EPC Generation 2.0: The Next Step: Trusted, Turn-Key RFID Solutions
EPC Generation 2.0: The Next Step: Trusted, Turn-Key RFID Solutions
EPC Generation 2.0: The Next Step: Trusted, Turn-Key RFID Solutions
Why is it Better?
and
What Should you do to Prepare for it?
12 January 2004
-1-
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
The problems developing are apparent in the compliance and interoperability areas.
Using three different protocols would illogically create three different forms of
technology based on the same concept. Each protocol would need its own unique set of
readers, tags, and potentially networking methods. R&D costs would be unnecessarily
high for manufacturers and hardware would be expensive for integrators (as three
systems would be needed to serve each protocol). However, if one protocol is used for all
future RFID technology, these unnecessary costs will be eliminated, and most
importantly, global RFID adoption will occur at a faster pace. As of now, one global
standard does not exist. EPC tag protocol Class 1 Generation 2.0 is the solution to this
problem.
The “acceptable protocols” today are defined as either Class 0 or Class 1 Identity tags
and are open standards that any vendor can use to identify products. Also emerging is
ISO 18000 standard. However, these protocol standards are not interoperable.
Currently, the Class 0 tag is a factory programmable tag disallowing an end-user to write
a new number to the tag. Manufacturers are being allocated specific blocks of EPC
numbers; and adding their own product codes and serial numbers to their assigned
manufacturer numbers to create a unique identifier. Factory written tags increase
administrative and logistics cost of affixing the correct tag to the correct item and
minimize a tag’s flexibility. Should the user attempt to use unused tags, they could be
stuck with a disorganized EPC address space, creating a host of network and
identification related problems. Therefore Class 0 is only acceptable for closed or tightly
managed systems.
-2-
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
Class1 tags allow end-users to write serial numbers to their tags, but current Class1
Generation 1.0 reader technology does not enable the communication with Class 0 tags.
The other problem with Class 1 Generation 1.0 tags is there is only 64 bits of memory on
the tag, limiting potential numbering schemes.
The emerging ISO standard has four primary components, but ISO-18000-6 is the one
dealing with UHF range. The ISO standard differs from the EPC in that the ISO standard
only addresses the air interface, how the tags and readers talk to each other and the EPC
standard addresses other components of the system. The good news is that it will be
compatible with the emerging Generation 2.0 protocol.
The Class1 Generation 2.0 protocol will be backward compatible for Generation 1.0
Class 1 and Class 0, and incorporate the specifications for both classes of tags. Class1
Generation 2.0 protocol will also operate with the emerging ISO18000-6 standard
protocol, creating one global standard and enabling an efficient solution to the current
lack of interoperability between Class 0 and Class 1 tags.
The Generation 2.0 tags will utilize four distinct memory banks:
1. Tag Identification
2. Object Identification (OID) – EPC Data
3. User Memory and
4. Reserved Memory
The OID memory stores the identifier of the object to which the tag is affixed and
consists of a 16-bit protocol-control parameter, a 16-bit Cyclic Redundancy Check
(CRC16), which ensures no errors in data have been communicated from a tag to a reader
(with an accuracy rate of 99.998%), and an object identifier that is an N-bit EPC code
(“N” is a valid EPC length). The tag identification memory and user memory are
incorporated within the Generation 2.0 Class 2 Higher Functionality tags that allow tag
and vendor-specific data storage. The tag identification memory stores the unique
identifier for the tag, and the user memory allows user-specific memory storage.
Reserved memory is used for system parameters such as password.
Generation 2.0 Identity tags incorporate simple privacy functionality in the form of the
Conceal function. Concealed tags will not communicate any of their memory contents
-3-
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
unless the reader authenticates itself by issuing the password stored on the tag. The tags
can also be unconcealed only if authenticated by the password. Adding to the strength of
the security is a 16-bit random number generator (RN16) used to generate numbers for
encryption of data communicated to the tag.
The flexibility of the EPC also ensures for future use and global uniqueness indefinitely.
A 96-bit number enables the theoretical identification of nearly a million, trillion, trillion
objects. To put this in perspective, if this many golf balls were placed next to each other,
they would extend far beyond the edge of the known universe. If these golf balls were
formed into a sphere, they would make an object six billion times larger than our sun.
Considering that tagged items are most likely to be larger than golf balls, the industry
believes that a 96-bit code will suffice for object identification.
Generation 2.0 EPC tags utilize an advanced and globally employable anti-collision
technology enabling readers to identify tags in significantly shorter time periods than
other existing protocols are capable of– this means faster, more accurate systems. When
multiple RFID tags are communicating to a single reader and are in close proximity to
each other, their signals can interfere with each other. This interference is called a
“collision.”
