Professional Documents
Culture Documents
IEEE Transactions On Communications Volume 59 Issue 2 2011 (Doi 10.1109/tcomm.2010.120710.100054) Liva, G. - Graph-Based Analysis and Optimization of Contention Resolution Diversity Slott
IEEE Transactions On Communications Volume 59 Issue 2 2011 (Doi 10.1109/tcomm.2010.120710.100054) Liva, G. - Graph-Based Analysis and Optimization of Contention Resolution Diversity Slott
Abstract—Contention resolution diversity slotted ALOHA The intuition behind CRDSA deals with the adoption of in-
(CRDSA) is a simple but effective improvement of slotted terference cancellation (IC) [10]–[13] for resolving collisions.
ALOHA. CRDSA relies on MAC bursts repetition and on inter- More specifically, with respect to DSA, the twin replicas of
ference cancellation (IC), achieving a peak throughput 𝑇 ≃ 0.55,
whereas for slotted ALOHA 𝑇 ≃ 0.37. In this paper we show each burst transmitted within a MAC frame1 possess a pointer
that the IC process of CRDSA can be conveniently described by a to the slot where the respective copy was sent. Whenever a
bipartite graph, establishing a bridge between the IC process and clean burst is detected and successfully decoded, the pointer
the iterative erasure decoding of graph-based codes. Exploiting is extracted and the potential interference contribution caused
this analogy, we show how a high throughput can be achieved by by the twin replica on the corresponding slot is removed. The
selecting variable burst repetition rates according to given prob-
ability distributions, leading to irregular graphs. A framework procedure is iterated, hopefully permitting the recovery of the
for the probability distribution optimization is provided. Based whole set of bursts transmitted within the same frame. This
on that, we propose a novel scheme, named irregular repetition results in a remarkably improved throughput 𝑇 (defined as
slotted ALOHA, that can achieve a throughput 𝑇 ≃ 0.97 for probability of successful packet transmission per slot) which
large frames and near to 𝑇 ≃ 0.8 in practical implementations, may reach 0.55, while the peak throughput for pure SA is
resulting in a gain of ∼ 45% w.r.t. CRDSA. An analysis of
the normalized efficiency is introduced, allowing performance 𝑇 = 1/𝑒 ≃ 0.37. Further improvements may be achieved by
comparisons under the constraint of equal average transmission exploiting the capture effect [2], [14], especially in presence
power. Simulation results, including an IC mechanism described of power unbalance among different users. CRDSA permits
in the paper, substantiate the validity of the analysis and confirm moreover to achieve low packet loss rates (e.g., 10−2 or
the high efficiency of the proposed approach down to a signal- less) at moderate-high loads, whereas SA needs to operate
to-noise ratio as a low as 𝐸𝑏 /𝑁0 = 2 dB.
at extremely low loads. Hence for CRDSA most of the burst
Index Terms—Bipartite graphs, erasure channel, density evo- transmissions are successful at the first attempt, leading to
lution, slotted ALOHA, diversity slotted ALOHA, contention low latencies. CRDSA (as well as the enhancement proposed
resolution diversity slotted ALOHA, successive interference can-
cellation. herein) is currently investigated within the Digital Video
Broadcasting (DVB) - Return Channel via Satellite (RCS)
standardization as random access scheme for next generation
I. I NTRODUCTION interactive satellite services [15], [16].
W HEREAS the adoption of demand assignment multiple In this paper, we propose a novel scheme, referred to
access (DAMA) medium access control (MAC) proto- as irregular repetition slotted ALOHA (IRSA), which relies
cols guarantees an efficient usage of the available bandwidth, on a bipartite graph optimization of CRDSA. In fact, we
random access schemes remain an appealing solution for first show that the iterative burst recovery process can be
wireless networks. Among them, slotted ALOHA (SA) [1]– represented via a bipartite graph. Bipartite graphs have been
[3] is currently adopted as initial access scheme in satellite often used to describe the structure of iteratively-decodable
communication networks [4], where the large propagation error correcting codes and to analyze their performance un-
delays make the low access latency of ALOHA-based schemes der iterative (message-passing) decoding [17]–[20]. Based
extremely appealing [5]. Several enhancements of SA have on the bipartite graph representation of low-density parity-
been investigated in the past decades [6]–[8]. Among them, check (LDPC) codes [21], methods for obtaining iterative
diversity slotted ALOHA (DSA) introduces a burst repetition decoding thresholds close to the Shannon’s limit for many
which, at low normalized loads, yields a slight throughput types of communication channels were introduced. The re-
enhancement respect to SA. A more efficient use of the burst sult was achieved by irregular bipartite graph constructions
repetition is provided by contention resolution diversity slotted [19], [20], whereas regular graphs usually lead to a loss
ALOHA (CRDSA) [9]. in terms of iterative decoding threshold. In the CRDSA
context, the bipartite graph representation allows analyzing
Paper approved by T.-S. P. Yum, the Editor for Packet Access and Switching the convergence of the iterative IC process, permitting a fast
of the IEEE Communications Society. Manuscript received January 26, 2010;
revised June 7, 2010. analytical characterization of the CRDSA performance. We
This paper was presented in part at the International ITG Conference on show how the bipartite graph framework can be used to largely
Source and Channel Coding, Siegen (Germany), Jan. 2010, and in part at the
IEEE Global Communications Conference, Miami (US), Nov. 2010.
