CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW)
|
|
- Brett Stokes
- 6 years ago
- Views:
Transcription
1 33 CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW) In a RFID based communication system the reader activates a set of tags, and the tags respond back. As outlined in the previous chapter the reply back signals of some tags do hit the reader simultaneously causing collisions. The reasons are many which cause collisions. Exploring the reasons for collisions requires in depth study of a number of phenomena and parameters like radiation patterns of readers and tags, type of protocols used in the system, dynamics of tag carriers, which is beyond the scope of this study. In fact, a number of collision avoidance strategies and techniques are already available in the literature. Unfortunately, no such technique ensures totally collision free RFID communication system. It is in this context, this thesis introduces a novel technique which guarantees a multiple access RFID communication system with out collision. Before getting into such details, we shall briefly review some of the existing collision avoidance techniques just for the sake of understanding the underlying principle of collision avoidance. Collision avoidance techniques for tags are mainly classified into two types: (a) probabilistic, and (b) deterministic. Alternatively, reader based collision avoidance protocols are mainly classified into four types:
2 34 (a) Polling based protocol (b) Splitting method based protocol (c) I-code protocol and (d) Contact less protocol. Figure 3.1 shows various multiple access and anti-collision procedures. Figure 3.1.: Types of Multiple Access and Anti-collision procedures The multiple-access techniques are categorized as Space Division Multiple Access (SDMA) technique, Time Division Multiple Access (TDMA) technique, Frequency Division Multiple Access (FDMA) technique and Code Division Multiple Access (CDMA) technique. We shall briefly review these four techniques. (i) Space Division Multiple Access (SDMA) Technique Space Division Multiple Access technique categorizes the available channel capacity into separate areas which are spatial. It minimizes the reading range of readers and forms as an array in space. It uses
3 35 electronically controlled directional antenna. Various tags will be distinguished based on their angular positions. (ii) Time Division Multiple Access (TDMA) Technique Time Division Multiple Access technique allocates the available channel bandwidth to readers and tags with respect to time. Based on the time allocated by the reader, tags respond in their corresponding time slots with the reader. In this technique, reader talks first, tags listen. Later tags respond to the reader based on the time allocated. Most of the RFID communication systems use TDMA technique. (iii) Frequency Division Multiple Access (FDMA) Technique In this method, the existing resource i.e., channels bandwidth into smaller bandwidths which in turn are dedicated to individual tags until the communication among the tag and the reader is completed. (iv) Code Division Multiple Access (CDMA) Technique This technique works basically on the principle of cellular mobile communication. Readers are identified by their unique codes and works in synchronization with each other. This technique is too complicated to implement for RFID system as the computation time required is more for both tags as well as reader. The research work has been laser focused on Tag anti-collision procedures only. Hence, reader s collision avoidance procedures are not discussed in this thesis.
4 TAG COLLISION AVOIDANCE PROTOCOLS The collision avoidance protocols of the tags are mainly classified into two types. They are (a) Probabilistic and (b) Deterministic Probabilistic techniques make use of different types of ALOHA protocols. Specifically, the use of Framed Slotted ALOHA [32] makes the reader inform all the tags present in its vicinity about the frame length. In turn, the tags select any one of the time slots available and communicate with the reader. This process continues until all the tags have been identified and communicated at least once. All the active and semi active tags which have successfully communicated with reader are acknowledged at the end of every frame. The tags that have communicated with the reader will not further participate in the subsequent rounds so that the probability of collisions is minimized and thus the overall identification time reduces. On the other hand, in a multiple tag environment, the passive tags transmit their packets incessantly in every frame causing a monotonic increase in the total read time. Thus, we observe that there is a dire necessity for improvised protocols to resolve the collision problem posed by RFID systems that work with passive tags. Deterministic protocols come under the classification of tree-based protocols [30, 40 and 42] where the tags are treated as nodes in a binary tree. The tags are identified based on their unique ID s where the reader scans all the nodes of the tree in every round. Refer to figure 3.2, in
