-
Slotted Aloha for Optical Wireless Communications in Internet of Underwater Things
Authors:
Milica Petkovic,
Sotiris A. Tegos,
Panagiotis D. Diamantoulakis,
Dejan Vukobratovic,
Erdal Panayirci,
Cedomir Stefanovic,
George K. Karagiannidis
Abstract:
In this work, we design and analyse a Slotted ALOHA (SA) solution for Optical Wireless Communication (OWC)-based Internet of Underwater Things (IoUT). In the proposed system, user devices exchange data with an access point (AP) which exploits the capture effect. The space spanned by the IoUT nodes is three-dimensional, i.e., users are located in half-sphere centered at the AP placed at the bottom…
▽ More
In this work, we design and analyse a Slotted ALOHA (SA) solution for Optical Wireless Communication (OWC)-based Internet of Underwater Things (IoUT). In the proposed system, user devices exchange data with an access point (AP) which exploits the capture effect. The space spanned by the IoUT nodes is three-dimensional, i.e., users are located in half-sphere centered at the AP placed at the bottom of a floating object at the water surface level. The analytical expressions for the system throughput and reliability expressed in terms of the outage probability are derived. Based on the simulated signal-to-noise-and-interference-ratio statistics and derived analytical expressions, we present numerical results that investigate the trade-off between the system performance and the IoUT system parameters, such as the number of users, activation probability and type of water medium. The presented conclusions provide valuable insights into the design of an SA-based solution for IoUT communications.
△ Less
Submitted 1 December, 2023;
originally announced December 2023.
-
A Deep Reinforcement Learning Approach for Improving Age of Information in Mission-Critical IoT
Authors:
Hossam Farag,
Mikael Gidlund,
Cedomir Stefanovic
Abstract:
The emerging mission-critical Internet of Things (IoT) play a vital role in remote healthcare, haptic interaction, and industrial automation, where timely delivery of status updates is crucial. The Age of Information (AoI) is an effective metric to capture and evaluate information freshness at the destination. A system design based solely on the optimization of the average AoI might not be adequat…
▽ More
The emerging mission-critical Internet of Things (IoT) play a vital role in remote healthcare, haptic interaction, and industrial automation, where timely delivery of status updates is crucial. The Age of Information (AoI) is an effective metric to capture and evaluate information freshness at the destination. A system design based solely on the optimization of the average AoI might not be adequate to capture the requirements of mission-critical applications, since averaging eliminates the effects of extreme events. In this paper, we introduce a Deep Reinforcement Learning (DRL)-based algorithm to improve AoI in mission-critical IoT applications. The objective is to minimize an AoI-based metric consisting of the weighted sum of the average AoI and the probability of exceeding an AoI threshold. We utilize the actor-critic method to train the algorithm to achieve optimized scheduling policy to solve the formulated problem. The performance of our proposed method is evaluated in a simulated setup and the results show a significant improvement in terms of the average AoI and the AoI violation probability compared to the related-work.
△ Less
Submitted 23 November, 2023;
originally announced November 2023.
-
A TETRA-based System for Remote-Health Monitoring of First Responders: Peak AoI Assessment in Direct and Trunked Mode
Authors:
Hossam Farag,
Aleksandar Vujic,
Milos Kostic,
Goran Bijelic,
Cedomir Stefanovic
Abstract:
In this paper, we study peak age of information (PAoI) performance of a novel IoT solution for remote health-monitoring of first responders over TErrestrial Trunked RAdio (TETRA) links. The solution features a set of sensors embedded in a smart garment that periodically record and send physiological parameters of first responders to a remote agent. The received data is analyzed by the remote agent…
▽ More
In this paper, we study peak age of information (PAoI) performance of a novel IoT solution for remote health-monitoring of first responders over TErrestrial Trunked RAdio (TETRA) links. The solution features a set of sensors embedded in a smart garment that periodically record and send physiological parameters of first responders to a remote agent. The received data is analyzed by the remote agent, which feeds back notifications and warnings to the first responders in the form of electrotactile stimuli. The communication in the system is performed over the TETRA Short Data Service (SDS), which is the default option for the development of third-party applications and which has rather limited capabilities. The choice of the PAoI as the parameter of interest is motivated by its suitable to measure data freshness in IoT applications with periodic monitoring. We derive closed-form expressions of PAoI for different packet-management schemes allowed by the TETRA standard, and verify the analytical results through extensive simulations under varying message generation rates. Our results provide important insights on the expected PAoI performance, which can be used for the system design guidelines. To the best of our knowledge, this is the first work that analyzes AoI performance of TETRA networks.
△ Less
Submitted 23 November, 2023;
originally announced November 2023.
-
On the Analysis of AoI-Reliability Tradeoff in Heterogeneous IIoT Networks
Authors:
Hossam Farag,
Syed Muhammad Ali,
Cedomir Stefanovic
Abstract:
Age of information (AoI) and reliability are two critical metrics to support real-time applications in Industrial Internet of Things (IIoT). These metrics reflect different concepts of timely delivery of sensor information. Monitoring traffic serves to maintain fresh status updates, expressed in a low AoI, which is important for proper control and actuation actions. On the other hand, safety-criti…
▽ More
Age of information (AoI) and reliability are two critical metrics to support real-time applications in Industrial Internet of Things (IIoT). These metrics reflect different concepts of timely delivery of sensor information. Monitoring traffic serves to maintain fresh status updates, expressed in a low AoI, which is important for proper control and actuation actions. On the other hand, safety-critical information, e.g., emergency alarms, is generated sporadically and must be delivered with high reliability within a predefined deadline. In this work, we investigate the AoI-reliability trade-off in a real-time monitoring scenario that supports two traffic flows, namely AoI-oriented traffic and deadline-oriented traffic. Both traffic flows are transmitted to a central controller over an unreliable shared channel. We derive expressions of the average AoI for the AoI-oriented traffic and reliability, represented by Packet Loss Probability (PLP), for the deadline-oriented traffic using Discrete-Time Markov Chain (DTMC). We also conduct discrete-event simulations in MATLAB to validate the analytical results and evaluate the interaction between the two types of traffic flows. The results clearly demonstrate the tradeoff between the AoI and PLP in such heterogeneous IIoT networks and give insights on how to configure the network to achieve a target pair of AoI and PLP.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Timely and Efficient Information Delivery in Real-Time Industrial IoT Networks
Authors:
Hossam Farag,
Dejan Vukobratovic,
Andrea Munari,
Cedomir Stefanovic
Abstract:
Enabling real-time communication in Industrial Internet of Things (IIoT) networks is crucial to support autonomous, self-organized and re-configurable industrial automation for Industry 4.0 and the forthcoming Industry 5.0. In this paper, we consider a SIC-assisted real-time IIoT network, in which sensor nodes generate reports according to an event-generation probability that is specific for the m…
▽ More
Enabling real-time communication in Industrial Internet of Things (IIoT) networks is crucial to support autonomous, self-organized and re-configurable industrial automation for Industry 4.0 and the forthcoming Industry 5.0. In this paper, we consider a SIC-assisted real-time IIoT network, in which sensor nodes generate reports according to an event-generation probability that is specific for the monitored phenomena. The reports are delivered over a block-fading channel to a common Access Point (AP) in slotted ALOHA fashion, which leverages the imbalances in the received powers among the contending users and applies successive interference cancellation (SIC) to decode user packets from the collisions. We provide an extensive analytical treatment of the setup, deriving the Age of Information (AoI), throughput and deadline violation probability, when the AP has access to both the perfect as well as the imperfect channel-state information. We show that adopting SIC improves all the performance parameters with respect to the standard slotted ALOHA, as well as to an age-dependent access method. The analytical results agree with the simulation based ones, demonstrating that investing in the SIC capability at the receiver enables this simple access method to support timely and efficient information delivery in IIoT networks.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
AA-DL: AoI-Aware Deep Learning Approach for D2D-Assisted Industrial IoT
Authors:
Hossam Farag,
Mohamed Ragab,
Cedomir Stefanovic
Abstract:
In real-time Industrial Internet of Things (IIoT), e.g., monitoring and control scenarios, the freshness of data is crucial to maintain the system functionality and stability. In this paper, we propose an AoI-Aware Deep Learning (AA-DL) approach to minimize the Peak Age of Information (PAoI) in D2D-assisted IIoT networks. Particularly, we analyzed the success probability and the average PAoI via s…
▽ More
In real-time Industrial Internet of Things (IIoT), e.g., monitoring and control scenarios, the freshness of data is crucial to maintain the system functionality and stability. In this paper, we propose an AoI-Aware Deep Learning (AA-DL) approach to minimize the Peak Age of Information (PAoI) in D2D-assisted IIoT networks. Particularly, we analyzed the success probability and the average PAoI via stochastic geometry, and formulate an optimization problem with the objective to find the optimal scheduling policy that minimizes PAoI. In order to solve the non-convex scheduling problem, we develop a Neural Network (NN) structure that exploits the Geographic Location Information (GLI) along with feedback stages to perform unsupervised learning over randomly deployed networks. Our motivation is based on the observation that in various transmission contexts, the wireless channel intensity is mainly influenced by distancedependant path loss, which could be calculated using the GLI of each link. The performance of the AA-DL method is evaluated via numerical results that demonstrate the effectiveness of our proposed method to improve the PAoI performance compared to a recent benchmark while maintains lower complexity against the conventional iterative optimization method.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
An Advanced Tree Algorithm with Interference Cancellation in Uplink and Downlink
Authors:
Quirin Vogel,
Yash Deshpande,
Čedomir Stefanović,
Wolfgang Kellerer
Abstract:
In this paper, we propose Advanced Tree-algorithm with Interference Cancellation (ATIC), a variant of binary tree-algorithm with successive interference cancellation (SICTA) introduced by Yu and Giannakis. ATIC assumes that Interference Cancellation (IC) can be performed both by the access point (AP), as in SICTA, but also by the users. Specifically, after every collision slot, the AP broadcasts t…
▽ More
In this paper, we propose Advanced Tree-algorithm with Interference Cancellation (ATIC), a variant of binary tree-algorithm with successive interference cancellation (SICTA) introduced by Yu and Giannakis. ATIC assumes that Interference Cancellation (IC) can be performed both by the access point (AP), as in SICTA, but also by the users. Specifically, after every collision slot, the AP broadcasts the observed collision as feedback. Users who participated in the collision then attempt to perform IC by subtracting their transmissions from the collision signal. This way, the users can resolve collisions of degree 2 and, using a simple distributed arbitration algorithm based on user IDs, ensure that the next slot will contain just a single transmission. We show that ATIC reaches the asymptotic throughput of 0.924 as the number of initially collided users tends to infinity and reduces the number of collisions and packet delay. We also compare ATIC with other tree algorithms and indicate the extra feedback resources it requires.
