391 research outputs found

    Pseudo-random Aloha for Enhanced Collision-recovery in RFID

    Full text link
    In this letter we motivate the need to revisit the MAC protocol used in Gen2 RFID system in order to leverage receiver structures with Collision Recovery capabilities at the PHY layer. To this end we propose to consider a simple variant of the Framed Slotted Aloha with pseudo-random (deterministic) slot selection as opposite to the classical random selection. Pseudo-random access allows naturally to implement Inter-frame Successive Interference Cancellation (ISIC) without changing the PHY modulation and coding format of legacy RFID standard. By means of simulations we show that ISIC can bring 20-25% gain in throughput with respect to traditional intra-frame SIC. Besides that, we elaborate on the potential of leveraging pseudo-random access protocols in combination with advanced PHY techniques in the context of RFID applications.Comment: This manuscript has been submitted to IEEE on the 19th September 201

    Perfect tag identification protocol in RFID networks

    Full text link
    Radio Frequency IDentification (RFID) systems are becoming more and more popular in the field of ubiquitous computing, in particular for objects identification. An RFID system is composed by one or more readers and a number of tags. One of the main issues in an RFID network is the fast and reliable identification of all tags in the reader range. The reader issues some queries, and tags properly answer. Then, the reader must identify the tags from such answers. This is crucial for most applications. Since the transmission medium is shared, the typical problem to be faced is a MAC-like one, i.e. to avoid or limit the number of tags transmission collisions. We propose a protocol which, under some assumptions about transmission techniques, always achieves a 100% perfomance. It is based on a proper recursive splitting of the concurrent tags sets, until all tags have been identified. The other approaches present in literature have performances of about 42% in the average at most. The counterpart is a more sophisticated hardware to be deployed in the manufacture of low cost tags.Comment: 12 pages, 1 figur

    Exploiting Capture Effect in Frameless ALOHA for Massive Wireless Random Access

    Full text link
    The analogies between successive interference cancellation (SIC) in slotted ALOHA framework and iterative belief-propagation erasure-decoding, established recently, enabled the application of the erasure-coding theory and tools to design random access schemes. This approach leads to throughput substantially higher than the one offered by the traditional slotted ALOHA. In the simplest setting, SIC progresses when a successful decoding occurs for a single user transmission. In this paper we consider a more general setting of a channel with capture and explore how such physical model affects the design of the coded random access protocol. Specifically, we assess the impact of capture effect in Rayleigh fading scenario on the design of SIC-enabled slotted ALOHA schemes. We provide analytical treatment of frameless ALOHA, which is a special case of SIC-enabled ALOHA scheme. We demonstrate both through analytical and simulation results that the capture effect can be very beneficial in terms of achieved throughput.Comment: Accepted for presentation at IEEE WCNC'14 Track 2 (MAC and Cross-Layer Design

    Unequal Error Protection in Coded Slotted ALOHA

    Full text link
    We analyze the performance of coded slotted ALOHA systems for a scenario where users have different error protection requirements and correspondingly can be divided into user classes. The main goal is to design the system so that the requirements for each class are satisfied. To that end, we derive analytical error floor approximations of the packet loss rate for each class in the finite frame length regime, as well as the density evolution in the asymptotic case. Based on this analysis, we propose a heuristic approach for the optimization of the degree distributions to provide the required unequal error protection. In addition, we analyze the decoding delay for users in different classes and show that better protected users experience a smaller average decoding delay

    Seek and Decode: Random Multiple Access with Multiuser Detection and Physical-Layer Network Coding

    Get PDF
    We present a novel random multiple access scheme that combines joint multiuser detection (MUD) with physical-layer network coding (PLNC) over extended Galois fields (EGF). We derive an analytical bound to the throughput at the system level and present simulation results for the decoding at the physical level in both fast fading and block fading channels. We adopt a cross layer approach in which a non-binary joint multiuser decoder is used in combination with PLNC at slot level, while the use of EGF increases the system diversity at frame level. The results we present are encouraging and suggest that the combination of these two interference management techniques can significantly enhance the performance of random multiple access systems

    A Mobile Satellite Experiment (MSAT-X) network definition

    Get PDF
    The network architecture development of the Mobile Satellite Experiment (MSAT-X) project for the past few years is described. The results and findings of the network research activities carried out under the MSAT-X project are summarized. A framework is presented upon which the Mobile Satellite Systems (MSSs) operator can design a commercial network. A sample network configuration and its capability are also included under the projected scenario. The Communication Interconnection aspect of the MSAT-X network is discussed. In the MSAT-X network structure two basic protocols are presented: the channel access protocol, and the link connection protocol. The error-control techniques used in the MSAT-X project and the packet structure are also discussed. A description of two testbeds developed for experimentally simulating the channel access protocol and link control protocol, respectively, is presented. A sample network configuration and some future network activities of the MSAT-X project are also presented
    corecore