跳到主要內容

臺灣博碩士論文加值系統

(216.73.216.169) 您好!臺灣時間:2025/10/30 00:43
字體大小: 字級放大   字級縮小   預設字形  
回查詢結果 :::

詳目顯示

: 
twitterline
研究生:林正祥
研究生(外文):Cheng-Hsian Lin
論文名稱:適用於動態RFID環境下的通訊排程方法
論文名稱(外文):An Adaptive Scheduling Technique Towards Efficient Transactions in Dynamic RFID Environments
指導教授:許慶賢
指導教授(外文):Ching-Hsien Hsu
學位類別:碩士
校院名稱:中華大學
系所名稱:資訊工程學系(所)
學門:工程學門
學類:電資工程學類
論文種類:學術論文
論文出版年:2007
畢業學年度:95
語文別:中文
論文頁數:29
中文關鍵詞:無限辨識系統通訊排程
外文關鍵詞:RFIDTransactions
相關次數:
  • 被引用被引用:0
  • 點閱點閱:240
  • 評分評分:
  • 下載下載:32
  • 收藏至我的研究室書目清單書目收藏:5
無線射頻辨識(RFID)技術已成為現代科技的新趨勢,應用的產業包含航空行李監控、生產自動化管控、倉儲管理、運輸監控、保全管制、圖書管理及醫療管理等,由於RFID技術應用範圍愈來愈廣泛,佈置的數量也愈來愈大;在實作上所面臨到最大的問題就是讀取器和標籤之間碰撞問題。針對這些問題近年來有許多相關研究,分別提出了不同的策略解決。在這篇論文中,我們提出二階段動態調整的方法(TPDM)來減輕讀取器和標籤之間的碰撞。TPDM有三個優點:第一、可減緩因隱藏的終端機所引起的碰撞問題。第二、使用分散式架構來做排程,不需額外使用其它硬體設備來進行協調,可降低建置成本。第三、Reader可調整出適當的等待時間來提高生產量。我們實作Pulse、Colorwave、以及TPDM三種方法做效能評估,模擬結果顯示出TPDM可以達到較高的生產量且比另外兩種方法更穩定。關鍵字:無線射頻辨識技術,二階段動態調整的方法,隱藏的終端機,生產量,Pulse,Colorwave
With the emergence of wireless RFID technique, the problem of collisions between readers and tags become important in RFID system. In recent year, it has also instigated researches to propose different approaches. In this thesis, we proposed the method of Two Phase Dynamic Modulation (TPDM) protocol to decrease the problems of a lot of collision between readers and tag. The first benefit of TPDM can avoid hidden terminal problem, and the second is TPDM using the distributed protocol to scheduling without other hardware to execute coordinator. The final is TPDM can adjust the adaptive waiting time slot and improve the system throughput. We utilize distributed control mode to design the TPDM and chose the Pulse, and Colorwave to compare the simulation result. The performance evaluation indicates that the TPDM has the highest throughput and more stable then other two methods. Keywords: RFID, TPDM, Hidden Terminal, Throughput, Pulse, Colorwave
Table of Contents Chienese Abstract I English Abstract II Acknowledgements III Table of Contents IV List of Figures V List of Tables V 1 Introduction 1 1.1 Motivation 1 1.2 Objective 2 1.3 Thesis Organization 3 2 Related Work 4 2.1 Multiple Access Mechanisms 4 2.2 Collision Avoidance Mechanisms 5 3 Hidden Terminal Problem 10 3.1 Reader to Reader Frequency Interference 11 3.2 Multiple Readers to Tag Interference 12 4 Transmission Scheduling Algorithm 14 4.1 Region Scheduling 14 4.2 Hidden Terminal Scheduling 16 5 Performance Evaluation 20 5.1 Definitions 20 5.2 Simulation Results of Static Environment 22 5.3 Simulation Results of Dynamic Environment 24 6 Conclusions and Future Research 26 References 27
1.Lichun Bao and J. J. Garcia-Luna-Aceves, “Collision-free topology-dependent channel access scheduling,” Proceedings of the IEEE 21st Century Military Communications Conference (MILCOM), pp. 507-511, 2000. 2.Shailesh M. Birari, “Mitigating the Reader Collision Problem in RFID Networks with Mobile Readers”, Master thesis, Kanwal Rekhi School of Information Technology, 2005. 3.Wen-Tsuen Chen, Te-Wei Ho and Yen-Cheng Chen, “An MAC Protocol for Wireless Ad-hoc Networks Using Smart Antennas,” Proceedings of the 11th IEEE International Conference on Parallel and Distributed Systems (ICPADS'05), pp. 446 – 452, 2005. 4.Chris Diorio and HAG Co-Chair, “Class-1 Generation 2 UHF RFID,” www.autoid.org/sc31/2004/dec/SG3_200411_430_Gen2Update.pdf, Dec. 2004. 5.Daniel W. Engels and Sanjay E. Sarma, “The reader collision problem,” Proceedings of the 2002 IEEE International Conference on Systems, Man and Cybernetics, pp. 6, 2002. 6.Lain-Jinn Hwang, Shiann-Tsong Sheu, Yun-Yen Shih and Yen-Chieh Cheng, “Grouping strategy for solving hidden node problem in IEEE 802.15.4 LR-WPAN,” Wireless Internet, 2005. Proceedings. First International Conference on , vol., no.pp. 26- 32, 10-14 July 2005. 7.Junius Ho, Daniel W. Engels and Sanjay E. Sarma, “HiQ: A Hierarchical Q-Learning Algorithm to Solve the Reader Collision Problem,” Proceedings of the International Symposium on Applications and the Internet Workshops (SAINTW'06), pp. 88-91, 2006. 8.Nitin Jain, Samir R. Das and Asis Nasipuri, “A multichannel CSMA MAC protocol with receiver-based channel selection for multihop wireless networks,” Proceedings of the 10th IEEE International Conference on Computer Communications and Networks, pp.432 – 439, 2001. 9.Joongheon Kim, Sunhyoung Kim, Dongshin Kim, Wonjun Lee and Eunkyo Kim, “Low-Energy Localized Clustering: An Adaptive Cluster Radius Configuration Scheme for Topology Control in Wireless Sensor Networks,” Proceedings of the IEEE Vehicular Technology Conference (VTC), pp. 2546-2550, 2005. 10.Jerzy Konorski, “Solvability of a Markovian Model of an IEEE 802.11 LAN under a Backoff Attack,” Proceedings of the 13th IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems (MASCOYS'05), pp. 491–498, 2005. 11.Wen-Kuang Kuo and C.-C. Jay Kuo, “Enhanced backoff scheme in CSMA/CA for IEEE 802.11,” Proceedings of the 58th IEEE Vehicular Technology Conference, pp. 2809 – 2813, 2003. 12.S. Sandoval-Reyes and J. L. Soberanes Perez, “Mobile RFID Reader with Database Wireless Synchronization,” Proceedings of the 2nd IEEE International Conference on Electrical and Electronics Engineering, pp. 5 – 8, 2005. 13.Joao Luıs Sobrinho, Roland de Haan and Jose Manuel Brazio, “Why RTS-CTS is not your ideal wireless LAN multiple access protocol,” Proceedings of the IEEE Wireless Communications and Networking Conference, pp. 81 - 87, 2005. 14.James Waldrop, Daniel W. Engels and Sanjay E. Sarma, “Colorwave: an anticollision algorithm for the reader collision problem,” Proceedings of the IEEE International Conference on Communications, pp. 1206 - 1210, 2003. 15.Xin Wang and Koushik Kar, “Throughput modelling and fairness issues in CSMA/CA based ad-hoc networks,” Proceedings of the 24th Annual Joint Conference on IEEE Computer and Communications Societies (INFOCOM 2005), pp. 23 – 34, 2005. 16.Tiantong You, Hossam Hassanein and Chi-Hsiang Yeh, “PIDC - Towards an Ideal MAC Protocol for Multi-hop Wireless LANs,” Proceedings of the IEEE International Conference on Wireless Networks, Communications and Mobile Computing, pp. 655 – 660, 2005. 17.European Telecommunications Standards Institute, “ETSI EN 302 208-1 v1.1.1,” www.RFIDc.com/pdfs_downloads/ETSI%20Standard%202.pdf, 2004.
QRCODE
 
 
 
 
 
                                                                                                                                                                                                                                                                                                                                                                                                               
第一頁 上一頁 下一頁 最後一頁 top