Presented by Zhu Jinshun Season: Shelving Interference and Joint Identification in Large- scale RFID Systems.

Slides:



Advertisements
Similar presentations
A DISTRIBUTED CSMA ALGORITHM FOR THROUGHPUT AND UTILITY MAXIMIZATION IN WIRELESS NETWORKS.
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Interference.
Introduction to MS-Aloha R. Scopigno, Networking Lab – 1.
A Centralized Scheduling Algorithm based on Multi-path Routing in WiMax Mesh Network Yang Cao, Zhimin Liu and Yi Yang International Conference on Wireless.
A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks Hwee-Xian TAN and Mun Choon CHAN Department of Computer Science, School of Computing.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Bidding Protocols for Deploying Mobile Sensors Reporter: Po-Chung Shih Computer Science and Information Engineering Department Fu-Jen Catholic University.
TDMA Scheduling in Wireless Sensor Networks
Kyung Tae Kim, Hee Yong Youn (Sungkyunkwan University)
An Energy Efficient Routing Protocol for Cluster-Based Wireless Sensor Networks Using Ant Colony Optimization Ali-Asghar Salehpour, Babak Mirmobin, Ali.
Presented By- Sayandeep Mitra TH SEMESTER Sensor Networks(CS 704D) Assignment.
End-to-End Fair Bandwidth Allocation in Multi-hop Wireless Ad Hoc Networks Baochun Li Department of Electrical and Computer Engineering University of Toronto.
Every Bit Counts – Fast and Scalable RFID Estimation Muhammad Shahzad and Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
CS-541 Advanced Networking DMesh: Incorporating Practical Directional Antennas in Multichannel Wireless Mesh Networks Vishwanath Annavarapu April 13 th,
PEDS September 18, 2006 Power Efficient System for Sensor Networks1 S. Coleri, A. Puri and P. Varaiya UC Berkeley Eighth IEEE International Symposium on.
On the Construction of Energy- Efficient Broadcast Tree with Hitch-hiking in Wireless Networks Source: 2004 International Performance Computing and Communications.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 9th Lecture Christian Schindelhauer.
RFID Cardinality Estimation with Blocker Tags
On Self Adaptive Routing in Dynamic Environments -- A probabilistic routing scheme Haiyong Xie, Lili Qiu, Yang Richard Yang and Yin Yale, MR and.
Yanyan Yang, Yunhuai Liu, and Lionel M. Ni Department of Computer Science and Engineering, Hong Kong University of Science and Technology IEEE MASS 2009.
Fault Tolerant and Mobility Aware Routing Protocol for Mobile Wireless Sensor Network Name : Tahani Abid Aladwani ID :
1 Secure Cooperative MIMO Communications Under Active Compromised Nodes Liang Hong, McKenzie McNeal III, Wei Chen College of Engineering, Technology, and.
FiWi Integrated Fiber-Wireless Access Networks
Dynamic Clustering for Acoustic Target Tracking in Wireless Sensor Network Wei-Peng Chen, Jennifer C. Hou, Lui Sha.
Multimedia & Networking Lab
1 BitHoc: BitTorrent for wireless ad hoc networks Jointly with: Chadi Barakat Jayeoung Choi Anwar Al Hamra Thierry Turletti EPI PLANETE 28/02/2008 MAESTRO/PLANETE.
Tracking with Unreliable Node Sequences Ziguo Zhong, Ting Zhu, Dan Wang and Tian He Computer Science and Engineering, University of Minnesota Infocom 2009.
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
Wireless Sensor Network Protocols Dr. Monir Hossen ECE, KUET Department of Electronics and Communication Engineering, KUET.
Energy-Conserving Access Protocols for Identification Networks By Imrich Chlamtac, Chiara Petrioli, and Jason Redi IEEE/ACM TRANSACTIONS ON NETWORKING,
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Load-Balancing Routing in Multichannel Hybrid Wireless Networks With Single Network Interface So, J.; Vaidya, N. H.; Vehicular Technology, IEEE Transactions.
