
Performance Analysis of RFID Framed Slotted Aloha Anti-Collision Protocol
OPEN ACCESS JCC
extensively analyzed and modeled either as a communi-
cation system or as an RFID anti-collision protocol. The
most classical paper that provides an exact analysis of the
framed slotted aloha communication system was written
by Wieselthier and others [4]. The authors provided a
combinatorial analysis of different variations of the pro-
tocol including capture effects and dynamic frame slots
allocation. By calculating all states of all users, the tech-
niques provided in the paper could be used to calculate
the throughput and other performance indicators.
Haralad Vogt [7] introduced a mathematical modeling
for the Slotted Aloha proto col that is being used in RFID
readers as an anti-collision protocol. Starting form a sim-
ple occupancy problem, Vogt has calculated the proba-
bility distribution function of the random variable that is
equal to the number of slots in a frame that is being filled
with exactly r tags. Kim et al. [8] have started with con-
ditional probabilities and reached to the same recursive
closed formula introduced by Vogt. The mathematical
model introduced in [9] was based on simple probability
calculations with approximated performance measure-
ments.
Delgado et al. [10] utilized Vogt model [7] and mod-
ified it to reflect the case of tag muting in RFID system.
The algorithm is modeled by a Markov Chain of size N +
1 where N is the number of tags. The transition probabil-
ities of the Markov Chain are then calculated using the
model introduced by Vogt.
3. System Model
We assume an RFID network with one reader and n tags.
Note that in real applications, the number of tags is
usually unknown. For this, we assume the availability of
a population estimation algorithm such as [11-13]. The
reader selects the frame size s in terms of time slots and
announces it to the tags. Each tag then, selects a random
time slot to send its identification code. The reader iden-
tifies the tags who selected unique time slots. Hence
when at least two tags select the same time slot, a tag
collision occurs. As a result, the involved tags will not be
identified during that specific interrogation round. The
reader continues th e interrogation pr ocess for r rounds. In
this work, once a tag is identified, it will be muted (i.e.
the tag will not respond to the reader request) in the sub-
sequent interrogation rounds. Also, we assume that frames
have fixed sizes and no channel capture effect is assumed.
We will relax these assumptions in our fut ure work.
The allocation of tags to slots within a time frame is an
example of a mathematical class of problems called the
Occupancy Problems [14-17]. This class of problems
studies the random allocation of a number of balls to a
number of bins with different settings and objectives.
Some examples of such problems include, estimating the
number of empty bins, estimating the number of bins
containing only one ball and estimating the number of
bins containing more than one ball.
Reformulating the occupancy problem in terms of tags
and slots, we are interested in finding the number of slots
that contains one and only one tag. This means that the
tags included in those slots were successfully identified
by the RFID reader. Figure 1 shows an example of an
interrogation process. In the first round, 8 tags were
competing for 8 time slots. After selecting a random slot,
three tags selected distinct time slots. The reader was
able to recognize them. The other five tags selected one
of two time slots and thus their messages collided. The
reader needed 4 rounds to discover all the tags in this
particular example.
4. Mathematical
The proposed mathematical model consists of two parts.
First in 4.1, we calculate th e probability mass fun ction of
the number of tags that can be identified in one round.
Then in 4.3, we calculate the p robability density fun ction
of the number of identified tags after r rounds. Addition-
ally, the probability density function of the number of
rounds needed to discover n tags can also be estimated.
The notations used throughout the paper are summarized
in Table 1.
4.1. Analytical Model for Slot Selection
Mechanism
To identify a tag during an arbitrary slo t time “a” out of s
slots in a round, exactly one tag out of n tags should se-
lect that slot and transmit its identification code. Let us
define slot “a” as a Discovery Slot. Then, the probability
Figure 1. Tags Allocation to time slots in multiple interro-
gation frames.
Table 1. Notations.
s Number of slots per frame
p(n, s) Probability that a slot is a discovery slot (
.
has transmitted its ID)
m(n, s)
Maximum number of tags that can be identified during
single round
q1(n, s) Probability of identifying exactly one tag during a round
i(
,
) Probability of identifying
tags during a round