skip to main content
10.1145/3345768.3355927acmconferencesArticle/Chapter ViewAbstractPublication PagesmswimConference Proceedingsconference-collections
research-article

Multi-Access Spreading over Time: MAST

Published: 25 November 2019 Publication History

Abstract

In this paper, we consider a multi-access communication channel with many transmitters that randomly enter a channel and send their data to a receiver. The transmitters are not synchronized and the receiver does not send any feedback to the transmitters. We propose a Medium Access Control (MAC) protocol, which we call Multi-Access Spreading over Time (MAST). In this protocol, in order to mitigate the effects of user interference, each transmitter spreads its access over a time frame that is much larger than its encoded and modulated packet size. In order to perform this operation, the transmitters choose a spreading matrix from a set, which is known by all the transmitters and the receiver. We obtain the packet decoding probability analytically under user interference conditions, and substantiate our results with simulations. We finally compare the symbol-error probability performance of our protocol with the one of the Zig-zag protocol, and show that MAST outperforms the Zig-zag protocol under the same spreading conditions in both low and high signal-to-noise ratio regimes.

References

[1]
Yihenew Dagne Beyene, Riku J"antti, and Kalle Ruttik. 2017. Random access scheme for sporadic users in 5G. IEEE Transactions on Wireless Communications, Vol. 16, 3 (2017), 1823--1833.
[2]
Jingye Cao, Feng Yang, Lianghui Ding, Liang Qian, and Cheng Zhi. 2013. Differential Overlap Decoding: Combating hidden terminals in OFDM systems. In Wireless Communications and Networking Conference (WCNC). IEEE, Shanghai, China, 3732--3736.
[3]
Enrico Casini, Riccardo De Gaudenzi, and Oscar Del Rio Herrero. 2007. Contention resolution diversity slotted ALOHA (CRDSA): An enhanced random access schemefor satellite access packet networks. IEEE Transactions on Wireless Communications, Vol. 6, 4 (2007), 1408 -- 1419.
[4]
Federico Clazzer and Mario Marchese. 2014. Layer 3 throughput analysis for advanced ALOHA protocols. In IEEE International Communications Conference (ICC). IEEE, Sydney, NSW, Australia, 533--538.
[5]
Yan Du, Liang Qian, Lianghui Ding, Cheng Zhi, and Feng Yang. 2013. Iterative Collision Recovery for OFDM based WLAN. In International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, Hangzhou, China, 1--6.
[6]
Alyson K Fletcher, Sundeep Rangan, and Vivek K Goyal. 2009. A sparsity detection framework for on-off random access channels. In IEEE International Symposium on Information Theory (ISIT). IEEE, Seoul, Korea, 169--173.
[7]
Shyamnath Gollakota and Dina Katabi. 2008. Zigzag Decoding: Combating Hidden Terminals in Wireless Networks. In Proceedings of the ACM SIGCOMM 2008 Conference on Data Communication. ACM, Seattle, WA, USA, 159--170.
[8]
Gabor Hannak, Martin Mayer, Gerald Matz, and Norbert Goertz. 2016. Bayesian QAM demodulation and activity detection for multiuser communication systems. In IEEE International Communications Conference (ICC). IEEE, Kuala Lumpur, Malaysia, 596--601.
[9]
Christian Kissling. 2011. Performance enhancements for asynchronous random access protocols over satellite. In IEEE International Communications Conference (ICC). IEEE, Kyoto, Japan, 1--6.
[10]
Gianluigi Liva. 2011. Graph-based analysis and optimization of contention resolution diversity slotted ALOHA. IEEE Transactions on Communications, Vol. 59, 2 (2011), 477--487.
[11]
Krishna R Narayanan and Henry D Pfister. 2012. Iterative collision resolution for slotted ALOHA: An optimal uncoordinated transmission policy. In International Symposium on Turbo Codes and Iterative Information Processing (ISTC). IEEE, Gothenburg, Sweden, 136--139.
[12]
Jeongyeup Paek and Michael J Neely. 2011. Mathematical analysis of throughput bounds in random access with ZIGZAG decoding. Mobile Networks and Applications, Vol. 16, 2 (2011), 255--266.
[13]
Enrico Paolini, Gianluigi Liva, and Marco Chiani. 2011. High throughput random access via codes on graphs: Coded slotted ALOHA. In IEEE International Communications Conference (ICC). IEEE, Kyoto, Japan, 1--6.
[14]
Enrico Paolini, Gianluigi Liva, and Marco Chiani. 2015a. Coded slotted ALOHA: A graph-based method for uncoordinated multiple access. IEEE Transactions on Information Theory, Vol. 61, 12 (2015), 6815--6832.
[15]
Enrico Paolini, Cedomir Stefanovic, Gianluigi Liva, and Petar Popovski. 2015b. Coded random access: applying codes on graphs to design random access protocols. IEEE Communications Magazine, Vol. 53, 6 (2015), 144--150.
[16]
Enrico Paolini, Cedomir Stefanovic, Gianluigi Liva, and Petar Popovski. 2015c. Coded random access: applying codes on graphs to design random access protocols. IEEE Communications Magazine, Vol. 53, 6 (2015), 144--150.
[17]
Gino T Peeters, R Bocklandt, and Benny Van Houdt. 2009. Multiple access algorithms without feedback using combinatorial designs. IEEE Transactions on Communications, Vol. 57, 9 (2009), 2724--2733.
[18]
Gino T Peeters and Benny Van Houdt. 2010. Design and analysis of multi-carrier multiple access systems without feedback. In 2010 22nd International Teletraffic Congress (lTC 22). IEEE, Amsterdam, Netherlands, 1--8.
[19]
David Qiu, Frederick J Block, and Everest W Huang. 2010. Analysis and extension of zigzag multiuser detection. In IEEE Military Communications Conference (MILCOM). IEEE, Shanghai, China, 1771--1776.
[20]
Md Shahriar Rahman, Yonghui Li, and Branka Vucetic. 2010. An iterative ZigZag decoding for combating collisions in wireless networks. IEEE Communications Letters, Vol. 14, 3 (2010), 242--244.
[21]
Mei-Ju Shih, Guan-Yu Lin, and Hung-Yu Wei. 2015. A distributed multi-channel feedbackless MAC protocol for D2D broadcast communications. IEEE Wireless Communications Letters, Vol. 4, 1 (2015), 102--105.
[22]
Mahyar Shirvanimoghaddam, Yonghui Li, Mischa Dohler, Branka Vucetic, and Shulan Feng. 2015. Probabilistic rateless multiple access for machine-to-machine communication. IEEE Transactions on Wireless Communications, Vol. 14, 12 (2015), 6815--6826.
[23]
Hossein Shokri-Ghadikolaei, Carlo Fischione, Petar Popovski, and Michele Zorzi. 2016. Design aspects of short-range millimeter-wave networks: A MAC layer perspective. IEEE Network, Vol. 30, 3 (2016), 88--96.
[24]
Chi Wan Sung and Xueqing Gong. 2014. Combination network coding: Alphabet size and zigzag decoding. In International Symposium on Information Theory and its Applications (ISITA). IEEE, Melbourne, VIC, Australia, 699--703.
[25]
Arash Saber Tehrani, Alexandros G Dimakis, and Michael J Neely. 2011. Sigsag: Iterative detection through soft message-passing. IEEE Journal of Selected Topics in Signal Processing, Vol. 5, 8 (2011), 1512--1523.
[26]
Qiwei Wang, Guangliang Ren, and Jueying Wu. 2015. A multiuser detection algorithm for random access procedure with the presence of carrier frequency offsets in LTE systems. IEEE Transactions on Communications, Vol. 63, 9 (2015), 3299--3312.
[27]
Lei Zheng and Lin Cai. 2015. AFDA: Asynchronous flipped diversity ALOHA for emerging wireless networks with long and heterogeneous delay. IEEE Transactions on Emerging Topics in Computing, Vol. 3, 1 (2015), 64--73.

