Movatterモバイル変換


[0]ホーム

URL:


Skip to main content

Advertisement

Slotted Gaussian Multiple Access Channel: Stable Throughput Region and Role of Side Information Vaneet

EURASIP Journal on Wireless Communications and Networkingvolume 2008, Article number: 2 (2008)Cite this article

Abstract

We study the relation between the stable throughput regions and the capacity regions for a Gaussian multiple-access channel. Our main focus is to study how the extent of side information about source arrival statistics and/or instantaneous queue states at each transmitter influence the achievable stable throughput region. Two notions of MAC capacity are studied. The first notion is the conventional Shannon capacity which relies on large coding block lengths for finiteSNR, while the second uses finite code blocks with highSNR. We find that the stable throughput region coincides with the Shannon capacity region for many scenarios of side information, where side information is defined as a mix of statistical description and instantaneous queue states. However, a lack of sufficient side information about arrival statistics can lead to a significant reduction in the stable throughput region. Finally, our results lend strong support to centralized architectures implementing some form of congestion/rate control to achieve Shannon capacity, primarily to counter lack of detailed information about source statistics at the mobile nodes.

1. Introduction

Often in communication networks, the traffic distribution is unknown. However, in bounding the performance of a network, it is commonly assumed [1-5] that the transmitters and the receivers have complete knowledge of the source arrival distribution (or the probability distribution of the number of packets arriving per unit time), which is then used in the design of optimal transmission methods. In this paper, we study the impact of such side information regarding the traffic on the stability performance of Gaussian multiple- access channels.

We will focus our attention on a slotted Gaussian multiple-access channel withK users sending bursty data to a single receiver. In capacity analysis, it is implicitly assumed that the users are aware of all the transmission rates (of every user) and have optimal codebooks, which allows the whole system to operate close to the boundary of the capacity region; this can be understood as all nodes having complete statistical knowledge regarding all sources. In this work, we will take the first step towards understanding exactly how much information is needed at each node about theother sources. We will study this through a series of five cases with different amount of statistical information at each node. Furthermore, we will adopt a more general source model, unlike prior work [3,4], in which data arrives randomly at a user with general distribution in each symbol duration. This arrival process decouples the definition of source arrivals from that of communication system design, which will occur in blocks of lengthn codewords.

In the first of the five cases, the transmitters and the receiver will be assumed to know the arrival distribution of all the sources, which represents the case of complete statistical information. We show that in this case the stable throughput region coincides with the Shannon capacity region. A similar result was shown in [3] for two-user multiple-access system, by requiring not only complete distributional knowledge but also one bit of instantaneous queue state information. Our encoding strategy holds for a generalK-user systemand requires no instantaneous state information to achieve every point in the Shannon capacity region. Keeping our objective in mind, we reduce the amount of side information in the second case from full statistical knowledge to only the knowledge of the mean arrival rates of every node. Since the probability of a certain input bit pattern depends on the length of the bit pattern, the coding techniques which assume equally likely bit arrival for every input bit pattern are not optimal. As a result, it appears that the knowledge of mean arrival rates alone is insufficient to guarantee achieving every point in the Shannon capacity region (optimal operation will potentially require a multiuser universal source coder and since we are transmitting over a noisy channel, we will also need multiuser source/channel separation. Thus, the chances that full Shannon capacity region is achievable with only information about mean arrival rates appear slim). However,we show that if each node sends quantized one- bit information about its own queue state to the receiver every time-slot, then the entire Shannon capacity region can be achieved with reduced statistical information. Again, in contrast to the main result in [3], we show that limited statistical information suffices if one bit of instantaneous system state information is available.

In contrast to the above cases, we consider a case where the sources are not aware of the mean arrival rates of other nodes. In this case, the stability region is significantly reduced compared to Shannon capacity region, even with one bit of quantized state information every time-slot. The significant loss can be attributed to the fact that each node has to essentially assume that other nodes potentially have highest possible load, thuspredividing the total available capacity intoK equal portions. This division is inefficient in the cases where some of the nodes have lower-than-maximum arrival rates. Thus the stable throughput region of actual systems may be significantly lower than the Shannon capacity region due to lack of knowledge of source arrival distribution, thereby underscoring the importance of side information.

We next show that this loss can be completely recovered if the receiver has either full statistical knowledge (like in first case above) or knows the mean arrivals of all nodes along with one-bit instantaneous queue state information, and the receiver can send feedback to each node once during system operation. This one-time feedback is akin to congestion/rate control [6,7], where the receiver informs each node of their allowable rate at the beginning of the communication. In this case, the stable throughput region coincides with the Shannon capacity region. This scenario is akin to the congestion control via feedback from the base station. Hence, compared to the first scenario, we traded the knowledge of complete arrival distribution of other sources at a source with a feedback from the receiver.

For each case of side information, we consider two notions of Shannon capacity. The first is the conventional notion of capacity, which is defined for a fixed value ofSNR with growing encoding block length [5]. In this notion, the problem of understanding delay in an information- theoretic setting remains intractable, sincen → ∞ makes all talk of per-bit delay irrelevant. A bit, even if it is in the queue for finite number of time-slots, will have infinitely large delay since time-slot is infinite. Hence, we explore an alternate asymptote, partially inspired by age-old diversity order analysis, where we study finite block lengths in a high-SNR regime. In this regime, we no longer work with the exact capacity region, but with the rates of growth. However, asSNR increases, the capacity increases in an unbounded fashion. So for, any meaningful discussion about stability regions, the sources have to produce data at rates which scale with theSNR. This leads us to reconsider the definition of stability. Note that this is not an uncommon assumption, and is implicitly assumed in asymptotic inSNR frameworks like diversity-multiplexing studies [8,9]. We formalize these new notions of capacity and stable throughput region and show that conceptually similar results hold for the finite block length case. While conceptually the results are similar in two notions of the capacity, they differ in the details of their proofs.

We quickly note that the problem of not knowing statistics of other nodes can be understood as a multiuser universal source-coding problem, where the distributed sources are not aware of the full joint distribution. In this case, the transmitters will encode assuming incomplete system knowledge and the receiver will decode assuming similarly reduced information about the system. Such a general formulation will form the obvious next step following our current work, and will be a topic of discussion elsewhere.

