SlideShare a Scribd company logo
1 of 25
Download to read offline
See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/350007514
Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication
in 5G
Presentation · March 2021
CITATIONS
0
READS
2
1 author:
Some of the authors of this publication are also working on these related projects:
Wireless Energy Transmission for Access Limited Underground Sensors View project
Dynamic Wireless Power Transfer System Using Coupled Magnetic Resonance View project
Chathuranga M. Wijerathna Basnayaka
Sri Lanka Technological Campus
13 PUBLICATIONS   13 CITATIONS   
SEE PROFILE
All content following this page was uploaded by Chathuranga M. Wijerathna Basnayaka on 12 March 2021.
The user has requested enhancement of the downloaded file.
Physical Layer Redesign for Unmanned Aerial
Vehicle (UAV) Communication in 5G
Chathuranga Madhushan Basnayaka
Supervisors: (Prof.) Dushantha Nalin Kumara and (Dr.) Udesh Oruthota
National Research Tomsk Polytechnic University / Center for
Telecommunications Research,SLTC,Sri Lanka
March 10, 2021
Outline 2
Latency in UAV Communication Networks
Age of Information
Age of Information in an URLLC-enabled Decode-and-Forward
Wireless Communication System
Numerical Simulation Results
Latency in UAV communication networks 3
I 5G will be key enabler of future UAV communication
system
I Ultra reliable low latency communications (URLLC)
concerns the transmission of data at a very small error
probability without violating a given latency constraint
I So how do we optimally design URLLCs? This is a tricky
question, even if we just limited to the physical layer.
I The physical layer design of current systems relies largely
on guidelines provided by information theory analyses. For
example, the well known formula for the capacity of the
AWGN channel
C = W log

1 +
P
N0W

(1)
Fnite-blocklength information Theory 4
I But to approach capacity, we need to use codes with large
blocklength ; large blocklengths often mean large latency.
I So we cannot use classic performance metric such as
ergodic capacity or outage capacity to benchmark the
performance of URLLC.
I So what can we do instead? We must replace asymptotic
information theory results with nonasymptotic finite
blocklength ones!
I Over the last 10 years, the information theory community
has developed many such nonasymptotic results Ex :
Polyanskiy Poor Verdú Converse Bound for Finite Block
Length; new theoretical tools
Age of Information 5
I Another approach to latency
I Age of Information ( AoI ) measures the freshness of the
received data in mission critical applications Ex:
autonomous vehicles , smart factories, smart homes,
immersive gaming, command and control etc.
I Command and control systems exchange mission critical
information in order to maintain situational awareness
I In such applications, it is essential to keep the information
fresh as outdated information loses its value and can lead
to system failures and safety risks.
I The concept of Age of Information ( AoI ) was introduced
in to quantify the freshness of the knowledge we have
about the status of a remote system.
Age of Information in an URLLC-enabled
Decode-and-Forward Wireless Communication
System
System Model 7
I A new system model is proposed to estimate the average
AoI AAoI ) in an Relay communication system
Figure: System model for URLLC-enabled relay system
System Model 8
The received signal at each communication node
Y1 =
p
PSHSRX1 + WSR, (2)
Y2 =
p
PRHRDX2 + WRD, (3)
The probability density function (PDF) of the small scale
channel gain (gij)
fgij (z) = e−z
(4)
The large scale channel gain αij
−10log(αij) = 20log(dij) + 20log

4πfc
C

(5)
System Model 9
channel coefficient between the communication nodes
Hij =
√
αijgij. (6)
The normalized received signal-to-noise ratio (SNR) γj at the
receiving node j
γj =
αijgijPi
σ2
ij
. (7)
Block Error Probability 10
Considering DF relay protocol, the overall decoding error
probability
ε = εR + εD(1 − εR) (8)
The expectation of the block error probability
Following Polyanskiy’s results on short packet communication [1]
εj = E

