Random Access MAC protocols are simple and effective when the nature of the traffic is unpredictable and sporadic. In the following paper, investigations on the new Enhanced Contention Resolution ALOHA (ECRA) are presented, where some new aspects of the protocol are investigated. Mathematical derivation and numerical evaluation of the symbol interference probability after SIC are here provided. Results of the optimum header positioning which is found to be in the beginning and in the end of the packets, are exploited for the evaluation of ECRA throughput and Packet Error Rate (PER) under imperfect knowledge of packets positions. Remarkable gains in the maximum throughput are observed for ECRA w.r.t. Contention Resolution ALOHA (CRA) under t...
Recently, contention resolution diversity slotted ALOHA (CRDSA) has been introduced as a simple but...
Because of the reliability of deployment, cost efficiency, and flexibility of ad-hoc wireless local ...
In this letter we motivate the need to revisit the MAC protocol used in Gen2 RFID system in order to...
Abstract—Random Access MAC protocols are simple and effective when the nature of the traffic is unpr...
tocols are simple and effective when the nature of the traffic is unpredictable and random. In the f...
Recently, random access protocols have acquired a new wave of interest, not only from ...
In this paper we investigate several central aspects of using the unslotted Contention Resolution Di...
International audienceCoded Slotted ALOHA (CSA) is a random access scheme based on the application o...
Motivated by the analogy between successive interference cancellation and iterative belief-propagati...
ALOHA-type protocols became a popular solution for distributed and uncoordinated multiple random acc...
Contention Resolution Diversity Slotted ALOHA (CRDSA) and its burst degree optimizations (CRDSA++, I...
In this paper, a novel enhancement of the well known ALOHA random access mechanism is presented whi...
Contention Resolution Diversity Slotted ALOHA (CRDSA) and its burst degree optimizations (CRDSA++, I...
In this paper, a dynamic access probability adjustment strategy for coded random access schemes base...
Random access (RA) protocols are normally used in a satellite networks for initial terminal access a...
Recently, contention resolution diversity slotted ALOHA (CRDSA) has been introduced as a simple but...
Because of the reliability of deployment, cost efficiency, and flexibility of ad-hoc wireless local ...
In this letter we motivate the need to revisit the MAC protocol used in Gen2 RFID system in order to...
Abstract—Random Access MAC protocols are simple and effective when the nature of the traffic is unpr...
tocols are simple and effective when the nature of the traffic is unpredictable and random. In the f...
Recently, random access protocols have acquired a new wave of interest, not only from ...
In this paper we investigate several central aspects of using the unslotted Contention Resolution Di...
International audienceCoded Slotted ALOHA (CSA) is a random access scheme based on the application o...
Motivated by the analogy between successive interference cancellation and iterative belief-propagati...
ALOHA-type protocols became a popular solution for distributed and uncoordinated multiple random acc...
Contention Resolution Diversity Slotted ALOHA (CRDSA) and its burst degree optimizations (CRDSA++, I...
In this paper, a novel enhancement of the well known ALOHA random access mechanism is presented whi...
Contention Resolution Diversity Slotted ALOHA (CRDSA) and its burst degree optimizations (CRDSA++, I...
In this paper, a dynamic access probability adjustment strategy for coded random access schemes base...
Random access (RA) protocols are normally used in a satellite networks for initial terminal access a...
Recently, contention resolution diversity slotted ALOHA (CRDSA) has been introduced as a simple but...
Because of the reliability of deployment, cost efficiency, and flexibility of ad-hoc wireless local ...
In this letter we motivate the need to revisit the MAC protocol used in Gen2 RFID system in order to...