-
Dynamic Bandwidth Allocation and Edge Caching Optimization for Nonlinear Content Delivery through Flexible Multibeam Satellites
Authors:
Thang X. Vu,
Nicola Maturo,
Symeon Chatzinotas,
Joel Grotz,
Tom Christophory,
Björn Ottersten
Abstract:
The next generation multibeam satellites open up a new way to design satellite communication channels with the full flexibility in bandwidth, transmit power and beam coverage management. In this paper, we exploit the flexible multibeam satellite capabilities and the geographical distribution of users to improve the performance of satellite-assisted edge caching systems. Our aim is to jointly optim…
▽ More
The next generation multibeam satellites open up a new way to design satellite communication channels with the full flexibility in bandwidth, transmit power and beam coverage management. In this paper, we exploit the flexible multibeam satellite capabilities and the geographical distribution of users to improve the performance of satellite-assisted edge caching systems. Our aim is to jointly optimize the bandwidth allocation in multibeam and caching decisions at the edge nodes to address two important problems: i) cache feeding time minimization and ii) cache hits maximization. To tackle the non-convexity of the joint optimization problem, we transform the original problem into a difference-of-convex (DC) form, which is then solved by the proposed iterative algorithm whose convergence to at least a local optimum is theoretically guaranteed. Furthermore, the effectiveness of the proposed design is evaluated under the realistic beams coverage of the satellite SES-14 and Movielens data set. Numerical results show that our proposed joint design can reduce the caching feeding time by 50\% and increase the cache hit ratio (CHR) by 10\% to 20\% compared to existing solutions. Furthermore, we examine the impact of multispot beam and multicarrier wide-beam on the joint design and discuss potential research directions.
△ Less
Submitted 24 January, 2022;
originally announced January 2022.
-
End-to-end Precoding Validation over a Live GEO Satellite Forward Link
Authors:
Jevgenij Krivochiza,
Juan Carlos Merlano Duncan,
Jorge Querol,
Nicola Maturo,
Liz Martinez Marrero,
Stefano Andrenacci,
Jens Krause,
Symeon Chatzinotas
Abstract:
In this paper we demonstrate end-to-end precoded multi-user multiple-input single-output (MU-MISO) communications over a live GEO satellite link. Precoded communications enable full frequency reuse (FFR) schemes in satellite communications (SATCOM) to achieve broader service availability and higher spectrum efficiency than with the conventional four-color (4CR) and two-color (2CR) reuse approaches…
▽ More
In this paper we demonstrate end-to-end precoded multi-user multiple-input single-output (MU-MISO) communications over a live GEO satellite link. Precoded communications enable full frequency reuse (FFR) schemes in satellite communications (SATCOM) to achieve broader service availability and higher spectrum efficiency than with the conventional four-color (4CR) and two-color (2CR) reuse approaches. In this scope, we develop an over-the-air test-bed for end-to-end precoding validations. We use an actual multi-beam satellite to transmit and receive precoded signals using the DVB-S2X standard based gateway and user terminals. The developed system is capable of end-to-end real-time communications over the satellite link including channel measurements and precompensation. It is shown, that by successfully canceling inter-user interference in the actual satellite FFR link precoding brings gains in terms of enhanced SINR and increased system goodput.
△ Less
Submitted 16 January, 2021;
originally announced March 2021.
-
Precoded Cluster Hop** in Multi-Beam High Throughput Satellite Systems
Authors:
Mirza Golam Kibria,
Eva Lagunas,
Nicola Maturo,
Danilo Spano,
Symeon Chatzinotas
Abstract:
Beam-Hop** (BH) and precoding are two trending technologies for the satellite community. While BH enables flexibility to adapt the offered capacity to the heterogeneous demand, precoding aims at boosting the spectral efficiency. In this paper, we consider a high throughput satellite (HTS) system that employs BH in conjunction with precoding. In particular, we propose the concept of Cluster-Hoppi…
▽ More
Beam-Hop** (BH) and precoding are two trending technologies for the satellite community. While BH enables flexibility to adapt the offered capacity to the heterogeneous demand, precoding aims at boosting the spectral efficiency. In this paper, we consider a high throughput satellite (HTS) system that employs BH in conjunction with precoding. In particular, we propose the concept of Cluster-Hop** (CH) that seamlessly combines the BH and precoding paradigms and utilize their individual competencies. The cluster is defined as a set of adjacent beams that are simultaneously illuminated. In addition, we propose an efficient time-space illumination pattern design, where we determine the set of clusters that can be illuminated simultaneously at each hop** event along with the illumination duration. We model the CH time-space illumination pattern design as an integer programming problem which can be efficiently solved. Supporting results based on numerical simulations are provided which validate the effectiveness of the proposed CH concept and time-space illumination pattern design.
△ Less
Submitted 3 May, 2019;
originally announced May 2019.
-
Carrier Aggregation in Multi-Beam High Throughput Satellite Systems
Authors:
Mirza Golam Kibria,
Eva Lagunas,
Nicola Maturo,
Danilo Spano,
Hayder Al-Hraishawi,
Symeon Chatzinotas
Abstract:
Carrier Aggregation (CA) is an integral part of current terrestrial networks. Its ability to enhance the peak data rate, to efficiently utilize the limited available spectrum resources and to satisfy the demand for data-hungry applications has drawn large attention from different wireless network communities. Given the benefits of CA in the terrestrial wireless environment, it is of great interest…
▽ More
Carrier Aggregation (CA) is an integral part of current terrestrial networks. Its ability to enhance the peak data rate, to efficiently utilize the limited available spectrum resources and to satisfy the demand for data-hungry applications has drawn large attention from different wireless network communities. Given the benefits of CA in the terrestrial wireless environment, it is of great interest to analyze and evaluate the potential impact of CA in the satellite domain. In this paper, we study CA in multibeam high throughput satellite systems. We consider both inter-transponder and intra-transponder CA at the satellite payload level of the communication stack, and we address the problem of carrier-user assignment assuming that multiple users can be multiplexed in each carrier. The transmission parameters of different carriers are generated considering the transmission characteristics of carriers in different transponders. In particular, we propose a flexible carrier allocation approach for a CA-enabled multibeam satellite system targeting a proportionally fair user demand satisfaction. Simulation results and analysis shed some light on this rather unexplored scenario and demonstrate the feasibility of the CA in satellite communication systems.
△ Less
Submitted 3 May, 2019;
originally announced May 2019.
-
Architectures and Key Technical Challenges for 5G Systems Incorporating Satellites
Authors:
A. Guidotti,
A. Vanelli-Coralli,
M. Conti,
S. Andrenacci,
S. Chatzinotas,
N. Maturo,
B. Evans,
A. Awoseyila,
A. Ugolini,
T. Foggi,
L. Gaudio,
N. Alagha,
S. Cioni
Abstract:
Satellite Communication systems are a promising solution to extend and complement terrestrial networks in unserved or under-served areas. This aspect is reflected by recent commercial and standardisation endeavours. In particular, 3GPP recently initiated a Study Item for New Radio-based, i.e., 5G, Non-Terrestrial Networks aimed at deploying satellite systems either as a stand-alone solution or as…
▽ More
Satellite Communication systems are a promising solution to extend and complement terrestrial networks in unserved or under-served areas. This aspect is reflected by recent commercial and standardisation endeavours. In particular, 3GPP recently initiated a Study Item for New Radio-based, i.e., 5G, Non-Terrestrial Networks aimed at deploying satellite systems either as a stand-alone solution or as an integration to terrestrial networks in mobile broadband and machine-type communication scenarios. However, typical satellite channel impairments, as large path losses, delays, and Doppler shifts, pose severe challenges to the realisation of a satellite-based NR network. In this paper, based on the architecture options currently being discussed in the standardisation fora, we discuss and assess the impact of the satellite channel characteristics on the physical and Medium Access Control layers, both in terms of transmitted waveforms and procedures for enhanced Mobile BroadBand (eMBB) and NarrowBand-Internet of Things (NB-IoT) applications. The proposed analysis shows that the main technical challenges are related to the PHY/MAC procedures, in particular Random Access (RA), Timing Advance (TA), and Hybrid Automatic Repeat reQuest (HARQ) and, depending on the considered service and architecture, different solutions are proposed.
