decentralized power control for random access with multi-user detection
DESCRIPTION
Decentralized Power Control for Random Access with Multi-User Detection. Chongbin Xu, Peng Wang, Sammy Chan, and Li Ping. Department of Electronic Engineering City University of Hong Kong December 27, 2012. Reference: - PowerPoint PPT PresentationTRANSCRIPT
![Page 1: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/1.jpg)
1
Decentralized Power Control for Random
Access with Multi-User Detection
Department of Electronic Engineering
City University of Hong Kong
December 27, 2012
Chongbin Xu, Peng Wang, Sammy Chan, and Li Ping
![Page 2: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/2.jpg)
2
Reference:
C. Xu, Li Ping, P. Wang, S. Chan, and X. Lin, “Decentralized Power Control for Random Access with Successive Interference Cancellation” to appear in IEEE JSAC.
![Page 3: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/3.jpg)
3
Overview
Background and Motivation
Decentralized Power Control Two-User AWGN Channel
K-User AWGN Channel
K-User Fading Channel
Conclusions and Future Work
![Page 4: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/4.jpg)
4
Overview
Background and Motivation
Decentralized Power Control Two-User AWGN Channel
K-User AWGN Channel
K-User Fading Channel
Conclusions and Future Work
![Page 5: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/5.jpg)
5
Cognitive Radio with Multiple Primary Users
AP
secondary user 1
secondary user 2
primary user 2primary user 1
Consider a cognitive radio with multiple users. The secondary users can transmit only when the primary users are silent. The secondary users access the channel opportunistically whenever a spectrum hole is detected.
![Page 6: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/6.jpg)
6
System Characteristics
1) There is usually no time to establish centralized control such as TDMA.
2) Thus random access is necessary.
3) If the spectrum holes are scarce, the secondary users may accumulate many un-transmitted packets. Thus is highly probable that each user has a packet to transmit whenever a spectrum hole is detected.
4) This is equivalent to the system with packet arrival rate 1.
![Page 7: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/7.jpg)
7
Collision and Throughput
In random-access systems, a collision will occur if k users transmit their packets simultaneously.
Conventionally, the packets involved in a collision are assumed to be unrecoverable. The system throughout is limited by collision probability.
0
0.1
0.2
0.3
0.4
0.5
0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.2
arrival rate of each user λ
pack
et th
roug
hput
T
When k≥1and k∞, the maximum throughput is 36.8% due to high collision probability
Performance of conventional slotted ALOHA
![Page 8: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/8.jpg)
8
How to improve the random access performance?
![Page 9: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/9.jpg)
9
Multi-Packet Reception (MPR)
In many situations, it is possible to recover some or all packets from a collision. This phenomenon is captured by the multi-packet reception (MPR) model. Early work on MPR model is focused on low-rate CDMA-type applications [1][2].
Both [1] and [2] allow multi-user detection (MUD). However, they are based on the traditional ALOHA with only one non-zero transmission power level.
The work in [3] allows multi-level transmission power but it is limited to single user detection (SUD) only.
[1] S. Ghez, S. Verdu, and S. Schwartz, “Stability properties of slotted ALOHA with multipacket reception capability,” IEEE Trans. Autom. Control, vol. 33, no. 7, pp. 640-649, Jul. 1988.[2] L. Tong and V. Naware, “Signal processing in random access,” IEEE Signal Process. Mag., vol. 21, no.5, pp. 29-39. Sep. 2004.[3] Y. Leung, “Mean power consumption of artificial power capture in wireless networks,” IEEE Trans. Commun., vol. 45, no. 8, pp. 957-964, Aug. 1997.
![Page 10: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/10.jpg)
10
Performance of MPR in Fading Channel
[a] M. H. Ngo, V. Krishnamurthy, and L. Tong, “Optimal channel-aware ALOHA protocol for random access in WLANs with multi-packet reception and decentralized channel state information,” IEEE Trans. Signal Process., vol. 56, no. 6, pp. 2575-2588, Jun. 2008. [b] Y. Leung, “Mean power consumption of artificial power capture in wireless networks,” IEEE Trans. Commun., vol. 45, no. 8, pp. 957-964, Aug. 1997.