Anti-collision methods can be broadly categorized into three domains: space, frequency,
and time.1 The Generation 2.0 protocol development is based partially on a privately
developed protocol from BTG, a British technology company credited with discovering
interferon (a human protein) and magnetic resonance imaging. They have developed the
“SuperTag” family of RFID protocols, which operates on the Aloha anti-collision
principle, but incorporates further additions to make it amenable to RFID systems.
Passive RFID tags do not communicate with one another; therefore a tag cannot identify
a collision of its communication. The reader must control the tags to “notify” them if the
signal was successful or unsuccessful. In the SuperTags approach, tags continuously
retransmit their identifier at random intervals until the reader acknowledges their
transmission. After reception of tag data, tags can be muted or their repetition rate can be
slowed. This method of muting a tag allows the proper counting of many tags in the same
field. Another SuperTag variation involves the muting of all tags except the one being
read. This ensures that no collision occurs. After a certain period, the muted tags are
activated, one by one, until they are all counted. In other methods, the reader, by sending
a gap or power burst, prompts the tags to respond after a randomly generated delay.
Although high performance can be achieved via Aloha-based methods, they may not
function as well as binary tree searches in high tag density environments.
1
See Appendix A
-4-
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
Nearly all classes of anti-collision methods require the reader to detect tag
communication collisions. Without such capability, even the best algorithms are useless.
The new Generation 2.0 tags will use a slotted Aloha based algorithm to identify tags
According to MIT’s Auto-ID Labs, this Generation 2.0 algorithm will enable a reader to
interrogate greater than one thousand tags in less than a second with 100% accuracy, far
better than any globally available solution today.
The Generation 2.0 protocol will revolutionize the RFID industry. There will be a single
higher-performance protocol useable by all applications. If the technology is adopted, it
will enable the interrogation of thousands of tags in seconds and make the older tags,
which are still considered by the general public as advanced technology, obsolete.
Generation 2.0 is faster, more universally accepted and will allow a global user base
easier communication.
The focus of this paper is on the tag protocol and the next generation of technology,
however consideration must be given to how that data travels to various nodes. Effective
long-term RFID architecture should be forward thinking in its design. For global
adoption to be successful, users must implement a homogeneous network communication
system using globally unique identifiers like the EPC protocol.
A much talked about, but so far still emerging solution is the “EPC network” using
current Internet Protocol as its transmission layer. One credible alternative to EPC is to
use address space from IPv6, the latest Generation of Internet Protocol. This address
space is designed to use 128 bits. This lends the possibility of using IPv6 numbers as
identifiers instead of EPC numbers; either 64-bit or 96-bit section would be allocated
from the IPv6 address space specifically for use by EPC, or alternatively, companies
could write tag IDs to RFID chips from their own IPv6 assignments. Regardless of
which approach is taken, IPv6 would provide globally unique address space suitable for
RFID tagging.
Another simple strategy under consideration would be to create globally agreed upon
headers that would identify the rest of the IPv6 number as an already-existing numbering
scheme. For example a header of “01” may mean the next number will be a GTIN
followed by a serial number, a “02” header could mean the Military’s Universal
Identification protocol would be next. Through international registries of Internet
numbers the header blocks would be assigned to ensure interoperability. This option is
also under consideration within an EPC numbering scheme – adding just an identifying
header followed by the UID, and is similar to how Wal-Mart wants their data formatted
by applying specific values (16=GTIN, 17=SSCC, 18=GLN) as the header followed by
GTIN, UPC, etc.2
2
ODIN technologies has patents pending for algorithms to automatically convert GTIN, SSCC, GLN, UID,
etc. to EPC numbers and can provide software to fully automate the translation process.
-5-
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
The Department of Defense has mandated that computing systems be IPv6 compliant by
4, 2006, and the Japanese government has mandated all Japan-based businesses to
compliant by Q4, 2005. Much of Europe has also begun adoption of IPv63 making the
protocol a credible global alternative to the current IPv4.
Although the future of technology is always unknown, EPC or a combination of EPC and
IPv6, will be the most probable solution to RFID object labeling. The more bits a tag
uses, the more expensive the tag is to produce. Therefore, it is imperative to create an
economical global standard protocol for RFID technology; and the Class 1 Generation
2.0 EPC Identity protocol is the most realistic solution to the deadlines set by government
agencies and large retailers.
User Recommendations
Based on what we know today about the change in protocol ODIN technologies
recommends that as you refine your project plan for compliance, you pose the following
four questions:
Some estimates predict EPC Generation 2.0 tag technology will be available for
production in less than a year. However since a new chip design is required, which is a
significant process, that timing is unlikely. ODIN technologies’ lab estimates that broadly
obtainable Generation 2.0 tags will not be available until sometime in early to mid ’05.
