frameless aloha with latency-reliability guarantees filec. stefanovic |´ frameless aloha random...

75
Frameless ALOHA with latency-reliability guarantees March 17, 2017 F. Lázaro , ˇ Cedomir Stefanovi´ c , Petar Popovski Institute of Communications and Navigation German Aerospace Center (DLR) Department of Electronic Systems Aalborg University

Upload: vukiet

Post on 12-May-2019

229 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

Frameless ALOHA with latency-reliability guarantees

March 17, 2017

F. Lázaro ♣, Cedomir Stefanovic †, Petar Popovski †

♣Institute of Communications and NavigationGerman Aerospace Center (DLR)

† Department of Electronic SystemsAalborg University

Page 2: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

Outline

Introduction

Frameless ALOHA

Finite Length Analysis

Latency-Reliability Guarantees

Conclusions

Page 3: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

Outline

Introduction

Frameless ALOHA

Finite Length Analysis

Latency-Reliability Guarantees

Conclusions

Page 4: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

1Random Access protocols

I random access (RA) protocols are effective when the nature of the trafficis unpredictable and/or when the number of active devices is dynamicand the total population very large

I the earliest examples of RA protocols are ALOHA [Abr-70] and SlottedALOHA [Rob-75], which have been adopted in many standards (GSM,UMTS, DVB-RCS2, ...), typically for control channels only. Issues:

I low peak throughput (1/(2e) and 1/e respectively)I high packet loss rate even for low load

[Abr-70] N. Abramson “The ALOHA system: Another alternative for computer communications”, in Proc. of the1970 Fall Joint Comput. Conf. (AFIPS)

[Rob-75] L.G. Roberts “ALOHA Packet System with and without Slots and Capture”, in Proc. SIGCOMM Comput.Commun. Rev., ACM, 1975

Page 5: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

1Random Access protocols

I random access (RA) protocols are effective when the nature of the trafficis unpredictable and/or when the number of active devices is dynamicand the total population very large

I the earliest examples of RA protocols are ALOHA [Abr-70] and SlottedALOHA [Rob-75], which have been adopted in many standards (GSM,UMTS, DVB-RCS2, ...), typically for control channels only. Issues:

I low peak throughput (1/(2e) and 1/e respectively)I high packet loss rate even for low load

[Abr-70] N. Abramson “The ALOHA system: Another alternative for computer communications”, in Proc. of the1970 Fall Joint Comput. Conf. (AFIPS)

[Rob-75] L.G. Roberts “ALOHA Packet System with and without Slots and Capture”, in Proc. SIGCOMM Comput.Commun. Rev., ACM, 1975

Page 6: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

1Random Access protocols

I random access (RA) protocols are effective when the nature of the trafficis unpredictable and/or when the number of active devices is dynamicand the total population very large

I the earliest examples of RA protocols are ALOHA [Abr-70] and SlottedALOHA [Rob-75], which have been adopted in many standards (GSM,UMTS, DVB-RCS2, ...), typically for control channels only. Issues:

I low peak throughput (1/(2e) and 1/e respectively)I high packet loss rate even for low load

[Abr-70] N. Abramson “The ALOHA system: Another alternative for computer communications”, in Proc. of the1970 Fall Joint Comput. Conf. (AFIPS)

[Rob-75] L.G. Roberts “ALOHA Packet System with and without Slots and Capture”, in Proc. SIGCOMM Comput.Commun. Rev., ACM, 1975

Page 7: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

1Random Access protocols

I random access (RA) protocols are effective when the nature of the trafficis unpredictable and/or when the number of active devices is dynamicand the total population very large

I the earliest examples of RA protocols are ALOHA [Abr-70] and SlottedALOHA [Rob-75], which have been adopted in many standards (GSM,UMTS, DVB-RCS2, ...), typically for control channels only. Issues:

I low peak throughput (1/(2e) and 1/e respectively)

I high packet loss rate even for low load

[Abr-70] N. Abramson “The ALOHA system: Another alternative for computer communications”, in Proc. of the1970 Fall Joint Comput. Conf. (AFIPS)

[Rob-75] L.G. Roberts “ALOHA Packet System with and without Slots and Capture”, in Proc. SIGCOMM Comput.Commun. Rev., ACM, 1975

Page 8: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

1Random Access protocols

I random access (RA) protocols are effective when the nature of the trafficis unpredictable and/or when the number of active devices is dynamicand the total population very large