Q
nijC(γj) − k
p
nijV (γj)
!#
(9)
V (γj) (the channel dispersion) = log2
2
e
2
(1 − 1
(1+γj )2 ),
C(γj)(capacity of a complex AWGN channel) = log2(1 + γj) , number of
bits per block k
Block Error Probability 11
Under the Rayleigh fading channel conditions, εj can be
formulated as
εj =
Z ∞
0
fγj (z)Q
nijC(γj) − k
p
njV (γj)
!
dz, (10)
Using the approximation technique given in [2] and [3], (10) can
be approximated as
εj ≈
Z ∞
0
fγj (z)Θj(z), (11)
where Θj(z) denotes the linear approximation of Q

nij .C(γj )−k
√
nij .V (γj )
Θj(z) =



1, γj ≤ φj,
1
2 − βj
√
nij(γj − ψj), φj  γj  δj,
0, γj ≥ δj,
(12)
where βj = 1
2π
r
2
2k
nij −1
, ψj = 2
k
nij − 1, φj = ψj − 1
2βj
√
nij
and
δj = ψj + 1
2.βj
√
nij
.
Using (11) and (12), a closed-form expression for the block error
probability can be derived as
εij ≈ 1 −

βj
√
nijPiαij
σ2

e
−
φiσ2
αijPi − e
−
δjσ2
αijPi
!
. (13)
Block Error Probability 13
Finally, substituting (13) in (8), a closed-form expression for
the overall error probability can be obtained as
ε ≈1 −
 
βRβD
√
nηSRηRD × ϕSϕR(P)2αSRαRD
σ4


e
−
φRσ2
αSRϕSP
− e
−
δRσ2
αSRϕSP

e
−
φDσ2
αRDϕRP
− e
−
δDσ2
αRDϕRP

.
(14)
Average Age of Information 14
If the generation time of the freshest update received at time
stamp t is g(t), then AoI can be defined as a random process as
∆(t) = t − g(t). (15)
Figure: Evolution of Age of Information (∆(t)) with the time
Average Age of Information 15
Time average AoI can be computed using the area under ∆(t)
(sequence of trapezoids Qi ) . The time average age
∆Tn =
1
Tn
Z Tn
0
∆(t)d(t) =
Pn−1
i=0 Qi
Tn
, (16)
where
Qi =
Z Di+Xi
Di
∆(t)d(t) = YiXi +
1
2
X2
i .
the AAoI can be written as
AAoI = ∆a =
E[X2]
2 + E[XY ]
E[X]
. (17)
In (17), E[XY ] is difficult to estimate without proper approximation.
Average Age of Information 16
The system delay (Y ) can be calculated as a summation of the
service time (s) and waiting time (w) of the queue,
∆a =
1
2E

X2

E [X]
+ E [s] +
E [wX]
E [X]
. (18)
Pollaczek–Khinchine [4] formula is used to further simplify (18).
The correlation term E[wX] can be evaluated as
E[wX] =
E[X](E[X] − E[s])
E[e−λs]
+
E[s2]E[X]
2(E[X] − E[s])
−
E[X2]
2
,
(19)
Average Age of Information 17
Total number of transmission R needed for the reliable
transmission of an update is geometrically distributed with
transmission error rate and its probability mass function
PR(m) = (1 − ε)εm−1
; m = 1, 2.... (20)
The service time for an update, which is transmitted using one
transmission block is given by
s = (nT + υ)R, (21)
Finally, the AAoI of the proposed system can be derived as
∆a =
(nT + υ)
1 − ε
+
(nT+υ)2(1+ε)
(1−ε)2
2(1
λ − (nT+υ)
1−ε )
+
(1
λ − (nT+υ)
1−ε )
(1−ε)e−(nT +υ)λ
1−εe−(nT +υ)λ
. (22)
Numerical Simulation Results
AAoI as a function of update generate 19
10
0
10
1
10
-1
10
0
10
1 Simulated
Theoretical
Number of updates generated per second
I High packet generation rate may overload the network and lead to a
high average AoI
I Low packet generation rate may result in infrequent information
updates at the destination, which may also lead to a high average AoI
AAoI as a function block length allocation factor 20
0.2 0.3 0.4 0.5 0.6 0.7 0.8
10-2
100
102
104
106
Power allocation factor - 0.5
Power allocation factor - 0.3
Power allocation factor- 0.7
I Maintaining a small update size (short packet communication)
minimize the AAoI in the relay network.
Publications 21
I Basnayaka C. M. W. ,Perera, T.D.P., Jayakody, D.N.K.,
2021 May .Age of Information in an URLLC-enabled
Decode-and-Forward Wireless communication. IEEE 93rd
Vehicular Technology Conference (VTC-Spring), IEEE.
[Accepted]
I A. Sharma, P. Vanjan, N. Paliwal, C. M. W. Basnayaka,
D. N. K.Jayakody, H.C.Wang and
P.Muthuchidambaranathan “Communication and
Networking Technologies for UAVs: A Survey ” Journal of
Network and Computer Applications (Accepted)
I C. M. W. Basnayaka, K.O. Lakamal and D. N. K.Jayakody,
2019. “The Era of the 5G Drone is Ahead, Are We
Ready?” Vidurava, 36(4), pp.19-21.
Work Plan for Next 6 Months 22
I Extend the aforementioned system model for a UAV
communication network.
I Simultaneous Wireless Information and Power Transfer
(SWIPT) and WPT assisted technologies for the UAV
communication system.
I Compare approximated numerical result with the practical
simulated model that uses the polar code as an error
correction code.
References 23
Y. Polyanskiy, H. V. Poor, and S. Verdu, “Channel coding
rate in the finite blocklength regime,” IEEE Trans. Inf.
Theory, vol. 56, no. 5, pp. 2307–2359, 2010.
B. Makki, T. Svensson, and M. Zorzi, “Finite block-length
analysis of the incremental redundancy harq,” IEEE Wirel.
Commun. Le., vol. 3, no. 5, pp. 529–532, 2014.
Y. Gu, H. Chen, Y. Li, and B. Vucetic, “Ultra-reliable
short-packet communications: Half-duplex or full-duplex
relaying?” IEEE Wirel. Commun., vol. 7, no. 3, pp.
348–351, 2017.
R. Talak, S. Karaman, and E. Modiano, “Can determinacy
minimize age of information?” arXiv preprint
arXiv:1810.04371, 2018.
Questions?
Thank you
Contact:
• Email: chathurangab@sltc.ac.lk
View publication stats
View publication stats

More Related Content

What's hot

Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...idescitation
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...IJORCS
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureKumar Goud
 
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...csandit
 
Using petri net with inherent fuzzy in the recognition of ecg signals
Using petri net with inherent fuzzy in the recognition of ecg signalsUsing petri net with inherent fuzzy in the recognition of ecg signals
Using petri net with inherent fuzzy in the recognition of ecg signalsIAEME Publication
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...TELKOMNIKA JOURNAL
 
Sierpinski carpet fractal monopole antenna for ultra-wideband applications
Sierpinski carpet fractal monopole antenna for ultra-wideband applications Sierpinski carpet fractal monopole antenna for ultra-wideband applications
Sierpinski carpet fractal monopole antenna for ultra-wideband applications IJECEIAES
 
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...IJERA Editor
 
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...IJECEIAES
 
Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...ijsrd.com
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN csandit
 
Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...IOSR Journals
 
Steganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matchingSteganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matchingIJECEIAES
 
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...Dr. Amarjeet Singh
 
Recent articles published in VLSI design & Communication Systems
 Recent articles published in VLSI design & Communication Systems Recent articles published in VLSI design & Communication Systems
Recent articles published in VLSI design & Communication SystemsVLSICS Design
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature mapsAlexander Decker
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSIJCNCJournal
 

What's hot (18)

Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
Robust Watermarking Technique using 2D Logistic Map and Elliptic Curve Crypto...
 
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
Design a New Image Encryption using Fuzzy Integral Permutation with Coupled C...
 
implementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architectureimplementation of area efficient high speed eddr architecture
implementation of area efficient high speed eddr architecture
 
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
NEURAL NETWORKS FOR HIGH PERFORMANCE TIME-DELAY ESTIMATION AND ACOUSTIC SOURC...
 
