6 results on '"Hoilun Ngan"'
Search Results
2. Chip Error Pattern Analysis in IEEE 802.15.4
- Author
-
Yunhuai Liu, Kaishun Wu, Lionel M. Ni, Haoyu Tan, and Hoilun Ngan
- Subjects
Channel code ,Computer Networks and Communications ,Computer science ,business.industry ,Physical layer ,Chip ,Spread spectrum ,Transmission (telecommunications) ,Computer engineering ,PHY ,Electrical and Electronic Engineering ,Routing (electronic design automation) ,Error detection and correction ,business ,Software ,IEEE 802.15 ,Communication channel ,Computer network - Abstract
IEEE 802.15.4 standard specifies physical layer (PHY) and medium access control (MAC) sublayer protocols for low-rate and low-power communication applications. In this protocol, every 4-bit symbol is encoded into a sequence of 32 chips that are actually transmitted over the air. The 32 chips as a whole is also called a pseudonoise code (PN-Code). Due to complex channel conditions such as attenuation and interference, the transmitted PN-Code will often be received with some PN-Code chips corrupted. In this paper, we conduct a systematic analysis on these errors occurring at chip level. We find that there are notable error patterns corresponding to different cases. We then show that recognizing these patterns enables us to identify the channel condition in great details. We believe that understanding what happened to the transmission in our way can potentially bring benefit to channel coding, routing, and error correction protocol design. Finally, we propose Simple Rule, a simple yet effective method based on the chip error patterns to infer the link condition with an accuracy of over 96 percent in our evaluations.
- Published
- 2012
3. Cardinality Estimation for Large-Scale RFID Systems
- Author
-
Yunhao Liu, Lionel M. Ni, Chen Qian, and Hoilun Ngan
- Subjects
Tree (data structure) ,Identification (information) ,Cardinality ,Computational Theory and Mathematics ,Hardware and Architecture ,Computer science ,Aloha ,Server ,Signal Processing ,Real-time computing ,Scalability ,Frame (networking) - Abstract
Counting the number of RFID tags (cardinality) is a fundamental problem for large-scale RFID systems. Not only does it satisfy some real application requirements, it also acts as an important aid for RFID identification. Due to the extremely long processing time, slotted ALOHA-based or tree-based arbitration protocols are often impractical for many applications, because tags are usually attached to moving objects and they may have left the readers interrogation region before being counted. Recently, estimation schemes have been proposed to count the approximate number of tags. Most of them, however, suffer from two scalability problems: time inefficiency and multiple-reading. Without resolving these problems, large-scale RFID systems cannot easily apply the estimation scheme as well as the corresponding identification. In this paper, we present the Lottery Frame (LoF) estimation scheme, which can achieve high accuracy, low latency, and scalability. LoF estimates the tag numbers by utilizing the collision information. We show the significant advantages, e.g., high accuracy, short processing time, and low overhead, of the proposed LoF scheme through analysis and simulations.
- Published
- 2011
4. Measurement Study of Mobility-Induced Losses in IEEE 802.15.4
- Author
-
Hoilun Ngan, Haoyu Tan, Kaishun Wu, Yunhuai Liu, and Lionel M. Ni
- Subjects
Mobile radio ,Network packet ,business.industry ,Packet loss ,Wireless network ,Computer science ,Testbed ,Physical layer ,Wireless ,Algorithm design ,business ,IEEE 802.15 ,Computer network - Abstract
Recent years have seen an increasing need of wireless networks in a mobile environment serving for more complex tasks and applications. Mobility becomes an indispensable factor of the system design and has been widely recognized as a general cause of packet loss. Though many works have been done on mobility study, to the best of our knowledge, they are mainly based on simulations or analytical studies that assume idealized link conditions. In this work, we experimentally investigate the nature of the error characteristics of mobility-induced packet losses at "chip-level" in IEEE 802.15.4. We believe this more understanding of mobility-induced packet losses can bring great potential benefits for further study on channel coding, routing and protocol design. Toward this end, we design and implement an efficient algorithm to distinguish mobility-induced packet losses from other packet losses of static environments such as attenuation. Our algorithm is greatly advantaged as it needs no training data even when environment changes. Collecting three corrupted packets is sufficient to obtain a satisfactory performance. This feature makes our design in particular suitable for dynamic and mobile environments, allowing real-time mobility induced loss detection in an online manner. Experiments based on GNU Radio testbed show that our algorithm can provide an accuracy of up to 96%.
- Published
- 2010
5. Chip Error Pattern Analysis in IEEE 802.15.4
- Author
-
Hoilun Ngan, Haoyu Tan, Kaishun Wu, and Lionel M. Ni
- Subjects
Routing protocol ,Channel code ,Computer science ,business.industry ,Physical layer ,Chip ,Transmission (telecommunications) ,PHY ,Wireless ,Error detection and correction ,business ,IEEE 802.15 ,Communication channel ,Computer network - Abstract
IEEE 802.15.4 standard specifies physical layer (PHY) and medium access control (MAC)sublayer protocols for low-rate and low-power communication applications. In this protocol, every 4-bit symbol is encoded into a sequence of 32 chips that are actually transmitted over the air. The 32 chips as a whole is also called a pseudo-noise code (PN-Code). Due to complex channel conditions such as attenuation and interference, the transmitted PN-Code will often be received with some PN-Code chips corrupted. In this paper, we conduct a systematic analysis on these errors occurring at chip-level. We find that there are notable error patterns corresponding to different cases. Recognizing these patterns will enable us to identify the channel condition in great details. We believe that understanding what happened to the transmission in our setup can potentially bring benefit to channel coding, routing and error correction protocol design.
- Published
- 2010
6. ASAP: Scalable Identification and Counting for Contactless RFID Systems
- Author
-
Yunhuai Liu, Lionel M. Ni, Hoilun Ngan, and Chen Qian
- Subjects
Identification (information) ,business.industry ,Computer science ,Video tracking ,Distributed computing ,Scalability ,Radio-frequency identification ,Mobile telephony ,business ,Protocol (object-oriented programming) - Abstract
The growing importance of operations such as identification, location sensing and object tracking has led to increasing interests in contact less Radio Frequency Identification (RFID) systems. Enjoying the low cost of RFID tags, modern RFID systems tend to be deployed for large-scale mobile objects. Both the theoretical and experimental results suggest that when tags are mobile and with large numbers, two classical MAC layer collision-arbitration protocols, slotted ALOHA and Tree-traversal, do not satisfy the scalability and time-efficiency requirements of many applications. To address this problem, we propose Adaptively Splitting-based Arbitration Protocol (ASAP), a scheme that provides low-latency RFID identification and has stable performance for massive RFID networks. Theoretical analysis and experimental evaluation show that ASAP outperforms most existing collision-arbitration solutions. ASAP is efficient for both small and large deployment of RFID tags, in terms of time and energy cost. Hence it can benefit dynamic and large-scale RFID systems.
- Published
- 2010
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.