Radio Frequency Identification Prototyping.pdf_第1页
Radio Frequency Identification Prototyping.pdf_第2页
Radio Frequency Identification Prototyping.pdf_第3页
Radio Frequency Identification Prototyping.pdf_第4页
Radio Frequency Identification Prototyping.pdf_第5页
已阅读5页,还剩17页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、29 Radio Frequency Identifi cation Prototyping ALEX K. JONES, SWAPNA DONTHARAJU, SHENCHIH TUNG, LEO MATS, PETER J. HAWRYLAK, RAYMOND R. HOARE, JAMES T. CAIN, and MARLIN H. MICKLE University of Pittsburgh While RFID is starting to become a ubiquitious technology, the variation between different RFID

2、systems still remains high. This paper presents several prototyping environments for different components of radio frequency identifi cation (RFID) tags to demonstrate how many of these com- ponents can be standardized for many different purposes. We include two active tag prototypes, one based on a

3、 microprocessor and the second based on custom hardware. To program these de- vices we present a design automation fl ow that allows RFID transactions to be described in terms of primitives with behavior written in ANSI C code. To save power with active RFID devices we describe a passive transceiver

4、 switch called the “burst switch” and demonstrate how this can be used in a system with a microprocessor or custom hardware controller. Finally, we present a full RFID system prototyping environment based on real-time spectrum analysis technology currently deployed at the University of Pittsburgh RF

5、ID Center of Excellence. Using our prototyping tech- niques we show how transactions from multiple standards can be combined and targeted to several microprocessors include the Microchip PIC, Intel StrongARM and XScale, and AD Chips EISC as well as several hardware targets including the Altera Apex,

6、 Actel Fusion, Xilinx Coolrunner II, Spartan 3 and Virtex 2, and cell-based ASICs. Categories and Subject Descriptors: B.8.2 Performance and Reliability: Performance Analysis and Design Aids General Terms: Design, Experimentation, Standardization, Verifi cation Additional Key Words and Phrases: Desi

7、gn automation, low-power, prototyping, RFID ACM Reference Format: Jones, A. K., Dontharaju, S., Tung, S., Mats, L., Hawrylak, P. J., Hoare, R. R., Cain, J. T., and Mickle, M. H. 2008. Radio frequency identifi cation prototyping. ACM Trans. Des. Autom. Electron. Syst. 13, 2, Article 29 (April 2008),

8、22 pages, DOI = 10.1145/1344418.1344425 / 10.1145/1344418.1344425 This work was supported in part by the Technology Collaborative, ADICUS, Inc., the Ben Franklin Technology Development Program of PA, and the University of Pittsburgh. Authorsaddress:A.K.Jones,UniversityofPittsburgh,E

9、lectricalandComputerEngineering,3700 OHara Street, 348 Benedum Hall, Pittsburgh, PA 15261. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profi t or direct commercial adva

10、ntage and that copies show this notice on the fi rst page or initial screen of a display along with the full citation. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, to redist

11、ribute to lists, or to use any component of this work in other works requires prior specifi c permission and/or a fee. Permissions may be requested from Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1 (212) 869-0481, or . C?2008 ACM 1084-

12、4309/2008/04-ART29 $5.00 DOI 10.1145/1344418.1344425 / 10.1145/1344418.1344425 ACM Transactions on Design Automation of Electronic Systems, Vol. 13, No. 2, Article 29, Pub. date: April 2008. 29:2 A. K. Jones et al. 1. INTRODUCTION Much of the credit for the successful development of

13、 current wired and wireless networks is due to the layered concept that is a part of the Open System Inter- connection (OSI) Model. While all of the layers may not be used or employed in the manner intended, the idea and thought process were extremely help- ful as was true when structures were intro

14、duced years ago into the software development process. Radio Frequency Identifi cation (RFID) is a ubiquitous technology that is exciting,useful,andpotentiallyextremelypervasive.Theanalogiestonetworks and software can be easily identifi ed in RFID in that the information network connects to devices

