- IoT Networks and Protocols
- Wireless Networks and Protocols
- Wireless Body Area Networks
- Age of Information Optimization
- Advanced MIMO Systems Optimization
- Energy Efficient Wireless Sensor Networks
- Wireless Communication Networks Research
- Congenital Heart Disease Studies
- IPv6, Mobility, Handover, Networks, Security
- Indoor and Outdoor Localization Technologies
- Cooperative Communication and Network Coding
- Power Line Communications and Noise
- Energy Harvesting in Wireless Networks
- Bluetooth and Wireless Communication Technologies
- Reinforcement Learning in Robotics
- Underwater Vehicles and Communication Systems
- Software-Defined Networks and 5G
- Advanced Wireless Communication Techniques
- Telecommunications and Broadcasting Technologies
- Network Time Synchronization Technologies
- Mobile Ad Hoc Networks
- Blockchain Technology Applications and Security
- Distributed Control Multi-Agent Systems
- Transportation and Mobility Innovations
- Satellite Communication Systems
Nokia (Germany)
2020-2024
Technical University of Munich
2015-2021
Persistently high traffic loads and heterogeneous quality of service (QoS) requirements arising from machine-to-machine communication in wireless 5G systems require effective random access prioritization. will likely evolve mature technologies, e.g., long term evolution (LTE). LTE conducts through preamble contention based on slotted Aloha principles. Prior studies have mainly examined prioritization for addressing temporary bursts manipulating the procedure a given set preambles, such as...
Age-of-information (AoI) is a metric quantifying information freshness at the receiver. It captures delay together with packet loss and generation rate. However, existing literature focuses on average or peak AoI neglects complete distribution. In this letter, we consider ${N}$ -hop network time-invariant probabilities each link. We derive closed form equations for probability mass function of AoI. verify our findings simulations. Our results show that performance indicators considered in...
Wireless machine-to-machine (M2M) communication with synchronized traffic patterns plays an important role in many aircraft systems. Recent research has separately examined collision avoidance mechanisms, such as presmoothing and access barring, well resolution tree resolution, for M2M random access. In contrast, we examine the combination of into hybrid protocols context popular Long-Term Evolution wireless system.
Industrial control systems are foreseen to operate over hybrid wired/wireless networks. While the controller will be deployed in wired network, sensors and actuators a wireless sensor network (WSN). To support QoS for systems, an end-to-end delay bound target reliability must provided both domains. However, industrial WSNs, guaranteeing is challenging task because of low-power communications harsh environment. In this work, we present first framework arbitrary networks, which guarantees that...
In this paper we present the effects of Wi-Fi interference on a Wireless Sensor Network (WSN) in an aircraft. We use Time-Slotted Channel Hopping (IEEE 802.15.4e) as Link layer WSN network. conduct measurements environment realistically representing aircraft cabin. provide resulting application failure and packet drop rates with without interference, for exemplary deadline critical application. order to outline importance hopping against controlled environment, compare results individual...
We consider the distributed resource selection problem in Vehicle-to-vehicle (V2V) communication absence of a base station. Each vehicle autonomously selects transmission resources from pool shared to disseminate Cooperative Awareness Messages (CAMs). This is consensus where each has select unique resource. The becomes more challenging when---due mobility---the number vehicles vicinity other changing dynamically. In congested scenario, allocation for infeasible and strategy be developed....
5G radio access network (RAN) slicing envisions a solution to flexibly deploy heterogeneous services as slices sharing the same infrastructure. However, this level of flexibility renders slice isolation challenging, mainly due stochastic nature wireless resources. In state-of-the-art, RAN algorithm’s efficiency with respect is related ability meeting individual requirements. mostly an aggregated performance guarantee considered instead per user guarantees. Hence, state-of-the-art approaches...
Guaranteeing reliability in highly interfered environments is a challenging requirement of current and future wireless applications. A promising state-of-the-art solution for low-power technologies, e.g., sensor networks (WSNs), frequency hopping aided with black- white-listing channels. Both methods, although increase reliability, sacrifice resources. Extensive measurements channels' packet drop probabilities show that channels are not fully blocked. Motivated by this discovery, we propose...
Reliability certification of the aircraft communication infrastructure is a challenging task with any kind wireless technology. In this paper reliability framework provided that used to test technologies against flight requirements. The required error rate each technology calculated an exemplary application in order form understanding relationship between system parameters. Results provide guideline about feasibility candidate for systems.
In this paper, we study binary tree-algorithms that exploit a combination of multi-packet reception (MPR) and successive interference cancellation (SIC), which so far has not been considered in the literature. Specifically, assume receiver is capable successfully decoding any collision up to including <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$K$ </tex-math></inline-formula> concurrent packet...
