yogesh

36
Power Management Schemes for NFC YOGESH SINGH Guide: Inderkumar Kochar ELECTRONICS AND TELECOMMUNICATION St. Francis Institute of Technology

Upload: yogesh-singh

Post on 15-Jan-2017

3.352 views

Category:

Engineering


0 download

TRANSCRIPT

Page 1: Yogesh

Power Management Schemes for NFC

YOGESH SINGH

Guide: Inderkumar Kochar

ELECTRONICS AND TELECOMMUNICATION

St. Francis Institute of Technology

Page 2: Yogesh

• NFC

• Power Management Schemes

– Protocol Independent Method

– PTF-Determinator

– FSS and BIN

• Comparison of Methods

• Conclusion

• References

2

Contents

Power Management Schemes for NFC

Page 3: Yogesh

NFC

• NFC or Near Field Communication is a short range high frequency wireless communication technology

• Extension of Radio frequency identification

• Contactless communication between handheld devices

• It operates within the globally available and unlicensed radio frequency band of 13.56 MHz

• NFC operates in Active and Passive modes

3Power Management Schemes for NFC

Page 4: Yogesh

Protocol Independent Detection

• In NFC, the standard method used to detect passive devices relies purely on protocol communication

• The initiator periodically sends out inquiry requests and waits for passive targets to respond

• Since the targets are passive, the initiator has to provide the energy for the target by maintaining the magnetic field for the whole communication sequence, lasting at least 5 ms.

• This approach cuts it down to 40 μs

4Power Management Schemes for NFC

Page 5: Yogesh

Protocol Independent Detection

5

Fig.1: Schematic of resonant coupled RWD–tag-system [1]

Power Management Schemes for NFC

Page 6: Yogesh

Protocol Independent Detection

6

0)(

')'(2)(

0)(

')'(2)(

1

02

2

22

2

01

1

11

dtt

Mdttdt

t

dtt

Mdttdt

t

diiCdiL

diiCdiL

t

t

(1)

)(4

422112

2121

2

2

21

2

2211

2,1

)(MLLCC

MCCLCLCLCLCf

(2)

Power Management Schemes for NFC

Page 7: Yogesh

Protocol Independent Detection

7

Fig.2 : f0 over M [1]

Power Management Schemes for NFC

Page 8: Yogesh

Protocol Independent Detection

8

Fig.3 : Block Diagram of Proposed Model [1]

Power Management Schemes for NFC

Page 9: Yogesh

Protocol Independent Detection

9

(a) (b)

Fig.4 : Two Excitation Frequencies (a) No Tag (b) Tag Present [1]

Power Management Schemes for NFC

Page 10: Yogesh

Results of Protocol Independent Detection

Frequency f1 ΔU ADC bits SNRmin

13.51MHz 6mV 9 57dB

13.48MHz 60mV 6 37dB

13.46MHz 120mV 5 31dB

13.44MHz 210mV 4 26dB

10

TABLE 1: Results of Protocol Independent Detection [1]

Power Management Schemes for NFC

Page 11: Yogesh

PTF-Determinator

• It determines the Power transfer Function (PTF) during run-time

• NFC consumes power when integrated in devices

• Focuses on components not on the system

• In our case the component is Reader which transfers power to the Tags

11Power Management Schemes for NFC

Page 12: Yogesh

• Reader can only scale the Magnetic field Strength

• A dynamic configuration of the magnetic field strength during run-time reduces this losses and this waste of energy

• With the determined PTF the field strength can be dynamically scaled

• The wireless communication channel between them can be split into two main parts,

(i) Power Transmission Path (ii) Data-Transfer Path

12

PTF-Determinator

Power Management Schemes for NFC

Page 13: Yogesh

PTF-Determinator

13

Fig.5 : PTF-determinator and the Integration Into the Near Field Communication System [2]

