Mobile ad hoc network researchers face the challenge of achieving full functionality with good performance while linking the new technology to the rest of the Internet. A strict layered design is not flexible enough to cope with the dynamics of manet environments, however, and will prevent performance optimizations. The MobileMan cross-layer architecture offers an alternative to the pure layered approach that promotes stricter local interaction among protocols in a manet node
One of the major challenges in the use of Radio Frequency-based Identification (RFID) on a large scale is the ability to read a large number of tags quickly. Central to solving this problem is resolving collisions that occur when multiple tags reply to the query of a reader. To this purpose, several MAC protocols for passive RFID systems have been proposed. These typically build on traditional MAC schemes, such as aloha and tree-based protocols. In this paper, we propose a new performance metric by which to judge these anticollision protocols: time system efficiency. This metric provides a direct measure of the time taken to read a group of tags. We then evaluate a set of well-known RFID MAC protocols in light of this metric. Based on the insights gained, we propose a new anticollision protocol, and show that it significantly outperforms previously proposed mechanisms
The infra-structureless nature of ad hoc networks requires the distribution of network functions to all the participating nodes. The underlying requirement for making operational the cooperative paradigm is the supposed good behavior of all entities composing and, at the same time, using the system. However the lack of any centralized authority that enforces the overall collaboration motivates a possible tendency of entities toward self-interested behavior. In this paper we explore the cooperation issues across layers of the protocol stack for a network node. In particular, we perform a per-protocol analysis of cooperative aspects, and identify the problems potentially affecting each layer Afterward, we survey current research approaches to cooperation enforcing, highlighting common features among different layers' solutions, as well as open issues
The emergent commercial use of techniques for Radio Frequency-based IDentification of different items (RFID) requires the investigation and testing of collision resolution mechanisms for the efficient and correct communication between the system reader and the tags labeling the items that need to be identified. Several MAC protocols have been proposed to resolve collisions in RFID networks. A recent solution, named Tree Slotted Aloha (TSA), has been shown to outperform previous ones with respect to the time it takes for identifying all tags, and the total number of bits transmitted to complete the identification process. However, almost half of the time needed by TSA for identifying tags is spent in collisions. This depends on TSA operation and in particular on the way TSA estimates the number of colliding tags. We have observed that in the case of realistically large networks, TSA highly underestimates this number, with non-negligible impact on the protocol performance. In this paper, we propose a Dynamic Tree Slotted Aloha (Dy-TSA) protocol that exploits the knowledge acquired during ongoing readings to refine the estimation of the number of colliding tags. In so doing, Dy-TSA adapts the length of the following reading cycles to the actual number of tags still requiring identification. Through ns2-based simulations we show that the proposed method is effective for tag identification and results in significantly improved performance over TSA. Specifically, the length of the identification process is up to 20% lower than that of TSA. Furthermore, the amount of transmitted bits needed for identifying all tags decreases up to 30%. Copyright 2008 ACM
Recently RFID technology has made its way into end-user applications, enabling automatic item identification without requiring line of sight. In particular passive tags provide a promising, low cost and energy-efficient solution for inventory applications. However, their large-scale adoption strictly depends on the efficiency of the identification process. A major challenge is how to arbitrate channel access so that all tags are able to answer the reader inquiries and identify themselves over time. This paper stems from the observation that a variety of anti-collision protocols for RFIDs have been proposed in the literature. However, a thorough simulation comparison among them and a clear identification of the mechanisms resulting in better end- to-end performance is lacking. The objective of our work has been to fill this gap. This paper presents the results of a detailed ns2-based comparative evaluation of representatives of all the classes of anti-collision protocols so far proposed. Simulation results show that end-to-end performance of the different classes of protocols in terms of metrics such as the time needed for tags identification differ significantly over what previously found by experiments which only focused on the number of reading cycles for tag identification. Our thorough performance evaluation has highlighted that different solutions are to be used in different application scenarios and that decreasing the collisions (rather than idle times) is the way to go to further improve anti-collision protocols performance
Abstract. Ad hoc networking is a new paradigm of wireless communications for mobile nodes. Mobile ad hoc networks work properly only if the partecipating nodes cooperate to network protocols. Cooperative algorithms make the system vulnerable to user misbehavior as well as to malicious and selfish misbehavior. Nodes act selfishly to save battery power, by not cooperating to routing-forwarding functions. Lack of cooperation may severely degrade the performance of the ad hoc system. This paper presents a new approach to cope with cooperation misbehavior, focusing on the forwarding function. We present a general framework, based on reliability indices taking into account not only selfish/malicious misbehavior, but also situations of congestion and jammed links. We aim at avoiding unreliable routes and enforcing cooperation, thus increasing network "performability" (performance and reliability).
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.