advanced wireless networking and cross-layer optimization
TRANSCRIPT
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 1/ 141 ⇒|
Advanced Wireless Networking and Cross-Layer OptimizationThe Myth of Interference-Free Communications...
Presented by
Lajos Hanzo
School of Electronics and Computer Science,
University of Southampton, SO17 1BJ, UK.
http://www-mobile.ecs.soton.ac.uk
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 2/ 141 ⇒|
Outline
❏ A historical perspective and information-theoretic limits
❏ Research drivers and contradictory design factor
❏ Multiple access techniques and their pros as well as cons
❏ Future-proof multi-carrier transceivers and systems
❏ The benefits and limitations of smart antennas/MIMOs: beamforming, SDMA, SDM as
well as STBC and STTC
❏ The benefits of smart TD, FD and SD spreading in multicarrier systems
❏ A digest of wireless networking considerations and the sensitivity of teletraffic
performance versus receiver SINR performance
❏ The required advanced transceivers and MBER optimization
❏ Improving the per-node capacity of ad hoc networks
❏ Conclusions and open problems
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 3/ 141 ⇒|
Figure 1: Instantaneous Channel SNR for all 512 subcarriers versus time, for an average
channel SNR of 16dB.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 4/ 141 ⇒|
Research Drivers [1]-[9]:
• Researchers are endeavouring to reach information theoretical limits.
• Communications frequency bands have been auctioned at a price in excess of 75
Billion dollars in the US and 22 Billion pounds in the UK.
• Hence halving the bitrate doubles the revenue!
• Halving the bitrate requires exponentially increasing research efforts - BUT IT IS
FUN!
• Contradictory performance factors:
– ’Lossy’ source representation quality for audio, video, etc
– Bitrate
– Error resilience
– Implementation complexity
– Delay
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 5/ 141 ⇒|
Implementationalcomplexity
Channelcharacteristics
Effectivethroughput
bandwidthSystem Bit error
rate
Coding gain
schemeModulation
Coding/
Coding rate
Coding/interleavingdelay
Figure 2: Factors affecting the design of channel coding and modulation schemes [5]
c©John Wiley, 2001, Hanzo, Liew, Yeap.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 6/ 141 ⇒|
1990
2000
1980
1970
1960
1950
Shannon limit (1948)
Elias, Convolutional codes
Viterbi algorithm
Bahl, MAP algorithm
Hamming codes
PGZ algorithm
Wolf, trellis block codes
Chase algorithm
Reed Solomon codesBCH codes
algorithmBerlekamp-Massey
RRNS codes
Ungerboeck, TCM
Berrou, turbo codes
Robertson, Log-MAP algorithm
Koch, Max-Log-MAP algorithmHagenauer, SOVA algorithm
Nickl, turbo Hamming codeHagenauer, turbo BCH code
Alamouti, space-timeblock code
Tarokh, space-time trellis codeRobertson, TTCM
Pyndiah, SISO Chasealgorithm
Convolutional CodesBlock Codes
Acikel, punctured turbo code
Figure 3: A brief history of channel coding [5].
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 7/ 141 ⇒|
Peterson & Weldon, Error correcting codes
Berlekamp, Algebraic coding theoryKasami, Combinational mathematics and its applications
Reed & Solomon, Polynomial codes over certain finite fields
1990
2000
1980
1970
1960
1950
Peterson, Error correcting codes
Mac Williams & Sloane, The theory of error correcting codes
Sklar, Digital communications fundamentals and applications
Blake, Algebraic coding theory: history and development
Clark & Cain, Error correction coding for digital communicationsPless, Introduction to the theory of error-correcting codesBlahut, Theory and practice of error control codes
Wozencraft & Reiffen, Sequential decodingShannon, Mathematical theory of communicationMassey, Threshold decoding
Shannon limit (1948)
Heegard & Wicker, Turbo coding
Bossert, Channel coding for telecommunicationsVucetic & Yuan, Turbo codes principles and applications
Lidl & Niederreiter, Finite fieldsLin & Costello, Error control coding: fundamentals and applicationsMichelson & Levesque, Error control techniques for digital communication
Steele & Hanzo, Mobile radio communications
Hoffman et al., Coding theoryHuber, TrelliscodierungAnderson & Mohan, Source and channel coding - an algorithmic approachWicker, Error control systems for digital Communication and storageProakis, Digital communicationsHonary & Markarian, Trellis decoding of block codesS. Lin et al., Trellises & trellis-based decoding alg. for linear block codesSchlegel, Trellis coding
Szabo & Tanaka, Residue arithmetic & its appl. to computer technology
Sweeney, Error Control Coding: An Introduction
Figure 4: Mile-stones in channel coding [5].
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 8/ 141 ⇒|
[1] L. Hanzo, W.T. Webb, T. Keller: Single- and Multi-carrier Quadrature Amplitude Modulation: Principles and Applications for
Personal Communications, WATM and Broadcasting; IEEE Press-John Wiley, 2000, p 739
(http://www-mobile.ecs.soton.ac.uk)
[2] R. Steele, L. Hanzo (Ed): Mobile Radio Communications: Second and Third Generation Cellular and WATM Systems,
John Wiley-IEEE Press, 2nd edition, 1999, ISBN 07 273-1406-8, p 1064
[3] L. Hanzo, F.C.A. Somerville, J.P. Woodard: Voice Compression and Communications: Principles and Applications for
Fixed and Wireless Channels; IEEE Press-John Wiley, 2001, p 642
[4] L. Hanzo, P. Cherriman, J. Streit: Wireless Video Communications: Second to Third Generation and Beyond, IEEE Press,
2001, p 1093
[5] L. Hanzo, T.H. Liew, B.L. Yeap: Turbo Coding, Turbo Equalisation and Space-Time Coding, John Wiley, 2002, p 751
[6] L. Hanzo, C.H. Wong, M.S. Yee: Adaptive wireless transceivers: Turbo-Coded, Turbo-Equalised and Space-Time Coded
TDMA, CDMA and OFDM systems, John Wiley, 2002, p 737
[7] J.S. Blogh, L. Hanzo: Third-Generation Systems and Intelligent Wireless Networking - Smart Antennas and Adaptive
Modulation, John Wiley, 2002, p 408
[8] L. Hanzo, M. Munster, B.J. Choi and T. Keller: OFDM and MC-CDMA for Broadband Multi-user Communications, WLANs
and Broadcasting, John Wiley - IEEE Press, May 2003, p 980
[9] L. Hanzo, L-L. Yang, E-L. Kuan and K. Yen: Single- and Multi-Carrier CDMA: Multi-User Detection, Space-Time
Spreading, Synchronisation, Standards and Networking, IEEE Press - John Wiley, June 2003, p950
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 9/ 141 ⇒|
The Standard-oriented Perspective on SDRs [9]
• The most recent version of the IMT-2000 standard is in fact constituted by a range of
five independent standards:
– UTRA Frequency Division Duplex (FDD) Wideband Code Division Multiple Access
(W-CDMA) mode
– UTRA Time Division Duplex (TDD) CDMA mode
– Pan-American multi-carrier CDMA configuration mode known as cdma2000
– Pan-American Time Division Multiple Access (TDMA) mode known as UWT-136
– Digital European Cordless Telecommunications (DECT) mode.
• It would be desirable to achieve that future systems become part of this standard
framework without having to define new standards, whilst also supporting legacy
systems, such as GSM, IS-95, etc. The framework proposed in this contribution is
capable of satisfying this requirement.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 10/ 141 ⇒|
The Channel-quality Motivated Perspective on SDRs [9]
• Multiple Spreading Codes
• Variable Spreading Factors
• Variable Rate FEC Codes
• Different FEC Schemes: CC, BCH, TC, TBCH, TCM, TTCM, BICM, BICM-ID
• Turbo Channel Equaliser
• Variable Constellation Size: 1-6bit/symb
• Multiple Time Slots
• Multiple Bands
• Multiple Transmit Antennas
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 11/ 141 ⇒|
In addition to channel-quality motivated reconfigurations the broadband FH/MC
DS-CDMA system may reconfigure [9]:
• Services: Data rate, QoS, real-time or non-real-time transmission,
encryption/decryption schemes and parameters;
• Error Control: CRC, FEC codes, coding/decoding schemes, coding rate, number of
turbo decoding steps, interleaving depth and pattern;
• Modulation: Modulation schemes, signal constellation, partial response filtering;
• PN Sequence: Spreading sequences (codes), chip rate, chip waveform, spreading
factor, PN acquisition and tracking schemes;
• Frequency Hopping: FH schemes (slow, fast, random, uniform and adaptive), FH
patterns, weight of constant-weight codes;
• Detection: Detection schemes (coherent or non-coherent, etc.) and algorithms
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 12/ 141 ⇒|
Algorithm Reconfiguration Examples [9]
• Maximum likelihood sequence detection (MLSD) or minimum mean square estimation
(MMSE), etc.
• Parameters associated with space/time coding as well as frequency diversity
• Beam-forming parameters
• Diversity combining schemes, equalization schemes as well as their related
parameters, such as the number of turbo equalization iterations
• Channel quality estimation algorithms, parameters, etc
• Subchannel bandwidth, power control parameters, etc
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 13/ 141 ⇒|
Adaptive Transceivers and Reconfiguration Regime [6]:
• When the channel quality improves, less robust but more bandwidth-efficient modem
modes can be invoked.
• Data and interactive sources have different integrity and latency constraints, hence
two systems have to be designed.
MS =
No Transmission (0bit/symb) if l1 < s
BPSK (1bit/symb) if l1 ≤ s < l2
QPSK (2bit/symb) if l2 ≤ s < l3
Square 16QAM (4bit/symb) if l3 ≤ s < l4
Square 64QAM (6bit/symb) if s ≤ l4
(1)
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 14/ 141 ⇒|
Downlink (DL)
Signal modem modes
Signal modem modesto be used by BS
Uplink (UL)
Evaluate perceived
channel quality and
Evaluate perceived
channel quality and
signal the requested
MS BS
to be used by MS
transmission mode
to the BS TX
signal the requested
to the MS TX
transmission mode
Figure 5: Closed-loop modem mode signalling in adaptive modems [1, 6]
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 15/ 141 ⇒|
0 5 10 15 20 25 30 35Eb / No(dB)
100
2
3
4
5
6
7
8
910
1
Nor
mal
ised
Cap
acity
(Bits
/s/H
z)
BPSK
4QAM
16QAM
64QAM
Shannon LimitFixed - mean BER 0.01%Fixed - mean BER 1%AQAM - mean BER 0.01%AQAM - mean BER 1%TU Channel
Figure 6: Channel capacity upper bound of adaptive QAM and fixed modulation schemes
over the COST 207 TU Rayleigh Fading channel for BER=1% and BER=0.01% [6].
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 16/ 141 ⇒|
Code
Time
Freq
uenc
y
Freq
uenc
y
Freq
uenc
yTimeTime
User 1
User 2 Use
r 1
Use
r 2
21
User 3
Figure 7: Multiple access schemes: FDMA (left), TDMA (middle) and CDMA (right).
