IN distributed random multiple access, nodes transmit

Similar documents
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE Jie Luo, Member, IEEE, and Anthony Ephremides, Fellow, IEEE

554 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 2, FEBRUARY /$ IEEE

CHAPTER 5 PROPAGATION DELAY

Some Optimization Trade-offs in Wireless Network Coding

ENHANCING THE PERFORMANCE OF MANET THROUGH MAC LAYER DESIGN

Markov Chains and Multiaccess Protocols: An. Introduction

Com S 611 Spring Semester 2007 Discrete Algorithms for Mobile and Wireless Networks. Lecture 3: Tuesday, 23rd January 2007

Power Laws in ALOHA Systems

Multiple Access Communications. EEE 538, WEEK 11 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department

Delay-minimal Transmission for Energy Constrained Wireless Communications

Packet multiple access and the Aloha protocol

INTEGRATION of data communications services into wireless

THE demand for widespread Internet access over large

Cooperative-Diversity Slotted ALOHA

TSIN01 Information Networks Lecture 3

Improved Collision Resolution Algorithms for Multiple Access Channels with Limited Number of Users * Chiung-Shien Wu y and Po-Ning Chen z y Computer a

AN ad-hoc network is a group of nodes without requiring

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

A Survey on Congestion Control and Maximization of Throughput in Wireless Networks

Enhanced Parity Packet Transmission for Video Multicast using R-DSTC

Performance Analysis of DS/SSMA Unslotted ALOHA System With Variable Length Data Traffic

Experiment report. Figure 1: Deployment location

Where Are We? Basics: Network Classification Network Architecture Reliable Data Transfer Delay Models Implementation: Protocol Design

Modulation-Aware Energy Balancing in Hierarchical Wireless Sensor Networks 1

Random Assignment Protocols

A Distributed Routing Algorithm for Supporting Connection-Oriented Service in Wireless Networks with Time-Varying Connectivity

Payload Length and Rate Adaptation for Throughput Optimization in Wireless LANs

MULTI-SENSOR DATA FUSION (MDF) combines information

Collaborative Multiple-Access Protocols for Wireless Networks

On the Design of a Quality-of-Service Driven Routing Protocol for Wireless Cooperative Networks

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 5, MAY

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Wireless Medium Access Control Protocols

ARELAY network consists of a pair of source and destination

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

Byzantine Consensus in Directed Graphs

Network Topology Control and Routing under Interface Constraints by Link Evaluation

Analyzing Split Channel Medium Access Control Schemes with ALOHA Reservation

Comparison of pre-backoff and post-backoff procedures for IEEE distributed coordination function

Mobile Sink to Track Multiple Targets in Wireless Visual Sensor Networks

Chapter 6 Medium Access Control Protocols and Local Area Networks

Keywords: Medium access control, network coding, routing, throughput, transmission rate. I. INTRODUCTION

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

Optimizing Joint Erasure- and Error-Correction Coding for Wireless Packet Transmissions

THERE are a number of fundamental optimization problems

454 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 47, NO. 3, MARCH Performance of Slotted Asynchronous CDMA Using Controlled Time of Arrival

Reliable Communication using Packet Coding for Underwater Acoustic Channels

13 Sensor networks Gathering in an adversarial environment

Wireless Multicast: Theory and Approaches

Collisions & Virtual collisions in IEEE networks

User Registration in Broadband Slotted Aloha Networks

Analyzing Multi-Channel Medium Access Control Schemes With ALOHA Reservation

ITERATIVE COLLISION RESOLUTION IN WIRELESS NETWORKS

A CDCA-TRACE MAC PROTOCOL FRAMEWORK IN MOBILE AD-HOC NETWORK

Medium Access Control Protocols With Memory Jaeok Park, Member, IEEE, and Mihaela van der Schaar, Fellow, IEEE

Distributed STDMA in Ad Hoc Networks

Efficient Power Management in Wireless Communication

Multiple Access (1) Required reading: Garcia 6.1, 6.2.1, CSE 3213, Fall 2010 Instructor: N. Vlajic