I the earliest examples of RA protocols are ALOHA [Abr-70] and SlottedALOHA [Rob-75], which have been adopted in many standards (GSM,UMTS, DVB-RCS2, ...), typically for control channels only. Issues:

I low peak throughput (1/(2e) and 1/e respectively)I high packet loss rate even for low load

[Abr-70] N. Abramson “The ALOHA system: Another alternative for computer communications”, in Proc. of the1970 Fall Joint Comput. Conf. (AFIPS)

[Rob-75] L.G. Roberts “ALOHA Packet System with and without Slots and Capture”, in Proc. SIGCOMM Comput.Commun. Rev., ACM, 1975

Page 9: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

2Advanced Random Access protocols

I recently it has been shown that much higher efficiency can be obtainedby introducing time diversity (replication) and successive interferencecancellation (SIC) at the receiver

I examples:

I CRDSA [Cas-07]I IRSA [Liva-11]

[Cas-07] E. Casini, R. De Gaudenzi, and O. del Rio Herrero, “Contention Resolution Diversity Slotted ALOHA(CRDSA): An Enhanced Random Access Scheme for Satellite Access Packet Networks”, IEEE Trans.on Wireless Commun., vol. 6, no. 4, pp. 1408-1419, April 2007

[Liva-11] G. Liva, “Graph-Based Analysis and Optimization of Contention Resolution Diversity Slotted ALOHA”,IEEE Trans. Commun., vol. 59, no. 2, pp. 477-487, Feb. 2011

Page 10: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

2Advanced Random Access protocols

I recently it has been shown that much higher efficiency can be obtainedby introducing time diversity (replication) and successive interferencecancellation (SIC) at the receiver

I examples:

I CRDSA [Cas-07]I IRSA [Liva-11]

[Cas-07] E. Casini, R. De Gaudenzi, and O. del Rio Herrero, “Contention Resolution Diversity Slotted ALOHA(CRDSA): An Enhanced Random Access Scheme for Satellite Access Packet Networks”, IEEE Trans.on Wireless Commun., vol. 6, no. 4, pp. 1408-1419, April 2007

[Liva-11] G. Liva, “Graph-Based Analysis and Optimization of Contention Resolution Diversity Slotted ALOHA”,IEEE Trans. Commun., vol. 59, no. 2, pp. 477-487, Feb. 2011

Page 11: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

2Advanced Random Access protocols

I recently it has been shown that much higher efficiency can be obtainedby introducing time diversity (replication) and successive interferencecancellation (SIC) at the receiver

I examples:I CRDSA [Cas-07]I IRSA [Liva-11]

[Cas-07] E. Casini, R. De Gaudenzi, and O. del Rio Herrero, “Contention Resolution Diversity Slotted ALOHA(CRDSA): An Enhanced Random Access Scheme for Satellite Access Packet Networks”, IEEE Trans.on Wireless Commun., vol. 6, no. 4, pp. 1408-1419, April 2007

[Liva-11] G. Liva, “Graph-Based Analysis and Optimization of Contention Resolution Diversity Slotted ALOHA”,IEEE Trans. Commun., vol. 59, no. 2, pp. 477-487, Feb. 2011

Page 12: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

Outline

Introduction

Frameless ALOHA

Finite Length Analysis

Latency-Reliability Guarantees

Conclusions

Page 13: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

3Frameless ALOHA

I Frameless ALOHA is a slotted RA protocol that exploits ideas originatingfrom the rateless coding framework:

I the length of the contention period is not fixed a prioriI every user is active (sends a packet) in a slot with probability p

Page 14: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

3Frameless ALOHA

I Frameless ALOHA is a slotted RA protocol that exploits ideas originatingfrom the rateless coding framework:

I the length of the contention period is not fixed a priori

I every user is active (sends a packet) in a slot with probability p

Page 15: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

3Frameless ALOHA

I Frameless ALOHA is a slotted RA protocol that exploits ideas originatingfrom the rateless coding framework:

I the length of the contention period is not fixed a prioriI every user is active (sends a packet) in a slot with probability p

Page 16: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

3Frameless ALOHA

I Frameless ALOHA is a slotted RA protocol that exploits ideas originatingfrom the rateless coding framework:

I the length of the contention period is not fixed a prioriI every user is active (sends a packet) in a slot with probability p

p =β

n

...

