Current Trends and Challenges in RFID 2011
DOI: 10.5772/16601
|View full text |Cite
|
Sign up to set email alerts
|

RFID Model for Simulating Framed Slotted ALOHA Based Anti-Collision Protocol for Muti-Tag Identification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
4
0

Year Published

2014
2014
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 6 publications
0
4
0
Order By: Relevance
“…In this algorithm, we have three cases for slots, collide completely, don't collide, or succeed. There is no partial collision, so this algorithm reduces waste of reading cycle [4].…”
Section: B Slotted Aloha Algorithm (Sa)mentioning
confidence: 99%
See 1 more Smart Citation
“…In this algorithm, we have three cases for slots, collide completely, don't collide, or succeed. There is no partial collision, so this algorithm reduces waste of reading cycle [4].…”
Section: B Slotted Aloha Algorithm (Sa)mentioning
confidence: 99%
“…Zornitza Prodanoff and Seungnam Kang say that in each read cycle there are multiple frames and each frame is divided into the same number of slots. So, this algorithm may reduce the number of collisions and give the best results compared with Slotted Aloha [4].…”
Section: Framed Slotted Aloha Algorithm (Fsa)mentioning
confidence: 99%
“…To minimize the impact of these collisions, the readers in the market implement a medium access control (MAC) mechanism based on the worldwide standard EPCglobal Class-1 Gen-2 [31]. It defines an MAC mechanism for RFID readers working at UHF that organize the tags responses by a Frame Slotted Aloha (FSA) protocol [32], controlled by the reader. This is a very simple mechanism with a low rate of identification, which has led the scientific community to propose new alternatives compatible with the standard that significantly increase the rate of identified tags per time unit [33][34][35][36].…”
Section: Agents At the Rfid Medium Access Controlmentioning
confidence: 99%
“…It is recommended to use bistatic antennas, with circular polarization, and a distance between the reader and the reader antennas (cable) less than 5 m. The reader will have at least 4 I/O ports, and it will work to the maximum output power according to the ITU region where it is operating. The reader-to-tag communication protocol must be EPCglobal Class-1 Gen-2 [31] or an improved version, compatible with the standard, that permits to modify the frame-length parameter (Q) [32][33][34]. Readers must implement a reader-toreader anti-collision protocol based on FHHS or a similar technique, being compatible with the current standard [31].…”
mentioning
confidence: 99%