Multiple Access Links and Protocols

2816 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 5, MAY Nikola Zlatanov, Student Member, IEEE, and Robert Schober, Fellow, IEEE

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 12, DECEMBER

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 12, DECEMBER Hybrid ALOHA: A Novel MAC Protocol Huahui Wang and Tongtong Li

A Multiqueue Service Room MAC Protocol for Wireless Networks With Multipacket Reception

Random Access. 1. Aloha. 2. Slotted Aloha 3. CSMA 4. CSMA/CD

THE capabilities of mobile cellular communications may

A Distributed Throughput-Optimal CSMA/CA

/99/$10.00 (c) 1999 IEEE

Protocols for Multiaccess Networks

Enhanced Contention Resolution Aloha - ECRA

The MAC layer in wireless networks

/$10.00 (c) 1998 IEEE

Maximum Traffic Scheduling and Capacity Analysis for IEEE High Data Rate MAC Protocol

WIRELESS MESH NETWORKs (WMNs) are comprised

A Modified Medium Access Control Algorithm for Systems with Iterative Decoding

788 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 24, NO. 2, APRIL Xudong Wang, Senior Member, IEEE, and Wenguang Mao

Simulated SA Throughput vs. p

CHAPTER 5. QoS RPOVISIONING THROUGH EFFECTIVE RESOURCE ALLOCATION

MUCH research has been published on multi-hop wireless

Network Working Group Request for Comments: 829 November 1982

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Scheduling Algorithms to Minimize Session Delays

Performance of Slotted-Aloha over TH-UWB

Error Control in Wireless Sensor Networks: A Cross Layer Analysis

Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

ECE453 Introduction to Computer Networks. Broadcast vs. PPP. Delay. Lecture 7 Multiple Access Control (I)

4608 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 10, OCTOBER 2009

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

WITH the evolution and popularity of wireless devices,

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

CENTRALISED AND DISTRIBUTED POWER ALLOCATION ALGORITHMS IN COOPERATIVE NETWORKS. Jaime Adeane, Miguel R.D. Rodrigues, and Ian J.

RECEIVER CONTROLLED MEDIUM ACCESS IN MULTIHOP AD HOC NETWORKS WITH MULTIPACKET RECEPTION

Medium Access Control

Concurrent-MAC: Increasing Concurrent Transmissions in Dense Wireless LANs

EVALUATING ADJACENT CHANNEL INTERFERENCE IN IEEE NETWORKS

Impact of IEEE MAC Packet Size on Performance of Wireless Sensor Networks

Error Control System for Parallel Multichannel Using Selective Repeat ARQ

Communication Networks I December 4, 2001 Agenda Graph theory notation Trees Shortest path algorithms Distributed, asynchronous algorithms Page 1

Transcription:

414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and Anthony Ephremides, Fellow, IEEE Abstract This paper extends our earlier results. We assume that the receiver has the capability of capturing multiple packets so long as the signal-to-interference-plus-noise ratio (SINR) of each packet is above a designed threshold throughout its transmission period. We prove that, compared with a multiple-power-level system, the single-power-level system in which all nodes transmit at the maximum allowable power level achieves optimal throughput, under a condition that exceeds the value 3 33. Given a minimum throughput requirement, under the same condition on, the single-power-level system also achieves the maximum average packet capture probability as well as the optimum energy usage efficiency. If the multiple-power-level systems are constrained such that higher power levels always have shorter packet lengths, then the above results hold for greater than 2. Index Terms ALOHA, energy efficiency, power capture, random multiple access. I. INTRODUCTION IN distributed random multiple access, nodes transmit packets in an uncoordinated fashion. Error-controlled packet reception, being one of the key properties of the medium access control layer, is usually implemented to transform the noisy wireless channel into an error-free logical link to the upper layers. When the signal-to-interference-plus-noise ratio (SINR) of a packet is above a designed threshold throughout its transmission period, the packet is received successfully with a low probability of reception error. If the SINR of a packet goes below during its reception, the packet is considered unreliable and hence is dropped by the receiver. For a reasonable value of (, for example), when multiple packets of similar powers overlap at the receiver, the SINR requirement of all packets will be violated. If two packets arrive at the receiver with different powers, however, it is possible that the SINR requirement of the high-power packet is still satisfied, and hence the packet is received successfully. Such a phenomenon is called power capture. In wireless networks, in order to take advantage of power capture, it is proposed in [2], [3] that Manuscript received January 22, 2004; revised March 5, 2005. This work was supported by the National Aeronautics and Space Administration Award NCC8-235 and the Collaborative Technology Alliance for Communication and Networks sponsored by the U.S. Army Laboratory under Cooperative Agreement DAAD19-01-2-0011. Part of the material in this paper was presented at the Conference on Information Science and Systems, Princeton, NJ, March 2004. Any opinions findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Aeronautics and Space Administration or the Army Research Laboratory of the U.S. Government. The authors are with the Electrical and Computer Engineering Department, University of Maryland, College Park, MD 20742 USA (e-mail: rockey@eng. umd.edu; tony@eng.umd.edu). Communicated by G. Sasaki, Associate Editor for Communication Networks. Digital Object Identifier 10.1109/TIT.2005.862076 packets can be transmitted at multiple discrete power levels, and the packet received at the highest power may be captured. Various power capture models have been studied in the literature. In the perfect capture model, a packet is successfully received if and only if the ratio between the power of the packet to that of any interfering packet is higher than a fixed value [3], [4]. Although the model is sometimes overly optimistic, its use [5], [6] often leads to simpler analytic derivations. A more accurate model is based on the assumption that a packet is captured if and only if its SINR is greater than a decodability threshold [3], [4], [7], [8]. This is called the SINR capture model. In all of the above works, packet lengths at different power levels are identical. When the packet lengths (or symbol durations) of different power levels are different, high SINR at the receiver matched filter output can be achieved either via a high transmission power or via a long symbol duration. Therefore, it is possible that multiple overlapping packets can satisfy the SINR requirement simultaneously. The capture model in such a situation depends on the receiver design. If the receiver has multiple matched filters with each corresponding to one of the overlapping packets, all the packets satisfying the SINR requirement can be received successfully. If the receiver contains only one matched filter and hence cannot receive multiple packets simultaneously, it was suggested that the receiver can lock onto the packet with the highest power [1], [10]. Consequently, in addition to the SINR requirement, a packet must maintain the highest reception power among all the overlapping packets throughout its transmission period in order to be received successfully. We call this the Highest Power SINR (HP-SINR) capture model. The performance of a random multiple-access system is often measured by the system throughput, which is defined as the average number of successfully received packets per second. When all the packets are of the same length, it was shown that the use of multiple power levels increases the throughput of the system [1]. However, when both power levels and packet lengths are system parameters, transmitting packets with multiple power levels is not always beneficiary. The effect of multiple power levels and packet lengths on the system throughput and energy usage efficiency was studied in [1] under the HP-SINR capture model. It was shown in [1] that the single-power-level system in which all nodes transmit at the maximum allowable power level achieves both optimal throughput and energy usage efficiency under a condition on the decodability threshold value. In this paper, we consider the problem as in [1] but with the general SINR capture model. In other words, we drop the assumption of the simple receiver design, and assume that meeting the predetermined SINR threshold is the only requirement 0018-9448/$20.00 2006 IEEE

LUO AND EPHREMIDES: POWER LEVELS AND PACKET LENGTHS IN RANDOM MULTIPLE ACCESS 415 for a successful packet reception. We prove that, when, the single-power-level system achieves the optimal throughput. Given a throughput requirement, the singlepower-level system also achieves the maximum average packet capture probability as well as the optimum energy usage efficiency, when. If we only consider systems where higher power levels have shorter packet lengths, then the above results on the optimality of the single-power-level system hold for. Furthermore, for the same problem considered in [1] with the HP-SINR capture model, we show that the results of this paper hold for. The rest of the paper is organized as follows. The system model is described in Section II. The main results of the paper are presented in Section III. The detailed proofs are provided in the appendices. The throughput upper bound used in the appendices is derived based on an optimistic model, which is presented in Section IV. The paper concludes in Section V. II. SYSTEM MODEL Suppose there is an infinite number of bufferless nodes in the system [1], [11]. A global clock is available to all the nodes such that slotted transmission can be achieved. There are discrete power levels in the system. The values of the power levels and packet lengths are determined in the system deployment phase and fixed once the system is in use. For each packet, a node randomly picks a power level from the power levels and transmits the packet at that power level. Power level of each packet is chosen independently. Time is slotted at each power level with the slot duration equaling the packet length of the corresponding power level. At each power level, packets transmissions start only at the slot edges. We do not assume slot synchronization between different power levels. If a packet is lost due to collision, it is retransmitted at a later time. Definitions: 1. The system throughput is measured by the average number of successfully received packets per second. 2. The average packet capture probability is measured by system throughput offered traffic rate in packets per second 3. The energy usage efficiency is measured by system throughput system average power consumption As in [1], we make the following assumptions. Assumptions: 1. Each packet contains symbols. 2. A packet is received correctly if and only if during the entire transmission period, the SINR of each symbol is always larger than a designed threshold. The SINR is defined as symbol energy to interference plus noise ratio, that is, SINR (1) where, are the transmission power and symbol duration of the packet, and are the interference energy and spectral density of the background noise in the output of the symbol matched filter. 3. There are discrete power levels. The power levels and packet lengths are designed such that when a packet of level overlaps with a packet of level at the receiver, there is a positive probability that the SINR requirement of the packet at power level can be satisfied. 4. Binary phase-shift keying (BPSK) modulation scheme is used with symbol waveform being the rectangular waveform. 1 5. The transmission power of each packet is constant during the transmission period. 6. The probability of a packet transmitted at power level is with. We assume these probabilities are determined at the system deployment phase and fixed once the system is in use. 7. The distance between the transmitters and the receiver are equal and the transmission medium is isotropic. 8. The maximum power that a packet can use is.we assume, and the bandwidth of the channel satisfy the requirement that a symbol waveform of length can pass the channel with negligible distortion. 9. The total offered traffic on the system, including new arrivals and retransmissions, is Poisson [11]. Further explanations on the assumptions can be found in [1]. III. OPTIMALITY OF THE SINGLE-POWER-LEVEL SYSTEM Based on the definitions and assumptions presented in Section II, the main result of the paper is given in the following proposition. Proposition 1: Assume that the decodability threshold satisfies 1. The single-power-level system where all nodes transmit at with packet length achieves the maximum possible throughput, which is 2. Given a minimum throughput requirement (assume that the throughput requirement is achievable), the single-power-level system where all nodes transmit at with packet length achieves the maximum average packet capture probability, which is where (2) capture (3) is the offered traffic on the system that satisfies and 1 Similar to [1], the results in this paper can be extended to other modulations and symbol waveforms with little essential modification.

