This invention relates generally to the field of radio frequency identification systems, and more particularly to a method for optimizing the design and implementation of RFID tags.
Passive RFID tags are highly reliable battery-less electronic devices primarily employed to streamline logistical and manufacturing processes. Passive RFID tags can be attached to physical objects that are either remote or are in motion, and provide dozens of bits of unique error-correctable identification. Higher performance RFID tags also include rewritable electronic memory and environmental transduction. For example, pressure RFID tags inside industrial tires automatically relay profiles to a central server that triggers maintenance, thus improving performance, reliability, and reducing replacement cost. Simpler identification RFID tags transmit a unique identification associated with the object in transit, for example a pallet load or a case of expensive fragrance.
In a typical RFID system, RFID tags (also referred to as transponders) are located on an asset to be tracked. A RFID reader (also referred to as an interrogator), which typically contains a radio frequency (RF) transceiver, when triggered, sends a radio frequency signal (an interrogation) towards the RFID tag. In a typical embodiment, the RF signal, also known as the carrier signal, initially supplies a voltage to the antenna coil of the RFID tag. The received voltage is rectified in the RFID tag to supply power for the RFID tag. The RFID reader modulates the carrier signal, using, in an exemplary embodiment, amplitude modulation (or AM modulation) to send data (such as a request for the RFID tag to provide information such as the RFID tag's identification number) to the RFID tag. The RFID tag responds by modulating the carrier signal and back scattering the modulated signal to the RFID reader.
The tags can either be active tags, which may transmit continuously or periodically, or passive tags, which transmit in response to an interrogation. Active tags are typically battery powered. Passive tags are typically powered without contact by the electrical or mechanical field generated by the reader.
When using an RFID system consideration might be given to the RFID tag to select for a given purpose. Typically, a user of RFID tags attempts to optimize certain properties of a RFID tag such as the range of the tag (maximum distance between the RFID reader and the RFID tag that communications can occur), the data rate of the tag and the cost of the tag. However, there is a complex relationship between these parameters and other parameters that are to be optimized.
As an example,
Therefore, it is desirable to develop an operational model for passive RFID tags that relate key parameter dependencies and develop a method for optimizing the design and implementation of RFID tags.
In one embodiment of the present invention, a method is provided for optimizing the design parameters of a RFID tag for use with a RFID reader in a RFID system. In the method, a desired frequency band that the RFID tag will operate in is chosen. Additionally, a maximum acceptable cost for the RFID tag, a minimum acceptable data range for the RFID tag and a minimum operating voltage for the RFID tag are chosen. For a given cost, an optimal data rate is calculated by varying a carrier modulation period of an interrogation signal generated by the RFID reader and antenna capacitance of the RFID tag. Next, an optimal range for a given operating voltage is calculated using the optimal data rate.
The present invention will hereinafter be described in conjunction with the following drawing figures, wherein like numerals denote like elements, and
a shows a graph illustrating the relationship between minimum operating voltage and range;
b shows a graph illustrating the relationship between IC cost and range;
The following detailed description of the invention is merely exemplary in nature and is not intended to limit the invention or the application and uses of the invention. Furthermore, there is no intention to be bound by any theory presented in the preceding background of the invention or the following detailed description of the invention.
The present invention, in one exemplary embodiment, provides a method for optimizing the selection of RFID tags. In order to optimize the selection of RFID tags, the relationships between RFID tag parameters are related in a series of derived equations. The various equations illustrate the tradeoffs that occur when optimizing certain parameters. Important parameters and variables, as well as exemplary values for certain variables, which are used in the derivation of the following equations, are listed in the table of
To begin, note that the received power, Pr, by an antenna sub-system in the far field is given as:
where λ is the wavelength of the carrier signal, r is the distance between the source of the carrier signal and the antenna sub-system, ψr is the gain in the receiving antenna and Ps is the transmitted power. The transmitted power, Ps, includes the power gain of the transmitting antenna. The receiving antenna power gain is the product of the receiving antenna directivity and the impedance matching efficiency of the power transfer circuit. The matching circuit efficiency, γr, is derived from the voltage-standing-wave-ratio (VSWR) of the antenna impedance matching circuitry where,
The above is a relatively simple model based on far-field RF propagation in free-space. The above far-field model does not take into account the various regulatory requirements set by different countries and localities regarding RF transmission. Nor does this model take into account semiconductor fabrication parameters such as limitations inherent in semiconductor design. Therefore, a more rigorous model that illustrates the trade-offs and optimization of various design parameters for meeting performance and cost objectives is needed.
