{"id":6886,"date":"2020-02-22T12:27:36","date_gmt":"2020-02-22T12:27:36","guid":{"rendered":"https:\/\/rfid4u.com\/?page_id=6886"},"modified":"2020-09-19T04:13:44","modified_gmt":"2020-09-19T04:13:44","slug":"rfid-anti-collision-and-dense-reader-mode","status":"publish","type":"page","link":"https:\/\/rfid4u.com\/rfid-anti-collision-and-dense-reader-mode\/","title":{"rendered":"RFID Anti-Collision and Dense Reader Mode"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1600488818167{background: #ffffff url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/Rfid4uWebsite-Background-Image-1.jpg?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;background-position-right-bottom&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Explore \/ RFID Basics &#038; Resources&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;RFID Anti-Collision and Dense Reader Mode&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1589010828775{background-color: #ffffff !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_row][vc_column][vc_column_text]Let\u2019s discuss various standards related to the design and use of RFID systems as well as a few RFID mandates issued by some commercial and governmental organizations, which drive a large part of RFID implementations today.[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>Standards are created by various organizations to facilitate interoperability among components of the system designed and manufactured by many different organizations. Many organizations develop standards\u2014for example, the International Organization for Standardization (ISO), American National Standards Institute (ANSI), and EPCglobal.<cite><\/cite><\/blockquote><\/div>[vc_column_text]While more than one standard may be available for a particular use and compliance with it is optional, regulations must be obeyed. Mandate compliance is optional. Mandates are created by organizations as a policy to interact with various business partners. The following sections describe various RFID standards and mandates that will effect the selection of a particular tag.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;READER TO READER INTERFERENCE&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]While tag to tag interference is called collision and it is usually prevented by an RFID anti-collision algorithm, the reader to reader interference is usually prevented by the RFID dense reader mode.<br \/>\nThe near-field readers use magnetic flux to communicate with the tags. The magnetic flux decays very rapidly and since the near-field readers are usually not installed very close to each other they do not interfere with each other.<br \/>\nReader-to-reader interference is only an issue for ultra-high frequency (UHF) and microwave readers operating in far-field. Reader interference countermeasures include:<br \/>\n\u2022 Physical isolation<br \/>\n\u2022 Absorptive materials<br \/>\n\u2022 Shielding<br \/>\n\u2022 Reduced transmit power<br \/>\n\u2022 Frequency hopping<br \/>\n\u2022 Band separation[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>The ISO\/IEC 18000 series of standards has seven parts and deals only with the air interface protocol. The standards define use of five frequency bands for communication between interrogator and tags. Let\u2019s review only the most important parts.<cite><\/cite><\/blockquote><\/div>[vc_column_text]When a reader and tag transmission share a channel, reader transmission is 100 dB larger than tag backscatter. The distant in-channel readers mask nearby tags. To solve this problem Generation 2 protocol provides three reader operation levels as follows:[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;]<div  class=\"rt-separator element-four \" data-separator-width=\"100%\" data-separator-color=\"#e0e0e0\" data-separator-background=\"#ffffff\" data-separator-direction=\"left\"><div class=\"block\"><div class=\"gap\"><\/div><div class=\"bar\"><\/div><\/div><\/div>[vc_row_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;ENVIRONMENT&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;]<div  class=\"rt-separator element-four \" data-separator-width=\"100%\" data-separator-color=\"#e0e0e0\" data-separator-background=\"#ffffff\" data-separator-direction=\"left\"><div class=\"block\"><div class=\"gap\"><\/div><div class=\"bar\"><\/div><\/div><\/div>[vc_column_text]Single-Reader<br \/>\nMultiple-Reader<\/p>\n<p>Dense-Reader[\/vc_column_text][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_custom_heading text=&#8221;DESCRIPTION&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;]<div  class=\"rt-separator element-four \" data-separator-width=\"100%\" data-separator-color=\"#e0e0e0\" data-separator-background=\"#ffffff\" data-separator-direction=\"left\"><div