throbber
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 43, N. 4, NOV. 1994
`
`1
`
`Slotted ALOHA for High-Capacity
`Voice Cellular Communications
`
`Michele Zorzi, Student Member, IEEE, and Silvano Pupolin, Senior Member, IEEE
`
`Abstract—Slotted ALOHA is proposed as a multiple access scheme for
`
`high capacity voice cellular communications in mobile radio environment.
`The performance of such a system, in the presence of fading and shadowing,
`is evaluated for both Mobile-to-Base and Base-to-Mobile links, in terms of
`number of supported conversations per cell, under some constraints on
`maximum tolerable delay. The numerical results show that a system of this
`sort can compete with other multiaccess schemes currently considered, such
`as TDMA, FDMA, and even CDMA. A heuristic stability analysis is also
`presented, showing that the proposed system does not suffer from instability
`problems.
`
`I. INTRODUCTION
`
`In recent times, the demand for mobile radio services has been
`increasing at an astonishing rate. Service providers are therefore
`required to accommodate more users in the same bandwidth, and
`the need for the systems to have a higher capacity and to utilize
`the spectrum resources more efficiently is clear. Moreover, these
`systems must provide service to a large population of users,
`distributed at random on the ground, that require the use of a
`communications channel rather unfrequently. Traditionally, the
`multiple access (MA) schemes used are TDMA and FDMA [1],
`in which there is no contention for the channel, resulting in a
`demand-based fixed-assignment strategy. The overall capacity
`is increased by organizing the system as a cellular structure,
`reusing the same frequencies in different cells, sufficiently apart
`from each other in order to keep the interference at a tolerable
`level [2].
`Digital voice communication, however, has some features
`that make this philosophy not efficient. For example, voice
`activity is limited to about the 35-40% of the time [3]: in fixed
`assignment strategies the remaining time would be wasted. The
`implementation of high capacity voice communications systems
`calls for more sophisticated multiple access protocols.
`Recently, Gilhousen et al. [4] have proposed code-division
`multiple access (CDMA) as a way to utilize more efficiently the
`available bandwidth, showing that it can perform significantly
`better than TDMA and FDMA. This is due basically to the fact
`that spread spectrum modulation has the capability to reduce
`the interference, and therefore it is no longer necessary any
`separation between cochannel cells, i.e., the same frequency
`range can be used in all cells, while maintaining a satisfactory
`transmission quality. This makes CDMA remarkably better than
`fixed assignment techniques.
`
`This work has been partially supported by the “Consiglio Nazionale delle Ricerche - Progetto
`Finalizzato Trasporti 2”, and by MURST, Italy.
`Part of this work has been presented at IEEE ICC’93, Geneva, Switzerland, 23-26 May
`1993.
`Michele Zorzi is with the Dipartimento di Elettronica e Informazione, Politecnico di Milano
`- ITALY.
`Silvano Pupolin is with the Dipartimento di Elettronica e Informatica, Universit`a di Padova
`- ITALY.
`
`In this paper, we develop an average performance analysis of
`another
`popular MA
`technique,
`namely
`slotted
`ALOHA, applied to a cellular voice environment; the propa-
`gation model takes into account Rayleigh fading, log-normal
`shadowing, inverse power loss law, random distribution of the
`mobiles in the two-dimensional space. The motivation of this
`study is that, although slotted ALOHA (along with an entire
`class of protocols originated by it) is very popular as a multiac-
`cess protocol, its application to this particular environment, i.e.,
`packet voice transmission in cellular systems, in the presence of
`fading and shadowing, has never been considered, to the best
`of our knowledge. The recent success of CDMA vs. TDMA
`and FDMA shows that random access protocols can do better
`than fixed assignment schemes; therefore, we believe that it is
`meaningful to explore more deeply the possibility of employ-
`ing random access in cellular, studying techniques other than
`CDMA. Since ALOHA was the first (and the simplest) random
`access protocol, it is a reasonable choice to develop an analysis
`and to give some results referring to it. In fact, if this simple
`approach proves to be promising, we believe that the remarkable
`expertise about the ALOHA protocol and its variations will en-
`able us to build on the basic idea here presented, and to develop
`more efficient schemes and more rigorous analyses. However,
`we are aware that some sophisticated techniques, developed for
`different environments, may be unsuitable in this context. For
`instance, CSMA/CD, which in the Ethernet standard achieves a
`throughput close to one, has been shown to suffer from some dif-
`ficulty in radio communications, in the presence of the so-called
`hidden-terminal problem [5].
