Time-Splitting Multiple-Access
نویسنده
چکیده
It is shown that the encoding/decoding problem for any asynchronous M -user memoryless multiple-access channel can be reduced to corresponding problems for at most 2M 1 single-user memoryless channels. This is done via a method called time-splitting multiple-access which is closely related to a recently developed method called rate-splitting multiple access. It is also related to to multilevel coding. The practical interest for time-splitting multiple access is is that it reduces the seemingly hard task of nding good multiple-access codes and implementable decoders for such codes to the much better understood task of nding codes and decoders for singleuser channels. As a by-product, some interesting properties of the capacity region of M -user asynchronous discrete memoryless channels are derived.
منابع مشابه
Integrated JIT Lot-Splitting Model with Setup Time Reduction for Different Delivery Policy using PSO Algorithm
This article develops an integrated JIT lot-splitting model for a single supplier and a single buyer. In this model we consider reduction of setup time, and the optimal lot size are obtained due to reduced setup time in the context of joint optimization for both buyer and supplier, under deterministic condition with a single product. Two cases are discussed: Single Delivery (SD) case, and Multi...
متن کاملA rate-splitting approach to the Gaussian multiple-access channel
It is shown that any point in the capacity region of a Gaussian multiple-access channel is achievable by single-user coding without requiring synchronization among users, provided that each user “splits” data and signal into two parts. Based on this result, a new multiple-access technique called rate-splitting multiple accessing (RSMA) is proposed. RSMA is a code-division multiple-access scheme...
متن کاملA Register Allocation Framework for Banked Register Files with Access Constraints
Banked register file has been proposed to reduce die area, power consumption, and access time. Some embedded processors, e.g. Intel’s IXP network processors, adopt this organization. However, they expose some access constraints in ISA, which complicates the design of register allocation. In this paper, we present a register allocation framework for banked register files with access constraints ...
متن کاملIEEE 802.11 medium access control enhancements based on simultaneous multiple-input multiple-output bandwidth sharing
The demand for higher data rate has spurred the adoption of multiple-input multiple-output (MIMO) transmission techniques in IEEE 802.11 products. MIMO techniques provide an additional spatial dimension that can significantly increase the channel capacity. A number of multiuser MIMO system have been proposed, where the multiple antenna at the physical layer are employed for multiuser access, al...
متن کاملReal-Time Wireless Communication using Splitting Protocols
Addressing the problem of packet transmission in a wireless soft real-time system, we present ve splitting protocols that take packet deadlines into account. We show, as in the case of non real-time splitting algorithms, that blocked access versions ooer higher success rates than free access ones. Of the two best performing blocked access protocols, performance under moderate to heavy loads fur...
متن کامل