To begin the derivation of a more rigorous model, an exemplary model of the power capture and conditioning circuit 300 of a typical passive RFID tag is illustrated in
In operation, the power captured by the RFID tag's antenna 302 is converted into a current, Iant, which flows across the antenna's 302 effective radiation resistance, parasitic resistances, and the reactive components. The matching circuit 304 transforms the source impedance to match the load impedance for maximum power transfer. The combination of antenna impedances and impedance matching circuitry can be modeled as lumped parallel RLC resonant circuit 306 as shown in
The received power is transferred to IC 308. The energy storage capacitor, Cp, receives power from the matching circuit 302 via rectification circuit 310. A switch 311 and a diode 313 represent the rectification junction of rectification circuit 310. The rectification circuit 310 has a power rectification efficiency, ηr. The power rectification efficiency, ηr, reflects departure from an ideal rectification, and is not the power efficiency of rectification. The efficiency, for example, reflects full-wave versus half-wave rectification but does not include the dynamic power dissipation losses across the rectification junction. For full-wave rectification, the switch 311 closes and current flows through the diode 313 and into the charge storage capacitor, Cp, twice each carrier cycle.
The voltage regulator 310 of the tag delivers an average power, Pa, to the microchip with efficiency, ηc:
where, Pc, is the average power consumed by the integrated circuit logic and the regulator 310. The regulator 310 and the IC logic 308 become active and consume energy once the charge storage capacitor, Cp, reaches a predetermined upper threshold voltage Vp. Energy flow to the storage capacitor, Cp, abates during interrogator AM modulation. In addition, energy flow to the storage capacitor ceases during periods of antenna detuning as the RFID tag backscatter modulates the carrier signal. The RFID tag must be able to sustain operation during any bit modulation period, either in the forward or reverse communications link.
The maximum interrogation bit rate, tbit, is limited by the sum of the AM modulation period, tAM, and the charge recovery period, trec, in the AM recovery phase. The AM recovery period depends on the rate of energy collection of the RFID tag, the Q-factor of the RF front-end of the RFID tag, and the size of the regulator hysteresis window, δw (the hysteresis window is the difference between the final voltage, VP, and the threshold voltage, VL). The rate of energy collection is assumed to be approximately constant during a single interrogation cycle. That is, it is assumed that the RFID tag has moved, at most, only a negligible distance during the interrogation cycle. The regulator 310 delivers a constant voltage to the digital logic as long as the input supply voltage remains within the specified hysteresis window δw. A sufficiently large hysteresis window helps to prevent the RFID tag from prematurely shutting down during an interrogation cycle by providing a relatively low threshold voltage, VL.
As the digital logic of the tag consumes power, Pa, during its active period, the storage capacitor voltage, vp, will change at a rate that is dependent on the net storage rate. For example, when the RFID tag is very close to the interrogator, the RFID tag will capture energy at a much faster rate than the logic can consume the power. Therefore, the storage capacitor voltage will rise relatively fast but will remain clamped near the upper threshold voltage VP due to the clamping diode 316. Clamping the voltage protects the integrated circuit 308 from receiving too great a voltage. Conversely, if the carrier periodically suspends, such as, for example, during AM modulation, the charge stored in the storage capacitor must be large enough, and the cut-off threshold VL low enough to sustain operation for the entire time when the carrier is periodically suspended (such as during the modulation period tAM).
