Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
TRANSMIT POWER CONTROL IN A SPREAD SPECTRUM UNSLOTTED RANDOM ACCESS COMMUNICATION SYSTEM.
Document Type and Number:
WIPO Patent Application WO/2014/108719
Kind Code:
A1
Abstract:
A method of transmitting data packets from a terminal (T) to a gateway receiver (GWR) over a channel shared with other terminals using an unslotted spread spectrum random access protocol, characterized in that transmission is performed at a transmit power level given by the sum of a deterministic term, function of a communication link budget, and of a random term, following a predetermined probability distribution. A method of operating a communication system, based on said method of transmitting data packets. A communication system and a terminal for implementing said methods.

Inventors:
DE GAUDENZI RICCARDO (NL)
Application Number:
PCT/IB2013/000547
Publication Date:
July 17, 2014
Filing Date:
January 11, 2013
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
AGENCE SPATIALE EUROPÉENNE (FR)
International Classes:
H04W52/14; H04W52/10; H04W52/24; H04W52/26
Foreign References:
EP2159926A12010-03-03
EP1686746A12006-08-02
EP2159926A12010-03-03
Other References:
FOTI G ET AL: "Spread-Spectrum Techniques for the Provision of Packet Access on the Reverse Link of Next-Generation Broadband Multimedia Satellite Systems", IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, IEEE SERVICE CENTER, PISCATAWAY, US, vol. 22, no. 3, 1 April 2004 (2004-04-01), pages 574 - 583, XP011110207, ISSN: 0733-8716, DOI: 10.1109/JSAC.2004.823440
O. DEL RIO HERRERO ET AL.: "Spread-spectrum techniques for the provision of packet access on the reverse link of next-generation broadband multimedia satellite systems", IEEE JOURNAL ON SEL. AREAS IN COMM., vol. 22, no. 3, April 2004 (2004-04-01), pages 574 - 583, XP011110207, DOI: doi:10.1109/JSAC.2004.823440
A. J. VITERBI: "Very Low Rate Convolutional Codes for Maximum Theoretical Performance of Spread-Spectrum Multiple-Access Channels", IEEE JOURNAL ON SEL. AREAS IN COMM., vol. 8, no. 4, May 1990 (1990-05-01), pages 641 - 649, XP001064796, DOI: doi:10.1109/49.54460
G. CAIRE; S. GUEMGHAR; A. ROUMY; S. VERDU: "Maximizing the spectral efficiency of coded CDMA under successive decoding", IEEE TRANS. ON INFORMATION THEORY, January 2004 (2004-01-01), pages 152 - 164
G. CAIRE; R. R. MULLER; T. TANAKA: "Iterative multiuser joint decoding: Optimal power allocation and low-complexity implementation", IEEE TRANS. ON INFORMATION THEORY, September 2004 (2004-09-01), pages 1950 - 1973, XP011118018, DOI: doi:10.1109/TIT.2004.833351
J. HOU; J. E. SMEE; H. D. PFISTER; S. TOMASINI: "Implementing Interference Cancellation to Increase the EV-DO Rev. A Reverse Link Capacity", IEEE COMM. MAGAZINE, February 2006 (2006-02-01), pages 96 - 102, XP001240364
O. DEL RIO HERRERO; R. DE GAUDENZI: "High Efficiency Satellite Multiple Access Scheme for Machine-to-Machine Communications", IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, vol. 4, no. 4, October 2012 (2012-10-01), pages 2961 - 2989, XP011467222, DOI: doi:10.1109/TAES.2012.6324672
S. VERDU; S. SHAMAI: "Spectral efficiency of CDMA with random spreadingl", IEEE TRANSACT. ON INFORMATION THEORY, vol. 45, March 1999 (1999-03-01), pages 622 - 640, XP011027309
HOU; J. E. SMEE; H. D. PFISTER; S. TOMASINI: "Implementing Interference Cancellation to Increase the EV-DO Rev. A Reverse Link Capacity", IEEE COMM. MAGAZINE, February 2006 (2006-02-01), pages 96 - 102, XP001240364
Attorney, Agent or Firm:
PRIORI, Enrico et al. (36 rue de St Pétersbourg, Paris, FR)
Download PDF:
Claims:
CLAIMS

1. A method of transmitting data packets from a terminal (T) to a gateway receiver (GWR) over a channel shared with other terminals using an unslotted spread spectrum random access protocol, characterized in that transmission is performed at a transmit power level given by the sum of a deterministic term, function of a communication link budget, and of a random term, following a predetermined probability distribution, both said terms being expressed in decibels.

2. A method of transmitting data according to claim 1 , further comprising a step of receiving a value for at least one parameter chosen from the list comprising: a noise level at the input of said gateway receiver, a satellite user downlink Effective Isotropic Radiated Power, a target packet carrier-to-noise power ratio and a service profile, said value or values being broadcast by a central station, and of using said received value for computing said predetermined probability distribution.

3. A method of transmitting data according to any of the preceding claims, wherein said gateway receiver performs successive interference cancellation of the received data packets, and wherein said predetermined probability distribution is chosen such that, when used by all the terminals sharing the channel, it maximizes the channel throughput subject to at least transmit power level constraints.

4. A method of transmitting data according to claim 3, wherein said predetermined probability distribution is chosen such that, when used by all the terminals sharing the channel, it minimizes the difference in signal to noise plus interference ratio - SNIR - between data packets within successive interference cancellation.

5. A method of transmitting data according to any of claims 3 or 4, wherein said predetermined probability distribution is a uniform distribution in decibels, comprised between a minimum value min and a maximum value amax-

6. A method of transmitting data according to any of claims 3 to 5, comprising the steps of:

a. randomly generating a trial value for said random term of the transmit power level following a probability distribution which is uniform in decibels, comprised between a minimum and a maximum value chosen such that they optimize the channel throughput without taking into account any transmit power level constraint;

b. if the sum of said random term and said deterministic term does not exceed a predetermined limit, retaining its value as the transmit power level; otherwise, repeating said step a.

7. A method of transmitting data according to any of claims 3 to 5, comprising the steps of:

a. randomly generating a value for said random term of the transmission power level following a probability distribution which is uniform in decibel, comprised between a minimum and a maximum value chosen such that they optimize the channel throughput without taking into account any power constraint;

b. if the sum of said random term and said deterministic term does not exceed a predetermined limit, retaining its value as the transmit power level; otherwise, retain said predetermined limit as said transmit power level.

8. A method of transmitting data according to any of claims 3 to 5, wherein said successive interference cancellation is an iterative successive interference cancellation.

9. A method according to any of the preceding claims, further comprising a step of blocking transmission when an attenuation level of the communication link between the terminal and the gateway exceeds a predetermined threshold.