G. Liva is with the Institute of Communications and Navigation (Digital 1 According to [9], in this paper we consider a random access scheme where
Networks Section) of the German Aerospace Centre (DLR), Oberpfaffen- the slots are grouped into MAC frames. We further restrict to the case where
hofen, 82234 Weßling, GERMANY (e-mail: Gianluigi.Liva@dlr.de). each user proceeds with only one transmission attempt (either related to a
Digital Object Identifier 10.1109/TCOMM.2010.120710.100054 new packet or to a retransmission) within a MAC frame.
0090-6778/11$25.00 ⃝
c 2011 IEEE
478 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 2, FEBRUARY 2011
repetition rate for each burst, leading to irregular graphs (the User 1
sum nodes
III. G RAPH R EPRESENTATION OF THE IC P ROCESS
S1 S2 S3 S4
0 0
is connected to a degree-𝑙 BN. Similarly, 𝜌𝑙 defines the assumption implies very large frame sizes (𝑛 → ∞), hence the
probability that an edge is connected to a SN of degree 𝑙. analysis presented next will refer to this asymptotic setting.
It follows from the definitions that It is crucial to remark that this hypothesis is nevertheless
Λ𝑙 𝑙 Ψ𝑙 𝑙 needed just in the system design phase for deriving a simple
𝜆𝑙 = ∑ , 𝜌𝑙 = ∑ . Λ(𝑥) distribution optimization criterion. We will see that
Λ
𝑙 𝑙 𝑙 𝑙 Ψ𝑙 𝑙
this criterion remains valid also for short or moderate-length
The polynomial representations of {𝜆𝑙 } and {𝜌𝑙 } are8 frames. In particular, it will be shown by numerical results that
∑ ∑ probability distributions designed for the asymptotic setting
𝜆(𝑥) ≜ 𝜆𝑙 𝑥𝑙−1 , 𝜌(𝑥) ≜ 𝜌𝑙 𝑥𝑙−1 .
turn to be effective also for realistic frame sizes.
𝑙 𝑙
By fixing Λ(𝑥) (and hence 𝜆(𝑥)), for each value of the
The relations 𝜆(𝑥) = Λ (𝑥)/Λ (1) and 𝜌(𝑥) = Ψ′ (𝑥)/Ψ′ (1)
′ ′
offered traffic 𝐺 the distribution 𝜌(𝑥) can be determined. For
follow from the definitions above. values of 𝐺 below a certain threshold 𝐺∗ , the bursts will be
recovered with a probability close to 1. Above the threshold
IV. I TERATIVE IC C ONVERGENCE A NALYSIS 𝐺∗ , the procedure will fail with a probability bounded away
Consider now a degree-𝑙 BN. Denote by 𝑞 the probability from 0. Hence, we define the threshold 𝐺∗ as the maximum
that an edge is unknown, given that each of the other 𝑙 − 1 value of 𝐺 such that
edges has been revealed with probability 1 − 𝑝 during the 𝑞 > 𝜆 (1 − 𝜌 (1 − 𝑞)) , ∀𝑞 ∈ (0, 1]. (3)
previous iteration step. The edge is revealed whenever at least
one of the other edges have been revealed. Hence, 𝑞 = 𝑝𝑙−1 . We will look for distributions Λ(𝑥) leading to a high threshold
In a similar manner, consider a SN with degree 𝑙. According 𝐺∗ , allowing (in the asymptotic setting) transmission with
to the notation introduced so far, 𝑝 denotes the probability vanishing error probability for any offered traffic up to 𝐺∗ .
that an edge is unknown, given that each of the other 𝑙 − 1
edges have been revealed with probability 1−𝑞 in the previous A. Derivation of the Sum Nodes Distribution
iteration step. The edge is revealed whenever all the other
To get the threshold for a given Λ(𝑥) we have first to derive
edges have been revealed. Hence, 1 − 𝑝 = (1 − 𝑞)𝑙−1 or
𝜌(𝑥). Recalling that the average number of collisions per burst
equivalently 𝑝 = 1−(1−𝑞)𝑙−1 .9 According to the tree analysis
is Ψ′ (1) and that 𝑚 users attempt a transmission in a MAC
argument of [18], by averaging these two expressions over the
frame, the probability that a generic user sends a burst replica
edge distributions, one can derive the evolution of the average
within a given slot is Ψ′ (1)/𝑚. Thus, the probability that a
erasure probabilities during the 𝑖-th iteration as
∑ SN has degree 𝑙 is given by
𝑞𝑖 = 𝜆𝑙 𝑝𝑙−1 ( ) ( ′ )𝑙 ( )𝑚−𝑙
𝑖−1 = 𝜆 (𝑝𝑖−1 ) (1) 𝑚 Ψ (1) Ψ′ (1)
𝑙 Ψ𝑙 = 1− .
