SlideShare a Scribd company logo
ICSE 2008 Proc. 2008, Johor, Malaysia
Reliable Fast Detection Anti-collision Technique for RFID
System Implemented on Chip
Jahariah Sampe, Nonmember, IEEE and Masuri Othman, Member, IEEE
Department of Electrical, Electronics and System Faculty of Engineering,
Institute of Microengineering and Nanoelectronic,
Universiti Kebangsaan Malaysia
43600 Bangi, Selangor, MALAYSIA
Email:jahariah@yahoo.com
Abstract The paper presented a proposed
Reliable Fast Detection Anti-collision
Technique (RFDACT) for Radio Frequency
Identification (RFID) system. Our proposed
RFDACT is implemented on-chip using
Application Specific Integrated Circuit (ASIC)
technology. The RFDACT consists of two
main subsystems; PreFDACT and
PostFDACT. The PreFDACT detects any
error in the incoming messages. Then, the
identification bit (ID) of the error free packet
will be fed to the next subsystem. The
PostFDACT will identify the tag by using the
deterministic fast detection anti-collision
technique. The proposed system is designed
using Verilog HDL. The system is simulated
using Modelsim and synthesized using Xilinx
Synthesis Technology. The system has been
successfully implemented in hardware using
Field Programmable Grid Array (FPGA)
VirtexII. The output waveforms from the
FPGA are tested on the Tektronix Logic
Analyzer for real time verification. Finally the
RFDACT system is implemented on chip using
0.18 µm Library, Synopsys Compiler and
tools. The hardware verification result shows
the proposed system enables to identify the
tags at the operating frequency of 180 MHz
without error. The system’s chip is consumed
7.578mW powers, occupied 6,041 gates and
0.0375 mm2
area.
I. INTRODUCTION
THE Radio Frequency Identification (RFID)
system consists of three main components; reader,
tag and data management software. The reader is
to write instructions to and to read data from the
tags. The tags are to store data or unique
Identification bits (ID) and are basically attached
to the objects to be identified. During the data
transmission from the tags to the reader, there
might be an error. Therefore, a main role of the
Data link layer in the data management system is
to convert the unreliable physical link between
reader and tag into a reliable link. As a result the
RFID system employs the Cyclic Redundancy
Check (CRC) as an error detection scheme. The
CRC calculation consists of an iterative process
involving Exclusive-ORs and shift register which
is executed much faster in hardware compare in
software [10-11].
In addition an anti-collision technique is
required to coordinate the communication
between the reader and the multiple tags. The
common deterministic anti-collision techniques
are based on the Tree algorithm such as the Binary
Tree and the Query Tree algorithms [1-4]. In the
Binary Tree algorithm, the identification process
will firstly search the smallest tag’s ID until the
largest one follows the Binary Tree sequence.
Since this algorithm is a deterministic
anti-collision technique, the reader will control
the communication between the Tags. As a result
enable production of the tag with simple, small,
low cost and low power features. However the
drawback of the Binary Tree algorithm is its
identification time is dependent on two
parameters; the number of tags simultaneously
exists in the interrogation zone and the length of
tag’s ID. If either one of these parameters is
increased the identification time will increase.
Moreover this algorithm also requires the tags to
remember the previous instructions from the
reader during the communication process.
II. RFDACT ARCHITECTURE
Based on the Binary Tree anti-collision
algorithm, the Reliable Fast Detection
Anti-collision Technique (RFDACT) is proposed.
2491-4244-2561-7/08/$20.00 ©2008 IEEE
ICSE 2008 Proc. 2008, Johor, Malaysia
The proposed RFDACT is novel in terms of faster
identification time by reducing the number of
iterations needed to identify one tag. The
powered tags are divided into a group of four for
every Read cycle in order to reduce the number of
iterations during the identification process. In
addition, the identification time of the proposed
RFDACT does not dependent on the length of the
tag’s ID. Instead of sending and receiving the ID
bit by bit, the RFDACT will read all the ID bits at
once regardless of its length. This is performed by
using the word-by-word multiplexing or byte
interleaving. Meanwhile, this algorithm also does
not require the tags to remember the previous
instructions from the reader during the
identification process. The reader transmits the
read command to the tags and the tags will
simultaneously backscatter its’ ID bits. As a
result the tag is treated as an address carrying
device i.e. the tag only carries its identification
bits. Therefore, the memoryless tag which
exhibits very low power consumption can be
produced [3].
The RFDACT system is based on a Time
Division Multiplexing (TDM) operation.
Therefore three parameters are used to measure
the performance of the system; the maximum data
rate (N), the length of ID bits (n) and the number
of supported input/output lines (L). The
identification time for RFDACT system is same
regardless of the length of the tag’s ID and equal
to one System clock cycle (T). Therefore, the
relationship between the maximum data rate (N),
the length of ID bits (n), the access time (tacc) and
the number of input/output lines (L) is given by
the following equation [12].
acctL
n
N
×
= (1)
In order to increase the throughput of the primary
RFDACT system, the number of input/output
lines (channels) should be increased. But from
(1), it shows that if the data rate increases, the
number of supported lines will be decreased and
vice versa. Therefore, to increase the number of
lines supported by the system per read cycle
without decreasing the maximum data rate, a few
primary RFDACT modules should be
multiplexed.
