Wireless Communications and a Priority Access Protocol for Multiple Mobile Terminals in Factory Automation

MNIT Jaipur
MNIT JaipurElectronics and Communications engineering
Wireless Communications and a Priority 
Access Protocol for Multiple Mobile 
Terminals in Factory Automation 
SUBMITTED BY :- 
SANDEEP KR. MAHAWAR 
2011UEC1303 
EC-3
Contents 
 INTRODUCTION 
 WIRELESS ACCESS INFRASTRUCTURE 
 WIRELESS ACCESS PROTOCOLS 
 PERFORMANCE EVALUATION AND NUMERICAL RESULTS 
 CONCLUSION
Introduction 
MANUFACTURING automation requires many mobile terminals. A robot is a good 
example of mobile terminals in manufacturing automation. Recently, multirobot 
systems have received much attention. The main reason for setting up a multirobot 
system is because two or more robots are necessary for performing manufacturing 
tasks, for example, carrying large objects. The problem then arises from the fact 
that coordination of these mobile devices becomes important. Recently, using 
local area network (LAN) for such operation has become an active research topic. 
Since 1980’s, the hardwired, token bus-based manufacturing automation protocol 
(MAP) network has been widely accepted for computer integrated 
manufacturing.
Wireless LAN 
A wireless local area network (WLAN) would lessen the 
time and cost of factory installation, restructuring and 
network maintenance and may allow mobile, hand-held 
communication users. In other words, a WLAN is a 
relatively low cost network of communicating control 
information and data to and from any mobile and fixed 
terminals in a factory automation application.
WIRELESS ACCESS INFRASTRUCTURE 
The following subsection will describe our proposed 
wireless access infrastructure 
 The Current Standards 
 Adding Wireless Strategy 
 CDMA Techniques
The Current Standards 
 Two widely used standards are the proposed manufacturing 
automation protocol (MAP) and Fieldbus (IEC TC65C). 
 For convenience of documentation and separation of 
functionality, MAP is referenced on the seven-layer ISO 
model while Fieldbus specifications are partitioned into five-layer 
structures. 
 These two standards characterize two different layer 
structures.
Adding Wireless Strategy 
The most desirable application of wireless access in factory 
integration is communication to and from mobile devices such as 
AMR’s and robots that may be clustered in islands of automation. 
There exist moving difficulties when these mobile devices are wired to 
the network. Therefore, we propose that each island can be covered 
by a base station. There could be several base stations in each 
factory floor, depending on the size of subnetworks and the number 
of mobile devices. Each base station controls a radio coverage area 
(RCA), and the RCA’s may be nonuniform and partially overlapping.
CDMA Techniques 
Most current WLAN products employ the code division 
multiple access (CDMA) techniques. The CDMA systems 
use spread spectrum technologies that are very suitable 
for indoor communication due to their capabilities in anti-multipath, 
antijamming, and low probability of 
interception and detection. In addition, the capability of 
allowing asynchronous, overlapped transmissions may be 
the key for commercial applications.
WIRELESS ACCESS PROTOCOLS 
 Multiple access schemes used in traditional LAN’s include random access 
(Aloha), token passing and polling access (token bus or ring), deterministic 
access (TDMA/FDMA), and demand access (handshake).
PERFORMANCE EVALUATION AND 
NUMERICAL RESULTS 
we classify the traffic class into type I and type II. A type-I traffic is the traffic that 
carries timely information that has to reach the supervisory computer on time, 
otherwise, it becomes useless. This kind of traffic must have priority over the other 
traffic. Also, it is critical to errors, thus requires more reliable transmission. A type-II 
traffic, on the other hand, is less sensitive to delay (latency) and may not be 
critical to errors (can be retransmitted). 
 Probability that an idle type-I unit will generate packet for transmission at next 
frame is 
 Probability that an idle type-II unit will generate packet for transmission at next 
frame is
 The average delay normalized to a frame period as 
The average probability of successful handshaking
CONCLUSION 
We can conclude that by using the wireless 
communication and suitable protocol, the 
installation and maintenance cost can be 
reduced without deteriorating its performance, 
and it also provides the flexibility in factory 
automation planning and restructuring.
Wireless Communications and a Priority Access Protocol for Multiple Mobile Terminals in Factory Automation
1 de 13