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 17/ 141 ⇒|
A/SF
Signal
B
A
SF · B
Spreading code
A/SF
Interferer
B
A
SF ·BSpreading code
Despreading code
A/SF
A
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 18/ 141 ⇒|
1
-1
1
-1
1
-1
Informationsignal
Signaturesequence
Spreadspectrumsignal
PSfrag replacements
b(t)
a(t)
u(t)
Ts = Nc ×Tc
Tc
Tc
Tc
2Tc
2Tc
2Tc
t
t
t
Figure 8: Time-domain waveforms involved in generating a direct sequence spread signal.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 19/ 141 ⇒|
Powerdensity
Frequency
PSfrag replacements
P watts/Hz
B
Bs = B×N
PN watts/Hz
Figure 9: Power spectral density of signal before and after spreading.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 20/ 141 ⇒|
Tx1
Tx2
TxM
Source
v[ bits ]
-
×
6f0
×
6
×
6
2 f0
M f0
vM [ bit
s ]
vM [ bit
s ]
vM [ bit
s ]
modulators
Subch1
Subch2
SubchM
×
6f0
×
6
×
6
2 f0
M f0
Rx1
Rx2
RxM
demodulators
v[ bits ]
- Sink
Channel
Figure 10: Simplified blockdiagram of the orthogonal parallel modem
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 21/ 141 ⇒|
x14x114
x11x12x112
f
f
f
x4
x3
x2
x1
x5
x7
x6
+1 +1 +1 +1 -1 -1 -1 -1
x13
x8x9
x10
+1
-1
+1
-1
+1 +1 +1-1 -1x15
-1
+1
x16x17
amplitute
x99
t
t
t
y3
y2
y1
Figure 11: Power spectra and time-domain signal of SC DS-CDMA, MC-CDMA and MC
DS-CDMA assuming the same total system bandwidth.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 22/ 141 ⇒|
......
......
......
......... .........
...
...
.
.
.
PSfrag replacements
Q
Serial
∑
data
Serial/
parallel
converter
and
grouping
Side information
Constant-weight
code book
C(Q,U)
Carrier selection
Frequency synthesizer
Constellation
Constellation
Constellation
mapping
mapping
mapping
b0(t)
b1(t)
bU−1(t)
C0
C1
CU−1 ×
×
×
Transmitted
signal
Spreading Multicarrier modulation
d0
d1
dU−1
f1(t) f2(t) fU (t)
1
1
2
2 3 Q
U
Figure 12: Transmitter diagram of the frequency-hopping multicarrier DS-CDMA system
using adaptive transmission [9].
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 23/ 141 ⇒|
Time Domain and Frequency Domain Spreading
❏ Traditional MC DS-CDMA spreads the transmitted signal in the time domain, which
mitigates the effects of TD-fading, but each subcarrier may experience narrow-band
Rayleigh fading, hence the symbol carried by a faded subcarrier may become
corrupted.
❏ This problem may be circumvented by frequency domain (FD) spreading in
MC-CDMA, which is capable of achieving frequency diversity.
❏ Ultimately, joint TD and FD spreading aided MC DS-CDMA has the highest grade of
design flexility.
❏ We will explore the design trade-offs of TF-domain spread MC-CDMA.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 24/ 141 ⇒|
TF-domain Spreading Scheme
. . . . . . . . . . . .ak(t)
sk(t)
∑
cos(ω1t)
cos(ω2t)
cos(ωMt)
×
×
×
×
×
×
×
bk(t)
ck[1]
ck[2]
ck[M]
Figure 13: Transmitter model of MC DS-CDMA. TD-spreading is carried out by the U -chip
code ak and each chip of ak is FD-spread by mapping it to M subcarriers.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 25/ 141 ⇒|
Benefits of Using TF-Domain Spreading in MC DS-CDMA
❐ In TF-domain spread MC DS-CDMA, the total system bandwidth is
related to the product of the T-domain spreading factor and the
F-domain spreading factor. Therefore, both a relatively low-chip-rate
and short spreading codes can be employed in TF-domain spread MC
DS-CDMA schemes;
❐ In TF-domain spread MC DS-CDMA simultaneous users can be
separated in both the T-domain and the F-domain with the aid of unique
signature codes. When the system is appropriately designed, the
multiuser detection complexity of TF-domain spread MC DS-CDMA can
be significantly decreased in comparison to that of a conventional
single-carrier DS-CDMA or MC-CDMA scheme.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 26/ 141 ⇒|
Optional Separate TD and FD Detection
❐ Let {a1(t),a2(t), . . . ,aU(t)} and {c1,c2, . . . ,cM} be the U number of
TD and M number of FD spreading sequences;
❐ Let the total number of users be K. The K number of users are divided
into U user groups. Hence each group has at most K = bK/Ucnumber of users, where bxc represents the smallest integer not less
than x;
❐ The K = bK/Uc number of users belonging to one of the U
user-groups share the same T-domain spreading code, but are
distinguished by their unique F-domain spreading codes.
❐ Each user-group is differentiated by one of the U number of TD
spreading sequences.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 27/ 141 ⇒|
Spreading Codes Exhibiting an IFW
❏ The imperfect correlation properties of classic spreading sequences
such as Walsh codes, m-sequence, Gold Sequence, limit the
achievable system performance.
❏ Using smart spreading codes, such as Large Area Synchronised (LAS)
codes and Generalized Orthogonal Codes (GOC) has the potential of
mitigating this problem.
❏ All these intelligent spreading codes exhibit an IFW.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 28/ 141 ⇒|
Correlation of Several Spreading Sequences
-100
0
100
200
300
Aut
o-co
rr
-30 -20 -10 0 10 20 30Offset
(a) Perfect sequence
-100
0
100
200
300
Aut
o-co
rr
-30 -20 -10 0 10 20 30Offset
(b) Walsh code
-100
0
100
200
300
Aut
o-co
rr
-30 -20 -10 0 10 20 30Offset
(c) Gold code
-100
0
100
200
300
Aut
o-co
rr
-30 -20 -10 0 10 20 30Offset
(d) GO code
Figure 14: Autocorrelations of some spreading sequences
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 29/ 141 ⇒|
Advantages of Having an Interference Free Window
❏ The auto-correlation and cross-correlation function are zero, when the
asynchronous delay-induced offset of the spreading codes is within the
IFW.
❏ No multiple path interference and multiple user interference will be
inflicted within the range of the IFW.
❏ Near-single user performance can achieved without a multiuser
detector.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 30/ 141 ⇒|
Disadvantages of Generalized Orthogonal Codes
❏ The number of generalized orthogonal codes having a certain
spreading gain G is limited.
❏ Accurate uplink timing advance control is necessary for maintaining the
quasi-synchronous relationship of all users for the sake of avoiding MUI.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 31/ 141 ⇒|
Example(2/2)
0
10
20
30
-30 -20 -10 0 10 20 30
|Aut
ocor
rela
tion|
offsets[chip]
(a) Autocorrelation
0
10
20
30
-30 -20 -10 0 10 20 30
|Cro
ssco
rrel
atio
n|
offsets[chip]
(b) Crosscorrelations
Figure 15: The auto- and cross-correlation magnitudes of the F (1)(L,M,Z) = F(32,4,4)
codes, both of which exhibit a four-chip IFW. (a) All four codes of the family exhibit the
same autocorrelation magnitude. (b) The crosscorrelation magnitudes of the four codes
are also identical. L=32 is the code length, while M=4 is the number of codes generated,
finally Z=4 is the IFW width.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 32/ 141 ⇒|
Example: LS(4,4,4)
0 2 4 6 8 10 12 14
−8−6−4−2 0 2 4 6 8 0 2 4 6 8
10 12 14 16
LS code index, p
offset, k
|Rg0,gp |
Figure 16: The magnitudes of aperiodic crosscorrelations between g0 and the other LS
codes. Note in the figure that the different groups of LS codes exhibit IFWs of [−4,+4],
[−3,+3], [−1,+1] and [0], when they are used together with the first LS code g0.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 33/ 141 ⇒|
LAS-CDMA versus Traditional DS-CDMA
0 5 10 15 20 25 3010
−5
10−4
10−3
10−2
10−1
100 G=128, K=32, η=0.2, ι=3, m=1, τ
max=2T
c, L
p=4
Average SNR per bit expressed in dB
BE
R
LAS codesRandom codes
Lr= 3, 2, 1
Figure 17: Performance comparison with different number of the RAKE receiver’s combined paths—
Lr.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 34/ 141 ⇒|
LAS-CDMA versus Traditional DS-CDMA
0 5 10 15 20 25 3010
−5
10−4
10−3
10−2
10−1
100
G=128, K=32, η=0.2, ι=3, m=1, Lr=3, L
p=4,
τmax
[Tc]
BE
R
LAS codesRandom codes
Eb/N
0 = 7dB
Eb/N
0 = 15dB
Eb/N
0 = 25dB
Figure 18: Performance comparison with different maximum delay differences—τmax.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 35/ 141 ⇒|
Extension of the IFW using MC DS-CDMA
❏ The chip duration of the MC DS-CDMA signal can be extended by a
factor of (U ·M).
❏ Hence, the width of the IFW can be extended by a factor of (U ·M) in
comparison to a classic DS-CDMA system, which is attractive in the
context of broadband wireless communication systems.
❏ This beneficial feature allows us to have significantly larger cells, which
result in higher propagation delay differences, as long as the associated
delay does not exceed the IFW width.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 36/ 141 ⇒|
Performance Evaluation (1/2)
10-5
10-4
10-3
10-2
10-1
100
0 2 4 6 8 10 12 14 16 18 20
BE
R
Eb/N0 [dB]
Single user boundK=8K=16K=24K=32
Figure 19: BER versus Eb/N0 performance of the F(L,M,Z) = F(16,8,1) GOC used as the T-
domain spreading code, where each chip of the code is spread to M = 4 subcarriers, each experi-
encing flat Rayleigh fading. L=16 is the code length, while M=8 is the number of codes generated,
finally Z is the IFW width.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 37/ 141 ⇒|
-100
0
100
200
300
Aut
o-co
rr-30 -20 -10 0 10 20 30
Offset
(a) Perfect sequence
-100
0
100
200
300
Aut
o-co
rr
-30 -20 -10 0 10 20 30Offset
(b) Walsh code
-100
0
100
200
300
Aut
o-co
rr
-30 -20 -10 0 10 20 30Offset
(c) Gold code
-100
0
100
200
300
Aut
o-co
rr
-30 -20 -10 0 10 20 30Offset
(d) LAS code
Figure 20: “Magic” Spreading Codes and their Correlations
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 38/ 141 ⇒|
Beamforming MIMOs
Base StationMobile Stations
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 39/ 141 ⇒|
Beamforming and Multipath Diversity
Interference paths
Basestation
Mobile station
Mobile station
Multipath
LOS
Multipath
LOS
Multipath
Basestation
Beam pattern
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 40/ 141 ⇒|
Soft Handover [7]
• The process of soft handovers is based on a make-before-break approach, where a
new communications link is established before the existing link is relinquished due to
the associated link quality degradation.
• The mobile station (MS) continuously monitors the power level of the received PIlot
CHannels (PICH) transmitted from the neighbouring basestations (BSs).
• The power levels of these basestations are compared against two thresholds, Tacc and
Tdrop.
• If the power level is above the basestation’s acceptance threshold, Tacc, then
assuming the basestation is not already in the Active Basestation Set (ABS), it is
added to the ABS.
• If, however, the PICH of a BS in the ABS is found to be below the dropping threshold,
Tdrop, then the BS is removed from the ABS.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 41/ 141 ⇒|
Soft Handover cont’d [7]
• If the threshold Tacc is set to too low a value, then basestations are added
unnecessarily to the ABS, which results in extraneous network resource utilisation.
• Conversely, if Tacc is excessively high, then it is possible that no basestations may
exist within the ABS at the cell extremities.
• A mobile station is in simultaneous communication with two or more basestations
during the soft handover, hence optimal combining of the downlink signals of several
BSs is performed at the MS.
• By contrast, the network invokes selective combining of the MSs’ signals decoded at
each basestation.
• Since a dropped call is less desirable from the user’s point of view, than a blocked call,
two resource allocation queues were invoked, one for new calls and the other - higher
priority - queue, for handovers.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 42/ 141 ⇒|
Soft Handover cont’d [7]
• By forming a queue of the handover requests, which have a higher priority during
contention for network resources than new calls, it is possible to reduce the number of
dropped calls at the expense of an increased blocked call probability.
