The Integration of IEEE 802.11 (WLAN) with RFID Systems in ISM (2.45 Ghz) Frequency Band Environment Using Framed Slotted ALOHA and IEEE 802.15.4
Total Page:16
File Type:pdf, Size:1020Kb
The Integration of IEEE 802.11 (WLAN) with RFID Systems in ISM (2.45 GHz) Frequency Band Environment using Framed Slotted ALOHA and IEEE 802.15.4 by Haleh Khojasteh A thesis presented to The Faculty of Graduate Studies of Ryerson University in partial fulfillment of the requirements of the degree of Master of Science Department of Computer Science Ryerson University Toronto, Ontario, Canada August 2011 c Copyright by Haleh Khojasteh, 2011 Author’s Declaration I hereby declare that I am the sole author of this thesis. I authorize Ryerson University to lend this thesis to other institutions or individuals for the purpose of scholarly research. Signed: I further authorize Ryerson University to reproduce this thesis by photocopying or by other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. Signed: iii Thesis advisor Author Jelena Miˇsi´c Haleh Khojasteh The Integration of IEEE 802.11 (WLAN) with RFID Systems in ISM (2.45 GHz) Frequency Band Environment using Framed Slotted ALOHA and IEEE 802.15.4 Abstract In this thesis, we attempt to solve the problem of WLAN/RFID coexistence and integration in frequency band of 2.45 GHz or Industrial, Scientific and Medical (ISM) band. Our solution to this problem is to allow WLAN access and RFID access in a time-sharing manner by making the WLAN Access Point (AP) aware of the RFID neighbor-network at the Medium Access Control (MAC) layer. In this approach, RFID readers act also as Wi-Fi nodes, thereby performing the bridging function between RFID and WLAN networks and allowing a single AP to cover multiple RFID networks. The bridging function is implemented using IEEE 802.11 Point Coordination Function (PCF) mechanism. RFID network is implemented using two different standards. First one is Framed Slotted Aloha standard and the second one is IEEE 802.15.4 standard (also known as ZigBee). We have simulated both models using Artifex simulator and we have evaluated the results of the simulations and the performance of both models. At last, we have compared two models by some performance parameters like collision probability and average number of collision in each superframe. v Contents Author’sDeclaration .............................. iii Abstract..................................... v TableofContents................................ viii ListofFigures.................................. ix ListofTables .................................. xi Acknowledgments................................ xiii Dedication.................................... xv 1 Introduction 1 2 ProblemStatementandRelatedWork 4 3 Background 9 3.1 RFID ................................... 9 3.1.1 CouplingTechniques . 10 Near-FieldCoupling ....................... 10 Far-FieldCoupling ........................ 12 3.1.2 TagMemory............................ 15 3.1.3 ProgrammingInterface . 15 3.1.4 TheLifeCycleofaTypicalRFIDTag . 17 The calculations of sleeping period and probability . 18 3.1.5 Anti-collision protocol for RFID network: Framed Slotted Aloha 19 PureAlohaProtocol ....................... 20 SlottedAlohaProtocol . 20 FramedSlottedAlohaProtocol . 23 3.1.6 Anti-collision protocol for RFID network: IEEE 802.15.4 ... 26 SlottedCSMA-CAMediumAccess . 29 Uplink and Downlink Communication in Beacon Enabled Mode 33 3.2 IEEE802.11DCF............................. 37 3.3 PointCoordinationFunction(PCF) . 42 vii viii Contents 4 TheProposedSolutionandSimulationModel 46 4.1 Timescheduleintheproposedsolution . 50 4.2 Basic Parameters and Calculations of Solution . .... 53 4.2.1 ParametersforWi-FiandIEEE802.15.4 . 53 Tags’SleepingPatternsandParameters . 55 4.2.2 ParametersforFramedSlottedAloha . 56 Tags’AccessProbability . 56 Tags’SleepingPatternsandParameters . 58 Tags’CollisionProbability . 58 4.3 TheSimulationModel .......................... 61 4.3.1 AccessPoint............................ 64 4.3.2 Wi-FiMedium .......................... 66 4.3.3 Wi-FiDevice ........................... 67 4.3.4 RFIDReader ........................... 71 4.3.5 RFIDMedium .......................... 74 4.3.6 RFIDTag: FramedSlottedAlohaversion . 75 4.3.7 RFIDTag:IEEE802.15.4 . 78 5 Simulation Results and Analysis 82 5.1 Simulation Results for Framed Slotted Aloha model . .... 83 5.2 Simulation Results for IEEE 802.15.4 Solution . ..... 88 6 Conclusion 94 A Abbreviations 97 Bibliography 106 List of Figures 2.1 WLAN/RFIDcoexistence. ........................ 5 2.2 The channel assignment of 802.11b and 802.15.4 networks....... 6 3.1 Near-field communication using inductive coupling [8]. ...... 11 3.2 Differenttypesofnear-fieldRFIDtags [8]. .. 12 3.3 Differenttypesoffar-fieldRFIDtags [8]. .. 13 3.4 Thelifecycleofatypicaltag. 