Cited By

View all
  • (2023)CAMELAMA: Cooperative awareness and spaceborne monitoring enabled by location-assisted medium accessComputer Communications10.1016/j.comcom.2023.07.015210(205-216)Online publication date: Oct-2023
  • (2022)CAMELAMA: Cooperative Awareness and spaceborne Monitoring Enabled by Location-Assisted Medium Access2022 17th Wireless On-Demand Network Systems and Services Conference (WONS)10.23919/WONS54113.2022.9764567(1-8)Online publication date: 30-Mar-2022

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
MSWIM '19: Proceedings of the 22nd International ACM Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems
November 2019
340 pages
ISBN:9781450369046
DOI:10.1145/3345768
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 November 2019

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access spreading
  2. aloha
  3. feedback-less communication
  4. medium access control
  5. multi-access communication
  6. zig-zag decoding

Qualifiers

  • Research-article

Conference

MSWiM '19
Sponsor:

Acceptance Rates

Overall Acceptance Rate 398 of 1,577 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)CAMELAMA: Cooperative awareness and spaceborne monitoring enabled by location-assisted medium accessComputer Communications10.1016/j.comcom.2023.07.015210(205-216)Online publication date: Oct-2023
  • (2022)CAMELAMA: Cooperative Awareness and spaceborne Monitoring Enabled by Location-Assisted Medium Access2022 17th Wireless On-Demand Network Systems and Services Conference (WONS)10.23919/WONS54113.2022.9764567(1-8)Online publication date: 30-Mar-2022

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media