During the periods when the RFID tag backscatters, the RF front-end reflects energy and, therefore, the storage capacitor must supply reserve energy to the digital logic. Since backscatter signaling generates reflections rather than sourced electromagnetic emissions, regulatory compliance can be achieved without limiting the data rate for backscattered signals. Therefore, the backscatter data rate is generally greater than the interrogator data rate. Hence, the backscatter bit modulation periods are significantly shorter than the carrier AM modulation periods. Therefore, the storage capacitor, Cp, is not likely to discharge to the minimum operating voltage during backscatter signaling. This can be seen in section 410 of
Once the interrogator receives the final reply from the RFID tag, the interrogator powers down the carrier signal. The RFID tag's digital logic will remain in the powered state until the charge on the storage capacitor leaks off below the minimum operating voltage threshold, VL.
As discussed previously, the RFID tag utilizes stored energy during carrier AM modulation or RFID tag backscatter modulation. During modulation recovery, the carrier must replenish the spent energy as well as deliver sufficient power to maintain operation for the remainder of the bit period. This implies that on average, the RF carrier must deliver energy at a rate that is higher than the average rate the RFID tag consumes during AM modulation. Typical design specifications require a faster RFID tag backscatter modulation rate (reverse link) than the interrogator carrier modulation rate (forward link.) This constraint is usually imposed because regulatory compliance for passive backscatter systems is based solely on the interrogator output power and the RF carrier modulation period, and not the RFID tag's backscatter characteristics. Since the interrogator's output power and the RF carrier modulation period are non-limiting factors, carrier modulation periods will be longer than backscatter modulation periods. Therefore, the minimum charge delivery rate can be established assuming the carrier modulation period is the longest duration that energy storage will cease.
To model the charge delivery rate, that is, the rate that charge is delivered to the storage capacitor, Cp, note that the energy consumed over a bit period must be equal to the energy delivered during the minimum time period that the RF carrier signal is available to deliver energy to the charge storage capacitor. The energy consumed per bit period is derived as follows:
The power regulation system incorporates hysteresis, the difference between the upper and lower threshold voltage. The regulator 312 begins to supply power to the IC logic once the voltage across the storage capacitor, Cp, reaches an upper threshold Vp and suspends regulation when the voltage falls below a second threshold, VL. Including the regulator efficiency from Eq. 3, and rearranging Eq. 4 to solve for the size of the charge storage capacitor, Cp, yields:
Substituting the hysteresis window size δw (δw=VP−VL) into this expression yields:
The current through the capacitor is:
During the AM recovery period the RF carrier must deliver enough energy to sustain logic power consumption throughout the carrier recovery period and to accumulate enough charge to sustain AM modulation during the next cycle when the RF carrier is suspended. Therefore, the rectifier 310 must deliver an average current IC that will charge the specified storage capacitor, Cp, from its lower threshold voltage VL to its final activation voltage Vp. The average current can be found by integrating both sides of Eq. 7.