Fig. 1 shows the block diagram of the RFDACT
system, which consist of two main subsystems;
PreRFDACT (front end) and PostRFDACT (back
end). The PreRFDACT subsystem as shown in
Fig. 1(a) is used to detect error in the incoming
messages. The CRC-generator module in this
subsystem employs the CRC16-CCITT standard
using the polynomial generator of X16
+ X12
+ X5
+1. Output from this subsystem which consist
only the ID of the active tags will be fed to the
next subsystem. The PostRFDACT subsystem as
shown in Fig. 1(b) will identify these tags’ ID by
using the Fast Detection anti-collision technique.
(a) Pre-RFDACT
(b) Post-RFDACT
Fig. 1 The subsystems of RFDACT system
In the PreRFDACT, the received messages are
fed into the CRC-remover module. In this module,
the received messages are separated into two; the
received packet and the received CRC. Then
these packet and CRC will be sent to the
CRC-checker module for a verification process.
The CRC-checker module will recalculate the
CRC of the received packet. Thus, the calculated
CRC are compared with the received CRC. If the
values are the same means no error, the statusbit is
set to its original value i.e. zero. Otherwise or
there are errors in the packet, the statusbit is set to
two. After that, this updated statusbit is appended
to its respective packet. Next the packet with the
updated status-bit is fed to the Status-checker
module. Finally the Status-checker module will
check the incoming packets whether have errors
or not. If there are errors, reset the slot of the
respective packet to zero value. Otherwise, fill the
slot of the packet with its respective ID. Hence,
the status-bit will be removed from its packet and
:
:
Data-value0
Status-Checker
Data-value3
:
CRC
Checker0
CRC-Remover
CRC
Checker3
Packet0
Pakcet3
Active0
Active3Clock
Reset
Messages
Tag clock
To monitor
(tag_out)
Improved
Fast-search
Read-Killtag
Reset
Clock
Clock Divider
Active0
Active3
To upper layer
(tag_kill)
Select
Generator
250
ICSE 2008 Proc. 2008, Johor, Malaysia
only the tag’s ID will be output to the
PostRFDACT.
In the PostRFDACT, the Fast-search module
will identify the four tag’s IDs simultaneously in
one Read cycle which equal to a Tag clock cycle.
The module will firstly identify the smallest ID
bits until the largest one follows the Binary Tree
with a maximum number of four leaves. Finally,
the identified tag will be killed by adding a bit ‘1’
to the most significant bit (MSB) of the tag’s ID
[9].
2.1 RFDACT modules
The proposed RFDACT system is designed using
Verilog HDL. The PreRFDACT system as shown
in Fig. 1(a) consists of Message-generator,
CRC-remover and Status-checker modules. Each
of these modules consist of a few submodules.
Message-generator module consists of
Packet-generator and CRC-generator submodules.
CRC-remover module consists of four
CRC-checker modules. CRC-checker module
consists of the CRC generator module and a
comparator. Status-checker module consists of
four Data-value submodules. All these modules
are synchronized to a system clock. The output of
this system which consist only the active tags’ ID
will become an input to the PostRFDACT system.
The PostRFDACT system as shown in Fig. 1(b)
consists of Fast-search, Read-killtag,
Clock-divider and Select-generator modules. All
these modules are also synchronized to a system
clock. In this subsystem there are two output
ports, the first port is to display the identified tags.
The other port is to acknowledge the successful
identified tags.
III. SIMULATION RESULTS
Verilog HDL codes for the RFDACT system
have been successfully simulated and verified
using the ModelSim XE II/Starter 5.7g tool. The
following will discuss the Behavioral simulation
waveforms for the selected ports in the RFDACT
system as shown in Fig. 2. At the first Read
cycle, for the received messages of 000C8584416,
0000550A516, 00010123116, and 0EA6093DF16,
the recalculated CRC of these messages are
584416, 50A516, 123116, and 93DF16 respectively.
As a result, the calculated CRCs are equal to the
received CRCs which is represented by the four
bit of the least significant bit (LSB) of the
messages. Since there are no errors in the received
messages, the statusbit of the packets are set to
zero, which are represented by the MSB of the
packets; 000C816, 0000516, 0001016 and 0EA6016
respectively. Finally, the ID of these packets will
be fed simultaneously to the PostRFDACT
system at the positive edge of the Tag clock.
(a) Output data from the PreRFDACT modules
(b) Output data form the PostRFDACT modules
Fig. 2 The Behavioral simulation of RFDACT
In the PostFDACT subsystem, the Fast-search
module will identify the four active tags
simultaneously starting from the smallest value to
the largest one. For examples, for the four input
tag’s ID of 00C816, 000516, 001016 and EA6016
will be identified as 00516, 001016, 00C816 and
EA6016 respectively. Then these identified tags
will be fed to the Read-killtag module
simultaneously at the negative edge of the Tag
clock. Finally, the Read-killtag Module will
output the four identified tags serially, one tag at
every cycle of the system clock starting from the
smallest tag’s ID to the largest one. Moreover, at
the same clock cycle, the identified tag will be
killed.
251
ICSE 2008 Proc. 2008, Johor, Malaysia
IV. IMPLEMENTATION AND VERIFICATION
The RFDACT system has been implemented in
hardware using the Field Programmable Grid
Array (FPGA) model Virtex II Xc2v250. The
output waveforms from the FPGA have been
displayed using the Tektronix Logic Analyzer
model TLA 5201 for real time verification. From
the result, it shows that the system still enables to
identify the tags at the operating frequency of 180
MHz without errors. This is the maximum
operating frequency of the used FPGA model.
The following will compare and discuss the
FPGA output and its respective Place-Route
Simulation output. This is purposely to verify the
correctness of the obtained FPGA output.
(a) FPGA output using Spectrum Analyzer
(b) Place-Route simulation output
Fig. 3 Output at the operating frequency of 40 MHz
Fig. 3(a) shows the FPGA output at the
operating frequency of 40 MHz and the threshold
voltage of 1.25V. The figure consists of two
portions; the upper and the bottom which
represent the low and the high sampling rate
waveforms respectively. For each portion the A3
represents the eight MSB of the tag’s ID and the
A2 represents the eight LSB of the tag’s ID. Fig.
3(b) is the equivalent Place-Route simulation
output of Fig. 3(a). For examples for both outputs,
the identified tags at the first Read cycle are
0D5916, 356016, 6B6816 and 8A5016. For the
second Read cycle, the identified tags are 0D5A16,
356416, 6B7016 and 8A5C16 etc. From the
comparison results, it shows that the RFDACA
system is correctly identified the tags at this
operating frequency.
Since the RFDACT system is successfully
implemented in hardware using FPGA with
desired performances. Then the system is
implemented on chip using ASIC approach. In
this approach the system is resynthesized using
0.18µm Library, Synopsys Compiler and tools. In
ASIC the most critical step is to determine the
design constraint parameters for the synthesis.
The chosen constraint parameters should ensure
that there is no constraint parameters are violated.
The other synthesis results for the system clock
period of 3.3 ns are shown on Table 1. This clock
period is given a good slack value of 0.41 ns.
Table 1 Synthesized output parameters
Xilinix Parameters ASIC Parameters
Max. Frequency=253MHz Cell area= 0.03753 mm2
Total gate count=6041 Power = 7.578 mW
Connection Delay=1.18ns Arrival time=2.31ns
Max. pin Delay=5.35ns Slack = 0.41 ns
Table 1 shows the output parameters using two
synthesis technology; Xilinix and ASIC. The
RFDACT system has the maximum operating
frequency of 253 MHz and the total gates of 6,041.
The average connection delay is 1.18 ns and the
maximum pin delay is 5.35 ns. Moreover, the
RFDACT is occupied 0.03753 mm2
cell area and
consumed 7.578 mW power. The data required
time and the data arrival time are 2.72 ns and
2.31ns respectively.
V. CONCLUSIONS
A proposed Reliable Fast Detection
Anti-collision Technique (RFDACT) is presented
to achieve a reliable and faster identification of
the tags. An error packet is detected at the front
end of the system before the tag identification
process is carried out. The faster identification
process is performed at the back end of the system
by using the deterministic anti-collision
technique. The RFDACT system has been
successfully implemented in hardware using
FPGA model Virtex II Xc2v250. The simulation
output of the system has been verified in real time
using Tektronix Logic Analyzer model TLA 520.
252
ICSE 2008 Proc. 2008, Johor, Malaysia
From the verification result, it shows that this
hardware implemented system enables to identify
the tags at the operating frequency of 180 MHz
without error. Then the system is implemented on
chip using 0.18 µm Library, Synopsys compiler
and tools. The synthesis result shows that the
minimum identification time is 3.3 ns. The chip is
utilized 6041 gates, occupied 0.03753 mm2
cell
area and consumed 7.578 mW power.
REFERENCES
[1] K. Finkenzeller, and R. Waddington, RFID
handbook: fundamental and applications in
Contactless Smart Cards and Identification, John
Wiley & Sons (2003).
[2] F. Zhou, D. Jing, C. Huang and H. Min,
“Evaluating and optimizing power consumption
of anti-collision protocols for applications in
RFID Systems,” Proc. ISLPED’04, International
Symposium on Low Power Electronics and
Design (2004).
[3] C. Law, K. Lee and K. Y. Siu, “Efficient
memoryless protocol for tag identification,” Proc.
4th
International Workshop on Discrete
Algorithms and Methods for Mobile Computing
and Communications, pp. 75-84 (2000).
[4] J. Myung and W. Lee, “Adaptive Binary Splitting
for Efficient RFID Tag Anti-Collision,” IEEE
Communication Letters, vol. 10, No.3,
pp.144-146 (2006).
[5] Shih, D. H, Sun, P. L, Yen, D. C. and Shi-Ming
Huang S. M, “Taxonomy and survey of RFID
anti-collision protocols,” Computer
Communications, Elsevier Science Publishers,
Vol. 29, Issue 11, pp. 2150-2166 (2006).
[6] S. Sarma, D. Brock and D. Engels, “Radio
Frequency Identification and the Electronic
Product Code,” IEEE Micro, vol. 21 No. 6,
pp.50-54 (2001).
[7] Choi, H.S., Cha, J.R. and Kim, J.H., “Improved
Bit-by-Bit Binary Tree Algorithm in Ubiquitous
ID System”, Proc. of the International
Conference on Advances in Multimedia
Information Processing, Springer Publisher,
LNCS 3332, pp. 696-703, (2004).
