Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf ·...
Transcript of Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf ·...
![Page 1: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/1.jpg)
Reliable and Efficient RFID Networks
Jue Wang
with Haitham Hassanieh, Dina Katabi, Piotr Indyk
![Page 2: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/2.jpg)
Machine‐Generated Data
RFID will be a major source of such traffic
• “number of RFID tags sold globally is projected to rise from 12 million in 2011 to 209 billion in 2021.”
–McKinsey Big Data Report 2011
• In Oil & Gas – about 30% annual growth rate
• In Healthcare – $1.3B revenue annually
![Page 3: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/3.jpg)
• Wireless protocols require power and computation
• RFIDs are very wimpy • No power source• Ultra‐low cost not much circuitry
Are Our Wireless Protocols Ready?
RFIDs can’t perform typical functions like carrier sense or rate adaptation
![Page 4: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/4.jpg)
RFIDs are Inefficient and Unreliable[P05, JZF06, RZH07, BW08, BVG09, GZG12]
The traditional approach to deal with wimpy technologies is to dial down functionality‐ e.g., client can’t adapt bit rate fixed rate
How Do we Deal with RFID Wimpy Nodes?
![Page 5: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/5.jpg)
Network As a Node: Build sophisticated protocols by making many wimpy RFIDs emulate one powerful node
Our Approach
Do not give up on functions that make communication reliable and efficient‐ e.g., if one RFID can’t adapt rate, maybe collectively can perform rate adaptation
![Page 6: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/6.jpg)
Rest of the Talk
• Understanding RFID communication
• Network As a Node
• Empirical evaluation
![Page 7: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/7.jpg)
Backscatter Communication
![Page 8: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/8.jpg)
Reader shines an RF signal on nearby RFIDs
Tag reflects the reader’s signal using ON‐OFF keying
Backscatter Communication
![Page 9: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/9.jpg)
Backscatter Communication
RFIDs are synced by the reader's signal
![Page 10: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/10.jpg)
Challenges of Backscatter
RFIDs cannot hear each other Collisions
Cannot adapt modulation to channel quality Don’t exploit a good channel to send
more bits per symbol Don’t react to a bad channel
![Page 11: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/11.jpg)
Rest of the Talk
• Understanding RFID communication
• Network As a Node
• Empirical evaluation
![Page 12: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/12.jpg)
Network As a Node
Wireless Medium
ID = 1 ID = 2 ID = 4ID = 3 ID = 5 ID = NID = 6 ...
Virtual Sender
Collisions
Collision becomes a code across the virtual sender’s bits • Deals with collision by decoding collision‐code• Adapts the rate by making collision‐code rateless
![Page 13: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/13.jpg)
Network‐As‐a‐Node
Node Identification
Data Communication
![Page 14: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/14.jpg)
The Node Identification Problem
Challenge: RFIDs cannot hear each other Collisions
Applications
• Inventory management
• Shopping cart
Each object has an IDReader learns IDs of nearby objects
![Page 15: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/15.jpg)
Current Approach: Slotted Aloha
Collision
Node1 Node2
Few Time Slots OR Many Time Slots
ID 1 ID 2
Unreliable Inefficient
Node1 Node2
Time is divided into slots;Each RFID transmits in a random slot
![Page 16: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/16.jpg)
How can network‐as‐a‐node help?
![Page 17: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/17.jpg)
A million RFIDs in the Wal‐Mart store
ID = 1 ID = 2 ID = 4ID = 3 ID = 5 ID = N...ID = 6
![Page 18: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/18.jpg)
But only a few (e.g., 20) in the shopping cart
ID = 1 ...ID = 2 ID = 4ID = 3 ID = 5 ID = NID = 6
![Page 19: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/19.jpg)
ID = 1 ...ID = 2 ID = 4ID = 3 ID = 5 ID = NID = 6
0 1 0 0 1 0 … 0
System is represented by a vector if node with ID = is in cart
![Page 20: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/20.jpg)
0 1 0 0 1 0 … 0
vector
Ideally, want to compress and send it to the reader
But is distributed across all nodes!
![Page 21: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/21.jpg)
0 1 0 0 1 0 … 0
is Sparse
Want the network to emulate acompressive sensing sender
vector
![Page 22: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/22.jpg)
• Virtual sender sends • Reader decodes using a
compressive sensing decoder
A Virtual Compressive Sensing SenderCompressive sensing matrix
![Page 23: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/23.jpg)
• Virtual sender sends • Reader decodes using a
compressive sensing decoder
A Virtual Compressive Sensing SenderCompressive sensing matrix
How to implement this virtual sender using a network of RFIDs?
![Page 24: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/24.jpg)
Network can mix information using Collisions
Virtual sender mixes information in
![Page 25: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/25.jpg)
Network Compressive Sensing Using Collisions
Node with ID = transmits Collisions mix on the air
![Page 26: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/26.jpg)
Example: Cart has only ID 2 and ID 30
TX/RX
Reader
ID = 2
ID = 30
![Page 27: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/27.jpg)
The reader receives a collision:
![Page 28: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/28.jpg)
The reader receives a collision:
Reader uses a compressive sensing decoder to recover from
Network‐based compressive sensing solves node identification
![Page 29: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/29.jpg)
Network‐As‐a‐Node
Node Identification
Data Communication
![Page 30: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/30.jpg)
Data communication in RFID networks performs poorly because it lacks rate adaptation
RFIDs always send 1 bit/symbol
Can’t exploit good channels to send more bits Inefficiency
Can’t reduce rate in bad channels Unreliability
![Page 31: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/31.jpg)
Can network‐as‐a‐node help?
