Unlock instant, AI-driven research and patent intelligence for your innovation.

Random switch-in method based on fountain coding

A fountain coding, random access technology, applied in digital transmission systems, electrical components, error prevention, etc., can solve the problems of wasting bandwidth resources and frequent conflicts later, and achieve the effect of improving system data throughput.

Inactive Publication Date: 2011-05-25
BEIJING INSTITUTE OF TECHNOLOGYGY
View PDF0 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0009] The purpose of the present invention is to solve the defects that pure ALOHA protocol, time-slotted ALOHA protocol, CSMA protocol and PRMA protocol adopt the strategy of waiting or retreating to lead to more frequent conflicts and waste of bandwidth resources when they encounter collisions. random access method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Random switch-in method based on fountain coding
  • Random switch-in method based on fountain coding
  • Random switch-in method based on fountain coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0032] User A and user B respectively send K 1 and K 2 Take a data frame of a source data packet to receiver C and receiver D as an example.

[0033] Using a random access method based on fountain coding, see figure 1 .

[0034] 1). Construct the data frame to be sent, and design to include K 1 and K 2 Data frames to be sent of source data packets ( a 0 , a 1 , · · · , a N 1 - 1 ) , ( b 0 , b 1 , · · · , b N 1 - ...

Embodiment 2

[0042] Taking cognitive radio as an example, an unlicensed user A sends a data frame containing K source data packets to a receiving end C by using a spectrum hole.

[0043] Using a random access method based on fountain coding, see figure 1 .

[0044] 1). Construct a data frame to be sent, and design a data frame to be sent that includes K source data packets (a 0 , a 1 ,...,a N-1 ), (b 0 , b 1 ,...,b N-1 ),..., (f 0 , f 1 ,..., f N-1 ).

[0045] 2). Fountain encoding is performed on the data frame to be sent, such as figure 2 Unauthorized user A sends the source data packet (a 0 , a 1 ,...,a N-1 ), (b 0 , b 1 ,...,b N-1 ),..., (f 0 , f 1 ,..., f N-1 ) reordered into packets (a 0 , b 0 ,..., f 0 ), (a 1 , b 1 ,..., f 1 ),..., (a N-1 , b N-1 ,..., f N-1 ) followed by fountain coding, such as sorting the i-th data packet (a i , b i ,..., f i ) to generate encoded data packets (A i , B i ,...,F i ,...), i=0, 1, ..., N-1; the output in columns i...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The present invention relates to a random switch-in method, especially relates to a random switch-in method using fountain coding, belonging to wired and wireless communication technology field. If the Pure ALOHA protocol, Slotted ALOHA protocol, CSMA protocol and PRMA protocol applies wait mode or wince mode when meets collision conflict will increase probability of the following conflict and cause conflict more frequently, and causing waste of channel bandwidth resources. For resolving the defect, the method uses steps of constructing the data frame to be sent, fountain coding the data frameto be sent, spectrum detection, outputting fountain coding data packet, processing collision conflict, receiving detection, decoding judge to obtain the random switch-in method based on fountain coding. When there is a collision conflict, comparing with the wait or wince strategy of the ALOHA protocol the method needs no wait or wince and using of the signal crossover technology can improve datathroughput ability of system in further.

Description

technical field [0001] The invention relates to a random access method, in particular to a random access method using fountain coding, and belongs to the technical field of wired and wireless communication. Background technique [0002] Random access belongs to the sharing technology of channel bandwidth resources. It mainly studies how to optimize the utilization of public resources while ensuring the quality of service. Its characteristic is that all users can send information randomly according to their wishes. However, when two or more users send information at the same time, collisions may occur, resulting in the failure of sending by conflicting users. Currently, random access methods mainly include pure ALOHA protocol, slotted ALOHA protocol, carrier sense multiple access (Carrier Sense Multiple Access, CSMA) protocol, packet reservation multiple access (Packet Reservation Multiple Access, PRMA) protocol, and the like. The specific implementation of the above protoco...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04W74/08H04L1/00
Inventor 安建平杨静李祥明袁磊
Owner BEIJING INSTITUTE OF TECHNOLOGYGY