The problem of wireless M2M communication is twofold: the reliability aspect and scalability aspect.The solution this demands a delay constrained random access protocol.To end we propose Admission Control based Traffic Agnostic Delay Constrained Random Access (AC/DC-RA) protocol.Our main contribution enabling stochastic constraints agnostic to traffic, such that constraint valid with respect varying number arrivals.We achieve an admission control decision uses novel collision estimation...
The paper presents an indoor testbed evaluation of a multi-hop IEEE 802.15.4e Time Slotted Channel Hopping (TSCH) sensor network, operating in 2.4 GHz band. First goal the is to assess perspectives TSCH, as more reliable version 802.15.4, for meter reading applications Smart Grid. Secondly, we compare network performance two medium access schemes: contention-based and contention-free. We model automatic applications, representing regular metering readings alarm reporting. With this model,...
Emerging technologies enforce strict requirements on future wireless networks such as massive connectivity that cannot be supported with scheduled access. Contention based Non-Orthogonal Multiple Access is a novel technique to overcome by efficient use of resources. However, most the solutions proposed in this direction assumes different loads which would degrade performance significantly if they not hold. To stress these assumptions resource efficiency metric defined and state art are...
Enabling autonomous driving and industrial automation with wireless networks poses many challenges, which are typically abstracted through reliability latency requirements. One of the main contributors to in cellular is reservation-based access, involves lengthy resource-inefficient signaling exchanges. An alternative use grant-free there no resource reservation. A handful recent works investigated how fulfill requirements different flavors solutions. However, efficiency, i.e., throughput,...
In this paper, we analyze binary-tree algorithms in a setup which the receiver can perform multi-packet reception (MPR) of up to and including K packets simultaneously. The analysis addresses both traffic-independent performance as well under Poisson arrivals. For former case, show that throughput, when normalized with respect assumed linear increase resources required achieve K-MPR capability, tends same value holds for single-reception setup. However, coupled arrivals windowed access...
Contention tree algorithm is initially invented as a solution to improve the stable throughput problem of Slotted ALOHA in multiple access schemes. Even though stabilized algorithms, delay requests may grow infinity with respect arrival rate system. Delay depends heavily on exploration structure, i.e., breadth search, or depth search. Breadth search necessary for faster tree. The analytical probability distribution delay, which available mostly not generalizable all In this paper we fill gap...
Age of information (AoI) measures freshness at the receiver. AoI may provide insights into quality service in communication systems. For this reason, it has been used as a cross-layer metric for wireless protocols. In work, we employ to calculate penalty functions centralized resource scheduling problem. We consider single link shared by multiple, heterogeneous control systems where each sub-system time-varying packet loss probability. Sub-systems are competing network resources improve...
Enabling closed control loops via wireless communication has attracted a lot of interest recently and is investigated under the name cyber-physical systems. Under systems one challenging scenario multiple sharing medium, age information to be minimized without sacrificing reliability guarantee stability. The number transmitting devices depends on parameters thus, it stochastic. Wireless uplink resource allocation given low latency constraints for unknown hard problem. For this problem,...
Automation is a key part of the new industrial revolution, that will be enabled by deployment thousands sensors and actuators. The flexible these devices requires wireless connectivity which labeled as internet things, IIoT. sporadic activity pattern IIoT naturally suggest use random access techniques, albeit posing unexplored challenges for current networks. On top demand protocols, latency-reliability requirements further challenge existing protocols. In this work we investigate adaptation...
In this letter, we propose a short-frame (SF) approximation for the packet loss rate of Irregular Repetition Slotted ALOHA (IRSA) particularly suitable very short frames, up to 50 slots. The reason limiting frame size is allow low-latency communications, typical requirement in Industrial Internet Things (IIoT) applications. We extend Error Floor (EF) through recursive evaluation inter-related stopping sets (STs). tighter yields user degree distribution that minimizes (PLR). For scenario with...
In the above article, authors propose <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$d$ </tex-math></inline-formula> -ary SICTA and derive expected conditional length of collision resolution interval, optimal splitting probability maximum stable throughput (MST) for notation="LaTeX">$d \geq 2$ under stationary ergodic packet arrivals. this correction, we show that premise analysis > consequentially...
Multiple routing metrics have been proposed for maximizing throughput or guaranteeing reliable delivery of the data. Some most common used metrics, neglect bursty behavior channel. A new metric improve this by taking burstiness into account. This creates a burst estimation all links and allocates maximum number required slots in worst-case. Even though is solution worst-case scenario, pessimistic approach cannot achieve performance applications with low deadline applications. In order to...
GSM-R (GSM for Railways) is a 2G-based standardized ground-to-train communications system that enabled interoperability across different countries. However, as system, it nearing its lifetime and therefore, will be replaced with 5G-based Future Railway Mobile Communications System (FRMCS). FRMCS expected to bring in new use cases demand low latency high reliability. from mobility perspective, not clear how the reliability achieved. This paper investigates effect of handover procedure on...