Tracking a Large Number of Tokens: A Customised Prioritised Medium-access Protocol for Target Responses


V. Rodriguez, F. Jondral, H. Jaekel,


        An organisation is interested in tracking a large number of potentially moving targets , each fitted with a simple tracking-assisting device, and roaming over a known, limited geographical area. To assist in tracking, a well-designed network of fixed anchors , with plentiful energy and computing power, and a reliable (say wired) communication channel for coordination is available. Anchors take turns (with spatial reuse as possible) sending a ranging request (RR) and receiving responses from targets. A target response is heard by several anchors, which enables the system to estimate the target s current location. The key issue is to coordinate the targets responses. At a given moment some targets may be inactive, asleep, or simply static, while others may be moving at various speeds. Potentially, many active targets may congregate in certain subarea. A simple time-division solution is inappropriate because many time-slots would be needed to accommodate the maximum number of targets, and many would be wasted at a given time. A simple ALOHA-style solution would be problematic when many active targets are near each other. Below, we provide a customised priority-based medium-access solution, which works for a large (or small) number of targets under the assumed scenario. The present report covers conceptual/qualitative aspects only.

BibTEX Reference Entry 

	author = {Virgilio Rodriguez and Friedrich Jondral and Holger Jaekel},
	title = "Tracking a Large Number of Tokens: A Customised Prioritised Medium-access Protocol for Target Responses",
	booktitle = "ICT-MobileSummit",
	address = {Santander},
	month = Jun,
	year = 2009,
	hsb = hsb910015875,


 Download paper  Download bibtex-file

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights there in are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.