Book contents
- Frontmatter
- Contents
- Preface
- Acknowledgements
- List of notation
- 1 Introduction
- 2 The wireless channel
- 3 Point-to-point communication: detection, diversity and channel uncertainity
- 4 Cellular systems: multiple access and interference management
- 5 Capacity of wireless channels
- 6 Multiuser capacity and opportunistic communication
- 7 MIMO I: spatial multiplexing and channel modeling
- 8 MIMO II: capacity and multiplexing architectures
- 9 MIMO III: diversity–multiplexing tradeoff and universal space-time codes
- 10 MIMO IV: multiuser communication
- Appendix A Detection and estimation in additive Gaussian noise
- Appendix B Information theory from first principles
- References
- Index
6 - Multiuser capacity and opportunistic communication
Published online by Cambridge University Press: 05 June 2012
- Frontmatter
- Contents
- Preface
- Acknowledgements
- List of notation
- 1 Introduction
- 2 The wireless channel
- 3 Point-to-point communication: detection, diversity and channel uncertainity
- 4 Cellular systems: multiple access and interference management
- 5 Capacity of wireless channels
- 6 Multiuser capacity and opportunistic communication
- 7 MIMO I: spatial multiplexing and channel modeling
- 8 MIMO II: capacity and multiplexing architectures
- 9 MIMO III: diversity–multiplexing tradeoff and universal space-time codes
- 10 MIMO IV: multiuser communication
- Appendix A Detection and estimation in additive Gaussian noise
- Appendix B Information theory from first principles
- References
- Index
Summary
In Chapter 4, we studied several specific multiple access techniques (TDMA/FDMA, CDMA, OFDM) designed to share the channel among several users. A natural question is: what are the “optimal” multiple access schemes? To address this question, one must now step back and take a fundamental look at the multiuser channels themselves. Information theory can be generalized from the point-to-point scenario, considered in Chapter 5, to the multiuser ones, providing limits to multiuser communications and suggesting optimal multiple access strategies. New techniques and concepts such as successive cancellation, superposition coding and multiuser diversity emerge.
The first part of the chapter focuses on the uplink (many-to-one) and downlink (one-to-many) AWGN channel without fading. For the uplink, an optimal multiple access strategy is for all users to spread their signal across the entire bandwidth, much like in the CDMA system in Chapter 4. However, rather than decoding every user treating the interference from other users as noise, a successive interference cancellation (SIC) receiver is needed to achieve capacity. That is, after one user is decoded, its signal is stripped away from the aggregate received signal before the next user is decoded. A similar strategy is optimal for the downlink, with signals for the users superimposed on top of each other and SIC done at the mobiles: each user decodes the information intended for all of the weaker users and strips them off before decoding its own.
- Type
- Chapter
- Information
- Fundamentals of Wireless Communication , pp. 228 - 289Publisher: Cambridge University PressPrint publication year: 2005
- 9
- Cited by