Established chip manufacturers will be the ones leading the way with Generation 2.0 tags
since there is significant cost associated with designing this Generation 2.0 chip ($1-5
million according to various estimates). This design cost is much easier for a multi-billion
dollar company to absorb than a new, venture-backed company. Therefore ODIN
recommends opening a dialogue with the larger chip manufacturers if your project
strategy calls for early deployment of Generation 2.0 tags. The newer companies, which
have shown better tag performance, are working hard to be at the forefront but may be
“out spent” by the larger better capitalized competitors.
With Generation 2.0 tags likely becoming available after several looming deployment
deadlines (Jan ’05 for Wal-Mart and potentially DoD), careful consideration should be
3
ODIN technologies Director of IT, Nick Hilliard, deployed the first country-wide IPv6 network in Ireland
in 2002.
-6-
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
given today to choosing a reader systems. Time should be spent over the 6-10 months
designing and implementing the optimal reader architecture and tag placement to meet
the 100% case and pallet read requirements that Wal-Mart and the DoD are mandating.
A system upgrade provision should also go into the purchase contract Service Level
Agreement (SLA) either with the hardware manufacturer, or the integrator performing the
installation, to ensure the timeliness of being Generation 2.0 compliant.
Once systems have been designed, tested, and deployed in the field with 100% accuracy,
a structured plan should be implemented for translating existing numbering schemes
(UPC, GTIN, SSCC, UID, etc) to EPC and then creating an infrastructure for
management of the numbers and monitoring of the system.
The last step should be to evaluate how EPC will impact your current systems and what
the costs of integration and scalability are. ODIN technologies will continue to leverage
its portfolio of patent- pending technologies to create solutions to make these tasks easy
for the end users.
-7-
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
In space-domain methods, tags are placed in specific locations to achieve isolation. Tags
in space-domain methods are identified by variation of reader range (variation of power
is transferred to passive tags) and/or by using directional antennas (as opposed to
omnidirectional antennae). Triangulation, using ultra-wide band communications and
positioning methods, poses another possibility of locating individual tags. RFID
identification using only space-domain methods drastically hinders the effectiveness of
the technology. Directional antennas limit the space in which readers can communicate
with tags; and without directional antennas, isolating a tag emitting a broad three-
dimensional electromagnetic field limits the amount of tags that can be placed in a certain
area. Space-domain methods rely on the amount of tags in a reader’s range—if there are
too many tags in the area, collision will result and reduce the reader’s ability to interpret
signals.
Frequency Domains
Time Domains
-8-
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
tree walking or binary tree, is relatively time-consuming and depends on the tag’s UID
number being known. Binary tree searches4 use binary code (groups of 0’s and 1’s) for
communication and basically involve the reader actively sending a signal of a 1 or 0 to a
tag. If the reader sends the correct number, the tag acknowledges it by transmitting the
signal back to the reader. If the reader sends the wrong signal, the tag mutes itself and
awaits another signal. Eventually, the computer deciphers the code of the tag.
To simplify the method of binary tree searching, imagine there is one tag in the field of an
antenna. If the reader sends the correct number, either a 1 or 0, the tag acknowledges it
by transmitting a signal back to the reader, and awaits another signal from the reader.
The reader has two commands when sending out bit numbers—“DOWN” and
“TOGGLE.” The “DOWN” command prompts the reader to send the same bit number as
the last bit number, and the “TOGGLE” command prompts the reader to send the
opposite bit number. The reader interrogates the tag randomly, resetting to zero when it
sends the wrong bit. However, it only has to interrogate the tag 8 bits at a time, because
after each byte (set of 8 bits) has been identified, the memory is stored, and the tag sets
the next bytes first number to zero.
The binary tree searching method is more advanced when multiple tags are in an
antenna’s field. Both the reader and tags act differently. In this method, a tag does not
acknowledge the reader’s signal if the reader sends the wrong bit number. The reader
will recognize this lack of communication and the tag will mute, reducing the chance of
collision. When a tag is muted with the “FLAG” command, it sets a pointer to the
beginning of the last byte identified. This way, the reader can partially interpret tags, 8
bits at a time. If a reader tried to decipher Generation 2.0 tags, 96 bits in a row, it would
take an extraordinary amount of time. Eventually, through the random binary tree
process, one tag remains un-muted, and the reader deciphers the code of this tag based on
the method previously explained. Once this tag’s code is deciphered, it mutes itself and
the reader subsequently sends an “UP” command to tell all muted tags (except the
identified tag) to become active again. Another tag is discovered and the cycle repeats
until all tags are read. Some binary tree searches use a more complex method of
signaling groups of bits to detect tags. In deciphering code, this algorithm is surprisingly
fast when compared to many time domain methods. Matrics tags use this anti-collision
algorithm and ODIN technologies lab research has shown it to be an effective method for
interrogating multiple tags at a fast rate. Matrics tags use this anti-collision algorithm
and ODIN technologies lab research has shown it to be an effective method for
interrogating multiple tags at a fast rate largely because of the wide bandwidth Matrics
utilizes. This creates a problem, however in Europe where the constraints on the
frequency band is much greater.
