Adaptive Splitting Protocols for RFID Tag Collision Arbitration

Size: px
Start display at page:

Download "Adaptive Splitting Protocols for RFID Tag Collision Arbitration"

Transcription

1 Adaptive Splitting Protocols for RFID Tag Collision Arbitration Jihoon Myung Department of Computer Science and Engineering Korea University, Seoul, Korea Wonjun Lee Department of Computer Science and Engineering Korea University, Seoul, Korea ABSTRACT Tag identification is an important tool in RFID systems with applications for monitoring and tracking. A RFID reader recognizes tags through communication over a shared wireless channel. When multiple tags simultaneously transmit their IDs to a reader, the tag signals collide and this collision disturbs the reader s identification process. Therefore, tag collision arbitration for passive RFID tags is a significant issue for fast identification. This paper presents two adaptive tag anti-collision protocols, an Adaptive Query Splitting protocol (AQS), which is an improvement on the query tree protocol and an Adaptive Binary Splitting protocol (ABS), which is based on the binary tree protocol, which is a de facto standard for RFID anti-collision protocols. To reduce collisions and identify tags efficiently, adaptive splitting protocols use information obtained from the last process of tag identification. Our performance evaluation shows that AQS and ABS outperform other tree based tag anti-collision protocols. Categories and Subject Descriptors C.2.1 [Computer-Communication Networks]: Network Architecture and Design - Wireless Communication General Terms Algorithm, Design, Performance Keywords Collision Resolution, RFID, Tag Anti-collision, Tag Identification 1. INTRODUCTION Radio frequency identification (RFID) is an automatic identification system which consists of readers and tags. A tag has an identification number (ID) and a reader recognizes an object through consecutive communications with the tag attached to it [14]. The reader sends out a signal which supplies power and instructions to a tag. The tag transmits ID to the reader, and the reader consults Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. MobiHoc 06, May 22 25, 2006, Florence, Italy. Copyright 2006 ACM /06/ $5.00. an external database with ID to recognize the object. RFID is fast replacing bar-code based identification mechanisms because (i) communication between a reader and a tag is not limited by the requirement of line-of-sight reading and (ii) each tag is allowed to have a unique ID. Simultaneous transmissions in RFID lead to collision because readers and tags communicate over a shared wireless channel. Collisions make both communication overhead and transmission delay often lose their usefulness. As a result, either the reader may not recognize all objects or retransmissions are required for successful recognition. Reader collisions occur when neighboring readers interrogate a tag simultaneously [3]. Tag collisions occur when multiple tags transmit ID to a reader at the same time and prevent the reader from recognizing any tag [1]. Especially, since low functional passive tags can neither detect collisions nor figure out neighboring tags, tag collision gives rise to the need for a tag anti-collision protocol that enables the recognition of tags with few collisions, and also executes in real-time. Tag anti-collision protocols for passive tags can be grouped into two broad categories, namely aloha based protocols and tree based protocols. Aloha based protocols such as aloha [15], slotted aloha [8], [17], [18], [20], [23] and frame slotted aloha [4], [5], [7], [9], [10], [13], [22] reduce the occurrence probability of tag collisions since tags transmit at distinct times. Aloha based protocols, however, cannot completely prevent collisions. In addition, they have the serious problem that a specific tag may not be identified for a long time, leading to the so called tag starvation problem. On the other hand, tree based protocols such as the binary tree protocol [9], [19], [22] and the query tree protocol [2], [6] do not cause tag starvation, although they have relatively long identification delay [21]. Based on the collision resolution algorithm studied in [11], [12] they split a set of tags into two subsets and attempt to recognize the subsets one by one. By splitting until each set has only one tag, the reader can recognize all tags. Based on the analysis above, a good tag collision arbitration protocol for passive RFID tags should have the following characteristics. First, a reader ought to recognize all the tags inside its own reading range. Tag starvation problem results in the failure of object tracking and monitoring. Since the reader, however, cannot assume the number of tags precisely, the guarantee of recognizing all tags must be taken into consideration in the design of the tag anti-collision protocol. Second, a reader has to recognize tags promptly. Since an object with a tag is potentially mobile, tag identification must keep pace with the object s velocity. If tag identification is carried out slower than the object s velocity, the 202

2 reader cannot recognize it and the RFID system fails in monitoring or tracking. Finally, a tag should be recognized while consuming a small amount of resource. Since the tag supplements power from the reader s wave, tag s available power is limited. Also, the tag has low computational capability and limited memory. Thus, the tag anti-collision protocol must load the tag with the least possible communication and computation overheads. We propose adaptive splitting protocols which are specializations of tree based protocols for passive tag collision arbitration. An Adaptive Query Splitting protocol (AQS) is an improvement on the query tree protocol which has a deterministic methodology. An Adaptive Binary Splitting protocol (ABS) is based on the binary tree protocol which adopts a probabilistic approach. For decreasing collisions, the proposed protocols use information obtained from the last identification process, in an environment where a reader executes tag identification repeatedly for object tracking and monitoring. The reduction in collisions facilitates tag identification with a small delay and low communication overhead, while still recognizing all tags. Simulation results show that AQS and ABS suppress the occurrence of collisions and shorten total delay for recognizing all tags while preserving low communication overhead. The rest of this paper is organized as follows. Section 2 describes existing tree based tag anti-collision protocols. We discuss problems of existing tree based protocols and explain our approach for resolution of problems in tree based protocols in Section 3. Sections 4 and 5 describe AQS and ABS, respectively. In Sections 6 and 7, the performance analysis, including the derivations of several major equations referred to in the analysis, is presented. Finally, the conclusions of our analysis are presented in Section TREE BASED TAG ANTI-COLLISION PROTOCOLS Tree based tag anti-collision protocols perform tag identification in units of reading cycle. In a reading cycle, a reader transmits a query (or a feedback) to tags and then tags transmit ID to the reader. Since a passive tag cannot detect collision, the reader detects whether tag collision occurs or not after its transmission and determines the query of the next cycle according to the result of the detection. Upon receiving a query from the reader, the tag decides whether to transmit or not. Only if a single tag transmits in a cycle, can the reader recognize it successfully. The reader recognizes all the tags within its reading range in a frame, which consists of several reading cycles. The reader attempts to recognize a set of tags in a cycle. Each set includes tags, which transmit at the same cycle. If a set has more than one tag, tag transmissions lead to collision. When tag collision occurs, the mechanisms split the tag set into two subsets by tag IDs or random numbers. After that, the reader tries to recognize two subsets one by one in the same frame. By continuing this splitting procedure until each set has only one tag, tree based protocols are capable of recognizing all the tags in the reader s range. The performance of tag identification is influenced significantly by how efficiently it splits the tag set. A frame of tree based protocols is represented by a tree structure as shown Figure 1. According to the number of tag transmissions in a cycle, reading cycles are divided into three types as follows. Figure 1. Tag identification in tree based protocols. Each node in the tree corresponds to a reading cycle. (a) Binary tree protocol. (b) Query tree protocol. Idle cycle: No transmission is attempted. It is a source of unnecessary increment of identification delay. Readable cycle: Exactly one transmission is attempted. A tag is recognized by the reader successfully. Collision cycle: More than one transmission is attempted. Tag collision occurs and the reader is unable to recognize any tags. The collision cycle defers tag identification and the tag s communication is pure overhead. Only a node of a collision cycle has two child nodes since a tag set is split into two subsets only in the collision cycle. Consequently, all the intermediate nodes in the tree correspond to collision cycles and all the leaf nodes correspond to either readable cycles or idle cycles. Tag identification is coincident with a tree search for finding nodes of readable cycles. The reduction of delay in tag identification can be accomplished by skipping collision cycles. However, once a frame is started, the tree search of the existing tree based protocols departs from the root of the tree and explores all intermediate nodes. In short, the unreasonable starting point of the tree search in existing protocols prolongs the identification delay. 2.1 Binary Tree Protocol The binary tree protocol (BT) [9], [19], [22] uses random binary numbers generated by colliding tags for the splitting procedure. The tag has a counter initialized to 0 at the beginning of the frame and transmits ID when its counter value is 0. Therefore, all the tags within the reader s reading range, at the start of the frame, form one set and transmit concurrently. The reader transmits a feedback to inform tags of the occurrence of tag collision. According to the reader s feedback, every tag changes its counter. In a collision cycle, the tag randomly selects a binary number when its transmission causes collision (i.e., its counter value is 0). Every colliding tag adds a random binary number to its counter. When tag collision occurs, the tag which is not involved in collision (i.e., its counter value is not 0) increases its counter by 1. Consequently, a tag set is split into two subsets. In a no-collision cycle, all tags decrease their counter by 1. The tag infers the successful transmission from the following feedback indicating no collision. The tag recognized by a reader does not transmit any signal until the ongoing frame is terminated. Since the reader also has a counter and changes it value as the tag does, all the tags are recognized. 203