![Page 32: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/32.jpg)
• Nodes transmit messages and collide
• Reader collects collisions until it can decode • good channel decode from few collisions• worse channel decode from more collisions
Adapts bit rate to channel quality without feedback
Network‐Based Rate Adaptation
![Page 33: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/33.jpg)
Collisions as a Distributed Code
b1
b2
b3
⁞
bK
y1 y1 = h1 b1 + h2 b2 + … + hK bK
Collisions naturally act like a linear code
![Page 34: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/34.jpg)
b1
b2
b3
⁞
bK
y1
y2
y3
y1 = h1 b1 + h2 b2 + … + hK bK
⁞
y2 = h1 b1 + h2 b2 + … + hK bK
y3 = h1 b1 + h2 b2 + … + hK bK
But simply colliding is not a good code
Repetition Code Bad Code!
![Page 35: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/35.jpg)
A good code for RFIDs
Different linear equations Sparse Easy to decode
(e.g., LDPC)
![Page 36: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/36.jpg)
Collisions as Sparse Random Code
b1
b2
b3
⁞
bK
y1
y2
y3
y1 = h2 b2 + hK bK
⁞
y2 = h1 b1
y3 = h2 b2 + h3 b3 + hK bK
Each node has a different pseudo random sequenceNode transmits in a collision if bit in sequence is “1”
![Page 37: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/37.jpg)
How Does the Reader Decode?
Sparse Code Leverage ideas from LDPC
Belief Propagation enables the reader to decode quickly
b1
b2
b3
⁞
bK
y1
y2
y3
⁞Treat network of RFIDs as a single virtual node
Rate adaptation via rateless collision‐code
![Page 38: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/38.jpg)
Rest of the Talk
• Understanding RFID communication
• Network as a node
• Empirical evaluation
![Page 39: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/39.jpg)
Evaluation
• Reader implementation on GNURadio USRP
• 16 UMass Moo programmable RFIDs
![Page 40: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/40.jpg)
Evaluate Data Communication
Compared schemes1. Network‐based Rate Adaptation2. TDMA3. CDMA
![Page 41: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/41.jpg)
ReliabilityMessage Loss R
ate
TDMA27%
12%
0%0%
10%
20%
30%
40%
50%
1 2 3Medium SNR(5dB 9dB)
High SNR(10dB 20dB)
Low SNR(0dB 4dB)
![Page 42: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/42.jpg)
ReliabilityMessage Loss R
ate
TDMA
CDMA42%
16%
0%
27%
12%
0%0%
10%
20%
30%
40%
50%
1 2 3Medium SNR(5dB 9dB)
High SNR(10dB 20dB)
Low SNR(0dB 4dB)
![Page 43: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/43.jpg)
ReliabilityMessage Loss R
ate
TDMA
CDMA
Our Design
42%
16%
0%
27%
12%
0%0% 0% 0%0%
10%
20%
30%
40%
50%
1 2 3Medium SNR(5dB 9dB)
High SNR(10dB 20dB)
Low SNR(0dB 4dB)
![Page 44: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/44.jpg)
ReliabilityMessage Loss R
ate
TDMA
CDMA
Our Design
0.57 bits/symbol
1.7bits/symbol
3.2bits/symbol
0%
10%
20%
30%
40%
50%
1 2 3Medium SNR(5dB 9dB)
High SNR(10dB 20dB)
Low SNR(0dB 4dB)
![Page 45: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/45.jpg)
ReliabilityMessage Loss R
ate
TDMA
CDMA
Our Design
0.57 bits/symbol
1.7bits/symbol
3.2bits/symbol
0%
10%
20%
30%
40%
50%
1 2 3Medium SNR(5dB 9dB)
High SNR(10dB 20dB)
Low SNR(0dB 4dB)
Network as a node adapts bit rate to eliminate message loss
![Page 46: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/46.jpg)
Node Identification
Compared Schemes‐ Network‐based Compressive Sensing‐ Framed Slotted Aloha (standard)
![Page 47: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/47.jpg)
0
500
1000
1500
2000
4 8 12 16
Node Identification
Number of Tags
Our Design
Slotted Aloha
Num
ber o
f Sym
bols to
Identify Nod
es
5.5× reduction in symbols needed for identification
![Page 48: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/48.jpg)
0
500
1000
1500
2000
4 8 12 16
Node Identification
Number of Tags
Our Design
Slotted Aloha
Num
ber o
f Sym
bols to
Identify Nod
es
Network compressive sensing improves efficiency of node identification by 5.5×
5.5× reduction in symbols needed for identification
![Page 49: Reliable and Efficient RFID Networkssynrg.csl.illinois.edu/ppts/Buzz_Sigcomm_Slides.pdf · Machine‐Generated Data RFID will be a major source of such traffic • “number of RFID](https://reader034.fdocuments.net/reader034/viewer/2022042323/5f0e0fcf7e708231d43d6d62/html5/thumbnails/49.jpg)
Conclusion
• Network as a node enables wimpy RFIDs to implement sophisticated protocols
• Efficient node identification via compressive sensing
• Network‐based rate adaptation using collisions as a rateless code
• Empirical results show significant gains in efficiency and reliability