1. Technical Field
The embodiments described herein are related to wireless information collection. In particular, embodiments described herein describe systems and methods for the hierarchical information collection from radiofrequency devices, such as radiofrequency identification (RFID) tags, utilizing hybrid devices that may act as both an RFID tag and a radiofrequency interrogator.
2. Description of Related Art
In the field of radiofrequency tag networks, polling and collecting information, such as data, from a large number of fast moving tags is often necessary. In these situations, a group of fast moving tags passing through a chokepoint may be awakened by a wake-up signal generated by a signpost or interrogator. Thus, all tags compete to get time slots needed for exchange of messages containing relevant and requested information and data. As the population of tags become larger and speed of the moving tags increases, physical limits of the network such as the bit rate are becoming a limiting factor for performance. Many possible collisions and retransmissions drastically reduce the number of tags being collected in the short time available to transmit the information and data while in range of the signpost or interrogator.
What is needed is a system and method that reduces the number of collisions and retransmissions at chokepoints in radiofrequency tag networks.
Consistent with some embodiments, there is provided a system for collecting information from one or more radiofrequency identification (RFID) tags. The system includes the one or more RFID tags and a first interrogator device. The first interrogator device is configured to perform interrogator functions in a first wireless network, the interrogator functions including creating the first wireless network, transmitting a wake-up signal and a collection request command to the one or more RFID tags, and perform tag functions in a second wireless network, the tag functions including responding to a wake-up signal and transmitting a collect response message in response to a received collection request command. The system also includes a second interrogator device, the second interrogator device configured to perform interrogator functions in the second wireless network, the interrogator functions including creating the second wireless network, transmitting a wake-up signal and a collection request command to the first interrogator when the first interrogator is in the second wireless network.
Also consistent with some embodiments, there is provided a method for collecting information from one or more radiofrequency identification (RFID) tags by an interrogator. The method includes transmitting, by the interrogator, a wake-up signal, transmitting, by the interrogator, a collect request command, receiving, by the interrogator, a collect response message, and transmitting and receiving, by the interrogator, additional application requests.
Further consistent with some embodiments, there is provided a hybrid interrogator device. The hybrid interrogator device includes a power source, a processor, a memory coupled to the processor, a clock generator coupled to the processor, a beacon signal generator coupled to the processor, and a transceiver coupled to the processor. The memory includes instructions that, when executed by the processor cause the hybrid interrogator device to perform interrogator functions in a first wireless network and perform tag functions in a second wireless network.
These and other embodiments will be described in further detail below, with reference to the following drawings.
This disclosure provides embodiments of systems and methods for operating a wireless network enabling collection of a large number of fast moving tags in a short period of time. A wireless network may include a plurality of tag devices communicating with at least one interrogator device through radio frequency signals. In some embodiments, the tag devices may also communicate with each other. The tags in the network may be mobile while the interrogator is fixed, according to some embodiments. In some embodiments, the interrogator may also be mobile. Furthermore, in some embodiments the wireless network may include a hybrid type interrogator device that acts as an interrogator in some instances and as a tag in other instances.
Consistent with some embodiments, data collection from the tags is performed hierarchically, at two (or possibly more) levels: first, all mobile tags are collected periodically by a hybrid device (an interrogator/tag), in this instance acting as an interrogator device. If the tag group passes through a chokepoint the hybrid interrogator device, in this instance behaving as a tag device, is queried by an interrogator at a second hierarchical level. Thus, the interrogator in the second level collects from a hybrid device data retrieved from a plurality of moving tags during the periodic collection procedure. In some embodiments, the periodic collection procedure at a first hierarchical level may include a beacon enabled wireless network.
