Analysis of Interrogator-tag Communication Protocols. Nokovic, B. & Sekerinski, E. Technical Report 60, McMaster University, Hamilton, Ontario, Canada, December, 2010. Pages: 22Paper abstract bibtex 1 download In this document we discuss and analyze three different Interrogator-Tag communication protocols. The first protocol is used in the AMQM (Automatic Mail Quality Measurement) system. The second protocol is based on the ISO 18000-7 standard, which specifies the protocol and parameters for active RFID (Radio Frequency IDentification) air interface communication at the 433MHz ISM (Industrial Scientific Medical) band. The third protocol is the AMQM protocol with some features of the ISO 18000-7 standard. Quantitative properties of the protocols are analyzed. The main goal of modelling is to analyze tag message collision probability and power consumption. The model is verified by PRISM - Probabilistic Model Check Software. We showed that by implementing principles of model checking, we could verify probability of reaching a particular state, calculate collision probability as quantitative property, and cost of reaching determined state. We also showed that model of the protocol could be used to estimate possible improvement in a one protocol by implementing features from another protocol.
@techreport{NokovicSekerinski10Interrogator,
address = {Hamilton, Ontario, Canada},
type = {{SQRL} {Report}},
title = {Analysis of {Interrogator}-tag {Communication} {Protocols}},
url = {https://www.cas.mcmaster.ca/~emil/pubs/NokovicSekerinski10Interrogator.pdf},
abstract = {In this document we discuss and analyze three different Interrogator-Tag communication protocols. The first protocol is used in the AMQM (Automatic Mail Quality Measurement) system. The second protocol is based on the ISO 18000-7 standard, which specifies the protocol and parameters for active RFID (Radio Frequency IDentification) air interface communication at the 433MHz ISM (Industrial Scientific Medical) band. The third protocol is the AMQM protocol with some features of the ISO 18000-7 standard. Quantitative properties of the protocols are analyzed. The main goal of modelling is to analyze tag message collision probability and power consumption. The model is verified by PRISM - Probabilistic Model Check Software. We showed that by implementing principles of model checking, we could verify probability of reaching a particular state, calculate collision probability as quantitative property, and cost of reaching determined state. We also showed that model of the protocol could be used to estimate possible improvement in a one protocol by implementing features from another protocol.},
number = {60},
institution = {McMaster University},
author = {Nokovic, Bojan and Sekerinski, Emil},
month = dec,
year = {2010},
note = {Pages: 22},
pages = {20},
}
Downloads: 1
{"_id":"pakGcSrnRQQ3Yzmir","bibbaseid":"nokovic-sekerinski-analysisofinterrogatortagcommunicationprotocols-2010","author_short":["Nokovic, B.","Sekerinski, E."],"bibdata":{"bibtype":"techreport","type":"SQRL Report","address":"Hamilton, Ontario, Canada","title":"Analysis of Interrogator-tag Communication Protocols","url":"https://www.cas.mcmaster.ca/~emil/pubs/NokovicSekerinski10Interrogator.pdf","abstract":"In this document we discuss and analyze three different Interrogator-Tag communication protocols. The first protocol is used in the AMQM (Automatic Mail Quality Measurement) system. The second protocol is based on the ISO 18000-7 standard, which specifies the protocol and parameters for active RFID (Radio Frequency IDentification) air interface communication at the 433MHz ISM (Industrial Scientific Medical) band. The third protocol is the AMQM protocol with some features of the ISO 18000-7 standard. Quantitative properties of the protocols are analyzed. The main goal of modelling is to analyze tag message collision probability and power consumption. The model is verified by PRISM - Probabilistic Model Check Software. We showed that by implementing principles of model checking, we could verify probability of reaching a particular state, calculate collision probability as quantitative property, and cost of reaching determined state. We also showed that model of the protocol could be used to estimate possible improvement in a one protocol by implementing features from another protocol.","number":"60","institution":"McMaster University","author":[{"propositions":[],"lastnames":["Nokovic"],"firstnames":["Bojan"],"suffixes":[]},{"propositions":[],"lastnames":["Sekerinski"],"firstnames":["Emil"],"suffixes":[]}],"month":"December","year":"2010","note":"Pages: 22","pages":"20","bibtex":"@techreport{NokovicSekerinski10Interrogator,\n\taddress = {Hamilton, Ontario, Canada},\n\ttype = {{SQRL} {Report}},\n\ttitle = {Analysis of {Interrogator}-tag {Communication} {Protocols}},\n\turl = {https://www.cas.mcmaster.ca/~emil/pubs/NokovicSekerinski10Interrogator.pdf},\n\tabstract = {In this document we discuss and analyze three different Interrogator-Tag communication protocols. The first protocol is used in the AMQM (Automatic Mail Quality Measurement) system. The second protocol is based on the ISO 18000-7 standard, which specifies the protocol and parameters for active RFID (Radio Frequency IDentification) air interface communication at the 433MHz ISM (Industrial Scientific Medical) band. The third protocol is the AMQM protocol with some features of the ISO 18000-7 standard. Quantitative properties of the protocols are analyzed. The main goal of modelling is to analyze tag message collision probability and power consumption. The model is verified by PRISM - Probabilistic Model Check Software. We showed that by implementing principles of model checking, we could verify probability of reaching a particular state, calculate collision probability as quantitative property, and cost of reaching determined state. We also showed that model of the protocol could be used to estimate possible improvement in a one protocol by implementing features from another protocol.},\n\tnumber = {60},\n\tinstitution = {McMaster University},\n\tauthor = {Nokovic, Bojan and Sekerinski, Emil},\n\tmonth = dec,\n\tyear = {2010},\n\tnote = {Pages: 22},\n\tpages = {20},\n}\n\n","author_short":["Nokovic, B.","Sekerinski, E."],"key":"NokovicSekerinski10Interrogator","id":"NokovicSekerinski10Interrogator","bibbaseid":"nokovic-sekerinski-analysisofinterrogatortagcommunicationprotocols-2010","role":"author","urls":{"Paper":"https://www.cas.mcmaster.ca/~emil/pubs/NokovicSekerinski10Interrogator.pdf"},"metadata":{"authorlinks":{}},"downloads":1},"bibtype":"techreport","biburl":"https://api.krunk.cn/emil/bib.php","dataSources":["HEdahWqKBpmSGmDwq","MF5eGzpJnqf6bSAoG","ienufKdnmJs49AsjR","So4gmSWFmbQRNEuFs","ezsmw4w22u9JFLNYJ","CvQYP6Tmpapx74Mgr","RWydLHbBJqgdeh5jr"],"keywords":[],"search_terms":["analysis","interrogator","tag","communication","protocols","nokovic","sekerinski"],"title":"Analysis of Interrogator-tag Communication Protocols","year":2010,"downloads":1}