Method of communicating in a radio frequency identification system using aloha networks
First Claim
1. A method of estimating a total number of RFID Tags in an unknown RFID Tag Field using an interrogator/reader, comprising:
- (a) storing a predefined random number within each individual RFID Tag wherein said predefined random number is scaled between 1 and a “
Number” and
each individual RFID Tag having an internal counter for incrementing a number and each defines a timeslot;
(b) estimating the total number of RFID tags in the unknown RFID Tag Field by sending a first “
Number”
generated by the interrogator/reader to the RFID Tag Field wherein each individual RFID Tag uses said “
Number”
to dimension a space of numbers from which each individual RFID Tag randomly chooses one of said numbers from said space of numbers and stores said chosen random number;
(c) sending a series of read commands from the reader/interrogator to the RFID Tag Field until a Preselected Number of successful tag reads have occurred wherein with each associated read command said internal counter is incremented and compared against said random number for each individual RFID Tag wherein each individual RFID Tag will not attempt to communicate to the interrogator/reader unless said incremented internal counter has a number with a Predefined Relationship to said chosen random number; and
(d) inferring the size of the RFID Tag Field by using the ratio between successful and empty timeslots multiplied by said “
Number”
minus said Preselected Number wherein the interrogator/reader counts the number of empty timeslots that occurred while obtaining said Preselected Number of successful tag reads.
1 Assignment
0 Petitions
Accused Products
Abstract
A method is presented for taking an unknown field of transponders and converting them to a slotted Aloha architecture and increasing the throughput allowed by the slotted Aloha architecture by using several different techniques including shortening the time of empty and collided timeslots, implementing a unique random number generator that creates random numbers that are uniquely based on an individual tags location, and on an ability to estimate the total number of transponders and control the offered rate such that throughput is always maximum. While these techniques work well together and produce the most benefit when used together, they are independent techniques and any one may be used alone without the others. Thus a system might use the estimated total number of transponders technique and the timeslot shortening technique, but use a standard random number generator rather one based on transponder location with only a small decrease in overall performance.
46 Citations
34 Claims
-
1. A method of estimating a total number of RFID Tags in an unknown RFID Tag Field using an interrogator/reader, comprising:
-
(a) storing a predefined random number within each individual RFID Tag wherein said predefined random number is scaled between 1 and a “
Number” and
each individual RFID Tag having an internal counter for incrementing a number and each defines a timeslot;(b) estimating the total number of RFID tags in the unknown RFID Tag Field by sending a first “
Number”
generated by the interrogator/reader to the RFID Tag Field wherein each individual RFID Tag uses said “
Number”
to dimension a space of numbers from which each individual RFID Tag randomly chooses one of said numbers from said space of numbers and stores said chosen random number;(c) sending a series of read commands from the reader/interrogator to the RFID Tag Field until a Preselected Number of successful tag reads have occurred wherein with each associated read command said internal counter is incremented and compared against said random number for each individual RFID Tag wherein each individual RFID Tag will not attempt to communicate to the interrogator/reader unless said incremented internal counter has a number with a Predefined Relationship to said chosen random number; and (d) inferring the size of the RFID Tag Field by using the ratio between successful and empty timeslots multiplied by said “
Number”
minus said Preselected Number wherein the interrogator/reader counts the number of empty timeslots that occurred while obtaining said Preselected Number of successful tag reads. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15)
-
-
16. A method to determine a value for the offered rate in a slotted Aloha network when using timeslot shortening to increase throughput which allows RFID Tags in a RFID Tag Field to be read in the least amount of time, comprising:
-
(a) calculating a value for producing an offered rate for maximizing throughput in the slotted Aloha network using a relationship between time durations of empty and collided timeslots; and (b) computing a ratio of the difference in durations between said empty and collided timeslots and a scaled duration of a collided timeslot;
operating on this ratio through a ProductLog function and adding 1 to obtain a desired value of said offered rate. - View Dependent Claims (17)
-
-
18. A method to determine if there are any unread RFID Tags in an RFID Tag Field by sending from an interrogator/reader to the RFID Tag Field a “
- Number”
which causes all unprocessed RFID Tags in the RFID Tag Field to respond. - View Dependent Claims (19, 20, 21)
- Number”
-
22. A method in a slotted Aloha network to read all RFID tags in an RFID tag field in a least amount of time by first using determined values for optimized value of an offered rate and estimating a Field Size, comprising:
-
(a) computing the optimized value of an estimate of Field Size for maximum read throughput by dividing a total estimated number Field Size by the optimized offered rate; (b) sending by an interrogator/reader, the optimized value of the estimate of Field Size for maximum read throughput to each tag in the tag field and using this number as a maximum for scaling, the tags choose an internal Random Number scaled between 1 and the optimized value of the estimate of the Field Size for maximum read throughput; (c) incrementing an internal counter each time a read command is received from the interrogator/reader, the tag attempts to communicate with the interrogator/reader when the relationship between the counter and the internal Random Number is a Predefined Relationship; (d) if the attempt is unsuccessful, then it is assumed that a collision resulted and the tag takes a Predetermined Action; (e) the interrogator/reader keeps track of the total number of successful time slots read, the total number of empty timeslots that occurred, and the total number of collided time slots that occurred during a particular set of read cycles; (f) calculating, at the end of a particular set of read cycles, a new estimate for the remaining number of tags in the tag field using the values of the total number of empty timeslots, and the total number of successful time slots that it counted during the last set of read cycles and iteratively looping back to (b) until the estimated number of remaining tags is in a Preset Range; and (g) using the Preset Range for the optimized value of the estimate of the Field Size for maximum read throughput until the reader/interrogator has determined that all tags in the tag field have been read. - View Dependent Claims (23, 24, 25, 26)
-
-
27. A method of using timeslot shortening to increase throughput in a slotted Aloha based network, comprising:
-
sending a series of read commands from an interrogator/reader to an RFID tag field for the purpose of communicating with RFID tags and; receiving data from the RFID tags to determine if empty and collided timeslots occur. - View Dependent Claims (28, 29, 30, 31)
-
-
32. A method to convert an Aloha Network architecture to that of an architecture where all timeslots are filled for maximum throughput and efficiency producing throughput at a maximum allowed by the communication link, further comprising:
-
(a) creating a series of unique random numbers by using a location in space of one or more individual tags wherein no two tags may occupy a same space at a same time and individual tag locations must be unique such that when a read command is performed, there would be no collisions; (b) determining location by selecting parameters from a set that includes direction from an interrogator/reader, distance from the interrogator/reader as measured by signal strength, polarization of an antenna, and an identifying number for a given interrogator/reader if there is more than one interrogator/reader in the system; (c) using the estimate of the number of tags in the tag field to determine in advance a reasonable size for the total number of locations needed to uniquely identify the tags; (d) programming the location based random numbers into the tags during a special programming cycle generated by the interrogator/reader wherein the interrogator/reader begins by transmitting a signal using a highly directional antenna, beginning with low signal strength, and initial antenna polarization; (e) using a Scaling Method, scale the number of directions used and the number of signal strengths used such that the total number of combinations of direction, signal strength and polarization is equal to the estimate for the number of tags in the tag field; and (f) creating a unique random number sequence with no gaps between the numbers for each tag in the tag field resulting in no empty timeslots by the reader/interrogator transmitting data describing to the tags the number that discloses which direction the antenna is pointed, how much power is being transmitted, and what antenna polarization is being used wherein the interrogator/reader repeats this cycle until all possible combinations of direction, power, and polarization have been sent. - View Dependent Claims (33, 34)
-
Specification