2,960 research outputs found
The complexity of resolving conflicts on MAC
We consider the fundamental problem of multiple stations competing to
transmit on a multiple access channel (MAC). We are given stations out of
which at most are active and intend to transmit a message to other stations
using MAC. All stations are assumed to be synchronized according to a time
clock. If stations node transmit in the same round, then the MAC provides
the feedback whether , (collision occurred) or . When ,
then a single station is indeed able to successfully transmit a message, which
is received by all other nodes. For the above problem the active stations have
to schedule their transmissions so that they can singly, transmit their
messages on MAC, based only on the feedback received from the MAC in previous
round.
For the above problem it was shown in [Greenberg, Winograd, {\em A Lower
bound on the Time Needed in the Worst Case to Resolve Conflicts
Deterministically in Multiple Access Channels}, Journal of ACM 1985] that every
deterministic adaptive algorithm should take rounds
in the worst case. The fastest known deterministic adaptive algorithm requires
rounds. The gap between the upper and lower bound is
round. It is substantial for most values of : When constant and (for any constant , the lower bound is
respectively and O(n), which is trivial in both cases. Nevertheless,
the above lower bound is interesting indeed when poly(). In this
work, we present a novel counting argument to prove a tight lower bound of
rounds for all deterministic, adaptive algorithms, closing
this long standing open question.}Comment: Xerox internal report 27th July; 7 page
Random Access Protocols for Massive MIMO
5G wireless networks are expected to support new services with stringent
requirements on data rates, latency and reliability. One novel feature is the
ability to serve a dense crowd of devices, calling for radically new ways of
accessing the network. This is the case in machine-type communications, but
also in urban environments and hotspots. In those use cases, the high number of
devices and the relatively short channel coherence interval do not allow
per-device allocation of orthogonal pilot sequences. This article motivates the
need for random access by the devices to pilot sequences used for channel
estimation, and shows that Massive MIMO is a main enabler to achieve fast
access with high data rates, and delay-tolerant access with different data rate
levels. Three pilot access protocols along with data transmission protocols are
described, fulfilling different requirements of 5G services
Markov Decision Processes with Applications in Wireless Sensor Networks: A Survey
Wireless sensor networks (WSNs) consist of autonomous and resource-limited
devices. The devices cooperate to monitor one or more physical phenomena within
an area of interest. WSNs operate as stochastic systems because of randomness
in the monitored environments. For long service time and low maintenance cost,
WSNs require adaptive and robust methods to address data exchange, topology
formulation, resource and power optimization, sensing coverage and object
detection, and security challenges. In these problems, sensor nodes are to make
optimized decisions from a set of accessible strategies to achieve design
goals. This survey reviews numerous applications of the Markov decision process
(MDP) framework, a powerful decision-making tool to develop adaptive algorithms
and protocols for WSNs. Furthermore, various solution methods are discussed and
compared to serve as a guide for using MDPs in WSNs
A 3-player protocol preventing persistence in strategic contention with limited feedback
In this paper, we study contention resolution protocols from a game-theoretic
perspective. In a recent work, we considered acknowledgment-based protocols,
where a user gets feedback from the channel only when she attempts
transmission. In this case she will learn whether her transmission was
successful or not. One of the main results of ESA2016 was that no
acknowledgment-based protocol can be in equilibrium. In fact, it seems that
many natural acknowledgment-based protocols fail to prevent users from
unilaterally switching to persistent protocols that always transmit with
probability 1. It is therefore natural to ask how powerful a protocol must be
so that it can beat persistent deviators.
In this paper we consider age-based protocols, which can be described by a
sequence of probabilities of transmitting in each time step. Those
probabilities are given beforehand and do not change based on the transmission
history. We present a 3-player age-based protocol that can prevent users from
unilaterally deviating to a persistent protocol in order to decrease their
expected transmission time. It is worth noting that the answer to this question
does not follow from the results and proof ideas of ESA2016. Our protocol is
non-trivial, in the sense that, when all players use it, finite expected
transmission time is guaranteed. In fact, we show that this protocol is
preferable to any deadline protocol in which, after some fixed time, attempt
transmission with probability 1 in every subsequent step. An advantage of our
protocol is that it is very simple to describe, and users only need a counter
to keep track of time. Whether there exist -player age-based protocols that
do not use counters and can prevent persistence is left as an open problem for
future research.Comment: arXiv admin note: substantial text overlap with arXiv:1606.0658
Underwater Data Collection Using Robotic Sensor Networks
We examine the problem of utilizing an autonomous underwater vehicle (AUV) to collect data from an underwater sensor network. The sensors in the network are equipped with acoustic modems that provide noisy, range-limited communication. The AUV must plan a path that maximizes the information collected while minimizing travel time or fuel expenditure. We propose AUV path planning methods that extend algorithms for variants of the Traveling Salesperson Problem (TSP). While executing a path, the AUV can improve performance by communicating with multiple nodes in the network at once. Such multi-node communication requires a scheduling protocol that is robust to channel variations and interference. To this end, we examine two multiple access protocols for the underwater data collection scenario, one based on deterministic access and another based on random access. We compare the proposed algorithms to baseline strategies through simulated experiments that utilize models derived from experimental test data. Our results demonstrate that properly designed communication models and scheduling protocols are essential for choosing the appropriate path planning algorithms for data collection.United States. Office of Naval Research (ONR N00014-09-1-0700)United States. Office of Naval Research (ONR N00014-07-1-00738)National Science Foundation (U.S.) (NSF 0831728)National Science Foundation (U.S.) (NSF CCR-0120778)National Science Foundation (U.S.) (NSF CNS-1035866
- …