研究生: |
劉子瑄 Liu, Tzu-Hsuan |
---|---|
論文名稱: |
阿羅哈接收器:用於分析結合連續干擾消除之編碼多重接取的網路演算方法 ALOHA Receivers: a Network Calculus Approach for Analyzing Coded Multiple Access with SIC |
指導教授: |
張正尚
Chang, Cheng-Shang |
口試委員: |
高榮鴻
Gau, Rung-Hung 高榮駿 Kao, Jung-Chun 李端興 Lee, Duan-Shin |
學位類別: |
碩士 Master |
系所名稱: |
電機資訊學院 - 通訊工程研究所 Communications Engineering |
論文出版年: | 2020 |
畢業學年度: | 109 |
語文別: | 英文 |
論文頁數: | 45 |
中文關鍵詞: | 多重接取 、網路運算 、連續干擾消除 、低延遲可靠傳輸 |
外文關鍵詞: | multiple access, network calculus, successive interference cancellation, ultra-reliable low-latency communications |
相關次數: | 點閱:3 下載:0 |
分享至: |
查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
為了隱藏物理層的複雜性,我們需要一種抽象的接收器幫助我們進行在Layer2的輸入與輸出流量分析。在先前的論文中,波以松接收器被視為能夠分析編碼隨機接取的數學架構。在本篇論文中,我們進一步提出了確定性且可合併到數學架構中的阿羅哈接收器。阿羅哈接收器的特徵在於成功接收的封包數量的成功函數。受網路演算理論的啟發,我們推導出成功函數的各種代數性質,而它們可以用來證明各種阿羅哈接收器的封閉特性,包括(1)串聯式阿羅哈接收器(2)合作式阿羅哈接收器,(3)帶有流量多路傳輸的阿羅哈接收器,以及(4)具有編碼的阿羅哈接收器。進行廣泛的模擬後,我們證明理論值與模擬值非常吻合。
Motivated by the need to hide the complexity of the physical layer from performance analysis in a layer 2 protocol, a class of abstract receivers, called Poisson receivers, was recently proposed as a probabilistic framework for providing differentiated services in uplink transmissions in 5G networks. In this paper, we further propose a deterministic framework of ALOHA receivers that can be incorporated into the probabilistic framework of Poisson receivers for analyzing coded multiple access with successive interference cancellation. An ALOHA receiver is characterized by a success function of the number of packets that can be successfully received. Inspired by the theory of network calculus, we derive various algebraic properties for several operations on success functions and use them to prove various closure properties of ALOHA receivers, including (i) ALOHA receivers in tandem, (ii) cooperative ALOHA receivers, (iii) ALOHA receivers with traffic multiplexing, and (iv) ALOHA receivers with packet coding. By conducting extensive simulations, we show that our theoretical results match extremely well with the simulation results.
[1] C.-H. Yu, L. Huang, C.-S. Chang, and D.-S. Lee, "Poisson receivers: a probabilistic framework for analyzing coded random access," arXiv preprint arXiv:2008.07561,2020.
[2] C.-P. Li, J. Jiang, W. Chen, T. Ji, and J. Smee, "5g ultra-reliable and low-latency systems design," in Networks and Communications (EuCNC), 2017 European Conference on. IEEE, 2017, pp. 1-5.
[3] M. Bennis, M. Debbah, and H. V. Poor, "Ultra-reliable and low-latency wireless communication: Tail, risk and scale," arXiv preprint arXiv:1801.01270, 2018.
[4] P. Popovski, C ̌. Stefanovic ́, J. J. Nielsen, E. De Carvalho, M. Angjelichinoski, K. F.Trillingsgaard, and A.-S. Bana, "Wireless access in ultra-reliable low-latency communication (urllc)," IEEE Transactions on Communications, vol. 67, no. 8, pp.5783-5801,2019.
[5] E. Casini, R. De Gaudenzi, and O. D. R. Herrero, "Contention resolution diversity slotted aloha (crdsa): An enhanced random access scheme for satellite access packet networks," IEEE Transactions on Wireless Communications, vol. 6, no. 4, 2007.
[6] G. Liva, "Graph-based analysis and optimization of contention resolution diversity slotted aloha," IEEE Transactions on Communications, vol. 59, no. 2, pp. 477-487, 2011.
[7] K. R. Narayanan and H. D. Pster, "Iterative collision resolution for slotted aloha: An optimal uncoordinated transmission policy," in Turbo Codes and Iterative Information Processing (ISTC), 2012 7th International Symposium on. IEEE, 2012, pp.136-139.
[8] E. Paolini, G. Liva, and M. Chiani, "Random access on graphs: A survey and new results," in Signals, Systems and Computers (ASILOMAR), 2012 Conference Record of the Forty Sixth Asilomar Conference on. IEEE, 2012, pp. 1743-1747.
[9] D. Jakovetic ́, D. Bajovic ́, D. Vukobratovic ́, and V. Crnojevic ́, "Cooperative slotted aloha for multi-base station systems," IEEE Transactions on Communications, vol. 63, no. 4, pp. 1443-1456, 2015.
[10] C ̌. Stefanovic and D. Vukobratovic ́, "Coded random access," in Network Coding and Subspace Designs. Springer, 2018, pp. 339-359.
[11] R. Hoshyar, F. P. Wathan, and R. Tafazolli, "Novel low-density signature for synchronous cdma systems over awgn channel," IEEE Transactions on Signal Processing, vol. 56, no. 4, pp. 1616-1626, 2008.
[12] H. Nikopour and H. Baligh, "Sparse code multiple access," in Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th International Symposium on. IEEE, 2013, pp. 332-336.
[13] Z. Yuan, G. Yu, W. Li, Y. Yuan, X. Wang, and J. Xu, "Multi-user shared access for internet of things," in Vehicular Technology Conference (VTC Spring), 2016 IEEE 83rd. IEEE, 2016, pp. 1-5.
[14] S. Chen, B. Ren, Q. Gao, S. Kang, S. Sun, and K. Niu, " Pattern division multiple access-a novel nonorthogonal multiple access for fifth-generation radio networks," IEEE Transactions on Vehicular Technology, vol. 66, no. 4, pp. 3185-3196, 2017.
[15] O. Ordentlich and Y. Polyanskiy, "Low complexity schemes for the random access gaussian channel," in 2017 IEEE International Symposium on Information Theory (ISIT). IEEE, 2017, pp. 2528-2532.
[16] C.-S. Chang, D.-S. Lee, and C.Wang, "Asynchronous grant-free uplink transmissions in multichannel wireless networks with heterogeneous qos guarantees," IEEE/ACM Transactions on Networking, vol. 27, no. 4, pp. 1584-1597, 2019.
[17] Y. Liu, Y. Deng, M. Elkashlan, A. Nallanathan, and G. K. Karagiannidis, "Analyzing grant-free access for urllc service," arXiv preprint arXiv:2002.07842, 2020.
[18] K. Andreev, E. Marshakov, and A. Frolov, "A polar code based tin-sic scheme for the unsourced random access in the quasi-static fading mac," arXiv preprint arXiv:2005.06899, 2020.
[19] R. Gallager, "Low-density parity-check codes," IRE Transactions on information theory, vol. 8, no. 1, pp. 21-28, 1962.
[20] C ̌. Stefanovic ́, M. Momoda, and P. Popovski, "Exploiting capture e
ffect in frameless aloha for massive wireless random access," in 2014 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2014, pp. 1762-1767.
[21] F. Clazzer, E. Paolini, I. Mambelli, and C ̌. Stefanovic ́, "Irregular repetition slotted aloha over the rayleigh block fading channel with capture," in 2017 IEEE International Conference on Communications (ICC). IEEE, 2017, pp. 1-6.
[22] R. L. Cruz, "A calculus for network delay. i. network elements in isolation," IEEE Transactions on information theory, vol. 37, no. 1, pp. 114{131, 1991.
