SlideShare a Scribd company logo
1 of 32
frameless ALOHA:
analysis of the physical layer effects
Petar Popovski
Cedomir Stefanovic, Miyu Momoda
Aalborg University
Denmark
2 / 32
outline
 intro: massive M2M communication
 frameless ALOHA
– random access based on rateless codes
– noise and capture
 summary
3 / 15
R1: today’s systems
R2: high-speed versions
of today’s systems
R3: massive access for
sensors and machines
R4: ultra-reliable
connectivity
R5: physically
impossible
data
rate
1
kbps
Mbps
Gbps
bps
1000
0
1000
100
10
R5
≥99%
R2
# devices
≥95%
≥99.999%
R4
≥90-99%
R3
the shape of wireless to come
≥99%
R1
4 / 32
massive M2M
 it will be billions, but how many?
o Ericsson figure is pointing to 50 billions
o others are less ambitious
 massive variation in the requirements
o traffic burstiness/regularity
• smart meter vs. event-driven surveillance camera
o data chunk size
• single sensor reading vs. image
o dependability requirements
• emergency data vs. regular update
5 / 32
defining massive M2M
the total number of
managed connections to
individual devices is
much larger than the average
number of active connections
within a short service period
6 / 32
access protocols for massive M2M
 massive M2M setup emulates
the original analytical setup for ALOHA
– infinite population,
maximal uncertainty about the set of active devices
 difference occurs if the arrivals are correlated
time
…
event
… …
short service period
7 / 32
how to make protocols for massive access
 predict the activation:
– account for the relations among the devices,
group support, traffic correlation
 control the activation
– load control mechanisms
 our focus:
improve the access capability of the protocols
– departure from “collision is a waste”
– put more burden on the BS
8 / 32
observations on random access
 useful when
– the devices have not interacted before
– the required flexibility is above a threshold
 use with caution
– in a static setup , the devices “know each other”,
and a better strategy (learning, adaptation) can be used
 signaling, waste (error, collisions)
may take a large fraction of the resources
– especially important for small data chunks
9 / 32
FRAMELESS ALOHA
or
rateless coded random access
10 / 32
slotted ALOHA
 essentially part of all cellular standards
 all collisions destructive
– only single slots contribute to throughput
 memoryless randomized selection
of the retransmission instant
11 / 32
expanding ALOHA with SIC
(successive interference cancellation)
 users send replicas in
several randomly chosen slots
– same number of replicas per user
– throughput 0.55 with two repetitions per user
frame of M slots
. . .
. . .
time
slots
N users
E. Casini, R. De Gaudenzi, and O. Herrero,
“Contention Resolution Diversity Slotted
ALOHA (CRDSA): An Enhanced Random
Access Scheme for Satellite Access Packet
Networks,” Wireless Communica- tions,
IEEE Transactions on, vol. 6, pp. 1408 –
1419, april 2007.
12 / 32
how SIC is done
 each successfully decoded replica
enables canceling of other replicas
user 1
user 2
user 3
time
slot 1 slot 2 slot 3 slot 4
13 / 32
SIC and codes on graphs
 new insight
- analogy with the
codes-on-graphs
- each user selects its no. of
repeated transmissions
according to a predefined
distribution
 important differences
- left degree can be
controlled to exact values,
right degree only
statistically
- right degree 0
possible (idle slot)
. . .
. . .
variable nodes
G. Liva, “Graph-Based Analysis and Optimization of
Contention Resolution Diversity Slotted ALOHA,” IEEE
Trans. Commun., Feb. 2011.
check nodes
14 / 32
frameless ALOHA
 idea: apply paradigm of rateless
codes to slotted ALOHA:
– no predefined frame length
– slots are successively added until a
criterion related to key performance
parameters of the scheme is
satisfied
.
.
.
.
.
.
N users
M slots
15 / 32
• single feedback used after M-th slot
- M not defined in advance (rateless!)
• feedback when sufficient slots collected
- for example, NR < N resolved users lead
to throughput of
NR
M
time
slots
. . . . . .
. . .
frameless ALOHA
overview
16 / 32
frameless ALOHA
stopping criterion
G∗ M ∗ / N T̄m ax
2.55 1.32 0.68
2.68 1.27 0.73
2.85 1.15 0.8
2.9 1.12 0.82
2.98 1.08 0.85
3.12 1.05 0.87
n)
TABLE I
∗ , OPTIMAL NORMALIZED NUMBER OF
MAXIMAL AVERAGE THROUGHPUT T̄m ax ,
N NUMBER OF USERS N
number of slotsM ∗
/ N of theframe
ing maximal average throughput
given number of users N 4
. These
idelines for the design of framed