The relation between queuing stability and Shannon capacity remains a problem of interest, since most sources are bursty and require a delay-bounded delivery. For random access systems, the problem has been studied extensively (e.g., see [1,4,10-13]). A key result in [2,4] is that the queuing stability region coincides with the Shannon capacity region in many cases on the collision channel, illustrating that the bursty nature of the arriving packets does not limit the data rate at which the probability of error can be made arbitrarily small. The entire body of work on collision channels assumes that the arrival distributions are known to all the users, and also that the receiver knows if a particular user is sending the data in order to decide collisions. Also, the transmitting users have some side information, by which they know if a collision has occurred and, hence, decide to retransmit. Similar information is needed for random-access systems with multipacket reception capability in order to decide retransmissions.

Following the work on the collision channel, the effect of scheduling and power control on the stability in multiuser channels under Poisson arrivals was studied in [7,14-16]. The stability of the queues in wired switches has been studied for general arrivals [17,18] for certain scheduling algorithms. While numerous works characterize stability conditions, stability policies and stable-system behavior, we concentrate on the influence of side information on the stable throughput region.

The relation between queuing stability and Shannon capacity for multiple-access systems over AWGN channels has been studied earlier in [3,7,14,15,19].Most of this work [7,14,15,19] assumes complete knowledge of the queue states. In [3], with the assumptions of time slots being large, and a maximum of one packet of fixed length arriving at each user in a time slot for a system with two users, it was shown that the stable throughput region was independent of the burstiness and the shared queue information. The model assumed a fixed form of side information rather than the tradeoff of side information with stable throughput regions that is addressed in this paper.

We begin in Section 2 by describing the channel model and the capacity regions. In Section 3, we assume finiteSNR with large time-slots. Various achievable stable throughput regions are described depending on the amount of side information. In Section 4, we consider the dual problem of finite time-slots with largeSNR, where the influence of the amount of side information on the achievable stable throughput region is studied.

2. Problem Formulation

2.1. Channel and source model

We consider a multiple-access system, as the illustrated in Figure 1, whereK users transmit to a single receiver. We will assume a time-slotted system where the transmissions only occur at the slot boundaries. Each slot is indexed byk and within each slot, then symbols will be indexed byj.

Figure 1
figure 1

Gaussian multiple-access channel with random arrivals.

The received signal at time unitj is the sum of the transmissions of the users and Gaussian noise at time unitj,

Yj=i=1KXj+Zj,
(1)

whereZ[j] is zero mean i.i.d. Gaussian noise with varianceN, and is independent of channel inputsXi[j] ϵ,i = 1,2,…,K ((Xi[1],…,Xi[n]) represents the n-length codeword sent in a time-slot). The channel output isY[j] ϵ. The transmit power of useri averaged over all the codewords isPi if it is transmitting and 0 otherwise. Thus, no power control is performed. We also assume that receiver has the perfect timing information to ensure the synchronization at the receiver. Finally defineSNR = (SNRU1,SNR2,…,SNRK), whereSNRj = Pi/N, is the signal-to-noise ratio for useri (SNRi is the ratio of the average signal power ofith user to the noise variance, and does not include interference from other users).

While the transmissions occur only at the slot boundaries, the data can arrive anytime during the slot. Data arrives for useri in form of bits with an average rate ofλi bits per unit time (one time unit represents one symbol duration). So the arrival process is defined independent of the slot boundaries or the slot length and directly on the smallest time unit, the symbol time-duration. We define Δi(k) to be the number of bits that arrive for transmission at useri in time-slotk,Ei(k)] = i. Thus, unlike the previous works [1,2,4], we do not assume that the arrivals occur only at the start or the end of the time-slot, which makes the definition of arrival process independent of the communication-system design, notably the slot lengthn.

We denote the number of bits departing from the queue of useri in time slotk as Ωi(k). Further, we denote the number of bits in theith queue at the beginning of time-slotk as Qi(k). The queue is updated as

Qik+1=max0,Qik+ΔikΩik=Qik+ΔikΩik+fork1,
(2)

withQi(1) = 0. We assume that the number of elements in the queue ofith user (or the queue state) is known only toith user. The stable throughput region is the region where the queues do not grow unbounded in the steady state. The mathematical definitions for these stability regions for large time slots and largeSNRs are defined in Section 2.3.

2.2. Capacity regions

In this section, we define the two notions of capacity. First is the conventional definition where theSNR is held fixed and the blocklength is allowed to grow unbounded. And in the second case, blocklength is held fixed andSNR is increased unbounded. To contrast the two definitions, we state the preliminaries for conventional definition of capacity.

A2nR12nR22nRKn code for multiple-access channel consists ofK encoding functionsfi : Wi → Wni where Wdi is the input to the encoder at useri and takes2nRK values, and a decoding function g :g : Rn → W1 × W2 ×  × Wk, whereXni Rn

Definition 1. A rate tuple (R1,R2,…,RK) is achievable if there exists a sequence of2nR1,2nR2,2nRKn codeswith error probabilityPe → 0 as n → ∞. The capacity region is the closure of all achievable rate tuples (R1,R2,…,RK).

Lemma 1 (see [5]).The capacity region of Gaussian multiple- access channel is given by closure of convex hull of all (R1,R2,…,Rk) satisfying

iSRi<CiSPiN,
(3)

where S is any subset of {1,2, …K},and C(x) = (1/2)log (1 + x)

The classical definition of capacity requires the block lengthn to approach infinity. In contrast, we will define the SNR-capacity region for a fixed blocklengthn but with increasingSNR. Our motivation stems from our aim to analytically understand the role of delay in communication. Towards that end, the high-SNR regime allows keeping delay in check and is useful for high-data-rate systems. Part of our motivation for choosing high-SNR regime comes from diversity-multiplexing tradeoff [8,9], which has proven useful in fading channels.

To maintain differentiation in the quality of user channels, we will model the growth ofSNR on different transmitter-receiver links with different exponents. LetSNRiuαi for some fixedαi greater than zero (we adopt the notation of [8]to denote,. and. to represent exponential equality and inequalities) for some baseSNR denoted byu (In other words,αi lim u → ∞ (log(SNRi)/log(u))) (u can be chosen to be any baseSNR, e.g., max(SNRi) or min(SNRi) or an average). For our asymptotic analysis, we take the rates to vary asRiri, log(SNRi). Thus,R,ri, log(SNRi)riαilog(u)

Definition 2. A rate tuple (r1,r2,…,rK) is SNR-achievable if there exists a sequence of2nr1logSNR1,2nr2logSNR2,2nrKlogSNRKn codes with error probabilityPe 0 asu — to (equivalently,SNRiuαi). TheSNR- capacity region is the closure of allSNR-achievable rate tuples (r1,r2,…,rK).