3 2.2 Query Tree Protocol The query tree protocol (QT) [2], [6] uses tag IDs to split a tag set. The reader transmits a query including a bit string. The reader has queue Q for bit strings of queries and initializes Q with two 1-bit strings, 0 and 1, at the beginning of the frame. The reader pops a bit string from Q and transmits a query in a cycle. The tag whose first bits of ID equal the bit string of the query responds by transmitting ID. If tag responses of query q 1 q 2 q x (q i {0,1}, 1 x b, and b is the number of bits in the tag ID) collide, the reader pushes two 1-bit longer bit strings, q 1 q 2 q x 0 and q 1 q 2 q x 1, into Q and uses two 1-bit longer queries in next cycles. The set of tags which match q 1 q 2 q x is split into two subsets; one is a set of tags which match q 1 q 2 q x 0 and the other is a set of tags which match q 1 q 2 q x 1. By expanding the query until either a response or no response follows, the reader recognizes all the tags. Contrary to BT, QT imposes simple functions on tags. QT is also called a memoryless protocol because tags need not have additional memory except ID for identification. However, the identification delay is affected by the distribution of tag IDs. As tags have much similar IDs, delay is increased. 3. ADAPTIVE SPLITTING PROTOCOLS We assume that a reader performs tag identification processes, namely, frames, repeatedly for object tracking and monitoring 1. For reader r, let A r,i be the set of tags which dwell inside reader r s range in the ith frame of reader r. To consider the tag s mobility, we classify tags into staying tags, arriving tags, and leaving tags. We say that tag a s is a staying tag in the ith frame of reader r if a s A r,i-1 A r,i. We say that tag a a is an arriving tag in the ith frame of reader r if a a A r,i A r,i-1. We say that tag a l is a leaving tag in the ith frame of reader r if a l A r,i-1 A r,i. Tag identification should recognize staying tags and arriving tags promptly. Staying tags sojourn in the reader s range both during the last frame and during the current frame. Since the reader already has information on staying tags, tag collision arbitration can prevent collisions between transmissions of staying tags. However, the existing tag anti-collision protocols cause collisions between staying tags because they do not take staying tags into consideration. At the beginning of the frame, BT resets tags counters to 0 and QT initializes reader s queue Q with 1-bit queries. Tag identification in existing tree based protocols starts from one set including all tags and causes tag collisions for splitting tag sets. The colliding tag need re-transmit ID whenever tag collision occurs. The retransmission brings about an increase in identification delay, which handicaps the identification capability of the reader. To make matters worse, readers and tags consume significantly extra energy for successful transmission. Therefore, eliminating inter-staying tag collisions can shorten total delay for tag identification and reduce tag communication overhead. Moreover, information on the tree of the last frame makes a new tag identification start from multiple tag sets and hence the reader can recognize tags with less collisions. Our proposed protocols maintain information on the last frame with a small amount of data and use it 1 Prominent retailers such as Wal-Mart, Target and Best Buy, as well as logistics companies like UPS and Fed-Ex have made this a requirement of all their operations. Manufacturers are following suite. Figure 2. The starting point of tag identification in tree based protocols for preventing tag collisions. They are still simple enough to apply to passive RFID tags and recognize all tags quickly. Adaptive splitting protocols have the characteristic of fast tag identification. AQS uses reader s queries and tag IDs analogous to QT, but it starts the tree search from the leaf nodes in the tree of the last frame as shown in Figure 2. Since some arriving tags may not match any nodes of readable cycles of the last frame, the tree search starts at the nodes of idle cycles as well as the nodes of readable cycles of the last frame. On the other hand, ABS uses random numbers and starts the tree search from the nodes of readable cycles of the last frame. An arriving tag gets to belong to a node of a randomly selected readable cycle of the last frame at the beginning of a new frame. AQS and ABS restrain collisions between tags by skipping cycles in which tag collision occurred in the last frame. 4. ADAPTIVE QUERY SPLITTING AQS recognizes tags with queries sent by a reader. The query includes a bit string. The tag responds with its ID when its first bits of ID are equal to the bit string of the query. Collisions are resolved by two 1-bit longer queries. The reader does not transmit queries which caused tag collisions in the last frame. The reader has queue Q which maintains bit strings for queries. At the beginning of the frame, Q is initialized with queries of all the leaf nodes in the tree of the last frame. To do this, the reader also has candidate queue CQ, which compiles queries of readable cycles and idle cycles of the ongoing frame. When a new frame starts, the reader initializes Q with bit strings in CQ and makes CQ empty. Tags still require very simple functions such as matching its ID with the query and are recognized with few collisions. 4.1 Query Insertion Algorithm 1 and Algorithm 2 show pseudo code of the tag and the reader, respectively, in AQS during a frame. IsResponsible flag is set to TRUE if the tag is allowed to send ID and set to 0 otherwise. At the beginning of the frame, Q is initialized with queries of CQ. The reader recognizes all the tags during the while operation from line 9 to line 23 in Algorithm 2. In lines 10 and 11, the reader pops a bit string from Q and transmits a query in a cycle. If responses of query q 1 q 2 q x (q i {0,1}, 1 x b, and b is the number of bits in the tag ID) collide, the reader pushes q 1 q 2 q x 0 and q 1 q 2 q x 1 into Q in lines 15 and 16. If q 1 q 2 q x engenders an idle cycle or a readable cycle, the reader pushes 204

4 Algorithm 1. AQS Tag Operation /* Query q is q 1 q 2...q x (q i = a binary value, x = the length of the query) Tag ID is t 1 t 2...t b (t i = a binary value, b = the length of ID) */ 1 Receive query q 2 while q!= the command terminating a frame do 3 IsResponsible = TRUE 4 for i = 0 to i < the number of bits of q do 5 if q i!= t i then 6 IsResponsible = FALSE 7 break 8 end if 9 if IsResponsible then 10 Transmit ID 11 end if 12 Receive query q 13 end while q 1 q 2 q x into CQ in lines 19 and 21. Note that all leaf nodes correspond to either readable cycles or idle cycles. At the end of the frame, CQ has queries of all the leaf nodes of the tree. By using queries of leaf nodes of the last frame, the reader can recognize all tags with few collisions and a small delay in the next frame. When there are some arriving tags, the query expansion from leaf nodes resolves collisions with few cycles. Theorem 1: Maintaining CQ at the reader does not need additional memory. Proof: Let S Q (x) be the size of Q after transmitting the xth query and S CQ (x) be the size of CQ after transmitting the xth query. Denote l(x) as the number of bits of the xth query. For x 0, we have 0 if x = 0 SCQ ( x) = (1) SCQ ( x 1) + t( x) l( x) if x > 0 where t(x) = 0 if the cycle of the xth query is a collision cycle, t(x) = 1 otherwise. S CQ (x) increases when the cycle of the xth query is not a collision cycle. However, when t(x) = 1, SQ ( x) + SCQ ( x) = SQ ( x 1) l( x) + SCQ ( x 1) + l( x) = SQ ( x 1) + SCQ ( x 1) That is, the total size of Q and CQ is not changed. Therefore, maintaining CQ at the reader does not require additional memory. (2) Algorithm 2. AQS Reader Operation (candidate queue CQ) 1 /* Initialize Q and CQ */ 2 Q = CQ 3 CQ = NULL 4 if Q = NULL then 5 push (Q, 0) 6 push (Q, 1) 7 end if 8 /* Identify tags and form CQ */ 9 while Q! = NULL do 10 q = pop(q) 11 Transmit a query including q 12 Receive tag responses and detect collision 13 if collision occurs then 14 /* Push 1-bit longer bit strings into Q */ 15 push (Q, q0) 16 push (Q, q1) 17 else if receive only a response then 18 Store the tag ID 19 push (CQ, q) 20 else /* receive no response */ 21 push (CQ, q) 22 end if 23 end while 24 QueryDeletion(CQ) /* Remove unnecessary queries */ 25 Transmit the command terminating a frame; 4.2 Query Deletion In performing the procedure, query insertion augments the number of leaf nodes in the tree and increases the length of queries. Since the number of readable cycles is the same as the number of tags, idle cycles will proliferate and worsen the reader s ability of tag identification. It results from which readable cycles of the last frame is transformed into idle cycles by leaving tags. To address this problem, AQS eliminates unnecessary idle cycles in line 24 in Algorithm 2. Since there is more than one response in the collision cycle, a node of a collision cycle should have two child nodes which are a pair of types as follows: 1) two collision cycles, 2) a collision cycle and a readable cycle, 3) a collision cycle and an idle cycle, and 4) two readable cycles. If leaving tags transform a pair of child nodes, the reader deletes unnecessary queries from CQ as follows. A readable cycle and an idle cycle: If only tag a x responds to query q 1 q 2 q x 0 (q 1 q 2 q x 1) and no tag responds to q 1 q 2 q x 1 (q 1 q 2 q x 0), tag a x can be recognized by q 1 q 2 q x without collision. The reader deletes q 1 q 2 q x 0 and q 1 q 2 q x 1 from CQ and puts q 1 q 2 q x into CQ. Two idle cycles: If both q 1 q 2 q x 0 and q 1 q 2 q x 1 are queries of idle cycles, there is no tag which responds to q 1 q 2 q x. Therefore, q 1 q 2 q x is the query of the idle cycle. The reader deletes q 1 q 2 q x 0 and q 1 q 2 q x 1 from CQ and puts q 1 q 2 q x into CQ. After a frame, the reader deletes unnecessary queries except two 1-bit queries from CQ. Figure 3 depicts an example of the query insertion and the query deletion procedure. As the query deletion is done under the condition that all branches in the tree are included in CQ, all tags can be recognized promptly in the next frame. Theorem 2: All tags are recognized by queries of all the leaf nodes in the tree of the last frame. Proof: If a 1-bit query, 0 (or 1) is a leaf node, it recognizes all tags of which the first bit of IDs is 0 (or 1). For query q 1 q 2 q x, all tags which match q 1 q 2 q x are recognized by q 1 q 2 q x 0 and q 1 q 2 q x 1. Therefore, any tag can be recognized by all the leaf nodes in the tree of the last frame. 205