erethethelength of theframe(i.e.,
0.5 0.6 0.7 0.8 0.9 1 1.1 1.2 1.3 1.4 1.5
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
1
M/N
Fraction of resolved users FR
Instantaneous throughput TI
Fig. 2. Typical performance of the proposed scheme, N = 500, G = 2
fraction should be chosen such that the (expected) through
is maximized. FR is computed as:
a typical run of frameless
ALOHA in terms of
(1) fraction of resolved
users
(2) instantaneous
throughput
heuristic stopping criterion:
fraction of resolved users
genie-aided stopping criterion:
stop when T is maximal
17 / 32
analogy with the rateless codes
 structural
– selection of transmission probabilities
 operational
– stopping criterion based on target performance
 controlling of the degree distribution
– in the simplest case all the users have the same
transmission probability
18 / 32
errorless case
 all users transmit with the same probability distribution
– no channel-induced errors
 slot access probability
b is the average slot degree
 objective:
maximize throughput by selecting b and
designing the termination criterion
pa =
b
N
19 / 32
asymptotic analysis
 probability of user resolution PR
when the number of users N goes to infinity
 M is the number of elapsed slots
 asymptotic throughput
contention is terminated at the M -th slot and the number of resolved users
NR, then TI can be computed as:
TI =
NR
M
.
Analysis
otic behavior, when N → ∞ , of the probability of user resolution PR an
ghput T:
T =
PR
M/ N
=
PR
1+
,
20 / 32
result of the AND-OR analysis
21 / 32
non-asymptotic behavior
22 / 32
termination and throughput
50 100 500 1000
0.83 0.84 0.88 0.88
0.82 0.84 0.87 0.88
0.75 0.76 0.76 0.76
0.97 0.95 0.9 0.9
2.68 2.83 2.99 3.03
0.83 0.87 0.88 0.89
 simple termination:
stop the contention
if either is true
FR≥V or T=1
 genie-aided (GA)
termination
 the highest reported throughput
for a practical (low to moderate) no. of users
23 / 32
average delay
 the rateless structure provides an elegant framework
to compute the average delay of the resolved users
 average delay as a function of
the total number of contention slots M
– the probability that a user is resolved after m slots is p(m)
24 / 32
average delay example
 slot access probability
– optimized for throughput maximization
 asymptotic analysis
 observations
– average delay shifted towards the end of the contention period
– most of the users get resolved close to the end
– typical for the iterative belief-propagation
– NB: we have not optimized the protocol for
delay minimization
p(M) T M/N D(M)/N
0.928193 0.874474 1.06145 0.928031
25 / 32
noise –induced errors
 plug in the noise
 the link of each individual user has a different SNR
 received signal in a slot
 example
– if user 2 is resolved elsewhere and cancelled by SIC,
the probability that slot j is useful is high
– situation opposite when user 1 removed by SIC,
slot j less likely useful
Yj = hi Xij + Zj
å
Yj =10X1j + X2 j +Zj
26 / 32
capture effect (1)
 gives rise to intra-slot SIC in addition to inter-slot SIC
 typical model for the decoding process
received power of user i
noise power
Received power of interfering users
capture threshold
27 / 32
capture effect (2)
 the capture effect boost the SIC
 capture can occur anew after
every removal of a colliding transmission from the slot
– asymptotic analysis significantly complicated
no capture effect with capture effect
unresolved user
resolved user
28 / 32
capture effect: example
 narrowband system, valid for M2M:
 Rayleigh fading
 pdf of SNR for user i at the receiver
– long-term power control and
the same expected SNR for every user
29 / 32
asymptotic analysis (1)
30 / 32
asymptotic analysis (2)
 high SNR => low b/SNR
– throughput is well over 1!
– throughput decreases as the capture threshold b increases
 low SNR => high b/SNR
– the achievable throughputs drop
– noise impact significant
 target slot degrees are higher
compared the case without capture effect
– the capture effect favors more collisions
31 / 32
non-asymptotic results
 confirm the conclusions of the asymptotic analysis
32 / 32
summary
 high interest for massive access in the upcoming wireless
– M2M communication
 coded random access
– addresses the fundamental obstacle of collisions in ALOHA
 frameless ALOHA
– inspired by rateless codes, inter-slot SIC
– nontrivial interaction with capture and intra-slot SIC
 main future steps
– finite blocklength
– reengineer and existing ALOHA protocol into coded random access

