SlideShare a Scribd company logo
Wireless Communications and a Priority 
Access Protocol for Multiple Mobile 
Terminals in Factory Automation 
SUBMITTED BY :- 
SANDEEP KR. MAHAWAR 
2011UEC1303 
EC-3
Contents 
 INTRODUCTION 
 WIRELESS ACCESS INFRASTRUCTURE 
 WIRELESS ACCESS PROTOCOLS 
 PERFORMANCE EVALUATION AND NUMERICAL RESULTS 
 CONCLUSION
Introduction 
MANUFACTURING automation requires many mobile terminals. A robot is a good 
example of mobile terminals in manufacturing automation. Recently, multirobot 
systems have received much attention. The main reason for setting up a multirobot 
system is because two or more robots are necessary for performing manufacturing 
tasks, for example, carrying large objects. The problem then arises from the fact 
that coordination of these mobile devices becomes important. Recently, using 
local area network (LAN) for such operation has become an active research topic. 
Since 1980’s, the hardwired, token bus-based manufacturing automation protocol 
(MAP) network has been widely accepted for computer integrated 
manufacturing.
Wireless LAN 
A wireless local area network (WLAN) would lessen the 
time and cost of factory installation, restructuring and 
network maintenance and may allow mobile, hand-held 
communication users. In other words, a WLAN is a 
relatively low cost network of communicating control 
information and data to and from any mobile and fixed 
terminals in a factory automation application.
WIRELESS ACCESS INFRASTRUCTURE 
The following subsection will describe our proposed 
wireless access infrastructure 
 The Current Standards 
 Adding Wireless Strategy 
 CDMA Techniques
The Current Standards 
 Two widely used standards are the proposed manufacturing 
automation protocol (MAP) and Fieldbus (IEC TC65C). 
 For convenience of documentation and separation of 
functionality, MAP is referenced on the seven-layer ISO 
model while Fieldbus specifications are partitioned into five-layer 
structures. 
 These two standards characterize two different layer 
structures.
Adding Wireless Strategy 
The most desirable application of wireless access in factory 
integration is communication to and from mobile devices such as 
AMR’s and robots that may be clustered in islands of automation. 
There exist moving difficulties when these mobile devices are wired to 
the network. Therefore, we propose that each island can be covered 
by a base station. There could be several base stations in each 
factory floor, depending on the size of subnetworks and the number 
of mobile devices. Each base station controls a radio coverage area 
(RCA), and the RCA’s may be nonuniform and partially overlapping.
CDMA Techniques 
Most current WLAN products employ the code division 
multiple access (CDMA) techniques. The CDMA systems 
use spread spectrum technologies that are very suitable 
for indoor communication due to their capabilities in anti-multipath, 
antijamming, and low probability of 
interception and detection. In addition, the capability of 
allowing asynchronous, overlapped transmissions may be 
the key for commercial applications.
WIRELESS ACCESS PROTOCOLS 
 Multiple access schemes used in traditional LAN’s include random access 
(Aloha), token passing and polling access (token bus or ring), deterministic 
access (TDMA/FDMA), and demand access (handshake).
PERFORMANCE EVALUATION AND 
NUMERICAL RESULTS 
we classify the traffic class into type I and type II. A type-I traffic is the traffic that 
carries timely information that has to reach the supervisory computer on time, 
otherwise, it becomes useless. This kind of traffic must have priority over the other 
traffic. Also, it is critical to errors, thus requires more reliable transmission. A type-II 
traffic, on the other hand, is less sensitive to delay (latency) and may not be 
critical to errors (can be retransmitted). 
 Probability that an idle type-I unit will generate packet for transmission at next 
frame is 
 Probability that an idle type-II unit will generate packet for transmission at next 
frame is
 The average delay normalized to a frame period as 
The average probability of successful handshaking
CONCLUSION 
We can conclude that by using the wireless 
communication and suitable protocol, the 
installation and maintenance cost can be 
reduced without deteriorating its performance, 
and it also provides the flexibility in factory 
automation planning and restructuring.
Wireless Communications and a Priority Access Protocol for Multiple Mobile Terminals in Factory Automation

