Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

Nick Feamster CS 4251 Computer Networking II Spring 2008
Medium Access Issues David Holmer
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
– Wireless PHY and MAC Stallings Types of Infrared FHSS (frequency hopping spread spectrum) DSSS (direct sequence.
Every Bit Counts – Fast and Scalable RFID Estimation Muhammad Shahzad and Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
Adaptive Splitting Protocols for RFID Tag Collision Arbitration Jihoon Myung and Wonjun Lee ACM Mobihoc 06.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 17 Introduction to Computer Networks.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
Topic 3: Sensor Networks and RFIDs Part 3 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
1 Wavelet synopses with Error Guarantees Minos Garofalakis Phillip B. Gibbons Information Sciences Research Center Bell Labs, Lucent Technologies Murray.
RFID Cardinality Estimation with Blocker Tags
ECE358: Computer Networks Spring 2012
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
“SDJS: Efficient Statistics in Wireless Networks” Albert Krohn, Michael Beigl, Sabin Wendhack TecO (Telecooperation Office) Institut für Telematik Universität.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Hong Kong University of Science and Technology.
9/11/2015 5:55 AM1 Ethernet and CSMA/CD CSE 6590 Fall 2010.
Wireless Medium Access. Multi-transmitter Interference Problem  Similar to multi-path or noise  Two transmitting stations will constructively/destructively.
Chapter 4: Medium Access Control (MAC) Sublayer
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
Copyright: S.Krishnamurthy, UCR Power Controlled Medium Access Control in Wireless Networks – The story continues.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
Hashing Sections 10.2 – 10.3 CS 302 Dr. George Bebis.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
Medium Access Control Sub Layer
Chapter 6 Multiple Radio Access
RFID E STIMATION P ROBLEM Lee, Gunhee S URVEY. R EFERENCES Energy Efficient Algorithms for the RFID Estimation Problem –Tao Li, Samuel Wu, Shigang Chen.
Introduction to Wireless Networks Dina Katabi & Sam Madden MIT – – Spring 2014.
Hashtables. An Abstract data type that supports the following operations: –Insert –Find –Remove Search trees can be used for the same operations but require.
Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
Medium Access Control in Wireless networks
Identifying the Missing Tags in a Large RFID System Tao Li (University of Florida, US) Shigang Chen (University of Florida, US) Yibei Ling (Telcordia Technologies,
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
1 Ethernet CSE 3213 Fall February Introduction Rapid changes in technology designs Broader use of LANs New schemes for high-speed LANs High-speed.
SERENA: SchEduling RoutEr Nodes Activity in wireless ad hoc and sensor networks Pascale Minet and Saoucene Mahfoudh INRIA, Rocquencourt Le Chesnay.
CSMA/CA Simulation  Course Name: Networking Level(UG/PG): UG  Author(s) : Amitendu Panja, Veedhi Desai  Mentor: Aruna Adil *The contents in this ppt.
CSMA/CD Simulation Carrier Sense Multiple Access (CSMA), although more efficient than ALOHA or slotted ALOHA, still has one glaring inefficiency: When.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Media Access Methods MAC Functionality CSMA/CA with ACK
Sensing multiple passive tags simultaneously
Communication through Silence in Wireless Sensor Networks
Bluetooth, RFID, Data Link Layer Switching
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Learning Objectives After interacting with this Learning Object, the learner will be able to: Explain the process of collision detection in CSMA/CD.
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
The Medium Access Control Sublayer
Channel Allocation Problem/Multiple Access Protocols Group 3
Channel Allocation Problem/Multiple Access Protocols Group 3
Random Access RU Allocation in the Trigger Frame
Random Access RU Allocation in the Trigger Frame
Hashing Sections 10.2 – 10.3 Lecture 26 CS302 Data Structures
IOT Technologies: Radio Frequency Identification (RFID)
Chapter 6 Multiple Radio Access.
Presentation transcript:

Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies

What is RFID? RFID, Radio Frequency Identification, is not a new subject that is going to be proposed anymore. It is an identification tag that stores the identity of something. It is very simple and cheap to be largely produced. It has been used in various application ranging from inventory control and tracking to medical-patient management.

What is RFID? (cont.) Most of them are designed to have a very long life. It is because they are not designed to use any existing energy sources for transmitting data. Instead, a probe signal sent by a reader node is used as energy for data transmission. The probe itself can be performed via magnetic coupling (called near-field) or electro-magnetic coupling (called far- field). Nowadays, the probe has much larger range and is designed to read hundreds of tags at a time.

Classification of RFID Passive tags Semi-passive tags Active tags

Common problem that arise Some applications need to estimate the number of tags as fast as possible for a givenaccuracy Two major problems arise in anyRFIDdeployment Identification Estimation Existing protocols are not fast enough

Identification Algorithm The idea is described as following: the reader probes a set of tags, and the tags reply back. Since it operates in the wireless medium, Collisions might happen in the process of probing a set of tags. To hinder the collisions, anti-collision schemes needed to be applied into the identification algorithms.

