-
Comparative Analysis of Sub-band Allocation Algorithms in In-body Sub-networks Supporting XR Applications
Authors:
Saeed Bagherinejad,
Thomas Jacobsen,
Nuno K. Pratas,
Ramoni O. Adeogun
Abstract:
In-body subnetworks (IBS) are envisioned to support reliable wireless connectivity for emerging applications including extended reality (XR) in the human body. As the deployment of in-body sub-networks is uncontrollable by nature, the dynamic radio resource allocation scheme in place becomes of the uttermost importance for the performance of the in-body sub-networks. This paper provides a comparat…
▽ More
In-body subnetworks (IBS) are envisioned to support reliable wireless connectivity for emerging applications including extended reality (XR) in the human body. As the deployment of in-body sub-networks is uncontrollable by nature, the dynamic radio resource allocation scheme in place becomes of the uttermost importance for the performance of the in-body sub-networks. This paper provides a comparative study on the performance of the state-of-the-art interference-aware sub-band allocation algorithms in in-body sub-networks supporting the XR applications. The study identified suitable models for characterizing in-body sub-networks which are used in a snapshot-based simulation framework to perform a comprehensive evaluation of the performance of state-of-art sub-band allocation algorithms, including greedy selection, sequential greedy selection (SG), centralized graph coloring (CGC), and sequential iterative sub-band allocation (SISA). The study shows that for XR requirements, the SISA and SG algorithms can support IBS densities up to 75% higher than CGC.
△ Less
Submitted 18 March, 2024;
originally announced March 2024.
-
Ambient IoT: A missing link in 3GPP IoT Devices Landscape
Authors:
M. Majid Butt,
Nitin R. Mangalvedhe,
Nuno K. Pratas,
Johannes Harrebek,
John Kimionis,
Muhammad Tayyab,
Oana-Elena Barbu,
Rapeepat Ratasuk,
Benny Vejlgaard
Abstract:
Ambient internet of things (IoT) is the network of devices which harvest energy from ambient sources for powering their communication. After decades of research on operation of these devices, Third Generation Partnership Project (3GPP) has started discussing energy harvesting technology in cellular networks to support massive deployment of IoT devices at low operational cost. This article provides…
▽ More
Ambient internet of things (IoT) is the network of devices which harvest energy from ambient sources for powering their communication. After decades of research on operation of these devices, Third Generation Partnership Project (3GPP) has started discussing energy harvesting technology in cellular networks to support massive deployment of IoT devices at low operational cost. This article provides a timely update on 3GPP studies on ambient energy harvesting devices including device types, use cases, key requirements, and related design challenges. Supported by link budget analysis for backscattering energy harvesting devices, which are a key component of this study, we provide insight on system design and show how this technology will require a new system design approach as compared to New Radio (NR) system design in 5G.
△ Less
Submitted 11 December, 2023;
originally announced December 2023.
-
Signaling Design for Cooperative Resource Allocation and its Impact to Reliability
Authors:
Rasmus Liborius Bruun,
C. Santiago Morejón García,
Troels B. Sørensen,
Nuno K. Pratas,
Tatiana Kozlova Madsen,
Preben Mogensen
Abstract:
Decentralized cooperative resource allocation schemes for robotic swarms are essential to enable high reliability in high throughput data exchanges. These cooperative schemes require control signaling with the aim to avoid half-duplex problems at the receiver and mitigate interference. We propose two cooperative resource allocation schemes, device sequential and group scheduling, and introduce a c…
▽ More
Decentralized cooperative resource allocation schemes for robotic swarms are essential to enable high reliability in high throughput data exchanges. These cooperative schemes require control signaling with the aim to avoid half-duplex problems at the receiver and mitigate interference. We propose two cooperative resource allocation schemes, device sequential and group scheduling, and introduce a control signaling design. We observe that failure in the reception of these control signals leads to non-cooperative behavior and to significant performance degradation. The cause of these failures are identified and specific countermeasures are proposed and evaluated. We compare the proposed resource allocation schemes against the NR sidelink mode 2 resource allocation and show that even though signaling has an important impact on the resource allocation performance, our proposed device sequential and group scheduling resource allocation schemes improve reliability by an order of magnitude compared to sidelink mode 2.
△ Less
Submitted 15 September, 2022; v1 submitted 15 September, 2021;
originally announced September 2021.
-
Towards Massive Connectivity Support for Scalable mMTC Communications in 5G networks
Authors:
Carsten Bockelmann,
Nuno K. Pratas,
Gerhard Wunder,
Stephan Saur,
Monica Navarro,
David Gregoratti,
Guillaume Vivier,
Elisabeth de Carvalho,
Yalei Ji,
Cedomir Stefanovic,
Petar Popovski,
Qi Wang,
Malte Schellmann,
Evangelos Kosmatos,
Panagiotis Demestichas,
Miruna Raceala-Motoc,
Peter Jung,
Slawomir Stanczak,
Armin Dekorsy
Abstract:
The fifth generation of cellular communication systems is foreseen to enable a multitude of new applications and use cases with very different requirements. A new 5G multiservice air interface needs to enhance broadband performance as well as provide new levels of reliability, latency and supported number of users. In this paper we focus on the massive Machine Type Communications (mMTC) service wi…
▽ More
The fifth generation of cellular communication systems is foreseen to enable a multitude of new applications and use cases with very different requirements. A new 5G multiservice air interface needs to enhance broadband performance as well as provide new levels of reliability, latency and supported number of users. In this paper we focus on the massive Machine Type Communications (mMTC) service within a multi-service air interface. Specifically, we present an overview of different physical and medium access techniques to address the problem of a massive number of access attempts in mMTC and discuss the protocol performance of these solutions in a common evaluation framework.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
Achieving Low Latency Two-Way Communication by Downlink and Uplink Decoupled Access
Authors:
Dong Min Kim,
Nuno K. Pratas,
Petar Popovski
Abstract:
In many scenarios, low latency wireless communication assumes two-way connection, such that the node that receives information can swiftly send acknowledgment or other response. In this paper, we address the problem of low latency two-way communication and address it through proposal of a base station (BS) cooperation scheme. The scheme is based on downlink (DL) and uplink (UL) decoupled access (D…
▽ More
In many scenarios, low latency wireless communication assumes two-way connection, such that the node that receives information can swiftly send acknowledgment or other response. In this paper, we address the problem of low latency two-way communication and address it through proposal of a base station (BS) cooperation scheme. The scheme is based on downlink (DL) and uplink (UL) decoupled access (DUDA). To the best of our knowledge, this is the first time that the idea of decoupled access is used to reduce latency. We derive the analytical expression for the average latency and verify that the latency expression is valid with outage probability based on stochastic geometry analysis. Both analytical and simulation results show that, with DUDA, the latency can be reduced by approximately 30-60% compared to the traditional coupled access.
△ Less
Submitted 6 March, 2018;
originally announced March 2018.
-
Statistical Multiplexing of Computations in C-RAN with Tradeoffs in Latency and Energy
Authors:
Anders E. Kalør,
Mauricio I. Agurto,
Nuno K. Pratas,
Jimmy J. Nielsen,
Petar Popovski
Abstract:
In the Cloud Radio Access Network (C-RAN) architecture, the baseband signals from multiple remote radio heads are processed in a centralized baseband unit (BBU) pool. This architecture allows network operators to adapt the BBU's computational resources to the aggregate access load experienced at the BBU, which can change in every air-interface access frame. The degree of savings that can be achiev…
▽ More
In the Cloud Radio Access Network (C-RAN) architecture, the baseband signals from multiple remote radio heads are processed in a centralized baseband unit (BBU) pool. This architecture allows network operators to adapt the BBU's computational resources to the aggregate access load experienced at the BBU, which can change in every air-interface access frame. The degree of savings that can be achieved by adapting the resources is a tradeoff between savings, adaptation frequency, and increased queuing time. If the time scale for adaptation of the resource multiplexing is greater than the access frame duration, then this may result in additional access latency and limit the energy savings. In this paper we investigate the tradeoff by considering two extreme time-scales for the resource multiplexing: (i) long-term, where the computational resources are adapted over periods much larger than the access frame durations; (ii) short-term, where the adaption is below the access frame duration. We develop a general C-RAN queuing model that describes the access latency and show, for Poisson arrivals, that long-term multiplexing achieves savings comparable to short-term multiplexing, while offering low implementation complexity.
△ Less
Submitted 15 March, 2017;
originally announced March 2017.
