Upload
independent
View
0
Download
0
Embed Size (px)
Citation preview
CODED MODULATIONS AND DIVERSITY FOR SATELLITE
CELLULAR COMMUNICATIONS Ezio Biglieri, Giuseppe Caire, Giorgio Taricco*
Javier Ventura-Traveset**
ABSTRACT
* Politecnico di Torino Corso Duca degli Abrtlz::i 24, 1-10129 Torino (Italy)
** Etlmpean Space Agency / ESTEC P.O. Box 299. 2200 AG Noordwijk (The Netherland.s)
Two detection schemes are considered for the fading channel with co-channel interference. Both schemes exploit the synergy of diversity and coding with maximum-rat.io combining and perfect channel state information. The first one - conventional receiver - reduces the error floor by the use of diversity and coding. The second - multi-user receiver - eliminates the error floor by exploiting the structure of the interfering signal which is no more treated as an unknown source of disturbance [6]. Performance results include bit error probability bounds and simulation results for both schemes envisaged.
Keywords: PCS Systems, Satellite Communications, Coding. Diversity.
1 INTRODUCTION
Most Personal Communication Systems (PCS) include coding and diversity to protect the transmitted signal from the severe performance degradation associated with fading in the mobile radio channel. Their simultaneous use allows the designer to cope with stringent power requirements and co-channel interference (CCI) typical of cellular environments. However, only a few works address the interaction of coding and diversity, which is the main focus of this paper.
This work was supported in part by the Human Capital and Mobility Program of t.he Commission of the European Union.
57
58
Different kinds of diversity have been considered for a long time: space, frequency, direction-of-arrival, polarization, time, and multi path diversity [8]. Coded modulations can be regarded themselves as kind of time diversity [9]. It is then natural to try to exploit coding and diversity together in order to reduce receiver complexity.
The design of coded modulations for the fading channel [3. 4] without diversity is generally more complex than designing coded modulation ~or ,t.he AWGN channel. Codes are selected according to different criteria than the st.andard minimum Euclidean distance used for the AWGN channel, so t.hat. good codes for the AWGN channel may perform poorly on a fading channel and vicf' versa. However, as the order of diversity increases, a fading channel approaches all AWGN channel [12, 13, 11]. This allows us to use powerful codes designed for the AWGN channel ~ such as t.he well known Ungerboeck codes [10] - after introducing a suitable amount of diversity.
Focusing on space diversity, we consider a NORmalized Diversity (NORD) receiver based on an antenna array of 1'.1 elements, each having equivalent area Ae. Assuming that the transmitted power is Pt , we identify two equivalent cases of NORD: i) Ae = A/M, Pt = P (fixed total antenna gain and t.ransmitted power) and ii) Ae = A, Pt = P/M (antenna gain increased by 1'.1 and transmitted power reduced by 1'.1). In both cases, the product of each ant.enna element's gain by the transmitted power is constant. The average signal-t.onoise ratio (SNR) per diversity branch is given by r /1'.1 where r = E /No is the total average SNR at the receiver input, E is the energy per symbol and No is the unilateral power spectral density of the AWGN.
Cellular PCSs are mostly limited by co-channel interference (CCI), which determines the system capacity [5]. Therefore, we will concentrate on system performance vs. CCI. We consider two different receiver schemes based on i) coherent detection with maximum-ratio combining (MR.c). hereafter referred to as the conventional receiver, suboptimal in the presence of eCI and ii) a novel detection scheme based on the multi-user approach introduced in [6], hereaft.er referred to as the multi-user receiver. In both cases, we present result.s based on error probability bounds and simulat.ion.
The paper is organized as follows. Section 2 describes the channel model. Section 3 considers the coded system with diversity and the conventional recpiver. Section 4 considers the same system with the multi-user receiver. In both cases, error probability performance is studied based on union bounds. Section 5 gives numerical results on the performance of a specific code. Finally, our conclusions are collected in Section 6.