15、termed interrogators or readers that trigger actions and receive information from the unconnected wireless devices termed tags. Thus, there is an information port/connection at the highest level (application layer) and an air interface (physical layer) at the other end of the “stack.” However, at th

16、is point, the analogy switches more to software in the ability to separate and interfacefunctionalityofindividuallayersasopposedtofacilitatingpeertopeer communication within classical network structures Ramteke 2001. Thus, the interrogator/reader is typically a hardware device (with some software) t

17、hat is a node on an information network and appears as a modem device with the tag functioning as Data Terminal Equipment (DTE) and the interrogator as Data Connection Equipment (DCE). However, this node (reader) is typically designed, developed, and marketed by an industry where competitive positio

18、n is based on features, functionality, cost, and reliability of the integrated unit as a whole. As the applications and customer requirements continue to increase and evolve, there is an inherent diversion in each of these features in order to solve a different problem. Thus, essentially each applic

19、ation requires a different reader and infrastructure de- signed and manufactured to satisfy a particular demand. While this situation may be lucrative to the companies selling legacy readers, it is a detriment to the general advancement of RFID as a technology. This article presents a series of prot

20、otyping environments and tools includ- ing both hardware and software components that provide a general procedure to facilitate the development of an open system interface (platform) for RFID interrogator/reader development. The goal is to reduce the disruptive and re- curring design and development

21、 costs for the infrastructure and multiple air interfaces. Several examples are provided based on current sponsored research and numerous conversations with frustrated end users. The remainder of this document is organized as follows: Section 2 contains some background on research and related work p

22、ertaining to RFID. A design automation fl ow for generating RFID tag controllers for both microprocessor and custom hardware based systems is described in Section 3 with examples from the ISO 18000 Part 6C standard, formerly called Gen 2 ISO/IEC 18000-6 2004. In this section we present two prototypi

23、ng environments, one for the microprocessor-based tag, and the other for a custom hardware tag. Section 4 describes two prototypes of a power-aware active RFID tag that employs a pas- sive front-end called the “burst-switch.” This section describes two platforms, ACM Transactions on Design Automatio

24、n of Electronic Systems, Vol. 13, No. 2, Article 29, Pub. date: April 2008. Radio Frequency Indentifi cation Prototyping 29:3 software and hardware based, to test the burst-switch and an encoding tech- niqueforthistechnology.Wepresentaprototypingtechniquebasedonreal-time spectrum analysis hardware a

25、nd software for RFID tags in Section 5. Section 6 presents some results from the use of these prototyping systems for various tag standards and techniques. Finally, conclusions are related in Section 7. 2. BACKGROUND AND RELATED WORK ResearchanddevelopmentinRFIDhasbeenfocusedonhardwareandfi rmware c

26、omponents such as active and passive RFID tags, readers, and embedded soft- ware, for the purpose of its deployment in specifi c application domains. RFID is being incorporated in supply chain management, giving enterprises a real- time view on the location and integrity of their inventories Sarma e

27、t al. 2002. RFID technology is used in a location sensing prototype system (LANDMARC) for locating objects inside buildings Ni et al. 2004. Novel architectures for deployments of RFID in libraries are described in Molnar and Wagner 2004. RFID tags have been adopted in the Vatican Library in Rome to

28、identify and manageitsextensivebookanddocumentcollectionTI2004.RFIDtagsandin- telligent transponders are widespread for vehicle to roadside communications, road tolling and vehicle access control Blythe 1999. The medical industry has also deployed RFID technology in “Mobile Healthcare Systems” for p

29、osi- tioning and identifying persons and objects inside and outside the hospitals Li et al. 2004. Different types of RFID prototype systems are being developed to support all aspects of aviation baggage tracking, sorting and reconciliation, which are surveyed in Cerino and Walsh 2000. Recent researc

