Codes on Random Geometric Graphs Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with D. Bajović, D. Jakovetić,

Slides:



Advertisements
Similar presentations
Cognitive Radio Communications and Networks: Principles and Practice By A. M. Wyglinski, M. Nekovee, Y. T. Hou (Elsevier, December 2009) 1 Chapter 9 Fundamentals.
Advertisements

Mobility Increase the Capacity of Ad-hoc Wireless Network Matthias Gossglauser / David Tse Infocom 2001.
Company LOGO F OUNTAIN C ODES, LT C ODES AND R APTOR C ODES Susmita Adhikari Eduard Mustafin Gökhan Gül.
Chorus: Collision Resolution for Efficient Wireless Broadcast Xinyu Zhang, Kang G. Shin University of Michigan 1.
Frameless ALOHA: analysis of the physical layer effects Petar Popovski Cedomir Stefanovic, Miyu Momoda Aalborg University Denmark.
Min Song 1, Yanxiao Zhao 1, Jun Wang 1, E. K. Park 2 1 Old Dominion University, USA 2 University of Missouri at Kansas City, USA IEEE ICC 2009 A High Throughput.
Channel Allocation Protocols. Dynamic Channel Allocation Parameters Station Model. –N independent stations, each acting as a Poisson Process for the purpose.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
Routing Protocols for Sensor Networks Presented by Siva Desaraju Computer Science WMU An Application Specific Protocol Architecture for Wireless Microsensor.
An Application-Specific Protocol Architecture for Wireless Microsensor Networks Wendi Rabiner Heinzelman, Anantha Chandrakasan, and Hari Balakrishnan (MIT)
Delay and Throughput in Random Access Wireless Mesh Networks Nabhendra Bisnik, Alhussein Abouzeid ECSE Department Rensselaer Polytechnic Institute (RPI)
SUCCESSIVE INTERFERENCE CANCELLATION IN VEHICULAR NETWORKS TO RELIEVE THE NEGATIVE IMPACT OF THE HIDDEN NODE PROBLEM Carlos Miguel Silva Couto Pereira.
Cooperative Multiple Input Multiple Output Communication in Wireless Sensor Network: An Error Correcting Code approach using LDPC Code Goutham Kumar Kandukuri.
Topology Control for Effective Interference Cancellation in Multi-User MIMO Networks E. Gelal, K. Pelechrinis, T.S. Kim, I. Broustis Srikanth V. Krishnamurthy,
Dynamic Tuning of the IEEE Protocol to Achieve a Theoretical Throughput Limit Frederico Calì, Marco Conti, and Enrico Gregori IEEE/ACM TRANSACTIONS.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
MAC Protocols Media Access Control (who gets the use the channel) zContention-based yALOHA and Slotted ALOHA. yCSMA. yCSMA/CD. TDM and FDM are inefficient.
1 NETWORK CODING Anthony Ephremides University of Maryland - A NEW PARADIGM FOR NETWORKING - February 29, 2008 University of Minnesota.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 7th Lecture Christian Schindelhauer.
EWSN 04 – Berlin, Jan. 20, 2004 Silence is Golden with High Probability: Maintaining a Connected Backbone in Wireless Sensor Networks Paolo Santi* Janos.
EEC-484/584 Computer Networks Lecture 7 Wenbing Zhao
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
DAC: Distributed Asynchronous Cooperation for Wireless Relay Networks 1 Xinyu Zhang, Kang G. Shin University of Michigan.
ECE358: Computer Networks Spring 2012
On the Coded Complex Field Network Coding Scheme for Multiuser Cooperative Communications with Regenerative Relays Caixi Key Lab of Information.
COGNITIVE RADIO FOR NEXT-GENERATION WIRELESS NETWORKS: AN APPROACH TO OPPORTUNISTIC CHANNEL SELECTION IN IEEE BASED WIRELESS MESH Dusit Niyato,
International Technology Alliance In Network & Information Sciences International Technology Alliance In Network & Information Sciences 1 Cooperative Wireless.
1 ECE453 – Introduction to Computer Networks Lecture 7 – Multiple Access Control (I)
Delay Analysis of IEEE in Single-Hop Networks Marcel M. Carvalho, J.J.Garcia-Luna-Aceves.