𝑙 𝑚 𝑚
and
∑ ( ) The node-perspective SNs degree distribution results in
𝑙−1
𝑝𝑖 = 𝜌𝑙 1 − (1 − 𝑞𝑖 ) = 1 − 𝜌 (1 − 𝑞𝑖 ) , (2) ∑ ( )𝑚
Ψ′ (1)
𝑙 Ψ(𝑥) = Ψ𝑙 𝑥𝑙 = 1 − (1 − 𝑥) . (4)
𝑚
where the subscript 𝑖 denotes the iteration number that, for 𝑙
the sake of simplicity, will be omitted in the rest of the paper. By letting 𝑚 → ∞ (asymptotic setting), (4) becomes
By iterating (1),(2) for a given amount of times (𝐼𝑚𝑎𝑥 ), it Ψ(𝑥) = exp(−Ψ′ (1)(1 − 𝑥)) = exp(−𝐺Λ′ (1)(1 − 𝑥)).11
is possible to analyze the convergence of the IC process.10 Recalling the identities provided at the end of Section III,
The initial condition has to be set as 𝑞0 = 𝑝0 = 1 (there are the polynomial representation of the edge-perspective SNs
no revealed edges at the beginning of the process). Following distribution is obtained as
(2), at the first iteration 𝑝 is the probability that an edge is not Ψ′ (𝑥) ′
connected to any degree-1 SN. 𝜌(𝑥) = ′ = 𝑒−𝐺Λ (1)(1−𝑥) . (5)
Ψ (1)
Note that the recursion of (1),(2) holds if the messages
exchanged along the edges of the graph are statistically By replacing (5) in (3), the threshold 𝐺∗ is defined as the
independent. Thus, the accuracy of (1),(2) is subject to the maximum value of 𝐺 such that
( )
absence of loops in the graph (recall that loops introduce ′
𝑞 > 𝜆 1 − 𝑒−𝑞𝐺Λ (1) , ∀𝑞 ∈ (0, 1]. (6)
correlation in the evolution of the erasure probabilities). This
8 For
Define now 𝑓 (𝑞) ≜ 𝜆 (1 − exp(−𝑞𝐺Λ′ (1))). A simple
the node-perspective degree distributions we associate the coefficients
(Λ𝑙 , Ψ𝑙 ) to 𝑥𝑙 . In the edge-perspective case the coefficients (𝜆𝑙 , 𝜌𝑙 ) are upper bound on the threshold can be obtained by observing
related to the 𝑥𝑙−1 term. This choice will bring to a compact description that, for 𝑞 → 0 and for 𝐺 ≤ 𝐺∗ , the derivative of 𝑓 (𝑞) with
of the IC process.
9 Similar equations were developed in [9, Sec.III.D] for deriving an upper 11 For large 𝑛 the number of transmissions in a slot follows a Poisson
bound to the throughput of CRDSA. distribution, Ψ𝑙 = (1/𝑙!)(𝐺Λ′ (1))𝑙 exp(−𝐺Λ′ (1)). As pointed out by one
10 This approach is in fact equivalent to the density evolution analysis for of the anonymous reviewers, the graph representation for IRSA is closely
LDPC codes [20]. However, note that the IC process of IRSA and the erasure related to that of Luby-Transform (LT) codes [23]. For LT codes, the encoding
recovery process of LDPC codes are similar, but not strictly the same. In fact, symbol degrees (corresponding to the SNs degrees of the IRSA case) are
while for IRSA the entire graph is active in the collision resolution, in the defined by the code designer, whereas input symbols (which correspond
LDPC codes case just the sub-graph induced by the erasure pattern is involved to BNs) involved in an equation are selected with a uniform distribution,
in the erasure recovery process. resulting for large blocks in Poisson-distributed input symbol degrees.
LIVA: GRAPH-BASED ANALYSIS AND OPTIMIZATION OF CONTENTION RESOLUTION DIVERSITY SLOTTED ALOHA 481
1
respect to 𝑞 must be less or equal than one, i.e. 𝑓 ′ (0) ≤ 1.
This turns in 𝜆′ (0)Λ′ (1)𝐺 = 𝜆2 Λ′ (1)𝐺 ≤ 1 and hence in the 0.9
∗ 1
𝐺 ≤ . (7)
𝜆2 Λ′ (1) 0.7
qi=λ(1−ρ(1−qi−1))
In the IRSA case, this bound is the counterpart of a similar 0.6
i
q
0.4
TABLE I
T HRESHOLDS COMPUTED FOR DIFFERENT DISTRIBUTIONS and hence 𝐶2 = 𝑇2 (𝐺) log (1 + 𝑃/(2𝑁 𝐺)), while for IRSA,
𝐷 = Λ′ (1)𝐺 and 𝐶3 = 𝑇3 (𝐺) log (1 + 𝑃/(Λ′ (1)𝑁 𝐺)),
Distribution, Λ(𝑥) 𝐺∗ where 𝑇2 (𝐺) and 𝑇3 (𝐺) are the throughput vs. offered traffic
0.5102𝑥2 + 0.4898𝑥4 0.868 functions of CRDSA and IRSA, for which a closed-form ex-
pression is not available. By fixing the overall received signal
0.5631𝑥2 + 0.0436𝑥3 + 0.3933𝑥5 0.898
power, and hence the signal to noise ratio 𝑃/𝑁 = 𝐸𝑠 /𝑁0 ,
0.5465𝑥2 + 0.1623𝑥3 + 0.2912𝑥6 0.915 it is possible to compare the efficiency of the schemes w.r.t.
0.5𝑥2 + 0.28𝑥3 + 0.22𝑥8 0.938 the channel capacity limit in terms of normalized efficiency
as 𝜂˜𝑖 = 𝐶𝑖 /𝐶𝑟𝑒𝑓 .