30、h has focused on the collection and storage of RFID data using Geo-Time visualization Shuping and Wright 2005. Distributed Application Specifi cation Language (DASL) has been used to model and deploy software applications to process the RFID event data Kaundinya and Syed 2004. Many of these applicat

31、ions and others would benefi t considerably from a tag with long battery life, ideally a life equal to that of the tag. Most of the preceding applications and others use proprietary hard- ware and software that cannot tolerate changes to the application or standard. However, the use of design automa

32、tion for the development of fl exible RFID systems has not been a topic of research. In the embedded systems domain, however, the need for meeting aggressive time-to-market requirements has lead to signifi cant research to automate as many design steps as possible. Various design tools and specifi c

33、ation method- ologies such as Specifi cation and Description Language (SDL), Architecture Description Language (ADL) and Unifi ed Modeling Language (UML) are be- ing used in embedded systems design. SDL ITU-T 1994 is increasingly being used as a formal, abstract description technique at the system l

34、evel Muth et al. 2000. Optimizations for the performance of SDL-derived system implementa- tions and a tool that supports the complete development process are described in Pereira et al. 2000. ADL is a language designed to specify architecture tem- plates for Systems on Chips (SoCs). An ADL-based So

35、C codesign methodology that enables effi cient design space exploration of SoC architectures and auto- matic software toolkit generation has been developed Halambi et al. 1999. ACM Transactions on Design Automation of Electronic Systems, Vol. 13, No. 2, Article 29, Pub. date: April 2008. 29:4 A. K.

36、Jones et al. Fig. 1. Specifi cation methodology and compilation fl ow. UML is an analogous approach that is a collection of notations for capturing a specifi cation of a software system Rumbaugh et al. 1998. UML standards are used for specifying the requirements, documenting the structure, decomposi

37、ng into objects and defi ning relationships between objects in a software system. Some tools support code generation from the UML specifi cations, but are lim- ited by the lack of formalized semantics. Embedded UML is a UML profi le for embedded real-time system specifi cation, design, and verifi ca

38、tion Martin et al. 2001. All of the above approaches have enabled the effi cient development of embedded systems and mapping from specifi cations to the implementation models in signifi cantly short times. Development of a complete RFID system from the specifi cations in general has required a large

39、 amount of design time and expertise, similar to the de- velopment of embedded systems. Like embedded systems, RFID systems will benefi t from design approaches that can automatically generate target device software. Our contribution to the fi eld of RFID systems design is a tool that can automatica

40、lly generate the RFID tag controller software based on simple input specifi cations. This can signifi cantly reduce the design time and the cost of deploying fl exible RFID systems. In addition, the ability to rapidly prototype a custom RFID tag provides an economically viable means for individual c

41、ompanies to provide specialized features to differentiate their products from the competition in that particular application. The tools described here give the company the ability to obtain this differentiation without hiring large teams of skilled personnel. 3. DESIGN AUTOMATION FOR RFID The RFID c

42、ommunication system consists of a transponder or tag and an inter- rogator or reader. The format for exchanges between the interrogator and the transponder is a set of commands or primitives that requests that the transpon- der perform a set of actions. The specifi cations of these commands vary fro

43、m one standard to another. The fl ow of the RFID compiler is specifi ed in Figure 1. This particular compiler can accept virtually any set of commands as input and target a microprocessor or hardware device to provide the RFID tag controller functionality. 3.1 The ISO 18000 Part 6C UHF RFID Standard

44、 Figure 2 shows an example of the ISO 18000 Part 6C protocol for inventory and access of a single RFID tag. In step 1, the interrogator (reader) issues a query. In step 2, the tag responds with a randomly generated 16-bit number. ACM Transactions on Design Automation of Electronic Systems, Vol. 13,

45、No. 2, Article 29, Pub. date: April 2008. Radio Frequency Indentifi cation Prototyping 29:5 Fig. 2.Example transaction for ISO 18000 Part 6C. This random number is designed to avoid contention between multiple tags and to ensure that the reader is communicating with only a single tag. The reader ack

