10

Wireless Networks : multiuser detection in cross- layer design

Embed Size (px)

Citation preview

WIRELESS NETWORKS MULTIUSER DETECTION IN CROSS-LAYER DESIGN

Information Technology: Transmission, Processing, and Storage

Series Editor: Jack Keil Wolf UniversiQ qf Californiil at Sun Diego Ln Jolln, Cnlifornia

Editorial Board: Robert J. McEliece California Institute of Tecilnology Pnsndenn, Cdiforrzzn

John Proakis Northeastem Universily Boston, Massach~mtts

William H. Tranter Krginia Poljtechic Iiz~tctute and State Universzty Blacksblirg, Virgznzn

Communication System Design Using DSP Algorithms: With Laboratory Experiments for the TMS320C6701 and TMS320C6711 Steven A. Tretter

Interference Avoidance Methods for Wireless Systems Dimitrie C. Popescu and Christopher Rose

MIMO Signals and Systems Horst J. Bessai

Performance Analysis and Modeling of Digital Transmission Systems William Turin

Stochastic Image Processing Chee Sun Won and Robert M. Gray

Wireless Communications Systems and Networks Mohsen Guizani

Wireless Networks Multiuser Detection in Cross-Layer Design Cristina Comaniciu, Narayan B. Mandayam, and H. Vincent Poor

A Continuat~on Order Plan is ava~lable for t h ~ s wr ies . A continuation order will bring dzli,ery of each new volt1111c ~mmed~a te ly upon publication. Volumes are billed only upon actual sh~pment . For further in to~ ina t~on plzaw contact the publ~sher.

WIRELESS NETWORKS MULTIUSER DETECTION IN CROSS-LAYER DESIGN

Cristina Comaniciu Stevens Inslitute of Techizology

Hoboken, New Jersey

Narayan B. Mandayam Rutgers University

Piscataway, New Jersey

H. Vincent Poor Prznceton University

Princeton, New Jersey

a - Springer

Library of Congress Cataloging-in-Publication Data

Cornaniciu, Cristina. Wireless networks: multiuser detection in cross-layer design1Cristina Cornaniciu,

Narayan B. Mandayarn, H. Vincent Poor.

p , cm. - (Information technology: transmission, processing, and storage) Includes bibliographical references and index. ISBN 0-387-23697-X

1. Wireless communication systems-Security measures. 2. Computer networks-Security nxeasures. 3. Denlodulation (Electronics) I. Mandayam, Narayan B. 11. Poor, H. Vincent. 111. Title. IV. Series

ISSN: 1389-6938 ISBN-10: 0-387-23697-X ISBN-13: 978-0387-23697-1 Printed on acid-free paper,

0 2 0 0 5 Springer Science+Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage arid retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names. trademarks, service marks and similar terms. even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.

Printed in the United States of America

To our families

Contents

List of Figures List of Tables Preface Acknowledgments

1. MULTIUSER DETECTION FOR WIRELESS NETWORKS

1 Future Generation Wireless Networks 1.1 Third Generation (3G) Cellular Networks 1.2 Wireless Application Protocol (WAP) 1.3 Network Costs for Data Transmission 1.4 Wireless Networks for Unlicensed Bands: WiFi,

WiMax, HomeRF, Bluetooth and Infostations 1.5 Ad Hoc Networks 1.6 Cross-Layer Design

2 Introduction to Multiuser Receivers: Pros and Cons 2.1 Performance of Matched Filter Receivers 2.2 Multiuser Detectors 2.3 Performance of Blind Receivers

3 Multiuser Detection for Next Generation Wireless Networks 38

4 Multi-Rate Multiuser Detection

5 Information Theoretic Aspects: Spectral Efficiency

6 Multiuser Detection in Cross-Layer Design: Introductory Remarks and Book Outline

2. INTEGRATED RADIO RESOURCE ALLOCATION

1 Introduction to Radio Resource Allocation

ix xiii xv

xvii

2 Power Control 5 3

vii

MULTIUSER DETECTION IN CROSS-LAYER DESIGN

Integrated Power Control and Multiuser Detection 5 6

Access Control, Power Control and Multiuser Detection 62

Traffic-Aided LIultiuser Detection 7 1

Medium Access Control for Multipacket Reception Networks 76

Routing and Multiuser Detection in Ad Hoc Networks

Admission Control: General Framework

3. ASYMPTOTIC CAPACITY FOR WIRELESS NETWORKS WITH MULTIUSER RECEIVERS

1 Effective Bandwidths and Capacity for Linear Receivers in Cellular Networks 1.1 General Formulation for Synchronous Networks 1.2 Partial Hybrid Networks 1.3 Optimal Signature Sequences 1.4 Multipath Fading Channels 1.5 Multi-Rate Networks 1.6 Asynchronous Networks 1.7 Imperfect Power Control 1.8 Blind and Group-Blind LIultiuser Receivers

2 Ad Hoc Networks 2.1 Asymptotic Capacity 2.2 Capacity for Finite Networks: Simulations 2.3 Implications for Admission Control

4. INTEGRATED ADMISSION CONTROL

1 Cellular Wireless Networks

2 Ad Hoc Networks

5. MULTIUSER DETECTION IK CROSS-LAYER DESIGN: PERSPECTIVES

List of Acronyms

References

About the authors

Index

List of Figures

Heterogeneous applications and ubiquitous cover- age in third generation cellular networks 3 Illustration of the infostation concept 10

Ad hoc network illustration 12 Adaptation at local layers in the OSI model 14

Cross-layer adaptation 15 Asynchronous CDMA: basic model 19 Power tradeoff regions for two users employing matched filter receivers 21 Power tradeoff regions for two users employing op- timal multiuser detection 24 A classification of multiuser receivers 2 5 Decorrelator implemented as a modified matched filter receiver 2 6 Power tradeoff regions for two users employing the decorrelating (solid line) and LMMSE (dash-dot line) receivers. 2 9 SIC block diagram 33 Power tradeoff regions for two users employing suc- cesive interference cancellation detector 33 Bit transmissioii for multirate systems 42

Virtual user equivalence in LRD multirate systems 42

HRD for multirate systems 43 Groupwise successive interference cancellation 44 Spectral efficiencies for 2 = lOdB (reprinted with permission from [ V e r d ~ and Shamai, 19991) 48

MULTIUSER DETECTION IhT CROSS-LA Y E R DESIGN

Spectral efficiency for optimal KIN (reprinted with permission from [ V e r d ~ and Shamai, 19991) 49

Performance gains of integrated power control and multiuser detection (reprinted with permission from [Ulukus and Yates, 1998a1) 60

Integrated access control and receiver adaptation flowchart 69

Simulated convergence of the Perron-Frobenius eigen- value for the partial hybrid LMMSE implementation 70

Total data throughput capacity 70

Throughput per user for integrated access control and detection 7 1

Two stage multiuser detector (reprinted with per- mission from [Chen and Tong, 20011) 72

State tracker with matched filter receiver (reprinted with permission from [Chen and Tong, 20011) 73

Ergodic receiver operating characteristics (ROCs) (reprinted with permission from [Chen and Tong, 20011) 77

Packet error probability (reprinted with permission from [Chen and Tong, 20011)

Throughput comparisons (reprinted with permis- sion from [Tong et al., 20011)

Multiple transmissions from node k Joint power control and routing algorithm

Distribution of powers versus node number: (a) initially, (b) after convergence

Total transmission power

Total energy consumption

Equivalent queueing system (reprinted with per- mission from [Comaniciu and Poor, 2003al)

Finite network simulations (reprinted with permis- sion from [Tse and Hanly, 19991)

Effective interference for linear receivers

Effective bandwiths for linear receivers

Bidimensional capacity for the H - M M S E ( P ) sys- tem: (a) No power constraints (b) Minimum power transmission for both voice and data and power ra- tio fixed to K