More Related Content

Similar to FramelessALOHA_2014.pptx

Noise Immune and Area Optimized Serial Interface for FPGA based Industrial In...
Noise Immune and Area Optimized Serial Interface for FPGA based Industrial In...Noise Immune and Area Optimized Serial Interface for FPGA based Industrial In...
Noise Immune and Area Optimized Serial Interface for FPGA based Industrial In...
International Journal of Science and Research (IJSR)
 
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd Iaetsd
 
Adaptive blind multiuser detection under impulsive noise using principal comp...
Adaptive blind multiuser detection under impulsive noise using principal comp...Adaptive blind multiuser detection under impulsive noise using principal comp...
Adaptive blind multiuser detection under impulsive noise using principal comp...
csandit
 
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
csandit
 
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
cscpconf
 
Types Of Window Being Used For The Selected Granule
Types Of Window Being Used For The Selected GranuleTypes Of Window Being Used For The Selected Granule
Types Of Window Being Used For The Selected Granule
Leslie Lee
 
High speed board design considerations
High speed board design considerationsHigh speed board design considerations
High speed board design considerations
Mohamad Tisani
 

Similar to FramelessALOHA_2014.pptx (20)

Multi user-MIMO Broadcast Channel techniques
Multi user-MIMO Broadcast Channel techniquesMulti user-MIMO Broadcast Channel techniques
Multi user-MIMO Broadcast Channel techniques
 
Multiuser detection new
Multiuser detection newMultiuser detection new
Multiuser detection new
 
G010223035
G010223035G010223035
G010223035
 
Noise Immune and Area Optimized Serial Interface for FPGA based Industrial In...
Noise Immune and Area Optimized Serial Interface for FPGA based Industrial In...Noise Immune and Area Optimized Serial Interface for FPGA based Industrial In...
Noise Immune and Area Optimized Serial Interface for FPGA based Industrial In...
 
Reduction of Outage Probability in Fast Rayleigh Fading MIMO Channels Using OFDM
Reduction of Outage Probability in Fast Rayleigh Fading MIMO Channels Using OFDMReduction of Outage Probability in Fast Rayleigh Fading MIMO Channels Using OFDM
Reduction of Outage Probability in Fast Rayleigh Fading MIMO Channels Using OFDM
 
Iaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdmaIaetsd performance analysis of multicarrier ds-cdma
Iaetsd performance analysis of multicarrier ds-cdma
 
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
OPTIMIZATION TECHNIQUES FOR SOURCE FOLLOWER BASED TRACK-AND-HOLD CIRCUIT FOR ...
 
Adaptive blind multiuser detection under impulsive noise using principal comp...
Adaptive blind multiuser detection under impulsive noise using principal comp...Adaptive blind multiuser detection under impulsive noise using principal comp...
Adaptive blind multiuser detection under impulsive noise using principal comp...
 
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
 
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
ADAPTIVE BLIND MULTIUSER DETECTION UNDER IMPULSIVE NOISE USING PRINCIPAL COMP...
 