Using petri net with inherent fuzzy in the recognition of ecg signals
Using petri net with inherent fuzzy in the recognition of ecg signalsUsing petri net with inherent fuzzy in the recognition of ecg signals
Using petri net with inherent fuzzy in the recognition of ecg signals
 
An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...An energy-efficient cluster head selection in wireless sensor network using g...
An energy-efficient cluster head selection in wireless sensor network using g...
 
Sierpinski carpet fractal monopole antenna for ultra-wideband applications
Sierpinski carpet fractal monopole antenna for ultra-wideband applications Sierpinski carpet fractal monopole antenna for ultra-wideband applications
Sierpinski carpet fractal monopole antenna for ultra-wideband applications
 
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
Optimization of Number of Neurons in the Hidden Layer in Feed Forward Neural ...
 
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
Novel approach for hybrid MAC scheme for balanced energy and transmission in ...
 
Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...Implementation of Feed Forward Neural Network for Classification by Education...
Implementation of Feed Forward Neural Network for Classification by Education...
 
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
A NOVEL BACKGROUND SUBTRACTION ALGORITHM FOR PERSON TRACKING BASED ON K-NN
 
Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...Digital Implementation of Artificial Neural Network for Function Approximatio...
Digital Implementation of Artificial Neural Network for Function Approximatio...
 
Steganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matchingSteganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matching
 
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
High Speed Data Exchange Algorithm in Telemedicine with Wavelet based on 4D M...
 
Recent articles published in VLSI design & Communication Systems
 Recent articles published in VLSI design & Communication Systems Recent articles published in VLSI design & Communication Systems
Recent articles published in VLSI design & Communication Systems
 
I017425763
I017425763I017425763
I017425763
 
11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps11.secure compressed image transmission using self organizing feature maps
11.secure compressed image transmission using self organizing feature maps
 
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKSA NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
A NOVEL ROUTING PROTOCOL FOR TARGET TRACKING IN WIRELESS SENSOR NETWORKS
 

Similar to Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5G

Throughput analysis of non-orthogonal multiple access and orthogonal multipl...
Throughput analysis of non-orthogonal multiple access and  orthogonal multipl...Throughput analysis of non-orthogonal multiple access and  orthogonal multipl...
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...IJECEIAES
 
Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5G
Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5GPhysical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5G
Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5GChathuranga Basnayaka
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksIffat Anjum
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioIJECEIAES
 
Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT IJECEIAES
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisnooriasukmaningtyas
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...IJNSA Journal
 
Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communicat...
Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communicat...Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communicat...
Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communicat...Chathuranga Basnayaka
 
Context-Aware Energy Conserving Routing Algorithm for Internet of Things
Context-Aware Energy Conserving Routing Algorithm for Internet of Things Context-Aware Energy Conserving Routing Algorithm for Internet of Things
Context-Aware Energy Conserving Routing Algorithm for Internet of Things IJCNCJournal
 
Qualitative Analysis of Optical Interleave Division Multiple Access using Spe...
Qualitative Analysis of Optical Interleave Division Multiple Access using Spe...Qualitative Analysis of Optical Interleave Division Multiple Access using Spe...
Qualitative Analysis of Optical Interleave Division Multiple Access using Spe...IRJET Journal
 
Secrecy performance analysis on spatial modeling of wireless communications w...
Secrecy performance analysis on spatial modeling of wireless communications w...Secrecy performance analysis on spatial modeling of wireless communications w...
Secrecy performance analysis on spatial modeling of wireless communications w...IJECEIAES
 
Crankshaft protocol
Crankshaft protocolCrankshaft protocol
Crankshaft protocolgmeneses23
 
Noor’s Algorithmic Flow of Electronics and Communication Engineering
Noor’s Algorithmic Flow of Electronics and Communication EngineeringNoor’s Algorithmic Flow of Electronics and Communication Engineering
Noor’s Algorithmic Flow of Electronics and Communication EngineeringIRJET Journal
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...IRJET Journal
 
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...IJECEIAES
 
AN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKS
AN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKSAN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKS
AN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKSIAEME Publication
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNCJournal
 
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity Technique
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity TechniquePerformance of BCH and RS Codes in MIMO System Using MPFEC Diversity Technique
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity TechniqueALYAA AL-BARRAK
 