-
Secure Real-Time Monitoring and Management of Smart Distribution Grid using Shared Cellular Networks
Authors:
Jimmy J. Nielsen,
Hervé Ganem,
Ljupco Jorguseski,
Kemal Alic,
Miha Smolnikar,
Ziming Zhu,
Nuno K. Pratas,
Michal Golinski,
Haibin Zhang,
Urban Kuhar,
Zhong Fan,
Ales Svigelj
Abstract:
The electricity production and distribution is facing two major changes. First, the production is shifting from classical energy sources such as coal and nuclear power towards renewable resources such as solar and wind. Secondly, the consumption in the low voltage grid is expected to grow significantly due to expected introduction of electrical vehicles. The first step towards more efficient opera…
▽ More
The electricity production and distribution is facing two major changes. First, the production is shifting from classical energy sources such as coal and nuclear power towards renewable resources such as solar and wind. Secondly, the consumption in the low voltage grid is expected to grow significantly due to expected introduction of electrical vehicles. The first step towards more efficient operational capabilities is to introduce an observability of the distribution system and allow for leveraging the flexibility of end connection points with manageable consumption, generation and storage capabilities. Thanks to the advanced measurement devices, management framework, and secure communication infrastructure developed in the FP7 SUNSEED project, the Distribution System Operator (DSO) now has full observability of the energy flows at the medium/low voltage grid. Furthermore, the prosumers are able to participate pro-actively and coordinate with the DSO and other stakeholders in the grid. The monitoring and management functionalities have strong requirements to the communication latency, reliability and security. This paper presents novel solutions and analyses of these aspects for the SUNSEED scenario, where the smart grid ICT solutions are provided through shared cellular LTE networks.
△ Less
Submitted 13 January, 2017;
originally announced January 2017.
-
Massive Machine-Type Communication (mMTC) Access with Integrated Authentication
Authors:
Nuno K. Pratas,
Sarath Pattathil,
Cedomir Stefanovic,
Petar Popovski
Abstract:
We present a connection establishment protocol with integrated authentication, suited for Massive Machine-Type Communications (mMTC). The protocol is contention-based and its main feature is that a device contends with a unique signature that also enables the authentication of the device towards the network. The signatures are inspired by Bloom filters and are created based on the output of the MI…
▽ More
We present a connection establishment protocol with integrated authentication, suited for Massive Machine-Type Communications (mMTC). The protocol is contention-based and its main feature is that a device contends with a unique signature that also enables the authentication of the device towards the network. The signatures are inspired by Bloom filters and are created based on the output of the MILENAGE authentication and encryption algorithm set, which is used in the authentication and security procedures in the LTE protocol family. We show that our method utilizes the system resources more efficiently, achieves lower latency of connection establishment for Poisson arrivals and allows a $87\%$ signalling overhead reduction. An important conclusion is that the mMTC traffic benefits profoundly from integration of security features into the connection establishment/access protocols, instead of addressing them post-hoc, which has been a common practice.
△ Less
Submitted 15 March, 2017; v1 submitted 31 October, 2016;
originally announced October 2016.
-
Full Duplex Emulation via Spatial Separation of Half Duplex Nodes in a Planar Cellular Network
Authors:
Henning Thomsen,
Dong Min Kim,
Petar Popovski,
Nuno K. Pratas,
Elisabeth de Carvalho
Abstract:
A Full Duplex Base Station (FD-BS) can be used to serve simultaneously two Half-Duplex (HD) Mobile Stations (MSs), one working in the uplink and one in the downlink, respectively. The same functionality can be realized by having two interconnected and spatially separated Half Duplex Base Stations (HD-BSs), which is a scheme termed \emph{CoMPflex} (CoMP for In-Band Wireless Full Duplex). A FD-BS ca…
▽ More
A Full Duplex Base Station (FD-BS) can be used to serve simultaneously two Half-Duplex (HD) Mobile Stations (MSs), one working in the uplink and one in the downlink, respectively. The same functionality can be realized by having two interconnected and spatially separated Half Duplex Base Stations (HD-BSs), which is a scheme termed \emph{CoMPflex} (CoMP for In-Band Wireless Full Duplex). A FD-BS can be seen as a special case of CoMPflex with separation distance zero. In this paper we study the performance of CoMPflex in a two-dimensional cellular scenario using stochastic geometry and compare it to the one achieved by FD-BSs. By deriving the Cumulative Distribution Functions, we show that CoMPflex brings BSs closer to the MSs they are serving, while increasing the distance between a MS and interfering MSs. Furthermore, the results show that CoMPflex brings benefits over FD-BS in terms of communication reliability. Following the trend of wireless network densification, CoMPflex can be regarded as a method with a great potential to effectively use the dense HD deployments.
△ Less
Submitted 8 May, 2016;
originally announced May 2016.
-
Random Access for Machine-Type Communication based on Bloom Filtering
Authors:
Nuno K. Pratas,
Cedomir Stefanovic,
German Corrales Madueno,
Petar Popovski
Abstract:
We present a random access method inspired on Bloom filters that is suited for Machine-Type Communications (MTC). Each accessing device sends a \emph{signature} during the contention process. A signature is constructed using the Bloom filtering method and contains information on the device identity and the connection establishment cause. We instantiate the proposed method over the current LTE-A ac…
▽ More
We present a random access method inspired on Bloom filters that is suited for Machine-Type Communications (MTC). Each accessing device sends a \emph{signature} during the contention process. A signature is constructed using the Bloom filtering method and contains information on the device identity and the connection establishment cause. We instantiate the proposed method over the current LTE-A access protocol. However, the method is applicable to a more general class of random access protocols that use preambles or other reservation sequences, as expected to be the case in 5G systems. We show that our method utilizes the system resources more efficiently and achieves significantly lower connection establishment latency in case of synchronous arrivals, compared to the variant of the LTE-A access protocol that is optimized for MTC traffic. A dividend of the proposed method is that it allows the base station (BS) to acquire the device identity and the connection establishment cause already in the initial phase of the connection establishment, thereby enabling their differentiated treatment by the BS.
△ Less
Submitted 30 August, 2016; v1 submitted 16 November, 2015;
originally announced November 2015.
-
Network-Assisted Device-to-Device (D2D) Direct Proximity Discovery with Underlay Communication
Authors:
Nuno K. Pratas,
Petar Popovski
Abstract:
Device-to-Device communications are expected to play an important role in current and future cellular generations, by increasing the spatial reuse of spectrum resources and enabling lower latency communication links. This paradigm has two fundamental building blocks: (i) proximity discovery and (ii) direct communication between proximate devices. While (ii) is treated extensively in the recent lit…
▽ More
Device-to-Device communications are expected to play an important role in current and future cellular generations, by increasing the spatial reuse of spectrum resources and enabling lower latency communication links. This paradigm has two fundamental building blocks: (i) proximity discovery and (ii) direct communication between proximate devices. While (ii) is treated extensively in the recent literature, (i) has received relatively little attention. In this paper we analyze a network-assisted underlay proximity discovery protocol, where a cellular device can take the role of: announcer (which announces its interest in establishing a D2D connection) or monitor (which listens for the transmissions from the announcers). Traditionally, the announcers transmit their messages over dedicated channel resources. In contrast, inspired by recent advances on receivers with multiuser decoding capabilities, we consider the case where the announcers underlay their messages in the downlink transmissions that are directed towards the monitoring devices. We propose a power control scheme applied to the downlink transmission, which copes with the underlay transmission via additional power expenditure, while guaranteeing both reliable downlink transmissions and underlay proximity discovery.
△ Less
Submitted 13 August, 2015;
originally announced August 2015.
-
Assessment of LTE Wireless Access for Monitoring of Energy Distribution in the Smart Grid
Authors:
Germán C. Madueño,
Jimmy J. Nielsen,
Dong Min Kim,
Nuno K. Pratas,
Čedomir Stefanović,
Petar Popovski
Abstract:
While LTE is becoming widely rolled out for human-type services, it is also a promising solution for cost-efficient connectivity of the smart grid monitoring equipment. This is a type of machine-to-machine (M2M) traffic that consists mainly of sporadic uplink transmissions. In such a setting, the amount of traffic that can be served in a cell is not constrained by the data capacity, but rather by…
▽ More
While LTE is becoming widely rolled out for human-type services, it is also a promising solution for cost-efficient connectivity of the smart grid monitoring equipment. This is a type of machine-to-machine (M2M) traffic that consists mainly of sporadic uplink transmissions. In such a setting, the amount of traffic that can be served in a cell is not constrained by the data capacity, but rather by the signaling constraints in the random access channel and control channel. In this paper we explore these limitations using a detailed simulation of the LTE access reservation protocol (ARP). We find that 1) assigning more random access opportunities may actually worsen performance; and 2) the additional signaling that follows the ARP has very large impact on the capacity in terms of the number of supported devices; we observed a reduction in the capacity by almost a factor of 3. This suggests that a lightweight access method, with a reduced number of signaling messages, needs to be considered in standardization for M2M applications. Additionally we propose a tractable analytical model to calculate the outage that can be rapidly implemented and evaluated. The model accounts for the features of the random access, control channel and uplink and downlink data channels, as well as retransmissions.
△ Less
Submitted 30 November, 2015; v1 submitted 11 August, 2015;
originally announced August 2015.