Recomendados

Multiple Access Protocal por
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
14.6K vistas67 diapositivas
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTAN por
Medium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTANMedium Access PROTOCOL b yENGR.  FAWAD KHAN UET BANNU KP PAKISTAN
Medium Access PROTOCOL b yENGR. FAWAD KHAN UET BANNU KP PAKISTANirfan sami
534 vistas33 diapositivas
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS por
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS
MULTIPLE ACCESS PROTOCOL COMPUTER NETWORKS garishma bhatia
995 vistas13 diapositivas
Aloha protocol in data communication and networking por
Aloha protocol in data communication and networkingAloha protocol in data communication and networking
Aloha protocol in data communication and networkingkritikadas3
315 vistas15 diapositivas
Controlled Access Protocols por
Controlled Access ProtocolsControlled Access Protocols
Controlled Access ProtocolsPruthviraj Konu
18K vistas26 diapositivas

Más contenido relacionado

La actualidad más candente

Media Access Control (MAC Layer) por
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)Meenakshi Paul
971 vistas44 diapositivas
aloha por
alohaaloha
alohaDeepikaT13
1.7K vistas42 diapositivas
Media Access Control por
Media Access ControlMedia Access Control
Media Access ControlHusnainHadi
232 vistas24 diapositivas
Frame Relayprint por
Frame RelayprintFrame Relayprint
Frame Relayprintguest6206a05
976 vistas18 diapositivas
TCP Over Wireless por
TCP Over WirelessTCP Over Wireless
TCP Over WirelessFarooq Khan
6.2K vistas92 diapositivas
Mac adhoc (1) por
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)hinalala
1.1K vistas28 diapositivas

La actualidad más candente(20)

Media Access Control (MAC Layer) por Meenakshi Paul
Media Access Control (MAC Layer)Media Access Control (MAC Layer)
Media Access Control (MAC Layer)
Meenakshi Paul971 vistas
Media Access Control por HusnainHadi
Media Access ControlMedia Access Control
Media Access Control
HusnainHadi232 vistas
TCP Over Wireless por Farooq Khan
TCP Over WirelessTCP Over Wireless
TCP Over Wireless
Farooq Khan6.2K vistas
Mac adhoc (1) por hinalala
Mac adhoc (1)Mac adhoc (1)
Mac adhoc (1)
hinalala1.1K vistas
Lect04 (1) por hinalala
Lect04 (1)Lect04 (1)
Lect04 (1)
hinalala1.4K vistas
Mac protocols por Anuj Gupta
Mac protocolsMac protocols
Mac protocols
Anuj Gupta9.4K vistas
Computer Network - Network Layer por Manoj Kumar
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
Manoj Kumar10K vistas
Switching & VLAN(4knet.ir) por Azad Kaki
Switching & VLAN(4knet.ir)Switching & VLAN(4knet.ir)
Switching & VLAN(4knet.ir)
Azad Kaki208 vistas
Presentation Routing algorithm por Basit Hussain
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
Basit Hussain2.6K vistas
Mac protocols sensor_20071105_slideshare por Chih-Yu Lin
Mac protocols sensor_20071105_slideshareMac protocols sensor_20071105_slideshare
Mac protocols sensor_20071105_slideshare
Chih-Yu Lin8.6K vistas

Destacado

Multiple access protocol por
Multiple access protocolMultiple access protocol
Multiple access protocolMerlin Florrence
66K vistas35 diapositivas
Multiple access control protocol por
Multiple access control protocol Multiple access control protocol
Multiple access control protocol meenamunesh
50.3K vistas37 diapositivas
blutooth based smart sensor network por
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor networkMaulik Patel
16.2K vistas20 diapositivas
Bluetooth technology presentation por
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentationKrishna Kumari
195.9K vistas29 diapositivas
wireless network IEEE 802.11 por
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
25.8K vistas22 diapositivas
PPT on Bluetooth Based Wireless Sensor Networks por
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor NetworksSiya Agarwal
88.5K vistas50 diapositivas

Destacado(6)

Multiple access control protocol por meenamunesh
Multiple access control protocol Multiple access control protocol
Multiple access control protocol
meenamunesh50.3K vistas
blutooth based smart sensor network por Maulik Patel
blutooth based smart sensor networkblutooth based smart sensor network
blutooth based smart sensor network
Maulik Patel16.2K vistas
Bluetooth technology presentation por Krishna Kumari
Bluetooth technology presentationBluetooth technology presentation
Bluetooth technology presentation
Krishna Kumari195.9K vistas
wireless network IEEE 802.11 por Shreejan Acharya
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Shreejan Acharya25.8K vistas
PPT on Bluetooth Based Wireless Sensor Networks por Siya Agarwal
PPT on Bluetooth Based Wireless Sensor NetworksPPT on Bluetooth Based Wireless Sensor Networks
PPT on Bluetooth Based Wireless Sensor Networks
Siya Agarwal88.5K vistas

Similar a Wireless Communications and a Priority Access Protocol for Multiple Mobile Terminals in Factory Automation

ATM for Navy Applications.PDF por
ATM for Navy Applications.PDFATM for Navy Applications.PDF
ATM for Navy Applications.PDFDeborah Goldsmith
99 vistas5 diapositivas
Qualcomm 5G Standard Candidates R&D Insights from Patents por
Qualcomm 5G Standard Candidates R&D Insights from PatentsQualcomm 5G Standard Candidates R&D Insights from Patents
Qualcomm 5G Standard Candidates R&D Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
478 vistas4 diapositivas
Cy31439446 por
Cy31439446Cy31439446
Cy31439446IJMER
308 vistas8 diapositivas
1880153 1880165 por
1880153 18801651880153 1880165
1880153 1880165Gave Me Opnet 14.5 ayoob
127 vistas6 diapositivas
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul... por
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...IJNSA Journal
13 vistas28 diapositivas
Ft2510561062 por
Ft2510561062Ft2510561062
Ft2510561062IJERA Editor
264 vistas7 diapositivas

Similar a Wireless Communications and a Priority Access Protocol for Multiple Mobile Terminals in Factory Automation(20)

Cy31439446 por IJMER
Cy31439446Cy31439446
Cy31439446
IJMER308 vistas
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul... por IJNSA Journal
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
Performance of Vehicle-to-Vehicle Communication using IEEE 802.11p in Vehicul...
IJNSA Journal13 vistas
Data Processing And Processing Of Data por Megan Moore
Data Processing And Processing Of DataData Processing And Processing Of Data
Data Processing And Processing Of Data
Megan Moore4 vistas
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P por ijwmn
SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P SPEECH QUALITY EVALUATION BASED CODEC  FOR VOIP OVER 802.11P
SPEECH QUALITY EVALUATION BASED CODEC FOR VOIP OVER 802.11P
ijwmn268 vistas
Optical Ofdm For Passive Optical Network por Rachel Phillips
Optical Ofdm For Passive Optical NetworkOptical Ofdm For Passive Optical Network
Optical Ofdm For Passive Optical Network
Rachel Phillips9 vistas
LOCAL multipoint distribuition service.pdf por JoelNtemoBampangi
LOCAL multipoint distribuition service.pdfLOCAL multipoint distribuition service.pdf
LOCAL multipoint distribuition service.pdf
JoelNtemoBampangi68 vistas
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf por YAAKOVSOLOMON1
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdfPreliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
Preliminary work-ideas of design-CRDSA_IRSA-Zhongtian_thesis.pdf
YAAKOVSOLOMON14 vistas
2002023 por pglehn
20020232002023
2002023
pglehn113 vistas
Location Convenience Is An Important Factor When Customers... por Angie Jensen
Location Convenience Is An Important Factor When Customers...Location Convenience Is An Important Factor When Customers...
Location Convenience Is An Important Factor When Customers...
Angie Jensen3 vistas
CAN and TTP are the two wired network protocols used for distributed .pdf por ssuserc77a341
CAN and TTP are the two wired network protocols used for distributed .pdfCAN and TTP are the two wired network protocols used for distributed .pdf
CAN and TTP are the two wired network protocols used for distributed .pdf
ssuserc77a3418 vistas
IRJET- Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ... por IRJET Journal
IRJET-  	  Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ...IRJET-  	  Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ...
IRJET- Mobile Handoff using Wireless CAN Protocol: An Approach to Reduce ...
IRJET Journal20 vistas
International Journal of Computer Science, Engineering and Information Techno... por ijcseit
International Journal of Computer Science, Engineering and Information Techno...International Journal of Computer Science, Engineering and Information Techno...
International Journal of Computer Science, Engineering and Information Techno...
ijcseit7 vistas

Último

iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...Bernd Ruecker
50 vistas69 diapositivas
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online por
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineShapeBlue
181 vistas19 diapositivas
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool por
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPoolShapeBlue
84 vistas10 diapositivas
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... por
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...ShapeBlue
154 vistas62 diapositivas
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesShapeBlue
210 vistas15 diapositivas
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
153 vistas59 diapositivas

Último(20)

iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas... por Bernd Ruecker
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
iSAQB Software Architecture Gathering 2023: How Process Orchestration Increas...
Bernd Ruecker50 vistas
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online por ShapeBlue
KVM Security Groups Under the Hood - Wido den Hollander - Your.OnlineKVM Security Groups Under the Hood - Wido den Hollander - Your.Online
KVM Security Groups Under the Hood - Wido den Hollander - Your.Online
ShapeBlue181 vistas
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool por ShapeBlue
Extending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPoolExtending KVM Host HA for Non-NFS Storage -  Alex Ivanov - StorPool
Extending KVM Host HA for Non-NFS Storage - Alex Ivanov - StorPool
ShapeBlue84 vistas
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P... por ShapeBlue
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
Developments to CloudStack’s SDN ecosystem: Integration with VMWare NSX 4 - P...
ShapeBlue154 vistas
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates por ShapeBlue
Keynote Talk: Open Source is Not Dead - Charles Schulz - VatesKeynote Talk: Open Source is Not Dead - Charles Schulz - Vates
Keynote Talk: Open Source is Not Dead - Charles Schulz - Vates
ShapeBlue210 vistas
Digital Personal Data Protection (DPDP) Practical Approach For CISOs por Priyanka Aash
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Priyanka Aash153 vistas
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit... por ShapeBlue
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
Transitioning from VMware vCloud to Apache CloudStack: A Path to Profitabilit...
ShapeBlue117 vistas
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ por ShapeBlue
Confidence in CloudStack - Aron Wagner, Nathan Gleason - AmericConfidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
Confidence in CloudStack - Aron Wagner, Nathan Gleason - Americ
ShapeBlue88 vistas
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava... por ShapeBlue
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
Centralized Logging Feature in CloudStack using ELK and Grafana - Kiran Chava...
ShapeBlue101 vistas
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or... por ShapeBlue
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
Zero to Cloud Hero: Crafting a Private Cloud from Scratch with XCP-ng, Xen Or...
ShapeBlue158 vistas
Igniting Next Level Productivity with AI-Infused Data Integration Workflows por Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software385 vistas
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O... por ShapeBlue
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
Declarative Kubernetes Cluster Deployment with Cloudstack and Cluster API - O...
ShapeBlue88 vistas
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha... por ShapeBlue
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
Mitigating Common CloudStack Instance Deployment Failures - Jithin Raju - Sha...
ShapeBlue138 vistas
Business Analyst Series 2023 - Week 4 Session 7 por DianaGray10
Business Analyst Series 2023 -  Week 4 Session 7Business Analyst Series 2023 -  Week 4 Session 7
Business Analyst Series 2023 - Week 4 Session 7
DianaGray10126 vistas
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue por ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlueCloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
CloudStack Managed User Data and Demo - Harikrishna Patnala - ShapeBlue
ShapeBlue94 vistas
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f... por TrustArc
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc Webinar - Managing Online Tracking Technology Vendors_ A Checklist f...
TrustArc160 vistas
Ransomware is Knocking your Door_Final.pdf por Security Bootcamp
Ransomware is Knocking your Door_Final.pdfRansomware is Knocking your Door_Final.pdf
Ransomware is Knocking your Door_Final.pdf
Security Bootcamp90 vistas
Why and How CloudStack at weSystems - Stephan Bienek - weSystems por ShapeBlue
Why and How CloudStack at weSystems - Stephan Bienek - weSystemsWhy and How CloudStack at weSystems - Stephan Bienek - weSystems
Why and How CloudStack at weSystems - Stephan Bienek - weSystems
ShapeBlue197 vistas
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue por ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
2FA and OAuth2 in CloudStack - Andrija Panić - ShapeBlue
ShapeBlue103 vistas

Wireless Communications and a Priority Access Protocol for Multiple Mobile Terminals in Factory Automation

  • 1. Wireless Communications and a Priority Access Protocol for Multiple Mobile Terminals in Factory Automation SUBMITTED BY :- SANDEEP KR. MAHAWAR 2011UEC1303 EC-3
  • 2. Contents  INTRODUCTION  WIRELESS ACCESS INFRASTRUCTURE  WIRELESS ACCESS PROTOCOLS  PERFORMANCE EVALUATION AND NUMERICAL RESULTS  CONCLUSION
  • 3. Introduction MANUFACTURING automation requires many mobile terminals. A robot is a good example of mobile terminals in manufacturing automation. Recently, multirobot systems have received much attention. The main reason for setting up a multirobot system is because two or more robots are necessary for performing manufacturing tasks, for example, carrying large objects. The problem then arises from the fact that coordination of these mobile devices becomes important. Recently, using local area network (LAN) for such operation has become an active research topic. Since 1980’s, the hardwired, token bus-based manufacturing automation protocol (MAP) network has been widely accepted for computer integrated manufacturing.
  • 4. Wireless LAN A wireless local area network (WLAN) would lessen the time and cost of factory installation, restructuring and network maintenance and may allow mobile, hand-held communication users. In other words, a WLAN is a relatively low cost network of communicating control information and data to and from any mobile and fixed terminals in a factory automation application.
  • 5. WIRELESS ACCESS INFRASTRUCTURE The following subsection will describe our proposed wireless access infrastructure  The Current Standards  Adding Wireless Strategy  CDMA Techniques
  • 6. The Current Standards  Two widely used standards are the proposed manufacturing automation protocol (MAP) and Fieldbus (IEC TC65C).  For convenience of documentation and separation of functionality, MAP is referenced on the seven-layer ISO model while Fieldbus specifications are partitioned into five-layer structures.  These two standards characterize two different layer structures.
  • 7. Adding Wireless Strategy The most desirable application of wireless access in factory integration is communication to and from mobile devices such as AMR’s and robots that may be clustered in islands of automation. There exist moving difficulties when these mobile devices are wired to the network. Therefore, we propose that each island can be covered by a base station. There could be several base stations in each factory floor, depending on the size of subnetworks and the number of mobile devices. Each base station controls a radio coverage area (RCA), and the RCA’s may be nonuniform and partially overlapping.
  • 8. CDMA Techniques Most current WLAN products employ the code division multiple access (CDMA) techniques. The CDMA systems use spread spectrum technologies that are very suitable for indoor communication due to their capabilities in anti-multipath, antijamming, and low probability of interception and detection. In addition, the capability of allowing asynchronous, overlapped transmissions may be the key for commercial applications.
  • 9. WIRELESS ACCESS PROTOCOLS  Multiple access schemes used in traditional LAN’s include random access (Aloha), token passing and polling access (token bus or ring), deterministic access (TDMA/FDMA), and demand access (handshake).
  • 10. PERFORMANCE EVALUATION AND NUMERICAL RESULTS we classify the traffic class into type I and type II. A type-I traffic is the traffic that carries timely information that has to reach the supervisory computer on time, otherwise, it becomes useless. This kind of traffic must have priority over the other traffic. Also, it is critical to errors, thus requires more reliable transmission. A type-II traffic, on the other hand, is less sensitive to delay (latency) and may not be critical to errors (can be retransmitted).  Probability that an idle type-I unit will generate packet for transmission at next frame is  Probability that an idle type-II unit will generate packet for transmission at next frame is
  • 11.  The average delay normalized to a frame period as The average probability of successful handshaking
  • 12. CONCLUSION We can conclude that by using the wireless communication and suitable protocol, the installation and maintenance cost can be reduced without deteriorating its performance, and it also provides the flexibility in factory automation planning and restructuring.