R = 1 bit/symbol
standard slotted ALOHA
channel multi-level aware [a] SUD [b]
0
0.5
1
1.5
number of active users K
syst
em th
roug
hput
2 4 6 8 10 12 14 16 18 20
The channel aware technique assume only a single non-zero transmission power level.
The multi-level SUD technique is limited to SUD only.
![Page 11: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/11.jpg)
11
Serial Interference Cancellation
Multi-user detection (MUD) has the potential to solve the problem by serial interference cancellation (SIC) [4][5].
In this case, the signals of the users that have been correctly detected are subtracted from the received signal, and there is no interference to the others.
Assume that the signals of users 1, 2, …, k-1 have been correctly detected and subtracted from the received signal. Then the SINR of user k is given by
2
1
kk
ii k
eSINR
e
+
from remaining interfering users.
[4] T. M. Cover and J. A. Thomas, Elements of Information Theory, New York: Wiley, 2006.[5] D. Tse and P. Viswanath, Fundamentals of Wireless Communications, Cambridge: Cambridge University Press, 2005.
![Page 12: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/12.jpg)
12
Power Requirement for SIC
The following is an illustration of the power requirement for a two-user SIC system. We can recover both packets during an collision.
user 1 decoded first:
2
0
log 1e
RN
0N
2e
1e
user 1 user 2
user 2 decoded second:
1
2 0
log 1e
Re N
transmission power
![Page 13: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/13.jpg)
13
Power Control and Feasible Region
Power control is crucial for MUD. We refer to the closure of power profiles that can support reliable transmissions of all users as feasible power region.
The following is an example of the feasible region for a two-user system with R ≥ 1 bit/symbol, ideal coding and SIC.
E1 = (2R – 1)N0
E2 = (2R – 1)∙(E1 + N0)
1
2
0
(21)(
)
R
e
eN
2
1
0
(21)
(
)
R
e
eN
2 0(2 1)Re N
10
(21)
Re
N
00
1
2
ee
1e
2e
1E 2E
1E
2E
e1=e 2 is the worst-case situation.
![Page 14: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/14.jpg)
14
Feasible Region
When R>1, equal power line is not in the feasible region. If centralized power control is possible, we can allocate the two users with power inside the feasible region. In particular, the power pair (E1, E2) or (E2, E1) leads to
the minimum information theoretic sum-power.
However, how to allocate powers without centralized control?
1
2
0
(21)(
)
R
e
eN
2
1
0
(21)
(
)
R
e
eN
2 0(2 1)Re N
10
(21)
Re
N
00
1
2
ee
1e
2e
1E 2E
1E
2E
E1 = (2R – 1)N0
E2 = (2R – 1)∙(E1 + N0)
![Page 15: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/15.jpg)
15
Objectives
We aim to improve the throughput of random-access systems by allowing MUD at the receiver and decentralize power control at the transmitters.
We will limit our discussions to the simple slotted ALOHA systems. It is expected that the results can be extended to systems with more sophisticated random access protocols such as CSMA.
We will discuss the decentralized power control problems in two-user AWGN channel, K-User AWGN channel, and K-User fading Channel.
![Page 16: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/16.jpg)
16
Overview
Background and Motivation
Decentralized Power Control Two-User AWGN Channel
K-User AWGN Channel
K-User Fading Channel
Conclusions and Future Work
![Page 17: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/17.jpg)
Problem Formulation
17
To improve the performance by optimizing the power distribution f(e).
1
2
0
(21)(
)
R
e
eN
2
1
0
(21)
(
)
R
e
eN
2 0(2 1)Re N
10
(21)
Re
N
00
1
2
ee
1e
2e
1E 2E
1E
2E
e1
e2
e
f(e)
e
f(e)
![Page 18: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/18.jpg)
18
Discrete Power Levels
1
0, 0;
( ), 0.nn
nE
E n
We define a discrete set {En}
with 0 = E0 < E1 < … En < …,
where En is the minimum power
level that guarantees successful decoding of one user when the interference power level from the other user is En–1.
0E 1E 2E 3E0E
1E
2E
3E
4E
4E
1e
2e
1
2
ee
2
1
boun
dary
()
e
e
1
2
boundary
()
e
e
3 2( , )E E
4 3( , )E E2 3( , )E E
3 4( , )E E
2 1boundary e E
11
boun
dary
eE
1 2( , )E E
2 1( , )E E
![Page 19: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/19.jpg)
19
Theorem 1
1
0, 0;
( ), 0.nn
nE
E n
The support of the optimal distribution is a subset of the discrete set {En}.