10. A method according to any of the preceding claims, further comprising a step of computing said deterministic term of the transmit power level, said step including estimating an attenuation level of the communication link between the terminal and the gateway from signals transmitted by said gateway and received by said terminal.

1 1 A method according to claim 10, wherein said step of computing said deterministic term of the transmit power level includes receiving the value of at least one parameter of said communication link budget, other than said attenuation level, broadcast by a central station.

12. A method of operating a communication system comprising:

using a plurality of terminals (Ti ... TN) for transmitting data packets to a gateway receiver (GWR) over a shared channel using an unslotted spread spectrum random access protocol; and

using said gateway receiver to receive said data packets and detect them using successive interference cancellation;

characterized in that each said terminal transmits said data packets using a method according to any of the preceding claims.

13. A method according to claim 12, comprising no synchronization or coordination between said terminals.

14. A method according to any of claim 12 or 13, wherein said successive interference cancellation is an iterative successive interference cancellation.

15. A terminal (T) comprising an emitter (TE) for transmitting data packets over a communication channel using an unslotted spread spectrum random access protocol and a processor (TPR) for determining a transmit power level, said terminal being configured for carrying out a method according to any of claims 1 to 1 1.

16. A communication system comprising a plurality of terminals (T1 ... TN) according to claim 15 and a gateway receiver (GWR) communicating over a shared communication channel, the gateway receiver comprising a detector (GWD) for receiving and detecting data packets transmitted by said terminals over said shared communication channel using successive interference cancellation.

17. A communication system according to claim 16, wherein said gateway receiver performs iterative successive interference cancellation.

Description:
TRANSMIT POWER CONTROL IN A SPREAD-SPECTRUM UNSLOTTED RANDOM ACCESS COMMUNICATION SYSTEM

The invention relates to a method of transmitting data packets from a terminal to a gateway receiver over a channel shared with other terminals using an unslotted spread spectrum random access protocol, characterized by a decentralized control of the transmit power allowing to optimize the channel throughput.

The invention also relates to a method of operating a communication system with spread-spectrum unslotted random access, to such a communication system and to a user terminal, all implementing said decentralized control of the transmit power.

The invention applies in particular, albeit not exclusively, to the implementation of the return link of a satellite broadcast system, wherein a large number of user terminals transmit data packets to a gateway over a satellite channel with a very low duty cycle. In a system according to the invention, the gateway receiver performs packet detection using conventional or iterative successive interference cancellation.

The invention has potential applications both for mobile satellite communications at L/S band and for fixed satellite applications, in which the return link usually operates at Ka/Ku/C-band.

Among the mobile applications it is possible to cite:

• Data services

> Mobile broadband - anywhere, anytime (vehicles, trains, planes)

> Public safety & first-responder services

> Issue distress beacons in the event of an accident

> Emergency alerting

> Monitoring of traffic flows

• Environmental monitoring

Combination with GNSS applications (GPS, Galileo, etc)

> Location-aware services > Vehicle Information

> Deliver real time information on the road traffic

> Automatic paying of highway or city toll

And among the fixed applications:

• Connected TV: as return link for interactive STB/TV (Set-top Box Television), coupled with a forward link in Ku-band, for services such as:

Voting

Payment transactions

Personal & domotic services

iv. Limited web browsing

• M2M: as return link for M2M/loT (Machine-to-Machine/lnternet of Things) applications such as:

i. Data acquisition

ii. Alarm triggering

The invention has also applications in wireless terrestrial systems, e.g. in the 3GPP and 3GPP2 standards or their evolutions.

All or most of these applications concern non-real-time messaging (data collection or short text messaging), wherein a great number of user terminals transmits short messages with a very low duty-cycle. Typically, individual messages have a length of a few tens to a few hundreds of bytes, and a low bit rate (e.g. a few kbps to a few tens of kbps). The delivery delay should be from a few seconds to a few minutes (even more if the terminal is not in visibility of the satellite). The typical activity factor is estimated in a few tens of Kbytes per user per day (e.g. 100 messages of 100 bytes = 10 KB), i.e. a very low one.

Such a low duty-cycle traffic makes efficient implementation of the return link (or uplink) challenging, because:

- Classical Demand Assignment Multiple Access - DAMA or Contention Free DAMA do not work properly with this type of traffic characterized by large number of users with unpredictable low duty-cycle traffic patterns; closed loops for timing synchronization as required for slotted random access systems such as Slotted-Aloha or the more recently proposed Contention Resolution Diversity Slotted Aloha (CRDSA) - see document EP 1 686 746 - would require an unacceptable signalling overhead,

- power control as required for spread Aloha random access system would require an unacceptable signalling overhead.

The Spread-Spectrum Aloha (also known as "Spread Aloha") protocol - SSA - described in the paper by O. del Rio Herrero et al. "Spread- spectrum techniques for the provision of packet access on the reverse link of next-generation broadband multimedia satellite systems", IEEE Journal on Sel. Areas in Comm., vol. 22, no. 3, pp. 574 - 583, Apr. 2004, shows potentially interesting features. It provides a higher throughput capability than CRDSA for the same Packet Loss Ratio target under equal power multiple access conditions and using powerful physical layer FEC (Forward Error Correction), i.e. of the order of G=0.45 b/s/Hz for a packet loss ratio of 10 "3 ). Furthermore SSA allows operating in a truly asynchronous mode, i.e. without the need of synchronizing the terminals to ensure "slotted" operation. The basic principle of the Spread-Aloha scheme is the following: when a user terminal has a packet to transmit, it picks up at random one spreading sequence among a predetermined set of sequences, and one possible spreading code phase, and transmits it (a single spreading sequence may be sufficient in some applications). If two messages, transmitted using a same spreading sequence and spreading code phase, collide and are lost, transmission is tried again after a random delay. One of the major weakness of SSA is it fragility to packet power unbalance conditions which is heavily curtailing its performance. In a random access satellite network it is very difficult to achieve tight power control thus SSA practically achievable efficiency is very modest.

Document EP 2 159 926 describes an improvement of SSA (called E-SSA, for Enhanced Spread Spectrum Aloha), using Iterative Successive Interference Cancellation to recover corrupted packets, thus increasing the throughput of the channel in particular when received packet power unbalance occurs. Contrarily to SSA, the E-SSA detection process allows to achieve higher throughput in the presence of unbalanced packets power. Document EP 2 159 926 also discloses a basic decentralized transmission control algorithm (SDUPTC: SNIR-Driven Uplink Packet Transmission Control). Its principle is simple: user terminals only transmit when the downlink signal quality is good i.e. the signal strength or better signal-to-noise plus interference ratio (SNIR) is within a certain window representative of line of sight conditions (LOS). If this is not the case the transmission is delayed until LOS conditions are verified. A simple congestion control mechanism is also disclosed, reducing the transmission rate when the channel is congested.

