2009
DOI: 10.1109/tase.2008.2007266
|View full text |Cite
|
Sign up to set email alerts
|

An Optimal Q-Algorithm for the ISO 18000-6C RFID Protocol

Abstract: Abstract-Passive radio-frequency identification (RFID) systems based on the ISO/IEC 18000-6C (aka EPC Gen2) protocol have typical read rates of up to 1200 unique 96-bit tags per second. This performance is achieved in part through the use of a medium access control algorithm, christened the Q-algorithm, that is a variant of the Slotted Aloha multiuser channel access algorithm. We analyze the medium access control algorithm employed by the ISO/IEC 18000-6C RFID air interface protocol and provide a procedure to … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
58
0

Year Published

2010
2010
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 98 publications
(58 citation statements)
references
References 4 publications
0
58
0
Order By: Relevance
“…Hence rt f (r) = (p i (r)) 3 · (p t (r)) 2 . Therefore we can derive that p i (r) = rt(f ) rt (1) and p t (r) = (rt(1)) 3 (rt(f )) 2 . We can store the values of p i (r) and p t (r) at various distance r. In our probabilistic model, for simplification of the problem we do not consider the impact This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2010 proceedings This paper was presented as part of the main Technical Program at IEEE INFOCOM 2010.…”
Section: Obtain the Propagation And Backscatter Parametersmentioning
confidence: 97%
See 2 more Smart Citations
“…Hence rt f (r) = (p i (r)) 3 · (p t (r)) 2 . Therefore we can derive that p i (r) = rt(f ) rt (1) and p t (r) = (rt(1)) 3 (rt(f )) 2 . We can store the values of p i (r) and p t (r) at various distance r. In our probabilistic model, for simplification of the problem we do not consider the impact This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM 2010 proceedings This paper was presented as part of the main Technical Program at IEEE INFOCOM 2010.…”
Section: Obtain the Propagation And Backscatter Parametersmentioning
confidence: 97%
“…The ALOHA protocol was first developed for random access in packet radio networks. To improve efficiency for RFID systems, the slotted ALOHA is developed [1] [2]. In [9], Schoute analyzes the performance of the dynamic frame-sized ALOHA.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…There is a lively research interest on MAC solutions for RFID systems based on the ISO/IEC 18000-6 standard (i.e, [6] - [14]). In [6], the authors propose a tree structured collision resolution scheme.…”
Section: Related Workmentioning
confidence: 99%
“…In [13], the optimal contention window is derived according to estimations of the tag population. In [14], an adaptive algorithm for the contention window is proposed to maximize the number of reads per second. The presence of multiple access interference and the impact on the MAC performance has been studied in [15].…”
Section: Related Workmentioning
confidence: 99%