Beruflich Dokumente
Kultur Dokumente
Abstra
t | Information theoretic considerations tures and cell geometries. Section IV explains the en-
for the uplink of a cellular mobile communication hanced receiver structure applicable for the two service
system with two service classes are presented. Dif- classes to comply with practical constraints on complex-
ferent receiver structures are compared on the ba- ity and delay. Finally, Section V discusses results on
sis of achievable rates, required received powers, and the user capacity increase due to more sophisticated re-
supportable number of users. The channels consid- ceiver schemes for the power–limited as well as power–
ered are restricted to AWGN channels. Particular unlimited cases.
emphasis is on interference modeling via spill–over
factors for large number of users and different de- II. T HE C ELLULAR M ULTIPLE –ACCESS M ODEL
coding schemes including stripping receivers. This
work offers theoretical bounds for practical cellular The uplink of a wireless mobile communication sys-
systems and gives an insight into the effects of the dif- tem is characterised by a set of multiple transmitters that
ferent system parameters on performance. correspond to mobile users distributed in the coverage
area and a set of multiple receivers that correspond to
I. I NTRODUCTION base stations. The general framework to analyse such a
system is a multiple–input multiple–output channel [2],
A wideband accessing scheme has been selected where each base station acts as a receiver for all the
for the third generation universal mobile telecommu- users dissipated in the coverage area. A practical ap-
nications system (UMTS) due to its service flexibility proach that is implemented in current systems assigns
and improved performance over second generation sys- users to specific receivers to form cells, thus, the cov-
tems [1]. UMTS will provide access to a comprehensive erage area is partitioned into several cells with a single
set of services, ranging from simple voice connections receiver each. A cell receiver processes only signals
to high quality multimedia applications. Data services received from users allocated to the corresponding cell,
in UMTS are characterised by high transmission rates and treats signals received from neighbouring cells as
and non–stringent delay requirements, thus, enabling interference. This approach falls within the class of
long block length coding schemes. On the other hand, multiple–access and interference channels, the optimum
speech services are characterised by low transmission capacity region of which is still an open problem [3].
rates and real time delay constraints, thus, requiring The multiple–access is from users within the cell and
shorter block lengths and low complexity decoding. the interference is from users in other cells which are
transmitting to their own base stations. In the sequel,
the other cell interference is modeled as Gaussian noise
In this work, information theoretic considerations
which can be viewed as a worst case assumption [2].
for the uplink of a cellular system with two service
classes, e.g., voice and data, are presented. The chan-
Consider the uplink scenario of a cellular mobile
nels considered are restricted to AWGN channels. An
communication system composed of M cells with K
information theoretic analysis of different multiuser
users per cell. It is assumed that each user is allocated
receiver structures for a cellular environment is per-
only to one cell at a time and, thus, multiple cell site pro-
formed which offers theoretical bounds for practical
cessing is not considered in this work. All users follow
systems and gives an insight into the effects of the
a wideband accessing strategy using the whole available
different system parameters on performance. In cellular
resource all the time resembling the accessing scheme in
systems, performance is mainly limited by the amount
UMTS. The received signal Ym at cell site m is given by
of interference from neighbouring cells. Therefore, it is
X X X q (m) (m0 )
Ym = Xk(m) + + Zm ;
important to understand the implications of the receiver
structures to the power consumption within the cell as k;m0 Xk (1)
well as the interference into adjacent cells. k2K m0 2Am k2K
(m)
where Xk is the received signal of user k in cell m,
Section II introduces the cellular multiple–access
model. In Section III, particular emphasis is on the spill– Am is the set of indicesqof all cells that contain users
m)
over factor computation for different receiver struc- interfering with cell m, (k;m 0 is an attenuation factor
0
multiplied by Xk
(m )
to give the received signal of user from cell m0 to cell site m tends to the statistical mean
k in cell m0 at cell site m, and Zm is additive Gaussian by the law of large numbers
noise of zero mean and variance 2 . We assume that
P X m
the users’ signals are statistically independent, Gaussian
(m)
0
K k2K k;m
! P E fmm0 (w)g as K ! 1: (3)
distributed, and symbol and block synchronized. k;m0
depends on the location of user k with respect to the cell
sites m and m0 . Under the assumption of an attenuation Thus, can be calculated as
(m) X
in power proportional to a power a of the distance, k;m0 = m0 (w)g :
E fm (4)
m0 2Am
is given by
0 m0 a
(
= m 0 )a ;
(m )
k;m 0 rk;m
( )
The validity of the spill–over factor approach is justified
(m)
k;m0 = (2)
(m)
k;m0 (rk;m0 )
( ) by the following argument. Let
!
X X X
where
m)
(k;m 0 is the geometrical path loss from user k Im = PS k;m0 + PD
(m) (m)
k;m0 (5)
m0 2Am k2KS k2KD
in cell m0 to the site of cell m, rk;m0 is the distance
(m)
from user k in cell m0 to the site of cell m, and a is the denote the total intercell interference at cell m from all
(m)
attenuation exponent. Shadowing and fast fading are not neighbouring cells . Mind that k;m0 merely depends on
considered. 0
the position of user k in cell m . Let
= + (K S P+SI+m KD PD )
2
Assume that the K users are divided into KS speech T (6)
users and KD data users with transmission rates RS and 2
Xk ; k 2 K D
Y log T = 0 as K ! 1 (10)
Z N (0; 2 + (KS PS + KD PD )) –factors have been evaluated for a linear and hexag-
onal array of cells and different attenuation coefficients a
Fig. 1: Cellular GMAC with 2 service classes. based upon a uniform user distribution within each cell.
Results can be found in Table I. Results for a two di-
mensional hexagonal array of cells have been calculated
The modeling of the intercell interference via the – by Monte–Carlo integration due to the more complex
factor approach can be applied for all decoding schemes cell geometry. For both cases, the intercell interference
that require that users within a decoding group should be is dominated by interference from the first tier of cells.
received with the same power P at the receiver. In this Note that is decreasing with increasing a due to de-
case, the transmit power of user k depends only on his creased intercell interference. Moreover, the value of
location and is independent of the locations of the other is independent of the number of users per cell and the
users. Thus, a snapshot average intercell interference required received power per user.
TABLE I x 2 [r; 2r℄, respectively, for an average user distribu-
–factor for a network with equal received powers tion. Im;i
(1)
(a) and Im;i (a) can be evaluated as
(2)
a linear hexagonal
4 0:1271 0:4149 Z r
2 ( Kr 1 x)R (x +jx(2i rj1)r)a dx;
a
3:75 0:1369 0:4659 Im;i
(1)
(a)= K;R 2
attenuations [7]. If the attenuations are in increasing or- The intracell received signal, Iin , at cell site m is equal
der, control the transmit power of user k such that he is to KP where P is the average received power of each
received with power user in cell m. Since these powers correspond to a ver-
Pj>k Rj tex in the power region, the sum power KP can be cal-
Pk = 2 2 Rk 1 2
2 2
: (11) culated as
for kS ; kD 1 can provide tighter bounds on RS or RD . The second performance measure is based on com-
paring the power regions of the different receiver struc-
The value of the –factor varies depending if decod- tures. The power region gives the set of received powers
ing is done jointly with users within each service class required for reliable communication. The power region
received with the same powers PS and PD , or is done via of each scheme is bounded by a set of constraints. It can
stripping with users within each service class received be plotted in the PD –PS plane, where PS and PD are
with different powers of average PS and PD . In the se- the average received powers of the speech and data ser-
vices, respectively. Fig. 3 depicts the power regions for
quel, the scheme with users decoded jointly and received
with the same power within each service class is denoted a hexagonal network with KS = 40
users and KD =8
joint/equal while the scheme where users are decoded users.
via stripping is denoted joint/stripping. Note that the 0.04
joint/stripping scheme is an optimal scheme with users conventional scheme
enhanced scheme
decoded and stripped at the cell site in increasing order 0.035
joint/equal scheme
joint/stripping scheme
100
S