The invention aims at improving the E-SSA - and more general any other communication protocol using unslotted spread spectrum random access and, at the receiver, packet detection by "conventional" or iterative successive interference cancellation - by increasing the maximum achievable throughput.

According to the invention, this result is achieved by implementing a fully decentralized control of the transmit power of the terminals.

It is known in the art that the user terminal power distribution at the input of a Successive Interference Cancellation (SIC) decoder has a strong influence on the packet error ratio (PER). In particular, Viterbi (A. J. Viterbi, "Very Low Rate Convolutional Codes for Maximum Theoretical Performance of Spread-Spectrum Multiple-Access Channels", IEEE Journal on Sel. Areas in Comm. , Vol. 8, No. 4, May 1990, pp. 641-649) has shown that, in a slotted CDMA (Code Division Multiple Access) with SIC, the optimal received signals power distribution is exponential i.e. for the n-th user the power P n is given by: being L W the spreading factor, — - the symbol energy to thermal noise ratio for the lowest power user i.e. the one that will be decoded last in the SIC process. It is required that is

the minimum required SNR for achieving the required PER in the absence of MAI (Multiple Access Interference). This approach, although optimum in terms of achievable sum rate, is very impractical as it requires coordination between the user terminals to ensure they transmit with a power level which grows exponentially with the user, number. Furthermore there may be issues in providing the required transmitted EIRP (Effective Isotropic Radiated Power) dynamic range required as the maximum terminal EIRP grows exponentially with the number of active users (the terms "user", "terminal" and "user terminal" will be used indistinctly). See also:

G. Caire, S. Guemghar, A. Roumy, S. Verdu, ""Maximizing the spectral efficiency of coded CDMA under successive decoding", IEEE Trans. On Information Theory, January 2004, pp. 152 - 164;

G. Caire, R. R. Muller, T. Tanaka, "Iterative multiuser joint decoding: Optimal power allocation and low-complexity implementation", IEEE Trans. On Information Theory, Sept. 2004, pp. 1950 - 1973.

These works are based on assumptions which are incompatible with E-SSA and similar protocols:

The transmission is assumed to be continuous (in E-SSA it is bursty);

The transmission is typically slotted (in E-SSA it is unslotted);

The packets are transmitted using CDMA (in some E-SSA embodiments, a single spreading sequence can be used);

The transmit power levels are determined in a coordinated way between the users (in the case of the invention, coordination would be impractical and decentralized power control is required). Moreover, at the receiver, "simple" SIC is considered, instead of iterative SIC as adopted in E-SSA.

A paper by J. Hou, J. E. Smee, H. D. Pfister and S. Tomasini, "Implementing Interference Cancellation to Increase the EV-DO Rev. A Reverse Link Capacity", IEEE Comm. Magazine, February 2006, pp. 96-102, discusses the implementation of SIC at the base station of a terrestrial mobile system is also operating in packet mode with asynchronous mode and with no coordination among the users. According to this document, in order to achieve the maximum sum rate capacity, the user packets shall arrive with a same power level. The statement is supported by a single example, but no evidence is provided allowing its generalization. The assertion is contradicted by the results that will be discussed here.

An object of the present invention, allowing to achieve the above-mentioned goal, is a method of transmitting data packets from a terminal to a gateway receiver over a channel shared with other terminals using an unslotted spread spectrum random access protocol, characterized in that transmission is performed at a transmit power level given by the sum of a deterministic term, function of a communication link budget, and of a random term, following a predetermined probability distribution, both said terms being expressed in decibels.

Another object of the invention is a method of operating a communication system comprising: using a plurality of terminals for transmitting data packets to a gateway receiver over a shared channel using an unslotted spread spectrum random access protocol; and using said gateway receiver to receive said data packets and detect them using (preferably iterative) successive interference cancellation; characterized in that each said terminal transmits said data packets using the above method.

Yet another object of the invention is a terminal comprising an emitter for transmitting data packets over a communication channel using an unslotted spread spectrum random access protocol and a processor for determining a transmit power level, said terminal being configured for carrying out such a method. Yet another object of the invention is a communication system comprising a plurality of such terminals and a gateway receiver communicating over a shared communication channel, the gateway receiver comprising a detector for receiving and detecting data packets transmitted by said terminals over said shared communication channel using (preferably iterative) successive interference cancellation.

Additional features and advantages of the present invention will become apparent from the subsequent description, taken in conjunction with the accompanying drawings, which show:

Figures A, 1 B and 1 C, block diagrams of a communication system according to the invention, a user terminal according to the invention and a gateway station of said communication system;

Figures 2A, 2B and 2C, blocks diagrams of a first, second and third embodiments of a method of transmitting data packets according to the invention;

Figures 3A and 3B, two plots illustrating the user power distribution in a communication system according to a first comparative example;

Figures 4A and 4B, two plots illustrating the user power distribution in a communication system according to a second comparative example;

Figures 5A and 5B, two plots illustrating the user power distribution in a communication system according to a third comparative example;

Figures 6A and 6B, two plots illustrating the user power distribution in a communication system according to a fourth comparative example;

Figures 7A and 7B, two plots illustrating the user power distribution in a communication system according to a first exemplary embodiment of the invention; Figures 8A and 8B, two plots illustrating the user power distribution in a communication system according to a second exemplary embodiment of the invention;

- Figures 9A, 9B and 10A, 10B, plots illustrating the technical results of the invention, based on simulations; and

Figures 1 1 A and 1 1 B, plots illustrating the technical results of the invention, based on laboratory measurements;

Figure 12 a plot of the capacity bound for CDMA with random spreading sequences;

Figure 13, an illustration of iterative SIC;

Figures 14 and 15, two plots illustrating the user power distribution in a communication system according to said first embodiment of the invention for two different values of the channel load.

