Frameless ALOHA: analysis of the physical layer effects Petar Popovski Cedomir Stefanovic, Miyu Momoda Aalborg University Denmark.

Slides:



Advertisements
Similar presentations
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
Advertisements

Bandwidth-Efficient, Energy-Constrained Short Range Wireless Communications.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
EECC694 - Shaaban #1 lec #5 Spring Data Link In Broadcast Networks: The Media Access Sublayer Broadcast networks with multi-access (or random.
David Ripplinger, Aradhana Narula-Tam, Katherine Szeto AIAA 2013 August 21, 2013 Scheduling vs Random Access in Frequency Hopped Airborne.
2005/12/06OPLAB, Dept. of IM, NTU1 Optimizing the ARQ Performance in Downlink Packet Data Systems With Scheduling Haitao Zheng, Member, IEEE Harish Viswanathan,
SUCCESSIVE INTERFERENCE CANCELLATION IN VEHICULAR NETWORKS TO RELIEVE THE NEGATIVE IMPACT OF THE HIDDEN NODE PROBLEM Carlos Miguel Silva Couto Pereira.
Asymptotic Throughput Analysis of Massive M2M Access
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks E. Gelal, K. Pelechrinis, T.S. Kim, I. Broustis Srikanth V. Krishnamurthy,
Interactions Between the Physical Layer and Upper Layers in Wireless Networks: The devil is in the details Fouad A. Tobagi Stanford University “Broadnets.
Available Bandwidth Estimation in IEEE Based Wireless Networks Samarth Shah, Kai Chen, Klara Nahrstedt Department of Computer Science University.
Madhavi W. SubbaraoWCTG - NIST Dynamic Power-Conscious Routing for Mobile Ad-Hoc Networks Madhavi W. Subbarao Wireless Communications Technology Group.
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
Radio Propagation Spring 07 CS 527 – Lecture 3. Overview Motivation Block diagram of a radio Signal Propagation  Large scale path loss  Small scale.
Wireless Network Design for Distributed Control Liu and Goldsmith - Appeared at CDC 2004 Presented by Vinod Namboodiri.
1 Cooperative Communications in Networks: Random coding for wireless multicast Brooke Shrader and Anthony Ephremides University of Maryland October, 2008.
802.11n MAC layer simulation Submitted by: Niv Tokman Aya Mire Oren Gur-Arie.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
1 Cross-Layer Design for Wireless Communication Networks Ness B. Shroff Center for Wireless Systems and Applications (CWSA) School of Electrical and Computer.
Adaptation of TDMA Parameters Based on Network Conditions Bora KARAOGLU.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
Introduction to Cognitive radios Part two HY 539 Presented by: George Fortetsanakis.
Opportunistic Packet Scheduling and Media Access Control for Wireless LANs and Multi-hop Ad Hoc Networks Jianfeng Wang, Hongqiang Zhai and Yuguang Fang.
Studying Local Area Networks Via Media Access Control (MAC) SubLayer
ECE358: Computer Networks Spring 2012
How to Turn on The Coding in MANETs Chris Ng, Minkyu Kim, Muriel Medard, Wonsik Kim, Una-May O’Reilly, Varun Aggarwal, Chang Wook Ahn, Michelle Effros.
“On the Integration of MPEG-4 streams Pulled Out of High Performance Mobile Devices and Data Traffic over a Wireless Network” Spyros Psychis, Polychronis.
CS 5253 Workshop 1 MAC Protocol and Traffic Model.
Networks: Local Area Networks1 LANs Studying Local Area Networks Via Media Access Control (MAC) SubLayer.
1 Lecture 9: Diversity Chapter 7 – Equalization, Diversity, and Coding.
Model and tools. Traffic Model Poisson law – Napoléon worries about the statistics of horse accidents of his generals – Poisson confirms these are unfrequent.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
Communication over Bidirectional Links A. Khoshnevis, D. Dash, C Steger, A. Sabharwal TAP/WARP retreat May 11, 2006.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
1 SenMetrics’05, San Diego, 07/21/2005 SOSBRA: A MAC-Layer Retransmission Algorithm Designed for the Physical-Layer Characteristics of Clustered Sensor.
PLANETE group, INRIA Sophia-Antipolis July 1, 2003 Adaptive Channel allocation for QoS Enhancement in IEEE Wireless LANs Presented by: Mohammad.
Unwanted Link Layer Traffic in Large IEEE Wireless Network By Naga V K Akkineni.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
Wireless Mobile Communication and Transmission Lab. Chapter 8 Application of Error Control Coding.
Cross-Layer Optimization in Wireless Networks under Different Packet Delay Metrics Chris T. K. Ng, Muriel Medard, Asuman Ozdaglar Massachusetts Institute.
The 2014 APSIPA ASC Conference December 9-12, 2014, Siem Reap, city of Angkor Wat, Cambodia Improved Cross-Layer Cooperative MAC Protocol for Wireless.
Novel network coding strategy for TDD Use of feedback (ACK) improves delay/energy/ throughput performance, especially for high latency- high errors scenarios.
Medium Access Control Sub Layer
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
STUMP: Exploiting Position Diversity in the Staggered TDMA Underwater MAC Protocol Kurtis Kredo II, Petar Djukic, Prasant Mohapatra IEEE INFOCOM 2009.
Hangguan Shan, Member, IEEE, Ho Ting Cheng, Student Member, IEEE, and Weihua Zhuang, Fellow, IEEE Cross-Layer Cooperative MAC Protocol in Distributed Wireless.
5: Capacity of Wireless Channels Fundamentals of Wireless Communication, Tse&Viswanath 1 5. Capacity of Wireless Channels.
Codes on Random Geometric Graphs Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with D. Bajović, D. Jakovetić,
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
Courtesy Piggybacking: Supporting Differentiated Services in Multihop Mobile Ad Hoc Networks Wei LiuXiang Chen Yuguang Fang WING Dept. of ECE University.
Discovering Sensor Networks: Applications in Structural Health Monitoring Summary Lecture Wireless Communications.
Chapter 4 The Medum Access Sublayer. MA Sublayer Additional Reference –Local and Metropolitan Area Networks, William Stallings, Prentice Hall, 2000, 6th.
THE MEDIUM ACCESS CONTROL SUBLAYER 4.1 THE CHANNEL ALLOCATION PROBLEM 4.2 MULTIPLE ACCESS PROTOCOLS.
AN EFFICIENT TDMA SCHEME WITH DYNAMIC SLOT ASSIGNMENT IN CLUSTERED WIRELESS SENSOR NETWORKS Shafiq U. Hashmi, Jahangir H. Sarker, Hussein T. Mouftah and.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Introduction to Cognitive radios Part two
Topics in Distributed Wireless Medium Access Control
SENSYS Presented by Cheolki Lee
Channel Allocation (MAC)
Services of DLL Framing Link access Reliable delivery
<month year> <doc.: IEEE doc> January 2013
of the IEEE Distributed Coordination Function
Information Sciences and Systems Lab
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

