207 research outputs found
Perfect tag identification protocol in RFID networks
Radio Frequency IDentification (RFID) systems are becoming more and more
popular in the field of ubiquitous computing, in particular for objects
identification. An RFID system is composed by one or more readers and a number
of tags. One of the main issues in an RFID network is the fast and reliable
identification of all tags in the reader range. The reader issues some queries,
and tags properly answer. Then, the reader must identify the tags from such
answers. This is crucial for most applications. Since the transmission medium
is shared, the typical problem to be faced is a MAC-like one, i.e. to avoid or
limit the number of tags transmission collisions. We propose a protocol which,
under some assumptions about transmission techniques, always achieves a 100%
perfomance. It is based on a proper recursive splitting of the concurrent tags
sets, until all tags have been identified. The other approaches present in
literature have performances of about 42% in the average at most. The
counterpart is a more sophisticated hardware to be deployed in the manufacture
of low cost tags.Comment: 12 pages, 1 figur
Exploiting Capture Effect in Frameless ALOHA for Massive Wireless Random Access
The analogies between successive interference cancellation (SIC) in slotted
ALOHA framework and iterative belief-propagation erasure-decoding, established
recently, enabled the application of the erasure-coding theory and tools to
design random access schemes. This approach leads to throughput substantially
higher than the one offered by the traditional slotted ALOHA. In the simplest
setting, SIC progresses when a successful decoding occurs for a single user
transmission. In this paper we consider a more general setting of a channel
with capture and explore how such physical model affects the design of the
coded random access protocol. Specifically, we assess the impact of capture
effect in Rayleigh fading scenario on the design of SIC-enabled slotted ALOHA
schemes. We provide analytical treatment of frameless ALOHA, which is a special
case of SIC-enabled ALOHA scheme. We demonstrate both through analytical and
simulation results that the capture effect can be very beneficial in terms of
achieved throughput.Comment: Accepted for presentation at IEEE WCNC'14 Track 2 (MAC and
Cross-Layer Design
Recommended from our members
Approaching Fair Collision-Free Channel Access with Slotted ALOHA Using Collaborative Policy-Based Reinforcement Learning
ALOHA Random Access that Operates as a Rateless Code
Various applications of wireless Machine-to-Machine (M2M) communications have
rekindled the research interest in random access protocols, suitable to support
a large number of connected devices. Slotted ALOHA and its derivatives
represent a simple solution for distributed random access in wireless networks.
Recently, a framed version of slotted ALOHA gained renewed interest due to the
incorporation of successive interference cancellation (SIC) in the scheme,
which resulted in substantially higher throughputs. Based on similar principles
and inspired by the rateless coding paradigm, a frameless approach for
distributed random access in slotted ALOHA framework is described in this
paper. The proposed approach shares an operational analogy with rateless
coding, expressed both through the user access strategy and the adaptive length
of the contention period, with the objective to end the contention when the
instantaneous throughput is maximized. The paper presents the related analysis,
providing heuristic criteria for terminating the contention period and showing
that very high throughputs can be achieved, even for a low number for
contending users. The demonstrated results potentially have more direct
practical implications compared to the approaches for coded random access that
lead to high throughputs only asymptotically.Comment: Revised version submitted to IEEE Transactions on Communication
Performance evaluation of non-persistent CSMA as anti-collision protocol for active RFID tags.