[23] R. L. Cruz, \A calculus for network delay. ii. network analysis," IEEE Transactions on information theory, vol. 37, no. 1, pp. 132-141, 1991.
[24] C.-S. Chang, Performance guarantees in communication networks. Springer Science & Business Media, 2012.
[25] J.-Y. Le Boudec and P. Thiran, Network calculus: a theory of deterministic queuing systems for the internet. Springer Science & Business Media, 2001, vol. 2050.
[26] S. Mao and S. S. Panwar, "A survey of envelope processes and their applications in quality of service provisioning," IEEE Communications Surveys & Tutorials, vol. 8, no. 3, pp. 2-20, 2006.
[27] Y. Jiang and Y. Liu, Stochastic network calculus. Springer, 2008, vol. 1.
[28] M. Fidler, "Survey of deterministic and stochastic service curve models in the network calculus," IEEE Communications surveys & tutorials, vol. 12, no. 1, pp. 59-86,2010.
[29] F. Baccelli, G. Cohen, G. J. Olsder, and J.-P. Quadrat, "Synchronization and linearity: an algebra for discrete event systems," 1992.
[30] A. K. Parekh and R. G. Gallager, " A generalized processor sharing approach to flow control in integrated services networks: the single-node case," IEEE/ACM transactions on networking, vol.1, no. 3, pp. 344-357, 1993.
[31] H. Sariowan, R. L. Cruz, and G. C. Polyzos, "Sced: A generalized scheduling policy for guaranteeing quality-of-service," IEEE/ACM Transactions on networking, vol. 7, no. 5, pp. 669-684, 1999.
[32] E. Paolini, C. Stefanovic ́, G. Liva, and P. Popovski, "Coded random access: applying codes on graphs to design random access protocols," IEEE Communications Magazine, vol. 53, no. 6, pp. 144-150, 2015.
[33] A. Munari, F. Clazzer, and G. Liva, "Multi-receiver aloha systems-a survey and new results," in Communication Workshop (ICCW), 2015 IEEE International Conference on. IEEE, 2015, pp.2108-2114.
[34] M. Luby, M. Mitzenmacher, and M. A. Shokrollahi, "Analysis of random processes via and-or tree evaluation," in SODA, vol. 98, 1998, pp. 364-373.
[35] M. Luby, M. Mitzenmacher, A. Shokrollah, and D. Spielman, "Analysis of low-density codes and improved designs using irregular graphs," in Proceedings of the thirtieth annual ACM symposium on Theory of computing, 1998, pp. 249-258.
[36] T. J. Richardson and R. L. Urbanke, "The capacity of low-density parity-check codes under message-passing decoding," IEEE Transactions on Information Theory,vol. 47, no. 2, pp. 599-618, 2001.
[37] N. Abramson, "The aloha system: another alternative for computer communications," in Proceedings of the November 17-19, 1970, fall joint computer conference. ACM, 1970, pp. 281-285.
[38] 3GPP, "Service requirements for cyber-physical control applications in vertical domains," 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 22.104, 03 2019, version 16.1.0. [Online]. Available: https://portal.3gpp.org/
desktopmodules/Specications/SpecicationDetails.aspx?specicationId=3528
[39] 3GPP, "Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio access capabilities," 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 36.306, 06 2019, version 15.5.0. [Online]. Available: https://portal.3gpp.org/desktopmodules/Specications/SpecicationDetails.aspx?specicationId=2434
[40] A. Anand, G. De Veciana, and S. Shakkottai, "Joint scheduling of urllc and embb traffic in 5g wireless networks," IEEE/ACM Transactions on Networking, vol. 28, no. 2, pp. 477-490, 2020.
[41] P. Popovski, K. F. Trillingsgaard, O. Simeone, and G. Durisi, "5g wireless network slicing for embb, urllc, and mmtc: A communication-theoretic view," IEEE Access, vol. 6, pp. 55 765-55 779, 2018.