Politecnico di Torino. Porto Institutional Repository

Similar documents
1334 IEEE INTERNET OF THINGS JOURNAL, VOL. 3, NO. 6, DECEMBER 2016

How to improve CSMA-based MAC protocol for dense RFID reader-to-reader Networks?

Key Management for Static Wireless Sensor Networks With Node Adding

CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW)

Collision Avoidance through Multiple RTS/CTS Dialogue in RFID System

Evaluating the Fault Tolerance Capabilities of Embedded Systems via BDM

Revisiting Backoff algorithms in CSMA/CA based MAC for channel Reservation in RFID reader Networks through broadcasting

Comparative Evaluation of Probabilistic and Deterministic Tag Anti-collision Protocols for RFID Networks

An Improved DFSA Anti-collision Algorithm Based on the RFID-based Internet of Vehicles

RFID systems: anti-collision protocols and applications. Naeem Khademi Cyber-Physical Systems,

PDQRAP - Prioritized Distributed Queueing Random Access Protocol. DQRAP Research Group Report 93-2

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

Reader collisions take place when several neighbor readers try to interrogate the same tag at the same time, such that the neighbor readers interfere

Performance Analysis of WLANs Under Sporadic Traffic

QT-CBP: A New RFID Tag Anti-collision Algorithm Using Collision Bit Positioning*

Data Communications. Automatic Repeat Request Medium Access Control

A FORWARDING CACHE VLAN PROTOCOL (FCVP) IN WIRELESS NETWORKS

Analysis and Simulation of RFID Anti-collision Algorithms

Enhanced Broadcasting and Code Assignment in Mobile Ad Hoc Networks

CHAPTER 5 PROPAGATION DELAY

Internet of Things (IoT)

Investigating MAC-layer Schemes to Promote Doze Mode in based WLANs

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS

An Efficient Tag Identification Algorithm Based on Improved Collision Detection

Research on Anti-collision Algorithm Optimization of RFID Tag Based on Binary Search

Spoofing Attack Against an EPC Class One RFID System

The PHP language. Teaching you everything about PHP? Not exactly Goal: teach you how to interact with a database via web

Stochastic Petri Nets Supporting Dynamic Reliability Evaluation

ISO/IEC , CSD, IEEE a. Embedded Systems Lab. Dept. of CSE, PNU

A Highly Accurate Method for Managing Missing Reads in RFID Enabled Asset Tracking

Mobile Cloud Multimedia Services Using Enhance Blind Online Scheduling Algorithm

Real-Time Traffic in Ad-hoc Sensor Networks

A Novel Priority-based Channel Access Algorithm for Contention-based MAC Protocol in WBANs

An Enhanced Dynamic Framed Slotted ALOHA Algorithm for RFID Tag Identification

ADAPTIVE PICTURE SLICING FOR DISTORTION-BASED CLASSIFICATION OF VIDEO PACKETS

Internet of Things (IoT)

MINIMIZING MOBILITY FOR DATA AGGREGATION IN CLUSTER BASED

Initialization Protocols for IEEE Based Ad Hoc Networks Λ

Caching video contents in IPTV systems with hierarchical architecture

Bandwidth Allocation for Video Streaming in WiMax Networks

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

A Scatternet Formation Protocol for Ad hoc Networks of Bluetooth Devices

[Kaplieswar*, 5(4): April, 2016] ISSN: (I2OR), Publication Impact Factor: 3.785

Ethernet. Introduction. CSE 3213 Fall 2011

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

Efficient Hybrid Multicast Routing Protocol for Ad-Hoc Wireless Networks

A Dynamic TDMA Protocol Utilizing Channel Sense

Cellular Ad-hoc Relay for Emergencies (CARE)

Improving Information Retrieval Effectiveness in Peer-to-Peer Networks through Query Piggybacking

Reliability improvement for an RFID-based psychiatric patient localization system q,qq

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

Performance Evaluation of Frame Slotted-ALOHA with Succesive Interference Cancellation in Machine-to-Machine Networks

