830 research outputs found

    5G wireless systems: principles, IoT connectivity, and slicing of radio resources

    Get PDF
    In the conference, the landscape of future wireless connectivity is first described. Later, a glimpse into the new radio and standardization is given. New modes in 5G are treated in deep, emphasizing those related to Ultra-­Reliable Low Latency Communication and massive Machine Type Communication (mMTC). Finally, an overview is given on slicing and modeling of 5G systems.Universidad de Málaga. Campus de Excelencia Internacional Andalucía Tech

    Ultra-Reliable Communication in 5G Wireless Systems

    Get PDF
    Wireless 5G systems will not only be "4G, but faster". One of the novel features discussed in relation to 5G is Ultra-Reliable Communication (URC), an operation mode not present in today's wireless systems. URC refers to provision of certain level of communication service almost 100 % of the time. Example URC applications include reliable cloud connectivity, critical connections for industrial automation and reliable wireless coordination among vehicles. This paper puts forward a systematic view on URC in 5G wireless systems. It starts by analyzing the fundamental mechanisms that constitute a wireless connection and concludes that one of the key steps towards enabling URC is revision of the methods for encoding control information (metadata) and data. It introduces the key concept of Reliable Service Composition, where a service is designed to adapt its requirements to the level of reliability that can be attained. The problem of URC is analyzed across two different dimensions. The first dimension is the type of URC problem that is defined based on the time frame used to measure the reliability of the packet transmission. Two types of URC problems are identified: long-term URC (URC-L) and short-term URC (URC-S). The second dimension is represented by the type of reliability impairment that can affect the communication reliability in a given scenario. The main objective of this paper is to create the context for defining and solving the new engineering problems posed by URC in 5G.Comment: To be presented at the 1st International Conference on 5G for Ubiquitous Connectivit

    Zero-Error Capacity of a Class of Timing Channels

    Get PDF
    We analyze the problem of zero-error communication through timing channels that can be interpreted as discrete-time queues with bounded waiting times. The channel model includes the following assumptions: 1) Time is slotted, 2) at most N N "particles" are sent in each time slot, 3) every particle is delayed in the channel for a number of slots chosen randomly from the set {0,1,,K} \{0, 1, \ldots, K\} , and 4) the particles are identical. It is shown that the zero-error capacity of this channel is logr \log r , where r r is the unique positive real root of the polynomial xK+1xKN x^{K+1} - x^{K} - N . Capacity-achieving codes are explicitly constructed, and a linear-time decoding algorithm for these codes devised. In the particular case N=1 N = 1 , K=1 K = 1 , the capacity is equal to logϕ \log \phi , where ϕ=(1+5)/2 \phi = (1 + \sqrt{5}) / 2 is the golden ratio, and the constructed codes give another interpretation of the Fibonacci sequence.Comment: 5 pages (double-column), 3 figures. v3: Section IV.1 from v2 is replaced with Remark 1, and Section IV.2 is removed. Accepted for publication in IEEE Transactions on Information Theor

    ALOHA Random Access that Operates as a Rateless Code

    Get PDF
    Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research interest in random access protocols, suitable to support a large number of connected devices. Slotted ALOHA and its derivatives represent a simple solution for distributed random access in wireless networks. Recently, a framed version of slotted ALOHA gained renewed interest due to the incorporation of successive interference cancellation (SIC) in the scheme, which resulted in substantially higher throughputs. Based on similar principles and inspired by the rateless coding paradigm, a frameless approach for distributed random access in slotted ALOHA framework is described in this paper. The proposed approach shares an operational analogy with rateless coding, expressed both through the user access strategy and the adaptive length of the contention period, with the objective to end the contention when the instantaneous throughput is maximized. The paper presents the related analysis, providing heuristic criteria for terminating the contention period and showing that very high throughputs can be achieved, even for a low number for contending users. The demonstrated results potentially have more direct practical implications compared to the approaches for coded random access that lead to high throughputs only asymptotically.Comment: Revised version submitted to IEEE Transactions on Communication

    Coded Slotted ALOHA with Varying Packet Loss Rate across Users

    Full text link
    The recent research has established an analogy between successive interference cancellation in slotted ALOHA framework and iterative belief-propagation erasure-decoding, which has opened the possibility to enhance random access protocols by utilizing theory and tools of erasure-correcting codes. In this paper we present a generalization of the and-or tree evaluation, adapted for the asymptotic analysis of the slotted ALOHA-based random-access protocols, for the case when the contending users experience different channel conditions, resulting in packet loss probability that varies across users. We apply the analysis to the example of frameless ALOHA, where users contend on a slot basis. We present results regarding the optimal access probabilities and contention period lengths, such that the throughput and probability of user resolution are maximized.Comment: 4 pages, submitted to GlobalSIP 201

    Network-Assisted Device-to-Device (D2D) Direct Proximity Discovery with Underlay Communication

    Get PDF
    Device-to-Device communications are expected to play an important role in current and future cellular generations, by increasing the spatial reuse of spectrum resources and enabling lower latency communication links. This paradigm has two fundamental building blocks: (i) proximity discovery and (ii) direct communication between proximate devices. While (ii) is treated extensively in the recent literature, (i) has received relatively little attention. In this paper we analyze a network-assisted underlay proximity discovery protocol, where a cellular device can take the role of: announcer (which announces its interest in establishing a D2D connection) or monitor (which listens for the transmissions from the announcers). Traditionally, the announcers transmit their messages over dedicated channel resources. In contrast, inspired by recent advances on receivers with multiuser decoding capabilities, we consider the case where the announcers underlay their messages in the downlink transmissions that are directed towards the monitoring devices. We propose a power control scheme applied to the downlink transmission, which copes with the underlay transmission via additional power expenditure, while guaranteeing both reliable downlink transmissions and underlay proximity discovery.Comment: Accepted for presentation at Globecom 201

    Block-Fading Channels with Delayed CSIT at Finite Blocklength

    Get PDF
    In many wireless systems, the channel state information at the transmitter (CSIT) can not be learned until after a transmission has taken place and is thereby outdated. In this paper, we study the benefits of delayed CSIT on a block-fading channel at finite blocklength. First, the achievable rates of a family of codes that allows the number of codewords to expand during transmission, based on delayed CSIT, are characterized. A fixed-length and a variable-length characterization of the rates are provided using the dependency testing bound and the variable-length setting introduced by Polyanskiy et al. Next, a communication protocol based on codes with expandable message space is put forth, and numerically, it is shown that higher rates are achievable compared to coding strategies that do not benefit from delayed CSIT.Comment: Extended version of a paper submitted to ISIT'1

    Zero-Outage Cellular Downlink with Fixed-Rate D2D Underlay

    Full text link
    Two of the emerging trends in wireless cellular systems are Device-to-Device (D2D) and Machine-to-Machine (M2M) communications. D2D enables efficient reuse of the licensed spectrum to support localized transmissions, while M2M connections are often characterized by fixed and low transmission rates. D2D connections can be instrumental in localized aggregation of uplink M2M traffic to a more capable cellular device, before being finally delivered to the Base Station (BS). In this paper we show that a fixed M2M rate is an enabler of efficient Machine-Type D2D underlay operation taking place simultaneously with another \emph{downlink} cellular transmission. In the considered scenario, a BS BB transmits to a user UU, while there are NMN_M Machine-Type Devices (MTDs) attached to UU, all sending simultaneously to UU and each using the same rate RMR_M. While assuming that BB knows the channel BUB-U, but not the interfering channels from the MTDs to UU, we prove that there is a positive downlink rate that can always be decoded by UU, leading to zero-outage of the downlink signal. This is a rather surprising consequence of the features of the multiple access channel and the fixed rate RMR_M. We also consider the case of a simpler, single-user decoder at UU with successive interference cancellation. However, with single-user decoder, a positive zero-outage rate exists only when NM=1N_M=1 and is zero when NM>1N_M>1. This implies that joint decoding is instrumental in enabling fixed-rate underlay operation.Comment: Revised versio
    corecore