416 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 3. Given a minimum throughput requirement, the single-power-level system also achieves the maximum power usage efficiency, which is efficiency (4) The proof of Proposition 1 is provided in Appendix A. In addition to Proposition 1, stronger results can be obtained for the following two special cases. Proposition 2: Under the assumptions in Section II with an additional assumption that the packet lengths in any -powerlevel system satisfy, then the results of Proposition 1 hold for. Proof: When is satisfied, according to the group assignment criterion presented in Section IV, the system contains groups and each group in the -power-level system contains only one power level. Hence, the results of Proposition 1 can be shown by following the proof in Appendix A but starting directly from Section A.2. The proof only requires. Proposition 3: Under the assumptions in Section II and assuming the HP-SINR capture model (the same problem considered in [1]), the results in Proposition 1 hold for Fig. 1. Illustration of two interfering packets. T =(k + + )T, k = 0; 1; 2;...is a nonnegative integer, 0 ; < 1. corresponding to the two packets is illustrated in Fig. 1, where is a nonnegative integer and. The packet lengths of packet 1 and 2 are and, respectively. Define. Under the assumptions of BPSK modulation and rectangular symbol waveform, the SINR of the corresponding symbol matched filter output of packet 1 is given by 3 When, we have [1] SINR (5) SINR (6) The proof of Proposition 3 is presented in Appendix B and improves the results in [1]. Considering Assumption 8 in Section II, the results in this section should be interpreted as improving the bandwidth efficiency has a higher priority than exploiting the power capture effect in the system design. We want to emphasize that the results do not mitigate the value of a multiple-power-level design under the condition that the symbol duration already reaches the minimum value corresponding to the channel bandwidth. IV. THE OPTIMISTIC MODEL In this section, we describe an optimistic power capture model. The model is used to provide an upper bound to the throughput of a multiple-power-level system; such an upper bound plays a key role in deriving the results in Section III. Since the model is revised from the one in [1], we focus only on the aspects that differ from [1]. Suppose two packets 1 and 2 with symbol durations and, respectively, overlap at the receiver. When the number of symbols per packet,, is relatively large, without essential loss of generality, we assume the packets overlap over multiple symbols of each packet. 2 Therefore, at least one of the symbols of packet 1 completely overlaps with symbols of packet 2 throughout its symbol duration [1]. The offset of the symbols 2 Such an assumption might not hold when the symbol length of a packet is larger than the whole packet length of the other packet. However, in this paper, we do not consider such an extreme case in the multiple power level system design. When SINR,wehave In the optimistic model, we assume that interferences from multiple overlapping packets do not have additive effects to the packet of interest. A packet is successfully received if the following two requirements are satisfied. 1. The power and packet length satisfy 2. For all the packets that overlap with packet,we have If power level and power level satisfy requirements 1 and 2, we say survives. Next, we divide the power levels into several groups. Suppose the system has power levels. We assign power levels to groups via the following procedure. 3 The detailed derivation of the SINR can be found in [1, Sec. V]. if if (7) (8) (9)

LUO AND EPHREMIDES: POWER LEVELS AND PACKET LENGTHS IN RANDOM MULTIPLE ACCESS 417 Group Assignment: 1. Initialize power level index, group index. Assign power level to group. 2. Let,if, stop the group assignment. 3. If power levels, satisfy (10) increase the group index by, and assign power level to group. 4. If power levels, do not satisfy inequality (10), assign power level to group. 5. Goto Step 2. By Assumption 3 in Section II, survives.if and belong to the same group, we must have,. Consequently, for any, if, belong to the same group, we also have,. Suppose two packets of power levels, ( ) overlap at the receiver, no matter if they belong to the same group or not, according to the optimistic system model, it is easily seen that will be received successfully. If and belong to the same group, as long as, the packet at power level cannot satisfy the SINR requirement. However, if the two power levels do not belong to the same group, it is possible that also survives. To obtain an upper bound to the system throughput, we assume that as long as, do not belong to the same group, they can always be captured simultaneously. Note that we are free to make such an assumption since we are constructing an optimistic system for upper-bounding purposes. Since the offered traffic on the system is Poisson with arrival rate (in packets per second), the offered traffic at any power level is also Poisson with arrival rate [1]. We denote the offered traffic vector by. Denote the group that contains by, the throughput of packets at power level is upper-bounded by (11) Consequently, the overall system throughput is upper-bounded by (12) It is important to note that, although is an upper bound to the system throughput of a multiple-power-level system due the optimistic assumptions made in this section, it becomes the actual throughput if the system has only a single power level. V. CONCLUSION The results in [1] are extended in this paper. We showed that, even when the receiver has multiple-packet-reception capability and implements a pure SINR power capture, the singlepower-level system still achieves optimal system throughput under a condition on the decodability threshold. Given a minimum throughput requirement, the single-power-level system also achieves the maximum packet capture probability and the optimal energy usage efficiency, under the same condition on the decodability threshold. Considering the channel bandwidth assumption 8 in Section II, the results in this paper support the understanding that an efficient exploitation of the channel bandwidth takes higher priority than exploiting the advantage of the power capture. APPENDIX A PROOF OF PROPOSITION 1 A. Proof The proof contains four sections. Sections A.1 and A.2 prove result 1 of Proposition 1. Sections A.3 and A.4 prove results 2 and 3 of the proposition, respectively. Here we describe the main structure of the proof of result 1. The idea is similar to that of [1]. Based on the optimistic system model presented in Section IV, which is a revised version of the one given in [1], the power levels are divided into several groups. We assume that the packets from different groups can be received simultaneously. Based on these optimistic assumptions, an upper bound to the system throughput of a multiple-power-level system is given in Section IV. Suppose an -power-level system, system, contains groups. There must be at least one group that contains more than one power levels. We pick one such group, say in, and construct an ( )-power-level system, called, by combining the last two power levels in group of into one power level in. We show that the maximum value on the throughput bound of system is no less than that of system. The construction is performed iteratively, until we get an -power-level system, which contains groups and every group contains only one power level. Next, we show that the maximum throughput of the single-power-level system described in Proposition 1 is higher than or equal to the throughput upper bound of. Result 1 in the proposition then follows. 1) Proof of Result 1 Part 1: Consider an -power-level system. Assume that, according to the group assignment procedure, the power levels in are divided into groups. Suppose the throughput bound is maximized by traffic vector, i.e., (13) Since, we can find a group that contains at least two power levels. Assume that the last two power levels in are,. In the rest of the proof, we will construct an ( )-power-level system by combining power levels, into one. We will also construct a traffic vector for system, and show that (14) To simplify the notation, we omit the superscripts on the parameters of. The ( )-power-level system, and the system traffic are constructed as follows. The parameters