class=\"block\"><div class=\"gap\"><\/div><div class=\"bar\"><\/div><\/div><\/div>[vc_column_text]A single reader operating in the environment<br \/>\n# of simultaneously active readers &lt; # of available channels<br \/>\nExample: 10 readers operating in 50 channels<br \/>\n# of simultaneously active readers \u00bb # of available channels<br \/>\nExample: 50 readers operating in 50 channels[\/vc_column_text][\/vc_column_inner][\/vc_row_inner]<div  class=\"rt-separator element-four \" data-separator-width=\"100%\" data-separator-color=\"#e0e0e0\" data-separator-background=\"#ffffff\" data-separator-direction=\"left\"><div class=\"block\"><div class=\"gap\"><\/div><div class=\"bar\"><\/div><\/div><\/div>[vc_column_text]The number of available channels in US is 50, while in Europe it is 20.[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>Interference is mitigated by the environment and the modes in which the interrogators operate. Single interrogator environments obviously indicate one interrogator is installed in a particular facility. This interrogator can broadcast on whatever channels it finds appropriate within its configuration at any given time. The interrogator will not encounter interference from other interrogators, but it may encounter interference from the environment and from its own multi-path interference caused by reflections of its own or other signal(s). This type of interference can be handled by proper shielding and by adjusting the signal strength and antenna gain (the gain is not adjustable on the antenna itself, you\u2019d have to switch to a different antenna).<cite><\/cite><\/blockquote><\/div>[vc_column_text]If the number of simultaneously operating interrogators is smaller than the number of available channels, a multiple interrogator environment results. In this type of environment, the interrogators can interfere with each other, but you can resolve this by assigning specific channels to specific interrogators or by time division.[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>In a dense interrogator environment, the number of interrogators operating is greater than the number of available channels. Certified interrogators will incorporate schemes identified in the Gen 2 specification to minimize mutual interference.<cite><\/cite><\/blockquote><\/div>[vc_column_text]Note: In order to handle a dense interrogator environment successfully, it is essential that all interrogators operate in dense interrogator mode. If one interrogator does not operate in this mode, the whole scheme will not work.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;DENSE INTERROGATOR MODE&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text el_class=&#8221;text-justify&#8221;]Dense interrogator mode (often called dense reader mode) allows for operation of multiple interrogators located within close proximity of each other without causing interrogator interference. Dense interrogator mode can also involve special allocations in which interrogators and tags are separated in their ability to communicate on various channels so that strong interrogator signals will not overpower weaker tag responses.<br \/>\nInterrogators that are EPC Gen 2 certified use dense interrogator mode when the number of interrogators present in an environment exceeds the number of available channels. In North America, dense interrogator mode is used if more than 50 interrogators are installed within a facility. In Europe, the mode is used if the number of operating interrogators is greater than 10 if they operate at maximum allowed power.<br \/>\nDense interrogator mode allows for coordination of interrogators so that no two interrogators are transmitting at the exact same moment on exactly same frequency and causing interference within one another\u2019s interrogation zones. To do this, many interrogators perform frequency hopping and support a function known as listen before talk (LBT).[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14471&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221; el_class=&#8221;explore_image_width&#8221;][vc_column_text el_class=&#8221;text-center&#8221;]<\/p>\n<p style=\"text-align: center;\">Frequency Hopping and LBT<\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]Frequency hopping employs a technology that forces an interrogator to change channels constantly within a given range of frequencies. For instance, a UHF interrogator licensed by the FCC for operation in North America must support hopping across 50 channels (each 500 kHz wide) between the frequencies of 902 to 928 MHz and spend no longer than 0.04 second in any channel during this rotation.