This theorem greatly simplifies the optimization problem.
0E 1E 2E 3E0E
1E
2E
3E
4E
4E
1e
2e
1
2
ee
2
1
boun
dary
()
e
e
1
2
boundary
()
e
e
2 1( , )E E
3 2( , )E E
4 3( , )E E
1 2( , )E E
2 3( , )E E
3 4( , )E E
2 1boundary e E
11
boun
dary
eE
![Page 20: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/20.jpg)
20
Optimization Problem
Based on Theorem 1, the design problem can be formulated as follows.
20 1{ }
0
0
min imize
subject to 1
0 1, .
n
N
nnp
N
nn
N
n nn
n
p p
p
E p e
p n
Notes: (1) p0 is the probability that a user does not transmit.
(2) pn2 is the probability that both users using the same powers, and so
transmission will fail.
p0 0E 1E 2E 3E0E
1E
2E
3E
4E
4E
1e
2e
1
2
ee
pn2
![Page 21: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/21.jpg)
21
Proof of Theorem 1
Any transmit power E' (E0, E1) is unnecessary since E1 is the minimum power for reliable transmission without interference.
1
2
0
(21)(
)
R
e
eN
2
1
0
(21)
(
)
R
e
eN
2 0(2 1)Re N
10
(21)
Re
N
00
1
2
ee
1e
2e
1E 2E
1E
2E
1
0, 0;
( ), 0.nn
nE
E n
![Page 22: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/22.jpg)
22
Proof of Theorem 1 (Continued)
Provided that the probability of (E0, E1) is zero, any E' (E1, E2) is also unnecessary
since E2 is the minimum power for reliable transmission when the interfering packet
has power E1.
![Page 23: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/23.jpg)
23
Proof of Theorem 1 (Continued)
The above reasoning is generalized to show that E' (En, En+1) is unnecessary for any n.
![Page 24: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/24.jpg)
Example: Packet Throughput Comparison
24
Packet throughput T of a 2-user AWGN channel with ideal coding. R = 1 bit/symbol
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
arrival rate of each user λ
pack
et th
roug
hput
T
0 0.2 0.4 0.6 0.8 1
ML - SICconventional
![Page 25: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/25.jpg)
25
Overview
Background and Motivation
Decentralized Power Control Two-User AWGN Channel
K-User AWGN Channel
K-User Fading Channel
Conclusions and Future Work
![Page 26: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/26.jpg)
26
K-User Systems
To optimize the power distribution in a K-user system, we need to analyze the general K-user feasible region, which is a tedious issue and we will not pursuit it further. Instead, we will discuss a simple and sub-optimal solution.
We refer to a collision involving k (2 ≤ k ≤ K) users as a type-k collision. For the sub-optimal solution, we will only consider type-2 collisions.
In this sub-optimal solution, the system throughput is given by T = T1 + T2,
where T1 is the throughput related to transmissions without collisions and T2
the throughout related to type-2 collisions.
![Page 27: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/27.jpg)
27
Throughput CalculationDenote by pn the probability of transmission power taking value En. We
calculated T1 and T2 as follows. For convenience, we assume full load for all
users. The discussions can be extended to the general loading case.
T1 is the throughput related to transmissions without collisions, calculated
by
T2 the throughout related to type-2 collisions, calculated by
Thus, we have
11 0 0(1 )KT Kp p
2 2 2 22 0 0 0
2 (1 )KK nn
T C p p p
1 2
1 2 2 20 0 0 0 0
(1 ) ( 1) (1 )K Knn
T T T
Kp p K K p p p
![Page 28: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/28.jpg)
28
Throughput Optimization
1 2 2 20 0 0 0 0
(1 ) ( 1) (1 )K Knn
T Kp p K K p p p
1
2
1{ ,... }
01
1
minimize
subject to 1
0 1, .
N
N
nnp p
N
nn
N
n nn
n
p
p p
E p e
p n
To optimize the throughput of the proposed scheme, we discretize the value of p0, and solve the following optimization problem for each discretized p0.
Repeat:
![Page 29: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/29.jpg)
29
Example: Performance Comparison
Performance in a 3-user system with ideal coding. R = 1 bit/symbol.