...

ppppp

p

pp

p

n users

m slots

Page 17: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

4Frameless ALOHAExample

contention starts

User 1

User 2

User 3

Page 18: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

4Frameless ALOHAExample

slot 1

User 1

User 2

User 3

Page 19: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

4Frameless ALOHAExample

slot 2

User 1

User 2

User 3

Page 20: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

4Frameless ALOHAExample

slot 3

User 1

User 2

User 3

Page 21: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

4Frameless ALOHAExample

slot 4

User 1

User 2

User 3

Page 22: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

4Frameless ALOHAExample

slot 4

User 1

User 2

User 3

decoding starts

Page 23: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

4Frameless ALOHAExample

slot 4

User 1

User 2

User 3

decoding continues

Page 24: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

4Frameless ALOHAExample

slot 4

User 1

User 2

User 3

decoding continues

Page 25: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

4Frameless ALOHAExample

slot 4

User 1

User 2

User 3

decoding continues

Page 26: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

4Frameless ALOHAExample

slot 4

User 1

User 2

User 3

since all users are recovered we can terminate the contention after 5 slots

Page 27: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

Outline

Introduction

Frameless ALOHA

Finite Length Analysis

Latency-Reliability Guarantees

Conclusions

Page 28: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

5Finite Length AnalysisDefinitions

Definition (Ripple)We define the ripple as the set of singleton slots (reduced degree 1) and wedenote it by R.

the cardinality of the ripple is denoted by r and its associated randomvariable as R.

Definition (Cloud)We define the cloud as the set of slots with reduced degree d ≥ 2 and wedenote it by C .

the cardinality of the cloud is denoted by c and the corresponding randomvariable as C.

Page 29: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

6Finite Length AnalysisBipartite Graph Representation

v1 y1

v2 y2

v3 y3

v4 y4

ripple, R

cloud, C

n users m slots

Page 30: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

7Finite Length AnalysisBipartite Graph Representation

I the slot degree distribution is given by

Ωi =

(ni

)pi (1− p)n−i .

I in the collision channel, the iterative SIC process can be seen as aniterative pruning of the bipartite graph.

I intially all n users are unresolvedI at every iteration:

I if there are singleton slots→ one user is resolvedI if there are no singleton slots decoding stops

Page 31: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

7Finite Length AnalysisBipartite Graph Representation

I the slot degree distribution is given by

Ωi =

(ni

)pi (1− p)n−i .

I in the collision channel, the iterative SIC process can be seen as aniterative pruning of the bipartite graph.

I intially all n users are unresolvedI at every iteration:

I if there are singleton slots→ one user is resolvedI if there are no singleton slots decoding stops

Page 32: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

7Finite Length AnalysisBipartite Graph Representation

I the slot degree distribution is given by

Ωi =

(ni

)pi (1− p)n−i .

I in the collision channel, the iterative SIC process can be seen as aniterative pruning of the bipartite graph.

I intially all n users are unresolved

I at every iteration:

I if there are singleton slots→ one user is resolvedI if there are no singleton slots decoding stops

Page 33: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

7Finite Length AnalysisBipartite Graph Representation

I the slot degree distribution is given by

Ωi =

(ni

)pi (1− p)n−i .

I in the collision channel, the iterative SIC process can be seen as aniterative pruning of the bipartite graph.

I intially all n users are unresolvedI at every iteration:

I if there are singleton slots→ one user is resolvedI if there are no singleton slots decoding stops

Page 34: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

7Finite Length AnalysisBipartite Graph Representation

I the slot degree distribution is given by

Ωi =

(ni

)pi (1− p)n−i .

I in the collision channel, the iterative SIC process can be seen as aniterative pruning of the bipartite graph.

I intially all n users are unresolvedI at every iteration:

I if there are singleton slots→ one user is resolvedI if there are no singleton slots decoding stops

Page 35: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

8Finite Length AnalysisFinite State Machine

I the iterative SIC process can be modelled by means of a finite statemachine with state:

Su := (Cu,Ru)

I Cu : cardinality of cloud when u users are unresolvedI Ru : cardinality of ripple when u users are unresolved

Page 36: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

8Finite Length AnalysisFinite State Machine

I the iterative SIC process can be modelled by means of a finite statemachine with state:

Su := (Cu,Ru)

I Cu : cardinality of cloud when u users are unresolved

I Ru : cardinality of ripple when u users are unresolved

Page 37: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

8Finite Length AnalysisFinite State Machine

I the iterative SIC process can be modelled by means of a finite statemachine with state:

Su := (Cu,Ru)

I Cu : cardinality of cloud when u users are unresolvedI Ru : cardinality of ripple when u users are unresolved

Page 38: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

9Finite Length AnalysisTransition from u to u − 1 resolved users

Ru Cu

Ru−1 Cu−1

Page 39: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

10Finite Length AnalysisTransition from u to u − 1 resolved users

Ru Cu

Ru−1 Cu−1

I bu : the number of slots leaving Cu and entering Ru−1

bu := cu − cu−1

I Bu : associated random variable

Page 40: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

11Finite Length AnalysisTransition from u to u − 1 resolved users

Ru Cu

Ru−1 Cu−1

I au : the number of slots leaving the ripple Ru in the transitionI Au : r.v. associated to au

Page 41: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

12Finite Length AnalysisMain Result

TheoremGiven that the decoder is at state Su = (cu ,ru), when u users are unresolved and withru > 0, the probability of the decoder being at state PrSu−1 = (cu−1,ru−1) whenu − 1 users are unresolved is given by

PrSu−1 = (cu − bu ,ru − au + bu)|Su = (cu ,ru) =(cu

bu

)qu

bu (1− qu)cu−bu(ru − 1au − 1

)×(

1u

)au−1 (1−

1u

)ru−au

for 0 ≤ bu ≤ cu , bu − au ≤ ru and au ≥ 1, and with

qu =

n−u−2∑d=2

Ωd d(d − 1) 1n

u−1n−1

(n−ud−2

)(

n−2d−2

)

1−n−u−1∑

d=1Ωd u

(n−ud−1

)(

nd

) −n−u∑d=0

Ωd

(n−u

d

)(

nd

).

Page 42: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

13Finite Length AnalysisThroughput and PER

I In practice one is interested in the packet error rate Pe

Pe =n∑

u=1

∑cu

un

PrSu = (cu, 0).

I The throughput T is the number of resolved users normalized by thenumber of slots:

T =n(1− Pe)

m=

1− Pe

m/n.

Page 43: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

13Finite Length AnalysisThroughput and PER

I In practice one is interested in the packet error rate Pe

Pe =n∑

u=1

∑cu

un

PrSu = (cu, 0).

I The throughput T is the number of resolved users normalized by thenumber of slots:

T =n(1− Pe)

m=

1− Pe

m/n.

Page 44: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

14Finite Length AnalysisThroughput for β = 2.5, for n = 100

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 20

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

m/n

T

analyticalsimulation

Page 45: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

15Finite Length AnalysisPER for β = 2.5, for n = 100

0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 210−3

10−2

10−1

100

m/n

P e

analyticalsimulation

Page 46: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

Outline

Introduction

Frameless ALOHA

Finite Length Analysis

Latency-Reliability Guarantees

Conclusions

Page 47: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

16Latency-Reliability GuaranteesMotivation

I the analysis provides not only the PER but it can provide the exactprobability that k users are undecoded after m slots

I it provides a latency-reliability guaranteeI in some applications one wants to decode at least k out of n with a very high

probability (for example, vehicular networks or industrial automation)I Example: n = 50 users, m = 100 slots

Page 48: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

16Latency-Reliability GuaranteesMotivation

I the analysis provides not only the PER but it can provide the exactprobability that k users are undecoded after m slots

I it provides a latency-reliability guarantee

I in some applications one wants to decode at least k out of n with a very highprobability (for example, vehicular networks or industrial automation)

I Example: n = 50 users, m = 100 slots

Page 49: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

16Latency-Reliability GuaranteesMotivation

I the analysis provides not only the PER but it can provide the exactprobability that k users are undecoded after m slots

I it provides a latency-reliability guaranteeI in some applications one wants to decode at least k out of n with a very high

probability (for example, vehicular networks or industrial automation)

I Example: n = 50 users, m = 100 slots

Page 50: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

16Latency-Reliability GuaranteesMotivation

I the analysis provides not only the PER but it can provide the exactprobability that k users are undecoded after m slots