• A further advantage of the Handover Queueing System (HQS) is that during the time,
while a handover is in the queue, previously allocated resources may become
available, hence increasing the probability of a successful handover.
• A disadvantage of using fixed handover thresholds is that in some locations all the
pilot signals may be weak, whereas in other locations they may all be strong. Hence,
dynamic thresholds are advantageous.
• An additional benefit of using dynamic thresholds is experienced in a fading
environment, where the received pilot strength may drop momentarily below a fixed
threshold and thus may cause an ABS removal and addition.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 43/ 141 ⇒|
Soft Handover cont’d [7]
• However, this basestation may be the only basestation in the ABS, which would result
in a dropped call.
• Using dynamic thresholds this scenario would not have occurred, since the pilot
strength would not have dropped below that of any of the other pilot signals.
Power Control
• Accurate power control is essential in CDMA in order to mitigate the near-far problem,
which affects the network capacity and coverage.
• Closed-loop power control is employed on both the UL and DL.
• The mobiles and basestations estimate the Signal-to-Interference Ratio (SIR) every
0.667ms, or in each timeslot, and compare this estimated SIR to a target SIR.
• If the estimated SIR is higher than the target SIR, then the relevant transmitter is
instructed to reduce its transmit power.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 44/ 141 ⇒|
Power Control cont’d [7]
• Likewise, if the estimated SIR is lower than the target SIR, the associated transmitter
is instructed to increase its transmit power.
• Transmitting at an unnecessarily high power increases the power consumption and
degrades the other users’ signal quality by inflicting excessive co-channel interference.
• Hence, the other users may request a power increase in an effort to maintain their
target link quality, potentially leading to an unstable system.
• If the mobile is in soft handover, and therefore basestation-diversity combining is
performed, then the basestations’ transmit powers are controlled independently.
• Hence, the mobile station may receive different power control commands from the
BSs in its ABS. Thus, the mobile only increases its transmit power, if all of the BSs in
the ABS instruct it to do so.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 45/ 141 ⇒|
Power Control cont’d [7]
• However, if any one of the basestations in the ABS instructs the mobile to decrease its
power, then the mobile will reduce its transmit power.
• This method ensures that the multi-user interference is kept to a minimum, since at
least one basestation has a sufficiently high quality link.
Code Allocation [7]
• The UTRA downlink is assumed to be synchronous under the control of a basestation,
however, the basestations are asynchronous with respect to the other basestations.
• The UMTS channelization codes are known as Orthogonal Variable Spreading Factor
(OVSF) codes, which provide total isolation between different users on the
synchronous downlink under perfect channel conditions, thus perfectly eliminating
intra-cell Multiple Access Interference (MAI).
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 46/ 141 ⇒|
Code Allocation cont’d [7]
• However, the OVSF codes exhibit poor asynchronous cross-correlation properties and
hence the inter-cell MAI may be high, unless the same code is only allocated to BSs
exhibiting a sufficiently high geographic separation.
• By contrast, other codes such as Gold codes, exhibit a low asynchronous
cross-correlation.
• Therefore, cell-specific long codes are used for reducing the inter-cell interference on
the downlink.
• These so-called scrambling codes are Gold codes of 218 −1 chip-duration and each
user served by a given basestation has the same downlink scrambling code.
• There are a total of 512 scrambling codes, potentially allowing the system to assign a
different cell-specific scrambling code to 512 cell sites, which eases the task of code
planning and allocation.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 47/ 141 ⇒|
Code Allocation cont’d [7]
• The downlink OVSF codes are allocated by the basestation, again, facilitating perfectly
interference-free isolation between different users on the synchronous downlink, if the
channel coditions are perfect.
• Thus each user supported by a given basestation has a different downlink OVSF
code, while MSs served by a different basestation may be using the same OVSF code.
• On the asynchronous uplink the MAI is reduced by assigning different scrambling
codes to different users, emphasizing again that the employment of scrambling codes
exhibiting low asynchronous cross-correlation is important.
• The primary scrambling code is constructed from the so-called extended Kasami code
set of length 256, where the short length enables low complexity multi-user detection
to be implemented.
• For single-user detector assisted BSs, a long secondary scrambling code is used,
which is a Gold-code having a length of 241 −1 chips.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 48/ 141 ⇒|
Performance Metrics
• New call blocking probability, PB.
• Call dropping or forced termination probability, PFT . A call is dropped when the lower
of the uplink and downlink SINRs dips consecutively below the outage SINR, where
the BER exceeds 1% a given number of times.
• Probability of a low quality access, Plow, quantifies the chances of either the uplink or
downlink signal quality being sufficiently poor, resulting in a low quality access, where
the BER exceeds 0.5%.
• Probability of outage, Pout , is defined as the probability that the SINR is below the
value at which the call is deemed to be in outage.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 49/ 141 ⇒|
Performance Metrics Cont’d
• Grade-Of-Service (GOS) was defined by Cheng and Chuang as:
GOS = P{unsuccessful or low-quality call accesses}= P{call is blocked}+P{call is admitted}×
P{low signal quality and call is admitted}= PB +(1−PB)Plow. (2)
• In order to determine the number of users that may be supported with adequate call
quality by the network, we have defined a conservative and a lenient scenario which
are formed from a combination of the performance metrics, as follows:
PB ≤ 3%, PFT ≤ 1%, Plow ≤ 1% and GOS ≤ 4%.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 50/ 141 ⇒|
Parameter Value Parameter Value
Noisefloor -100dBm Pilot power -8.5dBm
Frame length 10ms Cell radius 86.8m
Multiple access FDD/CDMA Number of basestations 49
Modulation scheme 4QAM/QPSK Spreading factor 16
Minimum BS transmit power -47.5dBm Min. MS transmit power -47.5dBm
Maximum BS transmit power 17.5dBm Max. MS transmit power 17.5dBm
Power control stepsize 1dB Power control hysteresis 1dB
Low quality (0.5 % BER) SINR 5.2dB Outage (1% BER) SINR 4.8dB
Pathloss exponent -2.0 Size of Active BS Set 2
Average inter-call-time 300s Max. new-call queue-time 5s
Average call length 60s Pedestrian speed 3mph
Maximum consecutive outages 5 Signal bandwidth 5MHz
Target SINR (at BER=0.1%) 6.2 dB
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 51/ 141 ⇒|
4 6 8 10 12 14Target Eb / N0 (SINR) dB
0.0
0.5
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
Max
Car
ried
Tele
traf
fic(E
rlan
gs/k
m2 /M
Hz)
4QAM4-element beamforming2-element beamformingNo beamforming
Figure 21: Mean carried traffic of the UTRA-like FDD cellular network versus the target SINR threshold both
with as well as without beamforming in conjunction with shadowing having a frequency of 0.5 Hz and a standard
deviation of 3dB for a spreading factor of SF=16.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 52/ 141 ⇒|
2 4 6 8 10 12 14
Mean Carried Teletraffic (Erlangs/km2/MHz)
10-3
2
5
10-2
2
Forc
edTe
rmin
atio
nPr
obab
ility
,PFT
OVSF Codes
LS Codes
1%
4-element beamforming2-element beamformingNo beamforming
LS CodesOVSF Codes
Figure 22: Call dropping probability versus mean carried traffic of the UTRA-like FDD cellular network using LS codes andOVSF codes both with as well as without beamforming in conjunction with shadowing having a frequency of 0.5 Hz and a standard
deviation of 3dB for a spreading factor of SF=16.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 53/ 141 ⇒|
2 4 6 8 10 12 14
Mean Carried Teletraffic (Erlangs/km2/MHz)
10-4
2
5
10-3
2
5
10-2
2
Prob
abili
tyof
low
qual
ityac
cess
,Plo
w
OVSF Codes
LS Codes
1%
4-element beamforming2-element beamformingNo beamforming
LS CodesOVSF Codes
Figure 23: Probability of low quality access versus mean carried traffic of the UTRA-like FDD cellular network using LS codesand OVSF codes both with as well as without beamforming in conjunction with shadowing having a frequency of 0.5 Hz and a
standard deviation of 3dB for a spreading factor of SF=16.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 54/ 141 ⇒|
2 4 6 8 10 12 14
Mean Carried Teletraffic (Erlangs/km2/MHz)
-13
-12
-11
-10
-9
-8
-7
-6
-5
-4
Mea
nT
rans
mis
sion
Pow
er(d
Bm
)
OVSF Codes
LS Codes
4 element beamforming2 element beamformingNo beamformingFilled = Downlink, Blank = Uplink
LS CodesOVSF Codes
Figure 24: Mean transmission power versus mean carried traffic of the UTRA-like FDD cellular network using LS codes andOVSF codes both with as well as without beamforming in conjunction with shadowing having a frequency of 0.5 Hz and a standard
deviation of 3dB for a spreading factor of SF=16.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 55/ 141 ⇒|
Traffic (Erl. Power (dBm)
Spr. Code Beamforming Users /km2/MHz) MS BS
OVSF codes No 152 2.65 -9.0 -9.0
OVSF codes 2-elements 242 4.12 -8.28 -7.88
OVSF codes 4-elements 428 7.23 -7.45 -5.40
LS codes No 581 10.1 -8.19 -5.84
LS codes 2-elements 622 10.6 -9.88 -5.53
LS codes 4-elements 802 13.39 -10.57 -4.49
Table 1: Maximum mean carried traffic and maximum number of mobile users that can be supported by the network, whilst
meeting the network quality constraints namely PB ≤ 3%, PFT ≤ 1%, Plow ≤ 1% and GOS ≤ 4%. The carried traffic is expressed
in terms of normalized Erlangs (Erlang/km2/MHz) using OVSF codes and LS codes in conjunction with shadow fading having a
standard deviation of 3 dB and a frequency of 0.5 Hz for a spreading factor of SF=16.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 56/ 141 ⇒|
THE UTRA FDD VERSUS TDD MODES
• Why TDD/CDMA?
– Guarantees flexible and efficient resource utilisation
– Similar nature of the channel in the uplink and downlink renders it
amenable to adaptive modulation
– More suitable for the employment of beamforming
• Extensive study of FDD/CDMA has been carried out
• There is a paucity of capacity results in the literature for TDD/CDMA
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 57/ 141 ⇒|
INTERFERENCE SCENARIO IN TDD/CDMA
Cell 1
MS1
BS1
MS0
BS0
Cell 0
Desired Signals
Base Station to Base Station Interference
Mobile to Mobile Interference
Figure 25: Inter-cell Interference.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 58/ 141 ⇒|
UTRA-TDD FRAME STRUCTURE
10ms
Multiple−switch−point configuration (symmetric DL/UL allocation)
Multiple−switch−point configuration (asymmetric DL/UL allocation)
Single−switch−point configuration (symmetric DL/UL allocation)
Single−switch−point configuration (asymmetric DL/UL allocation)
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 59/ 141 ⇒|
HSDPA-Style Adaptive Transceivers
• When the channel quality improves, less robust but more bandwidth-efficient modem
modes can be invoked.
• Data and interactive sources have different integrity and latency constraints, hence
two systems have to be designed.
