Code assignment for hidden terminal interference avoidance in multihop packet radio networks
Hidden terminal interference is caused by the (quasi-) simultaneous transmission of two stations that cannot hear each other, but are both received by the same destination station. This interference lowers the system throughput and increases the average packet delay. Some random access protocols tha...
Gespeichert in:
Veröffentlicht in: | IEEE/ACM transactions on networking 1995-08, Vol.3 (4), p.441-449 |
---|---|
Hauptverfasser: | , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 449 |
---|---|
container_issue | 4 |
container_start_page | 441 |
container_title | IEEE/ACM transactions on networking |
container_volume | 3 |
creator | Bertossi, A.A. Bonuccelli, M.A. |
description | Hidden terminal interference is caused by the (quasi-) simultaneous transmission of two stations that cannot hear each other, but are both received by the same destination station. This interference lowers the system throughput and increases the average packet delay. Some random access protocols that reduce this interference have been proposed, e.g., BTMA protocol. However, the hidden terminal interference can be totally avoided only by means of code division multiple access (CDMA) schemes. In the paper, the authors investigate the problem of assigning orthogonal codes to stations so as to eliminate the hidden terminal interference. Since the codes share the fixed channel capacity allocated to the network in the design stage, their number must not exceed a given bound. The authors seek assignments that minimize the number of codes used. They show that this problem is NP-complete, and thus computationally intractable, even for very restricted but very realistic network topologies. Then, they present optimal algorithms for further restricted topologies, as well as fast suboptimal centralized and distributed heuristic algorithms. The results of extensive simulation set up to derive the average performance of the proposed heuristics on realistic network topologies are presented.< > |
doi_str_mv | 10.1109/90.413218 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_crossref_primary_10_1109_90_413218</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>413218</ieee_id><sourcerecordid>28906410</sourcerecordid><originalsourceid>FETCH-LOGICAL-c308t-40b83ad192cf99094618335e7d0db938d026a80656d103f8bb22d68d6057d7663</originalsourceid><addsrcrecordid>eNqFkE1LxDAQhoMouK4evHrKSfDQdZK0aXKUxS8QvOhNKGkzdeO2yZp0Ff-9Xbp49TQPzDMvw0vIOYMFY6CvNSxyJjhTB2TGikJlvJDycGSQIpNS82NyktIHABPA5Yy8LYNFalJy775HP9A2RLpy1qKnA8beedNR50dsMaJvRvcrOGt25Dztt93gVmFDN6ZZ40CjsS5Qj8N3iOt0So5a0yU82885eb27fVk-ZE_P94_Lm6esEaCGLIdaCWOZ5k2rNehcMiVEgaUFW2uh7PipUSALaRmIVtU151YqK6EobSmlmJPLKXcTw-cW01D1LjXYdcZj2KaKKw0yH2__FzkTqtwlXk1iE0NKEdtqE11v4k_FoNoVXWmopqJH92JyHSL-efvlL57ueBs</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>28213876</pqid></control><display><type>article</type><title>Code assignment for hidden terminal interference avoidance in multihop packet radio networks</title><source>IEEE Electronic Library (IEL)</source><creator>Bertossi, A.A. ; Bonuccelli, M.A.</creator><creatorcontrib>Bertossi, A.A. ; Bonuccelli, M.A.</creatorcontrib><description>Hidden terminal interference is caused by the (quasi-) simultaneous transmission of two stations that cannot hear each other, but are both received by the same destination station. This interference lowers the system throughput and increases the average packet delay. Some random access protocols that reduce this interference have been proposed, e.g., BTMA protocol. However, the hidden terminal interference can be totally avoided only by means of code division multiple access (CDMA) schemes. In the paper, the authors investigate the problem of assigning orthogonal codes to stations so as to eliminate the hidden terminal interference. Since the codes share the fixed channel capacity allocated to the network in the design stage, their number must not exceed a given bound. The authors seek assignments that minimize the number of codes used. They show that this problem is NP-complete, and thus computationally intractable, even for very restricted but very realistic network topologies. Then, they present optimal algorithms for further restricted topologies, as well as fast suboptimal centralized and distributed heuristic algorithms. The results of extensive simulation set up to derive the average performance of the proposed heuristics on realistic network topologies are presented.< ></description><identifier>ISSN: 1063-6692</identifier><identifier>EISSN: 1558-2566</identifier><identifier>DOI: 10.1109/90.413218</identifier><identifier>CODEN: IEANEP</identifier><language>eng</language><publisher>IEEE</publisher><subject>Access protocols ; Channel capacity ; Computational modeling ; Computer networks ; Delay ; Heuristic algorithms ; Interference elimination ; Multiaccess communication ; Network topology ; Throughput</subject><ispartof>IEEE/ACM transactions on networking, 1995-08, Vol.3 (4), p.441-449</ispartof><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c308t-40b83ad192cf99094618335e7d0db938d026a80656d103f8bb22d68d6057d7663</citedby><cites>FETCH-LOGICAL-c308t-40b83ad192cf99094618335e7d0db938d026a80656d103f8bb22d68d6057d7663</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/413218$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,778,782,794,27907,27908,54741</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/413218$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Bertossi, A.A.</creatorcontrib><creatorcontrib>Bonuccelli, M.A.