65 research outputs found
Exploiting Capture Effect in Frameless ALOHA for Massive Wireless Random Access
The analogies between successive interference cancellation (SIC) in slotted
ALOHA framework and iterative belief-propagation erasure-decoding, established
recently, enabled the application of the erasure-coding theory and tools to
design random access schemes. This approach leads to throughput substantially
higher than the one offered by the traditional slotted ALOHA. In the simplest
setting, SIC progresses when a successful decoding occurs for a single user
transmission. In this paper we consider a more general setting of a channel
with capture and explore how such physical model affects the design of the
coded random access protocol. Specifically, we assess the impact of capture
effect in Rayleigh fading scenario on the design of SIC-enabled slotted ALOHA
schemes. We provide analytical treatment of frameless ALOHA, which is a special
case of SIC-enabled ALOHA scheme. We demonstrate both through analytical and
simulation results that the capture effect can be very beneficial in terms of
achieved throughput.Comment: Accepted for presentation at IEEE WCNC'14 Track 2 (MAC and
Cross-Layer Design
ALOHA Random Access that Operates as a Rateless Code
Various applications of wireless Machine-to-Machine (M2M) communications have
rekindled the research interest in random access protocols, suitable to support
a large number of connected devices. Slotted ALOHA and its derivatives
represent a simple solution for distributed random access in wireless networks.
Recently, a framed version of slotted ALOHA gained renewed interest due to the
incorporation of successive interference cancellation (SIC) in the scheme,
which resulted in substantially higher throughputs. Based on similar principles
and inspired by the rateless coding paradigm, a frameless approach for
distributed random access in slotted ALOHA framework is described in this
paper. The proposed approach shares an operational analogy with rateless
coding, expressed both through the user access strategy and the adaptive length
of the contention period, with the objective to end the contention when the
instantaneous throughput is maximized. The paper presents the related analysis,
providing heuristic criteria for terminating the contention period and showing
that very high throughputs can be achieved, even for a low number for
contending users. The demonstrated results potentially have more direct
practical implications compared to the approaches for coded random access that
lead to high throughputs only asymptotically.Comment: Revised version submitted to IEEE Transactions on Communication
Frameless ALOHA with Reliability-Latency Guarantees
One of the novelties brought by 5G is that wireless system design has
increasingly turned its focus on guaranteeing reliability and latency. This
shifts the design objective of random access protocols from throughput
optimization towards constraints based on reliability and latency. For this
purpose, we use frameless ALOHA, which relies on successive interference
cancellation (SIC), and derive its exact finite-length analysis of the
statistics of the unresolved users (reliability) as a function of the
contention period length (latency). The presented analysis can be used to
derive the reliability-latency guarantees. We also optimize the scheme
parameters in order to maximize the reliability within a given latency. Our
approach represents an important step towards the general area of design and
analysis of access protocols with reliability-latency guarantees.Comment: Accepted for presentation at IEEE Globecom 201
Characterization of Coded Random Access with Compressive Sensing based Multi-User Detection
The emergence of Machine-to-Machine (M2M) communication requires new Medium
Access Control (MAC) schemes and physical (PHY) layer concepts to support a
massive number of access requests. The concept of coded random access,
introduced recently, greatly outperforms other random access methods and is
inherently capable to take advantage of the capture effect from the PHY layer.
Furthermore, at the PHY layer, compressive sensing based multi-user detection
(CS-MUD) is a novel technique that exploits sparsity in multi-user detection to
achieve a joint activity and data detection. In this paper, we combine coded
random access with CS-MUD on the PHY layer and show very promising results for
the resulting protocol.Comment: Submitted to Globecom 201
Coded Slotted ALOHA with Varying Packet Loss Rate across Users
The recent research has established an analogy between successive
interference cancellation in slotted ALOHA framework and iterative
belief-propagation erasure-decoding, which has opened the possibility to
enhance random access protocols by utilizing theory and tools of
erasure-correcting codes. In this paper we present a generalization of the
and-or tree evaluation, adapted for the asymptotic analysis of the slotted
ALOHA-based random-access protocols, for the case when the contending users
experience different channel conditions, resulting in packet loss probability
that varies across users. We apply the analysis to the example of frameless
ALOHA, where users contend on a slot basis. We present results regarding the
optimal access probabilities and contention period lengths, such that the
throughput and probability of user resolution are maximized.Comment: 4 pages, submitted to GlobalSIP 201
Unequal Error Protection in Coded Slotted ALOHA
We analyze the performance of coded slotted ALOHA systems for a scenario
where users have different error protection requirements and correspondingly
can be divided into user classes. The main goal is to design the system so that
the requirements for each class are satisfied. To that end, we derive
analytical error floor approximations of the packet loss rate for each class in
the finite frame length regime, as well as the density evolution in the
asymptotic case. Based on this analysis, we propose a heuristic approach for
the optimization of the degree distributions to provide the required unequal
error protection. In addition, we analyze the decoding delay for users in
different classes and show that better protected users experience a smaller
average decoding delay
- …