Figure 1A represents, in a very schematic way, a satellite communication system suitable for carrying out the invention. The system comprises a set of user terminals T-i , T 2 , T 3 ... TN (generally referred to as "T") and a gateway station GWS communicating through a satellite repeater SAT, which can be either transparent or regenerative. In the following for simplicity the description will be focused on the transparent satellite case. Also the satellite can include one or more user beams connected to the gateway. A multi-beam configuration allows reusing the user link frequency, thus increasing the overall system throughput given a user bandwidth. The gateway station uses an emitter (reference GWE on figure 1 C) to broadcast data to the terminals through respective communication links called "forward links", FL. The forward link can also be used for sending packet reception acknowledgements to the terminals as well as any network ancillary signalling information. The terminals transmit data packets to the gateway station - and more precisely to a gateway receiver GWR - through respective communication links called "return links" RN using an unslotted spread- spectrum random access protocol, e.g. Spread-Spectrum Aloha, which requires no communication, coordination or synchronization between terminals. Such a protocol is efficient when the transmission duty ratio of each terminal (i.e. the fraction of the total time during which the terminal transmits over the return link) is small. The random access scheme allows collisions between data packets transmitted by different terminals, which can lead to the loss of said packets; in order to reduce the packet loss ratio, the gateway receiver GWR comprises a detector GWD (see figure 1 C) which performs iterative serial interference cancellation, e.g. using the algorithm described in document EP 2 159 926.

An important aspect of the present invention is that the throughput of the return link (considered as a whole, i.e. the link between all the terminals and the gateway receiver) can be optimized by controlling in open loop fashion the transmit power of the terminals. Therefore, as illustrated on figure 1 B, a generic terminal T comprises a processor TPR which drives an emitter TE according to a suitable algorithm, which will be described later. The power control depends on some characteristics of the return link: attenuation, noise level at the gateway receiver input, etc. These data can be broadcast by a central station (typically the gateway station itself) and/or be estimated by the terminal processor itself on the basis of the signal received through the forward link. For this reason, on figure 1 B the processor TPR is represented with an input port connected to an output port of the terminal receiver TR. On this figure, the terminal receiver and emitter share a same antenna TA, but this is not essential.

The detailed description of the invention will comprise three parts:

in a first part, the optimal power distribution of the data packets at the input of the gateway receiver will be derived;

in a second part, different transmit power control algorithms will be illustrated; and

a third part will demonstrate the technical results of the invention by presenting simulations and experimental data.

In order to derive the optimal power distribution at the input of the gateway receiver, it will be assumed that data packets detection is performed in a time window k spanning 3 packet lengths, and that M incoming packets are present at the gateway demodulator. As the system is asynchronous (unslotted), the packet arrival density follows a Poisson distribution and, for a given traffic load G, is given by λ, = 2GG p being G p the processing gain expressed as the ratio between the chip and bit rate of the spread-spectrum system. See O. Del Rio Herrero, R. De Gaudenzi "High Efficiency Satellite Multiple Access Scheme for Machine-to-Machine Communications", IEEE Transactions on Aerospace and Electronic Systems, Vol. 4 , Issue: 4, Pages 2961 - 2989, October 2012

In general the number of incoming packets is also time-variant although, considering the E-SSA high-level of traffic aggregation, the fluctuations are limited in percentage of the average number of packets even in the presence of Poisson type of traffic. In the following, said number of incoming packets will be assumed constant in order to simplify the notation but without loss of generality.

Each interfering packet / belonging to the time window k is characterized by its power P(k,l) and by the associated relative normalized packet overlap factor 3(k, l, n) related to the current packet of interest n. It will be assumed that 3{k,l, n) is a random variable uniformly distributed in [0,1], "0" meaning no overlap and "1 " full packet overlap. In case of a conventional Single User Detector (SUD) the SNIR for the current packet of interest n in the time window k is given by:

SNIR{k, n) =

(1) where 0 < a(k, ri)≤∞ represents the power fluctuation factor of the received packet n in time window k around its nominal value, L w is the spreading factor defined as the chip over the symbol rate ratio, R s is the symbol rate, E s is the symbol energy, N 0 is the thermal noise power spectral density, [E<//V 0 ] nom and P nom are respectively the nominal received packet [Ε< Ν 0 ] and power when a(k,n) = 1.

If SIC is performed, the calculation gets slightly more involved as the incoming packets are re-ordered according to their power, and the Multiple Access Interference (MAI) from non-decoded packets and the residual MAI from previous cancellations must be taken into account at each packet detection step. Analytically the SIC SNIR for packet of interest n in the time window k is given by:

a(k) = [a(k,l), a(k,2) .... a(k,n)],

(2) where P"(k,n) is the re-ordered element of the received incoming packets so that: P n (k, \)≥P"(k, 2)-.≥P"(k, M), where a°(&,/) and 9"{k,l) are re-ordered accordingly and β is the power cancellation factor, β=0 corresponding to ideal SIC and β=1 corresponding to a Single User Detector (SUD).

Maximum throughput is achieved when the difference in the SNIR experienced by the different packets following the SIC process is minimized.

It is useful, then, to introduce the variable ASNIR, defined as:

(3) where a represents a specific distribution of the array of random variables a(k) .

The optimum packet power offset distribution a o t is therefore defined as the one which minimized the function

subject to different constraints depending on the type of SIC algorithms adopted. Alternatively, one can also consider minimizing the standard deviation of the SNIR random variable. In this case the quantity to be minimized instead of ASNIR derived from (3) is given by a smR computed as:

σ sum α,

(3-a)

For a "conventional" SIC detector - i.e. a detector performing a single SIC iteration, wherein packets are ranked according to their SNIR and detection and interference removal start from the best quality packet and end with the last detectable one - the condition to be verified is the following:

(4) where the constraint:

ensures that the worst case SIC SNIR is above the FEC (Forward Error

FEC

Correction) threshold to achieve the target FER (Frame Error Rate). In

N,

the following, the expressions "Frame Error Rate" (FER), "Packet Error Rate" (PER) and "Packet Loss Rate" (PLR) are used as synonyms.

In case of iterative SIC (see e.g. the E-SSA protocol of EP 2 159 926), wherein detection involves several complete SIC cycles through the window memory to reduce the packet loss ratio (PLR), the condition to be verified are the following:

(5)

The first constraints ensure the triggering the SIC process i.e.:

SI

mm k \ SNIR k,n, ,M, β,

achievement of

is more relaxed than the one applicable to conventional SIC demodulator.