The next result proves theSNR-capacity region; and Figure 2 shows an example capacity-region whenα1 > α2.

Figure 2
figure 2

SNR capacity region for the case where α1 > α2.

Lemma 2.The SNR-capacity region of Gaussian multiple- access channel is given by closure of all (r1,r2,…,rK)satisfying

iSriαi<12maxiSαi,
(4)

where S is any subset of {1,2,…K},where αiis defined as above.

Proof. The achievability proof can be given on similar lines as in [9]. Consider the ensemble of i.i.d. random codes. Specifically, each user generates a codebook(i) containing2nRiSNRirin codewords denoted asX1i,,XSNRirini. Each codeword isn-length vector with i.i.d. Gaussian entries with zero mean and unit variance. Once picked, the codebooks are revealed to the receiver. In each block period, transmitted signal of useri is chosen from(i).

Consider detection error probability of joint maximum- likelihood receiver. We first define for each nonempty setS {1, 2, … K} an error event

εSm^i=miiScandm^iiS,
(5)

wherem^i is the decoded message of useri whilemi is the actual message. ThusεS is the event that receiver makes wrong decisions of all users in setS and makes correct for the rest. Clearly, we have the probability of errorPe(u) as

Peu=ProbSεSSProbεS.
(6)

Without loss of generality, we assumeS = {1, 2,…, |S|}. Let X0 = (X(1)0, …, X(K)0) be the transmitted signal where X(i)0(i) is the codeword transmitted by user i. Denote by X1 another codeword that differs from X0 on the symbols transmitted by all users in S but coincide on those by other users, that is, X1 = (X(1)1, … X(|S|)1, X(|S| + 1)0, … X(K)0).

The error eventεS occurs if the receiver makes a wrong decision in favor of any such X1. This happens when

Z2141iKSNRiX0iX1i2=141SSNRiX0iX1i2.
(7)

Note that (7) is similar to (27) in [9] withH=SNR1SNR2SNRS and number of transmit and receive antennas as unity. Hence by comments following (27) in [9], we consider this as a single-user error probability with overall rate ∑iSRi, |S| transmit antennas and 1 receive antenna.

Following [8], we use pairwise error probability (PEP) to bound average probability of error. Recall thatX0 andX1 differ in setS {1, 2, …, K}. Construct a matrix ΔX of size |S| × n containingX0X1 at all |S| users.This reflects the difference in transmit matrices for|S| transmit antennas.

ProbX0X1=ProbZ214iSSNRiX0iX1i2Prob114HΔX2.
(8)

Since ΔX is isotropic, ||HΔX||2 has same distribution asev(HH)||Δx||2 whereev(HH) is defined as the eigen-value ofHH and equalsiSSNRiumaxiSαi, and Δx any row vector of ΔX. Hence,

ProbX0X1Prob114iSSNRΔx2=ProbΔx24iSSNRi.4iSSNRi.
(9)

As the number of possible choices ofX1 isiSSNRinri1, the overall error probability

ProbεS.iSSNRinri14iSSNRin/2unΣisriαiun/2maxiSαi=un(ΣiSriαi1/2maxiSαi.
(10)

Hence, the error probability goes to zero whenΣiSriαi − (1/2 maxiSαi < 0 for allS which is true by the statement of the theorem.

For the converse, letΣiSriαi > (1/2)maxiSαi for some S. Again, assume thatS = {1,2,…, |S|} without loss of generality. The probability of error can be bounded by Fano’s inequality as

PeuProbεS11+IX1n,X2,n,XSn;Yn|X|S|+1n,XKnlog2nR1,
(11)

whereR = ΣiϵSRi. SinceI(Xn1, Xn2, …, Xn|S|; Yn|Xn|S| + 1, … XnK) = (n/2)log(1 + ΣiSPi/N) we get

Peu11+IX1n,X2,n,XSn;Yn|X|S|+1n,XKnlog2nR111/2maxiSαiΣiSriαi>0.
(12)

This shows that the error probability cannot be brought arbitrarily close to zero in the limit of highSNR whenΣiSriαi > (1/2)maxiSαi for anyS, thus proving the converse.□

We will sometimes use the terminterior of the capacity region orinterior of SNR-capacity region to imply that the vector is not on the boundary, but inside the region.

2.3. Stable throughput region

In the case of finiteSNR, stable throughput region is the region formed by the closure of vectors of mean arrival rates at the different queues for which there exists a transmission scheme in which the queues are stable. In our discussion, stability of queues implies that the ratio of queue length to block length is finite with probability one for large block-lengths. The above definition of stability of queues corresponds to a “time-observed” version of the stability definition used in standard practice [12,20,21], according to which the queue length is finite with probability one. There are some other weaker notions of stability in literature like substability [12,17,20,21] which also hold when the queues satisfy stability. Formally, we will use the following definition of the stable throughput region

Definition 3 (Stable throughput (largen and finiteSNR)). The stable throughput region in the case whenn → ∞ is defined as the closure of all (λ1, λ2,…, λK), such that, there exists a transmission scheme, such that, the signal received at destination has probability of errorPe 0 asn → ∞. Furthermore, there exists an integerM such that all the queues are stable forn > M .In other words, there exists an integerM such that limj→∞ Pr[Qi(j) < nx] = F(x,n) and limx→∞F(x,n) = 1, fori = 1,2,…,K andn > M, when the arrival rates at useri isλi.

When theSNR is large, large amount of data can be serviced in a time-slot even if the time-slot is not large. Hence, the stability of the queue is defined by normalizing with the order of amount of information that can be serviced in each block-length which is of the order of log(u) as mentioned in Section 2.2. As we can serve such large rates, the incoming rates which are of lower order than log(u) can definitely be served; hence we assume that the incoming arrival rates are also of the order of log(u) (i.e.,λili log(SNRi) liαi log(u)). Hence, stable throughput region in this case is the region formed by the closure of vectors of normalized mean arrival rates at the different queues for which there exists a transmission scheme in which the queues are stable. In our discussion, stability of queues implies that the ratio of queue length to log(u) is finite with probability one for largeSNR (oru). Hence, the stable throughput region in this case is defined as follows.

