Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Cedomir Stefanovic is active.

Publication


Featured researches published by Cedomir Stefanovic.


IEEE Transactions on Industrial Electronics | 2014

Robust Networked Control Scheme for Distributed Secondary Control of Islanded Microgrids

Qobad Shafiee; Cedomir Stefanovic; Tomislav Dragicevic; Petar Popovski; Juan C. Vasquez; Josep M. Guerrero

Distributed secondary control (DSC) is a new approach for microgrids (MGs) by which frequency, voltage, and power can be regulated by using only local unit controllers. Such a solution is necessary for anticipated scenarios that have an increased number of distributed generators (DGs) within the MG. Due to the constrained traffic pattern required by the secondary control, it is viable to implement a dedicated local area communication functionality among the local controllers. This paper presents a new wireless-based robust communication algorithm for the DSC of MGs. The algorithm tightly couples the communication and the control functionality, such that the transmission errors are absorbed through an averaging operation performed in each local controller, resulting in a very high reliability. Furthermore, transmissions from each DG are periodic and prescheduled broadcasts, and in this way, contention over the shared wireless medium is avoided. Real-time simulation and experimental results are presented in order to evaluate the feasibility and robustness endowed by the proposed algorithm. The results indicate that the proposed algorithm is very robust with respect to communication impairments, such as packet delays and random packet losses.


IEEE Transactions on Communications | 2013

ALOHA Random Access that Operates as a Rateless Code

Cedomir Stefanovic; Petar Popovski

Various applications of wireless Machine-to-Machine (M2M) communications have rekindled the research interest in random access protocols, suitable to support a large number of connected devices. Slotted ALOHA and its derivatives represent a simple solution for distributed random access in wireless networks. Recently, a framed version of slotted ALOHA gained renewed interest due to the incorporation of successive interference cancellation (SIC) in the scheme, which resulted in substantially higher throughputs. Based on similar principles and inspired by the rateless coding paradigm, a frameless approach for distributed random access in the slotted ALOHA framework is described in this paper. The proposed approach shares an operational analogy with rateless coding, expressed both through the user access strategy and the adaptive length of the contention period, with the objective to end the contention when the instantaneous throughput is maximized. The paper presents the related analysis, providing heuristic criteria for terminating the contention period and showing that very high throughputs can be achieved, even for a low number for contending users. The demonstrated results potentially have more direct practical implications compared to the approaches for coded random access that lead to high throughputs only asymptotically.


IEEE Communications Letters | 2012

Frameless ALOHA Protocol for Wireless Networks

Cedomir Stefanovic; Petar Popovski; Dejan Vukobratovic

We propose a novel distributed random access scheme for wireless networks based on slotted ALOHA, motivated by the analogies between successive interference cancellation and iterative belief-propagation decoding on erasure channels. The proposed scheme assumes that each user independently accesses the wireless link in each slot with a predefined probability, resulting in a distribution of user transmissions over slots. The operation bears analogy with rateless codes, both in terms of probability distributions as well as to the fact that the ALOHA frame becomes fluid and adapted to the current contention process. Our aim is to optimize the slot access probability in order to achieve rateless-like distributions, focusing both on the maximization of the resolution probability of user transmissions and the throughput of the scheme.


IEEE Communications Magazine | 2015

Coded random access: applying codes on graphs to design random access protocols

Enrico Paolini; Cedomir Stefanovic; Gianluigi Liva; Petar Popovski

The rise of machine-to-machine communications has rekindled interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as waste. However, if the common receiver (e.g. base station) is able to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on a graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded random access protocols are described, as well as a case study on how to upgrade a legacy ALOHA system using the ideas of coded random access.


IEEE Communications Magazine | 2016

Massive machine-type communications in 5g: physical and MAC-layer solutions

Carsten Bockelmann; Nuno Pratas; Hosein Nikopour; Kelvin Kar Kin Au; Tommy Svensson; Cedomir Stefanovic; Petar Popovski; Armin Dekorsy

MTC are expected to play an essential role within future 5G systems. In the FP7 project METIS, MTC has been further classified into mMTC and uMTC. While mMTC is about wireless connectivity to tens of billions of machinetype terminals, uMTC is about availability, low latency, and high reliability. The main challenge in mMTC is scalable and efficient connectivity for a massive number of devices sending very short packets, which is not done adequately in cellular systems designed for human-type communications. Furthermore, mMTC solutions need to enable wide area coverage and deep indoor penetration while having low cost and being energy-efficient. In this article, we introduce the PHY and MAC layer solutions developed within METIS to address this challenge.


global communications conference | 2012

Code-expanded random access for machine-type communications

Nuno Pratas; Henning Thomsen; Cedomir Stefanovic; Petar Popovski

The random access methods used for support of machine-type communications (MTC) in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. Motivated by the random access method employed in LTE, we propose a novel approach that is able to sustain a wide random access load range, while preserving the physical layer unchanged and incurring minor changes in the medium access control layer. The proposed scheme increases the amount of available contention resources, without resorting to the increase of system resources, such as contention sub-frames and preambles. This increase is accomplished by expanding the contention space to the code domain, through the creation of random access codewords. Specifically, in the proposed scheme, users perform random access by transmitting one or none of the available LTE orthogonal preambles in multiple random access sub-frames, thus creating access codewords that are used for contention. In this way, for the same number of random access sub-frames and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the support of an increased number of MTC users. We present the framework and analysis of the proposed code-expanded random access method and show that our approach supports load regions that are beyond the reach of current systems.


