## Exploiting Decentralized Channel State Information for Random Access (2002)

### Cached

### Download Links

- [acsp.ece.cornell.edu]
- [people.ece.cornell.edu]
- [acsp.ece.cornell.edu]
- DBLP

### Other Repositories/Bibliography

Citations: | 64 - 18 self |

### BibTeX

@MISC{Adireddy02exploitingdecentralized,

author = {S. Adireddy and L. Tong},

title = {Exploiting Decentralized Channel State Information for Random Access},

year = {2002}

}

### Years of Citing Articles

### OpenURL

### Abstract

We study the use of channel state information for random access in fading channels. Traditionally, random access protocols have been designed by assuming simple models for the physical layer where all users are symmetric and there is no notion of channel state. We introduce a reception model that takes into account the channel states of various users. Under the assumption that each user has access to his channel state information (CSI), we propose a variant of Slotted ALOHA protocol for medium access control, where the transmission probability is allowed to be a function of the CSL The function is called the transmission control scheme. Assuming the finite user infinite buffer model we derive expressions for the maximum stable throughput of the system. We introduce the notion of asymptotic stable throughput (AST) that is the maximum stable throughput as the number of users goes to infinity. We consider two types of transmission control namely population independent transmission control (PITC) where the transmission control is not a function of the size of the network and population dependent transmission control where the transmission control is a function of the size of the network. We obtain expressions for the AST achievable with PITC. For population dependent transmission control, we introduce a particular transmission control that can potentially lead to significant gains in AST. For both PITC and PDTC, we show that the effect of transmission control is equivalent to changing the probability distribution of the channel state. The theory is then applied to CDMA networks with Linear Minimum Mean Square Error (LMMSE) receivers and Matched Filters (MF) to illustrate the effectiveness of utilizing channel state. It is shown that through the use of channel state, with an...

### Citations

3422 |
Convergence of probability measures
- Billingsley
(Show Context)
Citation Context ...s Poisson process of rate 1. We then have =si= N +sSi s()5/m [' 1 ] = Psi: N + Si s(133) The second equality follows from a simple substitution. Note that P i= N + Si s- i= N + Si s(134) We also have =-=[42]-=-(page 346) that P -1si: N + S? s- M-o M (135) November 1, 2002 DRAFT SUBMITTED TO IEEE TRAN. INFO. THEORY, NOVEMBER 2002 45 where Therefore C(/, N, 6) = lim f M-oo J-M It is easy to see that (w)dwds. ... |

512 | Opportunistic beamforming using dumb antennas
- Viswanath, Tse, et al.
- 2002
(Show Context)
Citation Context ...base station, transmit power capabilities, etc. There is a recent line of work that studies the effect of channel state information (CSI) on resource allocation in multiple-access fading channels [2]–=-=[7]-=-, [9], [10]. These papers however assume a centralized controller that has the knowledge of the channel states of all the users in the network. While this assumption might be reasonable for channel al... |

286 | Linear Multiuser Receivers: Effective Interference, Effective Bandwidth and User Capacity
- Tse, Hanly
- 1999
(Show Context)
Citation Context ...e transmitting users. However, if the signature sequences are random, the size of the network and the spreading gain are large, the SIR can be approximated as a simple function of the received powers =-=[37]-=-. Due to the heuristics in [37], we will use the following reception model for the LMMSE multi-user detector. Given that K users transmit, Pi is the power received from user i, user i goes through if ... |

198 | Dynamic server allocation to parallel queues with randomly varying connectivity
- Tassiulas, Ephremides
- 1993
(Show Context)
Citation Context ...ing fluctuations in the channel state in downlink has been considered in [8]. Throughput optimal scheduling for downlink over time-varying channels by a central controller has been considered in [9], =-=[10]-=- All these strategies require the knowledge of the channel states of all the users in the network. While this assumption might be reasonable for channel allocation on the downlink, a similar assumptio... |

169 |
A perspective on multiaccess channels
- Gallager
- 1985
(Show Context)
Citation Context ...tic in nature. Information theoretic studies assume that data is always present at each user and this makes the analysis of network throughput, delay and buffer overflow with bursty sources difficult =-=[14]-=-, [15]. The field of random access protocols is an approach to the multi-access problem that explicitly takes into account the burstiness of sources. In this paper, we will consider the use of decentr... |

149 |
Information capacity and power control in single cell multi-user communications
- Knopp, Humblet
- 1995
(Show Context)
Citation Context ...ies etc. .(t) figure Fig. 1: Cellular Uplink There is a recent line of work showing that the knowledge of channel can crucially change the resource allocation problem for multi-access fading channels =-=[2]-=-, [3], [4], [5], [6]. In fact, it has been shown that the strategy that maximizes the information theoretic sum capacity is the one that allows at most the user with the best channel state to transmit... |

144 | A.L.: Scheduling for multiple flows sharing a time-varying channel: The exponential rule
- Shakkottai, Stolyar
- 2002
(Show Context)
Citation Context ...inducing fluctuations in the channel state in downlink has been considered in [8]. Throughput optimal scheduling for downlink over time-varying channels by a central controller has been considered in =-=[9]-=-, [10] All these strategies require the knowledge of the channel states of all the users in the network. While this assumption might be reasonable for channel allocation on the downlink, a similar ass... |

139 | Information theory and communication networks: An unconsummated union,” this issue
- Ephremides, Hajek
(Show Context)
Citation Context ... nature. Information theoretic studies assume that data is always present at each user and this makes the analysis of network throughput, delay and buffer overflow with bursty sources difficult [14], =-=[15]-=-. The field of random access protocols is an approach to the multi-access problem that explicitly takes into account the burstiness of sources. In this paper, we will consider the use of decentralized... |

122 |
Stability properties of slotted aloha with multipacket reception capability
- Ghez, Verdu
- 1988
(Show Context)
Citation Context ... transmitting users and second abstract the increasing sophistication of the underlying signal processing algorithms. One such model is the multipacket reception (MPR) model introduced by Ghez et al. =-=[16]-=-, [17]. It is possible to model the simultaneous reception of multiple packets using this model but the level of abstraction does not allow for the incorporation of the channel state information of th... |

121 |
The impact of frequency-flat fading on the spectral efficiency of CDMA
- Shamai, Verdú
- 2001
(Show Context)
Citation Context ...hannel that uses CDMA with an optimal receiver. The effect of decentralized power control on the sum capacity of CDMA with linear receivers and single-user decoders was studied by Shamai and Verdú in =-=[13]-=-. In this paper, we complement the existing information-theoretic literature by considering the effect of decentralized CSIs538 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 u... |

84 | Capture and Retransmission Control in Mobile Radio - Zorzi, Rao - 1994 |

77 | Multi-Access Fading Channels: Part II: Delay-Limited Capacities - Hanly, Tse - 1998 |

67 | Asymptotically optimal waterfilling in vector multiple access channels
- Viswanath, Tse, et al.
- 2001
(Show Context)
Citation Context ...ity that is close to that obtained by the optimal centralized power control scheme. Decentralized schemes have also been considered for code-division multiple-access (CDMA) networks. Viswanath et al. =-=[12]-=- have shown the asymptotic optimality of a decentralized power control scheme for a multiple-access fading channel that uses CDMA with an optimal receiver. The effect of decentralized power control on... |

57 | Multipacket reception in random access wireless networks: from signal processing to optimal medium access control
- Tong, Zhao, et al.
(Show Context)
Citation Context ...of the traditional network architecture and design principles. Cross layer design, where information is exchanged between layers is being explored as an alternative to the traditional design paradigm =-=[1]-=-. In this context, allowing interaction between MAC and PHY layers seems natural, especially for mobile wireless communication where the channel quality is changing with time. As illustrated in Figure... |

54 | On the capture probability for a large number of stations
- Hajek, Krishna, et al.
- 1997
(Show Context)
Citation Context ...distribution that turns out to be very crucial is the way in which the tail of the distribution rolls off. Given a distribution function ,define to be the rolloff of , if there exists a such that and =-=[37]-=- (36) If there exists a positive constant such that the cumulative distribution function (CDF) of the distance of a station satisfies (37) where is a positive constant. Then it can be shown that [37] ... |

50 | Stability of n interacting queues in random-access systems - Luo, Ephremides - 1999 |

47 |
Multiaccess fading channels. i. polymatroid structure, optimal resource allocation and throughput capacities
- Tse, Hanly
- 1998
(Show Context)
Citation Context ...(t) figure Fig. 1: Cellular Uplink There is a recent line of work showing that the knowledge of channel can crucially change the resource allocation problem for multi-access fading channels [2], [3], =-=[4]-=-, [5], [6]. In fact, it has been shown that the strategy that maximizes the information theoretic sum capacity is the one that allows at most the user with the best channel state to transmit [2], [3],... |

45 |
Optimal decentralized control in the random access multipacket channel
- Ghez, Verdu, et al.
- 1989
(Show Context)
Citation Context ...mitting users and second abstract the increasing sophistication of the underlying signal processing algorithms. One such model is the multipacket reception (MPR) model introduced by Ghez et al. [16], =-=[17]-=-. It is possible to model the simultaneous reception of multiple packets using this model but the level of abstraction does not allow for the incorporation of the channel state information of the tran... |

37 |
Stability conditions for some multiqueue distributed systems: Buffered random access systems
- Szpankowski
- 1994
(Show Context)
Citation Context ...th them. If for any , , , then (63) (64) (65) This lemma says that the stability of implies the stability of . The properties listed in the lemma are commonly notated as stochastically dominates [39]–=-=[41]-=-. Given the random sequence , the key is to identify a sequence that stochastically dominates and whose stability is easy to analyze. As in [23], we define a one-dimensional Markov chain which is the ... |

33 | A multiqueue service room MAC protocol for wireless networks with multipacket reception - Zhao, Tong - 2003 |

30 |
The way of analysis
- Strichartz
(Show Context)
Citation Context ...efine the function f(co) as f(o)sF]-(o). (163) Since F(o) = 1 + O(02), we can choose e small enough such that the inverse function of F(o) is defined. This also implies, from inverse function theorem =-=[44]-=-, that the function F] - is continuously differentiable. It is therefore simple to show that the function F() = O() ass0. It is also easy to show that the function F(F(w)) = 1 +0( ) as ws0. Thus f(w) ... |

29 | Performance of a wireless access protocol on correlated rayleigh-fading channels with capture
- Chockalingam, Zorzi, et al.
- 1998
(Show Context)
Citation Context ...ncreases with the number of users. The reception model considered was a collision model. In [33], the design of transmission probability was chosen in a heuristic fashion and it was not optimized. In =-=[34]-=-, Chockalingam et al. studied the design of Slotted ALOHA for correlated Rayleigh-fading channel. It was not assumed that the mobiles have access to the channel state but it was shown that the correla... |

28 |
Some conditions for ergodicity and recurrence of Markov chains
- Pakes
- 1969
(Show Context)
Citation Context ...bove satisfies the properties listed in Lemma 1. Lemma 2: The Markov Chain Qj(t) stochastically dominates Nj(t). ProofsRefer to the appendix. For the fully loaded system an application of Pakes' Lemma=-=[41]-=-, which gives a sufficient condition on drift Di __A E{Qj(t + 1) -Qj(t)lQj(t ) = i}, can be used to obtain a sufficient condition for stability. For the sake of completeness, we state Pakes' lemma bel... |

28 |
Ergodicity of slotted aloha system. Probl
- Tsybakov, Mikhailov
- 1979
(Show Context)
Citation Context ...ge of channel state is utilized to vary the transmission probability. The function that maps the CSI to the probability of transmission is termed the transmission control. • Maximum stable throughput =-=[23]-=- is used as a figure of merit to compare different transmission control schemes. We assume a network with finite number of users and infinite buffers and derive the expression of maximum stable throug... |

26 |
On the stability of interacting queues in a multi-access system
- Rao, Ephremides
- 1988
(Show Context)
Citation Context ...ed with them. If for any , , , then (63) (64) (65) This lemma says that the stability of implies the stability of . The properties listed in the lemma are commonly notated as stochastically dominates =-=[39]-=-–[41]. Given the random sequence , the key is to identify a sequence that stochastically dominates and whose stability is easy to analyze. As in [23], we define a one-dimensional Markov chain which is... |

25 | Stability and delay of finite user slotted ALOHA with multipacket reception
- Naware, Mergen, et al.
- 2005
(Show Context)
Citation Context ...d by Zhao and Tong [18], [19]. Again, there is no concept of channel state in these protocols. Random access for general reception models without using channel state have also been considered in [20]–=-=[22]-=-. The contents and contributions of this paper can be broadly separated into two parts. In the first part, we focus on deriving a general theory of random access with CSI. Our main contributions in th... |

24 | Sensor networks with mobile access: Optimal random access and coding
- Venkitasubramaniam, Adireddy, et al.
- 2004
(Show Context)
Citation Context ...ove is important for the uplink of networks that have a large number of nodes but each is equipped with small power. The regime of large number of nodes and small power is relevant to sensor networks =-=[46]-=-. Thus, the theory that we have derived finds an important application in the reachback problem in sensor networks. For us, reachback refers to the data gathering phase of the operation of sensor netw... |

22 |
Signal processing in random access
- Tong, Naware, et al.
- 2004
(Show Context)
Citation Context ... channel state parameters. Once the reception model has been developed, then it is important to determine good target distributions and then evaluate the possible gains from transmission control. See =-=[47]-=- for related discussions. The results presented in this paper are mostly asymptotic in nature and there are different transmission control algorithms that give the same AST. But, these different choic... |

21 |
Some information theoretic aspects of decentralized power control in multiple access fading channels
- Telatar, Shamai
- 1999
(Show Context)
Citation Context ...on on the uplink is not easy to justify. Resource allocation on the uplink, specifically power control, with each user having access to his channel state alone was considered by Telatar and $hamai in =-=[11]-=-. It was shown that the loss due to the decentralized strategy in information theoretic capacity is November 1, 2002 DRAFT SUBMITTED TO IEEE TRAN. INFO. THEORY, NOVEMBER 2002 4 minimal. Viswanath et a... |

21 | A dynamic queue protocol for multiaccess wireless networks with multipacket reception
- Zhao, Tong
- 2004
(Show Context)
Citation Context ... version of ALOHA proposed in [16], [17] is symmetric with respect to the users. Random access protocols that are built upon the multi packet reception model have been proposed by Zhao and Tong [18], =-=[19]-=-. Again, there is no concept of channel state in these protocols. Random access for general reception models have also been considered in [20], [21]. However, both these papers do not consider the use... |

17 | Mobile radio slotted ALOHA with capture and diversity
- Zorzi
- 1995
(Show Context)
Citation Context ... can be represented with the proposed general reception model. The performance of Slotted ALOHA for uplink in fading channels both with and without capture has been previously explored in [23], [24], =-=[25]-=-, [26] and the references there in. But these papers did not assume that the users have access to their channel state information. Design of retransmission probability was considered in [27], [28], [2... |

15 |
decentralized control in random-access multipacket channel
- “Optimal
- 1989
(Show Context)
Citation Context ...tting users and, second, abstract the increasing sophistication of the underlying signal processing algorithms. One such model is the multipacket reception (MPR) model introduced by Ghez et al. [16], =-=[17]-=-. It is possible to model the simultaneous reception of multiple packets using this model but the level of abstraction does not allow for the incorporation of the CSI of the transmitting users. As a r... |

14 |
Ergodicity of slotted Aloha system
- Tsybakov, Mikhailov
- 1979
(Show Context)
Citation Context ...ity is used as the random access protocol. The function that maps the channel state information to the probability of transmission is termed the transmission control scheme.sMaximum stable throughput =-=[22]-=- is used as a figure of merit to compare different transmission control schemes. We assume a network with finite number of users and infinite buffers and derive the expression of maximum stable throug... |

13 |
Optimal transmission ranges and code rates for frequency-hop packet radio networks
- Subbarao, Hughes
- 2000
(Show Context)
Citation Context ...el that can be represented with the proposed general reception model. The performance of Slotted ALOHA for uplink in fading channels both with and without capture has been previously explored in [24]–=-=[27]-=- and the references therein. But these papers did not assume that the users have access to their CSI. Design of retransmission probability was considered in [28]–[30]. An important concern in these pa... |

13 | Exploiting multiuser diversity in wireless ALOHA networks
- Qin, Berry
- 2001
(Show Context)
Citation Context ...gn was done by a central controller who has access to channel state of all the users. The Slotted ALOHA scheme where mobiles have knowledge of the uplink signal-to-noise ratio (SNR) was considered in =-=[32]-=-, [33]. In [32], Qin and Berry used this knowledge to vary the power of transmission but the transmission probability was kept fixed. It was shown that with the choice considered, the throughput incre... |

9 |
Optimal transmit power management on a fading multiaccess channel
- Cheng
- 1996
(Show Context)
Citation Context ...tc. .(t) figure Fig. 1: Cellular Uplink There is a recent line of work showing that the knowledge of channel can crucially change the resource allocation problem for multi-access fading channels [2], =-=[3]-=-, [4], [5], [6]. In fact, it has been shown that the strategy that maximizes the information theoretic sum capacity is the one that allows at most the user with the best channel state to transmit [2],... |

9 | Stability and capacity of wireless networks with probabilistic receptions
- Mergen, Tong
- 2003
(Show Context)
Citation Context ...oposed by Zhao and Tong [18], [19]. Again, there is no concept of channel state in these protocols. Random access for general reception models without using channel state have also been considered in =-=[20]-=-–[22]. The contents and contributions of this paper can be broadly separated into two parts. In the first part, we focus on deriving a general theory of random access with CSI. Our main contributions ... |

8 | Performance analysis of a slotted-ALOHA protocol on a capture channel with fading,” Queueing Systems
- Sant, Sharma
- 2000
(Show Context)
Citation Context ...ave access to the channel state but it was shown that the correlation in the fading channel can be exploited to improve the throughput of ALOHA. Stability analysis for capture model was considered in =-=[35]-=- by Sant and Sharma. It was not assumed that the nodes have access to their CSI. The retransmission probabilities of different users was therefore kept fixed. Characterization of stability region for ... |

6 | B.Hajek, “Adaptive Induced Fluctuations for Multiuser Diversity - Sanghavi - 2002 |

6 | Optimal transmission probabilities for slotted ALOHA in fading channels
- Adireddy, Tong
(Show Context)
Citation Context ...l consider the SNR threshold model as an example for which it is possible to obtain the optimal transmission control. The optimal transmission control for a simplified capture model was considered in =-=[36]-=-. Obtaining the optimal transmission control for the general capture model and other reception models is interesting and useful but is also hard. A. An Example In this section, we apply the results de... |

5 | Stability of queues in slotted aloha with multiple antennas
- Naware, Tong
- 2002
(Show Context)
Citation Context ...ion model have been proposed by Zhao and Tong [18], [19]. Again, there is no concept of channel state in these protocols. Random access for general reception models have also been considered in [20], =-=[21]-=-. However, both these papers do not consider the use of channel state information. The contents and contributions of this paper can be broadly separated into two parts. In the first part, we focus on ... |

5 |
Retransmission control and fairness issue in mobile slotted ALOHA networks with fading and near-far effect
- Liu, Polydoros
- 1997
(Show Context)
Citation Context ...sume that the users have access to their CSI. Design of retransmission probability was considered in [28]–[30]. An important concern in these papers was to make the protocol fair to all the users. In =-=[31]-=-, Liu and Polydoros study the design of retransmission probabilities to maximize the throughput, but it was assumed that the design was done by a central controller who has access to channel state of ... |

4 |
dynamic queue protocol for multiaccess wireless networks with multipacket reception
- “A
- 2004
(Show Context)
Citation Context ...s. As a result, the version of ALOHA proposed in [16], [17] is symmetric with respect to the users. Random-access protocols that are built upon the MPR model have been proposed by Zhao and Tong [18], =-=[19]-=-. Again, there is no concept of channel state in these protocols. Random access for general reception models without using channel state have also been considered in [20]–[22]. The contents and contri... |

4 |
Improvement of Slotted Aloha for Land-Mobile Satellite Communications, Using Channel State Information
- Jahn, Bottcher
- 1993
(Show Context)
Citation Context ... done by a central controller who has access to channel state of all the users. The Slotted ALOHA scheme where mobiles have knowledge of the uplink signal-to-noise ratio (SNR) was considered in [32], =-=[33]-=-. In [32], Qin and Berry used this knowledge to vary the power of transmission but the transmission probability was kept fixed. It was shown that with the choice considered, the throughput increases w... |

3 |
D.N.C.Tse, "Multiaccess Fading Channels: Part II: Delay Limited Capacities
- Hanly
- 1998
(Show Context)
Citation Context ...igure Fig. 1: Cellular Uplink There is a recent line of work showing that the knowledge of channel can crucially change the resource allocation problem for multi-access fading channels [2], [3], [4], =-=[5]-=-, [6]. In fact, it has been shown that the strategy that maximizes the information theoretic sum capacity is the one that allows at most the user with the best channel state to transmit [2], [3], [4].... |

3 |
On the Use of Transmitter Power Variations to Increase Throughput in Multiple Access Radio Systems
- LaMaire, Krishna, et al.
- 1998
(Show Context)
Citation Context ...l that can be represented with the proposed general reception model. The performance of Slotted ALOHA for uplink in fading channels both with and without capture has been previously explored in [23], =-=[24]-=-, [25], [26] and the references there in. But these papers did not assume that the users have access to their channel state information. Design of retransmission probability was considered in [27], [2... |

3 |
Stability conditions for some mulitqueue distributed systems: Buffered random access systems
- Szpankowski
- 1994
(Show Context)
Citation Context ... _ xlx(0) -- k). (65) This lemma says that the stability of X(t) implies the stability of (t). The properties listed in the lemma are commonly notated as X(t) stochastically dominates (t) [38], [39], =-=[40]-=-. Given the random sequence Ni(t), the key is to identify a sequence that stochastically dominates Ni(t) and whose stability is easy to analyze. As in [22], we define a onedimensional Markov chain Qt)... |

2 |
The impact of frequency-fiat fading on the spectral efficiency of CDMA
- Shamai, Verdu
- 2001
(Show Context)
Citation Context ...hannel that uses CDMA with an optimal receiver. The effect of decentralized power control on the sum capacity of CDMA with linear receivers and single user decoders was studied by $hamai and Verdu in =-=[13]-=-. Most papers that consider the effect of channel state information on centralized or decentralized resource allocation are information theoretic in nature. Information theoretic studies assume that d... |

2 | R.Rao, "Capture and Retransmission Control in Mobile Radio - Zorzi - 1994 |

2 |
R.Berry. "Exploiting Multiuser Diversity in Wireless ALOHA Networks
- Qin
- 2001
(Show Context)
Citation Context ...he retransmission probabilities are designed in a distributed way since each user has access only to his CSI. The Slotted ALOHA scheme where mobiles have knowledge of the uplink SNR was considered in =-=[31]-=-, [32]. In [31], Qin and Berry used this knowledge to vary the power of transmission but the transmission probability was kept fixed. It was shown that with the choice considered, the throughput incre... |