MS =
No Transmission (0bit/symb) if l1 > s
BPSK (1bit/symb) if l1 ≤ s < l2
QPSK (2bit/symb) if l2 ≤ s < l3
Square 16QAM (4bit/symb) if l3 ≤ s < l4
Square 64QAM (6bit/symb) if s ≤ l4
(3)
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 60/ 141 ⇒|
Adaptive Transceivers
0 5 10 15 20 25 30 35 40 45 50Average Channel SNR
10-5
2
5
10-4
2
5
10-3
2
5
10-2
2
5
10-1
Bit
Err
orR
ate
0 5 10 15 20 25 30 35 40 45 500
1
2
3
4
5
6
BPS
DataSpeech
BPSBER
Figure 26: Bit Error rate (BER) and Bit/Symbol (BPS) performance of Adaptive Quadrature
Amplitude Modulation (AQAM) in Rayleigh Channel optimised separately for BER=1% and
0.01%
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 61/ 141 ⇒|
16-QAM4-QAM4-QAM
Frame n Frame n+2Frame n+1
Tra
nsm
it p
ow
er
Figure 27: Power control in AQAM
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 62/ 141 ⇒|
0.0 0.5 1.0 1.5 2.0
Mean Carried Teletraffic (Erlangs/km2/MHz)
10-3
2
5
10-2
2
Forc
edTe
rmin
atio
nPr
obab
ility
,PFT
1%
4 element beamforming2 element beamformingNo beamforming
1.0Hz, 3dB shadowing0.5Hz, 3dB shadowingBlank = FDDFilled = TDD
Figure 28: Call dropping probability versus mean carried traffic of the UTRA-like
TDD/CDMA based cellular network both with as well as without beamforming and withshadowing for SF=16.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 63/ 141 ⇒|
0.5 1.0 1.5 2.0 2.5
Mean Carried Teletraffic (Erlangs/km2/MHz)
10-3
2
5
10-2
2
Forc
edTe
rmin
atio
nPr
obab
ility
,PFT
1%
2 element
4 element
4 element beamforming Filled2 element beamforming BlankNo beamforming
1.0Hz, 3dB shadowing0.5Hz, 3dB shadowingFilled = TDD, Blank = FDD
Figure 29: Call dropping probability versus mean carried traffic of the UTRA-like
TDD/CDMA based cellular network both with and without beamforming in conjunc-tion with AQAM as well as with shadowing having a standard deviation of 3 dB for
SF=16.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 64/ 141 ⇒|
f ij
1
2
3
n
2 3 4 5 m
. . .
. . .
. . .
. . .
. . .
. . .
. . .
1 . . .
. . .
1
1
1
1
1
1
1
1
1
1
1
10
0
0 0 0 0 0 0 0
1
10
0
0
0 0
0
0
0 0 0
0 0
0
0
0 0 0
0
0
0
0
0
0 0
0
0
0
0
0
0
0 0 0
000
0 0
0
0
0
00
Timeslot Index
Cell Index
Figure 30: UL/DL timeslot scheduling matrix used by the GA
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 65/ 141 ⇒|
“I have called this principle, by which each slightvariation, if useful, is preserved, by the term of NaturalSelection.”
Charles Darwin, On the Origin of Species, 1859
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 66/ 141 ⇒|
Genetic Algorithm Flowchart❏ Based on Darwinian evolution and selec-
tion
❏ Resistant against local minima problem
❏ Random initialization
❏ Fitness function used to describe the
problem is of key significance
❏ A plausible choice is that of selecting
those slot for UL and DL, which results in
maximising the sum of the UL/DL SINR
❏ The slot-scheduling may also be com-
bined with power control
Initial Population
Evaluation
Selection
Evaluation
Mutation
Crossover
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 67/ 141 ⇒|
GA-aided TDD scheduling performance
0.0 0.5 1.0 1.5 2.0 2.5
Mean Carried Teletraffic (Erlangs/km2/MHz)
2
5
10-2
2
5
Forc
edTe
rmin
atio
nPr
obab
ility
,PFT
1%
No GAP=4 G=25P=20 G=5P=10 G=10
Figure 31: Call dropping probability versus mean carried traffic of the UTRA-like
TDD/CDMA based cellular network both with and without GA-assisted timeslots allo-cation as well as with shadowing having a standard deviation of 3 dB for SF=16.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 68/ 141 ⇒|
CONCLUSIONS
❏ Conventional CDMA systems suffer from various sources of interferences.
❏ Beamforming, AQAM, GA-adided slot scheduling and LS codes have the potential of
substantially improving the network performance.
❏ LS spreading sequences exhibit an IFW. Interference-free parallel wireless channels
can be constructed using LS spreading sequences for transmission in wideband sce-
narios.
❏ Substantial user capacity gains may be achieved with the aid of LS codes, which
have perfect auto-correlation and cross-correlation functions, essentially eliminating
the intra-cell interference.
❏ A low call dropping probability, low mobile and base station transmission powers and a
high call quality has been maintained. LS codes might hold the promise of an increased
network capacity without dramatic changes of the 3G standards.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 69/ 141 ⇒|
Improving the Throughput of DS-CDMA Systems Using
Adaptive Rate Transmissions Based on Variable
Spreading Factor
Lie-Liang Yang and Lajos Hanzo
IEEE VTC2002, Fall, Vancouver, British Columbia, Canada, Sept. 24 - 29, 2002
Dept. of Electronics and Computer Science,
University of Southampton, SO17 1BJ, UK.
Tel: +44 23 8059 3215, Fax: +44 23 8059 4508
Email: [email protected] and [email protected]
http://www-mobile.ecs.soton.ac.uk
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 70/ 141 ⇒|
MOTIVATION AND OUTLINE
• Introduction
• System overview
• Principles of variable spreading factor (VSF) assisted adap-
tive rate transmissions
• Advantages
• Performance results
• Conclusions
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 71/ 141 ⇒|
INTRODUCTION
• DS-CDMA is the prevalent technique in the 3rd-generation (3G) wireless
communication systems
• The capacity of a DS-CDMA system is limited by
– time-varying characteristics of wireless channels
– multiple-access interference (MAI) or multiuser interference (MUI)
• Efficient techniques of increasing the capacity include
– diversity
– multiuser detection
– adaptive rate transmission
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 72/ 141 ⇒|
Our motivation is to show that variable spreading factor
(VSF) based adaptive rate transmissions can be employed
in response to the time-varying multiuser interference (MUI)
level experienced, in order to increase the effective
throughput of DS-CDMA systems
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 73/ 141 ⇒|
SYSTEM OVERVIEW - ASSUMPTIONS
• A single-cell DS-CDMA system is studied, where a single base station
(BS) is located at the center of the cell, while the mobile users are
uniformly distributed in the area covered by the cell
• The maximum number of simulataneous users supported is K
• BPSK data modulation is employed
• Ideal power control is assumed
• The spreading factor N is a function of the number of active users and
the target bit error rate (BER)
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 74/ 141 ⇒|
SYSTEM OVERVIEW - ASSUMPTIONS
• The number of interfering users, Kl can be modelled with the aid of a
Markov chain having K states
...... ......k0
(K −1)µ∆t
1− (K −1)µ∆tλ∆tλ∆tλ∆tλ∆t
µ∆t (k +1)µ∆tkµ∆t
1−λ∆t
1− (λ+ kµ)∆t
k +1k−1 K −1
• It represents a M/M/m/m queueing system, where
• λ: Arrival rate;
• 1/µ: Average service time.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 75/ 141 ⇒|
K=64, =0.35, =0.009, k=k
0 500 1000 1500 2000 2500 3000Normalized time slots, n
0
10
20
30
40
50
60
Num
ber
ofac
tive
inte
rfer
ing
user
s,k
Figure 32: Markov characteristics of the number of active interfering users over the time slot interval of [0,
3000], where K is the maximum number of users.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 76/ 141 ⇒|
K=64, =0.35, =0.009, k=k
1000 1200 1400 1600 1800 2000Normalized time slots, n
0
10
20
30
40
50
60
Num
ber
ofac
tive
inte
rfer
ing
user
s,k
Figure 33: Markov characteristics of the number of active interfering users over the time slot interval of [1000,
2000].
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 77/ 141 ⇒|
Based on the results of Fig.32 and Fig.33, we observe that
• the number of active interfering users is a slowly time-variant variable,
• it fluctuates as a function of the normalized time slot index.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 78/ 141 ⇒|
c=0 dB
N=8,16,24,40,56,80,112,120
0 10 20 30 40 50 60Number of active users, Kl+1
10-5
10-4
10-3
10-2
10-1
100
BE
R,P
e
Figure 34: BER performance versus the number of active users for the parameters of γc = 0dB and spreading
factors of N = 8,16,24,40,56,80,112,120.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 79/ 141 ⇒|
WHY VSF-BASED ADAPTIVE RATE TRANSMISSION
Based on the results of Fig.32, Fig.33 and Fig.34, we have the following
conclusions:
• An appropriate spreading factor can be employed within a specific time
slot for maximizing the number of bits transmitted in this specific time
slot, while maintaining the required constant target BER performance
• When the number of active users dynamically fluctuates, variable
spreading factors (VSF) can be employed by the DS-CDMA system for
achieving the maximum throughput, while guaranteeing the required
BER performance.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 80/ 141 ⇒|
VSF-BASED ADAPTIVE RATE TRANSMISSIONS INDS-CDMA SYSTEMS - PRINCIPLE
The transmission rate is adapted in response to the multiuser interference
(MUI) level
• the mobile users increase their transmission rates by employing lower
spreading factors, when the number of active interfering users
decreases;
• By contrast, the mobile users decrease their transmission rates by
employing higher spreading factors, in response to an increased
number of active interfering users.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 81/ 141 ⇒|
VSF-BASED ADAPTIVE RATE TRANSMISSIONS INDS-CDMA SYSTEMS - ADVANTAGES
• The rate adaption of each active user may be controlled independently;
• The adaptive-rate transmission scheme imposes no extra interference
on the system. An active user’s interference environment is affected
only by the number of active users corresponding to a certain level of
MUI, but not by their individual transmission rates;
• For DS-CDMA systems, where some active users may communicate at
constant rates, the BER and throughput of the active users
communicating at constant rates is not affected by those
communicating using adaptive rate transmissions.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 82/ 141 ⇒|
K=64, k=k , PE=0.01
Adaptive
non-adaptive
=0.4 =0.006
=0.35 =0.009=0.2 =0.01
-15.0 -12.5 -10.0 -7.5 -5.0 -2.5 0.0 2.5 5.0SNR/chip, c (dB)
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Thr
ough
put,
bits
/chi
p
Figure 35: Throughput performance comparison of the constant spreading factor assisted non-adaptive DS-
CDMA scheme and the VSF-assisted adaptive DS-CDMA arrangement.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 83/ 141 ⇒|
K=64, k=k , PE=0.01
Adaptive
non-adaptive
=0.4 =0.006
=0.35 =0.009=0.2 =0.01
-15.0 -12.5 -10.0 -7.5 -5.0 -2.5 0.0 2.5 5.0SNR/chip, c (dB)
10-3
2
5
10-2
2
5
10-1
BE
R
Figure 36: BER performance comparison between the constant spreading factor assisted non-adaptive DS-
CDMA and the VSF-assisted adaptive DS-CDMA schemes, when they achieve the effective throughputs of Fig.35.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 84/ 141 ⇒|
CONCLUSIONS
• By employing VSF-assisted adaptive rate transmissions, the effective
throughput of a DS-CDMA system may be increased by 40% upon
exploiting the Markovian distributed number of active users in the
system.
• The increased effective throughput is achieved:
– without wasting power
– without imposing extra interference upon other users
– without increasing the bit error rate (BER).
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 85/ 141 ⇒|
Further applications of multiple
antennas in wireless communications
• Beamforming
• SDMA
• SDM
• STTC and STBC
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 86/ 141 ⇒|
Beamforming [7] Typically λ/2-spaced antenna elements are used for the sake of creating a spa-
tially selective transmitter/receiver beam. Smart antennas using beamforming
have been employed for mitigating the effects of co-channel interfering signals
and for providing beamforming gain.
Spatial Diversity [5] and
Space-Time Spreading
(STBC and STTC)
In contrast to the λ/2-spaced phased array elements, in spatial diversity
schemes, such as space-time block or trellis codes [5] the multiple antennas are
positioned as far apart as possible, so that the transmitted signals of the different
antennas experience independent fading, resulting in the maximum achievable
diversity gain.
