期刊文献+

A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory

A Reprocessing Model for Complete Execution of RFID Access Operations on Tag Memory
原文传递
导出
摘要 This paper investigates the problem of inconsistent states of radio frequency identification (RFID) tag data caused by incomplete execution of read/write operations during access to RFID tag memory. Passive RFID tags require RF communication to access memory data. This study is motivated by the volatility of RF communication, where instability is caused by intermittent connections and uncertain communication. If a given tag disappears from the communication area of the reader during the reading or writing of tag data, the operation is incomplete, resulting in an inconsistent state of tag data. To avoid this inconsistency, it is necessary to ensure that any operations on tag memory are completed. In this paper, we propose an asynchronous reprocessing model for finalizing any incomplete execution of read/write operations to remove inconsistent states. The basic idea is to resume incomplete operations autonomously by detecting a tag's re-observation from any reader. To achieve this, we present a concurrency control mechanism based on continuous query processing that enables the suspended tag operations to be re-executed. The performance study shows that our model improves the number of successful operations considerably in addition to suppressing inconsistent data access completely. This paper investigates the problem of inconsistent states of radio frequency identification (RFID) tag data caused by incomplete execution of read/write operations during access to RFID tag memory. Passive RFID tags require RF communication to access memory data. This study is motivated by the volatility of RF communication, where instability is caused by intermittent connections and uncertain communication. If a given tag disappears from the communication area of the reader during the reading or writing of tag data, the operation is incomplete, resulting in an inconsistent state of tag data. To avoid this inconsistency, it is necessary to ensure that any operations on tag memory are completed. In this paper, we propose an asynchronous reprocessing model for finalizing any incomplete execution of read/write operations to remove inconsistent states. The basic idea is to resume incomplete operations autonomously by detecting a tag's re-observation from any reader. To achieve this, we present a concurrency control mechanism based on continuous query processing that enables the suspended tag operations to be re-executed. The performance study shows that our model improves the number of successful operations considerably in addition to suppressing inconsistent data access completely.
作者 Wooseok Ryu Bonghee Hong Joonho Kwon 于戈 Wooseok Ryu;Bonghee Hong;Joonho Kwon;Ge Yu(Department of Computer Engineering,Pusan National University,Busan 609-735,Korea;Institute of Logistics Information Technology,Pusan National University,Busan 609-735,Korea;School of Information Science and Engineering,Northeastern University,Shenyang 110004,China)
出处 《Journal of Computer Science & Technology》 SCIE EI CSCD 2012年第1期213-224,共12页 计算机科学技术学报(英文版)
基金 supported by the Grant of the Regional Core Research Program/Institute of Logistics Information Technology of Korean Ministry of Education, Science and Technology
关键词 asynchronous reprocessing concurrency control continuous query RFID tag access operation asynchronous reprocessing, concurrency control, continuous query, RFID, tag access operation
  • 相关文献

参考文献20

  • 1Want R. An introduction to RFID technology. IEEE Perva- sive Comput., 2006, 5(1): 25-33.
  • 2Banks J, Hanny D, Pachano M, Thompson L. RFID Applied. Wiley, Chichester, March 2007, pp.328-329.
  • 3Weinstein R. RFID: A technical overview and its application to the enterprise. IT Professional, 2005, 7(3): 27-33.
  • 4Fishkin K P, Jiang B, Philipose M, Roy S. I sense a distur- bance in the field: Unobtrusive detection of interactions with RFID-tagged object. In Proe. the 6th Int. Conf. Ubiquitous Computing, Sept. 2004, pp.268-282.
  • 5Jung S, Cho J, Kim S. FQTR: Novel hybrid tag anti-collision protocols in RFID system. Journal of KIISE: Software and Applications, 2009, 36(7): 560-570.
  • 6EPCglobal Inc, Class 1 generation 2 UHF air interface proto- col standard "Gen 2", http://www.gsl.org/gsmp/kc/epcglo- bal/uhfclg2.
  • 7EPCglobal Inc. Low level reader protocol, http://www.gsl. org/gsmp/kc/epcglobal/llrp.
  • 8EPCglobal Inc. Application level events (ALE) standard, http://www.gsl.org/gsmp/kc/epcglobal/ale.
  • 9Golab L, (3zsu M T. Issues in data stream management. SIG- MOD Record, 2003, 32(2): 5-14.
  • 10Silberschatz A, Korth H F, Sudarshan S. Database System Concepts, 4th edition, New York: McGraw-Hill, 2002, pp.709- 722.

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部