Design of 3x6 axial-slot array antenna on circular cylinder waveguide for 2.4...
Design of 3x6 axial-slot array antenna on circular cylinder waveguide for 2.4...Design of 3x6 axial-slot array antenna on circular cylinder waveguide for 2.4...
Design of 3x6 axial-slot array antenna on circular cylinder waveguide for 2.4...IRJET Journal
 

Similar to Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5G (20)

Throughput analysis of non-orthogonal multiple access and orthogonal multipl...
Throughput analysis of non-orthogonal multiple access and  orthogonal multipl...Throughput analysis of non-orthogonal multiple access and  orthogonal multipl...
Throughput analysis of non-orthogonal multiple access and orthogonal multipl...
 
Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5G
Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5GPhysical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5G
Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5G
 
Quality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networksQuality of service aware mac protocol for body sensor networks
Quality of service aware mac protocol for body sensor networks
 
Design and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined RadioDesign and Implementation of an Embedded System for Software Defined Radio
Design and Implementation of an Embedded System for Software Defined Radio
 
Ijcnc050207
Ijcnc050207Ijcnc050207
Ijcnc050207
 
Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT Security-aware fair transmission scheme for 802.11 based cognitive IoT
Security-aware fair transmission scheme for 802.11 based cognitive IoT
 
Physical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysisPhysical layer security in DF full-duplex relaying network: performance analysis
Physical layer security in DF full-duplex relaying network: performance analysis
 
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
AN EFFICIENT SECURE CRYPTOGRAPHY SCHEME FOR NEW ML-BASED RPL ROUTING PROTOCOL...
 
Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communicat...
Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communicat...Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communicat...
Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communicat...
 
Context-Aware Energy Conserving Routing Algorithm for Internet of Things
Context-Aware Energy Conserving Routing Algorithm for Internet of Things Context-Aware Energy Conserving Routing Algorithm for Internet of Things
Context-Aware Energy Conserving Routing Algorithm for Internet of Things
 
Qualitative Analysis of Optical Interleave Division Multiple Access using Spe...
Qualitative Analysis of Optical Interleave Division Multiple Access using Spe...Qualitative Analysis of Optical Interleave Division Multiple Access using Spe...
Qualitative Analysis of Optical Interleave Division Multiple Access using Spe...
 
Secrecy performance analysis on spatial modeling of wireless communications w...
Secrecy performance analysis on spatial modeling of wireless communications w...Secrecy performance analysis on spatial modeling of wireless communications w...
Secrecy performance analysis on spatial modeling of wireless communications w...
 
Crankshaft protocol
Crankshaft protocolCrankshaft protocol
Crankshaft protocol
 
Noor’s Algorithmic Flow of Electronics and Communication Engineering
Noor’s Algorithmic Flow of Electronics and Communication EngineeringNoor’s Algorithmic Flow of Electronics and Communication Engineering
Noor’s Algorithmic Flow of Electronics and Communication Engineering
 
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
A Multiple Access Technique for Differential Noise Shift Keying: A Review of ...
 
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...EEIT2-F: energy-efficient aware IT2-fuzzy based clustering  protocol in wirel...
EEIT2-F: energy-efficient aware IT2-fuzzy based clustering protocol in wirel...
 
AN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKS
AN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKSAN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKS
AN IMPROVED ROUTING PROTOCOL SCHEME IN ADHOC NETWORKS
 
IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!IJCNC Top 10 Trending Articles in Academia !!!
IJCNC Top 10 Trending Articles in Academia !!!
 
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity Technique
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity TechniquePerformance of BCH and RS Codes in MIMO System Using MPFEC Diversity Technique
Performance of BCH and RS Codes in MIMO System Using MPFEC Diversity Technique
 
Design of 3x6 axial-slot array antenna on circular cylinder waveguide for 2.4...
Design of 3x6 axial-slot array antenna on circular cylinder waveguide for 2.4...Design of 3x6 axial-slot array antenna on circular cylinder waveguide for 2.4...
Design of 3x6 axial-slot array antenna on circular cylinder waveguide for 2.4...
 

Recently uploaded

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxpritamlangde
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxMustafa Ahmed
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelDrAjayKumarYadav4
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwaitjaanualu31
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Ramkumar k
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...ssuserdfc773
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesChandrakantDivate1
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxSCMS School of Architecture
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxhublikarsn
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...HenryBriggs2
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdfAlexander Litvinenko
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiessarkmank1
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...ppkakm
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2ChandrakantDivate1
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaOmar Fathy
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...dannyijwest
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdfKamal Acharya
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...ronahami
 

Recently uploaded (20)

Digital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptxDigital Communication Essentials: DPCM, DM, and ADM .pptx
Digital Communication Essentials: DPCM, DM, and ADM .pptx
 
Worksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptxWorksharing and 3D Modeling with Revit.pptx
Worksharing and 3D Modeling with Revit.pptx
 
Path loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata ModelPath loss model, OKUMURA Model, Hata Model
Path loss model, OKUMURA Model, Hata Model
 
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills KuwaitKuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
Kuwait City MTP kit ((+919101817206)) Buy Abortion Pills Kuwait
 
Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)Theory of Time 2024 (Universal Theory for Everything)
Theory of Time 2024 (Universal Theory for Everything)
 
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
Convergence of Robotics and Gen AI offers excellent opportunities for Entrepr...
 
Computer Graphics Introduction To Curves
Computer Graphics Introduction To CurvesComputer Graphics Introduction To Curves
Computer Graphics Introduction To Curves
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Introduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptxIntroduction to Robotics in Mechanical Engineering.pptx
Introduction to Robotics in Mechanical Engineering.pptx
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
PE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and propertiesPE 459 LECTURE 2- natural gas basic concepts and properties
PE 459 LECTURE 2- natural gas basic concepts and properties
 
Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...Basic Electronics for diploma students as per technical education Kerala Syll...
Basic Electronics for diploma students as per technical education Kerala Syll...
 
Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2Fundamentals of Internet of Things (IoT) Part-2
Fundamentals of Internet of Things (IoT) Part-2
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
Cybercrimes in the Darknet and Their Detections: A Comprehensive Analysis and...
 
Post office management system project ..pdf
Post office management system project ..pdfPost office management system project ..pdf
Post office management system project ..pdf
 
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...Max. shear stress theory-Maximum Shear Stress Theory ​  Maximum Distortional ...
Max. shear stress theory-Maximum Shear Stress Theory ​ Maximum Distortional ...
 

Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5G

  • 1. See discussions, stats, and author profiles for this publication at: https://www.researchgate.net/publication/350007514 Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5G Presentation · March 2021 CITATIONS 0 READS 2 1 author: Some of the authors of this publication are also working on these related projects: Wireless Energy Transmission for Access Limited Underground Sensors View project Dynamic Wireless Power Transfer System Using Coupled Magnetic Resonance View project Chathuranga M. Wijerathna Basnayaka Sri Lanka Technological Campus 13 PUBLICATIONS   13 CITATIONS    SEE PROFILE All content following this page was uploaded by Chathuranga M. Wijerathna Basnayaka on 12 March 2021. The user has requested enhancement of the downloaded file.
  • 2. Physical Layer Redesign for Unmanned Aerial Vehicle (UAV) Communication in 5G Chathuranga Madhushan Basnayaka Supervisors: (Prof.) Dushantha Nalin Kumara and (Dr.) Udesh Oruthota National Research Tomsk Polytechnic University / Center for Telecommunications Research,SLTC,Sri Lanka March 10, 2021
  • 3. Outline 2 Latency in UAV Communication Networks Age of Information Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communication System Numerical Simulation Results
  • 4. Latency in UAV communication networks 3 I 5G will be key enabler of future UAV communication system I Ultra reliable low latency communications (URLLC) concerns the transmission of data at a very small error probability without violating a given latency constraint I So how do we optimally design URLLCs? This is a tricky question, even if we just limited to the physical layer. I The physical layer design of current systems relies largely on guidelines provided by information theory analyses. For example, the well known formula for the capacity of the AWGN channel C = W log 1 + P N0W (1)
  • 5. Fnite-blocklength information Theory 4 I But to approach capacity, we need to use codes with large blocklength ; large blocklengths often mean large latency. I So we cannot use classic performance metric such as ergodic capacity or outage capacity to benchmark the performance of URLLC. I So what can we do instead? We must replace asymptotic information theory results with nonasymptotic finite blocklength ones! I Over the last 10 years, the information theory community has developed many such nonasymptotic results Ex : Polyanskiy Poor Verdú Converse Bound for Finite Block Length; new theoretical tools
  • 6. Age of Information 5 I Another approach to latency I Age of Information ( AoI ) measures the freshness of the received data in mission critical applications Ex: autonomous vehicles , smart factories, smart homes, immersive gaming, command and control etc. I Command and control systems exchange mission critical information in order to maintain situational awareness I In such applications, it is essential to keep the information fresh as outdated information loses its value and can lead to system failures and safety risks. I The concept of Age of Information ( AoI ) was introduced in to quantify the freshness of the knowledge we have about the status of a remote system.
  • 7. Age of Information in an URLLC-enabled Decode-and-Forward Wireless Communication System
  • 8. System Model 7 I A new system model is proposed to estimate the average AoI AAoI ) in an Relay communication system Figure: System model for URLLC-enabled relay system
  • 9. System Model 8 The received signal at each communication node Y1 = p PSHSRX1 + WSR, (2) Y2 = p PRHRDX2 + WRD, (3) The probability density function (PDF) of the small scale channel gain (gij) fgij (z) = e−z (4) The large scale channel gain αij −10log(αij) = 20log(dij) + 20log 4πfc C (5)
  • 10. System Model 9 channel coefficient between the communication nodes Hij = √ αijgij. (6) The normalized received signal-to-noise ratio (SNR) γj at the receiving node j γj = αijgijPi σ2 ij . (7)
  • 11. Block Error Probability 10 Considering DF relay protocol, the overall decoding error probability ε = εR + εD(1 − εR) (8) The expectation of the block error probability Following Polyanskiy’s results on short packet communication [1] εj = E Q nijC(γj) − k p nijV (γj) !# (9) V (γj) (the channel dispersion) = log2 2 e 2 (1 − 1 (1+γj )2 ), C(γj)(capacity of a complex AWGN channel) = log2(1 + γj) , number of bits per block k
  • 12. Block Error Probability 11 Under the Rayleigh fading channel conditions, εj can be formulated as εj = Z ∞ 0 fγj (z)Q nijC(γj) − k p njV (γj) ! dz, (10) Using the approximation technique given in [2] and [3], (10) can be approximated as εj ≈ Z ∞ 0 fγj (z)Θj(z), (11) where Θj(z) denotes the linear approximation of Q nij .C(γj )−k √ nij .V (γj )
