ArticlePDF Available

Abstract

We design a self-decision goal-oriented multiple access scheme, where sensing agents observe a common event and individually decide to communicate the event’s attributes as updates to the monitoring agents, to satisfy a certain goal. Decisions are based on the usefulness of updates, generated under uniform, change- and semantics-aware acquisition, as well as statistics and updates of other agents.We obtain optimal activation probabilities and threshold criteria for decision-making under all schemes, maximizing a grade of effectiveness metric. Alongside studying the effect of different parameters on effectiveness, our simulation results show that the self-decision scheme may attain at least 92% of optimal performance.
arXiv:2401.10614v2 [cs.IT] 14 Jun 2024
1
Goal-Oriented Multiple Access Connectivity
for Networked Intelligent Systems
Pouya Agheli, Graduate Student Member, IEEE, Nikolaos Pappas, Senior Member, IEEE,
and Marios Kountouris, Fellow, IEEE.
Abstract—We design a self-decision goal-oriented multiple ac-
cess scheme, where sensing agents observe a common event and
individually decide to communicate the event’s attributes as up-
dates to the monitoring agents, to satisfy a certain goal. Decisions
are based on the usefulness of updates, generated under uniform,
change- and semantics-aware acquisition, as well as statistics and
updates of other agents. We obtain optimal activation probabilities
and threshold criteria for decision-making under all schemes,
maximizing a grade of effectiveness metric. Alongside studying
the effect of different parameters on effectiveness, our simulation
results show that the self-decision scheme may attain at least 92%
of optimal performance.
Index Terms—Goal-oriented multiple access, semantic update
acquisition, optimal activation probability, decision-making
I. INTRO DUC TI ON
GOAL -O RI ENT ED semantic communication holds great
promise for realizing resource-efficient and scalable net-
worked intelligent systems [1], where sensing agents observe
events and convey the events’ attributes to monitoring agents to
achieve a certain goal. Therein, update acquisition, data trans-
mission, and information usage become effective in satisfying
the goal when only useful or significant updates are considered
in the communication lifecycle. The challenge is exacerbated
when the medium is shared, and agents have to commu-
nicate over multiple access channels. Conventional medium
access protocols, such as typed-based ALOHA, grant-based,
and grant-free access, are primarily goal- and effectiveness-
agnostic, sending all frames regardless of their goal-dependent
usefulness and impact at the endpoint. Despite some prior
work [2]–[7], the problem of goal-oriented multiple access and
update provision remains mostly unexplored.
In this letter, we propose a self-decision goal-oriented mul-
tiple access scheme, in which each sensing agent decides
to speak up or remain silent based on the usefulness of its
generated updates and the statistics of the other agents and their
P. Agheli and M. Kountouris are with the Communication Systems De-
partment, EURECOM, Sophia-Antipolis, France, email: {pouya.agheli,
kountour}@eurecom.fr. M. Kountouris is also with the Department of
Computer Science and Artificial Intelligence, University of Granada, Spain.
N. Pappas is with the Department of Computer and Information Science,
Link¨oping University, Sweden, email: nikolaos.pappas@liu.se. The
work of P. Agheli and M. Kountouris has received funding from the European
Research Council (ERC) under the European Union’s Horizon 2020 research
and innovation programme (Grant agreement No. 101003431). The work of N.
Pappas has been supported by the Swedish Research Council (VR), ELLIIT,
and the European Union (ETHER, 101096526).
ISAk1
ISAk
ISAK
NMAm1
NMAm
NMAM
Event
Xn’s DTMC
X1X2
X2
X3
X3X4X5
1 2 3 In
p1,1
p1,In
pIn,1
MAC
MAC
MAC
...
Fig. 1. Goal-oriented medium access in a networked intelligent system.
generated updates for achieving a specific goal. The design
involves computing the optimal activation probabilities of the
agents and a decision-making criterion, which maximizes a
grade of effectiveness metric that integrates the discrepancy
error between actual and reconstructed events, the consumed
resources, and the usefulness of perceived updates. Our results
indicate that the proposed self-decision scheme is very close
to the optimal solution.
II. SY S TE M MO DE L
We consider Kintelligent sensing agents (ISAs) that ob-
serve a common event (information source) and convey their
noisy observations in the form of updates to Mnetworked
monitoring agents (NMAs) over a multiple access wireless
channel prone to errors and universal frequency reuse, c.f.,
Fig. 1. Communication occurs over independent time-slotted
service intervals. Within each interval, all NMAs query for
new observations from the ISAs in the downlink, and the ISAs
respond to those queries in the uplink, providing updates within
the same service interval. The evolution of the source Xtat the
t-th service interval, with tN, belongs to a finite state space.