0.4977𝑥2 + 0.2207𝑥3 + 0.0381𝑥4
+ 0.0756𝑥5 +
0.0398𝑥6 + 0.0009𝑥7 + 0.0088𝑥8 + 0.0068𝑥9 +
0.0030𝑥11 + 0.0429𝑥14 + 0.0081𝑥15 + 0.0576𝑥16 0.965 VI. N UMERICAL R ESULTS
Simulation results are presented next. The simulations have
been carried out at two levels. A first type of simulations
the sake of comparison, we computed the threshold of a 4- deals with the MAC layer only. In this case, we consid-
regular distribution, i.e. a distribution with constant repetition ered that a burst is recovered if and only if there is no
rate 4 [14], which is 𝐺∗ = 0.772. Thus, asymptotically the interference contribution in the corresponding slot (i.e., no
irregular distribution with maximum repetition rate equal to collision happened or the contributions of all the colliding
4 permits to enhance the throughput of roughly 12% w.r.t. bursts have been cancelled). A second type of simulations
the 4-regular CRDSA case. Similarly, the optimized distri- included a complete implementation of the signal waveform
bution with maximum repetition rate 5 reaches a threshold received at the burst demodulator (comprising, apart from the
𝐺∗ = 0.898, while for the 5-regular CRDSA case [14] the Gaussian noise, random phase/frequency/timing offsets) and of
threshold is 𝐺∗ = 0.701. In this case, the throughput gain is the physical layer receiver algorithms. In this case, an actual
nearly 28%. IC mechanism has been used (details in the Appendix B)
and complemented by the forward error correcting scheme
V. R EMARKS ON THE N ORMALIZED E FFICIENCY included in the last version of the DVB-RCS standard [4],
The comparisons carried out so far assume the same phys- [26]. A comparison between the results obtained by the two
ical layer configuration (i.e., modulation and coding) and the approaches is presented, which shows that the first (MAC
same peak transmitting power for all the analyzed schemes layer) approach, despite of its simplicity, tightly matches the
(SA, CRDSA, IRSA). This assumption is correct for many results obtained through a complete simulation of the physical
concrete applications, where the peak power available for layer algorithms (which is indeed much more complex), at
the terminal transmissions is bounded by practical reasons least down to moderate-low packet loss rates.14 In the follow-
(e.g. performance of the amplifiers and/or by regulations on ing, unless otherwise stated, by “simulations” we will denote
the spectrum usage). In this condition, the choice of the MAC layer simulations. No capture effect, which may lead
modulation/coding scheme used for protecting each burst is to throughput gains, is considered. For IRSA, we adopted the
tailored to the signal-to-noise ratio (SNR) with which the distribution Λ3 (𝑥) introduced in Section IV-B.
bursts are received. Hence, SA, CRDSA and IRSA would A first set of simulations assumes a fixed frame size of
transmit with the same spectral efficiency, and the throughput 𝑛 = 200 slots, which is considered among the typical values
comparison among the different schemes reflects the actual for CRDSA and IRSA in interactive satellite systems [9].
amount of information that is conveyed by them. Recall that the number of users attempting a transmission
It is nevertheless clear that CRDSA/IRSA require on aver- within the frame is given by 𝑚 = 𝐺𝑛. In Fig. 5, the
age more power than SA. This is due to the average number reference throughput curve for SA and the asymptotic curves
of packet repetitions required by the schemes, which is (by (obtained by the iterative IC analysis) for CRDSA and IRSA
neglecting the retransmissions due to unresolvable collisions) are provided for 𝐺 ∈ [0, 1]. Focusing on the simulation results,
1 for SA, 2 for CRDSA (as in its original setting [9]) and with 𝐼𝑚𝑎𝑥 = 100 iterations, IRSA achieves a throughput close
in general Λ′ (1) for IRSA. Following the approach proposed to 0.8, while CRDSA does not exceed 𝑇 = 0.55. By limiting
in [3], one can compute the efficiency of a MAC scheme the iteration count to 10 (a case of interest for low-complexity
normalized to the capacity of the multiple access Gaussian implementations [9]), IRSA shows a small throughput degra-
channel under the constraint on the overall received signal dation with respect to the case of 𝐼𝑚𝑎𝑥 = 100. The relation
power (normalized efficiency). throughput vs. load is linear almost up 𝑇 = 0.7. Up to such
∑𝑚 Given the average aggregate values, most of the traffic turns into throughput. The behavior
signal power 𝑃 (𝑃 = 𝑖=1 𝑃𝑖 with 𝑃𝑖 being the aver-
age power for the 𝑖-th terminal) and the noise power 𝑁 , of IRSA when 𝐺 approaches 1 deserves further comments.
the sum-rate multiple access channel capacity is given by While for values of 𝐺 that are quite below the threshold 𝐺∗
𝐶𝑟𝑒𝑓 = log (1 + 𝑃/𝑁 ) [25]. Following [3], for a generic the advantage of CRDSA and IRSA with respect to SA is
ALOHA-based access scheme the capacity can be evaluated evident, at higher traffic values SA outperforms the contention
as 𝐶𝑖 = 𝑇𝑖 (𝐺) log (1 + 𝑃/(𝑁 𝐷)), where 𝐷 denotes the ratio resolution schemes. This is due to the threshold phenomenon
between the average transmitted power and the power used 14 Similarly, the analysis provided in [9, Sec.V] showed that the performance
for the transmission of a burst (replica). For SA, 𝐷 = 𝐺 obtained by MAC layer simulations is very close to that achieved by
and 𝐶1 = 𝐺𝑒−𝐺 log (1 + 𝑃/(𝑁 𝐺)). For CRDSA, 𝐷 = 2𝐺 simulating the entire IC process, down to 𝐸𝑠 /𝑁0 = 5 dB.
LIVA: GRAPH-BASED ANALYSIS AND OPTIMIZATION OF CONTENTION RESOLUTION DIVERSITY SLOTTED ALOHA 483
1 1
Theorical Slotted ALOHA Theorical Slotted ALOHA
Asymptotic performance for CRDSA Asymptotic performance for IRSA
Asymptotic performance for IRSA IRSA − Simulation n=50
0.9 0.9
Slotted ALOHA − Simulation IRSA − Simulation n=200
CRDSA − Simulation (Imax=100) IRSA − Simulation n=1000
IRSA − Simulation (Imax=10)
0.8 IRSA − Simulation (Imax=100) 0.8
IRSA − Simulation (Imax=10) − Actual IC
0.7 0.7
Normalized Throughput, T
Normalized Throughput, T
0.6 0.6
0.5 0.5
0.4 0.4
0.3 0.3
0.2 0.2
0.1 0.1
0 0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Normalized Offered Traffic, G Normalized Offered Traffic, G
Fig. 5. Simulated and asymptotic throughput for SA, CRDSA, and for IRSA Fig. 6. Simulated and asymptotic throughput for SA and IRSA with Λ3 (𝑥) =
with Λ3 (𝑥) = 0.5𝑥2 + 0.28𝑥3 + 0.22𝑥8 . 𝑛 = 200. The results obtained 0.5𝑥2 + 0.28𝑥3 + 0.22𝑥8 . Various MAC frame sizes. 𝐼𝑚𝑎𝑥 = 20.
by simulating the actual IC mechanism (specified in the Appendix B) are
denoted by the marker ′ □′ , and are referred to a SNR at 𝐸𝑏 /𝑁0 = 2 dB.
0 Es/N0=0 dB Es/N0=6 dB
10
1 1
SA SA
0.9 CRDSA 0.9 CRDSA
IRSA IRSA
0.8 0.8
0.7 0.7
Normalized Efficiency
Normalized Efficiency
0.6 0.6
−1
10
0.5 0.5
0.4 0.4
0.3 0.3
0.2 0.2
0.1 0.1
PLR
−2
10 0 0
0 0.5 1 1.5 2 0 0.5 1 1.5 2
G G
Slotted ALOHA
−3 2−regular CRDSA E /N =12 dB E /N =15 dB
10 s 0 s 0
4−regular CRDSA 1 1
SA SA
IRSA with Λ3(x) 0.9 0.9
CRDSA CRDSA
IRSA with Λ4(x) 0.8
IRSA
0.8
IRSA
Normalized Efficiency
Normalized Efficiency
Λ4(x) − Actual IC 0.6 0.6
−4
10 0.5 0.5
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Normalized Offered Traffic, G 0.4 0.4
0.3 0.3
0.2 0.2
Fig. 7. Packet loss rates for SA, CRDSA with 2 and 4 repetitions, and for 0.1 0.1
loss rate. Simulation results, including an actual IC mechanism 𝑙 collisions took place, the probability to decode one burst is
described in the Appendixes, substantiate the validity of the hence given by
presented analysis and confirm the high efficiency of the 𝑙−2 ( )
∑ 𝑙−1
proposed approach down to a signal-to-noise ratio as a low 1 − 𝑝 = 𝑤𝑙,𝑙−1 (1 − 𝑞)𝑙−1 + 𝑤𝑙,𝑡 (1 − 𝑞)𝑡 𝑞 𝑙−1−𝑡 ,
as 𝐸𝑏 /𝑁0 = 2 dB. The introduced graph representation 𝑡=0
𝑡
constitutes a novel application of bipartite graphs to the
where the term 𝑤𝑙,𝑙−1 (1 − 𝑞)𝑙−1 corresponds
(𝑙−1) to (8) (case of
analysis iterative receiver algorithms. ∑
no capture effect) and the term 𝑙−2 𝑤
𝑡=0 𝑙,𝑡 𝑡 (1 − 𝑞) 𝑡 𝑙−1−𝑡
𝑞
accounts for the capture effect. By averaging over the BN
A PPENDIX A distribution we finally get the modification of (9) as
A NALYSIS IN P RESENCE OF I MPAIRMENTS AND C APTURE
∑ ∑ 𝑙−1 ( )
E FFECT 𝑙−1
𝑝𝑖 = 1 − 𝜌𝑙 𝑤𝑙,𝑡 (1 − 𝑞𝑖 )𝑡 𝑞𝑖𝑙−1−𝑡 . (11)
The analysis developed in Section IV relies on the hy- 𝑡=0
𝑡
𝑙
pothesis that a burst can be recovered with probability 1
whenever the 𝑙 − 1 bursts colliding in the same slot have A PPENDIX B
been revealed. Nevertheless, the proposed analysis can be I MPLEMENTATION OF THE IC MECHANISM
adapted to take into account more general conditions. To do Let’s consider the case where 𝑙 users attempt a transmis-
so, let us first introduce the weights 𝑤𝑙 , 𝑙 = 1 . . . ∞, such sion within the same slot. We stick to the case of perfect
that 𝑤𝑙 represents the probability that a burst is successfully power control and equal channel condition (gain) among the
decoded after removing the interference contribution of the users. We denote by 𝑢(𝑖) (𝑡) the complex baseband pulse
𝑙 − 1 colliding bursts [32]. We keep on denoting by 1 − 𝑞 amplitude modulation (PAM) signal transmitted by the 𝑖-
the probability that one among the 𝑙 − 1 colliding bursts has ∑𝑛𝑠 (𝑖)
th user, i.e. 𝑢(𝑖) (𝑡) = 𝑘=1 𝑏𝑘 𝛾(𝑡 − 𝑘𝑇𝑠 ), where 𝑛𝑠 is
been revealed elsewhere. It turns that the probability that the (𝑖)
the number of symbols composing the burst, {𝑏𝑘 } is the
remaining burst is successfully decoded is sequence of such
{√ symbols } and 𝑇𝑠 is the symbol period. By
1 − 𝑝 = 𝑤𝑙 (1 − 𝑞)𝑙−1 . (8) 𝛾(𝑡) = ℱ −1 𝐶𝑅(𝑓 ) we denote the pulse shape, being
𝐶𝑅(𝑓 ) the frequency response of the raised-cosine filter.
It follows that (2) can be rewritten as Each contribution is received with a random delay 𝜖𝑖 , a
∑ ( )
𝑝𝑖 = 𝜌𝑙 1 − 𝑤𝑙 (1 − 𝑞𝑖 )
𝑙−1
= 1 − 𝜌˜ (1 − 𝑞𝑖 ) , (9) random frequency offset 𝑓𝑖 ∼ 𝒰[−𝑓𝑚𝑎𝑥 , 𝑓𝑚𝑎𝑥 ] and a random
𝑙
phase offset 𝜙𝑖 ∼ 𝒰[0, 2𝜋).15 The received ∑𝑙signal(𝑖) after
∑ the matched filter (MF) is given by 𝑟(𝑡) = 𝑖=0 𝑧 (𝑡) ∗
𝑙−1
where 𝜌˜(𝑥) ≜ 𝑙 𝜌𝑙 𝑤𝑙 𝑥 ∑ . Being from (5) 𝜌(𝑥) = ℎ(𝑡) + 𝑛(𝑡) where 𝑛(𝑡) is the Gaussian noise contribution,
′ 𝑙−1
exp (−𝐺Λ (1)(1 − 𝑥)) = 𝑙 𝜌𝑙 𝑥 , we thus derive the ℎ(𝑡) = 𝛾 ∗ (−𝑡) is the MF impulse response and 𝑧 (𝑖) (𝑡) =
coefficients 𝜌𝑙 of the Taylor series around 𝑥0 = 0, resulting ∑𝑛𝑠 (𝑖)
𝑘=1 𝑏𝑘 𝛾(𝑡 − 𝑘𝑇𝑠 − 𝜖𝑖 ) exp(𝑗2𝜋𝑓𝑖 𝑡 + 𝑗𝜙𝑖 ). Assuming fre-
in quency shifts that are small w.r.t. the signal bandwidth (i.e.,
1 ′
𝜌𝑙 = (𝐺Λ′ (1))𝑙−1 𝑒−𝐺Λ (1) . (10) 𝑓𝑚𝑎𝑥 𝑇𝑠 ≪ 1), the received signal can be approximated by
(𝑙 − 1)!
∑ 𝑙−1
𝑙
∑
Recalling ∑that 𝜌(𝑥) = Ψ(𝑥) and that 𝜌(𝑥) = 𝑙 𝜌𝑙 𝑥 , 𝑟(𝑡) ≃ ˜(𝑖) (𝑡 − 𝜖𝑖 )𝑒𝑗2𝜋𝑓𝑖 𝑡+𝑗𝜙𝑖 + 𝑛(𝑡).
𝑢 (12)
𝑙
Ψ(𝑥) = 𝑙 Ψ 𝑙 𝑥 , we have 𝜌 𝑙 = Ψ 𝑙−1 . It turns that (10) 𝑖=1
can be alternatively obtained by noting that for large 𝑛 the
number of collisions in a slot follows a Poisson distribution, Here, 𝑢˜(𝑖) (𝑡) is the response of the MF to 𝑢(𝑖) (𝑡). We assume
Ψ𝑙 = (1/𝑙!)(𝐺Λ′ (1))𝑙 exp(−𝐺Λ′ (1)). The coefficients given next that the contribution to be recovered is the one for 𝑖 = 1,
by (10) can be used in (9) together with (1) to analyze the and the residual 𝑙 − 1 contributions 𝑢 ˜(2) (𝑡), 𝑢˜(3) (𝑡), . . . , 𝑢
˜(𝑙) (𝑡)
iterative IC process for a given choice of the probabilities represent the interference to be cancelled. We consider more-
{𝑤𝑙 }. As an example, one could analyze the case where over that the 𝑙 − 1 interfering signals correspond to bursts that
𝑤𝑙 = 1 for 𝑙 ≤ 𝑙, while 𝑤𝑙 = 0 for 𝑙 > 𝑙. This setting have been correctly decoded in other slots.
represents the case where a non-linear effect (e.g. clipping, To proceed with the IC, it is necessary to estimate the set of
saturation) jeopardizes the success of the IC process whenever parameters {𝜖𝑖 , 𝑓𝑖 , 𝜙𝑖 }, for 𝑖 = 2 . . . 𝑙. As discussed in [9], we
too many collisions take place in a slot. In this case, 𝜌˜(𝑥) is consider the case where 𝜖𝑖 and 𝑓𝑖 can be accurately estimated
the truncation of the Taylor series of 𝜌(𝑥) at the 𝑙-th term, i.e. on the corresponding burst replica that have been already
recovered, and that their values remain constant through the
𝑙
∑ ′
𝑙
∑ 1 frame. As pointed out in [9], this argument does not hold for
𝜌˜(𝑥) = 𝜌𝑙 𝑥𝑙−1 = 𝑒−𝐺Λ (1) (𝑥𝐺Λ′ (1))𝑙−1 . the phase rotation terms 𝜙𝑖 , which may not be stable from
(𝑙 − 1)!
𝑙=1 𝑙=1 a slot to another one. We need therefore to estimate 𝜙𝑖 for
In a similar manner, an eventual capture effect can be taken each burst directly on the slot where we want to eliminate its
into account in the analysis. To do so, it is sufficient to contribution. An estimator for 𝜙𝑖 is suggested in [9], which
generalize the above-presented approach. We introduce the takes advantage of a training sequence included in each burst.
weight 𝑤𝑙,𝑡 , which denotes the probability that a burst replica 15 𝒰 [𝑎, 𝑏] denotes the uniform distribution over the closed interval [𝑎, 𝑏],
can be decoded in a slot with 𝑙 colliding packets, after re- while 𝒰 [𝑎, 𝑏) denotes the uniform distribution over the left-closed right-open
moving 𝑡 interference contributions. Considering a slot where interval [𝑎, 𝑏).
486 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 2, FEBRUARY 2011
0
10
A finer estimation can be obtained by a data aided (DA) AWGN (Reference)
l=2 bursts
(𝑖)
approach. Recall in fact that the symbol sequences {𝑏𝑘 } l=4 bursts
l=8 bursts
(for 𝑖 = 2 . . . 𝑙) are known at the receiver, since they can
be reconstructed from the twin packets decoded in other slots. −1
10
The IC works as follows. We denote by 𝑦 (𝑖) (𝑡) the signal at
the input of the phase estimator for the 𝑖-th contribution. In
the first step, the input signal is given by 𝑦 (2) (𝑡) = 𝑟(𝑡) and
the phase of the first interfering user (𝑖 = 2) is estimated as
PER
−2
10
{𝑛 }
∑ 𝑠 ( )∗
𝜙ˆ2 = arg
(2) (2)
𝑦 𝑏
𝑘 𝑘
𝑘=1 −3
10
with
(2)
𝑦𝑘 = 𝑦 (2) (𝑘𝑇𝑠 + 𝜖2 )𝑒−𝑗2𝜋𝑓2 (𝑘𝑇𝑠 +𝜖2 ) .
After the estimation of the phase offset for the first in- −4
10
1 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8 1.9 2
terferer, the corresponding signal can be reconstructed as Eb/N0 [dB]
ˆ
˜(2) (𝑡 − 𝜖2 )𝑒𝑗2𝜋𝑓2 𝑡+𝑗 𝜙2 and its contribution can be removed
𝑢
from (12), i.e. Fig. 9. PER vs. 𝐸𝑏 /𝑁0 for the (4096, 1992) S-IRA code of the DVB-
ˆ2
RCS+M standard. QPSK modulation, 50 iterations of the belief propagation
𝑦 (3) (𝑡) = 𝑦 (2) (𝑡) − 𝑢
˜(2) (𝑡 − 𝜖2 )𝑒 𝑗2𝜋𝑓2 𝑡+𝑗 𝜙
. algorithm. Various number (𝑙) of colliding packets.
[2] L. G. Roberts, “ALOHA packet systems with and without slots and [22] L. Kleinrock and S. Lam, “Packet switching in a multiaccess broadcast
capture," ARPANET System Note 8 (NIC11290), June 1972. channel: performance evaluation," IEEE Trans. Commun., vol. 23, no. 4,
[3] N. Abramson, “The throughput of packet broadcasting channels," IEEE pp. 410-423, Apr. 1975.
Trans. Commun., vol. COM-25, no. 1, pp. 117-128, Jan. 1977. [23] M. Luby, “LT codes," in Proc. 43rd Annual IEEE Symp. Foundations
[4] “Interaction channel for satellite distribution systems," ETSI EN 301 790 Computer Science, Vancouver, Canada, Nov. 2002.
v1.5.1, DVB, 2009. [24] R. Storn and K. Price, “Differential evolution–a simple and efficient
[5] D. Raychaudhuri and K. Joseph, “Channel access protocols for Ku- heuristic for global optimization over continuous spaces," J. Global
band VSAT networks: a comparative evaluation," IEEE Commun. Mag., Optimization, vol. 11, no. 4, pp. 341-359, Dec. 1997.
vol. 26, no. 5, pp. 34-44, May 1998. [25] T. M. Cover and J. A. Thomas, Elements of Information Theory,
[6] D. Raychaudhuri, “ALOHA with multipacket messages and ARQ-type 2nd edition. Wiley, 2006, chapter 15.
retransmission protocols-throughput analysis," IEEE Trans. Commun., [26] G. Liva, M. Papaleo, C. Niebla, S. Scalise, S. Cioni, A. Vanelli-Coralli,
vol. 32, no. 2, pp. 148-154, Feb. 1984. G. E. Corazza, P. Kim, and H. J. Lee, “The very short frame of mobile
[7] D. Bertsekas and R. G. Gallager, Data Networks. Upper Saddle River, DVB-RCS: code design and QoS performance," Int. J. Satellite Commun.
NJ: Prentice-Hall, Inc., 1987. Netw. (Wiley), vol. 28, no. 3-4, pp. 209-231, May-Aug. 2010.