5 37 which one of the deterministic protocols named Framed Query Tree (FQT) protocol is shown to use a binary tree search approach. Figure 3.2: Binary tree representation of a typical identification process by FQT Protocol These algorithms are quite accurate in identifying the tags. However, more over head is involved in the identification process and the reader gets burdened in specifying every time address ranges of the tags. To summarize, the general requirement for both probabilistic and deterministic collision avoidance protocols is proper tag identification and enumeration of the actual number of tags K in the system. This is very much required in order to (i) optimize the frame size in Framed Slotted ALOHA protocol (probabilistic approach) and (ii) continue tree-based identification process for computing the number of slots (deterministic approach). Fast enumeration of tags is an important requirement which can also be achieved by using non-identifiable information (a string of bits) available with the tags so that the tag density K is calculated. For certain applications where privacy is of prime concern, it may not be
6 38 possible for the readers to identify the tags using the normal procedure defined. In such situations, tags can transfer non-identifiable encrypted information, which can be accepted to enumerate the cardinality of the tag set Probabilistic Protocols. ALOHA PROTOCOL: As outlined in chapter 1, ALOHA protocol is a multiple medium access control protocol developed for a packet radio network which is implemented at the data link layer to permit multiple tags access the medium in a semi-random manner without any interference or collision. Protocol was developed by a scientist by name Norman Abramson and his team at University of Hawaii. A group of stations forms a network among them and starts transmitting their information in a random fashion to one another under the supervision of one of the stations which controls and monitors the transmission of packets. After transmitting, the station checks whether the transmission was successful or lost due to collision by listening to the broadcast. If the data is lost due to collision, the station retransmits the same information packet once again. The same methodology is adopted and implemented in RFID communication system. The success rate or throughput that has achieved with this protocol is around 18%.
7 39 In what follows, we present different versions of ALOHA protocols that are in use currently. Figure 3.3 shows the classification of Probabilistic Algorithms (ALOHA based protocols). All probabilistic protocols are basically enhanced versions of ALOHA protocol. Figure.3.3 shows a variety of probabilistic algorithms. The main aim of these algorithms is to decrease the probability of collisions since all the tags try to respond in different intervals of time. Figure 3.3: Classification of Probabilistic algorithms Pure ALOHA (Basic ALOHA) Protocol Figure 1.2 (a) represents an example RFID environment where four tags and one reader are engaged with the help of pure ALOHA protocol. Here, the tags-reader engagement is totally random. That is, tags send their packets randomly when electromagnetically activated by the reader without any control. In such a case, collision of packets is inevitable. To be precise, when two or more tags try to transmit their data packets at
8 40 the same time which is represented by dark rectangles at the reader side, collision is said to occur. Refer to figure 1.2 (a). The efficiency of this algorithm will drop down if there is a large tag density in the vicinity of the reader or if the tags have huge amount of data [34]. One possibility for optimizing the performance of the ALOHA algorithm is the slotted ALOHA algorithm Slotted ALOHA Protocol Figure 1.2 (b) represents the slotted ALOHA in which the available time is further divided into distinct time intervals called as time slots and a tag is permitted to transmit at the beginning of a slot. In this protocol, collision of the tags will be either completely or not at all, i.e., no chances of occurrence of partial collisions like in the pure ALOHA case. The tags will transmit in predefined and synchronous time slots. The synchronization among the tags is achieved under the supervision of the reader. Thus, this can be called as a reader-driven TDMA anticollision protocol [35]. The Slotted ALOHA algorithm has better performance than the basic ALOHA because of the synchronization between the reader and the tags. Moreover, the defined points of time where the tags start responding decrease the probability of collision. However, the Slotted ALOHA algorithm still has the weak point that it provides a meager performance when the tag density increases [24, 35].