</creatorcontrib><title>Code assignment for hidden terminal interference avoidance in multihop packet radio networks</title><title>IEEE/ACM transactions on networking</title><addtitle>TNET</addtitle><description>Hidden terminal interference is caused by the (quasi-) simultaneous transmission of two stations that cannot hear each other, but are both received by the same destination station. This interference lowers the system throughput and increases the average packet delay. Some random access protocols that reduce this interference have been proposed, e.g., BTMA protocol. However, the hidden terminal interference can be totally avoided only by means of code division multiple access (CDMA) schemes. In the paper, the authors investigate the problem of assigning orthogonal codes to stations so as to eliminate the hidden terminal interference. Since the codes share the fixed channel capacity allocated to the network in the design stage, their number must not exceed a given bound. The authors seek assignments that minimize the number of codes used. They show that this problem is NP-complete, and thus computationally intractable, even for very restricted but very realistic network topologies. Then, they present optimal algorithms for further restricted topologies, as well as fast suboptimal centralized and distributed heuristic algorithms. The results of extensive simulation set up to derive the average performance of the proposed heuristics on realistic network topologies are presented.< ></description><subject>Access protocols</subject><subject>Channel capacity</subject><subject>Computational modeling</subject><subject>Computer networks</subject><subject>Delay</subject><subject>Heuristic algorithms</subject><subject>Interference elimination</subject><subject>Multiaccess communication</subject><subject>Network topology</subject><subject>Throughput</subject><issn>1063-6692</issn><issn>1558-2566</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>1995</creationdate><recordtype>article</recordtype><recordid>eNqFkE1LxDAQhoMouK4evHrKSfDQdZK0aXKUxS8QvOhNKGkzdeO2yZp0Ff-9Xbp49TQPzDMvw0vIOYMFY6CvNSxyJjhTB2TGikJlvJDycGSQIpNS82NyktIHABPA5Yy8LYNFalJy775HP9A2RLpy1qKnA8beedNR50dsMaJvRvcrOGt25Dztt93gVmFDN6ZZ40CjsS5Qj8N3iOt0So5a0yU82885eb27fVk-ZE_P94_Lm6esEaCGLIdaCWOZ5k2rNehcMiVEgaUFW2uh7PipUSALaRmIVtU151YqK6EobSmlmJPLKXcTw-cW01D1LjXYdcZj2KaKKw0yH2__FzkTqtwlXk1iE0NKEdtqE11v4k_FoNoVXWmopqJH92JyHSL-efvlL57ueBs</recordid><startdate>19950801</startdate><enddate>19950801</enddate><creator>Bertossi, A.A.</creator><creator>Bonuccelli, M.A.</creator><general>IEEE</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7SP</scope></search><sort><creationdate>19950801</creationdate><title>Code assignment for hidden terminal interference avoidance in multihop packet radio networks</title><author>Bertossi, A.A. ; Bonuccelli, M.A.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c308t-40b83ad192cf99094618335e7d0db938d026a80656d103f8bb22d68d6057d7663</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>1995</creationdate><topic>Access protocols</topic><topic>Channel capacity</topic><topic>Computational modeling</topic><topic>Computer networks</topic><topic>Delay</topic><topic>Heuristic algorithms</topic><topic>Interference elimination</topic><topic>Multiaccess communication</topic><topic>Network topology</topic><topic>Throughput</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bertossi, A.A.</creatorcontrib><creatorcontrib>Bonuccelli, M.A.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>Electronics & Communications Abstracts</collection><jtitle>IEEE/ACM transactions on networking</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Bertossi, A.A.</au><au>Bonuccelli, M.A.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Code assignment for hidden terminal interference avoidance in multihop packet radio networks</atitle><jtitle>IEEE/ACM transactions on networking</jtitle><stitle>TNET</stitle><date>1995-08-01</date><risdate>1995</risdate><volume>3</volume><issue>4</issue><spage>441</spage><epage>449</epage><pages>441-449</pages><issn>1063-6692</issn><eissn>1558-2566</eissn><coden>IEANEP</coden><abstract>Hidden terminal interference is caused by the (quasi-) simultaneous transmission of two stations that cannot hear each other, but are both received by the same destination station. This interference lowers the system throughput and increases the average packet delay. Some random access protocols that reduce this interference have been proposed, e.g., BTMA protocol. However, the hidden terminal interference can be totally avoided only by means of code division multiple access (CDMA) schemes. In the paper, the authors investigate the problem of assigning orthogonal codes to stations so as to eliminate the hidden terminal interference. Since the codes share the fixed channel capacity allocated to the network in the design stage, their number must not exceed a given bound. The authors seek assignments that minimize the number of codes used. They show that this problem is NP-complete, and thus computationally intractable, even for very restricted but very realistic network topologies. Then, they present optimal algorithms for further restricted topologies, as well as fast suboptimal centralized and distributed heuristic algorithms. The results of extensive simulation set up to derive the average performance of the proposed heuristics on realistic network topologies are presented.< ></abstract><pub>IEEE</pub><doi>10.1109/90.413218</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 1063-6692 |
ispartof | IEEE/ACM transactions on networking, 1995-08, Vol.3 (4), p.441-449 |
issn | 1063-6692 1558-2566 |
language | eng |
recordid | cdi_crossref_primary_10_1109_90_413218 |
source | IEEE Electronic Library (IEL) |
subjects | Access protocols Channel capacity Computational modeling Computer networks Delay Heuristic algorithms Interference elimination Multiaccess communication Network topology Throughput |
title | Code assignment for hidden terminal interference avoidance in multihop packet radio networks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T18%3A24%3A38IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Code%20assignment%20for%20hidden%20terminal%20interference%20avoidance%20in%20multihop%20packet%20radio%20networks&rft.jtitle=IEEE/ACM%20transactions%20on%20networking&rft.au=Bertossi,%20A.A.&rft.date=1995-08-01&rft.volume=3&rft.issue=4&rft.spage=441&rft.epage=449&rft.pages=441-449&rft.issn=1063-6692&rft.eissn=1558-2566&rft.coden=IEANEP&rft_id=info:doi/10.1109/90.413218&rft_dat=%3Cproquest_RIE%3E28906410%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=28213876&rft_id=info:pmid/&rft_ieee_id=413218&rfr_iscdi=true |