-
Spatio-Temporal Information Freshness for Remote Source Monitoring in IoT Systems
Authors:
Andrea Munari,
Federico Chiariotti,
Leonardo Badia,
Petar Popovski
Abstract:
The widespread adoption of age of information (AoI) as a meaningful and analytically tractable information freshness metric has led to a wide body of work on the timing performance of Internet of things (IoT) systems. However, the spatial correlation inherent to environmental monitoring has been mostly neglected in the recent literature, due to the significant modeling complexity it introduces. In…
▽ More
The widespread adoption of age of information (AoI) as a meaningful and analytically tractable information freshness metric has led to a wide body of work on the timing performance of Internet of things (IoT) systems. However, the spatial correlation inherent to environmental monitoring has been mostly neglected in the recent literature, due to the significant modeling complexity it introduces. In this work, we address this gap by presenting a model of spatio-temporal information freshness, considering the conditional entropy of the system state in a remote monitoring scenario, such as a low-orbit satellite collecting information from a wide geographical area. Our analytical results show that purely age-oriented schemes tend to select an overly broad communication range, leading to inaccurate estimates and energy inefficiency, both of which can be mitigated by adopting a spatio-temporal approach.
△ Less
Submitted 5 June, 2025;
originally announced June 2025.
-
On the Role of Early-Termination for Age of Information in Tree-Based Random Access Protocols
Authors:
Andrea Munari,
Cedomir Stefanovic
Abstract:
Age of Information (AoI) has emerged as a key metric for assessing data freshness in IoT applications, where a large number of devices report time-stamped updates to a monitor. Such systems often rely on random access protocols based on variations of ALOHA at the link layer, where collision resolution algorithms play a fundamental role to enable reliable delivery of packets. In this context, we pr…
▽ More
Age of Information (AoI) has emerged as a key metric for assessing data freshness in IoT applications, where a large number of devices report time-stamped updates to a monitor. Such systems often rely on random access protocols based on variations of ALOHA at the link layer, where collision resolution algorithms play a fundamental role to enable reliable delivery of packets. In this context, we provide the first analytical characterization of average AoI for the classical Capetanakis tree-based algorithm with gated access under exogenous traffic, capturing the protocol's dynamics, driven by sporadic packet generation and variable collision resolution times. We also explore a variant with early termination, where contention is truncated after a maximum number of slots even if not all users are resolved. The approach introduces a fundamental trade-off between reliability and timeliness, allowing stale packets to be dropped to improve freshness.
△ Less
Submitted 5 June, 2025;
originally announced June 2025.
-
A low-PAPR Pilot Design and Optimization for OTFS Modulation
Authors:
Davide Bergamasco,
Federico Clazzer,
Andrea Munari,
Paolo Casari
Abstract:
Orthogonal time frequency space (OTFS) modulation has been proposed recently as a new waveform in the context of doubly-selective multi-path channels. This article proposes a novel pilot design that improves OTFS spectral efficiency (SE) while reducing its peak-to-average power ratio (PAPR). Instead of adopting an embedded data-orthogonal pilot for channel estimation, our scheme relies on Chu sequ…
▽ More
Orthogonal time frequency space (OTFS) modulation has been proposed recently as a new waveform in the context of doubly-selective multi-path channels. This article proposes a novel pilot design that improves OTFS spectral efficiency (SE) while reducing its peak-to-average power ratio (PAPR). Instead of adopting an embedded data-orthogonal pilot for channel estimation, our scheme relies on Chu sequences superimposed to data symbols. We optimize the construction by investigating the best energy split between pilot and data symbols. Two equalizers, and an iterative channel estimation and equalization procedure are considered. We present extensive numerical results of relevant performance metrics, including the normalized mean squared error of the estimator, bit error rate, PAPR and SE. Our results show that, while the embedded pilot scheme estimates the channel more accurately, our approach yields a better tradeoff by achieving much higher spectral efficiency and lower PAPR.
△ Less
Submitted 19 March, 2025;
originally announced March 2025.
-
On the Uncertainty of a Simple Estimator for Remote Source Monitoring over ALOHA Channels
Authors:
Andrea Munari
Abstract:
Efficient remote monitoring of distributed sources is essential for many Internet of Things (IoT) applications. This work studies the uncertainty at the receiver when tracking two-state Markov sources over a slotted random access channel without feedback, using the conditional entropy as a performance indicator, and considering the last received value as current state estimate. We provide an analy…
▽ More
Efficient remote monitoring of distributed sources is essential for many Internet of Things (IoT) applications. This work studies the uncertainty at the receiver when tracking two-state Markov sources over a slotted random access channel without feedback, using the conditional entropy as a performance indicator, and considering the last received value as current state estimate. We provide an analytical characterization of the metric, and evaluate three access strategies: (i) maximizing throughput, (ii) transmitting only on state changes, and (iii) minimizing uncertainty through optimized access probabilities. Our results reveal that throughput optimization does not always reduce uncertainty. Moreover, while reactive policies are optimal for symmetric sources, asymmetric processes benefit from mixed strategies allowing transmissions during state persistence.
△ Less
Submitted 3 February, 2025;
originally announced February 2025.
-
Goal-Oriented Medium Access with Distributed Belief Processing
Authors:
Federico Chiariotti,
Andrea Munari,
Leonardo Badia,
Petar Popovski
Abstract:
Goal-oriented communication entails the timely transmission of updates related to a specific goal defined by the application. In a distributed setup with multiple sensors, each individual sensor knows its own observation and can determine its freshness, as measured by Age of Incorrect Information (AoII). This local knowledge is suited for distributed medium access, where the transmission strategie…
▽ More
Goal-oriented communication entails the timely transmission of updates related to a specific goal defined by the application. In a distributed setup with multiple sensors, each individual sensor knows its own observation and can determine its freshness, as measured by Age of Incorrect Information (AoII). This local knowledge is suited for distributed medium access, where the transmission strategies have to deal with collisions. We present Dynamic Epistemic Logic for Tracking Anomalies (DELTA), a medium access protocol that limits collisions and minimizes AoII in anomaly reporting over dense networks. Each sensor knows its own AoII, while it can compute the belief about the AoII for all other sensors, based on their Age of Information (AoI), which is inferred from the acknowledgments. This results in a goal-oriented approach based on dynamic epistemic logic emerging from public information. We analyze the resulting DELTA protocol both from a theoretical standpoint and with Monte Carlo simulations, showing that it is significantly more efficient and robust than classical random access, while outperforming state-of-the-art scheduled schemes by at least 30%, even with imperfect feedback.
△ Less
Submitted 19 March, 2025; v1 submitted 10 December, 2024;
originally announced December 2024.
-
Peak Age of Incorrect Information of Reactive ALOHA Reporting Under Imperfect Feedback
Authors:
Federico Chiariotti,
Andrea Munari,
Leonardo Badia,
Petar Popovski
Abstract:
Age of Incorrect Information (AoII) is particularly relevant in systems where real time responses to anomalies are required, such as natural disaster alerts, cybersecurity warnings, or medical emergency notifications. Keeping system control with wrong information for too long can lead to inappropriate responses. In this paper, we study the Peak AoII (PAoII) for multi-source status reporting by ind…
▽ More
Age of Incorrect Information (AoII) is particularly relevant in systems where real time responses to anomalies are required, such as natural disaster alerts, cybersecurity warnings, or medical emergency notifications. Keeping system control with wrong information for too long can lead to inappropriate responses. In this paper, we study the Peak AoII (PAoII) for multi-source status reporting by independent devices over a collision channel, following a zero-threshold ALOHA access where nodes observing an anomaly immediately start transmitting about it. If a collision occurs, nodes reduce the transmission probability to allow for a resolution. Finally, wrong or lost feedback messages may lead a node that successfully updated the destination to believe a collision happened. The PAoII for this scenario is computed in closed-form. We are eventually able to derive interesting results concerning the minimization of PAoII, which can be traded against the overall goodput and energy efficiency, but may push the system to the edge of congestion collapse.