Power Management Schemes for NFC

Page 14: Yogesh

PTF-Determinator

14

Fig.6: Replacement Circuit To Describe The PowerTransfer From The Reader To The Tag Without The Voltage Regulation On Tag- Side [2]

Power Management Schemes for NFC

Page 15: Yogesh

Approximation of Tag-Reader Distance

15

Fig.7: Algorithm To Approximate The Distance Between The Reader And Tag [2]

Power Management Schemes for NFC

Page 16: Yogesh

Simulation Results

16

Fig.8: Detection of the Tag with and without the PTF Evaluation if x < xmax [2]

Power Management Schemes for NFC

Page 17: Yogesh

Simulation Results

17

Fig.9: Detection of the Tag with and without the PTF Evaluation if x > xmax [2]

Power Management Schemes for NFC

Page 18: Yogesh

FSS and BIN

• This technique does not consider multiple transponders in transmission range

• In this technique, the magnetic field strength is scaled on the reader’s side

• The scaling is based on power transmission depending on the current Physical Relation Factor, which also involves the distance between Transponders and the Reader

18Power Management Schemes for NFC

Page 19: Yogesh

Magnetic Field Strength Scaling

19

Fig.10: Magnetic Field Strength Scaling for Multiple Transponders in Two Possible Scenarios [3]

Power Management Schemes for NFC

Page 20: Yogesh

Magnetic Field Strength Scaling

• To prevent said issues, the field strength (shell) is dynamically scaled to consume a power of P = Pi

• In the last shell, the power consumption is equivalent to the one of the CONST algorithm, which always uses the maximum field strength

• FSS simply scales the field strength gradually until the wanted transponder can be found or the maximum output power is reached

20Power Management Schemes for NFC

Page 21: Yogesh

Binary Method

• FSS strictly scales the field strength from the lowest to the highest shell, which is not optimal

• This is achieved with a quadratic binary search through the available field strengths

• The algorithm handles the field strengths as a sorted list

21Power Management Schemes for NFC

Page 22: Yogesh

CONST Method

• tU ... This is an abstract time unit, which describes the smallest amount of time used in the analytic approach. The value of this time factor can be matched to the investigated system by measurement (measuring the average time of execution)

• To cover the resulting delay that influences the energy consumption, tSET is introduced which describes the amount of time required to set the field strength once. By definition one single field strength setting operation takes tU time.

22Power Management Schemes for NFC

Page 23: Yogesh

CONST Method

• tREAD ... In order to demonstrate the correct behavior of all algorithms, an amount of 1 kB has to be read from the specified transponder after it was successfully reached. This process takes approximately 80 time units tREAD = 80 tU

• tFIND ... In order to communicate with a certain transponder, independently of how many targets are actually in transmission range at that time, the transmission module of the reader has to acquire its full UID (unique identifier). This process can be repeated (nTL) until either all transponders have been inspected or the wanted one was successfully found

23Power Management Schemes for NFC

Page 24: Yogesh

CONST Method

• The main goal of the analytic approach is to minimize the energy consumption,

E = Pi (tSET + tFIND + tREAD) (1)

24

Parameter Relation with time unit

tSET tU

tFIND 1.2*nTL*tU

tREAD 80*tU

TABLE 2: FACTORS FOR THE ANALYTIC APPROACH RELATING TO THE TIME UNIT tU BASED ON THE TIMING ANALYSIS OF THE MEASURED RFID-READER [3]

Power Management Schemes for NFC

Page 25: Yogesh

CONST Method

• Best case ... In this case the wanted transponder is the first one found by the transponder-detection procedure (nTL = 1)

tFIND = 1.2*tU (2)

t = tSET + tFIND + tREAD = 82.2*tU (3)

E = PMAX*82.2*tU (4)• Average Case ... For this case it is assumed that after listing

half of the transponders, the wanted one is found (nTL = n/2 ). tFIND = 1.2*(n/2)*tU = 0.6*n*tU (5)

t = tSET + tFIND + tREAD = (0.6*n + 81)*tU (6)

