SlideShare a Scribd company logo
1 of 26
Fast and Reliable
Estimation Schemes in
RFID Systems
Murali Kodialam and Thyaga Nandagopal
Bell Labs, Lucent Technologies
What is RFID?
 RFID, Radio Frequency Identification, is not a new subject
that is going to be proposed anymore.
 It is an identification tag that stores the identity of
something.
 It is very simple and cheap to be largely produced.
 It has been used in various application ranging from
inventory control and tracking to medical-patient
management.
What is RFID? (cont.)
 Most of them are designed to have a very long life.
 It is because they are not designed to use any existing
energy sources for transmitting data.
 Instead, a probe signal sent by a reader node is used as
energy for data transmission.
 The probe itself can be performed via magnetic coupling
(called near-field) or electro-magnetic coupling (called far-
field).
 Nowadays, the probe has much larger range and is
designed to read hundreds of tags at a time.
Classification of RFID
 Passive tags
 Semi-passive tags
 Active tags
Common problem that arise
 Some applications need to estimate the number of tags
as fast as possible for a givenaccuracy
Two major problems arise in anyRFIDdeployment
Identification
Estimation
Existing protocols are not fast enough
Identification Algorithm
 The idea is described as following: the reader probes a set
of tags, and the tags reply back.
 Since it operates in the wireless medium, Collisions might
happen in the process of probing a set of tags.
 To hinder the collisions, anti-collision schemes needed to
be applied into the identification algorithms.
Identification Algorithm
 Probabilistic
 Deterministic
Probabilistic Identification
Algorithm
 The reader communicates through a framed ALOHA
scheme length and the tags pick a particular slot in the
frame to transmit.
 This process is repeated by the reader until all tags have
transmitted at least once successfully in a slot without
collisions.
 In semi-passive and active tag systems, the reader can
acknowledge tags that have succeeded at the end of each
frame, therefore it shorts the overall identification time.
 In passive tags, all tags will continue to transmit in every
frame, which lengthens the total time needed to identify
all tags.
Deterministic Identification
Algorithm
 The reader identifies the set of tags that need to transmit
in a given slot, and tries to seduce the contending tag set
in the next slot based on the result in the previous slot.
 These algorithms fall into the class of tree-based
identification algorithms, such as a binary tree.
 On the binary tree, the tags are classified based on their id
and the reader moving down the tree at each step to
identify all nodes.
 Deterministic algorithms are typically faster than
probabilistic schemes in terms of actual tag response slots
used, however, they suffer from large reader overhead
since address ranges need to be specified to isolate
contending tag subsets using a probe at the beginning of
each slot.
Algorithm Requirements.
 An estimation of the actual number of tags t in the system
is required by both of the algorithms.
 The estimation is used:
◦ To set the optimal frame size in framed ALOHA.
◦ To guide the tree-based identification process for computing
the expected number of slots needed for identification.
 The estimation process should also be able to use non-
identifiable information, such as a string of bits used by all
tags, to compute the size of the tag set t.
System Model
 readers and tags
 Use a Listen-before-Talk model approach, where tags
listen to the reader’s request before they talk back.
System Model (cont.)
Assumption on the model:
 There exist a separate estimation phase for identification
process.
 Framed-slotted ALOHA model is used for tags to transmit
back to the reader.
 The tags respond with a bit-string that contains some
error-detection (such as CRC) embedded in the string
when probed by the reader in the estimation phase. The
length of this common bit-string is defined as the
minimum length string such that the reader can detect
collisions when multiple tags transmit the same string in a
given slot. The reader can thus detect collisions in the
estimation phase and identify a successful transmission in
any slot by only one tag.
 There is no identification problem.
System Model (cont.)
 The estimator performance is measured in terms of the
number of slots needed to perform the estimation to the
desired accuracy level.
 The goal is to achieve the desired performance in as little
time as possible.
 In other words, if it takes le slots to compute ˆt, the
estimate of t tags with a certain accuracy, and li slots to
uniquely identify ˆt tags, then, we need se.le < li.si, where
se and si are the sizes of the bit strings transmitted during
the estimation and identification phases respectively.
System Model (cont.)
◦ Phillips I-Code system.
◦ A frame size f (typically a power of 2) is sent by the
readers along with a seed value which is 16-bit number.
◦ The seed information along with its identifier used by
the tag to hash into an integer in the range [1, f], which
specifies the slot in which the frame will contend.
System Model (cont.)
 Model that is approached:
◦ Extend the scheme to support variable contention
probability p.
◦ Therefore, the reader now sends three parameters in
each probe:
 the seed
 the frame size f
 the integer [f/p]
◦ The tag hashes the combined seed/identifier value into
the range [1, [f/p]].
◦ If the hashed value is greater than f, then the tag does
not transmit in this frame, else it transmit in the
computed slot.
◦ Therefore, a frame transmission probability of f/(f/p) =
p.
Deterministic Algorithm
 The reader probes the tags with the frame size f
 The tags pick a slot j in the frame uniformly at random and
transmit in that slot.
 The indicator random variable Xj is used to determine
whether tag transmit to and not transmit to in slot j.
 Xj = 1 if no tag transmit in slot j, referred as an empty slot,
and Xj = 0 otherwise.
 Similarly, we set Yj = 1 if and only if there is exactly one
tag that transmits in slot j, referred as a singleton slot, and
Vj = 1 if and only if there are multiple tags that transmit in
slot j, referred as a collision.
 So that, Xj + Yj + Vj = 1 for all slots j.
Deterministic Algorithm (cont.)
 Let N0 = ∑ Xj from j = 1 to j = f denote the total number of
empty slots.
 N1 = ∑ Yj from j = 1 to j = f denote the total number of
singleton slots.
 Nc = f − N0 − N1 denote the number of collision slots.
 P = t/f, t denotes numbers of tags and f denotes frame
size.
Deterministic Algorithm (cont.)
Deterministic Algorithm (cont.)
Zero Estimator (ZE)
ρ<1, many empty slots and few singleton and
collision slots
Collision Estimator (CE)
ρ>1, many collision slots and singleton
slots decrease
Singleton Estimator (SE) ρ=1
Deterministic Algorithm (cont.)
Deterministic Algorithm (cont.)
 ρ<1 ZE gets more accurate results than CE
 CE performs better when ρ greater than a
threshold
Deterministic Algorithm (cont.)
Compute the desired variance σ
Initial frame size f
Energize the tags and get n0 and nc
Compute (1) get fz
if fz >fmax then set fz = fmax and ρ=t’/fmax and set
repetition number
Let fc = ρ=t’*1.15. if fc >fmax then set fc=fmax. and set
repetition number
Select the littler one between fc and fz
Deterministic Algorithm (cont.)
Large number of slots needed for the desired accuracy
The estimation time is faster than the identification time within an
accuracy. 50 000 tags within an confidence interval of ±500 tags
in 4 .5 seconds.
Probabilistic Algorithm (cont.)
Probabilistic Algorithm (cont.)
Probabilistic Algorithm (cont.)