`The basic contribution of this paper is to explore the possibility
`of using ALOHA random access in a cellular voice packet mobile
`radio network and to develop a simplified performance analysis
`for such a system. As mentioned, this is a new application,
`since in the previous literature the ALOHA systems are studied
`in different situations. In many papers, such as [6; 7], capture is
`not considered: this is clearly unacceptable in this environment
`where, because of the propagation characteristics (e.g., the near-
`far effect and the random fluctuations of the received power),
`the advantages of a capture mechanism can be fully exploited.
`In other papers, such as [8; 9; 10; 11], capture ALOHA is
`presented, with reference to a single receiver:
`this is also not
`applicable to the present context, where the presence of many
`cells is a basic feature of the system. Papers like [12], presenting
`PRMA for cellular voice, suffer from this fundamental limitation
`as well. The concept of cellular ALOHA requires to consider
`different spatial distributions for the intended user and for the
`interferers. In fact, not all colliding users are contending: those
`
`PETITIONERS EX. 1016 PAGE 1
`
`

`

`IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 43, N. 4, NOV. 1994
`
`2
`
`(carrier frequency). Therefore, even though the transmission
`quality is enhanced, the required bandwidth is significantly in-
`creased (more specifically, it must be multiplied by the number
`of cells in a cluster). For a typical cluster configuration, the
`number of cells is 7. The throughput per cell in TDMA/FDMA
`is at most equal to the voice activity, i.e., 35-40%, as already
`
`of the total capacity, so that the overall throughput is at most
`5-6%. This means that a random access scheme, with complete
`frequency reuse, performs better as soon as its throughput per
`cell is greater than 5-6%, and this is often the case.
`Packets are assumed to have fixed length, and to fit into a slot.
`Voice is digitalized and packetized by using some standard tech-
`nique of redundancy reduction. In such a case, voice packets
`are generated periodically during voice activity, and the dura-
`
`observed, but the available capacity in a single cell is 1/7' 14%
`tion of a period is called frame. LetZ be the number of slots
`bidimensional Poisson point process with intensity(cid:21) (users per
`All users transmit the same amount of power,PT (i.e., no power
`the slot the Signal-to-Interference plus Noise Ratio,SNR, is
`greater than a fixed threshold, denoted byb. The value ofb
`
`transmitting from within the cell are contending, whereas those
`transmitting from outside are just interfering. In this view, the
`cellular approach with complete frequency reuse seems to be
`unique. Also, very often slotted ALOHA is considered for data
`transmission, where delay, which is the fundamental constraint
`in the present context, is not a major concern. In this view, the
`analysis presented in [10], although one of the few cases in which
`intercell interference is taken into account, is not applicable here.
`We remark that the analysis presented in this paper is an
`average analysis, i.e., does not take into account the dynamic
`behaviour of the network; at the end of the paper, we deal
`briefly with the stability issues, although in a simplified and not
`completely rigorous manner. There are several reasons for this
`choice. First, the main goal, as already stated, is to explore the
`feasibility of a scheme of this sort, and therefore a rough analysis
`appears a convenient choice. Second, a complete and rigorous
`analysis, in a real-world context, where some basic assumptions
`are not verified, is too complex. Moreover, even though the
`throughput analysis can probably be done rigorously, the study
`of the delay turned out to be not feasible, without recurring to
`simulation; our opinion is that in this first approach a rough
`analytical study is better than the presentation of the results of a
`sophisticated (and somewhat obscure) simulation, which would
`not be of theoretical interest anyway. The stability issues and
`a more rigorous approach remain our primary concerns, and a
`topic we are currently doing research on. Finally, as has been
`shown in several papers [13; 14; 15], there exist stabilization
`schemes, which enable the system to achieve the performance
`predicted by the static (i.e., average) analysis. Even though
`designed for different situations, our sense is that they might be
`successfully employed, possibly with some modifications, in the
`present context as well.
`The paper is organized as follows: in Section 2, the system
`model is described, and in Section 3 the throughput and delay
`analyses are developed. Section 4 takes into account the effect
`of noise (neglected up to that point), whereas Section 5 presents
`some numerical results. Some considerations about stability
`(Section 6) and the Conclusions complete the paper.