After evaluating the integral and substituting the expression for capacitance, (Eq. 5) the result is:
This average current is established once the RF carrier returns to charge the energy storage capacitor and requires an average bias voltage across the semiconductor rectifier junction, Vd, of:
Therefore, at the end of each bit period, the RFID tag's antenna 302 will be supplying a final voltage across the IC 308 of:
Vb=Vd+Vp Eq. 11
Note that although the voltages and currents are RMS voltages and currents, the rectifier 310 produces sinusoidal voltage ramps and discontinuous current waveforms each quarter cycle of the RF carrier. RMS voltages and currents are preferred over instantaneous values because they simplify the analysis and provide the same insight into the RFID tag's overall operation. Substituting the expressions from Eq. 9 and Eq. 10 into Eq. 11 gives,
At the end of the charging cycle, the rectification and energy storage circuitry will be consuming power equal to:
Substituting expressions for Vb and Ic from Eq. 9 and Eq. 12 respectively into Eq. 13 yields the maximum power that the IC 308 consumes at the end of the charging cycle (this is power consumed by the IC 308 only and does not include the antenna and matching circuit),
Incorporating the hysteresis window size, δw(δw=Vp−VL), into this expression yields:
in terms of the lower threshold voltage VL and hysteresis window size, δw, since these are the independent parameters. Also, from Eq. 15 it can be seen that the IC power consumption decreases as the lower threshold voltage or hysteresis window size increase (note that VL and δw are in the denominators of Eq. 15, so an increase in VL or δw will decrease the right hand side of Eq. 15). Taking the increase in threshold voltage, VL, or hysteresis window size, δw, to the limit is equivalent to setting the storage capacitance, Cp, to zero. In doing so, it can be seen that power will be delivered at the rate that the logic consumes it, moderated by efficiency factors and the carrier duty cycle. That is,
Where Pco, is the minimum required energy storage rate and the interrogation bit rate, Rbit, (also known as the data rate) can be defined as:
This relationship allows the bit rate, Rbit, as an independent variable in future equations.
If the RF carrier does not modulate or alternatively, the duty cycle is unity, then the IC consumes power at exactly the rate that it is consumed by the logic circuit, moderated by the rectifier and regulator efficiency factors. Simplify the expression for the integrated circuit power consumption yields:
From this expression, two power dissipation components can be identified. The first term is the charge storage rate and the second term is the power dissipation across the non-linear rectifier.
For narrow bandwidth systems, the antenna and associated impedance matching sub-system can be modeled as a lumped parallel RLC network 306 as shown in
Where the power dissipative elements can be lumped into an equivalent resistance, Rm, the antenna inductance, La, and antenna capacitance, Ca. The power dissipated in this antenna and matching network, Pm, is due only to the resistive portion such that:
Therefore, systems with a higher Q-factor value will dissipate less energy. For higher bandwidth systems, the power dissipative elements can be lumped into an equivalent resistance Rm. Substituting the IC supply voltage, Vb, from Eq. 12 yields:
The bandwidth, BW, required to reliably transmit a pulse of duration equal to the bit modulation period is:
Where, fo, is the frequency of the RF carrier.
Therefore, the Q-factor in terms of the independent variable, tAM, (bit modulation period) is:
Q=fotAM Eq. 23
The antenna inductance, La, and capacitance, Ca, ratio can be rewritten as:
Substituting Eq. 25 into Eq. 21 yields:
Unlike the IC power dissipation, PIC, the power dissipation in the antenna 302 and matching circuit 304 (PM) increases with activation voltage. This phenomenon suggests the existence of an optimum activation threshold. The upper and lower operational voltage thresholds are usually a circuit design parameter for a given particular semiconductor process.
Eq. 26 also demonstrates a trade-off between antenna power dissipation and detuning sensitivity. It is preferred that the lumped antenna capacitance, Ca, be much greater than that of the parasitic capacitive coupling due to the antenna's proximity with other objects in the environment. This parasitic coupling will limit the antenna's resonant frequency variation as parasitic coupling distances reduce. However, increasing the antenna capacitance, Ca, will increase the antenna's power dissipation Pm and subsequently decrease the interrogation distance. To compensate the bit modulation period, tAM, can be increased. From Eq. 16, increasing the bit modulation without also reducing the bit rate will increase the required energy delivery rate Pco, and subsequently decrease the interrogation distance as well. However, less power will be dissipated in the antenna and the power transfer efficiency will improve. Therefore, unlike active RFID tags, passive RFID tag operation will be more robust at lower rather than higher bit rates. Detuning sensitivity can be decreased by increasing the antenna lumped capacitance, and increasing the bit modulation period while lowering the bit rate, without losing range.