9 Basic Framed Slotted ALOHA (BFSA) Protocol Figure 1.2 (c) represents a Basic Framed Slotted ALOHA (BFSA) protocol which is an enhanced version of the above two protocols. This protocol includes further discrimination of time in the form of frames, with N slots per frame. Every tag tries to communicate with the reader at most once in a randomly selected slot. Every tag can have one collision at the most in a given frame. A frame is a time period with some preamble and synchronization bits appended and transmitted by the reader to the tags which contain number of slots. In BFSA protocol the number of slots per frame is fixed and not changed during the identification process. The reader broadcasts the request command which includes the frame size (number of time slots available) and the random number. Each tag in turn uses the random number to select a slot in a frame, and respond in that slot [36]. The process of BFSA algorithm can be shown in Fig.3.4. Figure 3.4: Process of BFSA Algorithm
10 42 The frame shown in the above example consists of eight slots. In slot 1; Tag 6, Tag 7 and Tag 14 try to communicate with the reader at the same time where a collision occurs. Hence it is identified as unsuccessful slot. In slot 2, no tag responds and is identified as empty slot. In slot 3, Tag 1 and Tag 4 try to send their ID where again collision occurs which will be identified as unsuccessful slot. In slot 4 Tag 3 alone responds and is identified as successful slot with single tag responding. In slot 5, Tag 5 alone responds which is again identified as a successful slot. In slot 6, Tags 8, 9 and 11 try to send their IDs where collision occurs and remains as unsuccessful slot. In slot 7, collision occurs because of Tag 10 and Tag 12 responding at the same time. Hence it turns out to be an unsuccessful slot. Finally, during slot 8, Tag 13 responds with its ID which turns out to be a successful slot. Therefore, the tags which could not communicate with the reader must respond in the next round. Although the Basic Framed Slotted ALOHA protocol is simple to implement, the percentage of tag identification is less because of fixed frame size. This protocol completely fails when there is sudden variation in the tag density. Further wastage of time will happen if large frame size is used for less number of tags [36]. The modifications immediately made to Basic Framed Slotted ALOHA (BFSA) are to adapt the frame size in accordance with available tags in the next successive rounds. The number of slots per frame is
11 43 decided as per the number of tags present in the reader field. Few of them are discussed below Dynamic Framed Slotted ALOHA (DFSA) Protocol In Dynamic Framed Slotted ALOHA (DFSA) protocol, the number of slots is adaptable in order to have excellent tag identification. The number of slots per frame will be determined by collecting the information about the number of successful slots, unsuccessful slots and idle slots. Based on this information the frame size will be designed for the successive rounds. If the value of the probability of collisions is greater than the defined threshold value, the frame size is automatically increased in the successive rounds. If the collision probability is less than the defined threshold value, the frame size will be automatically decreased in the next round. Thus the frame size is adaptable i.e., number of slots can be either decreased or increased based on the threshold value maintained at the reader [24]. DFSA algorithm is more efficient than BFSA algorithm because the reader readjusts the frame size based on the tag density. Thus, DFSA algorithm can improve the probability of identification and estimation of the tags when compared to the BFSA algorithm [24, 37, and 38]. To summarize, adjusting the frame size alone cannot decrease the tag collision in case of high tag density because the number of slots per frame cannot be increased indefinitely and takes more time to read the entire frame. This algorithm failed especially when tag set is high.
12 Advanced Dynamic Framed Slotted ALOHA (ADFSA) Protocol Advanced Dynamic Framed Slotted ALOHA (ADFSA) protocol adjusts the number of slots per frame based on the enumeration of the tags. It works better than Basic Framed Slotted ALOHA (BFSA) protocol. There are many existing estimation functions. Vogt [26] suggested two approaches to enumerate the tags present in the vicinity of the reader. The first suggested method is Lower Bound (LB) method and the second method is called CIILB (Chebyshev Inequality Improved Lower Bound). ADFSA algorithm has the same problem as DFSA algorithm that the number of slots per frame cannot be increased infinitely as the tag density increases. Therefore, this protocol shows better performance when the tag density is less, however, it fails when the tag density is high [38] Enhanced Dynamic Framed Slotted ALOHA (EDFSA) Protocol In all the other variants of Framed Slotted ALOHA protocols, increasing the number of slots per frame indefinitely is practically not feasible in order to increase the system efficiency to its maximum value. However, this problem can be handled by avoiding the number of active tags approximately to the same size which is equal to number of slots per frame. Enhanced Dynamic Framed Slotted ALOHA (EDFSA) protocol can handle this problem by grouping unread tags using modulo operation [27].
13 Deterministic Identification Protocols Most Tree based protocols are basically modified forms of Binary or Query Tree protocol. Fig.3.5 shows variety of Tree based algorithms Binary Tree Protocols Binary Search (BS) algorithm can solve the collisions by gradually decreasing the collided bits in transponder s electronic serial number which is reciprocated by the transponder to the reader. In turn, the reader will detect the position of the collided bit by using efficient bit coding techniques; for example, using Manchester code the collided bit can be traced out. In this bit coding, the value of the bit can be determined based on the way the transition has occurred. In Manchester coding, positive transition is treated as logic 0 and negative transition is considered as logic 1. If there is no transition it means that an error has occurred. Figure 3.5: Tree based deterministic algorithms Figure 3.5 shows the bit coding using Manchester coding scheme.