`
`II. SYSTEM MODEL
`
`The protocol used by our system is slotted ALOHA [6], in
`the sense that, every time a user has a packet, this is transmitted
`in the next slot, regardless the behavior of the other users.
`It
`is also cellular, because there are many base stations and each
`terminal transmits packets to the closest one, which will relay
`them towards their destinations. Note that, in reality, slotted
`ALOHA as a multiple access protocol is used only on the mobile-
`to-base channel; in the base-to-mobile direction, in fact, the base
`station takes care of all the transmissions in its cell, and the
`resulting scheme is very much like TDMA.
`The frequency reuse is complete, i.e. the same frequency band
`is used in every cell (all cells are cochannel). This fact enables us
`to overcome a major problem exhibited by the fixed assignment
`schemes, i.e., spectral efficiency. In fact, in TDMA and FDMA,
`adequate spacing between cochannel cells is unavoidable, in or-
`der to keep the interference at tolerable levels. On the other
`hand, this choice requires that the cells be grouped into clusters,
`and that within a cluster all cells transmit on a different channel
`
`contained in a frame. A wideband channel is used, and each
`packet must be successfully transmitted within a given number
`of frames to meet the delay constraints, otherwise it is discarded.
`Users are assumed to be distributed on the ground according to a
`
`unit area per slot), up to an infinite distance from the receiver.
`This assumption, although not strictly verified, turns out to be
`reasonable in the presence of a large population of users [16].
`Also, with many users, the Poisson assumption is a good model
`of a finite population (binomial distribution) as well.
`The propagation model is the same as in [17]. Due to multi-
`ple reflections, each signal at the receiver is modeled as the su-
`perposition of two orthogonal Gaussian components (Rayleigh
`fading), so that its envelope turns out to be a Rayleigh random
`variable (r.v.); as a result, the signal power is exponentially dis-
`tributed. Another random effect in the propagation is shadow-
`ing, which is a slow random fluctuation of the average received
`power, due to weather conditions, terrain roughness and the pres-
`ence of obstacles: in a popular model [10], based on the available
`measurements, this effect is described by a log-normal r.v., i.e.,
`a r.v. whose representation in logarithmic units (e.g., in dB) is
`Gaussian. Finally, the fact that the average received power is a
`decreasing function of the transmitter-receiver distance must be
`taken into account, by means of a deterministic path loss law.
`In this paper, we will assume an inverse loss law, defined later.
`
`control is used).
`Acknowledgements are neglected, in the sense that a transmit-
`ter is assumed to know instantaneously whether its transmission
`has been successful or not. The base stations are able to cap-
`ture “strong” packets, and the capture effect, due to the random
`locations of users, is enhanced by the random effects in prop-
`agation (Rayleigh fading and log-normal shadowing) [18]. We
`assume that a packet is correctly received if and only if during
`
`depends on the modulation format and on the coding scheme
`used, if any. Being this kind of system typically interference
`limited, noise is neglected in most of the following analysis: in
`Section 4, formulas in the presence of noise are given, and in
`Section 5.2 some numerical results are presented, showing that
`this assumption is in fact reasonable and that a more complete
`
`PETITIONERS EX. 1016 PAGE 2
`
`

`

`e(cid:24)0Ar(cid:0)(cid:17)
`(1)
`PT;
`ulation, is given byP0=(cid:11)2
`where(cid:11)2
`Sincee(cid:24)0 represents the random fluctuation around the area
`mean, due to the log-normal shadowing, the r.v.(cid:24)0 is Gaussian
`with zero mean and variance(cid:27)2. In this context,(cid:27) is expressed
`spread; often, in the literature, the dB spread,(cid:27)dB, is used in-
`stead, when decimal logarithms are employed. Of course,(cid:27) =
`0.1(cid:27)dB log10. The values that(cid:27) can take are usually between
`1.3 and 3 (6 to 13 dB [17]). The factorAr(cid:0)(cid:17)
`deterministic dependence of the power on the distance,r0;(cid:17) can
`take a value between 2 and 4, whereas the constantA depends
`on the heigths of the antennas and on the carrier frequency.PT
`In the same way, the power from thei-th interferer can be
`Ii=(cid:11)2ie(cid:24)iAr(cid:0)(cid:17)iPT;
`(2)
`the constantA is assumed to be the same for all users.