An event at each state is described via a set of information
attributes, defined by A={Xn|n= 1,2,...,N}. Here,
Xn {x(n)
i|i= 1,2,...,In}is a level-nattribute, which is
modeled by a discrete-time Markov chain (DTMC) with In2
states. In the DTMC modeling the n-th attribute, we assume
pi,i =p
n, and pi,i=pn,i6=i, for i, i= 1,2,...,In,
where p
n+ (In1)pn= 1.
At the t-th interval, the NMAs query for a group of attributes
b
At A represented by the sequence hb
Ati, where |b
At| N.
2
Either queried attribute is independently communicated in one
slot j,j= 1,2,...,|b
At|, with the same order as in hb
Ati.
The levels of queried attributes are determined in line with
the goal to which the NMAs subscribe. The k-th ISA, where
k= 1,2,...,K, can observe only a subset of attributes
Ak A and generate updates from its noisy observations via
an encoder, yielding a codebook shared with the other agents.
Moreover, Kn=hk:Xn Akiis the sequence of ISAs that
can observe the n-th attribute. To estimate the event, the NMAs
need to jointly decode all queried attributes and construct b
Xt
at the t-th service interval. An attribute is correctly perceived
at that interval if at least MtNMAs successfully decode it,
where 1MtM.
A. Goal-Oriented Update Provision
At the time slot order of the n-th queried attribute, the k-
th ISA, k Kn, generates an update from its observation
with probability βk,n , as obtained in Section IV-D, under the
following acquisition schemes [8]:
1) Uniform: An update is generated periodically at each
time slot, regardless of the prior state of the source and
the latest perceived update at the NMAs.
2) Change-aware: An update for an attribute is generated if
the state of that attribute changes at a time slot, regardless
of the latest perceived update.
3) Semantics-aware: Update generation for an attribute is
triggered once there is a discrepancy between the current
actual state of the attribute and that of the latest decoded
one of the same level at the NMAs. In this case, the ISAs
should maintain a record of the last decoded attributes.
The ISA follows a self-decision policy, thanks to which it
individually decides whether to transmit that update relevant
to the n-th attribute with probability αk,n . Each update is
assigned a meta value according to its usefulness in satisfying
the subscribed goal [9]. We consider v(n)
k,i ,k, i, n, the meta
value for the realization x(n)
iat the k-th ISA, and assume
it is assigned based on a knowledge fusion model, as in [9,
Section III-A]. In this work, the self-decision scheme takes the
form of a threshold-based decision policy. Thus, the k-th ISA
speaks up at the j-th slot if v(n)
k,j > v(n)
th,k; otherwise, it remains
silent. The threshold v(n)
th,k, shows a variable decision-making
criterion for the k-th ISA observing the n-th attribute.
B. Transmission Success Probability
As observations are noisy, updates generated from the same
event via different ISAs can be different, which leads to
signal contamination over the wireless network. We consider
hk,m =¯
hk,mda
2
k,m the channel between the k-th ISA and the
m-th NMA, represented by an independent and identically dis-
tributed (i.i.d.) random variable (r.v.) where ¯
hk,m is the small-
scale fading with its power having a cumulative distribution
function (CDF) of Fh2(|¯
hk,m|2) = 1 exp(−|¯
hk,m|2),dk,m
denoting the i.i.d. distance r.v.s, and 2a < 7being the
path-loss exponent. Let us consider γth the signal-to-noise ratio
(SNR) sensitivity. The probability of successful transmission of
the update from the k-th ISA and received at the m-th NMA is
γ(C,I)
k,m,n = PrSNR(C,I)
k,m,n > γth. The channel drop-off occurs
when SNR(C,I)
k,m,n γth, with the probability of 1γ(C,I)
k,m,n.
Here, Cshows the set of collaborating ISAs, and Iis that of
interfering ones. After some algebraic manipulations, we reach
γ(C,I)
k,m,n =X
k∈CkX
k′′∈I "Qk
0∈CkΛ(n)
k
0,m Qk′′
0∈I (n)
k′′
0,m
Λ(n)
k,m +Ω(n)
k′′,m Λ(n)
k,mΨ(n)
k,k,k′′ ,m
×expΛ(n)
k,mγth σ2
m#(1)
where Ck=C {k},Λ(n)
k,m =da
k,m
ρ(n)
k,j
,(n)
k′′,m =da
k′′,m
γthρ(n)
k′′,j
,
Ψ(n)
k,k,k′′ ,m =Y
i∈Ck\{k}
Λ(n)
i,m Λ(n)
k,m
×Y
j∈I\{k′′ }
(n)
j,m (n)
k′′,m ,
σ2
mis the power of the complex additive white Gaussian noise
(AWGN) at the m-th NMA, and ρ(n)
k,j is the transmission power
of the k-th ISA for the n-th attribute at the j-th time slot.