△ Less
Submitted 6 June, 2018;
originally announced June 2018.
-
On the Error Detection Capability of Combined LDPC and CRC Codes for Space Telecommand Transmissions
Authors:
Marco Baldi,
Nicola Maturo,
Giacomo Ricciutelli,
Franco Chiaraluce
Abstract:
We present a method for estimating the undetected error rate when a cyclic redundancy check (CRC) is performed on the output of the decoder of short low-density parity-check (LDPC) codes. This system is of interest for telecommand links, where new LDPC codes have been designed for updating the current standard. We show that these new LDPC codes combined with CRC are adequate for complying with the…
▽ More
We present a method for estimating the undetected error rate when a cyclic redundancy check (CRC) is performed on the output of the decoder of short low-density parity-check (LDPC) codes. This system is of interest for telecommand links, where new LDPC codes have been designed for updating the current standard. We show that these new LDPC codes combined with CRC are adequate for complying with the stringent requirements of this kind of transmissions in terms of error detection.
△ Less
Submitted 28 May, 2016;
originally announced May 2016.
-
Performance assessment and design of finite length LDPC codes for the Gaussian wiretap channel
Authors:
Marco Baldi,
Giacomo Ricciutelli,
Nicola Maturo,
Franco Chiaraluce
Abstract:
In this work we study the reliability and secrecy performance achievable by practical LDPC codes over the Gaussian wiretap channel. While several works have already addressed this problem in asymptotic conditions, i.e., under the hypothesis of codewords of infinite length, only a few approaches exist for the finite length regime. We propose an approach to measure the performance of practical codes…
▽ More
In this work we study the reliability and secrecy performance achievable by practical LDPC codes over the Gaussian wiretap channel. While several works have already addressed this problem in asymptotic conditions, i.e., under the hypothesis of codewords of infinite length, only a few approaches exist for the finite length regime. We propose an approach to measure the performance of practical codes and compare it with that achievable in asymptotic conditions. Moreover, based on the secrecy metrics we adopt to achieve this target, we propose a code optimization algorithm which allows to design irregular LDPC codes able to approach the ultimate performance limits even at moderately small codeword lengths (in the order of 10000 bits).
△ Less
Submitted 5 June, 2015;
originally announced June 2015.
-
AONT-LT: a Data Protection Scheme for Cloud and Cooperative Storage Systems
Authors:
Marco Baldi,
Nicola Maturo,
Eugenio Montali,
Franco Chiaraluce
Abstract:
We propose a variant of the well-known AONT-RS scheme for dispersed storage systems. The novelty consists in replacing the Reed-Solomon code with rateless Luby transform codes. The resulting system, named AONT-LT, is able to improve the performance by dispersing the data over an arbitrarily large number of storage nodes while ensuring limited complexity. The proposed solution is particularly suita…
▽ More
We propose a variant of the well-known AONT-RS scheme for dispersed storage systems. The novelty consists in replacing the Reed-Solomon code with rateless Luby transform codes. The resulting system, named AONT-LT, is able to improve the performance by dispersing the data over an arbitrarily large number of storage nodes while ensuring limited complexity. The proposed solution is particularly suitable in the case of cooperative storage systems. It is shown that while the AONT-RS scheme requires the adoption of fragmentation for achieving widespread distribution, thus penalizing the performance, the new AONT-LT scheme can exploit variable length codes which allow to achieve very good performance and scalability.
△ Less
Submitted 29 May, 2014;
originally announced May 2014.
-
Practical LDPC coded modulation schemes for the fading broadcast channel with confidential messages
Authors:
Marco Baldi,
Nicola Maturo,
Giacomo Ricciutelli,
Franco Chiaraluce
Abstract:
The broadcast channel with confidential messages is a well studied scenario from the theoretical standpoint, but there is still lack of practical schemes able to achieve some fixed level of reliability and security over such a channel. In this paper, we consider a quasi-static fading channel in which both public and private messages must be sent from the transmitter to the receivers, and we aim at…
▽ More
The broadcast channel with confidential messages is a well studied scenario from the theoretical standpoint, but there is still lack of practical schemes able to achieve some fixed level of reliability and security over such a channel. In this paper, we consider a quasi-static fading channel in which both public and private messages must be sent from the transmitter to the receivers, and we aim at designing suitable coding and modulation schemes to achieve such a target. For this purpose, we adopt the error rate as a metric, by considering that reliability (security) is achieved when a sufficiently low (high) error rate is experienced at the receiving side. We show that some conditions exist on the system feasibility, and that some outage probability must be tolerated to cope with the fading nature of the channel. The proposed solution exploits low-density parity-check codes with unequal error protection, which are able to guarantee two different levels of protection against noise for the public and the private information, in conjunction with different modulation schemes for the public and the private message bits.
△ Less
Submitted 11 April, 2014;
originally announced April 2014.
-
LDPC coded transmissions over the Gaussian broadcast channel with confidential messages
Authors:
Marco Baldi,
Nicola Maturo,
Giacomo Ricciutelli,
Franco Chiaraluce
Abstract:
We design and assess some practical low-density parity-check (LDPC) coded transmission schemes for the Gaussian broadcast channel with confidential messages (BCC). This channel model is different from the classical wiretap channel model as the unauthorized receiver (Eve) must be able to decode some part of the information. Hence, the reliability and security targets are different from those of the…
▽ More
We design and assess some practical low-density parity-check (LDPC) coded transmission schemes for the Gaussian broadcast channel with confidential messages (BCC). This channel model is different from the classical wiretap channel model as the unauthorized receiver (Eve) must be able to decode some part of the information. Hence, the reliability and security targets are different from those of the wiretap channel. In order to design and assess practical coding schemes, we use the error rate as a metric of the performance achieved by the authorized receiver (Bob) and the unauthorized receiver (Eve). We study the system feasibility, and show that two different levels of protection against noise are required on the public and the secret messages. This can be achieved in two ways: i) by using LDPC codes with unequal error protection (UEP) of the transmitted information bits or ii) by using two classical non-UEP LDPC codes with different rates. We compare these two approaches and show that, for the considered examples, the solution exploiting UEP LDPC codes is more efficient than that using non-UEP LDPC codes.
△ Less
Submitted 10 April, 2014;
originally announced April 2014.
-
Advanced coding schemes against jamming in telecommand links
Authors:
Marco Baldi,
Marco Bianchi,
Franco Chiaraluce,
Roberto Garello,
Nicola Maturo,
Ignacio Aguilar Sanchez,
Stefano Cioni
Abstract:
The aim of this paper is to study the performance of some coding schemes recently proposed for updating the TC channel coding standard for space applications, in the presence of jamming. Besides low-density parity-check codes, that appear as the most eligible candidates, we also consider other solutions based on parallel turbo codes and extended BCH codes. We show that all these schemes offer very…
▽ More
The aim of this paper is to study the performance of some coding schemes recently proposed for updating the TC channel coding standard for space applications, in the presence of jamming. Besides low-density parity-check codes, that appear as the most eligible candidates, we also consider other solutions based on parallel turbo codes and extended BCH codes. We show that all these schemes offer very good performance, which approaches the theoretical limits achievable.