Coordinated carrier aggregation for campus of home base stations

Comparison of Transmission Control Protocols Based on EPC C1G2 Standard

Interference Mitigation Technique for Performance Enhancement in Coexisting Bluetooth and WLAN

Lifetime Enhancement of Wireless Sensor Networks using Duty Cycle, Network Coding and Cluster Head Selection Algorithm

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications

Optimization on TEEN routing protocol in cognitive wireless sensor network

Multiple Access Protocols

Clustering Based Routing Protocol to increase the stability in WBAN

Local Data Gathering Using Opportunistic Networking in a Urban Scenario

Performance of ARQ Go-Back-N protocol in Markov channels with unreliable feedback: Delay analysis

Optimizing the hotspot performances by using load and resource balancing method

A Data Parallel Algorithm for Boolean Function Manipulation

Mohammad Hossein Manshaei 1393

Performance analysis of QoS-Oriented Distributed Routing protocols for wireless networks using NS-2.35

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

A METHOD FOR DETECTING FALSE POSITIVE AND FALSE NEGATIVE ATTACKS USING SIMULATION MODELS IN STATISTICAL EN- ROUTE FILTERING BASED WSNS

Politecnico di Torino. Porto Institutional Repository

Network protocol for Internet of Things based on 6LoWPAN

ScienceDirect. Evaluating the Energy Overhead Generated by Interferences within the 2.4 GHz Band for a Hybrid RFID Network

Using a Managed Peer-to-Peer Protocol to Deliver Files within an Organization

Aloha and slotted aloha

OVSF Code Tree Management for UMTS with Dynamic Resource Allocation and Class-Based QoS Provision

Design Considerations on Implementing an Indoor Moving Objects Management System

Privacy Enhanced Authentication Protocol for RFID Tag System Security

FAULT TOLERANT LEADER ELECTION IN DISTRIBUTED SYSTEMS

ECE/CSC 570 Section 001. Final test. December 11, 2006

CSMA based Medium Access Control for Wireless Sensor Network

Multimedia Communication Services Traffic Modeling and Streaming

Dictionaries and Hash Tables

Strengthening Unlicensed Band Wireless Backhaul

A Key Management Scheme for Mobile Wireless Sensor Networks

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

CFMTL: Clustering Wireless Sensor Network Using Fuzzy Logic and Mobile Sink In Three-Level

A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

The Effect of Physical Topology on Wireless Sensor Network Lifetime

The MAC Protocol of the paper: Performance of Buffer-Aided Adaptive Modulation in Multihop Communications

Improved MAC protocol for urgent data transmission in wireless healthcare monitoring sensor networks

Bit Mask Search Algorithm for Trajectory Database Mining

HYBRID PETRI NET MODEL BASED DECISION SUPPORT SYSTEM. Janetta Culita, Simona Caramihai, Calin Munteanu

An adaptive genetic algorithm for dynamically reconfigurable modules allocation

Optimal Channel Selection for Cooperative Spectrum Sensing Using Coordination Game

Parallel Singulation in RFID Systems

On improving capacity and delay in multi Tx/Rx wireless mesh networks with weighted links

A.1 Routing Header Pseudo Code

Medium Access Control

Infrastructure for Autonomous Mobile Robots Communication and Coordination

Transcription:

Politecnico di Torino Porto Institutional Repository [Other] Introducing probability in Colorwave Original Citation: Filippo Gandino, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo (2011). Introducing probability in Colorwave.. Availability: This version is available at : http://porto.polito.it/2423978/ since: May 2011 Terms of use: This article is made available under terms and conditions applicable to Open Access Policy Article ("Public - All rights reserved"), as described at http://porto.polito.it/terms_and_conditions. html Porto, the institutional repository of the Politecnico di Torino, is provided by the University Library and the IT-Services. The aim is to enable open access to all the world. Please share with us how this access benefits you. Your story matters. (Article begins on next page)