III. PER FO RMA NC E METR ICS
We propose a grade of effectiveness (GoE) metric to evaluate
the effectiveness of communicated updates in the form of
GoE = ϕWT;g1(f1),...,gR(fR), which has RZ+
effectiveness features, with frR+
0for r= 1,2,...,R
denoting the r-th one. Herein, W= [w1,...,wR]TRR,
0wr1, indicates a weight factor, where WT1R×1= 1.
Also, gr:R+
0Ris a positive non-decreasing differentiable
function, and ϕ:R2RRis a context-dependent utility
function [1]. In this letter, we focus on three effectiveness
features to determine the GoE: Effective discrepancy error
(EDE), effective resource consumption (ERC), and effective
utility of updates (EUU).
A. Effective Discrepancy Error (EDE)
Update discrepancy error Etoccurs at the t-th service
interval if the actual event Xtis not equal to the reconstructed
b
Xt, i.e., Et=
1
{Xt6=b
Xt}. The EDE depicts the feature that
the effect of losing information is scaled by its usefulness in
satisfying the goal. Given this, we model the EDE as follows
EDE(Et,b
At;α
α
α, v) = F1X
n:Xn
b
At
Pe,n (2)
where F1=
|
b
At|
X
j=1 "X
k∈Kn
αk,nv(n)
k,j #n:Xn=Xj
,
3
α
α
α= [αk,n]K×N,v= [v(n)
k,j ]K×|
b
AtN,Xjb
Atindicates the
attribute queried at the j-th time slot. We also have
Pe,n = lim
T→∞
1
T
T
X
t=1 PrE(n)
t,j = 1j:Xj
b
At
,(3)
which is the expected discrepancy error probability for the n-th
attribute and is derived according to Proposition 1. In (3), we
define E(n)
t,j =
1
{x(n)
j6=bx(n)
j|t}, and bx(n)
jshows the decoded
realization via the NMAs for the n-th attribute at the j-th slot.
Proposition 1. The expected discrepancy error probability Pe,n
for the n-th attribute is derived as
Pe,n =En(In1)pn
1 + Enh2(In1)pnIn2
In1pn1i(4)
where En=1
2|Kn|P2|Kn|
=1 En,ℓ denotes the probability that the
n-th attribute is not successfully delivered to MtNMAs, where
En,ℓ =Y
k0∈R
(1αk0,n )Y
k1¯
R
αk1,n
×
2|R|
X
τ=1 "Y
k2∈T
τ
(1qk2,n )Y
k3∈Tτ
qk3,n Y
m∈Mk3
1γ(Tτ,T
τ)
k3,m,n #
(5)
where qk,n is the probability that the k-th ISA’s observation is
correct. Moreover, R,R
,Tτ, and T
τare the sets of ISAs that
are active, inactive, active with correct observations, and active
with incorrect observations, respectively. Also, Mk3shows the
subset of Mt+ 1 NMAs being farthest from the k3-th ISA.
Proof: We use the same approach as in [8, Section 3.2]
to derive (4). Considering its definition, the discrepancy error
E(n)
t,j ,t, j, n, follows a DTMC with two possible states {0,1}
and transition probabilities π(n)
a,b = PrE(n)
t+1,j=b|E(n)
t,j =
a,a, b {0,1}, where Xj=Xj=Xn. Therefore, we can
obtain the steady-state error probability Pe,n, as follows
Pe,n =π(n)
0,1
1 + π(n)
0,1π(n)
1,1
.(6)
After computing π(n)
0,1and π(n)
1,1, we insert them into (6) and
obtain (4) after some algebraic manipulations.
B. Effective Resource Consumption (ERC)
The ERC feature allows us to model the resource con-
sumption for communicating updates as a function of its
usefulness. Having time-slotted channels with shared frequency
band, power is the main candidate resource to adapt. Therefore,
we define the transmission power of the k-th ISA at the j-th
time slot as ρ(n)
k,j =fρ(v(n)
k,i ), in the form of a non-decreasing
function fρ:R+
0R+
0of the meta value assigned to x(n)
iat
the j-th slot. In this regard, we can write
ERC( b
At;α
α
α, v) = F2Y
n:Xn
b
At
Sn(7)
where F2=
|
b
At|
X
j=1 "X
k∈Kn
h αk,n
fρ(v(n)
k,j )
v(n)
k,j !#n:Xn=Xj
,
h:R+
0R+
0is a non-decreasing differentiable function, and
Sn= 1 Endenotes the probability of correctly delivering the
n-th attribute to the required number of NMAs.