The power delivered to the rectification and charge storage circuitry, Pd, is equal to the power collected from the antenna 302 less the power lost in the matching circuit 304. That is,
Pd=Pr−Pm Eq. 27
Substituting the expressions for Pd from Eq. 15, Pr from Eq. 1 and Pm from Eq. 26 into equation Eq. 27 and solving for the range, r, yields:
Thus, the powering distance depends on the power dissipation in the various circuit sub-systems such as the IC logic, the non-linear voltage rectifier, the antenna, and its associated matching circuit. In addition, the power dissipation in each sub-system is also scaled by the required rate of energy accumulation. This is expected as the nonlinear rectification circuit, for example, will dissipate more power as the storage current increases.
For typical design parameters, Equation 28 can be simplified. The rectifier junction is weakly biased at the maximum interrogation distance such that
For example, in an exemplary embodiment,
at the maximum interrogation distance, which is about 20 feet for a typical low cost chip that consumes about 50 microwatts. This approximation results in approximately 2% error at the maximum range but the expression for maximum range can be simplified:
substituting for Pco from Eq. 16 clarifies the maximum rate's dependency on the AM modulation period, tAM, where:
The maximum possible range under ideal circumstances of zero hysteresis window, zero carrier modulation period, and 100% rectification and regulation efficiencies can be calculated. Setting δw=0, and the efficiency factors to unity yields:
From Eq. 20 the antenna capacitance, Ca, approaches zero as its power dissipation approaches zero. Therefore, for a loss-less antenna, the second term can be set to zero. For zero carrier modulation, tAM can be set to 0 and the final expression for maximum range under ideal conditions is:
The derivation of the maximum range expression (Eq. 24 and 33) shows that the collected power is distributed between losses in the antenna and matching circuitry, losses across the power rectifier, and power that the voltage regulator and digital logic consumes. For typical designs, numerical evaluation shows that, depending on the data rate, the digital logic consumes between 30% and 70% of the total collected power while the antenna and rectifier dissipate the rest. When utilized, as a clamping diode, Schottky diodes will account for about 5% of the power dissipation because of their characteristically low threshold voltages.
The power dissipation in the antenna and matching circuitry increases with activation threshold voltage Vp or [VL+δw] while that of the rectifier and charge storage circuitry decreases. The specific transistor topology and bias currents of the regulator's analog circuit design establishes the minimum operating voltage threshold.
Powering range is strongly dependent on the resistive losses and, therefore, the Q-factor of the impedance matching circuit. Consequently Q-enhancement will provide significant increases in powering distance but at the cost of bandwidth reduction. This fact can be used to produce passive dual-frequency RFID tags which receive remote power via narrow band UHF frequencies, but communicate either via low power active or backscatter transmission within the industrial, scientific and medical (ISM) bands such as 2.45 GHz or 5.6 GHz. Using a dual frequency RFID tag provides an opportunity to substantially enhance the Q-factor of the power receiving UHF circuitry, and hence the powering range without sacrificing the RFID tag's communication bandwidth.
The power dissipation of the impedance matching circuit is directly proportional to the sum of its distributed capacitance (lumped model.) That is, smaller antenna capacitance will result in greater interrogation range. However, smaller antenna capacitances also result in greater detuning sensitivity whereby the antenna's resonance frequency shifts away from the carrier frequency. To reduce detuning sensitivity, the parasitic capacitances produced by coupling with nearby objects should be orders of magnitude smaller than the distributed antenna capacitance.
The maximum distance that a passive RFID tag can be activated or the powering range is linearly dependent on the carrier wavelength. This strong dependency on wavelength is the main reason for the popularity of UHF frequency bands relative to the shorter wavelength ISM bands such as 2.5 GHz and 5.8 GHz.
When optimized, maximum power is transferred from the antenna subsystem to the integrated digital logic. Therefore, an optimized design minimizes the power dissipated across the antenna and rectification junction and maximizes the power transferred to the digital logic. This involves maximizing the power transfer via antenna and load impedance matching, and minimizing the turn-on voltage and the leakage current in the rectification junction. The power transfer efficiency to the digital logic is the ratio of the average logic power consumption to the power received at the maximum interrogation distance. From Eq. 1:
This value typically ranges from 30% to 70% at the maximum read range for an optimized design, depending on the cost and data rate selection. However, the efficiency may increase as tag designs change.
Multiple RFID tags in the field initialize at different times depending on the received power in that location. RFID tags initialize once the charge storage capacitor accumulates sufficient energy to exceed the minimum operating voltage threshold by an amount equal to the voltage hysteresis window δw. The amount of power received by a RFID tag decreases as distance from the interrogator increases. Therefore, RFID tags at the maximum reading distance receive the least amount of power and are the last ones to initialize. The longest initialization period can be derived from:
Substituting Ic from Eq. 9,
By setting VL=0, the initialization period is identical to the AM recovery period. That is, VL=0 represents no charge overhead to establish a minimum operating voltage.
Anti-collision algorithms currently do not rely on this inherent spatial diversity. Instead, most algorithms wait a predetermined amount of time in order to ensure that all the RFID tags in the field are first initialized before beginning the interrogation cycle. This additional amount of initialization time is usually a substantial portion of the total interrogation time for typical RFID tag population densities, n, where the interrogation time is proportional to n log(n). Therefore, the protocol speed may be improved by incorporating this inherent spatial diversity along with intelligent transmit power control (TPC) algorithms. TPC algorithms are known in the art and currently are employed in popular wireless wide area network systems, and standards are emerging for similar mechanisms to be incorporated into wireless local area network systems.
The efficiency of an RFID tag is also dependent on the semiconductor fabrication technology. Semiconductor fabrication technologies typically change significantly every 18 months or so. At some point, mature technologies cost the least and older technologies again begin to increase in cost due to obsolescence. Some analog dominant designs provide better performance on much older, and larger feature size technologies, and this is why they still exist in order to serve a niche market. Newer fabrication technologies are generally more power efficient because of the smaller feature sizes but are more expensive per unit area because of the early tooling investment and initial low yields. Therefore, typically, two-year-old technologies tend to be the most cost effective for passive RFID tag chip fabrication because they are mature, have the least cost overhead, and are widely available.
Passive RFID tags typically incorporate a relatively simple state machine logic that consists of less then 25 thousand gates. The charge storage capacitor is usually integrated into the silicon in order to reduce the overall RFID tag assembly cost. The storage capacitor typically dominates the RFID tag's die area. The total die area per RFID tag can be calculated as:
Given an average cost per silicon area ζ, the total chip cost is,
Cost=ADζ Eq. 40
In order to set the cost as an independent variable for analysis, Eq. 6 is solved for hysteresis in terms of the capacitance. Solving equation Eq. 6 for δw and taking the positive solution gives,
Eq. 39 and Eq. 40 can be combined and solved for Cp. The result can be substituted into Eq. 41 to yield the hysteresis voltage as a function of cost,
Eq. 42 allows for the calculation of the maximum interrogation distance as a function of cost. The graph in
The interrogation distance or range is strongly dependent on almost all of the requirements. This is intuitive because the main objective of passive RFID tag design is to achieve maximum power transfer efficiency, therefore, maximum range while providing the desired combination of maximum data rate, minimum cost, and minimum detuning sensitivity from parasitic coupling with objects in the environment. Maximum power transfer efficiency or range is often desirable. Heavy multi-path signaling and capacitive coupling with metallic and plastic objects significantly impede energy collection. Maximum range translates directly to maximum sensitivity, which greatly improves the chances of communicating with the RFID tag under difficult signal propagation conditions. Therefore, by selecting the minimum desired range, the boundaries of the remaining parameter spaces, including the maximum achievable data rate, the minimum achievable cost, and the minimum achievable detuning sensitivity, can be established.
a-6c shows the trade-off between range, cost, and data rate for various ranges of acceptable detuning sensitivity and selection between the two most widely available and cost effective semiconductor fabrication processes as of this writing. The semiconductor processes are selected such that the desired minimum operating voltage threshold, VL, can be achieved at the least possible cost. The parameters from
a illustrates the range versus transmission data rate for a modulation period of 5 μs (high detuning sensitivity) for a 0.28 micron process system (604) and 0.35 micron process system (602).