Introducing probability in Colorwave Filippo Gandino, Renato Ferrero, Bartolomeo Montrucchio, Maurizio Rebaudengo Dipartimento di Automatica ed Informatica Politecnico di Torino, Italy {filippo.gandino, renato.ferrero, bartolomeo.montrucchio, maurizio.rebaudengo}@polito.it Technical Report n. 01-2011-UC Abstract The RFID technology is affected by the reader-to-reader collision problem. Several studies proposes anti-collision protocols. A high throughput adaptation protocol based on time division is Colorwave. A known mechanism, already applied to another time division protocol to improve its performance, is the introduction of a probability factor in the collision resolution routine. In this work, the effects of the introduction of the probability factor in Colorwave are analyzed. 1 Introduction The Radio Frequency Identification (RFID) is a well known technology for auto-identification. Several applications, from health care [1] to traceability management [2], use many RFID readers in the same area. The presence of readers working close together involves the reader-to-reader collision problem [3]. In order to solve the reader-to-reader collisions several appraoches have been proposed [4]. An high throughput protocol based on time division is Colorwave [5, 6]. It is a distributed adaptable protocol, where each RFID reader periodically try at queering tags, and modify its parameters according to the quantity of collisions. Colorwave is based on DCS [5, 6]. The main difference between these protocols is that DCS does not involve adaptive parameters. When the density of the network is unknown, Colorwave provides 1

Tech. Rep. 01-2011-UC 2 RELATED WORKS a higher throughput than DCS, since each reader modifies its parameters according to the quantity of collisions. In [7], the introduction of a probabilistic factor in the collision resolution routine of time division protocols has been proposed in order to improve their performance. Probabilistic DCS (PDCS) is a new protocol proposed in [8], which employs the probabilistic factor and is based on DCS. This work analyzes the introduction of the probabilistic parameter in Colorwave. A new version of the protocol, compliant with this technique, is presented and evaluated. The remainder of the paper is organized as follows: in Sect. 2 related works are described. In Sect. 3 the proposed scheme is presented. Finally, in Sect. 4, the analyzed approach is evaluated, and in Sect. 5 some conclusions are drawn. 2 Related Works This section describes the main relevant anti-collision protocols and their requirements. 2.1 Distributed Color System (DCS) In DCS [5, 6] each communication round is composed of time slots. Each RFID reader can communicate only during its time slot. When a transmission collides, each involved reader stops the communication and randomly chooses a new timeslot that it has reserved, sending a specific signal named kick. When the reserved slot is used by some neighbors, they randomly choose a new slot and try using it without reservation. The communications are divided in rounds. Each round is composed of µ timeslots. Each timeslot is composed of a kick phase and a transmission phase. The identification of a timeslot is called color. A color is assigned to a reader, and it works only during the corresponding time slot. During the kick phase, each working reader that had collided at the previous transmission sends a kick. Each working reader that receives a kick changes color. During the transmission phase, each working reader that has to read tags executes a transmission. If the transmission collides then the involved readers stop it and randomly choose a new color. At the subsequent round the colliding readers will send a kick, in order to reserve a timeslot. In the described protocol when more than one reader transmits a kick during the same slot, all the transmitting readers also receive the kick, and 2