5 Figure 3. Tag identification of AQS. A number in a box indicates a bit string stored in CQ. (a) Tag identification in the first frame when there are three tags, which have 0100, 0111 and 1010 as ID, respectively. (b) Tag identification by query insertion in the second frame when tag 1101 is an arriving tag. (c) Tag identification by query deletion in the third frame when tag 0111 becomes a leaving tag. 5. ADAPTIVE BINARY SPLITTING AQS reduces collisions, but it needs some idle cycles. To guarantee the recognition of all tags, the reader uses not only queries of readable cycles but also queries of idle cycles of the last frame. Though the reader eliminates unnecessary idle cycles by leaving tags, some idle cycles cannot be avoided in order to cover all possible ranges of the tag ID. On the contrary, ABS starts tag identification from only readable cycles of the last frame and uses random numbers for splitting tag sets. A staying tag revises its counter into the cycle number that its transmission does not collide with other staying tags. An arriving tag decides its counter value with a random number selected among possible values inside the reader s range. Tag transmissions are aligned in the increasing order of counter values. ABS achieves fast identification by diminishing not only collisions but also unnecessary cycles. Algorithm 3. ABS Tag Operation 1 Receive the command starting a frame with reader s TSC 2 /* Initialize PSC and ASC */ 3 PSC = 0 4 if ASC = NULL or ASC > TSC then 5 ASC = random number from 0 to TSC 6 end if 7 /* Process PSC and ASC for transmission */ 8 while PSC <= ASC do 9 if PSC = ASC then 10 Transmit ID 11 Receive the reader's feedback f 12 if f = collision then 13 Select a binary value i randomly 14 ASC = ASC + i 15 else 16 PSC = PSC end if 18 else 19 Receive the reader's feedback f 20 if f = collision then 21 ASC = ASC else if f = readable then 23 PSC = PSC else /* f = idle */ 25 ASC = ASC 1 26 end if 27 end if 28 end while 5.1 Tag transmission control Algorithm 3 shows the pseudo code of the tag in ABS. A tag has two counters, Progressed Slot Counter (PSC) and Allocated Slot Counter (ASC). It is applicable to passive RFID tags because they can have a little storage though they can neither have a complex logic nor communicate each other [16]. PSC represents the number of tags recognized successfully. PSC is initialized to 0 at the beginning of the frame and is increased by 1 only in the readable cycle. All the tags have the same value of PSC at all times. ASC signifies the cycle when the tag can transmit ID. The tag is allowed to transmit when its ASC is equal to PSC. If the tag has ASC less than PSC, it does not attempt the transmission until the completion of the frame because it has already been recognized in the ongoing frame. To control PSC and ASC, the reader informs tags of the type of the last cycle by transmitting a feedback. For splitting a set of tags transmitting at the same cycle, every colliding tag increases ASC by a random number. When tag collision occurs, the tag which has ASC equal to PSC randomly selects one of two binary numbers, 0 and 1, and then adds it to ASC in lines 13 and 14. To prevent the second subset, i.e., tags which have ASC equal to PSC and select 1, from combining with another set, i.e., tags which have ASC equal to PSC + 1, the tag which has ASC greater than PSC adds 1 to ASC in the collision cycle in line 21. Since PSC is not changed, the first subset, i.e., tags which have ASC equal to PSC and select 0, tries to retransmit in the following cycle. The second subset, i.e., tags which have ASC equal to PSC and select 1, transmits after the first subset is recognized. In an idle cycle, the tag which has not been recognized in the ongoing frame, i.e., the tag which has ASC greater than PSC, decreases ASC by 1 in line 25. Since PSC is not changed in the idle cycle, the decrement of ASC gets to pull the schedule of the tag transmission. Figure 4 depicts tag operation in the collision cycle and in the idle cycle under ABS, and Figure 5 shows tag identification of ABS. At the end of the frame, every tag gets a unique ASC. Preserving ASC at the boundary of two consecutive frames enables the tree search to start from the readable cycles of the last frame possible. 206

6 Algorithm 4. ABS Reader Operation 1 PSC = 0 2 if TSC = NULL then 3 TSC = 0 4 end if 5 Transmit the command starting a frame with TSC 6 While PSC <= TSC do 7 Receive tag responses and detect collision 8 if collision occurs then 9 TSC = TSC f = collision 11 else if receive only a response then 12 Store the tag ID 13 PSC = PSC f = readable 15 else /* receive no response */ 16 TSC = TSC f = idle 18 end if 19 Transmit the feedback f 20 end while 5.2 Frame termination For terminating a frame at once after identifying all tags, the reader of ABS acts as the tag which has the largest ASC. Algorithm 4 shows the pseudo code of the reader. The reader determines the end point of the frame with Progressed Slot Counter (PSC) and Terminated Slot Counter (TSC). PSC represents the number of tags recognized successfully. In a readable cycle, the reader adds 1 to PSC. TSC signifies the number of tag sets in the reader s range. For fast identification, the reader preserves TSC after the end of the frame. If collision occurs, the reader increases TSC by 1 because the number of sets has increased. When a cycle of type idle is encountered, the reader decreases TSC by 1. This is to reflect the effect of elimination of idle cycles. As soon as PSC is greater than TSC, the reader concludes that all tags have been recognized and terminates the frame. In an environment with multiple readers, an arriving tag can be recognized with its ASC given by other readers. If an arriving tag has ASC less than TSC, it is obvious that the arriving tag has the same ASC as a staying tag or a leaving tag. To cope with ASC Figure 4. Tag operation in ABS. A number in parentheses indicates ASC which tags in the set have. (a) The operation in the collision cycle. (b) The operation in the idle cycle. greater than TSC, the reader supports the TSC value when a frame starts. A tag having ASC greater than TSC changes its ASC to a random number from 0 to TSC. ABS recognizes all tags quickly through scaling ASCs of arriving tags into the range of TSC. 6. PERFORMANCE ANALYSIS In this section, we analyze the total delay for recognizing all tags with AQS and ABS. At first, the identification delay is defined by the number of cycles. Definition 1: Let A r,i denote the set of tags which dwell inside reader r s range in the ith frame of reader r. The identification delay caused by recognizing A r,i, d total (A r,i ), is dtotal T ( A ) r, i i ) ( d reader ( x) + dtag ) T i ) dcycle = x= 1 where T(A r,i ) is the number of cycles in a frame when reader r recognizes tags in A r,i, d reader (x) is the delay of delivering the xth query (or feedback), d tag is the delay of delivering the tag ID, and d cycle is the average delay of the reading cycle. The identification delay is determined by T(A r,i ). (3) Figure 5. Tag identification of ABS. (a) Tag identification in the first frame when there are three tags. (b) Tag identification in the second frame when tag D is an arriving tag. (c) Tag identification in the third frame when tag B becomes a leaving tag. 207

7 Let a x denote tag x. Assume that tags have unique b-bit IDs and A r,i has n tags, i.e., A r,i = {a 1, a 2,, a n }. Let B arrive = {a n+1, a n+2,, a n+α } be the set of arriving tags in the i+1th frame of reader r and B leave = {a f(1), a f(2),, a f(β) } (1 f(x) n, 1 β n) be the set of leaving tags in the i+1th frame of reader r. As described in the previous section, AQS uses tag IDs for the splitting procedure like QT. We analyze the worst case identification delay of AQS through the derivation of the identification delay of QT. Lemma 1: Let us define C QT (A r,i ) as the number of collision cycles in the ith frame when reader r recognizes A r,i under QT. For given C QT (A r,i ), the identification delay of QT, T QT (A r,i ), is T QT i ) = 2CQT i ) + 1 (4) Proof: In the tree of tag identification at QT, only a node of a collision cycle has two child nodes, since a tag set is split into two subsets only in the collision cycle. Therefore, the tree of tag identification at QT is a full binary tree and all the intermediate nodes in the tree correspond to collision cycles. Lemma 2: When the length of the tag ID is b bits and A r,i has n tags, TQT i ) = n( b + 2 log 2 n) 3 (5) Proof: By lemma 1, the worst case in the identification delay of QT is that collisions are most numerous. Since tags have unique b-bit IDs, two tag IDs can, at most, equal first b-1 bits except the last bit. At this time, two tags make b-1 collisions. In depth k of the tree, a node can be a collision cycle when more than one tag selects it for transmission. The maximum number of collision cycles in depth k of the tree when reader r recognizes n tags under QT, C QT (n, k) is k 2 CQT ( n, k) = n / 2 (0 < k log 2 n 1) (log 2 n 1 < k < b) b 1 CQT i ) CQT ( n, k) k= 1 log2 n 1 b 1 k n = k = 1 k= log2 n n ( b + 2 log 2 n) 2 2 From lemma 1, (5) is derived. Theorem 3: Let T AQS (A r,i+1 A r,i ) be the number of cycles in the i+1th frame when reader r recognizes A r,i+1 under AQS after it has recognized A r,i in the last frame. When A r,i+1 = A r,i + B arrive, TAQS i + Barrive Ar, i ) (8) ( n + α ){ b + 2 log 2 ( n + α )} ( n + 2) Proof: Suppose that there exist two readers and they attempt to recognize A r,i+1 under QT and AQS, respectively. Tag identification at QT starts at the l-level nodes in the tree. On the other hand, Tag identification at AQS starts from the leaf nodes in the tree of (6) (7) the ith frame. Since A r,i A r,i+1, the tree of the ith frame at QT is the part of the tree of the i+1th frame at QT. From lemma 2, TAQS i+ 1 Ar, i ) = TQT i+ 1) CQT i ) ( n + α ){ b + 2 log 2 ( n + α )} 3 ( n 1) (9) because the minimum value of C QT (A r,i ) is n-1 when the ith frame has no idle cycle. When there is no leaving tag, AQS reduces at least n-1 cycles compared with QT. Theorem 4: When A r,i+1 = A r,i + B arrive B leave, TAQS i+ 1 Ar, i ) ( n + α ){ b + 2 log 2 ( n + α )} ( n + 2) (10) Proof: AQS is able to eliminate unnecessary idle cycles after the reader has detected nonexistence of tags. However, reader r does not know leaving tags before the i+1th frame. Therefore, T AQS i + B = T arrive AQS B leave i + B Theorem 4 is derived from (8). Ar, i ) arrive Ar, i ) (11) We analyze the average case in identification delay of ABS because the performance of ABS is determined by random numbers. Lemma 3: The number of collision cycles in the ith frame when reader r recognizes A r,i under BT, C BT (A r,i ), is k k ( 2 + n 1)( 1 ) k BT i ) = 2 2 k= 0 n 1 C (12) Proof: A frame of BT can be represented in a binary tree. Let E BT (n, k), R BT (n, k) and C BT (n, k) be the number of idle cycles, readable cycles and collision cycles, respectively, in depth k of the binary tree when BT recognizes n tags. Since the number of nodes in depth k of the binary tree is 2 k, E BT (n, k) = 2 k (1-2 -k ) n and R BT (n, k) = n(1-2 -k ) n-1. C BT ( Ar, i ) = CBT ( n, k) k = 0 = BT k = 0 k k = 2 2 k = 0 k { 2 E ( n, k) R ( n, k )} BT k n k ( 1 2 ) n( 1 2 ) n 1 (13) Lemma 4: The number of cycles in the ith frame when reader r recognizes A r,i under BT, T BT (A r,i ), is k k ( 2 + n 1)( 1 ) k BT i ) = k = 0 n 1 T (14) Proof: Lemma 1 is also applied into tag identification at BT. As a result, every intermediate node in the binary tree corresponds to the collision cycle and hence 208

