Skip to main content
Log in

Maximizing delay-constrained throughput in multi-channel DS-CDMA ALOHA networks through power diversity and successive decoding

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

We study multi-channel ALOHA networks (e.g., satellite-based networks) for online transaction processing, striving to maximize attainable throughput while meeting a deadline with near certainty. This captures the service provider’s fixed costs and per-transaction revenue, the user’s delay consciousness and ALOHA’s probabilistic nature. Specifically, we consider CDMA channels and successive-decoding receivers. Interestingly, judicious use of power diversity is shown to be extremely effective: with a single transmission, capacity is doubled relative to that with power equalization. With the deadline permitting as few as one or two retransmission attempts upon failure, the probability of not meeting it can be virtually diminished (10−5 and 10−8, respectively) while approaching the throughput attainable without delay constraints. This also holds for limited mean transmission power. Thus, the effect of power diversity in conjunction with CDMA depends strongly on the type of receiver and on the exact performance measure, and the proposed approach is worth considering for next-generation systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8

Similar content being viewed by others

Notes

  1. This paper is motivated by the long delays of geostationary satellites, and the most common setup is not mobile, and using highly directional antennas. For this, the AWGN model and the assumption of amplitude stationarity for the duration of a packet are sensible.

  2. The actual relative time shift of different transmissions may exceed a single bit time, but is assumed to be negligible relative to packet length. For interference purposes, the “phase” (modulo T) of the time difference suffices.

  3. Throughout this work, we conveniently mention transmission power levels, W i , but these are actually power levels of the signal arriving at the hub’s receiver. With proper feedback from the hub, we assume that VSAT transmission levels can be adjusted to yield the desired relative levels at the receiver.

  4. We add here another loop of exhaustive search that goes over many vectors of \((P_{c_1},\ldots,P_{c_{D_r}}).\)

  5. Note that the importance of the value of W i is not merely in that it is the numerator of the SIR expression. Rather, it also influences the decoding order. The contribution of other transmissions to the interference seen by our transmission, in turn, depends on the decoding order.

  6. For Poisson random variables there is not really a maximum. We pick a large enough K max such that the probability of getting larger K i s is negligible for our computation purpose.

References

  1. Abramson, N. (1985). Development of the alohanet. IEEE Transaction on Information Theory, 31(3), 119–123.

    Article  MATH  Google Scholar 

  2. Baron, D., & Birk, Y. (2002). Coding schemes for multislot messages in multichannel aloha with deadlines. IEEE Transaction on Wireless Communications, 1(2), 292–301.

    Article  Google Scholar 

  3. Baron, D., & Birk, Y. (2002). Multiple working points in multichannel aloha with deadlines. ACM/Baltzer Wireless Networks, 8(1), 5–11.

    Article  MATH  Google Scholar 

  4. Biglieri, E., Proakis, J., & Shamai, S. (1998). Fading channels: Information-theoretic and communication aspects. IEEE Transactions on Information Theory, 44(6), 2619–2692.

    Article  MATH  MathSciNet  Google Scholar 

  5. Birk, Y., & Keren, Y. (1999). Judicious use of redundant transmissions in multichannel aloha networks with deadlines. IEEE Journal on Selected Areas in Communications, 17(2), 257–269.

    Article  Google Scholar 

  6. Birk, Y., & Revah, Y. (2005). Increasing deadling-constrained throughput in multichannel aloha networks via non-stationary multiple-power-level transmission policies. Wireless Networks, 11, 523–529.

    Article  Google Scholar 

  7. Buehrer, R. M. (2001). Equal ber performance in linear successive interference cancellation for cdma systems. IEEE Transactions on Communications, 49(7), 1250–1258.

    Article  MATH  Google Scholar 

  8. Heiman, R., & Kaplan, G. (1996). Issues in vsat networks, Lecture in The 19th Convention of Electrical and Electronics Engineers in Israel.

  9. Kleinrock, L., & Lam, S. S. (1975). Packet switching in multi-access broadcast channel: Performance evaluation. IEEE Transactions on Communications, COM-23, 410–423.

    Article  Google Scholar 

  10. Lamaire, R., Krishna, A., & Zorzi, M. (1998). On the randomization of transmitter power levels to increase throughput in multiple access radio systems. Wireless Networks, 4(3), 263–277.

    Article  Google Scholar 

  11. Lee, C. C. (1987). Random signal levels for channel access in packet broadcast networks. IEEE Journal on Selected Areas in Communications, SAC-5(6), 1026–1034.

