Chapter 7 – Aloha-Based Protocol

Slides:



Advertisements
Similar presentations
Victor K. Y. Wu Department of Electrical Engineering
Advertisements

Data and Computer Communications Eighth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 16 – High Speed LANs.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Fundamentals of Computer Networks ECE 478/578
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies.
Ethernet. Review Media Access Control – Broadcast media shared by all stations – MAC is used to determine who gets the right to send Developed protocol.
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 2 – LAN Medium Access.
Adaptive Splitting Protocols for RFID Tag Collision Arbitration Jihoon Myung and Wonjun Lee ACM Mobihoc 06.
1 6/27/ :02 Chapter 15LAN Performance1 Rivier College CS575: Advanced LANs Chapter 15: LAN Performance.
ECE358: Computer Networks Spring 2012
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Fast and Reliable Estimation Schemes in RFID Systems Murali Kodialam and Thyaga Nandagopal Bell Labs, Lucent Technologies Presented by : Joseph Gunawan.
A Multichain Backoff Mechanism for IEEE WLANs Alkesh Patel & Hemant Patel ECE 695 – Leading Discussion By : Shiang- Rung Ye and Yu-Chee Tseng.
CIS 725 Media Access Layer. Medium Access Control Sublayer MAC sublayer resides between physical and data link layer Broadcast/multiacess channels N independent.
: Data Communication and Computer Networks
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Chapter 4: Medium Access Control (MAC) Sublayer
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
The Medium Access Control Sublayer Chapter 4 10/1/2015www.noteshit.com1.
Layer 2 Technologies At layer 2 we create and transmit frames over communications channels Format of frames and layer 2 transmission protocols are dependent.
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation Dynamic Channel Allocation  Delay for the divided.
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Medium Access Control Sublayer Chapter.
Modulation and Data Transfer February 21, References gy-Article.asp?ArtNum=2
جلسه یازدهم شبکه های کامپیوتری به نــــــــــــام خدا.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Medium Access Control Sub Layer
Multiple Access.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
Medium Access Control Protocols, Local Area Networks, and Wireless Local Area Networks Lecture Note 9.
Giuseppe Bianchi Random Access Performance the case of Aloha.
The Medium Access Control Sublayer Chapter 4 12/13/2015www.ishuchita.com1.
Every Bit Counts – Fast and Scalable RFID Estimation
Chapter 12 Multiple Access
The Medium Access Control Sublayer Chapter 4. The Channel Allocation Problem Static Channel Allocation in LANs and MANs Dynamic Channel Allocation in.
Carrier Sense Multiple Access Improve ALOHA by using carrier sense –Stations listen to the carrier before transmitting –If channel is busy, the station.
The Medium Access Control Sublayer
UNIT 3 MULTIPLE ACCESS Adapted from lecture slides by Behrouz A. Forouzan © The McGraw-Hill Companies, Inc. All rights reserved.
Multiple Access. Figure 12.1 Data link layer divided into two functionality-oriented sublayers.
Network Communications Chapter 8 Ethernet and IEEE Networking Technology.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Lecture Focus: Data Communications and Networking  Data Link Layer  Media Access Control (MAC) Lecture 23 CSCS 311.
ECEN “Mobile Wireless Networking”
CSMA/CD Carrier sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology.
The Data Link Layer Chapter
MEDIUM ACCESS CONTROL PROTOCOL
Chapter 12 Multiple Access.
Introduction to Queueing Theory
Flow control for EDMG devices
Chapter 12 Multiple Access
Multiple Access Mahesh Jangid Assistant Professor JVW University.
Flow control for EDMG devices
Services of DLL Framing Link access Reliable delivery
Multiple access.
The Medium Access Control Sublayer
Figure 12.1 Data link layer divided into two functionality-oriented sublayers Networks can be divided into two categories: those using point-to-point.
The Medium Access Control Sublayer
Chapter 12 Multiple Access
Chapter 9 - A Comparison of TTF and RTF UHF RFID Protocols
7- chapter Seven Local Area Networks (LAN)
Simulation Results for Controlled Contention Mechanism
CSE 313 Data Communication
CARRIER SENSE MULTIPLE ACCESS (CSMA)
Computer Interfacing and Protocols
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
IOT Technologies: Radio Frequency Identification (RFID)
Chapter 6 Multiple Radio Access.
Chapter 12 Media Access Control (MAC)
Presentation transcript:

Chapter 7 – Aloha-Based Protocol

Table 7.1 RFID standards and products

Figure 7.1 Reader and tags interactions

Figure 7.2 Pure Aloha with muting

Figure 7.3 Pure Aloha with slow down

Figure 7.4 Pure Aloha with fast mode

Figure 7.5 Slotted Aloha with early end

Figure 7.6 λ = 20, K = 5 λ is the offered load and K is the maximum retransmission delay Klair et al. 2009

Figure 7.7 Number of collision to read n tags

Figure 7.8 Number of idle slots encountered when reading n tags

Table 7.2 Optimal frame sizes for a given tag range

Figure 7.9 (a) A CD frame precedes each jump frame. The number of slots in each jump frame corresponds to the number of successful transmissions in the CD frame; in this example, only two tags successfully transmitted their ID. Tags that transmitted successfully in the CD frame then send their full ID in the jump frame.

Figure 7.9 (b) Collision detection using Manchester encoding no transition in the middle of a bit indicates a collision

Table 7.3 EDFSA frame sizes n denotes the number of tags, N is the frame size, and M is the number of tag groups.

Figure 7.10 ResMon Frames

Figure 7.11 An example showing QT being used to identify the following tags: A (0111), B (0000), C (0101) and D (0001). In scenario (ii), only tags A and B contend with each other. Tag C and D will contend at a different time.

Figure 7.12 Reading delay of BFSA, DFSA, and EDFSA variants

Figure 7.13 Average number of collisions encountered when reading n tags

Figure 7.14 Average number of idle slots encountered when reading n tags