2,762 research outputs found
Constant Delivery Delay Protocol Sequences for the Collision Channel Without Feedback
International audienceWe consider a collision channel model without feedback based on a time-slotted communication channel shared by K users. In this model, packets transmitted in the same time slot collide with each other and are unrecoverable. Each user accesses the channel according to an internal periodical pattern called protocol sequence. Due to the lack of feedback, users cannot synchronize their protocol sequences, leading to unavoidable collisions and varying throughput. Protocol sequences that provide constant throughput regardless of delay offsets between users are called shift-invariant (SI), they have been studied and characterized in previous work. We propose a new class of SI sequences: Constant Individual Delivery Delay (CIDD) sequences which ensure that the delay between two successfully delivered packets is constant for each user. We present a characterization of CIDD sequences. We also prove that CIDD sequences can achieve the lower bound of SI sequences period but not the optimal throughput
Construction and Applications of CRT Sequences
Protocol sequences are used for channel access in the collision channel
without feedback. Each user accesses the channel according to a deterministic
zero-one pattern, called the protocol sequence. In order to minimize
fluctuation of throughput due to delay offsets, we want to construct protocol
sequences whose pairwise Hamming cross-correlation is as close to a constant as
possible. In this paper, we present a construction of protocol sequences which
is based on the bijective mapping between one-dimensional sequence and
two-dimensional array by the Chinese Remainder Theorem (CRT). In the
application to the collision channel without feedback, a worst-case lower bound
on system throughput is derived.Comment: 16 pages, 5 figures. Some typos in Section V are correcte
Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access
In this paper, a random access scheme is introduced which relies on the
combination of packet erasure correcting codes and successive interference
cancellation (SIC). The scheme is named coded slotted ALOHA. A bipartite graph
representation of the SIC process, resembling iterative decoding of generalized
low-density parity-check codes over the erasure channel, is exploited to
optimize the selection probabilities of the component erasure correcting codes
via density evolution analysis. The capacity (in packets per slot) of the
scheme is then analyzed in the context of the collision channel without
feedback. Moreover, a capacity bound is developed and component code
distributions tightly approaching the bound are derived.Comment: The final version to appear in IEEE Trans. Inf. Theory. 18 pages, 10
figure
Spatially-Coupled Random Access on Graphs
In this paper we investigate the effect of spatial coupling applied to the
recently-proposed coded slotted ALOHA (CSA) random access protocol. Thanks to
the bridge between the graphical model describing the iterative interference
cancelation process of CSA over the random access frame and the erasure
recovery process of low-density parity-check (LDPC) codes over the binary
erasure channel (BEC), we propose an access protocol which is inspired by the
convolutional LDPC code construction. The proposed protocol exploits the
terminations of its graphical model to achieve the spatial coupling effect,
attaining performance close to the theoretical limits of CSA. As for the
convolutional LDPC code case, large iterative decoding thresholds are obtained
by simply increasing the density of the graph. We show that the threshold
saturation effect takes place by defining a suitable counterpart of the
maximum-a-posteriori decoding threshold of spatially-coupled LDPC code
ensembles. In the asymptotic setting, the proposed scheme allows sustaining a
traffic close to 1 [packets/slot].Comment: To be presented at IEEE ISIT 2012, Bosto
Constructions of Robust Protocol Sequences for Wireless Sensor and Ad hoc Networks
International audienceIn this paper, a class of periodic unipolar binary sequences are investigated for their potential applications in defining new protocols for distributed wireless multiple access. Based on linear congruence sequences, one can show that for any finite subset of these sequences with total proportional rate not exceeding a specific threshold, there cannot be enough collisions to completely block any particular sequence, no matter how they are shifted with respect to one another. This property can be exploited in certain applications such as wireless sensor and ad hoc networks. A further investigation on how to enhance the allowable rate sum is carried out. New protocol sequences with interesting and useful properties are designed accordingly
The design and analysis of protocol sequences for robust wireless accessing
International audienceIn this paper, a family of linear congruence sequences with interesting cross-correlation properties is investigated for potential applications in defining new multiple access protocols for distributed wireless systems. One can show that for any finite subset of the sequences with rate sum not exceeding a certain level, there cannot have enough collisions to completely block any particular user no matter how they are shifted with respect to one another. The user un-suppressibility and service guarantee can be exploited in many applications such as wireless sensor or impulse radio systems. To enhance the system's allowable rate sum while possessing the non-blocking property, new protocol sequences are designed. Besides, the throughput shift-invariant property is obtained
- …