`k, this power is
`PI=kXi=1
`Ii:
`(3)
`TheSNR at the receiver is given by
`P0PI+W;
`SNR=
`(4)
`whereW is the thermal noise power. The packet success prob-
`Ps=P[SNR>b]=P(cid:20)P0PI+W>b(cid:21);
`(5)
`whereb is the thresholdSNR.
`LetG=(cid:21)(cid:25)R2 the average number of attempted transmis-
`sions to a base station during a slot:R is the radius of the cells
`value ofG and for a given mobile-base distance,r0, is computed
`Ps((cid:16))=Z (cid:0) d(cid:24)e(cid:0)(cid:24)2
`2(cid:27)2p
`2(cid:25)(cid:27)e(cid:0)J((cid:24);(cid:16));
`(6)
`J((cid:24);(cid:16))=U(cid:16)e(cid:0)2(cid:24)=(cid:17)
`(7)
`(cid:16)=(cid:21)(cid:25)r2
`=G(cid:26)2
`(8)
`U= 2(cid:25)(cid:17) cosec
`2(cid:25)(cid:17)b2=(cid:17)e2((cid:27)=(cid:17))2;
`(9)
`and(cid:26)=r0=R is the normalized mobile-base distance. Note that
`Ps does not depend on the location of the intended user,(cid:26), and
`
`ability is defined as
`
`A. Mobile-to-base link (MB)
`
`It is shown
`(modeled as circular for analytical convenience).
`in Appendix A that the packet success probability, for a given
`
`as:
`
`where
`
`0
`
`IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 43, N. 4, NOV. 1994
`
`3
`
`0
`
`0
`
`0 is an exponentially distributed r.v. with unit mean.
`
`in logarithmic natural units, and will referred to as the natural
`
`accounts for the
`
`0
`
`is the transmitted power.
`
`expressed as
`
`where the symbols have the same meaning as in (1); in particular,
`
`The total interference power at the receiver is the (incoherent)
`sum of the contributions of all the interferers; given their number,
`
`analysis leads to substantially the same results.
`
`III. PERFORMANCE ANALYSIS
`
`When studying MA systems, two are the relevant performance
`indices: throughput and delay. These parameters typically form
`a trade-off to be solved in the system design. In fact, when the
`network is loaded with a traffic close to the maximum sustain-
`able, the probability of a successful transmission is small (many
`collisions), and therefore a large number of retransmissions are
`needed. On the other hand, when the network is lightly loaded
`most of the transmissions are successful, but many slots go by
`without being used, and the throughput is decreased. In the fol-
`lowing analysis, which is an average analysis, we will assume
`to be in stationary conditions. In studying the performance, we
`will treat separately the two links: mobile-to-base and base-to-
`mobile.
`The (normalized) throughput per cell is defined as the average
`number of successfully received transmissions per slot. As will
`be defined more precisely in the following, it can be expressed
`as the offered load per cell (average number of attempted trans-
`mission per slot in a cell) multiplied by the average probability
`of success of a transmission (which is a decreasing function of
`the offered load).
`In the two directions, these quantities are
`computed differently, even though the concept of throughput is
`substantially the same.
`The delay is strongly related to the probability of packet suc-
`
`packet must be transmitted until it is successfully received can
`
`In our analysis of voice
`and depends on the user’s position.
`communications, we are interested in throughput as a perfor-
`mance measure to be maximized, whereas delay is a constraint
`to be met, rather than a performance measure itself.
`Indeed,
`there are strict limitations on the overall delay experienced by a
`voice packet (50-100 ms). In our analysis, we assume that, upon
`the arrival of the next packet at the transmitter, the old packet
`is discarded unless it has already been successfully transmit-
`ted. This strategy obviously forces the delay to be bounded (at
`
`packet gets lost. Subjective tests, reported in [19], indicate that
`
`good quality, even though there exist techniques to somewhat
`
`study, however, we will take 0.01 as the maximum acceptable
`
`The first quantity to be computed is the probability of a packet
`
`cess,Ps: given the offered traffic, the number of times that a
`be modeled as a geometric random variable of parameter 1(cid:0)Ps,
`most one frame), but introduces a positive probability,PL, that a
`PL should be kept below values of the order of 0.01 to provide
`“interpolate” packets, which admitPL as large as 5-10%. In our
`value ofPL.