Space Division Multiple
Access (SDMA)
SDMA exploits the unique, user-specific ”spatial signature” of the individual users
for differentiating amongst them. This allows the system to support multiple users
within the same frequency band and/or time slot.
Space Division Multiplex-
ing (SDM) [Foschini 1996]
MIMO systems also employ multiple antennas, but in contrast to SDMA arrange-
ments, not for the sake of supporting multiple users. Instead, they aim for increas-
ing the throughput of a wireless system in terms of the number of bits per symbol
that can be transmitted by a given user in a given bandwidth at a given integrity.
Table 2: Applications of multiple antennas in wireless communications:The four MIMOs
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 87/ 141 ⇒|
Capacity of MIMO SystemsDiscrete-Input Continuous-Output Memoryless Channel (DCMC)
❏ The Full-multiplexing-gain sys-
tem has a higher asymptotic ca-
pacity as a benefit of its multi-
plexing gain.
❏ The gap between the capacity
curves of the Rayleigh fading
channel and the AWGN channel
is narrower for the full-diversity
system as a benefit of its diver-
sity gain.
ray-capacity-mimo-16qam-3.gle
-10 0 10 20 30SNR (dB)
0
1
2
3
4
5
6
7
8
9
10
11
C(b
it/sy
mbo
l)..........
.........
......
..................
......
..........
......................
......................
.........
......
......
......
........
...................
.....
...............
......
........................
....................................
....................
........
......
......
.......
.......
...........................
Nt = Nr = 2
. Multiplexing
RayleighAWGN
16-QAM, D=4
16-QAM, D=2
16-QAM, D=4
16-QAM, D=2
Diversity
The capacity of D = 2 and 4 dimensional 16QAM-based
MIMO DCMC uncorrelated Rayleigh-fading channel and
AWGN channel.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 88/ 141 ⇒|
Space-Time Processing
Detection methods
Space-Time Processing Applications
Point-to-Point Point-to-Multipoint
BLAST/SDM STC
UplinkDownlink
D-BLAST SDMD
SDMABeamforming
MUD
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 89/ 141 ⇒|
Spatial Division Multiplexing Detection Techniques.
SDMD/MUD
Linear Detection Non-Linear Detection
LS MMSE ML SIC GA-MMSE OHRSA-ML
Log-MAP OHRSA-Log-MAP SOPHIE
• Various Space Division Multiplexing (SDM) detection methods have been studied in the context of
BLAST-type systems and their achievable performances have been evaluated using extensive computer
simulations.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 90/ 141 ⇒|
Genetic Algorithm Assisted Minimum Bit Error Rate
Multiuser Detection in Multiple Antenna Aided OFDM
M. Y. Alias, S. Chen and L. Hanzo
VTC Fall, LA, USA, September 26-29, 2004
School of Electronics and Computer Science,
University of Southampton, SO17 1BJ, UK.
Tel: +44 23 8059 3125, Fax: +44 23 8059 4508
Email: {mya00r, sqc, lh}@ecs.soton.ac.uk
http://www-mobile.ecs.soton.ac.uk
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 91/ 141 ⇒|
OUTLINE
❏ Introduction
❏ References
❏ Motivation
❏ System Model: SDMA
❏ System Model: Exact MBER Multiuser Detection
❏ System Model: Genetic Algorithm
❏ Simulation results
❏ Complexity comparison
❏ Conclusions
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 92/ 141 ⇒|
INTRODUCTION
❏ In an effort to increase the achievable system capacity of an OFDM system,
antenna arrays can be employed for supporting multiple users in a Space
Division Multiple Access (SDMA) communications scenario.
❏ A variety of linear multiuser detectors have been proposed for performing
the separation of OFDM users based on their unique, user-specific, spatial
signature provided that their channel impulse response was accurately esti-
mated.
❏ The most popular design strategy is constituted by the low-complexity mini-
mum mean-squared-error (MMSE) multiuser detector (MUD).
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 93/ 141 ⇒|
REFERENCES
1. P. Vandenameele, L. Van Der Perre, M. G. E. Engels, B. Gyselinckx, and H. J. De Man, “A
Combined OFDM/SDMA Approach,” IEEE Journals of Selected Areas in Communications, vol.
18, no. 11, pp. 2312–2321, November 2000.
2. L. Hanzo, M. Munster, B. J. Choi and T. Keller, OFDM and MC-CDMA, John Wiley and IEEE
Press, West Sussex, England, 2003.
3. B. Mulgrew and S. Chen, “Adaptive Minimum-BER Decision Feedback Equalizers for Binary
Signalling,” EURASIP Signal Processing Journal, vol. 81, no. 7, pp. 1479–1489, 2001.
4. C.-C. Yeh and J. R. Barry, “Adaptive Minimum Bit-Error Rate Equalization for Binary Signalling,”
IEEE Transactions on Communications, vol. 48, no. 7, pp. 1226–1235, July 2000.
5. M. Y. Alias, A. K. Samingan, S. Chen, and L. Hanzo, “Multiple Antenna Aided OFDM Employing
Minimum Bit Error Rate Multiuser Detection,” IEE Electronics Letters, vol. 39, no. 24, pp. 1769–
1770, 27 November 2003.
6. D. E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning, Addison-
Wesley, Reading, Massachusetts, 1989.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 94/ 141 ⇒|
MOTIVATION
❏ However, as recognised in the literature, a better strategy is to choose the linear detec-
tor’s coefficients so as to directly minimise the error-probability or bit-error rate (BER),
rather than the mean-squared error (MSE).
❏ This is because minimising the MSE does not necessarily guarantee that the BER of
the system is also minimised. The family of detectors that directly minimises the BER
is referred to as the minimum bit-error rate (MBER) detector.
❏ In [5] we have derived the exact MBER MUD weight calculation for the uplink SDMA
OFDM system, and shown that the MBER MUD may significantly outperform the
MMSE MUD in terms of the achievable BER in a two-user OFDM scenario
❏ In this contribution, we will investigate the performance of the proposed MBER MUD
with the assistance of genetic algorithm for finding the MUD’s weight vectors, as an
alternative to the simplified conjugate gradient (CG) algorithm of [5].
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 95/ 141 ⇒|
SYSTEM MODEL: SDMA
User L Modulator
bL
User 22b
User 1 Modulator1b
+
n
x P
P
1n
+x 1
+x
n 2
2Modulator
Channel
Mul
tiuse
r D
etec
tor
s
1H
H 2H P
H 2H P
H 2
H
s
^
^1
2
Ls
s1
1
1
2
2
1H
2
H 1L
L
LP
2
1
sL Lb
2b
1bs
^
^
^
Figure 37: Schematic of an antenna array aided OFDM uplink scenario,
where each of the L users is equipped with a single transmit antenna and
the BS’s receiver is assisted by a P-element antenna front-end.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 96/ 141 ⇒|
SYSTEM MODEL: SDMA (CONT’D)
❏ The set of complex signals received by the P-element antenna array can be
represented as:
x = Hs+n = x+n, (4)
where the received signals x, the transmitted signals s and the array noise
vector n, respectively, are given by:
x = (x1,x2, . . . ,xP)T , (5)
s = (s1,s2, . . . ,sL)T , (6)
n = (n1,n2, . . . ,nP)T , (7)
and x represents the noiseless component of x. The frequency domain chan-
nel transfer function matrix H of dimension P×L is constituted by the set of
channel transfer function vectors of the L users.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 97/ 141 ⇒|
SYSTEM MODEL: SDMA (CONT’D)
❏ For linear multiuser detectors, the estimate s of the transmitted signal vector
s of the L simultaneous users is generated by linearly combining the signals
received by the P different antenna elements at the BS with the aid of the array
weight matrix W, resulting in:
s = WHx. (8)
❏ At the current state-of-the-art, the most popular MUD strategy is the MMSE
design, where wl is chosen as the unique vector minimising the MSE ex-
pressed as MSE = E[(sl − sl)2], namely as:
wl(MMSE) = (HHH +2σ2nI)−1Hl , (9)
where Hl is the l-th column of the system matrix H.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 98/ 141 ⇒|
MSE and BER Surface
Error surfaces at the receiver’s
output calculated for five BPSK
modulated sources having
equal received power and
communicating over AWGN
channels at SNR=10 dB.-2-1.5
-1-0.5
0 0.5
1 1.5
2
Re{w1}
-2-1.5-1-0.5 0 0.5 1 1.5 2
Re{w2}
0 2 4 6 8
10 12 14
MSE
-0.5 0 0.5
1 1.5
2 2.5
Re{w1}
-0.5 0
0.5 1
1.5 2
2.5
Re{w2}
-6
-5
-4
-3
-2
-1
0
log10(BER)
The imaginary part of both weights of the 2-element array was fixed.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 99/ 141 ⇒|
SYSTEM MODEL:EXACT MBER MULTIUSER DETECTION
Figure 38: An example of the complex, irregular shape BER
cost function of a 2-user SDMA/OFDM system supported by two
receiver antennas.
❏ The MBER solution is defined as:
wl(MBER) = argminwl
PE(wl). (10)
❏ However, the complex, irregular
shape of the BER cost function pre-
vents us from deriving a closed-form
solution for the MBER MUD weights.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 100/ 141 ⇒|
SYSTEM MODEL:EXACT MBER MULTIUSER DETECTION (CONT’D)
❏ Therefore in practice an iterative strategy based on the steepest-descent gradient
method can be used for finding the weights of the MBER solution.
❏ According to this method, the linear MUD’s weight vector wl is iteratively updated,
commencing for example from the MMSE weights, until the weight vector that ex-
hibits the lowest BER is arrived at.
❏ In each step, the weight vector is updated according to a specific step-size, µ,
in the vectorial direction in which the BER cost function decreases most rapidly,
namely in the direction opposite to the gradient of the BER cost function.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 101/ 141 ⇒|
SYSTEM MODEL: GAUse the probability of error
functionequation as the objective
Start GA
Is terminationcriterion met?
Initialisation
Evaluation
No
Evaluation
Mutation
Crossover
Selection Decisiontaken
Finish GA
Convert binary string to weightvalues
Yes
Figure 39: Flowchart of the BER optimisation using a
GA.
❏ Even though the MBER detector of [5] is ca-
pable of maintaining a good performance, the
convergence of the algorithm is sensitive to
the choice of the algorithm’s parameters.
❏ An attractive method that might be able to
assist the MBER MUD in circumventing the
above-mentioned problems is constituted by
the family of genetic algorithms (GA) [6].
❏ GAs may be invoked in robust global search
and optimisation procedures that do not re-
quire the knowledge of the objective function’s
derivatives or any gradient-related information
concerning the search space.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 102/ 141 ⇒|
SIMULATION RESULTSParameter Value or type
SDMA 4 users and 4 receiver antennas
OFDM 128 subcarriers and 32 cyclic prefix
GA
Population size 30
Number of generations 100
Probability of mutation 0.01
Crossover type Single-point crossover
Probability of crossover 0.6
Genome type Binary string
Encoding/decoding Binary encoding and decoding
Channel impulse response h(z) = 0.8854+0.3504z−6
+0.2881−11, dispersive Gaussian channel [2]
Table 3: Parameters for the GA simulations.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 103/ 141 ⇒|
SIMULATION RESULTS (CONT’D)
0 5 10 15 20 25 30 35 40Average SNR (dB)
10-7
10-6
10-5
10-4
10-3
10-2
10-1
100
Ave
rage
BE
R
1-user 1-antenna AWGNGA MBER DetectorCG MBER DetectorMMSE Detector
Figure 40: The average BER performance of the four
different users characterised in an SDMA system employ-
ing four receiver antennas and 128-subcarrier OFDM for
communicating over the OFDM symbol-invariant disper-
sive Gaussian channel given in Table 3.
