MAC layer: resource sharing principles and algorithms

29
MAC LAYER (WP4) Internal report no.2 MAC layer: resource sharing principles and algorithms Authors: Andrea Baiocchi, Fabrizio Capriotti, Francesca Cuomo, Cristina Martello Date: 18-04-2001

Transcript of MAC layer: resource sharing principles and algorithms

MAC LAYER (WP4)

Internal report no.2

MAC layer: resource sharing principles and algorithms

Authors: Andrea Baiocchi, Fabrizio Capriotti, Francesca Cuomo, Cristina Martello

Date: 18-04-2001

MAC LAYER (WP4)

1

Contents 1. Introduction ..................................................................................................................................2

2. Evaluation of the Signal-to-Noise Ratio ......................................................................................3

2.1 Introduction ..........................................................................................................................3

2.2 The Signal-to-Noise Ratio in the centralized scenario.........................................................3

2.3 The Signal-to-Noise Ratio in the distributed scenario .........................................................8

2.4 Interference from RF signals................................................................................................9

2.5 The adopted full-duplex mode ...........................................................................................12

2.6 Comparison among different variable bit rate allocation schemes ....................................13

3. Resource sharing ........................................................................................................................16

3.1 Resource sharing approach.................................................................................................18

3.2 Reservation Based traffic ...................................................................................................21

4. Simulations and performance results .........................................................................................27

5. References ..................................................................................................................................28

MAC LAYER (WP4)

2

1. Introduction

This document aims at laying out a modelling framework and a quantitative approach to the

resource sharing issue in an UWB air interface, where the main issues are: i) multiplexing of best

effort traffic with reservation based traffic with QoS (in terms of delay); ii) distributed algorithms.

Therefore, we assume that traffic offered to the UWB air interface (MAC layer) falls into two

categories: i) Reservation Based (RB) traffic; ii) Best Effort (BE) traffic.

The RB traffic serves those services requiring some guarantees as to throughput (hence transfer

delay). As seen by the MAC entities, the terminal to be addressed (among those that are

“connected”, i.e. reachable) and the bit rate of the MAC layer communication to be set up are given

as input, while the decision variables are the power levels to be used under the constraints on the

maximum transmittable average power and the communication quality (BER).

The BE traffic offers a transfer resource that adapts itself to the available bandwidth at a given

time and in a given point in space. The aim here is to achieve the maximum possible overall

throughput, possibly with fairness constraints, but no guarantees are offered as to achievable

throughput and transfer delay.

The resource sharing among the UWB terminodes requires both signalling and local

measurements.

The rest of the document is structured as follows.

Section 2 summarizes with some detail the derivation of the bit error probability for the UWB air

interface under the fundamental hypothesis of ideal channel with Gaussian additive noise (AWGN

channel). Moreover, unsynchronised randomly coded time hopping sequences are assumed for the

co-existing communications.

Section 3 lays down the principles of the resource sharing starting out from the expression of the

SNR and of the BER derived in the previous Section. A theoretical framework is assessed, and hints

are given as to how a distributed algorithm can exploit the theoretical results.

Section 4 presents a distributed algorithm based on the approach outlined in the previous

Section, by specifying signalling flows for RB and BE traffic.

Section 5 reports the analysis of the proposed algorithms based on simulations.

MAC LAYER (WP4)

3

2. Evaluation of the Signal-to-Noise Ratio

2.1 Introduction

In this section the UWB transmission technique performance are evaluated in terms of Signal-to

Noise Ratio and some strategies of managing and controlling the UWB parameters are considered

in order to explain how a variable throughput can be obtained. In 2.2 the Signal-to-Noise Ratio in a

centralized scenario is derived, while in 2.3 this result is generalized to a distributed context. The

section 2.4 provides an analysis of the effect of a RF signal in the UWB signal band. In the 2.5 a

full-duplex mode is defined and the relative impact on performance is analysed. Finally section 2.6

provide a comparison among different schemes for bit rate reconfiguration.

2.2 The Signal-to-Noise Ratio in the centralized scenario

We consider the case of multiple users transmitting to the same receiver, typically named Base

Station, by using a particular UWB transmission technique named Impulse Radio: the transmitted

signal is a sequence of very short-time (a nanosecond) pulses, named monocycles, whose

bandwidth is wide (a GigaHerz) [xx].

The transmitted signal relative to a single user k when time-hopping codes are used and without

modulation, is:

∑+∞

−∞=−−=

jc

kjfk

k TcjTtgAts )()( )()( (2.1)

where g(t) represents the monocycle, a normalized in amplitude base-band pulse not modulated by

any carrier and as for the used parameters their means are explained in the list below:

Ak is the pulse amplitude;

Tf is the pulse repetition period without the time-hopping code;

cj(k): is the j-th chip of the time-hopping code, it assumes values in the countable set [0, 1, 2, …,

Nh] and it determines the time shift of the relative pulse within a time interval lasting Tf so that it

does not overlap with the successive pulse;

Tc is the minimum time shift due to the time-hopping code.

A possible choice for g(t) is the Gaussian pulse (see Figure 1):

−=

22

2exp41)(mm

tttg

τπ

τπ (2.2)

where τm is a time constant that determines the pulse time duration.

MAC LAYER (WP4)

4

1 2 3 4 5 6 7 8 9

10-12

10-10

10-8

10-6

10-4

10

G(f)

f (GHz)0 1 2 3 4 5 6 7 8

-0.5

0

0.5

1

g(t)

t (ns)1 2 3 4 5 6 7 8 9

10-12

10-10

10-8

10-6

10-4

10

G(f)

f (GHz)1 2 3 4 5 6 7 8 9

10-12

10-10

10-8

10-6

10-4

101 2 3 4 5 6 7 8 9

10-12

10-10

10-8

10-6

10-4

10

G(f)

f (GHz)0 1 2 3 4 5 6 7 8

-0.5

0

0.5

1

g(t)

t (ns)0 1 2 3 4 5 6 7 8

-0.5

0

0.5

1

0 1 2 3 4 5 6 7 8-0.5

0

0.5

1

g(t)

t (ns)

Figure 1 – The Gaussian pulse both in the time and frequency domain

The time-hopping code is used in order to allow the contemporary access of multiple users; in fact

if the pulse sequence were periodic, two different signals could collide in a catastrophic way in an

asynchronous scenario, i.e. every pulse of a sequence overlapped in time with the relative pulse of

the other sequence. The time-hopping codes are periodic sequences with period Np (c(k)j=c(k)

j+Np)

and, in order to avoid two successive pulses to overlap, the relation 0≤ c(k)jTc≤ Tf must be satisfied.

The used modulation is PPM (Pulse Position Modulation) and is applied to the time-hopping coded

pulses sequence by introducing a time shift depending on the symbol to be transmitted. Referring to

a binary modulation, a sequence of NS not shifted pulses is transmitted for the symbol 0, while the

symbol 1 is transmitted by a sequence of NS pulses shifted of δ. The resulting expression of the

transmitted signal is:

∑+∞

−∞=−−−=

jS

kc

kjfk

k NjdTcjTtgAts /(()( )()()( δ (2.3)

fSk TNR /1= (2.4)

where:

d(k)(i) is the i-th symbol of the k-th user

Rk is the k-th user data-rate.

As far as the receiver analysis is concerned, first we consider the case of a single user (user 1) and

an AWGN channel model (the multipath is not considered). In this context the received signal can

be written as:

)()()( 1)1(

11 tntsgAtr +−= τ (2.5)

MAC LAYER (WP4)

5

where:

g1 is the path gain from the transmitter to the receiver;

τ1 is the transmission delay.

The received signal relative to the i-th bit is r(t) considered in the time window within which that bit

is transmitted, that is:

)()()( 1)1(

11 tntsgAtr +−= τ with [ ]{ }fSfSi TNiTiNt 1)1(, 11 −+++=∈ τττ (2.6)

Another way to write the received signal relative to the i-th bit is by mean of the normalized

transmitted signal relative to the i-th bit:

)t(n)t(WgA)t(r bit += 11 with ∑−+

=−−−=

1)1(

1)1( )()(

s

S

Ni

iNjcjfbit TcjTtgtW τ (2.7)

In presence of an AWGN, the optimum receiver is a correlator with a correlation template signal

v(t) (see Figure 2):

)()()( δ−−= tgtgtv (2.8)

∑−+

=−−=−−−=

1)1(

1)1( )()()()(

s

s

Ni

iNjbitbitcjfbit tWtWTcjTtvtV δτ (2.9)

v(t)

0 0.2 0.4 0.6 0.8

0

0.5

1

1.5

-1.5

-1

-0.5

0.9

t (ns)

v(t)

0 0.2 0.4 0.6 0.8

0

0.5

1

1.5

-1.5

-1

-0.5

0.90 0.2 0.4 0.6 0.8

0

0.5

1

1.5

-1.5

-1

-0.5

0.9

t (ns)

Figure 2 – The correlator receiver

At the receiver a bit is decoded by correlating the received signal with the correlation template v(t).

Ideally, considering perfect synchronism with the received signal due to a perfect detection of the

time position pulse and assuming that a v(t)-pulse sequence according to the used time-hopping

code is generated at the receiver without errors, we have that:

MAC LAYER (WP4)

6

- if a symbol 0 was transmitted, then each of the Ns pulses is multiplied for the positive part of

v(t), so that a positive value after correlation is obtained;

- if a symbol 1 was transmitted, then the correlation is negative since the received pulses are

located in the negative part of v(t).

Thus the receiver makes Ns correlations per bit: given the result αj of each correlation, α represents

the variable on whose value the receiver bases the decision of the transmitted value:

∫++

+=

−−−=f

f

Tj

jTtcjfj dtTcjTtvtr

)1()1(

1

1

1

)()(

τ

τ

τα (2.10)

∑−+

⋅==

1)1( s

S

Ni

Nijjαα (2.11)

The Signal-to-Noise Ratio in presence of thermal noise only must be calculated after the correlator

as the ratio between the amplitude m of the desired signal risen to the second power and the noise

power. As for m, it represents the correlation value between the transmitted pulse and v(t):

pSt

bitbit mNgAdttVtWgAm

i

∫∈

==τ

1111 )()( (2.12)

dttvtgm p )()(∫= (2.13)

The noise power in output at the correlator is given by:

[ ]∑ ∫−

=

+∞

∞−

==1

00

22 )(2

SN

jSp

orec NmNdttv

Nσ (2.14)

Thus the Signal-to-Noise Ratio (where the multi access interference is not considered):

0

121

221

21

)1(N

NgA

NmN

mNgASNR S

Spo

pSOUT == (2.15)

Now we generalized the SNR expression to the case of multi-access interference. The received

signal is:

)()()()()( 1)1(

11)(

1

tNtsgAtntsgAtr totkk

kk

N

k

U

+−=+−= ∑=

ττ (2.16)

∑=

+−=uN

kk

kkktot tntsgAtN

2

)( )()()( τ (2.17)

In order to characterize Nout(t) some hypotheses can be stated:

1) the different users emitted signals are asynchronous and it results:

(τk -τ1)mod Tf ∈[0,Tf) (2.18)

MAC LAYER (WP4)

7

2) the time-hopping codes are pseudorandom, i.e. the code chips are statistically independent

random variables within a periodic interval lasting Np chips uniformly distributed in the set

[0,1…Nh], moreover different user select a code in a random and independent way;

3) during a bit transmission time the code chip are statistically independent due to the condition

Np>NS, where Ns is the number of chips per bit.

The hypotheses stated above allow to characterize the multi-access interference as a Gaussian white

stochastic process when the number of users is high; the mean value is zero because of the zero

average value of the transmitted pulses, due to the statistic independence of the single terms in

Nout(t), the variance is equal to the sum of the variance of the single terms themselves. Thus we

have:

{ } 0)( =tNE tot (2.19)

{ }∑=

+=UN

kkkkrectot nEgA

2

2222 )(σσ (2.20)

∫∈

−=it

bitkk

k dttVtsnτ

τ )()()( (2.21)

The term nk represents the k-th user interference and is computed in output at the user 1’s correlator

receiver. The interference is due to the asynchronism among different users signals and to the

pseudorandom codes, (as a consequence different users pulses can collide in time). The power of

the interference term is proportional to the number NS of the integrated pulses and it results:

{ } 22)( aSk NnE σ= with f

a T

dsdttvstg

2

2

)()(∫ ∫∞+

∞−

∞+

∞−

=σ (2.22)

Thus the Signal-to-Noise Ratio in presence of multiaccess interference in a centralized context and

assuming the same data rate for each user is:

∑=

+==

UN

kkkaSrec

ps

utotuOUT

gAN

)mNgA(

)N(

m)N(SNR

2

222

211

2

2

σσσ (2.23)

∑=

+=

uN

k

kk

pS

a

out

uOUT

gA

gA

mN)(SNR

)N(SNR

2 121

2

2

2

1

1

1

σ (2.24)

The specific case of perfect power control can be obtained from (2.24) as below:

)1()1(

1

1)(

2

2

−+

=

UpS

a

out

uOUT

NmNSNR

NSNRσ

(2.25)

MAC LAYER (WP4)

8

from which it can be shown that a performance degradation is experienced when the users number

NU increases or the number of pulses per bit NS decreases, which is equivalent to a decreasing bit

rate (see (2.4)).

In particular the maximum number of contemporary users can be determined with a given bit rate

and a desired SNRSPEC. In order to do that we define ∆P as the extra power – with respect to the case

of single user - that each user must transmit in order to reach the desired SNRSPEC when there are NU

–1 interference users:

SPEC

OUT

SNR

SNRP

)1(log10 10=∆ (2.26)

From (2.25) and (2.26) the number of users can be expressed as:

( ){ } 1101)( 10/2

2

+

−=∆ ∆− P

SPECa

pSU

SNR

mNPN

σ (2.27)

{ })10/(2

2

101)1(

)( P

Uaf

p

NT

mPR ∆−−

−=∆

σ (2.28)

When ∆P becomes infinite, the maximum number of contemporary users is obtained

12

2

+

=−

SPECa

pSMAXU

SNR

mNN

σ (2.29)

)1(2

2

−=

Uaf

pMAX

NT

mR

σ (2.30)

The bit error probability Pe can be obtained as a function of the SNR when the hypothesis of

Gaussian white stochastic process is assumed for the multiaccess interference process:

∫∞

−=

=

x

uUOUTe due)x(erfc,

)N(SNRerfcP

22

22

1

π (2.31)

2.3 The Signal-to-Noise Ratio in the distributed scenario

In the distributed context – as in an ad-hoc network – there does not exist a centralized node to

which the traffic is directed. (Each radio terminal must be considered as a terminode because it acts

both as a terminal and as a node.)

With respect to the generic link from the transmitter node i to the receiver one j the SNR can be

written as:

MAC LAYER (WP4)

9

ijSjilm imjm

mjmjmjmlapo

ijijSpijij

NgAgAmN

gNmASNR

−≠ ≠

++

=

∑ ∑),(),( ),,(

222

2)(

σ

(2.32)

ijfjilm imjm

mjmjmjmlapo

ijpij

RTgAgAmN

gmA

++

=

∑ ∑≠ ≠),(),( ),,(

222

2)(

σ

(2.33)

The expression (2.32) takes into account all the incoming transmissions to the node j (see the pairs

(m,j), m≠i) and all the transmissions directing to other nodes l≠j and contributing to the multi-access

interference level at the node j (see (m,l)≠(i,j).).

Thus the success in establishing a link depends on the values of the following quantities:

1) the multi-access interference level at the receiver;

2) the distance between the transmitter and receiver and the radio channel conditions

determining the path gain gij;

3) the desired bit rate of the link to be established Rij.

The (2.32) takes into account the thermal noise and the multi-access interference but does not

consider the extra interference due to other radio systems sharing the same (or part of) band of the

considered UWB system.

In the two following sections the interference from other systems and the SNR degradation for the

adopted full-duplex mode are studied so that a general expression for the SNR can be finally

obtained for the distributed case

2.4 Interference from RF signals

Referring to the distributed case, we consider the presence of other radio systems interfering signal

within the UWB system band. In a general way we can model it as a sinusoidal tone due to its very

narrow band with respect to the ultra wide band:

( ) )2( θπ += tfsinAtR or (2.34)

where the phase θ is a random variable uniformly distributed between 0 and 2π

In order to evaluate the SNR degradation due to a sinusoidal signal we can not assume the Gaussian

white model for the total interference process and thus the optimum receiver is not an adapted filter

any more; however we still consider it as receiver.

The output of the receiver due to the considered sinusoidal tone in a time interval lasting as a bit is:

MAC LAYER (WP4)

10

∑ ∑ ∫∫−

=

=

++++

+− ++=−−=

1

0

1

0 0

)()( )()()()(

)1(

)(

Sij Sij WWcjf

ci

jf

N

j

N

j

T

cijf

TTcjT

TcjT

fcijijr dttvTcjTtRdtjTTctvtRS

δδ

[ ]∑ ∫−

=

+

−−++=1

0 0

)( )()()(Sij wN

j

T

cijf dttgtgTcjTtR

δ

δ (2.35)

where TW is the monocycle duration.

From the (2.35) it can be obtained:

[ ] +

+++= ∑ ∫

=−

1

0 0

2ijNs

j

Tw)i(

jforijr dt)TccjTt(fsin)t(gAS θπ

[ ] =

++++− ∑ ∫

=

1

0 0

)( )(2)(Sij WN

j

T

cijfor dtTcjTtfsintgA θδπ

∑ ∫=

++++−=

Sij WN

J

T

cijfoor TcjTtftgfsinA

0 0

)( ))222(cos()()(2 θδπδπ (2.36)

We assume that the time shift due to the code is continuous rather than discrete; then we consider

interfering tones with To<Tf, and we define the random variable θj uniformly distributed in [0, 2π)

according to:

( ) jcjfofoo

o TcjTfTTT

f θθπ =++⇒<= 22,1

(2.37)

It can be noticed that the condition To<Tf restricts the set of sinusoidal tones under study to those

ones whose frequency – for example - is grater than 10 MHz when Tf is equal to 100 ns.

The random variable θj uniformly distributed in [0, 2π) means that for the pulses corresponding to

different code chips the interfering tone phases result random independent variables and as a

consequence the interference terms relative to the code sequence pulses do not sum in phase each

other. Thus the interference term can be rewritten as:

∑ ∑−

=

=− −=++−=

1

0

1

0

)(2))2(cos()()(2ij ijNs

j

Ns

jrjorjoorijr nfsinAtftgfsinAS δπθδπδπ (2.38)

and the interference power can now be obtained:

[ ]

=

=

==

∑ ∑

∑−

=

=Θ−Θ−

1 1

0

22

21

0

222

)(4

)(4

ij ij

ij

Ns

ol

Ns

mrmrlor

Ns

krkorijrijr

nnEfsinA

nEfsinASEI

δπ

δπ

(2.39)

MAC LAYER (WP4)

11

Due to the hypotheses assumed for the random variables θj the terms with different indexes l and m

does not contribute to the sum since they are equal to zero as shown below:

[ ]

∫∫

∫ ∫

=++++=

=

++++=Θ

W

l

W

m

lm

T

lomo

T

Tw

o

Tw

lomorlrm

dttfEdttfE

dttfdttfEnnE

00

0

0))2(cos())2(cos(

))2(cos())2(cos(

θδπθδπ

θδπθδπ

θθ

θθ

(2.40)

Thus the (2.39) can be rewritten as follows:

imprjij

Tw

oijr

Ns

krkorijr

INsdttftgENsfsinA

nEfsinAIij

=Θ−

=

++=

=

=

∑2

00

22

1

0

222

))2(cos()()(4

)(4

θδπδπ

δπ

θ

(2.41)

From (2.41) it can be noticed that the interference level due to a sinusoidal tone is proportional to

the number NS of pulses per bit while the desired term is proportional to NS risen to the second

power. So the quantity NS represents a processing gain even in contending with RF interference.

When we consider several interfering sinusoidal tones at different frequencies we have:

∑=

+=Nrj

kkkrk tfsinAtR

1

)2()( ϑπ (2.42)

where θk are statistically independent random variables uniformly distributed in [0, 2π).

By a similar proceeding with respect to that in the previous case and thanks to the linearity of the

receiver, the interference term results:

∑ ∑

∑∑

=

=−

=−

=−

−=

=++−=

rj Sij

ij

N

k

N

lkrlkrk

Ns

lklkkkr

Nrj

kijr

nfsinA

tftgfsinAS

1

1

0

1

01

)(2

))2(cos()()(2

δπ

θδπδπ (2.43)

From (2.43) the interference power is:

MAC LAYER (WP4)

12

[ ]

∑ ∫

∑ ∑

∑ ∑

=

=

=−Θ

=

=−Θ−Θ−

++=

=

=

=

==

Nrj

k

Tw

kkrkij

Nrj

K

Ns

lkrlkrk

Nrj

k

Ns

lkrlkrkijrijr

dttftgEfsinANs

nfsinAE

nfsinAESEI

ij

ij

1

2

0

22

1

1

0

222

2

1

1

0

2

))2(cos()()(4

)(4

)(4

θδπδπ

δπ

δπ

θ

(2.44)

Thus the obtained SNR is:

( )( ) ( )ijfimprj

jilm imjmmjmjmjmlapo

pijijij

RTIgAgAmN

mgASNR

+

++

=

−≠ ≠

∑ ∑., ,,

222

22

σ

(2.45)

2.5 The adopted full-duplex mode

We consider a node j with several both out coming and incoming established links. Let nTj be the

number of contemporary out coming links. The relative transmissions are synchronous, moreover

we assume that they use orthogonal codes, while the multicode mode is examined in the next

section.

As for the received signals, they must be considered asynchronous both each other both with respect

to the node j transmissions, since they income from different users.

The adopted full-duplex mode consists in turn off the receiver while transmitting as long as the

pulse plus the time shift of the PPM lasts. In this way the error causes due to contemporary

transmission and reception are avoided, in fact since an error would occur if a transmitted pulse

were decoded as a received one, the receiver must turned off during the transmission. Of course that

has an impact on the SNR in terms of a degradation of its. In order to explain that the Figure 3

shows the case of an incoming pulse lost due to the turned off receiver. For sake of simplicity the

case of synchronism in the TC but not in the Tf is shown.

Tx node j

Rx node i

“LOST” PULSE

Tf

Tx node j

Rx node i

“LOST” PULSE

Tf

Figure 3 - The case of an incoming pulse lost due to the turned off receiver

MAC LAYER (WP4)

13

In order to evaluate the SNR degradation due to the described full-duplex scheme, we must consider

that the decision variable α is obtained from NS transmitted pulses whereas a number NSij < NS is

received: the variables NSij result random variables statistically independent and equidistributed, so

that for the decision variable α it can be written:

ijh

TjNs

jj

Ns

jj Ns

N

nE

ijij

)1(11

−=

⇒ ∑∑

==αα (2.46)

From (2.45) and (2.46) the SNR in the considered general case of a distributed network, of the

described full-duplex mode and of both multi-access and RF signal interference, is:

( )( ) ( )

)1(

., ,,

222

22

h

tj

ijfimprjjilm imjm

mjmjmjmlapo

pijijij N

n

RTIgAgAmN

mgASNR −

+

++

=

−≠ ≠

∑ ∑σ

(2.47)

2.6 Comparison among different variable bit rate allocation schemes

The aim of this section is evaluating different variable bit rate allocation schemes. Thus we consider

the centralized case when several users are transmits to a Base Station with different bit rate; then

from (2.23) the SNR of the k-th user is:

∑≠=

⋅+

=UN

kjjjjapo

Skkpkuk

gAmN

NgmANSNR

,1

22

2)()(

σ (2.48)

Let suppose the user 1’s bit rate must be reconfigured and in particular – but without loss of

generality – it must be increased by an integer factor n1. There are three ways to do that:

1) by decreasing by the factor n1 the number of pulses per bit;

2) by using a number of n1 pseudorandom codes (even with the previous NS);

3) by using a number of n1 codes (even with the previous NS) orthogonal and synchronized

each other.

Let consider the first way.

In this case the SNR relative to the user 1 is:

1

12

22

112*

11

)()( γ

σ

=

+

=

∑=

ngAmN

NgmANSNR

UN

jjjapO

Spu (2.49)

In order to obtain the same previous value of the SNR, the user 1 must increase the transmitting

power by a factor n1 so that it interferes with the other users more. The level power is chosen

according to:

MAC LAYER (WP4)

14

211

2*1 )()( AnA = (2.50)

1

21

2

221

21)(

Sp

N

jjjapo

Nmg

gAmN

A

U

+

=∑=

σγ

(2.51)

UN

kjjjjapo

Skkpkuk Nk

AngAmN

NgmANSNR

U

,2,)(

)(

,2

211

22

2

=

++

=

∑≠=

σ

(2.52)

Now we consider the second case of using n1 random codes, so that the transmitted signal is:

∑∑=

−− −−−=1

11

)1()1(1

)1( ))/(()(n

i jS

ic

ijf NjdTcjTtgAts δ (2.53)

This multi-rate mode corresponds to assign n1 channels each of bit rate 1/NS1Tf; since the codes are

pseudorandom, they interfere each other, thus resulting in a degradation of the SNR that must be

compensated by increasing the transmitting power. Below the expressions for the SNR and for the

needed transmitting power are given:

1

12

211

22

112

11

)1(

)()( γ

σ

=

−++

=

∑=

gAngAmN

NgmANSNR

UN

jjjapo

Spui (2.54)

[ ]2*

1211

21

112

12

1

2

221

21 )()(,

)1()( AAnA

nNmg

gAmN

A RMCaSp

N

jjjapo

U

>=−−

+

= −=∑

γσ

σγ

(2.55)

The needed power results higher with respect the previous case (see (2.50)) because of the mutual

interference of the n1 codes.

The idea of the third case is to assign a set of n1 codes chosen such that they do not interfere each

other (i.e. in an orthogonal set and by using a code time shift at least equal to Tc =TW +δ ). In this

case we obtain the same SNR expression of (2.53), here obtained with the assumption given below:

imNjcc pm

ji

j ≠=≠ −− ,...1,)1()1( (2.56)

1

2

22

112

11

)()( γ

σ

=

+

=

∑=

−UN

jjjapO

Spui

gAmN

NgmANSNR (2.57)

2*1

211

21 )()()( AAnA OMC ==− (2.58)

MAC LAYER (WP4)

15

From (2.58) it can be noticed that the node 1 transmitting power is equal to that of the first case. As

for the interference on other users, we must compare the one due to the transmission of a single

code to the one due to the transmission of n1 codes at a power level less by a factor n1.

We consider signals synchronous with respect to the code word but not with respect to the single

chip. In the single code case the collision probability with other users pulses is 1/Nh and the

transmitting power is (A1)2n1; in the multi-orthogonal codes case the collision probability increases

by a factor n1 while the transmitting power decreases by the same factor. As a consequence the

interference caused to other users is the same in the two cases.

In conclusion the multi-code mode can be used in order to support links with different SNR

requirements or to establish link with different users, so that the general expression of the

transmitted signal is:

∑ ∑=

−−−

− −−−=KN

i jiSk

ikc

ikjfiK

k NjdTcjTtgAts1

)()()( ))/(()( δ (2.59)

)max( iSkpk NN −> (2.60)

where the (2.60) represents a necessary condition to obtain that a chip occurs only one time within a

bit period in each of the Nk used channels.

MAC LAYER (WP4)

16

3. Resource sharing

By assuming an AWGN channel model with perfect timing, the SNR of the communication

between a transmitter i and a receiver j is

SNRij =Ai

2mp2N s,ijgij

N0mp + IRF , j + σa2

Ak2gkj

k =1k≠ i, j

NTX

∑1 −

n j

Nh

j =1,…, NRX (3.1)

where NRX and NTX are the number of receivers and transmitters respectively. The index i of the

transmitter is a function of j, at least as long as we consider unicast transmissions.

For the remaining of this Section we make the following simplification: we assume that a

receiving terminal has no simultaneous transmissions. Thus, also each transmitter does not have any

reception going on and we can label the transmitter-receiver pair of each communication with the

same index, say i. Let N = NTX = NRX be the number of such pairs.

The expression of SNR can be simplified also from a notational point of view, by introducing the

transmission power. Let

Pi =1

TfA

i2W 2 (t )dt

0

Tf

∫ =1

TfA

i2EW (3.2)

with

EW = W 2 (t )dt−∞

mp = W(t ) W (t ) −W (t − δ)[ ]dt−∞

σa2 = 1

TfW(t − s) W( t ) −W (t − δ)[ ]dt

−∞

2

ds−∞

(3.3)

Note that EW, mp and σa all have the same dimension (energy, e.g. measured in Volt2.s; to have

Joule we have to apply the signal to a load).

Then the SNR in (3.1) can be rewritten as

SNRi =Pigii

Ri ηi + Tf σ2 Pkgkik =1,k ≠i

N

i =1,…, N (3.4)

where we let the following definitions

Tf the pulse repetition time interval;

Ri the binary bit rate of the i-th communication;

Pi the average power emitted by the i-th transmitter;

gij the path gain from the i-th transmitter to the j-th receiver;

MAC LAYER (WP4)

17

ηi the background noise energy; with the model in (3.1), this is N0 + IRF , j mp( )EW m p ;

σ2 an adimensional parameter equal to σ

a2 m

p2 .

Typical values of the above parameters are as follows [3]: the pulse duration is 0.75 ns and Tf =

100 ns; σ2 = 1.9966e–3; in case of thermal background noise, ηi = 2.568e-21 V2.s. Note that powers

are measured in V2.

We can also write (3.4) by using the energy per bit instead of the power level at the transmitter.

Let Ebi be the energy per bit used by the i-th transmitter; then

SNRi =Ebigii

ηi + Tf σ2 Rk Ebk gkik =1,k≠ i

N

∑=

Ebigii

ηi + σ2 Ebk Ns,kgkik=1,k ≠i

N

∑i =1,…, N (3.5)

With the same hypotheses leading to (3.4) and assuming further that UWB self-interference can

be modelled as a Gaussian process, the probability of error per bit can be calculated leading to:

Pe(SNR) = Q SNR( ), Q( x) =1

2πe−u2 / 2du

x

∫ (3.6)

The denominator of the SNR in (3.4) and (3.5) highlights the two sources of noise: internal

UWB self-interference and external noise and interference (e.g. RF). The first contribution arises

because random codes are assumed (no orthogonality): it can be controlled by means of admission

control, possibly working differently for a reservation based traffic and for a best effort traffic.

Along with admission control, transmission level measurements and adaptation of power

levels/rates are crucial to the working of the UWB terminals. External interference and noise are to

be taken as given and not modifiable.

The minimum allowable energy per bit to contrast external interference can be obtained by the

requirement SNRi ��γi, by letting the internal UWB interference tend to 0; so

Ebi ≥ Ebmin,i =

ηiγ i

g ii (3.7)

By accounting for the upper limit on the power level at the transmitter available for data

transmission (not signalling), Pmax, we get an upper limit for the bit rate achievable by the i-th

communication:

Ri ≤

Pi

Ebi≤

Pmaxgii

ηiγ i≡ Rmax,i (3.8)

In the rest of this Section we deal with power levels and bit rates as if they were continuously

variable quantities. They are not. Power is usually adjusted in fixed steps (e.g. by 1 dB step). As for

bit rates, remind that Ri = 1/(NsTf); Tf being fixed, the bit rate can be varied by either adjusting Ns,

which is an integer, (variable “spreading factor” code) or by using more than one code per

communication (multicode). The first solution suffers from very gross quantization for high rates.

The second one requires several impulse shifting chains, orthogonalization of the codes of a same

user, and distribution of the overall transmitted power among the codes.

The rest of this Section aims at laying out a sort of “theoretical approach” to the resource sharing

MAC LAYER (WP4)

18

issue. To make it work, at least in a world where AWGN channel model can be assumed (!), many

aspects need be investigated. Section 3.1 lays out the guidelines of the resource sharing approach.

Section 3.2 deals with resource sharing for best effort traffic (BE traffic). Section 3.3 is devoted to

reservation based (RB) traffic. Section 3.4 draws some conclusions and outlines the lines of action

to develop a practical approach. Throughout this report mobility is marginally considered. Its full

impact should be investigated further. However, power/bit rate adaptation mechanism here defined

should be carried over rather straightforwardly.

3.1 Resource sharing approach

In general, a basic requirement of the physical layer is to offer communication links with an error

probability no greater than a given threshold value. This in turn means that the SNR of a

communication link be no less than a specified threshold γ. Moreover, a power limiting constraint

adds usually either with respect to the average value of the power level or to the peak power. We

consider the former one in the following.

Therefore, from (3.4) we infer that the power levels and bit rates should meet the following

constraints

Pigii − Ri γ iTf σ2 Pkgkik =1,k≠ i

N

∑ ≥ ηi Ri γ i i =1,… , N

0 < Pi ≤ Pmax Ri > 0

(3.9)

The assignment problem splits into two subproblems depending on the required service

guarantees. In case of RB MAC flows, the target value of Ri comes as a requirement from the upper

layer; hence the point is to check if a feasible power level can be set in all transmitters so that the

required bit rates be supported. This in turn is equivalent to the existence of a solution to the

inequalities system (3.9) with a given set of values of the bit rates.

In case of best effort traffic, the problem as stated in (3.9) is undetermined, since the bit rates can

take in principle any positive value. It is clear from the form of (3.9) that a feasible solution for the

power levels always exists, provided that the bit rates are sufficiently small.

Then, we can pose an optimisation problem by stating a function of the Pi‘s and the Ri‘s and

requiring that this function be maximized, under the constraints (3.9). An obvious target is to

maximized the overall rate of the active communications. To account for binary errors, one could

maximize the “capacity” of the ongoing communications. This leads to the following target

function:

H (r,p) = Ri ⋅C Pe(SNRi )( )

i=1

N

∑ , C( p) =1 + p log2 ( p) + (1− p) log2 (1 − p) (3.10)

If the constraints in the first line of (3.9) were all satisfied with the equality, the above function

becomes just a linear combination of the bit rates. If all threshold values γi are equal to a same value

γ, the target function (3.10) can be restated as just the sum of the bit rates. In general, we can find

the value of Ri such that Ri ⋅C(Pe(SNRi )) = Ri ⋅C(Q( ai Ri )) is maximized, with SNRi = ai/Ri. It is

MAC LAYER (WP4)

19

easy to see that this function has a unique maximum for Ri ranging in (0,���� ���� �� �� �� ���

solving the equation ϕ(u)=uϕ’(u), where ϕ(u) = C(Q( u )). Let the unique positive solution be

denoted by u*. Then the optimum Ri is Ri,opt = ai/u* and the target function (3.10) becomes

H (r,p) ≡ H (p) = Ri,opt ⋅C Pe u*( )

i =1

N

∑ =C Pe u*( )

u*

Pi gii

ηi + Tf σ2Pkgki

k =1,k≠ i

N

∑⋅

i =1

N

∑ (3.11)

A modified form of the target function (3.10) represents the sum of capacities per unit of energy

spent by each transmitting terminal. Then, we might want to maximize:

G(r,p) =Ri ⋅C Pe(SNRi )( )

Ebii=1

N

∑ =R

i2

PiC Pe Pigii Ri ηi + Tf σ2 Pk gki

k=1,k ≠i

N

i=1

N

∑ (3.12)

With either function (3.10) or (3.12) we can proceed in two ways. If one requires that SNRi = γi

(with equality), the bit rates can be easily found out from these constraints and plugged into the

target function expression, so that it becomes only a function of the power levels. Alternatively, one

can choose the optimum rate for each communication, by assuming all power levels are fixed. The

existence of these optimal rates follows from the form of the bit error probability function and from

the target function expressions. This last approach does not constrain the SNR in any way.

The above formulation highlights a form of duality between RB and BE traffic. In the former

case, power levels are adjusted (optimised) for given values of the bit rates. In the latter case, we

optimise the bit rates and calculate the power level thereof, based on the SNR constraint.

Summing up, the RB traffic problem can be stated as follows

given r > 0, find p such that

Pigii − Ri γ iTf σ2 Pkgkik =1,k≠ i

N

∑ ≥ ηi Ri γ i i =1,… , N

0 < Pi ≤ Pmax

(3.13)

Let

��

M =

g11 γ1σ2Tf R1( ) −g12 � −g1N

−g21 g22 γ2σ2T f R2( )� −g2N

� � � �

−gN 1 −g N 2 � gNN γ N σ2Tf RN( )

(3.14)

The matrix M is not symmetric in general, since gij is the path gain from the i-th transmitter to

the j-th receiver. The above problem can be compactly stated in matrix form as

pM ≥ h ≡1

Tf σ2η1,…,ηN[ ] (3.15)

A solution exists (actually with equality in each of the first N inequalities of (3.13)) iff the matrix

M (with positive diagonal entries and nonpositive off-diagonal entries) is such that the spectral

MAC LAYER (WP4)

20

radius of (D–M)D–1 is less than 1, where D is the diagonal part of M. Remind that the spectral

radius of a matrix is the maximum of the modulus of its eigenvalues.

A sufficient condition for M–1 to exist and to be a non negative matrix, is that the matrix M be

strictly (or irreducibly) diagonally dominant. As an example, dominance by columns means that at

the i-th receiver it must be

gii > γ i σ2Ns,i gki

k=1,k≠i

N

∑ i =1,…, N (3.16)

The difference between the left and the right hand sides can be taken as a definition of the i-th

receiver margin. Conversely, this could be used as a criterion to select an intermediate terminode in

a multihop path, i.e. by choosing the terminode i that maximizes the above margin. This is because

the spectral radius of a matrix is upper bounded by any matrix norm. So, we have

ρ (D − M)D−1( )≤ (D − M)D−1

1= max

1≤ i≤N

γ iσ2 Ns,i

giigki

k =1,k≠ i

N

(3.17)

The amount by which the rightmost side of (3.17) is less than 1 represents a margin, since it

upper bounds the rate of convergence of the power levels from their initial values to the optimum

values, according to

p(n +1) = p(n)(D − M)D−1 + hD−1, n ≥ 0 (3.18)

Let us assume that the solution of the problem (3.15) exists. Since M–1 is a non negative matrix,

the power vector is a monotonously increasing function of the right-hand side vector. Hence we can

evaluate the maximum additional interference that can be tolerated by each communication

(receiver) under that maximum average power constraint. If e denotes a row vector of 1’s, the

maximum additional interference a is found as

Pmaxe = hM−1 + aM−1 ⇒ a = PmaxeM − h (3.19)

Provided that no more than that interference is added to any of the receiver, it can safely make

the transmitter adjust its power (and hence trigger power adjustments in other communications),

without violating the maximum power constraint. The “power margin” of the i-th transmitter is

∆Pi =Pmax

γ i Rigii − γ iσ

2 Ns,i gkik =1,k ≠i

N

− ηi (3.20)

This is the amount of additional interference that can be loaded to the i-th receiver, without

violating the SNR and the maximum average power constraints.

As for BE traffic with SNR constraints, the problem formulation can be as follows:

MAC LAYER (WP4)

21

maximize H (p) =C Pe max{u* ,γ i }( )

max{u*,γ i}

Pi gii

ηi + Tf σ2 Pk gkik=1,k ≠i

N

∑i =1

N

0 ≤ Pi ≤ Pmax i =1,… , N

Ri = 1

max{u*, γ i}

Pi gii

ηi + Tf σ 2 Pkgkik=1,k ≠i

N

∑i =1,…, N

(3.21)

Under the SNR constraint in the first line of (3.21), the assignment problem for BE traffic

reduces to the maximization of a function of the vector P in the hypercube [0,Pmax]N.

These results generalize quite straightforwardly to the case of multi transmission/reception for

each terminal. As a matter of fact, the reduction of the SNR indicated by (3.1) can be easily

incorporated into the constant γi. Moreover, the practically interesting cases are those with one or

two transmission going on at the same time a reception is active (bi-directional link or two bi-

directional link, when a terminode is acting as a relay). So the reduction of the SNR is generally

negligible (Nh is in the order of 100).

A major point requiring an in-depth analysis is the impact of terminal mobility. This essentially

implies a variability of the path gain (provided the assumed AWGN model still holds!). This in turn

entails that power levels (for RB traffic) and bit rates (for BE traffic) should be adjusted

accordingly. In the former case, the constraints (3.13) could become no more sustainable. In that

case, the forced termination of some communication is necessary (or possibly a modification from

RB to BE of some traffic).

As stated above, the assignment problems are “centralized” optimisation problems. To make

them practical in a distributed UWB environment, a possibly approximate approach should be taken

based on local measurements and signalling, with a trade-off between signalling load and accuracy.

3.2 Reservation Based traffic

The basic principle a practical solution of the problem (3.13) can be based on is to define

margins. To this end, each pair of terminals wishing to establish a RB connection, will choose a

power level such that the SNR constraint is met with a margin of β dB.

We address the issue of a new UWB terminal pair wishing to start its communication. Let this

pair be labelled with 0. We assume that the constraints (3.13) are met for the on-going N RB traffic

communications. The rate R0 associated to the new connection is constrained by the QoS

requirements (e.g. limited transfer delay for real time services, time deadlines for given blocks of

data). The power level P0 has to be chosen so that

P0g00

η0 + Tf σ2 Pk gk 0k =1

N

∑= ξ0γ 0 (3.22)

MAC LAYER (WP4)

22

where ξ0 is a margin and η0 includes the UWB self interference due to BE traffic.

A number of constraint must be met: i) ξ0 must be not less than 1; ii) the interference due to the

new RB connection on the on-going RB connections must be limited within their respective SNR

safety margins, denoted by ∆k for the k-th receiving terminal (for a formal definition of the margin

see later on); iii) the power level P0 cannot exceed Pmax.

The SNR safety margin is so defined: let the SNR of the j-th terminal pair be equal to ξjγj. Then,

the margin is the amount of additional UWB interference that can be tolerated by maintaining that

the SNR be no less than γj. Formally,

Pjg jj

Rj η j +U j( )= ξ jγ j andPj g jj

R j η j +U j + ∆ j( )= γ j (3.23)

From (3.23) it is easily derived that:

∆ j =Pj g jj

γ j Rj1 −

1

ξ j

(3.24)

The constraints on (3.22) above can be so formulated

P0 =ξ0γ 0R0 η0 +U0( )

g00≤ min

1≤ j≤N

∆ j

T f σ2g0 j

≡ Pallowed

1 ≤ ξ0 ≤ β

P0 =ξ0γ 0R0 η0 +U0( )

g00≤ Pmax

(3.25)

If there exist a ξ0 such that all inequalities in (3.25) hold, then the new connection can be

admitted, otherwise it is rejected. In the former case, ξ0 is set according to:

ξ0 = min β,g00Pmax

γ0 R0 η0 +U 0( ),g00Pallowed

γ 0 R0 η0 +U0( )

≥1 (3.26)

and the margin of the 0-th receiving terminal can be computed by means of (3.24).

To reduce the signalling load due to the update of the margin values as the terminals move

and/or the radio channel propagation changes the SNR and hence the adopted margins, we could

consider a range of acceptable values of the SNR instead of a specific value γ.

3.3. Best Effort traffic

First, we address the issue of a new UWB terminal pair starting its communication. Let this pair

be labelled with 0. In this case, the terms ηi include all the external (non UWB) interference and

background noise at the receiver, plus the UWB interference of communications having higher

priority of best effort traffic (i.e. reserved bandwidth communications).

Then, we require the following constraints to be satisfied (and we assume that they are with Eb0

= 0):

MAC LAYER (WP4)

23

Ebigii

ηi + Tf σ2 Rk Ebk gkik =1,k≠ i

N

∑ + Tf σ2 R0Eb0g0i

≥ γ i i = 1,…, N

Eb0g00

η0 + Tf σ2 RkEbk gk 0k =1

N

∑≥ γ 0

(3.27)

In (3.27) the bit rates and energy per bit of each communication except the 0-th one are already

fixed. The point is what are the feasible values of the new communication. For a positive bit rate to

be allowed for the new communications it is necessary to either reconfigure the assignable

quantities of the other communications or to have set them so that the SNR constraints are satisfied

with a margin. If the latter is the case, we have to answer the question as to which is the most

appropriate value of the margin for the active communications.

To illustrate an example, let us assume only best effort traffic and let us take a TCP-like

approach to congestion control. The concept is as follows: a terminal pair wishing to initialise a

communication, start transmitting at a rate depending on the interference level measured by the

receiver and on the path gain from the transmitter to the receiver. Each other pair of communicating

terminals (i.e. already active communications) senses a possibly increased interference level and

adjusts its rate consistently, so as to maintain a target SNR value. The point to answer is whether it

is convenient that the new communication be activated. This depends obviously on the objective

function to be optimised. To this end, we choose the problem formulation as in (3.21).

Specific to this type of optimisation there is the step-by-step approach: given that N

communications are active, what are the best rate and power level for a new (N+1)-th

communication?

Let us assume that N communications involving N pairs of terminals are active with values of Pi

and Ri chosen so as to maximize the objective function and be compatible with the following

constraints

SNRi =Pigii

Ri ηi + Tf σ2 Pkgkik=1,k ≠i

N

=Pi gii

Ri Ii= γ i i =1,… , N

Pi ≤ Pmax

(3.28)

When the new communication is activated, the above constraints become as follows:

MAC LAYER (WP4)

24

SNRi =Pi gii

Ri* ηi + Tf σ2 Pkgki

k =1,k≠ i

N

∑ + Tf σ 2P0g0i

=

= Pi gii

Ri* Ii + T f σ2 γ 0I0

g00g0i R0

= Pigii

Ri* I i + ci R0( )= γ i i =1,…, N

SNR0 =P0g00

R0 η0 + Tf σ2Pk gk0

k =1

N

=P0g00

R0I0= γ0

Pi ≤ Pmax i = 0,1,… , N

(3.29)

where the rates of the already on going communications have been adjusted to the new value Ri* to

maintain the same SNR as before the 0-th communication started. Moreover, the notation

ci = Tf σ2 γ 0 I0 g00( )g0i is used.

The value of P0 is fixed by the second of (3.29). There remains to choose the rate R0. The

objective functions can be as follows

G( R0 ) = R0 f (SNR0 )Eb0

+R

i* f (SNRi )

Ebi*

i =1

N

∑ =

= R0g00

γ 0 I0f (γ 0 ) + Ri

Iigii

γ i Ii + ci R0( )2f (γ i )

i =1

N

H ( R0 ) = R0 f (SNR0 ) + Ri* f (SNRi )

i =1

N

∑ = R0 f (γ0 ) + RiI i

Ii + ci R0f (γ i )

i=1

N

R0 ∈ 0, R0max[ ], R0max = Pmaxg00

γ 0 I0

(3.30)

In 3.12 we use the notation f(.) = C(Pe(.)).

Since they lead to the same result, we confine ourselves to the second one. As a minor

simplification (but trivial modifications only would be needed to generalize) we assume that all

SNR target values are equal to the same γ. Then, we can redefine the second objective function in

(3.30) by cancelling the common positive factor f(γ), thus considering the function (with a slight

abuse of notation)

H ( R0 ) = R0 + RiIi

Ii + ci R0i =1

N

R0 ∈ 0, R0max[ ], R0max = Pmaxg00

γI0

(3.31)

It can be easily checked that the second derivative of this function is always positive, hence it is

convex; the first derivative at R0 = 0 can be of either sign. In any case, the maximum of H(R0) is

achieved at the border of the interval where R0 varies, i.e. Hmax = max{H(0), H(R0)}.

The meaning of this result is as follows. If H(R0) > H(0), the new communication can increase

MAC LAYER (WP4)

25

the overall net throughput of the air interface, and its best rate is the maximum one, compatible with

the power constraint. This implies that the transmitter should use the maximum power level. If the

reverse is true, the new communication should not be initialised, since the benefit it brings about is

outweighted by the rate penalty induced in all other affected communications. The condition

H(R0max) > H(0) is easily checked out to be equivalent to

ci Ri

Ii + ci R0maxi =1

N

∑ <1 (3.32)

This is intuitively appealing, since the term ci contains the path gain from the 0-th transmitter to

the i-th receiver, hence a measure of how much “disturbing” the new communication is to the

already established i-th one.

As for the possibility to measure the quantities in (3.32), we can write ciR0max = diPmax. The i-th

MS can measure both Ii and Ii+ciR0max hence, by knowledge of Pmax, it can evaluate di. If the ratios

diRi/(Ii+ciR0max) are signalled to the 0-th terminal, after it probes the air by sending a signal at Pmax,

that terminal can decide whether its communication can actually start by comparing the sum of

those ratios to the threshold g00/(γ0I0). This comparison can be carried out by the receiving terminal.

This requires a pair of terminals wishing to initialise a communication to cooperate, so that the

transmitting terminal sends a sort of paging signal with the identity of the receiving terminal at a

power level Pmax. Then, all the terminals acting as the receiving side of an already active

communication will start measuring a modified level of interference and finally will signal back the

ratio diRi/(Ii+ciR0max) to the terminal paged by the initial signalling. So, the receiver of the 0-th pair

can verify the inequality in (3.32) and decide whether the communication can actually take place.

The optimisation of the overall net rate with a step-by-step approach (i.e., as new

communications come up) turns out to translate into a dyadic choice: either give up to transmitting,

or transmit at peak power (hence the maximum allowed rate). That peak power transmission be

optimal is not intuitive in a self-interference prone environment. However, it must be stressed that a

one step optimisation of the overall system could lead to a different power and rate assignment.

Interestingly enough, it can be shown that also the overall optimisation of the best effort traffic in a

single step is attained by either shutting up a transmitting terminal or letting it transmit at peak

power.

To show this result, we consider N terminal pairs, each having a communication. We wish to

solve the constrained optimisation problem (3.21), which can be easily reduced to

maximize H (P) = Pigii f (γ i )

γ i ηi + Tf σ2 Pk gkik=1,k≠ i

N

i =1

N

0 ≤ Pi ≤ Pmax

(3.33)

By some tedious algebra, it can be checked that

MAC LAYER (WP4)

26

∂2H (P)

∂Pi2

=2 Tf σ2gij( )2 Pj g jj f (γ j )

γ j η j + Tf σ2 Pk gkjk=1,k≠ j

N

3j=1j≠ i

N

∑ ≥ 0 (3.34)

for any vector P in the hypercube [0,Pmax]N. The inequality (3.34) imply that the target function

H(P) is convex with respect to each scalar variable, whatever the values of the others.

So, we can write:

H (P) = H (P1, P2 ,…, PN )

≤ max H (0,P2,… ,PN ), H (Pmax ,P2,…,PN ){ }≤ max H (0,0,…,PN ), H (0,Pmax ,…, PN ), H (Pmax ,0,… ,PN ), H (Pmax ,Pmax ,…, PN ){ }≤ max

ε∈ 0,1{ }NH (ε1Pmax ,ε2Pmax ,…,ε N Pmax ){ }

(3.35)

where the last max operator is taken over all the permutation of N binary values belonging to {0,1}.

From (3.35) it is clear that the maximum of H(P) is achieved in one of the vertices of the hypercube

[0,Pmax]N. This corresponds to the extreme choice of either 0 or maximum power level transmission

of the N pairs of terminals.

Therefore, a main result is that the maximization of the overall net rate for BE traffic leads to

maximum power transmission for some terminals while the others cannot set up their

communications. The Pmax/0 pattern of the N pairs of terminals need not be the same as that

obtained by step-by-step optimisation (think of starting from a pair that would have to stay silent on

the overall optimisation). The interesting result is that there is no point is using any intermediate

level of the average power.

MAC LAYER (WP4)

27

4. Simulations and performance results

MAC LAYER (WP4)

28

5. References

[1] Sanjay Lal, Elvino S. Sousa “Distributed Resource Allocation for DS-CDMA-Based

Multimedia ad hoc Wireless LAN’s”, IEEE JSAC, vol. 17, No. 5, pp. 947-967, May 1999.

[2] J.-P. Hubaux, T. Gross, J.-Y. Le Boudec, and M. Vetterli "Toward Self-Organized Mobile Ad

Hoc Networks: The Terminodes Project", IEEE Communications Magazine, January 2001.

[3] T. A. Elbatt, S. V. Krishnamurthy, D. Connors, S. Dao, “Power Management for Throughput

Enhancement in Wireless Ad Hoc Networks,” IEEE 2000, pp. 1506-1513.

[4] D. Kim, “Rate-Regulated Power Control for Supporting Flexible Transmission in Future

CDMA Mobile Networks,” IEEE J. Select. Areas Commun., vol. 17, pp. 968-977, May 1999.

[5] S. J. Oh, T. L. Olsen, K. M. Wasserman, “Distributed Power Control and Spreading Gain

Allocation in CDMA Data Networks,” in Proc. INFOCOM ’00, 2000, pp. 379-385.