520 likes | 652 Vues
Season: Shelving Interference and Joint Identification in Large-scale RFID Systems. Presented by Zhu Jinshun. How RFID works. Typical RFID system. Basic Tag Assembly. Outlines. Introduction Preliminaries Season Performance Evaluation Related Works Conclusion. Introduction.
E N D
Season: Shelving Interference and Joint Identification in Large-scale RFID Systems Presented by Zhu Jinshun
How RFID works Typical RFID system
Outlines • Introduction • Preliminaries • Season • Performance Evaluation • Related Works • Conclusion
Introduction • Collisions in RFID systems • Anti-collision methods
Collisions in RFID systems • Tag collision • Reader collision • Reader-Tag collision tag reader
Collisions in RFID systems contentious tag contentious region Reader collision Tag collision Reader-Tag collision
Anti-collision methods Tag collision FSA Reader collision Colorwave Reader-Tag collision Protocol stack: Season
Outlines • Introduction • Preliminaries • Season • Performance Evaluation • Related Works • Conclusion
Preliminaries Tag Collision Reader Collision Reader-Tag Collision System Model
Tag Collision • Mainly employ Time Dividing Multiple Accesses (TDMA) • A popular anti-tag-collision algorithm • is Framed Slotted ALOHA (FSA) Tag collision
Tag Collision - FSA procedure:
Tag Collision-FSA • Command: • request, select, read/write, quit, reset • Types of slots: • Idle, single, collided
Reader Collision • Reader Conflict Graph (RCG) • Colorwave Reader collision RCG
Reader - Tag Collision schedule (r1,r2 ) in sequence, we can only consider the other two types of collisions Reader-Tag collision
Outlines • Introduction • Preliminaries • Season • Performance Evaluation • Related Works • Conclusion
Season Observations Overview Season-I Season-II Season-III Discussion
Season - Observations • Majority of tags are non-contentious • Contentious tags cause the major delay • The signals from contentious tags can be • received
Season - Overview • Season is a protocol stack • two phases: • Shelving Interference(Season-I) • Joint Identification(Season-II,Season-III)
Season - Overview • Season-I:non-contentious tags • Season-II:active reader,passive reader • Season-III:datafrom contentious tags
Season - Season-I • concurrently identify tags • the majority of tags can be identified • Similar to FSA,frames,equivalent slots • different from FSA,tune the length of frames
Season - Season-I • One slot = 1/f • the optimal choice of f is • USE,estimate • Dynamically adjust the frame to -k after the k-th tag is collected
Season Season - Season-II • Joint Identification has two advantages: • 1、 can avoid reader collisions among neighboring readers • 2、 Reduce the identification delay • significantly
Season - Season-II • Active reader and passive reader • Active readers ,two conditions: • 1、cover edges as most as possible • 2、 will not incur signal interference among themselves when concurrently activated
Season - Season-II • the Maximal Weighted Independent Set (MWIS) • Notation: • v, CH(v), JOIN(v,u), EXIT • v, either a clusterhead or an ordinary node
Season - Season-III • Cross-range tag collision, a new tag collision • Season-III • to allow active and passive readers to identify contentious tags collaboratively Cross-range tag collision
Season - Season-III Given that the set of active readers is A and the set of passive readers is the P • On one hand, for active readers… • On the other hand, for passive readers…
Season - Season-III • On one hand, for active readers: • estimate the number of contentious tags, • TDMA, • keep the tags in active state util all “FINISH” • broadcast “silence”
Season - Season-III • On one hand, for passive readers: • listen , estimate • send a “FINISH” message • if no neighboring passive readers, • otherwise, next scheduling round
Season - Season-III For example
Season - Discussion • Unbalanced Loads of Readers • session number • Source Sensitive and Insensitive
Outlines • Introduction • Preliminaries • Season • Performance Evaluation • Related Works • Conclusion
Performance Evaluation Evaluation Methodology Implementation Results Simulation Results
Evaluation Methodology • Testbed and deployment • Simulating Real RFID Applications • Performance Metrics
Evaluation Methodology Testbed and deployment use a NI PXI-1044 RFID testing tool with PXI 5600 receiver as our passive reader interrogation range 2m deploy five readers find that the percentage of contentious tags is less than 10%
Evaluation Methodology • Testbed and deployment • Simulating Real RFID Applications • Performance Metrics
Evaluation Methodology • Simulating Real RFID Applications • two typical application scenarios and three random reader topologies • Warehouse: 72 readers, 78,606 records • Object tracking: 1653 records, includes the tag locations, source, and identification time • Random Topologies: “Sparse”,“Moderate”,“Dense”
Evaluation Methodology • Performance Metrics • Throughput: the ratio of total number of tags to the overall identification time • Average Delay • Read Rate: environment noise,multi-path, signal attenuation • Scheduling Round: the efficiency of anti-reader-collision
Implementation Results employ a NI PXI-1044 testing tool with a PXI 5600 receiver as the passive reader, Alien reader as the active reader We can observe that the passive reader achieves a read rate of 0.73 in 60% of testing cases. The average value of its read rates is up to 0.71, which is nearly as good as that in the single-reader deploying scenario.
Identifying tags without reader collisions when number of tag is above 100, Season-I has 30.6% and 42.2% time saving on average than BT and FSA
Identifying tags without reader collisions Season-I, up to 0.4 and 60% of the cases has a throughput higher than 0.37
Identifying tags with reader collisions the average delay of Season is no more than 300 time slots
Outlines • Introduction • Preliminaries • Season • Performance Evaluation • Related Works • Conclusion
Related Works FSA, Colorwave, USE……
Outlines • Introduction • Preliminaries • Season • Performance Evaluation • Related Works • Conclusion