SlideShare a Scribd company logo
1 of 23
Download to read offline
Extended Summary of “Coded
Slotted ALOHA: A Graph-Based
Method for Uncoordinated Multiple
Access”
Enrico Paolini, Gianluigi Liva, and Marco Chiani. Coded slotted aloha: A
graph-based method for uncoordinated multiple access. IEEE Transactions
on Information Theory, 61(12):6815–6832, 2015.
Student: Marco Parentin - IN0500912
Supervisor: Prof. Fulvio Babich
Academic Year: 2022-2023
MASSIVE MULTIPLE ACCESS (MMA)
q Multiple access (MA): organize
trasmissions from many independent
users to a common receiver
q Massive scenario:
Ø Huge population size
Ø Random and sporadic activity
Ø Short packets
q Traditional schemes are not suitable
for MMA due to low efficiency
Image: https://hdl.handle.net/11580/98575
1
TOWARDS 6G’s IoT
q Billions of machine-type users (massive
Machine-type Communication)
q Sporadic transmission of few packets (e.g.
alarm, GPS position, …)
q Highly unpredictable number of active users
Ø Need for a scalable scheme
2
RANDOM MULTIPLE ACCESS (RMA)
q Traditional solution: Slotted ALOHA (SA)
Ø Time divided in slots
Ø Users transmit in first available slot whenever they have a packet
Ø No coordination: collisions and idle slots ⇒ Low efficiency
3
RANDOM MULTIPLE ACCESS (RMA)
q Traditional solution: Slotted ALOHA (SA)
Ø Time divided in slots
Ø Users transmit in first available slot whenever they have a packet
Ø No coordination: collisions and idle slots ⇒ Low efficiency
q Modern solutions: Successive Interference Cancellation (SIC)
Ø Remove contribution of correctly received packet in colliding slot
Ø Repetition schemes: CRDSA (2007), IRSA (2011)
Ø Packet-coding scheme: CODED SLOTTED ALOHA (CSA, 2015)
3
CSA ENCODING PROCESS
Ø User Activation
4
CSA ENCODING PROCESS
Ø User Activation
Ø Segmentation
4
CSA ENCODING PROCESS
Ø User Activation
Ø Segmentation
Ø Packet-Level Encoding
4
CSA ENCODING PROCESS
Ø User Activation
Ø Segmentation
Ø Packet-Level Encoding
Ø Random slice selection
4
CSA ENCODING PROCESS
Ø User Activation
Ø Segmentation
Ø Packet-Level Encoding
Ø Random slice selection
4
CSA ENCODING PROCESS
Ø User Activation
Ø Segmentation
Ø Packet-Level Encoding
Ø Random slice selection
4
CSA DECODING PROCESS
5
CSA DECODING PROCESS
Ø Clean segments received
5
CSA DECODING PROCESS
Ø Clean segments received
Ø Local erasure decoding
5
CSA DECODING PROCESS
Ø Clean segments received
Ø Local erasure decoding
Ø SIC
5
CSA DECODING PROCESS
Ø Clean segments received
Ø Local erasure decoding
Ø SIC
Ø Iterate
5
CSA DECODING PROCESS
Ø Clean segments received
Ø Local erasure decoding
Ø SIC
Ø Iterate
5
PERFORMANCE ANALYSIS (I)
q Key idea: exploit analogy with decoding of LDPC codes on graphs
⇕
q SIC ≡ Message
passing through
graph’s edges
6
PERFORMANCE ANALYSIS (II)
q Important parameters:
Ø Load 𝑮: avarage packets per slot
Ø Throughput 𝑺: expected successful
transmissions per slot
qAsymptotic analysis of iterative decoding:
Ø Threshold behavior
∃ 𝐺!"# ∶ %
𝑆 = 𝐺 ∀ 𝐺 < 𝐺!"#
𝑆 = 0 ∀ 𝐺 > 𝐺!"#
Ø No retransmission for 𝐺 < 𝐺!"#
Image: From 5G to 6G: Has the Time for Modern Random Access Come?
7
WEAK POINTS and FUTURE
q Main issue: SIC requires synchronization
Ø Ok for satellites
Ø Difficult in terrestrial distributed systems
SATELLITE
NOMA
(Capture)
IRSA / CSA
(SIC)
5G 8
WEAK POINTS and FUTURE
q Main issue: SIC requires synchronization
Ø Ok for satellites
Ø Difficult in terrestrial distributed systems
NOMA
(Capture)
IRSA / CSA
(SIC)
6G? 8
q In CSA segmentation, code diversity and SIC enable to approach 1
packet/slot of throughput without retransmissions
q Higher energy efficiency with respect to IRSA
q Several commonalities with LDPC codes on graphs
q The scheme is promising for 6G
CONCLUSIONS
9
THANK YOU FOR YOUR ATTENTION
10