[8] G. L. Choudhury and S. S. Rappaport, “Diversity ALOHA–a random [27] C. Di, D. Proietti, T. Richardson, E. Telatar, and R. Urbanke, “Finite
access scheme for satellite communications," IEEE Trans. Commun., length analysis of low-density parity-check codes on the binary erasure
vol. 31, no. 3, pp. 450-457, Mar. 1983. channel," IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1570-1579, June
[9] E. Casini, R. De Gaudenzi, and O. del Rio Herrero, “Contention 2002.
resolution diversity slotted ALOHA (CRDSA): an enhanced random [28] A. Orlitsky, K. Viswanathan, and J. Zhang, “Stopping set distribution
access scheme for satellite access packet networks," IEEE Trans. Wireless of LDPC code ensembles," IEEE Trans. Inf. Theory, vol. 51, no. 3, pp.
Commun., vol. 6, no. 4, pp. 1408-1419, Apr. 2007. 929-953, Mar. 2005.
[10] T. M. Cover, Some Advances in Broadcast Channels, chapter in the [29] M. Chiani and A. Ventura, “Design and performance evaluation of
book, “Advances in Communication Theory," vol. 4, edited by A. J. some high-rate irregular low-density parity-check codes," in Proc. IEEE
Viterbi. Academic Press, 1975. GLOBECOM, San Antonio, TX, Nov. 2001, pp. 990-994.
[11] S. Verdú, Multiuser Detection. Cambridge University Press, 1998, [30] Y. Zhang and W. E. Ryan, “Structured IRA codes: performance analysis
chapter 7. and construction," IEEE Trans. Commun., vol. 55, no. 5, pp. 837-844,
[12] A. J. Viterbi, “Very low rate convolutional codes for maximum theoret- May 2007.
ical performance of spread-spectrum multiple-access channels," IEEE J. [31] W. E. Ryan and S. Lin, Channel Codes - Classical and Modern.
Sel. Areas Commun., vol. 8, no. 4, pp. 641-649, May 1990. Cambridge University Press, 2009.
[13] P. Patel and J. Holtzman, “Analysis of a simple successive interference [32] G. Liva, “A slotted ALOHA scheme based on bipartite graph optimiza-
cancellation scheme in a DS/CDMA system," IEEE J. Sel. Areas Com- tion," in Proc. International ITG Conf. Source Channel Coding, Siegen,
mun., vol. 12, no. 5, pp. 796-807, June 1994. Germany, Jan. 2010.
[14] O. del Rio Herrero and R. De Gaudenzi, “A high-performance MAC [33] C. Herzet, N. Noels, V. Lottici, H. Wymeersch, M. Luise,
protocol for consumer broadband satellite systems," in Proc. 27th AIAA M. Moeneclaey, and L. Vandendorpe, “Code-aided turbo synchroniza-
International Commun. Satellite Syst. Conf. (ICSSC), Edinburgh, UK, tion," in IEEE Proc., vol. 95, no. 6, pp. 1255-1271, June 2007.
June 2009.
[15] Next generation DVB-RCS standardization group. [Online]. Available: Gianluigi Liva was born in Spilimbergo, Italy, on
http://www.dvb.org/technology/dvbrcs/. July 23rd, 1977. He received the Laurea in Elec-
[16] C. Morlet, A. B. Alamanac, G. Gallinaro, L. Erup, P. Takats, and tronic Engineering in 2002, and the Ph.D. degree
A. Ginesi, “Introduction of mobility aspects for DVB-S2/RCS broadband in 2006 at DEIS, University of Bologna (Italy). His
systems," IOS Space Commun., vol. 21, no. 1-2, pp. 5-17, 2007. main research interests include satellite communi-
[17] R. Tanner, “A recursive approach to low complexity codes," IEEE Trans. cation systems, random access techniques and error
Inf. Theory, vol. 27, no. 5, pp. 533-547, Sep. 1981. control coding. Since 2003 he has been involved
[18] M. Luby, M. Mitzenmacher, and A. Shokrollahi, “Analysis of random in the research of channel codes for high data rate
processes via and-or tree evaluation," in Proc. 9th Annual ACM-SIAM CCSDS (Consultative Committee for Space Data
Symp. Discrete Algorithms, San Francisco, CA, USA, Jan. 1998. Systems) missions, in collaboration with the Eu-
[19] M. Luby, M. Mitzenmacher, A. Shokrollahi, and D. A. Spielman, ropean Space Operations Centre of the European
“Improved low-density parity-check codes using irregular graphs," IEEE Space Agency (ESA-ESOC). From October 2004 to April 2005 he was
Trans. Inf. Theory, vol. 47, no. 2, pp. 585-598, Feb. 2001. researching at the University of Arizona as visiting student, where he
[20] T. J. Richardson, A. Shokrollahi, and R. L. Urbanke, “Design of was involved in the design of low-complexity coding systems for space
capacity-approaching irregular low-density parity-check codes," IEEE communication systems. He is currently with the Institute of Communications
Trans. Inf. Theory, vol. 47, no. 2, pp. 619-637, Feb. 2001. and Navigation at the German Aerospace Center (DLR). He is active in the
[21] R. G. Gallager, Low-Density Parity-Check Codes. Cambridge, MA: DVB-SH and in the DVB-RCS Mobile standardization groups. In 2010 he
M.I.T. Press, 1963. has been appointed guest lecturer for channel coding at the Institute for
Communications Engineering (LNT) of the Technische Universität München
(TUM). He is IEEE member and he serves IEEE as reviewer for transactions,
journals and conferences.