8 T BT i ) = 1 + 2CBT i ) (15) Lemma 4 is derived from (12) and (15). Theorem 5: Let T ABS (A r,i+1 A r,i ) be the number of cycles in the i+1th frame when reader r recognizes A r,i+1 under ABS after it has recognized A r,i in the ith frame. When A r,i+1 = A r,i + B arrive B leave, TABS i+ 1 Ar, i ) = n k n 2 k = 0 αβ 1 n k ( 1 2 ) k = 0 α / n 1 1 k k ( 2αn 2 + 3)( 1 2 ) α / n (16) Proof: When there exist n tags in the ith frame, ABS makes n tag sets before the beginning of the i+1th frame. Each set has a staying tag or a leaving tag. Among n sets, n β sets include staying tags and β sets include leaving tags. Without loss of generality, assume that arriving tags select a set randomly. Arriving tags in B arrive are assigned to n sets uniformly. Since BT and ABS have the same splitting procedure, TABS i + Barrive Bleave Ar+ i ) = ( n β ) TBT 1 1 ( 1+ αn ) + β T ( αn ) Theorem 5 is derived by (14) and (17). BT (17) 7. PERFORMANCE EVALUATION We evaluate the performance of AQS and ABS compared to BT and QT. To measure the efficiency of tag identification in the tree based protocols, we consider the following aspects. The number of collisions: We measure the number of collisions between tag-to-reader signals. Collision defers identification and increases power consumption of tags. The number of idle cycles: The idle cycle is a factor of identification delay. Identification delay: We measure the total delay for recognizing all tags by the cycle. Fast identification is the most significant factor in the tree based anti-collision protocols because they do not cause tag starvation problem. Tag communication overhead: This metric is the average number of bits transmitted by a tag in a frame. This influences the amount of power consumption. Due to lack of power source in tags, this must be low. 7.1 Simulation Setup The simulation setup is shown in Table 1. To avoid the reader collision problem [3], we place readers such that their reading ranges do not intersect. To appreciate the impact of tag s mobility, we define Meter Per Frame (MPF). Let MPF(a) denote MPF of tag a. MPF(a) is given by ma ( t1, t2) MPF ( a) = (m/frame) F ( t, t ) p where m a (t 1, t 2 ) is the distance that tag a moves in the time interval [t 1, t 2 ] and F p (t 1, t 2 ) is the number of frames executed by protocol p in the interval [t 1, t 2 ]. By MPF, we can ensure that tree based protocols recognize the same tags in any frame. In our 1 2 Table 1. Simulation setup Parameter Table 2. Simulation scenarios Value Simulation Area 100 m 100 m Number of readers 100 Identification range of the reader 3 m Number of tags 1000 Tag ID Randomly selected 96-bit ID Maximum Meter Per Frame (MFP) 2 m/frame U a A i r s r a Scenario I ~ 1 0 Scenario II ~ Scenario III ~ 1 Scenario IV ~ 1 simulations, initial positions and destinations of tags are randomly selected under the simulation area. A tag moves from its initial position toward its destination with MPF, which is randomly selected from 0 to the maximum MPF. 7.2 Impact of Staying Tags and Arriving Tags First, we simulate tree based protocols with a single reader while varying the number of staying tags and arriving tags. Let U be the set of all tags in the simulation area and let A i be the set of tags recognized in the ith frame. We measure the performance in the i+1th frame by changing the ratio of staying tags to A i, denoted by r s and the ratio of arriving tags to U A i, denoted by r a. We place 100 tags in the simulation area and only 50 tags of them sojourn within the reader s range in the ith frame. We consider four scenarios according to the values of r s and r a as shown Table 2. Figure 6 and Table 3 depict the simulation results about the four scenarios. In the first scenario, there is no arriving tag. From Figure 6(a) and Table 3, we can see that AQS and ABS achieve collision-less tag identification. They do not allocate more than one staying tag to the same set to block collisions between staying tags. On the other hand, as the number of staying tags increases, tag collisions occur more frequently in BT and QT. Figure 6(b) illustrates that identification delay of ABS is the shortest of all protocols at high ratios of staying tags, while it is slower than BT and QT at ratios less than 0.3 because of idle cycles produced by leaving tags. AQS has longer delay than ABS because the reader transmits additional queries for covering all possible ranges of ID. The second scenario is tag identification with increasing the fraction of staying tags when some arriving tags exist. Though AQS and ABS eliminate collisions between staying tags, they cannot completely block collisions by arriving tags as shown in Figure 6(d) and Figure 6(e). As the fraction of staying tags increases, collisions between staying tags overwhelm collisions by arriving tags and the superiority of identification delay of AQS and ABS becomes stronger. 209

9 (a) Collisions (r a =0) (b) Identification delay (r a =0) (c) Tag communication overhead (r a =0) (d) Collisions (r a =0.5) (e) Identification delay (r a =0.5) (f) Tag communication overhead (r a =0.5) (g) Collisions (r s =0) (h) Identification delay (r s =0) (i) Tag communication overhead (r s =0) (j) Collisions (r s =0.5) (k) Identification delay (r s =0.5) (l) Tag communication overhead (r s =0.5) Figure 6. The simulation results according to the values of r s and r a Figure 6(g), Figure 6(h) and Figure 6(i) show the results when there is no staying tag. Though tag identification of AQS and ABS lead to fewer collisions, idle cycles in AQS and ABS cause delay. Since collisions between staying tags do not occur, the increment of idle cycles is more than the decrement of collisions at low ratios of arriving tags. This scenario shows the worst case of adaptive splitting protocols, but it is unreal. The fourth scenario is tag identification while increasing the fraction of arriving tags, where there are some staying tags. The results in Figure 6(j) and Figure 6(k) show faster identification of AQS and ABS than BT and QT in spite of additional idle cycles created by leaving tags. Additionally, the decrement of collisions involves low communication overhead at a tag in all the scenarios. 210

10 Table 3. Average number of reading cycles according to the ratio of staying tags and the ratio of arriving tags Scenario I Scenario II Scenario III Scenario IV Protocol Collisions Idle cycles Total cycles BT QT AQS ABS BT QT AQS ABS BT QT AQS ABS BT QT AQS ABS (a) Collisions (b) Idle cycles 7.3 Impact of the Number of Tags Figure 7 shows the simulation results obtained by changing the number of tags. As the number of tags increases, the identification delay gets longer and tag collisions occur more often. BT and QT show comparable delay curves. By restraining the occurrence of collisions, AQS and ABS have shorter delay than BT and QT. Small collisions activate small tag communication overhead. ABS has the shortest delay because it eliminates many idle cycles. AQS generates more idle cycles than others due to additional queries in order to guarantee recognizing all tags. On the other hand, AQS make less collision than ABS. In AQS, many idle cycles prevent arriving tags from colliding with staying tags and reduce the tag communication overhead. 7.4 Impact of Tag Movement We evaluate the performance by increasing the tag velocity. Figure 8 presents the simulation result obtained by varying the maximum MPF. We normalize the measured values by dividing by the number of tags. When tags move at low speeds, AQS and ABS outperform BT and QT considerably. Tags would like to be staying tags, and AQS and ABS eliminate collisions between staying tags perfectly. There is no collision when the maximum MPF is 0. As tags move faster, the performance of AQS and ABS deteriorates. When the maximum MPF is more than 6 m/frame, AQS has longer delay then QT. At high speed, there are few staying tags and collisions between staying tags at BT and QT hardly occur. Additionally, adaptive splitting protocols generate more idle cycles than BT and QT because leaving tags increase and a cycle of a leaving tag is inclined to be idle. Hence, AQS and ABS show the performance similar to BT and QT at high speed. (c) Identification delay (d) Tag communication overhead Figure 7. Performance comparison with varying the number of tags 7.5 Impact of the Similarity of ID For the purpose of another comparison, we evaluate the impact of the similarity among IDs. QT and AQS may be influenced by the distribution of IDs because they use tag ID for splitting a tag set. To quantify the similarity of IDs, we define an identical bit. If the identical bit is γ and each tag has a 96-bit ID, ID is depicted by x 1 x 2 x γ x γ+1 x 96 (x i is a binary digit, 1 γ < 96) and all tags have the same x 1 x 2 x γ. Figure 9 gives the simulation results for various identical bits from 0 (IDs are completely randomly selected) to 80. We normalize the measured values by dividing by the 211

