Chapter 8 – Tree-based Anti-Collision Protocols for RFID tags

Slides:



Advertisements
Similar presentations
Fig. 4-1, p Fig. 4-2, p. 109 Fig. 4-3, p. 110.
Advertisements

Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
Slide 1Fig. 22.1, p.669. Slide 2Fig. 22.3, p.670.
Computer Science: A Structured Programming Approach Using C Converting File Type A rather common but somewhat trivial problem is to convert a text.
Presented for: CPS Lab-ASU By: Ramtin Kermani
Slide 1Fig. 17.1, p.513. Slide 2Table 17.1, p.514.
P.464. Table 13-1, p.465 Fig. 13-1, p.466 Fig. 13-2, p.467.
P449. p450 Figure 15-1 p451 Figure 15-2 p453 Figure 15-2a p453.
Fig. 11-1, p p. 360 Fig. 11-2, p. 361 Fig. 11-3, p. 361.
Processing Data in External Storage CS Data Structures Mehmet H Gunes Modified from authors’ slides.
Adaptive Splitting Protocols for RFID Tag Collision Arbitration Jihoon Myung and Wonjun Lee ACM Mobihoc 06.
Binary Decision Diagrams1 BINARY DECISION DIAGRAMS.
©Brooks/Cole, 2001 Chapter 13 Binary Files. ©Brooks/Cole, 2001 Figure 13-1.
Table 6-1, p Fig. 6-1, p. 162 p. 163 Fig. 6-2, p. 164.
ISBN Chapter 3 Describing Syntax and Semantics.
RFID Cardinality Estimation with Blocker Tags
Figure 1.1 The observer in the truck sees the ball move in a vertical path when thrown upward. (b) The Earth observer views the path of the ball as a parabola.
David Molnar, David Wagner - Authors Eric McCambridge - Presenter.
Chapter 11 - Reducing Interference in RFID Reader Networks
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
Anti-tag collision algorithms of RFID
Panagiotis Rizomiliotis and Stefanos Gritzalis Dept. of Information and Communication Systems Engineering University of the Aegean, Greece GHB#: A Provably.
Issues in Integrated Circuit Design for UHF RFID Zhihua WANG,Xuguang SUN, Chun ZHANG,Yongming LI Institute of Microelectronics, Tsinghua University,Beijing,100084,P.R.China.
Connecting LANs, Backbone Networks, and Virtual LANs
Chapter 4 The Building Blocks: Binary Numbers, Boolean Logic, and Gates.
Review for Chapter 3 Test. Find 385 ÷6. 64 R1 Which is the most reasonable estimate for 7, 824 ÷2 ? 2,000 2,500 4,000 4,500.
Probabilistic Optimal Tree Hopping for RFID Identification Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering Michigan State University.
Final Review Focus- Chapter 4: Network layer Chapter 5: Data link layer Notes: Physical layer Understand previous chapters covered in class. Final exam.
Quadratic Patterns of Change
Coding Theory Efficient and Reliable Transfer of Information
Muhammad Shahzad Alex X. Liu Dept. of Computer Science and Engineering
The Sampling Distribution of the Sample Mean
NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS ( NET 222: COMMUNICATIONS AND NETWORKS FUNDAMENTALS (PRACTICAL PART) Tutorial 4 : Chapter 5 Data & computer.
Text Illustrations in PPT Chapter 11. Source Coding and Error Correction Techniques Principles of Communications, 6th Edition Rodger E. Ziemer William.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Fig. 6-CO, p p. 185a p. 185b p. 185c p. 185d.
Part III. Data Link Layer
Sensing multiple passive tags simultaneously
Chapter 5 – Design of Passive Tag RFID Readers
Chapter 7 – Aloha-Based Protocol
Multiplication table. x
External Methods Chapter 15 (continued)
Chapter 12 Multiple Access
Chapter 10 – Integrating RFID Readers in Enterprise IT
Chapter 15 - Principles and Techniques of RFID Positioning
Figures & Tables from the textbook.
Chapter 12 Multiple Access
Designing Algorithms for Multiplication of Fractions
Chapter 12 Multiple Access
SNMP Examples.
Chapter 10 Error-Control Coding.
5 × 7 = × 7 = 70 9 × 7 = CONNECTIONS IN 7 × TABLE
5 × 8 = 40 4 × 8 = 32 9 × 8 = CONNECTIONS IN 8 × TABLE
Chapter 9 - A Comparison of TTF and RTF UHF RFID Protocols
Designing Algorithms for Multiplication of Fractions
4 × 6 = 24 8 × 6 = 48 7 × 6 = CONNECTIONS IN 6 × TABLE
5 × 6 = 30 2 × 6 = 12 7 × 6 = CONNECTIONS IN 6 × TABLE
1: multiple representations
Figure 11-1.
Fig. 6-CO, p. 211.
07CO, p. 190.
10 × 8 = 80 5 × 8 = 40 6 × 8 = CONNECTIONS IN 8 × TABLE MULTIPLICATION.
3 × 12 = 36 6 × 12 = 72 7 × 12 = CONNECTIONS IN 12 × TABLE
Figure Overview.
Figure Overview.
5 × 12 = × 12 = × 12 = CONNECTIONS IN 12 × TABLE MULTIPLICATION.
5 × 9 = 45 6 × 9 = 54 7 × 9 = CONNECTIONS IN 9 × TABLE
3 × 7 = 21 6 × 7 = 42 7 × 7 = CONNECTIONS IN 7 × TABLE
Chapter 1 Functions.
Presentation transcript:

Chapter 8 – Tree-based Anti-Collision Protocols for RFID tags

Figure 8.1 Illustration of (a) tag collision and (b) reader collision. Tag collision occurs at the reader RA. The reader collision occurs at tags τ2; τ3, but not at τ1; τ4. (Author saved all figures in pdf file, so I have to take screen shot for this chapter’s figures)

Figure 8.2 Time diagram that represents the channel over which the tag-reader arbitration and communication is done Probes are sent by the reader, while in the other slots the reader receives.

Figure 8.3 An instance of the binary tree algorithm for collision multiplicity of N = 8 Each vertex represents a slot that can be in one of the three states: Idle (I), Single (S) or Collision (C). For channel state “S”, τi denotes the resolved or singulated tag.

Figure 8.4 (a) The algorithm run at the reader

Figure 8.4 (b) The algorithm run at a tag

Figure 8.5 Timing diagram for part of the protocol execution described in Fig. 8.3 The notation (τi - τj) below a slot denotes the set of tags τi; τi+1; τi+2 : : : τj that transmits in that slot.

Figure 8.6 Binary tree from Fig. 8.3 Binary tree from Fig. 8.3 represented in the framework that uses tokens and sequence of enabled intervals. A rectangle denotes the interval enabled in a given slot. Shaded rectangle denotes collision; a rectangle labeled with τi denotes that only tag τi has its token that particular enabled interval.

Table 8.1 Time efficiency

Figure 8.7 General model that represents the errors at the reader

Figure 8.8 (a) RFID tags on a conveyor belt The reader covers length L on the belt

Figure 8.8 (b) RFID tags on a conveyor belt Equivalent representation in the two-dimensional arbitration space in one time snapshot. The abscissa represents the random token in [0; 1). The light shaded stripe is the coverage area of the reader in that snapshot, while the dark shaded stripe is the area enabled when the tree protocol enables the interval [0:25; 0:5).

Figure 8.9 Movement of the tags on a conveyor belt The shaded area represents the reader coverage.

Figure 8.10 Representation of the compound random process the tags are randomly distributed in a two-dimensional space and their tokens are randomly distributed in interval [0; 1). For a given tag, the random token represents its x coordinate and the random placement its y coordinate.

Figure 8.11 Different estimates of normalized by the total number of tags n

Figure 8.12 Possible spatial arbitration patterns for a system Possible spatial arbitration patterns for a system with a single reader and beamforming. The arbitration space is three-dimensional, one dimension being the random token and the other two dimensions are represented by the circle.