    Article  Google Scholar 

  12. Metzner, J. J. (1976). On improving utilization in aloha networks. IEEE Transactions on Communications, COM-24, 447–448.

    Article  Google Scholar 

  13. Morrow, R. K., & Lehnert, J. S. (1992). Packet throughput in slotted aloha ds/ssma radio systems with random signature sequences. IEEE Transactions on Communications, 40(7), 1223–1230.

    Article  MATH  Google Scholar 

  14. Pursley, M. B. (1977). Performance evaluation for phase-coded spread-spectrum multiple-access communication – part i: System analysis. IEEE Transactions on Communications, COM-25(8), 795–799.

    Article  MathSciNet  Google Scholar 

  15. Revah, Y. (2002). Utilization of power capture for delay-constrained throughput maximization in multi-channel aloha networks. Master’s Thesis, Electrical Engineering Department, Technion.

  16. Roberts, L. G. (1975). Aloha packets, with and without slots capture. Computer Communications Review, 5, 28–42.

    Article  Google Scholar 

  17. Sui, H., & Zeidler, J. R. (2007). A robust coded mimo fh-cdma transceiver for mobile ad hoc networks. IEEE Journal on Selected Areas in Communications, 25, 1413–1423.

    Article  Google Scholar 

  18. Verdú, S. (1998). Multiuser detection. Cambridge University Press.

  19. Yue, W. (1991). The effect of capture on performance of multichannel slotted aloha systems. IEEE Transactions on Communications, 39(6), 818–822.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Yitzhak Birk.

Appendix

Appendix

1.1 A. Random spreading sequences

The performance of various demodulation strategies depends on the signal-to-noise ratio, A k /σ, and on the similarity among the spreading sequences, quantified by their cross-correlations:

$$ \rho_{ij}(\tau)= \int s_i(t)s_j(t-\tau)dt . $$
(26)

In the random signature model

$$ s_{km}(t) = \frac{1}{\sqrt{N}} \sum_{i=1}^{N} d_{kmi}p_{T_c}(t-iT_c+T_c), $$
(27)

where N is the spreading gain. \(\{d_{kmi}\}_{{1\leq i \leq N \atop 1 \leq k \leq K} \atop 1 \leq m \leq M}\) are i.i.d. random variables and can be 1 or −1 with equal probabilities [18].

For further analysis of the interference among users, it is useful to know the statistical properties of the cross-correlation between the spreading sequences of each two users i, j in the mth bit: ρ ijm . In [18] and [14], it is shown that

$$ E\left[\rho_{ijm}^2\right]=\frac{1}{3N} i \neq j. $$
(28)

1.2 B. Packet collision model

1.2.1 Packet decoding

We assume that packets are encoded using an error-correction code. Thus, the probability that the kth user’s packet is not decoded correctly, P c,k , can be closely approximated as a unit step function of the SIR (see for example in [4]):

$$ P_{c,k}=\left\{ \begin{array}{lc} 1, & \Upgamma_k \geq \Upgamma_{thr} \\ 0, & \Upgamma_k < \Upgamma_{thr} \end{array} \right. , $$
(29)

where Γ thr is a parameter that depends on the specific error-correcting code used and Γ k is the SIR of the kth user.

Let \(\{b_i\}_{i=1,\ldots,M}\) denote the M bits of a packet. The output of the decoder, denoted \(\{\hat{b}_i\}_{i=1,\ldots,M}\) is an estimate of these bits. It should be emphasized that the estimation of \(\{\hat{b}_i\}_{i=1,\ldots,M}\) is not a simple per-bit hard-decision but a decoding that takes into account many other neighboring bits. If decoding is successful (which can be easily determined by a simple CRC) then we assume that all of the bit estimates in the packets are accurate. (The amplitude estimation may nonetheless be imperfect). This assumption is an approximation, suitable for long coded packets (longer than 1 kb).

The spreading sequences are assumed to be independent from bit to bit, but the relative delay shifts, τ k , do not change significantly during a given packet. This bit-to-bit error dependence was studied in [13], where the results show that the simple model that ignores inter-bit relations is quite accurate. It is also shown that resorting to a simpler model of synchronous spreading sequences (τ = 0) results in a very pessimistic assessment of capacity. We therefore ignore the bit-to-bit error dependence within each packet, but do not assume bit-level synchronization among different transmissions.