  • 13. Θj(z) =    1, γj ≤ φj, 1 2 − βj √ nij(γj − ψj), φj γj δj, 0, γj ≥ δj, (12) where βj = 1 2π r 2 2k nij −1 , ψj = 2 k nij − 1, φj = ψj − 1 2βj √ nij and δj = ψj + 1 2.βj √ nij . Using (11) and (12), a closed-form expression for the block error probability can be derived as εij ≈ 1 − βj √ nijPiαij σ2 e − φiσ2 αijPi − e − δjσ2 αijPi ! . (13)
  • 14. Block Error Probability 13 Finally, substituting (13) in (8), a closed-form expression for the overall error probability can be obtained as ε ≈1 − βRβD √ nηSRηRD × ϕSϕR(P)2αSRαRD σ4 e − φRσ2 αSRϕSP − e − δRσ2 αSRϕSP e − φDσ2 αRDϕRP − e − δDσ2 αRDϕRP . (14)
  • 15. Average Age of Information 14 If the generation time of the freshest update received at time stamp t is g(t), then AoI can be defined as a random process as ∆(t) = t − g(t). (15) Figure: Evolution of Age of Information (∆(t)) with the time
  • 16. Average Age of Information 15 Time average AoI can be computed using the area under ∆(t) (sequence of trapezoids Qi ) . The time average age ∆Tn = 1 Tn Z Tn 0 ∆(t)d(t) = Pn−1 i=0 Qi Tn , (16) where Qi = Z Di+Xi Di ∆(t)d(t) = YiXi + 1 2 X2 i . the AAoI can be written as AAoI = ∆a = E[X2] 2 + E[XY ] E[X] . (17) In (17), E[XY ] is difficult to estimate without proper approximation.
  • 17. Average Age of Information 16 The system delay (Y ) can be calculated as a summation of the service time (s) and waiting time (w) of the queue, ∆a = 1 2E X2 E [X] + E [s] + E [wX] E [X] . (18) Pollaczek–Khinchine [4] formula is used to further simplify (18). The correlation term E[wX] can be evaluated as E[wX] = E[X](E[X] − E[s]) E[e−λs] + E[s2]E[X] 2(E[X] − E[s]) − E[X2] 2 , (19)
  • 18. Average Age of Information 17 Total number of transmission R needed for the reliable transmission of an update is geometrically distributed with transmission error rate and its probability mass function PR(m) = (1 − ε)εm−1 ; m = 1, 2.... (20) The service time for an update, which is transmitted using one transmission block is given by s = (nT + υ)R, (21) Finally, the AAoI of the proposed system can be derived as ∆a = (nT + υ) 1 − ε + (nT+υ)2(1+ε) (1−ε)2 2(1 λ − (nT+υ) 1−ε ) + (1 λ − (nT+υ) 1−ε ) (1−ε)e−(nT +υ)λ 1−εe−(nT +υ)λ . (22)
  • 20. AAoI as a function of update generate 19 10 0 10 1 10 -1 10 0 10 1 Simulated Theoretical Number of updates generated per second I High packet generation rate may overload the network and lead to a high average AoI I Low packet generation rate may result in infrequent information updates at the destination, which may also lead to a high average AoI
  • 21. AAoI as a function block length allocation factor 20 0.2 0.3 0.4 0.5 0.6 0.7 0.8 10-2 100 102 104 106 Power allocation factor - 0.5 Power allocation factor - 0.3 Power allocation factor- 0.7 I Maintaining a small update size (short packet communication) minimize the AAoI in the relay network.
  • 22. Publications 21 I Basnayaka C. M. W. ,Perera, T.D.P., Jayakody, D.N.K., 2021 May .Age of Information in an URLLC-enabled Decode-and-Forward Wireless communication. IEEE 93rd Vehicular Technology Conference (VTC-Spring), IEEE. [Accepted] I A. Sharma, P. Vanjan, N. Paliwal, C. M. W. Basnayaka, D. N. K.Jayakody, H.C.Wang and P.Muthuchidambaranathan “Communication and Networking Technologies for UAVs: A Survey ” Journal of Network and Computer Applications (Accepted) I C. M. W. Basnayaka, K.O. Lakamal and D. N. K.Jayakody, 2019. “The Era of the 5G Drone is Ahead, Are We Ready?” Vidurava, 36(4), pp.19-21.
  • 23. Work Plan for Next 6 Months 22 I Extend the aforementioned system model for a UAV communication network. I Simultaneous Wireless Information and Power Transfer (SWIPT) and WPT assisted technologies for the UAV communication system. I Compare approximated numerical result with the practical simulated model that uses the polar code as an error correction code.
  • 24. References 23 Y. Polyanskiy, H. V. Poor, and S. Verdu, “Channel coding rate in the finite blocklength regime,” IEEE Trans. Inf. Theory, vol. 56, no. 5, pp. 2307–2359, 2010. B. Makki, T. Svensson, and M. Zorzi, “Finite block-length analysis of the incremental redundancy harq,” IEEE Wirel. Commun. Le., vol. 3, no. 5, pp. 529–532, 2014. Y. Gu, H. Chen, Y. Li, and B. Vucetic, “Ultra-reliable short-packet communications: Half-duplex or full-duplex relaying?” IEEE Wirel. Commun., vol. 7, no. 3, pp. 348–351, 2017. R. Talak, S. Karaman, and E. Modiano, “Can determinacy minimize age of information?” arXiv preprint arXiv:1810.04371, 2018.
  • 25. Questions? Thank you Contact: • Email: chathurangab@sltc.ac.lk View publication stats View publication stats