帳號:guest(18.117.192.192)          離開系統
字體大小: 字級放大   字級縮小   預設字形  

詳目顯示

以作者查詢圖書館館藏以作者查詢臺灣博碩士論文系統以作者查詢全國書目
作者(中文):劉子瑄
作者(外文):Liu, Tzu-Hsuan
論文名稱(中文):阿羅哈接收器:用於分析結合連續干擾消除之編碼多重接取的網路演算方法
論文名稱(外文):ALOHA Receivers: a Network Calculus Approach for Analyzing Coded Multiple Access with SIC
指導教授(中文):張正尚
指導教授(外文):Chang, Cheng-Shang
口試委員(中文):高榮鴻
高榮駿
李端興
口試委員(外文):Gau, Rung-Hung
Kao, Jung-Chun
Lee, Duan-Shin
學位類別:碩士
校院名稱:國立清華大學
系所名稱:通訊工程研究所
學號:107064702
出版年(民國):109
畢業學年度:109
語文別:英文
論文頁數:45
中文關鍵詞:多重接取網路運算連續干擾消除低延遲可靠傳輸
外文關鍵詞:multiple accessnetwork calculussuccessive interference cancellationultra-reliable low-latency communications
相關次數:
  • 推薦推薦:0
  • 點閱點閱:312
  • 評分評分:*****
  • 下載下載:0
  • 收藏收藏:0
為了隱藏物理層的複雜性,我們需要一種抽象的接收器幫助我們進行在Layer2的輸入與輸出流量分析。在先前的論文中,波以松接收器被視為能夠分析編碼隨機接取的數學架構。在本篇論文中,我們進一步提出了確定性且可合併到數學架構中的阿羅哈接收器。阿羅哈接收器的特徵在於成功接收的封包數量的成功函數。受網路演算理論的啟發,我們推導出成功函數的各種代數性質,而它們可以用來證明各種阿羅哈接收器的封閉特性,包括(1)串聯式阿羅哈接收器(2)合作式阿羅哈接收器,(3)帶有流量多路傳輸的阿羅哈接收器,以及(4)具有編碼的阿羅哈接收器。進行廣泛的模擬後,我們證明理論值與模擬值非常吻合。
Motivated by the need to hide the complexity of the physical layer from performance analysis in a layer 2 protocol, a class of abstract receivers, called Poisson receivers, was recently proposed as a probabilistic framework for providing differentiated services in uplink transmissions in 5G networks. In this paper, we further propose a deterministic framework of ALOHA receivers that can be incorporated into the probabilistic framework of Poisson receivers for analyzing coded multiple access with successive interference cancellation. An ALOHA receiver is characterized by a success function of the number of packets that can be successfully received. Inspired by the theory of network calculus, we derive various algebraic properties for several operations on success functions and use them to prove various closure properties of ALOHA receivers, including (i) ALOHA receivers in tandem, (ii) cooperative ALOHA receivers, (iii) ALOHA receivers with traffic multiplexing, and (iv) ALOHA receivers with packet coding. By conducting extensive simulations, we show that our theoretical results match extremely well with the simulation results.
Contents 1
List of Figures 3
List of Tables 4
1 Introduction 5
2 Poisson receivers 9
2.1 Review of the framework of Poisson receivers . . . . . . . . . . . . . . . . 9
2.2 Rayleigh block fading channel with capture . . . . . . . . . . . . . . . . . 11
3 ALOHA Receivers 14
3.1 Definitions and examples of ALOHA receivers . . . . . . . . . . . . . . . 14
3.2 Operations on functions . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
3.3 Two ALOHA receivers in tandem . . . . . . . . . . . . . . . . . . . . . . 21
3.4 Two cooperative ALOHA receivers . . . . . . . . . . . . . . . . . . . . . 23
3.5 ALOHA receivers with trac multiplexing . . . . . . . . . . . . . . . . . 25
3.6 ALOHA receivers with packet coding . . . . . . . . . . . . . . . . . . . . 27
3.7 Multiple cooperative D-fold ALOHA receivers . . . . . . . . . . . . . . . 31
4 Numerical results 35
4.1 Two cooperative D-fold ALOHA receivers with URLLC traffic and eMBB traffic . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35
4.1.1 Wireless channel model . . . . . . . . . . . . . . . . . . . . . . . . 36
4.1.2 Coded random access for a use case . . . . . . . . . . . . . . . . . 36
4.2 Rayleigh block fading channel with URLLC traffic and eMBB traffic . . . 38
5 Conclusion 40
[1] C.-H. Yu, L. Huang, C.-S. Chang, and D.-S. Lee, "Poisson receivers: a probabilistic framework for analyzing coded random access," arXiv preprint arXiv:2008.07561,2020.
