IEICE TRANS. COMMUN., VOL.E98–B, NO.10 OCTOBER 2015

1978

PAPER

Special Section on 5G Radio Access Networks — Part II: Multi-RAT Heterogeneous Networks and Smart Radio Technologies

Decentralized Multilevel Power Allocation for Random Access Huifa LIN†a) , Nonmember, Koji ISHIBASHI† , Won-Yong SHIN†† , and Takeo FUJII† , Members

SUMMARY In this paper, we introduce a distributed power allocation strategy for random access, that has the capabilities of multipacket reception (MPR) and successive interference cancellation (SIC). The proposed random access scheme is suitable for machine-to-machine (M2M) communication application in fifth-generation (5G) cellular networks. A previous study optimized the probability distribution for discrete transmission power levels, with implicit limitations on the successful decoding of at most two packets from a single collision. We formulate the optimization problem for the general case, where a base station can decode multiple packets from a single collision, and this depends only on the signal-to-interference-plusnoise ratio (SINR). We also propose a feasible suboptimal iterative perlevel optimization process; we do this by introducing relationships among the different discrete power levels. Compared with the conventional power allocation scheme with MPR and SIC, our method significantly improves the system throughput; this is confirmed by computer simulations. key words: random access, decentralized power allocation, convex optimization, multipacket reception (MPR), successive interference cancellation (SIC), machine-to-machine (M2M) communications

1. Introduction Currently, the coming fifth-generation (5G) cellular network is receiving much attention from both academia and industry [1]–[6]. In 5G networks, the number of devices is likely to increase dramatically due to the potential development of Internet of Things (IoT) applications [4]. Consequently, one key requirement of 5G is the native support of machine-tomachine (M2M) communication with a massive number of devices [1]. However, the enormous traffic generated by this M2M communication poses a challenge to the centralized multiple access of current cellular networks; thus, a new random access scheme dealing with such a traffic is required [5]. In conventional random access schemes such as pure and slotted ALOHA, a collision is defined as an event that two or more users transmit simultaneously [7]. Conventional analysis of random access mainly focuses on the performance of the media access control (MAC) layer, ignoring the details of the physical (PHY) layer, and all packets received during the collision time slot are considered to be Manuscript received January 19, 2015. Manuscript revised May 1, 2015. † The authors are with the Advanced Wireless & Communication Research Center (AWCC), The University of ElectroCommunications, Chofu-shi, 182-8585 Japan. †† The author is with the Computer Science and Engineering, Dankook University, 152 Jukjeon-ro, Shuji-gu, Yongin-si, Gyeonggi-do 448-701, Korea. a) E-mail: [email protected] (Corresponding author) DOI: 10.1587/transcom.E98.B.1978

destroyed [8]. Therefore, when the traffic load becomes relatively high, the throughput of these schemes steeply falls down because of collisions. However, it has been well-recognized in the literature [9]–[16] that more complex procedures could permit decoding of interfering signals, which is referred to as multipacket reception (MPR). For example, if the power of one of the received packets is sufficiently higher than the other packets in the collision, the strongest one can be correctly decoded while the others are lost, which is known as capture effect [9]. Also, a successive interference cancellation (SIC) decoder might decode more packets by successively subtracting the correctly decoded packets from the collision [17]. The SIC decoder performs as well as a near-optimal decoder while it has much lower linear complexity [18]. The use of SIC has thus been actively investigated in wireless multipleaccess scenarios [19]–[23]. Recently, the slotted ALOHA with SIC has been extensively studied [24]–[26]. The contention resolution diversity slotted ALOHA (CRDSA) has been proposed to enhance the throughput [24]. In CRDSA, every packet is transmitted twice with a pointer to the slot where the respective copy is sent. Whenever the receiver can decode the packet without the interference, the pointer is extracted and the potential interference in the corresponding slot is removed by the SIC. Upon iterating this procedure, the CRDSA achieves the low packet loss rate even at moderately high loads. In [25], the number of repetition of each packet was optimized using density evolution. Moreover, in [26], the idea of rateless coding has been applied to design the slotted ALOHA. These papers, however, have not considered the capture effect or MPR from one collision. Furthermore, a significantly large buffer is required at the receiver to hold all the received signals until the included packets are resolved. As originally pointed out in [9], the power allocation enhances the resulting throughput of the system. In [11], [16], a random transmission power control was proposed in order to achieve higher throughput assuming that the receiver is able to decode a single packet from the collision. In [27], a decentralized power control for random access with SIC was proposed; in this system, the discrete power levels were derived, and the optimal probability distribution of power levels was obtained, with the implicit limitation of that, at most, two packets could be decoded from a single collision. In this paper, we focus on a random power allocation to enhance the MPR capability and the use of SIC for the sin-

c 2015 The Institute of Electronics, Information and Communication Engineers Copyright 

LIN et al.: DECENTRALIZED MULTILEVEL POWER ALLOCATION FOR RANDOM ACCESS

1979

gle random access time slot to avoid the large buffer at the receiver side. Specifically, we propose decentralized multilevel power allocation (MLPA). The users randomly select transmission powers from the given discrete power levels according to the corresponding probability distribution and the receiver tends to decode more than two packets from a collision. This decentralized power control and optimization are similar to [27] but our approach can be considered as a more general case. We propose a suboptimal per-level iterative optimization method for the additive white Gaussian noise (AWGN) channel. However, the obtained power levels and the corresponding probabilities also perform well in the fading environment. The main contributions of this paper are summarized as follows: • The probability distribution optimization problem of the multilevel power allocation for generalized random access with MPR and SIC is formulated. • A feasible suboptimal solution using the virtual user method and the per-level iterative optimization process is proposed. • The theoretical throughput is derived from the optimization results and is used to investigate the improvement of throughput with an increase in the power level. • The selection of base code is investigated by performing computer simulations. The paper is organized as follows. Section 2 describes the system model. In Sect. 3, we propose the multilevel random access scheme, formulate the optimization problem, introduce the virtual user method, and present the iterative per-level optimization process. Section 4 is devoted to the analysis of the proposed scheme and provides the analytical value of the system MAC throughput. In Sect. 5, we compare the performances by presenting the numerical results from computer simulations. Finally, Sect. 6 summarizes our conclusions.

Notation K k ek L l El pl Kl Ro ρ ν δ dl Dl DL T R

Table 1 Notation. Meaning Number of active users Index of user, k = 1, 2, · · · , K Transmission power of user k Number of power levels Index of power level, l = 1, 2, · · · , L Value of power level l Probability of selecting discrete power El Number of users with discrete power El Base rate Decoding threshold of base code 1 ρ rounded down to an integer Margin ratio of decoding threshold, δ = ρ1 − ν Conditional expectation of packet number successfully decoded at level l Expectation of packet number successfully decoded from level 1 to level l Expectation of packet number successfully decoded from level 1 to level L System MAC throughput System PHY throughput

Fig. 1 System model of random access using decentralized power allocation with K users.

2. System Model Preliminary to an explanation of the system model treated throughout the paper, the notation is summarized in Table 1. We consider a wireless random access network that consists of one common base station (BS) and K users as illustrated in Fig. 1. Let K = {1, 2, · · · , K} denote the set of users and k ∈ K is an index of the user. As shown in Fig. 2, the information packets are first encoded by sufficiently powerful channel codes, such as turbo codes and low-density parity-check (LDPC) codes, and then the coded packets are modulated to complex signals. The channel coding and the modulation together constitute the base code with the data rate Ro . At every time slot, each user randomly selects a transmission power and transmits its own coded packet with the chosen power. Namely, user k transmits with power ek ∈ [0, 1]. If ek = 0, user k is idle during the time slot, and if ek = 1, user k transmits with full power. Note that this can be considered to be a simplified case of the slotted

Fig. 2 Block diagram of random access using the same base code and decentralized power allocation, with K users during N time slots.

ALOHA, where each user either transmits with full power or keeps idle. Each user selects the transmission power independently in a distributed manner, and none has any knowledge of the transmission power of the other users. The network is assumed to be fully loaded, that is, each user always has a packet to transmit and the buffer is assumed to be sufficient (i.e., the arrival packets are queued in the buffer that is large enough that packets are never discarded). The received signal y at the BS can be written as y=

K  i=1

√ hi ei xi + z,

(1)

IEICE TRANS. COMMUN., VOL.E98–B, NO.10 OCTOBER 2015

1980

where xi is the transmitted signal of the i-th user with am√ plitude ei and hi denotes the complex channel coefficient. When additive white Gaussian noise (AWGN) channels is considered, we have hi = 1 for ∀i. Also, when flat Rayleigh fading channel is considered, the channel coefficient is modelled as a circularly symmetric complex Gaussian random variable hi ∼ CN(0, 1). We assume that the channel state information (CSI) is ideally available at the BS but not at the users. The noise z is modelled as a circularly symmetric complex Gaussian random variable z ∼ CN(0, N0 ). One of the application scenarios is that the users are located far away from the BS and they are close to each other compared with the distance to the BS. Hence the path loss difference of uplink (user to BS) is not the dominant factor for the decentralized power allocation and is neglected in this paper. Then, the signal-to-interference-and-noise ratio (SINR) corresponding to the user k can be calculated by SINRk =  i∈K\k

|hk |2 ek , |hi |2 ei + N0

(2)

where K \ k denotes the subset of K from which k is excluded. The BS can decode the packet of user k if and only if SINRk exceeds the decoding threshold ρ which is obviously defined by Ro . The threshold of ideal channel coding ρ˜ is thus given by ρ˜ = 2Ro − 1.

Fig. 3 Bit error rate performance of the scheme with totally correlated interfering users, using BICM or not using BICM. We use a turbo code with component code of rate 1/3 RSC code (15, 17)8 in octal form. The information size is 1530 bits and quadrature phase shift keying (QPSK) is used.

(3)

However, owing to the gap between practical codes and channel capacity, a higher SINR is required to correctly decode the information. Hence, we use an arbitrary small Δ > 0 to consider this gap. The practical decoding threshold is given by   (4) ρ = 2Ro − 1 (1 + Δ). In a communication system, the packets from different users would correlate each other and significantly degrade the decoding performance. To deal with this problem, bit-interleaved coded modulation (BICM) that originally proposed to improve the decoding performance in the fading environment [28], can be used to eliminate the correlations by letting each packet use statistically independent interleaver. We perform simulations of transmitting totally correlated packets but without the noise, comparing with the case of AWGN channel that the packet is only corrupted by the noise. As shown in Fig. 3, the correlated interferences profoundly degrade the decoding performance. However, with the BICM, the cases that the users using different interleavers achieve close waterfall region to the case of the AWGN channel. In a practical scenario, the users would generate partially correlated packets but the correlation portion is small, and the BICM can further decorrelate the packets. Hence, we use the decoding threshold in the proposed algorithm and the simulations. Upon decoding the information packet with the highest SINR, the SIC process begins to subtract the corresponding

packet from the received signal. The SIC process is repeated in the order of descending SINR until all packets have been decoded except for that none’s SINR exceeds the decoding threshold. 3. 3.1

Multilevel Power Allocation Problem Statement

We consider the discrete power levels and the corresponding probability mass function (PMF) in a random access system, since it was conjectured in [16], [27] that the optimal power distribution may be of a discrete nature. For each time slot, each user randomly selects a transmission power from a set of discrete power levels E = {E0 , E1 , · · · , E L }, according to the discrete probability distribution p = [p0 , p1 , · · · , pL ]. Here l ∈ {0, 1, · · · , L} is the index of the power levels. Taking user k for example, the probability that it transmits with El is given by pl = Pr(ek = El ).

(5)

With the power constraints, the power of the lowest level is E1 > 0 and the power of the highest level is E L ≤ 1. We assume that Ei < E j , ∀i < j. When ek = E0 = 0, it means that the user does not  transmit signals, andthe correspondL L pi ≥ 0; hence i=1 pi ≤ 1. The ing probability is 1 − i=1 key issues here are how to design the discrete power levels and how to optimize the probability distribution in order to maximize the average number of decodable packets, given the constraint on the transmission power. In the rest of paper, this average number of decodable packets is referred to as MAC throughput. 3.2

Optimization Problem Formulation

To formulate the problem of maximizing the system MAC throughput, we define the event of successful decoding the

LIN et al.: DECENTRALIZED MULTILEVEL POWER ALLOCATION FOR RANDOM ACCESS

1981

users with power level l as DL (p, E) = dL + · · · + dl

Sl = Event[successfully decode Kl packets of l-th level],

ql (p, E) = Pr(Sl |Sl+1 , . . . , SL ) ⎛ ⎞ ⎜⎜⎜ ⎟⎟ El ⎜ = Pr ⎝ ≥ ρ⎟⎟⎠ , l−1 (Kl − 1)El + i=1 Ki Ei

(7)

where the other (Kl − 1) signals with the same power El and the signals with the lower power levels l−1 i=1 Ki E i are considered to be interference. Equation (7) shows the condition for successful decoding one user from among Kl users. Upon the successful decoding of the first packet with power level El , the interference from the same power level is reduced to (Kl − 2)El , due to the packet subtraction. Hence with this condition, all Kl users can be successfully decoded. Assuming the packets of higher levels are successfully decoded and subtracted, for the l-th power level, the conditional expectation of packet number that can be successfully decoded is given by† dl (p, E) = E[Kl ql ] =

K  Kl =1

⎛ ⎜⎜ Kl Pr(Kl ) Pr ⎜⎝⎜

El (Kl − 1)El +

l−1

i=1 Ki E i

⎛ ⎞ L L−1 ⎜  ⎟⎟⎟ ⎜⎜⎜  ⎜⎜⎝d j = dL + qi ⎟⎟⎠⎟. j=1

L  i=2

qi (10)

i= j+1

For a general case, let Dl (p, E) †† denote the expectation of packet number that can be successfully decoded from power levels 1 to l, assuming the packets of all the higher power levels are subtracted. Similarly Dl is given by ⎛ ⎞ l−1 ⎜ l  ⎟⎟⎟ ⎜⎜⎜  ⎜⎝⎜d j Dl (p, E) = dl + qi ⎟⎟⎠⎟. (11) j=1

i= j+1

For the multiple-access network, the system MAC throughput T is used to measure the MAC layer efficiency, which is mathematically defined by N ˜ DL (i) , (12) T = i=1 N where N is the number of time slots and D˜ L (i) is the number of successfully decoded packets in the i-th time slot. According to the definition of T , the optimization of the function DL (p, E) is identical to the maximization of the system MAC throughput. Direct formulation of the optimization problem is hence given by max

DL (p, E)

s.t.

0 < Ei ≤ 1, i = 1, . . . , L Ei−1 − Ei < 0, i = 1, . . . , L 0 < pi < 1, i = 1, . . . , L

p,E

⎞ ⎟⎟ (8) ≥ ρ⎟⎠⎟,

where Kl is a binomial random variable whose probability is given by K Kl (9) p (1 − pl )K−Kl . Pr(Kl ) = Kl l

qi + · · · + d1

i=l+1

(6) where LKl is the number of users transmitting with power El , Kl = K. and l=0 For analytical tractability, we here consider the AWGN channels, namely hi = 1, ∀i. Consider the decoding of an arbitrary user with the l-th power level in the sufficiently high SNR region where the effect of noise can be neglected. Assuming that the users above the l-th power level have been successfully decoded and ideally subtracted by the SIC process, the probability of successful decoding is given by

L 

L 

(13)

pi ≤ 1.

i=1

3.3

Suboptimal Per-Level Optimization

Let DL (p, E) denote the expectation of packet number that can be successfully decoded from power level 1 to L. Considering the overall SIC process, the decoding starts from the highest power level L. The throughput contribution of the L-th power level is simply given by dL , since there is no higher power level. For power levels l < L, we need to take into account of the probabilities of successfully decoding the higher levels since only when the packets of all the higher levels are subtracted first, the packets of l-th level have the chance to be decoded. Hence L the contribution qi . Finally the of the l-th power level is given by dl i=l+1 overall throughput DL (p, E) is a summation of the throughput contributions from all the power levels, as the following

Since the number of power levels L is unknown, direct optimizing the target function DL (p, E) is unfeasible. Moreover, even if we can derive L, it is difficult to prove the concavity of the target function DL (p, E), which consists of multiple functions of ql (p, E) and dl (p, E). By  observing (7), we notice that the summed interference l−1 i=1 Ki E i makes it difficult to derive the successful decoding probability ql . If this item can be replaced by a function of El , it may be possible to obtain a closed form of ql that depends only on El and Kl . Hence to simplify the problem and make the optimization feasible, we propose a suboptimal method that introduces relationships among the power levels. Specifically, except for the first power level, the relationships among the current l-th power level (l > 1) and its lower power levels is given by

† To simplify the notation, ql (p, E) will be written as ql when this will not cause any confusion.

†† Dl (p, E) will be written as Dl when this will not cause any confusion.

IEICE TRANS. COMMUN., VOL.E98–B, NO.10 OCTOBER 2015

1982

El =

l−1 

K pi Ei .

(14)

i=1

Based on the law of large numbers, for large K, we can make the following approximation: l−1  i=1

K pi Ei ≈

l−1 

Ki E i .

(15)

i=1

From (14) and (15), the total power of all users at lower levels can be treated as a single virtual user at the current power level. Thus, (7) can be rewritten as ⎛ ⎞ ⎜⎜⎜ ⎟⎟ El ql (pl ) = Pr ⎝⎜ ≥ ρ⎟⎠⎟ l−1 (Kl − 1)El + i=1 Ki Ei

El ≥ρ ≈ Pr (Kl − 1)El + El

(16) 1 = Pr Kl ≤ = Pr (Kl ≤ ν) ρ ν  K u = pl (1 − pl )K−u , u u=0   1 where ν = ρ . Since Kl is the number of packets, and thus it is always an integer, the equation Pr (Kl ≤ 1/ρ) = Pr (Kl ≤ ν) holds. Hence for l > 1, at most ν users at the lth power level can be decoded. With this approximation, for each power level, using (7)–(11) and (16), the target function Dl (p, E) is reduced to a simplified function Dl (pl ), which is given by Dl (pl ) = ql (Kl + Dl−1 ) = Pr (Kl ≤ ν) (Kl + Dl−1 )

ν  K u pl (1 − pl )K−u (u + Dl−1 ) , = u u=0

(17)

where pl is the only variable and Dl−1 is set to a constant, since Dl−1 is maximized for power level l − 1 and is independent of pl . As shown in (16), the set of power levels E has no effect on the target function. Finally, for the l-th power level, the optimal p∗l can be obtained by maximizing the function Dl (pl ), which turns out to be quasiconcave. Proposition 1. Function Dl (pl ) is quasiconcave. The proof is given in Appendix. Since Dl (pl ) is proven to be quasiconcave, we know that there is one and only one global maximal for Dl (pl ), and the optimal p∗l can be obtained by the optimization algorithm. Hence the optimization of the multilevel power allocation becomes feasible by using an iterative process from the lowest to the highest power level. For each power level, the optimization problem is simplified to

ν  K u max Dl (pl ) = pl (1 − pl )K−u (u + Dl−1 ) pl u . u=0 s.t.

0 < pl < 1. (18)

Algorithm 1 Obtain E and p∗ Initialization: l = 1, E1 while 1 do Optimize Dl and obtain p∗l using (17)  if li p∗i ≤ 1 then save pl to p∗ , continue. else discard p∗l , break. end if Calculate El using (14) if El ≤ 1 then save El to E, l = l + 1, continue. else discard El and p∗l , break. end if end while

The optimization process begins from the lowest power level l = 1, where the minimum required transmission power is E1 = N0 ρ. For higher power levels l > 1, the power is calculated by (14). The entire process is shown as Algorithm 1. The optimization is calculated iteratively up to the highest power level L, with L constraints on the power E L ≤ 1 pi ≤ 1. Finally, we can obtain and on the probability i=1 the set of power levels E and the corresponding optimized discrete probability distribution p∗ . 3.4

Calculation of Power Levels

In this subsection, we provide a method for choosing the parameters that improve the calculation of El by taking into account the effect of noise. For a given SNR, the system MAC throughput depends only on the base rate, since for a given base rate Ro , the decoding threshold ρ and ν are determined. However, we notice that ν ≤ 1/ρ, and the margin ratio of the decoding threshold is δ=

1 − ν, ρ

(19)

where 0 ≤ δ < 1. In the presence of noise, the condition in (16) for successful decoding can be rewritten as El ≥ ρ, (Kl − 1)El + El + N0

(20)

which can be expressed as Kl ≤

1 N0 − . ρ El

(21)

Recalling (16), the condition for successful decoding after omitting the noise and excessive interference is Kl ≤ ν. The effect of noise can be neglected due to the margin ratio if ν≤

1 N0 − . ρ El

(22)

For the power levels of l > 1, it follows that El ≥

N0 . δ

(23)

LIN et al.: DECENTRALIZED MULTILEVEL POWER ALLOCATION FOR RANDOM ACCESS

1983

We use these requirements to improve the calculation of power for l > 1, as follows: ⎞ ⎛ l−1 ⎜⎜⎜ N0 ⎟⎟⎟⎟ ⎜ K pi Ei , ⎟⎟⎠ . El = max ⎜⎜⎝ δ i=1

(24)

q∗l = Pr(Sl |Sl+1 , . . . , SL , p∗ ) ν  K−u K ∗u  = pl 1 − p∗l u u=0 ≈

ν  λu e−λl l

4. Performance Analysis In this section, we derive the analytical system MAC throughput from the probabilities p∗ = [p∗0 , p∗1 , · · · , p∗L ] obtained by the proposed algorithm. The obtained power levels and the corresponding probabilities are shown in Fig. 4 and Fig. 5, respectively. According to the calculation of DL in (10), we can derive the theoretical system MAC throughput D∗L . Let q∗l denote the probability of successful decoding the l-th power level for l ∈ {1, 2, · · · , L}. By replacing pl with p∗l in (7), we derive q∗l by the following

where

u!

u=0

(25)

λl = p∗l K,

where if K is sufficiently large, from the fact that a Poisson distribution is an approximated version of the binomial distribution for large K, we make the above approximation. Let dl∗ denote the MAC throughput contributed by power level l. Similarly, by replacing pl with p∗l in (8), we derive dl∗ by the following  ν  K−u K ∗u ∗ u pl 1 − p∗l dl = u u=1 (26) ν  λul e−λl ∗ where λl = pl K. ≈ (u − 1)! u=1 Using (10), (25) and (26), the analytical system MAC throughput is given by the following closed-form expression D∗L (d∗ , q∗ , L) = dL∗ + · · · + dl∗

L  i=l+1

q∗i + · · · + d1∗

⎛ ⎞ L L−1 ⎜  ⎟⎟⎟ ⎜⎜⎜ ∗  ∗ ∗ ⎜⎜⎝d j = dL + qi ⎟⎟⎟⎠, j=1



Fig. 4 Value distribution of the discrete power levels for various noise powers with K = 100.

Fig. 5 Probability distribution of the discrete power levels for various noise powers with K = 100. According to this probability distribution, in the random access system, most of the users are idle, but a small portion of users transmit at different power levels.

L  i=2

q∗i

(27)

i= j+1

[q∗1 , · · ·

, q∗L ] and d∗ = [d1∗ , · · · , dL∗ ]. where q = As shown in Fig. 6, the throughput results from the simulation are tightly bounded by the derived analytical throughput. We design the suboptimal algorithm with the assumption of low noise power and neglect the noise in the optimization problem formulation. Hence as the noise power decreases, the numerical throughput by the simulations approaches to the analytical throughput. Having the analytical throughput, we can well understand the performance that the random access system can achieve, especially for the case of low noise power.

Fig. 6 Analytical throughput and throughput results by simulation for various 1/N0 values with K = 100 and Δ = 0.1.

IEICE TRANS. COMMUN., VOL.E98–B, NO.10 OCTOBER 2015

1984 Table 2

Simulation parameters.

Parameter Base channel code Base modulation Base rate Ro Gap of threshold Δ Decoding threshold ρ Noise power N0 Fading channel Number of user K

Value 1/5 turbo code QPSK 1/5 × 2 = 0.4 0.4125 0.4467 10−1 Flat Rayleigh fading [4,20]

5. Numerical Results We perform computer simulations and use them to verify the effectiveness of the proposed MLPA scheme and to compare it with the existing random access schemes. The simulation parameters are listed in Table 2. We also perform simulations with using various data rates and provide some guidance on selecting the base code.

Fig. 7 Comparison of system MAC throughput for various schemes with different numbers of users.

5.1 Throughput Performance Comparisons We make the comparisons of the system MAC throughput using the the proposed scheme and the conventional decentralized power allocation schemes for various number of user K. Figure 7 shows the system MAC throughput performances of various random access schemes including the slotted ALOHA, the SIC scheme with decentralized power allocation (SIC-DPA) in [27], and our proposed SIC scheme with MLPA (SIC-MLPA). Specially, we also perform the simulation for the proposed MLPA with the same constraint as in [27] where at most two packets can be decoded from one collision (SIC-MLPA constrained). The SIC-DPA scheme achieves superior throughput performance comparing with the slotted ALOHA, since the capability of SIC is exploited by properly allocating transmission power. However, its performance is limited, since at most two collided packets can be decoded, even if the decoding threshold is exceeded. The proposed SIC-MLPA achieves large throughput improvement without the constraint, and the SIC-MLPA constrained scheme still can achieve superior performance but with smaller gain. This indicates that the main gain comes from successful decoding from collisions of more than two packets. Hence to exploit the advantage of the SIC receiver, our proposal is more effective.

Fig. 8 Throughput performance comparison among various schemes in the fading environment.

mance comparing with the scheme without power allocation, and the proposed SIC-MLPA further improves the throughput performance. These results show that although the fading affects the power allocation on the received powers, the power allocation schemes can still outperforms the scheme without power allocation. Figure 9 compares the throughput performances between the fading channel and the AWGN channel. Both the existing SIC-DPA scheme and the proposed SIC-MLPA scheme in the fading environment achieve superior throughput performance. For our proposal, this is because that the random fading coefficient makes the received powers of the same transmit power level more dynamic and creates additional opportunities of successful decoding.

5.2 Throughput Performances in Fading Environment

5.3

Base Code Selection

Figure 8 shows the throughput performances of the random access schemes with SIC in the fading environment, using different decentralized power allocation strategies including the proposed SIC-MLPA scheme, the SIC-DPA scheme in [27], and the random access scheme with SIC but without transmission power allocation (the received power is changed randomly by the fading channel). The existing SIC-DPA scheme achieves superior throughput perfor-

Since the parameters including ρ, ν, and δ that affect the performance are determined only by the base rate Ro , we performed simulations for various base rates. The system PHY throughput results for 1/N0 = 20 [dB] are listed in Table 3. Note that we set Δ = 0.1 for the assumption of even powerful channel code. Here, the system PHY throughput R is used to measure the overall efficiency of both the MAC and PHY layers. Since all of the users adopt the same base code

LIN et al.: DECENTRALIZED MULTILEVEL POWER ALLOCATION FOR RANDOM ACCESS

1985

probabilities. The numerical results confirmed that the system MAC throughput for our system was better than that of conventional schemes. As an area of future work, we will continue to improve the performance of the random access scheme by combining the power allocation for a single time slot and the SIC for multiple time slots. Acknowledgment

Fig. 9 Throughput performance comparisons in the AWGN environment and in the fading environment.

This research was supported in part by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2014R1A1A2054577). References

Table 3 Summed data rates for various base codes. Ro ρ ν δ R(1) R(2) 1/5×2

0.35

2

0.84

1.60

1.63

1/6×2

0.29

3

0.50

1.57

1.52

1/7×2

0.24

4

0.15

0.98

1.45

1/8×2

0.21

4

0.80

1.82

1.83

1/9×2

0.18

5

0.46

1.61

1.58

with data rate Ro , the system PHY throughput is R = Ro T . According to Table 3, for a low-rate base code, the decoding threshold ρ is low, and thus more packets of the same power level (larger ν) can be decoded. The margin ratio δ is also important for the system PHY performance, since it makes the system more tolerant of noise and the random interference from lower power levels. Without designing the parameters as in (24), the base code of Ro = 1/7 × 2 achieved an inferior system PHY throughput performance (R(1) column) due to the small margin ratio δ = 0.15. The effect of a small δ can be alleviated by the parameter design using (24), as shown in the R(2) column of Table 3. Hence when selecting the base code, we need to avoid one that makes δ small. We can find the base code that maximizes the system PHY throughput R by using the results of the simulations: the base code of 1/8 × 2. 6. Conclusions In this paper, we have proposed multilevel power allocation for a decentralized random access scheme with the capabilities of MPR and SIC; it is suitable for the M2M communication application in 5G. We formulated the problem of optimizing the discrete power levels and the probability distribution, and by introducing relationships among the different power levels, we obtained a feasible suboptimal iterative per-level optimization process. We derived the theoretical system MAC throughput from the optimized transmission

[1] F. Boccardi, R. Heath, A. Lozano, T. Marzetta, and P. Popovski, “Five disruptive technology directions for 5G,” IEEE Commun. Mag., vol.52, no.2, pp.74–80, Feb. 2014. [2] C.-X. Wang, F. Haider, X. Gao, X.-H. You, Y. Yang, D. Yuan, H. Aggoune, H. Haas, S. Fletcher, and E. Hepsaydir, “Cellular architecture and key technologies for 5G wireless communication networks,” IEEE Commun. Mag., vol.52, no.2, pp.122–130, Feb. 2014. [3] S. Chen and J. Zhao, “The requirements, challenges, and technologies for 5G of terrestrial mobile telecommunication,” IEEE Commun. Mag., vol.52, no.5, pp.36–43, May 2014. [4] A. Osseiran, F. Boccardi, V. Braun, K. Kusume, P. Marsch, M. Maternia, O. Queseth, M. Schellmann, H. Schotten, H. Taoka, H. Tullberg, M.A. Uusitalo, B. Timus, and M. Fallgren, “Scenarios for 5G mobile and wireless communications: The vision of the METIS project,” IEEE Commun. Mag., vol.52, no.5, pp.26–35, May 2014. [5] G. Wunder, P. Jung, M. Kasparick, T. Wild, F. Schaich, Y. Chen, S. Brink, I. Gaspar, N. Michailow, A. Festag, L. Mendes, N. Cassiau, D. Ktenas, M. Dryjanski, S. Pietrzyk, B. Eged, P. Vago, and F. Wiedmann, “5GNOW: Non-orthogonal, asynchronous waveforms for future mobile applications,” IEEE Commun. Mag., vol.52, no.2, pp.97–105, Feb. 2014. [6] S.-Y. Lien, K.-C. Chen, Y.-C. Liang, and Y. Lin, “Cognitive radio resource management for future cellular networks,” IEEE Wireless Commun., vol.21, no.1, pp.70–79, Feb. 2014. [7] N. Abramson, “The ALOHA System: Another alternative for computer communications,” Proc. November 17–19, 1970, Fall Joint Computer Conference on AFIPS’70 (Fall), pp.281–285, 1970. [8] D. Bertsekas and R. Gallager, Data networks (2nd Ed.), PrenticeHall, 1992. [9] J. Metzner, “On improving utilization in ALOHA networks,” IEEE Trans. Commun., vol.24, no.4, pp.447–448, April 1976. [10] S. Ghez, S. Verdu, and S.C. Schwartz, “Stability properties of slotted ALOHA with multipacket reception capability,” IEEE Trans. Autom. Control, vol.33, no.7, pp.640–649, July 1988. [11] Y.-W. Leung, “Mean power consumption of artificial power capture in wireless networks,” IEEE Trans. Commun., vol.45, no.8, pp.957–964, Aug. 1997. [12] L. Tong, V. Naware, and P. Venkitasubramaniam, “A cross-layer perspective in an uncharted path — Signal processing in random access,” IEEE Signal Process. Mag., vol.21, no.5, pp.29–39, Sept. 2004. [13] J. Luo and A. Ephremides, “Power levels and packet lengths in random multiple access with multiple-packet reception capability,” IEEE Trans. Inf. Theory, vol.52, no.2, pp.414–420, Feb. 2006. [14] J. Arnbak and W. van Blitterswijk, “Capacity of slotted ALOHA in Rayleigh-fading channels,” IEEE J. Sel. Areas. Commun., vol.5, no.2, pp.261–269, Feb. 1987. [15] C.T. Lau and C. Leung, “Capture models for mobile packet radio

IEICE TRANS. COMMUN., VOL.E98–B, NO.10 OCTOBER 2015

1986

[16]

[17] [18]

[19]

[20]

[21] [22]

[23]

[24]

[25]

[26]

[27]

[28]

networks,” IEEE Trans. Commun., vol.40, no.5, pp.917–925, May 1992. R.O. LaMaire, A. Krishna, and M. Zorzi, “On the randomization of transmitter power levels to increase throughput in multiple access radio systems,” Wirel. Netw., vol.4, no.3, pp.263–277, March 1998. T. Cover, “Broadcast channels,” IEEE Trans. Inf. Theory, vol.18, no.1, pp.2–14, Jan. 1972. J.G. Andrews, “Interference cancellation for cellular systems: A contemporary overview,” IEEE Wireless Commun., vol.12, no.2, pp.19–29, April 2005. B. Rimoldi and R. Urbanke, “A rate-splitting approach to the Gaussian multiple-access channel,” IEEE Trans. Inf. Theory, vol.42, no.2, pp.364–375, March 1996. R.R. Muller, A. Lampe, and J.B. Huber, “Gaussian multiple-access channels with weighted energy constraint,” 1998 Information Theory Workshop (Cat. No.98EX131), pp.106–107, June 1998. S. Verdu, Multiuser detection, Cambridge Univ. Press, 1998. J.G. Andrews and T.H. Meng, “Optimum power control for successive interference cancellation with imperfect channel estimation,” IEEE Trans. Wireless Commun., vol.2, no.2, pp.375–383, March 2003. Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, and K. Higuchi, “Non-orthogonal multiple access (NOMA) for cellular future radio access,” Proc. 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), pp.1–5, June 2013. E. Casini, R. De Gaudenzi, and O.R. Herrero, “Contention resolution diversity slotted ALOHA (CRDSA): An enhanced random access schemefor satellite access packet networks,” IEEE Trans. Wireless Commun., vol.6, no.4, pp.1408–1419, April 2007. G. Liva, “Graph-based analysis and optimization of contention resolution diversity slotted ALOHA,” IEEE Trans. Commun., vol.59, no.2, pp.477–487, Feb. 2011. C. Stefanovic and P. Popovski, “ALOHA random access that operates as a rateless code,” IEEE Trans. Commun., vol.61, no.11, pp.4653–4662, Nov. 2013. C. Xu, L. Ping, P. Wang, S. Chan, and X. Lin, “Decentralized power control for random access with successive interference cancellation,” IEEE J. Sel. Areas. Commun., vol.31, no.11, pp.2387–2396, Nov. 2013. G. Caire, G. Taricco, and E. Biglieri, “Bit-interleaved coded modulation,” IEEE Trans. Inf. Theory, vol.44, no.3, pp.927–946, May 1998.

Appendix: Proof of the Quasiconcavity of D l (ν) For large K 1 and small pl 1, the function Dl (ν) can be approximated by

ν−1  K i Dl (ν) = pl (1 − pl )K−i (i + d) i i=0 (A· 1) ν−1  i + d i −λ λe , ≈ i! i=0 where d is a positive real number and λ = K pl . The firstorder and second-order derivatives of Dl (ν) are given by D l =

Γ(ν, λ) − e−λ λν−1 (d + ν) , Γ(ν)

(A· 2)

e−λ λν−2 (λ(−1 + d + ν) − (d + ν)(ν − 1)) . (A· 3) Γ(ν) We can derive the unique root for D

l = 0: D

l =

λ∗∗ =

(d + ν)(ν − 1) . −1 + d + ν

(A· 4)

Since (d + ν)(ν − 1) and (−1 + d + ν) are both positive, we have D

l < 0, λ ∈ [0, λ∗∗ ) and D

l > 0, λ ∈ (λ∗∗ , ∞). Hence D l is monotonically decreasing for λ ∈ [0, λ∗∗ ) and reaches the minimal negative value at λ = λ∗∗ . It is also obvious that D l (0) > 0. It can be proved that there is one and only one λ that makes D l (λ = λ ) = 0 and D l (λ < λ ) > 0, D l (λ > λ ) < 0. This proves the quasi-concavity of Dl .

Huifa Lin received the B.E. degree in information engineering from Beijing University of Post and Communications, Beijing (BUPT), China, in 2004 and worked in the wireless communication industry for five years. He received the M.E. degree in communication engineering from The University of ElectroCommunications (UEC), Tokyo, Japan, in 2012. Since April 2012, he has been a Ph.D. candidate in UEC. He is an IEEE student member. His current research interests include channel coding, rateless codes, cooperative communication, and multiple access channel.

Koji Ishibashi received the B.E. and M.E. degrees in engineering from The University of Electro-Communications, Tokyo, Japan, in 2002 and 2004, respectively, and the Ph.D. degree in engineering from Yokohama National University, Yokohama, Japan, in 2007. From 2007 to 2012, he was an Assistant Professor at the Department of Electrical and Electronic Engineering, Shizuoka University, Hamamatsu, Japan. Since April 2012, he has been with the Advanced Wireless & Communication Research Center (AWCC), The University of Electro-Communications, Tokyo, Japan where he is currently an Associate Professor. From 2010 to 2012, he was a Visiting Scholar at the School of Engineering and Applied Sciences, Harvard University, Cambridge, MA. Prof. Ishibashi has contributed more than 60 articles to international journals and conference proceedings. His current research interests are signal processing, cooperative communications, RF energy harvesting, rateless coding, and information theory. He currently serves as an Associate Editor for the IEICE TRANSACTIONS ON COMMUNICATIONS.

LIN et al.: DECENTRALIZED MULTILEVEL POWER ALLOCATION FOR RANDOM ACCESS

1987

Won-Yong Shin received the B.S. degree in electrical engineering from Yonsei University, Seoul, Korea, in 2002. He received the M.S. and the Ph.D. degrees in electrical engineering and computer science from the Korea Advanced Institute of Science and Technology (KAIST), Daejeon, Korea, in 2004 and 2008, respectively. From February 2008 to April 2008, he was a Visiting Scholar in the School of Engineering and Applied Sciences, Harvard University, Cambridge, MA. From September 2008 to April 2009, he was with the Brain Korea Institute and CHiPS at KAIST as a Postdoctoral Fellow. From August 2008 to April 2009, he was with the Lumicomm, Inc., Daejeon, Korea, as a Visiting Researcher. In May 2009, he joined Harvard University as a Postdoctoral Fellow and was promoted to a Research Associate in October 2011. Since March 2012, he has been with the Division of Mobile Systems Engineering, College of International Studies and the Department of Computer Science and Engineering, Dankook University, Yongin, Korea, where he is currently an Assistant Professor. His research interests are in the areas of information theory, communications, signal processing, mobile computing, and their applications to multiuser networking issues. Dr. Shin has served as an Associate Editor for the IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS, COMMUNICATIONS, COMPUTER SCIENCES, for the IEIE TRANSACTIONS ON SMART PROCESSING & COMPUTING, and for the JOURNAL OF KOREA INFORMATION AND COMMUNICATIONS SOCIETY. He has also served on the Organizing Committee for the 2015 IEEE Information Theory Workshop.

Takeo Fujii was born in Tokyo, Japan, in 1974. He received the B.E., M.E. and Ph.D. degrees in electrical engineering from Keio University, Yokohama, Japan, in 1997, 1999 and 2002 respectively. From 2000 to 2002, he was a research associate in the Department of Information and Computer Science, Keio University. From 2002 to 2006, he was an assistant professor in the Department of Electrical and Electronic Engineering, Tokyo University of Agriculture and Technology. From 2006 to 2014, he has been an associate professor in Advanced Wireless & Communication Research Center, The University of Electro-Communications. Currently, he is a professor in Advanced Wireless Communication Research Center, The University of Electro-Communications. His current research interests are in cognitive radio and ad-hoc wireless networks. He received Best Paper Award in IEEE VTC 1999-Fall, 2001 Active Research Award in Radio Communication Systems from IEICE technical committee of RCS, 2001 Ericsson Young Scientist Award, Young Researcher’s Award from the IEICE in 2004, The Young Researcher Study Encouragement Award from IEICE technical committee of AN in 2009, and Best Paper Award in IEEE CCNC 2013. He is a member of IEEE.

Decentralized Multilevel Power Allocation for Random ...

Oct 10, 2015 - formance of the media access control (MAC) layer, ignoring the details of ..... tion DL(p, E) is identical to the maximization of the system. MAC throughput. Direct formulation of the optimization problem is hence given by max p,E. DL(p, E) ..... resource management for future cellular networks,” IEEE Wireless.

2MB Sizes 0 Downloads 223 Views

Recommend Documents

Decentralized Power Allocation for Secondary Random ...
promising technology to solve the growing problem of wireless spectrum scarcity ..... is used to obtain the power and the probability of the current level, using the ...

Decentralized power allocation for coordinated multiple access channels
optimal power allocation in multiple access channels (MAC) .... GAUSSIAN SISO MULTIPLE ACCESS .... [0, +∞[4 and define the two constrained functions.

Power Allocation for OFDM-based Cognitive Radio ... - Semantic Scholar
Cognitive radio (CR) is a highly promising technology to solve the spectrum insufficiency ... Small Cell Based Autonomic Wireless Network]. is assumed to have ...

Power and subcarrier allocation for physical-layer ...
Page 3 of 10. Page 3 of 10. Wang_Xiaowei_TIFS11_Power_and_subcarrier_alloca ... _in_OFDMA_Based_Broadband_wireless_networks.pdf.

Joint Power Allocation and Beamforming for Multiuser ...
Multiuser MIMO Two-way Relay Networks. Mohammad .... The problem is formulated and solved via the proposed iterative scheme in. Section III. Simulation results are presented in Section IV. Finally, conclusions are drawn in Section V. II. SYSTEM .....

Power and subcarrier allocation for physical-layer security in ...
I. INTRODUCTION. S ECURITY is a crucial issue in wireless systems due to ... The as- sociate editor coordinating the review of this manuscript and approving it for .... _in_OFDMA_Based_Broadband_wireless_networks.pdf ... .pdf. Page 1 of 14.

A Distributed Cooperative Power Allocation Method for Campus ...
in power system operation and control. Therefore, building- to-grid integration has recently attracted significant attention. in the smart grid research [3]–[10].

A Distributed Cooperative Power Allocation Method for Campus ...
A Distributed Cooperative Power Allocation Method for Campus Buildings.pdf. A Distributed Cooperative Power Allocation Method for Campus Buildings.pdf.

Reduced Complexity Power Allocation Strategies for ...
Abstract—We consider wireless multiple-input–multiple-output. (MIMO) systems ..... allocation algorithm, we propose some novel allocation tech- niques that are ...

Symbol repetition and power re-allocation scheme for ... - IEEE Xplore
Symbol Repetition and Power Re-allocation Scheme for Orthogonal Code Hopping Multiplexing Systems. Bang Chul Jung, Jae Hoon Clung, and Dan Keuii Sung. CNR Lab.. Dept. of EECS.. KAIST. 373-1. Guseong-dong. Yuseong-gu. Daejeon. 305-70 I _ KOREA. En~ail

Distributed Cooperative Q-learning for Power Allocation ...
Since femtocells are installed by the end user, their number and positions are random ..... a femto/macro-user is set to 800 meters, 3) The maximum distance between a .... relatively small overhead. ... Challenges for Business and Technology.

Adaptive Power Allocation for Noncooperative OFDM ...
complementary approach is to design smarter transmitters with ... by the system designer, and is made possible only if the transmitter can ... Application of.

Fixed Power Allocation with Nulling for TDD-Based ...
Index Terms—Power allocation, fading channels, inter-cell interference. I. INTRODUCTION. CHANNEL capacity is an important performance metric for digital communication systems. Studies on Shannon capacity in fading channels have been extensively don

Efficient Resource Allocation for Power Minimization in ...
While these solutions are optimal in minimiz- .... this section, an efficient solution to the power minimization .... remains in contact with this minimum surface.

Robust Power Allocation for Multicarrier Amplify-and ... - IEEE Xplore
Sep 11, 2013 - Abstract—It has been shown that adaptive power allocation can provide a substantial performance gain in wireless communication systems ...

Power Allocation and Scheduling for Ultra-Wideband ...
(MUI); 3) the diverse quality of service (QoS) requirements of multimedia ...... RIM/CITO Chair on Pico-Cellular Wireless Internet Access Networks and is.

Optimal Power Allocation for Fading Channels in ...
Jul 8, 2008 - communication network (SCN) to opportunistically operate in the ...... Telecommunications Conference (GLOBECOM07), Washington. DC, USA ...

Multi-Group Random Access Resource Allocation ... - Semantic Scholar
J.-W. Choi (corresponding author) is with the Department of Informa- tion & Communication Engineering, Daegu ..... SIR (dB). Probability. Group 1 @ Underlay P1=1.0000P1. Group 2 @ Underlay P2=0.1975P1. Group 3 @ Underlay P3=0.0672P1. Group 1 @ Overla

Multilevel Security for Relational Databases - IT Today
CHAPTER 2 BASIC CONCEPT OF MULTILEVEL DATABASE. SECURITY. 17 ...... every year. 2.5.2 Impact of ... of the teaching staff of the Department of Computer Science and. Engineering at ... an M.Sc. degree in communication systems.

BLIND DECENTRALIZED ESTIMATION FOR ...
fusion center are perfect. ... unlabeled nature of the fusion center observations makes the problem .... where ˆψML is the solution obtained through the EM algo-.

Decentralized Workflow Execution for Virtual ...
Decentralized Workflow Execution for Virtual Enterprises in Grid. Environment. Wei Tan ... grid, to serve as the process management platform. We also stress that ...

learning distributed power allocation policies in mimo ...
nt . Note that the Kronecker propa- gation model ( where the channel matrices are of the form. Hk = R. 1/2 k. ˜ΘkT. 1/2 k. ) is a special case of the UIU model. The.

Power Allocation Policies with Full and Partial Inter ...
of diverse wireless systems, the demand for spectrum has increased in recent ... ent multiple wireless systems or operators. ...... Cambridge University Press. 35.

Distributive Subband Allocation, Power and Rate ... - IEEE Xplore
in an orthogonal frequency-division multiple-access (OFDMA) cellular system with ... systems with imperfect CSIT in order to take into account of potential packet ...