56
1 Decentralized Power Control for Random Access with Multi-User Detection Department of Electronic Engineering City University of Hong Kong December 27, 2012 Chongbin Xu, Peng Wang, Sammy Chan, and Li Ping

Decentralized Power Control for Random Access with Multi-User Detection

  • Upload
    gavril

  • View
    32

  • Download
    3

Embed Size (px)

DESCRIPTION

Decentralized Power Control for Random Access with Multi-User Detection. Chongbin Xu, Peng Wang, Sammy Chan, and Li Ping. Department of Electronic Engineering City University of Hong Kong December 27, 2012. Reference: - PowerPoint PPT Presentation

Citation preview

Page 1: Decentralized Power Control for Random Access with Multi-User Detection

1

Decentralized Power Control for Random

Access with Multi-User Detection

Department of Electronic Engineering

City University of Hong Kong

December 27, 2012

Chongbin Xu, Peng Wang, Sammy Chan, and Li Ping

Page 2: Decentralized Power Control for Random Access with Multi-User Detection

2

Reference:

C. Xu, Li Ping, P. Wang, S. Chan, and X. Lin, “Decentralized Power Control for Random Access with Successive Interference Cancellation” to appear in IEEE JSAC.

Page 3: Decentralized Power Control for Random Access with Multi-User Detection

3

Overview

Background and Motivation

Decentralized Power Control Two-User AWGN Channel

K-User AWGN Channel

K-User Fading Channel

Conclusions and Future Work

Page 4: Decentralized Power Control for Random Access with Multi-User Detection

4

Overview

Background and Motivation

Decentralized Power Control Two-User AWGN Channel

K-User AWGN Channel

K-User Fading Channel

Conclusions and Future Work

Page 5: Decentralized Power Control for Random Access with Multi-User Detection

5

Cognitive Radio with Multiple Primary Users

AP

secondary user 1

secondary user 2

primary user 2primary user 1

Consider a cognitive radio with multiple users. The secondary users can transmit only when the primary users are silent. The secondary users access the channel opportunistically whenever a spectrum hole is detected.

Page 6: Decentralized Power Control for Random Access with Multi-User Detection

6

System Characteristics

1) There is usually no time to establish centralized control such as TDMA.

2) Thus random access is necessary.

3) If the spectrum holes are scarce, the secondary users may accumulate many un-transmitted packets. Thus is highly probable that each user has a packet to transmit whenever a spectrum hole is detected.

4) This is equivalent to the system with packet arrival rate 1.

Page 7: Decentralized Power Control for Random Access with Multi-User Detection

7

Collision and Throughput

In random-access systems, a collision will occur if k users transmit their packets simultaneously.

Conventionally, the packets involved in a collision are assumed to be unrecoverable. The system throughout is limited by collision probability.

0

0.1

0.2

0.3

0.4

0.5

0 0.02 0.04 0.06 0.08 0.1 0.12 0.14 0.16 0.18 0.2

arrival rate of each user λ

pack

et th

roug

hput

T

When k≥1and k∞, the maximum throughput is 36.8% due to high collision probability

Performance of conventional slotted ALOHA

Page 8: Decentralized Power Control for Random Access with Multi-User Detection

8

How to improve the random access performance?

Page 9: Decentralized Power Control for Random Access with Multi-User Detection

9

Multi-Packet Reception (MPR)

In many situations, it is possible to recover some or all packets from a collision. This phenomenon is captured by the multi-packet reception (MPR) model. Early work on MPR model is focused on low-rate CDMA-type applications [1][2].

Both [1] and [2] allow multi-user detection (MUD). However, they are based on the traditional ALOHA with only one non-zero transmission power level.

The work in [3] allows multi-level transmission power but it is limited to single user detection (SUD) only.