<br \/>\nTo perform LBT, interrogators use an antenna (often a dedicated antenna) to listen for the frequency on which the interrogator is about to transmit. If another interrogator is communicating in that channel, the interrogator will automatically switch to the next available channel and transmit there instead. LBT is often used with frequency hopping and is required in Europe for dense interrogator operations.<br \/>\nOther forms of dense interrogator mode include spectral allocation, time slice interrogator control, software synchronization, and hardware timing controls of interrogator platforms.[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>Spectral allocation designates a portion of the allotted frequency range for each type of communication. This allows tags to talk in different channels than interrogators, which prevents them from interfering with one another.<cite><\/cite><\/blockquote><\/div>[vc_column_text]Time slice interrogator control is typically done with a back-end system controller that determines when each interrogator is allowed to communicate. In this method, each interrogator is provided a set period of time for communication, and it is then turned off to wait for its next turn while all the other interrogators communicate.[\/vc_column_text]<div class=\"radiantthemes-blockquote element-two   \" ><blockquote ><i class=\"fa fa-quote-left\" ><\/i>Software synchronization allows the interrogators to communicate with one another and determine which one can transmit at what time via software built into the interrogator\u2019s operating system.<cite><\/cite><\/blockquote><\/div>[vc_column_text]Hardware timing will usually employ the use of triggering devices to allow interrogators to communicate for controlled periods of time. For instance, when an object breaks a light beam on the way into the interrogation zone, the read cycle is started. As the object leaves the interrogation zone, it breaks another beam that tells the interrogator to stop.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;TAG POPULATION MANAGEMENT&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]Interrogators support various commands and functions used for managing the tag population. They can address an entire group of tags to perform inventory of all tags in the area, as well as singulate each tag to access its memory and perform reading and writing operations.<br \/>\nThe following are the most important interrogator commands:<br \/>\n\u2022 <strong>Select\u2003<\/strong>Used to determine which groups of tags will respond (for example, this command can be used to isolate case tags from item tags).<br \/>\n\u2022 <strong>Inventory\u2003<\/strong>Used to identify individual tags within a group.<br \/>\n\u2022 <strong>Access\u2003<\/strong>Used to communicate with individual tags and issue commands to them once they have been singulated.<br \/>\n\u2022 <strong>Kill\u2003<\/strong>After the tag has been accessed and a secure communication channel established, this command can be used to make the tag stop functioning. Killed tags will not respond to interrogation and cannot be resurrected.<br \/>\n\u2022 <strong>Lock\u2003<\/strong>Used to secure the contents of a tag. Once issued, it can prevent the tag from being read from or written to. Can also be used to lock individual tag memory banks.<br \/>\n\u2022 For more information on Interrogator Commands, visit <a href=\"https:\/\/rfid4u.com\/epc-gen2-reader-commands-and-q-parameter\/\">Gen2 Reader Commands and Q Parameter<\/a>.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_single_image image=&#8221;14472&#8243; img_size=&#8221;full&#8221; alignment=&#8221;center&#8221; style=&#8221;vc_box_border&#8221; el_class=&#8221;explore_image_width&#8221;][vc_column_text el_class=&#8221;text-center&#8221;]<\/p>\n<p style=\"text-align: center;\">Sessions and AB Symmetry<\/p>\n<p>[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_column_text]Generation 2 interrogators support these interrogator commands and also tag management functions, such as AB symmetry and sessions.<br \/>\nAB symmetry replaced the Gen 1 technique of \u201cputting tags to sleep\u201d after being interrogated. AB symmetry allows tags to be flagged with an identifier to ease counting. If a tag that was flagged as an A gets counted, it then becomes flagged with a B until it is counted again, at which time it will be flagged with an A. This technique eliminates problems with tags that cannot \u201cwake up\u201d or are slow to wake up for the next round of inventory.