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
Classical Discrete-Time Fourier TransformBased Channel Estimation for MIMO-OF...
 
Types Of Window Being Used For The Selected Granule
Types Of Window Being Used For The Selected GranuleTypes Of Window Being Used For The Selected Granule
Types Of Window Being Used For The Selected Granule
 
L4 multiplexing &amp; multiple access 16
L4 multiplexing &amp; multiple access 16L4 multiplexing &amp; multiple access 16
L4 multiplexing &amp; multiple access 16
 
Design and performance analysis of band pass filter
Design and performance analysis of band pass filterDesign and performance analysis of band pass filter
Design and performance analysis of band pass filter
 
MC-cdma
MC-cdmaMC-cdma
MC-cdma
 
Code Division Multiple Access.pptx
Code Division Multiple Access.pptxCode Division Multiple Access.pptx
Code Division Multiple Access.pptx
 
Pilot Decontamination over Time Frequency and Space Domains in Multi-Cell Ma...
Pilot Decontamination over Time Frequency and  Space Domains in Multi-Cell Ma...Pilot Decontamination over Time Frequency and  Space Domains in Multi-Cell Ma...
Pilot Decontamination over Time Frequency and Space Domains in Multi-Cell Ma...
 
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA SystemMultiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
Multiuser Detection with Decision-feedback Detectors and PIC in MC-CDMA System
 
Multiple acces techniques
Multiple acces techniquesMultiple acces techniques
Multiple acces techniques
 
High speed board design considerations
High speed board design considerationsHigh speed board design considerations
High speed board design considerations
 

More from YAAKOVSOLOMON1

MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdf
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdfMASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdf
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdf
YAAKOVSOLOMON1
 
Complexity analysis for recent ALOHA random access techniques.pdf
Complexity analysis for recent ALOHA random access techniques.pdfComplexity analysis for recent ALOHA random access techniques.pdf
Complexity analysis for recent ALOHA random access techniques.pdf
YAAKOVSOLOMON1
 
RANDOM MAC OPTIMIZATION FOR IOT COMMUNICATION.pdf
RANDOM MAC OPTIMIZATION FOR IOT COMMUNICATION.pdfRANDOM MAC OPTIMIZATION FOR IOT COMMUNICATION.pdf
RANDOM MAC OPTIMIZATION FOR IOT COMMUNICATION.pdf
YAAKOVSOLOMON1
 
Machine-Type-Communication in 5G Cellular System-Li_Yue_PhD_2018.pdf
Machine-Type-Communication in 5G Cellular System-Li_Yue_PhD_2018.pdfMachine-Type-Communication in 5G Cellular System-Li_Yue_PhD_2018.pdf
Machine-Type-Communication in 5G Cellular System-Li_Yue_PhD_2018.pdf
YAAKOVSOLOMON1
 
Massive_Machine-type_Communications_in_5G_Physical.pdf
Massive_Machine-type_Communications_in_5G_Physical.pdfMassive_Machine-type_Communications_in_5G_Physical.pdf
Massive_Machine-type_Communications_in_5G_Physical.pdf
YAAKOVSOLOMON1
 
Massive_MTC_An_Overview and Perspectives Towards 5G.pdf
Massive_MTC_An_Overview and Perspectives Towards 5G.pdfMassive_MTC_An_Overview and Perspectives Towards 5G.pdf
Massive_MTC_An_Overview and Perspectives Towards 5G.pdf
YAAKOVSOLOMON1
 
Graph-based Random-Access Protocols for Massive Multiple Access Networks.pdf
Graph-based Random-Access Protocols for Massive Multiple Access Networks.pdfGraph-based Random-Access Protocols for Massive Multiple Access Networks.pdf
Graph-based Random-Access Protocols for Massive Multiple Access Networks.pdf
YAAKOVSOLOMON1
 
Massive MTC An Overview and Perspectives Towards 5G (2).pdf
Massive MTC An Overview and Perspectives Towards 5G (2).pdfMassive MTC An Overview and Perspectives Towards 5G (2).pdf
Massive MTC An Overview and Perspectives Towards 5G (2).pdf
YAAKOVSOLOMON1
 