`success,Ps; in general, it depends on the statistics of the in-
`terference, on theSNR at the receiver, and on the relationship
`between theSNR and the correct packet reception (in this con-
`text,SNR is the short-term Signal-to-Interference plus Noise
`alent to the event that theSNR at the receiver is greater than
`a threshold value, called outageSNR [17]. Therefore, in the
`
`Ratio). When powerful error control codes are used, however,
`with good approximation the correct packet reception is equiv-
`
`following, we will take the complement to one of the probability
`of outage [17] as the probability of correct reception.
`With the above model, the useful signal power, after demod-
`
`PETITIONERS EX. 1016 PAGE 3
`
`

`

`IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 43, N. 4, NOV. 1994
`
`4
`
`on the traffic,G, individually, but only on the product(cid:16)=G(cid:26)2.
`The average throughput,Smb, is obtained by averaging (6) over
`(cid:26), and multiplying it byG, to obtain
`Smb(G)=GZ
`2(cid:26)d(cid:26)Ps(G(cid:26)2)
`=Z (cid:0) d(cid:24)e(cid:0)(cid:24)2
`2(cid:25)(cid:27)Z
`2(cid:27)2p
`2(cid:26)d(cid:26)Ge(cid:0)J((cid:24);G(cid:26)2)
`=Z (cid:0) d(cid:24)e(cid:0)(cid:24)2
`2(cid:25)(cid:27) 1(cid:0)e(cid:0)GUe(cid:0)2(cid:24)=(cid:17)
`2(cid:27)2p
`:
`Ue(cid:0)2(cid:24)=(cid:17)
`Note that the limit ofSbm asG! is finite, and is equal to
`Smb( )=e2((cid:27)=(cid:17))2U
`=
`(11)
`2(cid:25)(cid:17) cosec 2(cid:25)(cid:17)b2=(cid:17):
`Note also that, taking the derivative ofSbm with respect toG,
`we obtainSmb(G)=Z (cid:0) d(cid:24)e(cid:0)(cid:24)2
`2(cid:27)2p
`2(cid:25)(cid:27)e(cid:0)GUe(cid:0)2(cid:24)=(cid:17);
`(12)
`which, of course, is always positive. Therefore,Sbm(G) is an
`increasing function of its argument,G.
`For every value of the offered load,G, the corresponding
`average throughput,Smb(G), can be computed from (10). Given
`the offered traffic,G, and the location of the intended user,(cid:26),
`the number of retransmissions (assumed independent),Nrt, is a
`geometrically distributed r.v. with parameter 1(cid:0)Ps(G(cid:26)2), and
`D= 1+NrtXi=1
`ki;
`(13)
`where theki’s are the random backoffs, which are necessary
`slot. We note that, due to the finite backoffski’s, the Poisson
`ki’s are independent and identically distributed uniform random
`variables between 1 andK, the mean,mD((cid:16)), and the variance,
`(cid:27)2D((cid:16)) of the delay (in slots) suffered by a user for a given value
`of(cid:16), are computed in Appendix B, to obtain (we neglect the half
`mD((cid:16))=E[D]= 1+K+ 1
`1(cid:0)Ps((cid:16))
`(14)
`Ps((cid:16))
`(cid:27)2D((cid:16))=Var[D]
`1(cid:0)Ps((cid:16))
`=K2(cid:0) 1
`Ps((cid:16))+
`+(K+ 1)2
`1(cid:0)Ps((cid:16))
`:
`P 2s((cid:16))
`
`1
`
`0
`
`1
`
`0
`
`1
`
`(10)
`
`the packet delay, in slots, can be expressed as:
`
`in order to avoid the certainty of another collision in the next
`
`It has been
`assumption about arrivals is not strictly verified.
`observed, however, that when the arrival process is obtained
`by merging many streams, it can be very well approximated
`by means of a Poissonian stream [16]; therefore, we go on
`with the analysis under this assumption. If we assume that the
`
`slot due to the fact that packets may be generated at any point in
`time):
`
`2
`
`4
`
`12
`
`(15)
`
`D is a multinomial r.v. which, for the case of interest, i.e., when
`(cid:18)Z(cid:0)mD((cid:16))
`2(cid:27)D((cid:16))(cid:19);
`p
`PL((cid:16))=P[D>Z]' 1
`(16)
`whereZ is the number of slots in a frame.PL((cid:16)) is an increasing
`function of(cid:16), and therefore, for a givenG, is maximum at the
`boundary of the cell, i.e., for(cid:26)= 1 and(cid:16)=G. In order to guar-
`antee thatPL((cid:16))(cid:20) 0:01 everywhere, it is sufficient to require
`G(cid:20)G0, whereG0 is such thatPL(G0)= 0:01. Therefore, the
`given byS0=Smb(G0).