[8] S. Singh, “Low Cost Object Identification in
RFID via Dynamic Markov Chain & Two Time
Scale SPSA,” Proc. SAINTW’06, International
Symposium on Applications and the Internet
Workshops (2006).
[9] Jahariah S. and Masuri O., “Fast Detection
Anti-collision Algorithm for RFID System
Implemented On-chip”, J. of Applied Science
8(7), pp. 1315-1319 (2008)
[10] William Stallings, “Digital Data Communication
Techniques” in Data and Computer
Communications, Macmillan, Inc., pp. 103-112,
(1988).
[11] Chris Borrelli, IEEE 802.3 Cyclic Redundancy
Check, XAPP209 (v1.0), Xilinix Publishers
(2001).
[12] Edmond Zahedi: Digital data communication.
Prentice Hall, pp.171-177 (2002).
253

More Related Content

PDF
Design of Anti-collision Technique for RFID UHF Tag using Verilog
PPTX
07 coms 525 tcpip - udp [autosaved]
PDF
Concurrent Online Test of RFID Memories Using MBIST
PDF
A Sense-based Registration Process for TDMA in IEEE 802.11 Network q
PDF
Automatic Analyzing System for Packet Testing and Fault Mapping
PDF
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
PDF
Ccna 3-discovery-4-0-module-3-100-
PPTX
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3
Design of Anti-collision Technique for RFID UHF Tag using Verilog
07 coms 525 tcpip - udp [autosaved]
Concurrent Online Test of RFID Memories Using MBIST
A Sense-based Registration Process for TDMA in IEEE 802.11 Network q
Automatic Analyzing System for Packet Testing and Fault Mapping
A 2 stage data word packet communication decoder using rate 1-by-3 viterbi de...
Ccna 3-discovery-4-0-module-3-100-
Unit 10 Assignment_2_Sig_Theory_and_Data Elements V3

What's hot (20)

PDF
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
PPTX
ND0801_Assignment_3_Protocols for P3
PDF
Implementation of message authentication code using DNA-LCG key and a novel h...
PDF
Interprocess Message Formats
PDF
Multi Process Message Formats
PDF
Electronic Identification System using RFID
PDF
X4103141144
PPT
813 Ieeestds 090330072026 Phpapp01
DOCX
Data link layer
PPTX
Data link layer
PDF
Ba25315321
DOCX
Cs8581 networks lab manual 2017
DOCX
Cn lab manual 150702
PDF
Ccna 3-discovery-4-0-module-7-100-
PDF
Online stream mining approach for clustering network traffic
PDF
Online stream mining approach for clustering network traffic
PDF
A novel defence scheme against selfish Node attack in manet
PDF
IEEE 802.11a Physical Layer Simulation
PDF
Fpga implemented multichannel hdlc transceiver
PDF
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
Securing AODV Routing Protocol in MANET to Detect Wormhole Attack Using NMAC ...
ND0801_Assignment_3_Protocols for P3
Implementation of message authentication code using DNA-LCG key and a novel h...
Interprocess Message Formats
Multi Process Message Formats
Electronic Identification System using RFID
X4103141144
813 Ieeestds 090330072026 Phpapp01
Data link layer
Data link layer
Ba25315321
Cs8581 networks lab manual 2017
Cn lab manual 150702
Ccna 3-discovery-4-0-module-7-100-
Online stream mining approach for clustering network traffic
Online stream mining approach for clustering network traffic
A novel defence scheme against selfish Node attack in manet
IEEE 802.11a Physical Layer Simulation
Fpga implemented multichannel hdlc transceiver
PROTECTOR CONTROL PC-AODV-BH IN THE AD HOC NETWORKS
Ad

Viewers also liked (20)

PPTX
5 Top Collection of Diamond Engagement Rings
PPTX
Daktari Newsletter July - August 2011
PDF
Satelliet meubelen - Zien en gezien worden - 29 en 30 oktober 2014
PPTX
Soulbrands of the 21st Century
PPTX
Portfolio Review
PPSX
Daktari Newsletter May - June
DOC
Formular aplicare pentru experti amare phrala
PPT
Rfid presentation in internet
DOCX
When the faith rubber meets the road mile 3
PPTX
5 Top Collection of Diamond Engagement Rings by Adiamor
PPTX
Föräldrtamöte om spelande ppt
PPTX
Xmas 10
PPTX
Jacques Louis David
PPTX
DAKTARI Newsletter - October, November, December 2014
DOCX
Technology table
PDF
Pata rat stocktaking visit report june 2011
PDF
Islami dunya taghoot ulma copy
PDF
Mihai Eminescu economist
PDF
Rezoluţia privind problema construcţiei obiectivului
DOC
Formular aplicare pentru experti amare phrala
5 Top Collection of Diamond Engagement Rings
Daktari Newsletter July - August 2011
Satelliet meubelen - Zien en gezien worden - 29 en 30 oktober 2014
Soulbrands of the 21st Century
Portfolio Review
Daktari Newsletter May - June
Formular aplicare pentru experti amare phrala
Rfid presentation in internet
When the faith rubber meets the road mile 3
5 Top Collection of Diamond Engagement Rings by Adiamor
Föräldrtamöte om spelande ppt
Xmas 10
Jacques Louis David
DAKTARI Newsletter - October, November, December 2014
Technology table
Pata rat stocktaking visit report june 2011
Islami dunya taghoot ulma copy
Mihai Eminescu economist
Rezoluţia privind problema construcţiei obiectivului
Formular aplicare pentru experti amare phrala
Ad

Similar to Check shavad (20)

PDF
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
PDF
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
PDF
A network behavior analysis method to detect this writes about a method to ...