11 (a) Collisions (a) Collisions (b) Idle cycles (b) Idle cycles (c) Identification delay (c) Identification delay (d) Tag communication overhead Figure 8. Impact of tag mobility (d) Tag communication overhead Figure 9. Impact of ID distribution number of tags. As the identical bit increases, QT rapidly degenerates as expected. QT has the highest communication overhead because the reader transmits all queries causing collisions in every frame. On the other hand, the performance of AQS is not seriously affected by the similarity of IDs though it uses tag ID. Since candidate queue CQ excludes queries of collision cycles of the last frame, AQS uses a collision query only once. However, as the identical bit increases, the tree has more leaf nodes and, consequently, identification delay of AQS is longer. ABS and BT are not affected by the identical bit because they do not use the patterns of IDs. As in the previous scenario, ABS shows the shortest identical delay. 8. CONCLUSION Tag collision is a major factor in deferring tag identification of RFID systems. In this paper, adaptive tag anti-collision protocols for passive tags have been proposed and evaluated. We develop novel and enhanced tree based protocols to reduce the number of collisions by exploiting information obtained from the last process of tag identification. The key institution behind our proposed approach is that in most applications employing RFID tags, the set of objects encountered in successive readings from a particular reader does not change substantially, and information from one reading can be used for the next. A simulation based evaluation 212

12 shows that AQS and ABS significantly reduce delay and communication overhead for the tag reading process. 9. ACKNOWLEDGMENTS This work was jointly supported by a grant from SK Telecom, Korea [Project No. KU-R040572] and by a grant by KOSEF [Grant No. R ]. Corresponding Author: Wonjun Lee ( wlee@korea.ac.kr). 10. REFERENCES [1] C. Floerkemeier and M. Lampe, Issues with RFID usage in ubiquitous computing applications, Proc. 2nd Int'l Conf. Pervasive Computing, LNCS 3001, pp , [2] C. Law, K. Lee and K.-Y. Siu, Efficient memoryless protocol for tag identification, Proc. 4th Int'l Workshop Discrete Algorithms and Methods for Mobile Computing and Communications, pp , Boston, Massachusetts, USA, Aug [3] D. W. Engels and S. E. Sarma, The reader collision problem, Proc. IEEE Int'l Conf. System, Man and Cybernetics, Hammamet, Tunisie, Oct [4] EPCTM radio-frequency identification protocols class-1 generation-2 UHF RFID protocol for communications at 860MHz-960MHz version 1.0.8, EPCglobal, Dec [5] F. C. Schoute, Dynamic frame length ALOHA, IEEE Trans. Comm., COM-31(4): , Apr [6] F. Zhou, C. Chen, D. Jin, C. Huang and H. Min, Evaluating and optimizing power consumption of anti-collision protocols for applications in RFID systems, Proc. Int'l Symp. Low Power Electronics and Design, Newport Beach, California, USA, Aug [7] H. Vogt, Efficient object identification with passive RFID tags, Proc. Int'l Conf. Pervasive computing, LNCS 2414, pp , Apr [8] I. E. Teletar and R. G. Gallager, Combining queuing theory and information theory for multiaccess, IEEE J. Selected Areas Communication, vol. 13, pp , Aug [9] Information technology automatic identification and data capture techniques radio frequency identification for item management air interface - part 6: parameters for air interface communications at MHz, Final Draft International Standard ISO , Nov [10] J. E. Wieselthier, A. Ephremides and L. A. Michaels, An exact analysis and performance evaluation of framed ALOHA with capture, IEEE Trans. Comm., COM- 38(2): , [11] J. I. Capetanakis, Tree algorithms for packet broadcast channels, IEEE Trans. Information Theory, IT-25(5): , Sept [12] J. Moseley and P. Humblet, A class of efficient contention resolution algorithms for multiple access channels, IEEE Trans. Communications, vol. COM-33, pp , [13] J. Zhai and G. Wang, An anti-collision algorithm using twofunctioned estimation for RFID tags, Proc. Int'l Conf. Computational Science and its Applications, May [14] K. Finkenzeller, RFID handbook: fundamentals and applications in contactless smart cards and identification, John Wiley & Sons, [15] N. Abramson, The aloha system- another alternative for computer communications, Proc. Fall Joint Computer Conf., AFIPS Conf., vol. 37, pp , [16] Philips I*Code1 System Design Guide Application Note AN00025, Philips Semiconductors, [17] R. Metcalfe, Steady state analysis of a slotted and controlled Aloha system with blocking, Proc. 6th Hawaii Conf. System Science, Honolulu, HI, [18] R. Rao and A. Ephremides, On the stability of interacting queues in a multiple-access system, IEEE Trans. Inform. Theory, vol. 34, pp , [19] S. A. Weis, S. E. Sarma, R. L. Rivest and D. W. Engels, Security and privacy aspects of low-cost radio frequency identification systems, Proc. First Annual Conf. Security in Pervasive Computing, LNCS 2802, pp , Mar [20] S. Lam and L. Kleinrock, Packet switching in a multi access broadcast channel: Dynamic control procedures, IEEE Trans. Automat. Contr., vol. AC-27, pp , [21] T. A. Scharfeld, An analysis of the fundamental constraints on low cost passive radio-frequency identification system design, M.S. thesis, Massachusetts Institute of Technology, pp , Aug [22] UCODE, Philips Semiconductors, [23] V. Anatharam, The stability region of the finite-user slotted ALOHA protocol, IEEE Trans. Inform. Theory, vol. 37,

A Memory Efficient Anti-Collision Protocol to Identify Memoryless RFID Tags

A Memory Efficient Anti-Collision Protocol to Identify Memoryless RFID Tags J Inf Process Syst, Vol., No., pp.95~3, March 25 http://dx.doi.org/.3745/jips.3. ISSN 976-93X (Print) ISSN 292-85X (Electronic) A Memory Efficient Anti-Collision Protocol to Identify Memoryless RFID Tags

More information

Dynamic Tag Estimation for Optimizing Tree Slotted Aloha in RFID Networks

Dynamic Tag Estimation for Optimizing Tree Slotted Aloha in RFID Networks Dynamic Tag Estimation for Optimizing Tree Slotted Aloha in RFID Networks Gaia Maselli, Chiara Petrioli, Claudio Vicari Computer Science Department Rome University La Sapienza, Italy {maselli, petrioli,

More information

Dynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System

Dynamic Framed Slotted ALOHA Algorithms using Fast Tag Estimation Method for RFID System Dynamic Framed Slotted AOHA Algorithms using Fast Tag Estimation Method for RFID System Jae-Ryong Cha School of Electrical and Computer Engineering Ajou Univ., Suwon, Korea builder@ajou.ac.kr Jae-Hyun

More information

RFID Systems, an Introduction Sistemi Wireless, a.a. 2013/2014

RFID Systems, an Introduction Sistemi Wireless, a.a. 2013/2014 RFID Systems, an Introduction Sistemi Wireless, a.a. 2013/2014 Un. of Rome La Sapienza Chiara Petrioli, Gaia Maselli Department of Computer Science University of Rome Sapienza Italy RFID Technology Ø RFID

More information

Double Time Slot RFID Anti-collision Algorithm based on Gray Code

Double Time Slot RFID Anti-collision Algorithm based on Gray Code Double Time Slot RFID Anti-collision Algorithm based on Gray Code Hongwei Deng 1 School of Computer Science and Technology, Hengyang Normal University; School of Information Science and Engineering, Central

More information

ANALYTICAL EVALUATION OF RFID IDENTIFICATION PROTOCOLS. Gaia Maselli

ANALYTICAL EVALUATION OF RFID IDENTIFICATION PROTOCOLS. Gaia Maselli ANALYTICAL EVALUATION OF RFID IDENTIFICATION PROTOCOLS Gaia Maselli maselli@di.uniroma1.it 2 RFID Technology Ø RFID - Radio Frequency Identification Technology enabling automatic object identification

More information

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques

Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques 1 Improving Reader Performance of an UHF RFID System Using Frequency Hopping Techniques Ju-Yen Hung and Venkatesh Sarangan *, MSCS 219, Computer Science Department, Oklahoma State University, Stillwater,

More information

2. RFID COLISSION AND INTERFERENCE PROBLEMS 1. INTRODUCTION /07/$ IEEE

2. RFID COLISSION AND INTERFERENCE PROBLEMS 1. INTRODUCTION /07/$ IEEE Radio Frequency Identification (RFID): Evaluation of the Technology supporting the Development of Program Latihan Khidmat Negara (PLKN) Participants Tracking Application 1 Datuk Prof. Ishak Ismail, 2 George

More information

Dynamic Framed-Slot ALOHA Anti-Collision using Precise Tag Estimation Scheme

Dynamic Framed-Slot ALOHA Anti-Collision using Precise Tag Estimation Scheme Dynamic Framed-Slot ALOHA Anti-Collision using Precise Tag Estimation Scheme Author Pupunwiwat, Prapassara, Stantic, Bela Published 2010 Conference Title Twenty-First Australasian Database Conference (ADC2010)

More information

Analysis of energy consumption for multiple object identification system with active RFID tags

Analysis of energy consumption for multiple object identification system with active RFID tags WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2008; 8:953 962 Published online 18 September 2007 in Wiley InterScience (www.interscience.wiley.com).552 Analysis of energy consumption