More Related Content

Similar to Presentation: Extended Summary of "Coded Slotted ALOHA- A Graph-Based Method for Uncoordinated Multiple Access"

A Graph-Based Method For Cross-Entity Threat Detection
 A Graph-Based Method For Cross-Entity Threat Detection A Graph-Based Method For Cross-Entity Threat Detection
A Graph-Based Method For Cross-Entity Threat DetectionJen Aman
 
Operationalizing SDN
Operationalizing SDNOperationalizing SDN
Operationalizing SDNADVA
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDataWorks Summit
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataJames Sirota
 
Cilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPCilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPThomas Graf
 
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesR2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesAndrea Tassi
 
Scaling the Container Dataplane
Scaling the Container Dataplane Scaling the Container Dataplane
Scaling the Container Dataplane Michelle Holley
 
Safer Commutes & Streaming Data | George Padavick, Ohio Department of Transpo...
Safer Commutes & Streaming Data | George Padavick, Ohio Department of Transpo...Safer Commutes & Streaming Data | George Padavick, Ohio Department of Transpo...
Safer Commutes & Streaming Data | George Padavick, Ohio Department of Transpo...HostedbyConfluent
 
Recent advance in netmap/VALE(mSwitch)
Recent advance in netmap/VALE(mSwitch)Recent advance in netmap/VALE(mSwitch)
Recent advance in netmap/VALE(mSwitch)micchie
 
A chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemA chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemMohit Chimankar
 
Bringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potentialBringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potentialAdrian Hornsby
 
LREProxy module for Kamailio Presenation
LREProxy module for Kamailio PresenationLREProxy module for Kamailio Presenation
LREProxy module for Kamailio PresenationMojtaba Esfandiari
 
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...Harshal Solao
 
PhD Thesis Diogo Mónica
PhD Thesis Diogo MónicaPhD Thesis Diogo Mónica
PhD Thesis Diogo MónicaDiogo Mónica
 
AJAY NANOCHIP RESUME
AJAY NANOCHIP RESUMEAJAY NANOCHIP RESUME
AJAY NANOCHIP RESUMEAJAY ABRAHAM
 
Graphical packet generator
Graphical packet generatorGraphical packet generator
Graphical packet generatortusharjadhav2611
 
What is a Service Mesh and what can it do for your Microservices
What is a Service Mesh and what can it do for your MicroservicesWhat is a Service Mesh and what can it do for your Microservices
What is a Service Mesh and what can it do for your MicroservicesMatt Turner
 

Similar to Presentation: Extended Summary of "Coded Slotted ALOHA- A Graph-Based Method for Uncoordinated Multiple Access" (20)

A Graph-Based Method For Cross-Entity Threat Detection
 A Graph-Based Method For Cross-Entity Threat Detection A Graph-Based Method For Cross-Entity Threat Detection
A Graph-Based Method For Cross-Entity Threat Detection
 
Operationalizing SDN
Operationalizing SDNOperationalizing SDN
Operationalizing SDN
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Detecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking DataDetecting Hacks: Anomaly Detection on Networking Data
Detecting Hacks: Anomaly Detection on Networking Data
 
Cilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDPCilium - Fast IPv6 Container Networking with BPF and XDP
Cilium - Fast IPv6 Container Networking with BPF and XDP
 
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & OutcomesR2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
R2D2 Project (EP/L006251/1) - Research Objectives & Outcomes
 
Scaling the Container Dataplane
Scaling the Container Dataplane Scaling the Container Dataplane
Scaling the Container Dataplane
 
Safer Commutes & Streaming Data | George Padavick, Ohio Department of Transpo...
Safer Commutes & Streaming Data | George Padavick, Ohio Department of Transpo...Safer Commutes & Streaming Data | George Padavick, Ohio Department of Transpo...
Safer Commutes & Streaming Data | George Padavick, Ohio Department of Transpo...
 
