3 research outputs found

    Stability Analysis of Frame Slotted Aloha Protocol

    Full text link
    Frame Slotted Aloha (FSA) protocol has been widely applied in Radio Frequency Identification (RFID) systems as the de facto standard in tag identification. However, very limited work has been done on the stability of FSA despite its fundamental importance both on the theoretical characterisation of FSA performance and its effective operation in practical systems. In order to bridge this gap, we devote this paper to investigating the stability properties of FSA by focusing on two physical layer models of practical importance, the models with single packet reception and multipacket reception capabilities. Technically, we model the FSA system backlog as a Markov chain with its states being backlog size at the beginning of each frame. The objective is to analyze the ergodicity of the Markov chain and demonstrate its properties in different regions, particularly the instability region. By employing drift analysis, we obtain the closed-form conditions for the stability of FSA and show that the stability region is maximised when the frame length equals the backlog size in the single packet reception model and when the ratio of the backlog size to frame length equals in order of magnitude the maximum multipacket reception capacity in the multipacket reception model. Furthermore, to characterise system behavior in the instability region, we mathematically demonstrate the existence of transience of the backlog Markov chain.Comment: 14 pages, submitted to IEEE Transaction on Information Theor

    Performance analysis of a slotted-ALOHA protocol on a capture channel with fading

    No full text
    We consider the slotted ALOHA protocol on a channel with a capture effect. There are M < ∞ users each with an infinite buffer. If in a slot, i packets are transmitted, then the probability of a successful reception of a packet is qi. This model contains the CDMA protocols as special cases. We obtain sufficient rate conditions, which are close to necessary for stability of the system, when the arrival streams are stationary ergodic. Under the same rate conditions, for general regenerative arrival streams, we obtain the rates of convergence to stationarity, finiteness of stationary moments and various functional limit theorems. Our arrival streams contain all the traffic models suggested in the recent literature, including the ones which display long range dependence. We also obtain bounds on the stationary moments of waiting times which can be tight under realistic conditions. Finally, we obtain several results on the transient performance of the system, e.g., first time to overflow and the limits of the overflow process. We also extend the above results to the case of a capture channel exhibiting Markov modulated fading. Most of our results and proofs will be shown to hold also for the slotted ALOHA protocol without capture

    Distributed MAC protocol for networks with multipacket reception capability and spatially distributed nodes

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2007.Includes bibliographical references (p. 123-127).The physical layer of future wireless networks will be based on novel radio technologies such as Ultra-Wideband (UWB) and Multiple-Input Multiple-Output (MIMO). One of the important capabilities of such technologies is the ability to capture a few packets simultaneously. This capability has the potential to improve the performance of the MAC layer. However, we show that in networks with spatially distributed nodes, reusing MAC protocols originally designed for narrow-band systems (e.g., CSMA/CA) is inefficient. It is well known that when networks with spatially distributed nodes operate with such MAC protocols, the channel may be captured by nodes that are near the destination. We show that when the physical layer enables multi-packet reception, the negative implications of reusing the legacy protocols include not only such unfairness but also a significant throughput reduction. We present a number of simple alternative backoff mechanisms that attempt to overcome the throughput reduction phenomenon. We evaluate the performance of these mechanisms via exact analysis, approximations, and simulation, thereby demonstrating that they usually outperform the legacy backoff mechanisms. We then discuss the implications of the results on developing realistic MAC protocols for networks with a multi-packet reception capability and in particular for UWB networks.by Guner Dincer Celik.S.M
    corecore