Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A Feedback-Based Randomized Multi-User Access Method

A multi-user access and user technology, applied in wireless communication, electrical components, etc., can solve the problems of insufficient throughput and insufficient utilization of received data packets, and achieves improved throughput, system throughput, and access to users. Number boosting effect

Active Publication Date: 2019-02-22
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF1 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0007] The purpose of the present invention is to propose a feedback-based random multi-user access method for the technical defects of insufficient utilization of received data packets and insufficient throughput in the case of a large access amount in the existing CSA access method. entry method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Feedback-Based Randomized Multi-User Access Method
  • A Feedback-Based Randomized Multi-User Access Method
  • A Feedback-Based Randomized Multi-User Access Method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0071] The following describes how to apply an improved CSA access method based on feedback retransmission in the present invention to improve the throughput of the system in conjunction with the specific access process.

[0072] figure 1 It is a feedback-based random multi-user access method of the present invention and an overall flow chart of this embodiment; figure 1 It can be seen that the specific implementation steps in this embodiment are as follows:

[0073] Step 1: M users perform multiple access according to the agreed method;

[0074] Step 2: The data packet output in step 1 is transmitted through the channel;

[0075] Step 3: the base station receives the data packet output in step 2;

[0076] Step 4: The base station uses serial interference cancellation to decode the data received in Step 3;

[0077] Step 5: Determine whether the data packets of M users are successfully decoded, and the base station performs a feedback operation accordingly, and the user per...

Embodiment 2

[0082] figure 2 Indicates the access process of the traditional CSA access mode, figure 2 shows a frame 1 containing N time slots, which is multiple-accessed by M users. Taking user 1 as an example, the degree of user 1 selection is 3, and randomly selects time slot 1, time slot 3 and slot N-2 for transmission.

[0083] image 3 It is a possible access in this embodiment of a random multi-user access method based on feedback in the present invention, where frame 1 and frame 2 are according to figure 2 The access is performed by M users respectively in the additional time slots 1 to M RE Among them, there are M RE Each user retransmits the data packets in order, and the additional time slot transmission criterion is determined by step 5 in the description, for example, user 1 retransmits in time slot 1 in this embodiment.

Embodiment 3

[0085] Figure 4 It is a possible access in this embodiment based on a feedback-based random multi-user access method of the present invention.

[0086] This embodiment adopts CSA access based on feedback retransmission, including the following steps:

[0087] Step A, using the MAC frame model; the present embodiment is specific to Figure 4 The possible access situation reflected in , the current MAC frame contains an average of 5 time slots, and assuming that the user and the base station are fully synchronized, there are 5 users, respectively: u 1 ,u 2 ,u 3 ,u 4 ,u 5 ; Access and send data packets in this MAC frame, define the normalized load of the system as The normalized throughput T is defined as the average number of data packets sent on each frame, and the degree distribution of this embodiment is:

[0088] Λ(x)=Λ 1 x+Λ 2 x 2 +…+Λ 5 x 5 (4)

[0089] Among them, Λ l Represents the probability that the user chooses to resend the data packet for l times. ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a feedback-based random multi-user access method, which comprises the following steps of (1) carrying out multi-address access; (2) carrying out channel transmission; (3) receiving data packets; (4) adopting successive interference cancellation to decode the data packets; (5) if all user data packets are successfully decoded, jumping to (1) to transmit the next data frame, otherwise increasing a time slot to retransmit the data packets and jumping to (6); (6) receiving the retransmitted data packets through a base station and continuing to carry out successive interference cancellation; and (7) sending ACK (Acknowledge) and NACK (Non-Acknowledge) signals through the base station and preparing to-be-sent data packets in the next data frame. According to the method, through adopting feedback to make the user retransmit, the throughput of the system is improved, and when the system load is larger, the user data can be recovered by utilizing more impacted user data packets. In comparison with a CSA (Coded Slotted ALOHA) access method, retransmission is not needed when the system load is low, and the complexity is unchanged; when the system load is high, through retransmission, the throughput of the system is improved, and the attenuation of the throughput becomes very slow along with the increase of the load.

Description

technical field [0001] The invention relates to a feedback-based random multi-user access method, which belongs to the field of multiple access technology. Background technique [0002] In the M2M communication system in the future, many scenarios such as intelligent transportation and automated home furnishing require automatic communication between devices without manual operation. In such a system planning, the number of devices connected to the system will be more than ten times that of the current one. How to solve the problem of multiple access caused by a large number of users is one of the research focuses. [0003] There are two main types of existing random access methods: 1) No scheduling type, the user directly sends the data packet to the channel after generating the data packet, without the need for the base station to allocate resources or specify the channel; 2) Based on the scheduling type, the user sends the data packet before, The base station needs to al...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W74/08
CPCH04W74/0825H04W74/0833
Inventor 费泽松于含笑贾岱叶能孙策
Owner BEIJING INSTITUTE OF TECHNOLOGYGY
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products