• Title/Summary/Keyword: aloha protocol

Search Result 83, Processing Time 0.025 seconds

An Improved Backoff Algorithm for the Random Access Protocol for the Ranging Subchannel of IEEE 802.16 Networks (IEEE 802.16 환경의 레인징 부채널에서 랜덤액세스 프로토콜의 Backoff 알고리즘 성능 향상 기법)

  • Kwon, Jeong-Min;Lee, Hyong-Woo;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1267-1275
    • /
    • 2007
  • An improved backoff algorithm for retransmission randomization for OFDMA/CDMA/slotted ALOHA used in the ranging subchannel of IEEE 802.16 network is proposed. Exploiting the fact that a base station coordinates channel access using UL-/DL-MAP in the IEEE 802.16 networks, we propose a minor modification of the existing IEEE 802.16 in order to increase throughput, decrease delay variation and achieve a graceful performance degradation in case of overload channel condition of the random access protocol. The algorithm basically estimates the number of backlogged users and arrival rate using which, the BS calculates retransmission probability for the subscriber stations involved in a collision. Computer simulation is performed to demonstrate the effectiveness of the proposed algorithm and to compare the performance with existing binary exponential backoff algorithm.

Hybrid reservation request algorithm for dynamic reservation TDMA/TDD protocol (혼합 예약 요청 알고리즘을 이용한 동적 예약 TDMA/TDD 프로토콜)

  • 박선현;최덕규
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2001.05a
    • /
    • pp.132-132
    • /
    • 2001
  • 본 논문에서는 혼합예약요청(hybrid reservation request) 알고리즘을 적용한 새로운 동적 예약 TDMA 프로토콜을 제안한다. 제안된 혼합 예약 요청 알고리즘은 기존의 랜덤접속방식과 기지국의 중재 없이 단말간 직접 신호교환을 통하여 이웃 단말의 새로운 예약 요청을 대신 전송하는 방식을 혼합해서 사용하는 방법이다. 이 알고리즘은 기존 slotted-ALOHA 방식을 이용한 예약 요청의 비효율성을 개선하여 새로운 단말의 예약 요청실패로 인한 셀 전송지연 및 호 봉쇄 확률(call blocking probability)을 줄이기 위한 목적으로 제안되었다. 제안한 알고리즘은 새로 전송할 데이터를 가진 단말이 많은 경우에 특히 효율적이다. 본 논문에서 제안하는 프로토콜은 모든 종류의 트래픽이 예약을 통한 전송방식으로 전송된다. 즉, 단말들로부터의 예약 요청을 바탕으로, 기지국이 스케줄링을 하여 트래픽 별로 접근 슬랏을 할당해 주는 방식이다. 이 경우, 예약 요청을 하는 방법은 새로 전송을 개시하는 단말과 이미 전송중인 단말의 경우가 다른데, 새로운 전송을 위한 예약이 필요한 단말은 제안하는 알고리즘을 이용하며, 이미 예약에 성공한 단말은 기존에 사용하던 자신의 버스트헤더(burst header)에 피기백(piggybacking)하는 방법을 이용한다. 제안한 알고리즘에 따라, 새로 접속하는 단말이나 새로운 예약 요청이 필요한 단말은 두 단계로 요청을 전송할 수 있다. 첫 번째 단계는 이미 예약에 성공하여 전송중인 이웃단말에게 전송요청신호를 보내 간접적으로 기지국에게 예약을 요청하는 방법이며, 두 번째 단계는 첫 번째 방법이 실패했을 경우 기존의 랜덤접속방법에 참가하는 것이다 먼저 첫 번째 방법에서는 단말이 랜덤접근 구간의 예약요청구간(resonation request)중 하나의 미니 슬랏을 선택해 이웃 단말들에게 한번 방송(broadcast) 한다 이후 ACK 응답구간(ACK receive)에서 응답을 받으면 예약요청성공이라 간주하고, 그렇지 않으면 실패로 판단, 뒤이어 오는 랜덤접근구간(normal random access period)에 참가하여 기지국에게 직접 예약 요청을 한다. 시뮬레이션은 기존 slotted-ALOHA방식으로 랜덤 접속을 할 경우와 제안한 방식과의 성공률을 비교해 제안한 방식의 call blocking probability가 낮음을 보였다.

  • PDF

Implementation & Verification of RFID Gen2 Protocol on FPGA Prototyping board (FPGA를 이용한 RFID Gen2 protocol의 구현 및 검증)

  • Je, Young-Dai;Kim, Jae-Lim;Jang, Il-Su;Yang, Hoon-Gee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.869-872
    • /
    • 2008
  • This paper presents the VHDL implementation procedure of the passive RFID tag in Ultra High Frequency RFID system. The operation of the tag compatible with the EPCglobal Class1 Generation2(GEN2) protocol is verified by timing simulation after synthesis and implementation on prototyping board. Due to the reading range with relatively large distance, a passive tag needs digital processor which facilitates faster decoding, encoding and state transition for enhancement of the interrogation rate. Also with UART communication, verify a inventory Round in Gen2 Protocol. The verification results with the fastest data rate, 640kbps, and multi tags environment scenario show that the implemented tag spend 1.4ms transmitting the 96bits EPC to reader.