Definition 4 (SNR-stable throughput (finiten and largeSNR)). The SNR-stable throughput region in the case whenSNR → ∞ is defined as the closure of all (l1,l2,…,lK) such that there exists a transmission scheme such that the signal received at destination has probability of errorPe → 0 asu → ∞. Furthermore, all the queues are stable foru large enough. In other words, there existsM < ∞ such that limj → ∞ Pr[Qi,(j) < xlog(u)] = F(x,u) and limx→∞F(x,u) = 1, fori = 1,2,…,K andu > M, when the arrival rate at useri isλiliαi log(u).

Asu → ∞, the region is defined as the closure of (l1,l2,…,lK) which is a finite region although λi, go to to. Let us sayli as the arrival rate perSNR-unit which we use in defining the stable throughput region for largeSNR in contrast toλi, which is the arrival rate per unit time and is used to define stable throughput region for largen. The stability of the queues refer to the queue length per growth is finite with probability one, where the growth is the block-length (f) in case of largen, while log(u) in the case of largeSNR. Also, the stable throughput region is defined as the region in which the arrival rates per unit-growth (per time-unit or per SNR-unit in the two cases) lie so that the queues remain stable.

2.4. Source side information

To keep our analysis tractable, we consider the case of i.i.d. arrivals. Thus, each sourcei is described by an arrival distributionpi,(a), and the joint distribution of the arrival process isp(a) = Πipi(a). While the joint distribution is often used in capacity analysis to obtain best possible capacity region [5], it is seldom known in such detail in operational systems. In source coding parlance, this is a problem of universal source coding over noisy channels, where the distribution is only partially known (see universal source coding over noiseless channels in [5]). Our objective is to study the role of this statistical information on the stability of multiuser-queuing system and, in the process, understand the interplay between statistical information and instantaneous source information (in the form of queue stateQi,(j)). Hence we will study the following series of cases.

  1. (1a)

    Full statistical informationp(a) known to all nodes—K transmitters and the central receiver.

  2. (1b)

    Each node knows arrival means (E(a1),E(a2),…,E(aK)) for all nodes and transmitters convey 1-bit of quantized queue information to the receiver every time-slot.

  3. (2a)

    Each transmitter only knows its own arrival statisticspi,(a) but the receiver knowsp(a) and is allowed to feedback some information to all the transmitters.

  4. (2b)

    Each transmitter knows only its own arrival meanE(ai), and conveys 1-bit of quantized queue information to the receiver every time-slot. In this case, the receiver knows (E(a1),E(a2),…,E(aK)), and is allowed to feedback some information to all the transmitters.

  5. (3)

    No statistical information is available to any node and the transmitters can convey 1-bit of queue information.

Our focus is on finite-bit overhead information about the queue state from transmitters to receiver to counter lack of statistical knowledge. In the process, we discovered that a single bit of queue state information is sufficient to achieve our goals; as a result, we state our results only for single-bit information and note that the proof techniques can be generalized to multi bit information case. Furthermore, implicit in our constructions is the desire to use the simplest multiuser receiver and avoid universal decoding (which is not matched to any particular source distribution but to a whole class). Thus, the receiver adapts its decoder to match the current state of the queues in those cases where the arrival distributions (and hence the prior message probabilities) are (partially) unknown.

An analogue of quantized instantaneous source information is the quantized channel state information studied in fading channels [22,23] where the receivers convey a few bits of information about the current fading states. In the current case, the transmitters have instantaneous information about the sources; and, hence, they convey a few bits to the receiver to enable improved decoding. This source-channel duality in information sharing, while interesting in its own right, is not further discussed in this paper.

Finally, we note that each node in the system is assumed to know the transmit powers of each user and their channel gains, and hence knows the capacity region accurately. Thus the only uncertainty at the transmitters is potentially about the source arrival statistics of other nodes; and, in some cases (2a, 2b and 3), about the available capacity for each node.

3. FiniteSNR Withn

In this section, we assume that the time-slots can be made arbitrarily large so that we can use the conventional large block length coding strategies [5] for multiple-access channels. We will give an achievable rate region for all five side information cases listed in Section 2.4. Two main code constructions are used, namely in Theorem 1 for Case 1a and Theorem 2 for Case 1b, and rest of the side-information cases follow from them (Cases 2a, 2b and 3). Throughout this section, we assume thatλi,< ∞ and limn→∞(Var(Δi,(k))/n2) < ∞

Theorem 1 (side-information Case 1a). The stable throughput region (as in Definition 3) coincides with the Shannon capacity region given in Lemma 1, when all K + 1nodes know the complete arrival distribution of all K sources.

Proof. Let the incoming rates (λ12,…,λK) be such that ΣiϵSλi< CiϵSPi/N) where S ϵS andS is set of all nonempty subsets of {1,2,…,K}. Letτ = (1/2 K)minS(C(ΣiϵsPi/N) – Σiϵsλi). Letγi= λi, +τ. Note that (γ1,γ2,…,γK) is also in the interior of the capacity region of Lemma 1.

Suppose that the number of bits with the transmitteri at the beginning of time-slotk isQi(k). Then, Ωi(k) = min(Qi(k),i) bits are sent to the encoder. The encoding and decoding operations make use of the prior probabilities of all the possible2nγi+1 – 1 messages (consisting of all messages of length ≤ i). The asymptotic rate at useri is thus no more thanγi. Since (γ1,γ2,…,γK) is in the interior of the capacity region, there exists an encoding and decoding scheme in which average probability of error at the decoder goes to 0 asn → ∞. Note here that we do not change the codebooks in every time slot. Once chosen in the first time-slot, the codebook for each user remains the same throughout the use of the channel in all subsequent timeslots.

Using the above encoding scheme, the queue update equation for useri (2) reduces toQi(k + 1) = Qi(k) –min(Qi(k),nyi) + Δi(k) = (Qi(k) –nyi)+ + Δi(k). This queue update equation is different from [24] because in our case, the encoding is done at the beginning of a time-slot. Hence, Δi(k) bits will remain in the queue at the start of the next time-slot.We prove that this queue is stable in the appendix. This completes the proof. □

When there is incomplete information about statistical information, we can assume a distribution and encode as if the distribution is known. But, this approach will lead to a loss in stable throughput region due to mismatch of the probability distributions at the sources and the actual distribution (this leads to a loss in the achievable rates as shown in [25]). To avoid this loss, we consider 1-bit queue state information which can aid in alleviating the loss in performance.

