Научная статья на тему 'ANALYZING AND STABILIZING MULTICHANNEL ALOHA WITH THE USE OF THE PREAMBLE-BASED EXPLORATION PHASE'

ANALYZING AND STABILIZING MULTICHANNEL ALOHA WITH THE USE OF THE PREAMBLE-BASED EXPLORATION PHASE Текст научной статьи по специальности «Медицинские технологии»

CC BY
60
6
i Надоели баннеры? Вы всегда можете отключить рекламу.
Ключевые слова
MULTICHANNEL ALOHA / MAXIMUM THROUGHPUT / RANDOM MULTIPLE ACCESS / STABILITY / MASSIVE MACHINE-TYPE COMMUNICATIONS / INTERNET OF THINGS

Аннотация научной статьи по медицинским технологиям, автор научной работы — Burkov A.A., Rachugin R.O., Turlikov A.M.

Introduction: Internet of Things devices are actively used within the framework of Massive Machine-Type Communication scenarios. The interaction of devices is carried out by random multiple-access algorithms with limited throughput. To improve throughput one can use orthogonal preambles in the ALOHA-type class of algorithms. Purpose: To analyze ALOHA-based algorithms using the exploration phase and to calculate the characteristics for the algorithm with and without losses with a finite number of channels. Results: We have described a system model that employs random access for data transmission over a common communication channel with the use of orthogonal preambles and exploration phase. We have obtained a formula for numerical calculation of the throughput of an algorithm channel with losses with an infinite number of preambles and a given finite number of channels. The calculation results for several values of the number of independent channels are presented. A modification of the algorithm using the exploration phase and repeated transmissions is proposed and described. The system in question can work without losses. For this system, we have given the analysis of the maximum input throughput up to which the system operates stably. Also, the average delay values for the algorithm that were obtained by simulation modeling are shown. By reducing the number of available preambles, the results obtained can be used as an upper bound on the system throughput. Practical relevance: The results obtained allow to assess the potential for improving the throughput of random multiple-access systems in 6G networks through the application of the exploration phase.

i Надоели баннеры? Вы всегда можете отключить рекламу.
iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.
i Надоели баннеры? Вы всегда можете отключить рекламу.

Текст научной работы на тему «ANALYZING AND STABILIZING MULTICHANNEL ALOHA WITH THE USE OF THE PREAMBLE-BASED EXPLORATION PHASE»

Ч КОДИРОВАНИЕ И ПЕРЕДАЧА ИНФОРМАЦИИ

udc 004.728.3.057.4 Articles

doi:10.31799/1684-8853-2022-5-49-59 EDN: KGVYDI

Analyzing and stabilizing multichannel ALOHA with the use of the preamble-based exploration phase

A. A. Burkova, Assistant Professor, orcid.org/0000-0002-0920-585X R. O. Rachugina, Master Student, orcid.org/0000-0001-5813-3867

A. M. Turlikova, Dr. Sc., Tech., Professor, orcid.org/0000-0001-7132-094X, turlikov@vu.spb.ru a Saint-Petersburg State University of Aerospace Instrumentation, 67, B. Morskaia St., 190000, Saint-Petersburg, Russian Federation

Introduction: Internet of Things devices are actively used within the framework of Massive Machine-Type Communication scenarios. The interaction of devices is carried out by random multiple-access algorithms with limited throughput. To improve throughput one can use orthogonal preambles in the ALOHA-type class of algorithms. Purpose: To analyze ALOHA-based algorithms using the exploration phase and to calculate the characteristics for the algorithm with and without losses with a finite number of channels. Results: We have described a system model that employs random access for data transmission over a common communication channel with the use of orthogonal preambles and exploration phase. We have obtained a formula for numerical calculation of the throughput of an algorithm channel with losses with an infinite number of preambles and a given finite number of channels. The calculation results for several values of the number of independent channels are presented. A modification of the algorithm using the exploration phase and repeated transmissions is proposed and described. The system in question can work without losses. For this system, we have given the analysis of the maximum input throughput up to which the system operates stably. Also, the average delay values for the algorithm that were obtained by simulation modeling are shown. By reducing the number of available preambles, the results obtained can be used as an upper bound on the system throughput. Practical relevance: The results obtained allow to assess the potential for improving the throughput of random multiple-access systems in 6G networks through the application of the exploration phase.

Keywords— multichannel ALOHA, maximum throughput, random multiple access, stability, Massive Machine-Type Communications, Internet of Things.

