Random access schemes for satellite networks, from VSAT to M2M: a survey

Size: px
Start display at page:

Download "Random access schemes for satellite networks, from VSAT to M2M: a survey"

Transcription

1 INTERNATIONAL JOURNAL OF SATELLITE COMMUNICATIONS AND NETWORKING Int. J. Satell. Commun. Network. 2018; 36: Published online 15 December 2016 in Wiley Online Library (wileyonlinelibrary.com) Random access schemes for satellite networks, from VSAT to M2M: a survey Riccardo De Gaudenzi 1, *, Oscar Del Rio Herrero 1, Gennaro Gallinaro 2, Stefano Cioni 3 and Pantelis-Daniel Arapoglou 1 1 European Space Agency, Keplerlaan 1, 2200 AG Noordwijk, The Netherlands 2 Space Engineering S.p.A., Via dei Berio, 91, Roma, Italy 3 Aijlon for European Space Agency, Keplerlaan 1, 2200 AG Noordwijk, The Netherlands SUMMARY In this survey paper, we review the random access (RA) techniques with particular emphasis on the issues and the possible solutions applicable to satellite networks. RA dates back to the 1970s when the ALOHA protocol was developed to solve the problem of interconnecting university computers located in different Hawaiian islands. Since then, several evolutions of the ALOHA protocol have been developed. In particular, solutions were devised to mitigate the problem of packet collisions severely degrading the RA protocols performance. The approach followed for many years has been to avoid the occurrence of collisions rather than solving them. More recently, techniques tackling the RA packet collision problem have appeared triggered by the need of improving RA performance in satellite and terrestrial wireless networks. In particular, satellite networks large propagation delay does not allow the adoption of enhanced terrestrial RA techniques based on channel sensing. Adopting conventional demand assignment multiple access protocols is not suitable for supporting a large number of sensors or devices transmitting small-size low duty cycle packets as required for machine-to-machine communications. This provided the stimulus to exploit successive interference cancelation schemes to solve packet collision issues. The use of successive interference cancelation in RA is relatively new and has opened up a promising research area. We provide an extensive review of recent high-performance RA techniques achieving more than three orders of magnitude throughput increase compared with the original ALOHA at low packet loss rate. In this survey, we cover both slotted and unslotted techniques. Finally, we review the use of RA in satellite systems and related standards including recent proposals for machine-to-machine applications. Copyright 2016 John Wiley & Sons, Ltd. Received 27 April 2016; Revised 25 September 2016; Accepted 9 November 2016 KEY WORDS: satellite communications; random access; multiple access; machine-to-machine communications; multi-user detection 1. INTRODUCTION This survey aims to review recent advances in the field of random access (RA) for satellite networks. Until recently, the use of RA in satellite networks was limited to initial logon or to low-efficiency messaging systems. This is because the large propagation delay of the satellite channel as well as its noise limited nature was making the adoption of more efficient RA schemes not viable. These known satellite features have recently triggered the development of some unconventional solutions to make RA protocols able to efficiently cope with collisions. Machine-to-machine (M2M) is defined as data communication among devices without the need for human interaction. This may be data communication between devices and a server, or device-to-device either directly or over a network. Examples of M2M services include security, tracking, payment, smart grid, and remote devices maintenance/monitoring [1, 2]. The support to M2M applications by satellite networks is important for complementing the * Correspondence to: R. De Gaudenzi, European Space Agency, Keplerlaan 1, 2200 AG Noordwijk, The Netherlands. rdegaude@xrsun0.estec.esa.nl Copyright 2016 John Wiley & Sons, Ltd

2 R. DE GAUDENZI ET AL. 67 terrestrial infrastructure to provide ubiquitous coverage. However, this requires the exploitation of access techniques at physical layer providing high spectral, power, and energy efficiency with minimum overhead in terms of signaling and network synchronization. A similar collision resolution protocols trend is also emerging in terrestrial wireless applications. We believe that some of the new RA techniques devised for satellite networks may also find application in the growing market of terrestrial M2M networks. In the early years of satellite communications, key applications were point-to-point trunk connections aggregating traffic from large geographical areas (mostly voice and television). As a consequence, multiple access to the satellite transponder was implemented by fixed frequency division multiple access (FDMA) assignments to each Earth station [3]. Very small aperture terminals (VSAT) professional satellite networks appeared in the 1980s. VSAT networks used bidirectional communications and were typically characterized by a star topology, where VSATs communicate to a larger master Earth station (called the hub). In some circumstances, a VSAT can also communicate directly to other VSAT when operating in mesh configuration [4 6]. The inbound channel (multipoint-to-point) typically consists of several lower bit rate carriers operating in FDMA or multi-frequency time division multiple access (MF-TDMA) with digitally modulated signals [7]. Only few satellite networks were implemented using code division multiple access (CDMA). The most popular examples of CDMA technology adoption are represented by the OmniTRACS r messaging system [8] and the Globalstar global personal mobile satellite communication system [9]. With a medium to low level of traffic aggregation on each VSAT terminal, traffic was no longer deterministic and constant like in the point-to-point trunk connections, but rather bursty and with a low duty cycle. As a result, it was no longer efficient to use fixed resource assignments such as FDMA or TDMA in the inbound channel. The arrival of the VSAT and mobile satellite networks triggered the need for new multiple access protocols able to efficiently share the satellite communication resources among all terminals, while maintaining acceptable throughout loss and delay performances. The satellite environment is characterized by radio link power limitations and a large propagation delay, among other inherent attributes (e.g., nonlinearities). As discussed in Section 2, the large propagation delay, in the range of 250 ms for a geostationary satellite, represents a very peculiar property of this type of network, which conditions the applicability of terrestrial multiple access schemes to the satellite environment. In this channel, the propagation delay is much larger than the time taken to transmit a packet, and a sender may have sent several packets before the receiver starts receiving (or not in case of collisions) the first packet. Satellite multiple access schemes must be able to deal with all these aspects. The services initially supported by VSAT networks were mainly voice calls or data circuit-switched communications; thus, the network resources were allocated for a relatively long time compared with the physical layer frame duration. As a consequence, the system was designed to dynamically allocate the available resources (e.g., frequency sub-bands, frame time slots, or spreading codes) according to the request occurring on a contention channel. The RA used for the contention channel was just representing a tiny part of the overall system traffic. Thus, its efficiency was not a major concern for satellite network designers. In recent years, the traffic evolution towards packet-oriented Internet protocol (IP) and the emergence of M2M applications have been generating new challenges. In this new landscape, both satellite and terrestrial networks share the same need to efficiently cope with the low duty cycle traffic generated by a much larger population of small-size, low-power, and low-cost terminals. Classical VSAT solutions for resource allocation based on demand assignment (DA) are clearly not adequate for this type of traffic. This issue has triggered research for more efficient satellite RA schemes. In parallel, terrestrial wireless networks are also facing the challenge of efficiently supporting M2M type of traffic with several orders of magnitude increase for the population of supported terminals by each base station [10]. We can conclude that both application domains are looking for reliable, highly spectral, power, and energy efficient RA schemes. The following survey will cover past and recent RA schemes with emphasis on physical and medium access control (MAC) aspects. The more conventional schemes reviewed are still in use and, thus, relevant for the survey. However, while reviewing them, their main limitations will be outlined to justify

3 68 R. DE GAUDENZI ET AL. Figure 1. Classification of satellite RA techniques considered in this review. IC stands for interference cancelation. the search for more suitable solutions described in the following sections. The review is also covering terrestrial RA schemes to illustrate their possible issues when applied to satellite. The survey of RA schemes research is split according to their key physical/mac layer protocol features, that is, slotted versus unslotted, interference cancelation versus non-interference cancelation, and spread-spectrum versus non-spread spectrum multiple access schemes (Figure 1). Slotted protocols require that the physical layer packet emitted by each terminal is aligned to a common network frame and slot timing structure. Instead, in case of unslotted RA, the packet can be asynchronously transmitted by each terminal. In the following, we will use both terms unslotted and asynchronous terms interchangeably. The rest of the paper is organized as follows: Section 2 deals with multiple access in satellite networks and provides a review of the key terrestrial RA techniques and their applicability to satellite networks; Section 3 illustrates the more recent advances in RA for slotted access systems both spread and non-spread spectrum variants; Section 4 summarizes advanced unslotted spread-spectrum RA techniques; Section 5 is dealing with unslotted non-spread spectrum high-performance RA solutions; and Section 6 provides an overview of satellite systems exploiting RA techniques and the corresponding standards. Finally, in Section 7, conclusions are provided. 2. THE SATELLITE MULTIPLE ACCESS PROBLEM AND INITIAL RANDOM ACCESS SOLUTIONS 2.1. The satellite multiple access problem Initial solutions. As mentioned in the introduction, during the 1980s and 1990s, numerous multiple access protocols were developed [5, 6, 11 16]. They are all based on combinations of RA (unslotted or slotted) with fixed-allocation TDMA, demand-assigned TDMA, or CDMA. The available inbound bandwidth resources are shared employing FDMA, TDMA, MF-TDMA, or CDMA [7]. As opposed to the purely fixed assignment multiple access techniques, the protocols in [5, 6, 11 16] combined DA, RA, and fixed assignment to dynamically control the access to the shared resources by the large population of contending users. These protocols typically have a centralized control located in the hub, which manages the access to the satellite resources, as it allows a more efficient multiplexing of services with different priorities (e.g. data, voice, and video). Oriented initially to the telephone service, a portion of the satellite resources (e.g., frequency channel in FDMA or timeslots in TDMA) was assigned dynamically on a call basis [17], and the grade of service was determined through the well-known call blocking formulas, such as the Poisson and Erlang B formulas used for terrestrial links [18] Demand assignment protocols. With the increase of data services (e.g., corporate networks interconnection, retail point-of-sale transactions, and supervisory control and data acquisition

4 R. DE GAUDENZI ET AL. 69 (SCADA)), it was necessary to assign satellite resources in a more dynamic way, that is, on a packet basis rather than call (or circuit) basis. Demand assignment multiple access (DAMA) schemes evolved introducing faster capacity reservation mechanisms in order to reduce end-to-end transmission time. In the contention-based priority-oriented demand assignment protocol (CPODA) protocol [19], capacity reservations can be implemented via contention mini slots and piggybacking them in the header of the scheduled packet transmissions. The combined free/demand-assignment piggybacked (CFDAMA-PB) multiple-access protocol [20] behaves like the CPODA protocol, but in addition, it randomly assigns the unused traffic slots to inactive users. At low traffic loads and with relatively small terminal population, the chance that an Earth station obtains free-assigned slots is high, thus reducing its end-to-end transmission time to a minimum of one satellite hop propagation delay (i.e., 250 ms for GEO satellites). At high loads, the end-to-end transmission delay is not reduced as no spare satellite resources are left, but the system remains stable. However, the performance of DAMA protocols is highly dependent on the traffic characteristics and the number of Earth stations sharing the satellite resources. Internet data traffic is known to be statistically self-similar [21, 22]. Satellite terminals generate heavy tailed bursts of packets with a large variance in the inter-arrival times between bursts. Besides, by aggregating streams of such traffic from different Earth stations, we intensify the self-similarity (burstiness) instead of smoothing it (fractal-like behavior). In [23], the performance of the CFDAMA-PB protocol has been analyzed with traffic following a Poisson regime, which is more appropriate for voice, facsimile, or SCADA type of services, but not for Internet data traffic as described previously. Del Río Herrero, Foti, and Gallinaro [24] investigate the sensitivity of the CFDAMA-PB protocol under different types of Internet data traffic and a large number of Earth stations (i.e., greater than the number of traffic slots in one satellite hop propagation delay). It is shown that the performance of CFDAMA-PB is equivalent to a pure DAMA scheme, that is, the majority of the free capacity assignments are wasted. Figure 2 shows that the throughput component for free-assigned slots with bursty traffic is very low at all loads, while for Poisson, traffic is quite high at loads up to 80%. Under these conditions, every packet transmission undergoes first a reservation cycle (two satellite hops) and then another satellite hop for the packet transmission (i.e., a latency larger than 750 ms for a GEO scenario) like in a pure DAMA scheme. This poses some limitations on the use of DAMA for consumer broadband access to support real-time or interactive applications. To enhance the performance of DAMA protocols for broadband satellite networks, predictive DAMA protocols have been developed, such as PRDAMA [25]. PRDAMA estimates the positive varying trend of the traffic on each Earth station to allocate the free capacity assignments. Nonlinear prediction methods are used to predict the traffic burstiness [26]. This results in a more efficient assignment of the free bandwidth to those terminals that are predicted to need the resource, thus minimizing the wastage of free bandwidth assignments. However, the effectiveness of the predictive methods cannot be guaranteed for all traffic data [26]. Besides, the improvement in the end-to-end delay with respect to CFDAMA-PB is rather limited (i.e., ~100 ms delay reduction) with an average end-to-end delay over a bent pipe GEO satellite still in the order of 750 ms. A final consideration for DAMA schemes is related to their overhead. All DAMA schemes introduce control sub-frames that are needed by Earth stations to make capacity requests and to remain synchronized with the satellite network (e.g., for TDMA and MF-TDMA). This represents a sizeable overhead in the inbound channel of large-size networks. Del Río Herrero, Foti, and Gallinaro [24] have also shown that, as opposed to DAMA schemes, RA schemes are much less sensitive to the traffic characteristics and the number of Earth stations. This is demonstrated by analyzing the performance of spread-spectrum ALOHA (SSA) [27] for different number of Earth stations and for different traffic types (voice, web client, and web server). Furthermore, Hasegawa, Wu, and Mizuno [28] illustrate how the common smoothing methods in RA such as random blocking and random delays force Poisson characteristics on the traffic for heavy loads. For these reasons, in the following, RA schemes will be analyzed in the presence of Poisson type of traffic.

5 70 R. DE GAUDENZI ET AL. Figure 2. Combined free/demand-assignment piggybacked throughput decomposition in demand and free assigned slots from [24]: (a) Poisson traffic and (b) self-similar traffic Hybrid RA and DAMA protocols. In [29] and [30], two combined random/reservation multiple access schemes have been proposed dubbed combined random/reservation access (CRRMA) and random access with notification (RAN), respectively. The basic principle is to perform the first transmission attempt in a RA slot, thus avoiding the initial two hops satellite delay for capacity reservation, and in case it is unsuccessful (i.e., due to collision), perform a second transmission in a reserved slot. RA performs well under bursty traffic, but, due to the high probability of packet collisions at high loads, the improvement in delay of the CRRMA and RAN schemes is limited to low load conditions Emerging satellite broadband and M2M networks needs. The emergence of broadband access and M2M communications has triggered the need for further performance improvements of satellite multiple access protocols. The M2M multiple access protocols shall provide fast and reliable access for a very large population of Earth stations (tens of thousands) generating bursty traffic with a very low duty cycle. Random access protocols represent a good candidate solution, as they are quite insensitive to the network population size and traffic characteristics, as well as providing low-access delays and reduced terminal complexity. RA protocols used in combination with DAMA are also a good alternative to the free capacity assignment scheme for the less predictive, low duty cycle, time sensitive traffic encountered in broadband access networks Main terrestrial random access techniques and their applicability to satellite Random access protocols originated in the 1970s from the need for terminal computer and computer computer communication. In this kind of communication, data traffic is bursty. This is the result of

6 R. DE GAUDENZI ET AL. 71 the high degree of randomness seen in the message generation time and size and of the relatively lowdelay constraint required by the user. Users generate traffic with a low duty cycle, but when they do, they require a fast response. As a result, there is a large peak-to-average ratio in the required data transmission rate. In this context, it is not efficient to use fixed channel allocation schemes, as they would result in a low channel utilization, that is, the percentage of the channel capacity that goes into the throughput. A more advantageous approach is to provide a single shared high-speed channel to a large number of users. However, when dealing with shared media, conflicts arise, that is, more than one user want to access the shared resources simultaneously. Therefore, the challenge with shared media is to control the access to the common channel while providing good level of performance and maintaining reduced implementation complexity. RA protocols were developed to address this multiple access scenario, and today are extensively used in terrestrial networks over wired and wireless shared media [11, 31, 32]. In this section, we review the main terrestrial RA techniques and analyze their applicability to the satellite environment Carrier sensing protocols. One of the most widely used distributed packet access schemes is the carrier sense multiple access (CSMA) and its variants. In CSMA, a station senses the medium before transmitting only starting transmission if the medium is not being used by other transmitters [33]. CSMA/collision detection (CSMA/CD) operates similarly to CSMA, but once the transmission has started, if the sender detects a collision, it stops transmitting to reduce the overhead. When collisions occur, each station willing to transmit backs off for a random time period [34]. CSMA/CD cannot be efficiently implemented over a terrestrial wireless network because of the hidden terminal problem, where some stations are out of the transmission and detection range of each other [35]. However, CSMA/CD mechanism performs well in wired networks, and the IEEE has standardized CSMA/CD in the IEEE standard [36]. Another CSMA variant used in wireless networks to avoid collisions is the CSMA/collision avoidance (CSMA/CA) scheme. In CSMA/CA, the sender tries to avoid a collision after the channel becomes idle, by waiting for an inter frame spacing time before contending for the channel. The IEEE has standardized CSMA/CA in the IEEE standard [37]. The back-off algorithm in CSMA/CA tries to avoid collisions, but does not remove them completely. Small values of the random backoff time cause many of them, while very large values can cause unnecessarily long delays. Second, CSMA/CA fails to solve the hidden terminal problem and cannot always detect that the medium is busy, thus creating a collision in the channel. All the previous multiple access protocols employ carrier sensing to avoid collisions and offer a good channel utilization, low latency, and good stability over channels where packet transmission times are larger than propagation delays. But unfortunately, they cannot operate over satellite channels where propagation delays are very large Distributed reservation protocols. Another family of schemes are distributed reservation schemes, such as the multiple access collision avoidance (MACA) [38], also adopted in wireless networks. In MACA, a sender transmits a request to send (RTS) message to its intended receiver before the data transmission. The data are transmitted only after reception of a clear to send (CTS) message from the receiver, which is sent after reception of a successful RTS. A different distributed reservation scheme is represented by the random access channel (RACH) adopted in the third generation (3G) cellular mobile networks [39]. In case of RACH, terminals randomly transmit first short packet preambles and then wait for a positive acquisition indicator from the base station prior to the transmission of the complete message (i.e., after successful reservation of the channel). Distributed reservation schemes not only solve the hidden terminal problem typically present in terrestrial radio links but also rely on short propagation delays, that is, the reservation delay only represents a small overhead of the total packet transmission time. In the satellite environment, centralized reservation schemes are used instead [20] to avoid several failed attempts prior to the packet transmission, which could represent a very large overhead to the total end-to-end packet transmission delay.

7 72 R. DE GAUDENZI ET AL ALOHA protocols. We review now protocols not exploiting any form of channel sensing or reservation. ALOHA, slotted ALOHA, and diversity slotted ALOHA - The pure ALOHA protocol, first proposed by N. Abramson in [40], is one of the oldest and simplest multiple access protocols. In ALOHA, a terminal transmits a packet in an asynchronous fashion without checking if any other terminal is active. Within an appropriate timeout period, it receives an acknowledgment from the destination, confirming that no conflict has occurred. Otherwise, it assumes that a collision has occurred and must retransmit. To avoid repeated collisions, the re-transmission time is randomized across the terminals, thus spreading the retry packets over time. A slotted version, referred to as slotted ALOHA (S-ALOHA) is obtained by dividing time into slots of duration equal to the duration of a fixed-length packet [41]. Users are required to synchronize the start of transmission of their packets to the slot boundaries. When two packets collide, they will overlap completely rather than partially, providing an increase on channel utilization over pure ALOHA. The S-ALOHA has the advantage of higher efficiency but requires time slot synchronization. Both schemes are applicable to the satellite environment, as they have no dependency on the propagation delay. Unfortunately, these schemes are subject to a high collision probability Figure 3. S-ALOHA and DSA performance from [48] for quaternary phase shift keying (QPSK) modulation, 3GPP turbo code FEC r D 1=2, packet block size 100 bits, energy per symbol to noise power spectral density ratio E s =N 0 D 7 db in the presence of lognormal packets power imbalance with mean D 0 db, standard deviation, and Poisson traffic. [Colour figure can be viewed at wileyonlinelibrary.com]

8 R. DE GAUDENZI ET AL. 73 because of the lack of carrier sensing. As a consequence, their operation in the high-load region is not practical in the satellite environment because of the high number of retransmissions required, yielding very large latencies. S-ALOHA stability analysis has been investigated in [42]. The diversity slotted ALOHA (DSA) [43] slightly improves the S-ALOHA performance at low channel loads by sending twice the same packet at random slot locations in the frame in favor of increasing the time diversity and thus reducing the packet loss ratio (PLR). As for S-ALOHA, operation in the high packet collision probability region is not practical in satellite environment. It is generally assumed that whenever two packet transmissions overlap in time, they cancel each other. This assumption is pessimistic as it neglects capture or near-far effects in radio channels. Capture occurs when a terminal receives messages simultaneously from two terminals, but the signal from one of them drowns out the other, so that no collision occurs. The terminal with the higher received power is said to have captured the receiver. Some of these effects have been addressed in [41, 44 46]. Capture is good in the sense that it not only reduces the time needed in resolving collisions but may also drive weak terminals completely out of the medium. Figure 3 from [48] presents the performance results for S-ALOHA and DSA in the presence of packets power imbalance following independent identically distributed lognormal distributions with equal mean and standard deviation, where both parameters are expressed in db in the logarithmic domain. The corresponding packet amplitude a distribution is given by [47] p A.a/ D 20 p exp.20 log 10 2 ln 10 a 2 2 a /2 : (1) The results have been obtained by detailed simulations (see the figure caption for details on the physical layer assumptions) and by using the analytical model derived in [48]. The x-axis represents the normalized average channel MAC load (G) expressed in information bits/symbol for non spread-spectrum RA schemes and in information bits/chip for RA schemes employing spread spectrum. In this way, we avoid any dependence on the modulation cardinality or coding rate used. A similar approach has been used for measuring the RA throughput shown in y-axis. The figure shows that in both schemes, the throughput improves with increasing power imbalance as collisions become easier to resolve (power capture effect). However, as expected, the PLR rises quickly as the load on the channel increases. Although for equi-powered packets, the maximum channel utilization available is 18% for pure ALOHA, and 36% for S-ALOHA, low packet collision probabilities (e.g., < 10 3 ) typically required by satellite networks are achieved at very low loads, that is, <10 3 bits/symbol. This results in very low channel utilization (Figure 3). The low PLR operating point is justified by the need to avoid excessive and highly variable retransmission latencies in the satellite environment, which is characterized by very long propagation delays, and to maximize the throughput of applications using the TCP protocol that is also highly sensitive to the packet losses [51, 52]. It is important to remark the fact that often in the literature, RA schemes are compared, looking at their peak throughput rather than the value achieving the required MAC PLR for a given service or application. In fact, for low loads (e.g., G<0:2bits/symbol), DSA outperforms S-ALOHA, although its peak throughput is lower than S-ALOHA. This can be better appreciated in Figure 4, where S- ALOHA and DSA PLR curves are combined in one figure for the case of no power imbalance and the low load region is expanded. For instance, for a target PLR D 10 2, DSA can achieve a throughput T D 0:05 bits/symbol, while for S-ALOHA, the maximum achievable throughput is T D 0:01 bits/symbol. The low PLR operating point is justified by the need to avoid excessive and highly variable retransmission latencies in the satellite environment, which is characterized by very long propagation delays, and to maximize the throughput of applications using upper-layer protocols such as the transmission control protocol (TCP) that is also highly sensitive to the packet losses [49, 50]

9 74 R. DE GAUDENZI ET AL. Figure 4. Analytical versus simulation S-ALOHA and DSA performance comparison in the low load region for QPSK modulation, 3GPP turbo code FEC r D 1=2, packet block size 100 bits, E s =N 0 D 7 db in the presence of no power imbalance, and Poisson traffic. [Colour figure can be viewed at wileyonlinelibrary.com] This is justified by the fact that under light traffic, multiple transmission, hence time diversity, gives better PLR performance. Spread spectrum ALOHA - Slotted RA systems require terminals to keep time slot synchronization. For satellite applications, the resulting network synchronization overhead greatly reduces system efficiency, in particular, for networks characterized by large number of terminals with very low transmission duty cycle (e.g., M2M applications). Moreover, a requirement of accurate network-level time synchronization increases the complexity of the terminal. Thus, slotted RA is penalizing lowcost terminal solutions. To mitigate this limitation, a pure ALOHA scheme can be employed, but its performance is worse than for S-ALOHA increasing by a factor two the packet collision probabilities [41]. Direct-sequence spread spectrum (DS-SS) multiple access is the most common form of CDMA, whereby each user is assigned a particular code sequence, which is modulated on the carrier with the digital data modulated on top of that [7]. Users can transmit asynchronously, and even when the same spreading code is used, data can be received [27, 53]. The SSA protocol proposed in [27] has potentially attractive features as it provides a much higher throughput capability than S-ALOHA for the same PLR target under equal power multiple access conditions when adopting powerful physical layer forward error correction (FEC) (e.g., coding rates 6 1=2) and low-order modulations (e.g., binary phase shift keying (BPSK) and QPSK). The authors in [24] shows that the SSA throughput is critically dependent on the demodulator signal-to-noise plus interference ratio (SNIR) threshold for packet decoding. Results reported in [24] indicate that, differently from S-ALOHA, SSA shows a steep PLR increase with MAC load. Thus, SSA can be operated with low PLR close to the peak of the throughput characteristic. As an example, using turbo codes and relatively small packets, SSA can achieve a much higher throughput than ALOHA or S-ALOHA, in the order of T ' 0:5 bits/chip for a PLR of 10 3 (Figure 5 with D 0 db). Spread-spectrum ALOHA represents a very interesting RA scheme for the satellite environment, in particular, when asynchronous access is required. The main reason for performance improvement of SSA techniques with regard to pure ALOHA is that they can take advantage of a higher traffic aggregation. The average number of packet arrivals over one packet duration can be computed as follows: D N rep GG p ; (2) where N rep is the number of replicas transmitted for each packet, G is the MAC load expressed in information bits/symbol in non-spread systems, and bits/chip in spread systems. The processing

10 R. DE GAUDENZI ET AL. 75 Figure 5. Simulated versus analytical SSA performance with and without power unbalance from [54]: 3GPP turbo code FEC r D 1=3 with block size 100 bits, BPSK modulation, spreading factor 256, E s =N 0 D 8:9 db. [Colour figure can be viewed at wileyonlinelibrary.com] gain is given by G p D SF=.r log 2 M/,wherer is the FEC code rate, M is the modulation cardinality, and SF is the spreading factor. It can be observed from (2) that large processing gain will proportionally increase the value of. Typical values for non-spread spectrum systems are 6 5, while for SS systems assuming SF D 32 and r D 1=3, 100. Figure 6 demonstrates that the Poisson density normalized to the mean value approaches a Dirac delta function as increases. This means that the instantaneous number of interfering packets fluctuation will reduce with increasing. This is a favorable consequence for RA, because the system operational average MAC load can be chosen to be close to its maximum operational value (i.e., when the PLR is around ). Furthermore, when operating with large values, the co-channel interference can be accurately approximated as additive white Gaussian noise (AWGN) thanks to the large number of interfering packets thus easing its analysis. Despite the attractive features listed previously, SSA Achilles heel resides in its high sensitivity to multiple access carrier power imbalance. This phenomenon is disrupting the SSA scheme throughput because of the well-known CDMA near-far problem. As shown in Figure 5, for PLR of 10 3 or less, the SSA throughput is diminished by several orders of magnitude when the received packets power is lognormally distributed with standard deviation of 2 3 db, as opposed to S-ALOHA where power imbalance results in improved performance because of the power capture effect.

11 76 R. DE GAUDENZI ET AL. Figure 6. Traffic probability distribution normalized to the mean value. [Colour figure can be viewed at wileyonlinelibrary.com] Tree-based contention resolution protocols. Another class of RA algorithms is represented by the tree algorithms. The most basic collision resolution protocol is called the standard (binary) tree algorithm (STA) protocol and was proposed by Hayes [55] and Capetanakis [56]. According to this protocol, when a collision occurs, say in slot k, all users that are not involved in the collision wait until the collision is resolved. The users involved in the collision split randomly into two subsets, by (for instance) each flipping a coin. The users in the first subset, those that flipped 0, retransmit in slot k C 1, while those that flipped 1 wait until all those that flipped 0 transmit successfully their packets. If slot k C 1 is either idle or contains a successful transmission, the users of the second subset (those that flipped 1) retransmit in slot k C 2. Ifslotk C 1 contains another collision, then the procedure is repeated, that is, the users whose packets collided in slot k C 1 (the colliding users) flip a coin again and operate according to the outcome of the coin flipping, and so on. Massey s modified tree algorithm (MTA) [57] is eliminating avoidable collisions caused by multiple user retransmissions in the same slot of the STA protocol. Except for eliminating that issue, the MTA protocol evolves exactly as the STA protocol. The successive interference cancelation tree algorithm (SICTA) has been introduced in [58] as an evolution of the STA and MTA. Colliding packets are discarded in STA and MTA with no attempt to extract pertinent packet information. In contrast, SICTA retains them for future reuse. The SICTA algorithm relies on SIC to take advantage of collided packets in a conventional STA. With a cross-layer design approach, SICTA combines SIC with tree algorithm and thus permeates SIC benefits to the MAC layer. In addition to detailing the SICTA algorithm, Capetanakis [58] provides analytical derivation of the collision resolution interval (CRI) length, delay, and throughput statistics. The CRI represents the time interval from the slot where initial collision occurs up to and including the slot in which all senders recognize that all packets involved in this collision have been successfully received. The main advantages of SICTA are its high throughput (up to 0.693) and low complexity. The high throughput renders SICTA suitable for medium to high traffic load and widens the applicability of RA. However, SICTA as STA and MTA protocols packet retransmission is requiring quick feedback sent by the receiver. This mechanism is not suitable for satellite networks characterized by long propagation delays Summary of the section. The aforementioned review of well-known terrestrial and satellite RA techniques reveals that none of them is fully satisfactory for satellite M2M applications. Table I provides a summary of the various RA techniques analyzed in this section. In general, conventional RA schemes provide low channel utilization over the satellite environment because

12 R. DE GAUDENZI ET AL. 77 Table I. Summary of conventional random access techniques. Implementation complexity Peak power requirement Sensitivity to power imbalance Channel utilization Slotted / unslotted Sensitivity to delay Technique Carrier sense multiple access (CSMA) [33] High Slotted High Medium High Low and unslotted CSMA collision detection [34] High Slotted High Medium High Medium and unslotted CSMA collision avoidance [37] High Slotted Medium Medium High Low and unslotted Multiple access collision avoidance [38] High Unslotted Medium Low High Low 3G random access channel [39] High Slotted Medium High Low Medium ALOHA [40] Low Unslotted Low Low High Low Slotted ALOHA [41] Low Slotted Low Low High Low Diversity slotted ALOHA [43] Low Slotted Low Low High Low Spread spectrum ALOHA [27, 53] Low Unslotted Medium High Low Medium Successive interference cancelation High Slotted Medium Medium High Medium Tree algorithm [58] of the long propagation delays. Among them, the ALOHA-based techniques adapt better to the satellite environment, as they do not have any dependency on the propagation delay, but their performance is constrained by their high collision probability. Subsequently, today s satellite systems only use ALOHA-based RA for initial network login, capacity request, and short packet transmissions [59, 60]. 3. ADVANCED SLOTTED RA TECHNIQUES In this section, we review recently proposed RA schemes suitable for satellite applications that are sharing the following features: slotted access, open loop RA, and collision resolution through interference cancelation by using no (or light) spreading techniques Contention resolution diversity slotted ALOHA To address the shortcomings of conventional RA techniques over satellite, the contention resolution diversity slotted ALOHA (CRDSA) technique was introduced in [61]. Similarly to DSA, CRDSA is transmitting every packet two or more times (number of replicas, N rep ) in randomly selected slots within a TDMA frame of N slots. The novelty is that, to help contention resolution, each physical layer packet contains in the header information about the location of the replicas within the frame (Figure 7). The complete TDMA frame is sampled and stored in a digital memory at the receiver side. By using simple, yet efficient interference cancelation techniques, clean bursts are recovered (e.g., packet The use of number of replicas in the context of CRDSA shall be understood as the number of same packet instances physically repeated in the same frame.

13 78 R. DE GAUDENZI ET AL. Figure 7. Example of contention resolution diversity slotted ALOHA frame with two replicas per packet. [Colour figure can be viewed at wileyonlinelibrary.com] 3 in slot 5 in Figure 7), and the interference generated by their replicas on other slots is canceled (e.g., packet 3 in slot 4). By performing iterative processing of the TDMA frame, it is proven that most of the initial collisions can be resolved. In Figure 8, it is shown that CRDSA largely outperforms classical S-ALOHA techniques in terms of throughput and PLR. For a MAC packet loss probability of 1%, channel utilization of 25% can be achieved with the CRDSA technique with two replicas (Figure 8(b)), while for S-ALOHA, a channel utilization of only 1% can be achieved for the same packet loss probability (Figure 4). This represents a 25-fold throughput improvement compared with S-ALOHA. With three replicas, the performance improvement is even larger. As shown in Figure 8(b), a channel utilization of 58% can be achieved, which represents a 58-fold throughput improvement compared with S-ALOHA. The authors in [61] presents detailed CRDSA delay performance results. For a target PLR =10 3, CRDSA with two and three replicas achieves channel utilization of 0.07 and 0.45, respectively, compared with a modest for S-ALOHA. It is important to highlight the relevance of PLR improvement in the satellite environment, as it has a direct benefit on the end-to-end delay due to the reduced need for packet retransmissions. The performance boost of the CRDSA protocol is achieved thanks to the implementation in the hub receiver of a collision resolution capability that exploits interference cancelation (IC) techniques. Interference cancelation techniques have been extensively investigated for CDMA [62], but before CRDSA has never been proposed in a TDMA S-ALOHA context. CRDSA is basically a TDMA access scheme that uses the information from the successfully decoded packets to cancel the interference their replicas may generate on other slots. It is possible to cancel the interference because the interfering data symbols are known from the successfully decoded packets. One of the main issues in applying IC techniques to TDMA S-ALOHA is related to the need for accurate channel estimation for the burst replicas removal where collision(s) occur. In fact, collisions in a satellite TDMA multiple access channel are typically destructive, as the near-far effect is rather limited. While carrier frequency, symbol timing, and signal amplitude estimation for IC can be derived from the clean replica (e.g., packet 3 in slot 5 in the example of Figure 7), carrier phase has to be estimated on the slot(s) where collision(s) occurs (e.g., in slot 4). This is because in practical broadband systems, the carrier phase is time variant also from slot to slot. This key problem was initially solved in [61] by exploiting the burst preamble, which is individually signed by a pseudo-random binary sequence randomly selected among the available code family by each active Earth station for each burst in each frame. All replicas of the same burst use the same preamble code. This approach does not require a centralized preamble code assignment, thus allowing to maintain the RA nature of the proposed scheme. In this way, the preamble can be used for carrier phase estimation also in case of multiple collisions, which normally are destructive for channel estimation and payload decoding. With the aforementioned channel estimation implementation, the CRDSA performance with real detector realization is very close to the one obtained with ideal channel estimation [61]. An alternative, yet simpler way to perform channel estimation described in [63], is to use a common unique word (UW) (or preamble) for all Earth stations and, in addition, all or a sub-set of the payload symbols, which are known from the clean replicas. Payload symbols are uncorrelated among the colliding packets, even though without optimized cross-correlation properties. It is found that by employing payload symbols for channel estimation, performance results are comparable with those obtained by using multiple pseudo-random binary sequences for the burst preambles. This approach reduces complexity on both the earth stations and hub as a single preamble is used. Besides, the knowledge of the payload data allows to estimate the carrier phase along the burst

14 R. DE GAUDENZI ET AL. 79 Figure 8. Simulation S-ALOHA, DSA, and CRDSA performance for N rep D 2 and 3, N slots D 100, QPSK modulation, 3GPP FEC r D 1=2, packet block size 100 bits, E s =N 0 D 7 db in the presence of no power imbalance, and Poisson traffic. [Colour figure can be viewed at wileyonlinelibrary.com] by using a conventional carrier phase estimator for unmodulated carrier. This turns out particularly advantageous when low-cost, low-bit rate terminals are employed (e.g., for interactive TV), because the RF front-end introduces a non-negligible amount of phase noise [63]. Contention resolution diversity slotted ALOHA has a number of parameters that can greatly influence its behaviors. The most important ones are the FEC coding rate r, the number of replicas N rep,and the packets power imbalance. With the aim of optimizing its performance, in [48], an analytical framework has been developed jointly with a detailed simulator for the performance assessment of slotted

15 80 R. DE GAUDENZI ET AL. RA protocols. The proposed analytical framework assumes arbitrary power and traffic distributions and accurately models the RA system behavior. It has to be remarked that using a powerful FEC code (e.g., r D 1=3) and an adequate E s =N 0 value (e.g., E s =N 0 D 10 db), there is a non-negligible probability of correctly detecting the packet even in the presence of a collision and equi-powered packets (capture effect). Besides, the FEC code is important to help the collision resolution process in the presence of strong co-channel interference from colliding packet(s), thus not under pure AWGN-like conditions. Therefore, low FEC coding rates, which apparently reduce the individual packet information bit rate, end up playing an important role in enhancing the overall RA scheme throughput. The main reason limiting the PLR performance of CRDSA with two replicas is the so-called loop phenomenon described and analyzed in [48]. A loop occurs when all replicas of a set of packets are causing an unrecoverable collision with one or more replicas. A loop phenomenon occurs when all replicas of a set of packets are in unrecoverable collision with one or more replicas. Irresolvable loops are the loops that can not be resolved with further demodulator processing and lead to packet losses. In the example of Figure 7, packets 4 and 5 have formed a loop as their replicas have been transmitted in the same slots. The probability of occurrence is linked to the length of the frame, the MAC load, and, more importantly, the number of replicas from each packet. Longer frames and larger number of replicas will significantly reduce the occurrence of loops at the expenses of latency and energy efficiency. Its probability is responsible for the mild slope of the PLR versus MAC load characteristic reported in Figure 8(b) for CRDSA with two replicas. As observed in Figure 8(b) and in [64], three packet replicas give better CRDSA performance than two, because it significantly reduces the loop occurrence probability. This issue has been extensively analyzed in [48], and with three packet replicas, the probability of occurrence is well below the PLR target for our applications (PLR< 10 3 ). Contention resolution diversity slotted ALOHA stability has been investigated in [65 67]. The latter reference also contains a very short review of conventional RA protocols such as SA, DSA, and the more advanced ones such as CRDSA, IRSA. As for ALOHA and S-ALOHA, packets power imbalance boosts the performance of CRDSA. Stronger packets are decoded first, and weaker packets are successively decoded following the iterative IC process. Power imbalance results from the combined effect of the time variant atmospheric propagation, open loop power control errors (if applicable), Earth station equivalent isotropically radiated power (EIRP), and satellite receive antenna gain variations. It is shown in Figure 9 that CRDSA with FEC r D 1=3, N rep D 3, and power imbalance that follows a lognormal power distribution with standard deviation D 3 db can achieve a throughput T D 1:4 bits/symbol for a PLR <10 3, which represents a 1400-fold improvement with respect to S-ALOHA. As shown in [54], the PLR floor appearing in Figure 9 for D 3 db is due to presence of lognormal packet power variations that causes a number of packets to be received at the gateway below the detector threshold even assuming perfect interference cancelation. Further CRDSA performance improvement can be achieved optimizing the power distribution of the gateway demodulator incoming packets. In fact, Mengali, De Gaudenzi, and Arapoglou [68] has demonstrated that a uniform in db power distribution provides close to optimum performance. Selecting the uniform instead of the lognormal distribution will also remove the PLR floor appearing in Figure 9. In [69], a reservation scheme for CRDSA, called R-CRDSA, is proposed. The results reported are only related to the throughput and compared with the very early two replicas CRDSA scheme results reported in [61]. It is therefore difficult to compare the scheme with the more CRDSA optimized versions operating at a practical PLR value. In [70], the authors propose a slotted frameless evolution of CRDSA dubbed sliding window-based CRDSA (SW-CRDSA). In SW-CRDSA, as soon as a user has a packet available for transmission, the first instance is sent in the next available slot, while the other N rep 1 copies for the same packet are placed in the next N sw 1 slots with equally distributed probability. N sw 1 represents the number of successive slots in which a certain user can place its packet instances and corresponds to the number of CRDSA frame slots. The SW-CRDSA is claimed to have a higher throughput and a lower latency than CRDSA at the expense of increased central detector memory requirements. Unfortunately, the results

16 R. DE GAUDENZI ET AL. 81 Figure 9. Analytical versus simulation CRDSA performance from [48] for N rep D 3, N iter max D 15, N slots=1000, QPSK modulation, 3GPP FEC r D 1=3, packet block size 100 bits, E s =N 0 D 10 db in the presence of lognormal packets power imbalance with mean D 0 db, standard deviation, and Poisson traffic. [Colour figure can be viewed at wileyonlinelibrary.com] reported in [70] are based on a simple collision-based physical layer model (no FEC is modeled) and only throughput (no PLR) performance are reported. A recent interesting enhancement of the CRDSA detector, dubbed multi-replica decoding using correlation-based localization (MARSALA), has been recently proposed in [71]. MARSALA proposes a new decoding technique for CRDSA based on replicas localization exploiting packet autocorrelation. In particular, MARSALA takes advantage of correlation procedures to locate replicas of packets even when all of them are undergoing a collision and their replica pointers are not decodable. Furthermore, samples of slots containing the same packets are combined, enhancing the SNIR and enhancing packet decoding probability. The transmitter side in MARSALA is the same as in CRDSA, modifications

17 82 R. DE GAUDENZI ET AL. made only regard the receiver side. In particular, the modulator side of MARSALA can be exactly the same as the one described for CRDSA in the DVB-RCS2 standard [104]. The results reported in [72] show an appreciable CRDSA throughput performance increase when using MARSALA-enhanced detection scheme. At PLR =10 3 for CRDSA, three replicas with r D 1=3 FEC and E s =N 0 D 7 db, the MARSALA may provide a 40% throughput improvement compared with the conventional CRDSA detector. The channel estimation algorithm analyzed in [72] shows a degradation of about 10% in throughput compared with ideal MARSALA channel estimation. However, the MARSALA processing results reported so far assumes that the carrier phase remains constant over the packet duration, which may not be the case due to phase noise in practical systems Multi-frequency CRDSA A major drawback related to the exploitation of TDMA for RA is the high-peak transmit power requirement resulting from the fact that each terminal is transmitting during a small fraction (1=N slots )ofthe TDMA frame duration. Reducing the number of frame, slots N slots will have a negative impact on the RA performance in particular if N slots <60[73]. Because the PLR of a system is directly related to the ratio between the symbol energy and the noise floor level (i.e., the E s =N 0 ), TDMA needs a (peak) power transmission N slots times higher than FDMA or CDMA. In thin route satellite communications networks, MF-TDMA was introduced to mitigate this problem (Section of [74]). The multi-frequency concept can be easily applied to CRDSA leading to MF-CRDSA RA [68, 75]. In this scheme, the packets are randomly located in a two-dimensional space composed by NT MF time slots and NF MF frequency sub-bands [68]. To minimize the MF-CRDSA peak power requirement, one should minimize the number of available time slots in a frame, while avoiding the need to transmit the packet replicas at the same time slot. In [68], it was found that for optimum MF-CRDSA performance, NT MF D N rep and N slots D NF MF NT MF. MF-TDMA allows to reduce the required terminal peak transmit power by a factor N slots =NT MF, which is typically 1. It is remarked that MF-CRDSA is affected by a slight increase of the loop probability. This is because by imposing the transmission of the packet, replicas in different time slots result in fewer possible choices of slot combinations compared with standard CRDSA. Simulation results reported in [68] indicate that MF-CRDSA MAC performance is just slightly worse than CRDSA, but with a huge reduction in the terminal peak power requirement Spread spectrum and multi-frequency spread spectrum CRDSA We have seen in Section 3.1 that CRDSA PLR performance with two replicas is largely degraded by the occurrence of loops. In the following, we see how this effect can be mitigated in a slotted system without increasing the number of replicas. Section 5 will illustrate solutions based on unslotted RA. Spread-spectrum CRDSA (SS-CRDSA) [68] represents an evolution of the standard CRDSA that adopts a light direct-sequence spreading on top of the CRDSA physical layer packets. The short spreading sequence to be used by each terminal is randomly selected from a codebook family known to the gateway. The minimum number of different spreading sequences required depends on the amount of loop probability reduction required. SS-CRDSA reduces the number of irresolvable loops thanks to the cross-correlation properties of the spreading sequence that reduce the colliding packets crosstalk. SS-CRDSA entails some complexity increase in the packet demodulator because more preambles have to be searched. The minimum number of different spreading sequences required depends on the amount of loop probability reduction required. In [68], it is shown that combining MF- with the SS- variants results in MF-SS-CRDSA, the simulation results of which for two replicas lead to MAC performance slightly better than CRDSA with three replicas. This is combined with a huge reduction in the transmitter peak power requirement Irregular repetition slotted ALOHA The key idea behind irregular repetition slotted ALOHA (IRSA) [76] is to have a nonconstant, yet random, number of packet replicas transmitted in the frame. To derive the optimized irregular packet

18 R. DE GAUDENZI ET AL. 83 repetition scheme probabilities, the author exploits the bipartite graphs techniques typically used for the design of FEC low density parity check (LDPC) codes. When IRSA is used, each burst is transmitted l times within the MAC frame, where the repetition rate l varies from burst to burst according to a given mass probability distribution. CRDSA can be seen as a special case of IRSA, where the repetition rate is fixed (e.g. l D 2 or l D 3). Fixing the IRSA maximum number of burst repetitions l max, the graph-based methodology described in [76] allows to derive the mass probability distribution p l for the probability to have l repetitions in each frame with 1 6 l 6 l max. The paper also derives the asymptotic IRSA PLR versus MAC load performance. Simulation results reported [76] refer to balanced packet power with constant traffic (no Poisson) and simplified collision-based physical layer model. The IRSA RA scheme shows some advantages compared with two replicas CRDSA in terms of a higher peak throughput. However, for PLR <10 3, the IRSA throughput is lower or comparable with CRDSA with three replicas. It is noted that the IRSA randomized and variable number of packet replicas in each frame makes the scheme implementation and the associated signaling mechanism more complex than CRDSA. This is because the random location generation represents a problem as the terminal aims to transmit multiple unique payloads in the same CRDSA/IRSA frame. The complexity is due to the necessity that the replicas of these multiple unique payloads must be randomly located in non-overlapping timeslots. The number of trialand-errors attempts required increases with IRSA compared with CRDSA because it may randomly use a higher number of replicas per unique payload. With IRSA, a 4-bit field is typically needed in each replica packet to indicate the total number of replicas that correspond to the unique payload. This is not required with CRDSA, because the number of replicas can be fixed at the time of channel setup. A comparison between IRSA and CRDSA TCP performance in a satellite study case has been reported in [77]. It is concluded that there is no appreciable difference between the two techniques when incoming packets power is balanced. Stefanović, Momoda, and Popovski [78] extended the original IRSA graph-based model to cope with the packet capture effect. However, the model assumes that a packet is captured in a slot if the corresponding SNIR is above a given fixed threshold. This approach was found to be inaccurate for predicting the PLR performance of the RA scheme. For this reason in [48], a more accurate physical layer modeling was introduced. To make a more realistic and fair comparison of CRDSA with IRSA with the real FEC and Poisson traffic, simulations have been performed in [68], and results are reported in Figure 10. We can see that, even more realistic IRSA simulations with optimized IRSA FEC code rate 1/3 as CRDSA show no advantages compared with the simpler and more energy efficient CRDSA with three replicas. Reducing the E s =N 0 from 10.2 db down to 1.2 db, IRSA throughput performance at PLR=10 3 gets almost identical to CRDSA. Appendix B of [76] also provides an approach for improving the channel estimation during the cancelation step, which is very similar to the one independently proposed in [63] Multi-slots coded ALOHA In multi-slots coded ALOHA (MuSCA) [79], differently from CRDSA, the different N p slots randomly assigned in a given frame to a specific terminal packet do not contain the same payload information. Instead, the coded packet symbols embedding FEC redundancy are partitioned in subpackets spread across two or more slots randomly located in the frame slots. This means that, instead of using repetition coding as in CRDSA, in MuSCA, it is possible to exploit lower coding rate FEC for the same MAC redundancy. This approach has the potential to enhance the collision resolution capability of the protocol provided that channel estimation quality at low SNIR ratios is good. Similarly to CRDSA, each sub-packet contains some signaling information indicating the location of the other packet slots in the frame. In the MuSCA scheme, the coded symbols are partitioned in N p distinct sub-packets, each assigned to a different frame slot. Thus, the sub-packets can not be decoded at slot level as it was the case for CRDSA. Consequently, the sub-packet location signaling information needs to be independently coded from the payload. For this purpose, [79] suggests the introduction of a Reed Muller block code. This represents a drawback compared with CRDSA because the associated signaling overhead is higher, particularly for small-size packets. Simulation results reported in [79] show that MuSCA outperforms CRDSA when disregarding the signaling overhead. More specifically, it is shown that for PLR =10 3, MuSCA with two replicas and r D 1=6 FEC can achieve

