Random Access: An Information-Theoretic Perspective

被引:51
作者
Minero, Paolo [1 ]
Franceschetti, Massimo [2 ]
Tse, David N. C. [3 ]
机构
[1] Univ Notre Dame, Wireless Inst, Dept Elect Engn, Notre Dame, IN 46556 USA
[2] Univ Calif San Diego, Dept Elect & Comp Engn, Calif Inst Telecommun & Informat Technol CALIT2, Adv Network Sci Grp ANS, La Jolla, CA 92093 USA
[3] Univ Calif Berkeley, Dept Elect Engn & Comp Sci, Wireless Fdn, Berkeley, CA 94720 USA
基金
美国国家科学基金会;
关键词
Broadcast approach; capacity; multiple-access channels; network information theory; random access; slotted ALOHA; SLOTTED ALOHA; STABILITY; CHANNEL;
D O I
10.1109/TIT.2011.2173711
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers a random access system where each sender is in one of two possible states, active or not active, and the states are only known to the common receiver. Active senders encode data into independent information streams, a subset of which is decoded depending on the collective interference. An information-theoretic formulation of the problem is presented and the set of achievable rates is characterized with a guaranteed gap to optimality. Inner and outer bounds on the capacity region of a two-sender system are tight in the case of a binary-expansion deterministic channel and differ by less than one bit in the case of a Gaussian channel. In systems with an arbitrary number of senders, the symmetric scenario of equal access probabilities and received power constraints is studied and the system throughput, i.e., the maximum achievable expected sum rate, is characterized. It is shown that a simple coding scheme where active senders transmit a single message is optimum for a binary-expansion deterministic channel and achieves within one bit of the optimum in the case of a Gaussian channel. Finally, a comparison with the slotted ALOHA protocol is provided, showing that encoding rate adaptation at the transmitters achieves constant (rather than zero) throughput as the number of users tends to infinity.
引用
收藏
页码:909 / 930
页数:22
相关论文
共 23 条
[1]  
Abramowitz M., 1972, Handbook on Mathematical Functions with Formulas, Graphs, and Mathematical Tables
[2]  
Abramson N., 1970, Proceedings of the 1970 fall joint computer conference, P281, DOI 10.1145/1478462.1478502
[3]  
Ahlswede R., 1971, P 2 INT S INF THEOR
[4]   Low-complexity receivers for multiuser detection with an unknown number of active users [J].
Angelosante, Daniele ;
Biglieri, Ezio ;
Lops, Marco .
SIGNAL PROCESSING, 2010, 90 (05) :1486-1495
[5]   Wireless Network Information Flow: A Deterministic Approach [J].
Avestimehr, A. Salman ;
Diggavi, Suhas N. ;
Tse, David N. C. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (04) :1872-1905
[6]   Fading channels: Information-theoretic and communications aspects [J].
Biglieri, E ;
Proakis, J ;
Shamai, S .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1998, 44 (06) :2619-2692
[7]   Multiuser detection in a dynamic environment - Part 1: User identification and data detection [J].
Biglieri, Ezio ;
Lops, Marco .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2007, 53 (09) :3158-3170
[8]   The multiple-access channel with partial state information at the encoders [J].
Cemal, Y ;
Steinberg, Y .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (11) :3992-4003
[9]   BROADCAST CHANNELS [J].
COVER, TM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1972, 18 (01) :2-+
[10]  
El Gamal A, 2011, NETWORK INFORMATION THEORY, P1