The number of hybrid interrogator devices acting as tags in a higher hierarchical level is in general much less than the number of tags in a lower hierarchical level. In some situations, data from only one hybrid interrogator device may be collected. Thus, the number of collisions is minimized and the amount of data transferred in a short period of time in the higher level is maximized. In some embodiments beacon enabled wireless networks and beaconless wireless networks may be used to support the hierarchical collection method. Some embodiments may perform the methods disclosed herein with the International Standards Organization (ISO) 18000-7:2009 protocol type of networks at one or more of the hierarchical levels. In some embodiments, other wireless technologies and protocols can be used such as the Institute of Electrical and Electronic Engineers (IEEE) 802.15.4 protocol.
Interrogator 120 is powered by a power source 134. Power source 134 can, for example, be a battery or an external power source. Consistent with some embodiments, particularly as disclosed herein, interrogator 120 may be a hybrid interrogator having the capabilities of both an interrogator and a tag. Such hybrid interrogators may contain fully functional interrogator and tag devices such that each interrogator portion and tag portion may be fully configurable. Memory 128 may contain instructions that, when executed by processor 126, cause interrogator to perform interrogator functions in one wireless network and tag functions in another wireless network. Consistent with some embodiments, interrogator functions include creating a wireless network 160, transmitting a wake-up signal and a collection request command to RFID tags 110. Tag functions include responding to a wake-up signal and transmitting a collect response message in response to a received collection request command. Each portion of the hybrid interrogator may have its own unique media access control (MAC) address. A hybrid interrogator can be configured to behave as an interrogator in one network and a tag in another. Further, in some embodiments a hybrid interrogator can be configured as two interrogators or two tag devices, enabling support for additional uses.
RFID tag 110 includes a processor 144 coupled to a memory 146. Consistent with some embodiments, processor 144 may be configured to execute instructions stored in memory 146 to communicate with interrogator 120 or perform other tasks. Processor 144 is further coupled to transceiver 142, which is coupled to antenna 140, through which tag 110 can wirelessly communicate with interrogator 120. Tag 110 includes a clock 150 that provides timing for tag 110. Tags 110 also include a power source 148, which typically is a battery. In tags 110, however, power stored in power source 148 is conserved and conservation efforts are utilized to insure that tags 110 are continuously useful during their use.
In some embodiments, interrogator 120 may include a beacon signal generator 132 to periodically generate a beacon signal for tags 110. In some embodiments, system 100 is synchronized through clock 136. Clock 150 in tags 110 match signals received to the timing of clock 136. In such systems 100, beacon signal generator 132 may not be used and network 160 may be a beaconless network. Further, beacon signals generated by beacon signal generator 132 may include information regarding system 100, such as network capabilities provided by interrogator 120.
System 100 may include any number of tags 110 or interrogators 120. Tags 110, which are often attached to shipments, for example shipping containers, that are in transit between locations are read, or collected, as they come into range of an interrogator 120, which may be illustrated by network 160. Although specific examples of aspects of system 100 and of interrogators 120 and tags 110 are provided below, specific examples are provided only to facilitate better understanding of aspects of the present invention. It is to be understood that other arrangements than those specifically described can be implemented while remaining within the scope of this disclosure.
Typically, tags 110 are low power devices and spend much of their time in a sleep mode of operation. During normal operation, each of tags 110 wakes periodically to monitor for a wake-up signal from interrogator 120. The wake-up period can be set to be any interval that maximizes a desired wake-up time while minimizing power consumption. Alternatively, the wake-up period may be determined by a standard or protocol. In the 18000-7:2009 protocol, for example, tags 110 wake up once every 2.4 sec to check for a wake-up signal from interrogator 120. Upon wake-up, if tag 110 detects the wake-up signal, tags 110 remain awake to exchange further information with interrogator 120. If no wake-up signal is detected, then tags 110 return to a sleep mode.