19 84 R. DE GAUDENZI ET AL. Figure 10. Simulated IRSA performance from [68] with 3.x/ D 0:5x 2 C0:28x 3 C0:22x 8, 4.x/ D 0:25x 2 C 0:6x 3 C 0:15x 8 from [76] and CRDSA performance for N rep D 3, Nmax iter D 15, N slots=1000, QPSK modulation, real 3GPP FEC r D 1=3, packet block size 100 bits, E s =N 0 D 10:2 db in the presence of no packets power imbalance, and Poisson traffic. [Colour figure can be viewed at wileyonlinelibrary.com] 100% throughput increase compared with CRDSA with three replicas and r D 1=2 FEC. For the more optimized r D 1=3 CRDSA configuration, the gain is close to 60% (again without accounting for the extra signaling overhead) Coded slotted ALOHA The coded slotted ALOHA (CSA) protocol, [80] represents a generalization of the IRSA and MuSCA RA schemes. User packets are encoded prior to transmission in the MAC frame, instead of being simply repeated as in IRSA. It follows that CSA is more power efficient than IRSA but less than MuSCA, which puts all the extra FEC redundancy at physical layer level. In CSA, prior to the transmission, the packet of an active user is divided into k information (or data) segments, all of the same length in bits. The k segments are then encoded by the user via

20 R. DE GAUDENZI ET AL. 85 a packet-oriented linear block code. Different redundancy levels are possible and can be selected in a finite code-book family C. In CSA, the level of block code protection for each segment (instead of the number of repetitions such as in IRSA) C h is then randomly picked-up (in alternative of being fixed as in MuSCA) according to a probability mass function, which is the same for all users. Encoded segments are further encoded through a physical layer code before being transmitted over the multiple access channel (frame slices). In CSA, the physical layer protection is applied at individual (packet) slice level instead of at the packet level. On the receiver side, decoding is performed as follows: segments that are received in clean slices (i.e., segments not experiencing collisions) are first decoded at physical layer. Then information about the relevant user, that is, the code C h 2 C adopted by the user, and the positions of the other segments in the MAC frame are extracted. For each active user, the receiver becomes aware of, maximum-aposteriori (MAP) erasure decoding of the code C h is performed in order to recover as many encoded segments as possible for the user. Recovered segments may now be exploited in order to subtract their contribution of interference in those slices where collisions occurred. This procedure is iterated until the maximum number of iterations is reached. Simulated throughput results for optimized CSA reported in [80] appears slightly superior to IRSA for coding rates greater than 1/2. Unfortunately, no PLR results are reported; thus, a fair comparison with other RA schemes is not possible. Ivanov et al. [81] present a framework for the analysis of the error floor of CSA for finite frame lengths over the packet erasure channel. From the implementation point of view, CSA is a more complex RA scheme due to its associated signaling mechanism Frameless ALOHA protocols The authors in [82, 83] have been investigating the potential of applying rateless codes [84] to the SA framework (FSA). In FSA, the random access is based on common network time slots, but frame length is not a priori set and becomes time variant. New slots are added until a sufficiently high fraction of users has been resolved. This implies that the time instant at which feedback arrives also adapts to the contention process. More specifically, a downlink base station beacon marks the start of the contention round. The second beacon target is to ensure that the starting instants of the slots become aligned across. Finally, the beacon broadcast the numbering sequence of the slots to the users. In each slot, every user attempts transmission with a predefined probability, denoted as slot access probability. This parameter is received via the beacon at the start of the round and is the same for all users in the given slot. In general, the access probability is a function of the slot number. The round is terminated when the fraction of resolved users reaches a predefined threshold, which is signaled by the next beacon that acknowledges resolved users and initializes the next round. The results reported in [82] show that the FSA schemes provides a higher peak throughput compared with recent literature with relatively modest complexity. However, no comparative throughput results at typical PLR values with realistic physical layer modeling have been reported. In [85], the impact of capture effect in Rayleigh fading scenario for FSA are reported. Through asymptotic analytical and (simplified) simulation results, it is shown that the capture effect can be very beneficial in terms of achieved throughput. The class of FSA protocols are based on feedback sent by the receiver thus not considered suitable for a satellite environment characterized by long propagation delays Physical layer network coding RA Goseling, Gastpar, and Weber [86] present an approach to random access that is based on physicallayer network coding [87, 88]. The gist of this strategy is that whenever packets collide, the receiver decodes a linear combination of these packets. The throughput that is achieved by this approach is significantly better than that of other approaches.

21 86 R. DE GAUDENZI ET AL. In [89], network-coded diversity protocol (NCDP) has been devised. The key idea of NCDP is to apply PNC on top of the CRDSA packet repetition(s) at random locations within the frame composed by S slots. NCDP exploits extended Galois fields PNC for recovering collisions in symbol synchronous S-ALOHA systems. As for CRDSA, several replicas of the same packet are transmitted in the same frame. Once the channel has been estimated, the gateway demodulator applies PNC decoding to calculate the bit-wise XOR of the transmitted messages. After the PNC is applied to decode the collided bursts, the receiver uses common matrix manipulation techniques over finite fields to recover the original messages. See Ref. [89] for more details on the NCDP demodulator operations. To operate with high level of MAC load, the NCDP scheme requires the use of orthogonal preambles. This implies a more complex gateway demodulator preamble acquisition unit compared with CRDSA single preamble approach. In [89], it was found that the NCDP scheme performs best with BPSK modulation and its performance is negatively impacted by packet power unbalance. With perfectly power balanced packets, the NCDP performance is found to be inferior to CRDSA with three replicas. 4. ADVANCED UNSLOTTED RA SPREAD-SPECTRUM TECHNIQUES In this section, we review recently proposed RA schemes suitable for satellite applications that are sharing the following features: unslotted access, open loop RA, and collision resolution through interference cancelation using spreading techniques Enhanced spread spectrum ALOHA Enhanced spread spectrum ALOHA (E-SSA) design [54] is the same as SSA on the transmitter side (Section 2.2). The E-SSA novelty lies on the packet detector design exploiting iterative SIC (isic) approach customized to the asynchronous RA DS-SS scheme [90]. The detector located at the hub is the heart of the system, as it has to provide reliable detection of the incoming packets even under heavy MAC channel load conditions and with arbitrary packets power distribution. In Section 2.2, it is shown how the conventional SSA demodulator is very sensitive to packets power imbalance. Thanks to a more suitable gateway digital signal processing, compared with conventional SSA, E-SSA provides remarkable enhancements in terms of robustness and absolute throughput. The principle of the E-SSA detector is illustrated in Figure 11. The received signal at the gateway is band-pass filtered, sampled, digitally down-converted to baseband with I-Q components stored in a Figure 11. Enhanced spread spectrum ALOHA algorithm description from [54]. [Colour figure can be viewed at wileyonlinelibrary.com]

22 R. DE GAUDENZI ET AL. 87 digital memory of 2W Ns c real samples, where N s c corresponds to the number of chips per physical layer channel symbol and W corresponds to the memory window size in symbols for the isic process at the hub. The window size W shall be optimized to be the smallest possible value providing good detector performance. Typically, W should be three times the physical layer packet length in symbols. The receiver window memory is shifted in time in discrete steps allowing some overlap of packets on each window step (sliding window process). To reduce the detector complexity, the window step W, in symbols, shall be the largest possible compatible with a negligible performance loss. Normally, the window step W shall be between one-third to one-half of the window length W. At each window step, the following isic process takes place: 1. Store in the detector memory the new baseband signal samples corresponding to the current window step (n). 2. Perform packets preamble detection and select the packet with highest SNIR value. 3. Perform data-aided channel estimation for the selected packet over the preamble. 4. Perform FEC decoding of the selected packet. 5. If the decoded FEC frame is considered correct after CRC check, then (a) Perform enhanced data-aided channel estimation over the whole recovered packet (carrier frequency, phase, amplitude, and timing) [63]. (b) Reconstruct at baseband the detected packet for following cancelation step. (c) Perform interference cancelation. 6. Repeat from step 2 until the maximum number of SIC iterations are performed. When the limit is reached, advance the observation window by W. Two important steps for an optimal E-SSA detection performance are the packet preamble detection (step 2) and the IC process (step 5-c). The hub demodulator starts searching for the presence of packet preambles by means of a conventional preamble correlator. Because of the incoming packets carrier frequency uncertainty (due to the oscillator instabilities), preamble parallel search in the frequency domain is typically required. The preamble miss detection and false alarm probability needs to be lower than the target PLR (e.g., 10 3 ) (Section IV.E in [54]). In practice, in [91], it has been shown that E-SSA can operate with a single spreading sequence common to all terminals thus greatly simplifying the gateway demodulator implementation. The E-SSA performance has been investigated in-depth both by analysis and simulation in Section IV-D from [54]. The analytical framework reported in this reference precisely models the performance of spread-spectrum RA techniques, such as SSA and E-SSA, and assumes arbitrary power and traffic distributions, and accurately models the FEC and RA IC behavior (Section IV-A from [54]). Figure 12 reports some key conclusions about E- SSA performance compared with the SSA ones previously reported in Figure 5. First of all, assuming a target PLR of 10 3 and no power imbalance, the E-SSA throughput is 1.12 bits/chip, that is, 2.4 times higher than conventional SSA. When lognormal distributed packet power is assumed (with standard deviation D 3 db), then the E-SSA throughput exceeds 1.9 bits/chip, that is, more than 110 times larger than SSA. This striking result is due to the isic superior performance compared with conventional SSA burst demodulator in case of imbalanced power. Initial E-SSA performance results reported in [54] assumed a lognormal incoming packet power distribution because this represented a close approximation for the case of a mobile satellite interactive system exploiting the open loop packet power control algorithm described in the same reference. Similarly to CRDSA, also E-SSA is affected by a PLR floor in the presence of large lognormal packet power standard deviations. As explained in Section 3.1, the PLR floor appearing in Figure 12 for D 3 db is simply due to the probability that a packet E s =N 0 is below the FEC decoding threshold given to the lognormal power distribution and has nothing to do with the E-SSA isic process. More recently, some in-depth investigation on the optimum packets power distribution for the E-SSA detector was reported in [92]. The analysis and simulation findings show that for E-SSA, a uniform in db incoming hub demodulator packets power distribution is very close to the optimum and avoids the appearance of PLR floor effects as in the lognormal case. In the same reference, semi-analytical formulation is provided

23 88 R. DE GAUDENZI ET AL. Figure 12. Simulated versus analytical SSA and E-SSA throughput and PLR performance with and without power unbalance from [54], 3GPP FEC r D 1=3 with block size 100 bits, BPSK modulation, spreading factor 256, E s =N 0 D 6 db. [Colour figure can be viewed at wileyonlinelibrary.com] for computing the optimum minimum packet E s =N 0 as a function of the key RA system parameters and the amount of residual power after interference cancelation in the isic demodulator. The open loop power control algorithm described in the paper is able to achieve the quasi optimum power distribution in a multi-beam satellite network. More recently, a theoretical analysis to calculate the capacity optimizing user SNIR profile for a SSA RA system adopting SIC and FEC has been reported in [93] Minimum mean square error plus E-SSA Gallinaro, Alagha, De Gaudenzi, Kansanen, Muller and Rossi [94] describes an extension of the E-SSA detector dubbed minimum mean square plus enhanced spread spectrum ALOHA (ME- SSA), which further improves the spectral efficiency in particular when the packets power

24 R. DE GAUDENZI ET AL. 89 Figure 13. ME-SSA MMSE multistage detector functional block diagram from [94]. [Colour figure can be viewed at wileyonlinelibrary.com] imbalance is modest. The main changes introduced by ME-SSA are (a) the use of QPSK modulation before spreading instead of BPSK used in E-SSA, (b) the introduction of a multi-stage approximation of the minimum mean square error (MMSE) filter at the gateway demodulator before the isic. As discussed in [94], incorporating the MMSE detector in an E-SSA-like scheme is not straightforward. E-SSA is in fact a totally asynchronous system with short time packets being randomly transmitted in time. Thus, active transmitters are continuously changing, making the co-channel interference non-stationary. This fact, jointly with the use of long spreading code sequences and relatively short packets, makes infeasible the use of a conventional adaptive MMSE detector. Because the implementation of MMSE through a direct matrix inversion is too cumbersome, the adopted solution is the use of a multistage detector approximating the MMSE one following the approach described in [95 98]. The multi-stage approximation of the MMSE optimum detector allows to make the detector complexity linear with the number of users. As shown in Figure 13, the MMSE detector is now approximated by S linear stages with each stage performing despreading (with a single user matched filter detector) and then re-spreading of the input signal. The weighting factors required for combining the S detector stages can be computed off-line following [97], [98]. The adoption of QPSK instead of BPSK modulation before spreading is justified by the need to exploit the maximum number of signal dimensions available to maximize the MMSE performance [99]. Simulation results reported in [94] for SF D 16 (Figure 14) show that in case of balanced packets power ME-SSA gains about 50% over E-SSA. In case of uniformly distributed in db power imbalance, the throughput gain can go up to 80%. These gains are obtained at the cost of some affordable gateway complexity increase. 5. ADVANCED UNSLOTTED NON SPREAD-SPECTRUM TECHNIQUES In this section, we review recently proposed RA schemes suitable for satellite applications that are sharing the following features: unslotted access, open loop RA, and collision resolution through interference cancelation without using spreading techniques Contention resolution ALOHA Contention resolution ALOHA (CRA) [100] represents a first step in evolving CRDSA towards an unslotted RA scheme. Differently from CRDSA, the burst transmissions happen at random times within the frame; thus, there is no longer a notion of time slots within the frame as for the RA schemes investigated in Section 3. Similarly to IRSA, the number of packet replicas can be randomized up to a given maximum number of replicas Nrep max. The CRA main advantages reside in the reduction of the loop probability and the flexible physical layer packet size. The loop probability is reduced in CRA because of the asynchronous packet transmission within the frame. The abolition of the slots within the frame also gives much more freedom in selecting the most appropriate physical layer packet size matching the information packet nature. The main drawbacks of the protocol are the fact that time

25 90 R. DE GAUDENZI ET AL. Figure 14. ME-SSA and E-SSA performance comparison from [94]: packet length 1200 bits, code rate 1/3, and preamble length 1536 chips. ME-SSA uses QPSK modulation. E-SSA uses BPSK modulation. [Colour figure can be viewed at wileyonlinelibrary.com] synchronization at network level is still required and the higher signaling overhead necessary for identifying the replicas with non-integer offset and variable packet size. Simulation results reported in [100] show a steeper PLR curve with respect to CRDSA with two replicas due to the reduced loop probability. CRA performance are comparable with the ones of CRDSA with three replicas Enhanced contention resolution ALOHA Enhanced contention resolution ALOHA (ECRA) [101] represents an extension of the CRA concept improving further the loop phenomenon resolution. Initial detection steps are the same as CRA. For each remaining user in the frame, the packet replica(s) chunks without interference are taken and used for creating a new combined packet for the considered user. If some portions of the user packets encounter interference in all the replicas, the replica symbols with the lowest interference level are taken and exploited for creating the combined packet. Similarly to MuSCA, ECRA requires a very robust FEC applied to the headers to allow retrieving the information about replica locations although the packet itself is not decodable because of collisions. The corresponding overhead increase has not been considered in [101]. Some other technical aspects not reported are (a) the way to identify the packet chunks with the highest SNIR and (b) the channel estimation techniques and required accuracy for combining complementary packet chunks.