Ijecet 06 06_002
Ijecet 06 06_002Ijecet 06 06_002
Ijecet 06 06_002
 
Recent advance in netmap/VALE(mSwitch)
Recent advance in netmap/VALE(mSwitch)Recent advance in netmap/VALE(mSwitch)
Recent advance in netmap/VALE(mSwitch)
 
Cikm 2018
Cikm 2018Cikm 2018
Cikm 2018
 
A chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication systemA chaotic direct sequence spread-spectrum communication system
A chaotic direct sequence spread-spectrum communication system
 
Bringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potentialBringing Wireless Sensing to its full potential
Bringing Wireless Sensing to its full potential
 
LREProxy module for Kamailio Presenation
LREProxy module for Kamailio PresenationLREProxy module for Kamailio Presenation
LREProxy module for Kamailio Presenation
 
Real time traffic management - challenges and solutions
Real time traffic management - challenges and solutionsReal time traffic management - challenges and solutions
Real time traffic management - challenges and solutions
 
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
An Efficient Parallel Algorithm for Secured Data Communication Using RSA Publ...
 
PhD Thesis Diogo Mónica
PhD Thesis Diogo MónicaPhD Thesis Diogo Mónica
PhD Thesis Diogo Mónica
 
AJAY NANOCHIP RESUME
AJAY NANOCHIP RESUMEAJAY NANOCHIP RESUME
AJAY NANOCHIP RESUME
 
Graphical packet generator
Graphical packet generatorGraphical packet generator
Graphical packet generator
 
What is a Service Mesh and what can it do for your Microservices
What is a Service Mesh and what can it do for your MicroservicesWhat is a Service Mesh and what can it do for your Microservices
What is a Service Mesh and what can it do for your Microservices
 

Recently uploaded

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksMagic Marks
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdfKamal Acharya
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Call Girls Mumbai
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptxrouholahahmadi9876
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdfKamal Acharya
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfsumitt6_25730773
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfJiananWang21
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxmaisarahman1
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdfKamal Acharya
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Arindam Chakraborty, Ph.D., P.E. (CA, TX)
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayEpec Engineered Technologies
 

Recently uploaded (20)

Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Online electricity billing project report..pdf
Online electricity billing project report..pdfOnline electricity billing project report..pdf
Online electricity billing project report..pdf
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
457503602-5-Gas-Well-Testing-and-Analysis-pptx.pptx
 
Hospital management system project report.pdf
Hospital management system project report.pdfHospital management system project report.pdf
Hospital management system project report.pdf
 
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdfIntroduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdfdata_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
 
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptxA CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
A CASE STUDY ON CERAMIC INDUSTRY OF BANGLADESH.pptx
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
School management system project Report.pdf
School management system project Report.pdfSchool management system project Report.pdf
School management system project Report.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 

Presentation: Extended Summary of "Coded Slotted ALOHA- A Graph-Based Method for Uncoordinated Multiple Access"