More Related Content

What's hot

Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul
 
aloha
alohaaloha
aloha
DeepikaT13
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
HusnainHadi
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over WirelessFarooq Khan
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
Nimii Nimo
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)hinalala
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar
 
Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)
Azad Kaki
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
ABDUL WAHAB KORAI
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
JAIGANESH SEKAR
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
trendy updates
 
Network Layer
Network LayerNetwork Layer
Network Layer
Rutwik Jadhav
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
Basit Hussain
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
Meenakshi Paul
 
wireless networks
wireless networkswireless networks
wireless networks
Saqib Shehzad
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
Chih-Yu Lin
 

What's hot (20)

Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
 
aloha
alohaaloha
aloha
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Frame Relayprint
Frame RelayprintFrame Relayprint
Frame Relayprint
 
TCP Over Wireless
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
 
Mac adhoc (1)
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
 
Mac adhoc
Mac adhocMac adhoc
Mac adhoc
 
Lect04 (1)
Lect04 (1)Lect04 (1)
Lect04 (1)
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Computer networks unit iv
Computer networks    unit ivComputer networks    unit iv
Computer networks unit iv
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
wireless networks
wireless networkswireless networks
wireless networks
 
Mac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
 
Data link layer
Data link layerData link layer
Data link layer
 

Viewers also liked

Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
meenamunesh
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
Maulik Patel
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
Krishna Kumari
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Shreejan Acharya
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
 

Viewers also liked (6)

Multiple access protocol
Multiple access protocolMultiple access protocol
Multiple access protocol
 
Multiple access control protocol
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
 
blutooth based smart sensor network
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
 
Bluetooth technology presentation
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
PPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
 

Similar to Wireless Communications and a Priority Access Protocol for Multiple Mobile Terminals in Factory Automation

ATM for Navy Applications.PDF
ATM for Navy Applications.PDFATM for Navy Applications.PDF
ATM for Navy Applications.PDFDeborah Goldsmith
 
Qualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from PatentsQualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from Patents
Alex G. Lee, Ph.D. Esq. CLP
 
Cy31439446
Cy31439446Cy31439446
Cy31439446IJMER
 
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
IJNSA Journal
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
IJERA Editor
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
RobinKumar260480
 
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
ijwmn
 
Optical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical NetworkOptical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical Network
Rachel Phillips
 
LOCAL multipoint distribuition service.pdf
LOCAL multipoint distribuition service.pdfLOCAL multipoint distribuition service.pdf
LOCAL multipoint distribuition service.pdf
JoelNtemoBampangi
 
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfPreliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
YAAKOVSOLOMON1
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
Thesis Scientist Private Limited
 
2002023
20020232002023
2002023
pglehn
 
CAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfCAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdf
ssuserc77a341
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
GayathriRHICETCSESTA
 
IRJET- Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ...
IRJET-  	  Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ...IRJET-  	  Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ...
IRJET- Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ...
IRJET Journal
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
ijcseit
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
ijcseit
 

Similar to Wireless Communications and a Priority Access Protocol for Multiple Mobile Terminals in Factory Automation (20)

ATM for Navy Applications.PDF
ATM for Navy Applications.PDFATM for Navy Applications.PDF
ATM for Navy Applications.PDF
 
Qualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from PatentsQualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from Patents
 
Cy31439446
Cy31439446Cy31439446
Cy31439446
 
1880153 1880165
1880153 18801651880153 1880165
1880153 1880165
 
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
 
Ft2510561062
Ft2510561062Ft2510561062
Ft2510561062
 
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdfrohvjhgggghhgggggdtyffttyg_46218827462.pdf
rohvjhgggghhgggggdtyffttyg_46218827462.pdf
 
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
 
Optical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical NetworkOptical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical Network
 
4g magic communication
4g magic communication4g magic communication
4g magic communication
 
LOCAL multipoint distribuition service.pdf
LOCAL multipoint distribuition service.pdfLOCAL multipoint distribuition service.pdf
LOCAL multipoint distribuition service.pdf
 
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfPreliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
 
Do black holes exist
Do black holes existDo black holes exist
Do black holes exist
 
2002023
20020232002023
2002023
 
CAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdfCAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdf
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
CS8601-IQ.pdf
CS8601-IQ.pdfCS8601-IQ.pdf
CS8601-IQ.pdf
 
IRJET- Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ...
IRJET-  	  Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ...IRJET-  	  Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ...
IRJET- Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ...
 
International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
 
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
Candidate solutions to improve Wireless Mesh Networks WMNs performance to mee...
 

Recently uploaded

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
Fwdays
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 

Recently uploaded (20)

From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 

Wireless Communications and a Priority Access Protocol for Multiple Mobile Terminals in Factory Automation

  • 1. Wireless Communications and a Priority Access Protocol for Multiple Mobile Terminals in Factory Automation SUBMITTED BY :- SANDEEP KR. MAHAWAR 2011UEC1303 EC-3
  • 2. Contents  INTRODUCTION  WIRELESS ACCESS INFRASTRUCTURE  WIRELESS ACCESS PROTOCOLS  PERFORMANCE EVALUATION AND NUMERICAL RESULTS  CONCLUSION
  • 3. Introduction MANUFACTURING automation requires many mobile terminals. A robot is a good example of mobile terminals in manufacturing automation. Recently, multirobot systems have received much attention. The main reason for setting up a multirobot system is because two or more robots are necessary for performing manufacturing tasks, for example, carrying large objects. The problem then arises from the fact that coordination of these mobile devices becomes important. Recently, using local area network (LAN) for such operation has become an active research topic. Since 1980’s, the hardwired, token bus-based manufacturing automation protocol (MAP) network has been widely accepted for computer integrated manufacturing.
  • 4. Wireless LAN A wireless local area network (WLAN) would lessen the time and cost of factory installation, restructuring and network maintenance and may allow mobile, hand-held communication users. In other words, a WLAN is a relatively low cost network of communicating control information and data to and from any mobile and fixed terminals in a factory automation application.
  • 5. WIRELESS ACCESS INFRASTRUCTURE The following subsection will describe our proposed wireless access infrastructure  The Current Standards  Adding Wireless Strategy  CDMA Techniques
  • 6. The Current Standards  Two widely used standards are the proposed manufacturing automation protocol (MAP) and Fieldbus (IEC TC65C).  For convenience of documentation and separation of functionality, MAP is referenced on the seven-layer ISO model while Fieldbus specifications are partitioned into five-layer structures.  These two standards characterize two different layer structures.
  • 7. Adding Wireless Strategy The most desirable application of wireless access in factory integration is communication to and from mobile devices such as AMR’s and robots that may be clustered in islands of automation. There exist moving difficulties when these mobile devices are wired to the network. Therefore, we propose that each island can be covered by a base station. There could be several base stations in each factory floor, depending on the size of subnetworks and the number of mobile devices. Each base station controls a radio coverage area (RCA), and the RCA’s may be nonuniform and partially overlapping.
  • 8. CDMA Techniques Most current WLAN products employ the code division multiple access (CDMA) techniques. The CDMA systems use spread spectrum technologies that are very suitable for indoor communication due to their capabilities in anti-multipath, antijamming, and low probability of interception and detection. In addition, the capability of allowing asynchronous, overlapped transmissions may be the key for commercial applications.
  • 9. WIRELESS ACCESS PROTOCOLS  Multiple access schemes used in traditional LAN’s include random access (Aloha), token passing and polling access (token bus or ring), deterministic access (TDMA/FDMA), and demand access (handshake).
  • 10. PERFORMANCE EVALUATION AND NUMERICAL RESULTS we classify the traffic class into type I and type II. A type-I traffic is the traffic that carries timely information that has to reach the supervisory computer on time, otherwise, it becomes useless. This kind of traffic must have priority over the other traffic. Also, it is critical to errors, thus requires more reliable transmission. A type-II traffic, on the other hand, is less sensitive to delay (latency) and may not be critical to errors (can be retransmitted).  Probability that an idle type-I unit will generate packet for transmission at next frame is  Probability that an idle type-II unit will generate packet for transmission at next frame is
  • 11.  The average delay normalized to a frame period as The average probability of successful handshaking
  • 12. CONCLUSION We can conclude that by using the wireless communication and suitable protocol, the installation and maintenance cost can be reduced without deteriorating its performance, and it also provides the flexibility in factory automation planning and restructuring.