Asynchronous schemes are those in which tags in the reader’s field respond at randomly
generated times. This helps to reduce the chance of collisions. The “Aloha5” scheme is
asynchronous and involves a node transmitting a data packet after receiving a data
packet. If a collision occurs, a node becomes saturated and transmits the packet again
4
See Appendix B for diagrams
5
See Appendix B for diagrams
-9-
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
after a random delay. The reader transmits continuously until a collision does not occur.
In “slotted Aloha6,” transmission is performed in slotted times by making small
restrictions in the transmission freedom of individual data packets. When packets collide
under slotted Aloha protocol, they overlap completely instead of partially, and this
significantly increases the efficiency of data transfer.
Aloha is more easily understood with an analogy. For the purposes of the analogy,
imagine there are fifty tags in an interrogation zone. Imagine fifty railway stations as
tags, a railroad car as a tag’s transmission, and two tunnels which represent the
antenna/reader. A train gets loaded with supplies at its respective station (which is
representative of the data being delivered) and once supplies are delivered through the
tunnel, they are no longer needed, and thus the next train does not need to leave the
station. One tunnel (the reader output tunnel) has trains coming out on one track, one
behind the other, at constant speeds (this represents the electromagnetic waves being
emitted by the antenna). At the fifty stations, the trains stop simultaneously, pick up their
supplies, which takes a random amount of time (analogous to the random delay of Aloha
protocol), and take off for the next tunnel. The tracks all converge at the one tunnel,
however, and the trains cannot touch each other while merging, or the “collision” will
destroy them; and thus no supplies will reach the other side (no data will be transferred to
the reader). Trains will continue to leave stations until the supplies are delivered, and the
station, receiving word from the “antenna/reader” tunnel, shuts down (representing a tag
shutting off, or “muting” itself). The trains are long, and even though they move
extremely fast, they sometimes overlap by random distances. The more trains there are
leaving at random times, the more chance for collision.
This is representative of pure Aloha protocol. In slotted Aloha protocol, trains are only
allowed to leave at certain times (slots). Imagine the stations have stoplights, and that all
turn green and red at intervals just long enough to prevent partial train collision. If a train
is ready to go at green, it goes, but if it is not, it must wait for the next light. This ensures
that if two trains (signals) do go at the same time, they completely collide. If they
overlapped (as they do with pure Aloha), the lagging train would still have the ability to
collide with a train behind it. Now imagine the light flickers on and off multiple times
per second, and the trains instantly accelerate to light speed. It may be easier to see how
slotted Aloha is superior to pure Aloha. As stated before, once the train has delivered its
supplies, it sends a signal so no train leaves its respective station; thus ensuring a smaller
chance of collision.
6
See Appendix B for diagrams
- 10 -
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
Appendix B - Diagrams
Diagram 1.1
ACK stands for “acknowledge”
(FLAG) means the tag mutes itself
The Up command prompts the reader to begin a tree search again
The Down command prompts to move down the command list (tree) and send a bit
The Toggle command prompts the reader to send a different bit
This diagram represents a hypothetical binary tree search when only two tags are
in the field. The first tag mutes itself when it fails to receive the correct bit
transmission from the reader. Once Tag2 is muted, it will not send any response
to the reader, and will not react to any signal except the “Up” command, which
will unmute it, and prepare it for data transmission. Note that the tags are only 8
bits long - any “Flag” command will bring the tag back to zero.
STEP 1
- 11 -
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
Diagram 1.2
ACK stands for “acknowledge”
The Down command prompts to move down the command list (tree) and send a bit
The Toggle command prompts the reader to send a different bit
The Done command prompts the reader to stop sending signals
The “x” in the Tag1 bit locations represent that the tag is muted
STEP2
- 12 -
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
Diagram 1.3- Representations of Pure Aloha Protocol
Black rectangle represents successful transmission
White rectangle represents collision
Tag 1 Transmission
READER
Tag 2 Transmission
Tag 3 Transmission
Tag 4 Transmission
Time
No overlap No overlap No overlap
Slot 1 2 3 4 5 6 7 8
Tag 1 Transmission
READER
Tag 2 Transmission
Tag 3 Transmission
Tag 4 Transmission
Time
These diagrams show the difference between Pure Aloha protocol and Slotted
Aloha protocol. To reiterate, in pure Aloha protocol, the transmissions overlap by
random distances during collision, leaving the chance for infinitesimally small distances
to completely disrupt tag interrogation. In slotted Aloha, transmissions overlap
completely or not at all, and this increases the efficiency of data transfer.
- 13 -
CONFIDENTIAL DRAFT
ODIN technologies lab – Reston, VA
- 14 -