Consistent with some embodiments PHY layer 218, contains the radio frequency (RF) transceiver and receiver along with a low-level control mechanism. PHY layer 218 may provide a PHY data service and a PHY management service. A PHY data service enables the transmission and reception of PHY protocol data units across the physical radio channel. The features of PHY 218 include activation and deactivation of the radio transceiver, energy detection (ED) within the current channel, link quality indication (LQI) for received packets, clear channel assessment (CCA) for carrier sense multiple access with collision avoidance (CSMA-CA), channel frequency selection, and data transmission and reception. Consistent with some embodiments, PHY layer 218 is performed partly in processors and transceivers of interrogator 120 and tag 110.
Consistent with some embodiments, MAC layer 216 provides a MAC data service and a MAC management service. The MAC data service enables the transmission and reception of MAC protocol data units across the PHY data service. The features of MAC layer 216 include management of power saving devices, synchronization, channel access, frame validation, acknowledged frame delivery, network association, and network disassociation. In addition, MAC layer 216 may provide infrastructure for the MAC layer security. Consistent with some embodiments, MAC Layer 216 supports one or more of authentication, key derivation procedures, and crypto algorithms such as those defined in the ISO/IEC WD 29167-7. Consistent with some embodiments, the functions of MAC sub 216 are performed in the processors of interrogator 120 and tag 110.
Protocol stack 200 also includes a network layer 214 and a transport layer 212. Data may be received into MAC layer 216 from network layer 214, and may be coupled to a logical link control (LLC) 220 between network layer 214 and MAC layer 216. An IEEE 802.2 Type 1 logical link control (LLC) 220 can access the MAC layer through the service-specific convergence sub-layer (SSCS). Network layer 214 may also provide network configuration, manipulation, and message routing services to transport layer 212. The functions of network protocol layer 214 can include connection services, host addressing, and message forwarding. In some embodiments, network layer 214 can support, for example, IPv4 or IPv6 internet protocols. Other supported networking protocols include Distance Vector Multicast Routing Protocol (DVMRP), Internet Control Message Protocol (ICMP), Internet Group Multicast Protocol (IGMP), Protocol Independent Multicast Sparse Mode (PIM-SM), Protocol Independent Multicast Dense Mode (PIM-DM), Internet Protocol Security (IPsec), Internet Packet Exchange (IPX), Routing Information Protocol (RIP), Datagram Delivery Protocol (DDP), and Border Gateway Protocol (BGP).
Returning to
Transport Layer 212, Network Layer 214, and MAC Layer 216 each receive a packet of data and provide a header layer to that packet. Consistent with some embodiments, RFID Application Layer 210 provides a packet consistent with an RFID Protocol such as the 18000-7:2009 protocol standard. Transport layer 212 inserts the RFID protocol packet into the payload of a transport layer protocol packet. Network layer 214 receives the transport layer protocol packet and places it into the payload of one or more network protocol packets for transmission by physical layer 218. Other features of protocol stack 200 are described in U.S. patent application Ser. No. 13/297,094, filed on Nov. 15, 2011, the contents of which is incorporated herein by reference in their entirety.
After receiving the data frame with the Collect Request application command 404, tag 110 may transmit a data frame with a Collect Response message 406. Collect Response message 406 may include all data requested by Collect Request command 404 which may include a tag identity and status, depending on the type of collection request. Consistent with some embodiments, tag 110 can send the response using a method described in the Collect Request command 404. Further consistent with some embodiments, tag 110 may stay awake for a predetermined period of time, which can be configurable or transferred in Collect Request command 404. In this period interrogator 120 can send additional application data frames containing additional application requests 408, which are requests directed to RFID application layer 210 of tag 110, to which tag 110 can provide a response. Consistent with some embodiments, exchanged frames may contain application requests and responses embedded into MAC layer data frames only. Consistent with such embodiments, the application requests and responses are embedded into a frame just after MAC header 308. Once method 400 is complete, then tag 110 returns to a sleep mode, once again waking periodically to determine the presence of another wake-up signal 402. Consistent with some embodiments, communications 404, 406, and 408 between interrogator 120 and tag 110 may be terminated at RFID application layers 210 of both interrogator 120 and tag 110 so that RFID application layers 210 of both interrogator 120 and 110 can retrieve data from their respective MAC layers 216 using efficient MAC APIs.