Multiple Access Protocols Chapter 6 of Hiroshi Harada Book
Tuning the Carrier Sensing Range of IEEE MAC Jing Deng,Ben Liang and Pramod K. Varshney Univ. of New Orleans Globecom 2004.
CHAPTER 4: THE MEDIUM ACCESS SUBLAYER 4.1: The Channel Allocation Problem 4.2: Multiple Access Protocols.
LECTURE9 NET301. DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies the absence of other.
جلسه دهم شبکه های کامپیوتری به نــــــــــــام خدا.
1 11 Subcarrier Allocation and Bit Loading Algorithms for OFDMA-Based Wireless Networks Gautam Kulkarni, Sachin Adlakha, Mani Srivastava UCLA IEEE Transactions.
Medium Access Control NWEN302 Computer Network Design.
Message-Passing for Wireless Scheduling: an Experimental Study Paolo Giaccone (Politecnico di Torino) Devavrat Shah (MIT) ICCCN 2010 – Zurich August 2.
Shifted Codes Sachin Agarwal Deutsch Telekom A.G., Laboratories Ernst-Reuter-Platz Berlin Germany Joint work with Andrew Hagedorn and Ari Trachtenberg.
User Cooperation via Rateless Coding Mahyar Shirvanimoghaddam, Yonghui Li, and Branka Vucetic The University of Sydney, Australia IEEE GLOBECOM 2012 &
November 4, 2003APOC 2003 Wuhan, China 1/14 Demand Based Bandwidth Assignment MAC Protocol for Wireless LANs Presented by Ruibiao Qiu Department of Computer.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Medium Access Control Sublayer.
Salah A. Aly,Moustafa Youssef, Hager S. Darwish,Mahmoud Zidan Distributed Flooding-based Storage Algorithms for Large-Scale Wireless Sensor Networks Communications,
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2000 Unit-II Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Multimedia Transmission Over Cognitive Radio Networks using Decode-and-Forward Multi-Relays and Rateless Coding Abdelaali Chaoub, Elhassane Ibn-Elhaj National.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
UEP LT Codes with Intermediate Feedback Jesper H. Sørensen, Petar Popovski, and Jan Østergaard Aalborg University, Denmark IEEE COMMUNICATIONS LETTERS,
X. Li, W. LiuICC May 11, 2003A Joint Layer Design Smart Contention Resolution Random Access Wireless Networks With Unknown Multiple Users: A Joint.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
5: DataLink Layer 5a-1 Multiple Access protocol. 5: DataLink Layer 5a-2 Multiple Access Links and Protocols Three types of “links”: r point-to-point (single.
CS3502: Data and Computer Networks Local Area Networks - 1 introduction and early broadcast protocols.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
Fair and Efficient multihop Scheduling Algorithm for IEEE BWA Systems Daehyon Kim and Aura Ganz International Conference on Broadband Networks 2005.
Information Theory for Mobile Ad-Hoc Networks (ITMANET): The FLoWS Project Collision Helps! Algebraic Collision Recovery for Wireless Erasure Networks.
COMPUTER NETWORKS Data-link Layer (The Medium Access Control Sublayer) MAC Sublayer.
Multiple Access By, B. R. Chandavarkar, CSE Dept., NITK, Surathkal Ref: B. A. Forouzan, 5 th Edition.
Salah A. Aly ,Moustafa Youssef, Hager S. Darwish ,Mahmoud Zidan
Channel Allocation (MAC)
Make Random Access Contentions Transparent by Orthogonal Complementary Codes in Wireless Communications Xiaohua (Edward) Li Department of Electrical and.
Net301 lecture9 11/5/2015 Lect 9 NET301.
Services of DLL Framing Link access Reliable delivery
Howard Huang, Sivarama Venkatesan, and Harish Viswanathan
Colorado School of Mines
Hidden Terminal Decoding and Mesh Network Capacity
The Medium Access Control Sublayer
<month year> <doc.: IEEE doc> January 2013
Chapter 6 Multiple Radio Access.
Information Sciences and Systems Lab
Satellite Packet Communications A UNIT -V Satellite Packet Communications.
Presentation transcript:

Codes on Random Geometric Graphs Dejan Vukobratović Associate Professor, DEET-UNS University of Novi Sad, Serbia Joint work with D. Bajović, D. Jakovetić, V. Crnojević (UNS)

Codes on Random Geometric Graphs Small Base Station Sensor Node

Codes on Random Geometric Graphs

This talk will be about…  Inspiration: Codes on graphs  LDPC codes and iterative decoding methods  Problem: Massive uncoordinated multiple access  Evolution of Slotted ALOHA protocols  Motivation: M2M services in future 5G  Connecting massive amount of devices to future 5G small cell network

Outline  Single Base-Station Model  Recent Trends in Slotted ALOHA  LDPC Codes  Multiple Base-Station Model  Cooperative Slotted ALOHA  Codes on Random Geometric Graphs  Summary

Outline  Single Base-Station Model  Recent Trends in Slotted ALOHA  LDPC Codes  Multiple Base-Station Model  Cooperative Slotted ALOHA  Codes on Random Geometric Graphs  Summary

Slotted ALOHA Preliminaries... n users...

Slotted ALOHA... n users SA protocol L. G. Roberts, “Aloha packet system with and without slots and capture,” SIGCOMM Computer Communications Review, Apr

Frame τ slots Framed Slotted ALOHA... n users H. Okada, Y. Igarashi, Y. Nakanishi, ”Analysis and application of framed ALOHA channel in satellite packet switching networks”, Electronics and Communications, FSA protocol

CRD-SA protocol Collision Resolution Diversity Slotted ALOHA E. Casini, R. De Gaudenzi, O. del Rio Herrero, “Contention Resolution Diversity Slotted ALOHA: An Enhanced Random Access Scheme for Satellite Access Packet Networks”, IEEE Trans Wireless Comms, April n users τ slots Frame

Iterative Interference Cancellation (IIC) Collision Resolution Diversity Slotted ALOHA  Once the frame is finished, the base station performs IIC across time slots  Iterative Interference Cancellation:  Detect and decode clean signal (singleton)  Remove its contribution from other slots  Repeat while possible E. Casini, R. De Gaudenzi, O. del Rio Herrero, “Contention Resolution Diversity Slotted ALOHA: An Enhanced Random Access Scheme for Satellite Access Packet Networks”, IEEE Trans Wireless Comms, April n users τ slots Frame...  Recovery failure: Stopping Set!  Complete recovery: Graph Erased

Irregular Repetition Slotted ALOHA IRSA protocol... n users τ slots Frame G. Liva, “Graph-Based Analysis and Optimization of Contention Resolution Diversity Slotted ALOHA,” IEEE Transactions on Communications, February 2011.

Frameless ALOHA  Idea: Apply paradigm of rateless codes  No predefined frame length  Slots are successively added until sufficiently many users are resolved  Optimization of the slot degree distribution  Implicitly controlled through user behavior - slot access probability p C. Stefanovic, P. Popovski, D. Vukobratovic, “Frameless ALOHA Protocol for Wireless Networks”, IEEE Communication Letters, December n users p p p p p p p p p p p p p p p p p p p p...

 Modeled as LDPC codes for erasure channels  Goal: Max Throughput: T = G P dec SA vs LDPC Slotted ALOHA  Asymptotic analysis  Density Evolution  Finite-Length analysis  Stopping Sets... Decoding Probability Analysis E.Paolini, C. Stefanovic, G. Liva, P. Popovski, “Coded Random Access: How Coding Theory Helps to Build Random Access Protocols”, IEEE Communications Magazine, to appear, arxiv.org/abs/

Outline  Single Base-Station Model  Recent Trends in Slotted ALOHA  LDPC Codes  Multiple Base-Station Model  Cooperative Slotted ALOHA  Codes on Random Geometric Graphs  Summary

Multiple Base Station Model Small Base Station Sensor Node

System model Base station deployment, user locations n users/devices, m base stations… Base station User/Device …deployed independently uniformly at random over unit square area.

System model Transmission protocol

System model System snapshot at slot t = 4  Signal at the base station j at slot t :  sum of signals of all users active at slot t covered by the base station j Base station User active at t User inactive at t

System model User collection  Base station “collects” a user whenever it detects a “clean” signal  A user is collected if it is collected by any base station! User 2 decoded! ( t = 4 )

Asymptotic analysis Asymptotic setup Metrics of interest

Decoding via Spatial Cooperation  Performed on a slot-by-slot basis

Decoding via Spatial Cooperation One iteration at arbitrary base station after each slot t 1) Check signal : BS j checks whether its received signal y j,t corresponds to a singleton; If yes, it performs Collect & Transmit step, otherwise it performs Receive & Update step 2) Collect & Transmit: BS j collects a user u and transmits x u to all BS k adjacent to user u (this is known to BS in advance). BS j leaves the algorithm. 3) Receive & Update: BS j scans all the received messages from its neighbors and identifies distinct set of user signals x u. Then it removes all the signals from this set from y j,t and goes to step one in the next iteration Spatial Cooperation decoding algorithm Fully Distributed: base stations communicate only with neighboring base stations!

Main results Spatial Cooperation:

Decoding via Spatio-Temporal Cooperation Each base station is doing: 1) Temporal decoding 2) Spatial decoding Interchangeably…  Performed on a frame-by-frame basis

Decoding via Spatio-Temporal Cooperation One iteration at arbitrary base station after each frame of τ slots 1) Temporal SIC and Transmit: BS j performs Temporal SIC across its received slots within the frame. The set of recovered users is shared with neighboring BS’s and BS j goes to next step 2) Check Termination: If all the slots are recovered, BS j leaves the algorithm 3) Receive and Spatial IC: BS j scans all the received messages from its neighbors and identifies distinct set of yet unrecovered user signals x u. Then it removes all the signals from this set from all the slots where these users were active (activation slots are known for collected users) and goes to step one in the next iteration Spatio-Temporal Cooperation decoding algorithm Fully Distributed: base stations communicate only with neighboring base stations!

Main results Spatio-Temporal Cooperation:

Optimal user degree distributions Close to single-BS optimal (IRSA) Close to constant-degree-two distribution — average users’ spatial degree

Simulation results

Summary  (Modern) coding theory helps designing efficient ALOHA- based random access protocols for single base station  For multiple base stations, geographic constrains need to considered, leading to codes on random geometric graphs  Work in progress, some results already available: [Bajović, Jakovetić, Vukobratović & Crnojević, IEEE ICC 2014]  [Jakovetić, Bajović, Vukobratović & Crnojević, IEEE ISIT 2014]  [Jakovetić, Bajović, Vukobratović & Crnojević, IEEE Transactions on Communications, – to appear] 