I it provides a latency-reliability guaranteeI in some applications one wants to decode at least k out of n with a very high

probability (for example, vehicular networks or industrial automation)I Example: n = 50 users, m = 100 slots

0 5 10 15 20 25 30 35 40 45 500

2 · 10−2

4 · 10−2

6 · 10−2

8 · 10−2

0.1

0.12

n. of undecoded users

prob

abili

ty

analyticalsimulation

Page 51: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

17Latency-Reliability GuaranteesOptimization

I the analysis can be used to optimize the performance of frameless Aloha

I we can perform the following optimization

I maximize Pk the probability that at least k users out of n are decoded after acontention of m slots

I in this presentation we shall focus on the following scenario

I number of users: n = 50I reliability target: k = n = 50I latency target (in slots): 100

I in this scenario the optimal parameter is β = 3.33, which leads toPk = 0.9334

I this value of Pk might be too high for many applications

Page 52: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

17Latency-Reliability GuaranteesOptimization

I the analysis can be used to optimize the performance of frameless AlohaI we can perform the following optimization

I maximize Pk the probability that at least k users out of n are decoded after acontention of m slots

I in this presentation we shall focus on the following scenario

I number of users: n = 50I reliability target: k = n = 50I latency target (in slots): 100

I in this scenario the optimal parameter is β = 3.33, which leads toPk = 0.9334

I this value of Pk might be too high for many applications

Page 53: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

17Latency-Reliability GuaranteesOptimization

I the analysis can be used to optimize the performance of frameless AlohaI we can perform the following optimization

I maximize Pk the probability that at least k users out of n are decoded after acontention of m slots

I in this presentation we shall focus on the following scenario

I number of users: n = 50I reliability target: k = n = 50I latency target (in slots): 100

I in this scenario the optimal parameter is β = 3.33, which leads toPk = 0.9334

I this value of Pk might be too high for many applications

Page 54: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

17Latency-Reliability GuaranteesOptimization

I the analysis can be used to optimize the performance of frameless AlohaI we can perform the following optimization

I maximize Pk the probability that at least k users out of n are decoded after acontention of m slots

I in this presentation we shall focus on the following scenario

I number of users: n = 50I reliability target: k = n = 50I latency target (in slots): 100

I in this scenario the optimal parameter is β = 3.33, which leads toPk = 0.9334

I this value of Pk might be too high for many applications

Page 55: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

17Latency-Reliability GuaranteesOptimization

I the analysis can be used to optimize the performance of frameless AlohaI we can perform the following optimization

I maximize Pk the probability that at least k users out of n are decoded after acontention of m slots

I in this presentation we shall focus on the following scenarioI number of users: n = 50

I reliability target: k = n = 50I latency target (in slots): 100

I in this scenario the optimal parameter is β = 3.33, which leads toPk = 0.9334

I this value of Pk might be too high for many applications

Page 56: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

17Latency-Reliability GuaranteesOptimization

I the analysis can be used to optimize the performance of frameless AlohaI we can perform the following optimization

I maximize Pk the probability that at least k users out of n are decoded after acontention of m slots

I in this presentation we shall focus on the following scenarioI number of users: n = 50I reliability target: k = n = 50

I latency target (in slots): 100

I in this scenario the optimal parameter is β = 3.33, which leads toPk = 0.9334

I this value of Pk might be too high for many applications

Page 57: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

17Latency-Reliability GuaranteesOptimization

I the analysis can be used to optimize the performance of frameless AlohaI we can perform the following optimization

I maximize Pk the probability that at least k users out of n are decoded after acontention of m slots

I in this presentation we shall focus on the following scenarioI number of users: n = 50I reliability target: k = n = 50I latency target (in slots): 100

I in this scenario the optimal parameter is β = 3.33, which leads toPk = 0.9334

I this value of Pk might be too high for many applications

Page 58: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

17Latency-Reliability GuaranteesOptimization

I the analysis can be used to optimize the performance of frameless AlohaI we can perform the following optimization

I maximize Pk the probability that at least k users out of n are decoded after acontention of m slots

I in this presentation we shall focus on the following scenarioI number of users: n = 50I reliability target: k = n = 50I latency target (in slots): 100

I in this scenario the optimal parameter is β = 3.33, which leads toPk = 0.9334

I this value of Pk might be too high for many applications

Page 59: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

17Latency-Reliability GuaranteesOptimization

I the analysis can be used to optimize the performance of frameless AlohaI we can perform the following optimization

I maximize Pk the probability that at least k users out of n are decoded after acontention of m slots

I in this presentation we shall focus on the following scenarioI number of users: n = 50I reliability target: k = n = 50I latency target (in slots): 100

I in this scenario the optimal parameter is β = 3.33, which leads toPk = 0.9334

I this value of Pk might be too high for many applications

Page 60: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

18Latency-Reliability GuaranteesOptimization II

I How can we improve the performance?