26 R. DE GAUDENZI ET AL Asynchronous contention resolution diversity ALOHA The asynchronous contention resolution diversity ALOHA (ACRDA) protocol has been proposed and analyzed in detail in [102]. Unlike S-ALOHA, DSA, CRDSA, or CRA, ACRDA completely eliminates the need to maintain slot (S-ALOHA, DSA, and CRDSA) or frame (CRA) synchronization among all transmitters. Differently to SSA and E-SSA, ACRDA does not require the use of spread spectrum techniques. As previously discussed, the need for transmitter synchronization is a major drawback for very large networks (e.g. M2M), as the signaling overhead scales up with the number of transmitters independently from their traffic activity factor. In ACRDA, Earth stations behave like in CRDSA, exploiting packet replicas and the associated location signaling but do not need to maintain slot synchronization with the hub. The term virtual frame (VF) is introduced here to refer to the concept of frame which is only locally valid to each transmitter. In ACRDA, for all transmitters, each VF is composed of a number of slots N slots,and each slot has a duration T slot with an overall frame duration T frame D N slots T slot. Figure 15 shows an example of the virtual frame compositions for the ACRDA scheme. The different transmitters are not time synchronized, and hence, the time offset between VF(i), VF(i 1), VF(i C 1) is arbitrary. In case of mobile applications, the Doppler effect may have an appreciable impact in terms of incoming packets clock frequency offset. In this situation, the VFs will have slightly different duration. However, the localization process of the replica packets within each VF will remain accurate, as the hub burst demodulator will extract for each VF its own clock reference. Because the demodulator has no knowledge of the start of VFs, the signaling of the replicas location within the VF has to be relative to each packet position and not absolute to the start of the VF. Two options exist for the ACRDA modulator, which consist in transmitting all packet replicas randomized within the VF, or transmitting the first packet replica in the first slot of the VF and the remaining replicas randomized within the VF [102]. The latter option improves the end-to-end delay performance, because the first packet replica is transmitted without any added delay. At the receiver side, ACRDA combines features of CRDSA, and E-SSA. On one hand, the same E-SSA sliding window-based memory processing described in Section 4.1 is adopted to handle the packet replicas arriving asynchronously. On the other hand, for a given receiver memory position, the replica packets cancelation scheme described in Section 3 is borrowed from the CRDSA detector processing. The received signal is sampled at baseband, and complex signal samples are stored in a sliding window memory of W virtual Figure 15. Virtual frame compositions in ACRDA from [102]. [Colour figure can be viewed at wileyonlinelibrary.com]

27 92 R. DE GAUDENZI ET AL. frames (Figure 15). Typically, a value W D 3 is recommended for optimal ACRDA performance (like for E-SSA). For a given window position, the demodulator performs the same iterative processing as for CRDSA to decode the clean packets and perform IC of the replica packets. The detailed ACRDA demodulator operation is described in Section II.B in [102]. Asynchronous contention resolution diversity ALOHA provides better PLR and throughput performance than CRDSA. Figure 16 compares the performance of the ACRDA versus CRDSA and E-SSA, evaluated via mathematical analysis and computer simulations. De Gaudenzi, Del Rio Herrero, Acar, Garrido Barrabes [102] report an extension to ACRDA of the analytical framework presented Figure 16. Simulation and analytical ACRDA, CRDSA, and E-SSA performance from [102]. CRDSA and ACRDA with N rep D 2, N slots =100 (simulations), QPSK modulation, 3GPP FEC r D 1=3, packet block size 100 bits, E s =N 0 D 10 db in the presence of no packets power imbalance, and Poisson traffic. For ACRDA window size W D 3 virtual frames and a window step W D 0:15. [Colour figure can be viewed at wileyonlinelibrary.com]

28 R. DE GAUDENZI ET AL. 93 Figure 17. Analytical ACRDA performance versus for different E s =N 0 values with N rep D 2, N slots = 100 (simulations), QPSK modulation, 3GPP FEC r D 1=3, packet block size 100 bits, window size W D 3 virtual frames, and a window step W D 0:15. The results are obtained in the presence of no packets power imbalance and Poisson traffic. [Colour figure can be viewed at wileyonlinelibrary.com] in [48]. For a target PLR D 10 3 and balanced packet power, the ACRDA channel can be loaded up to 1 bits/symbol, while CRDSA not more than 0.75 bits/symbol and E-SSA up to 1.2 bits/chip. It is important to note that the PLR floor present at low loads (i.e., G<1bits/symbol) is lower for ACRDA than for CRDSA. The reason for this is that the probability of loops occurrence, described in Section 3, is significantly lower in ACRDA than in CRDSA becaus of the asynchronous nature of the access. ACRDA with N rep D 2 is capable to achieve slightly better performance than the optimum CRDSA configuration with N rep D 3 shown in Figure 9, thus reducing the demodulator complexity, The effect of loops in performance is analyzed in detail in Section III of [102] for ACRDA and in Appendix D of [48] for CRDSA.

29 94 R. DE GAUDENZI ET AL. which is proportional to the number of replicas used [68]. It shall be recalled that ACRDA also reduces Earth station complexity, as it does not require any control loop to keep time slot synchronization with the hub. Similarly to CRDSA, ACRDA performance improves under power imbalance. Figure 8 from [102] shows that ACRDA with FEC r D 1=3, N rep D 2, and power imbalance following a lognormal power distribution with standard deviation D 3 db can achieve a throughput T D 1:5 bits/symbol for a target PLR< Figure 17 shows the ACRDA analytical performance as a function of E s =N 0 following the methodology developed in [102]. There is a sizeable reduction in performance reducing E s =N 0 from 7 to 3 db. Section IV of [102] analyzes and compares the delay performance between ACRDA and CRDSA. Results show that ACRDA reduces the latency by a factor of 10 compared with CRDSA for low loads (e.g., G D 0:3 bits/symbol) and by a factor of 2 at high loads (e.g., G D 0:9 bits/symbol) Multi-frequency ACRDA The ACRDA concept can be easily extended to multi-frequency ACRDA (MF-ACRDA) following the same approach used for MF-CRDSA. MF-ACRDA allows to reduce the terminal power requirements the same way MF-CRDSA does to better compete with schemes such as E-SSA or ME-SSA. 6. SATELLITE SYSTEMS AND STANDARDS 6.1. Congestion control in RA satellite networks Congestion control mechanisms are needed in RA schemes in order to operate around the desired channel load range, for example, around the maximum throughput region or below a target PLR. Satellite networks typically operate below a target PLR, as retransmissions introduce a large delay penalty due to the long propagation delays (e.g., PLR <10 3 ). Typical techniques employed for congestion control are a p-persistent algorithm, exponential backoff or a combination of the two. These techniques are widely used in Ethernet networks [103]. In the p-persistent algorithm, the sender transmits with a probability p or defers its transmission for a random interval Œ0; T BO with a probability 1 p. In exponential backoff, a terminal checks whether a packet transmission has been successful or not (e.g., through acknowledgement from the receiver). In case of failure the sender backs-off for a random time chosen between Œ0; 2 T BO before retransmitting its packet. If the retransmission also fails, the sender backs off for a random time in the interval between Œ0; 4T BO and tries again. Each retransmission doubles the interval until the transmission is successful (i.e., increases exponentially). On a successful transmission, the backoff interval is reset to its initial value. The values of p and T BO must be chosen to balance the transmission delay and RA channel performance under heavy loads. Small values of p not only offer good behavior at high channel loads but also increase transmission delay. In satellite systems, the values for these parameters are typically broadcasted on the forward channel (from ground Earth station to all network terminals) [104] and are adapted dynamically as a function of the average channel load. Some examples of implementation of congestion control for CRDSA in satellite systems are provided in [ ] Random access-based satellite systems Differently from common belief, the adoption of RA in satellite networks for messaging service support dates back from 1980s, when the European Space Agency (ESA) developed the PRODAT messaging system applying SSA as the return link access technique and the L-band MARISAT satellite capacity [108]. It featured state-of-the-art technology such as DS-SS CDMA access (both SSA RA and DAMA) coupled with convolutional coding, interleaving, Reed-Solomon block codes, and automatic repeat request (ARQ) protocols. The very first commercial worldwide deployment of a mobile (trucks) messaging system corresponds to the Qualcomm OmniTRACS r [8] in OmniTRACS r, which is still operational, is

30 R. DE GAUDENZI ET AL. 95 providing messaging and polling capabilities for trucks through geostationary satellites operating at Ku-band. The low-rate return link access scheme is based on SSA. To minimize the power spectral density, OmniTRACS r adopts DS-SS along with frequency hopping schemes. Orbcomm is an American company [109] that since 1998 offers M2M communications solutions designed to track, monitor, and control fixed and mobile assets in markets including transportation, heavy equipment, maritime, oil and gas, utilities, and government. Orbcomm operates in the VHFband using TDMA multiple access. As of May 2016, Orbcomm has more than 1.6 million billable subscriber communicators, serving original equipment manufacturers (OEMs). Since March 2016, the second generation Orbcomm satellites are operational, providing higher throughput per satellite than the first generation ones. A more recent satellite communication system based on SSA access technology is the Viasat ArcLight One [110]. This system exploits constant envelope Gaussian minimum shift keying (GMSK) chip pulse shaping to maximize the user terminal high-power amplifier (HPA) efficiency. It also reuses the same spreading sequence among different users (like in E-SSA) [111]. Furthermore, inbound packets are transmitted in the same outbound carrier band to reduce the spectrum occupancy. The gateway cancels the outbound carrier from the incoming signals using the Viasat paired carrier multiple access technology [112]. In the last decade, Iridium Low Earth Orbiting (LEO) constellation of 64 satellites has been successfully introducing the M2M service [113]. The air interface is based on the TDMA/FDMA and supports small (up to 350 bytes) sparse packet transmission in a khz channel. The system operates in L-band in time division diplexing with a very small transceiver (31 29 mm). In the same period, Globalstar deployed the simplex data network [114, 115], for vehicle and asset tracking as well as remote data reporting having a limited size requirement. The simplex transmitter sends one-way short data messages in L-band without the need of a forward link carrier. The selected RA protocol is based on SSA along with the concept of sending multiple replicas of the same burst to increase reception probability. The Newtec Sat3Play technology [116] allows the economic provision of triple play services over Ku-band and Ka-band geostationary satellites. The return link allows a mixed S-ALOHA RA/DAMA scheme to support different types of traffic. The return link physical layer is based on coded continuous phase modulation (CPM) to reduce the outdoor unit cost and power consumption. The Sat3Play solution has been adopted by SES for their Astra Connect service exploiting Ka-band capacity [117]. The last, in chronological order, realization of an advanced RA protocol in a real system is the Eutelsat Smart-LNB [118]. The Smart-LNB concept integrates the conventional receive only technology of direct-to-home (DTH) low-noise block (LNB) downconverters [119] with a return link capability based on an adaptation of the S-band mobile interactive multimedia (S-MIM) standard [120], which achieves high spectral efficiency thanks to the E-SSA concept. The return link can be allocated either in Ka-band or in Ku-band. The pre-commercial deployment of the Smart-LNB technologies started in 2014, and commercial deployments have started in As far as newly proposed satellite M2M systems, MUSTANG [121] is a LEO constellation conceived by Airbus operating at L-band and exploiting the terrestrial M2M SigFox ultra-narrowband air interface [122]. The idea is to complement the terrestrial SigFox coverage using the same air interface and very low-cost M2M modules. The LEO satellites can also use existing GEO mobile satellites for relaying the received packets to the ground stations Satellite M2M key requirements To design an effective satellite system aiming at provisioning M2M/IoT services, it is important to bear in mind some key design drivers. First, being a business case dominated by the capital expenditures (CAPEX), it is fundamental to minimize the terminal manufacturing costs, its size, and weight, without neglecting the overall ruggedness and reliability. Then, the efficient usage of the spectrum resources (both forward and return link) along with light network synchronization protocols and resource allocation procedures are essential as well to reduce the operational costs (OPEX).

31 96 R. DE GAUDENZI ET AL. Motivated by these key system design aspects, the following requirements shall be taken into account: efficient support of bursty traffic: minimizing transmission time in favor of terminal idle state; low terminal data rates: from few hundreds to tenths of thousands bits/s; terminal energy efficiency: minimization of energy required to deliver the information packet; terminal costs: very low (e.g., target less than 50 $); mobility: support of fixed, nomadic, and mobile terminals; scalability: from thousands to several hundred thousands connected devices sharing the same bandwidth without degrading the overall system performance; minimization of satellite spectrum requirements: to minimize the OPEX; return link only capability: to operate completely asynchronously not requiring the support of a forward link; minimum overhead: to ease system scalability and maximize spectrum resource exploitation; data security and integrity: encryption techniques (at the link layer and/or at the application layer) and data verification methods; robustness: communication guaranteed in both directions regardless the channel quality; reliability: long life and trustiness to minimize the maintenance/replacement costs; and flexibility: air interface adaptable to the different operational frequencies (e.g., UHF-band, L- band, S-band, Ku-band, and Ka-band). The use of state-of-the-art RA protocols previously illustrated is a key enabler to satisfy a number of the aforementioned requirements. In particular, RA is effective in terms of supporting bursty traffic, low data rates, network scalability, return link only capability, overhead minimization, terminal energy efficiency, mobility support, reliability of data transfer, and air interface adaptability to the operational frequency band Standards with RA features Random access has been traditionally adopted in satellite communication standards for the initial network login and the transmission of short control or data packets, such as in the digital video broadcasting return channel via satellite (DVB-RCS) standard [59], or in the IP over satellite standard [60]. In the last years, a number of satellite communication standards have been developed integrating more recent RA techniques. As far as slotted RA solutions are concerned, the second generation of the DVB-RCS standard [104] has added CRDSA and IRSA techniques as an optional feature particularly advantageous for SCADA and consumer profiles. These techniques can be easily integrated in the MF-TDMA nature of this standard, and they can provide very large throughput improvement (about 1400 times as presented in Section 3-A) compared with classical S-ALOHA solutions. The technology readiness is relatively high, since a complete hardware test-bed has been developed in 2011 [123] for the laboratory validation of such techniques. The fully RA asynchronous low transmit power solution offered by E-SSA has been considered in two mobile standardization contexts. First, the inclusion of the low-latency profile in the DVBsatellite services to handhelds (DVB-SH) standard has opened up the possibility to add a return link that is complementing the DVB-SH for interactive services. Consequently, the European Telecommunications Standards Institute (ETSI) S-MIM standard [124] has adopted the E-SSA protocol for the asynchronous access to support satellite mobile messaging and low-data rate services [125]. The technology maturity of E-SSA is very high, because several joint ESA/Eutelsat activities related to the design [125] and implementation of the DVB-SH/S-MIM standards have fostered the deployment of prototypes [126] and supported extensive validation campaigns in the field [127]. The second E-SSA application in standards is in the frame of the Single European Sky ATM Research (SESAR) program, where new data-links are being developed to support 4D air traffic management (ATM). A draft proposal for the satellite data-link standard has been published by ESA in 2013 [128] and the return link communications (both data and voice services) are provided through

32 R. DE GAUDENZI ET AL. 97 the E-SSA protocol. The full standardization process started in 2015 within the European Organisation for Civil Aviation Equipment Working Group 82, dealing with new terrestrial and satellite data link technologies for ATM Example of M2M satellite system dimensioning Hereafter, we present a realistic study case in which we show how low power and low data-rate services can be efficiently served via existing satellites by implementing the E-SSA protocol. The focus is on fixed M2M applications through a geostationary satellite. In the example, the satellite terminal acts as a collector of information packets from a small network of sensors. This assumption fits perfectly the case of delivery of M2M services in areas not sufficiently covered by terrestrial communications infrastructures. Inspired by the smart-lnb solution, and to reduce both space and ground segment costs, the satellite is operating in Ku-band and C-band, whereas the M2M terminal is reachable via existing fixed satellite service (FSS) carriers (e.g., DTH technologies) in the forward link. In the return link, the M2M system is occupying about 300 khz of bandwidth for sending the sensors information. Figure 18 shows a typical example of link budget for such type of services. Only the up-link parameters have been reported, because it is the one driving the overall return link performance. The physical layer waveform has been designed to offer a data rate of 5 kbps per satellite terminal. In addition, two different hypothesis on the reverse link satellite coverage have been considered, that is, global and regional beams. This choice is typically a trade-off between satellite antenna gain, service coverage region, and space segment costs. When looking at the link budget, it is noted that the maximum terminal transmission power is very low, less than 100 mw in both cases. Nonetheless, this small transmitter power provides enough link margin for both coverage, that is, about 6 or 11 db for a global or regional beam, respectively. As discussed in Section 4, this is beneficial for the E-SSA waveform, because the larger is the range for the power randomization algorithm, the higher is the achievable RA scheme spectral efficiency. A small part of the available link margin can be used for counteracting the atmospheric fading, while the rest can be used for randomizing the transmit packet power by means of the open loop power control algorithm described in [92]. Figure 18. Example of link budget in Ku-band for low data rate M2M services using E-SSA, and assuming different reverse link satellite coverage: global versus regional beam. [Colour figure can be viewed at wileyonlinelibrary.com]

33 98 R. DE GAUDENZI ET AL. Figure 19. E-SSA offered throughput and PLR performance as a function of different power transmission ranges in the context of the M2M example. [Colour figure can be viewed at wileyonlinelibrary.com] The offered traffic and the relative PLR curves for this type of E-SSA waveform are summarized in Figure 19, as a function of two different values for the terminal transmission power randomization range. As expected, the largest packet power randomization value of 9 db, compatible with the 11 db link margin, provides the best performance. The corresponding overall system throughput is close to T D 1:8 bits/chip for the regional beam and to T D 1:4 bits/chip for the global coverage case. In practice, for the system designer, it is interesting to derive the maximum number of satellite terminals N u that could co-exist in the network with still acceptable quality of service (e.g., PLR <10 3 ) without the introduction of sophisticated congestion control mechanisms. An effective rule of thumb is N u ' T R c D T.G p/ G p ; (3) R b d a d a where T.G p / is the achievable throughput at the desired PLR value for a given G p value, R c is the E-SSA chip rate, R b represents the single M2M terminal transmitted packet data rate, and finally 0 6 d a 6 1 stands for the average activity factor of the M2M terminal. Looking at (3), we notice that as expected, by increasing the processing gain G p, that is, increasing the occupied bandwidth for given user bit rate, the number of supported users will scale up almost linearly. In our example, assuming that each satellite terminal is transmitting a burst every hour, this solution is allowing to support N u ' 311,000 devices. 7. CONCLUSIONS AND OUTLOOK The extensive review of high-performance RA techniques suitable to satellite networks contained in this paper shows that the combination of advanced signal processing at physical layer with smart MAC design can provide outstanding performance improvements well in excess of three order of magnitudes compared with the original ALOHA protocol. Thanks to the collision resolution techniques adopted, a properly designed high-performance RA scheme can achieve a steep PLR transition from 0 to 1 with no packet errors up to a critical MAC load level. This greatly simplifies the implementation of congestion control algorithms. This feature also makes it possible to have a fire and forget type of operation from the transmitter side at the advantage of the device energy efficiency. Furthermore, the adoption of RA Typically, the RA throughput has a mild, yet not negligible for SF < 64, dependence on G p.

34 R. DE GAUDENZI ET AL. 99 techniques for M2M type of networks has the advantage of simplicity and scalability. We have shown that even when operating a large quantity of terminals in asynchronous open loop fashion, state-ofthe-art RA protocols can achieve performance comparable with fixed resource assignment without the large inefficiencies typically associated with infrequent packet transmission. The review of high-performance RA schemes has shown that the best performance is not always coupled with the most complex scheme. The complexity on the transmitter side of the new satellite RA schemes is generally kept to a minimum and comparable with the traditional S-ALOHA or SSA protocols. It is very important to stress the criticality of channel estimation, which is usually neglected in the analysis of RA techniques. Contention resolution RA techniques are typically operating in a highly interfered conditions due to colliding packets and require effective detection, synchronization, and cancelation techniques to work in practice with acceptable overhead. It has been shown that SSA RA with SIC achieves the best throughput performance, thanks to the inherent collision resolution capability and the high level of traffic aggregation, which is smoothing the traffic burstiness. Also from the overhead, power, and energy efficiency point of view, SSA turns out to be superior to slotted techniques. Among non spread-spectrum unslotted techniques, MF-ACRDA can approach the E-SSA performance, but with lower spectral and energy efficient. Exploiting high aggregated throughput, high reliability RA techniques enable achieving low energy, reliable, and scalable transmission of smallsize scattered transmission of packets as required to support low-cost ubiquitous M2M applications via satellite. Several of the new satellite RA techniques have been developed and validated by means of real-time hardware testbeds or even developed at pre-commercial level, thus confirming their viability in the field, at least for satellite applications. Some of the high-performance RA techniques reviewed already entered in recent satellite telecommunication standards. Some more recent and attractive schemes such as (MF-)ACRDA, MARSALA, and ME-ESSA are yet to be demonstrated in practical implementations. Another area requiring further investigation is related to the application of the surveyed advanced RA schemes to satellites in low Earth orbit. This will require enhanced gateway demodulator processing to cope with the increased Doppler shift and Doppler rate compared with geostationary satellites. The challenge now is to exploit these kind of new collision resolution RA paradigms in the frame of terrestrial wireless networks for supporting Internet of things (IoT) M2M-type of communications. The need for reliable RA schemes supporting a large number of devices with minimum overhead and maximum spectral and energy efficiency is common between RA techniques for satellite and terrestrial applications. We hope that this survey material will help bridging the two research communities. The accumulated research on RA collision resolution techniques that we reviewed in this paper, although initially stimulated by satellite applications, can be such a technology enabler for future M2M networks. More specifically, what remains to be investigated are the advanced RA schemes performance with channel estimation techniques representative of mobile terrestrial channels. The need to minimize the cost of the M2M/IoT sensor also requires to devise robust detection techniques at the base station, which can cope with low-quality oscillators in the transmitter in terms of frequency stability and phase noise. This represents an interesting subject of further research. ABBREVIATIONS 3GPP ACRDA ATM BPSK CDMA CFDAMA-PB CPM CPODA CRDSA CRRMA Third Generation Partnership Project Asynchronous contention resolution diversity ALOHA Air traffic management Binary phase shift keying Code division multiple access Combined free demand assignment multiple access piggybacked Continuous phase modulation Contention-based demand assignment Contention resolution diversity slotted ALOHA Combined random reservation multiple access

35 100 R. DE GAUDENZI ET AL. CSMA/CA CSMA/CD CRI CRA CSA CTS DAMA DSA DS-SS DTH DVB-RCS DVB-SH ECRA EIRP ESA E-SSA ETSI FEC FDMA FSS GEO GMSK HPA IC IP IRSA SIC isic LDPC LNB M2M MARSALA MAC MACA ME-SSA MF-ACRDA MF-CRDSA MF-TDMA MMSE MTA MuSCA NCDP PLR PNC PRDAMA QPSK RA RACH RAN R-CRDSA RFID RTS S-ALOHA SCADA Carrier sense multiple access/collision avoidance Carrier sense multiple access/collision detection Collision resolution interval Contention resolution ALOHA Coded slotted ALOHA Clear to send Demand assignment multiple access Diversity slotted ALOHA Direct-sequence spread spectrum Direct-to-home Digital video broadcasting return channel via satellite Digital video broadcasting satellite services to handhelds Enhanced contention resolution ALOHA Effective isotropically radiated power European space agency Enhanced spread apectrum ALOHA European Telecommunications Standards Institute Forward error correction Frequency division multiple access Fixed Satellite Service Geostationary Gaussian minimum shift keying High-power amplifier Interference cancelation Internet protocol Irregular repetition slotted ALOHA Successive interference cancelation iterative successive interference cancelation Low-density parity check Low-noise block Machine-to-machine Multi-replica decoding using correlation-based localization Medium access control Multiple access collision avoidance Minimum mean square plus enhanced spread spectrum ALOHA Multi-frequency asynchronous contention resolution diversity ALOHA Multi-frequency contention resolution diversity slotted ALOHA Multi-frequency time division multiple access Minimum mean square error Massey s modified tree algorithm Multi-slots coded ALOHA Network-coded diversity protocol Packet loss ratio Physical network coding Predictive demand assignment multiple access Quadrature phase shift keying Random access Random access channel Random access with notification Reservation CRDSA Radio frequency identification Request to send Slotted ALOHA Supervisory control and data acquisition

36 R. DE GAUDENZI ET AL. 101 SESAR SIC SICTA S-MIM SNIR SSA SS-CRDSA STA SUMF TCP UW VF VSAT Single European sky ATM research Successive interference cancelation Successive interference cancelation tree algorithm S-band mobile interactive multimedia Signal-to-noise and interference ratio Spread spectrum ALOHA Spread spectrum contention resolution diversity slotted ALOHA Standard tree algorithm Single user matched filter Transmission control protocol Unique word Virtual frame Very small aperture terminal LIST OF SYMBOLS a Random variable representing the packet amplitude C=.N C I/ Carrier-to-noise and interference W Memory window step size in symbols d a Activity factor of M2M terminal E s =N 0 Symbol energy over noise spectral density G Normalized average channel MAC load G p Processing gain G=T Antenna gain over noise temperature l Burst repetition rate of IRSA scheme l max Maximum number of burst repetition Average number of packet arrivals over one packet duration M Modulation cardinality NF MF Number of frequency sub-bands in the MF-CDRSA frame Nmax iter Maximum number of iterations of CRDSA detector N rep Number of replicas transmitted for each packet Ns c Number of chips per physical layer channel symbol in E-SSA scheme N slots Number of slots within a TDMA frame NT MF Number of time slots in the MF-CDRSA frame N SW Number of slots within sliding window N u Maximum number of satellite terminals p A.:/ Probability density function of lognormal distribution R b Single M2M terminal transmitted packet data rate R c E-SSA chip rate r FEC code rate, The mean and standard deviation of the random variable natural logarithm SF Spreading factor T Throughput T frame Frame duration T slot Slot duration VF.i/ i-th virtual frame W Memory window size in symbols REFERENCES 1. Kim J, Lee J, Kim J, Yun J. M2M service platforms: survey, issues, and enabling technologies, IEEE Commun. Surveys Tutorials 2014; 16(1): Nokia, LTE M2M. Optimizing LTE for the Internet of Things, White Paper.

37 102 R. DE GAUDENZI ET AL. 3. Nguyen T, Suda T. Survey and evaluation of multiple access protocols in multimedia satellite networks, IEEE Proceed. of the Southeastcon 90, Vol. 2, New Orleans, LA, 1990; Maral G. VSAT Networks, John Wiley & Sons Ltd: Chichester, West Sussex, England, Rana AH, McCoskey JS, Check WA. VSAT technology, trends, and applications, Proc IEEE, Vol. 78, 1990; DOI: / Chakraborty D. VSAT communications networks an overview, IEEE Commun Mag 1988; 26(5): Maral G, Bousquet M. Satellite Communications Systems, John Wiley & Sons Ltd: Chichester, West Sussex England, Jacobs IM, Salmasi A, Gilhousen KS, Weaver LA, Lindsay A, Bernard TJ, Thomas J. A second anniversary operational review of the OmniTRACS r : the first two-way mobile Ku-band satellite communications system, Proc. of the 2 nd International Mobile Satellite Conference (IMSC), Vol : Ottawa, Canada, 1990; Wiedeman RA, Viterbi AJ. The globalstar mobile satellite system for worldwide personal communications, Proc. 3rd, Int. Mobile Sat. Conf., (IMSC), Vol. 93, Pasadena, CA, 1993; Laya A, Alonso L, Alonso-Zarate J. Is the random access channel of LTE and LTE-a suitable for M2M communications? a survey of alternatives, IEEE Commun. Surveys and Tutorials 2014; 16(1): Tobagi FA. Multiaccess protocols in packet communication systems, IEEE Transactions on Communications, Vol. COM ; 4: Retnadhas C. Satellite multiple access protocols, IEEE Commun Mag 1980; 18(5): Wolejsza CJ, Taylor D, Grossman M, Osborne WP. Multiple access protocols for data communications via VSAT networks, IEEE Commun Mag 1987; 25(7): Raychaudhuri D, Joseph K. Channel access protocols for Ku-band VSAT networks: a comparative evaluation, IEEE Commun Mag 1988; 26(5): Peyravi H. Medium access control protocol performance in satellite communications, IEEE Commun Mag 1999; 37(3): Feldman PM. An overview and comparison of demand assignment multiple access (DAMA) concepts for satellite communications networks, RAND Corporation. 17. Puente JG. A PCM-FDMA demand assignment satellite multiple access experiment, Proc. of the AIAA 2nd Communications Satellite Systems Conference, paper No : San Francisco (USA), 1968; Frenkel G. The grade of service in multiple-access satellite communications systems with demand assignments, IEEE Trans Commun October 1974; 22(10): Jacobs I, Lee LN, Viterbi A, Binder R, Bressler R, Hsu NT, Weissler R. CPODA a demand assignment protocol for Satnet, Proc. of the 5th Symposium on Data Communications (SIGCOMM 77), Snowbird, Utah, USA, September 27 29, 1977; Le-Ngoc T, Krishnamurthy SV. Performance of combined free/demand assignment multiple-access schemes in satellite communications, Wiley International Journal of Satellite Communications 1996; 14(1): Leland WE. On the self-similar nature of Ethernet traffic (Extended version), IEEE ACM Transactions on Networking 1994; 2(1): Paxson V, Floyd S. Wide area traffic: the failure of Poisson modeling, IEEE ACM Transactions on Networking 1995; 3(3): Le-Ngoc T, Jahangir IM. Performance analysis of CFDAMA-PB protocol for packet satellite communications, IEEE Trans. on Communications 1998; 46(9): del Río Herrero O, Foti G, Gallinaro G. Spread-spectrum techniques for the provision of packet access on the reverse link of next-generation broadband multimedia satellite systems, IEEE Journal on Selected Areas in Communications 2004; 22(3): Jiang Z, Li Y, Leung VCM. Predictive demand assignment multiple access protocol for broadband satellite networks supporting Internet applications, Proc. of the IEEE International Conference on Communications (ICC),Vol.5:NewYork (USA), 2002; Hasegawa M, Wu G, Mizuno M. Applications of nonlinear prediction methods to the Internet traffic, Proc. of International Symposium on Circuits and Systems, Vol. 3: Sydney (Australia), 2001; Abramson N. Multiple access in wireless digital networks, IEEE Proceedings 1994; 82(9): Tyagi RR, Aurzada F, Lee K-D, Reisslein M. Connection establishment in LTE-A networks: justification of poisson process modeling, IEEE Systems Journal; PP(99): Lee HW, Mark JW. Combined Random/reservation access for packet switched transmission over a satellite with on-board processing: part I global beam satellite, IEEE Trans Commun 1983; 31(10): Chitre DM. VSAT networks: architectures, protocols, and management, IEEE Communications Magazine 1988; 26(7): Bertsekas D, Gallager R. Data Networks, Second Edition, Prentice Hall, ISBN Keshav S. An Engineering Approach to Computer Networking, Addison-Wesley Longman Publishing Co.: Boston, MA, USA, Kleinrock L, Tobagi FA. Packet switching in radio channels: part i carrier sense multiple access modes and their throughput-delay characteristics, IEEE Trans. on Communications 1975; 23(12):

38 R. DE GAUDENZI ET AL Metcalfe RM, Boggs DR. ETHERNET: distributed packet switching for local computer networks, Communications of the ACM Magazine 1976; 19(7): Tobagi FA, Kleinrock L. Packet switching in radio channels: part II the hidden terminal problem in carrier sense multipleaccess and the busy-tone solution, IEEE Trans. on Communications 1975; 12: IEEE Std IEEE Standard for Information Technology; Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks; Specific Requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications, IEEE Std IEEE Standard for Information Technology; Telecommunications and Exchange between Systems Local and Metropolitan Area Networks; Specific Requirements Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, Karn P. MACA a new channel access method for packet radio, Proc. of the ARRL/CRRL Amateur Radio and 9th Computer Networking Conference: London and Ontario (Canada), 1990; GPP TS v Physical Layer Procedures (FDD); Release 1999, Abramson N. The ALOHA system another alternative for computer communications, Proc. of 1970 Fall Joint Conference AFIPS, Vol. 37. AFIPS Press: Montvale (NJ), 1970; Abramson N. The throughput of packet broadcasting channels, IEEE Trans. on Communications 1977; 25(1): Kleinrock L, Lam S. Packet switching in a multiaccess broadcast channel: performance evaluation, IEEE on Transactions 1975; 23(4): Choudhury GL, Rappaport SS. Diversity ALOHA a random access scheme for satellite communications, IEEE Trans. on Communications 1983; 31: Roberts LG. ALOHA packet systems with and without slots and capture, Arpanet Satellite System Note, 8, NIC Document # : Zorzi M, Rao R. Capture and retransmission control in mobile radio, IEEE Journ. on Selected Areas in Communications 1994: Zanella A, Zorzi M. Theoretical analysis of the capture probability in wireless systems with multiple packet reception capabilities, IEEE Trans. Commun. 2012; 60(4): Proakis JG. Digital Communications, 4th ed., McGraw-Hill: New York, del Río Herrero O, De Gaudenzi R. Generalized analytical framework for the performance assessment of slotted random access protocols, IEEE Trans. on Wireless Communications 2014; 13(2): Mathis M, Semke J, Mahdavi J. The macroscopic behavior of the TCP congestion avoidance algorithm, Computer Communication Review, A publication of ACM SIGCOMM 1997; 27(3): Padhye J, Firoiu V, Townsley D, Kurose J. Modelling TCP throughput: a simple model and its empirical validation, Proc. SIGCOMM Symp, Communications Architectures and Protocols, Vancouver, British Columbia, September 2 4, 1998; Mathis M, Semke J, Mahdavi J. The macroscopic behavior of the TCP congestion avoidance algorithm, Computer Communication Review, a publication of ACM SIGCOMM 1997; 27(3): Padhye J, Firoiu V, Townsley D, Kurose J. Modelling TCP throughput: a simple model and its empirical validation, in Proc. SIGCOMM Symp, Communications Architectures and Protocols, August 1998; Pateros C. Novel direct sequence spread spectrum multiple access technique, Proc. MILCOM 2000, 21st Century Military Communications Conference Proceedings, Vol. 2: Los Angeles (CA), 2000; del Río Herrero O, De Gaudenzi R. High efficiency satellite multiple access scheme for machine-to-machine communications, IEEE Trans. on Aerospace and Electronic Systems 2012; 48(4): Hayes JF. An adaptive technique for local distribution, IEEE Trans. on Communications 1978; 26(8): Capetanakis JI. Tree algorithm for packet broadcast channels, IEEE Trans. on Information Theory 1979; IT-255: Massey JL. Collision resolution algorithm and random access communications. In Multiuser Communication Systems (CISM Course and Lecture Notes), Longo G (ed.), Vol. 265 Spriger-Verlag: New York, Yu Y, Giannakis GB. High-throughput random access using successive interference cancellation in a tree algorithm, IEEE Trans. on Information Theory 2007; 53(12): ETSI EN v Digital Video Broadcasting (DVB); Interaction Channel for Satellite Distribution Systems, Telecommunication Industry Association TIA IP Over Satellite, Casini E, De Gaudenzi R, del Río Herrero O. Contention resolution diversity slotted ALOHA (CRDSA): an enhanced random access scheme for satellite access packet networks, IEEE Trans. on Wireless Communications 2007; 6(4): Verdu S. Multiuser Detection, Cambridge Univ. Press, Casini E, del Río Herrero O, De Gaudenzi R, Delaruelle DME, Choffray JP. Packet data transmission over a shared transmission channel, US Patent No. 8,094, De Gaudenzi R, Del Río Herrero O. Advances in random access protocols for satellite networks, Proc. of International Workshop on Satellite and Space Communications (IWSSC): Siena (Italy), Kissling C. On the stability of contention resolution diversity slotted ALOHA (CRDSA), In the Proc. of IEEE 2011 Global Telecommunications Conference (Globecom 2011): Houston, Texas, USA, 2011; Meloni A, Murroni M. CRDSA, CRDSA++ and IRSA: stability and performance evaluation, In the Proc. of th Advanced Satellite Multimedia Systems Conference (ASMS) and 12th Signal Processing for Space Communications Workshop (SPSC), Vol. 5-7: Baiona, Spain, 2012;

