4,015 research outputs found

    Unequal Error Protection in Coded Slotted ALOHA

    Full text link
    We analyze the performance of coded slotted ALOHA systems for a scenario where users have different error protection requirements and correspondingly can be divided into user classes. The main goal is to design the system so that the requirements for each class are satisfied. To that end, we derive analytical error floor approximations of the packet loss rate for each class in the finite frame length regime, as well as the density evolution in the asymptotic case. Based on this analysis, we propose a heuristic approach for the optimization of the degree distributions to provide the required unequal error protection. In addition, we analyze the decoding delay for users in different classes and show that better protected users experience a smaller average decoding delay

    All-to-all Broadcast for Vehicular Networks Based on Coded Slotted ALOHA

    Get PDF
    We propose an uncoordinated all-to-all broadcast protocol for periodic messages in vehicular networks based on coded slotted ALOHA (CSA). Unlike classical CSA, each user acts as both transmitter and receiver in a half-duplex mode. As in CSA, each user transmits its packet several times. The half-duplex mode gives rise to an interesting design trade-off: the more the user repeats its packet, the higher the probability that this packet is decoded by other users, but the lower the probability for this user to decode packets from others. We compare the proposed protocol with carrier sense multiple access with collision avoidance, currently adopted as a multiple access protocol for vehicular networks. The results show that the proposed protocol greatly increases the number of users in the network that reliably communicate with each other. We also provide analytical tools to predict the performance of the proposed protocol.Comment: v2: small typos fixe

    Broadcast Coded Slotted ALOHA: A Finite Frame Length Analysis

    Full text link
    We propose an uncoordinated medium access control (MAC) protocol, called all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all broadcast with strict latency constraints. In B-CSA, each user acts as both transmitter and receiver in a half-duplex mode. The half-duplex mode gives rise to a double unequal error protection (DUEP) phenomenon: the more a user repeats its packet, the higher the probability that this packet is decoded by other users, but the lower the probability for this user to decode packets from others. We analyze the performance of B-CSA over the packet erasure channel for a finite frame length. In particular, we provide a general analysis of stopping sets for B-CSA and derive an analytical approximation of the performance in the error floor (EF) region, which captures the DUEP feature of B-CSA. Simulation results reveal that the proposed approximation predicts very well the performance of B-CSA in the EF region. Finally, we consider the application of B-CSA to vehicular communications and compare its performance with that of carrier sense multiple access (CSMA), the current MAC protocol in vehicular networks. The results show that B-CSA is able to support a much larger number of users than CSMA with the same reliability.Comment: arXiv admin note: text overlap with arXiv:1501.0338

    Error Floor Analysis of Coded Slotted ALOHA over Packet Erasure Channels

    Get PDF
    We present a framework for the analysis of the error floor of coded slotted ALOHA (CSA) for finite frame lengths over the packet erasure channel. The error floor is caused by stopping sets in the corresponding bipartite graph, whose enumeration is, in general, not a trivial problem. We therefore identify the most dominant stopping sets for the distributions of practical interest. The derived analytical expressions allow us to accurately predict the error floor at low to moderate channel loads and characterize the unequal error protection inherent in CSA

    Probabilistic Handshake in All-to-all Broadcast Coded Slotted ALOHA

    Get PDF
    We propose a probabilistic handshake mechanism for all-to-all broadcast coded slotted ALOHA. We consider a fully connected network where each user acts as both transmitter and receiver in a half-duplex mode. Users attempt to exchange messages with each other and to establish one-to-one handshakes, in the sense that each user decides whether its packet was successfully received by the other users: After performing decoding, each user estimates in which slots the resolved users transmitted their packets and, based on that, decides if these users successfully received its packet. The simulation results show that the proposed handshake algorithm allows the users to reliably perform the handshake. The paper also provides some analytical bounds on the performance of the proposed algorithm which are in good agreement with the simulation results