△ Less
Submitted 13 November, 2024;
originally announced November 2024.
-
Age-of-Gradient Updates for Federated Learning over Random Access Channels
Authors:
Yu Heng Wu,
Houman Asgari,
Stefano Rini,
Andrea Munari
Abstract:
This paper studies the problem of federated training of a deep neural network (DNN) over a random access channel (RACH) such as in computer networks, wireless networks, and cellular systems. More precisely, a set of remote users participate in training a centralized DNN model using SGD under the coordination of a parameter server (PS). The local model updates are transmitted from the remote users…
▽ More
This paper studies the problem of federated training of a deep neural network (DNN) over a random access channel (RACH) such as in computer networks, wireless networks, and cellular systems. More precisely, a set of remote users participate in training a centralized DNN model using SGD under the coordination of a parameter server (PS). The local model updates are transmitted from the remote users to the PS over a RACH using a slotted ALOHA protocol. The PS collects the updates from the remote users, accumulates them, and sends central model updates to the users at regular time intervals. We refer to this setting as the RACH-FL setting. The RACH-FL setting crucially addresses the problem of jointly designing a (i) client selection and (ii) gradient compression strategy which addresses the communication constraints between the remote users and the PS when transmission occurs over a RACH. For the RACH-FL setting, we propose a policy, which we term the ''age-of-gradient'' (AoG) policy in which (i) gradient sparsification is performed using top-K sparsification, (ii) the error correction is performed using memory accumulation, and (iii) the slot transmission probability is obtained by comparing the current local memory magnitude minus the magnitude of the gradient update to a threshold. Intuitively, the AoG measure of ''freshness'' of the memory state is reminiscent of the concept of age-of-information (AoI) in the context of communication theory and provides a rather natural interpretation of this policy. Numerical simulations show the superior performance of the AoG policy as compared to other RACH-FL policies.
△ Less
Submitted 15 October, 2024;
originally announced October 2024.
-
Evolution of the 5G New Radio Two-Step Random Access towards 6G Unsourced MAC
Authors:
Patrick Agostini,
Jean-Francois Chamberland,
Federico Clazzer,
Johannes Dommel,
Gianluigi Liva,
Andrea Munari,
Krishna Narayanan,
Yury Polyanskiy,
Slawomir Stanczak,
Zoran Utkovski
Abstract:
This report summarizes some considerations on possible evolutions of grant-free random access in the next generation of the 3GPP wireless cellular standard. The analysis is carried out by mapping the problem to the recently-introduced unsourced multiple access channel (UMAC) setup. By doing so, the performance of existing solutions can be benchmarked with information-theoretic bounds, assessing th…
▽ More
This report summarizes some considerations on possible evolutions of grant-free random access in the next generation of the 3GPP wireless cellular standard. The analysis is carried out by mapping the problem to the recently-introduced unsourced multiple access channel (UMAC) setup. By doing so, the performance of existing solutions can be benchmarked with information-theoretic bounds, assessing the potential gains that can be achieved over legacy 3GPP schemes. The study focuses on the two-step random access (2SRA) protocol introduced by Release 16 of the 5G New Radio standard, investigating its applicability to support large MTC / IoT terminal populations in a grant-free fashion. The analysis shows that the existing 2SRA scheme may not succeed in providing energy-efficient support to large user populations. Modifications to the protocol are proposed that enable remarkable gains in both energy and spectral efficiency while retaining a strong resemblance to the legacy protocol.
△ Less
Submitted 6 May, 2024;
originally announced May 2024.
-
Timely Status Updates in Slotted ALOHA Networks With Energy Harvesting
Authors:
Khac-Hoang Ngo,
Giuseppe Durisi,
Andrea Munari,
Francisco Lázaro,
Alexandre Graell i Amat
Abstract:
We investigate the age of information (AoI) in a scenario where energy-harvesting devices send status updates to a gateway following the slotted ALOHA protocol and receive no feedback. We let the devices adjust the transmission probabilities based on their current battery level. Using a Markovian analysis, we derive analytically the average AoI. We further provide an approximate analysis for accur…
▽ More
We investigate the age of information (AoI) in a scenario where energy-harvesting devices send status updates to a gateway following the slotted ALOHA protocol and receive no feedback. We let the devices adjust the transmission probabilities based on their current battery level. Using a Markovian analysis, we derive analytically the average AoI. We further provide an approximate analysis for accurate and easy-to-compute approximations of both the average AoI and the age-violation probability (AVP), i.e., the probability that the AoI exceeds a given threshold. We also analyze the average throughput. Via numerical results, we investigate two baseline strategies: transmit a new update whenever possible to exploit every opportunity to reduce the AoI, and transmit only when sufficient energy is available to increase the chance of successful decoding. The two strategies are beneficial for low and high update-generation rates, respectively. We show that an optimized policy that balances the two strategies outperforms them significantly in terms of both AoI metrics and throughput. Finally, we show the benefit of decoding multiple packets in a slot using successive interference cancellation and adapting the transmission probability based on both the current battery level and the time elapsed since the last transmission.
△ Less
Submitted 28 February, 2025; v1 submitted 29 April, 2024;
originally announced April 2024.
-
Timely and Efficient Information Delivery in Real-Time Industrial IoT Networks
Authors:
Hossam Farag,
Dejan Vukobratovic,
Andrea Munari,
Cedomir Stefanovic
Abstract:
Enabling real-time communication in Industrial Internet of Things (IIoT) networks is crucial to support autonomous, self-organized and re-configurable industrial automation for Industry 4.0 and the forthcoming Industry 5.0. In this paper, we consider a SIC-assisted real-time IIoT network, in which sensor nodes generate reports according to an event-generation probability that is specific for the m…
▽ More
Enabling real-time communication in Industrial Internet of Things (IIoT) networks is crucial to support autonomous, self-organized and re-configurable industrial automation for Industry 4.0 and the forthcoming Industry 5.0. In this paper, we consider a SIC-assisted real-time IIoT network, in which sensor nodes generate reports according to an event-generation probability that is specific for the monitored phenomena. The reports are delivered over a block-fading channel to a common Access Point (AP) in slotted ALOHA fashion, which leverages the imbalances in the received powers among the contending users and applies successive interference cancellation (SIC) to decode user packets from the collisions. We provide an extensive analytical treatment of the setup, deriving the Age of Information (AoI), throughput and deadline violation probability, when the AP has access to both the perfect as well as the imperfect channel-state information. We show that adopting SIC improves all the performance parameters with respect to the standard slotted ALOHA, as well as to an age-dependent access method. The analytical results agree with the simulation based ones, demonstrating that investing in the SIC capability at the receiver enables this simple access method to support timely and efficient information delivery in IIoT networks.
△ Less
Submitted 22 November, 2023;
originally announced November 2023.