C. Effective Utility of Updates (EUU)
The EUU feature shapes the utility (usefulness) of updates in
satisfying the goal once the actual event they are representing is
correctly reconstructed at the NMAs. Thereby, the EUU at each
service interval depends on the sum value of the communicated
attributes at that period, modeled as follows
EUU( b
At;α
α
α, v) = F1Y
n:Xn
b
At
Sn.(8)
IV. MULT IP L E ACC ESS DE SIG N
We aim to design a multiple access scheme via obtaining
the set of optimal activation probabilities α
α
α= [α
k,n]K×N,
maximizing the GoE in the system based on the goal. Next,
we find the threshold criteria for decision-making and propose
a self-decision scheme under all update acquisition schemes.
A. Problem Formulation
Based on Section III, we formulate the problem as follows
P1:max
α
α
α,WGoE = ϕWT;g1(f1),...,gR(fR)
s.t. 0α
α
α1,0W1,WT1R×1= 1.(9)
Without loss of generality, we transform the GoE optimiza-
tion in P1to a problem of minimizing the weighted sum of the
EDE and ERC features, named G, subject to guaranteeing that
the EUU exceeds a minimum value denoted by EUUmin at each
service interval. As transmissions are performed independently
among the service intervals, it is sufficient to analyze the
effectiveness problem for an arbitrary t-th period. Then, we can
apply the same access design for the other periods, depending
on b
At,t. Therefore, we can write
P2:min
0α
α
α1,0W1G=
2
X
r=1
wrgr(fr)
s.t. g3EUU( b
At;α
α
α, v)EUUmin,WT13×1= 1 (10)
where f1= EDE(Et,b
At;α
α
α, v), and f2= ERC( b
At;α
α
α, v).
B. Problem Solution
Inserting (2), (7), and (8) into (10), we define the Lagrange
function Lfor P2, and we can write the Karush-Kuhn-Tucker
(KKT) conditions, as follows
L
∂αk,n
=
4
w1"F1∂Pe,n
∂αk,n +Pe,n F1
∂αk,n #g
1
F1X
n:Xn
b
At
Pe,n
+w2Sn"SnF2
∂αk,n +F2Sn
∂αk,n #g
2F2SnSn
ηSn"SnF1
∂αk,n +F1Sn
∂αk,n #g
3F1SnSn
+λk,n = 0,k, n, (11)
where Sn=Qn
b
At\{Xn}Sn. Moreover, we have
L
∂w1
=g1
F1X
n:Xn
b
At
Pe,n
+µ0+µ1= 0,(12)
L
∂w2
=g2F2SnSn+µ0+µ2= 0.(13)
In (11)–(13), η0,µr0,r, and λk,n 0,n:Xnb
At,
k Kn, denote Lagrange multipliers.
The complementary slackness conditions are as below
H1:ηg3F1SnSnEUUmin= 0,
H2:µr(wr1)= 0, r = 1,2,H3:λk,n (αk,n 1) = 0,k , n.
Each of H1to H3holds under two conditions: In H3, we
consider (i) λk,n = 0, hence αk,n <1; or (ii) αk,n = 1, thus
λk,n >0. Under condition (ii), the ISAs are active at all time
slots, which is not optimal according to (4). Thus, we reach
λk,n = 0,k, n. In H2, we assume (i) µr= 0, then wr<1;
or (ii) wr= 1, hence µr>0. Condition (ii) leads one of the
weighting variables to become zero, which is incorrect referring
to P2. Thus, we have µr= 0,r. Given this, we arrive
F2=1
SnSn
g1
2
g1
F1X
n:Xn
b
At
Pe,n
.(14)
Also, for H1, we have (i) η= 0, and g3F1SnSn>EUUmin;
or (ii) g3F1SnSn= EUUmin, and η > 0. Applying (14)
into (11), condition (i) results in negative probabilities. Thus,
condition (ii) is true with g3F1SnSn= EUUmin. From (11),
we obtain
Pe,n =
g1
1ηSnSnEUUmin
2w1
F1Pn:Xn
b
At\{Xn}Pe,n
1/2
.(15)
Putting together (4), (5), and (15), and after some simple
numerical and algebraic manipulations based on the forms of
g1,h, and fρ, the optimal α
k,n,k , n, is derived. We achieve
optimal w
1and w
2by exerting α
α
αinto the Lagrange function
and equalizing the equation L(W) = L(α
α
α). In this regard,
Algorithm 1 is proposed, which provides the optimal values
for the optimization variables with certain stopping accuracy
and convergence rate of O((NiNj)1), where Niand Njare
the maximum numbers of inner and outer loops, respectively.