PDF
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
PDF
TABLE-BASED IDENTIFICATION PROTOCOL OF COMPUTATIONAL RFID TAGS
PDF
Table-Based Identification Protocol of Compuatational RFID Tags
PDF
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
PDF
Introduction to VIP with PCI Express Technology
PDF
Iaetsd implementation of aho corasick algorithm
PDF
A novel authenticated cipher for rfid systems
PDF
Jy3717961800
PDF
Electronic voting machine using RFID
PDF
Co emulation of scan-chain based designs
PDF
Design of Automatic Identification and Sorting System for Parcels Based on Pl...
PDF
IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...
PDF
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
PDF
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
PDF
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
PDF
The Design of an MVB Communication Controller Based on an FPGA
ASSURED NEIGHBOR BASED COUNTER PROTOCOL ON MAC-LAYER PROVIDING SECURITY IN MO...
IRJET - Network Traffic Monitoring and Botnet Detection using K-ANN Algorithm
A network behavior analysis method to detect this writes about a method to ...
Turbo encoder and decoder chip design and FPGA device analysis for communicat...
TABLE-BASED IDENTIFICATION PROTOCOL OF COMPUTATIONAL RFID TAGS
Table-Based Identification Protocol of Compuatational RFID Tags
Software-Defined Networking Changes for the Paradigm for Mission-Critical Ope...
Introduction to VIP with PCI Express Technology
Iaetsd implementation of aho corasick algorithm
A novel authenticated cipher for rfid systems
Jy3717961800
Electronic voting machine using RFID
Co emulation of scan-chain based designs
Design of Automatic Identification and Sorting System for Parcels Based on Pl...
IRJET - Netreconner: An Innovative Method to Intrusion Detection using Regula...
IRJET- Netreconner: An Innovative Method to Intrusion Detection using Regular...
A new dynamic speech encryption algorithm based on Lorenz chaotic map over in...
IRJET- Performance Improvement of Wireless Network using Modern Simulation Tools
The Design of an MVB Communication Controller Based on an FPGA

More from Ali Azarnia (11)

PDF
PDF
047067220 x 113
PPT
K.chart
PDF
Guide to thesis preparation (ver. 2013)
PDF
10.1.1.150.595
PDF
Mabani mokhaberat
PDF
Advanced computer networks(1)
PDF
Forouzan part1
PDF
Java farsi
PDF
Jalase1
PDF
Multimedia communications by fred halsal we learnfree
047067220 x 113
K.chart
Guide to thesis preparation (ver. 2013)
10.1.1.150.595
Mabani mokhaberat
Advanced computer networks(1)
Forouzan part1
Java farsi
Jalase1
Multimedia communications by fred halsal we learnfree

Recently uploaded (20)

PPTX
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
PDF
COST SHEET- Tender and Quotation unit 2.pdf
PPTX
Principles of Marketing, Industrial, Consumers,
PDF
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
PDF
How to Get Business Funding for Small Business Fast
PDF
WRN_Investor_Presentation_August 2025.pdf
PDF
Training And Development of Employee .pdf
DOCX
Business Management - unit 1 and 2
PDF
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
PPTX
Belch_12e_PPT_Ch18_Accessible_university.pptx
PDF
IFRS Notes in your pocket for study all the time
DOCX
Euro SEO Services 1st 3 General Updates.docx
DOCX
unit 1 COST ACCOUNTING AND COST SHEET
PDF
Reconciliation AND MEMORANDUM RECONCILATION
PDF
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
PPTX
Amazon (Business Studies) management studies
PDF
Chapter 5_Foreign Exchange Market in .pdf
PDF
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
PDF
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
PPTX
Dragon_Fruit_Cultivation_in Nepal ppt.pptx
CkgxkgxydkydyldylydlydyldlyddolydyoyyU2.pptx
COST SHEET- Tender and Quotation unit 2.pdf
Principles of Marketing, Industrial, Consumers,
Outsourced Audit & Assurance in USA Why Globus Finanza is Your Trusted Choice
How to Get Business Funding for Small Business Fast
WRN_Investor_Presentation_August 2025.pdf
Training And Development of Employee .pdf
Business Management - unit 1 and 2
Elevate Cleaning Efficiency Using Tallfly Hair Remover Roller Factory Expertise
Belch_12e_PPT_Ch18_Accessible_university.pptx
IFRS Notes in your pocket for study all the time
Euro SEO Services 1st 3 General Updates.docx
unit 1 COST ACCOUNTING AND COST SHEET
Reconciliation AND MEMORANDUM RECONCILATION
Katrina Stoneking: Shaking Up the Alcohol Beverage Industry
Amazon (Business Studies) management studies
Chapter 5_Foreign Exchange Market in .pdf
Solara Labs: Empowering Health through Innovative Nutraceutical Solutions
kom-180-proposal-for-a-directive-amending-directive-2014-45-eu-and-directive-...
