49,973 research outputs found

    Construction and Applications of CRT Sequences

    Full text link
    Protocol sequences are used for channel access in the collision channel without feedback. Each user accesses the channel according to a deterministic zero-one pattern, called the protocol sequence. In order to minimize fluctuation of throughput due to delay offsets, we want to construct protocol sequences whose pairwise Hamming cross-correlation is as close to a constant as possible. In this paper, we present a construction of protocol sequences which is based on the bijective mapping between one-dimensional sequence and two-dimensional array by the Chinese Remainder Theorem (CRT). In the application to the collision channel without feedback, a worst-case lower bound on system throughput is derived.Comment: 16 pages, 5 figures. Some typos in Section V are correcte

    Multiple accessing for the collision channel without feedback

    Get PDF
    Bibliography: p. 582."September 1984." Reprinted from IEEE Journal on Selected Areas in Communications, vol. SAC-2, no.4, July 1984."...National Science Foundation... Grant NSF/ECS-79-19880." "...Advanced Research Project Agency... Grant ONR/N00014-75-C1183."Joseph Y.N. Hui

    Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access

    Full text link
    In this paper, a random access scheme is introduced which relies on the combination of packet erasure correcting codes and successive interference cancellation (SIC). The scheme is named coded slotted ALOHA. A bipartite graph representation of the SIC process, resembling iterative decoding of generalized low-density parity-check codes over the erasure channel, is exploited to optimize the selection probabilities of the component erasure correcting codes via density evolution analysis. The capacity (in packets per slot) of the scheme is then analyzed in the context of the collision channel without feedback. Moreover, a capacity bound is developed and component code distributions tightly approaching the bound are derived.Comment: The final version to appear in IEEE Trans. Inf. Theory. 18 pages, 10 figure

    A General Upper Bound on the Size of Constant-Weight Conflict-Avoiding Codes

    Full text link
    Conflict-avoiding codes are used in the multiple-access collision channel without feedback. The number of codewords in a conflict-avoiding code is the number of potential users that can be supported in the system. In this paper, a new upper bound on the size of conflict-avoiding codes is proved. This upper bound is general in the sense that it is applicable to all code lengths and all Hamming weights. Several existing constructions for conflict-avoiding codes, which are known to be optimal for Hamming weights equal to four and five, are shown to be optimal for all Hamming weights in general.Comment: 10 pages, 1 figur

    Constant Delivery Delay Protocol Sequences for the Collision Channel Without Feedback

    Get PDF
    International audienceWe consider a collision channel model without feedback based on a time-slotted communication channel shared by K users. In this model, packets transmitted in the same time slot collide with each other and are unrecoverable. Each user accesses the channel according to an internal periodical pattern called protocol sequence. Due to the lack of feedback, users cannot synchronize their protocol sequences, leading to unavoidable collisions and varying throughput. Protocol sequences that provide constant throughput regardless of delay offsets between users are called shift-invariant (SI), they have been studied and characterized in previous work. We propose a new class of SI sequences: Constant Individual Delivery Delay (CIDD) sequences which ensure that the delay between two successfully delivered packets is constant for each user. We present a characterization of CIDD sequences. We also prove that CIDD sequences can achieve the lower bound of SI sequences period but not the optimal throughput
    corecore