❏ The parameters used for our simulations are
outlined in Table 3.
❏ A dispersive Gaussian channel was used,
where the z-domain transfer function associ-
ated with the CIR is given by h(z) = 0.8854+
0.3504z−6 +0.2881z−11 [2].
❏ As a starting point, we used binary type
genomes [6] for representing the GA’s individ-
uals. The GA’s termination criterion is consti-
tuted by the maximum affordable number of
generations.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 104/ 141 ⇒|
COMPLEXITY COMPARISON
010-7
10-6
10-5
10-4
10-3
10-2
10-1
4000 8000 12000 16000 20000Complexity
-7
-6
-5
-4
-3
-2
-1L
og10
(Ave
rage
BE
R)
MMSE MUDGA MBERCG MBER
Figure 41: The BER performance of User 1 versus
complexity for the GA and CG MBER MUD invoked in
the OFDM/SDMA system employing P = 4, L = 4 and
128-subcarrier OFDM for communicating over the symbol-
invariant dispersive Gaussian channel given in Table 3 at
SNR = 15 dB.
❏ The complexity of the CG algorithm is proportional to the
number of iterations used for finding the MBER solution on
the BER surface.
Compl{CG} ' Max. number of iter. (11)
❏ If we used the maximum number of generations as the ter-
mination criterion in the GA, each generation of the popu-
lation contains a certain number of individuals, thus
Compl{GA} ' Pop. size×Gen. (12)
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 105/ 141 ⇒|
CONCLUSIONS
❏ In this contribution, we have shown that GAs may be applied in the context of an SDMA
OFDM system for determining the MBER MUD’s weight vectors.
❏ The GA-aided system has an edge over the CG-based system, because it does not
require an initial weight solution.
❏ It was also shown that the GA is capable of approaching the MBER solution at a lower
complexity than the CG algorithm.
❏ Our future work will invoke forward error correction codes in high-dimensional SDMA-
MUDs.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 106/ 141 ⇒|
Reduced-Complexity Maximum-Likelihood SDMSphere-Detector for Rank-Deficient Scenarios
1
0
2
0.17
3
0.34
4
0.52
5
0.69
6
0.86
7
1.04
8
1.21
9
1.38
10
1.56
11
1.73
12
1.91
13
2.08
14
2.25
15
2.43
16
2.6
0
139
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 107/ 141 ⇒|
Reduced-Complexity SDM Sphere-Detector for Rank-Deficient Scenarios
10-6
10-5
10-4
10-3
10-2
10-1
100
0 5 10 15 20
BE
R
Eb/N0 [dB]
sdm-cmp-16qam : 27-Jun-2005
SOPHIEMMSE
mt=6,nr= 16QAM 464QAM 6
• The proposed SOPHIE SDM detection method exhibits near-optimum performance and relatively low
complexity in high-throughput scenarious such as 6x6 64QAM as well as rank-deficient 6x4 16QAM
MIMO-OFDM. The throughout is 36 and 24 bits/symbol, respectively.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 108/ 141 ⇒|
Iterative Joint Receiver Architecture.
Channel
Estimator
Space-Time
DetectorDecoder 1 Decoder 2y
y
H
c d
turbo decoder
joint detector-decoder
extr. info.
extr. info.
extr. info.
• A joint data detection and channel estimation based turbo architecture is developed, where a succession of
detection modules constituting a MIMO-OFDM receiver iteratively exchange soft information, thus resulting
in a substantial system performance improvement.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 109/ 141 ⇒|
Joint Iterative MIMO-OFDM Receiver
…
…
…
User 1
GA-aided
Iterative Joint
Channel
Estimator and
Multi-User
Detector
IFFT
SDMA MIMO Channel
(1)sb
1x
2x
Px
User 1
User 2
FFT
FFT
Base Station (BS)
Mod.
Geographically-separated Mobile Stations (MSs) …
…
…
…
…
User 2 IFFT
IFFT
Mod.
Mod. User L
…
…
…
User L FFT
P-element
Receiver
Antenna
Array
FEC Encoder
FEC Decoder
FEC Decoder
FEC Decoder
FEC Encoder
FEC Encoder
(2)b
( )Lb
(1)b
(1)b
(2)b
( )ˆ Lb
(1)s
(2)s
( )Ls
(2)sb
( )Lsb
(1)ˆsb
(2)ˆsb
( )ˆ Lsb
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 110/ 141 ⇒|
Joint Channel Estimation and Detection for MIMO-OFDM
…
…
…
Final-iteration Trigger
…
IFF
T
Cha
nnel
Tra
nsfe
r F
unct
ion
Buf
fer
GA-aided Joint
Channel Estimator
and MUD
OHRSA
MUD
( )ˆ [ , ]lpH n k
(2)[ , ]pH n k
�
(1)[ , ]pH n k
�
…
(1)[ , ]pH n K
�
(1)[ ,2]pH n
�
(1)[ ,1]pH n
�
…
…
(1)0[ , ]ph n K
�
(1)[ ,2]ph n
�
(1)[ ,1]ph n
�
…
FFT
…
…
0
…
(1)ˆ [ , ]pH n K
(1)ˆ [ ,2]pH n
(1)ˆ [ ,1]pH n
Cha
nnel
Tra
nsfe
r F
unct
ion
Buf
fer
IFF
T
…
( )[ ,2]LpH n
�
( )[ ,1]LpH n
…
( )0[ , ]L
ph n K
( )[ ,2]Lph n
�
( )[ ,1]Lph n
�
FFT
…
…
0
…
( )ˆ [ , ]LpH n K
( )ˆ [ ,2]LpH n
( )ˆ [ ,1]LpH n
…
Pilot
Controller
( )ˆ [ , ]LpH n k
(2)ˆ [ , ]pH n k
(1)ˆ [ , ]pH n k
…
…
Pilot symbols
(1)[ 1, ]s n k+
… …
…
(1)ˆ [ 1, ]s n k+b
(2)ˆ [ 1, ]s n k+b
( )ˆ [ 1, ]Ls n k+b
Time-domain filtering at the pth receiver antenna
Time-domain
filtering at other
receiver antennas
( )[ , ]lpH n k
�
( )ˆ [ , ]lpH n k
Detected soft bits
…
CIR-related taps
On/Off Control
…
…
On/Off Control
( )[ , ]LpH n K
�
1[0, ]x k
1[ 1, ]x n k+
2[0, ]x k
2[ 1, ]x n k+
[0, ]Px k[ 1, ]Px n k+
Working mode switching: pilot mode / data mode
Rx 1
Rx 2
Rx P
(2)[ 1, ]s n k+�
( )[ 1, ]Ls n k+� Received signals
…
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 111/ 141 ⇒|
Joint Channel Estimation and Detection for MIMO-OFDM
-2.0 -1.5 -1.0 -0.5 0.0 0.5 1.0 1.5 2.0Real
-2.0
-1.5
-1.0
-0.5
0.0
0.5
1.0
1.5
2.0Im
agin
ary
True Channel Transfer Functions, 2-path Rayleigh
...................
.......
. . . . . . . . . . . . . . . . . . . . . . .................................
........
. .. . . . . . . . . . . . . . . . . . . . . ....
.
..............................
..
....
. .. . . . . . . . . . . . . . . . . . . . .................................
..........
. . . . . . . . . . . . . . . . . . . . . ...................................
....... .
. . . . . . . . . . . . . . . . . . . . . ...................................
....... .
. . . . . . . . . . . . . . . . . . . . . ...................................
..
..... .
. . . . . . . . . . . . . . . . . . . . ...................................
........
. . . . . . . . . . . . . . . . . . . . . ...................................
........
. . . . . . . . . . . . . . . . . . . . . ...................................
........
. . . . . . . . . . . . . . . . . . . . . ...................................
........
. . . . . . . . . . . . . . . . . . . . ...................................
........
. . . . . . . . . . . . . . . . . . . . . ...................................
........
. . . . . . . . . . . . . . . . . . . . . ...................................
........
. . . . . . . . . . . . . . . . . . . . . ..................................
........
. .. . . . . . . . . . . . . . . . . . . .................................
..........
. .. . . . . . . . . . . . . . . . . . . .................................
..........
. .. . . . . . . . . . . . . . . . . . . .................................
..........
. .. . . . . . . . . . . . . . . . . . . ................................
............
. . . . . . . . . . . . . . . . . . . ...................................
........
. .. . . . . . . . . . . . . . . . . . . .................................
..........
. .. . . . . . . . . . . . . . . . . . . ................................
....
..
......
. . . . . . . . . . . . . . . . . . . ...................................
..........
. . . . . . . . . . . . . . . . . . . ...................................
..........
. . . . . . . . . . . . . . . . . . . ..................................
..........
. .. . . . . . . . . . . . . . . . . . ................................
....
..
......
. . . . . . . . . . . . . . . . . . . ...................................
..........
. . . . . . . . . . . . . . . . . . . ...................................
..........
. . . . . . . . . . . . . . . . . . . ..................................
..........
. .. . . . . . . . . . . . . . . . . .................................
....
..
......
. .. . . . . . . . . . . . . . . . . .................................
............
. .. . . . . . . . . . . . . . . . . ................................
....
........
. .. . . . . . . . . . . . . . . . . .................................
....
........
. .. . . . . . . . . . . . . . . . . .................................
....
..
......
. .. . . . . . . . . . . . . . . . . ................................
....
..........
. . . . . . . . . . . . . . . . . . ..................................
..........
. .. . . . . . . . . . . . . . . . . .................................
....
........
. .. . . . . . . . . . . . . . . . . ................................
....
..........
. . . . . . . . . . . . . . . . . . ..................................
............
. . . . . . . . . . . . . . . . . ...................................
..........
... . . . . . . . . . . . . . . . . ...........................
No. of OFDM symbols=40FD=0.003
User 1
User 2
User 3
User 4
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 112/ 141 ⇒|
-2.0 -1.5 -1.0 -0.5 0.0 0.5 1.0 1.5 2.0Real
-2.0
-1.5
-1.0
-0.5
0.0
0.5
1.0
1.5
2.0
Imag
inar
y
Estimated Channel Transfer Functions, 2-path Rayleigh
..
.
..
. .
... .
.
.
.
..
...
. ..
...
..
.... . ..
...
..
. . . ...
. ... .
..
.. .
..
. ..
..
.
.
..... ....
. ....
...
.
.
.. .
. . ...
.. . . . . . . . . . . .
.. ..
.. . ... .
. ...
.....
.... .
............
.....
.. .
. ...
. ....
.. ... . . . . .. . . .
.
.. .. ..
...
....
.
.....
........
........
....
.
..
....
. ..
. . ..
.
.. . .. . .
.. .
. .. . .
..
. .... .
.....
.. ...
....
..
......
.....
....
.
....
. . ... .. .
. . .. .. . . .
...
...
.....
..........
...........
. ..
.. .
.....
.. .
... .. .
. .. .
.. .... .
....
. ... .
....
..................
...
.
.
.
..
. ..
. . ... . ..
.... .
...
. . . . . ..
...
. .
..
.....
... .......
........
...
.
..
... ..
.. .... .. .
. . ..
. ..... . .
......
. .. .....
.................
....
. .
..... ..
.. . .
....
.. . . . ...
. . . . . .
...
..... ..
.
..
.. .........
..... .....
...
.. . .
.. . . ... . ..
... . . . .. . .
. .. .
.
.. .. .
.......
..........
..........
....
. ... .
.... .
.
.. .
. .. . .
. ..
.
. ... .
......
....
...
.. ...
.... ........
..
....... ..
... ..
. .. . . .
... ..
..
. . ....
....
.......
..
........
.....
.....
..
....... . .
..
.. . ..
. . . . . .. ..
.. .
.. .
.....
.... ...
....
.......
.....
..
..... .....
.. . .. .. . . . .. .. . .. .
. .. .
....
.......
... ....
..........
... ..
...
..... .. .
. .. .. . . .. . .
.. ... ...
..
..
. .......
............
..
.. ...
..
.. .
. .. .. .. .
... . . .
. ...
.. .
. .. .
..
....
..
......
...............
.. ....
.... .
....
.... . . . .
...
.. . ..
. ... ..
.
...
.... ....
.............
...
......
...
.... ...
.... . .
.. . . .
..
. . ... .
. . .
. ...
...
.. ..
.. ........
. .....
.. .....
. ..
...
. . .. .
. . .. ..
.. .. .
. ... ....
..
. .....
......
.....
......
....
. . .. ....
.
. .
. .. . .. .
. ..
. ..
.. .
...
..
......
...... .
...
.............
....
....
......
... . .
. . ... .. .. . . .
.....
...
.. .
..
......
........
.......
. ...
.. .....
.. .. .
. .
.. . . .. . . .
..
. ..
............
.........
... .. ..
........ ...
.. ..
. .. .... .
.. . ..
.. .. . .
. .........
..
......
....... ....
.. ....
....
.. ... ..
... . . . . . .
.. . . ..
.. . . .
..
.. ... .
......
.....
......
...
.......
. .. ... ..
.
... . .. . . . . .. .. .. .. .. ...
..
.......
.....
............
. ...
.
.... .
....
....
.
. . .. . ....
. . ...
. ... .
..
.....
......
.........
.....
... .
.. ....
.... ..
. . . .. . .. . ..
. ....... . ...
.....
.
.....
...
........
......
...... .
.. ..... .
.. .... . .
... ... . . . ....
....... ..
.
. ...
.. ..........
. ...
...... ....
. . . . . .. .. . .. . .. .
.. .. .
....
..... .
..........
......
.. ....
.......
.... .
..
.. . ... . . ..
. .. .. .
.. ....
....
.... .....
.... .
. ....
.....
. .. . ..
.. .. . .
. . .. . .. . .. . .. .. .
... ... ..
............
.. ......
.
....
.... .... ..
....
. . . . . .. .. . .. .
. .... .. ....
.. ..... ..
..... ........
...
..
...
... ..
.... . ....
...
..
.. . . .
. . .... .
..
.. .....
... ...
...
... ..
. .....
...
..
...
.. ....
.. . . . . .. .... ..
.. .. .
.. ..... ..
.. .
...........
....
....
...
... . .
. .. . . ..
. . . . . . .. .....
. . ... ....
.....
. .
...
.. ......
........
... ..
.
.
... . .. . .. . ..
. . . .. .. ..
.. . ..
.........
.....
. .... ..........
..
...
..
.....
. ..... .
.... . .
.. .. ...
... ..
.. ......
........
..... ...
.....
.........
.
.. ..
. .
.
. . . . . ... .. .. .
....
.. ... ....
......
............
...
... .
. ...
..... ..
. . ... .. . . . ... ..
.. ... .
... ......... .....
.....
.. ..... .
....
.... . ..
...
...
. .. .. . .. .. .
. .
. .......
..........
.....
No. of OFDM symbols=40FD=0.003
GA. Itr.=1=2.5%
SNR=20dB
User 1
User 2
User 3
User 4
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 113/ 141 ⇒|
GA-JCEMUD Performance
fdx_u4r2_jga_ldpc_4qam_mul.gle Mon Oct 10 2005 19:09:06
0 5 10 15 20 25 30SNR (dB)
10-5
10-4
10-3
10-2
10-1
100
BE
R
LDPC-GA-JCEMUD-SDMA-OFDM, L4/P2, 4QAM, 2-path Rayleigh
GA-JCEMUD, FD=0.005GA-JCEMUD, FD=0.003GA-JCEMUD, FD=0.001MMSE, Perfect CSIML, Perfect CSI
=2.5%GA. Itr.=1
LDPC-codedUncoded
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 114/ 141 ⇒|
GA-JCEMUD Performance
mse_fft-itx_u4r2_jga_ldpc_4qam_mul.gle Sat Sep 10 2005 14:26:24
0 5 10 15 20 25 30SNR (dB)
10-3
2
5
10-2
2
5
10-1
2
5
100
Cha
nnel
MSE
GA-JCEMUD-SDMA-OFDM, L4/P2, 4QAM, 2-path Rayleigh
GA. Itr.=2, =2.5%GA. Itr.=2, =100%GA. Itr.=1, =2.5%GA. Itr.=1, =100%GA. Itr.=0, =2.5%GA. Itr.=0, =100%FD=0.003
SchoolofE
CS
,Univ.
ofSoutham
pton,UK
.http://w
ww
-mobile.ecs.soton.ac.uk
115/141⇒|
CH
AN
NE
LVA
RIA
TIO
NIN
SPA
CE
-TIM
EC
OD
ED
OF
DM
1T
x1
Rx
0128
256384
512
Subcarrierindex0
2550
75100
125150
Transm
issionfram
e(T
ime)
4 5 6 7 8 9 10 11
12 13 14
Instantenous SNR (dB)2
Tx
1R
x
0128
256384
512
Subcarrierindex0
2550
75100
125150
Transm
issionfram
e(T
ime)
4 5 6 7 8 9 10 11
12 13 14
Instantaneous SNR (dB)
2T
x2
Rx
0128
256384
512
Subcarrierindex0
2550
75100
125150
Transm
issionfram
e(T
ime)
4 5 6 7 8 9 10 11
12 13 14
Instantaneous SNR (dB)
2T
x6
Rx
0128
256384
512
Subcarrierindex0
2550
75100
125150
Transm
issionfram
e(T
ime)
4 5 6 7 8 9 10 11
12 13 14
Instantaneous SNR (dB)
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 116/ 141 ⇒|
Effects of Rate Adaptation on the Throughput of Random
Ad Hoc Networks
Xiang Liu and Lajos Hanzo
Communications Research Group
School. of Electronics and Computer Science,
University of Southampton, SO17 1BJ, UK.
http://www-mobile.ecs.soton.ac.uk
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 117/ 141 ⇒|
Outline
❏ The system model of wireless ad hoc networks.
❏ The achievable per-node throughput improvements of perfect rate adaptation
are investigated in the following two scenarios:
❍ Only pathloss is taken into account,
❍ Shadowing is also taken into account.
❏ Conclusions: Perfect rate adaptation has the potential of considerably improv-
ing the achievable throughput of the random ad hoc network compared to
fixed rate transmissions. However, even perfect rate control fails to change
the scaling law of the per-node throughput result given by Θ(
1√n logn
)
in [1],
regardless of the absence or presence of shadow fading.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 118/ 141 ⇒|
Contributions
❏ In contrast to most of the existing literature, where a fixed transmission rate
associated with a time-invariant modulation scheme was assumed [1, 2, 3, 4,
5, 6], we consider the employment of perfect rate adaptation as well as the
effects of a fading channel
❏ Two formulas are provided for characterizing the beneficial effects of rate
adaptation on the achievable per-node throughput of random ad hoc networks
both in the absence and in the presence of shadow fading.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 119/ 141 ⇒|
System Model
❏ A random ad hoc network supports n nodes uniformly and independently dis-
tributed in a unit area S , which is a planar disk as in [1].
❏ All nodes share the same bandwidth, which is given by W Hz.
❏ All packet-transmissions are slotted into perfectly synchronized time slots.
❏ No node is capable of simultaneously transmitting and receiving signals, or
simultaneously transmitting/receiving signals to/from more than one node.
❏ The minimum SINR required for successful reception is β.
❏ The common reliable transmission range rn of all nodes is chosen to guaran-
tee the asymptotic connectivity of random networks.
❏ Initially the minimum distance between nodes is assumed to be rmin, which
satisfies rmin < rn.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 120/ 141 ⇒|
System Model
❏ The power of each transmitting node is fixed to Pt Watts, i.e. no power control
is used, which is typical in cost-efficient ad hoc networks.
❏ Let Nt be the subset of nodes simultaneously transmitting at some time in-
stant. If node i, i /∈ Nt is receiving signals from node j, j ∈ Nt , then the SINR
experienced at node i becomes:
γ ji =PtG ji
∑k∈Nt ,k 6= j PtGki +ηi, (13)
where γ ji is the SINR at node i experienced by the signal arriving from node j,
while Gki is the power gain between nodes k and i, and ηi is the background
noise encountered at node i.
❏ The value of the power gain G ji depends on the propagation model, which will
be discussed later, taking into account the absence of fading or the presence
of log-normal shadow fading, respectively.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 121/ 141 ⇒|
Notations
❏ α is the path loss exponent in the pathloss model.
❏ σ is the standard deviation of the lognormal shadowing.
❏ cg is the average per-node throughput achievable without rate adaptation,
which is fixed and determined by the Shannon limit at the minimum required
SINR β.
❏ ca is the average per-node throughput achievable with the advent of perfect
rate adaptation.
❏ ci =ca
cgis the normalized per-node throughput improvement achievable with
the advent of perfect rate adaptation.
