8,106 research outputs found

    Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access

    Full text link
    In this paper, a random access scheme is introduced which relies on the combination of packet erasure correcting codes and successive interference cancellation (SIC). The scheme is named coded slotted ALOHA. A bipartite graph representation of the SIC process, resembling iterative decoding of generalized low-density parity-check codes over the erasure channel, is exploited to optimize the selection probabilities of the component erasure correcting codes via density evolution analysis. The capacity (in packets per slot) of the scheme is then analyzed in the context of the collision channel without feedback. Moreover, a capacity bound is developed and component code distributions tightly approaching the bound are derived.Comment: The final version to appear in IEEE Trans. Inf. Theory. 18 pages, 10 figure

    On the Stability of Contention Resolution Diversity Slotted ALOHA

    Get PDF
    In this paper a Time Division Multiple Access (TDMA) based Random Access (RA) channel with Successive Interference Cancellation (SIC) is considered for a finite user population and reliable retransmission mechanism on the basis of Contention Resolution Diversity Slotted ALOHA (CRDSA). A general mathematical model based on Markov Chains is derived which makes it possible to predict the stability regions of SIC-RA channels, the expected delays in equilibrium and the selection of parameters for a stable channel configuration. Furthermore the model enables the estimation of the average time before reaching instability. The presented model is verified against simulations and numerical results are provided for comparison of the stability of CRDSA versus the stability of traditional Slotted ALOHA (SA). The presented results show that CRDSA has not only a high gain over SA in terms of throughput but also in its stability.Comment: 10 pages, 12 figures This paper is submitted to the IEEE Transactions on Communications for possible publication. The IEEE copyright notice applie

    Teleoperation of passivity-based model reference robust control over the internet

    Get PDF
    This dissertation offers a survey of a known theoretical approach and novel experimental results in establishing a live communication medium through the internet to host a virtual communication environment for use in Passivity-Based Model Reference Robust Control systems with delays. The controller which is used as a carrier to support a robust communication between input-to-state stability is designed as a control strategy that passively compensates for position errors that arise during contact tasks and strives to achieve delay-independent stability for controlling of aircrafts or other mobile objects. Furthermore the controller is used for nonlinear systems, coordination of multiple agents, bilateral teleoperation, and collision avoidance thus maintaining a communication link with an upper bound of constant delay is crucial for robustness and stability of the overall system. For utilizing such framework an elucidation can be formulated by preparing site survey for analyzing not only the geographical distances separating the nodes in which the teleoperation will occur but also the communication parameters that define the virtual topography that the data will travel through. This survey will first define the feasibility of the overall operation since the teleoperation will be used to sustain a delay based controller over the internet thus obtaining a hypothetical upper bound for the delay via site survey is crucial not only for the communication system but also the delay is required for the design of the passivity-based model reference robust control. Following delay calculation and measurement via site survey, bandwidth tests for unidirectional and bidirectional communication is inspected to ensure that the speed is viable to maintain a real-time connection. Furthermore from obtaining the results it becomes crucial to measure the consistency of the delay throughout a sampled period to guarantee that the upper bound is not breached at any point within the communication to jeopardize the robustness of the controller. Following delay analysis a geographical and topological overview of the communication is also briefly examined via a trace-route to understand the underlying nodes and their contribution to the delay and round-trip consistency. To accommodate the communication channel for the controller the input and output data from both nodes need to be encapsulated within a transmission control protocol via a multithreaded design of a robust program within the C language. The program will construct a multithreaded client-server relationship in which the control data is transmitted. For added stability and higher level of security the channel is then encapsulated via an internet protocol security by utilizing a protocol suite for protecting the communication by authentication and encrypting each packet of the session using negotiation of cryptographic keys during each session

    Measurement-induced two-qubit entanglement in a bad cavity: Fundamental and practical considerations

    Full text link
    An entanglement-generating protocol is described for two qubits coupled to a cavity field in the bad-cavity limit. By measuring the amplitude of a field transmitted through the cavity, an entangled spin-singlet state can be established probabilistically. Both fundamental limitations and practical measurement schemes are discussed, and the influence of dissipative processes and inhomogeneities in the qubits are analyzed. The measurement-based protocol provides criteria for selecting states with an infidelity scaling linearly with the qubit-decoherence rate.Comment: 13 pages, 7 figures, submitted to Phys. Rev.

    Quantum cryptography: key distribution and beyond

    Full text link
    Uniquely among the sciences, quantum cryptography has driven both foundational research as well as practical real-life applications. We review the progress of quantum cryptography in the last decade, covering quantum key distribution and other applications.Comment: It's a review on quantum cryptography and it is not restricted to QK

    Distributed Systems and Mobile Computing

    Get PDF
    The book is about Distributed Systems and Mobile Computing. This is a branch of Computer Science devoted to the study of systems whose components are in different physical locations and have limited communication capabilities. Such components may be static, often organized in a network, or may be able to move in a discrete or continuous environment. The theoretical study of such systems has applications ranging from swarms of mobile robots (e.g., drones) to sensor networks, autonomous intelligent vehicles, the Internet of Things, and crawlers on the Web. The book includes five articles. Two of them are about networks: the first one studies the formation of networks by agents that interact randomly and have the ability to form connections; the second one is a study of clustering models and algorithms. The three remaining articles are concerned with autonomous mobile robots operating in continuous space. One article studies the classical gathering problem, where all robots have to reach a common location, and proposes a fast algorithm for robots that are endowed with a compass but have limited visibility. The last two articles deal with the evacuations problem, where two robots have to locate an exit point and evacuate a region in the shortest possible time

    Advanced random access techniques for satellite communications

    Get PDF
    In this thesis, Advanced Random Access techniques for Satellite Communications are studied. In the last years, new advances in multi-access communication protocols together with the increasing need for bidirectional communications in consumer type of interactive satellite terminals have revived the interest for a set of schemes able to guarantee high-speed and low latency communications in bursty traffic conditions. In this work, starting from the latest findings on Aloha-based Random Access schemes, the optimization of such techniques and their use in closed-loop scenarios is investigated with particular regard to the Return Channel over Satellite of Digital Video Broadcasting. The thesis starts with a summary on the state of the art of Demand Assigned and Random Access techniques as well as on the recent evolution from the first to the second version of the Return Channel over Satellite of the Digital Video Broadcasting specification. In chapter 2 a stability and packet delay model for channel analysis and design are presented, showing that proper design through this tools can ensure high performance of the new access scheme. The use of control limit policies is also introduced and its use is thoroughly discussed both for finite and infinite users population showing that, differently from Slotted Aloha, in some cases static design over dynamic policies might be preferable if long propagation delay is present. In chapter 3 the same models and tools introduced for CRDSA are extended to the case of asynchronous Random Access schemes and a comparison of the two families of schemes is put in place demonstrating that asynchronous techniques are convenient only when the signal-to-noise ratio is high enough to ensure decodability of partially colliding packets. In chapter 4 a new access scheme currently patent pending is presented. In this scheme terminals access the channel in an unframed manner. It is shown that such a change brings improvements that further diminish latency due to immediate transmission of the first replica and further boost throughput because the number of loops on the corresponding bipartite graph representation is mitigated. The thesis concludes with a call for a new discussion of resource allocation in multi-access satellite communication scenarios such as DVB-RCS2 in light of the obtained results and of the new requirements in interactive satellite networks
    • …
    corecore