Dragon_Fruit_Cultivation_in Nepal ppt.pptx

Check shavad

  • 1. ICSE 2008 Proc. 2008, Johor, Malaysia Reliable Fast Detection Anti-collision Technique for RFID System Implemented on Chip Jahariah Sampe, Nonmember, IEEE and Masuri Othman, Member, IEEE Department of Electrical, Electronics and System Faculty of Engineering, Institute of Microengineering and Nanoelectronic, Universiti Kebangsaan Malaysia 43600 Bangi, Selangor, MALAYSIA Email:jahariah@yahoo.com Abstract The paper presented a proposed Reliable Fast Detection Anti-collision Technique (RFDACT) for Radio Frequency Identification (RFID) system. Our proposed RFDACT is implemented on-chip using Application Specific Integrated Circuit (ASIC) technology. The RFDACT consists of two main subsystems; PreFDACT and PostFDACT. The PreFDACT detects any error in the incoming messages. Then, the identification bit (ID) of the error free packet will be fed to the next subsystem. The PostFDACT will identify the tag by using the deterministic fast detection anti-collision technique. The proposed system is designed using Verilog HDL. The system is simulated using Modelsim and synthesized using Xilinx Synthesis Technology. The system has been successfully implemented in hardware using Field Programmable Grid Array (FPGA) VirtexII. The output waveforms from the FPGA are tested on the Tektronix Logic Analyzer for real time verification. Finally the RFDACT system is implemented on chip using 0.18 µm Library, Synopsys Compiler and tools. The hardware verification result shows the proposed system enables to identify the tags at the operating frequency of 180 MHz without error. The system’s chip is consumed 7.578mW powers, occupied 6,041 gates and 0.0375 mm2 area. I. INTRODUCTION THE Radio Frequency Identification (RFID) system consists of three main components; reader, tag and data management software. The reader is to write instructions to and to read data from the tags. The tags are to store data or unique Identification bits (ID) and are basically attached to the objects to be identified. During the data transmission from the tags to the reader, there might be an error. Therefore, a main role of the Data link layer in the data management system is to convert the unreliable physical link between reader and tag into a reliable link. As a result the RFID system employs the Cyclic Redundancy Check (CRC) as an error detection scheme. The CRC calculation consists of an iterative process involving Exclusive-ORs and shift register which is executed much faster in hardware compare in software [10-11]. In addition an anti-collision technique is required to coordinate the communication between the reader and the multiple tags. The common deterministic anti-collision techniques are based on the Tree algorithm such as the Binary Tree and the Query Tree algorithms [1-4]. In the Binary Tree algorithm, the identification process will firstly search the smallest tag’s ID until the largest one follows the Binary Tree sequence. Since this algorithm is a deterministic anti-collision technique, the reader will control the communication between the Tags. As a result enable production of the tag with simple, small, low cost and low power features. However the drawback of the Binary Tree algorithm is its identification time is dependent on two parameters; the number of tags simultaneously exists in the interrogation zone and the length of tag’s ID. If either one of these parameters is increased the identification time will increase. Moreover this algorithm also requires the tags to remember the previous instructions from the reader during the communication process. II. RFDACT ARCHITECTURE Based on the Binary Tree anti-collision algorithm, the Reliable Fast Detection Anti-collision Technique (RFDACT) is proposed. 2491-4244-2561-7/08/$20.00 ©2008 IEEE
  • 2. ICSE 2008 Proc. 2008, Johor, Malaysia The proposed RFDACT is novel in terms of faster identification time by reducing the number of iterations needed to identify one tag. The powered tags are divided into a group of four for every Read cycle in order to reduce the number of iterations during the identification process. In addition, the identification time of the proposed RFDACT does not dependent on the length of the tag’s ID. Instead of sending and receiving the ID bit by bit, the RFDACT will read all the ID bits at once regardless of its length. This is performed by using the word-by-word multiplexing or byte interleaving. Meanwhile, this algorithm also does not require the tags to remember the previous instructions from the reader during the identification process. The reader transmits the read command to the tags and the tags will simultaneously backscatter its’ ID bits. As a result the tag is treated as an address carrying device i.e. the tag only carries its identification bits. Therefore, the memoryless tag which exhibits very low power consumption can be produced [3]. The RFDACT system is based on a Time Division Multiplexing (TDM) operation. Therefore three parameters are used to measure the performance of the system; the maximum data rate (N), the length of ID bits (n) and the number of supported input/output lines (L). The identification time for RFDACT system is same regardless of the length of the tag’s ID and equal to one System clock cycle (T). Therefore, the relationship between the maximum data rate (N), the length of ID bits (n), the access time (tacc) and the number of input/output lines (L) is given by the following equation [12]. acctL n N × = (1) In order to increase the throughput of the primary RFDACT system, the number of input/output lines (channels) should be increased. But from (1), it shows that if the data rate increases, the number of supported lines will be decreased and vice versa. Therefore, to increase the number of lines supported by the system per read cycle without decreasing the maximum data rate, a few primary RFDACT modules should be multiplexed. Fig. 1 shows the block diagram of the RFDACT system, which consist of two main subsystems; PreRFDACT (front end) and PostRFDACT (back end). The PreRFDACT subsystem as shown in Fig. 1(a) is used to detect error in the incoming messages. The CRC-generator module in this subsystem employs the CRC16-CCITT standard using the polynomial generator of X16 + X12 + X5 +1. Output from this subsystem which consist only the ID of the active tags will be fed to the next subsystem. The PostRFDACT subsystem as shown in Fig. 1(b) will identify these tags’ ID by using the Fast Detection anti-collision technique. (a) Pre-RFDACT (b) Post-RFDACT Fig. 1 The subsystems of RFDACT system In the PreRFDACT, the received messages are fed into the CRC-remover module. In this module, the received messages are separated into two; the received packet and the received CRC. Then these packet and CRC will be sent to the CRC-checker module for a verification process. The CRC-checker module will recalculate the CRC of the received packet. Thus, the calculated CRC are compared with the received CRC. If the values are the same means no error, the statusbit is set to its original value i.e. zero. Otherwise or there are errors in the packet, the statusbit is set to two. After that, this updated statusbit is appended to its respective packet. Next the packet with the updated status-bit is fed to the Status-checker module. Finally the Status-checker module will check the incoming packets whether have errors or not. If there are errors, reset the slot of the respective packet to zero value. Otherwise, fill the slot of the packet with its respective ID. Hence, the status-bit will be removed from its packet and : : Data-value0 Status-Checker Data-value3 : CRC Checker0 CRC-Remover CRC Checker3 Packet0 Pakcet3 Active0 Active3Clock Reset Messages Tag clock To monitor (tag_out) Improved Fast-search Read-Killtag Reset Clock Clock Divider Active0 Active3 To upper layer (tag_kill) Select Generator 250
  • 3. ICSE 2008 Proc. 2008, Johor, Malaysia only the tag’s ID will be output to the PostRFDACT. In the PostRFDACT, the Fast-search module will identify the four tag’s IDs simultaneously in one Read cycle which equal to a Tag clock cycle. The module will firstly identify the smallest ID bits until the largest one follows the Binary Tree with a maximum number of four leaves. Finally, the identified tag will be killed by adding a bit ‘1’ to the most significant bit (MSB) of the tag’s ID [9]. 2.1 RFDACT modules The proposed RFDACT system is designed using Verilog HDL. The PreRFDACT system as shown in Fig. 1(a) consists of Message-generator, CRC-remover and Status-checker modules. Each of these modules consist of a few submodules. Message-generator module consists of Packet-generator and CRC-generator submodules. CRC-remover module consists of four CRC-checker modules. CRC-checker module consists of the CRC generator module and a comparator. Status-checker module consists of four Data-value submodules. All these modules are synchronized to a system clock. The output of this system which consist only the active tags’ ID will become an input to the PostRFDACT system. The PostRFDACT system as shown in Fig. 1(b) consists of Fast-search, Read-killtag, Clock-divider and Select-generator modules. All these modules are also synchronized to a system clock. In this subsystem there are two output ports, the first port is to display the identified tags. The other port is to acknowledge the successful identified tags. III. SIMULATION RESULTS Verilog HDL codes for the RFDACT system have been successfully simulated and verified using the ModelSim XE II/Starter 5.7g tool. The following will discuss the Behavioral simulation waveforms for the selected ports in the RFDACT system as shown in Fig. 2. At the first Read cycle, for the received messages of 000C8584416, 0000550A516, 00010123116, and 0EA6093DF16, the recalculated CRC of these messages are 584416, 50A516, 123116, and 93DF16 respectively. As a result, the calculated CRCs are equal to the received CRCs which is represented by the four bit of the least significant bit (LSB) of the messages. Since there are no errors in the received messages, the statusbit of the packets are set to zero, which are represented by the MSB of the packets; 000C816, 0000516, 0001016 and 0EA6016 respectively. Finally, the ID of these packets will be fed simultaneously to the PostRFDACT system at the positive edge of the Tag clock. (a) Output data from the PreRFDACT modules (b) Output data form the PostRFDACT modules Fig. 2 The Behavioral simulation of RFDACT In the PostFDACT subsystem, the Fast-search module will identify the four active tags simultaneously starting from the smallest value to the largest one. For examples, for the four input tag’s ID of 00C816, 000516, 001016 and EA6016 will be identified as 00516, 001016, 00C816 and EA6016 respectively. Then these identified tags will be fed to the Read-killtag module simultaneously at the negative edge of the Tag clock. Finally, the Read-killtag Module will output the four identified tags serially, one tag at every cycle of the system clock starting from the smallest tag’s ID to the largest one. Moreover, at the same clock cycle, the identified tag will be killed. 251