I we can have different classes of slots

I m1 slots with β1I m2 slots with β2I ...I mh slots with βh

I the analysis needs to be modifiedI the iterative SIC process is modelled by means of a finite state machine with

state:Su := (C

(1)u ,C

(2)u , . . . ,C

(h)u ,Ru)

I C(i)u : cardinality of i-th cloud when u users are unresolved (number of slots of

type i with reduced degree 2 or larger)I Ru : cardinality of ripple when u users are unresolved

Page 61: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

18Latency-Reliability GuaranteesOptimization II

I How can we improve the performance?I we can have different classes of slots

I m1 slots with β1I m2 slots with β2I ...I mh slots with βh

I the analysis needs to be modifiedI the iterative SIC process is modelled by means of a finite state machine with

state:Su := (C

(1)u ,C

(2)u , . . . ,C

(h)u ,Ru)

I C(i)u : cardinality of i-th cloud when u users are unresolved (number of slots of

type i with reduced degree 2 or larger)

I Ru : cardinality of ripple when u users are unresolved

Page 62: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

18Latency-Reliability GuaranteesOptimization II

I How can we improve the performance?I we can have different classes of slots

I m1 slots with β1

I m2 slots with β2I ...I mh slots with βh

I the analysis needs to be modifiedI the iterative SIC process is modelled by means of a finite state machine with

state:Su := (C

(1)u ,C

(2)u , . . . ,C

(h)u ,Ru)

I C(i)u : cardinality of i-th cloud when u users are unresolved (number of slots of

type i with reduced degree 2 or larger)I Ru : cardinality of ripple when u users are unresolved

Page 63: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

18Latency-Reliability GuaranteesOptimization II

I How can we improve the performance?I we can have different classes of slots

I m1 slots with β1I m2 slots with β2

I ...I mh slots with βh

I the analysis needs to be modifiedI the iterative SIC process is modelled by means of a finite state machine with

state:Su := (C

(1)u ,C

(2)u , . . . ,C

(h)u ,Ru)

I C(i)u : cardinality of i-th cloud when u users are unresolved (number of slots of

type i with reduced degree 2 or larger)I Ru : cardinality of ripple when u users are unresolved

Page 64: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

18Latency-Reliability GuaranteesOptimization II

I How can we improve the performance?I we can have different classes of slots

I m1 slots with β1I m2 slots with β2I ...I mh slots with βh

I the analysis needs to be modifiedI the iterative SIC process is modelled by means of a finite state machine with

state:Su := (C

(1)u ,C

(2)u , . . . ,C

(h)u ,Ru)

I C(i)u : cardinality of i-th cloud when u users are unresolved (number of slots of

type i with reduced degree 2 or larger)I Ru : cardinality of ripple when u users are unresolved

Page 65: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

18Latency-Reliability GuaranteesOptimization II

I How can we improve the performance?I we can have different classes of slots

I m1 slots with β1I m2 slots with β2I ...I mh slots with βh

I the analysis needs to be modifiedI the iterative SIC process is modelled by means of a finite state machine with

state:Su := (C

(1)u ,C

(2)u , . . . ,C

(h)u ,Ru)

I C(i)u : cardinality of i-th cloud when u users are unresolved (number of slots of

type i with reduced degree 2 or larger)I Ru : cardinality of ripple when u users are unresolved

Page 66: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

19Latency-Reliability GuaranteesOptimization - Results

I how much can we improve the performance?

slot classes Pk parameters1 0.9334 β = 3.33, m = 100

2 0.9986 β1 = 2.53, m1 = 86β2 = 22.08, m2 = 14

3 0.99917β1 = 2.51, m1 = 88β2 = 17.39, m2 = 11β3 = 50, m3 = 1

dynamical 0.9999975 dynamical

I dynamical means that using feedback β is varied on a slot basisdepending on the decoder state:

I the number of slots in each cloud type C(i)u

I the number of decoded users

Page 67: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

19Latency-Reliability GuaranteesOptimization - Results

I how much can we improve the performance?

slot classes Pk parameters1 0.9334 β = 3.33, m = 100

2 0.9986 β1 = 2.53, m1 = 86β2 = 22.08, m2 = 14

3 0.99917β1 = 2.51, m1 = 88β2 = 17.39, m2 = 11β3 = 50, m3 = 1

dynamical 0.9999975 dynamical

I dynamical means that using feedback β is varied on a slot basisdepending on the decoder state:

I the number of slots in each cloud type C(i)u

I the number of decoded users

Page 68: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

19Latency-Reliability GuaranteesOptimization - Results

I how much can we improve the performance?

slot classes Pk parameters1 0.9334 β = 3.33, m = 100

2 0.9986 β1 = 2.53, m1 = 86β2 = 22.08, m2 = 14

3 0.99917β1 = 2.51, m1 = 88β2 = 17.39, m2 = 11β3 = 50, m3 = 1

dynamical 0.9999975 dynamical

I dynamical means that using feedback β is varied on a slot basisdepending on the decoder state:

I the number of slots in each cloud type C(i)u

I the number of decoded users

Page 69: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

19Latency-Reliability GuaranteesOptimization - Results

I how much can we improve the performance?

slot classes Pk parameters1 0.9334 β = 3.33, m = 100

2 0.9986 β1 = 2.53, m1 = 86β2 = 22.08, m2 = 14

3 0.99917β1 = 2.51, m1 = 88β2 = 17.39, m2 = 11β3 = 50, m3 = 1

dynamical 0.9999975 dynamical

I dynamical means that using feedback β is varied on a slot basisdepending on the decoder state:

I the number of slots in each cloud type C(i)u

I the number of decoded users

Page 70: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

19Latency-Reliability GuaranteesOptimization - Results

I how much can we improve the performance?

slot classes Pk parameters1 0.9334 β = 3.33, m = 100

2 0.9986 β1 = 2.53, m1 = 86β2 = 22.08, m2 = 14

3 0.99917β1 = 2.51, m1 = 88β2 = 17.39, m2 = 11β3 = 50, m3 = 1

dynamical 0.9999975 dynamical

I dynamical means that using feedback β is varied on a slot basisdepending on the decoder state:

I the number of slots in each cloud type C(i)u

I the number of decoded users

Page 71: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

Outline

Introduction

Frameless ALOHA

Finite Length Analysis

Latency-Reliability Guarantees

Conclusions

Page 72: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

20Conclusions

I our work is based on an exact finite-length analysis of framelessALOHA in the collision channel

I the analysis yields the exact probability of meeting a latency-reliabilitytarget

I application example: introducing different slot classes we can decreasethe probability of not meeting a latency-reliability target by almost 2orders of magnitude

I a dynamical strategy can provide even further gains (2 orders ofmagnitude better than static).

Page 73: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

20Conclusions

I our work is based on an exact finite-length analysis of framelessALOHA in the collision channel

I the analysis yields the exact probability of meeting a latency-reliabilitytarget

I application example: introducing different slot classes we can decreasethe probability of not meeting a latency-reliability target by almost 2orders of magnitude

I a dynamical strategy can provide even further gains (2 orders ofmagnitude better than static).

Page 74: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

20Conclusions

I our work is based on an exact finite-length analysis of framelessALOHA in the collision channel

I the analysis yields the exact probability of meeting a latency-reliabilitytarget

I application example: introducing different slot classes we can decreasethe probability of not meeting a latency-reliability target by almost 2orders of magnitude

I a dynamical strategy can provide even further gains (2 orders ofmagnitude better than static).

Page 75: Frameless ALOHA with latency-reliability guarantees fileC. Stefanovic |´ Frameless ALOHA Random Access protocols 1 I random access (RA) protocols are effective when the nature of

C. Stefanovic | Frameless ALOHA

20Conclusions

I our work is based on an exact finite-length analysis of framelessALOHA in the collision channel

I the analysis yields the exact probability of meeting a latency-reliabilitytarget

I application example: introducing different slot classes we can decreasethe probability of not meeting a latency-reliability target by almost 2orders of magnitude

I a dynamical strategy can provide even further gains (2 orders ofmagnitude better than static).