418 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 level as for in system are the same as in system. Construct the parameters of power Therefore, from (23) and (24), (22) will hold if the following inequality holds: (25) (15) Define. To satisfy (25), it suffices to have The parameters for in system are the same as in system. 4 It can be seen that still contains groups, where if and in if and in (16) From the definition of the throughput bound in (11) and (12), to have, it suffices to show (26) Since the right-hand side of (26) is maximized at, (26) holds when. In the preceding discussion, we showed that Since we can continue to perform the construction iteratively, there exists an -power-level system, system, where each group in has only one power level, and We first consider the situation when inequality (17) becomes (17). In such a case, (18) (27) 2) Proof of Result 1 Part 2: Now consider an -powerlevel system. Assume that, according to the group assignment procedure, the system has exactly groups and each group contains only one power level. According to the optimistic assumption in Section IV, any packets from different groups can be captured simultaneously. We have Since and belong to different groups, according to the group assignment criterion, we have (28) Hence, (19) (20) Now, denote the single-power system where all nodes transmit with and packet length by. The maximum throughput of is (29) When, inequality (17) becomes According to the group assignment criterion, since each group in system has only one power level, we have which is equivalent to (21) where we omitted the superscripts on the parameters of,wehave (30). When (22) Since and survives we have From (19), we obtain (23) (24) which gives (31) (32) P 4 Here we assume i < M0 1. When i = M 0 1, we can simply assume =0in system and follow the same proof. 3) Proof of Result 2: Suppose an -power-level system achieves the maximum average packet capture probability with

LUO AND EPHREMIDES: POWER LEVELS AND PACKET LENGTHS IN RANDOM MULTIPLE ACCESS 419 a traffic vector. We again denote the single-power system where all nodes transmit with and packet length by.if Hence result 2 of the proposition holds. 4) Proof of Result 3: Suppose there is a multiple-powerlevel system that maximizes the energy usage efficiency. There are power levels; the offered traffic at power level is and we denote the offered traffic vector by. The throughput of the system is. According to result 1 of Proposition 1, we can find a single-powerlevel system with transmission power and packet length that achieves the same system throughput with offered traffic, where from result 1, we have and According to result 2 of the proposition, we have Therefore, (39) If,define (capture) (33) (40) This shows that the energy usage efficiency of the single-powerlevel system is no less than that of the multiple-power-level system. and define. Construct a traffic vector such that According to result 1, we have (34) (35) where is the group that contains power level in system. Substitute (34) into (35). We obtain (36) Define. Since, the function is concave for, (36) yields. Therefore, the single- satisfies the min- This indicates that power-level system with system traffic imum throughput requirement and (37) (capture) (capture) (38) APPENDIX B PROOF OF PROPOSITION 3 A. Proof Since the HP-SINR capture model is considered here, if two packets of power levels and ( ) overlap at the receiver, the packet at power level will always be lost. Therefore, we redefine the upper bound (11) on the throughput of packet at level by The overall system throughput is upper-bounded by (41) (42) We first show that result {1} of Proposition 1 holds for. Consider an -power-level system,. Assume that the throughput bound is maximized by traffic vector, i.e., We construct an ( )-power-level system by combining the last two power levels,, of system into one. The ( )-power-level system, and the system traffic are constructed as follows. The parameters for in system are the same as in system. Construct the parameters of power level as (43) where we omit the superscripts on the parameters of system. From the definition of the throughput bound in (41)and (42), to have, it suffices to show, as in [1], that (44)

420 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Consider the situation when and in system belong to the same group. It is easy to show that inequality (44) holds if. In the situation that, inequality (44) is equivalent to (45) Since and in system belong to the same group, we have Therefore, define to have (46) ; to satisfy (45), it suffices (47) In the situation when and in system belong to the different groups, we have Therefore, when (48) (49) The above analysis shows that (50) It is then easily seen that result 1 in Proposition 1 holds for. As long as result 1 has been proven, results 2 and 3 of Proposition 1 can be shown by following the proofs in Sections A.3 and A.4, respectively, with only minor revisions. REFERENCES [1] W. Luo and A. Ephremides, Power levels and packet lengths in random multiple access, IEEE Trans. Inf. Theory, vol. 48, no. 1, pp. 46 58, Jan. 2002. [2] J. Metzner, On improving utilization in ALOHA networks, IEEE Trans. Commun., vol. COM-24, no. 4, pp. 447 448, Apr. 1976. [3] C. Lau and C. Leung, Capture models for mobile packet radio networks, IEEE Trans. Commun., vol. 40, no. 3, pp. 917 925, May 1992. [4] R. LaMaire, A. Krishna, and M. Zorzi, On the use of transmitter power variations to increase throughput in multiple access radio systems, Wireless Netw., vol. 4, pp. 263 277, Jun. 1998. [5] L. Roberts, ALOHA packet system with and without slots and capture, Comput. Commun. Rev., pp. 28 42, Apr. 1975. [6] N. Abramson, The throughput of packet broadcasting channels, IEEE Trans. Commun., vol. COM-25, no. 1, pp. 117 128, Jan. 1977. [7] C. Lee, Random signal levels for channel access in packet broadcast networks, IEEE J. Sel. Areas Commun., vol. 5, no. 6, pp. 1026 1034, Jul. 1987. [8] R. LaMaire, A. Krishna, and M. Zorzi, Optimization of capture in multiple access radio systems with Rayleigh fading and random power levels, in Multiaccess, Mobility and Teletraffic for Personal Communications, B. Jabbari, P. Godlewski, and X. Lagrange, Eds. Norwell, MA: Kluwer, 1996, pp. 321 336. [9] Y. Leung, Mean power consumption of artificial power capture in wireless networks, IEEE Trans. Commun., vol. 45, no. 8, pp. 957 964, Aug. 1997. [10] C. Ware, J. Chicharo, and T. Wysocki, Simulation of capture behavior in IEEE 802.11 radio modems, in Proc. IEEE Vehicula Technology Conf 2001, vol. 3, Rhodes, Greece, May 2001, pp. 1393 1397. [11] D. Bertsekas and R. Gallager, Data Networks, 2nd ed. Englewood Cliffs, NJ: Prentice-Hall, 1992.