❏ c0i = max
rmin{ci} is the maximum achievable normalized per-node throughput
improvement ci attained with the advent of perfect rate adaptation, when we
have rmin = 0.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 122/ 141 ⇒|
The Effects of Path Loss:The Normalized Per-Node Throughput Improvement ci Achievable
with the Advent of Perfect Rate Adaptation
Theorem 1
ci =2
∫ 1u s ln(1+βs−α)ds
(1−u2) ln(1+β)≤ 2
∫ 10 s ln(1+βs−α)ds
ln(1+β)
= c0i < +∞, (14)
❍ u =rmin
rnis the normalized minimum distance between ad hoc nodes,
❍ s =r ji
rnis the normalized distance.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 123/ 141 ⇒|
The Effects of Path Loss:ci versus rmin/rn for different values of α
0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0Normalized minimum distance between nodes, rmin/rn
1.0
1.2
1.4
1.6
1.8
2.0
2.2
2.4
Nor
mal
ized
thro
ughp
utim
prov
emen
t,c i
=10 dB=4=3=2
Figure 42: The normalized per-node throughput improvement ci versus the normalized minimum distance
rmin/rn between nodes for different values of the path loss exponent α at a required SINR value of β = 10 dB in
the absence of fading, which is computed from Equation 14.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 124/ 141 ⇒|
The Effects of Path Loss:ci versus rmin/rn for different values of β
0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0Normalized minimum distance between nodes, rmin/rn
1.0
1.5
2.0
2.5
3.0
3.5
4.0
Nor
mal
ized
thro
ughp
utim
prov
emen
t,c i
=20 dB=10 dB=0 dB=3
Figure 43: The normalized per-node throughput improvement ci versus the normalized minimum distance
rmin/rn between nodes for different values of the required SINR β at a path loss exponent of α = 3 in the absence
of fading, which is computed from Equation 14.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 125/ 141 ⇒|
The Effects of Path Loss:c0
i versus α for different values of β
2.0 2.2 2.4 2.6 2.8 3.0 3.2 3.4 3.6 3.8 4.0Path loss exponent,
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
5.0
Nor
mal
ized
thro
ughp
utim
prov
emen
tupp
erbo
und,
c i0
=20 dB=10 dB=0 dB
Figure 44: The normalized per-node throughput improvement upper bound c0i versus the pathloss exponent α
plotted for different values of the target SINR β in the absence of fading, which is evaluated from Equation 14. The
transmit power is fixed and perfect rate adaptation is assumed.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 126/ 141 ⇒|
The Effects of Path Loss:c0
i versus β for different values of α
0 2 4 6 8 10 12 14 16 18 20Required SINR, (dB)
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
5.0
Nor
mal
ized
thro
ughp
utim
prov
emen
tupp
erbo
und,
c i0
=4=3=2
Figure 45: The normalized per-node throughput improvement upper bound c0i versus the target SINR β plotted
for different values of the pathloss exponent α in the absence of fading, which is evaluated from Equation 14. The
transmit power is fixed and perfect rate adaptation is assumed.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 127/ 141 ⇒|
The Effects of Shadow Fading:The Normalized Per-Node Throughput Improvement ci Achievable
with the Advent of Perfect Rate Adaptation
Theorem 2
ci =
∫ +∞0 ln(1+βet)dt
∫ 0u e2se
− (t+αs)2
2σ2 ds
ln(1+β)∫ +∞
0 dt∫ 0
u e2se− (t+αs)2
2σ2 ds
≤∫ +∞
0 ln(1+βet)dt∫ 0−∞ e2se
− (t+αs)2
2σ2 ds
ln(1+β)∫ +∞
0 dt∫ 0−∞ e2se
− (t+αs)2
2σ2 ds
= c0i < +∞, (15)
❍ u = lnrmin− lnrn is the logarithmic normalized minimum distance between ad
hoc nodes,
❍ s = lnr ji − lnrn is the logarithmic normalized distance,
❍ t = lnγ ji − lnβ is the logarithmic normalized SINR.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 128/ 141 ⇒|
The Effects of Shadow Fading:ci versus rmin/rn for different values of α
0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0Normalized minimum distance between nodes, rmin/rn
1.0
1.2
1.4
1.6
1.8
2.0
2.2
2.4
Nor
mal
ized
thro
ughp
utim
prov
emen
t,c i
=8 dB=10 dB=4=3=2
Figure 46: The normalized per-node throughput improvement ci versus the normalized minimum distance
rmin/rn between nodes for different values of the path loss exponent α at a required SINR value of β = 10 dB and
a lognormal shadowing standard deviation of σ = 8 dB in the presence of shadow fading, which is computed from
Equation 15.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 129/ 141 ⇒|
The Effects of Shadow Fading:ci versus rmin/rn for different values of β
0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0Normalized minimum distance between nodes, rmin/rn
1.0
1.5
2.0
2.5
3.0
3.5
4.0
Nor
mal
ized
thro
ughp
utim
prov
emen
t,c i
=8 dB=20 dB=10 dB=0 dB=3
Figure 47: The normalized per-node throughput improvement ci versus the normalized minimum distance
rmin/rn between nodes for different values of the required SINR β at a path loss exponent value of α = 3 and a
lognormal shadowing standard deviation of σ = 8 dB in the presence of shadow fading, which is computed from
Equation 15.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 130/ 141 ⇒|
The Effects of Shadow Fading:ci versus rmin/rn for different values of σ
0.0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1.0Normalized minimum distance between nodes, rmin/rn
1.0
1.2
1.4
1.6
1.8
2.0
2.2
2.4
Nor
mal
ized
thro
ughp
utim
prov
emen
t,c i
=12 dB=8 dB=5 dB=10 dB=3
Figure 48: The normalized per-node throughput improvement ci versus the normalized minimum distance
rmin/rn between nodes for different values of the lognormal shadowing standard deviation σ at a path loss expo-
nent value of α = 3 and a required SINR of β = 10 dB in the presence of shadow fading, which is computed from
Equation 15.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 131/ 141 ⇒|
The Effects of Shadow Fading:c0
i versus α for different values of β
2.0 2.2 2.4 2.6 2.8 3.0 3.2 3.4 3.6 3.8 4.0Path loss exponent,
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
5.0
Nor
mal
ized
thro
ughp
utim
prov
emen
tupp
erbo
und,
c i0
=8 dB=20 dB=10 dB=0 dB
Figure 49: The normalized per-node throughput improvement upper bound c0i versus the pathloss exponent α
plotted for different values of the target SINR β at a lognormal shadowing standard deviation of σ = 8 dB in the
presence of shadow fading, which is evaluated from Equation 15. The transmit power is fixed and perfect rate
adaptation is assumed.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 132/ 141 ⇒|
The Effects of Shadow Fading:c0
i versus α for different values of σ
2.0 2.2 2.4 2.6 2.8 3.0 3.2 3.4 3.6 3.8 4.0Path loss exponent,
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
5.0
Nor
mal
ized
thro
ughp
utim
prov
emen
tupp
erbo
und,
c i0
=12 dB=8 dB=5 dB=10 dB
Figure 50: The normalized per-node throughput improvement upper bound c0i versus the pathloss exponent
α plotted for different values of the lognormal shadowing standard deviation σ at a target SINR of β = 10 dB in
the presence of shadow fading, which is evaluated from Equation 15. The transmit power is fixed and perfect rate
adaptation is assumed.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 133/ 141 ⇒|
The Effects of Shadow Fading:c0
i versus β for different values of α
0 2 4 6 8 10 12 14 16 18 20Required SINR, (dB)
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
5.0
Nor
mal
ized
thro
ughp
utim
prov
emen
tupp
erbo
und,
c i0
=8 dB=4=3=2
Figure 51: The normalized per-node throughput improvement upper bound c0i versus the target SINR β plotted
for different values of the pathloss exponent α at a lognormal shadowing standard deviation of σ = 8 dB in the
presence of shadow fading, which is evaluated from Equation 15. The transmit power is fixed and perfect rate
adaptation is assumed.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 134/ 141 ⇒|
The Effects of Shadow Fading:c0
i versus β for different values of σ
0 2 4 6 8 10 12 14 16 18 20Required SINR, (dB)
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
5.0
Nor
mal
ized
thro
ughp
utim
prov
emen
tupp
erbo
und,
c i0
=12 dB=8 dB=5 dB=3
Figure 52: The normalized per-node throughput improvement upper bound c0i versus the target SINR β plotted
for different values of the lognormal shadowing standard deviation σ at a pathloss exponent of α = 3 in the
presence of shadow fading, which is evaluated from Equation 15. The transmit power is fixed and perfect rate
adaptation is assumed.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 135/ 141 ⇒|
The Effects of Shadow Fading:c0
i versus σ for different values of α
5 6 7 8 9 10 11 12Lognormal shadowing standard deviation, (dB)
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
5.0
Nor
mal
ized
thro
ughp
utim
prov
emen
tupp
erbo
und,
c i0
=10 dB=4 dB=3 dB=2 dB
Figure 53: The normalized per-node throughput improvement upper bound c0i versus the lognormal shadowing
standard deviation σ plotted for different values of the pathloss exponent α at a target SINR of β = 10 dB in the
presence of shadow fading, which is evaluated from Equation 15. The transmit power is fixed and perfect rate
adaptation is assumed.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 136/ 141 ⇒|
The Effects of Shadow Fading:c0
i versus σ for different values of β
5 6 7 8 9 10 11 12Lognormal shadowing standard deviation, (dB)
1.0
1.5
2.0
2.5
3.0
3.5
4.0
4.5
5.0
Nor
mal
ized
thro
ughp
utim
prov
emen
tupp
erbo
und,
c i0
=20 dB=10 dB=0 dB=3
Figure 54: The normalized per-node throughput improvement upper bound c0i versus the lognormal shadowing
standard deviation σ plotted for different values of the target SINR β at a pathloss exponent of α = 3 in the
presence of shadow fading, which is evaluated from Equation 15. The transmit power is fixed and perfect rate
adaptation is assumed.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 137/ 141 ⇒|
Example: AQAM Parameters
k 0 1 2 3 4 5 6
Mk 0 2 4 16 64 256 1024
bk 0 1 2 4 6 8 10
sk(dB) BER = 10−3 −∞ 6.7895 9.7998 16.5430 22.5490 28.4147 34.2607
sk(dB) BER = 10−5 −∞ 9.5879 12.5982 19.4551 25.5684 31.5341 37.4728
mode No Tx BPSK QPSK 16-QAM 64-QAM 256-QAM 1024-QAM
Table 4: The parameters of K-mode square AQAM systems using Gray coding and designed for maintaining
BER = 10−3 and 10−5, respectively. The switching thresholds were evaluated from Equations 14, 16 in [7] and
γ = γs/ log2 M.
❍ K is the number of modulation modes used in the AQAM scheme.
❍ Mk is the constellation size in the kth mode.
❍ bk is the number of bits per symbol (BPS) transmitted in the kth mode.
❍ sk is the switching level between the (k−1)th and kth modes.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 138/ 141 ⇒|
Example: AQAM Results
1 2 3 4 5 6Number of AQAM modes, K
0.0
0.5
1.0
1.5
2.0
2.5
3.0
3.5
4.0
Nor
mal
ized
BPS
thro
ughp
ut,B
i
K-mode AQAM, BER=10-5
, in the presence of shadowingK-mode AQAM, BER=10
-3, in the presence of shadowing
K-mode AQAM, BER=10-5
, in the absence of fadingK-mode AQAM, BER=10
-3, in the absence of fading
Figure 55: The achievable normalized per-node average BPS throughput Bi versus the number of modes K in
K-mode square AQAM systems using Gray coding for a path loss exponent value of α = 3, a lognormal shadowing
standard deviation of σ = 8 dB and a target BER of 10−3 and 10−5, respectively, recorded both in the absence of
fading and in the presence of shadow fading in a random ad hoc network.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 139/ 141 ⇒|
Conclusion
❏ Perfect rate adaptation has the potential of considerably improving the achievable
throughput of the random ad hoc network compared to fixed rate transmissions,
since rate adaptation is capable of mitigating the effects of link quality fluctuations,
as shown in Figures 42 - 48.
❏ However, Theorem 1 and 2 revealed that even perfect rate control fails to change
the scaling law of the per-node throughput result given by Θ(
1√n logn
)
in [1], re-
gardless of the absence or presence of shadow fading.
❏ This conclusion was further confirmed by Figure 55 in the context of our AQAM
examples.
School of ECS, Univ. of Southampton, UK. http://www-mobile.ecs.soton.ac.uk 140/ 141 ⇒|
[1] P. Gupta and P. Kumar, “The Capacity of Wireless Networks,” IEEE Transactions on Information Theory, vol. 46,
pp. 388–404, March 2000.
[2] A. Spyropoulos and C. Raghavendra, “Capacity Bounds for Ad-Hoc Networks Using Directional Antennas,” in
IEEE International Conference on Communications, vol. 1, (Anchorage, Alaska, USA), pp. 348–352, 11-15 May
2003.
[3] A. Spyropoulos and C. Raghavendra, “Asympotic Capacity Bounds for Ad-Hoc Networks Revisited: the Direc-
tional and Smart Antenna Cases,” in IEEE Global Telecommunications Conference, vol. 3, (San Francisco, Cali-
fornia, USA), pp. 1216–1220, 1-5 December 2003.
[4] M. Grossglauser and D. Tse, “Mobility Increases the Capacity of Ad Hoc Wireless Networks,” IEEE/ACM Trans-
actions on Networking, vol. 10, pp. 477–486, August 2002.
[5] B. Liu, Z. Liu, and D. Towsley, “On the Capacity of Hybrid Wireless Networks,” in IEEE INFOCOM, vol. 2, (San
Francisco, Carlifornia, USA), pp. 1543 –1552, 30 March-3 April 2003.
[6] U. C. Kozat and L. Tassiulas, “Throughput Capacity of Random Ad Hoc Networks with Infrastructure Support,” in
International Conference on Mobile Computing and Networking, (San Diego, Carlifornia, USA), pp. 55–65, 14-19
September 2003.
[7] K. Cho and D. Yoon, “On the General BER Expression of One- and Two-Dimension Amplitude Modulations,” IEEE
Transactions on Communications, vol. 50, pp. 1074–1080, July 2002.