Theorem 2 (side-information Case 1b).The stable throughput region (as in Definition 3)coincides with the Shannon capacity region given in Lemma 1,when all K +1nodes know the mean arrival rates of all K sources and transmitters convey 1-bit of quantized queue state information to the receiver in each time-slot.

Proof. Let the incoming rates (λ12,…,λK) be such that ΣiϵSλi,< CiϵsPi/N) whereS ϵS whereS is set of all nonempty subsets of {1,2,…,K}. Lett = (1/2 K)minsϵs(CSP/N) – ΣSλi). Letγi,= λi, + min(τ,λi). Note that (γ1,γ2,…,γK) is also in the interior of the capacity region.

Let us consider transmitteri. Suppose that the number of bits with the transmitter at the beginning of time-slotk beQi(k). IfQi(k) < i, we serve Ωi,(k) = 0 bits, else we serve Ωi,(k) = i bits. The input to the encoder at transmitteri can have any bit-sequence of lengthi. These are encoded to2nγi codewords of lengthn (since we do not know the whole statistical information,we encode only the equally likely symbols in contrast to Theorem 1 where we encode all the possible bit sequences having length at-mosti). The transmitter sends the information of Ωi(k) = 0 by sending the single bit quantized queue state information. The codebooks are chosen at the beginning of operation and stay fixed throughout. Since (y1,y2,…,yK) is in the interior of the capacity region, there exists an encoding and decoding scheme with average probability of error at the decoder going to 0 asn goes to infinity.

Using the above scheme, the queue update (2) reduces toQi(k +1) = f (Qi(k),i) + Δi(k), wheref (A,B) = AB if A ≥ B, and = A otherwise. Note thatQi(k +1) ≤ (Qi(k) –2nyi)+ + (nyi + Δi(k)). In other words, this queue is upper bounded by a queue whose stability can be proven similar to the appendix. Hence, we see that the queues are stable. This completes the proof. □

Lemma 3 (side-information Case 3).Suppose that the transmit power Pi= P for all i. All transmitters send 1-bit queue information as in Theorem 2. If nodes do not know anything about arrival distribution of any node (not even its own),then the stable throughput region contains the closure of12,…, λk)where12,…,λK)satisfy

λi<1KCKPNδK,
(13)

for any predecided variable S > 0chosen without any knowledge ofarrival distribution or arrival means,and known to all the transmitting nodes and the base station.

Proof. By choosingγi= (1/K)C(KP/N) –δ/2 K and using the same protocol as in the proof of Theorem 2 to encode, we see that any point in the above region is in stable throughput region. □

Remark 1. AlthoughS can be chosen arbitrarily small, the knowledge of sameδ > 0 at all the nodes can be considered as a side-information.

Two important conclusions can be drawn from studying Theorems 1 and 2 and Lemma 3. First, there is a significant loss in the achievable stable throughput region if the transmitters do not know anything about the source arrival statistics at all nodes. This situation represents the common scenario in actual practice. The loss is entirely due to the fact that any transmitter has to guarantee that its packets will be received error-freewithout any knowledge of amount of data which other transmitters may be trying to send. Thus, each transmitter assumes that every source is sending at its peak rate, so that they essentially split the sum-rate capacity equally. However, in cases where some sources have lower arrival rates, this scheme can lead to a large loss compared to full-information scenario of Theorem 1 or partial knowledge with feed-forward bit of Theorem 2.

Second, the proofs of Theorems 1 and 2 suggest a simple architecture to get around the problem of every transmitter knowing the statistics of every source in the system. Essentially the transmitters need to know only an appropriate value oft to calculate how far the arrival rate is from the capacity region and hence decide their transmission rate. Thus if the receiver knows the statistics or arrival rates at each node, it can calculate the appropriate “backoff” parametert and send it to each transmitter. This is akin to congestion/rate control by base-stations and leads to the following result.

Corollary 1 (side-information Case 2).The stable throughput region (as in Definition 3)coincides with the Shannon capacity region given in Lemma 1 if

  1. (2a)

    the K transmitters know only their own complete arrival distribution but the base station knows the complete arrival distribution ofall K sources,or

  2. (2b)

    the K transmitters know only their own mean arrival rates but the base station knows all the mean arrival rates; in addition,transmitters send one bit ofinstanta- neous queue state information

if the base station can feedback a real number to all K sources.

Proof. The proof is similar to that of Theorems 1 and 2 except thatt is calculated at the base station and is fedback to all theK sources. □

3.1. Discussion

In Theorem 1, it is shown that with full statistical information aboutall the nodes atall the nodes guarantees that every point in the Shannon capacity region of Lemma 1 is in stable throughput region. Thus, full statistical information guarantees maximal achievable performance. The key ingredient of this result is that the probability of different bit sequences is known to the receiver which allows the receiver to use the optimal maximuma posteriori probability decoder. Thus, while each codeblock may have different number of information bits, the receiver has accurate knowledge of the probability of each message.

As the information about the distribution of source information bits reduces, the transmitter and the receiver no longer can perform optimal allocation of code rates and thus suffer from additional “overhead” of indicating the number of encoded bits in every codeword. If we reduce the information, we may not have the same knowledge of the encoding rate at the senders and the receiver, which will result in significant number of errors, and the stable throughput regions will be much less than the capacity region. This overhead can surprisingly be eliminated if the encoders can share one-bit information about their current queue state. When the distribution of arrivals is not known, we have to assume that the incoming symbols are equally likely. For this assumption to hold, we encode equally likely symbols which have the same number of input bits. Hence, we send one bit of queue information when the respective queue has less elements than that supported by the service rate of that particular transmitter, and send the bits supported by service rate otherwise. This helps us to send all the blocks with equal probability. The encoding rates just need the side information of mean arrival rates rather than the whole distribution since we know the prior probabilities of each codeword and do not need the whole distribution for this information. This is why in Theorem 2 when each node knows the arrival rates at all the nodes, we get stable queues when the mean arrival rates are within the capacity region. There is a loss in achievable rates as we know less and less information.