frameless ALOHA: analysis of the physical layer effects Petar Popovski Cedomir Stefanovic, Miyu Momoda Aalborg University Denmark

2 / 32 outline  intro: massive M2M communication  frameless ALOHA –random access based on rateless codes –noise and capture  summary

3 / 15 R1: today’s systems R2: high-speed versions of today’s systems R3: massive access for sensors and machines R4: ultra-reliable connectivity R5: physically impossible data rate 1 kbps Mbps Gbps bps R5 ≥99% R2 # devices ≥95% ≥99.999% R4 ≥90-99% R3 the shape of wireless to come ≥99% R1

4 / 32 massive M2M  it will be billions, but how many? o Ericsson figure is pointing to 50 billions o others are less ambitious  massive variation in the requirements o traffic burstiness/regularity smart meter vs. event-driven surveillance camera o data chunk size single sensor reading vs. image o dependability requirements emergency data vs. regular update

5 / 32 defining massive M2M the total number of managed connections to individual devices is much larger than the average number of active connections within a short service period

6 / 32 access protocols for massive M2M  massive M2M setup emulates the original analytical setup for ALOHA –infinite population, maximal uncertainty about the set of active devices  difference occurs if the arrivals are correlated time … event …… short service period

7 / 32 how to make protocols for massive access  predict the activation: –account for the relations among the devices, group support, traffic correlation  control the activation –load control mechanisms  our focus: improve the access capability of the protocols –departure from “collision is a waste” –put more burden on the BS

8 / 32 observations on random access  useful when –the devices have not interacted before –the required flexibility is above a threshold  use with caution –in a static setup, the devices “know each other”, and a better strategy (learning, adaptation) can be used  signaling, waste (error, collisions) may take a large fraction of the resources –especially important for small data chunks

9 / 32 FRAMELESS ALOHA or rateless coded random access

10 / 32 slotted ALOHA  essentially part of all cellular standards  all collisions destructive –only single slots contribute to throughput  memoryless randomized selection of the retransmission instant

11 / 32 expanding ALOHA with SIC (successive interference cancellation)  users send replicas in several randomly chosen slots –same number of replicas per user –throughput 0.55 with two repetitions per user frame of M slots... time slots N users E. Casini, R. De Gaudenzi, and O. Herrero, “Contention Resolution Diversity Slotted ALOHA (CRDSA): An Enhanced Random Access Scheme for Satellite Access Packet Networks,” Wireless Communica- tions, IEEE Transactions on, vol. 6, pp – 1419, april 2007.

12 / 32 how SIC is done  each successfully decoded replica enables canceling of other replicas user 1 user 2 user 3 timeslot 1slot 2slot 3slot 4

13 / 32 SIC and codes on graphs  new insight -analogy with the codes-on-graphs -each user selects its no. of repeated transmissions according to a predefined distribution  important differences -left degree can be controlled to exact values, right degree only statistically -right degree 0 possible (idle slot)... variable nodes G. Liva, “Graph-Based Analysis and Optimization of Contention Resolution Diversity Slotted ALOHA,” IEEE Trans. Commun., Feb check nodes

14 / 32 frameless ALOHA  idea: apply paradigm of rateless codes to slotted ALOHA: –no predefined frame length –slots are successively added until a criterion related to key performance parameters of the scheme is satisfied... N users M slots

15 / 32 single feedback used after M-th slot - M not defined in advance (rateless!) feedback when sufficient slots collected - for example, N R < N resolved users lead to throughput of time slots... frameless ALOHA overview

16 / 32 frameless ALOHA stopping criterion a typical run of frameless ALOHA in terms of (1) fraction of resolved users (2) instantaneous throughput heuristic stopping criterion: fraction of resolved users heuristic stopping criterion: fraction of resolved users genie-aided stopping criterion: stop when T is maximal genie-aided stopping criterion: stop when T is maximal

17 / 32 analogy with the rateless codes  structural –selection of transmission probabilities  operational –stopping criterion based on target performance  controlling of the degree distribution –in the simplest case all the users have the same transmission probability

18 / 32 errorless case  all users transmit with the same probability distribution –no channel-induced errors  slot access probability  is the average slot degree  objective: maximize throughput by selecting  and designing the termination criterion

19 / 32 asymptotic analysis  probability of user resolution P R when the number of users N goes to infinity  M is the number of elapsed slots  asymptotic throughput

20 / 32 result of the AND-OR analysis

21 / 32 non-asymptotic behavior

22 / 32 termination and throughput  simple termination: stop the contention if either is true F R ≥V or T=1  genie-aided (GA) termination  the highest reported throughput for a practical (low to moderate) no. of users

23 / 32 average delay  the rateless structure provides an elegant framework to compute the average delay of the resolved users  average delay as a function of the total number of contention slots M –the probability that a user is resolved after m slots is p(m)

24 / 32 average delay example  slot access probability –optimized for throughput maximization  asymptotic analysis  observations –average delay shifted towards the end of the contention period –most of the users get resolved close to the end –typical for the iterative belief-propagation –NB: we have not optimized the protocol for delay minimization p(M)TM/ND(M)/N

25 / 32 noise –induced errors  plug in the noise  the link of each individual user has a different SNR  received signal in a slot  example –if user 2 is resolved elsewhere and cancelled by SIC, the probability that slot j is useful is high –situation opposite when user 1 removed by SIC, slot j less likely useful

26 / 32 capture effect (1)  gives rise to intra-slot SIC in addition to inter-slot SIC  typical model for the decoding process received power of user i noise power Received power of interfering users capture threshold

27 / 32 capture effect (2)  the capture effect boost the SIC  capture can occur anew after every removal of a colliding transmission from the slot –asymptotic analysis significantly complicated no capture effect with capture effect unresolved user resolved user

28 / 32 capture effect: example  narrowband system, valid for M2M:  Rayleigh fading  pdf of SNR for user i at the receiver –long-term power control and the same expected SNR for every user

29 / 32 asymptotic analysis (1)

30 / 32 asymptotic analysis (2)  high SNR => low b/SNR –throughput is well over 1! –throughput decreases as the capture threshold b increases  low SNR => high b/SNR –the achievable throughputs drop –noise impact significant  target slot degrees are higher compared the case without capture effect –the capture effect favors more collisions

31 / 32 non-asymptotic results  confirm the conclusions of the asymptotic analysis

32 / 32 summary  high interest for massive access in the upcoming wireless –M2M communication  coded random access –addresses the fundamental obstacle of collisions in ALOHA  frameless ALOHA –inspired by rateless codes, inter-slot SIC –nontrivial interaction with capture and intra-slot SIC  main future steps –finite blocklength –reengineer and existing ALOHA protocol into coded random access