-
Age of Information in Slotted ALOHA With Energy Harvesting
Authors:
Khac-Hoang Ngo,
Giuseppe Durisi,
Alexandre Graell i Amat,
Andrea Munari,
Francisco Lázaro
Abstract:
We examine the age of information (AoI) of a status update system that incorporates energy harvesting and uses the slotted ALOHA protocol. We derive analytically the average AoI and the probability that the AoI exceeds a given threshold. Via numerical results, we investigate two strategies to minimize the age of information (AoI): transmitting a new update whenever possible to exploit every chance…
▽ More
We examine the age of information (AoI) of a status update system that incorporates energy harvesting and uses the slotted ALOHA protocol. We derive analytically the average AoI and the probability that the AoI exceeds a given threshold. Via numerical results, we investigate two strategies to minimize the age of information (AoI): transmitting a new update whenever possible to exploit every chance to reduce the AoI, and transmitting only when sufficient energy is available to increase the chance of successful delivery. The two strategies are beneficial for low and high update generation rates, respectively. However, an optimized approach that balances the two strategies outperforms them significantly in terms of both AoI and throughput.
△ Less
Submitted 30 September, 2023;
originally announced October 2023.
-
Age of Incorrect Information in Random Access Channels without Feedback
Authors:
Andrea Munari
Abstract:
We focus on a system in which a set of two-state Markov sources report status update to a common receiver over a shared wireless channel. Inspired by practical IoT networks, we consider three variations of ALOHA as medium access protocol: i) a random approach in which a source transmits regardless of its status, ii) a reactive scheme in which updates are sent only when a source changes state, and…
▽ More
We focus on a system in which a set of two-state Markov sources report status update to a common receiver over a shared wireless channel. Inspired by practical IoT networks, we consider three variations of ALOHA as medium access protocol: i) a random approach in which a source transmits regardless of its status, ii) a reactive scheme in which updates are sent only when a source changes state, and iii) a hybrid solution which blends the two possibilities. We consider different criteria to capture the ability of the receiver to maintain an accurate perception of the tracked processes: average age of incorrect information (AoII), probability of missed detection (i.e., of not detecting a source transition), and average duration of intervals over which the receiver lingers with erroneous knowledge. We provide closed form analytical expressions for all the metrics, highlighting non-trivial trade-offs and providing useful protocol design hints.
△ Less
Submitted 11 August, 2023;
originally announced August 2023.
-
Remote Monitoring of Two-State Markov Sources via Random Access Channels: an Information Freshness vs. State Estimation Entropy Perspective
Authors:
Giuseppe Cocco,
Andrea Munari,
Gianluigi Liva
Abstract:
We study a system in which two-state Markov sources send status updates to a common receiver over a slotted ALOHA random access channel. We characterize the performance of the system in terms of state estimation entropy (SEE), which measures the uncertainty at the receiver about the sources' state. Two channel access strategies are considered: a reactive policy that depends on the source behaviour…
▽ More
We study a system in which two-state Markov sources send status updates to a common receiver over a slotted ALOHA random access channel. We characterize the performance of the system in terms of state estimation entropy (SEE), which measures the uncertainty at the receiver about the sources' state. Two channel access strategies are considered: a reactive policy that depends on the source behaviour and a random one that is independent of it. We prove that the considered policies can be studied using two different hidden Markov models and show through a density evolution analysis that the reactive strategy outperforms the random one in terms of SEE while the opposite is true for age of information. Furthermore, we characterize the probability of error in the state estimation at the receiver, considering a maximum a posteriori and a low-complexity (decode & hold) estimator. Our study provides useful insights on the design trade-offs that emerge when different performance metrics are adopted. Moreover, we show how the source statistics significantly impact the system performance.
△ Less
Submitted 15 December, 2023; v1 submitted 8 March, 2023;
originally announced March 2023.
-
Two-Tier Multi-Rate Slotted ALOHA for OWC/RF-Based IoT Networks
Authors:
Milica Petkovic,
Dejan Vukobratovic,
Andrea Munari,
Federico Clazzer
Abstract:
We consider a massive Internet of Things (IoT) scenario where indoor IoT devices access the network via optical wireless communication (OWC) IoT systems that relay data via a backhaul radio frequency (RF) low-power wide-area network (LP WAN). We propose a novel two-tier multi-rate Slotted ALOHA (SA) system model to design and analyse such hybrid OWC/RF networks. For a particular hybrid OWC/RF setu…
▽ More
We consider a massive Internet of Things (IoT) scenario where indoor IoT devices access the network via optical wireless communication (OWC) IoT systems that relay data via a backhaul radio frequency (RF) low-power wide-area network (LP WAN). We propose a novel two-tier multi-rate Slotted ALOHA (SA) system model to design and analyse such hybrid OWC/RF networks. For a particular hybrid OWC/RF setup, we present an in-depth numerical investigation that provides insights into the proposed two-tier multi-rate hybrid OWC/RF SA system design.
△ Less
Submitted 20 February, 2023;
originally announced February 2023.
-
The Dynamic Behavior of Frameless ALOHA: Drift Analysis, Throughput, and Age of Information
Authors:
Andrea Munari,
Francisco Lazaro,
Giuseppe Durisi,
Gianluigi Liva
Abstract:
We study the dynamic behavior of frameless ALOHA, both in terms of throughput and age of information (AoI). In particular, differently from previous studies, our analysis accounts for the fact that the number of terminals contending the channel may vary over time, as a function of the duration of the previous contention period. The stability of the protocol is analyzed via a drift analysis, which…
▽ More
We study the dynamic behavior of frameless ALOHA, both in terms of throughput and age of information (AoI). In particular, differently from previous studies, our analysis accounts for the fact that the number of terminals contending the channel may vary over time, as a function of the duration of the previous contention period. The stability of the protocol is analyzed via a drift analysis, which allows us to determine the presence of stable and unstable equilibrium points. We also provide an exact characterization of the AoI performance, through which we determine the impact of some key protocol parameters, such as the maximum length of the contention period, on the average AoI. Specifically, we show that configurations of parameters that maximize the throughput may result in a degradation of the AoI performance.
△ Less
Submitted 28 August, 2023; v1 submitted 24 January, 2023;
originally announced January 2023.
-
On the Performance of Irregular Repetition Slotted ALOHA with an Age of Information Threshold
Authors:
Hooman Asgari,
Andrea Munari,
Gianluigi Liva
Abstract:
The present paper focuses on an IoT setting in which a large number of devices generate time-stamped updates addressed to a common gateway. Medium access is regulated following a grant-free approach, and the system aims at maintaining an up-to-date knowledge at the receiver, measured through the average network age of information (AoI). In this context, we propose a variation of the irregular repe…
▽ More
The present paper focuses on an IoT setting in which a large number of devices generate time-stamped updates addressed to a common gateway. Medium access is regulated following a grant-free approach, and the system aims at maintaining an up-to-date knowledge at the receiver, measured through the average network age of information (AoI). In this context, we propose a variation of the irregular repetition slotted ALOHA (IRSA) protocol. The scheme, referred to as age-threshold IRSA (AT-IRSA), leverages feedback provided by the receiver to admit to the channel only devices whose AoI exceeds a dynamically adapted target value. By means of detailed networks simulations, as well as of a simple yet tight analytical approximation, we demonstrate that the approach can more than halve the average network AoI compared to plain IRSA, and offers notable improvements over feedback-based state-of-the-art slotted ALOHA solutions recently proposed in the literature.
△ Less
Submitted 27 October, 2022;
originally announced October 2022.