1.3 C. Successive decoding SIR analysis

Let r (k) denote the signal used to detect data from user k, which is the received signal, r(t), after k − 1 subtractions of previously decoded user signals:

$$ r^{(k)}(t)=r(t) - \sum_{i=1}^{k-1}\hat{x}_i(t), $$
(30)

where \(\hat{x}_i(t)\) is an estimate of the received signal from user i, defined as x i (t) = A i b i s i (t − τ i ).

We also define z k to be the matched filter output after k − 1 previous subtractions, \(z_k = \langle r^{(k)}(t), s_k(t) \rangle.\)

Following a similar analysis to [7], the variance of z k in the Hybrid SIC receiver model is

$$ \hbox{var} [z_k^{hyb}] = \frac{1}{3N} \sum_{i=k+1}^{K} A_i^2 + \frac{1}{3N} \sum_{i < k \atop \Upgamma_i < \Upgamma_{thr}} \hbox{var} [z_i^{hyb}] +\sigma^2. $$
(31)

1.3.1 Modeling the amplitude estimation inaccuracy

We use a simple model to account for inaccurate amplitude estimation of successfully decoded signals, by assuming a fixed relative error,

$$ \frac{\left|\hat{A}_k-A_k\right|}{A_k} \approx \alpha . $$
(32)

Adding this to (31) yields

$$ \begin{aligned} \hbox{var} [z_k^{hyb}] & = \frac{1}{3N} \sum_{i=k+1}^{K} A_i^2 + \frac{1}{3N} \sum_{i < k \atop \Upgamma_i < \Upgamma_{thr}} \hbox{var} [z_i^{hyb}] \\ &\quad + \frac{1}{3N}\sum_{i < k \atop \Upgamma_i \geq \Upgamma_{thr}} \alpha^2 A_i^2 +\sigma^2. \end{aligned} $$
(33)

By iteratively calculating E 2[z k ] and var[z k ] for all the users, \(\Upgamma_k=\frac{E^2[z_k]}{var[z_k]}\) can be compared to the decoding threshold, Γ thr to determine the fate of each of the concurrent transmissions.

1.4 D. A numerical method for approximating \(P_{c_{W_i}}\)

We assume that in all the successive cancellation schemes, transmissions are decoded in decreasing-power order. Same-power transmissions are decoded in random order.

Our method hinges on the observation that whether a “probe” transmission collides or not depends only on its SIR, and not on the numbers of concurrent transmissions K i . The SIR of the “probe” depends on its power, W i , and on the aggregate interference, var[z]. Consequently, we do not need to go over the many possibilities of K i vectors as was suggested by the summation in (15); rather, we merely need to calculate the probability distribution of the SIR seen by a transmission at power level W i .Footnote 5 \(P_{c_{W_i}}\) is calculated given the power W i , so W i is a parameter. var[z] is a random variable, because it depends on the interfering transmissions, their power levels and the cross-correlations between their spreading sequences and the probe’s spreading sequence.

Let I i denote the interference (contribution to var[z]) from higher- and lower-power transmissions than W i . The interference from transmissions with the same power level W i is excluded intentionally (The interference from these transmissions will be taken care of by the definition of the function \(P_{c_{W_i}}(n,v)).\)

We can simplify (15):

$$ P_{c_{W_i}} = \sum_{n=0}^{\infty} \Pr(K_i=n) \int_{v=0}^{\infty} P_{c_{W_i}}(n,v) dP_{I_i}(v), $$
(34)

where \(P_{I_i}(v)\) is the cumulative probability function of \(I_i,\,\, P_{I_i}(v) = \Pr(I_i\leq v).\) The function \(P_{c_{W_i}}(n,v)\) is the probability of collision for a W i -power transmission, given that n transmissions with W i occurred and the interference from other transmissions (lower + higher) equals v. This function can be pre-calculated and saved in a table for reference when calculating the integral in (34).

We separate the interference I i into two parts: \(I_i=I_i^{H}+I_i^{L}.\) I L i results from an aggregate of lower power level transmissions that are decoded after the “probe” transmission is decoded. Therefore, the interference that they induce does not depend upon the success/failure of their decoding. \(I_i^{H},\) in contrast, is the residual interference seen by the “probe” transmission, left by imperfect subtractions of previously decoded transmissions. Therefore, it depends on the success/failure of previous decodings. Furthermore, the results of previous decoding depend on the SIR levels seen by higher power level transmissions, which depend on the interference \(I_{i-1}^{L}.\) The analysis of \(I_i^{H}\) must therefore take into account the dependence on \(I_{i-1}^{L}.\)

1.4.1 Calculation of the probability distribution of \(I_i^{L}\)

We begin with the calculation of \(P_{I_i^{L}}(v) = \Pr(I_i^{L} \leq v).\) For i = m, the “probe” transmission is received with the lowest of power levels, so there is no interference from lower power levels by definition. Therefore, \(I_m^{L}=0\) w.p. 1, and \(P_{I_m^{L}}(v)\) is the unit step function:

$$ P_{I^{L}_m}(v) = \left\{ \begin{array}{ll} 1, & v \geq 0 \\ 0, & v < 0 \end{array} \right. $$
(35)

\(P_{I_i^{L}}(v)\) can be calculated iteratively using the following rule:

$$ \begin{aligned} P_{I_i^{L}}(v) & = \Pr(I_i^{L} \leq v) \\ & = \sum_{n=0}^{\infty} \Pr(K_{i+1}=n) \Pr(I^{L}_{i+1} + n W_{i+1} \leq v) \\ & = \sum_{n=0}^{\infty} \Pr(K_{i+1}=n) \Pr(I^{L}_{i+1} \leq v- n W_{i+1}) \\ & = \sum_{n=0}^{\infty} P_{I^{L}_{i+1}}( v- n W_{i+1} ) , \end{aligned} $$
(36)

1.4.2 Calculation of the probability distribution of I H i

Because of the dependency between I H i and I L i−1 , we calculate the conditional probability distribution function of I H i given I L i−1 . We define \(P_{I_i^{H} | I_{i-1}^{L}}(u,v)\):

$$ P_{I_i^{H} | I_{i-1}^{L}}(u,v)= \Pr (I_i^{H} \leq u | I_{i-1}^{L}=v) . $$
(37)

To facilitate the presentation, let I + i be the residual interference left by the imperfect subtractions of the W i transmissions. The residual interference left by imperfect subtractions of \(W_1,\ldots,W_{i-1}\) is I H i and is excluded intentionally. I + i depends only on K i , the number of transmissions with W i , and on the total interference \(I_i^{H}+I_i^{L}.\) The dependency on the interference in the linear receiver is due to the variance of the matched filter output, which depends on the interference. In the non-linear receiver, the success/failure of the decoding depends on the interference, and the decoding result affects the residual interference.

We will therefore use the notation \(I_i^{+}(K_i,I_i)\) to denote the residual interference left by K i imperfect subtractions (of transmissions with power level W i ) given that the interference from other power levels (higher + lower) was I i .

\(I_i^{+}(K_i,I_i)\) and \(P_{c_{W_i}}(K_i,I_i)\) (in (34)) can be pre-calculated and saved in a table using the analysis in Sect. C. As an example, we show how this precalculation should be done for the hybrid receiver defined in Sect. 2.

Example 1: Calculating \(P_{c_{W_i}}(K_i,I_i)\) and \(I_i^{+}(K_i,I_i)\) for the hybrid receiver case.

Set \(P_{c_{W_i}}(K_i,I_i)=0\) and \(I_i^{+}(K_i,I_i)=0\)

Iterate on j from 1 to K i

\(\Upgamma_j = \frac{W_i}{\frac{1}{3N} \left[ (K_i-j)W_i + I_i + I_i^{+}(K_i,I_i) \right] + \sigma^2};\)

  if (Γ j  > Γ thr ) /* Successful Decoding */

    \(I_i^{+}(K_i,I_i) = I_i^{+}(K_i,I_i) +\)

      α2 W i ; /* Power estimation error*/

  else

    \(P_{c_{W_i}}=P_{c_{W_i}}+1/K_i;\)

    \(I_i^{+}(K_i,I_i) = I_i^{+}(K_i,I_i)\)

      \( +\frac{1}{3N} \left[ (K_i-j)W_i + I_i + I_i^{+}(K_i,I_i) \right] \)

      + σ2;

  end

end

1.4.3 Calculation of \(P_{I^{H} | I^{L}}\)

Now that we have \(P_{c_{W_i}}(K_i,I_i)\) and \(I_i^{+}(K_i,I_i)\) ready, we go on to calculate the probability distribution of \(I_i^{H}\) given \(I_{i-1}^{L}.\) By definition, \(I^{H}_1=0\) w.p. 1. Therefore

$$ P_{I^{H}_1 | I^{L}_{0}}(u,v)=\left\{ \begin{array}{ll} 0, & u < 0 \\ 1, & u \geq 0 \end{array} \right. $$
(38)

To calculate \(P_{I_i^{H}|I_{i-1}^{L}}\) iteratively, we would like to express it in terms of \(P_{I_{i-1}^{H}|I^{L}_{i-2}}:\)

$$ \begin{aligned} P_{I_i^{H} | I_{i-1}^{L}}& (u,v) = \Pr (I_i^{H} \leq u | I_{i-1}^{L}=v) \\ &= \sum_{n=0}^{\infty} \Pr(K_{i-1}=n) \cdot \\ & \int_{u^{\prime}|I^{+}_{i-1}(n,v+u^{\prime})+u^{\prime}\leq u} dP_{I_{i-1}^{H} | I^{L}_{i-2}}(u^{\prime},v+nW_{i-1}) \end{aligned} $$

The summation and integration in (39) are over all values of K i−1 and u′, where u′ is the residual interference \(I_{i-1}^{H}.\) Because \(I_i^{H}=I_{i-1}^{H}+I^{+}_{i-1},\) we integrate over u′ values that yield a \(I_i^{H}\) interference less or equal to u.

Let \(u^{\bigstar}\) be the solution to the equation \(I^{+}_{i-1}(K_i,I_{i-1}^{L}+u^{\bigstar})+u^{\bigstar}=I_i^{H}. \) \(u^{\bigstar}\) can be pre-calculated and saved in a table, \(u^{\bigstar}(K_i,I_{i-1}^{L},I_i^{H}).\)

\(I^{+}_{i-1}(K_i,I_{i-1}^{L}+u^{\prime})\) is a monotonically non-decreasing function of u′, so the set of values of u′ over which we integrate is simply \(u^{\prime}\leq u^{\bigstar}.\) Using the table \(u^{\bigstar}(K_i,I_{i-1}^{L},I_i^{H}),\) (39) can be simplified,

$$ \begin{aligned} P_{I_i^{H} | I_{i-1}^{L}}(u,v) & = \sum_{n=0}^{\infty}\Pr(K_{i-1}=n) \cdot \\ & \quad P_{I_{i-1}^{H}|I^{L}_{i-2}}\left(u^{\bigstar}(n,v,u),v+nW_{i-1}\right) . \end{aligned} $$
(39)

Finally, \(P_{c_{W_i}}\) can be calculated using the pre-calculated tables \(P_{c_{W_i}}(K_i,I_{i-1}^{L}),\,\, P_{I_i^{H}|I_{i-1}^{L}}(u,v)\) and \(P_{I_i^{L}}(v)\):

$$ \begin{aligned} P_{c_{W_i}} &= \sum_{n=0}^{\infty} \Pr(K_{i}=n) \int_{v=0}^{\infty} dP_{I_i^{L}}(v) \\ & \int_{u=0}^{\infty} P_{c_{W_i}}(n,u+v) dP_{I_i^{H}|I_{i-1}^{L}}(u,v+nW_i) . \end{aligned} $$
(40)

1.4.4 Complexity analysis

Let m be the number of power levels and K max be the maximum number of transmissions per power level.Footnote 6 The probability functions described in the analysis above are actually approximated by histograms. Let N I be the number of bins on the interference axis of the histograms that we keep for functions like \(P_{I_i^{H} | I_{i-1}^{L}}(u,v).\) The table size required for this function is \(N_I^2.\)

The calculations that are done according to the analysis above are in the order of \(m \cdot N_I^2 \cdot K_{\rm max}.\) If we had to do the brute-force summation described in (15), this would require calculations that are in the order of \( K \cdot K_{\rm max}^{m} .\) For K max = 100, m = 6 and N I  = 1000, the brute force method is simply infeasible while the numerical approach leads to the results shown in this paper. Furthermore, our method is more scalable in the sense that the computation needed for larger K and m grows linearly rather than exponentially.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Birk, Y., Tal, U. Maximizing delay-constrained throughput in multi-channel DS-CDMA ALOHA networks through power diversity and successive decoding. Wireless Netw 15, 1126–1139 (2009). https://doi.org/10.1007/s11276-008-0107-4

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-008-0107-4

Keywords

Navigation