Algorithm 1: Solution for deriving α
α
αand Wat the
t-th service interval.
Input: Known parameters M,L,p,b
At,Kn,v(n)
k,j ,j, k,
qk,n,γ(C,I)
k,m,n,n, k,EUUmin,ε1
ε1
ε1, and ε2
ε2
ε2. Initial
parameters η(0) 0,α
α
α(0) =0K×|
b
At|, and
W= [0.5,0.5]T. Forms of gr,r,h, and fρ.
Output: Optimal parameters α
k,n,k , n,w
1, and w
2.
1Iteration j:Outer loop
2if conditions H4to H6are met. then goto 3.
3Iteration i:Inner loop
4Consider n=hb
At(c)ic=1 and k=hKn(c)ic=1.
5Update S(i)
n,F(i)
1,F(i)
2(α
α
α), and P(l,i)
e,n,nb
At\ {n}.
6Derive α
k,n from (4), (5), (15), and given αk,n,
n, k Kn\ {k}; update and save α
α
α(i).
7goto 4and repeat for hb
At(c)i|
b
At|
c=2 and hKn(c)i|Kn|
c=2 .
8if α
α
α(i)α
α
α(i1)> ε1
ε1
ε1then set i=i+1, and goto 3.
9Compute w(j)
1and w(j)
2; save W(j).
10 if W(j)W(j1)> ε2
ε2
ε2,W(j)0,W(j)1, or
k,nα(i)
k,n <0then step up η(j),j=j+1, and goto 1.
11 Return α
α
α=α
α
α(i)and W=W(j).
Remark 1. The convexity of Lrelies on the forms of g1,g2,
and g3. For convex g1and g2but concave g3, the dual problem
is definitely convex with the following conditions
H4:F1
∂αk,n
∂Pe,n
∂αk,n
+F1
2
2Pe,n
∂α2
k,n
0,
H5:Sn
∂αk,n
F2
∂αk,n
+Sn
2
2F2
∂α2
k,n
0.
For all being convex, Lis convex if H4,H5, and H6hold, with
H6:ηF1
Sn
∂αk,n
+Sn
F1
∂αk,n g′′
3F1SnSn
w2F2
Sn
∂αk,n
+Sn
F2
∂αk,n g′′
2F2SnSn.(16)
The reverse of Remark 1 is not necessarily true. Exerting
(7), (14), and Remark 1, optimal forms of hand fρare found.
C. Analysis for Large In
We consider Xn,n, has large enough state space, i.e., In
1. In this regime, we achieve lim
In→∞Pe,n =1
2from (4). Besides,
we rewrite (5) and define E(k)
nand b
E(k)
nas below
E(k)
n=P:k∈REn,ℓ
αk,n
,b
E(k)
n=P:k∈R
En,ℓ
1αk,n
.
Thereby, using (15), α
k,n,k , n, is derived as follows
α
k,n =
ηSnEUUmin1b
E(k)
n2w1g1
F1
2(|
b
At|+1)
ηSnEUUminE(k)
nb
E(k)
n.(17)
5
From (17), we infer that α
k,n increases by (i) decreasing the
average usefulness of updates to tackle the high contamination
of useful updates over the channels, (ii) enlarging the set of
queried attributes, and (iii) increasing the EUUmin constraint.
D. Decision Making Criterion
To obtain the threshold criterion v(n)
th,k,k,n Ak, for the
self-decision scheme proposed in II-A, the k-th ISA needs to
timely compute α
k,n,k, n, according to Section IV-B. To this
end, the ISA measures its distance from all NMAs thanks to
the received query signals and has knowledge of Kn, the other
ISAs’ location distribution, update usefulness distributions, and
observation accuracy. We derive the following upper bound for
γk,m,n in (1) by applying the Markov’s inequality
γ(C,I)
k,m,n E
Ck
X
k∈CkX
k′′∈I Qk
0∈CkΛ(n)
k
0,m Qk′′
0∈I (n)
k′′
0,m
Λ(n)
k,m +Ω(n)
k′′,m Λ(n)
k,m3(n)
k′′,m
.
(18)
After equalizing γ(C,I)
k,m,n to its upper bound and using Algo-
rithm 1, α
k,n is derived for the k-th ISA and n-th attribute at
any arbitrary service interval. Eventually, we arrive
v(n)
th,k =F1
V 1min(1,α
k,n
max0, βk,n)! (19)
where FV(v(n)
k,j )indicates the CDF of the update’s meta value.