-6 -4 -2 0 2 4 6average power ē
syst
em th
roug
hput
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
full search
ML-SUD
ML-SIC by only considering type-2 collisions
![Page 30: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/30.jpg)
30
Example: Performance Comparison
Performance comparison among various schemes in AWGN channels with ideal coding and different K. R = 1 bit/symbol.
number of active users K
syst
em th
roug
hput
2 4 6 8 10 12 14 16 18 200
0.1
0.2
0.3
0.4
0.5
0.6
0.7
conventionalML-SUDML-SIC
![Page 31: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/31.jpg)
31
Overview
Background and Motivation
Decentralized Power Control Two-User AWGN Channel
K-User AWGN Channel
K-User Fading Channel
Conclusions and Future Work
![Page 32: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/32.jpg)
32
Fading Channels
Consider a K-user system with fading. The received signal is given by
where the channel gains of all users, {gk}, are assumed to be independent and
identically distributed.
Assume that each user k knows its instantaneous channel gain gk. Our aim is
to optimize the conditional distributions {fT(eT|g)}, with eT the transmit
power, such that the system throughput is maximized.
The basic assumption above is that each user knows its own channel gain. This can be accomplished in different ways. A possible general solution is that the receiver will transmit a beacon signal, which will be used by the transmitters for channel estimation.
1
K
k k kky g e x
![Page 33: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/33.jpg)
33
Channel-Aware ALOHA
As a reference, a channel-aware ALOHA scheme is proposed in [6] based on the following special form of fT(eT|g),
where ET is a predetermined power value and p(g) the transmission
probability when the channel gain is g.
In the following, we will show that the system throughput can be significantly enhanced by jointly optimizing the transmission power levels and the related transmission probabilities.
[6] M. H. Ngo, V. Krishnamurthy, and L. Tong, “Optimal channel-aware ALOHA protocol for random access in WLANs with multi-packet reception and decentralized channel state information,” IEEE Trans. Signal Process., vol. 56, no. 6, pp. 2575-2588, Jun. 2008.
( | ) ( ) ( ) (1 ( )) ( )T T T T Tf e g p g e E p g e
![Page 34: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/34.jpg)
34
Support in Fading ChannelsGiven g, the support of the optimal conditional transmit power distribution fT(eT|g) is a subset of {E0/g, E1/g, E2/g, …..}.
Let (g) be the PDF of g. The received power distribution fR(eR) is given by
With {pn} available, the throughput can be calculated similarly as in AWGN
channels.
We next discuss the optimization of {pn(g)} based on the discretization of g.
0( | ) ( ) ( / )T T n T nn
f e g p g e E g
0( ) ( ),where ( ) ( )R R n R n n nn g
f e p e E p p g g dg
![Page 35: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/35.jpg)
35
Throughput Optimization in Fading Channels
We discretize the value of g according to M+1 thresholds {g(m)|m = 1,…, M+1} and assume that the received power distributions when g [g(m), g(m+1)) are the same, i.e.,
pn(g) = pn(m) for g(m) ≤ g < g(m+1).
We optimize {pn(m)} to maximize the system throughput.
( )
2
1{ }
( )
( ) ( )
1
( )
0
( ) ( )
0
maximize
subject to 0 1, 0,1,..., , 1,...,
, 0,1,...,
1, 1,...,
/
mn
nnp
mn
M m mn nm
N mnn
N m mn nn
p
p n N m M
p p q n N
p m M
p E g
1
M
me
![Page 36: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/36.jpg)
36
Example: Performance Comparison
Performance comparison among various schemes in fading channels with ideal coding and different K. R = 1 bit/symbol.
0
0.5
1
1.5
number of active users K
syst
em th
roug
hput
2 4 6 8 10 12 14 16 18 20
CA-SUD in [6]ML-SIC: M = 10ML-SIC: M = 25
conventional
ML-SIC: M = 40
![Page 37: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/37.jpg)
37
MUD for Practically Coded Systems
We have focused on ideal coding and assume successive interference cancellation (SIC) for MUD in the previous discussions.
We now consider practically coded systems, where IDMA is a simple scheme for MUD with relatively low receiver complexity.
hk
hK
user-1
ENC
user-k
user-K
. ... ..