Tech. Rep. 01-2011-UC 2 RELATED WORKS they choose a new color. The kick does not transport any additional information, but is used only to communicate to the neighbors that the channel is busy, so the readers do not need additional hardware. The only additional requirement is represented by the global synchronization, since each reader must initiate a new timeslot simultaneously to its neighbors. 2.2 Colorwave Colorwave [5, 6] is a protocol based on DCS. This protocol introduces a variable quantity of timeslots that compose a round (µ), differently from DCS where the number of timeslots is fixed. The value is dynamically changed in order to increase the efficiency of the RFID network. When the number of collisions is high, the number of used colors for round rises, while when it is small the number of colors decreases. This protocol requires a special kick transmission, which states the change to a new µ. The kick phase is divided in two subphases, where normal kicks are sent during the first one, and color kicks during the second one. In order to manage changes of µ, Colorwave introduces two couples of thresholds: one is used to manage the increase of µ, and the other for the decrease. Each couple is composed of a hard threshold, which sets a change, and a soft threshold, which sets a transition state, where the reader changes µ only if a neighbor is already changing. Therefore, each reader counts its percentage of successful transmissions. When the percentage exceeds a hard threshold the reader changes µ and communicates the change to its neighbors during the second kick subphase. If a reader has exceeded a soft threshold and it receives colorkick compliant with the exceeded threshold, then it changes µ and communicates the change to its neighbors. The adaptable µ allows Colorwave to autonomously find a good configuration. However, in addition to the requirements of DCS, this protocol also requires to manage the special color kicks. The presence of neighboring readers with different µ can generate additional collisions, as at each round different couples of slots overlap. However, this problem is in part overcome by the improved efficiency introduced by the adaptable µ. 2.3 Probabilistic DCS (PDCS) Probabilistic DCS (PDCS) [8] is an improved version of DCS. This protocol introduces a new parameter p, which represents the probability to change color after a collision. The goal of this protocol is to reduce the number of 3

Tech. Rep. 01-2011-UC 3 PROPOSED PROTOCOL Initialization() 1: Color i = (Color i + 1)mod(µ i ) 2: TimeInColor i = TimeInColor i + 1; 3: if reader i received a request to read tags then 4: TransFlag i = true; 5: end if 6: if CTrans i.getcollisions() > UpSafe AND TimeInColor i > MinTimeInColor then 7: µ i = µ i + 1; 8: CTrans i.clear(); 9: TimeInColor i = 0; 10: ColorUpKickFlag i = µ i ; 11: end if 12: if CTrans i.getcollisions() < DownSafe AND TimeInColor i > MinTimeInColor then 13: µ i = µ i 1; 14: CTrans i.clear(); 15: TimeInColor i = 0; 16: ColorDownKickFlag i = µ i ; 17: end if Fig. 1: Initialization subroutine collisions, reducing the number of readers that randomly change color. This approach improves the performance of DCS, without additional requirements. The analysis proposed in [8] shows that after a collision between 2 readers, the color of the collision is probably available, while the other colors could be busy. Therefore, reducing the probability of changing color after a collision, a reader could keep the same color and the other could change, reducing the probability of further collisions. 3 Proposed protocol In order to present the algorithm, some definitions are preliminary given. The list of the variables used in the probabilistic version of Colorwave is shown in Table 1. The procedures are: CTrans i.add() adds a new flag; CTrans i.clear() deletes all the flags; CTrans i.getcollisions() returns the percentage of flags equal to true; 4

Tech. Rep. 01-2011-UC 3 PROPOSED PROTOCOL Variable p UpSafe UpTrigger DownTrigger DownSafe Tab. 1: List of the variables. Description probabilistic factor highest threshold second highest threshold third highest threshold lowest threshold µ i number of used colors for reader i MinTimeInColor minimum number of slots between two subsequent changes of µ i TimeInColor i CTrans i Color i KickFlag i ColorUpKickFlag i ColorDownKickFlag i TransFlag i number of timeslots spent with the current µ i a First In First Out (FIFO) buffer containing the sequence of flags for the tag interrogations of reader i among the attempted tag interrogations with the current µ; the flags are true for successful interrogations and false for colliding ones index of the timeslot used by reader i to query tags boolean flag, true when reader i has to send a kick boolean flag, true when reader i has to send a colorupkick boolean flag, true when reader i has to send a colordownkick boolean flag, true when reader i has to query tags Kick sending() 1: if KickFlag i = true AND Color i = 0 then 2: reader i sends a kick; 3: KickFlag i = false; 4: end if Fig. 2: Kick sending subroutine. 5

