-
The Effect of Multiple Access Categories on the MAC Layer Performance of IEEE 802.11p
Authors:
Geeth P. Wijesiri,
Jussi Haapola,
Tharaka Samarasinghe
Abstract:
The enhanced distributed channel access (EDCA) mechanism enables IEEE 802.11p to accommodate differential quality of service (QoS) levels in vehicle-to-vehicle (V2V) communications, through four access categories (ACs). This paper presents multi-dimensional discrete-time Markov chain (DTMC) based model to study the effect of parallel operation of the ACs on the medium access control (MAC) layer pe…
▽ More
The enhanced distributed channel access (EDCA) mechanism enables IEEE 802.11p to accommodate differential quality of service (QoS) levels in vehicle-to-vehicle (V2V) communications, through four access categories (ACs). This paper presents multi-dimensional discrete-time Markov chain (DTMC) based model to study the effect of parallel operation of the ACs on the medium access control (MAC) layer performance of ITS-G5 IEEE 802.11p. The overall model consists of four queue models with their respective traffic generators, which are appropriately linked with the DTMCs modeling the operation of each AC. Closed-form solutions for the steady-state probabilities of the models are obtained, which are then utilized to derive expressions for key performance indicators at the MAC layer. An application for a highway scenario is presented to draw insights on the performance. The results show how the performance measures vary among ACs according to their priority levels, and emphasize the importance of analytical modeling of the parallel operation of all four ACs.
△ Less
Submitted 17 July, 2020;
originally announced July 2020.
-
A Discrete-Time Markov Chain Based Comparison of the MAC Layer Performance of C-V2X Mode 4 and IEEE 802.11p
Authors:
Geeth P. Wijesiri,
Jussi Haapola,
Tharaka Samarasinghe
Abstract:
Vehicle-to-vehicle (V2V) communication plays a pivotal role in intelligent transport systems (ITS) with cellular-vehicle to everything (C-V2X) and IEEE 802.11p being the two competing enabling technologies. This paper presents multi-dimensional discrete-time Markov chain (DTMC) based models to study the medium access control (MAC) layer performance of the IEEE 802.11p standard and C-V2X Mode 4. Th…
▽ More
Vehicle-to-vehicle (V2V) communication plays a pivotal role in intelligent transport systems (ITS) with cellular-vehicle to everything (C-V2X) and IEEE 802.11p being the two competing enabling technologies. This paper presents multi-dimensional discrete-time Markov chain (DTMC) based models to study the medium access control (MAC) layer performance of the IEEE 802.11p standard and C-V2X Mode 4. These models are coupled with an appropriate DTMC based queuing model, and traffic generators for periodic cooperative awareness messages (CAMs) and event-driven decentralized environmental notification messages (DENMs). Closed-form solutions for the steady-state probabilities of the models are obtained, which are then utilized to derive expressions for several key performance metrics. An application for a highway scenario is presented to provide numerical results and to draw insights on the performance. In particular, a performance comparison between IEEE 802.11p and C-V2X Mode 4 in terms of the average delay, the collision probability, and the channel utilization is presented. The results show that IEEE 802.11p is superior in terms of average delay, whereas C-V2X Mode 4 excels in collision resolution. The paper also includes design insights on possible future MAC layer performance enhancements of both standards.
△ Less
Submitted 17 August, 2020; v1 submitted 24 October, 2019;
originally announced November 2019.
-
Contextual Bandit Learning for Machine Type Communications in the Null Space of Multi-Antenna Systems
Authors:
Samad Ali,
Hossein Asgharimoghaddam,
Nandana Rajatheva,
Walid Saad,
Jussi Haapola
Abstract:
In this paper, a novel approach based on the concept of opportunistic spatial orthogonalization (OSO) is proposed for interference management between machine type communications (MTC) and conventional cellular communications. In particular, a cellular system is considered with a multi-antenna BS in which a receive beamformer is designed to maximize the rate of a cellular user, and, a machine type…
▽ More
In this paper, a novel approach based on the concept of opportunistic spatial orthogonalization (OSO) is proposed for interference management between machine type communications (MTC) and conventional cellular communications. In particular, a cellular system is considered with a multi-antenna BS in which a receive beamformer is designed to maximize the rate of a cellular user, and, a machine type aggregator (MTA) that receives data from a large set of MTDs. If there is a large number of MTDs to choose from for transmission at each time for each beamformer, one MTD can be selected such that it causes almost no interference on the BS. A comprehensive analytical study of the characteristics of such interference from several MTDs on the same beamformer is carried out. It is proven that, for each beamformer, an MTD exists such that the interference on the BS is negligible. However, the optimal implementation of OSO requires the CSI of all the links in the BS, which is not practical for MTC. To solve this problem, an online learning method based on the concept of contextual multi-armed bandits (MAB) learning is proposed. Simulation results show that is possible to implement OSO with no CSI from MTDs to the BS.
△ Less
Submitted 23 May, 2019;
originally announced May 2019.
-
Sleeping Multi-Armed Bandit Learning for Fast Uplink Grant Allocation in Machine Type Communications
Authors:
Samad Ali,
Aidin Ferdowsi,
Walid Saad,
Nandana Rajatheva,
Jussi Haapola
Abstract:
Scheduling fast uplink grant transmissions for machine type communications (MTCs) is one of the main challenges of future wireless systems. In this paper, a novel fast uplink grant scheduling method based on the theory of multi-armed bandits (MABs) is proposed. First, a single quality-of-service metric is defined as a combination of the value of data packets, maximum tolerable access delay, and da…
▽ More
Scheduling fast uplink grant transmissions for machine type communications (MTCs) is one of the main challenges of future wireless systems. In this paper, a novel fast uplink grant scheduling method based on the theory of multi-armed bandits (MABs) is proposed. First, a single quality-of-service metric is defined as a combination of the value of data packets, maximum tolerable access delay, and data rate. Since full knowledge of these metrics for all machine type devices (MTDs) cannot be known in advance at the base station (BS) and the set of active MTDs changes over time, the problem is modeled as a sleeping MAB with stochastic availability and a stochastic reward function. In particular, given that, at each time step, the knowledge on the set of active MTDs is probabilistic, a novel probabilistic sleeping MAB algorithm is proposed to maximize the defined metric. Analysis of the regret is presented and the effect of the prediction error of the source traffic prediction algorithm on the performance of the proposed sleeping MAB algorithm is investigated. Moreover, to enable fast uplink allocation for multiple MTDs at each time, a novel method is proposed based on the concept of best arms ordering in the MAB setting. Simulation results show that the proposed framework yields a three-fold reduction in latency compared to a random scheduling policy since it prioritises the scheduling of MTDs that have stricter latency requirements. Moreover, by properly balancing the exploration versus exploitation tradeoff, the proposed algorithm can provide system fairness by allowing the most important MTDs to be scheduled more often while also allowing the less important MTDs to be selected enough times to ensure the accuracy of estimation of their importance.
△ Less
Submitted 30 October, 2018;
originally announced October 2018.
-
D2D Communications in LoRaWAN Low Power Wide Area Network: From Idea to Empirical Validation
Authors:
Konstantin Mikhaylov,
Juha Petäjäjärvi,
Jussi Haapola,
Ari Pouttu
Abstract:
In this paper we advocate the use of device-to-device (D2D) communications in a LoRaWAN Low Power Wide Area Network (LPWAN). After overviewing the critical features of the LoRaWAN technology, we discuss the pros and cons of enabling the D2D communications for it. Subsequently we propose a network-assisted D2D communications protocol and show its feasibility by implementing it on top of a LoRaWAN-c…
▽ More
In this paper we advocate the use of device-to-device (D2D) communications in a LoRaWAN Low Power Wide Area Network (LPWAN). After overviewing the critical features of the LoRaWAN technology, we discuss the pros and cons of enabling the D2D communications for it. Subsequently we propose a network-assisted D2D communications protocol and show its feasibility by implementing it on top of a LoRaWAN-certified commercial transceiver. The conducted experiments show the performance of the proposed D2D communications protocol and enable us to assess its performance. More precisely, we show that the D2D communications can reduce the time and energy for data transfer by 6 to 20 times compared to conventional LoRaWAN data transfer mechanisms. In addition, the use of D2D communications may have a positive effect on the network by enabling spatial re-use of the frequency resources. The proposed LoRaWAN D2D communications can be used for a wide variety of applications requiring high coverage, e.g. use cases in distributed smart grid deployments for management and trading.
△ Less
Submitted 6 March, 2017;
originally announced March 2017.