Multiple Access Schemes

نویسنده

  • Moshe Sidi
چکیده

1 Communication channels are major components of computer communication networks. They provide the physical mediums over which signals, representing data, are transmitted from one node of the network to another node. Communication channels can be classiied into two main categories: point-to-point channels and shared channels. Typically, the backbone of wide area networks (WANs) consists of point-to-point channels, while local area networks (LANs) use shared channels. Point-to-point channels are dedicated to connect a pair of nodes of the network. They are usually used in xed topology networks and their cost depends on many parameters such as distance, bandwidth etc. An important characteristic of these channels is that nodes do not interfere with each other, namely, transmissions between a pair of nodes has no eeect on the transmissions between another pair of nodes, even if a node is common to the two pairs. Shared channels are used when point-to-point channels are not economical, not available, or when dynamic topologies are preferable. In a shared channel, called also a broadcast channel, several nodes can potentially transmit and/or receive messages at the same time. Shared channels appear naturally in radio networks, satellite networks and some local area networks (e.g., Ethernet). Their deployment is usually easier than point-to-point channels. An important characteristic of shared channels is that transmissions of diierent nodes interfere each other, namely, one transmission coinciding in time with another may cause none of them to be received. This means that the success of a transmission between a pair of nodes is no longer independent of other transmissions. To have successful transmissions in shared channels, interference must be avoided or at least controlled. The channel allocation among the competing nodes is critical for proper operation of the network. This article focuses on access schemes to such channels known as Multiple Access Schemes. These schemes are nothing but channel allocation rules that determine who goes next on the channel aiming at some desirable network performance characteristics. Multiple access schemes belong to a sublayer of the data link layer called the Medium Access Control (MAC) which is especially important in LANs. Multiple access schemes are natural not only in communication systems but also in many other systems such as computer systems, storage facilities or servers of any kind, where resources are shared by a number of nodes. In this article we mainly address shared communication channels. 2 One way to classify multiple access schemes is …

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Fair Power Allocation for Non-Orthogonal Multiple Access in the Power Domain

This paper presents an investigation on the performance of the Non-Orthogonal Multiple Access (NOMA) in the power domain scheme. A Power Allocation (PA) method is proposed from NOMA throughput expression analysis. This method aims to provide fair opportunities for users to improve their performance. Thus, NOMA users can achieve rates higher than, or equal to, the rates obtained with the convent...

متن کامل

On the Pixel Expansion of Hypergraph Access Structures in Visual Cryptography Schemes

In a visual cryptography scheme, a secret image is encoded into n shares, in the form of transparencies. The shares are then distributed to n participants. Qualified subsets of participants can recover the secret image by superimposing their transparencies, but non-qualified subsets of participants have no information about the secret image. Pixel expansion, which represents the number of subpi...

متن کامل

Multiple Access Technologies for Beyond 3G Wireless Cellular Systems

In this paper, some fundamental technical concepts of the main multiple access schemes for wireless mobile systems are reviewed, and a path for development of appropriate multiple access technologies for next-generation mobile networks, or so-called beyond 3G (B3G), is established. We first review the multiple access technologies in secondand third-generation wireless cellular systems from hist...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Multiple Access and Equalization Issues for 156 Mb/s ATM Radio in the Local Loop

This paper compares different multiple access schemes for broadband wireless local loop systems with a total shared capacity of 156 Mb/s per radio cell. Time Division Multiple Access (TDMA) and Orthogonal Frequency Division Multiple Access (OFDMA) are appropriate system concepts. The focus is on adaptive equalization issues for both access schemes.

متن کامل

A New Method for Construction Multiple Assignment Schemes for Generalized Secret Sharing

A secret sharing scheme is a way of protecting a secret by distributing partial information to a set of participants P in such a way that only authorized subsets of P can recover the secret. The family of authorized subsets is called the access structure of the scheme. In 1979, threshold schemes were proposed to realize threshold access structures, and in 1987, multiple assignment schemes were ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003