Coded Modulations and Diversity ... 59
2 SYSTEM MODEL
The basic transmission system under analysis is described in Fig. 1. We have a source generator of binary symbols mk,' mapped by a coded modulator to channel symbols Xk from the q-ary PSI{ modulation set .1:'q = {e:i2n,,/q}~-::~. The encoded symbols are then interleaved and shaped to produce the signal x(t) = VEL-k x~p(t - kT), where E is the energy per symbol, T is the symbol time, and p(t) is a unit-energy pulse chosen in order that, when passed through a matched filter p* (-t), the synchronously-sampled output is inter-symbol interference (lSI) -free. The transmitted signal x(t) is sent through M different faded channels (diversity branches). Interleaving allows us to assume the case of stationary slow Rician fading (see, e.g., [4]). The received signal over each branch i is given by
where, gi(t) and hi(t) are independent complex Gaussian random processes with E[gi(t)] = E[hi(t)] = JK/(K + 1), E[lgi(t)12] = E[lhi(tW] = 1, and var(gi(t)) = var(hi(t)) = 1/(2(K + 1)). K is the Rician parameter defined as the line-of-sight to diffuse multipath component power ratio; ni(t) is an independent white Gaussian complex noise process with two-sided power spectral density No/2; J(t) is the CCI signal of the same type as x(t) but statistically independent from it and with energy per symbol E' = E / (3 where (3 is the signal-to-interference ratio (SIR). In our model, we assume a single dominant CCI signal and perfect channel state information (CSI) on both the gi (t) and the hi (t). This strong assumption can be well approximated, for instance, by including non-overlapping pilot tones, multiplexed pilot symbols or multibeam receivers in the return link of a satellite mobile communication system.
After demodulation, matched filtering, and synchronous sampling with ideal timing (which provides lSI-free samples), we obtain the following discrete-time channel model:
(1.1)
where
• gk and hk are independent random M -vectors whose components g£ and h{ are complex Gaussian random variables (RVs) with unit second mo
ment E[lg£12] = E[lhLI2] = 1, mean E[g£] = E[hL] = J/(/(1{ + 1) and covariance E[g£(h~)*]- E[g£]E[(h{)*] = Cg(k - £, i - j).
• llk is a random M-vector whose components n£ are i.i.d. complex Gaussian RVs with zero mean and variance 1/2.
60
• 10 = r /!v! and 11 = r II!vI are tllP avprage SNR per branch of the mwflll and interfering signaL respectively, and r = £ jIV'1I and r J = £' /NII are the corresponding total average SNRs.
• h is the CCI given by h = L£ WrC/h'-f, where 11'( are the samples of the total channel impulse response ll'(t) = p(t) * p*( _t)e.iH sampled with an arbitrary delay with respect to tllf' optimal sampling timp and rotated by the phase difference e between the signal and the interference carriers, and the C/k E Xq are symbols from the eel source.
3 CONVENTIONAL RECEIVER
Here, we assume that CCI is an additive disturbance treated as independent Gaussian noise, thus obtaining a suboptimal detection scheme. From thp perfect CSI assumption, Yk is conditionally Gaussian with mean .JYO .r" anel covariance matrix HIIE[lhI2] + l)IM . Since the modulated symbols .r" have constant magnitu~de, maximum-likelihood (ML) coherent detection consists of
maximizing the additive metric Lk 2 Re [gkYk x;:] over all the possible coded sequences x (here the dagger t denotes Hermitian transposp). '<\-'e call first
form the combined diversity-channel output rk = gl.Yk, and then use it to generate the metric associated to the branch of the cocle trellis labeled by 7/,-: m(rk,xk) = 2 Re[rkxZ]. This is equivalent to perform maXimllll1-ratiocolllhilling (MRC) detection before Viterbi decoding. The bit error probability call 1w obtained by the union bound [1]
where m is the number of information bits entering the encoder at each trellis step; S is the number of states; the pair (xes, Xf,s) denotes an error event with span f starting from state 5, i.e., a pair of distinct sequences stemming from the same state 5 and merging after C 2: 1 discrete-time instants; B(XI'.8' X(.,) is the Hamming distance between the information bit sequences corresponding to xe,s and Xf,s; P(xe,s --t xe,s) is the pairwise error probability (PEP) of t,]lP
sequences xe,s and Xf,s'
Several methods have been proposed to calculate (l.:l) in closed form for thp AWGN channel [1] but none applies for the fading channel. In this case, we have to resort to numerical approximation and consider a limited number of terms in (l.2) [3].
Coded Modulations and Diversity ... 61
The PEP P(x -+ x) is calculated as follows. The difference bptween the metrics of two sequences x and x is given by
~ = L 2 Re [g1.n dZ] (1.:3 ) kEKL
where we defined dk = Xk - Xk and KL = {iI, ... , jL} = {k : J:k of :rd· L is the Hamming distance between x and x. The smallest Hamming distance between two encoded sequences is usually referred to as the "code diversity." We will examine the interaction between antenna and code diversity. If the code is not catastrophic and L is finite, the span of the error event is also finite, and the PEP is given by
P(x --+ x) = P(/)" :::; 0). ( 1.4)
The right-hand side (RHS) of (1.4) can be computed as follows. First, evaluate the Laplace transform of the probability density function of ~, <I>~(s) E[e-S~]. Then, we have from [7]
1 lc+j~ ds P(~ :::; 0) = -, -. <I>~(s)-
27rJ c-joo S (1.5 )
where c is chosen so as to let (1.5) converge. Numerical evaluation of (1.5) can be carried out by means of Gauss-Chebyshev quadrature, as explained in [2].
3.1 Performance of the conventional receiver
Following the approach of [12] with lSI-free cel (lhl 2 = 1), we obtain
<I>~(s) = II [1 + v00ldk l2s - hI + 1)ldk l2s2r M ( 1.()) kEKL
and then we get from (1.5):
Alternatively, applying the Chernoff bound to the RHS of (1.6), we obtain
( 1.8)
62
Letting r -+ 00, the Chernoff bound (l.8) approaches the limit value
(U))
This follows from the existence of an irreducible bit error probability, with CCI and fading, as the SNR increases without limits - an enor floor - which is exponentially reduced with the product of time and space diversities. The effect is mostly remarkable for weak codes (up to uncoded modulation). In the following, we will see a more powerful approach that is able to delete the error floor, which we call multi-user detection.
4 MULTI-USER RECEIVER
With multi-user detection, we recognize that CCI cannot be assimilated to Gaussian noise and deal with it as another modulated signal. We assume that the receiver has perfect knowledge of both gk and hk . The discrete-channel output sample can be written as Yk = Gkbk +Uk where G k = [v'FQ gA" -/hhkJ and bk = (Xk, h f. Then, the ML decoder branch metric associated to ;rk is given by
m(Yk,xk) ...:.. InP(Yklxk,gk,hk) == In{Eh[P(Yklxk,gk, h,hk)]}
...:.. In {Eh [exp[-IYk - Gk b kl 2]J}
(1.10)
where == stands for metric equivalence (ml == m2 if and only if ml = al 1112 + a2
for some constant al > 0 and (2) and Hk = G! Gk. We further assume that the CCI signal is not affected by lSI, thus wanted and interfering signals are symbolsynchronous, but not frame-synchronous. Therefore the (coded) sequence (h) is received as a sequence of independent, uniformly distributed, symbols from Xq and we have
m(Yk,xk) == In [L eXP[Sl(Xk,h)l] ~ Slmax(Xk) = max Sl(Xk,!k) (1.11) hEX.
hEXq
where we defined Sl(Xk,h) == Sl(bk) = 2Re[y!Gkb A,]- b!Hkbk and used the approximation In[Li exp(zd] ~ maxi Zj. The metric (l.11) is formally identical to the multi-user metric derived in [6] for two-user CDMA in AWGN and Gaussian spreading sequences gk and hk. The detection scheme based on (l.11) defines what we call m ulti- user receiver.
Coded Modulations and Diversdy ... 63
4.1 Performance of the multi-user receiver
Our approach to the evaluation of the PEP is based on the union bound. Let us consider the error event (x, x) with Hamming distance L and let KL = {it, .. ·,jd = {k : Xk "# :rd· Let Ie denote the Cth interfering sequence from Xf, for £ = 0, 1, ... , qL - 1. From the branch metric (1.11), we can write the path metric increment as follows l :
!1max (x) = L !1max (Xk) = mtx!1(x,I) kEICL
( 1.12)
where I = (Ijl' ... , Ih) and the last equality derives from the independence of the CCI samples in I. Then, the PEP is given as
(1.13)
In order to evaluate this probability, we first condition on the (random) transmitted CCI sequence I and we call Imax the CCI sequence attaining the maximum of !1(x, I):
P(x -7 x I I) P { !1(x, Imax) ::; mfx!1(x, I)} (1.14)
< P { !1(x, I) ::; myx!1(x,l) }
p rQ' {O(x, I) - O(S<, I,) ~ OJ} (1.15 )
qL_l
< L P {!1(x, I) - !1(x, Ie) :S O} (1.16) (=0
where (1.15) is greater than (1.14) because !1(x, I) :2 !1(x, Imax) and (1.16) is obtained from (1.15) by the union bound. The branch metric difference can be written as
~ t t ilk = !1(bk) - !1(bk) = 2Re[zkdkl + dkHkdk ( 1.17)
where dk = bk - bk and
Zk = GkYk - Hkbk = Gk(Gkbk + llk) - Hkbk = Gk llk
since Hk = GkGk. Conditionally on Gk, Zk is a vector of complex Gaussian RVs with zero mean and covariance matrix ~Hk. Then, still conditionally on
1 We do not consider the positions k such that Xk = ?k in the path metric since, in this case, rl.max(Xk) = rl.max(?k).
64
G k , ZLdk is a complex Gaussian RV with zero mean and variance ~d!Hkdk. It is then clear that the conditional PEP (1.15) does not depend on I but only on the difference Ie - I, so that, when If runs over all possible sequences from Xf, we can remove conditioning and choose. arbitrarily, I = 1, the seqlwllce of all ones. Then, we can write
qL_ 1
P(x -+ x) ::; L P {0(x, 1) - 0(x, Ie) ::; O} ( 1.18) (=0
Now, to calculate the probabilities P{0(x,1) - 0(x, Ie) ::; O}, we advocate the Laplace transform technique already used in Section ::l. First., by iterating expectations, we obtain
EGk [EZk [exp (-05 (2 Re [d!Zk] + dl,Hk dk)) I G k ]]
t .) EGk [exp( -dkHI,.ddo5 - o5~)))
[1 + (rold!.J' + "'flld~I::?)(o5 - o52)rM
with dk = Xk - Xk and d~, = 1 - h. Then, from the independpl1cP of the c:'k'S,
setting ~ = LkEKL ~k, we have
<I>A (s) = E[exp( -s~)) = IT [1 + (ro Idk I::? + "Ylld~12)(o5 - 82)]-M (1.19) kEKL
Applying (1.5) to (1.19) and inserting the result in bound (1.18), we get.
P(x --+ x)
where Jl = 1 - exp(j27r£/ q). This probability can be evaluated numerically by resorting to Gauss-Chebyshev quadrature, as described in Appendix A. Alternatively, applying the Chernoff bound to each term in (1.18), we get
(1.21 )
Bound (1.21) shows that the multi-user receiver suppresses t.he errol' floor, irrespectively of the value of SIR and for any finite diversity order AI. Wit.h
Coded Modulations an.d Diurrsily ... 65
strong CCI, i.e .. for (3 -+ 0, (l.21) approache~ the limit
with Je = 1 - exp(j27rJi/ q). This bound is independent of the coele as we assumed that the CCI interferer is not frame-synchronous and tlH~reforp appears uncoded. For weak interfering signal, i.e., for !3 -+ 00, the performancE' approaches the CCI-free case, since the effect of eCI becomes negligible.
Bound (l.16) is tight when the interference-to-noise ratio per branch /1 IS so high that there is a CCI sequence that attains a sharp maximum in nmax(x). This is not true when the SNR is lower than or around the SIR and. in this case, the bound is loose. However, performance cannot be worse than with the conventional receiver, so that we obtain a tighter general bound as follows
P(x-+X) ::::;min{bound (l.7). bound (1.l9)} ( 1.22)
5 RESULTS
In this section we collect results obtained by our analysis. We consider an uncorrelated flat Rayleigh fading channel affected by CCI and AWGN.
Performance with conventional coherent detection. In the following, results are relevant to Ungerboeck's rate 2/3 coded 8-PSK scheme with 4 states (U4). Fig. 2 shows the performance ofU4 with conventional detection. Results, obtained by analytic bounds and simulation, show excellent agreement below the level BER = 10-2 • Fixing a target BER = 10-3 , Fig. 3 shows the minimum Eb / No required to obtain the target performance vs. SIR for different values of the diversity order M. These results are obtained by analytic bounds, which proved to be extremely accurate in this case, as mentioned above. Finally, Fig. 4 shows how diversity progressively eliminates the error floor, following the asymptotic behavior of bound (1.9).
Impact of multi-user detection. An alternative to diversity is multi-user detection. We analyzed it in conjunction with diversity for the same code U4. Figs. 5 to 8 show the BER vs. Eb/ No for different values of SIR (-10,0,10 and 20 dB) and diversity order. First, we notice that the error floor has been deleted
66
for any diversity order. Second, the curves show the same good performance at. all values of SIR, as if the negative impact of SIR were totally removed. This can be explained by noting that multi-user detection exploit.s t.he struct.ure of the CCI disturbance, provided a reliable overall estimation of the CSI. This also explains why intermediate levels of SIR (around 5 dB) achieve the worst. performance, as neither the wanted nor the interfering signal are dominant. wit.h this level of CCI. The figures also show t.he looseness of bOil \ld (l.1 g) at low values of SNR. Simulation results are in good agreement. with analytic bounds below t.he level BER = 10-3 . The goodness of approximat.ion is better for low diversity order. Fig. 9 shows the minimum Eb/No required t.o obt.ain a target BER = 10-3 vs. SIR for different values of t.he diversit.y order M. As a consequence of the elimination of the error floor we can all ways achieve the target performance, irrespectively of the SIR.
As a final observation, the angular points of the bounds for the mult.i-user receiver derive from the fact that the multi-user bound (l.22) is a minimum oft.wo bounds, the second of which is looser for low SNR. However, from a practical point of view, this is acceptable since it produces a conservative performance analysis.
6 CONCLUSIONS
We have studied diversity r.eceivers for a coded communicat.ion system affected by fading and co-channel interference, namely a typical cellular PCS. Two detection schemes have been considered here: coherent detection wit.h maximumratio combining (MRC) (conventional receiver) and a novel detection scheme based on the multi-user approach introduced in (multiuser receiver) [6]. The performance of the conventional receiver is limited by the implicit assumption that the co-channel interference is an unknown disturbance, which inevitably introdeces an error-floor in the BER performance. The multi-user receiver overcomes this limitation and provides rather interesting results.
Further study is required to assess how close we can approach t.he perfect. CSI assumption, fundamental to the operation of both receiver, in the multipath environment. This is mostly important for t.he multi-user receiver which uses the CSI of both useful and interfering signals.
Coded Modulations and Diversity ... 67
REFERENCES
[1] E. Biglieri, D. Divsalar, P. J. McLane, and M. K. Simon, Introduction to Trellis-Coded Modulation with Applications. New York: MacMillan, 1991.
[2] E. Biglieri, G. Caire, G. Taricco, and J. Ventura-Traveset, "Simple method for evaluating error probabilities," Electronics Letters, Vol. 32, No.3, pp. 191-192, Feb. 1996.
[3] P. Ho and D. K. P. Fung, "Error Performance of Interleaved Trellis Coded PSK Modulations in Correlated Rayleigh Fading Channels," IEEE Trans. Communications, Vol. 40, No. 12, Dec. 1992.
[4] S. H. Jamali and T. Le-Ngoc, Coded-Modulation Techniques for Fading Channels. New York: Kluwer Academic Publishers, 1994.
[5] W. C. Y. Lee, "Spectrum Efficiency in Cellular," IEEE Trans. Veh. Tfchnol., vol. 38, pp. 69-75, May 1989.
[6] H. V. Poor and S. Verdu, "High-speed Digital Signal Processing for Satellite Communications," Final Report European Space Agency P. O. 184422, Feb. 1995.
[7] J.Proakis, Digital Communications. New York: McGraw-Hill, 1983.
[8] M. Schwartz, W. R. Bennett, and S. Stein, Communications Systems and Techniques. New York: McGraw-Hili, 1966.
[9] C.E. W. Sundberg and N. Seshadri, "Coded modulation for fading channels: An overview," European Transactions on Telecommunications, Vol. 4, No.3, pp. 325-334, May-June 1993.
[10] G. Ungerboeck, "Channel Coding with Multilevel/Phase Signals," IEEE Trans. on Inf. Theory, Vol. IT-28, Jan. 1982.
[11] J. Ventura-Traveset, G. Caire, E. Biglieri, and G. Taricco, "Impact of diversity reception on fading channels with coded modulation. Part I: Coherent detection," submitted to IEEE Trans. Communications., June 1995.
[12] J. Ventura-Traveset, G. Caire, E. Biglieri, and G. Taricco, "A multi-user approach to combating co-channel interference in narrowband mobile communications," 7th Tyrrhenian International Workshop on Digital Communications, Viareggio (LU), Italy, 10-14 Sept., 1995.
68
Source Generator
T R A
C N
H S
A M I
N
S N
S E
I L
0 N
Viterbi Decoder
rk
Coded Modulator
:q.
hI (t)
hM(t)
Deinterleaver
Int.erleaver
+
+
Matched
D Filtering
E T
I E rk
C 1M T Yk
I 0 N
Figure 1 Model of a coded transmission system with fading. diversity. and coherent detection combining. affected by CCl and AWGN.
[13] J. Ventura-Traveset, G. Caire, E. Biglieri, and G. Taricco, "Synergy of diversity reception and coded modulation in mobile communication channels," European Personal Mobile Communications Conference, Bologna, Italy, 30 Nov., 1995.
Coded lvlodulations and Diversity ...
10"
10'\
10.2
10.1
Hr"
ffi 10.5 CQ
10'"
10.7
Hr"
Hr"
10 20 30
Eh/N" (dB)
Figure 2 Bit error rate of U4 vs. Eb/NO with coherent detection. SIR=1O dB. Solid curves: TUB, dots: simulation results.
25
20 f+···················· .j .........•...........•............ .;+
o
~ 15 I-I .............. \. UJ
10
10 20 30
SIR (dB)
Figure 3 Eb/NO vs. SIR at Pb = 10-3 of U4 with coherent detection for different values of M (diversity order).
69
70
10" 10,1
10,2
Hr' 10-4 10,5
10-6 10,7
Hr'
~ Hr"
Ltl 10,111 CO
10,11
10,12
10,13 10,14
10,15
10,16
10,17
IO'IH
10,1'
10,2"
0 10 20 3D
SIR (dB)
Figure 4 "Error floor" of U4 vs, SIR with coherent detection for diversity order M = 1,2,4,8,16,
10,2
10-6 ~, ................ : ....... , ......... : ................. .
10" ~"'C ", .. ,: •.. ", ,', •. , ...•. : .....
10.111 L~~-'_-'-_~_-'--_.i.---'~-'_-'-_-'--_-'-_~"--'~-'_..J
o 10 20
EtfN" (dB)
Figure 5 BER vs, Eb/NO of U4 for SIR=-l0 dB and M curves: minimum upper bounds, dots: simulation results.
3D
1,2,4. Solid
Coded Modulations and Diversity ...
10"
10.2
104
t>: ~ <C
Hrn
Hr"
10-10
0 10 20 30
Figure 6 BER vs. Eb/NO of U4 for SIR=O dB and M = 1,2,4. Solid curves: minimum upper bounds, dots: simulation results.
10-2
104
10-10 '--~_~_~_~----1._~_~~~~_....L.._~~~~--"-~-----'
o 10 20 30
Figure 7 BER vs. Eb/NO ofU4 for SIR=10 dB and M = 1,2,4. Solid curves: minimum upper bounds, dots: simulation results.
71
72
lO"
10-2
10-4
e< Ul a:l
)(r"
IO-X
)(r 11l
0 III 211 311
Figure 8 BER vs. E b / No of \)4 for SIR=20 dB and !vI = 1,2,4. Solid curves: minimum upper bounds, dot.s: simulat.ion results.
SIR (dB)
Figure 9 Eb/No vs. SIR at Pb = 10-3 of \)4 with multiuser detection for different values of M (diversity order).
364
REFERENCES
[1] D. J. Goodman. Trends in cellular and cordless communications. IEEF Communications Magazine, 29(6)::n-4(), June 1991.
[2] D. J. Goodman. Cellular packet communications. IEFE COJIIlllllnicatlOn, Magazine, :38(8):1272-1280, August 1991.
[3] J .E. Wieselthier and A. Ephremides. Fixed- and movable-bonndary channel-access schemes for integrated voice/data wirpless nptworks. [F F E Trans. Communication, 43(1):64-74, January 1995.
[4] .J .M. Hyman, A.A. Lazar, and G. Pacifici. Real-t.inw scheduling with quality of service constraints. IEEE Journal on Selected AT'((J8 ill Communications, 9(7):1052-1063, September 1991.
[5] R. Bolla, F. Davoli, A. Iscra, C. Nobile, and S. Zappat.ore. Analysis and performance comparison of the RRA-ISA multiple access protocol for packet voice and data cellular systems. In Proceeding of PIMRC'95, pagps 378-382, Toronto, September 1995.
[6] M. Aicardi, G. Casalino, and F. Davoli. Independent Stations Algorithm for the maximization of one-step throughput in a nmltiarcess channel. IEEE Transactions 011 CommulIicatZ01l8, COM-:35(8):795-800. Angust. 1987.
[7] K.W. Ross. Multiservice Loss Models for Broadballd Tr[(communicatioll Networks. Springer, 1995.
[8] S. Jordan and P.P. Varaiya. Control of multiple service, multiple resollrcp communication networks. IEEE Trans. Communication, 42:2979--2988. November 1994.
[9] J .M. Hyman, A.A. Lazar, and G.Pacifici. A separation prilleiplp Iw1.\\·p(,11 scheduling and admission control for broadband switching. IEEt' JourlJal on Selected Areas in Communications, 1l(4):60.5-6}(j, May HJ9:3.
[10] R. Warfield, S. Chan, A. Konheim, and A. Guillaume. Real-Time traffic estimation in ATM networks. In Proceeding of ITC 14, pages 907 -9IG, 1994.