391 research outputs found
Pseudo-random Aloha for Enhanced Collision-recovery in RFID
In this letter we motivate the need to revisit the MAC protocol used in Gen2
RFID system in order to leverage receiver structures with Collision Recovery
capabilities at the PHY layer. To this end we propose to consider a simple
variant of the Framed Slotted Aloha with pseudo-random (deterministic) slot
selection as opposite to the classical random selection. Pseudo-random access
allows naturally to implement Inter-frame Successive Interference Cancellation
(ISIC) without changing the PHY modulation and coding format of legacy RFID
standard. By means of simulations we show that ISIC can bring 20-25% gain in
throughput with respect to traditional intra-frame SIC. Besides that, we
elaborate on the potential of leveraging pseudo-random access protocols in
combination with advanced PHY techniques in the context of RFID applications.Comment: This manuscript has been submitted to IEEE on the 19th September 201
Perfect tag identification protocol in RFID networks
Radio Frequency IDentification (RFID) systems are becoming more and more
popular in the field of ubiquitous computing, in particular for objects
identification. An RFID system is composed by one or more readers and a number
of tags. One of the main issues in an RFID network is the fast and reliable
identification of all tags in the reader range. The reader issues some queries,
and tags properly answer. Then, the reader must identify the tags from such
answers. This is crucial for most applications. Since the transmission medium
is shared, the typical problem to be faced is a MAC-like one, i.e. to avoid or
limit the number of tags transmission collisions. We propose a protocol which,
under some assumptions about transmission techniques, always achieves a 100%
perfomance. It is based on a proper recursive splitting of the concurrent tags
sets, until all tags have been identified. The other approaches present in
literature have performances of about 42% in the average at most. The
counterpart is a more sophisticated hardware to be deployed in the manufacture
of low cost tags.Comment: 12 pages, 1 figur
Exploiting Capture Effect in Frameless ALOHA for Massive Wireless Random Access
The analogies between successive interference cancellation (SIC) in slotted
ALOHA framework and iterative belief-propagation erasure-decoding, established
recently, enabled the application of the erasure-coding theory and tools to
design random access schemes. This approach leads to throughput substantially
higher than the one offered by the traditional slotted ALOHA. In the simplest
setting, SIC progresses when a successful decoding occurs for a single user
transmission. In this paper we consider a more general setting of a channel
with capture and explore how such physical model affects the design of the
coded random access protocol. Specifically, we assess the impact of capture
effect in Rayleigh fading scenario on the design of SIC-enabled slotted ALOHA
schemes. We provide analytical treatment of frameless ALOHA, which is a special
case of SIC-enabled ALOHA scheme. We demonstrate both through analytical and
simulation results that the capture effect can be very beneficial in terms of
achieved throughput.Comment: Accepted for presentation at IEEE WCNC'14 Track 2 (MAC and
Cross-Layer Design
Unequal Error Protection in Coded Slotted ALOHA
We analyze the performance of coded slotted ALOHA systems for a scenario
where users have different error protection requirements and correspondingly
can be divided into user classes. The main goal is to design the system so that
the requirements for each class are satisfied. To that end, we derive
analytical error floor approximations of the packet loss rate for each class in
the finite frame length regime, as well as the density evolution in the
asymptotic case. Based on this analysis, we propose a heuristic approach for
the optimization of the degree distributions to provide the required unequal
error protection. In addition, we analyze the decoding delay for users in
different classes and show that better protected users experience a smaller
average decoding delay
Seek and Decode: Random Multiple Access with Multiuser Detection and Physical-Layer Network Coding
We present a novel random multiple access scheme that combines joint multiuser detection (MUD) with physical-layer network coding (PLNC) over extended Galois fields (EGF). We derive an analytical bound to the throughput at the system level and present simulation results for the decoding at the physical level in both fast fading and block fading channels. We adopt a cross layer approach in which a non-binary joint multiuser decoder is used in combination with PLNC at slot level, while the use of EGF increases the system diversity at frame level. The results we present are encouraging and suggest that the combination of these two interference management techniques can significantly enhance the performance of random multiple access systems
A Mobile Satellite Experiment (MSAT-X) network definition
The network architecture development of the Mobile Satellite Experiment (MSAT-X) project for the past few years is described. The results and findings of the network research activities carried out under the MSAT-X project are summarized. A framework is presented upon which the Mobile Satellite Systems (MSSs) operator can design a commercial network. A sample network configuration and its capability are also included under the projected scenario. The Communication Interconnection aspect of the MSAT-X network is discussed. In the MSAT-X network structure two basic protocols are presented: the channel access protocol, and the link connection protocol. The error-control techniques used in the MSAT-X project and the packet structure are also discussed. A description of two testbeds developed for experimentally simulating the channel access protocol and link control protocol, respectively, is presented. A sample network configuration and some future network activities of the MSAT-X project are also presented
- …