39 104 R. DE GAUDENZI ET AL. 67. Meloni A. Advanced random access techniques for satellite communications, PhD Thesis in Electronic and Computer Engineering, Dept. of Electrical and Electronic Engineering University of Cagliari, Mengali A, De Gaudenzi R, Arapoglou PD. Optimizing contention resolution diversity slotted ALOHA to support massive access protocols, submitted to IEEE Trans. on Comm Lee M, Lee J-K, Lee J-J, Lim J. R-CRDSA: reservation-contention resolution diversity slotted ALOHA for satellite networks, IEEE Commun Lett 2012; 16(10): Meloni A, Murroni M, Kissling C, Berioli M. Sliding window-based contention resolution diversity slotted ALOHA, IEEE Global Communications Conference (GLOBECOM) 2012: Anaheim, CA, USA, 2012; Buiy H-C, Zidane K, Lacan J, Boucheret ML. A Multi-replica Decoding Technique for Contention Resolution Diversity Slotted ALOHA, VTC Fall, 2015: Boston, MA, Zidane K, Lacan J, Ginestex M, Bes C, Deramecourt A, Dervin M. Performance evaluation of MARSALA with synchronisation errors in satellite communications, arxiv: v1 [cs.it] Garrido Barrabés E. ACRDA advanced random access scheme for satellite communications. Master Thesis, Universitat Ramon Llull, La Salle Barcelona European Space Agency, [Accessed on June 2012]. 74. Corazza GE. Digital Satellite Communications, Springer: Boston, DOI: / Liva G. Method for contention resolution in time hopping or frequency hopping US Patent Application No. US/2011/ A Liva G. Graph-based analysis and optimization of contention resolution diversity slotted ALOHA, IEEE Trans. on Communications 2011; 59(2): Celandroni N, Ferro E, Gotta A. RA and DA satellite access schemes: a survey and some research results and challenges, Int J Commun Syst 2014; 27(11): Stefanović Č, Momoda M, Popovski P. Exploiting capture effect in frameless ALOHA for massive wireless random access, Proc. of IEEE WCNC 2014: Istanbul, Turkey, Apr. 2014; Bui HC, Lacan J, Boucheret M-L. An enhanced multiple random access scheme for satellite communications, Proc. of the 2012 Wireless Telecommunications Symposium (WTS), London, April 2012; Paolini E, Liva G, Chiani M. High throughput random access via codes on graphs: coded slotted ALOHA, Proc. of the IEEE International Conference on Communications (ICC): Kyoto (Japan), 2011; Ivanov M., Brännström F, Graell i Amat A, Popovski P. Error floor analysis of coded slotted ALOHA over packet erasure channels, IEEE Commun Lett 2015; 19(3): Stefanović Č, Popovski P, Vukobratovic D. Frameless ALOHA protocol for wireless networks, IEEE Commun Lett 2012; 1(12): Stefanović Č, Popovski P. ALOHA random access that operates as a rateless code, IEEE Trans Commun 2013; 61(11): Luby M. LT Codes, in IEEE FOCS 02: Vancouver, Canada, Stefanović Č, Momoda M, Popovski P. Exploiting capture effect in frameless ALOHA for massive wireless random access, IEEE Wireless Communications and Networking Conference 2014 (WCNC): Istanbul, Turkey, 2014; Goseling J, Gastpar M, Weber JH. Physical-layer network coding on the random-access channel, IEEE International Symposium on Information Theory Proceedings (ISIT) 2013: Istanbul, Turkey, July 2013; Liew SC, Zhangb S, Lu L. Physical-layer network coding: tutorial, survey, and beyond, Elsevier, Physical Communication 2013; 6: Popovski P, Yomo H. Physical network coding in two-way wireless relay channels, IEEE International Conference on Communications 2007 (ICC): Glasgow, Scotland, 2007; Cocco G, Alagha N, Ibars C, Cioni S. Network-coded diversity protocol for collision recovery in slotted ALOHA networks, International Journal of Satellite Communications and Networking 2014; 32(3): del Río Herrero O, De Gaudenzi R. Methods, apparatuses and system for asynchronous spread-spectrum communications, U.S. Patent 7,990,874 B De Gaudenzi R, del Rio Herrero O, Gallinaro G. Enhanced spread ALOHA physical layer design and performance, Wiley Int. Journal of Satellite Communications and Networking 2014; 32(6): Collard F, De Gaudenzi R. On the optimum packet power distribution for spread ALOHA packet detectors with iterative successive interference cancellation, IEEE Trans. Wireless Comm. 2014; 13(12): Sala-Alvarez J, Vilares J, Rey F. SINR profile for spectral efficiency optimization SIC receivers in the many-user regime, Proc. of IEEE International Communication Conference (ICC): London, United Kingdom, 2015; Gallinaro G, Alagha N, De Gaudenzi R, Kansanen K, Müller R, Salvo Rossi P. ME-SSA: an advanced random access for the satellite return channel, Proc. of the IEEE International Communication Conference (ICC): London, UK, 2015; Moshavi S, Kanterakis EG, Schilling DL. Multistage linear receivers for DS-CDMA systems, 1996, pp Müller R, Verd u S. Design and analysis of low-complexity interference mitigation on vector channels, IEEE Journal on Selected Areas in Communications 2001; 19(8): Cottatelluci L, Debbah M, MüLler R. Asymptotic Design and Analysis of Multistage Detectors for Asynchronous CDMA Systems: Chicago, USA, Cottatellucci L, Müller R. A systematic approach to multistage detectors in multipath fading channels, IEEE Trans. on Information Theory 2005; 51(9):

40 R. DE GAUDENZI ET AL Boudreau D, Caire G, Corazza GE, De Gaudenzi R, Gallinaro G, Luglio M, Lyons R, Romero-Garcia J, Vernucci A, Widmer H. Wideband CDMA for the satellite component of UMTS/IMT-2000, IEEE Trans. on Vehicular Technology 2002; 51(2): Kissling C. Performance enhancements for asynchronous random access protocols over satellite, Proc. of International Communication Conference (ICC): Kyoto, Japan, 2011; Clazzer F, Kissling C. Enhanced contention resolution ALOHA ECRA, Proc. of the 9th International ITG Conference on Systems, Communications and Coding (SCC): Munich, Germany, January ISBN: De Gaudenzi R, del Río Herrero O, Acar G, Garrido Barrabés E. Asynchronous contention resolution diversity ALOHA: making CRDSA truly asynchronous, IEEE Trans Wirel Commun 2014; 13(11): IEEE Std IEEE Standard for Information Technology; Telecommunications and Information Exchange between Systems Local and Metropolitan Area Networks; Specific Requirements Part 3: Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and Physical Layer Specifications, ETSI EN v Digital Video Broadcasting (DVB); Second Generation DVB Interactive Satellite System (DVB-RCS2); Part 2: Lower Layers for Satellite Standard, del Río Herrero O, Casini E, De Gaudenzi R. Contention resolution diversity slotted ALOHA plus demand assignment (CRDSA-DA): an enhanced MAC protocol for satellite access packet networks, 23rd AIAA International Communications Satellite Systems Conference: Rome, Italy, Kissling C, Munari A. On the integration of random access and DAMA channels for the return link of satellite networks, IEEE International Conference on Communications (ICC): Budapest, Hungary, 2013; Meloni A, Murroni M. Random access in DVB-RCS2: design and dynamic control for congestion avoidance, IEEE Trans Broadcast 2014; 60(1): Miguel C, Fernandez A, Vidaller L, Burillo V. PRODAT: a multi-functional satellite mobile communication system, Proceedings of the Mediterranean Electrotechnical Conference (MELECON): Lisbon, Portugal, 1989; Orbcomm Viasat. A breakthrough in satellite communications: the story of the technology behind ArcLight, Online J. Space Commun Fall Issue 7: Current Developments - ArcLight Technology Miller MJ, Dankberg MD, Pateros CN. Method and apparatus for multiple access communication over a channel, US patent No. US 7,065,125 B1, Viasat. PCMA Satellite Bandwidth Optimization Iridium M2M Vaddiparty S, Monte P, Shah B. Simplex Remote Telemetry via a Satellite System, US Patent No A McDermott SA, Vaneck TW. Transmit-only data exfiltration: the sensor enabled notification system (SENS), Proceedings of SPIE Vol (SPIE, Bellingham, WA 2004); Newtec. Sat3Play IP Broadband System SES Broadband Services. Astra Connect Service ViaSatellite. Eutelsat Unveils New Direct-to-Home Antenna, /eutelsat-unveils-new-direct-to-home-antenna/ Arcidiacono A, Finocchiaro D, Collard F, Scalise S, Lazaro Blasco F, De Gaudenzi R, Cioni S, Alagha N, Andrenacci M. From S-MIM to F-SIM: making satellite interactivity affordable at Ku and Ka-band, Int. Journal of Satellite Communications and Networking 2016; 34(4): Scalise S, Parraga Niebla C, De Gaudenzi R, Del Rio Herrero O, Finocchiaro D, Arcidiacono A. S-MIM: a novel radio interface for efficient messaging services over satellite, IEEE Communications Magazine 2013; 51(3): Deslandes V. MUSTANG: the ultimate integrate system for IoT/M2M communications, In the Proc. of the 8th Advanced Satellite Multimedia Systems Conference 14th Signal Processing for Space Communications Workshop: Palmade Mallorca, Spain, 2016; Anteur M, Deslandes V, Thomas N. Ultra narrow band technique for low power wide area communications, In the Proc. of IEEE 2015 Global Communications Conference (GLOBECOM): San Diego (CA), USA, 2015; Romanato R, Rossini E, Chiassarini G, Masci A, Silvi D, Burzigotti P, Giancristofaro D. AMPIST: an advanced modem prototype for interactive satellite terminals with contention resolution diversity slotted ALOHA (CRDSA) capabilities, Proc. of 17th Ka and Broadband Communications, Navigation and Earth Observation Conference: Palermo (Italy), ETSI TS v Satellite Earth Stations and Systems; Air Interface for S-band Mobile Interactive Multimedia (S-MIM); Part 3: Physical Layer Specification, Return Link Asynchronous Access, Gallinaro G, Di Cecca F, Marchitti M, De Gaudenzi R, del Río Herrero O. Enhanced spread spectrum ALOHA system level performance assessment, Wiley International Journal of Satellite Communications and Networking, Special Issue on S-band Mobile Interactive Multimedia 2014; 32(6): Andrenacci M, Mendola G, Collard F, Finocchiaro D, Recchia A. Enhanced spread spectrum ALOHA demodulator implementation, laboratory tests and satellite validation, Int. Journal of Satellite Communications and Networking 2014: Hermenier R, Del Bianco A, Marchitti MA, Heyn T, Recchia A, Collard F, Andrenacci M, Mendola G, Vaccaro A. S-MIM field trials results, Int. Journal of Satellite Communications and Networking 2014: ANTARES Communication Standard Technical Specifications.

41 106 R. DE GAUDENZI ET AL. AUTHORS BIOGRAPHIES Riccardo de Gaudenzi was born in Italy in He received his Doctor of Engineer degree (cum laude) in Electronic Engineering from the University of Pisa, Italy, in 1985, and his PhD from the Technical University of Delft, The Netherlands, in From 1986 to 1988, he was with the European Space Agency (ESA), Stations and Communications Engineering Department, Darmstadt (Germany), where he was involved in satellite telemetry, tracking, and control (TT&C) ground systems design and testing. In 1988, he joined ESA s Research and Technology Centre (ESTEC), Noordwijk, The Netherlands, where since 2005 he is the Head of the Radio Frequency Systems, Payload and Technology Division. The division is responsible for supporting the definition and development of advanced satellite system, subsystems, and related technologies for telecommunications, navigation, and earth observation applications. He has been responsible for a large number of R&D activities for TT&C, Telecom, and Navigation applications. In 1996, he spent 1ăyear with Qualcomm Inc., San Diego, USA, in the Globalstar LEO project system group under an ESA fellowship. His current interest is mainly related with efficient digital modulation and multiple access techniques for fixed and mobile satellite services, synchronization topics, adaptive interference mitigation techniques, and communication systems simulation techniques. He actively contributed to the development and the demonstration of the ETSI S-UMTS Family A, S-MIM, DVB-S2, DVB-S2X, DVB-RCS2, and DVB-SH standards. He has published more than 140 scientific papers and own more than 20 patents. From 2001 to 2005, he has been serving as Associate Editor for CDMA and Synchronization for IEEE Transactions on Communications. He is currently Associate Editor for Journal of Communications and Networks. He is co-recipient of the 2003 and 2008 Jack Neubauer Memorial Award Best Paper from the IEEE Vehicular Technology Society. Oscar Del Rio Herrero was born in Barcelona, Spain, in He received his BE degree in Telecommunications, ME degree in Electronics, and PhD degree (cum laude) from the University Ramon Llull, Barcelona, Spain, in 1992, 1994, and 2015, respectively. He works at the European Space Agency s (ESA) Research and Technology Centre (ESTEC) in the Netherlands since In 1996 and 1997, he worked as a radio-navigation system engineer in the preparation of the Galileo programme. From 1998 to 2009, he has worked as a Telecommunications System Engineer in the Electrical Systems Department. His research interests include packet access and switching, resource management, and IP inter-working for future broadband and M2M satellite systems. Since 2010, he is working as a System Engineer in the Telecommunications Satellites Programmes Department, first for the Iris project aiming at the development of a new satellite-based Air-Ground Communication system for Air Traffic Management and currently in the Neosat project aiming at the development, qualification, and validation in orbit of next-generation satellite platforms for the core satellite communications market. Gennaro Gallinaro received his Doctoral degree in Electronic Engineering (magna cum laude) from the University of Rome in 1979 with a thesis on TV signals digital compression techniques. From 1979 to 1980, he worked at Fondazione Bordoni (Government Research Center on Advanced Telecommunications) on Teletex signal simulations. After serving in the Italian Navy, he joined Telespazio in 1981 where he was first involved in system planning studies and then in the analysis and simulation of RF transmission links, payload hardware assessment, new modulation access techniques, and analog/digital signal processing technologies. Since 1989, he has been with Space Engineering S.p.A. where he was involved in several space communications-related projects and studies. He has got in-depth experience in the analysis, computer-aided design, and simulation of transmission systems (modulation, coding, etc.) and digital signal processing hardware (on-board multi-carrier demodulators (MCDs), digital beam forming, etc.). He is co-author of several papers, on Signal Processing and satellite communication techniques and was a co-recipient of the 2003 and 2009 IEEE Vehicular Technology Society Jack Neubauer Memorial Awards and of the Best Paper Award at the joint ASMS/ESA SPSC 2012 Conference. Stefano Cioni received his Doctor of Engineering degree in Telecommunication Engineering and his PhD from the University of Bologna, Italy, in 1998 and in 2002, respectively. Since 2002, he has been a senior researcher of the Advanced Research Center for Electronic Systems (ARCES) of the University of Bologna. During the summer of 2006, he was a visiting researcher at the Agilent Labs SMRD, Belgium. During the summer of 2007, he was a visiting researcher at the German Aerospace Center (DLR), Oberpfaffenhofen (Germany). From 2008 to 2010, he has been the Head of Digital Transmission Systems in Mavigex s.r.l. (Italy). In 2010, he joined the European Space Agency (Noordwijk) where he is currently a communications systems engineer within the Radio Frequency Systems, Payload and Technology Division.