E = PMAX*(0.6*n + 81)*tU (7)

25Power Management Schemes for NFC

Page 26: Yogesh

CONST Method

• Worst case ... The wanted transponder is only found after all the others have been inspected (nTL = n).

tFIND = 1.2*n tU (8)

t = tSET + tFIND + tREAD = (1.2*n + 81) tU (9)

E = PMAX*(1.2*n + 81) tU (10)

26Power Management Schemes for NFC

Page 27: Yogesh

CONST Method

27

Fig.11: Best Case [2]

Power Management Schemes for NFC

Page 28: Yogesh

CONST Method

28

Fig.12: Average Case [2]

Power Management Schemes for NFC

Page 29: Yogesh

CONST Method

29

Fig.13: Worst Case [2]

Power Management Schemes for NFC

Page 30: Yogesh

ENERGY CONSUMPTION OF CONST METHOD

Energy

Best Case PMAX*82.2*tU

Average Case PMAX*(0.6*n+81)*tU

Worst Case PMAX*(1.2*n+81)*tU

30

TABLE 3: ENERGY CONSUMPTION OF THE DIFFERENT CASES OF THE CONST METHOD [3]

Power Management Schemes for NFC

Page 31: Yogesh

ENERGY CONSUMPTION OF FSS METHOD

Energy

Best Case PMAX*54.5*tU

Average Case PMAX*(0.45*n+67.33)*tU

Worst Case PMAX*(1.2*n+103.4)*tU

31

TABLE 4: ENERGY CONSUMPTION OF THE DIFFERENT CASES OF THE FSS METHOD [3]

Power Management Schemes for NFC

Page 32: Yogesh

ENERGY CONSUMPTION OF BIN METHOD

Energy

Best Case PMAX*56.31*tU

Average Case PMAX*(0.49*n+69.93)*tU

Worst Case PMAX*(1.2*n+89.29)*tU

32

TABLE 5: ENERGY CONSUMPTION OF THE DIFFERENT CASES OF THE BIN METHOD [3]

Power Management Schemes for NFC

Page 33: Yogesh

Comparison

Methods Energy Consumption (%)

BIN 68.13%

FSS 65.53%

Method CONST(without field strength scaling)

100%

33

TABLE 6: COMPARISON OF THE ENERGY CONSUMPTIONS [3]

Power Management Schemes for NFC

Page 34: Yogesh

Conclusion

• This are the methods used to decrease the consumption of power in a NFC Device.FSS and BIN are more energy efficient than the standard approach of CONST. This scenario explains the advantage of the field strength scaling principle, as both optimized algorithms are able to successfully read from the transponder with a lower field strength, whereas CONST always operates with the maximum amount.

34Power Management Schemes for NFC

Page 35: Yogesh

References[1] Richard G. Mair, “Protocol-Independent Detection of Passive Transponders for Near-Field Communication Systems.” IEEE Transactions On Instrumentation And Measurement, vol. 59, no. 4, April 2010.

[2] Manuel Menghin, Norbert Druml, Christian Steger, Reinhold Weiss, Holger Bock and Josef Haid, “The PTF-Determinator: A run-time method used to save energy in NFC-Systems.”, Fourth International EURASIP Workshop on RFID Technology,2012.

[3] Manuel Menghin, Norbert Druml, Bernhard Kipperer, Christian Steger, Reinhold Weiss,Holger Bocky and Josef Haidy “Energy Efficiency by Using Field Strength Scaling for Multi-Transponder Applications” 12th International Conference on Telecommunications - ConTEL 2013.

[4]] MLA Menghin, Manuel, et al. "NFC-DynFS: a way to realize dynamic field strength scaling during communication." Near Field Communication (NFC), 2013 5th International Workshop on. IEEE, 2013

35Power Management Schemes for NFC

Page 36: Yogesh

THANK YOU

36Power Management Schemes for NFC