2017 IEEE International Conference on Communications (ICC) 2017
DOI: 10.1109/icc.2017.7997448
|View full text |Cite
|
Sign up to set email alerts
|

Finite length performance of random MAC strategies

Abstract: Multiple connected devices sharing common wireless resources might create interference if they access the channel simultaneously. Medium access control (MAC) protocols generally regulate the access of the devices to the shared channel to limit signal interference. In particular, irregular repetition slotted ALOHA (IRSA) techniques can achieve high-throughput performance when interference cancellation methods are adopted to recover from collisions. In this work, we study the finite length performance for IRSA s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…where P Fail (λ, L, B, m) as given in (2) (8). We also denote by ζ m as a function of K m , a realization of random variable SINR m whose distribution depends on the history of the arrivals.…”
Section: Infinite Block Lengthmentioning
confidence: 99%
See 3 more Smart Citations
“…where P Fail (λ, L, B, m) as given in (2) (8). We also denote by ζ m as a function of K m , a realization of random variable SINR m whose distribution depends on the history of the arrivals.…”
Section: Infinite Block Lengthmentioning
confidence: 99%
“…We investigate the scaling of the throughput λ opt in (1), with respect to W , ρ and T for constant SNR and Rayleigh fading cases. For numerical simulations, we use fixed-point iteration to determine the relation between λ M and λ given in (8). In the plots, solid and dashed curves denote the analytical approximations for the scaling results, while numerical results are squares.…”
Section: Numerical Simulationsmentioning
confidence: 99%
See 2 more Smart Citations
“…In the most recent years, many studies have concentrated on the outline of Medium Access Control (MAC) protocols. To be up to date with the advances in technologies, MAC techniques strategies must give adaptability and effectiveness to permit the presence of these sorts of frameworks with sensible quality and reliability [5]. ALOHA and Slotted-ALOHA protocols have been generally utilized as a part of the past as random access protocols.…”
Section: Mac Layer's Protocolsmentioning
confidence: 99%