  • 1. Extended Summary of “Coded Slotted ALOHA: A Graph-Based Method for Uncoordinated Multiple Access” Enrico Paolini, Gianluigi Liva, and Marco Chiani. Coded slotted aloha: A graph-based method for uncoordinated multiple access. IEEE Transactions on Information Theory, 61(12):6815–6832, 2015. Student: Marco Parentin - IN0500912 Supervisor: Prof. Fulvio Babich Academic Year: 2022-2023
  • 2. MASSIVE MULTIPLE ACCESS (MMA) q Multiple access (MA): organize trasmissions from many independent users to a common receiver q Massive scenario: Ø Huge population size Ø Random and sporadic activity Ø Short packets q Traditional schemes are not suitable for MMA due to low efficiency Image: https://hdl.handle.net/11580/98575 1
  • 3. TOWARDS 6G’s IoT q Billions of machine-type users (massive Machine-type Communication) q Sporadic transmission of few packets (e.g. alarm, GPS position, …) q Highly unpredictable number of active users Ø Need for a scalable scheme 2
  • 4. RANDOM MULTIPLE ACCESS (RMA) q Traditional solution: Slotted ALOHA (SA) Ø Time divided in slots Ø Users transmit in first available slot whenever they have a packet Ø No coordination: collisions and idle slots ⇒ Low efficiency 3
  • 5. RANDOM MULTIPLE ACCESS (RMA) q Traditional solution: Slotted ALOHA (SA) Ø Time divided in slots Ø Users transmit in first available slot whenever they have a packet Ø No coordination: collisions and idle slots ⇒ Low efficiency q Modern solutions: Successive Interference Cancellation (SIC) Ø Remove contribution of correctly received packet in colliding slot Ø Repetition schemes: CRDSA (2007), IRSA (2011) Ø Packet-coding scheme: CODED SLOTTED ALOHA (CSA, 2015) 3
  • 6. CSA ENCODING PROCESS Ø User Activation 4
  • 7. CSA ENCODING PROCESS Ø User Activation Ø Segmentation 4
  • 8. CSA ENCODING PROCESS Ø User Activation Ø Segmentation Ø Packet-Level Encoding 4
  • 9. CSA ENCODING PROCESS Ø User Activation Ø Segmentation Ø Packet-Level Encoding Ø Random slice selection 4
  • 10. CSA ENCODING PROCESS Ø User Activation Ø Segmentation Ø Packet-Level Encoding Ø Random slice selection 4
  • 11. CSA ENCODING PROCESS Ø User Activation Ø Segmentation Ø Packet-Level Encoding Ø Random slice selection 4
  • 13. CSA DECODING PROCESS Ø Clean segments received 5
  • 14. CSA DECODING PROCESS Ø Clean segments received Ø Local erasure decoding 5
  • 15. CSA DECODING PROCESS Ø Clean segments received Ø Local erasure decoding Ø SIC 5
  • 16. CSA DECODING PROCESS Ø Clean segments received Ø Local erasure decoding Ø SIC Ø Iterate 5
  • 17. CSA DECODING PROCESS Ø Clean segments received Ø Local erasure decoding Ø SIC Ø Iterate 5
  • 18. PERFORMANCE ANALYSIS (I) q Key idea: exploit analogy with decoding of LDPC codes on graphs ⇕ q SIC ≡ Message passing through graph’s edges 6
  • 19. PERFORMANCE ANALYSIS (II) q Important parameters: Ø Load 𝑮: avarage packets per slot Ø Throughput 𝑺: expected successful transmissions per slot qAsymptotic analysis of iterative decoding: Ø Threshold behavior ∃ 𝐺!"# ∶ % 𝑆 = 𝐺 ∀ 𝐺 < 𝐺!"# 𝑆 = 0 ∀ 𝐺 > 𝐺!"# Ø No retransmission for 𝐺 < 𝐺!"# Image: From 5G to 6G: Has the Time for Modern Random Access Come? 7
  • 20. WEAK POINTS and FUTURE q Main issue: SIC requires synchronization Ø Ok for satellites Ø Difficult in terrestrial distributed systems SATELLITE NOMA (Capture) IRSA / CSA (SIC) 5G 8
  • 21. WEAK POINTS and FUTURE q Main issue: SIC requires synchronization Ø Ok for satellites Ø Difficult in terrestrial distributed systems NOMA (Capture) IRSA / CSA (SIC) 6G? 8
  • 22. q In CSA segmentation, code diversity and SIC enable to approach 1 packet/slot of throughput without retransmissions q Higher energy efficiency with respect to IRSA q Several commonalities with LDPC codes on graphs q The scheme is promising for 6G CONCLUSIONS 9
  • 23. THANK YOU FOR YOUR ATTENTION 10