For citation: Burkov A. A., Rachugin R. O., Turlikov A. M. Analyzing and stabilizing multichannel ALOHA with the use of the preamble-based exploration phase. Informatsionno-upravliaiushchie sistemy [Information and Control Systems], 2022, no. 5, pp. 49-59. doi:10.31799/1684-8853-2022-5-49-59, EDN: KGVYDI

Introduction

Currently, there is an active development of wireless communication technologies, caused by a large increase in the requirements for the number of operating devices and the amount of transmitted data. A prime example is the Internet of Things (IoT) technology. Support for this technology in cellular networks is being studied in both the standard (5G) and emerging standards (6G). IoT systems are expected to work within the framework of the Massive Machine-Type Communications scenario. The possibility of operation of a potentially infinite number of devices and a high load on the network [1-3] are considered. Since the number of users is potentially infinite, random access algorithms are assumed [4, 5]. As a rule, varieties of algorithms such as ALOHA and its modifications are considered. The existing algorithms have restrictions on the limiting input arrival rate (throughput), which become few with the existing increase in the number of users. There are various approaches to increase the throughput of algorithms. Thus, approaches

based on the use of non-orthogonal multiple access (NOMA), sequential interference cancellation (SIC) and orthogonal preambles are proposed [6-12]. However, NOMA and SIC methods are computationally intensive. Therefore, in this article we will consider an approach using orthogonal preambles. The work [12] considers a system with independent channels and a multichannel ALOHA algorithm that uses orthogonal preambles to implement work with two phases. The exploration phase is the phase of evaluating possible collisions using preambles. Users then transmit messages in the Data Transmission Phase based on the results of the EP. In this paper, we will take as a basis the model of such a system. In contrast to [12], we will analyze the throughput for a finite number of independent channels. It also proposes a modification of the algorithm using repeated transmissions, which allows the system to work without losses. This algorithm can be used to organize data transmission in high reliability systems [13-15]. For such a model, the limiting input arrival rate is sought, up to which the system is stable for a given number of channels.

Analysis of a system with losses

Let us introduce a system of assumptions for the system under consideration.

Assumption 1. The entire time of the channel operation is divided into frames of the same length. A frame consists of two phases: an exploration phase (EP) and a data transmission phase (DTP). Each phase is followed by a response from the base station (BS). In the exploration phase, orthogonal preambles are transmitted, and in the data transmission phase, user messages are transmitted. Users know exactly the boundaries of the division into frames and phases and can transmit data only at the beginning of the corresponding phase at the beginning of a new frame.

Assumption 2. There is a set of K independent channels. All users have unique preambles. A preamble is a sequence of bits of a certain length, which is much less than the length of the message. The preamble transmission rate is the same. The BS can reliably determine the number of preambles on each channel.

Assumption 3. In each channel, during each phase of the frame, one of the following events can occur:

— "Success" — if the data was transmitted by one user;

— "Empty" — none of the users transmitted data;

— "Conflict" — simultaneously, two or more users were transmitting data. If a conflict occurs during the EP, then the BS will successfully determine the number of preambles. If a conflict occurs during the DTP, then the users' messages overlap and cannot be processed on the receiving side.

At the end of each phase, all users will reliably know what event happened in the channel.

Assumption 4. The system has a potentially unlimited number of users. The number of messages appearing in the system in one frame is distributed according to the Poisson law with the parameter KX.

Assumption 5. The time of the data transmission phase will be taken as a unit of time, and the time of the exploration phase will be taken as 0.

Let us describe the considered algorithm. According to Assumption 1, each frame consists of two phases: EP and DTP. In EP, users randomly select one of the K channels and send a preamble over it. The BS then estimates the number of preambles in each channel and broadcasts this information to all users. After that, users are divided into two groups. The first group (Gs) includes users in whose channels one preamble was transmitted. All other users fall into the second group (GC). Channels selected by users in GS are assigned to them, and all other channels belong to the second group.

Then comes DTP phase. GS users transmit data with a probability of one. Users of the GC decide whether to transmit data to them with a probability equal to pdtp = min 11, -'—~ f • Users of the

I I GC I \ GC group who decide to transmit data randomly select one of the channels of the second group and transmit their data. The base station then informs all users about the events that have occurred in each channel via the feedback channel.

Consider an example of the algorithm shown in Fig. 1.

The system has three data channels. Consider the first frame. In the first channel in the exploration

Channel 3

EP <-

DTP->■ EP <-DTP-> EP <- DTP

U2 U5

Data U4 S Ue 1 Data U6

Channel 2 U3 1 Data U3

Channel 1

и.

Data U2 S

U7 Uw

U9

Data U9 Data Uw

E

Uu UX2

Data Un S

С U13 1 Data U13 S

Data U\2 S

Tn T,

Ti

Tf

->ч-

Frame 1

■ Fig. 1. Example of the algorithm's lossy work

Frame 2

Frame 3

phase users Ui and U4 decided to send their preambles, in the second channel user U3 decided to send a preamble, in the third channel users U2 and U5 decided to send preambles. After evaluating the preambles in each channel, the base station will return to all users the next set of data {2, 1, 2}. Thus, channels one and three belong to group two, hence users Ui, U2, U4 and U5 also belong to the Gc. Channel two belongs to group one and also user U3 belongs to GS.

This is followed by the data transmission phase, in which the user from the first group remains in the same channel and transmits with probability equal to one. Users of the second group randomly decide whether or not to send data to them. In this case, the transmission probability will be equal to

PDTP = min |1> 4J = 0-5- Assume that users Ui

and U5 decide not to transmit, but users U2 and U4 decide to transmit and randomly reselect one of the channels of group two. Let user U2 reselect the first channel, and user U4 reselect the third channel. Thus, as a result, the "Success" event will occur in all channels.