42 R. DE GAUDENZI ET AL. 107 His research activities are mainly focused on the next generation broadcast/broadband satellite systems for fixed and mobile satellite services. In particular, his interests include efficient digital coding and modulation techniques, adaptive interference mitigation algorithms in multiple access systems, synchronization techniques, MIMO and OFDM systems, and iterative decoding techniques joint to channel parameter estimation. Dr. Cioni co-authored more than 80 papers and scientific conference contributions, and he is a co-recipient of the Best Paper Award at IEEE ICT 2001 and at IEEE ASMS/SPSC Pantelis-Daniel Arapoglou received his Diploma degree in Electrical and Computer Engineering and his Doctor of Engineering degree from the National Technical University of Athens (NTUA), Athens, Greece, in 2003 and 2007, respectively. From September 2008 to October 2010, he was involved in postdoctoral research on MIMO over satellite jointly supported by the NTUA and the European Space Agency Research and Technology Centre (ESA/ESTEC), The Netherlands. From October 2010 to September 2011, he was a research associate with the Interdisciplinary Centre for Security, Reliability and Trust (SnT), University of Luxembourg. Since September 2011, he has been a communications system engineer at ESA/ESTEC, where he is technically supporting R&D activities and developments in the areas of satellite telecommunications, digital and optical communications, and high data rate telemetry for Earth observation applications. Daniel was a recipient of the Ericsson Award of Excellence in Telecommunications for his diploma thesis in 2004 and of the URSI General Assembly Young Scientist Award in As a researcher, he has participated in the work of Study Group 3 of the ITU-R in Sat- NEx III and in COST Action IC0802. Currently, he is following SatNEx IV, which is funded by ESA. He is also participating in the CCSDS Optical Working Group.

Enhanced Contention Resolution Aloha - ECRA

Enhanced Contention Resolution Aloha - ECRA Enhanced Contention Resolution Aloha - ECRA Federico Clazzer and Christian Kissling German Aerospace Centre (DLR) Oberpfaffenhofen, D-82234, Wessling, Germany Email: {federico.clazzer, christian.kissling}@dlr.de

More information

Wireless Medium Access Control Protocols

Wireless Medium Access Control Protocols Wireless Medium Access Control Protocols Telecomunicazioni Undergraduate course in Electrical Engineering University of Rome La Sapienza Rome, Italy 2007-2008 Classification of wireless MAC protocols Wireless

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

5G Integrated satellite terrestrial M2M/IoT networks

5G Integrated satellite terrestrial M2M/IoT networks 5G Integrated satellite terrestrial M2M/IoT networks 5G PPP 1 st 5G Architecture Workshop Stefano Cioni (ESA) Maria Guta (ESA) stefano.cioni@esa.int maria.guta@esa.int Key satellite M2M design drivers

More information

ECEN 5032 Data Networks Medium Access Control Sublayer

ECEN 5032 Data Networks Medium Access Control Sublayer ECEN 5032 Data Networks Medium Access Control Sublayer Peter Mathys mathys@colorado.edu University of Colorado, Boulder c 1996 2005, P. Mathys p.1/35 Overview (Sub)networks can be divided into two categories:

More information

Chapter 12 Multiple Access 12.1

Chapter 12 Multiple Access 12.1 Chapter 12 Multiple Access 12.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. 12.2 Figure 12.1 Data link layer divided into two functionality-oriented sublayers

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Chapter 1 Basic concepts of wireless data networks (cont d)

Chapter 1 Basic concepts of wireless data networks (cont d) Chapter 1 Basic concepts of wireless data networks (cont d) Part 2: Medium access methods for mobile data networks Sept 15 2004 1 Fixed assignment access schemes in voice-oriented networks Frequency division

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

COMPUTER NETWORK Model Test Paper

COMPUTER NETWORK Model Test Paper Model Test Paper Question no. 1 is compulsory. Attempt all parts. Q1. Each question carries equal marks. (5*5 marks) A) Difference between Transmission Control Protocol (TCP) and User Datagram Protocol.

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

MAC LAYER. Murat Demirbas SUNY Buffalo

MAC LAYER. Murat Demirbas SUNY Buffalo MAC LAYER Murat Demirbas SUNY Buffalo MAC categories Fixed assignment TDMA (Time Division), CDMA (Code division), FDMA (Frequency division) Unsuitable for dynamic, bursty traffic in wireless networks Random

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?

More information

Markov Chains and Multiaccess Protocols: An. Introduction

Markov Chains and Multiaccess Protocols: An. Introduction Markov Chains and Multiaccess Protocols: An Introduction Laila Daniel and Krishnan Narayanan April 8, 2012 Outline of the talk Introduction to Markov Chain applications in Communication and Computer Science

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols Medium Access Control MAC protocols: design goals, challenges, contention-based and contention-free protocols 1 Why do we need MAC protocols? Wireless medium is shared Many nodes may need to access the

More information

Aloha and slotted aloha

Aloha and slotted aloha CSMA 2/13/06 Aloha and slotted aloha Slotted aloha: transmissions are synchronized and only start at the beginning of a time slot. Aloha sender A sender B collision sender C t Slotted Aloha collision sender

More information

The MAC layer in wireless networks

The MAC layer in wireless networks The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a time/space problem Who transmits when?

More information

Medium Access Control Sublayer Chapter 4

Medium Access Control Sublayer Chapter 4 Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Multiple Access Protocols Ethernet Wireless LANs Broadband Wireless Bluetooth RFID Data Link Layer Switching Revised: August 2011 & February

More information

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Wireless MACs: MACAW/802.11

Wireless MACs: MACAW/802.11 Wireless MACs: MACAW/802.11 Mark Handley UCL Computer Science CS 3035/GZ01 Fundamentals: Spectrum and Capacity A particular radio transmits over some range of frequencies; its bandwidth, in the physical

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

Satellite-Based Cellular Backhaul in the Era of LTE

Satellite-Based Cellular Backhaul in the Era of LTE Satellite-Based Cellular Backhaul in the Era of LTE Introduction 3 Essential Technologies for 3G/LTE Backhauling over Satellite 6 Gilat s Solution SkyEdge II-c Capricorn 7 Why Ultra-fast TDMA is the Only

More information

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA

LECTURE PLAN. Script. Introduction about MAC Types o ALOHA o CSMA o CSMA/CD o CSMA/CA Course- B.Sc. Applied Physical Science (Computer Science) Year- IIIrd, Sem- Vth Subject Computer Science Paper- XVIIth, Computer Networks Lecture -11 Lecture Title- Medium Access Layer Script Today in

More information

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University

Lecture 4: Wireless MAC Overview. Hung-Yu Wei National Taiwan University Lecture 4: Wireless MAC Overview Hung-Yu Wei National Taiwan University Medium Access Control Topology 3 Simplex and Duplex 4 FDMA TDMA CDMA DSSS FHSS Multiple Access Methods Notice: CDMA and spread spectrum

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Packet multiple access and the Aloha protocol

Packet multiple access and the Aloha protocol Packet multiple access and the Aloha protocol Massachusetts Institute of Technology Department of Aeronautics and Astronautics Slide 1 Packet Multiple Access PMA SHARED UPLINK TERMINAL TERMINAL APPL TRANS

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30 EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access

More information

Chapter 6 Medium Access Control Protocols and Local Area Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks Chapter 6 Medium Access Control Protocols and Local Area Networks Part I: Medium Access Control Part II: Local Area Networks CSE 3213, Winter 2010 Instructor: Foroohar Foroozan Chapter Overview Broadcast

More information

Mobile Communications Chapter 3 : Media Access

Mobile Communications Chapter 3 : Media Access Mobile Communications Chapter 3 : Media Access 2. Motivation 3. SDMA, FDMA, TDMA 1. Aloha and contention based schemes 4. Reservation schemes 5. Collision avoidance, MACA 6. Polling CDMA (Lecture 6) Prof.

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

Media Access Control in Ad Hoc Networks

Media Access Control in Ad Hoc Networks Media Access Control in Ad Hoc Networks The Wireless Medium is a scarce precious resource. Furthermore, the access medium is broadcast in nature. It is necessary to share this resource efficiently and

More information

CHAPTER TWO LITERATURE REVIEW

CHAPTER TWO LITERATURE REVIEW CHAPTER TWO LITERATURE REVIEW 2.1 Introduction. This chapter provides in detail about the multiple access technologies and the OCDMA system. It starts with a discussion on various existing multiple-access

More information

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802. 4.3 IEEE 802.11 Physical Layer 4.3.1 IEEE 802.11 4.3.2 IEEE 802.11b 4.3.3 IEEE 802.11a 4.3.4 IEEE 802.11g 4.3.5 IEEE 802.11n 4.3.6 IEEE 802.11ac,ad Andreas Könsgen Summer Term 2012 4.3.3 IEEE 802.11a Data

More information

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD Random Access 1. Aloha 2. Slotted Aloha 3. CSMA 4. CSMA/CD Background Communication medium B No Collision collision A C Modern Local Area Networks (LANs) operate as follows Users are connected to communication

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Data Link Layer: Collisions

Data Link Layer: Collisions Data Link Layer: Collisions 1 Multiple Access Data Link layer divided into two sublayers. The upper sublayer is responsible for datalink control, The lower sublayer is responsible for resolving access

More information

CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW)

CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW) 33 CHAPTER 3 ANTI-COLLISION PROTOCOLS IN RFID BASED HUMAN TRACKING SYSTEMS (A BRIEF OVERVIEW) In a RFID based communication system the reader activates a set of tags, and the tags respond back. As outlined

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department Multiple Access Communications EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Multiple Access Satellite systems, radio networks (WLAN), ethernet segment

More information

COMPUTER NETWORKS - Local area networks

COMPUTER NETWORKS - Local area networks Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Local area networks. Copyright

Local area networks. Copyright Local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS LANs - 1 Copyright Quest opera è protetta dalla licenza Creative Commons

More information

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic 1 Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, 6.2.2 CSE 3213, Fall 2010 Instructor: N. Vlajic Multiple Access Communications 2 Broadcast Networks aka multiple access networks multiple sending

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks

CDMA-Based MAC Protocol for Wireless Ad Hoc Networks CDMA-Based MAC Protocol for Wireless Ad Hoc Networks Alaa Muqattash and Marwan Krunz Presented by: Habibullah Pagarkar for 600.647-Advanced Topics in Wireless Networks. JHU. Spring 04 Today s Presentation

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

Local Area Networks NETW 901

Local Area Networks NETW 901 Local Area Networks NETW 901 Lecture 4 Wireless LAN Course Instructor: Dr.-Ing. Maggie Mashaly maggie.ezzat@guc.edu.eg C3.220 1 Contents What is a Wireless LAN? Applications and Requirements Transmission

More information

ICE 1332/0715 Mobile Computing (Summer, 2008)

ICE 1332/0715 Mobile Computing (Summer, 2008) ICE 1332/0715 Mobile Computing (Summer, 2008) Medium Access Control Prof. Chansu Yu http://academic.csuohio.edu/yuc/ Simplified Reference Model Application layer Transport layer Network layer Data link

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I) ECE453 Introduction to Computer Networks Lecture 7 Multiple Access Control (I) 1 Broadcast vs. PPP Broadcast channel = multiaccess channel = random access channel Broadcast LAN Satellite network PPP WAN

More information

Wireless Networking & Mobile Computing

Wireless Networking & Mobile Computing Wireless Networking & Mobile Computing CS 752/852 - Spring 2012 Lec #4: Medium Access Control - II Tamer Nadeem Dept. of Computer Science IEEE 802.11 Standards Page 2 Spring 2012 CS 752/852 - Wireless

More information

Data Link Layer: Multi Access Protocols

Data Link Layer: Multi Access Protocols Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top

More information

/$10.00 (c) 1998 IEEE

/$10.00 (c) 1998 IEEE Dual Busy Tone Multiple Access (DBTMA) - Performance Results Zygmunt J. Haas and Jing Deng School of Electrical Engineering Frank Rhodes Hall Cornell University Ithaca, NY 85 E-mail: haas, jing@ee.cornell.edu

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr.

Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP CN&DC Dr. Chapter 4 (Week 7) The Medium Access Control Sublayer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP. 247-292 1 4.1. THE CHANNEL ALLOCATION PROBLEM 4.2. MULTIPLE ACCESS PROTOCOLS 4.3. ETHERNET

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Performance of UMTS Radio Link Control

Performance of UMTS Radio Link Control Performance of UMTS Radio Link Control Qinqing Zhang, Hsuan-Jung Su Bell Laboratories, Lucent Technologies Holmdel, NJ 77 Abstract- The Radio Link Control (RLC) protocol in Universal Mobile Telecommunication

More information

Multiple Access. Data Communications and Networking

Multiple Access. Data Communications and Networking Multiple Access In the previous part we discussed data link control, a mechanism which provides a link with reliable communication. In the protocols we described, we assumed that there is an available

More information

CSMA based Medium Access Control for Wireless Sensor Network

CSMA based Medium Access Control for Wireless Sensor Network CSMA based Medium Access Control for Wireless Sensor Network H. Hoang, Halmstad University Abstract Wireless sensor networks bring many challenges on implementation of Medium Access Control protocols because

More information

Mobile and Sensor Systems

Mobile and Sensor Systems Mobile and Sensor Systems Lecture 2: Mobile Medium Access Control Protocols and Wireless Systems Dr Cecilia Mascolo In this lecture We will describe medium access control protocols and wireless systems

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

COMMUNICATION NETWORKS NETW 501

COMMUNICATION NETWORKS NETW 501 COMMUNICATION NETWORKS NETW 501 TUTORIAL 6 Presented by: Eng. Hana Hesham Eng. Mohamed Atef Data Link Layer Data Link Layer is split into 2 sublayers which are the Logical Link Control (LLC) and the Medium

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop

Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Performance Evaluation and Design Improvement of Media Access Control Protocols for Broadband Wireless Local Loop Mihir Thaker Masters Thesis Presentation Department of Electrical Engineering and Computer

More information

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD.

Announcements / Wireless Networks and Applications Lecture 9: Wireless LANs Wireless. Regular Ethernet CSMA/CD. Announcements 18-452/18-750 Wireless Networks and Applications Lecture 9: Wireless LANs 802.11 Wireless Peter Steenkiste Homework 1 should be out by tomorrow Project 1 by Friday Schedule:» Thursday lecture

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind

More information

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA

Introduction to CDMA ALOHA. 3. Access Control Techniques for CDMA ALOHA Introduction to CDMA ALOHA 3. Access Control Techniques for CDMA ALOHA Takaya Yamazato Center for Information Media Studies, Nagoya University Nagoya 464-01, Japan yamazato@nuee.nagoya-u.ac.jp CDMA ALOHA

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Overview of Adaptive TDMA in idx 3.2. May 2015

Overview of Adaptive TDMA in idx 3.2. May 2015 Overview of Adaptive TDMA in idx 3.2 May 2015 INTRODUCTION The idirect Adaptive Time Division Multiple Access (TDMA) delivers higher spectral efficiency and greater network versatility by optimally changing

More information

Link Layer: Retransmissions

Link Layer: Retransmissions Link Layer: Retransmissions Context on Reliability Where in the stack should we place reliability functions? Application Transport Network Link Physical CSE 461 University of Washington 2 Context on Reliability

More information

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com

INTRODUCTION DATA COMMUNICATION TELECOMMUNICATIONS SYSTEM COMPONENTS 1/28/2015. Satish Chandra satish0402.weebly.com INTRODUCTION DATA COMMUNICATION Satish Chandra satish0402.weebly.com The term telecommunication means communication at a distance. The word data refers to information presented in whatever form is agreed

More information

COMP/ELEC 429/556 Introduction to Computer Networks

COMP/ELEC 429/556 Introduction to Computer Networks COMP/ELEC 429/556 Introduction to Computer Networks Broadcast network access control Some slides used with permissions from Edward W. Knightly, T. S. Eugene Ng, Ion Stoica, Hui Zhang T. S. Eugene Ng eugeneng

More information

Wireless & Mobile Networking

Wireless & Mobile Networking Wireless & Mobile Networking CS 752/852 - Spring 2011 Lec #3: Medium Access Control - I Tamer Nadeem Dept. of Computer Science Data Link Layer (DLL) Main Task of the data link layer: Provide error-free

More information