1
K
k kk
h
r x
x1
xk
xK
1h1
ENC k
ENC K
chip-by-chip Processing
11-1
k
k-1
K
K-1
DEC
DEC
DEC
![Page 38: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/38.jpg)
38
MUD Feasible Region with LDPC CodingThe following is the feasible region of a (3, 6) regular LDPC coded systems with iterative receiver for BER ≤ 10-5. Please note the followings.
1) When powers for both users are low, near equal powers are not feasible.
2) When powers for both users are high, equal powers are feasible.
1
2
3
4
5
6
7
8
01 2 3 4 5 6 7 80
power of user 1
pow
er o
f us
er 2
unfeasible
unfe
asib
le
feasible
feasible
![Page 39: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/39.jpg)
39
Analysis of the Optimal Support
Q Qpoint Q ( , )E E
2 3( , )E E
3 2( , )E E
0
2 1( )e e
1 2( )e e
1e
2e
11
eE
2 1e E
1 2( , )E E
2 1( , )E E
1E2E 3E 4E 5E
1E
2E
3E
4E5E
0
In this case, the support of the optimal power distribution f(∙) is a subset of {E0,
E1, …, En, …, EQ} (for a feasible region with monotonically increasing
boundary function).
![Page 40: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/40.jpg)
40
Example: LDPC Coding
Performance comparison among various schemes in fading channels with LDPC coding and different K. R = 1 bit/symbol
0
0.5
1
1.5
number of active users K
syst
em th
roug
hput
2 4 6 8 10 12 14 16 18 20
CA-SUD in [6]ML-SUD
conventional
ML-SIC
![Page 41: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/41.jpg)
41
Overview
Background and Motivation
Decentralized Power Control Two-User AWGN Channel
K-User AWGN Channel
K-User Fading Channel
Conclusions and Future Work
![Page 42: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/42.jpg)
42
Conclusions
We have developed a decentralized power control scheme for random access systems with MUD.
We proved that the support of the optimal power distribution f is discrete. Based on this finding, we designed f. Numerical results demonstrate that significant performance gain can be obtained by the proposed scheme.
We have limited our focus to slotted ALOHA-type random access schemes. It is expected that the results can be extended to systems with more sophisticated random access protocols such as CSMA.
![Page 43: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/43.jpg)
43
Q & A
Thank you!
![Page 44: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/44.jpg)
44
Introduction: Decentralized Power Control
We study the decentralized power control for ALOHA-type random access scheme with MUD.
2 0(2 1)Re N
00
1 2( , )E E
1 1( , )E E
1e
2e
A
B
1E 2E
1E
2E
Example: f1(2) = f2
(2) = f (2) = 0.5(e) + 0.5(e – E1)
(∙) is the Dirac delta function
![Page 45: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/45.jpg)
45
Merging of Probabilities
For given f, we define a new distribution f[n] constructed as follows.
1
[ ] 0 ( )
( )( )
n
n l l nl
n
e E e Ef e
f e e E
1
where ( )l l
l E e Ef e de
![Page 46: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/46.jpg)
46
Proof of Theorem 1
The distribution pair (f[n+1], f[n]) has a better performance than (f[n], f[n]), n.
a sample of f[n+1] can be equivalently obtained through the following steps:
• Step 1: Draw a power value e1 according to f[n];
• Step 2: If En < e1 < En+1, reduce e1 to En; otherwise, keep e1 unchanged.
Denote by white circles {Ai} power pairs drawn from (f[n], f[n]) while black
circles {Ai'} represent those after the power change in Step 2, which are
also samples drawn from (f [n+1], f[n]).
![Page 47: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/47.jpg)
47
Example: SUD based OptimizationWe also consider optimizing the power distribution for systems with SUD (denoted by ML-SUD for multiple-level transmission and SUD).
The conventional slotted ALOHA can be regarded as a special case of ML-SUD, where the distribution is optimized over two levels E0 = 0 and E1 only.
power changing ∆ in dB
pack
et th
roug
hput
T
0
0.2
0.4
0.6
0.8
1
1.2
1.4
1.6
1.8
2
-4 -2 0 2 4 6 8 10 12
conventional
ML-SUDML-SIC
![Page 48: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/48.jpg)
48
Optimization Problem
Based on Theorem 1, the design problem can be formulated as follows.
