arXiv Analytics

Sign in

arXiv:1409.6902 [cs.IT]AbstractReferencesReviewsResources

Sign-Compute-Resolve for Random Access

Jasper Goseling, Cedomir Stefanovic, Petar Popovski

Published 2014-09-24Version 1

We present an approach to random access that is based on three elements: physical-layer network coding, signature codes and tree splitting. Upon occurrence of a collision, physical-layer network coding enables the receiver to decode the sum of the information that was transmitted by the individual users. For each user this information consists of the data that the user wants to communicate as well as the user's signature. As long as no more than $K$ users collide, their identities can be recovered from the sum of their signatures. A splitting protocol is used to deal with the case that more than $K$ users collide. We measure the performance of the proposed method in terms of user resolution rate as well as overall throughput of the system. The results show that our approach significantly increases the performance of the system even compared to coded random access, where collisions are not wasted, but are reused in successive interference cancellation.

Comments: Accepted for presentation at 52nd Annual Allerton Conference on Communication, Control, and Computing
Categories: cs.IT, math.IT
Related articles: Most relevant | Search more
arXiv:1801.06357 [cs.IT] (Published 2018-01-19)
On the Modeling and Performance Assessment of Random Access with SIC
arXiv:1011.5117 [cs.IT] (Published 2010-11-23)
Energy and Utility Optimization in Wireless Networks with Random Access
arXiv:0912.3264 [cs.IT] (Published 2009-12-16)
Random Access: An Information-Theoretic Perspective