Energy-Efficient Shortest Path Self-Stabilizing Multicast Protocol for Mobile Ad Hoc Networks Ganesh Sridharan
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
An Energy-Efficient Voting-Based Clustering Algorithm for Sensor Networks Min Qin and Roger Zimmermann Computer Science Department, Integrated Media Systems.
Whitespace Measurement and Virtual Backbone Construction for Cognitive Radio Networks: From the Social Perspective Shouling Ji and Raheem Beyah Georgia.
A Reservation-based TDMA Protocol Using Directional Antennas (RTDMA-DA) For Wireless Mesh Networks Amitabha Das and Tingliang Zhu, Nanyang Technological.
A SURVEY OF MAC PROTOCOLS FOR WIRELESS SENSOR NETWORKS
KAIS T High-throughput multicast routing metrics in wireless mesh networks Sabyasachi Roy, Dimitrios Koutsonikolas, Saumitra Das, and Y. Charlie Hu ICDCS.
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
A Scalable Routing Protocol for Ad Hoc Networks Eric Arnaud Id:
MMAC: A Mobility- Adaptive, Collision-Free MAC Protocol for Wireless Sensor Networks Muneeb Ali, Tashfeen Suleman, and Zartash Afzal Uzmi IEEE Performance,
University “Ss. Cyril and Methodus” SKOPJE Cluster-based MDS Algorithm for Nodes Localization in Wireless Sensor Networks Ass. Biljana Stojkoska.
Multi-channel Wireless Sensor Network MAC protocol based on dynamic route.
1 An Adaptive Energy-Efficient MAC Protocol for Wireless Sensor Networks Tijs van Dam, Koen Langendoen In ACM SenSys /1/2005 Hong-Shi Wang.
A Multi-Channel Cooperative MIMO MAC Protocol for Wireless Sensor Networks(MCCMIMO) MASS 2010.
Evaluation of ad hoc routing over a channel switching MAC protocol Ethan Phelps-Goodman Lillie Kittredge.
Jingbin Zhang( 張靜斌 ) †, Gang Zhou †, Chengdu Huang ‡, Sang H. Son †, John A. Stankovic † TMMAC: An Energy Efficient Multi- Channel MAC Protocol for Ad.
Energy-Efficient Randomized Switching for Maximizing Lifetime in Tree- Based Wireless Sensor Networks Sk Kajal Arefin Imon, Adnan Khan, Mario Di Francesco,
Video Streaming Transmission Over Multi-channel Multi-path Wireless Mesh Networks Speaker : 吳靖緯 MA0G WiCOM '08. 4th International.
Mitigating starvation in Wireless Ad hoc Networks: Multi-channel MAC and Power Control Adviser : Frank, Yeong-Sung Lin Presented by Shin-Yao Chen.
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
Multicast Scaling Laws with Hierarchical Cooperation Chenhui Hu, Xinbing Wang, Ding Nie, Jun Zhao Shanghai Jiao Tong University, China.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
A Bit-Map-Assisted Energy- Efficient MAC Scheme for Wireless Sensor Networks Jing Li and Georgios Y. Lazarou Department of Electrical and Computer Engineering,
LA-MAC: A Load Adaptive MAC Protocol for MANETs IEEE Global Telecommunications Conference(GLOBECOM )2009. Presented by Qiang YE Smart Grid Subgroup Meeting.
Z-MAC : a Hybrid MAC for Wireless Sensor Networks Injong Rhee, Ajit Warrier, Mahesh Aia and Jeongki Min ACM SenSys Systems Modeling.
Performance Evaluation of Scheduling in IEEE based Wireless Mesh Networks Bo Han, Weijia Jia,and Lidong Lin Computer Communications, 2007 Mei-zhen.
MAC Protocols for Sensor Networks
How to minimize energy consumption of Sensors in WSN Dileep Kumar HMCL 30 th Jan, 2015.
MAC Protocols for Sensor Networks
David S. L. Wei Joint Work with Alex Chia-Chun Hsu and C.-C. Jay Kuo
Dynamic TDMA Slot Assignment in Ad Hoc Network
Interference on the RFID Interrogation Range
SENSYS Presented by Cheolki Lee
Introduction Secondary Users (SUs) Primary Users (PUs)
Presentation transcript:

Presented by Zhu Jinshun Season: Shelving Interference and Joint Identification in Large- scale RFID Systems

How RFID works Typical RFID system

Basic Tag Assembly

I. Introduction II. Preliminaries III. Season IV. Performance Evaluation V. Related Works VI. Conclusion Outlines

Introduction Collisions in RFID systems Anti-collision methods

tag reader Collisions in RFID systems Tag collision Reader collision Reader-Tag collision

Collisions in RFID systems Tag collisionReader collisionReader-Tag collision contentious regioncontentious tag

Anti-collision methods Tag collision Reader collision Reader-Tag collision FSA Colorwave Protocol stack: Season

I. Introduction II. Preliminaries III. Season IV. Performance Evaluation V. Related Works VI. Conclusion Outlines

Preliminaries A. Tag Collision B. Reader Collision C. Reader-Tag Collision D. System Model

Tag Collision Mainly employ Time Dividing Multiple Accesses (TDMA) A popular anti-tag-collision algorithm is Framed Slotted ALOHA (FSA) Tag collision

SlotSlot SlotSlot SlotSlot……… frame …… procedure Tag Collision - FSA

Command request, select, read/write, quit, reset Types of slots Idle, single, collided

Reader Collision Reader Conict Graph (RCG) Colorwave Reader collision RCG

Reader - Tag Collision schedule (r1,r2 ) in sequence, we can only consider the other two types of collisions Reader-Tag collision

System Model

I. Introduction II. Preliminaries III. Season IV. Performance Evaluation V. Related Works VI. Conclusion Outlines

Season A. Observations B. Overview C. Season-I D. Season-II E. Season-III F. Discussion

Season - Observations Majority of tags are non-contentious Contentious tags cause the major delay The signals from contentious tags can be received

Season - Overview Season is a protocol stack two phases Shelving Interference Season-I Joint Identication Season-II Season-III

Season - Overview Season-I non-contentious tags Season-II active reader passive reader Season-III data from contentious tags

Season - Season-I concurrently identify tags the majority of tags can be identied Similar to FSA frames equivalent slots different from FSA tune the length of frames

Season - Season-I One slot = 1/f the optimal choice of f is USE estimate Dynamically adjust the frame to -k after the k-th tag is collected

SeasonSeason - Season-II Joint Identication has two advantages: 1 can avoid reader collisions among neighboring readers 2 Reduce the identication delay signicantly

Season - Season-II Active reader and passive reader Active readers,two conditions: 1 cover edges as most as possible 2 will not incur signal interference among themselves when concurrently activated

Season - Season-II the Maximal Weighted Independent Set (MWIS) Notation v CH(v) JOIN(v,u) EXIT v either a clusterhead or an ordinary node

Season - Season-II

Season - Season-III Cross-range tag collision Cross-range tag collision, a new tag collision Season-III to allow active and passive readers to identify contentious tags collaboratively

Season - Season-III Given that the set of active readers is A and the set of passive readers is the P On one hand, for active readers… On the other hand, for passive readers…

Season - Season-III On one hand, for active readers: estimate the number of contentious tags TDMA keep the tags in active state util all FINISH broadcast silence

Season - Season-III On one hand, for passive readers: listen, estimate send a FINISH message if no neighboring passive readers, otherwise, next scheduling round

Season - Season-III For example

Season - Discussion Unbalanced Loads of Readers session number Source Sensitive and Insensitive

I. Introduction II. Preliminaries III. Season IV. Performance Evaluation V. Related Works VI. Conclusion Outlines

Performance Evaluation A. Evaluation Methodology B. Implementation Results C. Simulation Results

Evaluation Methodology Testbed and deployment Simulating Real RFID Applications Performance Metrics

Evaluation Methodology Testbed and deployment use a NI PXI-1044 RFID testing tool with PXI 5600 receiver as our passive reader interrogation range 2m deploy ve readers nd that the percentage of contentious tags is less than 10%

Testbed and deployment Simulating Real RFID Applications Performance Metrics Evaluation Methodology

Simulating Real RFID Applications two typical application scenarios and three random reader topologies Warehouse: 72 readers, 78,606 records Object tracking: 1653 records, includes the tag locations, source, and identication time Random Topologies: Sparse,Moderate,Dense Evaluation Methodology

Performance Metrics Throughput: the ratio of total number of tags to the overall identication time Average Delay Read Rate: environment noise,multi-path, signal attenuation Scheduling Round: the efciency of anti-reader-collision Evaluation Methodology

Implementation Results employ a NI PXI-1044 testing tool with a PXI 5600 receiver as the passive reader, Alien reader as the active reader We can observe that the passive reader achieves a read rate of 0.73 in 60% of testing cases. The average value of its read rates is up to 0.71, which is nearly as good as that in the single-reader deploying scenario.

Identifying tags without reader collisions when number of tag is above 100, Season-I has 30.6% and 42.2% time saving on average than BT and FSA

Identifying tags without reader collisions Season-I, up to 0.4 and 60% of the cases has a throughput higher than 0.37

Identifying tags with reader collisions

the average delay of Season is no more than 300 time slots

I. Introduction II. Preliminaries III. Season IV. Performance Evaluation V. Related Works VI. Conclusion Outlines

Related Works FSA, Colorwave, USE……

I. Introduction II. Preliminaries III. Season IV. Performance Evaluation V. Related Works VI. Conclusion Outlines

Related Works Anti-collision is a crucial task we propose an anti-collision protocol stack, Season Our results show that Season signicantly increases throughput, dramatically reduces the delay for tags

Thanks !