Extended LTE Coverage for Indoor Machine Type Communication.pdf
Extended LTE Coverage for Indoor Machine Type Communication.pdfExtended LTE Coverage for Indoor Machine Type Communication.pdf
Extended LTE Coverage for Indoor Machine Type Communication.pdf
YAAKOVSOLOMON1
 
Key Enabling Technologies of 5G Wireless Mobile Communication.pdf
Key Enabling Technologies of 5G Wireless Mobile Communication.pdfKey Enabling Technologies of 5G Wireless Mobile Communication.pdf
Key Enabling Technologies of 5G Wireless Mobile Communication.pdf
YAAKOVSOLOMON1
 
Finite-Length Performance Analysis of Slotted ALOHA-Thesis.pdf
Finite-Length Performance Analysis of Slotted ALOHA-Thesis.pdfFinite-Length Performance Analysis of Slotted ALOHA-Thesis.pdf
Finite-Length Performance Analysis of Slotted ALOHA-Thesis.pdf
YAAKOVSOLOMON1
 
6G Internet of Things - A Comprehensive Survey.pdf
6G Internet of Things - A Comprehensive Survey.pdf6G Internet of Things - A Comprehensive Survey.pdf
6G Internet of Things - A Comprehensive Survey.pdf
YAAKOVSOLOMON1
 
Simulation analysis of key technology optimization of 5G.pdf
Simulation analysis of key technology optimization of 5G.pdfSimulation analysis of key technology optimization of 5G.pdf
Simulation analysis of key technology optimization of 5G.pdf
YAAKOVSOLOMON1
 

More from YAAKOVSOLOMON1 (20)

MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdf
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdfMASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdf
MASSIVE MACHINE TYPE COMMUNICATION TOWARDS 6G.pdf
 
Complexity analysis for recent ALOHA random access techniques.pdf
Complexity analysis for recent ALOHA random access techniques.pdfComplexity analysis for recent ALOHA random access techniques.pdf
Complexity analysis for recent ALOHA random access techniques.pdf
 
IoT and Low-Power Wireless.pdf
IoT and Low-Power Wireless.pdfIoT and Low-Power Wireless.pdf
IoT and Low-Power Wireless.pdf
 
RANDOM MAC OPTIMIZATION FOR IOT COMMUNICATION.pdf
RANDOM MAC OPTIMIZATION FOR IOT COMMUNICATION.pdfRANDOM MAC OPTIMIZATION FOR IOT COMMUNICATION.pdf
RANDOM MAC OPTIMIZATION FOR IOT COMMUNICATION.pdf
 
Machine-Type-Communication in 5G Cellular System-Li_Yue_PhD_2018.pdf
Machine-Type-Communication in 5G Cellular System-Li_Yue_PhD_2018.pdfMachine-Type-Communication in 5G Cellular System-Li_Yue_PhD_2018.pdf
Machine-Type-Communication in 5G Cellular System-Li_Yue_PhD_2018.pdf
 
Massive_Machine-type_Communications_in_5G_Physical.pdf
Massive_Machine-type_Communications_in_5G_Physical.pdfMassive_Machine-type_Communications_in_5G_Physical.pdf
Massive_Machine-type_Communications_in_5G_Physical.pdf
 
Massive_MTC_An_Overview and Perspectives Towards 5G.pdf
Massive_MTC_An_Overview and Perspectives Towards 5G.pdfMassive_MTC_An_Overview and Perspectives Towards 5G.pdf
Massive_MTC_An_Overview and Perspectives Towards 5G.pdf
 
Graph-based Random-Access Protocols for Massive Multiple Access Networks.pdf
Graph-based Random-Access Protocols for Massive Multiple Access Networks.pdfGraph-based Random-Access Protocols for Massive Multiple Access Networks.pdf
Graph-based Random-Access Protocols for Massive Multiple Access Networks.pdf
 
