Abstract Low Earth Orbit (LEO) satellite networks provide global data service coverage and has become increasingly popular. Uncoordinated access channels reduce data latency in LEO networks by allowing user terminals to transmit data packets at random times to the satellite without any coordination overhead. In this paper, packet acquisition in uncoordinated access channels of LEO networks is studied and a novel solution, called ChirpPair, is proposed, with which the satellite can detect the packets as well as estimating key parameters of the packets for data demodulation. With ChirpPair, the packet preamble consists of a chirp and its conjugate, where a chirp is a complex vector with constant magnitude and linearly increasing frequency. ChirpPair adopts a multi-stage process that gradually increases the estimation accuracy of the parameters without incurring high computation complexity. ChirpPair has been demonstrated in real-world experiments with over-the-air transmissions. ChirpPair has also been evaluated by simulations with the 3GPP New Radio (NR) Non-Terrestrial Network (NTN) channel model and the results show that ChirpPair achieves high accuracy despite its low computation complexity.
more »
« less
Reinforcement Learning Empowered Massive IoT Access in LEO-based Non-Terrestrial Networks
Low-Earth orbit (LEO) satellite (SAT) networks exhibit ultra-wide coverage under time-varying SAT network topology. Such wide coverage makes the LEO SAT network support the massive IoT, however, such massive access put existing multiple access protocols ill-suited. To overcome this issue, in this paper, we propose a novel contention-based random access solution for massive IoT in LEO SAT networks. Not only showing the performance of our proposed approach (see, Table II), but we also discuss the issue of scalability of deep reinforcement learning (DRL) by showing the convergence behavior (see, Table III and IV).
more »
« less
- Award ID(s):
- 2008443
- PAR ID:
- 10433250
- Date Published:
- Journal Name:
- 13th International Conference on Information and Communication Technology Convergence (ICTC)
- Page Range / eLocation ID:
- 1347 to 1350
- Format(s):
- Medium: X
- Sponsoring Org:
- National Science Foundation
More Like this
-
-
With the development of space-air-ground integrated networks, Low Earth Orbit (LEO) satellite networks are envisioned to play a crucial role in providing data transmission services in the 6G era. However, the increasing number of connected devices leads to a surge in data volume and bursty traffic patterns. Ensuring the communication stability of LEO networks has thus become essential. While Lyapunov optimization has been applied to network optimization for decades and can guarantee stability when traffic rates remain within the capacity region, its applicability in LEO satellite networks is limited due to the bursty and dynamic nature of LEO network traffic. To address this issue, we propose a robust Lyapunov optimization method to ensure stability in LEO satellite networks. We theoretically show that for a stabilizable network system, traffic rates do not have to always stay within the capacity region at every time slot. Instead, the network can accommodate temporary capacity region violations, while ensuring the long-term network stability. Extensive simulations under various traffic conditions validate the effectiveness of the robust Lyapunov optimization method, demonstrating that LEO satellite networks can maintain stability under finite violations of the capacity region.more » « less
-
null (Ed.)The number of devices connected to Internet of Things (IoT) and massive machine-type communication (mMTC) networks is expected to increase exponentially in the next generation of wireless communication systems, resulting in a new type of “massive” random access network. However, most of the work in this emerging field considers the single-hop setting with direct communication between the users and a fully-equipped base station. In contrast, this work explores the massive random access problem in a two-hop relay setting where users access the network through a femto- or pico-cell relay which itself only has a limited amount of bandwidth/power. We present two low-complexity relaying schemes designed to minimize power consumption and discuss their tradeoffs using numerical simulations.more » « less
-
The envisioned Internet of Things (IoT) will involve a massive deployment of objects connected through wireless cells. While commercial solutions are already available, the fundamental limits of such networks in terms of node density, achievable rates or reliability are not known. To address this question, this paper uses a large scale Multiple Access Channel (MAC) to model IoT nodes randomly distributed over the coverage area of a unique base station. The traffic is represented by an information rate spatial density ρ(x). This model, referred to as the Spatial Continuum Multiple Access Channel, is defined as the asymptotic limit of a sequence of discrete MACs. The access capacity region of this channel is defined as the set of achievable information rate spatial densities achievable with vanishing transmission errors and under a sum-power constraint. Simulation results validate the model and show that this fundamental limit theoretically achievable when all nodes transmit simultaneously over an infinite time, may be reached even with a relatively small number of simultaneous transmitters (typically around 20 nodes) which gives credibility to the model. The results also highlight the potential interest of non-orthogonal transmissions for IoT uplink transmissions when compared to an ideal time sharing strategy.more » « less
-
The Internet of Things (IoT) is revolutionizing society by connect- ing people and devices seamlessly and providing enhanced user experience and functionalities. However, the unique properties of IoT networks, such as heterogeneity and non-standardized protocol, have created critical security holes and network mismanagement. We propose a new measurement tool for IoT network data to aid in analyzing and classifying such network traffic. We use evidence from both security and machine learning research, which suggests that the complexity of a dataset can be used as a metric to determine the trustworthiness of data. We test the complexity of IoT networks using Intrinsic Dimensionality (ID), a theoretical complexity mea- surement based on the observation that a few variables can often describe high dimensional datasets. We use ID to evaluate four mod- ern IoT network datasets empirically, showing that, for network and device-level data generated using IoT methodologies, the ID of the data fits into a low dimensional representation; this makes such data amenable to the use of machine learning algorithms for anomaly detection.more » « less
An official website of the United States government