-
CoMPflex: CoMP for In-Band Wireless Full Duplex
Authors:
Henning Thomsen,
Petar Popovski,
Elisabeth de Carvalho,
Nuno K. Pratas,
Dong Min Kim,
Federico Boccardi
Abstract:
In this letter we consider emulation of a Full Duplex (FD) cellular base station (BS) by using two spatially separated and coordinated half duplex (HD) BSs. The proposed system is termed CoMPflex (CoMP for In-Band Wireless Full Duplex) and at a given instant it serves two HD mobile stations (MSs), one in the uplink and one in the downlink, respectively. We evaluate the performance of our scheme by…
▽ More
In this letter we consider emulation of a Full Duplex (FD) cellular base station (BS) by using two spatially separated and coordinated half duplex (HD) BSs. The proposed system is termed CoMPflex (CoMP for In-Band Wireless Full Duplex) and at a given instant it serves two HD mobile stations (MSs), one in the uplink and one in the downlink, respectively. We evaluate the performance of our scheme by using a geometric extension of the one-dimensional Wyner model, which takes into account the distances between the devices. The results show that CoMPflex leads to gains in terms of sum-rate and energy efficiency with respect to the ordinary FD, as well as with respect to a baseline scheme based on unidirectional traffic.
△ Less
Submitted 30 October, 2015; v1 submitted 30 July, 2015;
originally announced July 2015.
-
Effect of LOS/NLOS Propagation on Ultra-Dense Networks
Authors:
Carlo Galiotto,
Nuno K. Pratas,
Linda Doyle,
Nicola Marchetti
Abstract:
This paper aims at investigating the achievable performance and the issues that arise in ultra-dense networks (UDNs), when the signal propagation includes both the Line-of-Sight (LOS) and Non-Line-Of-Sight (NLOS) components. Backed by an analytical stochastic geometry-based model, we study the coverage, the Area Spectral Efficiency (ASE) and the energy efficiency of UDNs with LOS/NLOS propagation.…
▽ More
This paper aims at investigating the achievable performance and the issues that arise in ultra-dense networks (UDNs), when the signal propagation includes both the Line-of-Sight (LOS) and Non-Line-Of-Sight (NLOS) components. Backed by an analytical stochastic geometry-based model, we study the coverage, the Area Spectral Efficiency (ASE) and the energy efficiency of UDNs with LOS/NLOS propagation. We show that when LOS/NLOS propagation components are accounted for, the network suffers from low coverage and the ASE gain is lower than linear at high base station densities. However, this performance drop can partially be attenuated by means of frequency reuse, which is shown to improve the ASE vs coverage trade-off of cell densification, provided that we have a degree of freedom on the density of cells. In addition, from an energy efficiency standpoint, cell densification is shown to be inefficient when both LOS and NLOS components are taken into account. Overall, based on the findings of our work that assumes a more advanced system model compared to the current state-of-the-art, we claim that highly crowded environments of users represent the worst case scenario for ultra-dense networks. Namely, these are likely to face serious issues in terms of limited coverage.
△ Less
Submitted 7 July, 2015;
originally announced July 2015.
-
A Tractable Model of the LTE Access Reservation Procedure for Machine-Type Communications
Authors:
Jimmy J. Nielsen,
Dong Min Kim,
Germán C. Madueño,
Nuno K. Pratas,
Petar Popovski
Abstract:
A canonical scenario in Machine-Type Communications (MTC) is the one featuring a large number of devices, each of them with sporadic traffic. Hence, the number of served devices in a single LTE cell is not determined by the available aggregate rate, but rather by the limitations of the LTE access reservation protocol. Specifically, the limited number of contention preambles and the limited amount…
▽ More
A canonical scenario in Machine-Type Communications (MTC) is the one featuring a large number of devices, each of them with sporadic traffic. Hence, the number of served devices in a single LTE cell is not determined by the available aggregate rate, but rather by the limitations of the LTE access reservation protocol. Specifically, the limited number of contention preambles and the limited amount of uplink grants per random access response are crucial to consider when dimensioning LTE networks for MTC. We propose a low-complexity model of LTE's access reservation protocol that encompasses these two limitations and allows us to evaluate the outage probability at click-speed. The model is based chiefly on closed-form expressions, except for the part with the feedback impact of retransmissions, which is determined by solving a fixed point equation. Our model overcomes the incompleteness of the existing models that are focusing solely on the preamble collisions. A comparison with the simulated LTE access reservation procedure that follows the 3GPP specifications, confirms that our model provides an accurate estimation of the system outage event and the number of supported MTC devices.
△ Less
Submitted 30 November, 2015; v1 submitted 7 May, 2015;
originally announced May 2015.