The second constraint is similar to the first one, except in that it is only applied to the last step (packet M) of the iterative SIC process, when all interferers (ordered according to their decreasing SNIR) have been removed: min t <! SNIR k,M,a,M, (5-b)

The conjecture above is based on the hypothesis that the E- SSA repetitive SIC process will converge provided that the first constraint is satisfied. The difference between a conventional SIC process and the E-SSA iterative SIC process will be better clarified by the example illustrated on figure 13. The figure refers to a simplified case where 13 packets are present in window k during the E-SSA iterative SIC (i-SIC) processing. The initial condition (first panel of the figure) is the situation corresponding to the memory window k before starting the i-SIC processing. In run 1 corresponding to conventional SIC processing) the gateway detector starts looking for the packet preambles and if a preamble is detected, packet detection is attempted. If and only if the packet preamble is detected and the Cyclic Redundancy Check (CRC) is successfully completed, the packet will be considered detected and cancelled from the window memory. Then the preamble searcher is continuing to search forward in the memory for new packets until the end of window is reached (see document EP 1 686 746 for more details on the processing). With high MAC loads as in the present example following the example reported only 3 out of the 13 packets more precisely packets (k,4), (k,8) and (k, 12) are detected and cancelled (second panels; packet with dotted contour). The other 10 remain undetected. The ones detected are typically the ones with higher SNIR but also assuming the initial SIC run SNIR provides a PER of 0.9 it means that in average only 1 out of 10 packets will be successfully decoded. In run 2 (third panel) the process is repeated starting from the beginning of the window k. Because of the previous SIC run, the SNIR of the packets is better, and more of them can be decoded during said second SIC run. Specifically, in this exemplary case, packets (k,2), (k,7) and (k,9) are detected . Finally in the third SIC run (fourth panel) all the window packets are decoded and cancelled. At this point, following the E-SSA algorithm described in EP 1 686 746, the processing window is shifted by a fraction of the packet length (typically half) and the previous i-SIC process is repeated on the shifted memory window.

It is apparent that the i-SIC process described in the example works differently from conventional SIC corresponding to the sole run 1 of the i-SIC. To trigger the i-SIC convergence it is sufficient that the highest SNIR initially experienced is allowing to detect a certain percentage (say 10 %) of the packets present in the window. Their removal will allow to progressively detect the others through the iterative SIC processing. Instead with normal SIC processing the best SNIR for each packet shall give the final target PLR (say 10 ~4 ) thus representing a much more stringent condition. This condition is typically satisfied with a lower maximum throughput.

The system capacity is optimized looking at the maximum load ( or G) for which an optimum power distribution a opt can be found, satisfying the appropriate constraints.

Without additional hypothesis, finding α 0 μ is a complex problem. However, it can be simplified by assuming an a priori power distribution depending on one or more parameter to be optimized. In practice, as it will be discussed below, numerical simulations show that optimal or at least near-optimal performances can be achieved by using a packet power distribution which is uniformly distributed, in decibels, between a minimum value a m in and a maximum value a max . The problem of finding a opt is then reduced to the determination of optimal values for a min and a ma x. It should however be noted that in some cases different transmit power distributions can be preferred, e.g. to compensate a distortion of the initial packet power distribution induced by the communication system.

Having found a method for determining the optimal power distribution of data packets at the gateway receiver input, one is faced with the problem of achieving this optimal distribution without relying on coordination between the user terminals. A solution to this problem will be provided below. This solution allows achieving the required power distribution even in the presence of atmospheric fading, non-uniform satellite antenna gain pattern and user terminal RF power limitations. Moreover, it does not require information about the individual user terminal power settings, it supports different classes of services (bit rates) and allows operations at distinct downlink and uplink frequencies. It is particularly suitable for fixed satellite systems which do not experience fading/shadowing due to the user mobility, but only time and location dependent attenuation due to atmospheric fading and to the variability of satellite receive antenna gain and geometrical path loss. More precisely, the inventive method is particularly well suited for a fixed system in the Ka, Ku or C-band, where differently from a land mobile satellite channel atmospheric fading is a relatively rare and relatively slow event. This makes possible to track the downlink fading evolution and counteract it using the set of equations illustrated in the following to counteract it and to allow in a certain fading range to still obtain the wanted random packet power distribution at the gateway demodulator. Instead in a truly satellite mobile system operating in a non-open sky channel condition the fading/shadowing process variation speed is typically too high to be tracked and counteracted by the open loop scheme described in the following. In such a case, typically, only on-off transmission control can be implemented.

In a first embodiment of the inventive power control method, there is no limitation of the user terminal transmit power. In this case, the transmit power level Ργ χ is equal to a "required" value

where [Prx]req is expressed as the sum of a "deterministic" term [Pj x ] T

"random" one, R ra nd > both expressed in decibels:

ft * L [dBm] = [P TX f eq [dBm]+ i? rand (S type )[dB] (?) where indicates the selected packet service quality (e.g. standard, degraded, upgraded).

The deterministic term depends on the communication link budget, and can be expressed as: feJdBm] = I up (^ own , / down , up )[dB] + N SAT (dBm) + (S type )[dB] - G s (x,„y„) [dB]

(8)

C_

where (Stype ) is the target packet C I N 0 (carrier-to-noise power spectral density ratio) for a selected service, G s (x„,y„) is the satellite antenna gain at EOC (Edge of Coverage) and L up is the uplink attenuation, expressed as a function of the downlink attenuation (which can be estimated by the terminal receiver using conventional techniques), the downlink frequency /down and the uplink frequency up and A/ sa t is the noise power at the input of the satellite transponder.

The random term R rand follows a pre-set probability distribution, and more particularly the optimal distribution a opt determined by the method described above (or a different distribution, if this is preferred in some specific application). According to the numerical results shown later on, and assuming that the antenna gain variation within the coverage region is limited, R rand is preferably a uniformly distributed random value between ( 5 type ) [ dB ] which is generated by the terminal. The notation underlines that the values of a min and a ma x are determined by the terminal as a function of the service type S type .

The downlink and uplink attenuation can be estimated as:

(dBW)+| ^ I (dB/K)-[ SNR] UT (dB)

down = 10 10

r ^ ip ( down > ΐιρ )

(9) where is the satellite user downlink Effective Isotropic Radiated Power

G

(EIRP), I T UT

LIT is the terminal gain over thermal noise temperature, [SNR] is the signal-to-noise ratio estimated at the user terminal, A down and L down are the current estimate downlink fading and overall downlink path loss (including fading), Ci and C 2 are the rain attenuation coefficients expressed in dB for the downlink and the uplink respectively and f d0W n and f up are the downlink and uplink carrier frequencies expressed in GHz.

c SA T

The value of the P I 'M SAT P ' N 1 v SAT■ (S type ) and P t EIRP are broadcasted by the gateway station through specific signalling tables. The is assumed to be known at the terminal. For what concerns the satellite antenna gain G s (x u ,yJ it has to be computed from the approximate user location knowledge and the nearest value available from the broadcasted satellite antenna gain map for discrete locations over the coverage area. The proposed approach is able to work also in case there is a non-congruent forward and return link antenna pattern.

A flow chart of this simple power control algorithm is illustrated on figure 2. Broadcast data ( S^J are used to determine the optimal values of a m in and otmax, which in turn allows the random generation of P r and; other broadcast data and results from downlink channel estimation allow performing a power budget, which in turn allows the determination of [Prx] T re q ; and the transmit power level is simply computed as the sum of these two terms, expressed in decibels (or, equivaiently, their product if expressed in linear units).

In a more advantageous embodiment, the power control accounts for the maximum RF transmit power of the terminal, equal to T x ] max . Then the algorithm is modified as follows 1

(10) where [P Tx ] reci is computed as in the first embodiment (equations 6 - 8).

Figure 2B shows a flow chart of this algorithm. Its first steps are the same as those of the first embodiment, but the transmit power Pj x is not simply given by the sum of the deterministic and random terms (in decibels); instead is given by the minimum between said sum and the maximum transmit power (or, equivaiently, it is clipped at said maximum transmit power). Moreover, the algorithm includes an optional on/off controls which hinder data emission (in the mathematical expression of the algorithm, "no transmission" is represented by Ρτχ=-∞ dBm) if the power budget is too unfavourable; the checked condition is: [Ρτχ] 1713 * [dBm] < [Prx]Req T [dBm]+a m i n . If this condition is satisfied, even the lowest-possible value of P Tx ([Prx]Req T [dBm]+a m in) would be higher than the maximum transmit power (it should be recalled that [PT X ]R eq T [dBm] is a function of the link power budget). In these conditions ("outage"), a transmitted data packet would have a low probability of being correctly detected and it would uselessly increase the interference level for other packets.

Typically the system shall be designed to allow under non- faded conditions to have a large percentage of users being able to operate in the first nominal mode thus exploiting the nominal user terminal power dynamic range. The use of the second mode causes a "distortion" of the incoming gateway packets power distribution function.

This distortion is avoided by the third embodiment, adopting the following power control algorithm:

L, i dBm l if Π [ dBm ]≥ L [dBm] + a_ (S, pe ) [dB]

[ Tx ]; eq [dBm] + and (5, ype )[dB]

JdBm]

if [P T f e JdBm] + « mm (S t>pe )[dB]<[^ ] mK [dBm] <[ > Ts £ q [dBm] + a max (5 lvpe ) [dB]

-∞ if Κ [ dE H < L [dBm] + a min (5, pe ) [dB]

(1 1 ) where the random variable R * aild (.S type )[dB] is regenerated until the condition [ Τχ ]^ [άΒπι]+ ^ (^ ρ6 )[(1Β] < ίΓ[(1Βηι] is verified. In this case the clipping function min|[P Tx ] re JdBm],[ Tx ] max [dBm]| is replaced by the generation of a new random variable R * and (S type )[dB] that falls within the allowed user terminal power dynamic range. A flow chart of this algorithm is illustrated on figure 2C. Like in the second embodiment, transmission can be forbidden in case of link outage. An equivalent (but less straightforward) implementation could use a re-scaling of the values a m i n and a max before computing P r and-

In both the second and the third embodiment, if the current link attenuation is too large to make possible the packet transmission, the user terminal may switch to a more robust mode configuration, ensuring the a degraded service (in terms of bytes/packet and packet bit rate) and characterized by a lower target packet SNIR value and therefore by a higher service level availability i.e. 99.8 % for the worst-month. Then, the transmit

C

power is recomputed using the new (5^ ) value.

Conversely, if the estimated path attenuation is sufficiently low, the terminal can use an upgraded service mode, which higher number of bytes per packets and/or packet bit rate. This possibility applies to all the embodiments of the invention.

The technical result of the invention will now be assessed on the basis of computer simulations and experiments.

First of all, it will be shown that a uniform (in decibel) transmit power distribution is indeed optimal, or at least near-optimal, in realistic conditions.

Equation (5) will then be applied by considering six different a priori power distributions laws :

1 . Constant (no optimization parameters);

E.

Exponential following eqn. being the optimization parameter;

3. Lognormally distributed, with zero mean and standard deviation σ [dB] (optimization parameter);

4. Truncated lognormally distributed with zero mean and standard deviation σ [dB] (first optimization parameter) and |<ar|[dB] < a niax [dB] (second optimization parameter);

5. Uniformly distributed in the dB domain with -a ma [dB] < a[dB] < a ma [dB] .

6. Asymmetrically uniform distribution in the dB domain with a mm [dB] < a [dB] < « max [dB] .

The performances of these different power distributions are determined by numerical simulation and compared. . Constant packet power

The key system parameters have been taken using the link budget results of a realistic Ka-band multi-beam satellite. In particular, it was

E.

assumed = 9.2 dB (corresponding to the worst-case link budget

= -1.7 dB (corresponding to the 3GPP 100 information

bits Forward Error Correcting (FEC) threshold for PER=10 "3 plus 0.5 dB implementation losses), = -4.77 dB , L w = 32 , M = 88 χ 2 = 176. Initially

perfect SIC (β=0) was assumed. The impact of imperfect SIC will be studied for the selected baseline configuration at the end of this section. The results related to this case are reported in figures 3A and 3B.

Figure 3A is a three dimensional plot showing the SNIR at the demodulator input and after SIC (vertical axis) for different users and for different trials. The users are ordered by decreasing SNIR.

Figure 3B shows the average SNIR and after SIC at the demodulator input for the different users. It can be seen on this figure that there is a large unbalance in terms of individual users SNIR i.e. ASNIR mn = 13.7 dB . This makes the SIC detector operation very sub-optimum as at each IC stage the SNIR will improve until the last packet is detected.

E.

Furthermore, the worst-case SNIR is below the specified value as the resulting SNIR margin is -3.5 dB. The only way to make the margin positive is to reduce the number of simultaneous packets M which will result in a capacity reduction.

2. Exponential power distribution

The results related to the case No. 2 correspond to a packet power growing exponentially with the user index are reported in figures 4A = -0.8 dB i.e. 10 dB lower than ic range required spans almost

20 dB and 10 dB above the nominal power which makes this option possible. This approach guarantees a perfectly uniform SNIR(k, n) value when packets are synchronous. But when packets are asynchronous like in the present case the SNIR(k, n) values are not anymore constant thus the approach is sub- optimum. Furthermore the approach proposed by Viterbi requires coordination among users as each terminal shall know what power level is used by the others. This is an impractical situation. For the selected value of

= -0.8 dB equation (5) provides a ASNIR min = 3.0 dB with a SNIR margin of 0.9 dB.

3. Loqnormal power distribution

The results related to a packet power lognormally distributed in the dB domain are reported in figures 5A - 5B. The minimum of equation (5) corresponding to ASNIR mn = 4.9 dB has been obtained for σ = 2.5 [dB] with a SNIR margin of -0.4 dB. It is quite interesting to observe the specific shape of the average SNIR plot reported in figure 5B. This distribution that can be approximately found in mobile application condition when the packet control scheme follows the one described in the above-referenced paper by O. Del Rio Herrero et al. Numerical findings clearly show that this incoming packet power distribution is sub-optimum in terms of SIC SNIR distribution across the different steps.