<br \/>\nGen 2 tags support four sessions. This function is used when more interrogators or groups of interrogators interrogate the same group of tags. A tag would use each session to communicate with one interrogator or group of interrogators. This way, if a tag communicates with one interrogator and has been flagged with a B, for instance, a second interrogator communicating with the tag will use a second session with its own A and B flags. This will prevent the interrogators from interfering with each other\u2019s inventory rounds and avoid confusion that may cause an interrogator to count a tag twice.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;ANTI-COLLISION&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The various types of RFID anti-collision methods can be reduced to two basic types: deterministic and probabilistic. An example of deterministic is binary tree algorithm or tree walking algorithm. An example of probabilistic is the ALOHA anti-collision algorithm.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;PROBABILISTIC ALGORITHM&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]In a probabilistic method, tags respond at randomly generated times. If a collision occurs, colliding tags will have to identify themselves again after waiting a random period of time based on a random number the tag selects. This process will eventually isolate and identify all the tags in the interrogation zone but could be prone to collisions since it is possible that tags could choose numbers too close to one another. However, this algorithm is usually adjustable based on number of tags in the interrogation zone to increase efficiency and decrease collisions. Gen2 interrogators use Slotted ALOHA algorithm. For more information about Slotted ALOHA visit <a href=\"https:\/\/rfid4u.com\/epc-gen2-reader-commands-and-q-parameter\/\">Gen2 Reader Commands and Q Parameter<\/a>.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;][vc_custom_heading text=&#8221;DETERMINISTIC ALGORITHM&#8221; font_container=&#8221;tag:h4|text_align:left|color:%230f4996&#8243; use_theme_fonts=&#8221;yes&#8221;][vc_column_text]The deterministic algorithm works by asking for bits on the tag ID, and only tags with matching IDs respond. It starts by asking for the first numbers of the tag until it gets matches for tags; then it continues to ask for additional characters until all tags within the region are found. This method is slow but ultimately leads to fewer collisions and a more accurate search for tags in the interrogation zone.[\/vc_column_text][vc_empty_space height=&#8221;30px&#8221;]<div  class=\"rt-separator element-four \" data-separator-width=\"100%\" data-separator-color=\"#bdbdbd\" data-separator-background=\"#ffffff\" data-separator-direction=\"left\"><div class=\"block\"><div class=\"gap\"><\/div><div class=\"bar\"><\/div><\/div><\/div>[vc_empty_space height=&#8221;30px&#8221;][vc_btn title=&#8221;Inductive and Backscatter Coupling&#8221; style=&#8221;outline&#8221; shape=&#8221;square&#8221; color=&#8221;warning&#8221; size=&#8221;lg&#8221; align=&#8221;left&#8221; i_icon_fontawesome=&#8221;fas fa-arrow-left&#8221; add_icon=&#8221;true&#8221; link=&#8221;url:https%3A%2F%2Frfid4u.com%2Finductive-and-backscatter-coupling%2F|title:Inductive%20and%20Backscatter%20Coupling||&#8221;][\/vc_column][\/vc_row][\/vc_section]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1600488818167{background: #ffffff url(https:\/\/rfid4u.com\/wp-content\/uploads\/2020\/05\/Rfid4uWebsite-Background-Image-1.jpg?id=11905) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;}&#8221; el_class=&#8221;background-position-right-bottom&#8221;][vc_row][vc_column][vc_custom_heading text=&#8221;Explore \/ RFID Basics &#038; Resources&#8221; font_container=&#8221;tag:h5|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][vc_custom_heading text=&#8221;RFID Anti-Collision and Dense Reader Mode&#8221; font_container=&#8221;tag:h1|text_align:center|color:%23ffffff&#8221; use_theme_fonts=&#8221;yes&#8221;][\/vc_column][\/vc_row][\/vc_section][vc_section full_width=&#8221;stretch_row&#8221; css=&#8221;.vc_custom_1589010828775{background-color: #ffffff !important;background-position: 0 0 !important;background-repeat: no-repeat !important;}&#8221;][vc_row][vc_column][vc_column_text]Let\u2019s discuss various standards related to the design and use of RFID systems as well as a few [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"class_list":["post-6886","page","type-page","status-publish","hentry"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/6886","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/comments?post=6886"}],"version-history":[{"count":0,"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/pages\/6886\/revisions"}],"wp:attachment":[{"href":"https:\/\/rfid4u.com\/wp-json\/wp\/v2\/media?parent=6886"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}