14 46 Figure 3.6: Bit coding using Manchester code If at a time more than one transponder transmits bits of different values simultaneously, the positive transitions cancel the negative transitions. If the reader detects no transition, it is clearly understood that a collision has occurred between any two transponders who are simultaneously trying to access the channel. BS algorithm divides the contending transponders into two groups. It permits the transponders which have first collided bit 0 to respond in the next request and transponders with first collided bit 1 are not permitted to respond. Assume that there are four transponders in the vicinity of the reader. At the beginning, the reader sends a request asking all the transponders that have serial numbers less or equal to to respond. Since is the highest serial number, all transponders will answer to the reader in the starting iteration by sending their own serial numbers. Suppose if a collision is sensed in the received serial number at bit 0, bit 4 and bit 6. It implies that there are eight (2 3 =8) or less transponders in the reading range. Bit 6 is the
15 47 highest collided bit. This means that there is at least one transponder whose serial number value is less than Thus, in order to restrict the number of answering transponders, the reader transmits a new request for transponders that meet the condition of ( ) in the next round. Now let us assume that the received serial number will have collisions at bit 0 and bit 4. The same procedure will be repeated. The reader will request the transponders that have the serial numbers less than or equal in the next round. Transponder 2 is only located in this iteration (3rd iteration). The reader then selects Transponder 2 and starts the communication. By repeating these procedures, all transponders can be recognized by the reader [24]. The Adaptive Query Splitting protocol is an enhancement made to that of the Query Tree protocol and the Adaptive Binary Splitting protocol is an improvement made to the Binary Tree protocol are proposed by Myung [23, 25, and 40]. The enhanced protocols use the data retrieved from the final process of transponder identification in order to minimize the collision Query Tree (QT) Protocols In QT protocol, the reader broadcasts a prefix to all the transponders in the vicinity and the transponders whose ID matches to the prefix will respond. If a collision occurs, the reader increments the prefix by one bit until no collision is observed. The round will
16 48 automatically gets terminated and a new round with new prefix will be issued by the reader, once a transponder is identified [41] Tree ALOHA Based Protocols In collision prone environment, performance is usually measured as system efficiency which is defined as the ratio between the numbers of transponders identified to the frame size used in the whole identification process. All the algorithms discussed till now under deterministic approach have shown an average performance well below 50%. In fact the best performing algorithms, namely QT and TSA achieve 40% of system efficiency on an average [28, 41]. Long identification time is the major problem associated with tree based anti-collision algorithms especially with large number of tags and long ID s However, taking into account the advantages of tree based protocols and ALOHA based protocols and combining them together can lead to better protocol which will have excellent performance. The following section presents some of the protocols which combine different algorithms derived from the two methods Slotted Binary Tree (SBT) Protocols SBT protocol tackles the collisions as soon as it occurs. Whenever a collision happens in a particular slot J and the transponders who have not responded in slot J wait until the reader informs the collided slot number to all the transponders. The reader then directs the
17 49 transponders which has undergone collision to choose group 0 or group 1 randomly. The tags that opted group 0 respond in slot J+1 while the tags in the other group remain standstill until all the transponders in the group 0 are successfully recognized. If slot J+1 is either a idle slot or successful slot, transponders belonging to group 1 are instructed to respond in slot J+2. Otherwise, there is a chance of collision occurrence; the same procedures are repeated to solve the next collision Bi-Slotted Tree Based Anti-Collision Protocols Bi-slotted Tree based protocols are broadly classified into two types. They are (i) Bi-slotted query tree (BSQT) protocol and (ii) Bi-slotted collision tracking tree (BSCTT) protocol. The unique feature of these protocols is that the reader transmits two query bits each of length n to all the transponders in its vicinity, which have unique (n-1) bits with different end bit. The following steps explain the collision procedure of the above two protocols [30, 31]: Step 1- Request: In this step, the reader transmits a prefix of length (n-1) to all the transponders. Step 2- Grouping:
18 50 In this step, transponders which are in the proximity zone of the reader respond if the prefix of length (n-1) matches with the (n-1) bits of their ID s. The transponders answer in any one of the time slots based on the n th bit. If the value of the n th bit is 0, transponders select the initial slot to communicate; otherwise, if the value of the n th bit is 1, transponders select the next slot to communicate. Hence, based on the selected slot the value of the n th bit is known. If BSQT protocol is used, the transponders transmit their IDs starting from (n+1) bit to the last bit. On the other hand, if BSCTT protocol is used, the transponders transmit their IDs starting from (n+1) bit to the last bit and continues until they receive acknowledgement to indicate the reader that collision has occurred. Step 3- Decision: In this step a decision will taken based on the occurrence of collision. The reader stores a new prefix value in (LIFO) memory if a collision occurs (i) In BSQT protocol, the prefix of length (n-1) will be stored in addition to the information about the selected slot. (ii) In BSCTT protocol, the prefix of length (n-1), the data received before the occurrence of collision and the information related to the selected slot will be stored. Step 4- Repeating the steps 1, 2 and 3 until the LIFO memory is empty.