-
Relay-aided Slotted Aloha for Optical Wireless Communications
Authors:
Milica Petkovic,
Dejan Vukobratović,
Andrea Munari,
Federico Clazzer
Abstract:
We consider a relay-aided Slotted ALOHA solution for uplink random access for an Optical Wireless Communications (OWC)-based Internet of Things (IoT). The first phase of uplink, the one between IoT devices and the relays, is realized using indoor OWC, while the second phase, between the relays and a base station, represents the long-range RF transmission based on low-power wide area network such a…
▽ More
We consider a relay-aided Slotted ALOHA solution for uplink random access for an Optical Wireless Communications (OWC)-based Internet of Things (IoT). The first phase of uplink, the one between IoT devices and the relays, is realized using indoor OWC, while the second phase, between the relays and a base station, represents the long-range RF transmission based on low-power wide area network such as LoRaWAN and occurs outdoors. The throughput performance dependence on the OWC and RF channel conditions is observed. The behavior of the performance gain due to adding relays is highlighted and investigated under different channel and traffic conditions.
△ Less
Submitted 22 September, 2022;
originally announced September 2022.
-
The Role of Feedback in AoI Optimization Under Limited Transmission Opportunities
Authors:
Andrea Munari,
Leonardo Badia
Abstract:
Scheduling updates from remote sensors is a key task for the internet of things (IoT). In this context, the mathematical concept of age of information is often used to capture the freshness of received data. This is, in turn, relevant to optimize the frequency of the exchanges, especially for resource constrained (e.g., energy-limited) sensors. Most investigations on the subject assume that the tr…
▽ More
Scheduling updates from remote sensors is a key task for the internet of things (IoT). In this context, the mathematical concept of age of information is often used to capture the freshness of received data. This is, in turn, relevant to optimize the frequency of the exchanges, especially for resource constrained (e.g., energy-limited) sensors. Most investigations on the subject assume that the transmitter can leverage knowledge of the age of information at the receiver side to decide when to send data, even when the communication channel is unreliable. In reality, tracking the outcome of the updates would require additional consumption of resources to acquire a feedback. We investigate the optimal schedule of updates over a finite time horizon for a resource-constrained sensor that is allowed to perform a limited number of updates, as typical of IoT devices. We discuss the role of the feedback from the receiver, and whether it is convenient to ask for it whenever this causes additional energy consumption and consequently allows the transmission of a lower number of updates. We analytically identify regions for the feedback cost and the reliability of the channel where making use of feedback may or may not be beneficial.
△ Less
Submitted 30 August, 2022;
originally announced August 2022.
-
On the Value of Retransmissions for Age of Information in Random Access Networks without Feedback
Authors:
Andrea Munari
Abstract:
We focus on a slotted ALOHA system without feedback, in which nodes transmit time-stamped updates to a common gateway. Departing from the classical generate-at-will model, we assume that each transmitter may not always have fresh information to deliver, and tackle the fundamental question of whether sending stale packets can be beneficial from an age-of-information (AoI) standpoint. Leaning on a s…
▽ More
We focus on a slotted ALOHA system without feedback, in which nodes transmit time-stamped updates to a common gateway. Departing from the classical generate-at-will model, we assume that each transmitter may not always have fresh information to deliver, and tackle the fundamental question of whether sending stale packets can be beneficial from an age-of-information (AoI) standpoint. Leaning on a signal-flow-graph analysis of Markov processes the study reveals that, when packets can be lost due to channel impairments, retransmissions can indeed lower AoI for low generation rates of new information, although at a cost in terms of throughput.
△ Less
Submitted 30 May, 2022;
originally announced May 2022.
-
An Age of Information Characterization of Frameless ALOHA
Authors:
Andrea Munari,
Francisco Lázaro,
Giuseppe Durisi,
Gianluigi Liva
Abstract:
We provide a characterization of the peak age of information (AoI) achievable in a random-access system operating according to the frameless ALOHA protocol. Differently from previous studies, our analysis accounts for the fact that the number of terminals contending the channel may vary over time, as a function of the duration of the previous contention period. The exact characterization of the Ao…
▽ More
We provide a characterization of the peak age of information (AoI) achievable in a random-access system operating according to the frameless ALOHA protocol. Differently from previous studies, our analysis accounts for the fact that the number of terminals contending the channel may vary over time, as a function of the duration of the previous contention period. The exact characterization of the AoI provided in this paper, which is based on a Markovian analysis, reveals the impact of some key protocol parameters such as the maximum length of the contention period, on the average peak AoI. Specifically, we show that setting this parameter so as to maximize the throughput may result in an AoI degradation.
△ Less
Submitted 1 December, 2021;
originally announced December 2021.
-
Information Freshness Analysis of Slotted ALOHA in Gilbert-Elliot Channels
Authors:
Andrea Munari,
Gianluigi Liva
Abstract:
This letter analyzes a class of information freshness metrics for large IoT systems in which terminals employ slotted ALOHA to access a common channel. Considering a Gilbert- Elliot channel model, information freshness is evaluated through a penalty function that follows a power law of the time elapsed since the last received update, in contrast with the linear growth of age of information. By mea…
▽ More
This letter analyzes a class of information freshness metrics for large IoT systems in which terminals employ slotted ALOHA to access a common channel. Considering a Gilbert- Elliot channel model, information freshness is evaluated through a penalty function that follows a power law of the time elapsed since the last received update, in contrast with the linear growth of age of information. By means of a signal flow graph analysis of Markov processes, we provide exact closed form expressions for the average penalty and for the peak penalty violation probability.
△ Less
Submitted 22 June, 2021; v1 submitted 24 March, 2021;
originally announced March 2021.
-
Semantic Communications in Networked Systems: A Data Significance Perspective
Authors:
Elif Uysal,
Onur Kaya,
Anthony Ephremides,
James Gross,
Marian Codreanu,
Petar Popovski,
Mohamad Assaad,
Gianluigi Liva,
Andrea Munari,
Touraj Soleymani,
Beatriz Soret,
Karl Henrik Johansson
Abstract:
We present our vision for a departure from the established way of architecting and assessing communication networks, by incorporating the semantics of information for communications and control in networked systems. We define semantics of information, not as the meaning of the messages, but as their significance, possibly within a real time constraint, relative to the purpose of the data exchange.…
▽ More
We present our vision for a departure from the established way of architecting and assessing communication networks, by incorporating the semantics of information for communications and control in networked systems. We define semantics of information, not as the meaning of the messages, but as their significance, possibly within a real time constraint, relative to the purpose of the data exchange. We argue that research efforts must focus on laying the theoretical foundations of a redesign of the entire process of information generation, transmission and usage in unison by developing: advanced semantic metrics for communications and control systems; an optimal sampling theory combining signal sparsity and semantics, for real-time prediction, reconstruction and control under communication constraints and delays; semantic compressed sensing techniques for decision making and inference directly in the compressed domain; semantic-aware data generation, channel coding, feedback, multiple and random access schemes that reduce the volume of data and the energy consumption, increasing the number of supportable devices.
△ Less
Submitted 12 March, 2022; v1 submitted 9 March, 2021;
originally announced March 2021.