-
Massive M2M Access with Reliability Guarantees in LTE Systems
Authors:
German Corrales Madueno,
Nuno K. Pratas,
Cedomir Stefanovic,
Petar Popovski
Abstract:
Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arrivals from a large set of M2M devices. The existing solutions take a reactive approach in dealing with mas…
▽ More
Machine-to-Machine (M2M) communications are one of the major drivers of the cellular network evolution towards 5G systems. One of the key challenges is on how to provide reliability guarantees to each accessing device in a situation in which there is a massive number of almost-simultaneous arrivals from a large set of M2M devices. The existing solutions take a reactive approach in dealing with massive arrivals, such as non-selective barring when a massive arrival event occurs, which implies that the devices cannot get individual reliability guarantees. In this paper we propose a proactive approach, based on a standard operation of the cellular access. The access procedure is divided into two phases, an estimation phase and a serving phase. In the estimation phase the number of arrivals is estimated and this information is used to tune the amount of resources allocated in the serving phase. Our results show that the proactive approach is instrumental in delivering high access reliability to the M2M devices.
△ Less
Submitted 10 February, 2015;
originally announced February 2015.
-
Aggregation and Trunking of M2M Traffic via D2D Connections
Authors:
Giovanni Rigazzi,
Nuno K. Pratas,
Petar Popovski,
Romano Fantacci
Abstract:
Machine-to-Machine (M2M) communications is one of the key enablers of the Internet of Things (IoT). Billions of devices are expected to be deployed in the next future for novel M2M applications demanding ubiquitous access and global connectivity. In order to cope with the massive number of machines, there is a need for new techniques to coordinate the access and allocate the resources. Although th…
▽ More
Machine-to-Machine (M2M) communications is one of the key enablers of the Internet of Things (IoT). Billions of devices are expected to be deployed in the next future for novel M2M applications demanding ubiquitous access and global connectivity. In order to cope with the massive number of machines, there is a need for new techniques to coordinate the access and allocate the resources. Although the majority of the proposed solutions are focused on the adaptation of the traditional cellular networks to the M2M traffic patterns, novel approaches based on the direct communication among nearby devices may represent an effective way to avoid access congestion and cell overload. In this paper, we propose a new strategy inspired by the classical Trunked Radio Systems (TRS), exploiting the Device-to-Device (D2D) connectivity between cellular users and Machine-Type Devices (MTDs). The aggregation of the locally generated packets is performed by a user device, which aggregates the machine-type data, supplements it with its own data and transmits all of them to the Base Station. We observe a fundamental trade-off between latency and the transmit power needed to deliver the aggregate traffic, in a sense that lower latency requires increase in the transmit power.
△ Less
Submitted 5 February, 2015;
originally announced February 2015.
-
What Can Wireless Cellular Technologies Do about the Upcoming Smart Metering Traffic?
Authors:
Jimmy J. Nielsen,
Germán C. Madueño,
Nuno K. Pratas,
René B. Sørensen,
Čedomir Stefanović,
Petar Popovski
Abstract:
The introduction of smart electricity meters with cellular radio interface puts an additional load on the wireless cellular networks. Currently, these meters are designed for low duty cycle billing and occasional system check, which generates a low-rate sporadic traffic. As the number of distributed energy resources increases, the household power will become more variable and thus unpredictable fr…
▽ More
The introduction of smart electricity meters with cellular radio interface puts an additional load on the wireless cellular networks. Currently, these meters are designed for low duty cycle billing and occasional system check, which generates a low-rate sporadic traffic. As the number of distributed energy resources increases, the household power will become more variable and thus unpredictable from the viewpoint of the Distribution System Operator (DSO). It is therefore expected, in the near future, to have an increased number of Wide Area Measurement System (WAMS) devices with Phasor Measurement Unit (PMU)-like capabilities in the distribution grid, thus allowing the utilities to monitor the low voltage grid quality while providing information required for tighter grid control. From a communication standpoint, the traffic profile will change drastically towards higher data volumes and higher rates per device. In this paper, we characterize the current traffic generated by smart electricity meters and supplement it with the potential traffic requirements brought by introducing enhanced Smart Meters, i.e., meters with PMU-like capabilities. Our study shows how GSM/GPRS and LTE cellular system performance behaves with the current and next generation smart meters traffic, where it is clearly seen that the PMU data will seriously challenge these wireless systems. We conclude by highlighting the possible solutions for upgrading the cellular standards, in order to cope with the upcoming smart metering traffic.
