353 research outputs found
Probabilistic Rateless Multiple Access for Machine-to-Machine Communication
Future machine to machine (M2M) communications need to support a massive
number of devices communicating with each other with little or no human
intervention. Random access techniques were originally proposed to enable M2M
multiple access, but suffer from severe congestion and access delay in an M2M
system with a large number of devices. In this paper, we propose a novel
multiple access scheme for M2M communications based on the capacity-approaching
analog fountain code to efficiently minimize the access delay and satisfy the
delay requirement for each device. This is achieved by allowing M2M devices to
transmit at the same time on the same channel in an optimal probabilistic
manner based on their individual delay requirements. Simulation results show
that the proposed scheme achieves a near optimal rate performance and at the
same time guarantees the delay requirements of the devices. We further propose
a simple random access strategy and characterized the required overhead.
Simulation results show the proposed approach significantly outperforms the
existing random access schemes currently used in long term evolution advanced
(LTE-A) standard in terms of the access delay.Comment: Accepted to Publish in IEEE Transactions on Wireless Communication
Characterization of Coded Random Access with Compressive Sensing based Multi-User Detection
The emergence of Machine-to-Machine (M2M) communication requires new Medium
Access Control (MAC) schemes and physical (PHY) layer concepts to support a
massive number of access requests. The concept of coded random access,
introduced recently, greatly outperforms other random access methods and is
inherently capable to take advantage of the capture effect from the PHY layer.
Furthermore, at the PHY layer, compressive sensing based multi-user detection
(CS-MUD) is a novel technique that exploits sparsity in multi-user detection to
achieve a joint activity and data detection. In this paper, we combine coded
random access with CS-MUD on the PHY layer and show very promising results for
the resulting protocol.Comment: Submitted to Globecom 201
Exploiting Capture Effect in Frameless ALOHA for Massive Wireless Random Access
The analogies between successive interference cancellation (SIC) in slotted
ALOHA framework and iterative belief-propagation erasure-decoding, established
recently, enabled the application of the erasure-coding theory and tools to
design random access schemes. This approach leads to throughput substantially
higher than the one offered by the traditional slotted ALOHA. In the simplest
setting, SIC progresses when a successful decoding occurs for a single user
transmission. In this paper we consider a more general setting of a channel
with capture and explore how such physical model affects the design of the
coded random access protocol. Specifically, we assess the impact of capture
effect in Rayleigh fading scenario on the design of SIC-enabled slotted ALOHA
schemes. We provide analytical treatment of frameless ALOHA, which is a special
case of SIC-enabled ALOHA scheme. We demonstrate both through analytical and
simulation results that the capture effect can be very beneficial in terms of
achieved throughput.Comment: Accepted for presentation at IEEE WCNC'14 Track 2 (MAC and
Cross-Layer Design
On the Fundamental Limits of Random Non-orthogonal Multiple Access in Cellular Massive IoT
Machine-to-machine (M2M) constitutes the communication paradigm at the basis
of Internet of Things (IoT) vision. M2M solutions allow billions of multi-role
devices to communicate with each other or with the underlying data transport
infrastructure without, or with minimal, human intervention. Current solutions
for wireless transmissions originally designed for human-based applications
thus require a substantial shift to cope with the capacity issues in managing a
huge amount of M2M devices. In this paper, we consider the multiple access
techniques as promising solutions to support a large number of devices in
cellular systems with limited radio resources. We focus on non-orthogonal
multiple access (NOMA) where, with the aim to increase the channel efficiency,
the devices share the same radio resources for their data transmission. This
has been shown to provide optimal throughput from an information theoretic
point of view.We consider a realistic system model and characterise the system
performance in terms of throughput and energy efficiency in a NOMA scenario
with a random packet arrival model, where we also derive the stability
condition for the system to guarantee the performance.Comment: To appear in IEEE JSAC Special Issue on Non-Orthogonal Multiple
Access for 5G System
Sparse Message Passing Based Preamble Estimation for Crowded M2M Communications
Due to the massive number of devices in the M2M communication era, new
challenges have been brought to the existing random-access (RA) mechanism, such
as severe preamble collisions and resource block (RB) wastes. To address these
problems, a novel sparse message passing (SMP) algorithm is proposed, based on
a factor graph on which Bernoulli messages are updated. The SMP enables an
accurate estimation on the activity of the devices and the identity of the
preamble chosen by each active device. Aided by the estimation, the RB
efficiency for the uplink data transmission can be improved, especially among
the collided devices. In addition, an analytical tool is derived to analyze the
iterative evolution and convergence of the SMP algorithm. Finally, numerical
simulations are provided to verify the validity of our analytical results and
the significant improvement of the proposed SMP on estimation error rate even
when preamble collision occurs.Comment: submitted to ICC 2018 with 6 pages and 4 figure
Energy efficient hybrid satellite terrestrial 5G networks with software defined features
In order to improve the manageability and adaptability
of future 5G wireless networks, the software orchestration mechanism,
named software defined networking (SDN) with Control
and User plane (C/U-plane) decoupling, has become one of the
most promising key techniques. Based on these features, the hybrid
satellite terrestrial network is expected to support flexible
and customized resource scheduling for both massive machinetype-
communication (MTC) and high-quality multimedia requests
while achieving broader global coverage, larger capacity and lower
power consumption. In this paper, an end-to-end hybrid satellite
terrestrial network is proposed and the performance metrics,
e. g., coverage probability, spectral and energy efficiency (SE and
EE), are analysed in both sparse networks and ultra-dense networks.
The fundamental relationship between SE and EE is investigated,
considering the overhead costs, fronthaul of the gateway
(GW), density of small cells (SCs) and multiple quality-ofservice
(QoS) requirements. Numerical results show that compared
with current LTE networks, the hybrid system with C/U split
can achieve approximately 40% and 80% EE improvement in
sparse and ultra-dense networks respectively, and greatly enhance
the coverage. Various resource management schemes, bandwidth
allocation methods, and on-off approaches are compared, and the
applications of the satellite in future 5G networks with software
defined features are proposed
Multiple Access for Massive Machine Type Communications
The internet we have known thus far has been an internet of people, as it has connected people with one another. However, these connections are forecasted to occupy only a minuscule of future communications. The internet of tomorrow is indeed: the internet of things. The Internet of Things (IoT) promises to improve all aspects of life by connecting everything to everything. An enormous amount of effort is being exerted to turn these visions into a reality. Sensors and actuators will communicate and operate in an automated fashion with no or minimal human intervention. In the current literature, these sensors and actuators are referred to as machines, and the communication amongst these machines is referred to as Machine to Machine (M2M) communication or Machine-Type Communication (MTC). As IoT requires a seamless mode of communication that is available anywhere and anytime, wireless communications will be one of the key enabling technologies for IoT. In existing wireless cellular networks, users with data to transmit first need to request channel access. All access requests are processed by a central unit that in return either grants or denies the access request. Once granted access, users' data transmissions are non-overlapping and interference free. However, as the number of IoT devices is forecasted to be in the order of hundreds of millions, if not billions, in the near future, the access channels of existing cellular networks are predicted to suffer from severe congestion and, thus, incur unpredictable latencies in the system. On the other hand, in random access, users with data to transmit will access the channel in an uncoordinated and probabilistic fashion, thus, requiring little or no signalling overhead. However, this reduction in overhead is at the expense of reliability and efficiency due to the interference caused by contending users. In most existing random access schemes, packets are lost when they experience interference from other packets transmitted over the same resources. Moreover, most existing random access schemes are best-effort schemes with almost no Quality of Service (QoS) guarantees. In this thesis, we investigate the performance of different random access schemes in different settings to resolve the problem of the massive access of IoT devices with diverse QoS guarantees. First, we take a step towards re-designing existing random access protocols such that they are more practical and more efficient. For many years, researchers have adopted the collision channel model in random access schemes: a collision is the event of two or more users transmitting over the same time-frequency resources. In the event of a collision, all the involved data is lost, and users need to retransmit their information. However, in practice, data can be recovered even in the presence of interference provided that the power of the signal is sufficiently larger than the power of the noise and the power of the interference. Based on this, we re-define the event of collision as the event of the interference power exceeding a pre-determined threshold. We propose a new analytical framework to compute the probability of packet recovery failure inspired by error control codes on graph. We optimize the random access parameters based on evolution strategies. Our results show a significant improvement in performance in terms of reliability and efficiency. Next, we focus on supporting the heterogeneous IoT applications and accommodating their diverse latency and reliability requirements in a unified access scheme. We propose a multi-stage approach where each group of applications transmits in different stages with different probabilities. We propose a new analytical framework to compute the probability of packet recovery failure for each group in each stage. We also optimize the random access parameters using evolution strategies. Our results show that our proposed scheme can outperform coordinated access schemes of existing cellular networks when the number of users is very large. Finally, we investigate random non-orthogonal multiple access schemes that are known to achieve a higher spectrum efficiency and are known to support higher loads. In our proposed scheme, user detection and channel estimation are carried out via pilot sequences that are transmitted simultaneously with the user's data. Here, a collision event is defined as the event of two or more users selecting the same pilot sequence. All collisions are regarded as interference to the remaining users. We first study the distribution of the interference power and derive its expression. Then, we use this expression to derive simple yet accurate analytical bounds on the throughput and outage probability of the proposed scheme. We consider both joint decoding as well as successive interference cancellation. We show that the proposed scheme is especially useful in the case of short packet transmission
- …