-
Caching at the Edge: Outage Probability
Authors:
Estefanía Recayte,
Andrea Munari
Abstract:
Caching at the edge of wireless networks is a keytechnology to reduce traffic in the backhaul link. However, aconcentrated amount of requests during peak-periods may causethe outage of the system, meaning that the network is not ableto serve the whole set of demands. The outage probability is afundamental metric to take into account during the networkdesign. In this paper, we derive the analytical…
▽ More
Caching at the edge of wireless networks is a keytechnology to reduce traffic in the backhaul link. However, aconcentrated amount of requests during peak-periods may causethe outage of the system, meaning that the network is not ableto serve the whole set of demands. The outage probability is afundamental metric to take into account during the networkdesign. In this paper, we derive the analytical expression ofthe outage probability as a function of the total amount ofusers requests, library size, requests distribution, cache size andcapacity constraints on the backhaul resources. In particular, wefocus on a scenario where end-users have no direct connectionto the master node which holds the complete library of contentthat can be requested. A general formulation of the outage isderived and studied for two relevant caching schemes, i.e. therandom caching scheme and the most popular caching schemes.The exact closed form expressions presented in this paper provideuseful insights on how requests, memory and resources can bebalanced when the parameters of a cache-enabled network haveto designed
△ Less
Submitted 4 January, 2021;
originally announced January 2021.
-
Grant-Free Access: Machine Learning for Detection of Short Packets
Authors:
Estefania Recayte,
Andrea Munari,
Federico Clazzer
Abstract:
In this paper, we explore the use of machine learning methods as an efficient alternative to correlation in performing packet detection. Targeting satellite-based massive machine type communications and internet of things scenarios, our focus is on a common channel shared among a large number of terminals via a fully asynchronous ALOHA protocol to attempt delivery of short data packets. In this se…
▽ More
In this paper, we explore the use of machine learning methods as an efficient alternative to correlation in performing packet detection. Targeting satellite-based massive machine type communications and internet of things scenarios, our focus is on a common channel shared among a large number of terminals via a fully asynchronous ALOHA protocol to attempt delivery of short data packets. In this setup, we test the performance of two algorithms, neural networks and random forest, which are shown to provide substantial improvements over {traditional} techniques. Excellent performance is demonstrated in terms of detection and false alarm probability also in the presence of collisions among user transmissions. The ability of machine learning to extract further information from incoming signals is also studied, discussing the possibility to classify detected preambles based on the level of interference they undergo.
△ Less
Submitted 25 August, 2020;
originally announced August 2020.
-
Modern Random Access: an Age of Information Perspective on Irregular Repetition Slotted ALOHA
Authors:
Andrea Munari
Abstract:
Age of information (AoI) is gaining attention as a valuable performance metric for many IoT systems, in which a large number of devices report time-stamped updates to a central gateway. This is the case, for instance, of remote sensing, monitoring, or tracking, with broad applications in the industrial, vehicular, and environmental domain. In these settings, AoI provides insights that are compleme…
▽ More
Age of information (AoI) is gaining attention as a valuable performance metric for many IoT systems, in which a large number of devices report time-stamped updates to a central gateway. This is the case, for instance, of remote sensing, monitoring, or tracking, with broad applications in the industrial, vehicular, and environmental domain. In these settings, AoI provides insights that are complementary to those offered by throughput or latency, capturing the ability of the system to maintain an up-to-date view of the status of each transmitting device. From this standpoint, while a good understanding of the metric has been reached for point-to-point links, relatively little attention has been devoted to the impact that link layer solutions employed in IoT systems may have on AoI. In particular, no result is available for modern random access protocols, which have recently emerged as promising solutions to support massive machine-type communications. To start addressing this gap we provide in this paper the first study of the AoI of a scheme in this family, namely irregular repetition slotted ALOHA (IRSA). By means of a Markovian analysis, we track the AoI evolution at the gateway, prove that the process is ergodic, and derive a compact closed form expression for its stationary distribution. Leaning on this, we compute exact formulations for the average AoI and the age violation probability. The study reveals non-trivial design trade-offs for IRSA and highlights the key role played by the protocol operating frame size. Moreover, a comparison with the performance of a simpler slotted ALOHA strategy highlights a remarkable potential for modern random access schemes in terms of information freshness.
△ Less
Submitted 15 February, 2021; v1 submitted 20 July, 2020;
originally announced July 2020.
-
White Paper on Critical and Massive Machine Type Communication Towards 6G
Authors:
Nurul Huda Mahmood,
Stefan Böcker,
Andrea Munari,
Federico Clazzer,
Ingrid Moerman,
Konstantin Mikhaylov,
Onel Lopez,
Ok-Sun Park,
Eric Mercier,
Hannes Bartz,
Riku Jäntti,
Ravikumar Pragada,
Yihua Ma,
Elina Annanperä,
Christian Wietfeld,
Martin Andraud,
Gianluigi Liva,
Yan Chen,
Eduardo Garro,
Frank Burkhardt,
Hirley Alves,
Chen-Feng Liu,
Yalcin Sadi,
Jean-Baptiste Dore,
Eunah Kim
, et al. (6 additional authors not shown)
Abstract:
The society as a whole, and many vertical sectors in particular, is becoming increasingly digitalized. Machine Type Communication (MTC), encompassing its massive and critical aspects, and ubiquitous wireless connectivity are among the main enablers of such digitization at large. The recently introduced 5G New Radio is natively designed to support both aspects of MTC to promote the digital transfor…
▽ More
The society as a whole, and many vertical sectors in particular, is becoming increasingly digitalized. Machine Type Communication (MTC), encompassing its massive and critical aspects, and ubiquitous wireless connectivity are among the main enablers of such digitization at large. The recently introduced 5G New Radio is natively designed to support both aspects of MTC to promote the digital transformation of the society. However, it is evident that some of the more demanding requirements cannot be fully supported by 5G networks. Alongside, further development of the society towards 2030 will give rise to new and more stringent requirements on wireless connectivity in general, and MTC in particular. Driven by the societal trends towards 2030, the next generation (6G) will be an agile and efficient convergent network serving a set of diverse service classes and a wide range of key performance indicators (KPI). This white paper explores the main drivers and requirements of an MTC-optimized 6G network, and discusses the following six key research questions:
- Will the main KPIs of 5G continue to be the dominant KPIs in 6G; or will there emerge new key metrics?
- How to deliver different E2E service mandates with different KPI requirements considering joint-optimization at the physical up to the application layer?
- What are the key enablers towards designing ultra-low power receivers and highly efficient sleep modes?
- How to tackle a disruptive rather than incremental joint design of a massively scalable waveform and medium access policy for global MTC connectivity?
- How to support new service classes characterizing mission-critical and dependable MTC in 6G?
- What are the potential enablers of long term, lightweight and flexible privacy and security schemes considering MTC device requirements?
△ Less
Submitted 4 May, 2020; v1 submitted 29 April, 2020;
originally announced April 2020.
-
Average Age of Information of Irregular Repetition Slotted ALOHA
Authors:
Andrea Munari,
Alexey Frolov
Abstract:
Flanking traditional metrics such as throughput and reliability, age of information (AoI) is emerging as a fundamental tool to capture the performance of IoT systems. In this context, we focus on a setup in which a large number of nodes attempt delivery of time-stamped updates to a common destination over a shared channel, and investigate the ability of different grant-free access strategies to ma…
▽ More
Flanking traditional metrics such as throughput and reliability, age of information (AoI) is emerging as a fundamental tool to capture the performance of IoT systems. In this context, we focus on a setup in which a large number of nodes attempt delivery of time-stamped updates to a common destination over a shared channel, and investigate the ability of different grant-free access strategies to maintain fresh information at the receiver. Specifically, we derive for the first time an exact closed-form expression of the average AoI achieved by irregular repetition slotted ALOHA (IRSA), and compare its performance to that of a slotted ALOHA approach. Our analysis reveals the potential of modern random access schemes, and pinpoints some fundamental trade-offs, providing useful hints for proper system design.