In this paper we propose the use of non-persistent CSMA as an anti-collision procedure for RFID active tags. Current proposals for both passive and active tags are based on the framed slotted ALOHA protocol, which does not scale well requiring additional procedures for frame length adaptation. However, active RFID devices already include carrier sense capabilities with no additional cost and, thus, CSMA may be employed seamlessly. Nevertheless, selecting the contention
micro-slots of CSMA in the classical way (i.e., with a uniform distribution and an
exponential back-off algorithm) does not result in an efficient identification process, as we will demonstrate. Fortunately, better choices can be found. Recently, an optimal distribution for the selection of micro-slots for event-driven sensor networks has been computed, as well as a practical implementation: the Sift distribution. In this work we propose the application of the quasi-optimal Sift distribution along with
CSMA for active tag identification. By means of an analytical study, we evaluate
the average time needed for identification with this mechanism and compare it with
the current ISO 18000-7 and EPC “Gen 2” standard. The results reveal that the
Sift-based non-persistent CSMA outperforms both of them. Moreover, it also scales
much better, without the need for further adaptation mechanismsThis work has been funded by the Spanish Ministerio de EducaciĂłn y Ciencia
with the projects DEP2006-56158-C03-03/EQUI and m:ciudad (FIT-330503-
2006-2, partially funded by ERDF) and by the Spanish Research Council with the ARPaq project (TEC2004-05622-C04-02/TCM)
On Throughput Maximization of Grant-Free Access with Reliability-Latency Constraints
Enabling autonomous driving and industrial automation with wireless networks
poses many challenges, which are typically abstracted through reliability and
latency requirements. One of the main contributors to latency in cellular
networks is the reservation-based access, which involves lengthy and
resource-inefficient signaling exchanges. An alternative is to use grant-free
access, in which there is no resource reservation. A handful of recent works
investigated how to fulfill reliability and latency requirements with different
flavors of grant-free solutions. However, the resource efficiency, i.e., the
throughput, has been only the secondary focus. In this work, we formulate the
throughput of grant-free access under reliability-latency constraints, when the
actual number of arrived users or only the arrival distribution are known. We
investigate how these different levels of knowledge about the arrival process
influence throughput performance of framed slotted ALOHA with -multipacket
reception, for the Poisson and Beta arrivals. We show that the throughput under
reliability-latency requirements can be significantly improved for the higher
expected load of the access network, if the actual number of arrived users is
known. This insight motivates the use of techniques for the estimation of the
number of arrived users, as this knowledge is not readily available in
grant-free access. We also asses the impact of estimation error, showing that
for high reliability-latency requirements the gains in throughput are still
considerable.Comment: Accepted for publication in ICC'201
Stability Analysis of Frame Slotted Aloha Protocol
Frame Slotted Aloha (FSA) protocol has been widely applied in Radio Frequency
Identification (RFID) systems as the de facto standard in tag identification.
However, very limited work has been done on the stability of FSA despite its
fundamental importance both on the theoretical characterisation of FSA
performance and its effective operation in practical systems. In order to
bridge this gap, we devote this paper to investigating the stability properties
of FSA by focusing on two physical layer models of practical importance, the
models with single packet reception and multipacket reception capabilities.
Technically, we model the FSA system backlog as a Markov chain with its states
being backlog size at the beginning of each frame. The objective is to analyze
the ergodicity of the Markov chain and demonstrate its properties in different
regions, particularly the instability region. By employing drift analysis, we
obtain the closed-form conditions for the stability of FSA and show that the
stability region is maximised when the frame length equals the backlog size in
the single packet reception model and when the ratio of the backlog size to
frame length equals in order of magnitude the maximum multipacket reception
capacity in the multipacket reception model. Furthermore, to characterise
system behavior in the instability region, we mathematically demonstrate the
existence of transience of the backlog Markov chain.Comment: 14 pages, submitted to IEEE Transaction on Information Theor
Tag anti-collision algorithms in RFID systems - a new trend
RFID is a wireless communication technology that provides automatic identification or tracking and data collection from any tagged object. Due to the shared communication channel between the reader and the tags during the identification process in RFID systems, many tags may communicate with the reader at the same time, which causes collisions. The problem of tag collision has to be addressed to have fast multiple tag identification process. There are two main approaches to the tag collision problem: ALOHA based algorithms and tree based algorithms. Although these methods reduce the collision and solve the problem to some extent, they are not fast and efficient enough in real applications. A new trend emerged recently which takes the advantages of both ALOHA and tree based approaches. This paper describes the process and performance of the tag anti-collision algorithms of the tree-ALOHA trend
- …