More Related Content

Similar to Fast and Reliable Estimation Schemes in RFID Systems.ppt

Thesis presentation archita keni
Thesis presentation archita keniThesis presentation archita keni
Thesis presentation archita keniArchita Keni
 
Dynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationDynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationambitlick
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesIJERA Editor
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherMazin Alwaaly
 
Iaetsd implementation of aho corasick algorithm
Iaetsd implementation of aho corasick algorithmIaetsd implementation of aho corasick algorithm
Iaetsd implementation of aho corasick algorithmIaetsd Iaetsd
 
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFICSIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFICijdms
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsijcisjournal
 
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...IOSR Journals
 
A NOVEL ADAPTIVE - WAVELET BASED DETECTION ALGORITHM FOR CHIPLESS RFID SYSTEM
A NOVEL ADAPTIVE - WAVELET BASED DETECTION ALGORITHM FOR CHIPLESS RFID SYSTEMA NOVEL ADAPTIVE - WAVELET BASED DETECTION ALGORITHM FOR CHIPLESS RFID SYSTEM
A NOVEL ADAPTIVE - WAVELET BASED DETECTION ALGORITHM FOR CHIPLESS RFID SYSTEMcsandit
 

Similar to Fast and Reliable Estimation Schemes in RFID Systems.ppt (20)

Concurrent Online Test of RFID Memories Using MBIST
Concurrent Online Test of RFID Memories Using MBISTConcurrent Online Test of RFID Memories Using MBIST
Concurrent Online Test of RFID Memories Using MBIST
 
Thesis presentation archita keni
Thesis presentation archita keniThesis presentation archita keni
Thesis presentation archita keni
 
Dynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimationDynamic framed slotted aloha algorithms using fast tag estimation
Dynamic framed slotted aloha algorithms using fast tag estimation
 
Fault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch CodesFault Tolerant Parallel Filters Based On Bch Codes
Fault Tolerant Parallel Filters Based On Bch Codes
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
RFID PROTOCOL
RFID PROTOCOLRFID PROTOCOL
RFID PROTOCOL
 
Co35503507
Co35503507Co35503507
Co35503507
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
dgr
dgrdgr
dgr
 
CDMA
CDMACDMA
CDMA
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
Iaetsd implementation of aho corasick algorithm
Iaetsd implementation of aho corasick algorithmIaetsd implementation of aho corasick algorithm
Iaetsd implementation of aho corasick algorithm
 
10.1.1.150.595
10.1.1.150.59510.1.1.150.595
10.1.1.150.595
 
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFICSIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
SIMILARITY SEARCH FOR TRAJECTORIES OF RFID TAGS IN SUPPLY CHAIN TRAFFIC
 
O41049497
O41049497O41049497
O41049497
 
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systemsA novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systems
 
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...High Performance Error Detection with Different Set Cyclic Codes for Memory A...
High Performance Error Detection with Different Set Cyclic Codes for Memory A...
 
E031022026
E031022026E031022026
E031022026
 
Cdma
CdmaCdma
Cdma
 
A NOVEL ADAPTIVE - WAVELET BASED DETECTION ALGORITHM FOR CHIPLESS RFID SYSTEM
A NOVEL ADAPTIVE - WAVELET BASED DETECTION ALGORITHM FOR CHIPLESS RFID SYSTEMA NOVEL ADAPTIVE - WAVELET BASED DETECTION ALGORITHM FOR CHIPLESS RFID SYSTEM
A NOVEL ADAPTIVE - WAVELET BASED DETECTION ALGORITHM FOR CHIPLESS RFID SYSTEM
 

More from novrain1

Chuong 2- Tin & Luong tin.ppt slide for teaching
Chuong 2- Tin & Luong tin.ppt slide for teachingChuong 2- Tin & Luong tin.ppt slide for teaching
Chuong 2- Tin & Luong tin.ppt slide for teachingnovrain1
 
Channel coding chuong 6 ma hoa kenh phan ma chap.ppt
Channel coding chuong 6 ma hoa kenh phan ma chap.pptChannel coding chuong 6 ma hoa kenh phan ma chap.ppt
Channel coding chuong 6 ma hoa kenh phan ma chap.pptnovrain1
 
Xu ly tin hieu am thanh và hình ảnh giảng dạy slide
Xu ly tin hieu am thanh và hình ảnh giảng dạy slideXu ly tin hieu am thanh và hình ảnh giảng dạy slide
Xu ly tin hieu am thanh và hình ảnh giảng dạy slidenovrain1
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsnovrain1
 
RFID Estimation Problem in RFID system.ppt
RFID Estimation Problem in RFID system.pptRFID Estimation Problem in RFID system.ppt
RFID Estimation Problem in RFID system.pptnovrain1
 
mobile communication for student and lecture
mobile communication for student and lecturemobile communication for student and lecture
mobile communication for student and lecturenovrain1
 
Introduce mobile communication generation.ppt
Introduce mobile communication generation.pptIntroduce mobile communication generation.ppt
Introduce mobile communication generation.pptnovrain1
 
random variable and probability distributions
random variable and probability distributionsrandom variable and probability distributions
random variable and probability distributionsnovrain1
 
discrete and continuous probability distributions pptbecdoms-120223034321-php...
discrete and continuous probability distributions pptbecdoms-120223034321-php...discrete and continuous probability distributions pptbecdoms-120223034321-php...
discrete and continuous probability distributions pptbecdoms-120223034321-php...novrain1
 
Understanding RFID Counting Protocols.ppt
Understanding RFID Counting Protocols.pptUnderstanding RFID Counting Protocols.ppt
Understanding RFID Counting Protocols.pptnovrain1
 

More from novrain1 (10)

Chuong 2- Tin & Luong tin.ppt slide for teaching
Chuong 2- Tin & Luong tin.ppt slide for teachingChuong 2- Tin & Luong tin.ppt slide for teaching
Chuong 2- Tin & Luong tin.ppt slide for teaching
 
Channel coding chuong 6 ma hoa kenh phan ma chap.ppt
Channel coding chuong 6 ma hoa kenh phan ma chap.pptChannel coding chuong 6 ma hoa kenh phan ma chap.ppt
Channel coding chuong 6 ma hoa kenh phan ma chap.ppt
 
Xu ly tin hieu am thanh và hình ảnh giảng dạy slide
Xu ly tin hieu am thanh và hình ảnh giảng dạy slideXu ly tin hieu am thanh và hình ảnh giảng dạy slide
Xu ly tin hieu am thanh và hình ảnh giảng dạy slide
 
the Multiple Access SLIDE for university students
the Multiple Access SLIDE for university studentsthe Multiple Access SLIDE for university students
the Multiple Access SLIDE for university students
 
RFID Estimation Problem in RFID system.ppt
RFID Estimation Problem in RFID system.pptRFID Estimation Problem in RFID system.ppt
RFID Estimation Problem in RFID system.ppt
 
mobile communication for student and lecture
mobile communication for student and lecturemobile communication for student and lecture
mobile communication for student and lecture
 
Introduce mobile communication generation.ppt
Introduce mobile communication generation.pptIntroduce mobile communication generation.ppt
Introduce mobile communication generation.ppt
 
random variable and probability distributions
random variable and probability distributionsrandom variable and probability distributions
random variable and probability distributions
 
discrete and continuous probability distributions pptbecdoms-120223034321-php...
discrete and continuous probability distributions pptbecdoms-120223034321-php...discrete and continuous probability distributions pptbecdoms-120223034321-php...
discrete and continuous probability distributions pptbecdoms-120223034321-php...
 
Understanding RFID Counting Protocols.ppt
Understanding RFID Counting Protocols.pptUnderstanding RFID Counting Protocols.ppt
Understanding RFID Counting Protocols.ppt
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingrakeshbaidya232001
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAbhinavSharma374939
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxAsutosh Ranjan
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Analog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog ConverterAnalog to Digital and Digital to Analog Converter
Analog to Digital and Digital to Analog Converter
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 

Fast and Reliable Estimation Schemes in RFID Systems.ppt

  • 1. Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies
  • 2. What is RFID?  RFID, Radio Frequency Identification, is not a new subject that is going to be proposed anymore.  It is an identification tag that stores the identity of something.  It is very simple and cheap to be largely produced.  It has been used in various application ranging from inventory control and tracking to medical-patient management.
  • 3. What is RFID? (cont.)  Most of them are designed to have a very long life.  It is because they are not designed to use any existing energy sources for transmitting data.  Instead, a probe signal sent by a reader node is used as energy for data transmission.  The probe itself can be performed via magnetic coupling (called near-field) or electro-magnetic coupling (called far- field).  Nowadays, the probe has much larger range and is designed to read hundreds of tags at a time.
  • 4. Classification of RFID  Passive tags  Semi-passive tags  Active tags
  • 5. Common problem that arise  Some applications need to estimate the number of tags as fast as possible for a givenaccuracy Two major problems arise in anyRFIDdeployment Identification Estimation Existing protocols are not fast enough
  • 6. Identification Algorithm  The idea is described as following: the reader probes a set of tags, and the tags reply back.  Since it operates in the wireless medium, Collisions might happen in the process of probing a set of tags.  To hinder the collisions, anti-collision schemes needed to be applied into the identification algorithms.
  • 8. Probabilistic Identification Algorithm  The reader communicates through a framed ALOHA scheme length and the tags pick a particular slot in the frame to transmit.  This process is repeated by the reader until all tags have transmitted at least once successfully in a slot without collisions.  In semi-passive and active tag systems, the reader can acknowledge tags that have succeeded at the end of each frame, therefore it shorts the overall identification time.  In passive tags, all tags will continue to transmit in every frame, which lengthens the total time needed to identify all tags.
  • 9. Deterministic Identification Algorithm  The reader identifies the set of tags that need to transmit in a given slot, and tries to seduce the contending tag set in the next slot based on the result in the previous slot.  These algorithms fall into the class of tree-based identification algorithms, such as a binary tree.  On the binary tree, the tags are classified based on their id and the reader moving down the tree at each step to identify all nodes.  Deterministic algorithms are typically faster than probabilistic schemes in terms of actual tag response slots used, however, they suffer from large reader overhead since address ranges need to be specified to isolate contending tag subsets using a probe at the beginning of each slot.
  • 10. Algorithm Requirements.  An estimation of the actual number of tags t in the system is required by both of the algorithms.  The estimation is used: ◦ To set the optimal frame size in framed ALOHA. ◦ To guide the tree-based identification process for computing the expected number of slots needed for identification.  The estimation process should also be able to use non- identifiable information, such as a string of bits used by all tags, to compute the size of the tag set t.
  • 11. System Model  readers and tags  Use a Listen-before-Talk model approach, where tags listen to the reader’s request before they talk back.
  • 12. System Model (cont.) Assumption on the model:  There exist a separate estimation phase for identification process.  Framed-slotted ALOHA model is used for tags to transmit back to the reader.  The tags respond with a bit-string that contains some error-detection (such as CRC) embedded in the string when probed by the reader in the estimation phase. The length of this common bit-string is defined as the minimum length string such that the reader can detect collisions when multiple tags transmit the same string in a given slot. The reader can thus detect collisions in the estimation phase and identify a successful transmission in any slot by only one tag.  There is no identification problem.
  • 13. System Model (cont.)  The estimator performance is measured in terms of the number of slots needed to perform the estimation to the desired accuracy level.  The goal is to achieve the desired performance in as little time as possible.  In other words, if it takes le slots to compute ˆt, the estimate of t tags with a certain accuracy, and li slots to uniquely identify ˆt tags, then, we need se.le < li.si, where se and si are the sizes of the bit strings transmitted during the estimation and identification phases respectively.
  • 14. System Model (cont.) ◦ Phillips I-Code system. ◦ A frame size f (typically a power of 2) is sent by the readers along with a seed value which is 16-bit number. ◦ The seed information along with its identifier used by the tag to hash into an integer in the range [1, f], which specifies the slot in which the frame will contend.
  • 15. System Model (cont.)  Model that is approached: ◦ Extend the scheme to support variable contention probability p. ◦ Therefore, the reader now sends three parameters in each probe:  the seed  the frame size f  the integer [f/p] ◦ The tag hashes the combined seed/identifier value into the range [1, [f/p]]. ◦ If the hashed value is greater than f, then the tag does not transmit in this frame, else it transmit in the computed slot. ◦ Therefore, a frame transmission probability of f/(f/p) = p.
  • 16. Deterministic Algorithm  The reader probes the tags with the frame size f  The tags pick a slot j in the frame uniformly at random and transmit in that slot.  The indicator random variable Xj is used to determine whether tag transmit to and not transmit to in slot j.  Xj = 1 if no tag transmit in slot j, referred as an empty slot, and Xj = 0 otherwise.  Similarly, we set Yj = 1 if and only if there is exactly one tag that transmits in slot j, referred as a singleton slot, and Vj = 1 if and only if there are multiple tags that transmit in slot j, referred as a collision.  So that, Xj + Yj + Vj = 1 for all slots j.
  • 17. Deterministic Algorithm (cont.)  Let N0 = ∑ Xj from j = 1 to j = f denote the total number of empty slots.  N1 = ∑ Yj from j = 1 to j = f denote the total number of singleton slots.  Nc = f − N0 − N1 denote the number of collision slots.  P = t/f, t denotes numbers of tags and f denotes frame size.
  • 19. Deterministic Algorithm (cont.) Zero Estimator (ZE) ρ<1, many empty slots and few singleton and collision slots Collision Estimator (CE) ρ>1, many collision slots and singleton slots decrease Singleton Estimator (SE) ρ=1
  • 21. Deterministic Algorithm (cont.)  ρ<1 ZE gets more accurate results than CE  CE performs better when ρ greater than a threshold
  • 22. Deterministic Algorithm (cont.) Compute the desired variance σ Initial frame size f Energize the tags and get n0 and nc Compute (1) get fz if fz >fmax then set fz = fmax and ρ=t’/fmax and set repetition number Let fc = ρ=t’*1.15. if fc >fmax then set fc=fmax. and set repetition number Select the littler one between fc and fz
  • 23. Deterministic Algorithm (cont.) Large number of slots needed for the desired accuracy The estimation time is faster than the identification time within an accuracy. 50 000 tags within an confidence interval of ±500 tags in 4 .5 seconds.