    On the Information Loss of the Max-Log Approximation in BICM Systems

    Full text link
    We present a comprehensive study of the information rate loss of the max-log approximation for MM-ary pulse-amplitude modulation (PAM) in a bit-interleaved coded modulation (BICM) system. It is widely assumed that the calculation of L-values using the max-log approximation leads to an information loss. We prove that this assumption is correct for all MM-PAM constellations and labelings with the exception of a symmetric 4-PAM constellation labeled with a Gray code. We also show that for max-log L-values, the BICM generalized mutual information (GMI), which is an achievable rate for a standard BICM decoder, is too pessimistic. In particular, it is proved that the so-called "harmonized" GMI, which can be seen as the sum of bit-level GMIs, is achievable without any modifications to the decoder. We then study how bit-level channel symmetrization and mixing affect the mutual information (MI) and the GMI for max-log L-values. Our results show that these operations, which are often used when analyzing BICM systems, preserve the GMI. However, this is not necessarily the case when the MI is considered. Necessary and sufficient conditions under which these operations preserve the MI are provided

    Optimal Control Algorithms and Their Analysis for Short-Term Scheduling in Manufacturing Systems

    Get PDF
    International audienceCurrent literature presents optimal control computational algorithms with regard to state, control, and conjunctive variable spaces. This paper first analyses the advantages and limitations of different optimal control computational methods and algorithms which can be used for short-term scheduling. Second, it develops an optimal control computational algorithm that allows for the solution of short-term scheduling in an optimal manner. Moreover, qualitative and quantitative analysis of the manufacturing system scheduling problem is presented. Results highlight computer experiments with a scheduling software prototype as well as potential future research avenues

    Review of Quantitative Methods for Supply Chain Resilience Analysis

    Get PDF
    Supply chain resilience (SCR) manifests when the network is capable to withstand, adapt, and recover from disruptions to meet customer demand and ensure performance. This paper conceptualizes and comprehensively presents a systematic review of the recent literature on quantitative modeling the SCR while distinctively pertaining it to the original concept of resilience capacity. Decision-makers and researchers can benefit from our survey since it introduces a structured analysis and recommendations as to which quantitative methods can be used at different levels of capacity resilience. Finally, the gaps and limitations of existing SCR literature are identified and future research opportunities are suggested

    Review of Quantitative Methods for Supply Chain Resilience Analysis

    Get PDF
    Supply chain resilience (SCR) manifests when the network is capable to withstand, adapt, and recover from disruptions to meet customer demand and ensure performance. This paper conceptualizes and comprehensively presents a systematic review of the recent literature on quantitative modeling the SCR while distinctively pertaining it to the original concept of resilience capacity. Decision-makers and researchers can benefit from our survey since it introduces a structured analysis and recommendations as to which quantitative methods can be used at different levels of capacity resilience. Finally, the gaps and limitations of existing SCR literature are identified and future research opportunities are suggested

    Robust dynamic schedule coordination control in the supply chain

    Get PDF
    International audienceCoordination plays crucial role in supply chain management. In this paper, we extend the existing body of literature on supply chain coordination by representing a robust schedule coordination approach. A hybrid discrete/continuous flow shop supply chain with job shop processes at each supplier stage is studied. For this purpose, the developed scheduling model comprises operations control (for customer order fulfillment dynamics), channel control (production machine and transportation dynamics), resource control (material supply dynamics), and flow control (processing and shipment dynamics) with multiple objectives. Based on the scheduling model, we introduce a robust analysis of schedule coordination in the presence of disruptions in capacities and supply. The application of attainable sets opens a possibility to analyse schedule coordination dynamics under disruptions. The results provide insights of how to integrate the coordination issues into schedule robustness analysis. We exemplify the developed approach for the case of two-stage supply chain coordination, and derive managerial insights for both considered scheduling problem and application of dynamic control methods to supply chain coordination in general
    • …
    corecore