Consider the next frame. Suppose that in the exploration phase, users U8 and Ug decide to transmit their preambles on the first channel, users U7 and U10 on the second channel, and user U6 on the third channel. Then, the base station, having estimated the number of received preambles in each channel, returned the following data set to all users {2, 2, 1}. Thus, channels one and two belong to group two, hence users U7, U8, Ug and U^ also belong to the GC. Channel three belongs to group one, and user U6 belongs to GS.

This is followed by the data transmission phase, in which the user from the first group remains in the same channel and transmits with probability equal to one. Users of the second group randomly decide whether or not to send data to them. In this case, the probability of transmission will be equal

to Pdtp = min |1, —j = 0.5. Assume that users U7

and U8 decide not to transmit, users U9 and U^ decide to transmit and randomly reselect one of the channels of group two. Let both users U9 and U^ reselect the second channel. Thus, the event "Empty" occurred in the first channel, the event "Conflict" occurred in the second channel, and the event "Success" occurred in the third channel.

Consider the third frame. Assume that in the exploration phase, users U11 and U12 decide to transmit preambles on the first channel, user U13 transmits the preamble on the second channel. Then, the base station, having estimated the number of received preambles in each channel, returned to all

users the following data set {2, 1, 0}. Thus, channels one and three belong to group two, hence users U11 and U12 belong to the Gc. Channel two belongs to group one and also user U13 belongs to Gs•

This is followed by the data transmission phase, in which the user from the first group remains in the same channel and transmits with probability equal to one. The users of group two randomly decide to send data to them or not. In this case, the probability of transmission will be equal to

PDTP = min |1, —j = 1. Assume that user Un decides to transmit and randomly reselects the third channel. User U12 decided to transmit and randomly reselected the first channel. Thus, the "Success" event occurred in all channels.

Let us analyze for the algorithm with a finite number of channels. By analogy with [12], we will consider the normalized throughput (per channel) and denote it as T(X, K).

Throughput per channel is calculated as

T(X, K) =

E [Nt ]

K

(1)

where Nt is the number of users who logged out of the system at time t, Nt £ {0, 1, 2, ..., K}; K is the number of channels in the system; X is the intensity of the input arrival rate in the system, which affects the distribution of the random variable Nt.

Denote by Nlt the number of users leaving channel I at time t, then Nt = Nf(1) + n(2) +... + N(K}. Then from (1) it follows:

E

T (X) =-

Nm + Np +...+N(K)

K

KE

i=i

Nti}

K

It might be noted that E = ... = e

K

= E

Nf

ntK)

Then:

T(X) = E

N(1

Taking into account the fact that only message one user can be successfully transmitted in one

channel, then E that:

Nt1

= Pr jiN(1) = ^. Thus, we get T(X) = Pr |NVt(1) = l}.

Next, we will show how to calculate this probability for channel number 1. For a channel with other numbers, the probability is calculated similarly. Note the following:

Pr

{{ = i} = pr {{ = 1, sep }+pr {{

= 1, S

DTP I

where SEp is success in the first phase (EP); SDTp is success in the second phase (DTP).

Success in the first phase occurs only if the channel in question has been selected by one user. Given Assumption 4, the value of this probability can be calculated as

Pr

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

{{ = 1, Sep } = Xe"X.

If there was no success in a given channel in the first phase, then success in the second phase depends on the number of channels in which there was no success, let's denote the number of such channels as L, then:

Pr {{ = 1, SDTp } = J Pr {{ = 1, SDTp, L = /}. z=i

(2)

Next, we will show how to calculate the terms from the sum in expression (2), for each l. Denote by Pr{S£p, W = K - l} the probability that the event "Success" occurred in K - l channels during the exploration phase.

If l = 1, then in all other channels except the current one there should be a "Success" event, therefore

Pr {SEP, W = K - 1} = (Xe"X)

K-1

Let ii users arrive at the input of the current channel. We write the probability of such an event as:

Pr {entered ii users} = -— e . During the data transmission phase, the current channel can have a "Success" i1!

event if two events occur:

— at the exploration phase of the current channel there was an event "Conflict" (ii > 2);

— during the data transmission phase, only one of the users participating in the "Conflict" event during the exploration phase will make a decision to transmit in the current channel. Since in this case, the

users make a decision to transmission with the probability -1. So, the probability of such an event is

Pr{Sdtp I*l} = С1 -

4 i1

1 -1

V1-1

i i Y1-1 1 - —

Taking into account the introduced notation, we obtain:

Pr {{ = 1, SDTP, L = 1} = Pr {SEP, W = K -1} J Pr {SDTP | l1}Pr {entered l1 users} =

l1 =2

лК-1 -XK = К e

J

l1 =2 V

1 -1

^-1 Xi i1 !.

If l = 2, then in all channels, except for the current and one more, there should be a "Success" event, therefore

Pr {Sep , W = K - 2} = cK-2 (xe"X )

K-2

1

Let ii users arrive at the input of the current channel, and i2 users at the input of another. We write the probability of such an event as:

Pr {entered ii users} Pr {entered i2 users} =-— e -— e .

i1 ! i2 !

During the data transmission phase, the current channel can have a "Success" event if two events occur: — ii ^ 1 and i2 ^ 1 and ii + i2 > 2;

— during the data transmission phase, only one of the users participating in the "Conflict" event during the exploration phase will make a decision to transmit in the current channel. Since in this case the users decide

1 2

to transmit in the current channel with the probability---:-—. Then, the probability of the event "Success"

2 ii + ¿2

in the current channel is equal to Pr {dtp I ¿1, ¿2 } = C

(

¿1 +¿2 ¿1 + ¿2

Taking into account the introduced notation, we obtain:

to TO

Pr {{ = 1, SDTp, L = 2} = CfI2 (Xe"X )f-2 X X

¿1 =0 ¿2 =0 ¿1 ¿2 ¿1 +¿2 ^0 ¿1 +¿2

\h+¿2"! i

1--

¿1 + ¿2

Vl +i2-1

1

¿1 + ¿2

(

1--

V1+i2 1 X^ " X X^ " ■

¿1 + ¿2

TO TO

= Ck- 1 (Xe~X)K-2 X X

N¿1 +^-1 . ь

1

¿1 + ¿2

X^ -X Xi2

¿1!

¿2!

¿1!

e X =

¿2!

e X =

¿1 ¿2 ¿1 +¿2 ¿1 +¿2

r.1 лК-2 -XK = C^1X e

TO TO

X .X

¿1 =0 ¿2 =0

¿1 ¿2

¿1 +¿2 ^0 ¿1 +¿2^0

(

V1 +¿2

¿2-1

1

¿1 + ¿2

X^-r ¿2 ¿1!¿2

If l = 3, then in all channels, except for the current one and two more, there should be a "Success" event, therefore

,f -3

Pr {SEp, W = К -3} = CK-3 (X)

Let ¿! users arrive at the input of the current channel, and ¿2 and ¿3 users, respectively, at the input of the other two channels. We write the probability of such an event as:

X - X ^ X¿з - x

Pr {entered ¿1 users}Pr {entered ¿2 users}Pr {entered ¿3 users} =-— e -— e -— e .

¿1!

¿2 !

¿3 !

During the data transmission phase, the current channel can have a "Success" event if two events occur:

— ¿! ^ 1 and ¿2 ^ 1 and ¿3 ^ 1 and ¿^ + ¿2 + ¿3 > 2;

— during the data transmission phase, only one of the users participating in the "Conflict" event during the exploration phase will make a decision to transmit in the current channel. Since in this case the users decide to transmit in the current channel, the probability depends on the sum of the number of users in the channels under consideration. If 2 < ¿^ + ¿2 + ¿3 < 3, then the probability of the "Success" event in the current

1 ( 1 Y1 +¿2 +¿3^

channel is Pr {Sdtp I ¿1, ¿2, ¿3, L = 3} = (¿1 + ¿2 + ¿3 )—I 1--I . If ¿1 + ¿2 + ¿3 > 3, then the probability of

31. 3,

the "Success" event in the current channel is Pr {Sdtp I ¿1, ¿2, ¿3, L = 3} =

t ^ (1, true

We introduce the following indicator function I {statement} = <! ^ .

Taking into account the introduced notation, we obtain:

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

Pr {{ = 1, SDTP, L = 3} =

у1 +¿2 +¿3^

1--

¿1 + ¿2 + ¿3

nK-2n„-Xs. K-3 = CK-1 (Xe )

Xil - X X^ - iX* - ■

XXX Pr{Sdtp I ¿1, ¿2, ¿3, l = 3}}-X— e"X —

¿1 =0 ¿2=0 ¿3 =0

¿1 ¿2 ¿3

¿1 +¿2 +¿3 ^0 ¿1 +¿2 +¿3 ^0 ¿1 +¿2 +¿3 ^0

h !

-e -X =

¿3

то то то \\ 0,^2 \ ¿3

= с!.!(Я*-*)К_3 S S S Pr{ | , ¿2, i3, L = 3}}e"**-e"**-e_* =

¿1 =0 ¿2 =0 ¿3 =0

¿1 ¿2 ¿3

¿1 +¿2 +¿3 ^0 ¿1 +¿2 +¿3 ^0 ¿1 +¿2 +¿3 ^0

= С|_1Я^"3е"Ж S S S Pr{Sdtp I ¿1, ¿2, ¿3, L = 3}}— =

то то

¿1! ¿2 ! ¿3 !

^¿1 +¿2 +¿3

¿1 =0 ¿2=0 ¿3 =0

¿1 ¿2 ¿3

¿1 +¿2 +¿3 ^0 ¿1 +¿2 +¿3 ^0 ¿1 +¿2 +¿3 ^0

п2 л К_3 _ЯК = Ck e

то то

(

, S , S , S

¿1=0 ¿2=0 ¿3 =0

¿1 ¿2 ¿3

¿1 +¿2 +¿3 ^0 ¿1 +¿2 +¿3 ^0 ¿1 +¿2 +¿3 ^0

I {¿1 + ¿2 + ¿3 < 3}

Î1 ! ¿2 ! ¿3 !

f 1 f 1 ^¿1 +¿2 +¿3 _1 Л

(¿1 + ¿2 + ¿3 ) I 1 _ 3

(,

+1{¿1 + ¿2 + ¿3 > 3}

Then we can write in general:

K

\h +¿2 +¿3

_1

1 --

¿1 + ¿2 + ¿3

+¿2 +¿3

//

¿1 ! ¿2 !¿3 !

то то

T (X) = Xe"*+S С^ЯK ~e~ S - S

I=1

¿1 ¿z S ¿,-*0 S ¿j^0

i ÎS v < i IS ¿j1 f 1 _1

I • i J~ I -Л J l У l

I J=1 J J=1

I

S ¿J

j=1

J ^ J

J=1 J=1

i IS ^ > i\

i j=1

i A л s ¿j _1

J=1

1 _

l

Sv

j =1

I

S ¿j

Я J=1

I

П ^ ! j =1

(3)

where I (statement) = J , . 1 > [0, false

Formula (3) can be used to calculate for any number of channels.

Figure (2) shows the results obtained by (3) for a different number of channels depending on the throughput per channel.

From Fig. 2, it can be seen that the throughput limit is reached when the input arrival rate is greater than 1. The values of the maximum throughput and the corresponding input arrival rate are presented in Table 1. The values presented in this table will be used as a parameter for the lossless algorithm.

Analysis of a system without losses

Let us describe a modification of the algorithm [12], in which users remain in the system until they successfully transmit a message (system without losses).

To do this, we add one more assumption to the system.

Assumption 6. The number of active users (having a message ready for transmission) is known to M. According to Assumption 1, each frame consists of two phases: EP and DTP. This algorithm repeats the description structure of the phases of the previous algorithm, but the transmission probability in the EP phase is

Pep = min <1, KKG j, where G is the algorithm parameter. The user tries to send his message until he receives

confirmation of successful transmission.

Consider an example of the algorithm shown in Fig. 3.

Input attival rate

-1 channel -4 channels

-2 channels -5 channels

-3 channels 6 channels

■ Fig. 2. Throughput per channel on the input arrival rate

Consider the first frame. Suppose that by the beginning of this frame there are messages from users Up U2, U3, U4, U5 and everyone decided to transmit. Let in the EP users U4 and U5 decide to transmit in the first channel, users U3 in the second channel, users U1 and U2 in the third channel. BS, having estimated the number of preambles in each channel, will return the following information to all users

■ Table 1. Maximum throughput

Number channel max T(X) X

1 0.5482 1.775

2 0.578 1.55

3 0.5917 1.415

4 0.5983 1.34

5 0.6015 1.285

6 0.6031 1.25

{2, 1, 2}. Thus, user U3 belongs to the Gs, and users U1, U2, U4, U5 belong to the GC.

Then the DTP follows, in which the U3 user transmits with probability one in the second channel. Users of the GC with a probability of

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

PDTP = min <[1, 2J = 0 5 decide to send them data

in this frame or not. Suppose that users U1 and U4 decided not to transmit, and users U2 and U5 decided to transmit and reselected channels 1 and 3, respectively. As a result, the "Success" event will occur in all three channels.

Consider the second frame. At the beginning of this frame, there are messages from users U1 and U4 from the previous frame, as well as new ones from users U6, U7 and U8. In the EP, users decide to transmit preambles or not with a probability equal

Channel 3

EP <-DTP->■ EP <- DTP->■ EP <- DTP -

U2

2 Data Us S

Data Ut Data U8

С Ug 1 Data U9 S

Channel 2 U3 1 Data U3 S U-, 1 Data U7 S

Channel 1

UA U5

2 Data U2 S

иг

ия

щ Uw

2 Data U4 S

E Ue 1 Data Ue S

T, y

»< „ >

Frame 1

Frame 2

Frame 3

ив u7 ия

U,

■ Fig. 3. Example of the lossless algorithm's work

to Pep = min |1, —| = 0.6. Suppose that users U4

and U6 decided not to transmit, and users Up U7 and U8 decided to transmit. User U7 chose the second channel, and users Up and U8 chose the first channel. The BS, having estimated the number of preambles in each channel, will return the following information to all users {2, 1, 0}. Thus, user U7 belongs to the Gs, and users Up, U8 to the Gc.

Then the DTP follows, in which the user U7 transmits with probability one in the second channel. In this case, users of Gc transmit data with a

probability of Pdtp = min jl, 2j = 1. Let's assume

that users Up and U8 have both re-selected the third channel. As a result, the "Empty" event will occur in the first channel, the "Success" event in the second channel, and the "Conflict" event in the third channel.

Consider the third frame. At the beginning of this frame there are messages from users Up, U4, U6, Ug from the previous frames, as well as new ones from users U9 and U^. Suppose that users U4, U6, U9 and Upo decide to transmit in EP. User U6 chose the first channel, users U4 and U^ chose the second channel, and U9 chose the third channel. BS, having estimated the number of preambles in each channel, will return the following information to all users {1, 2, 1}. Thus, users U6 and Ug belong to the Gs, and users U4, U^ to the Gc.

This is followed by the DTP. Suppose that user U10 decided not to transmit, and user U4 decided to transmit and re-selected the second channel. As a result, the "Success" event will occur in all three channels.

For a system with repeated transmissions, we introduce two characteristics [16]:

— the dependence of the average delay on input arrival rate d(X);

— the limiting input arrival rate at which the system works stably Xcr = sup{X : d(X) < to}.

Let us show how, for a system described by a set of assumptions, Xcr can be calculated.

The number of active users during system operation can be described by the following recursive equation:

Mt+l = Mt - Nt + Vt,

where Mt and Mt+1 are the number of users in the system at time t and t + 1, respectively; Nt is the number of users who logged out of the system at time t, Nt £ {0, 1, 2, ..., K}, Kis the number of channels in the system; Vt is the number of users who arrived at time t, distributed according to the Poisson law with the parameter X.

It follows from this description that the sequence of random variables Mt defines a homogeneous irreducible aperiodic Markov chain.

To analyze stability, we calculate the mathematical expectation E[Nt\Mt = m]. It follows from the Foster criterion (see, for example, [17]) that Xcr can be defined as the following limit:

lim E[Nt | Mt _ m]

X _ m^x

K

(4)

r(0

Denote by Nt the number of users leaving chan,

Then from (4) it follows:

nel i at time t, then Nt _ N(1 N(2... + N(K\

E

X cr _ lim -

m^x

N.(1) + n(2) +... + N(k) | Mt _ ;

K

lim £ E

K

Nf | Mt _ m

K

£ lim E

i_1

K

Nti) | Mt _ m

K

It can be noted that for any value of m

E t

_ ... _ E

N1 | Mt _ m

_ E

Nt 2) | Mt _ m

n\K) | Mt _ m

Then:

X cr _ lim E

m^x

N1 | Mt _ m

Taking into account the fact that only message one user's can be successfully transmitted in one chan-

nel, then E Then:

N1 | Mt _ m

_ Pr

_ 11 Mt _ m

X„„ _ lim Pr

к

_ 11 M _ -

!

(5)

To calculate (5), we formulate and prove the following assertion.

Statement 1. Let there be m active users in some frame with number t. Then, as m ^ to, each channel independently receives a Poisson input flow with intensity 1.

proof: Let's consider the channel number i. Let Mt = m and m > K, m > G, then all users decide to

KG

transmit with probability Pep = and those us-

m

ers who decide to transmit will choose the i-th chan-

nel with probability p = 1. Denote by Zjl) the number of such users. The random variable Zf1 is distributed according to the Binomial distribution with

7(. i)

= Gm = G.

If

G

parameters and m, then E m

m ^ œ, then the Binomial distribution becomes a Poisson distribution with the same expectation.

It follows from the statement that the value of the limit (5) can be calculated by substituting the value X = G into (3). Thus, using (3), we can calculate the value of Xcr. The optimal value of G that maximizes the value of Xcr is defined as

iНе можете найти то, что вам нужно? Попробуйте сервис подбора литературы.

Gopt = argmax T(X ).

Figure 3 shows that the maximum limiting intensity with a small number of channels is achieved at the parameter Gopt > 1.

On Fig. 4 shows the results of calculating the critical input intensity up to which the system is stable according to formula (3) for the values of the number of channels 1, 2, 3, 4, 5 and 6. It is also shown that the optimal choice of the G parameter makes it possible to increase the throughput with a small number of channels. With an increase in the number of channels, this gain decreases, and with a large number of channels, the optimal value is G = 1.

To numerically calculate the average delay in the system, it is necessary to find the stationary distribution of the Markov chain with a countable number of states and cumbersome expressions for calculating the transition probabilities. Therefore, to illustrate the effect of the parameter G on the delay, a Java pro-

3 a л

M

з

о s-

-M

тэ

я

¡3

S-

о £

0.62 0.6 0.58 0.56 0.54 0.52 0.5 0.48

x -----

/ /

/ / / У у' /'

/' У '

/

2 3 4 5

Number of channels

---ALOHA-EP(exact value G=l)

- ALOHA-EP(exact value G=Gopt)

■ Fig. 4. Throughput on the number of channels

18 16 14 12 & 10 ° 8 6 4 2

Lieh G=1 t -3 ch G=1 1

<—1 ch G=GC <-3 chG= öopt 1

6 ch G=l-> 1

1 6 ch G= G t_ 1 .

1 ^opt

1 1 I

! 1 1

Л > V II 11 J II 1 1 -

II . II 1 1 II

0.5 1 1.5 2 2.5 3 Input arrival rate

3.5

■ Fig. 5. Delay in system without losses at G = 1 and G = opt from input arrival rate per channel

gram was developed and implemented that simulates the operation of the system, taking into account the assumptions described earlier. The results obtained by simulation modeling are presented in Fig. 5. The number of experiments was chosen such that the value of the confidence interval coincides with the thickness of the graph. As the throughput is approached, the delay increases and then tends to infinity, in which case the system is not stable.

Conclusion

The paper considers a model of a random multiple access system based on ALOHA with exploration phase from [12], where the calculation of the throughput per channel for an infinite number of channels was proposed. A method for analyzing the characteristics of the algorithm is proposed, which, in contrast to [12], makes it possible to calculate the throughput per channel for a given number of channels. It is shown that the maximum throughput with a finite number of channels is achieved at the input intensity X > 1.

A modification of the algorithm for lossless operation is proposed by using repeated transmissions and changing the operation of the exploration phase to stabilize the operation of the algorithm. It is shown that the system provides stable operation when the input arrival rate does not exceed the maximum throughput. The dependence of delays in the system, obtained using simulation modeling, is also given.

The model considered in the paper and its modification is based on 3 unrealistic assumptions: an infinite number of preambles, the availability of information on the number of active users, and no time is spent on the exploration phase. These assumptions can be consistently discarded in further

studies. Can use the method of estimating the number of active users (see, for example, [18-20]). If the number of preambles is limited, then the results of the above analysis will be an upper bound on the throughput. Also in the future, it is necessary to take into account the duration of the exploration phase and the response of the base station.

1. Ratasuk R., Prasad A., Li Z., Ghosh A., & Uusitalo M. A. Recent advancements in M2M communications in 4G networks and evolution towards 5G. 18th Intern. Conf. on Intelligence in Next Generation Networks, IEEE, 2015, pp. 52-57. doi:10.1109/ICIN.2015.7073806

2. Letaief K. B., Chen W., Shi Y., Zhang J., and Zhang Y. J. A. The roadmap to 6G: AI empowered wireless networks. IEEE Communications Magazine, 2019, vol. 57(8), pp. 84-90. doi:10.1109/MC0M.2019.1900271

3. Piran M. J., and Suh D. Y. Learning-driven wireless communications, towards 6G. Intern. Conf. on Computing, Electronics & Communications Engineering (iCCECE), IEEE, 2019, pp. 219-224. doi:10.1109/iC-CECE46942.2019.8941882

4. Wu Y., Gao X., Zhou S., Yang W., Polyanskiy Y., & Caire G. Massive access for future wireless communication systems. IEEE Wireless Communications, 2020, vol. 27(4), pp. 148-156. doi:10.1109/MWC.001. 1900494

5. Shahab M. B., Abbas R., Shirvanimoghaddam M., and Johnson S. J. Grant-free non-orthogonal multiple access for iot: A survey. IEEE Communications Surveys & Tutorials, IEEE, 2020, vol. 22, no. 3, pp. 1805-1838. doi:10.1109/C0MST.2020.2996032

6. Choi J. Noma-based random access with multichannel aloha. IEEE Journal on Selected Areas in Communications, IEEE, 2017, vol. 35, no. 12, pp. 2736-2743. doi:10.1109/JSAC.2017.2766778

7. Balevi E., Al Rabee F. T., and Gitlin R. D. ALOHA-no-ma for massive machine-to-machine IoT communication. IEEE Intern. Conf. on Communications (ICC), IEEE, 2018, pp. 1-5. doi:10.1109/ICC.2018.8422892

8. Matveev N. V. The adaptive retransmission management in random multiple-access system with successive interference cancellation. 2018 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), IEEE, 2018, pp. 1-5. doi:10.1109/WEC0NF.2018.8604323

9. Burkov A., Frolov A., and Turlikov A. Contention-based protocol with time division collision resolution. 2018 10th Intern. Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT), IEEE, 2018, pp. 1-4. doi:10.1109/ICUMT. 2018.8631217

10. Burkov A., Saveliev A., and Turlikov A. Upper and lower bound for non-blocking random multiple access algorithm with time division mode. 2019 Wave Elec-

Financial support

The paper was prepared with the financial support of the Russian Science Foundation, project No. 22-19-00305 "Spatial-temporal stochastic models of wireless networks with a large number of users".

tronics and its Application in Information and Telecommunication Systems (WECONF), IEEE, 2019, pp. 1-7. doi:10.1109/WECONF.2019.8840590

11. Burkov A. A., Shneer S. V., Turlikov A. M. Lower bound for average delay in unblocked random access algorithm with orthogonal preambles. Informatsion-no-upravliaiushchie sistemy [Information and Control Systems], 2020, no. 3, pp. 79-85. doi:10.31799/1684-8853-2020-3-79-85

12. Choi J. On improving throughput of multichannel ALOHA using preamble-based exploration. Journal of Communications and Networks, IEEE, 2020, vol. 22, no. 5, pp. 380-389. doi:10.1109/JCN.2020.000024

13. Bogatyrev V. A., Bogatyrev S. V., Bogatyrev A. V. Model and interaction efficiency of computer nodes based on transfer reservation at multipath routing. 2019 Wave Electronics and its Application in Information and Telecommunication Systems (WECONF), IEEE, 2019, pp. 1-4. doi:10.1109/WEC0NF.2019. 8840647

14. Bogatyrev V. A., Bogatyrev A. V., Bogatyrev S. V. Redundant servicing of a flow of heterogeneous requests critical to the total waiting time during the multi-path passage of a sequence of info-communication nodes. Intern. Conf. on Distributed Computer and Communication Networks, Springer, Cham, 2020, pp. 100-112. doi:10.1007/978-3-030-66471-8_9

15. Bogatyrev V. A., Bogatyrev A. V., Bogatyrev S. V. Redundant multi-path service of a flow heterogeneous in delay criticality with defined node passage paths. Journal of Physics: Conference Series, IOP Publishing, 2021, vol. 1864, no. 1, p. 012094. doi:10.1088/1742-6596/1864/1/012094

16. Tsybakov B. Survey of USSR contributions to random multiple-access communications. IEEE Transactions on Information Theory, 1985, vol. 31, no. 2, pp. 143165. doi:10.1109/TIT.1985.1057023

17. Tsybakov B. S., and Mikhailov V. A. Free synchronous packet access in a broadcast channel with feedback. Problemy peredachi informatsii [Problems Information Transmission], 1978, vol. 14, no. 4, pp. 259-280 (In Russian).

18. Galinina O., Turlikov A., Andreev S., and Kouch-eryavy Y. Stabilizing multichannel slotted aloha for machine-type communications. 2013 IEEE Intern. Symp. on Information Theory, IEEE, 2013, pp. 21192123. doi:10.1109/ISIT.2013.6620600

19. Yu J., Zhang P., Chen, L., Liu J., Zhang R., Wang K., & An J. Stabilizing frame slotted ALOHA-based IoT

systems: A geometric ergodicity perspective. IEEE Journal on Selected Areas in Communications, IEEE, 2020, vol. 39(3), pp. 714-725. doi:10.1109/JSAC.2020. 3018795

20. Liu J., Seo J. B., Jin H. Online transmission control for random access with multipacket reception and reservation. IEEE Internet of Things Journal, IEEE, 2022. doi:10.1109/JIOT.2022.3188280

УДК 004.728.3.057.4 doi:10.31799/1684-8853-2022-5-49-59 EDN: KGVYDI

Анализ и стабилизация многоканального алгоритма ALOHA с использованием фазы исследования на основе преамбул

А. А. Буркова, ассистент, orcid.org/0000-0002-0920-585X Р. О. Рачугина, магистрант, orcid.org/0000-0001-5813-3867

А. М. Тюрликова, доктор техн. наук, профессор, orcid.org/0000-0001-7132-094X, turlikov@vu.spb.ru аСанкт-Петербургский государственный университет аэрокосмического приборостроения, Б. Морская ул., 67, Санкт-Петербург, 190000, РФ

Введение: в настоящее время активно используются устройства интернета вещей, функционирующие в рамках сценариев массивных машинных коммуникаций. Взаимодействие устройств осуществляется алгоритмами случайного множественного доступа, имеющими ограниченную пропускную способность. Для увеличения пропускной способности можно использовать ортогональные преамбулы в классе алгоритмов ALOHA. Цель: провести анализ алгоритмов на базе ALOHA, использующих фазу исследования, и вычислить характеристики для алгоритма с потерями и без потерь при конечном числе каналов. Результаты: описана модель системы случайного доступа для передачи данных по общему каналу связи с использованием ортогональных преамбул и фазы исследования. Получена формула для численного расчета пропускной способности на канал алгоритма с потерями при бесконечном числе преамбул и заданном конечном числе каналов. Представлены результаты расчета для нескольких значений числа независимых каналов. Предложена и описана модификация алгоритма, использующая фазу исследования и повторные передачи. Данная система может работать без потерь. Для этой системы приведен анализ предельной пропускной способности, до которой система работает стабильно. Также показаны значения средней задержки для алгоритма, полученные имитационным моделированием. При уменьшении числа доступных преамбул данные результаты можно использовать в качестве верхней границы пропускной способности системы. Практическая значимость: полученные результаты позволяют оценить потенциальные возможности увеличения пропускной способности систем случайного множественного доступа в сетях 6G за счет применения фазы исследования.

Ключевые слова — многоканальная ALOHA, предельная интенсивность выходного потока, случайный множественный доступ, стабильность, массовая межмашинная связь, интернет вещей.

Для цитирования: Burkov A. A., Rachugin R. O., Turlikov A. M. Analyzing and stabilizing multichannel ALOHA with the use of the preamble-based exploration phase. Информационно-управляющие системы, 2022, № 5, с. 49-59. doi:10.31799/1684-8853-2022-5-49-59, EDN: KGVYDI

For citation: Burkov A. A., Rachugin R. O., Turlikov A. M. Analyzing and stabilizing multichannel ALOHA with the use of the preamble-based exploration phase. Informatsionno-upravliaiushchie sistemy [Information and Control Systems], 2022, no. 5, pp. 49-59. doi:10.31799/1684-8853-2022-5-49-59, EDN: KGVYDI

УВАЖАЕМЫЕ АВТОРЫ!

Научные базы данных, включая Scopus и Web of Science, обрабатывают данные автоматически. С одной стороны, это ускоряет процесс обработки данных, с другой — различия в транслитерации ФИО, неточные данные о месте работы, области научного знания и т. д. приводят к тому, что в базах оказывается несколько авторских страниц для одного и того же человека. В результате для всех по отдельности считаются индексы цитирования, что снижает рейтинг ученого.

Для идентификации авторов в сетях Thomson Reuters проводит регистрацию с присвоением уникального индекса (ID) для каждого из авторов научных публикаций.

Процедура получения ID бесплатна и очень проста, есть возможность провести регистрацию на 12 языках, включая русский (чтобы выбрать язык, кликните на зеленое поле вверху справа на стартовой странице): https://orcid.org

i Надоели баннеры? Вы всегда можете отключить рекламу.