[2] C.-P. Li, J. Jiang, W. Chen, T. Ji, and J. Smee, "5g ultra-reliable and low-latency systems design," in Networks and Communications (EuCNC), 2017 European Conference on. IEEE, 2017, pp. 1-5.
[3] M. Bennis, M. Debbah, and H. V. Poor, "Ultra-reliable and low-latency wireless communication: Tail, risk and scale," arXiv preprint arXiv:1801.01270, 2018.
[4] P. Popovski, C ̌. Stefanovic ́, J. J. Nielsen, E. De Carvalho, M. Angjelichinoski, K. F.Trillingsgaard, and A.-S. Bana, "Wireless access in ultra-reliable low-latency communication (urllc)," IEEE Transactions on Communications, vol. 67, no. 8, pp.5783-5801,2019.
[5] E. Casini, R. De Gaudenzi, and O. D. R. Herrero, "Contention resolution diversity slotted aloha (crdsa): An enhanced random access scheme for satellite access packet networks," IEEE Transactions on Wireless Communications, vol. 6, no. 4, 2007.
[6] G. Liva, "Graph-based analysis and optimization of contention resolution diversity slotted aloha," IEEE Transactions on Communications, vol. 59, no. 2, pp. 477-487, 2011.
[7] K. R. Narayanan and H. D. Pster, "Iterative collision resolution for slotted aloha: An optimal uncoordinated transmission policy," in Turbo Codes and Iterative Information Processing (ISTC), 2012 7th International Symposium on. IEEE, 2012, pp.136-139.
[8] E. Paolini, G. Liva, and M. Chiani, "Random access on graphs: A survey and new results," in Signals, Systems and Computers (ASILOMAR), 2012 Conference Record of the Forty Sixth Asilomar Conference on. IEEE, 2012, pp. 1743-1747.
[9] D. Jakovetic ́, D. Bajovic ́, D. Vukobratovic ́, and V. Crnojevic ́, "Cooperative slotted aloha for multi-base station systems," IEEE Transactions on Communications, vol. 63, no. 4, pp. 1443-1456, 2015.
[10] C ̌. Stefanovic and D. Vukobratovic ́, "Coded random access," in Network Coding and Subspace Designs. Springer, 2018, pp. 339-359.
[11] R. Hoshyar, F. P. Wathan, and R. Tafazolli, "Novel low-density signature for synchronous cdma systems over awgn channel," IEEE Transactions on Signal Processing, vol. 56, no. 4, pp. 1616-1626, 2008.
[12] H. Nikopour and H. Baligh, "Sparse code multiple access," in Personal Indoor and Mobile Radio Communications (PIMRC), 2013 IEEE 24th International Symposium on. IEEE, 2013, pp. 332-336.
[13] Z. Yuan, G. Yu, W. Li, Y. Yuan, X. Wang, and J. Xu, "Multi-user shared access for internet of things," in Vehicular Technology Conference (VTC Spring), 2016 IEEE 83rd. IEEE, 2016, pp. 1-5.
[14] S. Chen, B. Ren, Q. Gao, S. Kang, S. Sun, and K. Niu, " Pattern division multiple access-a novel nonorthogonal multiple access for fifth-generation radio networks," IEEE Transactions on Vehicular Technology, vol. 66, no. 4, pp. 3185-3196, 2017.
[15] O. Ordentlich and Y. Polyanskiy, "Low complexity schemes for the random access gaussian channel," in 2017 IEEE International Symposium on Information Theory (ISIT). IEEE, 2017, pp. 2528-2532.
[16] C.-S. Chang, D.-S. Lee, and C.Wang, "Asynchronous grant-free uplink transmissions in multichannel wireless networks with heterogeneous qos guarantees," IEEE/ACM Transactions on Networking, vol. 27, no. 4, pp. 1584-1597, 2019.
[17] Y. Liu, Y. Deng, M. Elkashlan, A. Nallanathan, and G. K. Karagiannidis, "Analyzing grant-free access for urllc service," arXiv preprint arXiv:2002.07842, 2020.
[18] K. Andreev, E. Marshakov, and A. Frolov, "A polar code based tin-sic scheme for the unsourced random access in the quasi-static fading mac," arXiv preprint arXiv:2005.06899, 2020.
[19] R. Gallager, "Low-density parity-check codes," IRE Transactions on information theory, vol. 8, no. 1, pp. 21-28, 1962.
[20] C ̌. Stefanovic ́, M. Momoda, and P. Popovski, "Exploiting capture e
ffect in frameless aloha for massive wireless random access," in 2014 IEEE Wireless Communications and Networking Conference (WCNC). IEEE, 2014, pp. 1762-1767.
