Abstract
In this paper, we propose a novel approach to enhance the performance of frameless slotted ALOHA (SA) protocol. We employ signature codes to help the receiver identify the packets contained in collisions, and use successive interference cancellation (SIC) for packet recovery. We model the proposed scheme as a two-state Markov model represented by a uni-partite graph. We evaluate the throughput, expected delay and average memory size of the proposed scheme, and optimize the proposed scheme to maximize the throughput. We show that the theoretical analysis matches well with simulation results. The throughput and expected delay of the proposed protocol outperform the conventional slotted ALOHA protocol significantly.
Similar content being viewed by others
References
IEEE 802.16p-10/0005. Machine-to-Machine (M2M) Communication Study Report. 2010
Yan S, Peng M G, Abana M A, et al. An evolutionary game for user access mode selection in fog radio access networks. IEEE Access, 2017, 5: 2200–2210
Roberts L G. ALOHA packet system with and without slots and capture. ACM SIGCOMM Comput Commun Rev, 1975, 5: 28–42
Ghez S, Verdu S, Schwartz S C. Stability properties of slotted ALOHA with multipacket reception capability. IEEE Trans Autom Control, 1988, 33: 640–649
Zheng J, Li J D, Liu Q, et al. Performance analysis of three multi-radio access control policies in heterogeneous wireless networks. Sci China Inf Sci, 2013, 56: 122305
Xu D, Li Q. Price-based time and energy allocation in cognitive radio multiple access networks with energy harvesting. Sci China Inf Sci, 2017, 60: 108302
Wei N, Zhang Z P. Competitive access in multi-RAT systems with regulated interference constraints. Sci China Inf Sci, 2017, 60: 022306
Namislo C. Analysis of mobile radio slotted ALOHA networks. IEEE J Sel Areas Commun, 1984, 2: 583–588
Wu L T, Sun P, Xiao M, et al. Sparse signal ALOHA: a compressive sensing-based method for uncoordinated multiple access. IEEE Commun Lett, 2017, 21: 1301–1304
Herrero O R, Gaudenzi R D. Generalized analytical framework for the performance assessment of slotted random access protocols. IEEE Trans Wirel Commun, 2014, 13: 809–821
Zhang Z H, Xu C B, Ping L. Coded random access with distributed power control and multiple-packet reception. IEEE Wirel Commun Lett, 2015, 4: 117–120
Zhang Y, Wang H M, Zheng T X, et al. Energy-efficient transmission design in non-orthogonal multiple access. IEEE Trans Veh Technol, 2017, 66: 2852–2857
Han W J, Zhang Y, Wang X J, et al. Orthogonal power division multiple access: a green communication perspective. IEEE J Sel Areas Commun, 2016, 34: 3828–3842
Casini E, De Gaudenzi R, Herrero O R. Contention resolution diversity slotted ALOHA (CRDSA): an enhanced random access schemefor satellite access packet networks. IEEE Trans Wirel Commun, 2007, 6: 1408–1419
Paolini E, Liva G, Chiani M. Graph-based random access for the collision channel without feedback: capacity bound. In: Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), Houston, 2011
Sun Z, Xie Y X, Yuan J H, et al. Coded slotted ALOHA schemes for erasure channels. In: Proceedings of IEEE International Conference on Communications (ICC), Kuala Lumpur, 2016
Stefanovic C, Popovski P, Vukobratovic D. Frameless ALOHA protocol for wireless networks. IEEE Commun Lett, 2012, 16: 2087–2090
Jia D, Fei Z S, Lin H, et al. Distributed decoding for coded slotted ALOHA. IEEE Commun Lett, 2017, 21: 1715–1718
Goseling J, Stefanovic C, Popovski P. Sign-compute-resolve for random access. In: Proceedings of the 52nd Annual Allerton Conference on Communication, Control, and Computing (Allerton), Monticello, 2014. 675–682
Nelson R. Probability, Stochastic Process, and Queueing Theory. Berlin: Springer, 2000
Vajargah B F, Gharehdaghi M. Ergodicity of fuzzy Markov chains based on simulation using Halton sequences. J Math Comput Sci, 2014, 11: 159–165
Altman E, Azouzi R E, Jiménez T. Slotted ALOHA as a game with partial information. Comput Netw, 2004, 45: 701–713
Gotsis A G, Lioumpas A S, Alexiou A. M2M scheduling over LTE: challenges and new perspectives. IEEE Veh Technol Mag, 2012, 7: 34–39
Wang K, Du M, Sun Y F, et al. Attack detection and distributed forensics in machine-to-machine networks. IEEE Netw, 2016, 30: 49–55
Little J D C. A proof for the queuing formula: L = W. Oper Res, 1961, 9: 383–387
ETSI GS LTN 001. Low Throughput Networks (LTN); Use Cases for Low Throughput Networks. V1.1.1 (2014-09)
Acknowledgements
This work was supported in part by Beijing Major Science and Technology Projects (Grant No. D171100006317001), Beijing Natural Science Foundation (Grant No. 4152047), and Programme of Introducing Talents of Discipline to Universities (111 Project) (Grant No. B14010).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Jia, D., Fei, Z., Xiao, M. et al. Enhanced frameless slotted ALOHA protocol with Markov chains analysis. Sci. China Inf. Sci. 61, 102304 (2018). https://doi.org/10.1007/s11432-017-9296-6
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-017-9296-6