[1] S. Ghez, S. Verdu, and S. Schwartz, “Stability properties of slotted ALOHA with multipacket reception capability,” IEEE Trans. Autom. Control, vol. 33, no. 7, pp. 640-649, Jul. 1988.[2] L. Tong and V. Naware, “Signal processing in random access,” IEEE Signal Process. Mag., vol. 21, no.5, pp. 29-39. Sep. 2004.[3] Y. Leung, “Mean power consumption of artificial power capture in wireless networks,” IEEE Trans. Commun., vol. 45, no. 8, pp. 957-964, Aug. 1997.

Page 10: Decentralized Power Control for Random Access with Multi-User Detection

10

Performance of MPR in Fading Channel

[a] M. H. Ngo, V. Krishnamurthy, and L. Tong, “Optimal channel-aware ALOHA protocol for random access in WLANs with multi-packet reception and decentralized channel state information,” IEEE Trans. Signal Process., vol. 56, no. 6, pp. 2575-2588, Jun. 2008. [b] Y. Leung, “Mean power consumption of artificial power capture in wireless networks,” IEEE Trans. Commun., vol. 45, no. 8, pp. 957-964, Aug. 1997.

R = 1 bit/symbol

standard slotted ALOHA

channel multi-level aware [a] SUD [b]

0

0.5

1

1.5

number of active users K

syst

em th

roug

hput

2 4 6 8 10 12 14 16 18 20

The channel aware technique assume only a single non-zero transmission power level.

The multi-level SUD technique is limited to SUD only.

Page 11: Decentralized Power Control for Random Access with Multi-User Detection

11

Serial Interference Cancellation

Multi-user detection (MUD) has the potential to solve the problem by serial interference cancellation (SIC) [4][5].

In this case, the signals of the users that have been correctly detected are subtracted from the received signal, and there is no interference to the others.

Assume that the signals of users 1, 2, …, k-1 have been correctly detected and subtracted from the received signal. Then the SINR of user k is given by

2

1

kk

ii k

eSINR

e

from remaining interfering users.

[4] T. M. Cover and J. A. Thomas, Elements of Information Theory, New York: Wiley, 2006.[5] D. Tse and P. Viswanath, Fundamentals of Wireless Communications, Cambridge: Cambridge University Press, 2005.

Page 12: Decentralized Power Control for Random Access with Multi-User Detection

12

Power Requirement for SIC

The following is an illustration of the power requirement for a two-user SIC system. We can recover both packets during an collision.

user 1 decoded first:

2

0

log 1e

RN

0N

2e

1e

user 1 user 2

user 2 decoded second:

1

2 0

log 1e

Re N

transmission power

Page 13: Decentralized Power Control for Random Access with Multi-User Detection

13

Power Control and Feasible Region

Power control is crucial for MUD. We refer to the closure of power profiles that can support reliable transmissions of all users as feasible power region.

The following is an example of the feasible region for a two-user system with R ≥ 1 bit/symbol, ideal coding and SIC.

E1 = (2R – 1)N0

E2 = (2R – 1)∙(E1 + N0)

1

2

0

(21)(

)

R

e

eN

2

1

0

(21)

(

)

R

e

eN

2 0(2 1)Re N

10

(21)

Re

N

00

1

2

ee

1e

2e

1E 2E

1E

2E

e1=e 2 is the worst-case situation.

Page 14: Decentralized Power Control for Random Access with Multi-User Detection

14

Feasible Region

When R>1, equal power line is not in the feasible region. If centralized power control is possible, we can allocate the two users with power inside the feasible region. In particular, the power pair (E1, E2) or (E2, E1) leads to

the minimum information theoretic sum-power.

However, how to allocate powers without centralized control?

1

2

0

(21)(

)

R

e

eN

2

1

0

(21)

(

)

R

e

eN

2 0(2 1)Re N

10

(21)

Re

N

00

1

2

ee

1e

2e

1E 2E

1E

2E

E1 = (2R – 1)N0

E2 = (2R – 1)∙(E1 + N0)

Page 15: Decentralized Power Control for Random Access with Multi-User Detection

15

Objectives

We aim to improve the throughput of random-access systems by allowing MUD at the receiver and decentralize power control at the transmitters.