20 1{ }
0
0
min imize
subject to 1
0 1, .
n
N
nnp
N
nn
N
n nn
n
p p
p
E p e
p n
Notes: (1) p0 is the probability that a user does not transmit.
(2) pn2 is the probability that both users using the same powers, and so
transmission will fail.
p0
0E 1E 2E 3E0E
1E
2E
3E
4E
4E
1e
2e
1
2
ee
pn2
![Page 49: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/49.jpg)
49
Proof of Theorem 1
0E 1E 2E 3E0E
1E
2E
3E
4E
4E
1e
2e
5E
5E
1e
2e
[4]1( )f e
1
2
ee
2A
1A'1A
'2A
1e
e
[3]1( )f e
[3]2
()
fe
The power change leads to the following three possibilities.a) A1 fails while A1' succeeds. Such
events result in increased throughput; b) A2 succeeds while A2' fails. Such
events cannot happen as f[n](e2) = 0,
e2(En–1, En);
c) In all other situations, both power pairs fail or succeed simultaneously.
![Page 50: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/50.jpg)
50
Example: Power Constraint
System throughput of a four-user Rayleigh fading channel with ideal coding under different power constraints. R = 1 bit/symbol.
-4 -3 -2 -1 0 1 2 3 4 5 60
0.2
0.4
0.6
0.8
1
1.2
transmission power ET
syst
em th
roug
hput
CA-SUDML-SIC
![Page 51: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/51.jpg)
51
Example: Power Distributions
The received power distributions of the ML-SIC scheme in the previous figure.
received power levels
prob
abil
ity
received power distribution at ET = 0 dB
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
received power distribution at ET = 3 dB
E0 E1 E2 E3 E4 E5 E6 E7 E8 E9 E10 E11 E12
![Page 52: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/52.jpg)
52
K-Users Slotted ALOHA Systems
Denote by pi the probability of transmission power taking value Ei. We
calculated T1 and T2 as follows.
T1 is the throughput related to transmissions without collisions.
T2 the throughout related to type-2 collisions.
1 11 0 01
10 0
(1 ) (1 )
(1 ) (1 )
K k k K k kK kk
K
T C C p p
K p p
2 2 2 22 0 02 0
2 2 2 20 0 0
2 (1 ) (1 )
( 1) (1 ) (1 )
K k k K k kK k ik i
Kii
T C C p p p
K K p p p
![Page 53: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/53.jpg)
53
Optimization for Type-2 Collisions
1 2
10 0
2 2 2 20 0 0
(1 ) (1 )
( 1) (1 ) (1 )
K
Kii
T T T
K p p
K K p p p
2
1
Q 0
Q Q 0
Q
minimize
subjectoto 1
0 1,
0 1.
ii
ii
i ii
i
p
p p
E p E p e
p i
p
To optimize the throughput of the proposed scheme, we discretize the value of p0, and solve the following optimization problem for each discretized p0.
Repeat:
![Page 54: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/54.jpg)
54
MUD Feasible Region with LDPC Coding
1
2
3
4
5
6
7
8
01 2 3 4 5 6 7 80
2
1
1
2
innerbound
outer bound
1
2
1power of user 1 e
2po
wer
of
user
2 e
11
eE
2 1e E
outer bound
inner bound
The feasible region of a (3, 6) regular LDPC coded systems with iterative receiver.
![Page 55: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/55.jpg)
55
Example: LDPC Coding
Performance comparison among various schemes in fading channels with LDPC coding and iterative receiver.
0
0.5
1
1.5
number of active users K
syst
em th
roug
hput
2 4 6 8 10 12 14 16 18 20
CA-SUDML-SUDOuterBound
conventional
InnerBound
![Page 56: Decentralized Power Control for Random Access with Multi-User Detection](https://reader036.vdocuments.site/reader036/viewer/2022062805/56814d10550346895dba4dba/html5/thumbnails/56.jpg)
56
Power Requirement for SIC
With SIC, its possible to recover two or more packets involved in a collision even for high-rate transmissions.
For example, if the SINR threshold for successful detection is given by SINRth, the following transmit power profile can lead to successful detection
of all users for MUD.
21 2
2
1
2
th ii
k th ii k
K th
e SINR e
e SINR e
e SINR
decoded first
decoded last
…