4. Truncated loqnormal power distribution

The results related to the case of packet power with truncated lognormal distribution are reported in figures 6A - 6B. The minimum of equation (5) corresponding to &SNIR min = 3.95 dB has been obtained for σ = 3.0 [dB] and a mm = 8.0 [dB] with a SNIR margin of 0.01 dB. By clipping the lognormal distribution, the SNIR fluctuation has been reduced by 1 dB, leading to a slightly positive link margin. Truncated lognormal distribution can be considered a better power distribution than the pure lognormal one.

5. Uniform power distribution (in the dB domain)

The results related to the case of packet power uniformly distributed in the dB domain are reported in figures7A - 7B. The minimum of equation (5) corresponding to ASNIR mm = 0.05 dB has been obtained for a max = 8.0 [dB] with a SNIR margin of 1.04 dB. This positive margin can be translated in an increased throughput. It is apparent that the uniform (in dB) power fluctuation distribution provides a very limited SIC SNIR excursion and a positive SNIR margin with a truly decentralized power randomization scheme. Therefore it is a practical approach to approximate the optimum SIC performance.

An additional case (5bis), related to the impact of the imperfect interference cancellation on the minimization of equation (5), has also been considered. Assuming β = -\ 5 dB the findings of the 5 th case are changed as follows: The minimum of equation (5) corresponding to &SNIR mm = 0.07 dB has been obtained for a max = 6.0 [dB] with a SNIR margin of

0.7 dB. The imperfect interference cancellation translates in a reduction by 0.5 dB of the SNIR margin while keeping the SNIR fluctuations across the different users very limited.

A summary of these results is provided in the following Table

1 :

where "NA" means "non applicable" and case 6 will be discussed below. It is apparent that the best performances are obtained for case 5 i.e. random uniform packet power distribution in the dB domain. This configuration is compatible with a random access (RA) system where there is no system coordination, but is affected by two major drawbacks:

The dynamic range for the packet power is quite large i.e. 16 dB peak to peak. This range, in many cases, is not compatible with user terminal EIRP limitations considering that the packet power shall be as high as +8 dB above the nominal value. When the mm value is reduced to 4 dB the

SIC performance are heavily degraded i.e. ASNIR mm = 6.4 dB with a SNIR margin of -0.6 dB.

The optimum value of a max depends on the RA channel load. For example reducing the load to M = 44x 2 = 88 the minimum ASNIR mm = 0.08 dB is obtained with a max = 6 dB to which corresponds

ASNIR mm = 3.1 dB . This problem can be solved by broadcasting the recommended mm = 6 dB value in the forward link.

A possible way forward to solve the first issue identified on the maximum EIRP dynamic range is to use an asymmetric uniform power distribution between [a mjn (dB), max (dB)] classified as case 6. It is assumed that physical limitations for the terminal EIRP impose cc mm =3 dB . In this case the minimization of eqn. (5) shall be performed with respect to parameter m in (dB) . Numerically it was found that the optimum value is a mm = -9.2 dB

ASNIR mm = 0.1 dB for which the SNIR margin is 0.5 dB. This is an excellent result as it optimizes all the system constraints with optimum SIC operating point. The results for case 6 are reported in 8A - 8B (note that, in these figures, the scales are different from those of figures 7A and 7B).

Increasing by 3 dB the value of = 12.2 dB

provides further room to increase the throughput. Numerically it was found that for M=125 e.g. 42 % more load than the previous case can be supported with a positive minimum SIC SNIR margin of 0.1 dB. The optimum value for

« =3 dB is a „ = -12.7 dB with ASNIR^ = 0.15 dB . i.e. ts:

G/T variation of 10 dB from minimum to maximum with a G/T for 60% of the locations 6 dB above the minimum value used for the worst case link budgets) provides further room to increase the throughput. Numerically it was found that for M=185 e.g. 65 % more load than the worst-case can be supported with a positive minimum SIC SNIR margin of 0.1 dB. The optimum value for a =3 dB is mm = -15.5 dBwith ASNIR m = 0.06 dB .

It has to be remarked that the proposed transmit power control (or "physical layer adaptation") algorithm described above "equalizes" the loss differences between the different terminals thanks to the estimation of the uplink path loss. Thus, neglecting the power randomization i? rand , the power received at the gateway will be the nominal one unless the terminal is faded and cannot counteract fading with the uplink power control. Thus applying a uniform (in dB) power randomization at each terminal for each packet for each terminal will satisfy the conditions numerically derived above. As shown above the optimum randomization range in dB depends on the system load. However, to simplify the system implementation, the optimization of i? rand is assumed to be performed for the maximum system load.

An overall E-SSA simulator based on the model already described in the above-referenced paper by O. Del Rio Herrero et al. has been exploited to assess the RA performance. First the MAC (Medium Access Control) throughput impact of the optimized incoming packet random distribution has been derived.

The first configuration adopted is described in table 2. It is to be remarked that in the simulation the information packet size is limited to 100 bits size packets so that results can be obtained by simulation and compared to previous finding obtained with lognormal incoming packets power distribution. More specifically the uniform (in dB) power distribution optimum

E. range is optimized for the target load condition always assuming

=13.7 dB. Even more specifically the load is kept constant G=2.2 b/s/Hz while the MAC throughput and PLR is simulated a function of the parameter a min while a ma x=3 dB is kept constant. The simulator key parameters are listed in table 2 while the simulation findings are summarized in figures 9A and 9B. Figure 9A shows the simulated throughput using the E-SSA protocol with G=2.2 b/s/Hz as a function of a m i n for uniform packet power distribution between a m j n and a max = 3 dB compared to a lognormal power distribution with μ—SdB and σ=3 dB. Figure 9B shows the corresponding Packet Loss Ratio (PLR) values.

It is remarked that the approximated optimum value found by simulation of a min =-1 1 dB matches well the semi-analytical finding of 0fmin=- 1 - dB following the procedure described above. It is to be remarked that the a m i n =-1 1 .1 dB value is driven by the conditions imposed by equation (5-b) ensuring that the minimum SNIR is above the FEC threshold. This explains why below a min the FER is growing.

Compared to lognormal power distribution, optimized uniform (in dB) power distribution achieves a 15 % MAC throughput improvement and we avoid the PLR floor effect due by the lognormal packet power distribution described by the above-referenced paper by O. Del Rio Herrero et al.