Massive MTC An Overview and Perspectives Towards 5G (2).pdf
Massive MTC An Overview and Perspectives Towards 5G (2).pdfMassive MTC An Overview and Perspectives Towards 5G (2).pdf
Massive MTC An Overview and Perspectives Towards 5G (2).pdf
 
Resolution for Random Access Schemes.pdf
Resolution for Random Access Schemes.pdfResolution for Random Access Schemes.pdf
Resolution for Random Access Schemes.pdf
 
Extended LTE Coverage for Indoor Machine Type Communication.pdf
Extended LTE Coverage for Indoor Machine Type Communication.pdfExtended LTE Coverage for Indoor Machine Type Communication.pdf
Extended LTE Coverage for Indoor Machine Type Communication.pdf
 
Massive Machine‐type Communications in 5G.pdf
Massive Machine‐type Communications in 5G.pdfMassive Machine‐type Communications in 5G.pdf
Massive Machine‐type Communications in 5G.pdf
 
Massive MTC 5G-Physical and MAC‐layer.pdf
Massive MTC 5G-Physical and MAC‐layer.pdfMassive MTC 5G-Physical and MAC‐layer.pdf
Massive MTC 5G-Physical and MAC‐layer.pdf
 
Key Enabling Technologies of 5G Wireless Mobile Communication.pdf
Key Enabling Technologies of 5G Wireless Mobile Communication.pdfKey Enabling Technologies of 5G Wireless Mobile Communication.pdf
Key Enabling Technologies of 5G Wireless Mobile Communication.pdf
 
contention resolution diversity slotted.pdf
contention resolution diversity slotted.pdfcontention resolution diversity slotted.pdf
contention resolution diversity slotted.pdf
 
CodedALOHA.pdf
CodedALOHA.pdfCodedALOHA.pdf
CodedALOHA.pdf
 
Finite-Length Performance Analysis of Slotted ALOHA-Thesis.pdf
Finite-Length Performance Analysis of Slotted ALOHA-Thesis.pdfFinite-Length Performance Analysis of Slotted ALOHA-Thesis.pdf
Finite-Length Performance Analysis of Slotted ALOHA-Thesis.pdf
 
6G Internet of Things - A Comprehensive Survey.pdf
6G Internet of Things - A Comprehensive Survey.pdf6G Internet of Things - A Comprehensive Survey.pdf
6G Internet of Things - A Comprehensive Survey.pdf
 
CODED SLOTTED ALOHA-Thesis.pdf
CODED SLOTTED ALOHA-Thesis.pdfCODED SLOTTED ALOHA-Thesis.pdf
CODED SLOTTED ALOHA-Thesis.pdf
 
Simulation analysis of key technology optimization of 5G.pdf
Simulation analysis of key technology optimization of 5G.pdfSimulation analysis of key technology optimization of 5G.pdf
Simulation analysis of key technology optimization of 5G.pdf
 

Recently uploaded

result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
Tonystark477637
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Christo Ananth
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
dharasingh5698
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Recently uploaded (20)

Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLSMANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
MANUFACTURING PROCESS-II UNIT-5 NC MACHINE TOOLS
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptxBSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
BSides Seattle 2024 - Stopping Ethan Hunt From Taking Your Data.pptx
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
Online banking management system project.pdf
Online banking management system project.pdfOnline banking management system project.pdf
Online banking management system project.pdf
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 