IEEE Journal on Selected Areas in Communications | 2016

Assessment of LTE Wireless Access for Monitoring of Energy Distribution in the Smart Grid

Germán Corrales Madueño; Jimmy Jessen Nielsen; Dong Min Kim; Nuno Pratas; Cedomir Stefanovic; Petar Popovski

While LTE has been widely rolled out for human-type services, it is also a promising solution for cost-efficient connectivity of the smart grid monitoring equipment. This is a type of machine-to-machine (M2M) traffic that consists mainly of sporadic uplink transmissions. In such a setting, the amount of traffic that can be served in a cell is not constrained by the data capacity, but rather by the signaling constraints in the random access channel and control channel. In this paper, we explore these limitations using a detailed simulation of the LTE access reservation protocol (ARP). We find that 1) assigning more random access opportunities may actually worsen performance and 2) the additional signaling that follows the ARP has very large impact on the capacity in terms of the number of supported devices; we observed a reduction in the capacity by almost a factor of 3. This suggests that a lightweight access method, with a reduced number of signaling messages, needs to be considered in standardization for M2M applications. Additionally we propose a tractable analytical model to calculate the outage that can be rapidly implemented and evaluated. The model accounts for the features of the random access, control channel, and uplink and downlink data channels, as well as retransmissions.


IEEE Wireless Communications Letters | 2014

Reliable Reporting for Massive M2M Communications with Periodic Resource Pooling

Germán Corrales Madueño; Cedomir Stefanovic; Petar Popovski

This letter considers a wireless M2M communication scenario with a massive number of M2M devices. Each device needs to send its reports within a given deadline and with certain reliability, e.g., 99.99%. A pool of resources available to all M2M devices is periodically available for transmission. The number of transmissions required by an M2M device within the pool is random due to two reasons-random number of arrived reports since the last reporting opportunity and requests for retransmission due to random channel errors. We show how to dimension the pool of M2M-dedicated resources in order to guarantee the desired reliability of the report delivery within the deadline. The fact that the pool of resources is used by a massive number of devices allows basing the dimensioning on the central limit theorem. The results are interpreted in the context of LTE, but they are applicable to any M2M communication system.


transactions on emerging telecommunications technologies | 2013

Code-expanded radio access protocol for machine-to-machine communications

Henning Thomsen; Nuno Pratas; Cedomir Stefanovic; Petar Popovski

The random access methods used for support of machine-to-machine, also referred to as Machine-Type Communications, in current cellular standards are derivatives of traditional framed slotted ALOHA and therefore do not support high user loads efficiently. We propose an approach that is motivated by the random access method employed in LTE, which significantly increases the amount of contention resources without increasing the system resources, such as contention subframes and preambles. This is accomplished by a logical, rather than physical, extension of the access method in which the available system resources are interpreted in a novel manner. Specifically, in the proposed scheme, users perform random access by transmitting orthogonal preambles in multiple random access subframes, in this way creating access codewords that are used for contention. We show that, for the same number of random access subframes and orthogonal preambles, the amount of available contention resources is drastically increased, enabling the massive support of Machine-Type Communication users that is beyond the reach of current systems. Copyright


IEEE Journal on Selected Areas in Communications | 2010

Rateless packet approach for data gathering in wireless sensor networks

Dejan Vukobratovic; Cedomir Stefanovic; Vladimir S. Crnojevic; Francesco Chiti; Romano Fantacci

In this paper, we propose a novel approach for data gathering in wireless sensor networks (WSN) based on distributed rateless codes. Rateless codes are an efficient, lowcomplexity solution for coded data transmission over channels with packet erasures, which motivates their application in distributed network scenarios such as WSN. Recently proposed distributed rateless coding techniques for WSN are node-centric, i.e., collecting sufficient number of different sensor data packets and performing rateless encoding is the task of sensor nodes. In the proposed packet-centric approach, this task is assigned to encoded packets called rateless packets. While randomly moving through the network, rateless packets collect and encode into their content required number of uniformly sampled sensor data packets, completing their paths in randomly selected network nodes. Using this approach, any degree distribution of rateless codes can be exactly obtained. The problem of uniform combining of sensor data into rateless packets, and uniform dispersion throughout the network is addressed. The efficiency of the proposed scheme and comparison with the performance of centralized rateless codes are demonstrated by simulation results.

Collaboration


Dive into the Cedomir Stefanovic's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge