Upload
khangminh22
View
1
Download
0
Embed Size (px)
Citation preview
Information Technology: Transmission, Processing, and Storage
Series Editor: Jack Keil Wolf UniversiQ qf Californiil at Sun Diego Ln Jolln, Cnlifornia
Editorial Board: Robert J. McEliece California Institute of Tecilnology Pnsndenn, Cdiforrzzn
John Proakis Northeastem Universily Boston, Massach~mtts
William H. Tranter Krginia Poljtechic Iiz~tctute and State Universzty Blacksblirg, Virgznzn
Communication System Design Using DSP Algorithms: With Laboratory Experiments for the TMS320C6701 and TMS320C6711 Steven A. Tretter
Interference Avoidance Methods for Wireless Systems Dimitrie C. Popescu and Christopher Rose
MIMO Signals and Systems Horst J. Bessai
Performance Analysis and Modeling of Digital Transmission Systems William Turin
Stochastic Image Processing Chee Sun Won and Robert M. Gray
Wireless Communications Systems and Networks Mohsen Guizani
Wireless Networks Multiuser Detection in Cross-Layer Design Cristina Comaniciu, Narayan B. Mandayam, and H. Vincent Poor
A Continuat~on Order Plan is ava~lable for t h ~ s wr ies . A continuation order will bring dzli,ery of each new volt1111c ~mmed~a te ly upon publication. Volumes are billed only upon actual sh~pment . For further in to~ ina t~on plzaw contact the publ~sher.
WIRELESS NETWORKS MULTIUSER DETECTION IN CROSS-LAYER DESIGN
Cristina Comaniciu Stevens Inslitute of Techizology
Hoboken, New Jersey
Narayan B. Mandayam Rutgers University
Piscataway, New Jersey
H. Vincent Poor Prznceton University
Princeton, New Jersey
a - Springer
Library of Congress Cataloging-in-Publication Data
Cornaniciu, Cristina. Wireless networks: multiuser detection in cross-layer design1Cristina Cornaniciu,
Narayan B. Mandayarn, H. Vincent Poor.
p , cm. - (Information technology: transmission, processing, and storage) Includes bibliographical references and index. ISBN 0-387-23697-X
1. Wireless communication systems-Security measures. 2. Computer networks-Security nxeasures. 3. Denlodulation (Electronics) I. Mandayam, Narayan B. 11. Poor, H. Vincent. 111. Title. IV. Series
ISSN: 1389-6938 ISBN-10: 0-387-23697-X ISBN-13: 978-0387-23697-1 Printed on acid-free paper,
0 2 0 0 5 Springer Science+Business Media, Inc. All rights reserved. This work may not be translated or copied in whole or in part without the written permission of the publisher (Springer Science+Business Media, Inc., 233 Spring Street, New York, NY 10013, USA), except for brief excerpts in connection with reviews or scholarly analysis. Use in connection with any form of information storage arid retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed is forbidden. The use in this publication of trade names. trademarks, service marks and similar terms. even if they are not identified as such, is not to be taken as an expression of opinion as to whether or not they are subject to proprietary rights.