We further see in Lemma 3 that if we do not know any information, we have to predecide the encoding and decoding rates in the interior of the capacity region which leads to the stability region being smaller than the capacity region. Note that the 1-bit side information is not needed when all the queues always have data to send, the case which is commonly considered in information theoretic analysis resulting in Lemma 1.

We further see in Corollary 1 that if the base station can feedback a real number to the transmitting users once, we need much less side information at the transmitters. This side information is needed only once and hence can be communicated the same time when the codebooks are told to the receivers. In this case, every point in the capacity region is stable. Hence, we have a practical way akin to congestion control where we trade side information of other transmitters at a transmitter by some information from receiver.

4. Fixed Block-Lengthn WithSNR

Till now, we concentrated on the block-length being large enough to make the error probability at the receiver decrease to 0. We now consider the dual-like problem to keep the block-length fixed, while letting theSNR = (SNR1,SNR2,…,SNRK) high enough for the probability of error at the decoder to be very small, whereSNRi=Pi/Nuαi, whereu is some baseSNR. We will give an achievable rate region for all five side-information cases listed in Section 2.4. Two main code constructions are used, namely in Theorem 3 for Case 1a and Theorem 4 for Case 1b, and rest of the side-information cases follows from them (Cases 2a, 2b, and 3).

In this section, we also assume that limSNR→∞(Ei(k))/log(SNRi)) < ∞ and limSNR→∞(Var(Δi(k))/log2(SNRi)) < ∞. As theSNR is large enough, the channel can support rates that are logarithmic inSNR. Hence, we can also support the arrival rates that are logarithmic inSNR. Hence, we let all the arrival rates be assumed to be a function ofSNR asλili log(SNRi) liαi log(u). We also assume thatSNRi for alli is known to all the nodes.

Theorem 3 (side-information Case 1a).The SNR-stable throughput region (as in Definition 4)coincides with the SNR- capacity region given in Lemma 2,when all K +1nodes know the complete arrival distribution of all K sources.

Proof. Let the incoming rates (λ12,…,λK) beλiliαi log(u), with ΣiϵSliαi< (1/2)maxiϵSαi, whereS ϵS, whereS is set of all nonempty subsets of {1,2,…,K}. Letτ = (1/K)(1 – maxSϵSΣiϵS liαi/(1/2)maxiϵSαi)). Letgi= li + τ/4. Note that (g1,g2,…,gK) is also in the interior of theSNR-capacity region. We can take the departure rateγi= λi + (gi − li)logSNRigi logSNRigiαi log u.

The constructive queuing scheme is similar to that in Theorem 1 with the above arrival and departure rates. We get probability of error at the decoder going to 0 asu → ∞ since (g1,g2,…,gK) is in the interior of the SNR-capacity region.

Using the above scheme, the queue states emerge asQi(k + 1) = (Qi(k)– nγi)+ + Δi(k). Using similar procedure as in the appendix, we can easily show that the queues are stable. □

Theorem 4 (side-information Case 1b).The SNR-stable throughput region (as in Definition 4)coincides with the SNR- capacity region given in Lemma 2,when all K +1nodes know the mean arrival rates of all K sources and transmitters convey 1-bit of quantized queue state information to the receiver in each time-slot.

Proof. Let the incoming rates (λ12,…,λK) beλiliαi log(u), with ΣiϵSliαi< (1/2)maxiϵSαi, whereS ϵS, andS is set of all nonempty subsets of {1,2,…,K}. Letτ = (1/K)(1 – maxSϵSiϵs liαi/(1/2)maxiϵsαi)). Letgi= li + min(li,τ/4). Note that (g1,g2,…,gK) is also in the interior of theSNR-capacity region. We can take the departure rateγi= λi + (gi, −li)logSNRgiαi log u.

Let us consider transmitteri. Suppose that the number of bits with the transmitter at the beginning of time-slotk isQi(k). IfQi(k) < nγi, we serve Ωi(k) = 0 bits, else we serve Ωi,(k) = i bits. The input to the encoder at transmitteri can be any bit-sequence of lengthi. These are encoded to2nγi codewords of lengthn. The transmitter sends the information of Ωi(k) = 0 by sending the single-bit information that the queue is empty. Since (g1,g2,.…,gK) is in the interior of the SNR-capacity region, there existsu large enough so that there exist an encoding and decoding scheme with arbitrarily small average probability of error asu goes to infinity.

Using the above scheme, the queue states emerge asQi (k +1) = f (Qi(k),i,) + Δi,(k), wheref (A,B) = AB ifA ≥ B, and = A otherwise. Using arguments similar to those used in the proof of Theorem 2, we can show that the queues are stable. □

Lemma 4 (side-information Case 3).Suppose that the transmit power Pi= P for all i,hence SNRi= u. All transmitters send 1-bit queue information as in Theorem 4. If nodes do not know anything about arrival distribution of any node (not even its own),then the SNR-stable throughput region contains the closure of (l1,(l2,…,lK),where (l1,l2,…,lK)satisfy

li<12KδK
(14)

for any predecided variable δ > 0chosen without any knowledge of arrival distribution or arrival means,and known to all the transmitting nodes and the base station.

Proof. The SNR-capacity region in this case is the closure of Σ1≤iKri < 1/2. By choosinggi = 1/2K − δ/2K, γigi log u and using the same protocol as in the proof of Theorem 4 to encode, we see that any point in the above region as stable. □

We further see that both the Cases 1a and 1b in Theorems 3 and 4 suggest that at a transmitting node, we use the information of its own arrival distribution/means while the arrival distributions/means at other nodes are absorbed into the parameterτ similar to that in Section 3. Hence we consider a method where only the receiver knows the full arrival distribution/mean, computes an appropriateτ, and then relays it to all the transmitters as in Section 3. Note that this parameter is needed only once and not in every time slot. Using this, Theorems 3 and 4 change as follows.

Corollary 2 (side-information Case 2).The SNR-stable throughput region (as in Definition 4)coincides with the SNR- capacity region given in Lemma 2,when

  1. (2a)

    all K-transmitting nodes know the complete arrival distribution of its own source,the base station knows the complete arrival distribution of all K sources,or

  2. (2b)

    all K-transmitting nodes know the mean arrival rates of its own source,the base station knows the mean arrival rates of all K sources,transmitters convey 1-bit of quantized queue state information to the receiver in each time-slot

if the base station can feedback a real number to all K sources.

