Copyright © 2008 by Dale R. Thompson Dale R. Thompson

Slides:



Advertisements
Similar presentations
Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Advertisements

Lesson Title: Threat Modeling Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: Tag Threats, Risks, and Mitigation Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
© 2013 Carnegie Mellon University Academy for Software Engineering Education and Training, 2013 Session Architect: Tony Cowling Session Chair: Nancy Mead.
Nurbek Saparkhojayev and Dale R. Thompson, Ph.D., P.E. Computer Science and Computer Engineering Dept. University of Arkansas Matching Electronic Fingerprints.
Lesson Title: Introduction to Cryptography Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Threats to and by an RFID system Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Electromagnetics and Antenna Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Singulation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
Lesson Title: Hacking RFID and other RF devices Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: History of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: Fast Fourier Transform Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: RFID Frequency Bands Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Introduction to RFID Applications Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Andrew McNab - License issues - 10 Apr 2002 License issues for EU DataGrid (on behalf of Anders Wannanen) Andrew McNab, University of Manchester
AUTOMATION IN MANUFACTURING 1 of 12 MADE IN FLORIDA - INDUSTRY TOURS.
Lesson Title: Privacy Overview Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This.
Lesson Title: RFID Stakeholders Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Doc.: IEEE /0024r0 Submission May 2006 Steve Shellhammer, QualcommSlide 1 Discussion of Coexistence Scenarios Notice: This document has been prepared.
Lesson Title: EPCglobal and ISO/IEC Item Management Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Computer Aided Design By Brian Nettleton This material is based upon work supported by the National Science Foundation under Grant No Any opinions,
Lesson Title: Types of RFID Tags Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1.
Cut Saturation for p-cycle Design Khalid Al-Snaie Electronics Dept., College of Technology Riyadh, Saudi Arabia Dale R. Thompson* Department of Computer.
Lesson Title: Guidelines for Securing RFID Systems Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: EPCglobal Gen2 Tag Finite State Machine Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas.
National Alliance for Medical Image Computing Licensing in NAMIC 3 requirements from NCBC RFA (paraphrased)
Lesson Title: Social Implications of RFID Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Media Interface Threats, Risks, and Mitigation Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: FCC Rules for ISM Band Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Leader Interviews Name, PhD Title, Organization University This project is funded by the National Science Foundation (NSF) under award numbers ANT
ILLINOIS - RAILTEC Slide 1 © 2013 University of Illinois at Urbana-Champaign. All Rights Reserved Pipeline Data Analysis Introduction to Pipeline Transportation.
Lesson Title: ThingNet Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas 1 This material.
Chemical Reactions & Electricity
 Wind Power TEAK – Traveling Engineering Activity Kits Partial support for the TEAK Project was provided by the National Science Foundation's Course,
Lesson Title: Tag Architecture Dale R. Thompson and Jia Di Computer Science and Computer Engineering Dept. University of Arkansas
Lesson Title: Animal Identification Standards Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Engineering programs must demonstrate that their graduates have the following: Accreditation Board for Engineering and Technology (ABET) ETP 2005.
Lesson Title: RFID Nominal Read Range in Far Field Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Doc.: IEEE /0076r0 Submission Jan 2006 Tom Siep, Cambridge Silicon Radio PlcSlide 1 Coexistence TAG Liaison Report Notice: This document has been.
Black Box Software Testing Spring 2005
Training Arkansas Computing Teachers (TACT)
Discussion and Conclusion
TV White Space Coexistence Scenario based on Channel Availability
Written by: Jennifer Doherty, Cornelia Harris, Laurel Hartley
Channel Classification for Logical Entities
Elliptic Partial Differential Equations – Direct Method
Lesson Title: Reader Architecture and Antenna Configurations
Title here Subtitle (optional) Methodology Introduction Discussion
Sensing Manager Authors: IEEE P Wireless RANs Date:
Title of Poster Site Visit 2017 Introduction Results
People Who Did the Study Universities they are affiliated with
Title of session For Event Plus Presenters 12/5/2018.
Channel Set Transition for Logical Entities
Channel Classification for Logical Entities
40th Gas-Lift Workshop Houston, Texas, USA Oct. 23 – 27, 2017
Supporting Material for the Biodiversity Teaching Experiment
IEEE White Space Radio Status Report
Negotiation between neighbor CMs
MA’s Response to Selected Comments
Logical Entities Date: Authors: September 2010
Title of Poster Site Visit 2018 Introduction Results
Negotiation between neighbor CMs
BLOW MINDS! TEACH PHYSICS
This material is based upon work supported by the National Science Foundation under Grant #XXXXXX. Any opinions, findings, and conclusions or recommendations.
BLOW MINDS! TEACH SCIENCE
LB81-Comment-Addressing-Clause
Project Title: I. Research Overview and Outcome
Title of the presentation: Methods and Data Analysis
Discussion of Coexistence Scenarios
Lesson Title: Regulations Affecting RFID
Presentation transcript:

Lesson Title: Gen2 Single-, Multiple-, and Dense-Interrogator Operation Copyright © 2008 by Dale R. Thompson {d.r.thompson@ieee.org} Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas This material is based upon work supported by the National Science Foundation under Grant No. DUE-0736741. Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the National Science Foundation (NSF). http://rfidsecurity.uark.edu

Reader Layer http://rfidsecurity.uark.edu

Operating Categories for Gen2 Readers Single-interrogator operation No requirements beyond local regulations like FCC Multiple-interrogator operation Modest number of readers with respect to the number of channels located in the same area Constraints on transmitted spectrum to reduce interference Dense-interrogator operation Used when every channel may be occupied by a reader Strict constraints on transmitted spectrum to reduce interference http://rfidsecurity.uark.edu

Multiple- and Dense-Interrogator Mode Methods Time-division multiplexing (TDM) Reader and tag responses at separate times Readers are synchronized Frequency-division multiplexing (FDM) Channel-boundary backscatter Adjacent-channel backscatter In-channel backscatter http://rfidsecurity.uark.edu

Contact Information Dale R. Thompson, Ph.D., P.E. Associate Professor Computer Science and Computer Engineering Dept. JBHT – CSCE 504 1 University of Arkansas Fayetteville, Arkansas 72701-1201 Phone: +1 (479) 575-5090 FAX: +1 (479) 575-5339 E-mail: d.r.thompson@ieee.org WWW: http://comp.uark.edu/~drt/ http://rfidsecurity.uark.edu

Copyright Notice, Acknowledgment, and Liability Release This material is Copyright © 2008 by Dale R. Thompson. It may be freely redistributed in its entirety provided that this copyright notice is not removed. It may not be sold for profit or incorporated in commercial documents without the written permission of the copyright holder. Acknowledgment These materials were developed through a grant from the National Science Foundation at the University of Arkansas. Any opinions, findings, and recommendations or conclusions expressed in these materials are those of the author(s) and do not necessarily reflect those of the National Science Foundation or the University of Arkansas. Liability Release The curriculum activities and lessons have been designed to be safe and engaging learning experiences and have been field-tested with university students. However, due to the numerous variables that exist, the author(s) does not assume any liability for the use of this product. These curriculum activities and lessons are provided as is without any express or implied warranty. The user is responsible and liable for following all stated and generally accepted safety guidelines and practices. http://rfidsecurity.uark.edu