19 51 By using BSQT protocol and BSCTT protocol, the main advantage is the average prefix overhead required will be reduced to the half of its value when implemented using other tree based protocols like QTA and CTTA. Other advantage of BSQT protocol over QTA is that only few bits are required to identify the transponders when compared to QTA. Furthermore, the performance of the BSQT protocol and Query Tree protocol gets affected as the number of bits required identifying the transponders increases as the transponder density increases. To evaluate the system performance, the iterations taken to identify a transponder is used as an alternate. BSQT protocol requires half the number of iterations when compared to that of Query Tree protocol. Finally, BSQT protocol performs better than Query Tree Protocol with respect to the total number of bits required and secondly the total number of iterations taken for identifying each transponder [31] Framed Query Tree (FQT) Protocol In this protocol, the transponders which are in the vicinity of the reader are randomly divided into frame units [33]. QT protocol is used to identify transponders which are randomly divided in each unit. The process of Framed Query Tree protocol is explained as follows: In the starting of the identification process, the reader transmits a request command to all the transponders which are in the vicinity asking for their ID. The request command transmitted includes Frames Number, also called as Epoch Size which informs about the total
20 52 number of the frames available (see fig.3.7). Then each transponder randomly chooses a frame and communicates with the reader only in the frame selected by the transponder. Within each frame, the reader uses Query Tree protocol to identify the transponders belonging to this frame. Thus, the reader sends the Frames Number along with the prefix of ID. If the opted frame is same as the frame to be transmitted, the transponder responds if its ID matches with the prefix (QT protocol). The reader continues to the next frame until all the transponders opted for that frame are identified. The above process is repeated for every frame [33]. Figure 3.7: Identification process in FQT Protocol (Same as Figure 3.2) Figure.3.7. indicates an example of the identification process where Framed Query Tree protocol is used in the RFID system where the transponder density in the vicinity of the reader is eight and the number of frames is 4 [33]. To improve the performance of Framed Query Tree protocol, an appropriate Frames Number (epoch size) is required. Query Tree
21 53 protocol is best suitable when the depth of the tree does not exceed more than 2. When the transponder density to be identified is N and the Frames Number i.e., epoch size is ES, the most ideal ES can be determined as follow [33]: N = 2 * ES However, it is very difficult to calculate a proper Frames Number in the starting of the identification process because transponder density N is not known. Therefore, the Framed Query Tree protocol uses a test by name First Frame Test. First Frame Test starts the process with small number of frames and if the collision in the first frame exceeds a threshold value, FFT increases the epoch size. As mentioned above all the transponders are randomly divided into multiple frames. If the first frame records many collisions, the successive frames may also face the same problem. [33]. Frame 3 in Figure 3.7 shows the best performance by implementing the above protocol when the transponder count = 2 and tree depth is equal to one. Hence a threshold value is to be defined in order to save the tree depth from not exceeding than the threshold value [11] Query Tree Aloha (QT-ALOHA) Protocol Query Tree-ALOHA protocol is derived from combining Framed Slotted ALOHA (FS-ALOHA) protocol and Query Tree protocol. Framed Query Tree protocol (FQT) is build using Framed Slotted ALOHA protocol
22 54 and Query Tree protocol and is used for actual transponder identification process. The process of QT-ALOHA protocol is explained as follows [33]: In the starting of the process, the reader transmits a request command which includes both prefix and frame size. The transponders whose IDs are matched are treated using Framed Slotted ALOHA protocol and transmits in the allocated slots belonging to the transmitted frame. During Framed Slotted-ALOHA protocol phase, if a collision takes place even in a single slot, it is treated as a collision pertaining to Query Tree protocol. Now a new prefix is generated and included in the queue [33]. Making comparison between the Framed Query Tree protocol and other protocols discussed so far, Framed Query Tree protocol exhibits best performance than any other deterministic collision avoidance protocols [33]. So far we had a preliminary review on the current RFID technology and subsequently the problems associated with its use in Human Tracking System. As a special case, the problem of tag collision and certain current solutions to overcome this problem has been briefly reviewed. It is also been outlined that the tag collision avoidance techniques that are used in the present day system does not guarantee absolute or does not provide a complete solution to this problem. In the light of the above argument we present a novel and absolutely reliable tag collision avoidance technique called Adaptive Slot Adaptive Frame (ASAF) ALOHA Protocol in the next chapter.