[21] F. Clazzer, E. Paolini, I. Mambelli, and C ̌. Stefanovic ́, "Irregular repetition slotted aloha over the rayleigh block fading channel with capture," in 2017 IEEE International Conference on Communications (ICC). IEEE, 2017, pp. 1-6.
[22] R. L. Cruz, "A calculus for network delay. i. network elements in isolation," IEEE Transactions on information theory, vol. 37, no. 1, pp. 114{131, 1991.
[23] R. L. Cruz, \A calculus for network delay. ii. network analysis," IEEE Transactions on information theory, vol. 37, no. 1, pp. 132-141, 1991.
[24] C.-S. Chang, Performance guarantees in communication networks. Springer Science & Business Media, 2012.
[25] J.-Y. Le Boudec and P. Thiran, Network calculus: a theory of deterministic queuing systems for the internet. Springer Science & Business Media, 2001, vol. 2050.
[26] S. Mao and S. S. Panwar, "A survey of envelope processes and their applications in quality of service provisioning," IEEE Communications Surveys & Tutorials, vol. 8, no. 3, pp. 2-20, 2006.
[27] Y. Jiang and Y. Liu, Stochastic network calculus. Springer, 2008, vol. 1.
[28] M. Fidler, "Survey of deterministic and stochastic service curve models in the network calculus," IEEE Communications surveys & tutorials, vol. 12, no. 1, pp. 59-86,2010.
[29] F. Baccelli, G. Cohen, G. J. Olsder, and J.-P. Quadrat, "Synchronization and linearity: an algebra for discrete event systems," 1992.
[30] A. K. Parekh and R. G. Gallager, " A generalized processor sharing approach to flow control in integrated services networks: the single-node case," IEEE/ACM transactions on networking, vol.1, no. 3, pp. 344-357, 1993.
[31] H. Sariowan, R. L. Cruz, and G. C. Polyzos, "Sced: A generalized scheduling policy for guaranteeing quality-of-service," IEEE/ACM Transactions on networking, vol. 7, no. 5, pp. 669-684, 1999.
[32] E. Paolini, C. Stefanovic ́, G. Liva, and P. Popovski, "Coded random access: applying codes on graphs to design random access protocols," IEEE Communications Magazine, vol. 53, no. 6, pp. 144-150, 2015.
[33] A. Munari, F. Clazzer, and G. Liva, "Multi-receiver aloha systems-a survey and new results," in Communication Workshop (ICCW), 2015 IEEE International Conference on. IEEE, 2015, pp.2108-2114.
[34] M. Luby, M. Mitzenmacher, and M. A. Shokrollahi, "Analysis of random processes via and-or tree evaluation," in SODA, vol. 98, 1998, pp. 364-373.
[35] M. Luby, M. Mitzenmacher, A. Shokrollah, and D. Spielman, "Analysis of low-density codes and improved designs using irregular graphs," in Proceedings of the thirtieth annual ACM symposium on Theory of computing, 1998, pp. 249-258.
[36] T. J. Richardson and R. L. Urbanke, "The capacity of low-density parity-check codes under message-passing decoding," IEEE Transactions on Information Theory,vol. 47, no. 2, pp. 599-618, 2001.
[37] N. Abramson, "The aloha system: another alternative for computer communications," in Proceedings of the November 17-19, 1970, fall joint computer conference. ACM, 1970, pp. 281-285.
[38] 3GPP, "Service requirements for cyber-physical control applications in vertical domains," 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 22.104, 03 2019, version 16.1.0. [Online]. Available: https://portal.3gpp.org/
desktopmodules/Specications/SpecicationDetails.aspx?specicationId=3528
[39] 3GPP, "Evolved Universal Terrestrial Radio Access (E-UTRA); User Equipment (UE) radio access capabilities," 3rd Generation Partnership Project (3GPP), Technical Specification (TS) 36.306, 06 2019, version 15.5.0. [Online]. Available: https://portal.3gpp.org/desktopmodules/Specications/SpecicationDetails.aspx?specicationId=2434
[40] A. Anand, G. De Veciana, and S. Shakkottai, "Joint scheduling of urllc and embb traffic in 5g wireless networks," IEEE/ACM Transactions on Networking, vol. 28, no. 2, pp. 477-490, 2020.
[41] P. Popovski, K. F. Trillingsgaard, O. Simeone, and G. Durisi, "5g wireless network slicing for embb, urllc, and mmtc: A communication-theoretic view," IEEE Access, vol. 6, pp. 55 765-55 779, 2018.
 
 
 
 
第一頁 上一頁 下一頁 最後一頁 top
* *