Tech. Rep. 01-2011-UC 3 PROPOSED PROTOCOL Colorkick sending() 1: if ColorUpKickFlag i! = 0 true AND Color i = 0 then 2: reader i sends a colorupkick; 3: ColorUpKickFlag i = 0 ; 4: end if 5: if ColorDownKickFlag i! = 0 true AND Color i = 0 then 6: reader i sends a colordownkick; 7: ColorDownKickFlag i = 0; 8: end if Fig. 3: Colorkick sending subroutine. Kick resolution() 1: if reader i received a kick AND Color i = 0 then 2: CTrans i.add(false); 3: Color i = random(µ i 1) + 1; 4: end if Fig. 4: Kick resolution subroutine. Colorkick resolution() 1: if reader i received a colorupkick AND CTrans i.getcollisions() > UpTrigger AND TimeInColor i > MinTimeInColor AND ColorUpKickFlag j > µ i then 2: µ i = ColorUpKickFlag j ; 3: CTrans i.clear(); 4: TimeInColor i = 0; 5: ColorUpKickFlag i = µ i ; 6: end if 7: if reader i received a colorupkick AND CTrans i.getcollisions() < DownTrigger AND TimeInColor i > MinTimeInColor AND ColorDownKickFlag j < µ i then 8: µ i = ColorDownKickFlag j ; 9: CTrans i.clear(); 10: TimeInColor i = 0; 11: ColorDownKickFlag i = µ i ; 12: end if Fig. 5: Colorkick resolution subroutine. 6

Tech. Rep. 01-2011-UC 3 PROPOSED PROTOCOL Transmission() 1: if TransFlag i = true AND Color i = 0 then 2: the reader i transmits; 3: end if Fig. 6: Transmission subroutine. Collision resolution() 1: if reader i collides then 2: if RANDOM(0,1)<p then 3: Color i = random(µ i ); 4: end if 5: KickFlag i = true; 6: CTrans i.add(false); 7: else 8: CTrans i.add(true); 9: TransFlag i = false; 10: end if Fig. 7: Collision resolution subroutine. Random(a,b) returns a random float between a and b. In the proposed algorithm, the transmissions performed by the readers are the following: interrogation, when a reader communicates with tags, kick, when a reader sends the reservation message, colorupkick, when a reader send a message, communicating its new higher value of µ i. colordownkick, when a reader sends a message, communicating its new lower value of µ i. The algorithm is iterated at each timeslot, and it is organized in three consecutive phases: initialization, kick, transmission. 7

Tech. Rep. 01-2011-UC 4 EVALUATION Fig. 8: Percentage Difference of PCW with respect to Colorwave using the configuration proposed in [5] During the Initialization Phase, which is shown in Fig. 1, the readers update their variables and flags. The reading modification requests of the user are forwarded to the readers. They check UpSafe and DownSafe and eventually change µ i. The Kick phase, which contains the Kick Sending subroutine (Fig. 2), the Kick Resolution subroutine (Fig. 4), the Colorkick Sending subroutine (Fig. 3), the Colorkick Resolution subroutine (Fig. 5), is used to reserve the current timeslot and to communicate a new µ i. The readers that have to reserve the slot send a kick. All the readers that receive a kick randomly choose a new color, different from the previous. The readers that change µ i send a colorupkick or colordownkick, with the new value. The Transmission Phase is used to query the tags. Each reader assigned to the current color can query tags. The colliding readers, with probability p, randomly choose a new color. Fig. 6 and 7 show respectively the Transmission and the Collision Resolution subroutine. 4 Evaluation The effects of the probabilistic factor in colorwave have been studied with two different sets of thresholds. The former set is 93%, 90%, 2%, 1%, which corresponds to Set1 in [5]. The latter is 66%, 66%, 64%, 64%, which is 8