We will limit our discussions to the simple slotted ALOHA systems. It is expected that the results can be extended to systems with more sophisticated random access protocols such as CSMA.

We will discuss the decentralized power control problems in two-user AWGN channel, K-User AWGN channel, and K-User fading Channel.

Page 16: Decentralized Power Control for Random Access with Multi-User Detection

16

Overview

Background and Motivation

Decentralized Power Control Two-User AWGN Channel

K-User AWGN Channel

K-User Fading Channel

Conclusions and Future Work

Page 17: Decentralized Power Control for Random Access with Multi-User Detection

Problem Formulation

17

To improve the performance by optimizing the power distribution f(e).

1

2

0

(21)(

)

R

e

eN

2

1

0

(21)

(

)

R

e

eN

2 0(2 1)Re N

10

(21)

Re

N

00

1

2

ee

1e

2e

1E 2E

1E

2E

e1

e2

e

f(e)

e

f(e)

Page 18: Decentralized Power Control for Random Access with Multi-User Detection

18

Discrete Power Levels

1

0, 0;

( ), 0.nn

nE

E n

We define a discrete set {En}

with 0 = E0 < E1 < … En < …,

where En is the minimum power

level that guarantees successful decoding of one user when the interference power level from the other user is En–1.

0E 1E 2E 3E0E

1E

2E

3E

4E

4E

1e

2e

1

2

ee

2

1

boun

dary

()

e

e

1

2

boundary

()

e

e

3 2( , )E E

4 3( , )E E2 3( , )E E

3 4( , )E E

2 1boundary e E

11

boun

dary

eE

1 2( , )E E

2 1( , )E E

Page 19: Decentralized Power Control for Random Access with Multi-User Detection

19

Theorem 1

1

0, 0;

( ), 0.nn

nE

E n

The support of the optimal distribution is a subset of the discrete set {En}.

This theorem greatly simplifies the optimization problem.

0E 1E 2E 3E0E

1E

2E

3E

4E

4E

1e

2e

1

2

ee

2

1

boun

dary

()

e

e

1

2

boundary

()

e

e

2 1( , )E E

3 2( , )E E

4 3( , )E E

1 2( , )E E

2 3( , )E E

3 4( , )E E

2 1boundary e E

11

boun

dary

eE

Page 20: Decentralized Power Control for Random Access with Multi-User Detection

20

Optimization Problem

Based on Theorem 1, the design problem can be formulated as follows.

20 1{ }

0

0

min imize

subject to 1

0 1, .

n

N

nnp

N

nn

N

n nn

n

p p

p

E p e

p n

Notes: (1) p0 is the probability that a user does not transmit.

(2) pn2 is the probability that both users using the same powers, and so

transmission will fail.

p0 0E 1E 2E 3E0E

1E

2E

3E

4E

4E

1e

2e

1

2

ee

pn2

Page 21: Decentralized Power Control for Random Access with Multi-User Detection

21

Proof of Theorem 1

Any transmit power E' (E0, E1) is unnecessary since E1 is the minimum power for reliable transmission without interference.

1

2

0

(21)(

)

R

e

eN

2

1

0

(21)

(

)

R

e

eN

2 0(2 1)Re N

10

(21)

Re

N

00

1

2

ee

1e

2e

1E 2E

1E

2E

1

0, 0;

( ), 0.nn

nE

E n

Page 22: Decentralized Power Control for Random Access with Multi-User Detection

22

Proof of Theorem 1 (Continued)

Provided that the probability of (E0, E1) is zero, any E' (E1, E2) is also unnecessary

since E2 is the minimum power for reliable transmission when the interfering packet

has power E1.

Page 23: Decentralized Power Control for Random Access with Multi-User Detection

23

Proof of Theorem 1 (Continued)

The above reasoning is generalized to show that E' (En, En+1) is unnecessary for any n.

Page 24: Decentralized Power Control for Random Access with Multi-User Detection

Example: Packet Throughput Comparison

24

Packet throughput T of a 2-user AWGN channel with ideal coding. R = 1 bit/symbol

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

arrival rate of each user λ

pack

et th

roug

hput

T

0 0.2 0.4 0.6 0.8 1

ML - SICconventional

Page 25: Decentralized Power Control for Random Access with Multi-User Detection

25

Overview

Background and Motivation

Decentralized Power Control Two-User AWGN Channel

K-User AWGN Channel

K-User Fading Channel

Conclusions and Future Work

Page 26: Decentralized Power Control for Random Access with Multi-User Detection

26

K-User Systems

To optimize the power distribution in a K-user system, we need to analyze the general K-user feasible region, which is a tedious issue and we will not pursuit it further. Instead, we will discuss a simple and sub-optimal solution.

We refer to a collision involving k (2 ≤ k ≤ K) users as a type-k collision. For the sub-optimal solution, we will only consider type-2 collisions.

In this sub-optimal solution, the system throughput is given by T = T1 + T2,

where T1 is the throughput related to transmissions without collisions and T2

the throughout related to type-2 collisions.

Page 27: Decentralized Power Control for Random Access with Multi-User Detection

27

Throughput CalculationDenote by pn the probability of transmission power taking value En. We

calculated T1 and T2 as follows. For convenience, we assume full load for all

users. The discussions can be extended to the general loading case.

T1 is the throughput related to transmissions without collisions, calculated

by

T2 the throughout related to type-2 collisions, calculated by

Thus, we have

11 0 0(1 )KT Kp p

2 2 2 22 0 0 0

2 (1 )KK nn

T C p p p

1 2

1 2 2 20 0 0 0 0

(1 ) ( 1) (1 )K Knn

T T T

Kp p K K p p p

Page 28: Decentralized Power Control for Random Access with Multi-User Detection

28

Throughput Optimization

1 2 2 20 0 0 0 0

(1 ) ( 1) (1 )K Knn

T Kp p K K p p p

1

2

1{ ,... }

01

1

minimize

subject to 1

0 1, .

N

N

nnp p

N

nn

N

n nn

n

p

p p

E p e

p n

To optimize the throughput of the proposed scheme, we discretize the value of p0, and solve the following optimization problem for each discretized p0.

Repeat:

Page 29: Decentralized Power Control for Random Access with Multi-User Detection

29

Example: Performance Comparison

Performance in a 3-user system with ideal coding. R = 1 bit/symbol.

-6 -4 -2 0 2 4 6average power ē

syst

em th

roug

hput

0

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

full search

ML-SUD

ML-SIC by only considering type-2 collisions

Page 30: Decentralized Power Control for Random Access with Multi-User Detection

30

Example: Performance Comparison

Performance comparison among various schemes in AWGN channels with ideal coding and different K. R = 1 bit/symbol.

number of active users K

syst

em th

roug

hput

2 4 6 8 10 12 14 16 18 200

0.1

0.2

0.3

0.4

0.5

0.6

0.7

conventionalML-SUDML-SIC

Page 31: Decentralized Power Control for Random Access with Multi-User Detection

31

Overview

Background and Motivation

Decentralized Power Control Two-User AWGN Channel

K-User AWGN Channel

K-User Fading Channel

Conclusions and Future Work

Page 32: Decentralized Power Control for Random Access with Multi-User Detection

32

Fading Channels

Consider a K-user system with fading. The received signal is given by

where the channel gains of all users, {gk}, are assumed to be independent and

identically distributed.

Assume that each user k knows its instantaneous channel gain gk. Our aim is

to optimize the conditional distributions {fT(eT|g)}, with eT the transmit

power, such that the system throughput is maximized.

The basic assumption above is that each user knows its own channel gain. This can be accomplished in different ways. A possible general solution is that the receiver will transmit a beacon signal, which will be used by the transmitters for channel estimation.

1

K

k k kky g e x

Page 33: Decentralized Power Control for Random Access with Multi-User Detection

33

Channel-Aware ALOHA

As a reference, a channel-aware ALOHA scheme is proposed in [6] based on the following special form of fT(eT|g),

where ET is a predetermined power value and p(g) the transmission

probability when the channel gain is g.

In the following, we will show that the system throughput can be significantly enhanced by jointly optimizing the transmission power levels and the related transmission probabilities.

[6] M. H. Ngo, V. Krishnamurthy, and L. Tong, “Optimal channel-aware ALOHA protocol for random access in WLANs with multi-packet reception and decentralized channel state information,” IEEE Trans. Signal Process., vol. 56, no. 6, pp. 2575-2588, Jun. 2008.

( | ) ( ) ( ) (1 ( )) ( )T T T T Tf e g p g e E p g e

Page 34: Decentralized Power Control for Random Access with Multi-User Detection

34

Support in Fading ChannelsGiven g, the support of the optimal conditional transmit power distribution fT(eT|g) is a subset of {E0/g, E1/g, E2/g, …..}.

Let (g) be the PDF of g. The received power distribution fR(eR) is given by

With {pn} available, the throughput can be calculated similarly as in AWGN

channels.

We next discuss the optimization of {pn(g)} based on the discretization of g.

0( | ) ( ) ( / )T T n T nn

f e g p g e E g

0( ) ( ),where ( ) ( )R R n R n n nn g

f e p e E p p g g dg

Page 35: Decentralized Power Control for Random Access with Multi-User Detection

35

Throughput Optimization in Fading Channels

We discretize the value of g according to M+1 thresholds {g(m)|m = 1,…, M+1} and assume that the received power distributions when g [g(m), g(m+1)) are the same, i.e.,

pn(g) = pn(m) for g(m) ≤ g < g(m+1).

We optimize {pn(m)} to maximize the system throughput.

( )

2

1{ }

( )

( ) ( )

1

( )

0

( ) ( )

0

maximize

subject to 0 1, 0,1,..., , 1,...,

, 0,1,...,

1, 1,...,

/

mn

nnp

mn

M m mn nm

N mnn

N m mn nn

p

p n N m M

p p q n N

p m M

p E g

1

M

me

Page 36: Decentralized Power Control for Random Access with Multi-User Detection

36

Example: Performance Comparison

Performance comparison among various schemes in fading channels with ideal coding and different K. R = 1 bit/symbol.

0

0.5

1

1.5

number of active users K

syst

em th

roug

hput

2 4 6 8 10 12 14 16 18 20

CA-SUD in [6]ML-SIC: M = 10ML-SIC: M = 25

conventional

ML-SIC: M = 40

Page 37: Decentralized Power Control for Random Access with Multi-User Detection

37

MUD for Practically Coded Systems

We have focused on ideal coding and assume successive interference cancellation (SIC) for MUD in the previous discussions.

We now consider practically coded systems, where IDMA is a simple scheme for MUD with relatively low receiver complexity.

hk

hK

user-1

ENC

user-k

user-K

. ... ..

1

K

k kk

h

r x

x1

xk

xK

1h1

ENC k

ENC K

chip-by-chip Processing

11-1

k

k-1

K

K-1

DEC

DEC

DEC

Page 38: Decentralized Power Control for Random Access with Multi-User Detection

38

MUD Feasible Region with LDPC CodingThe following is the feasible region of a (3, 6) regular LDPC coded systems with iterative receiver for BER ≤ 10-5. Please note the followings.

1) When powers for both users are low, near equal powers are not feasible.

2) When powers for both users are high, equal powers are feasible.

1

2

3

4

5

6

7

8

01 2 3 4 5 6 7 80

power of user 1

pow

er o

f us

er 2

unfeasible

unfe

asib

le

feasible

feasible

Page 39: Decentralized Power Control for Random Access with Multi-User Detection

39

Analysis of the Optimal Support

Q Qpoint Q ( , )E E

2 3( , )E E

3 2( , )E E

0

2 1( )e e

1 2( )e e

1e

2e

11

eE

2 1e E

1 2( , )E E

2 1( , )E E

1E2E 3E 4E 5E

1E

2E

3E

4E5E

0

In this case, the support of the optimal power distribution f(∙) is a subset of {E0,

E1, …, En, …, EQ} (for a feasible region with monotonically increasing

boundary function).