RFID systems: anti-collision protocols and applications. Naeem Khademi Cyber-Physical Systems,
RFID systems: anti-collision protocols and applications Naeem Khademi Cyber-Physical Systems, 12.11.2010 RFID Systems Radio-frequency identification (RFID) is a technology that uses communication via electromagnetic
More informationComparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks
Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks Jihoon Choi and Wonjun Lee Division of Computer and Communication Engineering College of Information
More informationAn Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles
2016 2 nd International Conference on Energy, Materials and Manufacturing Engineering (EMME 2016) ISBN: 978-1-60595-441-7 An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles
More informationAn Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification
An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification Su-Ryun Lee Ajou University Department of Electrical and Computer Engineering Suwon, Korea srlee@ajouackr Sung-Don Joo LG
More informationData Link Layer: Collisions
Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access
More informationCHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College
CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data
More informationMultiple Access. Data Communications and Networking
Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available
More informationChapter 12 Multiple Access 12.1
Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationMarkov Chains and Multiaccess Protocols: An. Introduction
Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science
More informationLecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University
Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum
More informationLECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA
Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in
More informationPacket multiple access and the Aloha protocol
Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS
More informationChapter 6 Medium Access Control Protocols and Local Area Networks
Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationMultiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department
Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationMedium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols
Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the
More informationWireless Sensor Networks 7th Lecture
Wireless Sensor Networks 7th Lecture 15.11.2006 Christian Schindelhauer schindel@informatik.uni-freiburg.de 1 Medium Access Control (MAC) Controlling when to send a packet and when to listen for a packet
More information1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30
EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access
More informationRandom Assignment Protocols
Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationOn Achieving Fairness and Efficiency in High-Speed Shared Medium Access
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 11, NO. 1, FEBRUARY 2003 111 On Achieving Fairness and Efficiency in High-Speed Shared Medium Access R. Srinivasan, Member, IEEE, and Arun K. Somani, Fellow, IEEE
More informationData Communications. Automatic Repeat Request Medium Access Control
Data Communications Automatic Repeat Request Medium Access Control Handling Error Cases Automatic Repeat request(arq), also known as Automatic Repeat Query, is an error-control method ARQ uses acknowledgements
More informationCS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,
More informationRandom Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD
Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication
More informationMobile Communications Chapter 3 : Media Access
Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.
More informationAloha and slotted aloha
CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationChapter 3 MEDIA ACCESS CONTROL
Chapter 3 MEDIA ACCESS CONTROL Distributed Computing Group Mobile Computing Winter 2005 / 2006 Overview Motivation SDMA, FDMA, TDMA Aloha Adaptive Aloha Backoff protocols Reservation schemes Polling Distributed
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationAnalysis and Simulation of RFID Anti-collision Algorithms
Analysis and Simulation of RFID Anti-collision Algorithms Tao Cheng, Li Jin School of Electronics and Information Engineering, Beijing Jiaotong University, Beijing 44, P.R.China E-mail: chtao@bjtu.edu.cn
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................
More informationMultiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic
1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending
More informationThe MAC layer in wireless networks
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?
More informationStrengthening Unlicensed Band Wireless Backhaul
be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism
More informationPhysical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan
P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)
More informationMedia Access Control. Networked Systems (H) Lecture 5
Media Access Control Networked Systems (H) Lecture 5 Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted
More informationIntelligent Transportation Systems. Medium Access Control. Prof. Dr. Thomas Strang
Intelligent Transportation Systems Medium Access Control Prof. Dr. Thomas Strang Recap: Wireless Interconnections Networking types + Scalability + Range Delay Individuality Broadcast o Scalability o Range
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationCS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,
More informationMAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users
MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing
More informationWireless Medium Access Control Protocols
Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationEP2210 FEP3210 Performance analysis of Communication networks. Topic 2 Medium access control (or multiple access protocols)
EP2210 FEP3210 Performance analysis of Communication networks Topic 2 Medium access control (or multiple access protocols) 1 Medium access control Lecture material: R. Rom, M. idi, Multiple access protocols,
More informationChapter 1 Basic concepts of wireless data networks (cont d)
Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationMULTIPLE ACCESS PROTOCOLS 2. 1
MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up
More informationMedium Access Control
Medium Access Control Fundamental Problem N nodes in vicinity want to transmit (to, say, N other nodes). How to do this interference free? Interference free means SINR Otherwise, we say that packets collide.
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationMultiple Access Links and Protocols
Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet
More informationRahman 1. Application
Data Link layer Overview of IEEE 802.11 Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationIEEE P Wireless Access Method and Physical Layer Specification. April 30, 1991 REVISED: May 2, 1991
IEEE P802.11 Wireless Access Method and Physical Layer Specification DATE: April 30, 1991 REVISED: May 2, 1991 TITLE: ACCESS PROTOCOL METHODS FOR FIXED AND ADAPTIVE WIDTH TIME SLOTS AUTHOR: Chandos A.
More informationWireless Communications
4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:
More informationCMPE 257: Wireless and Mobile Networking
CMPE 257: Wireless and Mobile Networking Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 3 CMPE 257 Winter'11 1 Announcements Accessing secure part of the class Web page: User id: cmpe257.
More informationThe Medium Access Control Sublayer
The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel
More informationECEN 5032 Data Networks Medium Access Control Sublayer
ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:
More informationCOS 140: Foundations of Computer Science
COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises
More informationMAC Essentials for Wireless Sensor Networks
MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer
More informationMultiple-access protocols
Multiple Access Multiple-access protocols Random Access MA CSMA CSMA/CD CSMA/CA RANDOM ACCESS In a random access method, each station has the right to the medium without being controlled by any other station.
More informationMedium Access Control Sublayer Chapter 4
Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February
More informationCOMPUTER NETWORK Model Test Paper
Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.
More informationImproving RFID System To Read Tags Efficiently
Improving RFID System To Read Tags Efficiently Dissertation submitted in partial fulfillment of the requirements for the degree of Master of Technology by Naval Bhandari (Roll Number 04329023) under the
More informationoriginal standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS
IEEE 802.11 The standard defines a wireless physical interface and the MAC layer while LLC layer is defined in 802.2. The standardization process, started in 1990, is still going on; some versions are:
More informationCSC 4900 Computer Networks: The Link Layer
CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF
More informationChapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.
Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.