Identification Algorithm Probabilistic Deterministic

Probabilistic Identification Algorithm The reader communicates through a framed ALOHA scheme length and the tags pick a particular slot in the frame to transmit. This process is repeated by the reader until all tags have transmitted at least once successfully in a slot without collisions. In semi-passive and active tag systems, the reader can acknowledge tags that have succeeded at the end of each frame, therefore it shorts the overall identification time. In passive tags, all tags will continue to transmit in every frame, which lengthens the total time needed to identify all tags.

Deterministic Identification Algorithm The reader identifies the set of tags that need to transmit in a given slot, and tries to seduce the contending tag set in the next slot based on the result in the previous slot. These algorithms fall into the class of tree-based identification algorithms, such as a binary tree. On the binary tree, the tags are classified based on their id and the reader moving down the tree at each step to identify all nodes. Deterministic algorithms are typically faster than probabilistic schemes in terms of actual tag response slots used, however, they suffer from large reader overhead since address ranges need to be specified to isolate contending tag subsets using a probe at the beginning of each slot.

Algorithm Requirements. An estimation of the actual number of tags t in the system is required by both of the algorithms. The estimation is used: ◦To set the optimal frame size in framed ALOHA. ◦To guide the tree-based identification process for computing the expected number of slots needed for identification. The estimation process should also be able to use non- identifiable information, such as a string of bits used by all tags, to compute the size of the tag set t.

System Model readers and tags Use a Listen-before-Talk model approach, where tags listen to the reader’s request before they talk back.

System Model (cont.) Assumption on the model: There exist a separate estimation phase for identification process. Framed-slotted ALOHA model is used for tags to transmit back to the reader. The tags respond with a bit-string that contains some error-detection (such as CRC) embedded in the string when probed by the reader in the estimation phase. The length of this common bit-string is defined as the minimum length string such that the reader can detect collisions when multiple tags transmit the same string in a given slot. The reader can thus detect collisions in the estimation phase and identify a successful transmission in any slot by only one tag. There is no identification problem.

System Model (cont.) The estimator performance is measured in terms of the number of slots needed to perform the estimation to the desired accuracy level. The goal is to achieve the desired performance in as little time as possible. In other words, if it takes le slots to compute ˆt, the estimate of t tags with a certain accuracy, and li slots to uniquely identify ˆt tags, then, we need se.le < li.si, where se and si are the sizes of the bit strings transmitted during the estimation and identification phases respectively.

System Model (cont.) ◦Phillips I-Code system. ◦A frame size f (typically a power of 2) is sent by the readers along with a seed value which is 16-bit number. ◦The seed information along with its identifier used by the tag to hash into an integer in the range [1, f], which specifies the slot in which the frame will contend.

System Model (cont.) Model that is approached: ◦Extend the scheme to support variable contention probability p. ◦Therefore, the reader now sends three parameters in each probe:  the seed  the frame size f  the integer [f/p] ◦The tag hashes the combined seed/identifier value into the range [1, [f/p]]. ◦If the hashed value is greater than f, then the tag does not transmit in this frame, else it transmit in the computed slot. ◦Therefore, a frame transmission probability of f/(f/p) = p.

Deterministic Algorithm The reader probes the tags with the frame size f The tags pick a slot j in the frame uniformly at random and transmit in that slot. The indicator random variable Xj is used to determine whether tag transmit to and not transmit to in slot j. Xj = 1 if no tag transmit in slot j, referred as an empty slot, and Xj = 0 otherwise. Similarly, we set Yj = 1 if and only if there is exactly one tag that transmits in slot j, referred as a singleton slot, and Vj = 1 if and only if there are multiple tags that transmit in slot j, referred as a collision. So that, Xj + Yj + Vj = 1 for all slots j.

Deterministic Algorithm (cont.) Let N 0 = ∑ Xj from j = 1 to j = f denote the total number of empty slots. N 1 = ∑ Yj from j = 1 to j = f denote the total number of singleton slots. N c = f − N 0 − N 1 denote the number of collision slots. P = t/f, t denotes numbers of tags and f denotes frame size.

Deterministic Algorithm (cont.)

Zero Estimator (ZE) ρ<1, many empty slots and few singleton and collision slots Collision Estimator (CE) ρ>1, many collision slots and singleton slots decrease Singleton Estimator (SE) ρ=1

Deterministic Algorithm (cont.)

ρ<1 ZE gets more accurate results than CE CE performs better when ρ greater than a threshold

Deterministic Algorithm (cont.) Compute the desired variance σ Initial frame size f Energize the tags and get n0 and nc Compute (1) get fz if fz >fmax then set fz = fmax and ρ=t’/fmax and set repetition number Let fc = ρ=t’*1.15. if fc >fmax then set fc=fmax. and set repetition number Select the littler one between fc and fz

Deterministic Algorithm (cont.) Large number of slots needed for the desired accuracy The estimation time is faster than the identification time within an accuracy tags within an confidence interval of ±500 tags in 4.5 seconds.

Probabilistic Algorithm (cont.)