`p is the probability that a base station is transmitting a packet
`Ps(p;})=Z (cid:0) d(cid:24)e(cid:0)(cid:24)2
`2(cid:25)(cid:27) 18Yi=1
`1(cid:0)pJi((cid:24);})(cid:1);
`(cid:0)
`2(cid:27)2p
`(17)
`Ji((cid:24);})=Z (cid:0) dxe(cid:0)x2
`2(cid:27)2p
`1+e(cid:24)(cid:0)xbd(cid:17)i(}):
`(18)
`2(cid:25)(cid:27)
`Ps(p;}) depends explicitly onp, which has the meaning of
`offered traffic per cell (the same asG in the MB link), and on
`the location of the receiving mobile,}.di(}) is the distance of
`the point} from thei-th interfering base station, divided by the
`distance from the intended base station. Averaging (17) over},
`and multiplying it byp, we obtain the average throughput per
`Sbm(p)=pPs(p);
`(19)
`wherePs(p) is the average ofPs(p;}) over the (uniform) dis-
`packet is assigned at random to a slot. For a givenSbm, the
`probability that exactlyk slots in the frame are unsuccessful is:
`P[k unsuccessful]=(cid:18)Zk(cid:19)SZ(cid:0)k
`bm(1(cid:0)Sbm)k:
`(20)
`
`B. Base-to-mobile link (BM)
`The BM channel is different from MB in that the transmitters
`(the base stations) lie in fixed positions, and the receiver is
`located at random. Moreover, in the BM channel, all packets of
`a cell are managed by the same base station. Therefore, there
`are no collisions from within the cell, but only interference from
`outside. We consider in our analysis only the useful base station
`and the nearest 18 interfering base stations; this corresponds
`to assuming that all sites beyond the second ring around the
`intended cell contribute negligible interference. In this case, if
`
`several retransmissions are required, can be approximated by a
`Gaussian r.v., so that we can write, for the packet loss probability,
`
`erfc
`
`2
`
`maximum achievable throughput under the delay constraints is
`
`in a given slot (assumed the same for all stations), the success
`probability can be shown to be (see Appendix C for the details):
`
`where
`
`1
`
`cell on the BM link, given by
`
`tribution of the intended receiver over the cell.
`In order to evaluate the packet loss probability due to the
`delay constraint, let us consider the following. We assume that
`the transmissions in different slots are independent, and that a
`
`PETITIONERS EX. 1016 PAGE 4
`
`

`

`IfN packets are to be transmitted in a frame, the number of
`lost packets, given thatk slots out ofZ are unsuccessful, is
`N(cid:0)(Z(cid:0)k), ifk>Z(cid:0)N , and is 0 ifk(cid:20)Z(cid:0)N . The
`probability that one ofN packets is lost whenn of them are lost
`isn=N . Therefore, we obtain:
`P[a given packet is lostjN]=
`(cid:18)Zk(cid:19)SZ(cid:0)k
`=ZXk=Z(cid:0)NN(cid:0)(Z(cid:0)k)
`bm(1(cid:0)Sbm)k
`N
`N(cid:0)jN(cid:18)Zj(cid:19)Sjbm(1(cid:0)Sbm)Z(cid:0)j:
`=NXj=0
`In the presence ofNconv conversations, each with voice activity
`(cid:12), the probability of havingN active users in a frame is given
`by:P[N activejNconv]=(cid:18)NconvN(cid:19)(cid:12)N(1(cid:0)(cid:12))Nconv(cid:0)N
`'e(cid:0)(cid:12)Nconv((cid:12)Nconv)N
`;
`N !
`and the average packet loss probability, givenNconv conversa-
`PL(Nconv)=NconvXN=0
`P[a given packet is lostjN]
`(cid:1)P[N activejNconv]:
`equations,Sbm, and thereforePL(Nconv), are functions ofp.
`p= 1.
`LetBs be the bandwidth required for a single TDMA channel
`(i.e., a single user),Bt=MBs be the total bandwidth in the
`system, andBc=Bt=C be the bandwidth per cell, ifC is
`the number of cells in a cluster (typically,C= 7). In CDMA
`Bc=Bt, since the frequency band is reused in all cells (i.e.,C =
`(of bandwidthBs) at his disposal. Note thatM has the meaning
`(cid:13)=NconvM;
`(24)
`whereNconv is the number of conversations that can be simul-
`On the MB link, ifNact=(cid:12)Nconv is the average number of
`Nact=(cid:12)Nconv=SmbZ:
`(25)
`
`C. Channel efficiency
`The major goal in systems of this sort is to maximize the
`number of admitted users, i.e., the system capacity.
`In this
`framework, we want to define an index to measure the spec-
`trum efficiency, in such a way that it is possible to compare the
`efficiency of systems with different bandwidths.
`
`(21)
`
`(22)
`
`(23)
`
`tions, is therefore expressed by:
`
`We remark that, although not explicitly indicated in the above
`
`However, as will be shown later, the best choice is very often
`
`and ALOHA, a wideband channel is provided to all users, and
`
`1), whereas in TDMA and FDMA each user has a single channel
`
`of “number of equivalent TDMA channels” in the system. We
`define channel efficiency by the quantity
`
`taneously supported by a base station.
`
`active conversations per cell, in steady-state we have that
`
`IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 43, N. 4, NOV. 1994
`
`5
`
`(cid:13)=SbmZ(cid:12)M=Sbm(cid:23)(cid:12);
`(26)
`where(cid:23)=Z=M is the fraction of information bits in a packet.
`On the BM channel, for a given value ofSbm,Nconv is com-
`puted from (23), and(cid:13) is found from (24). On the other hand,
`reuse strategy, can support at mostBc=Bs=M=C conversa-
`TDMA is 1=C.
`presence of noise vanishes asPs decreases. Referring to the
`((cid:26);G)=Z (cid:0) d(cid:24)e(cid:0)(cid:24)2
`2(cid:27)2p
`2(cid:25)(cid:27)e(cid:0)(cid:22)0(cid:26)(cid:17)e(cid:0)(cid:24)(cid:0)J((cid:24);G(cid:26)2);
`P(n)s
`(27)
`(cid:22)0=bWR(cid:17)APT;
`(28)
`over(cid:26) can be solved in closed form only for(cid:17)= 4, to obtain
`S(n)mb(G)=Z (cid:0) d(cid:24)e(cid:0)(cid:24)2
`2(cid:25)(cid:27)r(cid:25)(cid:22)0
`2(cid:27)2p
`Ge(cid:18)2=2(cid:0)(cid:24)=2
`
`(cid:1)h
`(cid:16)p2(cid:22)0e(cid:0)(cid:24)=2(cid:0)(cid:18)(cid:17)(cid:0) F((cid:18))i; (29)
`(cid:18)=UGp
`(30)
`2(cid:22)0
`(x)=Zx(cid:0) dte(cid:0)t2
`2p
`(31)
`2(cid:25):
`(p;})=Z (cid:0) d(cid:24)e(cid:0)(cid:24)2
`2(cid:25)(cid:27)e(cid:0)(cid:22)0(cid:26)(cid:17)e(cid:0)(cid:24) 18Yi=1
`(cid:0)
`1(cid:0)pJi((cid:24);})(cid:1);(32)
`2(cid:27)2p
`P(n)s
`bandwidth isBt = 1.25 MHz, the vocoder bit rate is 8 kbps,
`corresponding to a bandwidthBc' 10 kHz, so that the number
`of equivalent TDMA channels isM = 128; the spread of the
`
`Therefore, the channel utilization is computed as
`
`in TDMA and FDMA, a base station, because of the frequency
`
`tions at a time, so that the attainable channel efficiency (24) in
`
`IV. PRESENCE OF NOISE
`
`In the previous analysis we neglected noise, which on the
`other hand is always present in a communication system. In a
`system like slotted ALOHA, heavily loaded and with moderate
`noise levels, the probability of having an interfering user much
`stronger than noise is very high. Therefore, the effect of the
`
`analysis carried out in [17], in the presence of noise the success
`probability (6) is replaced by
`
`where
`
`and (10) is modified accordingly. In particular, the integration
`
`where
`
`Similarly, (17) is replaced by
`
`and (19) is modified accordingly.
`
`V. NUMERICAL RESULTS
`
`A. Absence of noise
`We apply the above theory to the same system shown in [4],
`whose parameters are here reported for convenience. The total
`
`PETITIONERS EX. 1016 PAGE 5
`
`F
`F
`

`

`IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 43, N. 4, NOV. 1994
`
`shadowing is(cid:27) = 8 dB, the propagation loss factor(cid:17)= 4, and
`the thresholdb = 6 dB. The voice activity is(cid:12) = 37.5%, the
`maximum backoffK = 10, the packet length is 16 bytes of
`the packet overhead, the effective number of slots in a frame,Z,
`is less thanM : this reduction is to be taken into account for a fair
`comparison. If we denote by(cid:23) the fraction of information bits in
`a packet ((cid:23) = 0.73 in the present case), we haveZ=(cid:23)M= 93.
`In Fig. 1, the packet loss probability (16) vs.(cid:16) is plotted. The
`maximum sustainable traffic under the constraintPL(cid:20) 0:01
`is the solution ofPL(G)= 0:01, as discussed in Section 3.1,
`and, in the present case, is equal toG0' 0:49. Fig. 2 shows
`the relationship betweenG andSmb: the maximum attainable
`throughput is computed asS0=Smb(G0), and turns out to be
`loss probability,PL. We remark that the values ofG0 andS0 are
`Fig. 3 shows the average delay,mD, (obtained averaging (14)
`over(cid:26)), vs. the throughput,Smb: the curve does not take into
`account the dropping mechanism (in fact,mD increases beyond
`Z= 93, which should be an obvious upper bound). The actual
`Fig. 3: for low delay, they almost coincide, whereas whenmD
`diverges the actual average delay tends to the valueZ= 93.
`Note that, when the throughput isSmb' 0:2, the average delay
`Z= 93 slots.
`With the above parameters, we obtainNconv' 49, and(cid:13)'
`0:38.
`If the bandwidth is increased, orK is decreased, the
`comparison, the channel utilization,(cid:13), reported in the rightmost
`utilization in TDMA, as discussed in Section 3.3, is 1=7' 0:143,
`In Fig. 4, the probability of having a successful slot,Sbm, is
`plotted vs.p, for the same system parameters. We note that the
`best performance (Sbm = 0.328) is obtained forp = 1, i.e., when
`a packet is lost is plotted vs.Nconv in Fig. 5 for some values
`ofSbm, withZ= 93. The curves in Fig. 5 are parametrized by
`Sbm, instead ofp, because in this case they are independent of
`the propagation parameters,(cid:17) and(cid:27), which, on the other hand,
`affect the relationship betweenp andSbm.
`Table II reportsNconv for different values ofM . The reported
`channel utilization,(cid:13), as in Table I, is the parameter to be con-
`results forM = 128, and compares them to those reported in
`
`information (16 ms of speech) plus 6 bytes of overhead. Due to
`
`A. Mobile-to-Base link
`
`about 0.2. From Figs. 1 and 2, the values of the maximum
`sustainable traffic and the corresponding maximum attainable
`throughput can be evaluated for any value of the required packet
`
`computed with reference to a worst-case situation, i.e., when the
`intended user is located at the cell boundary. This, of course, is
`not always the case, and, on the average, the experienced delay
`is substantially less than the maximum tolerable (i.e., a frame).
`
`curve of the average delay is of course upper bounded by that in
`
`is about 12 slots, much smaller than the maximum tolerable, i.e.,
`
`throughput is increased, as shown in Table I. Recall that, for a
`
`column, is the relevant parameter. Note also that the channel
`
`significantly smaller than the values of Table I.
`
`B. Base-to-Mobile link
`
`the base stations transmit in every slot. The probability (23) that
`
`sidered for a fair comparison. Table III summarizes the above
`
`6
`
`(cid:14)
`on the propagation loss factor,(cid:17). As(cid:17) decreases, the average
`formance of the system is dramatically reduced as(cid:17) decreases.
`PRN [20]:A=(cid:0)108 dB,PT = 0 dBW,W=(cid:0)144 dBW. By
`computingS(n)mb andS(n)bm , we verify our assumptions about the
`presence of noise. Let us define the averageSNR (due only to
`thermal noise) at the boundary of the cell,SNR0, as:
`SNR0=APTWR4
`=b(cid:22)0
`(33)
`:
`With the above

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket