14
ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture-Based Random-Access Systems with SINR Channel Models _________________________________________ work was supported by the Office of Naval Research. Jeffrey E. Wieselthier and Gam D. Nguyen Information Technology Division Naval Research Laboratory Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland ISIT 2007 — June 2007

ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

  • View
    217

  • Download
    0

Embed Size (px)

Citation preview

Page 1: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 1

Throughput (bits/sec/Hz) of Capture-Based Random-Access

Systems with SINR Channel Models

Throughput (bits/sec/Hz) of Capture-Based Random-Access

Systems with SINR Channel Models

______________________________________________This work was supported by the Office of Naval Research.

Jeffrey E. Wieselthier and Gam D. Nguyen

Information Technology DivisionNaval Research Laboratory

Anthony EphremidesElectrical and Computer Engineering Department

and Institute for Systems ResearchUniversity of Maryland

ISIT 2007 — June 2007

Page 2: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 2

Random-Access System

Collision channel no capture

General Multiple-Access channel all users “succeed”

In-between: Reception in the presence of interferenceSINR-based model

One or more users can be successful

Receiver

Page 3: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 3

SINR-based Capture Model

A packet from user j is successful if and only if

b = 0: Perfect capturesingle detector: largest always successfulmultiple detectors: all are successful

b = ∞: No capture (collision channel)when 2 or more transmit, none are successful

SINR( j) P( j)

N P(i)i1,ij

n

b

P(j) = Power at receiving node from user j

b = Threshold that depends on many system parameters (increasing function of rate)

Receiver

j

Page 4: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 4

Measures of Throughput

Scenario: Single destination Random-access transmissions

“Packet throughput” (ISIT 2006)Expected number of successful packets in a slot:

Sn = E{number of successful packets | n simultaneous transmissions}

Performance depends on threshold b

“Bit throughput” (this paper)Spectral efficiency (bits/sec/Hz)

We address impact of: b Specified BER Modulation scheme

Destination

Page 5: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 5

Packet Throughput: E{Successful packets | n}

All packets for which SINR > b are successful Sn = n Pr{SINR(1) > b} We addressed this problem at ISIT 2006

Model for b < 1 Performance evaluated via simulation

Shape of curves is dramatically different from previous results Because of our propagation model

0

1

2

3

4

5

1 10 100 1000number of transmitted packets (n)

b = 0

b = 0.1

b = 0.2

b = 0.5

b = 1b = 2b = 10

0

1

2

3

1 10 100 1000number of transmitted packets (n)

b = 0

b = 0.1

b = 0.2

b = 0.5

b = 1

b = 2b = 10

PR 1

1 r 2

PR 1

1 r 4

0

1

2

3

4

0 1 2 3 4 5r

= 2

Page 6: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 6

What is the Significance of the Parameter b?

Small value of b high packet throughputBut we pay a price to achieve small values of b:

Fewer bits in each packetExpand BWRelax BER requirement

How does b relate to spectral efficiency (bits/sec/Hz)?

Impact of specified BERImpact of modulation scheme

Page 7: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 7

Key Modeling Assumptions

Modulation scheme: M-ary PSK Minimum symbol duration: t = 1/W W = channel bandwidth

Ways to vary data rate Rb

Choice of k = log2M Increase symbol duration ts > t

This does NOT affect channel BW

No error-control coding

Other-user interference is uniform Gaussian in BW W = 1/t We neglect background noise

Equivalent noise spectral density: Pint P( j)

ji

N0

2Pint

W2Pintt

Page 8: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 8

Es/N0 and its Relationship to b

Evaluate Es/N0 Noise spectral density (background noise = 0):

Bit energy:

Symbol-energy-to-interference ratio:

Relationship to b

For signal i to be successful, we require:

Specifying a value of b is equivalent to requiring:

N0

2Pint

W2Pintt

P(i)

P( j)ji

P(i)

Pint

b

Eb

Rec'd energy in packet

# bits in packet

P(i)T

RbT

P(i)

Rb

P(i)ts

k

Es

N0

kEb

N0

1

2

P(i)

Pint

ts

t

Es

N0

b

2

ts

t

Page 9: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 9

Impact of BER Constraint on Achievable Data Rate

Define:

Esno(BER,k) = value of Es/N0 that is needed to achieve the specified BER when M-ary PSK is used

Spectral efficiency (bits/sec/Hz) is a function of BER, k and b:

Rb

WBER,k,b k min 1,

b

2Esno(BER,k)

Page 10: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 10

Alternative Approximate Model: Shannon Capacity

Shannon capacity

C = W log2(1+b)

Simple, inaccurate modelDoes not address finite packet lengthAddresses operation at BER = 0

Page 11: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 11

Spectral Efficiency of M-ary PSK vs b

Shannon capacity provides a decent approximation for spectral efficiency for BER = 0.1

0

1

2

3

4

0 5 10 15 20 25 30 35 40b

k = 1

k = 2

k = 3

BER = 0.01

0

1

2

3

4

0 2 4 6 8 10 12b

C

k = 1

k = 2

k = 3

BER = 0.1

C

Wlog2(1 b)

C

W

Page 12: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 12

Spectral Efficiency of Binary PSK(in presence of other-user interference)

Relax BER constraint increase spectral efficiency Curves show value of n that provides highest spectral efficiency

0

0.05

0.1

0.15

0.2

2 10 100 1000number of transmitted packets (n)

b = 10

b = 2

b = 1

b = 0.5b = 0.2b = 0.1

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

2 10 100 1000number of transmitted packets (n)

b = 10

b = 2

b = 1

b = 0.5

b = 0.2

b = 0.1

BER = 0.01 BER = 0.1

Spectral Efficiency (Bit Throughput per Hz):

SnRb

W

PR 1

1 r 2

Page 13: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 13

Spectral Efficiency of Binary PSK

(in presence of other-user interference)

0

0.05

0.1

0.15

0.2

0.25

0.3

2 10 100 1000number of transmitted packets (n)

b = 10

b = 2

b = 1

b = 0.5

b = 0.2b = 0.1

0

0.2

0.4

0.6

0.8

1

2 10 100 1000number of transmitted packets (n)

b = 10

b = 2

b = 1

b = 0.5

b = 0.2b = 0.1

BER = 0.01 BER = 0.1

Spectral Efficiency (Bit Throughput per Hz):

SnRb

W

PR 1

1 r 4

Page 14: ISIT 2007 — 1 Throughput (bits/sec/Hz) of Capture- Based Random-Access Systems with SINR Channel Models ______________________________________________

ISIT 2007 — 14

Summary and Conclusions

Addressed spectral efficiency of capture-based random-access systems

Relationships between “packet throughput” and “bit throughput”

Impact of threshold b Impact of BER

Developed basis of trade-offs in scheduled vs random-access systems

Model easily extended to multiple-destination networks with overlapping user populations

Using approach of our MILCOM 2006 paper

Provides link between information theory and networking