△ Less
Submitted 2 October, 2013;
originally announced October 2013.
-
Improving the efficiency of the LDPC code-based McEliece cryptosystem through irregular codes
Authors:
Marco Baldi,
Marco Bianchi,
Nicola Maturo,
Franco Chiaraluce
Abstract:
We consider the framework of the McEliece cryptosystem based on LDPC codes, which is a promising post-quantum alternative to classical public key cryptosystems. The use of LDPC codes in this context allows to achieve good security levels with very compact keys, which is an important advantage over the classical McEliece cryptosystem based on Goppa codes. However, only regular LDPC codes have been…
▽ More
We consider the framework of the McEliece cryptosystem based on LDPC codes, which is a promising post-quantum alternative to classical public key cryptosystems. The use of LDPC codes in this context allows to achieve good security levels with very compact keys, which is an important advantage over the classical McEliece cryptosystem based on Goppa codes. However, only regular LDPC codes have been considered up to now, while some further improvement can be achieved by using irregular LDPC codes, which are known to achieve better error correction performance than regular LDPC codes. This is shown in this paper, for the first time at our knowledge. The possible use of irregular transformation matrices is also investigated, which further increases the efficiency of the system, especially in regard to the public key size.
△ Less
Submitted 9 July, 2013; v1 submitted 17 June, 2013;
originally announced June 2013.
-
Low-power Secret-key Agreement over OFDM
Authors:
Francesco Renna,
Nicola Laurenti,
Stefano Tomasin,
Marco Baldi,
Nicola Maturo,
Marco Bianchi,
Franco Chiaraluce,
Matthieu Bloch
Abstract:
Information-theoretic secret-key agreement is perhaps the most practically feasible mechanism that provides unconditional security at the physical layer to date. In this paper, we consider the problem of secret-key agreement by sharing randomness at low power over an orthogonal frequency division multiplexing (OFDM) link, in the presence of an eavesdropper. The low power assumption greatly simplif…
▽ More
Information-theoretic secret-key agreement is perhaps the most practically feasible mechanism that provides unconditional security at the physical layer to date. In this paper, we consider the problem of secret-key agreement by sharing randomness at low power over an orthogonal frequency division multiplexing (OFDM) link, in the presence of an eavesdropper. The low power assumption greatly simplifies the design of the randomness sharing scheme, even in a fading channel scenario. We assess the performance of the proposed system in terms of secrecy key rate and show that a practical approach to key sharing is obtained by using low-density parity check (LDPC) codes for information reconciliation. Numerical results confirm the merits of the proposed approach as a feasible and practical solution. Moreover, the outage formulation allows to implement secret-key agreement even when only statistical knowledge of the eavesdropper channel is available.
△ Less
Submitted 19 February, 2013;
originally announced February 2013.
-
A Physical Layer Secured Key Distribution Technique for IEEE 802.11g Wireless Networks
Authors:
Marco Baldi,
Marco Bianchi,
Nicola Maturo,
Franco Chiaraluce
Abstract:
Key distribution and renewing in wireless local area networks is a crucial issue to guarantee that unauthorized users are prevented from accessing the network. In this paper, we propose a technique for allowing an automatic bootstrap and periodic renewing of the network key by exploiting physical layer security principles, that is, the inherent differences among transmission channels. The proposed…
▽ More
Key distribution and renewing in wireless local area networks is a crucial issue to guarantee that unauthorized users are prevented from accessing the network. In this paper, we propose a technique for allowing an automatic bootstrap and periodic renewing of the network key by exploiting physical layer security principles, that is, the inherent differences among transmission channels. The proposed technique is based on scrambling of groups of consecutive packets and does not need the use of an initial authentication nor automatic repeat request protocols. We present a modification of the scrambling circuits included in the IEEE 802.11g standard which allows for a suitable error propagation at the unauthorized receiver, thus achieving physical layer security.
△ Less
Submitted 20 December, 2012;
originally announced December 2012.