TY - JOUR
T1 - Sign-Compute-Resolve for Tree Splitting Random Access
AU - Goseling, Jasper
AU - Stefanovic, Cedomir
AU - Popovski, Petar
PY - 2018/7/1
Y1 - 2018/7/1
N2 - We present a framework for random access that is based on three elements: physical-layer network coding (PLNC), signature codes, and tree splitting. In presence of a collision, physical-layer network coding enables the receiver to decode, i.e., compute, the sum of the packets that were transmitted by the individual users. For each user, the packet consists of the user's signature, as well as the data that the user wants to communicate. As long as no more than K users collide, their identities can be recovered from the sum of their signatures. This framework for creating and transmitting packets can be used as a fundamental building block in random access algorithms, since it helps to deal efficiently with the uncertainty of the set of contending terminals. In this paper, we show how to apply the framework in conjunction with a tree-splitting algorithm, which is required to deal with the case that more than K users collide. We demonstrate that our approach achieves throughput that tends to 1 rapidly as K increases. We also present results on net data-rate of the system, showing the impact of the overheads of the constituent elements of the proposed protocol. We compare the performance of our scheme with an upper bound that is obtained under the assumption that the active users are a priori known. Also, we consider an upper bound on the net data-rate for any PLNC-based strategy in which one linear equation per slot is decoded. We show that already at modest packet lengths, the net data-rate of our scheme becomes close to the second upper bound, i.e., the overhead of the contention resolution algorithm and the signature codes vanishes.
AB - We present a framework for random access that is based on three elements: physical-layer network coding (PLNC), signature codes, and tree splitting. In presence of a collision, physical-layer network coding enables the receiver to decode, i.e., compute, the sum of the packets that were transmitted by the individual users. For each user, the packet consists of the user's signature, as well as the data that the user wants to communicate. As long as no more than K users collide, their identities can be recovered from the sum of their signatures. This framework for creating and transmitting packets can be used as a fundamental building block in random access algorithms, since it helps to deal efficiently with the uncertainty of the set of contending terminals. In this paper, we show how to apply the framework in conjunction with a tree-splitting algorithm, which is required to deal with the case that more than K users collide. We demonstrate that our approach achieves throughput that tends to 1 rapidly as K increases. We also present results on net data-rate of the system, showing the impact of the overheads of the constituent elements of the proposed protocol. We compare the performance of our scheme with an upper bound that is obtained under the assumption that the active users are a priori known. Also, we consider an upper bound on the net data-rate for any PLNC-based strategy in which one linear equation per slot is decoded. We show that already at modest packet lengths, the net data-rate of our scheme becomes close to the second upper bound, i.e., the overhead of the contention resolution algorithm and the signature codes vanishes.
KW - Access protocols
KW - compute-and-forward
KW - multiaccess communication
KW - physical-layer network coding
KW - wireless communication
UR - http://www.scopus.com/inward/record.url?scp=85047199008&partnerID=8YFLogxK
U2 - 10.1109/TIT.2018.2839197
DO - 10.1109/TIT.2018.2839197
M3 - Journal article
AN - SCOPUS:85047199008
SN - 0018-9448
VL - 64
SP - 5261
EP - 5276
JO - IEEE Transactions on Information Theory
JF - IEEE Transactions on Information Theory
IS - 7
ER -