More information

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers

DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers DiCa: Distributed Tag Access with Collision-Avoidance among Mobile RFID Readers Kwang-il Hwang, Kyung-tae Kim, and Doo-seop Eom Department of Electronics and Computer Engineering, Korea University 5-1ga,

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

A Novel Anti-Collision Algorithm for High-Density RFID Tags

A Novel Anti-Collision Algorithm for High-Density RFID Tags A Novel Anti-Collision Algorithm for High-Density RFID s 33 A Novel Anti-Collision Algorithm for High-Density RFID s Sarawut Makwimanloy 1, Piya Kovintavewat 2, Urachada Ketprom 3, and Charturong Tantibundhit

More information

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS

TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS TIME- OPTIMAL CONVERGECAST IN SENSOR NETWORKS WITH MULTIPLE CHANNELS A Thesis by Masaaki Takahashi Bachelor of Science, Wichita State University, 28 Submitted to the Department of Electrical Engineering

More information

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks

Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Scheduling Data Collection with Dynamic Traffic Patterns in Wireless Sensor Networks Wenbo Zhao and Xueyan Tang School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:

More information

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode

RFID Multi-hop Relay Algorithms with Active Relay Tags in Tag-Talks-First Mode International Journal of Networking and Computing www.ijnc.org ISSN 2185-2839 (print) ISSN 2185-2847 (online) Volume 4, Number 2, pages 355 368, July 2014 RFID Multi-hop Relay Algorithms with Active Relay

More information

PAPER Novel Dynamic Framed-Slotted ALOHA Using Litmus Slots in RFID Systems

PAPER Novel Dynamic Framed-Slotted ALOHA Using Litmus Slots in RFID Systems IEICE TRANS. COMMUN., VOL.E95 B, NO.4 APRIL 2012 1375 PAPER Novel Dynamic Framed-Slotted ALOHA Using Litmus Slots in RFID Systems Soon-Bin YIM, Jongho PARK, Nonmembers, and Tae-Jin LEE a), Member SUMMARY

More information

840 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 7, NO. 4, OCTOBER 2010

840 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 7, NO. 4, OCTOBER 2010 840 IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, VOL. 7, NO. 4, OCTOBER 2010 Efficient Estimation and Collision-Group-Based Anticollision Algorithms for Dynamic Frame-Slotted ALOHA in RFID

More information

An Empirical Study of UHF RFID Performance. Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof.

An Empirical Study of UHF RFID Performance. Michael Buettner and David Wetherall Presented by Qian (Steve) He CS Prof. An Empirical Study of UHF RFID Performance Michael Buettner and David Wetherall Presented by Qian (Steve) He CS 577 - Prof. Bob Kinicki Overview Introduction Background Knowledge Methodology and Tools

More information

Managing the Number of Tag Bits Transmitted in a Bit-Tracking RFID Collision Resolution Protocol

Managing the Number of Tag Bits Transmitted in a Bit-Tracking RFID Collision Resolution Protocol Sensors 24, 4, -27; doi:.339/s4 Article OPEN ACCESS sensors ISSN 424-822 www.mdpi.com/journal/sensors Managing the Number of Tag Bits Transmitted in a Bit-Tracking RFID Collision Resolution Protocol Hugo

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification

Politecnico di Milano Advanced Network Technologies Laboratory. Radio Frequency Identification Politecnico di Milano Advanced Network Technologies Laboratory Radio Frequency Identification 1 RFID in Nutshell o To Enhance the concept of bar-codes for faster identification of assets (goods, people,

More information

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks

Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Performance of ALOHA and CSMA in Spatially Distributed Wireless Networks Mariam Kaynia and Nihar Jindal Dept. of Electrical and Computer Engineering, University of Minnesota Dept. of Electronics and Telecommunications,

More information

TSIN01 Information Networks Lecture 9

TSIN01 Information Networks Lecture 9 TSIN01 Information Networks Lecture 9 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 26 th, 2017 Danyo Danev TSIN01 Information

More information

Power-conscious High Level Synthesis Using Loop Folding

Power-conscious High Level Synthesis Using Loop Folding Power-conscious High Level Synthesis Using Loop Folding Daehong Kim Kiyoung Choi School of Electrical Engineering Seoul National University, Seoul, Korea, 151-742 E-mail: daehong@poppy.snu.ac.kr Abstract

More information

Framed ALOHA for Multiple RFID Objects Identification

Framed ALOHA for Multiple RFID Objects Identification IEICE TRANS. COMMUN., VOL.E88 B, NO.3 MARCH 2005 991 PAPER Special Section on Ubiquitous Networks Framed ALOHA for Multiple RFID Objects Identification Bin ZHEN a), Mamoru KOBAYASHI b), Nonmembers, and

More information

PULSE: A MAC Protocol for RFID Networks

PULSE: A MAC Protocol for RFID Networks PULSE: A MAC Protocol for RFID Networks Shailesh M. Birari and Sridhar Iyer K. R. School of Information Technology Indian Institute of Technology, Powai, Mumbai, India 400 076. (e-mail: shailesh,sri@it.iitb.ac.in)

More information

An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag Identification

An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag Identification An Energy-Oriented Collision Arbitration Protocol for Passive RFID Tag Identification Kyongjin Sok 1, Prof. Gon Hong 1, Kwangnam Choe 2, Kinam Sin 3, Changho Kim 4, Chongil Rim 5 1Institute of Information

More information

Dynamic Radio Resource Allocation for Group Paging Supporting Smart Meter Communications

Dynamic Radio Resource Allocation for Group Paging Supporting Smart Meter Communications IEEE SmartGridComm 22 Workshop - Cognitive and Machine-to-Machine Communications and Networking for Smart Grids Radio Resource Allocation for Group Paging Supporting Smart Meter Communications Chia-Hung

More information

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks

Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Utilization Based Duty Cycle Tuning MAC Protocol for Wireless Sensor Networks Shih-Hsien Yang, Hung-Wei Tseng, Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks

Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Energy-Efficient Duty Cycle Assignment for Receiver-Based Convergecast in Wireless Sensor Networks Yuqun Zhang, Chen-Hsiang Feng, Ilker Demirkol, Wendi B. Heinzelman Department of Electrical and Computer

More information

Multiple Access Methods

Multiple Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Multiple Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 16.11.2004 Content of presentation Protocol

More information

IoT: lecture 2. Gaia Maselli Dept. of Computer Science. Internet of Things A.A

IoT: lecture 2. Gaia Maselli Dept. of Computer Science. Internet of Things A.A IoT: lecture 2 Gaia Maselli Dept. of Computer Science Internet of Things A.A. 17-18 1 Course info Course web page twiki.di.uniroma1.it/twiki/view/reti_avanzate/internetofthings1718 Additional lecturers

More information

An Anti-Collision Algorithm for RFID Based on an Array and Encoding Scheme

An Anti-Collision Algorithm for RFID Based on an Array and Encoding Scheme information Article An Anti-Collision Algorithm for RFID Based on an Array and Encoding Scheme Baolong Liu * and Xiaohao Su School Computing Science & Engineering, Xi an Technological University, Xi an

More information

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

Transmission Scheduling in Capture-Based Wireless Networks

Transmission Scheduling in Capture-Based Wireless Networks ransmission Scheduling in Capture-Based Wireless Networks Gam D. Nguyen and Sastry Kompella Information echnology Division, Naval Research Laboratory, Washington DC 375 Jeffrey E. Wieselthier Wieselthier

More information

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study

Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Distributed Power Control in Cellular and Wireless Networks - A Comparative Study Vijay Raman, ECE, UIUC 1 Why power control? Interference in communication systems restrains system capacity In cellular

More information

A survey on broadcast protocols in multihop cognitive radio ad hoc network

A survey on broadcast protocols in multihop cognitive radio ad hoc network A survey on broadcast protocols in multihop cognitive radio ad hoc network Sureshkumar A, Rajeswari M Abstract In the traditional ad hoc network, common channel is present to broadcast control channels

More information

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control

Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Simple, Optimal, Fast, and Robust Wireless Random Medium Access Control Jianwei Huang Department of Information Engineering The Chinese University of Hong Kong KAIST-CUHK Workshop July 2009 J. Huang (CUHK)

More information

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review

Outline. EEC-484/584 Computer Networks. Homework #1. Homework #1. Lecture 8. Wenbing Zhao Homework #1 Review EEC-484/584 Computer Networks Lecture 8 wenbing@ieee.org (Lecture nodes are based on materials supplied by Dr. Louise Moser at UCSB and Prentice-Hall) Outline Homework #1 Review Protocol verification Example

More information

A survey and tutorial of RFID anti-collision protocols

A survey and tutorial of RFID anti-collision protocols University of Wollongong Research Online Faculty of Informatics - Papers (Archive) Faculty of Engineering and Information Sciences 2010 A survey and tutorial of RFID anti-collision protocols Dheeraj K.