Also, βk,n shows the scheme-dependent probability that the
k-th ISA generates updates for the n-th attribute, given by
βk,n =
1; uniform
(In1)pn;change-aware
Pe,n(1Inpn) + (In1)pn;semantics-aware
(20)
if k Kn; otherwise, βk,n = 0.
V. SI MU L ATION RE SULTS
We investigate the performance of the proposed self-decision
scheme for satisfying the goal with EUUmin = 0.1. We
consider K= 10,M= 4,In= 10,p
n= 0.2,n,|b
At|= 10,
Mt=M+1
2= 3,t, and qk,n = 0.8,k, n. We also
randomly select a subset of the ISAs constructing Kn,n.
Additionally, we assume that the distance between each pair
of ISA and NMA having a 7 [m]height follows a standard
normal distribution with standard deviation 60 [m], the path-loss
exponent a= 3.8,σ2
m=120 [dBm], and γth = 10 [dB]. The
assignment of a meta value to each update is based on a beta
distribution with both shape parameters equal to 2. Moreover,
g1,g2, and g3have exponential forms, while hand fρare
linear and cubic functions, respectively. To simplify, we assume
αk,n =αk,nand accordingly v(n)
th,k =v(n)
th,k,n, n, k, k.
Fig. 2 illustrates the effect of the meta value threshold, i.e.,
v(n)
th,k,n, k , hence activation probability, on the effectiveness.
The optimization objective of the effectiveness problem, i.e.,
Fig. 2. The objective of P2and its constraint versus the meta value threshold.
Fig. 3. The interplay between the objective of P2and the number of states
in the DTMC for different sizes of required attributes.
Gin P2, and its EUU constraint are plotted versus v(n)
th,k based
on different update acquisition schemes and W= [0.5,0.5]T
using Monte Carlo simulations with 500 iterations. Despite al-
most identical G, the semantics-aware scheme offers the highest
EUU on average. To satisfy EUUmin, as shown in Fig. 2, the
semantics-aware, uniform, and change-aware schemes require
transmission rates of αk,n = 0.6,0.61, and 0.62,k, n,
respectively, under the first root, while they generate updates
with rates of 0.91,1, and 0.8. Thus, we infer that the semantics-
aware scheme poses, averagely, 6.4% less channel load than the
uniform scheme and 5% more than the change-aware one.
To assess the self-decision scheme, we apply Algorithm 1
to derive the set of optimal activation probabilities based on
different schemes and the assumed W. In this case, we reach
αk,n = 0.64,0.64, and 0.67,n, k , for the semantics-aware,
uniform, and change-aware schemes, respectively. Compared to
the derived values from Fig. 2, the accuracy of the self-decision
scheme is more than 92%. More importantly, EUUmin is not
satisfied without our self-decision scheme.
The interplay between Gand the number of states in the
DTMC, i.e., In,n, is depicted in Fig. 3 based on different
values of |b
At|,t. Therein, we plot the lowest value of the
objective that meets EUUmin . We see that increasing Inresults
in higher Gdue to the increase of Pe,n and EDE, accordingly,
concerning (4). Additionally, higher values of |b
At|boost ERC
according to (7), leading to higher G. Thus, the fewer attributes
queried within a service interval, the higher the effectiveness.
6
VI. CO NCL USI ON
We developed a self-decision goal-oriented multiple access
scheme for networked intelligent systems. Aiming to maximize
the GoE, we obtained the optimal activation probabilities and
threshold criteria for decision-making under different update
acquisition schemes. Analyzing how different parameters affect
the effectiveness, our simulation results showed that our pro-
posal could achieve at least 92% of the optimal performance.
REF ERE NC ES
[1] M. Kountouris and N. Pappas, “Semantics-empowered communication for
networked intelligent systems, IEEE Comm. Mag., vol. 59, no. 6, 2021.
[2] G. Mergen and L. Tong, “Type based estimation over multiaccess chan-
nels,” IEEE Trans. Signal Process., vol. 54, no. 2, 2006.
[3] L. Liu, E. G. Larsson, W. Yu, P. Popovski, C. Stefanovic, and E. De Car-
valho, “Sparse signal processing for grant-free massive connectivity: A
future paradigm for random access protocols in the Internet of Things,”
IEEE Signal Process. Mag., vol. 35, no. 5, 2018.
[4] Y. Wu, X. Gao, S. Zhou, W. Yang, Y. Polyanskiy, and G. Caire, “Mas-
sive access for future wireless communication systems, IEEE Wireless
Commun., vol. 27, no. 4, 2020.
[5] A. Munari, “Modern random access: An age of information perspective
on irregular repetition slotted ALOHA,” IEEE Trans. Commun., vol. 69,
no. 6, 2021.
[6] J. Choi, J. Ding, N.-P. Le, and Z. Ding, “Grant-free random access in
machine-type communication: Approaches and challenges, IEEE Wireless
Commun., vol. 29, no. 1, 2021.
[7] S. Daei and M. Kountouris, “Blind goal-oriented massive access for future
wireless networks, IEEE Trans. Signal Process., vol. 71, 2023.
[8] N. Pappas and M. Kountouris, “Goal-oriented communication for real-time
tracking in autonomous systems,” in IEEE ICAS, 2021.
[9] P. Agheli, N. Pappas, and M. Kountouris, “Semantic filtering and source
coding in distributed wireless monitoring systems,” IEEE Trans. Commun.
(Early Access), 2024.
ResearchGate has not been able to resolve any citations for this publication.
Article
Full-text available
The problem of goal-oriented semantic filtering and timely source coding in multiuser communication systems is considered here. We study a distributed monitoring system in which multiple information sources, each observing a physical process, provide status update packets to multiple monitors having heterogeneous goals. Two semantic filtering schemes are first proposed as a means to admit or drop arrival packets based on their goal-dependent importance, which is a function of the intrinsic and extrinsic attributes of information and the probability of occurrence of each realization. Admitted packets at each sensor are then encoded and transmitted over block-fading wireless channels so that served monitors can timely fulfill their goals. A truncated error control scheme is derived, which allows transmitters to drop or retransmit undelivered packets based on their significance. Then, we formulate the timely source encoding optimization problem and analytically derive the optimal codeword lengths assigned to the admitted packets which maximize a weighted sum of semantic utility functions for all pairs of communicating sensors and monitors. Our analytical and numerical results provide the optimal design parameters for different arrival rates and highlight the improvement in timely status update delivery using the proposed semantic filtering, source coding, and error control schemes.
Article
Full-text available
Wireless connectivity has traditionally been regarded as an opaque data pipe carrying messages, whose context-dependent meaning and effectiveness have been ignored. Nevertheless, in emerging cyber-physical and autonomous networked systems, acquiring, processing, and sending excessive amounts of distributed real-time data, which ends up being stale or useless to the end user, will cause communication bottlenecks, increased latency, and safety issues. We envision a communication paradigm shift, which makes the semantics of information (i.e., the significance and usefulness of messages) the foundation of the communication process. This entails a goal-orient-ed unification of information generation, transmission, and reconstruction, by taking into account process dynamics, signal sparsity, data correlation, and semantic information attributes. We apply this structurally new, synergetic approach to a communication scenario where the destination is tasked with real-time source reconstruction for the purpose of remote actuation. Capitalizing on semantics-empowered sampling and communication policies, we show significant reduction in both reconstruction error and cost of actuation error, as well as in the number of uninformative samples generated.
Article
Full-text available
The next wave of wireless technologies will proliferate in connecting sensors, machines, and robots for myriad new applications, thereby creating the fabric for the Internet of Things (IoT). A generic scenario for IoT connectivity involves a massive number of machine-type connections. But in a typical application, only a small (unknown) subset of devices are active at any given instant, thus one of the key challenges for providing massive IoT connectivity is to detect the active devices first and then to decode their data with low latency. This article outlines several key signal processing techniques that are applicable to the problem of massive IoT access, focusing primarily on advanced compressed sensing technique and its application for efficient detection of the active devices. We show that massive multiple-input multiple-output (MIMO) is especially well-suited for massive IoT connectivity in the sense that the device detection error can be driven to zero asymptotically in the limit as the number of antennas at the base station goes to infinity by using the multiple-measurement vector (MMV) compressed sensing techniques. The paper also provides a perspective on several related important techniques for massive access, such as embedding of short messages onto the device activity detection process and the coded random access.
