Maximizing the Link Throughput between Smart-meters and Aggregators as Secondary Users under Power and Outage Constraints
June 16, 2015 Β· Declared Dead Β· π Ad hoc networks
"No code URL or promise found in abstract"
Evidence collected by the PWNC Scanner
Authors
Pedro H. J. Nardelli, Mauricio de Castro TomΓ©, Hirley Alves, Carlos H. M. de Lima, Matti Latva-aho
arXiv ID
1506.04830
Category
eess.SY: Systems & Control (EE)
Cross-listed
cs.IT
Citations
23
Venue
Ad hoc networks
Last Checked
1 month ago
Abstract
This paper assesses the communication link from smart meters to aggregators as (unlicensed) secondary users that transmit their data over the (licensed) primary uplink channel. The proposed scenario assumes: (i) meters' and aggregators' positions are fixed so highly directional antennas are employed, (ii) secondary users transmit with limited power in relation to the primary, (iii) meters' transmissions are coordinated to avoid packet collisions, and (iv) the secondary links' robustness is guaranteed by an outage constraint. Under these assumptions, the interference caused by secondary users in both primary (base-stations) and other secondary users can be neglected. As unlicensed users, however, meter-aggregator links do experience interference from the mobile users of the primary network, whose positions and traffic activity are unknown. To cope with this uncertainty, we model the mobile users spatial distribution as a Poisson point process. We then derive a closed-form solution for the maximum achievable throughput with respect to a reference secondary link subject to transmit power and outage constraints. Our numerical results illustrate the effects of such constraints on the optimal throughput, evincing that more frequent outage events improve the system performance in the scenario under study. We also show that relatively high outage probabilities have little effect on the reconstruction of the average power demand curve that is transmitted from the smart-meter to the aggregator.
Community Contributions
Found the code? Know the venue? Think something is wrong? Let us know!
π Similar Papers
In the same crypt β Systems & Control (EE)
R.I.P.
π»
Ghosted
R.I.P.
π»
Ghosted
Incremental Gradient, Subgradient, and Proximal Methods for Convex Optimization: A Survey
R.I.P.
π»
Ghosted
Wireless Network Design for Control Systems: A Survey
R.I.P.
π»
Ghosted
Learning-based Model Predictive Control for Safe Exploration
R.I.P.
π»
Ghosted
Safety-Critical Model Predictive Control with Discrete-Time Control Barrier Function
R.I.P.
π»
Ghosted
Novel Multidimensional Models of Opinion Dynamics in Social Networks
Died the same way β π» Ghosted
R.I.P.
π»
Ghosted
Language Models are Few-Shot Learners
R.I.P.
π»
Ghosted
PyTorch: An Imperative Style, High-Performance Deep Learning Library
R.I.P.
π»
Ghosted
XGBoost: A Scalable Tree Boosting System
R.I.P.
π»
Ghosted