2010 IEEE International Conference on Industrial Technology 2010
DOI: 10.1109/icit.2010.5472512
|View full text |Cite
|
Sign up to set email alerts
|

A comparative study of RFID schedulers in dense reader environments

Abstract: In realistic deployments, several readers may be placed in the same area, forming a, so-called, dense reader environment. These scenarios are susceptible to suffer Reader Collision Problems, characterized by Reader-to-Tag and Reader-to-Reader interferences. Both affect network throughput, decreasing the overall number of tags identified per reader. This paper reviews the mechanisms proposed to mitigate the Reader Collision Problems. Besides, the constraints of these techniques are pointed out. The mechanisms h… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
14
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
8
1

Relationship

0
9

Authors

Journals

citations
Cited by 28 publications
(14 citation statements)
references
References 10 publications
0
14
0
Order By: Relevance
“…Although the need of covering large areas has been partially satisfied by using MIMO RFID readers [9], the majority of the RFID applications, especially the largest, require a dense reader deployment, where RFID readers operate in close proximity. Consequently, UHF RFID systems are easy to suffer from the interference generated during simultaneous interrogation activities [10]. In this case, a reader can suffer a reader-to-reader collision due to the interference generated by the simultaneous operations of other RFID readers [11].…”
Section: Introductionmentioning
confidence: 99%
“…Although the need of covering large areas has been partially satisfied by using MIMO RFID readers [9], the majority of the RFID applications, especially the largest, require a dense reader deployment, where RFID readers operate in close proximity. Consequently, UHF RFID systems are easy to suffer from the interference generated during simultaneous interrogation activities [10]. In this case, a reader can suffer a reader-to-reader collision due to the interference generated by the simultaneous operations of other RFID readers [11].…”
Section: Introductionmentioning
confidence: 99%
“…Despite the use of an anti-collision protocol [3], the interrogation activity of an RFID reader depends on the application requirements and the behavior. In order to take into consideration different behaviors, two scenarios have been considered for the performance simulation: probabilistic interrogation and slotted interrogation.…”
Section: Evaluation Scenariosmentioning
confidence: 99%
“…Simulators further call attention to multi-tag and multireader environments [45][46][47][48][49][50][51][52]. The potential of generating misleading facts because of inaccurate modeling of underlying physical conditions (like the wireless channel or tag characteristics) has been discovered in [31].…”
Section: System Simulatorsmentioning
confidence: 99%