46、nowledges by returning a random 16-bit number in step 3. This selects only one tag with which to communicate. In step 4, only the tag that issued the matching random number responds with its PC/EPC, essentially its identifi er. In step 5, the reader issues a transaction request with the same random

47、number. The tag responds with a transaction handle in step 6. In step 7, the actual transaction is issued with the handle as a parameter. Finally, the tag responds to the transaction in step 8. An example transaction is shown in Figure 3. The output shown in this fi gure is generated from a special

48、piece of equipment housed in the University of Pittsburgh RFID Center of Excellence called a real-time spectrum analyzer (RTSA).TheexampletagusespassiveRFIDtechnologyrequiringtheRFenergy generated by the reader to be used to power the tag, and to be used for a backscatter-based response. Backscatter

49、ing uses the refl ection of RF energy providedbyanexternalsource(inthiscasethereader)totransmitinformation. The backscattering device (in this case the tag) either absorbs or refl ects the energy of the incoming RF to generate low and high values in the backscattered response. The prototyping of pro

50、tocols such as this can now be done in a matter of days by one or two people where otherwise the time and cost are both greater by at least an order of magnitude. 3.2 Specifi cation of Macros In order to implement the ISO 18000 Part 6C standard into our prototyping environment, we leverage the conce

51、pt of communication layers introduced in ACM Transactions on Design Automation of Electronic Systems, Vol. 13, No. 2, Article 29, Pub. date: April 2008. 29:6 A. K. Jones et al. Fig. 3.Real-time spectrum analyzer output of the example ISO 18000 Part 6C transaction. Section 1. Thus, communication tran

52、sactions between the RFID reader and the tag can be broken down into a series of RFID primitives. To automate the gen- eration of the tag controller for the prototype, we implement these primitives as simple, assembly-like instructions called RFID macros. For example, the RFID macros required for ex

53、ecuting the “write” command of the ISO 18000 Part 6C standard are shown here. The format of the respective fi elds of each necessary primitive and its corresponding response are both illustrated in Figure 4. The command code of each RFID primitive is a unique fi eld or opcode that serves as the iden

54、tifi er. Each of the RFID primitives also contains a subset of fi elds with varying lengths providing positions for data present in a command, as can be inferred from Figure 4. Similarly, the tag response to each RFID primitive has fi elds of varying lengths. Each RFID macro description contains a r

55、elatively short character string corresponding to the specifi c name of the primitive, a number indicating how many bits are used to represent the opcode of this particular primitive as well as the distinct number corresponding to the value of the opcode. Additionally, a set of operands that corresp

56、ond to the primitive is included. On the next line, a set of operands is included that corresponds to the standard response. Figure 5 shows an example RFID macros fi le containing the basic primi- tives of the ISO 18000 Part 6C standard for initiating a transaction as well as the write primitive. Th

57、e macros fi le has a declarations section and a main section. The declarations section allows the user to predeclare the lengths of all of the corresponding fi elds that occur in each of the primitives and responses. In the section identifi ed as main, the primitives and their specifi c responses ar

58、e defi ned in terms of their fi elds. ACM Transactions on Design Automation of Electronic Systems, Vol. 13, No. 2, Article 29, Pub. date: April 2008. Radio Frequency Indentifi cation Prototyping 29:7 Fig. 4.Selected primitives and response formats from ISO 18000 Part 6C. The specifi c fi elds can be

59、 easily described as illustrated in Figure 5. This provides the user with the ability to adopt any level of granularity in order to manipulate the primitives and their corresponding responses. For example, in the macros illustrated in the fi gure, the string denoting the write command is write. The decimal value of the command code for this specifi c command is “195,” stored using 8-bits. 3.3 RFID Controller Behavior Communication from the RFID interrogator (reader) is accomplished by trans- mitting the primitive to the RFID tag using a standard air interface. The tag will resp

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论