Proof. The proof is similar to that of Theorems 3 and 4 except thatτ is calculated at the base station and is fedback to all theK sources. □

4.1. Discussion

The results follow the similar behavior as in Section 3 for finiteSNR. When each node knows the distribution of arrivals at all the nodes, theSNR-stable throughput region coincides with theSNR-capacity region as in Theorem 3. As we decrease the side information, we loose in theSNR-stable throughput regions since we would have to predecide something. With the knowledge of whole distribution of arrival, we estimated the a priori probability of all the messages sent from the encoder that gave us the maximum stable throughput region. We show that the knowledge of whole distribution of arrival can be relaxed if we allow one bit of information from the transmitters to indicate whether the queue is empty. On these lines, if each node knows the mean arrival rate at all the queues, stable queues are achieved as long as the mean arrival rates are in the interior of the SNR-capacity region (Theorem 4). We further see that there is a loss in the throughput stability regions due to predeciding some terms when there is a less information. We further see in Corollary 2 that the knowledge of arrival distribution/means of other transmitters is not needed at a transmitter as long as there is a real feedback from the base station.

Till now, we saw the similarities in the two cases when theSNR is finite with infinite block-length and when the block- length is finite whileSNR is infinite. The main difference in the two approaches is the definition of stability. The definition of stability in the case of infinite block length means that the queue length has to be finite multiple of block-length with probability 1. This would mean that a bit would take extremely large amount of time to get serviced (Asn → ∞, each bit even if waits one time-slot means that it waits for infinite time). In the case of infiniteSNR stability refers to queue length being a finite multiple of log(SNR) with probability 1. Since, increasingly large number of bits are being served each time unit, the average bit delay is smaller.

5. Conclusion

In this paper, we studied the impact of side information on the stable throughput regions. We found that when every node knows the distribution of the arrival rates of every node, the stable throughput region coincides with the Shannon capacity region for both finite time-slots with largeSNR and finiteSNR with large time-slots. We also considered a variant of the side information in which the knowledge of the whole of the distribution is replaced by the arrival means, along with one bit of side-information in every time-slot; and that seems enough. Further, the case of side information at a node in which a transmitter knows only its own arrival statistics was studied, and we found that a feedback from the receiver is enough. Finally, we showed that any information content that is less than the mean arrival rates known to all nodes implies a reduced stable throughput region, a case which is indicative of the performance of real systems.

References

  1. J. Luo and A. Ephremides, “On the throughput, capacity, and stability regions of random multiple access,”IEEE Transactions on Information Theory, vol. 52, no. 6, pp. 2593–2607, 2006.

    Article MathSciNet MATH  Google Scholar 

  2. J. Massey and P. Mathys, “The collision channel without feedback,”IEEE Transactions on Information Theory, vol. 31, no. 2, pp. 192–204, 1985.

    Article MathSciNet MATH  Google Scholar 

  3. M. Medard, J. Huang, A. J. Goldsmith, S. P. Meyn, and T. P. Coleman, “Capacity of time-slotted ALOHA packetized multiple-access systems over the AWGN channel,”IEEE Transactions on Wireless Communication, vol. 3, no. 2, pp. 486–499, 2004.

    Article  Google Scholar 

  4. R. Rao and A. Ephremides, “On the stability of interacting queues in a multiple-access system,”IEEE Transactions on Information Theory, vol. 34, no. 5, pp. 918–930, 1988.

    Article MathSciNet MATH  Google Scholar 

  5. T. M. Cover and J. A. Thomas,Elements of Information Theory, John Wiley & Sons, New York, NY, USA, 1991.

    Book MATH  Google Scholar 

  6. H. Ohsaki, M. Murata, H. Suzuki, C. Ikeda, and H. Miyahara, “Rate-based congestion control for ATM networks,”ACM SIGCOMM Computer Communication Review, vol. 25, no. 2, pp. 60–72, 1995.

    Article  Google Scholar 

  7. E. M. Yeh and A. S. Cohen, “Throughput optimal power and rate control for queued multiaccess and broadcast communications,” inProceedings of the International Symposium on Information Theory (ISIT ’04), p. 112, Chicago, 1ll, USA, June- July 2004.

    Google Scholar 

  8. L. Zheng and D. N. C. Tse, “Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels,”IEEE Transactions on Information Theory, vol. 49, no. 5, pp. 1073–1096, 2003.

    Article MATH  Google Scholar 

  9. D. N. C. Tse, P. Viswanath, and L. Zheng, “Diversity- multiplexing tradeoff in multiple-access channels,”IEEE Transactions on Information Theory, vol. 50, no. 9, pp. 1859–1874, 2004.

    Article MathSciNet MATH  Google Scholar 

  10. B. Tsybakov and V. Mikhailov, “Ergodicity of a slotted ALOHA system,”Problems of Information Transmission, vol. 15, no. 4, pp. 301–312, 1979.

    MathSciNet MATH  Google Scholar 

  11. S. Ghez, S. Verdu, and S. C. Schwartz, “Stability properties of slotted Aloha with multipacket reception capability,”IEEE Transactions on Automatic Control, vol. 33, no. 7, pp. 640–649, 1988.

    Article MathSciNet MATH  Google Scholar 

  12. W. Szpankowski, “Stability conditions for some distributed systems: buffered random access systems,”Advances in Applied Probability, vol. 26, no. 2, pp. 498–515, 1994.

    Article MathSciNet MATH  Google Scholar 

  13. B. Shrader and A. Ephremides, “On the Shannon capacity and queueing stability of random access multicast,” submitted to IEEE Transactions on Information Theory, May 2007.

    MATH  Google Scholar 

  14. H. Boche and M. Wiczanowski, “Optimal scheduling for high speed uplink packet access—a cross-layer approach,” inProceedings of the 59th IEEE Vehicular Technology Conference (VTC ‘04), vol. 5, pp. 2575–2579, Milan, Italy, May 2004.

    Google Scholar 

  15. M. J. Neely, E. Modiano, and C. E. Rohrs, “Power allocation and routing in multibeam satellites with time-varying channels,”IEEE/ACM Transactions on Networking, vol. 11, no. 1, pp. 138–152, 2003.

