Token-MAC: Inactive RFID Systems for A light MAC Protocol

نویسنده

  • Ramesh Babu
چکیده

Passive RFID systems used for list organization and benefit tracking normally use contention-based MAC protocols, such as the normal C1G2 protocol. Although the C1G2 protocol has the benefit that it is easy to apply, it suffers from wrongness and relatively low throughput when the number of tags in the network increases. It proposes a token-based MAC protocol called Token-MAC for passive RFID systems, which aims a) to provide a fair chance for tags in the network to access the average without requiring management of the tags, b) to increase the overall throughput, i.e., the tag rate, and c) to enable a high number of tags to be read under incomplete tag read time availability, which is an especially important challenge for mobile applications. We apply Token-MAC as well as C1G2 and a TDMA-based protocol using Intel WISP passive RFID tags and perform experiments. Additionally, based on our experimental results, we develop energy harvesting and communication models for tags that we then use in simulations of the three protocols. Our experimental and simulation results all show that Token-MAC can achieve a higher tag rate and better fairness than C1G2, and it can provide better performance over a longer range compared with the TDMA-based protocol. It is also shown that Token-MAC achieves much lower tag finding delay, particularly for high numbers of tags. Token-MAC is, therefore, a promising solution for passive RFID systems. KeywordsPassive RFID, MAC protocol, C1G2 protocol.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Game Theory based Energy Efficient Hybrid MAC Protocol for Lifetime Enhancement of Wireless Sensor Network

Wireless Sensor Networks (WSNs) comprising of tiny, power-constrained nodes are getting very popular due to their potential uses in wide applications like monitoring of environmental conditions, various military and civilian applications. The critical issue in the node is energy consumption since it is operated using battery, therefore its lifetime should be maximized for effective utilization ...

متن کامل

Evaluation of a BIBD Based Directional MAC Protocol for Wireless Ad Hoc Networks

The use of directional antennas in wireless ad hoc networks can significantly improve global performance due to a high spatial channel reuse. Nevertheless, its introduction poses new location dependent problems related to the MAC protocol. In this paper, the Balanced Incomplete Block Design theory has been exploited to develop a new MAC protocol for wireless ad hoc networks using directional ant...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

Multi-channel Medium Access Control Protocols for Wireless Sensor Networks: A Survey

Extensive researches on Wireless Sensor Networks (WSNs) have been performed and many techniques have been developed for the data link (MAC) layer. Most of them assume single-channel MAC protocols. In the usual dense deployment of the sensor networks, single-channel MAC protocols may be deficient because of radio collisions and limited bandwidth. Hence, using multiple channels can significantly ...

متن کامل

A load awareness medium access control protocol for wireless ad hoc network

A contention-based wireless ad hoc medium access control (MAC) protocol, such as carrier sense multiple access with collision avoidance (CSMA/CA), has the excellence of simple and efficient when the system is light-loaded. The main drawback of such protocols is their inefficiency and unbounded delay when system load is heavy. On the other hand, a contention-free MAC protocol, such as token pass...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014