More information

Anti-collision Scheme Analysis of RFID System

Anti-collision Scheme Analysis of RFID System Anti-collision Scheme Analysis of RFID System Zhongxiang Wang, Dan Liu, Xiaofang Zhou, Xi Tan, Junyu Wang, Hao Min Auto-ID Labs White Paper WP-HARDWARE-045 Zhongxiang Wang M.S. student Auto-ID Lab at Fudan

More information

Anti-Collision RFID System Based on Combination of TD and Gold Code Techniques

Anti-Collision RFID System Based on Combination of TD and Gold Code Techniques , pp.78-83 http://dx.doi.org/10.14257/astl.2015.95.15 Anti-Collision RFID System Based on Combination of TD and Gold Code Techniques Grishma Khadka 1, Tae-yun Kim 2, Suk-seung Hwang 3 1 Dept. of Advanced

More information

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks

Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Mobility Tolerant Broadcast in Mobile Ad Hoc Networks Pradip K Srimani 1 and Bhabani P Sinha 2 1 Department of Computer Science, Clemson University, Clemson, SC 29634 0974 2 Electronics Unit, Indian Statistical

More information

Lecture 5. RFID Technologies

Lecture 5. RFID Technologies Lecture 5 RFID Technologies What s RFID and What s It for? RFID Categories and Working Mechanisms RFID Frequencies and Features RFID Anti-Collision Techniques What is RFID - Video 1 Object Auto-Identification

More information

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn

Increasing Broadcast Reliability for Vehicular Ad Hoc Networks. Nathan Balon and Jinhua Guo University of Michigan - Dearborn Increasing Broadcast Reliability for Vehicular Ad Hoc Networks Nathan Balon and Jinhua Guo University of Michigan - Dearborn I n t r o d u c t i o n General Information on VANETs Background on 802.11 Background

More information

Joint Relaying and Network Coding in Wireless Networks

Joint Relaying and Network Coding in Wireless Networks Joint Relaying and Network Coding in Wireless Networks Sachin Katti Ivana Marić Andrea Goldsmith Dina Katabi Muriel Médard MIT Stanford Stanford MIT MIT Abstract Relaying is a fundamental building block

More information

ScienceDirect. Optimal Placement of RFID Antennas for Outdoor Applications

ScienceDirect. Optimal Placement of RFID Antennas for Outdoor Applications Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 34 (2014 ) 236 241 The 9th International Conference on Future Networks and Communications (FNC-2014) Optimal Placement

More information

A New Design for WDM Packet Switching Networks with Wavelength Conversion and Recirculating Buffering

A New Design for WDM Packet Switching Networks with Wavelength Conversion and Recirculating Buffering A New Design for WDM Packet Switching Networks with Wavelength Conversion and Recirculating Buffering Zhenghao Zhang and Yuanyuan Yang Department of Electrical & Computer Engineering State University of

More information

Analysis of BFSA Based Anti-Collision Protocol in LF, HF, and UHF RFID Environments

Analysis of BFSA Based Anti-Collision Protocol in LF, HF, and UHF RFID Environments UNF Digital Commons UNF Theses and Dissertations Student Scholarship 2014 Analysis of BFSA Based Anti-Collision Protocol in LF, HF, and UHF RFID Environments Varun Bhogal University of North Florida Suggested

More information

On the Suitability of Framed Slotted Aloha based RFID Anti-collision Protocols for Use in RFID-Enhanced WSNs

On the Suitability of Framed Slotted Aloha based RFID Anti-collision Protocols for Use in RFID-Enhanced WSNs 1 On the Suitability of Framed Slotted Aloha based RFID Anti-collision Protocols for Use in RFID-Enhanced WSNs Dheeraj K. Klair, Kwan-Wu Chin and Raad Raad School of Electrical, Computer and Telecommunications

More information

Fast RFID Polling Protocols

Fast RFID Polling Protocols Fast RFID Polling Protocols Jia Liu, Bin Xiao, Xuan Liu and Lijun Chen State Key Laboratory for Novel Software Technology, Nanjing University, China Department of Computing, The Hong Kong Polytechnic University,

More information

Cardinality Estimation for Large-scale RFID Systems

Cardinality Estimation for Large-scale RFID Systems IEEE TRANSACTION ON, VOL., NO., MON YEAR 1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Student Member, IEEE, Hoilun Ngan, Student Member, IEEE, Yunhao Liu, Senior Member, IEEE, Lionel

More information

Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness

Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness Fairness Matters: Identification of Active RFID Tags with Statistically Guaranteed Fairness Muhammad Shahzad Department of Computer Science North Carolina State University Raleigh, NC, USA mshahza@ncsu.edu

More information

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay

Stability Analysis for Network Coded Multicast Cell with Opportunistic Relay This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 00 proceedings Stability Analysis for Network Coded Multicast

More information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information

A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information A Comparative Study of Quality of Service Routing Schemes That Tolerate Imprecise State Information Xin Yuan Wei Zheng Department of Computer Science, Florida State University, Tallahassee, FL 330 {xyuan,zheng}@cs.fsu.edu

More information

Multi-Tag Radio Frequency Identification Systems

Multi-Tag Radio Frequency Identification Systems Multi-Tag Radio Frequency Identification Systems Leonid Bolotnyy University of Virginia Department of Computer Science Charlottesville, VA 22904 lb9xk@cs.virginia.edu Gabriel Robins University of Virginia

More information

Lecture 8: Media Access Control

Lecture 8: Media Access Control Lecture 8: Media Access Control CSE 123: Computer Networks Alex C. Snoeren HW 2 due NEXT WEDNESDAY Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing

More information

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks

Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks 1 Time-Efficient Protocols for Neighbor Discovery in Wireless Ad Hoc Networks Guobao Sun, Student Member, IEEE, Fan Wu, Member, IEEE, Xiaofeng Gao, Member, IEEE, Guihai Chen, Member, IEEE, and Wei Wang,

More information

Two Models for Noisy Feedback in MIMO Channels

Two Models for Noisy Feedback in MIMO Channels Two Models for Noisy Feedback in MIMO Channels Vaneet Aggarwal Princeton University Princeton, NJ 08544 vaggarwa@princeton.edu Gajanana Krishna Stanford University Stanford, CA 94305 gkrishna@stanford.edu

More information

Energy-Aware Tag Anti-Collision Protocols for RFID Systems

Energy-Aware Tag Anti-Collision Protocols for RFID Systems Energy-ware Tag nti-ollision Protocols for RID Systems Vinod Namboodiri, Lixin Gao Department of Electrical and omputer Engineering University of Massachusetts at mherst Email: {vnambood, lgao}@ecs.umass.edu

More information

Collision Avoidance in a Dense RFID Network

Collision Avoidance in a Dense RFID Network Collision Avoidance in a Dense RFID Network Shweta Jain Computer Science Department Stony Brook University Stony Brook, NY shweta@cs.sunysb.edu Samir R. Das Computer Science Department Stony Brook University

More information

Channel Sensing Order in Multi-user Cognitive Radio Networks

Channel Sensing Order in Multi-user Cognitive Radio Networks 2012 IEEE International Symposium on Dynamic Spectrum Access Networks Channel Sensing Order in Multi-user Cognitive Radio Networks Jie Zhao and Xin Wang Department of Electrical and Computer Engineering

More information

Analysis and Implementation of Scalable Clock Synchronization Protocols in IEEE Ad Hoc Networks

Analysis and Implementation of Scalable Clock Synchronization Protocols in IEEE Ad Hoc Networks Analysis and Implementation of Scalable Clock Synchronization Protocols in IEEE 802.11 Ad Hoc Networks Dong Zhou Ten-Hwang Lai Department of Computing and Information Science The Ohio State University

More information

Taxonomy and survey of RFID anti-collision protocols

Taxonomy and survey of RFID anti-collision protocols Computer Communications 29 (2006) 2150 2166 Short survey Taxonomy and survey of RFID anti-collision protocols Dong-Her Shih a, Po-Ling Sun a, David C. Yen b, *, Shi-Ming Huang c a Department of Information

More information

Decoding Distance-preserving Permutation Codes for Power-line Communications

Decoding Distance-preserving Permutation Codes for Power-line Communications Decoding Distance-preserving Permutation Codes for Power-line Communications Theo G. Swart and Hendrik C. Ferreira Department of Electrical and Electronic Engineering Science, University of Johannesburg,

More information

Multitree Decoding and Multitree-Aided LDPC Decoding

Multitree Decoding and Multitree-Aided LDPC Decoding Multitree Decoding and Multitree-Aided LDPC Decoding Maja Ostojic and Hans-Andrea Loeliger Dept. of Information Technology and Electrical Engineering ETH Zurich, Switzerland Email: {ostojic,loeliger}@isi.ee.ethz.ch

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

A Near-Optimal Dynamic Power Sharing Scheme for Self-Reconfigurable Modular Robots

A Near-Optimal Dynamic Power Sharing Scheme for Self-Reconfigurable Modular Robots A Near-Optimal Dynamic Power Sharing Scheme for Self-Reconfigurable Modular Robots Chi-An Chen, Thomas Collins, Wei-Min Shen Abstract This paper proposes a dynamic and near-optimal power sharing mechanism

More information

A High-Throughput Memory-Based VLC Decoder with Codeword Boundary Prediction

A High-Throughput Memory-Based VLC Decoder with Codeword Boundary Prediction 1514 IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS FOR VIDEO TECHNOLOGY, VOL. 10, NO. 8, DECEMBER 2000 A High-Throughput Memory-Based VLC Decoder with Codeword Boundary Prediction Bai-Jue Shieh, Yew-San Lee,

More information

Nonuniform multi level crossing for signal reconstruction

Nonuniform multi level crossing for signal reconstruction 6 Nonuniform multi level crossing for signal reconstruction 6.1 Introduction In recent years, there has been considerable interest in level crossing algorithms for sampling continuous time signals. Driven

More information

Configuring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging

Configuring the maximum number of external LSAs in LSDB 27 Configuring OSPF exit overflow interval 28 Enabling compatibility with RFC Logging Contents Configuring OSPF 1 Overview 1 OSPF packets 1 LSA types 1 OSPF areas 2 Router types 4 Route types 5 Route calculation 6 OSPF network types 6 DR and BDR 6 Protocols and standards 8 OSPF configuration