Table 2:

Simulation duration = 15600 [symbols]

Normalized MAC load G = 2.20 [b/s/Hz]

Information packet length = 100 [FEC input bits] FEC coding rate (r) = 0.33

Physical layer packet length = 312 [FEC encoded symbols] Modulation order (M) = 2 Spreading factor (L w ) = 256

Chip rate = 3.84 [Mcps]

GTW packet [Eb/No] nom = 13.70 [dB]

G B] w

Power error model = Uniform (Lognormal for comparison) RTN link max power deviation = 3.0 [dB]

Number of IC iterations = 5

Window size = 936 [symbols]

Window shift = 56 [symbols]

Another set of simulations has been performed using the following configuration for the E-SSA simulator (ideal cancellation):

Table 3

Simulation duration = 93600 [symbols]

Normalized MAC load G = variable [b/s/Hz]

Information packet length = 100 [FEC input bits] FEC coding rate = 0.32

Physical layer packet length = 312 [FEC encoded symbols]

Modulation order = 2

Spreading factor = 256

GTW packet [Eb/No] n0 m = 3.70 [dB]

GTW packet [Ec/No] nom = -15.15 [dB]

Power error model = Uniform (Lognormal for comparison)

RTN (return) link max power deviation = 7.0 [dB]

RTN link min power deviation = -9.8 [dB]

Number of IC iterations = 5

Window size = 936 [symbols]

Window shift = 156 [symbols]

The simulation results are reproduced in figures 10A and 10B where simulated throughput and PLR as functions of the MAC load have been compared to previous results obtained with different lognormal (LGN) distributions (on the figures captions: "ana" means analytics and "sim" means simulations). The 20% performance advantage of the uniform power distribution versus lognormal one is evident although the parameters were not fully optimized for the specific system parameters.

A third example of the power distribution optimization has been studied for a configuration corresponding to a more realistic FEC block size of 1200 information bits. In this case the inventive optimization method provides the results reported in table 4. Three different assumptions for the SIC residual power β has been used (Case 1 β=-∞ dB, Case 2 β=-21 dB, Case 3=-20 dB).

Table 4

The semi-analytical power distribution optimized results have been experimentally verified using an E-SSA hardware prototype. The measured results are reported in figures 1 1 A and 11 B, with conversion between the number of packets/s and the MAC load in b/s/Hz reported in table 5. It is apparent that the optimum performance are obtained for dB which corresponds according to Table 4 to a residual SIC interference factor β of about -20.5. This value is close to the experimental measurement for the S- MIM prototype of β=-21 dB (for low SNR). So it can be concluded that there is a good match between the analytical optimization and the experimental findings.

Table 5

3000 0.77 0.94

4000 1.02 1.25

5000 1.28 1.56

6000 1.54 1.88

7000 1.79 2.19

7500 1.92 2.34

8000 2.05 2.50

8500 2.18 2.66

9000 2.31 2.81

It is remarkable that the best performances are obtained using a uniform power randomization range of [-9.8, +7] dB. These performances correspond to a throughput of 2.8 b/s/Hz if the Square-Root Raised-Cosine (SRRC) filter excess bandwidth due to the roll-off factor is neglected; otherwise throughput is reduced to 2.3 b/s/Hz for a SRRC roll-off factor of 0.2. Reducing the packet power fluctuation dynamic range to [-9.8, +5] dB the throughput is reduced to 2.5 b/s/Hz. Further limiting the power dynamic range to [-9.8, +3] dB the throughput is further reduced to 2.2 b/s/Hz which is in line with the results obtained before by simulation with a 100 bits FEC block size but ideal E-SSA processing. Clearly the results also depend on the assumed

E.

value of (which has been assumed to be 13.7 dB) but it is clearly system dependent. According to the reference Ka-band satellite system link

E.

budgets in the average case link budget the user gets a - 16.6 dB

N„

which is almost 3 dB higher than the value assumed for the previous MAC

E.

performance assessment. The best is probably about 20.6 dB but just in a negligible amount of locations. Thus assuming that = 13.7 dB,

c<max=3 dB is certainly obtained. Therefore an effective throughput of 1 .9 b/s/Hz (including the SRRC roll-off factor) is potentially achievable in the existing reference Ka-band satellite type of system. It is also interesting to understand how the performance which can be obtained by the optimized E-SSA power distribution compares to the CDMA with random spreading capacity bounds - see S. Verdu and S. Shamai, "Spectral efficiency of CDMA with random spreading|", IEEE Transact. On Information Theory, vol. 45, pp. 622-640, March 1999.

First, the system received energy-per-bit is computed as

(see Hou, J. E. Smee, H. D. Pfister and S. Tomasini, "Implementing Interference Cancellation to Increase the EV-DO Rev. A Reverse Link Capacity", IEEE Comm. Magazine, February 2006, pp. 96-102), where a is the optimized incoming packet power distribution.

The capacity bound can be determined using the following equation from the above-referenced papers:

sys

where C is the multiple access channel capacity expressed in b/s/Hz. The results of eqn. (5-2) are reported in figure 12. The distance from the capacity bounds for several E-SSA configurations are summarized in table 6 The MAC load assumes that there is no extra bandwidth due to the SRRC roll- off factor.

It is clear that the loss depends on the system parameters but also on the presence or absence of perfect interference cancellation. The E- SSA capacity loss with respect to the bound ranges from 0.2 to 13 % in case of perfect IC and from 16 to 22 % in case of residual IC factor β=-20 dB. The loss is minimised when a max is extended to 7 dB corresponding to a maximum packet E b /N 0 =20.7 dB. Instead the loss with respect to the capacity bounds amounts to 13 % when the maximum terminal power is reduced to E b /No=1 1 dB. These results seem to confirm that the E-SSA with the proposed optimized power distribution can achieve the channel maximum theoretical capacity when the power randomization range is large enough with a practically realizable asynchronous and uncoordinated random access system exploiting a i-SIC multi-user packet detector at the gateway.

Table 6

Finally it is remarked that, when applying the E-SSA packets random power range optimization algorithm described by eqn. (5) for maximum load conditions (G=3.3 b/s/Hz in the specific case), the SNIR follows a monotonic behaviour starting from the lowest SNIR condition at the beginning of the i-SIC process approximately corresponding to

= -4.2 dB as final value (last packet to

be detected after all the others have been removed). This behaviour is clearly visible in the plot of figure 14, corresponding to the second case of the Table 6.

Instead, when the loading is not too close to the limits as it was the case reported in Figures 7 and 8 once the power distribution has been optimised, the SNIR evolution is much more flat as it is apparent from figure 15 corresponding to also to the second case of Table 6 but when the load is reduced to G=2.5 b/s/Hz.