ELG7177 Topics in Communications: Radio Frequency Identification (RFID)
Systems
Graduate Course
Fall 2012
PROFESSOR
Miodrag Bolic
School of Information Technology and Engineering (SITE),
University of Ottawa
Tel: (613) 562-5800 x 6224, Fax: (613) 562-5175
Email: mbolic@site.uottawa.ca
Web: www.site.uottawa.ca/~mbolic
Office Hours: Wednesday
12:00-13:00, CBY A-616
COURSE DESCRIPTION
Components of RFID
systems: tags, readers, software. Tag identification protocols: Aloha and tree
based. Reader infrastructure networking: Reducing interference in RFID reader
networks, deployments of large networks. Localization, read
rate improvements, security and privacy. Analysis of
related technologies and applications.
LONGER DESCRIPTION
The course is divided in five parts.
Part 1 provides an introduction and
describes architectures of both readers and tags. In addition, it defines
performance metrics and terminology that will be used in the course. It
distinguishes between passive and battery-operated systems with the emphasis on
the passive RFID systems.
Part 2 is related to networking protocols
that involve one reader and multiple tags with the goal of resolving tag to tag
interference. Tag identification protocols are covered in systematic way. They
include Aloha-based protocols, tree-based protocols which are the most popular.
In addition tag-talks-first and
tag-talks-only protocols as well as CDMA and SDMA protocols are discussed.
Necessary adjustments in the protocols needed for dynamic environments with
mobile tags are covered as well. Hardware solutions that are useful for
interference reduction are mentioned.
Part 3 provides coverage of networking protocols that
involve host and multiple readers. First, we will consider interface between
the host and the readers. Next, MAC layer solutions for reducing reader-to-tag
interference are discussed. In addition, redundant reader elimination problem,
mobility and energy conservation problems are covered as well. Deployments of
large RFID systems are discussed. Optimization of the whole system through
cross-layer design is discussed as well.
In Part 4, we will cover
several major research problems in RFID field such as read rates that are less
than 100% even in the most favorable RF environments, low read ranges, security problems, localization of tags and lack of
efficient simulators. Some of these
problems are so serious that they prevent wide-spread use of RFID technology
(e.g. low read rate). Hence, a number of these problems and potential solutions
are analyzed in this section. One solution to some of these issues is to
introduce novel RFID technologies.
In Part 5, we will discuss related
technologies including bar codes, wireless sensor networks as well as other
wireless technologies used for tagging and localization. We will also discuss
applications of RFID systems.
COURSE SCHEDULE
Activity |
Time |
Location |
LEC |
Friday 13:00-14:30 |
Lamoureux Hall (LMX)
Room: 390 |
LEC |
Wednesday 13:00 -14:30 |
Lamoureux Hall (LMX)
Room: 124 |
SUGGESTED TEXTS
Other relevant books:
PREREQUISITES
-
TOPICS DISCUSSED
(This is a very preliminary schedule)
Link to the
protected Web page
Lecture # |
Week of |
Topic |
Literature |
Additional topics |
1. |
Sep 3 |
Introduction Components and classification of RFID systems |
RFID Explained: A Primer on Radio Frequency Identification
Technology |
|
2. |
Sep 10 |
How RFID works: EPC
Generation 2 Standard |
“The RF in RFID: Passive UHF RFID in Practice” Chapter 8 |
|
3. |
Sep 17 |
Issues and problems in
passive UHF RFID systems |
RFID Systems: Research
trends and challenges: Chapter 1 “The RF in RFID: Passive UHF RFID in Practice” Chapter 3 |
|
4. |
Oct 24 |
Other components of EPCGlobal, middleware |
RFID Systems: Research trends and challenges Chapters 6 and 10 |
|
5 |
Oct 1 |
Standards and
implementation of HF systems |
Material to cover from Klaus Finkenzeller, ‘RFID Handbook:
Fundamentals and Applications in Contactless Smart Cards and Identification” : 3.2.1 4.1.1, 4.1.5, 4.1.7, 4.1.9.2 6.2 7.2.4.3 9.2.2, 9.2.3 10.1, 10.2 11.1 |
|
6. |
Oct 8 |
Smart cards and HF systems |
||
7. |
Oct 15 |
Localization for wireless networks and RFID systems ·
Methods,
techniques and devices used for localization ·
RTLS with
active RFID tags Localization of passive
RFID tags |
RFID Systems: Research trends and challenges Chapter 15 |
|
8. |
Oct 29 |
Antennas for RFID tags and
readers RF design of passive RFID
tags RF design of passive RFID
readers |
RFID Systems: Research trends and challenges Chapter 4, 5 |
|
10. |
Nov 5 |
Internet of things |
|
|
11. |
Nov 12 |
Merging RFID and wireless
sensor networks AIDC technologies: ·
Bar Coding ·
Biometrics ·
Contact Memory |
|
|
12. |
Nov 19 |
Additional topics: RFID-enabled
sensors, Tags with rechargeable batteries, Rubee
systems, SAW RFID systems, Dash-7, UWB RFID |
|
|
13. |
Nov 26 |
Reader-tag protocols –
current implementation and research directions: ·
Aloha-based
protocols ·
Tree based
protocols ·
Other solutions
for reducing collision |
|
|
14. |
Dec 3 |
Review |
|
Other topics of interest:
1.
Advanced techniques for RFID middleware: What is
complex event processing? How can one use negation, parasitized predicates, and
sliding windows to extend functionality of a RFID middleware. One of the
references can be: E. Wu, Y. Diao and S. Rizvi,
High-performance complex event processing over streams. In Proc. 2006 ACM
SIGMOD Int. Conf. Man. Data (2006) 407–418.
2.
Localization of objects using Zigbee
networks; structure of a Zigbee network.
3.
What is e-Pedigree RFID standard for the
pharmaceutical industry?
4.
Challenges of the deployment of large networks of
stationary UHF EPC-Gen 2 compliant RFID readers.
5.
Describe wireless techniques and solutions for
improving safety of elderly people. These are solutions for preventing
wandering as well as for monitoring some of the vital signs. Industrial
solutions include for example Wanderguard and GuardRFID.
MARKING SCHEME
·
Final exam (35%)
·
Preparation of the report
and presentation (30%)
·
Quizzes and class
participation (35%)
LECTURE PREPARATION
Additional topics will be prepared by
students. Students will need to prepare slides that can cover about 15 minutes.
In addition, the students will write a document about the topic of interest.
The document must be in IEEE format.
CLASS PARTICIPATION
We
will use Top Hat Monocle to solve some of the problems in the class. At the beginning
of the class there will be a short online quiz that will cover material from
last lecture. Please see more details about Top Hat Monocle on the Virtual
Campus.
.