△ Less
Submitted 22 November, 2023; v1 submitted 29 August, 2023;
originally announced August 2023.
-
Analysis of d-ary Tree Algorithms with Successive Interference Cancellation
Authors:
Quirin Vogel,
Yash Deshpande,
Cedomir Stefanović,
Wolfgang Kellerer
Abstract:
In this article, we calculate the mean throughput, number of collisions, successes, and idle slots for random tree algorithms with successive interference cancellation. Except for the case of the throughput for the binary tree, all the results are new. We furthermore disprove the claim that only the binary tree maximises throughput. Our method works with many observables and can be used as a bluep…
▽ More
In this article, we calculate the mean throughput, number of collisions, successes, and idle slots for random tree algorithms with successive interference cancellation. Except for the case of the throughput for the binary tree, all the results are new. We furthermore disprove the claim that only the binary tree maximises throughput. Our method works with many observables and can be used as a blueprint for further analysis.
△ Less
Submitted 16 February, 2023;
originally announced February 2023.
-
On d-ary tree algorithms with successive interference cancellation
Authors:
Yash Deshpande,
Cedomir Stefanovic,
H. Murat Gürsu,
Wolfgang Kellerer
Abstract:
In this paper, we outline the approach for the derivation of the length of the collision resolution interval for d-ary tree algorithms (TA) with gated access and successive interference cancellation (SIC), conditioned on the number of the contending users. This is the basic performance parameter for TA with gated access. We identify the deficiencies of the analysis performed in the seminal paper o…
▽ More
In this paper, we outline the approach for the derivation of the length of the collision resolution interval for d-ary tree algorithms (TA) with gated access and successive interference cancellation (SIC), conditioned on the number of the contending users. This is the basic performance parameter for TA with gated access. We identify the deficiencies of the analysis performed in the seminal paper on TA with SIC by Yu and Giannakis, showing that their analysis is correct only for binary splitting, i.e. for d=2. We also provide some insightful results on the stable throughput that can be achieved for different values of d.
△ Less
Submitted 8 August, 2022;
originally announced August 2022.
-
Multi-Objective Provisioning of Network Slices using Deep Reinforcement Learning
Authors:
Chien-Cheng Wu,
Vasilis Friderikos,
Cedomir Stefanovic
Abstract:
Network Slicing (NS) is crucial for efficiently enabling divergent network applications in next generation networks. Nonetheless, the complex Quality of Service (QoS) requirements and diverse heterogeneity in network services entails high computational time for Network Slice Provisioning (NSP) optimization. The legacy optimization methods are challenging to meet the low latency and high reliabilit…
▽ More
Network Slicing (NS) is crucial for efficiently enabling divergent network applications in next generation networks. Nonetheless, the complex Quality of Service (QoS) requirements and diverse heterogeneity in network services entails high computational time for Network Slice Provisioning (NSP) optimization. The legacy optimization methods are challenging to meet the low latency and high reliability of network applications. To this end, we model the real-time NSP as an Online Network Slice Provisioning (ONSP) problem. Specifically, we formulate the ONSP problem as an online Multi-Objective Integer Programming Optimization (MOIPO) problem. Then, we approximate the solution of the MOIPO problem by applying the Proximal Policy Optimization (PPO) method to the traffic demand prediction. Our simulation results show the effectiveness of the proposed method compared to the state-of-the-art MOIPO solvers with a lower SLA violation rate and network operation cost.
△ Less
Submitted 14 August, 2022; v1 submitted 27 July, 2022;
originally announced July 2022.
-
Distributed Backlog-Aware D2D Communication for Heterogeneous IIoT Applications
Authors:
Hossam Farag,
Cedomir Stefanovic,
Mikael Gidlund
Abstract:
Delay and Age-of-Information (AoI) are two crucial performance metrics for emerging time-sensitive applications in Industrial Internet of Things (IIoT). In order to achieve optimal performance, studying the inherent interplay between these two parameters in non-trivial task. In this work, we consider a Device-to-Device (D2D)-based heterogeneous IIoT network that supports two types of traffic flows…
▽ More
Delay and Age-of-Information (AoI) are two crucial performance metrics for emerging time-sensitive applications in Industrial Internet of Things (IIoT). In order to achieve optimal performance, studying the inherent interplay between these two parameters in non-trivial task. In this work, we consider a Device-to-Device (D2D)-based heterogeneous IIoT network that supports two types of traffic flows, namely AoI-orientated. First, we introduce a distributed backlog-aware random access protocol that allows the AoI-orientated nodes to opportunistically access the channel based on the queue occupancy of the delay-oriented node. Then, we develop an analytical framework to evaluate the average delay and the average AoI, and formulate an optimization problem to minimize the AoI under a given delay constraint. Finally, we provide numerical results to demonstrate the impact of different network parameters on the performance in terms of the average delay and the average AoI. We also give the numerical solutions of the optimal parameters that minimize the AoI subject to a delay constraint.
△ Less
Submitted 15 July, 2022;
originally announced July 2022.
-
Statistical Characterization of Closed-Loop Latency at the Mobile Edge
Authors:
Suraj Suman,
Federico Chiariotti,
Cedomir Stefanovic,
Strahinja Dosen,
Petar Popovski
Abstract:
The stringent timing and reliability requirements in mission-critical applications require a detailed statistical characterization of the latency. Teleoperation is a representative use case, in which a human operator (HO) remotely controls a robot by exchanging command and feedback signals. We present a framework to analyze the latency of a closed-loop teleoperation system consisting of three enti…
▽ More
The stringent timing and reliability requirements in mission-critical applications require a detailed statistical characterization of the latency. Teleoperation is a representative use case, in which a human operator (HO) remotely controls a robot by exchanging command and feedback signals. We present a framework to analyze the latency of a closed-loop teleoperation system consisting of three entities: HO, robot located in remote environment, and a Base Station (BS) with Mobile edge Computing (MEC) capabilities. A model of each component of the system is used to analyze the closed-loop latency and decide upon the optimal compression strategy. The closed-form expression of the distribution of the closed-loop latency is difficult to estimate, such that suitable upper and lower bounds are obtained. We formulate a non-convex optimization problem to minimize the closed-loop latency. Using the obtained upper and lower bound on the closed-loop latency, a computationally efficient procedure to optimize the closed-loop latency is presented. The simulation results reveal that compression of sensing data is not always beneficial, while system design based on average performance leads to under-provisioning and may cause performance degradation. The applicability of the proposed analysis is much wider than teleoperation, for systems whose latency budget consists of many components.
△ Less
Submitted 11 May, 2022;
originally announced May 2022.
-
Slotted Aloha with Capture for OWC-based IoT: Finite Block-Length Performance Analysis
Authors:
Tijana Devaja,
Milica Petkovic,
Francisco J. Escribano,
Cedomir Stefanovic,
Dejan Vukobratovic
Abstract:
In this paper, we propose a Slotted ALOHA (SA)-inspired solution for an indoor optical wireless communication (OWC)-based Internet of Things (IoT) system. Assuming that the OWC receiver exploits the capture effect, we are interested in the derivation of error probability of decoding a short-length data packet originating from a randomly selected OWC IoT transmitter. The presented OWC system analys…
▽ More
In this paper, we propose a Slotted ALOHA (SA)-inspired solution for an indoor optical wireless communication (OWC)-based Internet of Things (IoT) system. Assuming that the OWC receiver exploits the capture effect, we are interested in the derivation of error probability of decoding a short-length data packet originating from a randomly selected OWC IoT transmitter. The presented OWC system analysis rests on the derivation of the signal-to-noise-and-interference-ratio (SINR) statistics and usage of finite block-length (FBL) information theory, from which relevant error probability and throughput is derived. Using the derived expressions, we obtain numerical results which are further utilized to characterize the trade-offs between the system performance and the OWC system setup parameters. The indoor OWC-based system geometry plays an important role in the system performance, thus the presented results can be used as a guideline for the system design to optimize the performance of the SA-based random access protocol.
△ Less
Submitted 16 November, 2022; v1 submitted 5 May, 2022;
originally announced May 2022.
-
Deterministic Patterns for Multiple Access with Latency and Reliability Guarantees
Authors:
Radosław Kotaba,
Roope Vehkalahti,
Čedomir Stefanović,
Olav Tirkkonen,
Petar Popovski
Abstract:
We study a scenario in which multiple uncoordinated devices aim to achieve reliable transmissions within a given time frame. The devices are intermittently active and access a shared pool of channel resources in a grant-free manner by utilizing multiple transmissions (K-repetition coding). This allows them to achieve diversity and improve the reliability within a certain latency constraint. We foc…
▽ More
We study a scenario in which multiple uncoordinated devices aim to achieve reliable transmissions within a given time frame. The devices are intermittently active and access a shared pool of channel resources in a grant-free manner by utilizing multiple transmissions (K-repetition coding). This allows them to achieve diversity and improve the reliability within a certain latency constraint. We focus on two access methods: one where devices choose K slots at random and another one where the access patterns are deterministic and follow a specific code design, namely the Steiner System. We analyze the problem under two signal models that involve different complexity for the receiver. First, collision model is considered, where only interference-free transmissions can be used and combined. Second, a model treating interference as noise is analyzed, where the receiver is capable of utilizing all K replicas, applying maximum ratio combining (MRC). For both signal models, we investigate receivers with and without successive interference cancellation (SIC). We develop approximations and bounds for the outage probabilities that very closely match simulation results. Overall, we show that deterministic access patterns have the potential to significantly outperform random selection in terms of reliability. Furthermore, deterministic access patterns offer a simplified system design.
△ Less
Submitted 18 April, 2024; v1 submitted 20 February, 2022;
originally announced February 2022.
-
Design of AoI-Aware 5G Uplink Scheduler UsingReinforcement Learning
Authors:
Chien-Cheng Wu,
Petar Popovski,
Zheng-Hua Tan,
Cedomir Stefanovic
Abstract:
Age of Information (AoI) reflects the time that is elapsed from the generation of a packet by a 5G user equipment(UE) to the reception of the packet by a controller. A design of an AoI-aware radio resource scheduler for UEs via reinforcement learning is proposed in this paper. In this paper, we consider a remote control environment in which a number of UEs are transmitting time-sensitive measureme…
▽ More
Age of Information (AoI) reflects the time that is elapsed from the generation of a packet by a 5G user equipment(UE) to the reception of the packet by a controller. A design of an AoI-aware radio resource scheduler for UEs via reinforcement learning is proposed in this paper. In this paper, we consider a remote control environment in which a number of UEs are transmitting time-sensitive measurements to a remote controller. We consider the AoI minimization problem and formulate the problem as a trade-off between minimizing the sum of the expected AoI of all UEs and maximizing the throughput of the network. Inspired by the success of machine learning in solving large networking problems at low complexity, we develop a reinforcement learning-based method to solve the formulated problem. We used the state-of-the-art proximal policy optimization algorithm to solve this problem. Our simulation results showthat the proposed algorithm outperforms the considered baselines in terms of minimizing the expected AoI while maintaining the network throughput.
△ Less
Submitted 19 October, 2021;
originally announced October 2021.
-
Arctic connectivity: A frugal approach to infrastructural development
Authors:
Mette Simonsen Abildgaard,
Carina Ren,
Israel Leyva-Mayorga,
Cedomir Stefanovic,
Beatriz Soret,
Petar Popovski
Abstract:
As the Arctic is heating up, so are efforts to strengthen connectivity within the region, but also to enhance the connections from remote settlements to the global networks of trade as well as sociality. With global interest in the Arctic on the rise, it becomes increasingly relevant to ensure that investments in arctic infrastructure actually serve the people of the Arctic, while promoting indust…
▽ More
As the Arctic is heating up, so are efforts to strengthen connectivity within the region, but also to enhance the connections from remote settlements to the global networks of trade as well as sociality. With global interest in the Arctic on the rise, it becomes increasingly relevant to ensure that investments in arctic infrastructure actually serve the people of the Arctic, while promoting industrial and commercial innovation in the region through widespread access to broadband and Internet of Things (IoT) services. This calls for interdisciplinary research strategies that are able to connect and integrate technological and societal approaches, which are commonly applied separately and in isolation from one another. In this article, we propose an interdisciplinary collaborative research agenda for Arctic connectivity. Drawing on examples from Greenland, we stress the need for localized knowledge to design valuable and cost-effective connectivity solutions that cover the needs for everyday life and may also provide a new set of collaborative connectivity tools for innovation at an international level. Such solutions, termed 'frugal connectivity', are vital for the development of connected Arctic communities.
△ Less
Submitted 30 August, 2021;
originally announced August 2021.
-
Tree-Algorithms with Multi-Packet Reception and Successive Interference Cancellation
Authors:
Cedomir Stefanović,
Yash Deshpande,
H. Murat Gürsu,
Wolfgang Kellerer
Abstract:
In this paper, we perform a thorough analysis of tree-algorithms with multi-packet reception (MPR) and successive interference cancellation (SIC), showing a number of novel results. We first derive the basic performance parameters, which are the expected length of the collision resolution interval and the normalized throughput, conditioned on the number of contending users. We then study their asy…
▽ More
In this paper, we perform a thorough analysis of tree-algorithms with multi-packet reception (MPR) and successive interference cancellation (SIC), showing a number of novel results. We first derive the basic performance parameters, which are the expected length of the collision resolution interval and the normalized throughput, conditioned on the number of contending users. We then study their asymptotic behaviour, identifying an oscillatory component that amplifies with the increase in MPR. In the next step, we derive the throughput for the gated and windowed access, assuming Poisson arrivals. We show that for windowed access, the bound on maximum stable normalized throughput increases with the increase in MPR. his implies that investing in advanced physical capabilities, i.e., MPR and SIC pays off from the perspective of the medium access control algorithm.
△ Less
Submitted 10 August, 2022; v1 submitted 2 August, 2021;
originally announced August 2021.
-
Reliability Analysis of Slotted Aloha with Capture for an OWC-based IoT system
Authors:
Milica Petkovic,
Tijana Devaja,
Dejan Vukobratovic,
Francisco J. Escribano,
Cedomir Stefanovic
Abstract:
In this article, we consider a random access scheme for an indoor Internet of Things (IoT) framework that uses optical wireless communication (OWC). We focus on a Slotted ALOHA (SA)-based solution where a number of OWC IoT users contend to send data to a central OWC receiver. In any given slot, and for a randomly selected active user, we consider the reliability of decoding the user's data packet…
▽ More
In this article, we consider a random access scheme for an indoor Internet of Things (IoT) framework that uses optical wireless communication (OWC). We focus on a Slotted ALOHA (SA)-based solution where a number of OWC IoT users contend to send data to a central OWC receiver. In any given slot, and for a randomly selected active user, we consider the reliability of decoding the user's data packet at the receiver. This is done by deriving the signal-to-noise-and-interference-ratio (SINR) statistics from a randomly chosen user and evaluating the probability that the user's SINR is below a given threshold. By placing our analysis in the context of an indoor OWC IoT uplink setup, and employing the standard OWC channel model, we investigate the trade-offs between the reliability and the OWC system parameters such as the cell area or the transmitter's semi-angle. We obtain valuable insights into the design of an SA-based random access solution for a typical indoor OWC cell.
△ Less
Submitted 15 July, 2021;
originally announced July 2021.
-
Remote Health-Monitoring of First Responders over TETRA Links
Authors:
Hossam Farag,
Aleksandar Vujic,
Milos Kostic,
Goran Bijelic,
Cedomir Stefanovic
Abstract:
In this paper, we present a system for remote health-monitoring of first responders over TETRA radio links. The system features a smart garment that periodically records and sends physiological parameters of first responders to a remote agent, which processes the recordings and feeds back the health-status notifications and warnings in the form of electrotactile stimuli. The choice of TETRA as the…
▽ More
In this paper, we present a system for remote health-monitoring of first responders over TETRA radio links. The system features a smart garment that periodically records and sends physiological parameters of first responders to a remote agent, which processes the recordings and feeds back the health-status notifications and warnings in the form of electrotactile stimuli. The choice of TETRA as the connectivity solution is driven by its routine use by first responders all over the world, thus representing a convenient and economically-effective connectivity basis. Although the support for data communications in TETRA is rather limited and in practice reduced to the Short Data Service, we show that TETRA can serve the intended purpose in the considered scenario, achieving tolerable delay and message-loss performance. Moreover, when the system is examined and optimized in terms of the peak Age-of-Information, a metric suitable to characterize the quasi-periodic nature of the monitoring process, its performance becomes rather favorable, enabling timely monitoring of the first responders' health status.