    Article  Google Scholar 

  16. M. Kobayashi and G. Caire, “Joint beamforming and scheduling for a MIMO downlink with random arrivals,” inProceedings of the IEEE International Symposium on Information Theory (ISIT ‘06), pp. 1442–1446, Seattle, Wash, USA, July 2006.

    Chapter  Google Scholar 

  17. E. Leonardi, M. Mellia, F. Neri, and M. A. Marsan, “Bounds on average delays and queue size averages and variances in input- queued cell-based switches,” inProceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM ‘01), vol. 2, pp. 1095–1103, Anchorage, Alaska, USA, April 2001.

    Google Scholar 

  18. N. McKeown, V. Anantharam, and J. Walrand, “Achieving 100 percent throughput in an input-queued switch,” inProceedings of the 15th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM ‘96), pp. 296–302, San Francisco, Calif, USA, March 1996.

    Chapter  Google Scholar 

  19. I. E. Telatar and R. G. Gallager, “Combining queueing theory with information theory for multiaccess,”IEEE Journal on Selected Areas in Communications, vol. 13, no. 6, pp. 963–969, 1995.

    Article  Google Scholar 

  20. R. M. Loynes, “The stability of a queue with non-independent interarrival and service times,”Proceedings of the Cambridge Philosophical Society, vol. 58, pp. 497–520, 1968.

    Article MathSciNet MATH  Google Scholar 

  21. S. P. Meyn and R. L. Tweedie,Markov Chains and Stochastic Stability, Springer, New York, NY, USA, 1996.

    MATH  Google Scholar 

  22. A. Khoshnevis and A. Sabharwal, “Performance of quantized power control in multiple antenna systems,” inProceedings of the IEEE International Conference on Communications (ICC ‘04), vol. 2, pp. 803–807, Paris, France, June 2004.

    Google Scholar 

  23. C. Swannack, G. W. Wornell, and E. Uysal-Biyikoglu, “MIMO broadcast scheduling with quantized channel state information,” inProceedings of the IEEE International Symposium on Information Theory (ISIT ‘06), pp. 1788–1792, Seattle, Wash, USA, July 2006.

    Chapter  Google Scholar 

  24. L. Kleinrock,Queueing Systems, John Wiley & Sons, New York, NY, USA, 1975.

    MATH  Google Scholar 

  25. F. Hekland, G. E. 0ien, and T. A. Ramstad, “Quantifying performance losses in source-channel coding,” inProceedings of the European Wireless Conference (EW ‘07), Paris, France, April 2007.

  26. E. Gelenbe and G. Pujolle,Introduction to Queueing Networks, John Wiley & Sons, New York, NY, USA, 1987.

    MATH  Google Scholar 

Download references

ACKNOWLEDGMENTS

We acknowledge fruitful discussions with Robert Calderbank and Tian Lan (Princeton University). We would also like to thank the anonymous reviewers for many suggestions that improved this paper. V. Aggarwal was partially supported by NSF Awards ANI-0338807, CCF-0635331, CNS-0325971, and AFOSR under Contract 00852833. A. Sabharwal was partially supported by NSF Awards CCF-0635331 and CNS- 0325971.

Author information

Authors and Affiliations

  1. Department of Electrical Engineering, Princeton University, Princeton, NJ, 08544, USA

    Vaneet Aggarwal

  2. Department of Electrical & Computer Engineering, Rice University, Houston, TX, 77005, USA

    Ashutosh Sabharwal

Authors
  1. Vaneet Aggarwal

    You can also search for this author inPubMed Google Scholar

  2. Ashutosh Sabharwal

    You can also search for this author inPubMed Google Scholar

Corresponding author

Correspondence toVaneet Aggarwal.

Appendix

Appendix

Stability of Queues In Theorem 1

The queues emerge asQi(k + 1) = (Qi(k) –i)+ + Δi(k). LetQi(k)/n = Vi(k) andbi(k) = Δi(k)/nyi. Using this, we see that

Vi1=0,Vi2=maxVi1+bi1,Δi1n=maxbi1,Δi1n,Vi3=maxVi2+bi2,Δi2n=maxbi1+bi2mΔi1n+bi2,Δi2n.
(A.1)

Continuing in this way, we get

Vij=maxVij1+bij1,Δij1n=maxbi1++bij1,Δi1n+bi2++bij1,Δi2n+bi3++bij1,Δij1n.
(A.2)

Asbi(1) ≤ Δi(1)/n,

Vij=maxΔi1n+bi2++bij1,Δi2n+bi3++bij1,,Δij1n.
(A.3)

Let

Vi'j=maxΔij1n+bi2++bij1,Δij2n+bi2++bij2,,Δi1n=Δi1n+max0,di2,di2+di3,,di2++dij1,
(A.4)

wheredi(k) = (Δi(k) – Δi(k – 1))/n + bi(k).Vi(j) andV′i (j) have same distribution since we just renamed the labels and all thebi’s were i.i.d.

Letei(k) = di(2) + di(j – 2) + …di(k – 1) fork ≥ 3 and 0 otherwise. We see thatV′i (j) can only increase withj, and hence asj → ∞must converge to the (possibly infinite) random variablei,

V˜i=Δi1n+supk2eik.
(A.5)

As E(d,(k)) < 0, it follows being similar analysis as of [26, Section 1.7] that supk≥2ei(k) is finite with probability 1 and has a proper probability distribution (by proper, we mean that limit of the distribution is 0 and 1 at – and to, resp.). As mean and variance of Δi(1)/n is finite forn large enough, this has a proper distribution function,i is finite with probability 1 and forms a proper distribution function. Sincei is finite with probability 1, bothVi(j) andVi(j) converge to the same distribution, which is the distribution ofi. Hence, there exists an integerM such that limj→∞ Pr[Qi(j) < nx] = F (x,n) and limx→∞F(x,n) = 1, fori = 1,2,…,K andn > M. Thus, the queues are stable forn large enough.

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Aggarwal, V., Sabharwal, A. Slotted Gaussian Multiple Access Channel: Stable Throughput Region and Role of Side Information Vaneet.J Wireless Com Network2008, 2 (2008). https://doi.org/10.1155/2008/695894

Download citation

Keywords

Download PDF

Associated content


[8]ページ先頭

©2009-2025 Movatter.jp