More information

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage

Lecture 8: Media Access Control. CSE 123: Computer Networks Stefan Savage Lecture 8: Media Access Control CSE 123: Computer Networks Stefan Savage Overview Methods to share physical media: multiple access Fixed partitioning Random access Channelizing mechanisms Contention-based

More information

Antenna efficiency calculations for electrically small, RFID antennas

Antenna efficiency calculations for electrically small, RFID antennas Antenna efficiency calculations for electrically small, RFID antennas Author Mohammadzadeh Galehdar, Amir, Thiel, David, O'Keefe, Steven Published 2007 Journal Title IEEE Antenna and Wireless Propagation

More information

Cardinality Estimation for Large-scale RFID Systems

Cardinality Estimation for Large-scale RFID Systems Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Department of Computer Science and Engineering Hong Kong University of Science and Technology {cqian, cpeglun,

More information

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1

Data Gathering. Chapter 4. Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Data Gathering Chapter 4 Ad Hoc and Sensor Networks Roger Wattenhofer 4/1 Environmental Monitoring (PermaSense) Understand global warming in alpine environment Harsh environmental conditions Swiss made

More information

Configuring OSPF. Information About OSPF CHAPTER

Configuring OSPF. Information About OSPF CHAPTER CHAPTER 22 This chapter describes how to configure the ASASM to route data, perform authentication, and redistribute routing information using the Open Shortest Path First (OSPF) routing protocol. The

More information

Detection Performance of Spread Spectrum Signatures for Passive, Chipless RFID

Detection Performance of Spread Spectrum Signatures for Passive, Chipless RFID Detection Performance of Spread Spectrum Signatures for Passive, Chipless RFID Ryan Measel, Christopher S. Lester, Yifei Xu, Richard Primerano, and Moshe Kam Department of Electrical and Computer Engineering

More information

CENTRALIZED BUFFERING AND LOOKAHEAD WAVELENGTH CONVERSION IN MULTISTAGE INTERCONNECTION NETWORKS

CENTRALIZED BUFFERING AND LOOKAHEAD WAVELENGTH CONVERSION IN MULTISTAGE INTERCONNECTION NETWORKS CENTRALIZED BUFFERING AND LOOKAHEAD WAVELENGTH CONVERSION IN MULTISTAGE INTERCONNECTION NETWORKS Mohammed Amer Arafah, Nasir Hussain, Victor O. K. Li, Department of Computer Engineering, College of Computer

More information

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels

Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels 734 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 49, NO. 4, APRIL 2001 Utilization of Multipaths for Spread-Spectrum Code Acquisition in Frequency-Selective Rayleigh Fading Channels Oh-Soon Shin, Student

More information

Design of Adaptive RFID Reader based on DDS and RC522 Li Yang, Dong Zhi-Hong, Cong Dong-Sheng

Design of Adaptive RFID Reader based on DDS and RC522 Li Yang, Dong Zhi-Hong, Cong Dong-Sheng International Conference on Applied Science and Engineering Innovation (ASEI 2015) Design of Adaptive RFID Reader based on DDS and RC522 Li Yang, Dong Zhi-Hong, Cong Dong-Sheng Beijing Key Laboratory of

More information

Simulcast Packet Transmission in Ad Hoc Networks

Simulcast Packet Transmission in Ad Hoc Networks Simulcast Packet Transmission in Ad Hoc Networks Kiung Jung and John M. Shea Wireless Information Networking Group Department of Electrical and Computer Engineering University of Florida Gainesville, FL

More information

Wireless Multicasting with Channel Uncertainty

Wireless Multicasting with Channel Uncertainty Wireless Multicasting with Channel Uncertainty Jie Luo ECE Dept., Colorado State Univ. Fort Collins, Colorado 80523 e-mail: rockey@eng.colostate.edu Anthony Ephremides ECE Dept., Univ. of Maryland College

More information

On Multi-Server Coded Caching in the Low Memory Regime

On Multi-Server Coded Caching in the Low Memory Regime On Multi-Server Coded Caching in the ow Memory Regime Seyed Pooya Shariatpanahi, Babak Hossein Khalaj School of Computer Science, arxiv:80.07655v [cs.it] 0 Mar 08 Institute for Research in Fundamental

More information

DIGITAL BASEBAND PROCESSOR DESIGN OF PASSIVE RADIO FREQUENCY IDENTIFICATION TAG FOR ULTRA WIDEBAND TRANSCEIVER

DIGITAL BASEBAND PROCESSOR DESIGN OF PASSIVE RADIO FREQUENCY IDENTIFICATION TAG FOR ULTRA WIDEBAND TRANSCEIVER DIGITAL BASEBAND PROCESSOR DESIGN OF PASSIVE RADIO FREQUENCY IDENTIFICATION TAG FOR ULTRA WIDEBAND TRANSCEIVER Nallapu Vasantha 1, S. Vidyarani 2 1 M. Tech Scholar (DECS), 2 Associate Professor (DIP) Nalanda

More information

Stabilization of Contention-Based CDMA Ranging Channel in Wireless Metropolitan Area Networks

Stabilization of Contention-Based CDMA Ranging Channel in Wireless Metropolitan Area Networks Stabilization of Contention-Based CDMA Ranging Channel in Wireless Metropolitan Area Networks Jeong-Jae Won 1, Choong-Ho Cho 2, Hyong-Woo Lee 3, and Victor C.M. Leung 1 1 Department of Electrical and Computer

More information

A10-Gb/slow-power adaptive continuous-time linear equalizer using asynchronous under-sampling histogram

A10-Gb/slow-power adaptive continuous-time linear equalizer using asynchronous under-sampling histogram LETTER IEICE Electronics Express, Vol.10, No.4, 1 8 A10-Gb/slow-power adaptive continuous-time linear equalizer using asynchronous under-sampling histogram Wang-Soo Kim and Woo-Young Choi a) Department

More information

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks

Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks Page 1 of 10 Throughput-optimal number of relays in delaybounded multi-hop ALOHA networks. Nekoui and H. Pishro-Nik This letter addresses the throughput of an ALOHA-based Poisson-distributed multihop wireless

More information

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes

Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes 7th Mediterranean Conference on Control & Automation Makedonia Palace, Thessaloniki, Greece June 4-6, 009 Distributed Collaborative Path Planning in Sensor Networks with Multiple Mobile Sensor Nodes Theofanis

More information

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks

Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Attack-Proof Collaborative Spectrum Sensing in Cognitive Radio Networks Wenkai Wang, Husheng Li, Yan (Lindsay) Sun, and Zhu Han Department of Electrical, Computer and Biomedical Engineering University

More information

Optimal Multicast Routing in Ad Hoc Networks

Optimal Multicast Routing in Ad Hoc Networks Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting

More information

A Novel Network Design and Operation for Reducing Transmission Power in Cloud Radio Access Network with Power over Fiber

A Novel Network Design and Operation for Reducing Transmission Power in Cloud Radio Access Network with Power over Fiber A Novel Networ Design and Operation for Reducing Transmission Power in Cloud Radio Access Networ with Power over Fiber 2015 IEEE. Personal use of this material is permitted. Permission from IEEE must be

More information

Path Delay Test Compaction with Process Variation Tolerance

Path Delay Test Compaction with Process Variation Tolerance 50.1 Path Delay Test Compaction with Process Variation Tolerance Seiji Kajihara Masayasu Fukunaga Xiaoqing Wen Kyushu Institute of Technology 680-4 Kawazu, Iizuka, 820-8502 Japan e-mail:{kajihara, fukunaga,

More information

Gateways Placement in Backbone Wireless Mesh Networks

Gateways Placement in Backbone Wireless Mesh Networks I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract

More information

Lecture 2. 1 Nondeterministic Communication Complexity

Lecture 2. 1 Nondeterministic Communication Complexity Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols

More information

Good Synchronization Sequences for Permutation Codes

Good Synchronization Sequences for Permutation Codes 1 Good Synchronization Sequences for Permutation Codes Thokozani Shongwe, Student Member, IEEE, Theo G. Swart, Member, IEEE, Hendrik C. Ferreira and Tran van Trung Abstract For communication schemes employing

More information

Lab/Project Error Control Coding using LDPC Codes and HARQ

Lab/Project Error Control Coding using LDPC Codes and HARQ Linköping University Campus Norrköping Department of Science and Technology Erik Bergfeldt TNE066 Telecommunications Lab/Project Error Control Coding using LDPC Codes and HARQ Error control coding is an

More information

Experiments on Alternatives to Minimax

Experiments on Alternatives to Minimax Experiments on Alternatives to Minimax Dana Nau University of Maryland Paul Purdom Indiana University April 23, 1993 Chun-Hung Tzeng Ball State University Abstract In the field of Artificial Intelligence,

More information

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols

A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols A Performance Comparison of Multi-Hop Wireless Ad Hoc Network Routing Protocols Josh Broch, David Maltz, David Johnson, Yih-Chun Hu and Jorjeta Jetcheva Computer Science Department Carnegie Mellon University

More information

A Very Fast and Low- power Time- discrete Spread- spectrum Signal Generator

A Very Fast and Low- power Time- discrete Spread- spectrum Signal Generator A. Cabrini, A. Carbonini, I. Galdi, F. Maloberti: "A ery Fast and Low-power Time-discrete Spread-spectrum Signal Generator"; IEEE Northeast Workshop on Circuits and Systems, NEWCAS 007, Montreal, 5-8 August

More information

Analysis of cognitive radio networks with imperfect sensing

Analysis of cognitive radio networks with imperfect sensing Analysis of cognitive radio networks with imperfect sensing Isameldin Suliman, Janne Lehtomäki and Timo Bräysy Centre for Wireless Communications CWC University of Oulu Oulu, Finland Kenta Umebayashi Tokyo

More information