  • 4. ICSE 2008 Proc. 2008, Johor, Malaysia IV. IMPLEMENTATION AND VERIFICATION The RFDACT system has been implemented in hardware using the Field Programmable Grid Array (FPGA) model Virtex II Xc2v250. The output waveforms from the FPGA have been displayed using the Tektronix Logic Analyzer model TLA 5201 for real time verification. From the result, it shows that the system still enables to identify the tags at the operating frequency of 180 MHz without errors. This is the maximum operating frequency of the used FPGA model. The following will compare and discuss the FPGA output and its respective Place-Route Simulation output. This is purposely to verify the correctness of the obtained FPGA output. (a) FPGA output using Spectrum Analyzer (b) Place-Route simulation output Fig. 3 Output at the operating frequency of 40 MHz Fig. 3(a) shows the FPGA output at the operating frequency of 40 MHz and the threshold voltage of 1.25V. The figure consists of two portions; the upper and the bottom which represent the low and the high sampling rate waveforms respectively. For each portion the A3 represents the eight MSB of the tag’s ID and the A2 represents the eight LSB of the tag’s ID. Fig. 3(b) is the equivalent Place-Route simulation output of Fig. 3(a). For examples for both outputs, the identified tags at the first Read cycle are 0D5916, 356016, 6B6816 and 8A5016. For the second Read cycle, the identified tags are 0D5A16, 356416, 6B7016 and 8A5C16 etc. From the comparison results, it shows that the RFDACA system is correctly identified the tags at this operating frequency. Since the RFDACT system is successfully implemented in hardware using FPGA with desired performances. Then the system is implemented on chip using ASIC approach. In this approach the system is resynthesized using 0.18µm Library, Synopsys Compiler and tools. In ASIC the most critical step is to determine the design constraint parameters for the synthesis. The chosen constraint parameters should ensure that there is no constraint parameters are violated. The other synthesis results for the system clock period of 3.3 ns are shown on Table 1. This clock period is given a good slack value of 0.41 ns. Table 1 Synthesized output parameters Xilinix Parameters ASIC Parameters Max. Frequency=253MHz Cell area= 0.03753 mm2 Total gate count=6041 Power = 7.578 mW Connection Delay=1.18ns Arrival time=2.31ns Max. pin Delay=5.35ns Slack = 0.41 ns Table 1 shows the output parameters using two synthesis technology; Xilinix and ASIC. The RFDACT system has the maximum operating frequency of 253 MHz and the total gates of 6,041. The average connection delay is 1.18 ns and the maximum pin delay is 5.35 ns. Moreover, the RFDACT is occupied 0.03753 mm2 cell area and consumed 7.578 mW power. The data required time and the data arrival time are 2.72 ns and 2.31ns respectively. V. CONCLUSIONS A proposed Reliable Fast Detection Anti-collision Technique (RFDACT) is presented to achieve a reliable and faster identification of the tags. An error packet is detected at the front end of the system before the tag identification process is carried out. The faster identification process is performed at the back end of the system by using the deterministic anti-collision technique. The RFDACT system has been successfully implemented in hardware using FPGA model Virtex II Xc2v250. The simulation output of the system has been verified in real time using Tektronix Logic Analyzer model TLA 520. 252
  • 5. ICSE 2008 Proc. 2008, Johor, Malaysia From the verification result, it shows that this hardware implemented system enables to identify the tags at the operating frequency of 180 MHz without error. Then the system is implemented on chip using 0.18 µm Library, Synopsys compiler and tools. The synthesis result shows that the minimum identification time is 3.3 ns. The chip is utilized 6041 gates, occupied 0.03753 mm2 cell area and consumed 7.578 mW power. REFERENCES [1] K. Finkenzeller, and R. Waddington, RFID handbook: fundamental and applications in Contactless Smart Cards and Identification, John Wiley & Sons (2003). [2] F. Zhou, D. Jing, C. Huang and H. Min, “Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID Systems,” Proc. ISLPED’04, International Symposium on Low Power Electronics and Design (2004). [3] C. Law, K. Lee and K. Y. Siu, “Efficient memoryless protocol for tag identification,” Proc. 4th International Workshop on Discrete Algorithms and Methods for Mobile Computing and Communications, pp. 75-84 (2000). [4] J. Myung and W. Lee, “Adaptive Binary Splitting for Efficient RFID Tag Anti-Collision,” IEEE Communication Letters, vol. 10, No.3, pp.144-146 (2006). [5] Shih, D. H, Sun, P. L, Yen, D. C. and Shi-Ming Huang S. M, “Taxonomy and survey of RFID anti-collision protocols,” Computer Communications, Elsevier Science Publishers, Vol. 29, Issue 11, pp. 2150-2166 (2006). [6] S. Sarma, D. Brock and D. Engels, “Radio Frequency Identification and the Electronic Product Code,” IEEE Micro, vol. 21 No. 6, pp.50-54 (2001). [7] Choi, H.S., Cha, J.R. and Kim, J.H., “Improved Bit-by-Bit Binary Tree Algorithm in Ubiquitous ID System”, Proc. of the International Conference on Advances in Multimedia Information Processing, Springer Publisher, LNCS 3332, pp. 696-703, (2004). [8] S. Singh, “Low Cost Object Identification in RFID via Dynamic Markov Chain & Two Time Scale SPSA,” Proc. SAINTW’06, International Symposium on Applications and the Internet Workshops (2006). [9] Jahariah S. and Masuri O., “Fast Detection Anti-collision Algorithm for RFID System Implemented On-chip”, J. of Applied Science 8(7), pp. 1315-1319 (2008) [10] William Stallings, “Digital Data Communication Techniques” in Data and Computer Communications, Macmillan, Inc., pp. 103-112, (1988). [11] Chris Borrelli, IEEE 802.3 Cyclic Redundancy Check, XAPP209 (v1.0), Xilinix Publishers (2001). [12] Edmond Zahedi: Digital data communication. Prentice Hall, pp.171-177 (2002). 253