More informationUnit 7 Media Access Control (MAC)
Unit 7 Media Access Control (MAC) 1 Internet Model 2 Sublayers of Data Link Layer Logical link control (LLC) Flow control Error control Media access control (MAC) access control 3 Categorization of MAC
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationAdvantages and disadvantages
Advantages and disadvantages Advantages Disadvantages Asynchronous transmission Simple, doesn't require synchronization of both communication sides Cheap, timing is not as critical as for synchronous transmission,
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationAccess Technologies! Fabio Martignon
Access Technologies! Fabio Martignon 1 LAN Ethernet - IEEE 802.3 Broadcast Bus Capacity=10 Mb/s Xerox-Intel-Digital inventors Standardized at the beginning of the 80s as IEEE 802.3 Big Success and Several
More informationCOMP/ELEC 429/556 Introduction to Computer Networks
COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng
More informationECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)
ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN
More informationHomework 1 Solutions:
Homework 1 Solutions: If we expand the square in the statistic, we get three terms that have to be summed for each i: (ExpectedFrequency[i]), (2ObservedFrequency[i]) and (ObservedFrequency[i])2 / Expected
More informationKing Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering
Student Name: Section #: King Fahd University of Petroleum and Minerals College of Computer Sciences and Engineering Department of Computer Engineering COE 344 Computer Networks (T072) Final Exam Date
More informationPower Laws in ALOHA Systems
Power Laws in ALOHA Systems E6083: lecture 7 Prof. Predrag R. Jelenković Dept. of Electrical Engineering Columbia University, NY 10027, USA predrag@ee.columbia.edu February 28, 2007 Jelenković (Columbia
More informationIEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <
Project Title Date Submitted IEEE 82.16 Broadband Wireless Access Working Group Simulation of IEEE 82.16h and IEEE Coexistence (Preliminary Report) 7-1-12 Source(s) John Sydor, Amir
More informationCSE 6811 Ashikur Rahman
Data Link layer Application Overview of IEEE 802.11 LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform address recognition and CRC validation.
More informationAbstract of the Book
Book Keywords IEEE 802.16, IEEE 802.16m, mobile WiMAX, 4G, IMT-Advanced, 3GPP LTE, 3GPP LTE-Advanced, Broadband Wireless, Wireless Communications, Cellular Systems, Network Architecture Abstract of the
More informationCHAPTER 5 PROPAGATION DELAY
98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,
More information3. Evaluation of Selected Tree and Mesh based Routing Protocols
33 3. Evaluation of Selected Tree and Mesh based Routing Protocols 3.1 Introduction Construction of best possible multicast trees and maintaining the group connections in sequence is challenging even in
More informationCOMMUNICATION NETWORKS NETW 501
COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationLogical Link Control (LLC) Medium Access Control (MAC)
Overview of IEEE 802.11 Data Link layer Application Presentation Session Transport LLC: On transmission, assemble data into a frame with address and CRC fields. On reception, disassemble frame, perform
More informationData and Computer Communications. Chapter 13 Wireless LANs
Data and Computer Communications Chapter 13 Wireless LANs Wireless LAN Topology Infrastructure LAN Connect to stations on wired LAN and in other cells May do automatic handoff Ad hoc LAN No hub Peer-to-peer
More informationMultimedia Communication Services Traffic Modeling and Streaming
Multimedia Communication Services Traffic Modeling and Streaming Medium Access Control algorithms Introduction and details on Aloha networks with infinite nodes Università degli Studi di Brescia A.A. 2014/2015
More informationWSN Routing Protocols
WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before
More informationPerformance of UMTS Radio Link Control
Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication
More informationCOMPUTER NETWORKS - Local area networks
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationLocal area networks. Copyright
Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons
More informationChapter 5 Link Layer and LANs
Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights
More informationAn Efficient Tag Identification Algorithm Based on Improved Collision Detection
An Efficient Tag Identification Algorithm Based on Improved Collision Detection Ya-Ning Yan 1 and Jian Xiong 2 1. ZTE Telecommunications College, Xi an Peihua University, Xi an 710065, China 2. School
More informationData Link Layer: Multi Access Protocols
Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top
More informationPerformance Evaluation of Scheduling Mechanisms for Broadband Networks
Performance Evaluation of Scheduling Mechanisms for Broadband Networks Gayathri Chandrasekaran Master s Thesis Defense The University of Kansas 07.31.2003 Committee: Dr. David W. Petr (Chair) Dr. Joseph
More informationLANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed
Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among
More informationQT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning*
: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning* Hyunji Lee and Jongdeok Kim Dept. of Computer Science and Engineering, Pusan National University eastleap@pusan.ac.kr, kimjd@pusan.ac.kr
More informationPDQRAP - Prioritized Distributed Queueing Random Access Protocol. DQRAP Research Group Report 93-2
PDQRAP - Prioritized Distributed Queueing Random Access Protocol Harn-Jier Lin Graham Campbell Computer Science Dept. Illinois Institute of Technology Chicago IL, 60616 DQRAP Research Group Report 93-2
More information