18 3.5 Structure of the superframe in beacon enabled mode [27]. ...... 28 3.6 Operation of the slotted CSMA-CA algorithm [27]. .. 31 3.7 Uplink packet transmission, beacon enabled mode [27]. ..... 34 3.8 Downlink packet transmission, beacon enabled mode [27]. ...... 36 3.9 Exampleofbasicaccessmechanism [6]. 40 3.10 RTS/CTSAccessMechanism [6]. 41 3.11 MACArchitectureofIEEE802.11 [3]. 42 3.12 ExampleofPCFframetransfer [3]. 43 3.13 CFP/CPalternation [3]. 44 4.1 Overviewofproposedprototype. 47 4.2 Theoverallofproposedsolution. 51 4.3 The details of a typical cycle in proposed solution. ...... 52 4.4 An example of Pslot[k]. .......................... 60 4.5 The overview of simulated model and it’s classes. ..... 62 4.6 Mainpageofsimulation. ........................ 63 4.7 Measurementpage. ........................... 64 4.8 Accesspointclass. ............................ 65 4.9 Wi-Fimediumclass. ........................... 67 4.10 Wi-Fidevice:Mainpage. 68 4.11 Wi-Fi device: Data generating and waiting page. ..... 69 4.12 Wi-Fidevice:CSMA/CApage. 71 4.13 RFIDreader:Mainpage. 72 4.14 RFID reader: Data generating and waiting page. .... 73 ix x List of Figures 4.15 RFIDreader:CSMA/CApage. 74 4.16RFIDmediumclass. ........................... 75 4.17 RFID tag: Main page for Framed Slotted Aloha. 76 4.18 RFID tag: Data generating and waiting page for FSA. ... 77 4.19 RFID tag: Anti Collision page for Framed Slotted Aloha. .... 78 4.20RFIDtag:Mainpage. .......................... 79 4.21 RFID tag: Data generating and waiting page. ... 80 4.22 RFIDtag:CSMApage. ......................... 81 5.1 Simulation results for first scenario in each RFID network in FSA case. 85 5.2 Simulation results for second scenario in FSA case. ...... 87 5.3 Simulation results for first scenario in each RFID network in ZigBee case. 90 5.4 Simulation results for second scenario in ZigBee case. ........ 92 List of Tables 3.1 Frequency characteristics of RFID systems [8]. ..... 14 3.2 An example of Framed slotted Aloha protocol [41]. .. 25 3.3 Timing parameters in beacon enabled operating mode [27]. ..... 29 3.4 DefinedTimings for IEEE802.11 Standard [6]. .. 38 4.1 Timing parameters in beacon enabled operating mode [27]. ..... 54 4.2 Sleepingparametersfor ZigBee protocol. .... 55 4.3 Basic parameters for ZigBee and Framed Slotted Aloha protocols. 56 4.4 Sleeping parameters for Framed Slotted Aloha. .... 58 xi Acknowledgments My utmost gratitude goes to my supervisor, Dr. Jelena Miˇsi´c for accepting me as her Master’s student and guiding me with patience and encouragement. She has been abundantly helpful and has assisted me in numerous ways. Without her continual support and thoughtful mentoring, this thesis would not be possible. Furthermore, I would like to appreciate Dr. Vojislav B. Miˇsi´cfor his valuable ideas and advices on my simulation problems and Artifex simulator issues. Moreover, my appreciation goes to my friends in our lab who were there when I needed help. I dedicate this thesis to my family: my husband, my son and my parents who supported me unconditionally and have been the source of motivation and inspiration for me and made my time more enjoyable during past couple of years. xiii To my beloved family for their kindness and encouragement. xv Chapter 1 Introduction Radio Frequency Identification (RFID) systems and WLANs are emerging as two of the most ubiquitous computing technologies due to their important advantages and their broad applicability. RFID communication is fast, convenient and it’s application can substantially save time, improve services, reduce labor cost, reduce the possibility of fraudulent copies of product and theft, increase productivity gains and maintain quality standards. Common applications are highway toll collection, transport pay- ment, supply chain management, public transportation, tracking in mines, controlling building access, animal tracking (livestock ID), developing smart home appliance and remote keyless entry for automobiles (automotive security), e-passports, automated libraries, health care and locating children. RFID systems are mainly used to identify objects or to track their location without providing any indication about the physical condition of the object [41]. RFID is using the Radio Frequency (RF) technology for establishing communication among it’s nodes including the reader and tags. The complete definition of these nodes and their communication mechanism is presented 1 2 Chapter 1: Introduction at the beginning of Chapter 3. On the other hand, a wireless local area network (WLAN) is a flexible data com- munications system that can use either infrared or Radio Frequency (RF) technology to transmit and receive information over the air. A typical wireless LAN comprised of an Access Point (AP) and Network Interface Card (NIC) installed on the wireless device in that