△ Less
Submitted 17 June, 2021;
originally announced June 2021.
-
Congestion-Aware Routing in Dynamic IoT Networks: A Reinforcement Learning Approach
Authors:
Hossam Farag,
Cedomir Stefanovic
Abstract:
The innovative services empowered by the Internet of Things (IoT) require a seamless and reliable wireless infrastructure that enables communications within heterogeneous and dynamic low-power and lossy networks (LLNs). The Routing Protocol for LLNs (RPL) was designed to meet the communication requirements of a wide range of IoT application domains. However, a load balancing problem exists in RPL…
▽ More
The innovative services empowered by the Internet of Things (IoT) require a seamless and reliable wireless infrastructure that enables communications within heterogeneous and dynamic low-power and lossy networks (LLNs). The Routing Protocol for LLNs (RPL) was designed to meet the communication requirements of a wide range of IoT application domains. However, a load balancing problem exists in RPL under heavy traffic-load scenarios, degrading the network performance in terms of delay and packet delivery. In this paper, we tackle the problem of load-balancing in RPL networks using a reinforcement-learning framework. The proposed method adopts Q-learning at each node to learn an optimal parent selection policy based on the dynamic network conditions. Each node maintains the routing information of its neighbours as Q-values that represent a composite routing cost as a function of the congestion level, the link-quality and the hop-distance. The Q-values are updated continuously exploiting the existing RPL signalling mechanism. The performance of the proposed approach is evaluated through extensive simulations and compared with the existing work to demonstrate its effectiveness. The results show that the proposed method substantially improves network performance in terms of packet delivery and average delay with a marginal increase in the signalling frequency.
△ Less
Submitted 20 May, 2021;
originally announced May 2021.
-
RAN Slicing Performance Trade-offs: Timing versus Throughput Requirements
Authors:
Federico Chiariotti,
Israel Leyva-Mayorga,
Čedomir Stefanović,
Anders E. Kalør,
Petar Popovski
Abstract:
The coexistence of diverse services with heterogeneous requirements is a fundamental feature of 5G. This necessitates efficient radio access network (RAN) slicing, defined as sharing of the wireless resources among diverse services while guaranteeing their respective throughput, timing, and/or reliability requirements. In this paper, we investigate RAN slicing for an uplink scenario in the form of…
▽ More
The coexistence of diverse services with heterogeneous requirements is a fundamental feature of 5G. This necessitates efficient radio access network (RAN) slicing, defined as sharing of the wireless resources among diverse services while guaranteeing their respective throughput, timing, and/or reliability requirements. In this paper, we investigate RAN slicing for an uplink scenario in the form of multiple access schemes for two user types: (1) broadband users with throughput requirements and (2) intermittently active users with timing requirements, expressed as either latency-reliability (LR) or Peak Age of Information (PAoI). Broadband users transmit data continuously, hence, are allocated non-overlap** parts of the spectrum. We evaluate the trade-offs between the achievable throughput of a broadband user and the timing requirements of an intermittent user under Orthogonal Multiple Access (OMA) and Non-Orthogonal Multiple Access (NOMA), considering capture. Our analysis shows that NOMA, in combination with packet-level coding, is a superior strategy in most cases for both LR and PAoI, achieving a similar LR with only slight 2% decrease in throughput with respect to the upper bound in performance. However, there are extreme cases where OMA achieves a slightly greater throughput than NOMA at the expense of an increased PAoI.
△ Less
Submitted 19 August, 2021; v1 submitted 6 March, 2021;
originally announced March 2021.
-
Slicing a single wireless collision channel among throughput- and timeliness-sensitive services
Authors:
Israel Leyva-Mayorga,
Federico Chiariotti,
Čedomir Stefanović,
Anders E. Kalør,
Petar Popovski
Abstract:
The fifth generation (5G) wireless system has a platform-driven approach, aiming to support heterogeneous connections with very diverse requirements. The shared wireless resources should be sliced in a way that each user perceives that its requirement has been met. Heterogeneity challenges the traditional notion of resource efficiency, as the resource usage has cater for, e.g. rate maximization fo…
▽ More
The fifth generation (5G) wireless system has a platform-driven approach, aiming to support heterogeneous connections with very diverse requirements. The shared wireless resources should be sliced in a way that each user perceives that its requirement has been met. Heterogeneity challenges the traditional notion of resource efficiency, as the resource usage has cater for, e.g. rate maximization for one user and timeliness requirement for another user. This paper treats a model for radio access network (RAN) uplink, where a throughput-demanding broadband user shares wireless resources with an intermittently active user that wants to optimize the timeliness, expressed in terms of latency-reliability or Age of Information (AoI). We evaluate the trade-offs between throughput and timeliness for Orthogonal Multiple Access (OMA) as well as Non-Orthogonal Multiple Access (NOMA) with successive interference cancellation (SIC). We observe that NOMA with SIC, in a conservative scenario with destructive collisions, is just slightly inferior to that of OMA, which indicates that it may offer significant benefits in practical deployments where the capture effect is frequently encountered. On the other hand, finding the optimal configuration of NOMA with SIC depends on the activity pattern of the intermittent user, to which OMA is insensitive.
△ Less
Submitted 28 October, 2020;
originally announced October 2020.
-
Analysis of Tree-Algorithms with Multi-Packet Reception
Authors:
Cedomir Stefanović,
H. Murat Gürsu,
Yash Deshpande,
Wolfgang Kellerer
Abstract:
In this paper, we analyze binary-tree algorithms in a setup in which the receiver can perform multi-packet reception (MPR) of up to and including K packets simultaneously. The analysis addresses both traffic-independent performance as well as performance under Poisson arrivals. For the former case, we show that the throughput, when normalized with respect to the assumed linear increase in resource…
▽ More
In this paper, we analyze binary-tree algorithms in a setup in which the receiver can perform multi-packet reception (MPR) of up to and including K packets simultaneously. The analysis addresses both traffic-independent performance as well as performance under Poisson arrivals. For the former case, we show that the throughput, when normalized with respect to the assumed linear increase in resources required to achieve K-MPR capability, tends to the same value that holds for the single-reception setup. However, when coupled with Poisson arrivals in the windowed access scheme, the normalized throughput increases with K, and we present evidence that it asymptotically tends to 1. We also provide performance results for the modified tree algorithm with K-MPR in the clipped access scheme. To the best of our knowledge, this is the first paper that provides an analytical treatment and a number of fundamental insights in the performance of tree-algorithms with MPR.
△ Less
Submitted 4 February, 2021; v1 submitted 28 May, 2020;
originally announced May 2020.
-
Reliability-Latency Performance of Frameless ALOHA with and without Feedback
Authors:
Francisco Lázaro,
Čedomir Stefanović,
Petar Popovski
Abstract:
This paper presents a finite length analysis of multi-slot type frameless ALOHA based on a dynamic programming approach. The analysis is exact, but its evaluation is only feasible for moderate number of users due to the computational complexity. The analysis is then extended to derive continuous approximations of its key parameters, which, apart from providing an insight into the decoding process,…
▽ More
This paper presents a finite length analysis of multi-slot type frameless ALOHA based on a dynamic programming approach. The analysis is exact, but its evaluation is only feasible for moderate number of users due to the computational complexity. The analysis is then extended to derive continuous approximations of its key parameters, which, apart from providing an insight into the decoding process, make it possible to estimate the packet error rate with very low computational complexity. Finally, a feedback scheme is presented in which the slot access scheme is dynamically adapted according to the approximate analysis in order to minimize the packet error rate. The results indicate that the introduction of feedback can substantially improve the performance of frameless ALOHA
△ Less
Submitted 6 July, 2020; v1 submitted 15 July, 2019;
originally announced July 2019.
-
Repeat-Authenticate Scheme for Multicasting of Blockchain Information in IoT Systems
Authors:
Pietro Danzi,
Anders E. Kalør,
Čedomir Stefanović,
Petar Popovski
Abstract:
We study the problem of efficiently disseminating authenticated blockchain information from blockchain nodes (servers) to Internet of Things (IoT) devices, through a wireless base station (BS). In existing blockchain protocols, upon generation of a new block, each IoT device receives a copy of the block header, authenticated via digital signature by one or more trusted servers. Since it relies on…
▽ More
We study the problem of efficiently disseminating authenticated blockchain information from blockchain nodes (servers) to Internet of Things (IoT) devices, through a wireless base station (BS). In existing blockchain protocols, upon generation of a new block, each IoT device receives a copy of the block header, authenticated via digital signature by one or more trusted servers. Since it relies on unicast transmissions, the required communication resources grow linearly with the number of IoT devices. We propose a more efficient scheme, in which a single copy of each block header is multicasted, together with the signatures of servers. In addition, if IoT devices tolerate a delay, we exploit the blockchain structure to amortize the authentication in time, by transmitting only a subset of signature in each block period. Finally, the BS sends redundant information, via a repetition code, to deal with the unreliable wireless channel, with the aim of decreasing the amount of feedback required from IoT devices. Our analysis shows the trade-off between timely authentication of blocks and reliability of the communication, depending on the packet loss rate offered by the channel. The numerical results show that the performance benefits of the proposed scheme makes it a viable starting point for designing new lightweight protocols for blockchains.