The migration from one process to the next includes the logic power, Pa, scaling due to the change in minimum power supply voltage. The migration from one process to the next also accounts for the change in average gate size, capacitance density, and cost per unit area of the silicon design.
Given a desired range, data rate, and cost objective, the carrier modulation pulse width, tAM, can be adjusted within regulatory constraints, and the minimum operating voltage, VL, can be adjusted within the semiconductor fabrication constraints to change the location of the optimum operating points. The optimum operating point is the point of maximum power transfer to the RFID tag's digital logic. Changing the carrier modulation pulse width involves trading off at least one of the optimization objectives such as range, data rate, or cost for less detuning sensitivity. For example, as the modulation period lengthens, the RFID tag's receiver bandwidth decreases, which in turn reduces the antenna's resistive losses for each composite resonant frequency. This increases the RFID tag's range because more power is available for the digital logic. However, the reduced bandwidth or enhanced Q-factor increases the antenna's sensitivity to detuning from capacitive coupling with nearby objects. Antenna detuning results in significant range degradation. Instead the bit modulation period can be increased while reducing the bit rate by an equal amount so that the antenna capacitance, Ca, can increase without decreasing the interrogation range.
The semiconductor process establishes the minimum logic power consumption per gate, the capacitance and gate area density, and the acceptable range of gate operating voltages. The process technology also determines the designer's ability to integrate high-Q inductors for high efficiency regulators and low leakage, low voltage threshold PN junctions for high efficiency rectifiers. Logic power consumption, regulator, and rectifier efficiencies strongly constrain the optimum operating voltage threshold, VL.
Once the semiconductor process is selected, the operating voltage boundaries, the average logic power consumption, the regulator efficiency, the rectifier efficiency, and the capacitance per unit silicon area are known. The minimum and maximum operating voltages historically decline as fabrication technologies move to smaller transistors. The average logic power consumption also declines with the square of the supply voltage,
Pa∝CoVs2fclk Eq. 43
Substantial range improvement for passive RFID tags can be expected as fabrication technologies continue to produce smaller, and more power efficient, low-voltage transistors. As an example, the table below shows the expected power supply scaling with semiconductor process geometry.
Regulator efficiencies also continue to improve as designers utilize more advanced technologies such as micro-electro-mechanical (MEM) structures to improve the efficiencies of switches and inductors. Rectifiers are currently implemented with Schottky diodes serving as the main non-linear rectification junction. Schottky diodes have characteristically lower turn-on voltages but higher leakage currents than other traditional semiconductor diodes. As designs incorporate diode connected CMOS transistors or MEM switches, further efficiency improvements will be made. The expected trend is towards slightly higher capacitance per unit silicon area as the oxide thickness decrease with transistor scaling. The charge storage capacitor typically occupies the largest portion of the chip area, particularly in read-only passive RFID tags. Therefore, cost reduction should occur as semiconductor feature size shrinks.
Over time the costs related to RFID tags should decrease and performance should improve. However, even with these improvements, the designer of RFID tags will be faced with tradeoffs in the selection of parameters to optimize. The existence of tradeoffs are shown in
Next, in step 1004, the acceptable minimum range, the acceptable maximum cost, the acceptable minimum data rate and a minimum operating voltage are chosen. The choice of these values is typically left to the designer and is based on the needs of the application and in light of available technologies. The acceptable minimum range is, typically, an acceptable minimal maximum range, or, in other words, the smallest maximum range desired.
In step 1006, using the acceptable fixed minimum range as a constant, an optimal data rate near the desired data rate is found using Eqs. 33 and 42. An exemplary process of finding the optimal data rate is illustrated in
Returning to
In step 1010, steps 1006 and 1008 are repeated for different cost points and/or other constraint values. When this is completed, in step 1012, all of the determined optimal range, data rate and costs are analyzed to find the best set of values. In one embodiment, this is done using the well known technique of calculating the vector sum of range, cost, and data rate for each of the identified values and then determining which one of the vector sums is at a minimum total vector distance from the desired range, cost and data rate.
As an example,
Using the optimization algorithm, the graph of
The optimization cannot guarantee that one or all performance and cost goals will be met within the constraints of regulatory, application environment, and semiconductor fabrication parameter boundaries. It can only determine how close to the desired performance and cost specifications the optimized values can reach. Alternatively, it may be decided that one performance or cost parameter may be traded off for the others and terminate the optimization when that condition is met.
While at least one exemplary embodiment has been presented in the foregoing detailed description of the invention, it should be appreciated that a vast number of variations exist. It should also be appreciated that the exemplary embodiment or exemplary embodiments are only examples, and are not intended to limit the scope, applicability, or configuration of the invention in any way. Rather, the foregoing detailed description will provide those skilled in the art with a convenient road map for implementing an exemplary embodiment of the invention. It being understood that various changes may be made in the function and arrangement of elements described in an exemplary embodiment without departing from the scope of the invention as set forth in the appended claims.
This application claims the benefit of provisional application No. 60/464,234, filed on Apr. 21, 2003.
Number | Name | Date | Kind |
---|---|---|---|
5682143 | Brady et al. | Oct 1997 | A |
5854589 | How et al. | Dec 1998 | A |
5940006 | MacLellan et al. | Aug 1999 | A |
5999861 | Dove et al. | Dec 1999 | A |
6078791 | Tuttle et al. | Jun 2000 | A |
6147605 | Vega et al. | Nov 2000 | A |
6281794 | Duan et al. | Aug 2001 | B1 |
6407669 | Brown et al. | Jun 2002 | B1 |
6466131 | Tuttle et al. | Oct 2002 | B1 |
6480110 | Lee et al. | Nov 2002 | B2 |
6593841 | Mizoguchi et al. | Jul 2003 | B1 |
6693541 | Egbert | Feb 2004 | B2 |
6840440 | Uozumi et al. | Jan 2005 | B2 |
6999028 | Egbert | Feb 2006 | B2 |
7026935 | Diorio et al. | Apr 2006 | B2 |
7055754 | Forster | Jun 2006 | B2 |
7132946 | Waldner et al. | Nov 2006 | B2 |
7154283 | Weakley et al. | Dec 2006 | B1 |
7183926 | Diorio et al. | Feb 2007 | B2 |
20020097153 | Youbok et al. | Jul 2002 | A1 |
20020175805 | Armstrong et al. | Nov 2002 | A9 |
20030016133 | Egbert | Jan 2003 | A1 |
20040130438 | Garber | Jul 2004 | A1 |
20050007239 | Woodard et al. | Jan 2005 | A1 |
20050092845 | Forster | May 2005 | A1 |
20050099270 | Diorio et al. | May 2005 | A1 |
20050154570 | Sweeney | Jul 2005 | A1 |
20050154572 | Sweeney | Jul 2005 | A1 |
20050225435 | Diorio et al. | Oct 2005 | A1 |
20050258966 | Quan | Nov 2005 | A1 |
20060044192 | Egbert | Mar 2006 | A1 |
20060164249 | Lutz et al. | Jul 2006 | A1 |
20070001851 | Reynolds et al. | Jan 2007 | A1 |
Number | Date | Country | |
---|---|---|---|
20050030201 A1 | Feb 2005 | US |
Number | Date | Country | |
---|---|---|---|
60464234 | Apr 2003 | US |