Printed in the United States of America
Contents
List of Figures List of Tables Preface Acknowledgments
1. MULTIUSER DETECTION FOR WIRELESS NETWORKS
1 Future Generation Wireless Networks 1.1 Third Generation (3G) Cellular Networks 1.2 Wireless Application Protocol (WAP) 1.3 Network Costs for Data Transmission 1.4 Wireless Networks for Unlicensed Bands: WiFi,
WiMax, HomeRF, Bluetooth and Infostations 1.5 Ad Hoc Networks 1.6 Cross-Layer Design
2 Introduction to Multiuser Receivers: Pros and Cons 2.1 Performance of Matched Filter Receivers 2.2 Multiuser Detectors 2.3 Performance of Blind Receivers
3 Multiuser Detection for Next Generation Wireless Networks 38
4 Multi-Rate Multiuser Detection
5 Information Theoretic Aspects: Spectral Efficiency
6 Multiuser Detection in Cross-Layer Design: Introductory Remarks and Book Outline
2. INTEGRATED RADIO RESOURCE ALLOCATION
1 Introduction to Radio Resource Allocation
ix xiii xv
xvii
2 Power Control 5 3
vii
MULTIUSER DETECTION IN CROSS-LAYER DESIGN
Integrated Power Control and Multiuser Detection 5 6
Access Control, Power Control and Multiuser Detection 62
Traffic-Aided LIultiuser Detection 7 1
Medium Access Control for Multipacket Reception Networks 76
Routing and Multiuser Detection in Ad Hoc Networks
Admission Control: General Framework
3. ASYMPTOTIC CAPACITY FOR WIRELESS NETWORKS WITH MULTIUSER RECEIVERS
1 Effective Bandwidths and Capacity for Linear Receivers in Cellular Networks 1.1 General Formulation for Synchronous Networks 1.2 Partial Hybrid Networks 1.3 Optimal Signature Sequences 1.4 Multipath Fading Channels 1.5 Multi-Rate Networks 1.6 Asynchronous Networks 1.7 Imperfect Power Control 1.8 Blind and Group-Blind LIultiuser Receivers
2 Ad Hoc Networks 2.1 Asymptotic Capacity 2.2 Capacity for Finite Networks: Simulations 2.3 Implications for Admission Control
4. INTEGRATED ADMISSION CONTROL
1 Cellular Wireless Networks
2 Ad Hoc Networks
5. MULTIUSER DETECTION IK CROSS-LAYER DESIGN: PERSPECTIVES
List of Acronyms
References
About the authors
Index
List of Figures
Heterogeneous applications and ubiquitous cover- age in third generation cellular networks 3 Illustration of the infostation concept 10
Ad hoc network illustration 12 Adaptation at local layers in the OSI model 14
Cross-layer adaptation 15 Asynchronous CDMA: basic model 19 Power tradeoff regions for two users employing matched filter receivers 21 Power tradeoff regions for two users employing op- timal multiuser detection 24 A classification of multiuser receivers 2 5 Decorrelator implemented as a modified matched filter receiver 2 6 Power tradeoff regions for two users employing the decorrelating (solid line) and LMMSE (dash-dot line) receivers. 2 9 SIC block diagram 33 Power tradeoff regions for two users employing suc- cesive interference cancellation detector 33 Bit transmissioii for multirate systems 42
Virtual user equivalence in LRD multirate systems 42
HRD for multirate systems 43 Groupwise successive interference cancellation 44 Spectral efficiencies for 2 = lOdB (reprinted with permission from [ V e r d ~ and Shamai, 19991) 48
MULTIUSER DETECTION IhT CROSS-LA Y E R DESIGN
Spectral efficiency for optimal KIN (reprinted with permission from [ V e r d ~ and Shamai, 19991) 49
Performance gains of integrated power control and multiuser detection (reprinted with permission from [Ulukus and Yates, 1998a1) 60
Integrated access control and receiver adaptation flowchart 69
Simulated convergence of the Perron-Frobenius eigen- value for the partial hybrid LMMSE implementation 70
Total data throughput capacity 70
Throughput per user for integrated access control and detection 7 1
Two stage multiuser detector (reprinted with per- mission from [Chen and Tong, 20011) 72
State tracker with matched filter receiver (reprinted with permission from [Chen and Tong, 20011) 73
Ergodic receiver operating characteristics (ROCs) (reprinted with permission from [Chen and Tong, 20011) 77
Packet error probability (reprinted with permission from [Chen and Tong, 20011)
Throughput comparisons (reprinted with permis- sion from [Tong et al., 20011)
Multiple transmissions from node k Joint power control and routing algorithm
Distribution of powers versus node number: (a) initially, (b) after convergence
Total transmission power
Total energy consumption
Equivalent queueing system (reprinted with per- mission from [Comaniciu and Poor, 2003al)
Finite network simulations (reprinted with permis- sion from [Tse and Hanly, 19991)
Effective interference for linear receivers
Effective bandwiths for linear receivers
Bidimensional capacity for the H - M M S E ( P ) sys- tem: (a) No power constraints (b) Minimum power transmission for both voice and data and power ra- tio fixed to K