Optimal and sub‐optimal rate and power allocation for random networks
We consider the power and rate allocation for a transmission in a wireless network where the transmitter knows the channel state of the desired receiver but only knows the statistics of the interferes. While this scenario is often encountered in practice, and extremely important in dense networks, its optimal solution was not yet known.
Sapir Nativ Zucker, Itsik Bergel
wiley +1 more source
Mitigating RF jamming attacks at the physical layer with machine learning
Abstract Wireless communication devices must be protected from malicious threats, including active jamming attacks, due to the widespread use of wireless systems throughout our every‐day lives. Jamming mitigation techniques are predominately evaluated through simulation or with hardware for very specific jamming conditions.
Marko Jacovic +3 more
wiley +1 more source
Throughput Analysis of Large Wireless Networks with Regular Topologies
The throughput of large wireless networks with regular topologies is analyzed under two medium-access control schemes: synchronous array method (SAM) and slotted ALOHA. The regular topologies considered are square, hexagon, and triangle.
Kezhu Hong, Yingbo Hua
doaj +2 more sources
Stability of slotted ALOHA with spatial diversity [PDF]
We consider the problem of stability of slotted ALOHA for a system consisting of N users communicating with a common receiver, which employs spatial diversity to receive multiple transmissions simultaneously. We introduce a general packet reception model to incorporate multiple packet receptions since the collision channel model is no longer valid in ...
Vidyut Naware, Lang Tong 0001
openaire +1 more source
Comparing Delay-Constrained ALOHA and CSMA: A Learning-Based Low-Complexity Approximate Approach
Supporting delay-constrained traffic becomes more and more critical in multimedia communication systems, tactile Internet, networked control systems, and cyber-physical systems, etc. In delay-constrained traffic, each packet has a hard deadline.
Lei Deng +3 more
doaj +1 more source
ALOHA Random Access that Operates as a Rateless Code [PDF]
Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research interest in random access protocols, suitable to support a large number of connected devices.
Popovski, Petar, Stefanovic, Cedomir
core +2 more sources
Generalized Encoding CRDSA: Maximizing Throughput in Enhanced Random Access Schemes for Satellite
This work starts from the analysis of the literature about the Random Access protocols with contention resolution, such as Contention Resolution Diversity Slotted Aloha (CRDSA), and introduces a possible enhancement, named Generalized Encoding Contention
Manlio Bacco +2 more
doaj +1 more source
Performance Enhancements for Asynchronous Random Access Protocols over Satellite [PDF]
In this paper, a novel enhancement of the well known ALOHA random access mechanism is presented which largely extends the achievable throughput compared to traditional ALOHA and provides significantly lower packet loss rates. The novel mechanism, called
Kissling, Christian
core +1 more source
A novel RFID multi-tag anti-collision protocol for dynamic vehicle identification.
In order to obtain the information of the vehicle tags in adverse traffic conditions, we proposed a novel reservation framework named reservation to cancel idle-dynamic frame slotted ALOHA (RTCI-DFSA) algorithm.
Zhijian Qu +3 more
doaj +1 more source
Age of Information in Slotted ALOHA With Energy Harvesting [PDF]
We examine the age of information (AoI) of a status update system that incorporates energy harvesting and uses the slotted ALOHA protocol. We derive analytically the average AoI and the probability that the AoI exceeds a given threshold. Via numerical results, we investigate two strategies to minimize the age of information (AoI): transmitting a new ...
Ngo, Khac-Hoang +4 more
openaire +4 more sources