  • PDF

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Adaptive Control Technique for the Random Access Channel in DVB-RCS2 based Next Generation Military Satellite Networks (DVB-RCS2 기반 차세대 군 위성 네트워크 랜덤 액세스 채널 적응형 제어 기법)

  • Lee, WonKyun;Jang, Dae-Hee;Chung, Jong-Moon
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.99-108
    • /
    • 2020
  • In this paper, we analyze the most suitable RA method among PAMA, DAMA, and RA classified by the multiple access method of satellite communication in the rapidly changing traffic environment according to the emergency and tactical situation. It suggests an alternative to improve the limit of output degradation. Based on the CRDSA protocol selected as the standard of DVB-RCS2 among the current satellite communication methods, CRDSA2R (Contention) maintains an optimal RA channel environment by checking the limitations in an environment where packet volume is rapidly increasing and observing channel load and channel conditions. We propose a Resolution Diversity Slotted ALOHA with Adaptive Random Access.

Performance of Hybrid DS/FH Spread-Spectrum Systems in Cellular Packet Radio Network (셀룰러 패킷무선망에서 하이브리드 DS/FH 확산대역 시스팀의 성능)

  • 조현욱;박상규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1462-1470
    • /
    • 1999
  • In this paper, the performance of packet radio networks using the ALOHA protocol in Rayleigh fading channels is analyzed in terms of the capture probability and the throughput. We consider capture effect in order to increase the probability of the channel access and to include cellular environment we assume that the traffic is a truncated bell-shaped distribution. The packet proposed in this paper consists of a competition part and a data part to decrease the probability of collision in the channel access. In the competition part, DS system with common spreading code is used and in the data, hybrid DS/FH system is used. We consider the linear correlation receiver and the hard-limiting correlation receiver as the receiver model. BPSK modulation is also employed. Because hybrid DS/FH systems are not sensitive to variation of the interference power, as we choose a proper chip number N and a frequency hopping number q, we can obtain a steady system performance even though the variation of interference power is severe fading channels such as Rayleigh fading.

  • PDF

A Research on Low-power Buffer Management Algorithm based on Deep Q-Learning approach for IoT Networks (IoT 네트워크에서의 심층 강화학습 기반 저전력 버퍼 관리 기법에 관한 연구)

  • Song, Taewon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.4
    • /
    • pp.1-7
    • /
    • 2022
  • As the number of IoT devices increases, power management of the cluster head, which acts as a gateway between the cluster and sink nodes in the IoT network, becomes crucial. Particularly when the cluster head is a mobile wireless terminal, the power consumption of the IoT network must be minimized over its lifetime. In addition, the delay of information transmission in the IoT network is one of the primary metrics for rapid information collecting in the IoT network. In this paper, we propose a low-power buffer management algorithm that takes into account the information transmission delay in an IoT network. By forwarding or skipping received packets utilizing deep Q learning employed in deep reinforcement learning methods, the suggested method is able to reduce power consumption while decreasing transmission delay level. The proposed approach is demonstrated to reduce power consumption and to improve delay relative to the existing buffer management technique used as a comparison in slotted ALOHA protocol.

Performance evaluation of a multiple-access algorithm for PCN in microcell environment (마이크로셀 환경에서 개인휴대통신을 위한 다중접속 알고리즘의 성능 평가)

  • 전영희;이재형;최형진
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.7
    • /
    • pp.55-63
    • /
    • 1996
  • In this paper, a multiple-access algorithm for PCN is proposed. The proposed algorithm provides th integrated service of information soruces and can be operated stably in high load state. Given bandwidth is efficiently used for it in the microcell environment. And system performance can be improved through the statistical-multiplexing technque. In order to process the speech signal usually requiring real-tiem processing, we adopt a random access of AlOHA type for th ebasic protocol sturcture and assume the form of ALOHA-reservation. We have analyzed the performance of the proposed algorithm through system throughput and packet delay in the microcell environment.

  • PDF

Multiple Access Protocols for a Multichannel Optical Fibre Local Area Network Using a Passive Star Topology and WDM (Passive Star 토플로지와 WDM을 사용한 다중채널 광섬유 LAN을 위한 Multiple Access 르로토콜)

  • ;Jon W. Mark
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.32A no.9
    • /
    • pp.1184-1201
    • /
    • 1995
  • Two multiple access protocols are proposed for a multichannel WDM optical fibre local area network or metropolitan area network in which users are interconnected using a passive star topology. Each user has a single tunable transmitter and a single tunable receiver. A transmitter sends a control packet before its data packet transmission so that its intended receivers can tune to the proper data channel wavelength. The maximum throughput of the proposed protocols are independent of the effective normalized propagation delay which may include the transmitter and receiver tuning times and the processing delays. The maximum throughputs of the protocols are analyzed and compared with those of the existing ones by numerical examples. The message delay of the R- Aloha/synchronous N-server switch protocol which is suitable for the queued users is also analyzed.

  • PDF

An Improvement of Bin-slotted Anti-collision Algorithm for Ubiquitous ID System

  • Kim Ji-Yoon;Kang Bong-Soo;Yang Doo-Yeong
    • International Journal of Contents
    • /
    • v.2 no.1
    • /
    • pp.34-38
    • /
    • 2006
  • In this paper, an overview of anti-collision algorithm for RFID system of a standard EPC Class1 protocol is presented, and the binslotted dynamic search algorithm (BDS) based upon the slotted ALOHA and binary tree procedure is proposed and analyzed. Also, the performance is evaluated as comparing the BDS algorithm with the standard bin-slotted algorithm (BSA) through the simulation program. The performance of the proposed BDS algorithm is improved by dynamically identifying the collided-bit position and the collided bins stored in the stack of the reader. As the results, the number of request command that a reader send to tags in the reader s interrogation zone and the total recognition time are decreased to 59% as compared with BSA algorithm. Therefore, the tag identification performance is fairly improved by resolving a collision problem using the proposed BDS algorithm.

  • PDF