2013
DOI: 10.1109/tnet.2013.2241076
|View full text |Cite
|
Sign up to set email alerts
|

FASA: Accelerated S-ALOHA Using Access History for Event-Driven M2M Communications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
75
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
7
2
1

Relationship

0
10

Authors

Journals

citations
Cited by 137 publications
(75 citation statements)
references
References 24 publications
0
75
0
Order By: Relevance
“…A well-known protocol for uncoordinated access is Slotted ALOHA. An enhanced version of this protocol, called Fast Adaptive Slotted Aloha (FASA), is proposed in [46]: taking into account the burstiness of M2M traffic, the knowledge of the idle, successful, or collided state of the previous slots is exploited in order to improve the performance of the access control protocol. In particular, the number of consecutive idle or collision slots is used to estimate the number of active MTDs in the network (the socalled "network status"), enabling a fast update of the transmission probability of the MTDs and, hence, reducing access delays.…”
Section: Schemes Based On Slotted Alohamentioning
confidence: 99%
“…A well-known protocol for uncoordinated access is Slotted ALOHA. An enhanced version of this protocol, called Fast Adaptive Slotted Aloha (FASA), is proposed in [46]: taking into account the burstiness of M2M traffic, the knowledge of the idle, successful, or collided state of the previous slots is exploited in order to improve the performance of the access control protocol. In particular, the number of consecutive idle or collision slots is used to estimate the number of active MTDs in the network (the socalled "network status"), enabling a fast update of the transmission probability of the MTDs and, hence, reducing access delays.…”
Section: Schemes Based On Slotted Alohamentioning
confidence: 99%
“…Due to the effectiveness to tackle collisions in wireless networks, Aloha-based protocols have been applied extensively to various networked systems ranging from the traditional satellite networks [12], wireless LANs [24] to the emerging Machine-toMachine (M2M) communications [27]. Specifically, in radio frequency identification (RFID) systems, FSA plays a fundamental role in the identifications of tags [28], [29] and is standardized in EPCGlobal Class-1 Generation-2 (C1G2) RFID standard [4].…”
Section: A Context and Motivationmentioning
confidence: 99%
“…In addition, because the RACH is not a heavily loaded channel, s-ALOHA (being a simple protocol) is a perfect and adequate scheme for conventional H2H communications. However, as pointed out in [11], [12], supporting M2M traffic (in addition to the existing H2H traffic) will increase RACH access contention significantly. This effect will render the s -ALOHA scheme inefficient and lead to overload, affecting the RACH access performance.…”
Section: Introductionmentioning
confidence: 99%