△ Less
Submitted 10 December, 2019; v1 submitted 15 April, 2019;
originally announced April 2019.
-
Communication Aspects of the Integration of Wireless IoT Devices with Distributed Ledger Technology
Authors:
Pietro Danzi,
Anders E. Kalør,
René B. Sørensen,
Alexander K. Hagelskjær,
Lam D. Nguyen,
Čedomir Stefanović,
Petar Popovski
Abstract:
The pervasive need to safely share and store information between devices calls for the replacement of centralized trust architectures with the decentralized ones. Distributed Ledger Technologies (DLTs) are seen as the most promising enabler of decentralized trust, but they still lack technological maturity and their successful adoption depends on the understanding of the fundamental design trade-o…
▽ More
The pervasive need to safely share and store information between devices calls for the replacement of centralized trust architectures with the decentralized ones. Distributed Ledger Technologies (DLTs) are seen as the most promising enabler of decentralized trust, but they still lack technological maturity and their successful adoption depends on the understanding of the fundamental design trade-offs and their reflection in the actual technical design. This work focuses on the challenges and potential solutions for an effective integration of DLTs in the context of Internet-of-Things (IoT). We first introduce the landscape of IoT applications and discuss the limitations and opportunities offered by DLTs. Then, we review the technical challenges encountered in the integration of resource-constrained devices with distributed trust networks. We describe the common traits of lightweight synchronization protocols, and propose a novel classification, rooted in the IoT perspective. We identify the need of receiving ledger information at the endpoint devices, implying a two-way data exchange that contrasts with the conventional uplink-oriented communication technologies intended for IoT systems.
△ Less
Submitted 5 March, 2019;
originally announced March 2019.
-
On Throughput Maximization of Grant-Free Access with Reliability-Latency Constraints
Authors:
H. Murat Gürsu,
Wolfgang Kellerer,
Cedomir Stefanović
Abstract:
Enabling autonomous driving and industrial automation with wireless networks poses many challenges, which are typically abstracted through reliability and latency requirements. One of the main contributors to latency in cellular networks is the reservation-based access, which involves lengthy and resource-inefficient signaling exchanges. An alternative is to use grant-free access, in which there i…
▽ More
Enabling autonomous driving and industrial automation with wireless networks poses many challenges, which are typically abstracted through reliability and latency requirements. One of the main contributors to latency in cellular networks is the reservation-based access, which involves lengthy and resource-inefficient signaling exchanges. An alternative is to use grant-free access, in which there is no resource reservation. A handful of recent works investigated how to fulfill reliability and latency requirements with different flavors of grant-free solutions. However, the resource efficiency, i.e., the throughput, has been only the secondary focus. In this work, we formulate the throughput of grant-free access under reliability-latency constraints, when the actual number of arrived users or only the arrival distribution are known. We investigate how these different levels of knowledge about the arrival process influence throughput performance of framed slotted ALOHA with $K$-multipacket reception, for the Poisson and Beta arrivals. We show that the throughput under reliability-latency requirements can be significantly improved for the higher expected load of the access network, if the actual number of arrived users is known. This insight motivates the use of techniques for the estimation of the number of arrived users, as this knowledge is not readily available in grant-free access. We also asses the impact of estimation error, showing that for high reliability-latency requirements the gains in throughput are still considerable.
△ Less
Submitted 21 February, 2019;
originally announced February 2019.
-
Wireless Access in Ultra-Reliable Low-Latency Communication (URLLC)
Authors:
Petar Popovski,
Čedomir Stefanović,
Jimmy J. Nielsen,
Elisabeth de Carvalho,
Marko Angjelichinoski,
Kasper F. Trillingsgaard,
Alexandru-Sabin Bana
Abstract:
The future connectivity landscape and, notably, the 5G wireless systems will feature Ultra-Reliable Low Latency Communication (URLLC). The coupling of high reliability and low latency requirements in URLLC use cases makes the wireless access design very challenging, in terms of both the protocol design and of the associated transmission techniques. This paper aims to provide a broad perspective on…
▽ More
The future connectivity landscape and, notably, the 5G wireless systems will feature Ultra-Reliable Low Latency Communication (URLLC). The coupling of high reliability and low latency requirements in URLLC use cases makes the wireless access design very challenging, in terms of both the protocol design and of the associated transmission techniques. This paper aims to provide a broad perspective on the fundamental tradeoffs in URLLC as well as the principles used in building access protocols. Two specific technologies are considered in the context of URLLC: massive MIMO and multi-connectivity, also termed interface diversity. The paper also touches upon the important question of the proper statistical methodology for designing and assessing extremely high reliability levels.
△ Less
Submitted 16 October, 2018;
originally announced October 2018.
-
Delay and Communication Tradeoffs for Blockchain Systems with Lightweight IoT Clients
Authors:
Pietro Danzi,
Anders E. Kalør,
Čedomir Stefanović,
Petar Popovski
Abstract:
The emerging blockchain protocols provide a decentralized architecture that is suitable of supporting Internet of Things (IoT) interactions. However, kee** a local copy of the blockchain ledger is infeasible for low-power and memory-constrained devices. For this reason, they are equipped with lightweight software implementations that only download the useful data structures, e.g. state of accoun…
▽ More
The emerging blockchain protocols provide a decentralized architecture that is suitable of supporting Internet of Things (IoT) interactions. However, kee** a local copy of the blockchain ledger is infeasible for low-power and memory-constrained devices. For this reason, they are equipped with lightweight software implementations that only download the useful data structures, e.g. state of accounts, from the blockchain network, when they are updated. In this paper, we consider and analyze a novel scheme, implemented by the nodes of the blockchain network, which aggregates the blockchain data in periodic updates and further reduces the communication cost of the connected IoT devices. We show that the aggregation period should be selected based on the channel quality, the offered rate, and the statistics of updates of the useful data structures. The results, obtained for the Ethereum protocol, illustrate the benefits of the aggregation scheme in terms of a reduced duty cycle of the device, particularly for low signal-to-noise ratios, and the overall reduction of the amount of information transmitted in downlink (e.g., from the wireless base station to the IoT device). A potential application of the proposed scheme is to let the IoT device request more information than actually needed, hence increasing its privacy, while kee** the communication cost constant. In conclusion, our work is the first to provide rigorous guidelines for the design of lightweight blockchain protocols with wireless connectivity.
△ Less
Submitted 17 October, 2018; v1 submitted 19 July, 2018;
originally announced July 2018.
-
Latency-Energy Tradeoff based on Channel Scheduling and Repetitions in NB-IoT Systems
Authors:
Amin Azari,
Guowang Miao,
Cedomir Stefanovic,
Petar Popovski
Abstract:
Narrowband IoT (NB-IoT) is the latest IoT connectivity solution presented by the 3GPP. NB-IoT introduces coverage classes and introduces a significant link budget improvement by allowing repeated transmissions by nodes that experience high path loss. However, those repetitions necessarily increase the energy consumption and the latency in the whole NB-IoT system. The extent to which the whole syst…
▽ More
Narrowband IoT (NB-IoT) is the latest IoT connectivity solution presented by the 3GPP. NB-IoT introduces coverage classes and introduces a significant link budget improvement by allowing repeated transmissions by nodes that experience high path loss. However, those repetitions necessarily increase the energy consumption and the latency in the whole NB-IoT system. The extent to which the whole system is affected depends on the scheduling of the uplink and downlink channels. We address this question, not treated previously, by develo** a tractable model of NB-IoT access protocol operation, comprising message exchanges in random-access, control, and data channels, both in the uplink and downlink. The model is then used to analyze the impact of channel scheduling as well as the interaction of coexisting coverage classes, through derivation of the expected latency and battery lifetime for each coverage class. These results are subsequently employed in investigation of latency-energy tradeoff in NB-IoT channel scheduling as well as determining the optimized operation points. Simulations results show validity of the analysis and confirm that there is a significant impact of channel scheduling on latency and lifetime performance of NBIoT devices.
△ Less
Submitted 15 July, 2018;
originally announced July 2018.
-
Enabling LTE RACH Collision Multiplicity Detection via Machine Learning
Authors:
Davide Magrin,
Chiara Pielli,
Cedomir Stefanovic,
Michele Zorzi
Abstract:
The collision resolution mechanism in the Random Access Channel (RACH) procedure of the Long-Term Evolution (LTE) standard is known to represent a serious bottleneck in case of machine-type traffic. Its main drawbacks are seen in the facts that Base Stations (eNBs) typically cannot infer the number of collided User Equipments (UEs) and that collided UEs learn about the collision only implicitly, t…
▽ More
The collision resolution mechanism in the Random Access Channel (RACH) procedure of the Long-Term Evolution (LTE) standard is known to represent a serious bottleneck in case of machine-type traffic. Its main drawbacks are seen in the facts that Base Stations (eNBs) typically cannot infer the number of collided User Equipments (UEs) and that collided UEs learn about the collision only implicitly, through the lack of the feedback in the later stage of the RACH procedure. The collided UEs then restart the procedure, thereby increasing the RACH load and making the system more prone to collisions. In this paper, we leverage machine learning techniques to design a system that outperforms the state-of-the-art schemes in preamble detection for the LTE RACH procedure. Most importantly, our scheme can also estimate the collision multiplicity, and thus gather information about how many devices chose the same preamble. This data can be used by the eNB to resolve collisions, increase the supported system load and reduce transmission latency. The presented approach is applicable to novel 3GPP standards that target massive IoT, e.g., LTE-M and NB-IoT.
△ Less
Submitted 29 May, 2018;
originally announced May 2018.
-
Sparse Signal Processing for Grant-Free Massive Connectivity: A Future Paradigm for Random Access Protocols in the Internet of Things
Authors:
Liang Liu,
Erik G. Larsson,
Wei Yu,
Petar Popovski,
Cedomir Stefanovic,
Elisabeth De Carvalho
Abstract:
The next wave of wireless technologies will proliferate in connecting sensors, machines, and robots for myriad new applications, thereby creating the fabric for the Internet of Things (IoT). A generic scenario for IoT connectivity involves a massive number of machine-type connections. But in a typical application, only a small (unknown) subset of devices are active at any given instant, thus one o…
▽ More
The next wave of wireless technologies will proliferate in connecting sensors, machines, and robots for myriad new applications, thereby creating the fabric for the Internet of Things (IoT). A generic scenario for IoT connectivity involves a massive number of machine-type connections. But in a typical application, only a small (unknown) subset of devices are active at any given instant, thus one of the key challenges for providing massive IoT connectivity is to detect the active devices first and then to decode their data with low latency. This article outlines several key signal processing techniques that are applicable to the problem of massive IoT access, focusing primarily on advanced compressed sensing technique and its application for efficient detection of the active devices. We show that massive multiple-input multiple-output (MIMO) is especially well-suited for massive IoT connectivity in the sense that the device detection error can be driven to zero asymptotically in the limit as the number of antennas at the base station goes to infinity by using the multiple-measurement vector (MMV) compressed sensing techniques. The paper also provides a perspective on several related important techniques for massive access, such as embedding of short messages onto the device activity detection process and the coded random access.
△ Less
Submitted 18 July, 2018; v1 submitted 10 April, 2018;
originally announced April 2018.
-
Towards Massive Connectivity Support for Scalable mMTC Communications in 5G networks
Authors:
Carsten Bockelmann,
Nuno K. Pratas,
Gerhard Wunder,
Stephan Saur,
Monica Navarro,
David Gregoratti,
Guillaume Vivier,
Elisabeth de Carvalho,
Yalei Ji,
Cedomir Stefanovic,
Petar Popovski,
Qi Wang,
Malte Schellmann,
Evangelos Kosmatos,
Panagiotis Demestichas,
Miruna Raceala-Motoc,
Peter Jung,
Slawomir Stanczak,
Armin Dekorsy
Abstract:
The fifth generation of cellular communication systems is foreseen to enable a multitude of new applications and use cases with very different requirements. A new 5G multiservice air interface needs to enhance broadband performance as well as provide new levels of reliability, latency and supported number of users. In this paper we focus on the massive Machine Type Communications (mMTC) service wi…
▽ More
The fifth generation of cellular communication systems is foreseen to enable a multitude of new applications and use cases with very different requirements. A new 5G multiservice air interface needs to enhance broadband performance as well as provide new levels of reliability, latency and supported number of users. In this paper we focus on the massive Machine Type Communications (mMTC) service within a multi-service air interface. Specifically, we present an overview of different physical and medium access techniques to address the problem of a massive number of access attempts in mMTC and discuss the protocol performance of these solutions in a common evaluation framework.
△ Less
Submitted 5 April, 2018;
originally announced April 2018.
-
On the Modeling and Performance Assessment of Random Access with SIC
Authors:
Alberto Mengali,
Riccardo De Gaudenzi,
Cedomir Stefanovic
Abstract:
In this paper, we review the key figures of merit to assess the performance of advanced random access (RA) schemes exploiting physical layer coding, repetitions and collision resolution techniques. We then investigate RA modeling aspects and their impact on the figures of merit for the exemplary advanced RA schemes: Contention Resolution Diversity Slotted ALOHA (CRDSA), Irregular Repetition Slotte…
▽ More
In this paper, we review the key figures of merit to assess the performance of advanced random access (RA) schemes exploiting physical layer coding, repetitions and collision resolution techniques. We then investigate RA modeling aspects and their impact on the figures of merit for the exemplary advanced RA schemes: Contention Resolution Diversity Slotted ALOHA (CRDSA), Irregular Repetition Slotted ALOHA (IRSA), Coded Slotted ALOHA (CSA) and Enhanced Spread-Spectrum ALOHA (E-SSA). We show that typical simplifications of the reception model when used to optimize RA schemes lead to inaccurate findings, both in terms of parameter optimization and figures of merit, such as the packet loss ratio (PLR) and throughput. We also derive a generic RA energy efficiency model able to compare the schemes in terms of the energy required to transmit a packet. The combination of achievable RA throughput at the target PLR and energy efficiency, for the same average user power investment per frame and occupied bandwidth, shows that E-SSA, which is an unslotted scheme, provides the best overall performance, while, in terms of the slotted schemes, CRDSA outperforms the more elaborated IRSA and CSA. This surprising results is due to the fact that the IRSA and CSA optimization has so far been performed using RA channel models that are not accurately reflecting the physical layer receiver behavior. We conclude by providing insights on how to include more accurate reception models in the IRSA and CSA design and optimization.
△ Less
Submitted 19 January, 2018;
originally announced January 2018.
-
Reliable Video Streaming over mmWave with Multi Connectivity and Network Coding
Authors:
Matteo Drago,
Tommy Azzino,
Michele Polese,
Cedomir Stefanovic,
Michele Zorzi
Abstract:
The next generation of multimedia applications will require the telecommunication networks to support a higher bitrate than today, in order to deliver virtual reality and ultra-high quality video content to the users. Most of the video content will be accessed from mobile devices, prompting the provision of very high data rates by next generation (5G) cellular networks. A possible enabler in this…
▽ More
The next generation of multimedia applications will require the telecommunication networks to support a higher bitrate than today, in order to deliver virtual reality and ultra-high quality video content to the users. Most of the video content will be accessed from mobile devices, prompting the provision of very high data rates by next generation (5G) cellular networks. A possible enabler in this regard is communication at mmWave frequencies, given the vast amount of available spectrum that can be allocated to mobile users; however, the harsh propagation environment at such high frequencies makes it hard to provide a reliable service. This paper presents a reliable video streaming architecture for mmWave networks, based on multi connectivity and network coding, and evaluates its performance using a novel combination of the ns-3 mmWave module, real video traces and the network coding library Kodo. The results show that it is indeed possible to reliably stream video over cellular mmWave links, while the combination of multi connectivity and network coding can support high video quality with low latency.
△ Less
Submitted 5 February, 2018; v1 submitted 16 November, 2017;
originally announced November 2017.
-
Analysis of the Communication Traffic for Blockchain Synchronization of IoT Devices
Authors:
Pietro Danzi,
Anders Ellersgaard Kalør,
Čedomir Stefanović,
Petar Popovski
Abstract:
Blockchain is a technology uniquely suited to support massive number of transactions and smart contracts within the Internet of Things (IoT) ecosystem, thanks to the decentralized accounting mechanism. In a blockchain network, the states of the accounts are stored and updated by the validator nodes, interconnected in a peer-to-peer fashion. IoT devices are characterized by relatively low computing…
▽ More
Blockchain is a technology uniquely suited to support massive number of transactions and smart contracts within the Internet of Things (IoT) ecosystem, thanks to the decentralized accounting mechanism. In a blockchain network, the states of the accounts are stored and updated by the validator nodes, interconnected in a peer-to-peer fashion. IoT devices are characterized by relatively low computing capabilities and low power consumption, as well as sporadic and low-bandwidth wireless connectivity. An IoT device connects to one or more validator nodes to observe or modify the state of the accounts. In order to interact with the most recent state of accounts, a device needs to be synchronized with the blockchain copy stored by the validator nodes. In this work, we describe general architectures and synchronization protocols that enable synchronization of the IoT endpoints to the blockchain, with different communication costs and security levels. We model and analytically characterize the traffic generated by the synchronization protocols, and also investigate the power consumption and synchronization trade-off via numerical simulations. To the best of our knowledge, this is the first study that rigorously models the role of wireless connectivity in blockchain-powered IoT systems.
△ Less
Submitted 12 February, 2018; v1 submitted 1 November, 2017;
originally announced November 2017.
-
Asymptotic Performance of Coded Slotted ALOHA with Multi Packet Reception
Authors:
Cedomir Stefanovic,
Enrico Paolini,
Gianluigi Liva
Abstract:
In this letter, we develop a converse bound on the asymptotic load threshold of coded slotted ALOHA (CSA) schemes with K-multi packet reception capabilities at the receiver. Density evolution is used to track the average probability of packet segment loss and an area matching condition is applied to obtain the converse. For any given CSA rate, the converse normalized to K increases with K, which i…
▽ More
In this letter, we develop a converse bound on the asymptotic load threshold of coded slotted ALOHA (CSA) schemes with K-multi packet reception capabilities at the receiver. Density evolution is used to track the average probability of packet segment loss and an area matching condition is applied to obtain the converse. For any given CSA rate, the converse normalized to K increases with K, which is in contrast with the results obtained so far for slotted ALOHA schemes based on successive interference cancellation. We show how the derived bound can be approached using spatially-coupled CSA.
△ Less
Submitted 12 October, 2017; v1 submitted 6 October, 2017;
originally announced October 2017.
-
Grant-Free Radio Access for Short-Packet Communications over 5G Networks
Authors:
Amin Azari,
Petar Popovski,
Guowang Miao,
Cedomir Stefanovic
Abstract:
Radio access management plays a vital role in delay and energy consumption of connected devices. The radio access in existing cellular networks is unable to efficiently support massive connectivity, due to its signaling overhead. In this paper, we investigate an asynchronous grant-free narrowband data transmission protocol that aims to provide low energy consumption and delay, by relaxing the sync…
▽ More
Radio access management plays a vital role in delay and energy consumption of connected devices. The radio access in existing cellular networks is unable to efficiently support massive connectivity, due to its signaling overhead. In this paper, we investigate an asynchronous grant-free narrowband data transmission protocol that aims to provide low energy consumption and delay, by relaxing the synchronization/reservation requirement at the cost of sending several packet copies at the transmitter side and more complex signal processing at the receiver side. Specifically, the timing and frequency offsets, as well as sending of multiple replicas of the same packet, are exploited as form of diversities at the receiver-side to trigger successive interference cancellation. The proposed scheme is investigated by deriving closed-form expressions for key performance indicators, including reliability and battery-lifetime. The performance evaluation indicates that the scheme can be tuned to realize long battery lifetime radio access for low-complexity devices. The obtained results indicate existence of traffic load regions, where synchronous access outperforms asynchronous access and vice versa.
△ Less
Submitted 7 September, 2017;
originally announced September 2017.
-
Frameless ALOHA with Reliability-Latency Guarantees
Authors:
Cedomir Stefanovic,
Francisco Lazaro,
Petar Popovski
Abstract:
One of the novelties brought by 5G is that wireless system design has increasingly turned its focus on guaranteeing reliability and latency. This shifts the design objective of random access protocols from throughput optimization towards constraints based on reliability and latency. For this purpose, we use frameless ALOHA, which relies on successive interference cancellation (SIC), and derive its…
▽ More
One of the novelties brought by 5G is that wireless system design has increasingly turned its focus on guaranteeing reliability and latency. This shifts the design objective of random access protocols from throughput optimization towards constraints based on reliability and latency. For this purpose, we use frameless ALOHA, which relies on successive interference cancellation (SIC), and derive its exact finite-length analysis of the statistics of the unresolved users (reliability) as a function of the contention period length (latency). The presented analysis can be used to derive the reliability-latency guarantees. We also optimize the scheme parameters in order to maximize the reliability within a given latency. Our approach represents an important step towards the general area of design and analysis of access protocols with reliability-latency guarantees.
△ Less
Submitted 7 September, 2017;
originally announced September 2017.
-
Wireless Access for Ultra-Reliable Low-Latency Communication (URLLC): Principles and Building Blocks
Authors:
Petar Popovski,
Jimmy J. Nielsen,
Cedomir Stefanovic,
Elisabeth de Carvalho,
Erik Ström,
Kasper F. Trillingsgaard,
Alexandru-Sabin Bana,
Dong Min Kim,
Radoslaw Kotaba,
Jihong Park,
René B. Sørensen
Abstract:
Ultra-reliable low latency communication (URLLC) is an important new feature brought by 5G, with a potential to support a vast set of applications that rely on mission-critical links. In this article, we first discuss the principles for supporting URLLC from the perspective of the traditional assumptions and models applied in communication/information theory. We then discuss how these principles a…
▽ More
Ultra-reliable low latency communication (URLLC) is an important new feature brought by 5G, with a potential to support a vast set of applications that rely on mission-critical links. In this article, we first discuss the principles for supporting URLLC from the perspective of the traditional assumptions and models applied in communication/information theory. We then discuss how these principles are applied in various elements of the system design, such as use of various diversity sources, design of packets and access protocols. The important messages are that there is a need to optimize the transmission of signaling information, as well as a need for a lean use of various sources of diversity.
△ Less
Submitted 20 December, 2017; v1 submitted 25 August, 2017;
originally announced August 2017.
-
Compressive Coded Random Access for Massive MTC Traffic in 5G Systems
Authors:
Gerhard Wunder,
Cedomir Stefanovic,
Petar Popovski,
Lars Thiele
Abstract:
Massive MTC support is an important future market segment, but not yet efficiently supported in cellular systems. In this paper we follow-up on recent concepts combining advanced MAC protocols with Compressed Sensing (CS) based multiuser detection. Specifically, we introduce a concept for sparse joint activity, channel and data detection in the context of the Coded ALOHA (FDMA) protocol. We will a…
▽ More
Massive MTC support is an important future market segment, but not yet efficiently supported in cellular systems. In this paper we follow-up on recent concepts combining advanced MAC protocols with Compressed Sensing (CS) based multiuser detection. Specifically, we introduce a concept for sparse joint activity, channel and data detection in the context of the Coded ALOHA (FDMA) protocol. We will argue that a simple sparse activity and data detection is not sufficient (as many papers do) because control resources are in the order of the data. In addition, we will improve on the performance of such protocols in terms of the reduction of resources required for the user activity, channel estimation and data detection. We will mathematically analyze the system accordingly and provide expressions for the capture probabilities of the underlying sparse multiuser detector. Finally, we will provide structured CS algorithms for the joint estimation scheme and evaluate its performance.
△ Less
Submitted 29 June, 2017;
originally announced July 2017.
-
Reliable and Efficient Access for Alarm-initiated and Regular M2M Traffic in IEEE 802.11ah Systems
Authors:
German Corrales Madueno,
Cedomir Stefanovic,
Petar Popovski
Abstract:
EEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand We show that it is possible to both efficiently and rel…
▽ More
EEE 802.11ah is a novel WiFi-based protocol, aiming to provide an access solution for the machine-to-machine (M2M) communications. In this paper, we propose an adaptive access mechanism that can be seamlessly incorporated into IEEE 802.11ah protocol operation and that supports all potential M2M reporting regimes, which are periodic, on-demand We show that it is possible to both efficiently and reliably resolve all reporting stations in the cell, within the limits of the allowed deadlines. As a side result, we also provide a rationale for modeling the inter-arrival time in alarm events by using the Beta distribution, a model that is considered in the 3GPP standardization.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
Minimizing Data Distortion of Periodically Reporting IoT Devices with Energy Harvesting
Authors:
Chiara Pielli,
Cedomir Stefanovic,
Petar Popovski,
Michele Zorzi
Abstract:
Energy harvesting is a promising technology for the Internet of Things (IoT) towards the goal of self-sustainability of the involved devices. However, the intermittent and unreliable nature of the harvested energy demands an intelligent management of devices' operation in order to ensure a sustained performance of the IoT application. In this work, we address the problem of maximizing the quality…
▽ More
Energy harvesting is a promising technology for the Internet of Things (IoT) towards the goal of self-sustainability of the involved devices. However, the intermittent and unreliable nature of the harvested energy demands an intelligent management of devices' operation in order to ensure a sustained performance of the IoT application. In this work, we address the problem of maximizing the quality of the reported data under the constraints of energy harvesting, energy consumption and communication channel impairments. Specifically, we propose an energy-aware joint source-channel coding scheme that minimizes the expected data distortion, for realistic models of energy generation and of the energy spent by the device to process the data, when the communication is performed over a Rayleigh fading channel. The performance of the scheme is optimized by means of a Markov Decision Process framework.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
A Pseudo-Bayesian Approach to Sign-Compute-Resolve Slotted ALOHA
Authors:
Jasper Goseling,
Cedomir Stefanovic,
Petar Popovski
Abstract:
Access reservation based on slotted ALOHA is commonly used in wireless cellular access. In this paper we investigate its enhancement based on the use of physical-layer network coding and signature coding, whose main feature is enabling simultaneous resolution of up to K users contending for access, where K >= 1. We optimise the slot access probability such that the expected throughput is maximised…
▽ More
Access reservation based on slotted ALOHA is commonly used in wireless cellular access. In this paper we investigate its enhancement based on the use of physical-layer network coding and signature coding, whose main feature is enabling simultaneous resolution of up to K users contending for access, where K >= 1. We optimise the slot access probability such that the expected throughput is maximised. In particular, the slot access probability is chosen in line with an estimate of the number of users in the system that is obtained relying on the pseudo-Bayesian approach by Rivest, which we generalise for the case that K > 1. Under the assumption that this estimate reflects the actual number of users, we show that our approach achieves throughput 1 in the limit of large K.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
Irregular Repetition Slotted ALOHA over the Rayleigh Block Fading Channel with Capture
Authors:
Federico Clazzer,
Enrico Paolini,
Iacopo Mambelli,
Cedomir Stefanovic
Abstract:
Random access protocols relying on the transmission of packet replicas in multiple slots and exploiting interference cancellation at the receiver have been shown to achieve per- formance competitive with that of orthogonal schemes. So far the optimization of the repetition degree profile, defining the probability for a user to transmit a given number of replicas, has mainly been performed targetin…
▽ More
Random access protocols relying on the transmission of packet replicas in multiple slots and exploiting interference cancellation at the receiver have been shown to achieve per- formance competitive with that of orthogonal schemes. So far the optimization of the repetition degree profile, defining the probability for a user to transmit a given number of replicas, has mainly been performed targeting the collision channel model. In this paper the analysis is extended to a block fading channel model, also assuming capture effect at the receiver. Density evolution equations are developed for the new setting and, based on them, some repetition degree profiles are optimized and analyzed via Monte Carlo simulation in a finite frame length setting. The derived distributions are shown to achieve throughputs largely exceeding 1 [packet/slot].