Consistent with some embodiments, interrogator 120 may support both a “non-intelligent” wake-up signal and an “intelligent wake-up” signal. A non-intelligent wake-up signal does not carry information about the network besides indicating existence of the network. An example of a non-intelligent wake-up signal is the wake-up UHF tone described in ISO 18000-7:2009. Wake-up signal 402 may be implemented using: low frequency (LF), ultra-high frequency (UHF), or a special MAC/PHY frame. An intelligent wake-up signal may include the following parameters: a beacon interval, a beacon offset, association required, security required, or an active RF data channel number. The wake-up signal can be implemented as continuous or distributed.
Since
As shown in
Consistent with some embodiments, interrogator 120 may create and store a tag device table in memory 128. A tag device table may, for each tag polled by interrogator 110, include values for the following tag information: tag device MAC address, tag device identification (ID), tag device association ID, tag device group ID, tag device security parameters, a number of beacon intervals, and any additional elements that need to be defined and stored in memory 128. This tag information may be requested in the collection request command 404 or the application data message 408, and may be supplied by tag 110 in collect response message 406. Each device, tag and interrogator both, that is supported with this type of wireless network has a unique MAC address. In addition, tag devices may have a tag device ID that may be configured during a commissioning procedure or may be assigned by an application. The tag device association ID may be assigned by an interrogator when a tag joins the network. A tag device group ID may refer to a collection of tag devices that are grouped together during a collection process, and will be communicated to each tag device upon assignment. Consistent with some embodiments, tags can be grouped by application relevant criteria such as sensor tags. A collect application can also decide to further collect just certain groups of tags and not the complete population of the tags, enabling subsequent selective collection procedures. Moreover, a collection application can perform a selective collection of already associated tags belonging to a certain group. For example, sensor tags collected by the same interrogator may have assigned the same group ID. The interrogator may then issue Collect Request commands with the group ID to collect just the members of this group. Tag device security parameters may contain pre-shared keys, a key index, mutual authentication methods, methods used for encryption and/or authentication of the data frames, and may be implemented as a separate table. The number of beacon intervals (N) is assigned to each tag device during the association process, and the tag devices will multiply this number with the beacon interval (BI) and wake up periodically every N times BI. Thus, some tags can wake up every beacon interval if N=1, or every N beacon intervals if N>1.
Consistent with some embodiments, tag devices 504 may be associated with hybrid interrogator 506 through association requests 414 and association responses 416 performed in accordance with
As shown in
Although
Consistent with some embodiments, interrogator 900 may be a hybrid interrogator and may be used as a tag such that an interrogator in a higher hierarchical level can poll interrogator 900 for information collection and receive information about interrogator 900 and all hybrid interrogators and tags in the lower hierarchical levels. This can be repeated to include higher hierarchical levels by using additional hybrid interrogators. Consequently, a system could be implemented which uses any number of hierarchical levels.
Embodiments described herein provide systems and methods that utilize hybrid interrogators that can act as both an interrogator and a tag to create hierarchical levels of data collection and transmission. By creating hierarchical levels of data collection and transmission, many tags moving through a polling area can polled for data collection and reported with minimal data loss, collisions, and retransmissions. Consequently, the systems and methods provided herein may provide a system for tag data collection that is more efficient than prior art methods. Further the systems and methods provided herein are scalable to ensure that any amount of tags can be accurately polled for data collection and reported. The embodiments described above are exemplary only. One skilled in the art may recognize various alternative embodiments from those specifically disclosed. Those alternative embodiments are also intended to be within the scope of this disclosure. As such, the disclosure is limited only by the following claims.
This application claims priority to U.S. Provisional Application No. 61/473,684, filed on Apr. 8, 2011, the entire contents of which are incorporated herein in their entirety.
Number | Date | Country | |
---|---|---|---|
61473684 | Apr 2011 | US |