FramelessALOHA_2014.pptx

  • 1. frameless ALOHA: analysis of the physical layer effects Petar Popovski Cedomir Stefanovic, Miyu Momoda Aalborg University Denmark
  • 2. 2 / 32 outline  intro: massive M2M communication  frameless ALOHA – random access based on rateless codes – noise and capture  summary
  • 3. 3 / 15 R1: today’s systems R2: high-speed versions of today’s systems R3: massive access for sensors and machines R4: ultra-reliable connectivity R5: physically impossible data rate 1 kbps Mbps Gbps bps 1000 0 1000 100 10 R5 ≥99% R2 # devices ≥95% ≥99.999% R4 ≥90-99% R3 the shape of wireless to come ≥99% R1
  • 4. 4 / 32 massive M2M  it will be billions, but how many? o Ericsson figure is pointing to 50 billions o others are less ambitious  massive variation in the requirements o traffic burstiness/regularity • smart meter vs. event-driven surveillance camera o data chunk size • single sensor reading vs. image o dependability requirements • emergency data vs. regular update
  • 5. 5 / 32 defining massive M2M the total number of managed connections to individual devices is much larger than the average number of active connections within a short service period
  • 6. 6 / 32 access protocols for massive M2M  massive M2M setup emulates the original analytical setup for ALOHA – infinite population, maximal uncertainty about the set of active devices  difference occurs if the arrivals are correlated time … event … … short service period
  • 7. 7 / 32 how to make protocols for massive access  predict the activation: – account for the relations among the devices, group support, traffic correlation  control the activation – load control mechanisms  our focus: improve the access capability of the protocols – departure from “collision is a waste” – put more burden on the BS
  • 8. 8 / 32 observations on random access  useful when – the devices have not interacted before – the required flexibility is above a threshold  use with caution – in a static setup , the devices “know each other”, and a better strategy (learning, adaptation) can be used  signaling, waste (error, collisions) may take a large fraction of the resources – especially important for small data chunks
  • 9. 9 / 32 FRAMELESS ALOHA or rateless coded random access
  • 10. 10 / 32 slotted ALOHA  essentially part of all cellular standards  all collisions destructive – only single slots contribute to throughput  memoryless randomized selection of the retransmission instant
  • 11. 11 / 32 expanding ALOHA with SIC (successive interference cancellation)  users send replicas in several randomly chosen slots – same number of replicas per user – throughput 0.55 with two repetitions per user frame of M slots . . . . . . time slots N users E. Casini, R. De Gaudenzi, and O. Herrero, “Contention Resolution Diversity Slotted ALOHA (CRDSA): An Enhanced Random Access Scheme for Satellite Access Packet Networks,” Wireless Communica- tions, IEEE Transactions on, vol. 6, pp. 1408 – 1419, april 2007.
  • 12. 12 / 32 how SIC is done  each successfully decoded replica enables canceling of other replicas user 1 user 2 user 3 time slot 1 slot 2 slot 3 slot 4
  • 13. 13 / 32 SIC and codes on graphs  new insight - analogy with the codes-on-graphs - each user selects its no. of repeated transmissions according to a predefined distribution  important differences - left degree can be controlled to exact values, right degree only statistically - right degree 0 possible (idle slot) . . . . . . variable nodes G. Liva, “Graph-Based Analysis and Optimization of Contention Resolution Diversity Slotted ALOHA,” IEEE Trans. Commun., Feb. 2011. check nodes
  • 14. 14 / 32 frameless ALOHA  idea: apply paradigm of rateless codes to slotted ALOHA: – no predefined frame length – slots are successively added until a criterion related to key performance parameters of the scheme is satisfied . . . . . . N users M slots
  • 15. 15 / 32 • single feedback used after M-th slot - M not defined in advance (rateless!) • feedback when sufficient slots collected - for example, NR < N resolved users lead to throughput of NR M time slots . . . . . . . . . frameless ALOHA overview
  • 16. 16 / 32 frameless ALOHA stopping criterion G∗ M ∗ / N T̄m ax 2.55 1.32 0.68 2.68 1.27 0.73 2.85 1.15 0.8 2.9 1.12 0.82 2.98 1.08 0.85 3.12 1.05 0.87 n) TABLE I ∗ , OPTIMAL NORMALIZED NUMBER OF MAXIMAL AVERAGE THROUGHPUT T̄m ax , N NUMBER OF USERS N number of slotsM ∗ / N of theframe ing maximal average throughput given number of users N 4 . These idelines for the design of framed erethethelength of theframe(i.e., 0.5 0.6 0.7 0.8 0.9 1 1.1 1.2 1.3 1.4 1.5 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 M/N Fraction of resolved users FR Instantaneous throughput TI Fig. 2. Typical performance of the proposed scheme, N = 500, G = 2 fraction should be chosen such that the (expected) through is maximized. FR is computed as: a typical run of frameless ALOHA in terms of (1) fraction of resolved users (2) instantaneous throughput heuristic stopping criterion: fraction of resolved users genie-aided stopping criterion: stop when T is maximal
  • 17. 17 / 32 analogy with the rateless codes  structural – selection of transmission probabilities  operational – stopping criterion based on target performance  controlling of the degree distribution – in the simplest case all the users have the same transmission probability
  • 18. 18 / 32 errorless case  all users transmit with the same probability distribution – no channel-induced errors  slot access probability b is the average slot degree  objective: maximize throughput by selecting b and designing the termination criterion pa = b N
  • 19. 19 / 32 asymptotic analysis  probability of user resolution PR when the number of users N goes to infinity  M is the number of elapsed slots  asymptotic throughput contention is terminated at the M -th slot and the number of resolved users NR, then TI can be computed as: TI = NR M . Analysis otic behavior, when N → ∞ , of the probability of user resolution PR an ghput T: T = PR M/ N = PR 1+ ,
  • 20. 20 / 32 result of the AND-OR analysis
  • 22. 22 / 32 termination and throughput 50 100 500 1000 0.83 0.84 0.88 0.88 0.82 0.84 0.87 0.88 0.75 0.76 0.76 0.76 0.97 0.95 0.9 0.9 2.68 2.83 2.99 3.03 0.83 0.87 0.88 0.89  simple termination: stop the contention if either is true FR≥V or T=1  genie-aided (GA) termination  the highest reported throughput for a practical (low to moderate) no. of users
  • 23. 23 / 32 average delay  the rateless structure provides an elegant framework to compute the average delay of the resolved users  average delay as a function of the total number of contention slots M – the probability that a user is resolved after m slots is p(m)
  • 24. 24 / 32 average delay example  slot access probability – optimized for throughput maximization  asymptotic analysis  observations – average delay shifted towards the end of the contention period – most of the users get resolved close to the end – typical for the iterative belief-propagation – NB: we have not optimized the protocol for delay minimization p(M) T M/N D(M)/N 0.928193 0.874474 1.06145 0.928031
  • 25. 25 / 32 noise –induced errors  plug in the noise  the link of each individual user has a different SNR  received signal in a slot  example – if user 2 is resolved elsewhere and cancelled by SIC, the probability that slot j is useful is high – situation opposite when user 1 removed by SIC, slot j less likely useful Yj = hi Xij + Zj å Yj =10X1j + X2 j +Zj
  • 26. 26 / 32 capture effect (1)  gives rise to intra-slot SIC in addition to inter-slot SIC  typical model for the decoding process received power of user i noise power Received power of interfering users capture threshold
  • 27. 27 / 32 capture effect (2)  the capture effect boost the SIC  capture can occur anew after every removal of a colliding transmission from the slot – asymptotic analysis significantly complicated no capture effect with capture effect unresolved user resolved user
  • 28. 28 / 32 capture effect: example  narrowband system, valid for M2M:  Rayleigh fading  pdf of SNR for user i at the receiver – long-term power control and the same expected SNR for every user
  • 29. 29 / 32 asymptotic analysis (1)
  • 30. 30 / 32 asymptotic analysis (2)  high SNR => low b/SNR – throughput is well over 1! – throughput decreases as the capture threshold b increases  low SNR => high b/SNR – the achievable throughputs drop – noise impact significant  target slot degrees are higher compared the case without capture effect – the capture effect favors more collisions
  • 31. 31 / 32 non-asymptotic results  confirm the conclusions of the asymptotic analysis
  • 32. 32 / 32 summary  high interest for massive access in the upcoming wireless – M2M communication  coded random access – addresses the fundamental obstacle of collisions in ALOHA  frameless ALOHA – inspired by rateless codes, inter-slot SIC – nontrivial interaction with capture and intra-slot SIC  main future steps – finite blocklength – reengineer and existing ALOHA protocol into coded random access