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
User Activity Detection in Massive Random Access: Compressed Sensing vs. Coded Slotted ALOHA
Authors:
Veljko Boljanovic,
Dejan Vukobratovic,
Petar Popovski,
Cedomir Stefanovic
Abstract:
Machine-type communication services in mobile cel- lular systems are currently evolving with an aim to efficiently address a massive-scale user access to the system. One of the key problems in this respect is to efficiently identify active users in order to allocate them resources for the subsequent transmissions. In this paper, we examine two recently suggested approaches for user activity detect…
▽ More
Machine-type communication services in mobile cel- lular systems are currently evolving with an aim to efficiently address a massive-scale user access to the system. One of the key problems in this respect is to efficiently identify active users in order to allocate them resources for the subsequent transmissions. In this paper, we examine two recently suggested approaches for user activity detection: compressed-sensing (CS) and coded slotted ALOHA (CSA), and provide their comparison in terms of performance vs resource utilization. Our preliminary results show that CS-based approach is able to provide the target user activity detection performance with less overall system resource utilization. However, this comes at a price of lower energy- efficiency per user, as compared to CSA-based approach.
△ Less
Submitted 29 June, 2017;
originally announced June 2017.
-
Joint Retransmission, Compression and Channel Coding for Data Fidelity under Energy Constraints
Authors:
Chiara Pielli,
Cedomir Stefanovic,
Petar Popovski,
Michele Zorzi
Abstract:
We consider a monitoring application where sensors periodically report data to a common receiver in a time division multiplex fashion. The sensors are constrained by the limited and unpredictable energy availability provided by Energy Harvesting (EH), and by the channel impairments. To maximize the quality of the reported data, the packets transmitted contain newly generated data blocks together w…
▽ More
We consider a monitoring application where sensors periodically report data to a common receiver in a time division multiplex fashion. The sensors are constrained by the limited and unpredictable energy availability provided by Energy Harvesting (EH), and by the channel impairments. To maximize the quality of the reported data, the packets transmitted contain newly generated data blocks together with up to $r - 1$ previously unsuccessfully delivered ones, where $r$ is a design parameter; such blocks are compressed, concatenated and encoded with a channel code. The scheme applies lossy compression, such that the fidelity of the individual blocks is traded with the reliability provided by the channel code. We show that the proposed strategy outperforms the one in which retransmissions are not allowed. We also investigate the tradeoff between the value of $r$, the compression and coding rates, under the constraints of the energy availability, and, once $r$ has been decided, use a Markov Decision Process (MDP) to optimize the compression/coding rates. Finally, we implement a reinforcement learning algorithm, through which devices can learn the optimal transmission policy without knowing a priori the statistics of the EH process, and show that it indeed reaches the performance obtained via MDP.
△ Less
Submitted 28 June, 2017;
originally announced June 2017.
-
Distributed Proportional-Fairness Control in MicroGrids via Blockchain Smart Contracts
Authors:
Pietro Danzi,
Marko Angjelichinoski,
Čedomir Stefanović,
Petar Popovski
Abstract:
Residential microgrids (MGs) may host a large number of Distributed Energy Resources (DERs). The strategy that maximizes the revenue for each individual DER is the one in which the DER operates at capacity, injecting all available power into the grid. However, when the DER penetration is high and the consumption low, this strategy may lead to power surplus that causes voltage increase over recomme…
▽ More
Residential microgrids (MGs) may host a large number of Distributed Energy Resources (DERs). The strategy that maximizes the revenue for each individual DER is the one in which the DER operates at capacity, injecting all available power into the grid. However, when the DER penetration is high and the consumption low, this strategy may lead to power surplus that causes voltage increase over recommended limits. In order to create incentives for the DER to operate below capacity, we propose a proportional-fairness control strategy in which (i) a subset of DERs decrease their own power output, sacrificing the individual revenue, and (ii) the DERs in the subset are dynamically selected based on the record of their control history. The trustworthy implementation of the scheme is carried out through a custom-designed blockchain mechanism that maintains a distributed database trusted by all DERs. In particular, the blockchain is used to stipulate and store a smart contract that enforces proportional fairness. The simulation results verify the potential of the proposed framework.
△ Less
Submitted 16 May, 2017; v1 submitted 3 May, 2017;
originally announced May 2017.
-
Anti-Jamming Strategy for Distributed Microgrid Control based on Power Talk Communication
Authors:
Pietro Danzi,
Marko Angjelichinoski,
Čedomir Stefanović,
Petar Popovski
Abstract:
In standard implementations of distributed secondary control for DC MicroGrids (MGs), the exchange of local measurements among neighboring control agents is enabled via off-the-shelf wireless solutions, such as IEEE 802.11. However, Denial of Service (DoS) attacks on the wireless interface through jamming prevents the secondary control system from performing its main tasks, which might compromise…
▽ More
In standard implementations of distributed secondary control for DC MicroGrids (MGs), the exchange of local measurements among neighboring control agents is enabled via off-the-shelf wireless solutions, such as IEEE 802.11. However, Denial of Service (DoS) attacks on the wireless interface through jamming prevents the secondary control system from performing its main tasks, which might compromise the stability of the MG. In this paper, we propose novel, robust and secure secondary control reconfiguration strategy, tailored to counteract DoS attacks. Specifically, upon detecting the impairment of the wireless interface, the jammed secondary control agent notifies its peers via a secure, low-rate powerline channel based on Power Talk communication. This triggers reconfiguration of the wireless communication graph through primary control mode switching, where the jammed agents leave the secondary control by switching to current source mode, and are replaced by nonjammed current sources that switch to voltage source mode and join the secondary control. The strategy fits within the software-defined networking framework, where the network control is split from the data plane using reliable and secure side power talk communication channel, created via software modification of the MG primary control loops. The simulation results illustrate the feasibility of the solution and prove that the MG resilience and performance can be indeed improved via software-defined networking approaches.
△ Less
Submitted 22 December, 2016; v1 submitted 21 December, 2016;
originally announced December 2016.
-
Secure and Robust Authentication for DC MicroGrids based on Power Talk Communication
Authors:
Marko Angjelichinoski,
Pietro Danzi,
Čedomir Stefanović,
Petar Popovski
Abstract:
We propose a novel framework for secure and reliable authentication of Distributed Energy Resources to the centralized secondary/tertiary control system of a DC MicroGrid (MG), networked using the IEEE 802.11 wireless interface. The key idea is to perform the authentication using power talk, which is a powerline communication technique executed by the primary control loops of the power electronic…
▽ More
We propose a novel framework for secure and reliable authentication of Distributed Energy Resources to the centralized secondary/tertiary control system of a DC MicroGrid (MG), networked using the IEEE 802.11 wireless interface. The key idea is to perform the authentication using power talk, which is a powerline communication technique executed by the primary control loops of the power electronic converters, without the use of a dedicated hardware for its modem. In addition, the scheme also promotes direct and active participation of the control system in the authentication process, a feature not commonly encountered in current networked control systems for MicroGrids. The PLECS-based simulations verifies the viability of our scheme.
△ Less
Submitted 22 December, 2016; v1 submitted 21 December, 2016;
originally announced December 2016.