Page 40: Decentralized Power Control for Random Access with Multi-User Detection

40

Example: LDPC Coding

Performance comparison among various schemes in fading channels with LDPC coding and different K. R = 1 bit/symbol

0

0.5

1

1.5

number of active users K

syst

em th

roug

hput

2 4 6 8 10 12 14 16 18 20

CA-SUD in [6]ML-SUD

conventional

ML-SIC

Page 41: Decentralized Power Control for Random Access with Multi-User Detection

41

Overview

Background and Motivation

Decentralized Power Control Two-User AWGN Channel

K-User AWGN Channel

K-User Fading Channel

Conclusions and Future Work

Page 42: Decentralized Power Control for Random Access with Multi-User Detection

42

Conclusions

We have developed a decentralized power control scheme for random access systems with MUD.

We proved that the support of the optimal power distribution f is discrete. Based on this finding, we designed f. Numerical results demonstrate that significant performance gain can be obtained by the proposed scheme.

We have limited our focus to slotted ALOHA-type random access schemes. It is expected that the results can be extended to systems with more sophisticated random access protocols such as CSMA.

Page 43: Decentralized Power Control for Random Access with Multi-User Detection

43

Q & A

Thank you!

Page 44: Decentralized Power Control for Random Access with Multi-User Detection

44

Introduction: Decentralized Power Control

We study the decentralized power control for ALOHA-type random access scheme with MUD.

2 0(2 1)Re N

00

1 2( , )E E

1 1( , )E E

1e

2e

A

B

1E 2E

1E

2E

Example: f1(2) = f2

(2) = f (2) = 0.5(e) + 0.5(e – E1)

(∙) is the Dirac delta function

Page 45: Decentralized Power Control for Random Access with Multi-User Detection

45

Merging of Probabilities

For given f, we define a new distribution f[n] constructed as follows.

1

[ ] 0 ( )

( )( )

n

n l l nl

n

e E e Ef e

f e e E

1

where ( )l l

l E e Ef e de

Page 46: Decentralized Power Control for Random Access with Multi-User Detection

46

Proof of Theorem 1

The distribution pair (f[n+1], f[n]) has a better performance than (f[n], f[n]), n.

a sample of f[n+1] can be equivalently obtained through the following steps:

• Step 1: Draw a power value e1 according to f[n];

• Step 2: If En < e1 < En+1, reduce e1 to En; otherwise, keep e1 unchanged.

Denote by white circles {Ai} power pairs drawn from (f[n], f[n]) while black

circles {Ai'} represent those after the power change in Step 2, which are

also samples drawn from (f [n+1], f[n]).

Page 47: Decentralized Power Control for Random Access with Multi-User Detection

47

Example: SUD based OptimizationWe also consider optimizing the power distribution for systems with SUD (denoted by ML-SUD for multiple-level transmission and SUD).

The conventional slotted ALOHA can be regarded as a special case of ML-SUD, where the distribution is optimized over two levels E0 = 0 and E1 only.

power changing ∆ in dB

pack

et th

roug

hput

T

0

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

1.8

2

-4 -2 0 2 4 6 8 10 12

conventional

ML-SUDML-SIC

Page 48: Decentralized Power Control for Random Access with Multi-User Detection

48

Optimization Problem

Based on Theorem 1, the design problem can be formulated as follows.

20 1{ }

0

0

min imize

subject to 1

0 1, .

n

N

nnp

N

nn

N

n nn

n

p p

p

E p e

p n

Notes: (1) p0 is the probability that a user does not transmit.