Article
Emerging communication networks are envisioned to support massive wireless connectivity of heterogeneous devices with sporadic traffic and diverse requirements in terms of latency, reliability, and bandwidth. Providing multiple access to an increasing number of uncoordinated users and sharing the limited resources become essential in this context. In this work, we revisit the random access (RA) problem and exploit the continuous angular group sparsity feature of wireless channels to propose a novel RA strategy that provides low latency, high reliability, and massive access with limited bandwidth resources in an all-in-one package. To this end, we first design a reconstruction-free goal-oriented optimization problem, which only preserves the angular information required to identify the active devices. To solve this, we propose an alternating direction method of multipliers (ADMM) and derive closed-form expressions for each ADMM step. Then, we design a clustering algorithm that assigns the users in specific groups from which we can identify active stationary devices by their line of sight (LoS) angles. For mobile devices, we propose an alternating minimization algorithm to recover their data and their channel gains simultaneously, which allows us to identify active mobile users. Simulation results show significant performance gains in terms of active user detection and false alarm probabilities as compared to state-of-the-art RA schemes, even with limited number of preambles. Moreover, unlike prior work, the performance of the proposed blind goal-oriented massive access does not depend on the number of devices.
Article
Massive machine-type communication (MTC) is expected to play a key role in supporting Internet of Things (IoT) applications such as smart cities, smart factories, and connected vehicles through cellular networks. MTC is characterized by a large number of MTC devices and their sparse activities, which are difficult to be supported by conventional approaches and motivate the design of new access technologies. In particular, in the 5th generation (5G), grant-free (GF) or 2-step random access schemes are introduced for MTC to be more efficient by reducing signaling overhead. In this article, we first introduce GF random access and discuss how it can be modified with massive multiple-input multiple-output (MIMO) to exploit a high spatial multiplexing gain. We then explain preamble designs that can improve the performance and variations based on the notions of semi-GF random access and non-orthogonal multiple access (NOMA). Finally, design challenges of GF random access toward next generation cellular systems are presented.
Article
Age of information (AoI) is gaining attention as a valuable performance metric for many IoT systems, in which a large number of devices report time-stamped updates to a central gateway. This is the case, for instance, of remote sensing, monitoring, or tracking, with broad applications in the industrial, vehicular, and environmental domain. In these settings, AoI provides insights that are complementary to those offered by throughput or latency, capturing the ability of the system to maintain an up-to-date view of the status of each transmitting device. From this standpoint, while a good understanding of the metric has been reached for point-to-point links, relatively little attention has been devoted to the impact that link layer solutions employed in IoT systems may have on AoI. In particular, no result is available for modern random access protocols, which have recently emerged as promising solutions to support massive machine-type communications. To start addressing this gap we provide in this paper the first study of the AoI of a scheme in this family, namely irregular repetition slotted ALOHA (IRSA). By means of a Markovian analysis, we track the AoI evolution at the gateway, prove that the process is ergodic, and derive a compact closed form expression for its stationary distribution. Leaning on this, we compute exact formulations for the average AoI and the age violation probability. The study reveals non-trivial design trade-offs for IRSA and highlights the key role played by the protocol operating frame size. Moreover, a comparison with the performance of a simpler slotted ALOHA strategy highlights a remarkable potential for modern random access schemes in terms of information freshness.
Article
Multiple access technology played an important role in wireless communication in the last decades: it increases the capacity of the channel and allows different users to access the system simultaneously. However, the conventional multiple access technology, as originally designed for current human-centric wireless networks, is not scalable for future machine-centric wireless networks. Massive access (studied in the literature under such names as "massive-device multiple access," "unsourced massive random access," "massive connectivity," "massive machine-type communication," and "many-access channels") exhibits a clean break with current networks by potentially supporting millions of devices in each cellular network. The tremendous growth in the number of connected devices requires a fundamental rethinking of the conventional multiple access technologies in favor of new schemes suited for massive random access. Among the many new challenges arising in this setting, the most relevant are: the fundamental limits of communication from a massive number of bursty devices transmitting simultaneously with short packets, the design of low complexity and energy-efficient massive access coding and communication schemes, efficient methods for the detection of a relatively small number of active users among a large number of potential user devices with sporadic transmission pattern, and the integration of massive access with massive MIMO and other important wireless communication technologies. This article presents an overview of the concept of massive access wireless communication and of the contemporary research on this important topic.
Article
We study the problem of communicating sensor readings over a Gaussian multiaccess channel. We focus on the scenario that each sensor observes a single random variable and transmits it using certain signaling in a shared channel. The objective is the design of channel waveforms (i.e., the signal constellation) to facilitate the estimation of field parameters from the channel output. We propose a communication scheme in which sensors transmit according to the type of their observations-type-based multiple access (TBMA)-and show that the TBMA is asymptotically optimal in the limit of large number of sensors if the sensor channel-gains are identical. In particular, we show that TBMA together with a variant of the maximum-likelihood estimator achieves the Cramer-Rao bound asymptotically. We then extend the asymptotic analysis of TBMA to fading channels and compare the performance of TBMA with other orthogonal allocation methods such as time-division multiple access.