An Empirical Study of UHF RFID Performance Michael Buettner and David Wetherall Presented by Qian (Steve) He CS 577 - Prof. Bob Kinicki.

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

Amateur Radio Technician Class Element 2 Course Presentation
Towards MIMO-Aware n Rate Adaptation (Ioannis Pefkianakis, Suk-Bok Lee and Songwu Lu) Towards MIMO-Aware n Rate Adaptation (Ioannis Pefkianakis,
VSMC MIMO: A Spectral Efficient Scheme for Cooperative Relay in Cognitive Radio Networks 1.
CHAPTER Modulation.
Lesson Title: RFID Modulation, Encoding, and Data Rates Dale R. Thompson Computer Science and Computer Engineering Dept. University of Arkansas
Overview of new technologies Jørgen Bach Andersen, Aalborg University, Denmark Sven Kuhn, Rasmus Krigslund, Troels B. Sørensen.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
1 FCC RFID Workshop RFID Discussions September 7, 2004 Kevin Powell, Symbol Technologies.
Software Defined Radio Testbed Team may11-18 Members: Alex Dolan, Mohammad Khan, Ahmet Unsal Adviser: Dr. Aditya Ramamoorthy.
PERFORMANCE MEASUREMENTS OF WIRELESS SENSOR NETWORKS Gizem ERDOĞAN.
Computer Communication & Networks Lecture # 06 Physical Layer: Analog Transmission Nadeem Majeed Choudhary
Network Coding Testbed Using Software-Defined Radio Abstract In current generation networks, network nodes operate by replicating and forwarding the packets.
Timo Kasper Crete, Greece May 10, 2007 An Embedded System for Practical Security Analysis of Contactless Smartcards Timo Kasper, Dario Carluccio and Christof.
U NIVERSITY OF M ASSACHUSETTS, A MHERST Department of Computer Science Leveraging Interleaved Signal Edges for Concurrent Backscatter by Pan Hu, Pengyu.
RADIO FREQUENCY MODULE. Introduction  An RF module is a small electronic circuit used to transmit and receive radio signals.  As the name suggests,
EPC Radio Frequency Identify Protocols Class1 Generation-2 UHF RFID 860 MHZ – 960 MHZ EPCglobal.
Copyright : Hi Tech Criminal Justice, Raymond E. Foster Police Technology Police Technology Chapter Three Police Technology Wireless Communications.
Performance of DS-CDMA Protocols in Wireless LANS M.Parikh, P.Sharma, R.Garg, K. Chandra, C. Thompson Center for Advanced Computation and Telecommunications.
University of Kansas | School of Engineering Department of Electrical Engineering and Computer Science Milagros FigueroaApril Access Methods for.
Topic 3: Sensor Networks and RFIDs Part 3 Instructor: Randall Berry Northwestern University MITP 491: Selected Topics.
1 EPCglobal Training Suite. 2 Introduction Tag Protocol - UHF Class 1 Gen 2 Ultra High Frequency (UHF) Generation 2 (Generation 1 is deprecated) Class.
Can we get Wi-Fi connectivity for 15 µW? Bryce Kellogg.
A Transmission Control Scheme for Media Access in Sensor Networks Alec Woo, David Culler (University of California, Berkeley) Special thanks to Wei Ye.
Modulation of Waves (FM Radio, AM Radio and Television)
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
Real World Applications of RFID Mr. Mike Rogers Bryan Senior High School Omaha, NE.
Physical-layer Identification of RFID Devices Authors: Boris Danev, Thomas S. Heyde-Benjamin, and Srdjan Capkun Presented by Zhitao Yang 1.
Overview of RFID System Characteristics Operating Frequency Method of Coupling Transmission Range Data Storage Capacity Power Supply (Active, Passive)
Chip tag A radio-frequency identification system uses tags readers send a signal to the tag and read its response RFID tags can be either passive active.
Software Defined Radio Test bed Abstract In wireless communication systems, dedicated hardware built for signal processing purposes are traditionally used.
The physics of RFID Matt Reynolds Founding Partner ThingMagic LLC.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Tamer Nadeem Dept. of Computer Science Lec #7: MAC Multi-Rate.
Cong Wang1, Qian Wang1, Kui Ren1 and Wenjing Lou2
A Framework for Energy- Scalable Communication in High-Density Wireless Networks Telvis Calhoun Wireless Sensor Networks CSC Dr. Li 8/27/2008.
Wireless# Guide to Wireless Communications
IEEE High Rate WPAN - MAC functionalities & Power Save Mode Mobile Network Lab. 정상수, 한정애.
Network Coding Testbed Jeremy Bergan, Ben Green, Alex Lee.
by P. Sriploy, M. Uthansakul and R. Wongsan
© Janice Regan, CMPT 300, May CMPT 300 Introduction to Operating Systems Principles of I/0 hardware.
RF-ID Overview What is RFID? Components. Block diagram & Working. Frequency Ranges. EPC Code. Advantages & Disadvantages. Applications.
Submitted By: A.Anjaneyulu INTRODUCTION Near Field Communication (NFC) is based on a short-range wireless connectivity, designed for.
Modulation and Data Transfer February 21, References gy-Article.asp?ArtNum=2
3-2008UP-Copyrights reserved1 ITGD4103 Data Communications and Networks Lecture-11:Data encoding techniques week 12- q-2/ 2008 Dr. Anwar Mousa University.
Physical-layer Identification of UHF RFID Tags Authors: Davide Zanetti, Boris Danev and Srdjan Capkun Presented by Zhitao Yang 1.
Vertical Optimization Of Data Transmission For Mobile Wireless Terminals MICHAEL METHFESSEL, KAI F. DOMBROWSKI, PETER LANGENDORFER, HORST FRANKENFELDT,
RFID (Radio Frequency Identification) T.F.G.P.POLYTECHNICH - ADIPUR (KUTCH) HITESH C.PATEL SHAHGULAM KHWAJAJI.
Radio Frequency Identification
Day 4 Encoding Data. So… We have analog and digital data, and analog and digital signals. –We can use any combination of the above –Why? Shouldn’t we.
Network and Systems Laboratory nslab.ee.ntu.edu.tw Branislav Kusy, Christian Richter, Wen Hu, Mikhail Afanasyev, Raja Jurdak, Michael Brunig, David Abbott,
Technician License Course Chapter 2 Lesson Plan Module 3 – Modulation and Bandwidth.
Computer Science Department of University of Virginia  Voltage on a tag Radio Frequency Identification Systems New Ideas and Algorithms Introduction to.
Link Layer Support for Unified Radio Power Management in Wireless Sensor Networks IPSN 2007 Kevin Klues, Guoliang Xing and Chenyang Lu Database Lab.
IDENTITY NUMBERS BY A.M.VILLAVAN M.TECH(COS). RFID Acronymn: Radio Frequency Identification Device RFID is a technology, whose origins are found in the.
Wireless Cache Invalidation Schemes with Link Adaptation and Downlink Traffic Presented by Ying Jin.
CRMA: Collision Resistant Multiple Access Lili Qiu University of Texas at Austin Joint work with Tianji Li, Mi Kyung Han, Apurv Bhartia, Eric Rozner, Yin.
Strategic Innovation Management Prof. Marc Gruber January 27, 2011.
Doc.: IEEE Submission May 2008 Mike McInnis (The Boeing Company)Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
May 2008 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Potential FCC Part Waiver and Opportunity.
Radio Frequency Identification (RFID)
Wireless LANs Wireless proliferating rapidly.
Interference on the RFID Interrogation Range
Bluetooth, RFID, Data Link Layer Switching
Chapter 10 – Integrating RFID Readers in Enterprise IT
RADIO FREQUENCY IDENTIFICATION
Abstract Radio-frequency identification (RFID) is an emerging technology, which promises to advance the modern industrial practices in object identification.
IOT Technologies: Radio Frequency Identification (RFID)
Presentation transcript:

An Empirical Study of UHF RFID Performance Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof. Bob Kinicki

Overview Introduction Background Knowledge Methodology and Tools Experiment & Result Enhancement Conclusion 2

Overview Introduction Background Knowledge Methodology and Tools Experiment & Result Enhancement Conclusion 3

Terms Ultra-High Frequency (UHF) – UHF designates the International Telecommunication Union (ITU) radio frequency range of electromagnetic waves between 300 MHz and 3 GHz. Radio-Frequency IDentification (RFID) Electronic Product Code (EPC) – EPCglobal UHF Class 1 Generation 2 in this paper – EPCglobal (a joint venture between GS1 and GS1 US) 4

Characteristics Passive Radio Frequency Identification – small, inexpensive computer chip – remotely powered – interrogated for identifiers and other information 5

Comparison EPC Gen2 standard – defines readers and passive tags that operate at UHF frequencies – use “backscatter” communication to support read ranges measured in meters – high capability of data storage Early HF tags – based on inductive coupling that only provide read ranges of centimeters – active tags that require batteries to increase range 6

* Privacy 7 Richard Stallman at WSIS 2005 presenting his RFID badge wrapped with aluminum foil as a way of protesting RFID privacy issues. Logo of the anti-RFID campaign by German privacy group FoeBuD.

Overview Introduction Background Knowledge Methodology and Tools Experiment & Result Enhancement Conclusion 8

Backscatter 1.A reader transmits information to a tag by modulating an RF signal 2.The tag receives both down-link information and the entirety of its operating energy from this RF signal. 3.The reader transmits a continuous RF wave (CW) which assures that the tag remains powered 4.The tag then transmits its response by modulating the reflection coefficient of its antenna. 5.The reader is able to decode the tag response by detecting the variation in the reflected CW, 9

UHF EPC Physical Layer – RFID tags communicate by “backscattering” signals that are concurrent with reader transmissions, and use a variety of frequencies and encodings under the control of the reader. MAC Layer – Readers and tags use a variation on slotted Aloha to solve the multi-access problem in a setting where readers can hear tags but tags cannot hear each other. 10

Physical Layer Down-link – Amplitude Shift Keying (ASK) bits are indicated by brief periods of low amplitude – Pulse Interval Encoding (PIE) the time between low amplitude periods differentiates a zero or a one the reader can choose pulse durations 26.7 kbps to 128 kbps. Up-link – partially determined by down-link preamble a bit field set in the Query command – frequency (40 to 640 kHz) & encoding FM0 Miller-2 Miller-4 Miller-8 11

MAC Layer Based on Framed Slotted Aloha – each frame has a number of slots – each tag will reply in one randomly selected slot per frame – the number of slots in the frame is determined by the reader and can be varied on a per frame basis 12

Query Round & Circle Query Round – an individual frame Query Cycle – the series of Query Rounds between power down periods 13

Query Round: sequence 1.At the beginning, the reader can optionally transmit a Select command – limits the number of active tags by providing a bit mask – only tags with ID’s (or memory locations) that match this mask will respond in the subsequent round 2. A Query command is transmitted which contains the fields: – determine the up-link frequency and data encoding, the Q parameter (determines the number of slots in the Query Round), and a Target parameter. 3.A tag receives a Query command, it chooses a random number in the range (0, 2 Q - 1), where 0≤Q≤15, and the value is stored in the slot counter of the tag. The tag changes its Inventoried flag. 14

Query Round: sequence (cont.) 4.If a tag stores a 0 in its slot counter, it will transmit a 16 bit random number (RN16) immediately. 5.The reader will echo the RN16 in an ACK packet after receiving it. 6.If the tag successful receives the ACK with the correct random number, the tag will backscatter its ID. 15

Query Round: sequence (cont.) 7.The reader will send a QueryRepeat command to cause the tag to toggle its Inventoried flag. – If the ID was not successfully received by the reader, a NAK command is sent which resets the tag so that a subsequent QueryRepeat will not result in Inventoried flag being changed. – A QueryRepeat signals the end of the slot. 8.On receiving the command, the remaining tags will: – decrement their slot counter – respond with a RN16 if their slot counter is set to 0. – The process then repeats, with the number of QueryRepeats being equal to the number of slots set using the Q parameter. 16

C1G2 Protocol 17

Overview Introduction Background Knowledge Methodology and Tools Experiment & Result Enhancement Conclusion 18

Tools Hardware Readers – Alien Technologies ALR-9800 – ThingMagic Mercury5e Development kit Tags – Alien “Omni- Squiggle” tags Software – Universal Software Radio Peripheral (USRP) platform – GNURadio 19

Assessment How well do commercial readers perform? What protocol factors degrade reader performance? What causes tags to be missed during a read? What can be done to improve performance? 20

Overview Introduction Background Knowledge Methodology and Tools Experiment & Result Enhancement Conclusion 21

Experiment Settings A standard office setting with cubicles of 42 inch height – Experiment 1: 30’ x 22’ x 10’ – Experiment 2: 40’ x 24’ x 13’ 16 tags were adhered to a sheet of poster board in a 4 x 4 grid, with tags spaced approximately 6 inches apart. 22

Overall Performance Read Rate - Distance 23

Overall Performance Average Cycle Time – Number of Tags 24

Overall Performance Read Rate - Coding Scheme 25 *1 : Experiment 1*2 : Experiment 2

Cycle Duration 26

Error Rates 27

Effects of Errors 28

Effects of Errors (cont.) 29

Number of Cycles 30 the average number of cycles needed to read all tags in the set

Hit Rate of DR Mode for Each Tag 31

Effects of Frequency Selective Fading 32 ThingMagic reader in the same location and setup as Experiment1. 15 minute experiment, in which each tag responds on all 50 channels at least once

Effects of Frequency Selective Fading (conts.) 33

Effects of Frequency Selective Fading (conts.) 34

Summary Size of the tag set – affects performance, largely because larger tag sets are more efficient with respect to inter-cycle overhead. Up-link encoding – Slower but more robust up-link encodings are more effective at greater distances, as the overhead is quickly outweighed by reduced error rates. Multipath environment – Different multipath environments result in different error rates as distance increases, and these effects are location specific. Errors – increase both the variance and overall duration of cycles by increasing the number of ACKs and the number of slots. – also result in missed tags when a reader “gives up” during a cycle. 35

Summary (cont.) ACKs as well as Query and QueryRepeat commands – account for a significant amount of overall time – the ACKs because they are long and Query* because they are numerous. Lower down-link rate – result in fewer cycles needed to read the complete tag set, likely because more tags are able to power up. Frequency selective fading – is a dominant factor in missed reads, particularly at greater distances. 36

Overview Introduction Background Knowledge Methodology and Tools Experiment & Result Enhancement Conclusion 37

Physical Layer Reducing Slot Times – As the Q algorithm results in many empty slots, having the reader truncate the listen time for empty slots would reduce overall cycle times. Reducing Missed Tags Due to Fading – The variation in frequency response can be smoothed by channel hopping at a more rapid rate. 38

Reducing Slot Times 39

Reducing Missed Tags Due to Fading 40

Physical / MAC Layer Coordination Reducing ACKs – retrying ACKs even once is likely to have very little benefit when using these modes at larger distances – a more appropriate response would be to not waste time on retries, but instead change the physical layer parameters used in the next round Hybrid Reader Modes – combining the positive attributes of HS and DR mode has the potential to increase performance significantly 41

Reducing ACKs 42

Hybrid Reader Modes 43

Overview Introduction Background Knowledge Methodology and Tools Experiment & Result Enhancement Conclusion 44

Conclusion First detailed, low-level measurement study of EPC C1G2 UHF reader technology in a real world setting. RFID physical and MAC layers should be considered in conjunction rather than separately as is done at present. Found physical layer effects are significant factors that degrade the overal(l) performance of commercial readers. Suggests that better physical layer implementation choices can improve performance while remaining standards compliant. – reducing the listen time for empty slots – increasing the rate of frequency hopping 45

Thanks Q & A 46