△ Less
Submitted 18 May, 2020; v1 submitted 4 April, 2020;
originally announced April 2020.
-
Grant-Free Coexistence of Critical and Non-Critical IoT Services in Two-Hop Satellite and Terrestrial Networks
Authors:
Rahif Kassab,
Andrea Munari,
Federico Clazzer,
Osvaldo Simeone
Abstract:
Terrestrial and satellite communication networks often rely on two-hop wireless architectures with an access channel followed by backhaul links. Examples include Cloud-Radio Access Networks (C-RAN) and Low-Earth Orbit (LEO) satellite systems. Furthermore, communication services characterized by the coexistence of heterogeneous requirements are emerging as key use cases. This paper studies the perf…
▽ More
Terrestrial and satellite communication networks often rely on two-hop wireless architectures with an access channel followed by backhaul links. Examples include Cloud-Radio Access Networks (C-RAN) and Low-Earth Orbit (LEO) satellite systems. Furthermore, communication services characterized by the coexistence of heterogeneous requirements are emerging as key use cases. This paper studies the performance of critical service (CS) and non-critical service (NCS) for Internet of Things (IoT) systems sharing a grant-free channel consisting of radio access and backhaul segments. On the radio access segment, IoT devices send packets to a set of non-cooperative access points (APs) using slotted ALOHA (SA). The APs then forward correctly received messages to a base station over a shared wireless backhaul segment adopting SA. We study first a simplified erasure channel model, which is well suited for satellite applications. Then, in order to account for terrestrial scenarios, the impact of fading is considered. Among the main conclusions, we show that orthogonal inter-service resource allocation is generally preferred for NCS devices, while non-orthogonal protocols can improve the throughput and packet success rate of CS devices for both terrestrial and satellite scenarios.
△ Less
Submitted 25 September, 2021; v1 submitted 19 March, 2020;
originally announced March 2020.
-
Space Diversity-Based Grant-Free Random Access for Critical and Non-Critical IoT Services
Authors:
Rahif Kassab,
Osvaldo Simeone,
Andrea Munari,
Federico Clazzer
Abstract:
In this paper, we study the coexistence of critical and non-critical Internet of Things (IoT) services on a grant-free channel consisting of radio access and backhaul segments. On the radio access segment, IoT devices send packets to access points (APs) over an erasure collision channel using the slotted ALOHA protocol. Then, the APs forward correctly received messages to a base station (BS) over…
▽ More
In this paper, we study the coexistence of critical and non-critical Internet of Things (IoT) services on a grant-free channel consisting of radio access and backhaul segments. On the radio access segment, IoT devices send packets to access points (APs) over an erasure collision channel using the slotted ALOHA protocol. Then, the APs forward correctly received messages to a base station (BS) over a shared wireless backhaul segment, modeled as an erasure collision channel. The APs hence play the role of uncoordinated relays that provide space diversity and may reduce performance losses caused by collisions. Both non-orthogonal and inter-service orthogonal resource sharing are considered and compared. Throughput and reliability metrics are analyzed, and numerical results are provided to assess the performance trade-offs between critical and non-critical IoT services.
△ Less
Submitted 24 September, 2019; v1 submitted 23 September, 2019;
originally announced September 2019.
-
Modern Random Access for Beyond-5G Systems: a Multiple-Relay ALOHA Perspective
Authors:
Andrea Munari,
Federico Clazzer
Abstract:
Modern random access protocols are emerging as an efficient yet simple solution for arising internet of things (IoT) applications in upcoming beyond-5G systems. In this context, both terrestrial and non-terrestrial scenarios can benefit from the presence of multiple low-complexity receivers that act as relays, collecting packets from users and forwarding them towards a central unit. To gain insigh…
▽ More
Modern random access protocols are emerging as an efficient yet simple solution for arising internet of things (IoT) applications in upcoming beyond-5G systems. In this context, both terrestrial and non-terrestrial scenarios can benefit from the presence of multiple low-complexity receivers that act as relays, collecting packets from users and forwarding them towards a central unit. To gain insights on the potential of these setups, we investigate a two-tier slotted ALOHA (SA) multiple-relay system under an erasure channel model. We derive exact end-to-end throughput expressions for an arbitrary number of receivers, and complement our study by discussing the impact of channel impairments. The non-trivial outcome that adding relays is not always beneficial is highlighted and thoughtfully discussed.
△ Less
Submitted 5 June, 2019;
originally announced June 2019.
-
Multiple-Relay Slotted ALOHA: Performance Analysis and Bounds
Authors:
Andrea Munari,
Federico Clazzer,
Gianluigi Liva,
Michael Heindlmaier
Abstract:
Wireless random access protocols are attracting a revived research interest as a simple yet effective solution for machine-type communications. In the quest to improve reliability and spectral efficiency of such schemes, the use of multiple receivers has recently emerged as a promising option. We study the potential of this approach considering a population of users that transmit data packets foll…
▽ More
Wireless random access protocols are attracting a revived research interest as a simple yet effective solution for machine-type communications. In the quest to improve reliability and spectral efficiency of such schemes, the use of multiple receivers has recently emerged as a promising option. We study the potential of this approach considering a population of users that transmit data packets following a simple slotted ALOHA policy to a set of non-cooperative receivers or relays (uplink phase). These, in turn, independently forward - part of - what decoded towards a collecting sink (downlink phase). For an on-off fading channel model, we provide exact expressions for uplink throughput and packet loss rate for an arbitrary number of relays, characterising the benefits of multi-receiver schemes. Moreover, a lower bound on the minimum amount of downlink resources needed to deliver all information collected on the uplink is provided. The bound is proven to be achievable via random linear coding when no constraints in terms of latency are set. We complement our study discussing a family of simple forwarding policies that require no packet-level coding, and optimising their performance based on the amount of available downlink resources. The behaviour of both random linear coding and simplified policies is also characterised when receivers are equipped with finite buffers, revealing non-trivial tradeoffs.
△ Less
Submitted 8 March, 2019;
originally announced March 2019.
-
From 5G to 6G: Has the Time for Modern Random Access Come?
Authors:
Federico Clazzer,
Andrea Munari,
Gianluigi Liva,
Francisco Lazaro,
Cedomir Stefanovic,
Petar Popovski
Abstract:
This short paper proposes the use of modern random access for IoT applications in 6G. A short overview of recent advances in uncoordinated medium access is provided, highlighting the gains that can be achieved by leveraging smart protocol design intertwined with advanced signal processing techniques at the receiver. The authors' vision on the benefits such schemes can yield for beyond-5G systems i…
▽ More
This short paper proposes the use of modern random access for IoT applications in 6G. A short overview of recent advances in uncoordinated medium access is provided, highlighting the gains that can be achieved by leveraging smart protocol design intertwined with advanced signal processing techniques at the receiver. The authors' vision on the benefits such schemes can yield for beyond-5G systems is presented, with the aim to trigger further discussion.
△ Less
Submitted 1 March, 2019;
originally announced March 2019.
-
Performance of Radar and Communication Networks Coexisting in Shared Spectrum Bands
Authors:
Andrea Munari,
Nina Grosheva,
Ljiljana Simić,
Petri Mähönen
Abstract:
Recent technological advancements are making the use of compact, low-cost, low-power mm-wave radars viable for providing environmental awareness in a number of applications, ranging from automotive to indoor mapping and radio resource optimisation. These emerging use-cases pave the road towards networks in which a large number of radar and broadband communications devices coexist, sharing a common…
▽ More
Recent technological advancements are making the use of compact, low-cost, low-power mm-wave radars viable for providing environmental awareness in a number of applications, ranging from automotive to indoor mapping and radio resource optimisation. These emerging use-cases pave the road towards networks in which a large number of radar and broadband communications devices coexist, sharing a common spectrum band in a possibly uncoordinated fashion. Although a clear understanding of how mutual interference influences radar and communications performance is key to proper system design, the core tradeoffs that arise in such scenarios are still largely unexplored. In this paper, we provide results that help bridge this gap, obtained by means of an analytical model and extensive simulations. To capture the fundamental interactions between the two systems, we study mm-wave networks where pulsed radars coexist with communications devices that access the channel following an ALOHA policy. We investigate the effect of key parameters on the performance of the coexisting systems, including the network density, fraction of radar and communication nodes in the network, antenna directivity, and packet length. We quantify the effect of mutual interference in the coexistence scenario on radar detection and communication network throughput, highlighting some non-trivial interplays and deriving useful design tradeoffs.
△ Less
Submitted 4 February, 2019;
originally announced February 2019.
-
Stochastic Geometry Interference Analysis of Radar Network Performance
Authors:
Andrea Munari,
Ljiljana Simić,
Marina Petrova
Abstract:
This work characterises the effect of mutual interference in a planar network of pulsed-radar devices. Using stochastic geometry tools and a strongest interferer approximation, we derive simple closed-form expressions that pinpoint the role played by key system parameters on radar detection range and false alarm rate in the interference-limited region. The fundamental tradeoffs of the system betwe…
▽ More
This work characterises the effect of mutual interference in a planar network of pulsed-radar devices. Using stochastic geometry tools and a strongest interferer approximation, we derive simple closed-form expressions that pinpoint the role played by key system parameters on radar detection range and false alarm rate in the interference-limited region. The fundamental tradeoffs of the system between radar performance, network density and antenna directivity are captured for different path-loss exponents in the no-fading and Rayleigh-fading cases. The discussion highlights practical design hints for tuning the radar parameters. The accuracy of the model is verified through network simulations, and the role of random noise on detection in sparse, non interference-limited networks is characterised.
△ Less
Submitted 6 September, 2018;
originally announced September 2018.
-
Performance Tradeoffs of Joint Radar-Communication Networks
Authors:
Ping Ren,
Andrea Munari,
Marina Petrova
Abstract:
This letter considers a network where nodes share a wireless channel to work in turn as pulse radars for target detection and as transmitters for data exchange. Radar detection range and network throughput are studied using stochastic geometry tools. We derive closed-form expressions that identify the key tradeoffs between radar and communication operations. Results reveal interesting design hints…
▽ More
This letter considers a network where nodes share a wireless channel to work in turn as pulse radars for target detection and as transmitters for data exchange. Radar detection range and network throughput are studied using stochastic geometry tools. We derive closed-form expressions that identify the key tradeoffs between radar and communication operations. Results reveal interesting design hints and stress a marked sensitivity of radar detection to communication interference.
△ Less
Submitted 30 May, 2018;
originally announced May 2018.
-
On the Existence and Structure of Mixed Nash Equilibria for In-Band Full-Duplex Wireless Networks
Authors:
Andrea Munari,
Vaggelis G. Douros,
Petri Mahonen
Abstract:
This article offers the first characterisation of mixed Nash equilibria (MNE) for a wireless system with full-duplex capable terminals that share a common channel via Aloha-based contention. Focussing on a simple grid topology, we prove that mixed MNE exist only if proportionality, driven by the accuracy of self-interference cancellation, is granted between the cost undergone for full- and half-du…
▽ More
This article offers the first characterisation of mixed Nash equilibria (MNE) for a wireless system with full-duplex capable terminals that share a common channel via Aloha-based contention. Focussing on a simple grid topology, we prove that mixed MNE exist only if proportionality, driven by the accuracy of self-interference cancellation, is granted between the cost undergone for full- and half-duplex operations. The analysis shows how a proper selection of such costs allows MNE that are also optimal from a network viewpoint in terms of aggregate throughput. The sensitivity of system performance to costs is tackled and discussed considering the price of anarchy.
△ Less
Submitted 30 December, 2017; v1 submitted 22 September, 2017;
originally announced September 2017.
-
A comprehensive search for stellar bowshock nebulae in the Milky Way: a catalog of 709 mid-infrared selected candidates
Authors:
Henry A. Kobulnicky,
William T. Chick,
Danielle P. Schurhammer,
Julian E. Andrews,
Matthew S. Povich,
Stephan A. Munari,
Grace M. Olivier,
Rebecca L. Sorber,
Heather N. Wernke,
Daniel A. Dale,
Don M. Dixon
Abstract:
We identify 709 arc-shaped mid-infrared nebula in 24 micron Spitzer Space Telescope or 22 micron Wide Field Infrared Explorer surveys of the Galactic Plane as probable dusty interstellar bowshocks powered by early-type stars. About 20% are visible at 8 microns or shorter mid-infrared wavelengths as well. The vast majority (660) have no previous identification in the literature. These extended infr…
▽ More
We identify 709 arc-shaped mid-infrared nebula in 24 micron Spitzer Space Telescope or 22 micron Wide Field Infrared Explorer surveys of the Galactic Plane as probable dusty interstellar bowshocks powered by early-type stars. About 20% are visible at 8 microns or shorter mid-infrared wavelengths as well. The vast majority (660) have no previous identification in the literature. These extended infrared sources are strongly concentrated near Galactic mid-Plane with an angular scale height of ~0.6 degrees. All host a symmetrically placed star implicated as the source of a stellar wind sweeping up interstellar material. These are candidate "runaway" stars potentially having high velocities in the reference frame of the local medium. Among the 286 objects with measured proper motions, we find an unambiguous excess having velocity vectors aligned with the infrared morphology --- kinematic evidence that many of these are "runaway" stars with large peculiar motions responsible for the bowshock signature. We discuss a population of "in-situ" bowshocks (103 objects) that face giant HII regions where the relative motions between the star and ISM may be caused by bulk outflows from an overpressured bubble. We also identify 58 objects that face 8 micron bright-rimmed clouds and apparently constitute a sub-class of in-situ bowshocks where the stellar wind interacts with a photo-evaporative flow from an eroding molecular cloud interface (i.e., "PEF bowshocks"). Orientations of the arcuate nebulae exhibit a correlation over small angular scales, indicating that external influences such as HII regions are responsible for producing some bowshock nebulae. However, the vast majority of this sample appear to be isolated (499 objects) from obvious external influences.
△ Less
Submitted 7 September, 2016;
originally announced September 2016.
-
On the Stability of a Full-Duplex Aloha Network
Authors:
Andrea Munari,
Francesco Rossetto,
Petri Mähönen,
Marina Petrova
Abstract:
This letter offers the first characterisation of the stability for full-duplex large size networks. Through stochastic geometry tools, key performance metrics like delay and maximum stable arrival rate are derived for the non saturated system and compared to a half-duplex counterpart, also accounting for imperfect self-interference cancellation. This analysis better identifies that the full-duplex…
▽ More
This letter offers the first characterisation of the stability for full-duplex large size networks. Through stochastic geometry tools, key performance metrics like delay and maximum stable arrival rate are derived for the non saturated system and compared to a half-duplex counterpart, also accounting for imperfect self-interference cancellation. This analysis better identifies that the full-duplex advantage is prominent for sparse networks, whereas in dense topologies residual self-interference may hinder achievable gains.
△ Less
Submitted 16 September, 2016; v1 submitted 15 July, 2016;
originally announced July 2016.
-
A Stochastic Geometry Approach to Asynchronous Aloha Full-Duplex Networks
Authors:
Andrea Munari,
Petri Mähönen,
Marina Petrova
Abstract:
In-band full-duplex is emerging as a promising solution to enhance throughput in wireless networks. Allowing nodes to simultaneously send and receive data over the same bandwidth can potentially double the system capacity, and a good degree of maturity has been reached for physical layer design, with practical demonstrations in simple topologies. However, the true potential of full-duplex at a sys…
▽ More
In-band full-duplex is emerging as a promising solution to enhance throughput in wireless networks. Allowing nodes to simultaneously send and receive data over the same bandwidth can potentially double the system capacity, and a good degree of maturity has been reached for physical layer design, with practical demonstrations in simple topologies. However, the true potential of full-duplex at a system level is yet to be fully understood. In this paper, we introduce an analytical framework based on stochastic geometry that captures the behaviour of large full-duplex networks implementing an asynchronous random access policy based on Aloha. Via exact expressions we discuss the key tradeoffs that characterise these systems, exploring among the rest the role of transmission duration, imperfect self-interference cancellation and fraction of full-duplex nodes in the network. We also provide protocol design principles, and our comparison with slotted systems sheds light on the performance loss induced by the lack of synchronism.
△ Less
Submitted 22 September, 2017; v1 submitted 4 December, 2015;
originally announced December 2015.
-
The Throughput of Slotted Aloha with Diversity
Authors:
Andrea Munari,
Michael Heindlmaier,
Gianluigi Liva,
Matteo Berioli
Abstract:
In this paper, a simple variation of classical Slotted Aloha is introduced and analyzed. The enhancement relies on adding multiple receivers that gather different observations of the packets transmitted by a user population in one slot. For each observation, the packets transmitted in one slot are assumed to be subject to independent on-off fading, so that each of them is either completely faded,…
▽ More
In this paper, a simple variation of classical Slotted Aloha is introduced and analyzed. The enhancement relies on adding multiple receivers that gather different observations of the packets transmitted by a user population in one slot. For each observation, the packets transmitted in one slot are assumed to be subject to independent on-off fading, so that each of them is either completely faded, and then does not bring any power or interference at the receiver, or it arrives unfaded, and then may or may not, collide with other unfaded transmissions. With this model, a novel type of diversity is introduced to the conventional SA scheme, leading to relevant throughput gains already for moderate number of receivers. The analytical framework that we introduce allows to derive closed-form expression of both throughput and packet loss rate an arbitrary number of receivers, providing interesting hints on the key trade-offs that characterize the system. We then focus on the problem of having receivers forward the full set of collected packets to a final gateway using the minimum possible amount of resources, i.e., avoiding delivery of duplicate packets, without allowing any exchange of information among them. We derive what is the minimum amount of resources needed and propose a scheme based on random linear network coding that achieves asymptotically this bound without the need for the receivers to coordinate among them.
△ Less
Submitted 15 January, 2014;
originally announced January 2014.
-
Airborne Base Stations for Emergency and Temporary Events
Authors:
Alvaro Valcarce,
Tinku Rasheed,
Karina Gomez,
Sithamparanathan Kandeepan,
Laurent Reynaud,
Romain Hermenier,
Andrea Munari,
Mihael Mohorcic,
Miha Smolnikar,
Isabelle Bucaille
Abstract:
This paper introduces a rapidly deployable wireless network based on Low Altitude Platforms and portable land units to support disaster-relief activities, and to extend capacity during temporary mass events. The system integrates an amalgam of radio technologies such as LTE, WLAN and TETRA to provide heterogeneous communications in the deployment location. Cognitive radio is used for autonomous ne…
▽ More
This paper introduces a rapidly deployable wireless network based on Low Altitude Platforms and portable land units to support disaster-relief activities, and to extend capacity during temporary mass events. The system integrates an amalgam of radio technologies such as LTE, WLAN and TETRA to provide heterogeneous communications in the deployment location. Cognitive radio is used for autonomous network configuration. Sensor networks monitor the environment in real-time during relief activities and provide distributed spectrum sensing capacities. Finally, remote communications are supported via S-band satellite links.
△ Less
Submitted 11 July, 2013;
originally announced July 2013.
-
Cooperation in Carrier Sense Based Wireless Ad Hoc Networks - Part II: Proactive Schemes
Authors:
Andrea Munari,
Marco Levorato,
Michele Zorzi
Abstract:
This work is the second of a two-part series of papers on the effectiveness of cooperative techniques in non-centralized carrier sense-based ad hoc wireless networks. While Part I extensively discussed reactive cooperation, characterized by relayed transmissions triggered by failure events at the intended receiver, Part II investigates in depth proactive solutions, in which the source of a packet…
▽ More
This work is the second of a two-part series of papers on the effectiveness of cooperative techniques in non-centralized carrier sense-based ad hoc wireless networks. While Part I extensively discussed reactive cooperation, characterized by relayed transmissions triggered by failure events at the intended receiver, Part II investigates in depth proactive solutions, in which the source of a packet exploits channel state information to preemptively coordinate with relays in order to achieve the optimal overall rate to the destination. In particular, this work shows by means of both analysis and simulation that the performance of reactive cooperation is reduced by the intrinsic nature of the considered medium access policy, which biases the distribution of the available relays, locating them in unfavorable positions for rate optimization. Moreover, the highly dynamic nature of interference that characterizes non-infrastructured ad hoc networks is proved to hamper the efficacy and the reliability of preemptively allocated cooperative links, as unpredicted births and deaths of surrounding transmissions may force relays to abort their support and/or change the maximum achievable rate at the intended receiver. As a general conclusion, our work extensively suggests that CSMA-based link layers are not apt to effectively support cooperative strategies in large-scale non-centralized ad hoc networks.
△ Less
Submitted 1 June, 2012;
originally announced June 2012.
-
Cooperation in Carrier Sense Based Wireless Ad Hoc Networks - Part I: Reactive Schemes
Authors:
Andrea Munari,
Marco Levorato,
Michele Zorzi
Abstract:
Cooperative techniques have been shown to significantly improve the performance of wireless systems. Despite being a mature technology in single communication link scenarios, their implementation in wider, and practical, networks poses several challenges which have not been fully identified and understood so far. In this two-part paper, the implementation of cooperative communications in non-centr…
▽ More
Cooperative techniques have been shown to significantly improve the performance of wireless systems. Despite being a mature technology in single communication link scenarios, their implementation in wider, and practical, networks poses several challenges which have not been fully identified and understood so far. In this two-part paper, the implementation of cooperative communications in non-centralized ad hoc networks with sensing-based channel access is extensively discussed. Both analysis and simulation are employed to provide a clear understanding of the mutual influence between the link layer contention mechanism and collaborative protocols. Part I of this work focuses on reactive cooperation, in which relaying is triggered by packet delivery failure events, while Part II addresses proactive approaches, preemptively initiated by the source based on channel state information. Results show that sensing-based channel access significantly hampers the effectiveness of cooperation by biasing the spatial distribution of available relays, and by inducing a level of spatial and temporal correlation of the interference that diminishes the diversity improvement on which cooperative gains are founded. Moreover, the efficiency reduction entailed by several practical protocol issues related to carrier sense multiple access which are typically neglected in the literature is thoroughly investigated.
△ Less
Submitted 1 June, 2012;
originally announced June 2012.