(2) pn2 is the probability that both users using the same powers, and so

transmission will fail.

p0

0E 1E 2E 3E0E

1E

2E

3E

4E

4E

1e

2e

1

2

ee

pn2

Page 49: Decentralized Power Control for Random Access with Multi-User Detection

49

Proof of Theorem 1

0E 1E 2E 3E0E

1E

2E

3E

4E

4E

1e

2e

5E

5E

1e

2e

[4]1( )f e

1

2

ee

2A

1A'1A

'2A

1e

e

[3]1( )f e

[3]2

()

fe

The power change leads to the following three possibilities.a) A1 fails while A1' succeeds. Such

events result in increased throughput; b) A2 succeeds while A2' fails. Such

events cannot happen as f[n](e2) = 0,

e2(En–1, En);

c) In all other situations, both power pairs fail or succeed simultaneously.

Page 50: Decentralized Power Control for Random Access with Multi-User Detection

50

Example: Power Constraint

System throughput of a four-user Rayleigh fading channel with ideal coding under different power constraints. R = 1 bit/symbol.

-4 -3 -2 -1 0 1 2 3 4 5 60

0.2

0.4

0.6

0.8

1

1.2

transmission power ET

syst

em th

roug

hput

CA-SUDML-SIC

Page 51: Decentralized Power Control for Random Access with Multi-User Detection

51

Example: Power Distributions

The received power distributions of the ML-SIC scheme in the previous figure.

received power levels

prob

abil

ity

received power distribution at ET = 0 dB

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

received power distribution at ET = 3 dB

E0 E1 E2 E3 E4 E5 E6 E7 E8 E9 E10 E11 E12

Page 52: Decentralized Power Control for Random Access with Multi-User Detection

52

K-Users Slotted ALOHA Systems

Denote by pi the probability of transmission power taking value Ei. We

calculated T1 and T2 as follows.

T1 is the throughput related to transmissions without collisions.

T2 the throughout related to type-2 collisions.

1 11 0 01

10 0

(1 ) (1 )

(1 ) (1 )

K k k K k kK kk

K

T C C p p

K p p

2 2 2 22 0 02 0

2 2 2 20 0 0

2 (1 ) (1 )

( 1) (1 ) (1 )

K k k K k kK k ik i

Kii

T C C p p p

K K p p p

Page 53: Decentralized Power Control for Random Access with Multi-User Detection

53

Optimization for Type-2 Collisions

1 2

10 0

2 2 2 20 0 0

(1 ) (1 )

( 1) (1 ) (1 )

K

Kii

T T T

K p p

K K p p p

2

1

Q 0

Q Q 0

Q

minimize

subjectoto 1

0 1,

0 1.

ii

ii

i ii

i

p

p p

E p E p e

p i

p

To optimize the throughput of the proposed scheme, we discretize the value of p0, and solve the following optimization problem for each discretized p0.

Repeat:

Page 54: Decentralized Power Control for Random Access with Multi-User Detection

54

MUD Feasible Region with LDPC Coding

1

2

3

4

5

6

7

8

01 2 3 4 5 6 7 80

2

1

1

2

innerbound

outer bound

1

2

1power of user 1 e

2po

wer

of

user

2 e

11

eE

2 1e E

outer bound

inner bound

The feasible region of a (3, 6) regular LDPC coded systems with iterative receiver.

Page 55: Decentralized Power Control for Random Access with Multi-User Detection

55

Example: LDPC Coding

Performance comparison among various schemes in fading channels with LDPC coding and iterative receiver.

0

0.5

1

1.5

number of active users K

syst

em th

roug

hput

2 4 6 8 10 12 14 16 18 20

CA-SUDML-SUDOuterBound

conventional

InnerBound

Page 56: Decentralized Power Control for Random Access with Multi-User Detection

56

Power Requirement for SIC

With SIC, its possible to recover two or more packets involved in a collision even for high-rate transmissions.

For example, if the SINR threshold for successful detection is given by SINRth, the following transmit power profile can lead to successful detection

of all users for MUD.

21 2

2

1

2

th ii

k th ii k

K th

e SINR e

e SINR e

e SINR

decoded first

decoded last