1,710 research outputs found

    Goodbye, ALOHA!

    Get PDF
    ©2016 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.The vision of the Internet of Things (IoT) to interconnect and Internet-connect everyday people, objects, and machines poses new challenges in the design of wireless communication networks. The design of medium access control (MAC) protocols has been traditionally an intense area of research due to their high impact on the overall performance of wireless communications. The majority of research activities in this field deal with different variations of protocols somehow based on ALOHA, either with or without listen before talk, i.e., carrier sensing multiple access. These protocols operate well under low traffic loads and low number of simultaneous devices. However, they suffer from congestion as the traffic load and the number of devices increase. For this reason, unless revisited, the MAC layer can become a bottleneck for the success of the IoT. In this paper, we provide an overview of the existing MAC solutions for the IoT, describing current limitations and envisioned challenges for the near future. Motivated by those, we identify a family of simple algorithms based on distributed queueing (DQ), which can operate for an infinite number of devices generating any traffic load and pattern. A description of the DQ mechanism is provided and most relevant existing studies of DQ applied in different scenarios are described in this paper. In addition, we provide a novel performance evaluation of DQ when applied for the IoT. Finally, a description of the very first demo of DQ for its use in the IoT is also included in this paper.Peer ReviewedPostprint (author's final draft

    LPDQ: a self-scheduled TDMA MAC protocol for one-hop dynamic lowpower wireless networks

    Get PDF
    Current Medium Access Control (MAC) protocols for data collection scenarios with a large number of nodes that generate bursty traffic are based on Low-Power Listening (LPL) for network synchronization and Frame Slotted ALOHA (FSA) as the channel access mechanism. However, FSA has an efficiency bounded to 36.8% due to contention effects, which reduces packet throughput and increases energy consumption. In this paper, we target such scenarios by presenting Low-Power Distributed Queuing (LPDQ), a highly efficient and low-power MAC protocol. LPDQ is able to self-schedule data transmissions, acting as a FSA MAC under light traffic and seamlessly converging to a Time Division Multiple Access (TDMA) MAC under congestion. The paper presents the design principles and the implementation details of LPDQ using low-power commercial radio transceivers. Experiments demonstrate an efficiency close to 99% that is independent of the number of nodes and is fair in terms of resource allocation.Peer ReviewedPostprint (author’s final draft

    Optimization of Mobile RFID Platforms: A Cross-Layer Approach.

    Get PDF

    Energy Efficient Protocols for Active RFID

    Get PDF
    Radio frequency identification (RFID) systems come in different flavours; passive, active, semi-passive, or semi-active. Those different types of RFID are supported by different, internationally accepted protocol standards as well as by several accepted proprietary protocols. Even though the diversity is large between the flavours and between the standards, the RFID technology has evolved to be a mature technology, which is ready to be used in a large variety of applications. This thesis explores active RFID technology and how to develop and apply data communication protocols that are energy efficient and which comply with the different application constraints. The use of RFID technology is growing rapidly, and today mostly “passive” RFID systems are used because no onboard energy source is needed on the transponder (tag). However, the use of “active” RFID-tags with onboard power sources adds a range of opportunities not possible with passive tags. Besides that Active RFID offers increased working distance between the interrogator (RFID-reader) and tags, the onboard power source also enables the tags to do sensor measurements, calculations and storage even when no RFID-reader is in the vicinity of the tags. To obtain energy efficiency in an Active RFID system the communication protocol to be used should be carefully designed. This thesis describes how energy consumption can be calculated, to be used in protocol definition, and how evaluation of protocols in this respect can be made. The performance of such a new protocol, in terms of energy efficiency, aggregated throughput, delay, and number of collisions in the radio channel is evaluated and compared to an existing, commercially available protocol for Active RFID, as well as to the IEEE standard 802.15.4 (used, e.g., in the Zigbee medium-access layer). Simulations show that, by acknowledging the payload and using deep sleep mode on the tag, the lifetime of a tag is increased. For all types of protocols using a radio channel, when arbitrating information, it is obvious that the utilization of that channel is maximized when no collisions occur. To avoid and minimize collisions in the media it is possible to intercept channel interference by using carrier sense technology. The knowledge that the channel is occupied should result in a back-off and a later retry, instead of persistently listening to the channel which would require constant energy consumption. We study the effect on tag energy cost and packet delay incurred by some typical back-off algorithms (constant, linear, and exponential) used in a contention based CSMA/CA (Carrier Sense Multiple Access/ Collision Avoidance) protocol for Active RFID communication. The study shows that, by selecting the proper back-off algorithm coefficients (based on the number of tags and the application constraints), i.e., the initial contention window size and back-off interval coefficient, the tag energy consumption and read-out delays can be significantly lowered. The initial communication between reader and tag, on a control channel, establishes those important protocol parameters in the tag so that it tries to deliver its information according to the current application scenario in an energy efficient way. The decision making involved in calculating the protocol parameters is conducted in the local RFID-reader for highest efficiency. This can be done by using local statistics or based on knowledge provided by the logistic backbone databases. As the CMOS circuit technology evolves, new possibilities arise for mass production of low price and long life active tags. The use of wake-up radio technology makes it possible for active tags to react on an RFID-reader at any time, in contrast to tags with cyclic wake-up behaviour. The two main drawbacks with an additional wake-up circuit in a tag are the added die area and the added energy consumption. Within this project the solution is a complete wake-up radio transceiver consisting of only one hi-frequency very low power, and small area oscillator. To support this tag topology we propose and investigate a novel reader-tag communication protocol, the frequency binary tree protocol

    Enhanced QoS for real-time multimedia delivery over the wireless link using RFID technology.

    Get PDF
    This thesis presents a Sensor Guided Wireless Adaptation Scheme (SGWAS) that works in a micromobility domain. SGWAS infers the reason of high packet loss in a realtime multimedia flow received by a mobile node in a wireless cell. Determining the reason of packet loss relies on information obtained from wireless sensors, specifically RFID devices scattered in the cell, to detect the location of the mobile node. If packet loss is due to wireless link congestion, then local rate adaptation is applied in the cell. However, if it is due to handoff or signal propagation effects, e.g. obstruction or attenuation, then rate adaptation is not performed. The source adapts its transmission rate if congestion occurs in the wired network. SGWAS helps improve the quality of service and avoids unnecessary rate adaptation. Simulation results demonstrate that SGWAS identifies the reason of high packet loss and performs rate adaptation only when needed.Dept. of Computer Science. Paper copy at Leddy Library: Theses & Major Papers - Basement, West Bldg. / Call Number: Thesis2006 .E58. Source: Masters Abstracts International, Volume: 45-01, page: 0352. Thesis (M.Sc.)--University of Windsor (Canada), 2006

    Adaptive Power Control Protocol with Hardware Implementation for Wireless Sensor and RFID Reader Networks

    Get PDF
    The development and deployment of radio frequency identification (RFID) systems render a novel distributed sensor network which enhances visibility into manufacturing processes. In RFID systems, the detection range and read rates will suffer from interference among high-power reading devices. This problem grows severely and degrades system performance in dense RFID networks. Consequently, medium access protocols (MAC) protocols are needed for such networks to assess and provide access to the channel so that tags can be read accurately. In this paper, we investigate a suite of feasible power control schemes to ensure overall coverage area of the system while maintaining a desired read rate. The power control scheme and MAC protocol dynamically adjust the RFID reader power output in response to the interference level seen during tag reading and acceptable signal-to-noise ratio (SNR). We present novel distributed adaptive power control (DAPC) as a possible solution. A suitable back off scheme is also added with DAPC to improve coverage. A generic UHF wireless testbed is built using UMR/SLU GEN4-SSN for implementing the protocol. Both the methodology and hardware implementation of the schemes are presented, compared, and discussed. The results of hardware implementation illustrate that the protocol performs satisfactorily as expected

    Decentralized Power Control with Implementation for RFID Networks

    Get PDF
    In radio frequency identification (RFID) systems, the detection range and read rates will suffer from interference among high power reading devices. This problem grows severely and degrades system performance in dense RFID networks. In this paper, we investigate a suite of feasible power control schemes to ensure overall coverage area of the system while maintaining a desired read rate. The power control scheme and MAC protocol dynamically adjusts the RFID reader power output in response to the interference level seen locally during tag reading for an acceptable signal-to-noise ratio (SNR). We present novel distributed adaptive power control (DAPC) and probabilistic power control (PPC) as two possible solutions. A generic UHF wireless testbed is built using UMR/SLU GEN4-SSN for implementng the protocol. Simulation and hardware results are included

    Adaptive and Probabilistic Power Control Algorithms for RFID Reader Networks

    Get PDF
    In radio frequency identification (RFID) systems, the detection range and read rates will suffer from interference among high power reading devices. This problem grows severely and degrades system performance in dense RFID networks. Consequently, medium access protocols (MAC) protocols are needed for such networks to assess and provide access to the channel so that tags can be read accurately. In this paper, we investigate a suite of feasible power control schemes to ensure overall coverage area of the system while maintaining a desired read rate. The power control scheme and MAC protocol dynamically adjusts the RFID reader power output in response to the interference level seen during tag reading and acceptable signal-to-noise ratio (SNR). We present novel distributed adaptive power control (DAPC) and probabilistic power control (PPC) as two possible solutions. A suitable back off scheme is also added with DAPC to improve coverage. Both the methodology and implementation of the schemes are presented, simulated, compared, and discussed for further work
    • …
    corecore