Collision Free One-Way Communications Using Reed-Solomon Codes
Collision Free One-Way Communications Using Reed-Solomon Codes
Collision Free One-Way Communications Using Reed-Solomon Codes
Guevara Noubir Real-Time and Networking, CSEM SA. Jaquet-Droz 1, Neuchtel CH-2007, Switzerland. guevara.noubir@csem.ch Tel: +41-32 720 55 35 Fax: +41-32 720 57 20
Abstract- In this paper we present a multiple access scheme for wireless one-way communication systems. This scheme relies on using the properties of Reed-Solomon codes to avoid collisions between multiple users. Keywords: Multiple access methods in wireless communications, Reed-Solomon Codes, Galois Fields.
1. Introduction
Multiple access schemes for wireless communication with guarantees of collision avoidance for packet transmissions such as TDMA require two-way communications (at least to synchronize the communicating systems). Thus they cannot be efficiently used for one-way communication systems. In this paper, we present an access scheme for a one-way communication system that guarantees freedom from collisions. Such scheme is useful for a set of low cost transmitters that may coexist in the same spatial area and thus may interfere with each other. An example of such an application is an Automatic Vehicle Recognition System at gas stations. Such system allows to refill a car tank at a gas station by a wireless authentication of the car. The authentication packets are transmitted when the nozzle is inserted into the car tank. Given the high constraint on the cost of the transmitting unit of such system, a one-way communication is used over one frequency band. We will start by presenting a solution in the case where the transmitters are synchronized. Then we will generalize this solution to the cases where a partial synchronization and no-synchronization is available between the transmitters.
Assumptions:
1. Every transmitter can be uniquely identified by a number t (0tM-1). 2. The only possible cause of packet loss is collision with packets transmitted by other users.
m i =0
ti x i (where
x is an element of GF(pq). This polynomial is then evaluated over d elements of GF(pq). Since two polynomials of degree m cannot be equal over more than m points without being identical, then if d>(M-1)m, there exist at least one point where a given transmitter differs with all the other transmitters polynomials evaluation. The time is divided into frames of d slots, and each slot is sub-divided into pq sub-slots. The transmission is as follows: the packet is transmitted into each slot (a packet is transmitted d times). In slot k the sub-slot t(k) is used for transmitting the packet. In the presence of M transmitters, we are sure that every one will be able to transmit over at least one slot without colliding with any other transmitter. The slots free from collision cannot be known for the transmitter since he does not know the identification (polynomial) of the interfering transmitters.
pq sub-slots
Figure 1. Packets are transmitted in the shaded sub-slots.
This scheme is optimised by selecting p, q, and d such that pq(m+1)M, d>(M-1)m, and pqd is minimized (total number of slots) [CF94].
by using t(wk) sub-slot (where w is a root of unity of order d; w exists since d divides pq-1). This is because, the evaluation of this polynomial is now a Reed-Solomon code-word and Reed-Solomon codes are cyclic. Theorem: Let P, Q two polynomials such that the evaluation of P over 1, w, , wd-1 is equal to a circular left-shift by k of the evaluation of Q over 1, w, , wd-1. Then (p0, p1, p2, , pm) = (q0, (q1wk), (q2w2k), , (qmwmk)). Proof: The evaluation of P over 1, w, , wd-1 gives: P(1), P(w), , P(wd-1). A circular left-shift of the evaluation of Q by k gives: Q(wk), Q(wk+1), , Q(wk-1). These two sequences of values being equal is equivalent to say that: for every i such that 0id-1, we have: p0 + p1wi + p2w2i + + pmwmi = q0 + q1wk+i + q2w2(k+i) + + qmwm(k+i) This equality can be rephrased in: p0 + p1wi + p2w2i + + pmwmi = q0 + (q1wk) wi + (q2w2k) w2i + + (qmwmk) wmi Since this equality holds for more than m (degree of P) values of i (d>m) then, we can deduce that polynomials defined by the coefficients (p0, p1, p2, , pm) and (q0, (q1wk), (q2w2k), , (qmwmk)) are identical.
Since by shifting the transmission frames we still have a polynomial of degree m, then two transmitters can still not intersect over more than m slots without being equal. Thus the set of possible polynomials is reduced by a factor of 1/d. For example, if a polynomial of coefficients (p0, p1, , pm) is used then the polynomials (p0, wp1, , wmpm), (p0, wkp1, , wkmpm) (p0, wdp1, , w(d-1)mpm) can no-more be used by another transmitter. This new constraint modifies the conditions on p, q, and d, because less polynomials will be available for coding the transmitters identifiers. This results in the following conditions pq(m+1)dM, d>(M-1)m, and pqd is minimized (total number of slots).
t(w ) gt
t(wk)
t(wd-1)
When no synchronization is possible, then we propose to introduce some special guard time to avoid loosing the properties of the used polynomials. This consists of using a guard time equal to a slot duration. Thus, if slot i of transmitter T1 intersects with slot i+a of transmitter T2 then any other slot i+k of T1 will only
intersect with slot i+k+a of T2. A slot of T1 will never intersect with two slots of T2. This result will guarantee that the polynomial property of bounded collisions between transmitters is still valid. Thus transmitters will collide at most over m slots (like in the preceding sections). Finally, guard times has to be inserted between sub-slots to avoid packet collision for shifts less than a sub-slot duration. This new constraint modifies the conditions on p, q, and d, because less polynomials will be available for coding the transmitters. This results in the following conditions pq(m+1)4dM, d>(M-1)m, and pqd is minimized (total number of slots). An algorithm that computes the value of p, q, m, and d which maximizes the throughput can be developed by scanning all the possible values of p, q, (m, d) which verify the preceding conditions.
2.4 Discussion
The proposed scheme can be considered as a special case of the ALOHA random access schemes. t(wk) can be considered as random number generated using a seed given by the unique number t that identifies the transmitter. However, given the properties of this random number generation, we have a guarantee that the probability of collision is 0 after a pre-determined number of re-transmissions.
3. Conclusion
We have shown that Reed-Solomon codes can be used to design an access scheme which is free of collisions, and does not require the transmitters to be synchronized in time. The communication is executed over only one frequency band. This scheme can be used for low cost one-way communication system. Further, research can be done to compare such scheme with other one-way schemes like ALOHA and also to provide algorithms that aims at maximizing the throughput for a bounded number of transmitters. Finally, it would be interesting to investigate the influence of transmission errors on this scheme.
4. References
[CF94] I. Chlamtac and A. Farago, Making Transmission Schedules Immune to Topology Changes in Multi-Hop Packet Radio Networks, IEEE/ACM Transactions on Networking, vol. 2, No 1, February 1994, pp23-29. [S94] D. V. Sarwate, Reed-Solomon Codes and the Design of Sequences for Spread-Spectrum Multiple Access Communications. In Reed-Solomon Codes and their Applications, edited by S. B. Wicker and V. K. Bhargava, IEEE Press, 1994. [S73] G. Solomon, Optimal Frequency Hopping Sequences for Multiple Access, Proceedings of a Symposium on a Spread Spectrum Communication, vol 1, AD-915852, pp33-35, 1973.