Tech. Rep. 01-2011-UC 4 EVALUATION Fig. 9: Percentage Difference of PCW with respect to Colorwave using the configuration proposed in [9] compliant with the analysis on the colorwave configuration proposed in [9]. MinTimeInColor has been set to 100 slots, and the starting µ to 6. In order to evaluate the technique, the two configurations have been simulated with networks of 250 readers with different density. All the results are calculated as the average of 5 simulations executed on 20 different deployments with the same density. Fig. 8 shows the comparison of PCW with respect to Colorwave using the configuration proposed in [5]. The results are negative or negligible. The analyzed technique is not able to provide the same effects of DCS, since the presence of neighboring readers with a different total number of colors is too common. In fact, when two neighboring readers have a different total number of colors, at each round their relative color changes. It is equivalent to change color at each round, nullifying the effects of the probabilistic factor. Positive results are reached only when the staring color is proper for the network density, since in these networks, few readers change µ. Fig. 9 shows the comparison of PCW with respect to Colorwave using the configuration proposed in [9]. With the configuration proposed in [9], the behavior of the readers is different from the previous. A limited number of readers reach high performance, while their neighbors have less opportunities to query tags. It is observed that PCW with a high color change probability 9

Tech. Rep. 01-2011-UC References provides good results, which are better for high density networks. 5 Conclusion This work has studied the effects of the introduction of a probabilistic factor in the collision resolution routine of colorwave. On the one hand, using a configuration proposed in [5], this technique does not result compliant with colorwave, since the presence of neighboring readers with a different total number of colors is too common. On the other hand, using a configuration proposed in [9], in high density network PCW provides a throughput higher than Colorwave. Acknowledgments This work has been partially supported by the grant Nano -materials and -technologies for intelligent monitoring of safety, quality and traceability in confectionery products (NAMATECH) from Regione Piemonte, Italy. References [1] M. Chen, S. Gonzalez, V. Leung, Q. Zhang, M. Li, A 2G-RFID-based e-healthcare system, Wireless Communications, IEEE 17 (1) (2010) 37 43. [2] P. Bernardi, C. Demartini, F. Gandino, B. Montrucchio, M. Rebaudengo, E. R. Sanchez, Agri-food traceability management using a RFID system with privacy protection, in: Proceedings of the 21st International Conference on Advanced Networking and Applications, AINA 07, 2007, pp. 68 75. [3] D. Engels, S. Sarma, The reader collision problem, in: Systems, Man and Cybernetics, 2002 IEEE International Conference on, Vol. 3, 2002, p. 6. [4] M. Bueno-Delgado, J. Vales-Alonso, C. Angerer, M. Rupp, A comparative study of RFID schedulers in dense reader environments, in: Industrial Technology (ICIT), 2010 IEEE International Conference on, IEEE, 2010, pp. 1373 1378. [5] J. Waldrop, D. Engels, S. Sarma, Colorwave: an anticollision algorithm for the reader collision problem, in: Communications. ICC 03. IEEE International Conference on, Vol. 2, 2003, pp. 1206 1210. 10

Tech. Rep. 01-2011-UC References [6] J. Waldrop, D. Engels, S. Sarma, Colorwave: a MAC for RFID reader networks, in: Wireless Communications and Networking. WCNC 2003. IEEE, Vol. 3, 2003, pp. 1701 1704. [7] F. Gandino, R. Ferrero, B. Montrucchio, M. Rebaudengo, Introducing probability in RFID reader-to-reader anti-collision, in: Proceedings of the 2009 Eighth IEEE International Symposium on Network Computing and Applications, NCA 09, 2009, pp. 250 257. [8] F. Gandino, R. Ferrero, B. Montrucchio, M. Rebaudengo, Probabilistic DCS: An RFID reader-to-reader anti-collision protocol, Journal of Network and Computer Applications 34 (3) (2011) 821 832. [9] F. Gandino, R. Ferrero, B. Montrucchio, M. Rebaudengo, Increasing throughput in RFID multi-reader environments avoiding reader-to-reader collisions, in: Consumer Electronics (ICCE), 2011 IEEE International Conference on, 2011, pp. 37 38. 11