△ Less
Submitted 1 July, 2015; v1 submitted 4 February, 2015;
originally announced February 2015.
-
A Stochastic Geometry Framework for LOS/NLOS Propagation in Dense Small Cell Networks
Authors:
Carlo Galiotto,
Nuno K. Pratas,
Nicola Marchetti,
Linda Doyle
Abstract:
The need to carry out analytical studies of wireless systems often motivates the usage of simplified models which, despite their tractability, can easily lead to an overestimation of the achievable performance. In the case of dense small cells networks, the standard single slope path-loss model has been shown to provide interesting, but supposedly too optimistic, properties such as the invariance…
▽ More
The need to carry out analytical studies of wireless systems often motivates the usage of simplified models which, despite their tractability, can easily lead to an overestimation of the achievable performance. In the case of dense small cells networks, the standard single slope path-loss model has been shown to provide interesting, but supposedly too optimistic, properties such as the invariance of the outage/coverage probability and of the spectral efficiency to the base station density. This paper seeks to explore the performance of dense small cells networks when a more accurate path-loss model is taken into account. We first propose a stochastic geometry based framework for small cell networks where the signal propagation accounts for both the Line-of-Sight (LOS) and Non-Line-Of-Sight (NLOS) components, such as the model provided by the 3GPP for evaluation of pico-cells in Heterogeneous Networks. We then study the performance of these networks and we show the dependency of some metrics such as the outage/coverage probability, the spectral efficiency and Area Spectral Efficiency (ASE) on the base station density and on the LOS likelihood of the propagation environment. Specifically, we show that, with LOS/NLOS propagation, dense networks still achieve large ASE gain but, at the same time, suffer from high outage probability.
△ Less
Submitted 5 June, 2015; v1 submitted 16 December, 2014;
originally announced December 2014.
-
Zero-Outage Cellular Downlink with Fixed-Rate D2D Underlay
Authors:
Nuno K. Pratas,
Petar Popovski
Abstract:
Two of the emerging trends in wireless cellular systems are Device-to-Device (D2D) and Machine-to-Machine (M2M) communications. D2D enables efficient reuse of the licensed spectrum to support localized transmissions, while M2M connections are often characterized by fixed and low transmission rates. D2D connections can be instrumental in localized aggregation of uplink M2M traffic to a more capable…
▽ More
Two of the emerging trends in wireless cellular systems are Device-to-Device (D2D) and Machine-to-Machine (M2M) communications. D2D enables efficient reuse of the licensed spectrum to support localized transmissions, while M2M connections are often characterized by fixed and low transmission rates. D2D connections can be instrumental in localized aggregation of uplink M2M traffic to a more capable cellular device, before being finally delivered to the Base Station (BS). In this paper we show that a fixed M2M rate is an enabler of efficient Machine-Type D2D underlay operation taking place simultaneously with another \emph{downlink} cellular transmission. In the considered scenario, a BS $B$ transmits to a user $U$, while there are $N_M$ Machine-Type Devices (MTDs) attached to $U$, all sending simultaneously to $U$ and each using the same rate $R_M$. While assuming that $B$ knows the channel $B-U$, but not the interfering channels from the MTDs to $U$, we prove that there is a positive downlink rate that can always be decoded by $U$, leading to zero-outage of the downlink signal. This is a rather surprising consequence of the features of the multiple access channel and the fixed rate $R_M$. We also consider the case of a simpler, single-user decoder at $U$ with successive interference cancellation. However, with single-user decoder, a positive zero-outage rate exists only when $N_M=1$ and is zero when $N_M>1$. This implies that joint decoding is instrumental in enabling fixed-rate underlay operation.
△ Less
Submitted 30 December, 2014; v1 submitted 28 April, 2014;
originally announced April 2014.
-
Low-Rate Machine-Type Communication via Wireless Device-to-Device (D2D) Links
Authors:
Nuno K. Pratas,
Petar Popovski
Abstract:
Wireless cellular networks feature two emerging technological trends. The first is the direct Device-to-Device (D2D) communications, which enables direct links between the wireless devices that reutilize the cellular spectrum and radio interface. The second is that of Machine-Type Communications (MTC), where the objective is to attach a large number of low-rate low-power devices, termed Machine-Ty…
▽ More
Wireless cellular networks feature two emerging technological trends. The first is the direct Device-to-Device (D2D) communications, which enables direct links between the wireless devices that reutilize the cellular spectrum and radio interface. The second is that of Machine-Type Communications (MTC), where the objective is to attach a large number of low-rate low-power devices, termed Machine-Type Devices (MTDs) to the cellular network. MTDs pose new challenges to the cellular network, one if which is that the low transmission power can lead to outage problems for the cell-edge devices. Another issue imminent to MTC is the \emph{massive access} that can lead to overload of the radio interface. In this paper we explore the opportunity opened by D2D links for supporting MTDs, since it can be desirable to carry the MTC traffic not through direct links to a Base Station, but through a nearby relay. MTC is modeled as a fixed-rate traffic with an outage requirement. We propose two network-assisted D2D schemes that enable the cooperation between MTDs and standard cellular devices, thereby meeting the MTC outage requirements while maximizing the rate of the broadband services for the other devices. The proposed schemes apply the principles Opportunistic Interference Cancellation and the Cognitive Radio's underlaying. We show through analysis and numerical results the gains of the proposed schemes.
△ Less
Submitted 29 May, 2013;
originally announced May 2013.
-
Analysis of the LTE Access Reservation Protocol for Real-Time Traffic
Authors:
Henning Thomsen,
Nuno K. Pratas,
Cedomir Stefanovic,
Petar Popovski
Abstract:
LTE is increasingly seen as a system for serving real-time Machine-to-Machine (M2M) communication needs. The asynchronous M2M user access in LTE is obtained through a two-phase access reservation protocol (contention and data phase). Existing analysis related to these protocols is based on the following assumptions: (1) there are sufficient resources in the data phase for all detected contention t…
▽ More
LTE is increasingly seen as a system for serving real-time Machine-to-Machine (M2M) communication needs. The asynchronous M2M user access in LTE is obtained through a two-phase access reservation protocol (contention and data phase). Existing analysis related to these protocols is based on the following assumptions: (1) there are sufficient resources in the data phase for all detected contention tokens, and (2) the base station is able to detect collisions, i.e., tokens activated by multiple users. These assumptions are not always applicable to LTE - specifically, (1) due to the variable amount of available data resources caused by variable load, and (2) detection of collisions in contention phase may not be possible. All of this affects transmission of real-time M2M traffic, where data packets have to be sent within a deadline and may have only one contention opportunity. We analyze the features of the two-phase LTE reservation protocol and derive its throughput, i.e., the number of successful transmissions in the data phase, when assumptions (1) and (2) do not hold.
△ Less
Submitted 11 June, 2013; v1 submitted 11 January, 2013;
originally announced January 2013.
-
Joint Estimation and Contention-Resolution Protocol for Wireless Random Access
Authors:
Čedomir Stefanović,
Kasper F. Trilingsgaard,
Nuno K. Pratas,
Petar Popovski
Abstract:
We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution of their transmissions. The users independently access the wireless link on a slot basis with a predefined probability, re…
▽ More
We propose a contention-based random-access protocol, designed for wireless networks where the number of users is not a priori known. The protocol operates in rounds divided into equal-duration slots, performing at the same time estimation of the number of users and resolution of their transmissions. The users independently access the wireless link on a slot basis with a predefined probability, resulting in a distribution of user transmissions over slots, based on which the estimation and contention resolution are performed. Specifically, the contention resolution is performed using successive interference cancellation which, coupled with the use of the optimized access probabilities, enables throughputs that are substantially higher than the traditional slotted ALOHA-like protocols. The key feature of the proposed protocol is that the round durations are not a priori set and they are terminated when the estimation/contention-resolution performance reach the satisfactory levels.
△ Less
Submitted 2 October, 2012;
originally announced October 2012.
-
Code-Expanded Random Access for Machine-Type Communications
Authors:
Nuno K. Pratas,
Henning Thomsen,
Cedomir Stefanovic,
Petar Popovski
Abstract:
The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose a novel approach that is able to sustain a wide random access load range, while preserving the physical layer unch…
▽ More
The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose a novel approach that is able to sustain a wide random access load range, while preserving the physical layer unchanged and incurring minor changes in the medium access control layer. The proposed scheme increases the amount of available contention resources, without resorting to the increase of system resources, such as contention sub-frames and preambles. This increase is accomplished by expanding the contention space to the code domain, through the creation of random access codewords. Specifically, in the proposed scheme, users perform random access by transmitting one or none of the available LTE orthogonal preambles in multiple random access sub-frames, thus creating access codewords that are used for contention. In this way, for the same number of random access sub-frames and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the support of an increased number of MTC users. We present the framework and analysis of the proposed code-expanded random access method and show that our approach supports load regions that are beyond the reach of current systems.
△ Less
Submitted 2 July, 2012;
originally announced July 2012.