32 research outputs found
Finite Length Analysis of Irregular Repetition Slotted ALOHA in the Waterfall Region
A finite length analysis is introduced for irregular repetition slotted ALOHA
(IRSA) that enables to accurately estimate its performance in the
moderate-to-high packet loss probability regime, i.e., in the so-called
waterfall region. The analysis is tailored to the collision channel model,
which enables mapping the description of the successive interference
cancellation process onto the iterative erasure decoding of low-density
parity-check codes. The analysis provides accurate estimates of the packet loss
probability of IRSA in the waterfall region as demonstrated by Monte Carlo
simulations.Comment: Accepted for publication in the IEEE Communications Letter
Finite Length Analysis of Irregular Repetition Slotted ALOHA in the Waterfall Region
A finite length analysis is introduced for irregular repetition slotted ALOHA (IRSA) that enables to accurately estimate its performance in the moderate-to-high packet loss probability regime, i.e., in the so-called waterfall region. The analysis is tailored to the collision channel model, which enables mapping the description of the successive interference cancella- tion process onto the iterative erasure decoding of low-density parity-check codes. The analysis provides accurate estimates of the packet loss probability of IRSA in the waterfall region as demonstrated by Monte Carlo simulations
Error Floor Analysis of Coded Slotted ALOHA over Packet Erasure Channels
We present a framework for the analysis of the error floor of coded slotted
ALOHA (CSA) for finite frame lengths over the packet erasure channel. The error
floor is caused by stopping sets in the corresponding bipartite graph, whose
enumeration is, in general, not a trivial problem. We therefore identify the
most dominant stopping sets for the distributions of practical interest. The
derived analytical expressions allow us to accurately predict the error floor
at low to moderate channel loads and characterize the unequal error protection
inherent in CSA
Study of coded ALOHA with multi-user detection under heavy-tailed and correlated arrivals
In this paper, we study via simulation the performance of irregular repetition slotted ALOHA under multi-packet detection and different patterns of the load process. On the one hand, we model the arrival process with a version of the M/G/∞ process able to exhibit a correlation structure decaying slowly in time. Given the independence among frames in frame-synchronous coded-slotted ALOHA (CSA), this variation should only take effect on frame-asynchronous CSA. On the other hand, we vary the marginal distribution of the arrival process using discrete versions of the Lognormal and Pareto distributions, with the objective of investigating the influence of the right tail. In this case, both techniques should be affected by the change, albeit to a different degree. Our results confirm these hypotheses and show that these factors must be taken into account when designing and analyzing these systems. In frameless operations, both the shape of the packet arrivals tail distribution and the existence of short-range and long-range correlations strongly impact the packet loss ratio and the average delay. Nevertheless, these effects emerge only weakly in the case of frame-aligned operations, because this enforces the system to introduce a delay in the newly arrived packets (until the beginning of the next frame), and implies that the backlog of accumulated packets is the key quantity for calculating the performance.Ministerio de Ciencia e Innovación | Ref. PID2020-113240RB-I00Ministerio de Ciencia e Innovación | Ref. PID2020-113795RB-C3
Prioritized Random MAC Optimization via Graph-based Analysis
Motivated by the analogy between successive interference cancellation and
iterative belief-propagation on erasure channels, irregular repetition slotted
ALOHA (IRSA) strategies have received a lot of attention in the design of
medium access control protocols. The IRSA schemes have been mostly analyzed for
theoretical scenarios for homogenous sources, where they are shown to
substantially improve the system performance compared to classical slotted
ALOHA protocols. In this work, we consider generic systems where sources in
different importance classes compete for a common channel. We propose a new
prioritized IRSA algorithm and derive the probability to correctly resolve
collisions for data from each source class. We then make use of our theoretical
analysis to formulate a new optimization problem for selecting the transmission
strategies of heterogenous sources. We optimize both the replication
probability per class and the source rate per class, in such a way that the
overall system utility is maximized. We then propose a heuristic-based
algorithm for the selection of the transmission strategy, which is built on
intrinsic characteristics of the iterative decoding methods adopted for
recovering from collisions. Experimental results validate the accuracy of the
theoretical study and show the gain of well-chosen prioritized transmission
strategies for transmission of data from heterogenous classes over shared
wireless channels
Broadcast Coded Slotted ALOHA: A Finite Frame Length Analysis
We propose an uncoordinated medium access control (MAC) protocol, called
all-to-all broadcast coded slotted ALOHA (B-CSA) for reliable all-to-all
broadcast with strict latency constraints. In B-CSA, each user acts as both
transmitter and receiver in a half-duplex mode. The half-duplex mode gives rise
to a double unequal error protection (DUEP) phenomenon: the more a user repeats
its packet, the higher the probability that this packet is decoded by other
users, but the lower the probability for this user to decode packets from
others. We analyze the performance of B-CSA over the packet erasure channel for
a finite frame length. In particular, we provide a general analysis of stopping
sets for B-CSA and derive an analytical approximation of the performance in the
error floor (EF) region, which captures the DUEP feature of B-CSA. Simulation
results reveal that the proposed approximation predicts very well the
performance of B-CSA in the EF region. Finally, we consider the application of
B-CSA to vehicular communications and compare its performance with that of
carrier sense multiple access (CSMA), the current MAC protocol in vehicular
networks. The results show that B-CSA is able to support a much larger number
of users than CSMA with the same reliability.Comment: arXiv admin note: text overlap with arXiv:1501.0338
Irregular Invertible Bloom Look-Up Tables
We consider invertible Bloom lookup tables (IBLTs) which are probabilistic
data structures that allow to store keyvalue pairs. An IBLT supports insertion
and deletion of key-value pairs, as well as the recovery of all key-value pairs
that have been inserted, as long as the number of key-value pairs stored in the
IBLT does not exceed a certain number. The recovery operation on an IBLT can be
represented as a peeling process on a bipartite graph. We present a density
evolution analysis of IBLTs which allows to predict the maximum number of
key-value pairs that can be inserted in the table so that recovery is still
successful with high probability. This analysis holds for arbitrary irregular
degree distributions and generalizes results in the literature. We complement
our analysis by numerical simulations of our own IBLT design which allows to
recover a larger number of key-value pairs as state-of-the-art IBLTs of same
size.Comment: Accepted for presentation at ISTC 202
Code Design Principles for Ultra-Reliable Random Access with Preassigned Patterns
We study medium access control layer random access under the assumption that the receiver can perform successive interference cancellation, without feedback. During recent years, a number of protocols with impressive error performance have been suggested for this channel model. However, the random nature of these protocols causes an error floor which limits their usability when targeting ultra-reliable communications. In very recent works by Paolini et al. and Boyd et. al., it was shown that if each user employs predetermined combinatorial access patterns, this error floor disappears. In this paper, we develop code design criteria for deterministic random access protocols in the ultra-reliability region, and build codes based on these principles. The suggested design methods are supported by simulations.Peer reviewe