2,762 research outputs found

    Constant Delivery Delay Protocol Sequences for the Collision Channel Without Feedback

    Get PDF
    International audienceWe consider a collision channel model without feedback based on a time-slotted communication channel shared by K users. In this model, packets transmitted in the same time slot collide with each other and are unrecoverable. Each user accesses the channel according to an internal periodical pattern called protocol sequence. Due to the lack of feedback, users cannot synchronize their protocol sequences, leading to unavoidable collisions and varying throughput. Protocol sequences that provide constant throughput regardless of delay offsets between users are called shift-invariant (SI), they have been studied and characterized in previous work. We propose a new class of SI sequences: Constant Individual Delivery Delay (CIDD) sequences which ensure that the delay between two successfully delivered packets is constant for each user. We present a characterization of CIDD sequences. We also prove that CIDD sequences can achieve the lower bound of SI sequences period but not the optimal throughput

    Construction and Applications of CRT Sequences

    Full text link
    Protocol sequences are used for channel access in the collision channel without feedback. Each user accesses the channel according to a deterministic zero-one pattern, called the protocol sequence. In order to minimize fluctuation of throughput due to delay offsets, we want to construct protocol sequences whose pairwise Hamming cross-correlation is as close to a constant as possible. In this paper, we present a construction of protocol sequences which is based on the bijective mapping between one-dimensional sequence and two-dimensional array by the Chinese Remainder Theorem (CRT). In the application to the collision channel without feedback, a worst-case lower bound on system throughput is derived.Comment: 16 pages, 5 figures. Some typos in Section V are correcte

    Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access

    Full text link
    In this paper, a random access scheme is introduced which relies on the combination of packet erasure correcting codes and successive interference cancellation (SIC). The scheme is named coded slotted ALOHA. A bipartite graph representation of the SIC process, resembling iterative decoding of generalized low-density parity-check codes over the erasure channel, is exploited to optimize the selection probabilities of the component erasure correcting codes via density evolution analysis. The capacity (in packets per slot) of the scheme is then analyzed in the context of the collision channel without feedback. Moreover, a capacity bound is developed and component code distributions tightly approaching the bound are derived.Comment: The final version to appear in IEEE Trans. Inf. Theory. 18 pages, 10 figure

    Spatially-Coupled Random Access on Graphs

    Full text link
    In this paper we investigate the effect of spatial coupling applied to the recently-proposed coded slotted ALOHA (CSA) random access protocol. Thanks to the bridge between the graphical model describing the iterative interference cancelation process of CSA over the random access frame and the erasure recovery process of low-density parity-check (LDPC) codes over the binary erasure channel (BEC), we propose an access protocol which is inspired by the convolutional LDPC code construction. The proposed protocol exploits the terminations of its graphical model to achieve the spatial coupling effect, attaining performance close to the theoretical limits of CSA. As for the convolutional LDPC code case, large iterative decoding thresholds are obtained by simply increasing the density of the graph. We show that the threshold saturation effect takes place by defining a suitable counterpart of the maximum-a-posteriori decoding threshold of spatially-coupled LDPC code ensembles. In the asymptotic setting, the proposed scheme allows sustaining a traffic close to 1 [packets/slot].Comment: To be presented at IEEE ISIT 2012, Bosto

    Constructions of Robust Protocol Sequences for Wireless Sensor and Ad hoc Networks

    Get PDF
    International audienceIn this paper, a class of periodic unipolar binary sequences are investigated for their potential applications in defining new protocols for distributed wireless multiple access. Based on linear congruence sequences, one can show that for any finite subset of these sequences with total proportional rate not exceeding a specific threshold, there cannot be enough collisions to completely block any particular sequence, no matter how they are shifted with respect to one another. This property can be exploited in certain applications such as wireless sensor and ad hoc networks. A further investigation on how to enhance the allowable rate sum is carried out. New protocol sequences with interesting and useful properties are designed accordingly

    The design and analysis of protocol sequences for robust wireless accessing

    Get PDF
    International audienceIn this paper, a family of linear congruence sequences with interesting cross-correlation properties is investigated for potential applications in defining new multiple access protocols for distributed wireless systems. One can show that for any finite subset of the sequences with rate sum not exceeding a certain level, there cannot have enough collisions to completely block any particular user no matter how they are shifted with respect to one another. The user un-suppressibility and service guarantee can be exploited in many applications such as wireless sensor or impulse radio systems. To enhance the system's allowable rate sum while possessing the non-blocking property, new protocol sequences are designed. Besides, the throughput shift-invariant property is obtained
    corecore