0% found this document useful (0 votes)
5 views

Lecture 2 Outline: EE360: Multiuser Wireless Systems and Networks

This lecture covers bandwidth sharing techniques, multiuser detection, random access, and multiuser channel capacity in wireless systems. Key points discussed include: 1) Bandwidth sharing can occur through frequency division, time division, code division, space division, or hybrid techniques to allocate resources to multiple users. 2) Multiuser detection techniques can separate and subtract signals to mitigate interference between users. 3) Random access techniques like Aloha are used for bursty data transmission but perform poorly under heavy loads. Scheduling and hybrid methods are better for streaming data. 4) Multiuser channel capacity determines the fundamental limits on achievable data rates based on factors like bandwidth, SINR, channel characteristics, and

Uploaded by

Ahmed Sharif
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Lecture 2 Outline: EE360: Multiuser Wireless Systems and Networks

This lecture covers bandwidth sharing techniques, multiuser detection, random access, and multiuser channel capacity in wireless systems. Key points discussed include: 1) Bandwidth sharing can occur through frequency division, time division, code division, space division, or hybrid techniques to allocate resources to multiple users. 2) Multiuser detection techniques can separate and subtract signals to mitigate interference between users. 3) Random access techniques like Aloha are used for bursty data transmission but perform poorly under heavy loads. Scheduling and hybrid methods are better for streaming data. 4) Multiuser channel capacity determines the fundamental limits on achievable data rates based on factors like bandwidth, SINR, channel characteristics, and

Uploaded by

Ahmed Sharif
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

EE360: Multiuser Wireless Systems and Networks

Lecture 2 Outline
Announcements
Makeup lecture this Friday, 5-6:15, Packard 202 (pizza)
Bandwidth Sharing in Multiuser Channels
FD, TD, CD, SD, Hybrid
Multiuser Detection
Random Access
Scheduling Techniques
Overview of Multiuser Channel Capacity
Capacity of Broadcast Channels
AWGN
Fading
ISI
MIMO
Review of Last Lecture:
Uplink and Downlink
Downlink (Broadcast
Channel or BC):
One Transmitter
to Many Receivers.
Uplink (Multiple Access
Channel or MAC):
Many Transmitters
to One Receiver.
R
1
R
2
R
3
x
h
1
(t)
x
h
21
(t)
x
h
3
(t)
x
h
22
(t)
Uplink and Downlink typically duplexed in time or frequency
7C29822.033-Cimini-9/97
Bandwidth Sharing
Frequency Division
Time Division
Code Division
Multiuser Detection
Space (MIMO Systems)
Hybrid Schemes
Code Space
Time
Frequency
Code Space
Time
Frequency
Code Space
Time
Frequency
Multiuser Detection
Signal 1
Demod
Signal 2
Demod
-
=
Signal 1
-
=
Signal 2
Code properties of CDMA allow the signal separation and subtraction
RANDOM ACCESS TECHNIQUES
7C29822.038-Cimini-9/97
Random Access and Scheduling
Dedicated channels wasteful for data
Use statistical multiplexing
Random Access Techniques
Aloha (Pure and Slotted)
Carrier sensing
Typically include collision detection or avoidance
Poor performance in heavy loading
Reservation protocols
Resources reserved for short transmissions (overhead)
Hybrid Methods: Packet-Reservation Multiple Access
Retransmissions used for corrupted data
Often assumes corruption due to a collision, not channel
Multiuser Channel Capacity
Fundamental Limit on Data Rates
Main drivers of channel capacity
Bandwidth and received SINR
Channel model (fading, ISI)
Channel knowledge and how it is used
Number of antennas at TX and RX
Duality connects capacity regions of uplink and downlink
Capacity: The set of simultaneously achievable rates {R
1
,,R
n
}
R
1
R
2
R
3
R
1
R
2
R
3
Main Points
Orthogonal techniques (TD, FD, CD with
orthogonal codes) channelize resources
No interference between users
Semiorthogonal techniques introduce interference
Interference can be removed via MUD
This is optimal from a capacity perspective
Random access techniques used for bursty data
Poor performance in heavy loading
Scheduling and hybrid techniques used in streaming data
Capacity dictates fundamental channel rate limits
Also provides insight into practical design

You might also like