collision-tolerant media access control for asynchronous

10
Collision-Tolerant Media Access Control for Asynchronous Users over Frequency-Selective Channels Gang Wang, Jingxian Wu, Member, IEEE, Guoqing Zhou, and Geoffrey Ye Li, Fellow, IEEE Abstract— In this paper, a frequency-domain cross-layer collision-tolerant (CT) media access control (MAC) scheme is proposed for the up-links of broadband wireless networks with asynchronous users. The collision tolerance is achieved with a frequency-domain on-off accumulative transmission (FD-OOAT) scheme, where the spectrum is divided into a large number of orthogonal sub-channels, and each symbol is transmitted over a small subset of the sub-channels to reduce collisions. Such a radio resource management scheme renders a special signal structure that enables multi-user detection (MUD) in the physical layer to resolve the collisions at the MAC layer. Most existing MUDs require precise symbol level synchronization among users. The proposed scheme, however, can operate with asynchronous users. A new theoretical framework is provided to study the impacts of time-domain user delays on system performance. Both analytical and simulation results demonstrate that the proposed FD-OOAT structure with time-domain oversampling is robust to user delays and the timing phase offset caused by the sampling clock difference between the transmitter and the receiver. It is shown that the proposed scheme can achieve significant performance gains, in terms of both the number of users supported and the normalized throughput. Index Terms— Collision-tolerant media access control, asyn- chronous users, timing phase offset, and oversampling I. I NTRODUCTION The design of reliable broadband multi-user systems faces a number of challenges, such as frequency-selective fading, the competitions for the limited spectrum resource, and the lack of precise synchronization, etc. The main objective of this work is to develop a spectrum efficient communication technique that can address all these challenges by exploiting the interactions between physical (PHY) layer and media access control (MAC) layer in a communication network. In many conventional MAC schemes, signals collided at a receiver will be discarded and retransmitted. This results in a waste of the precious energy and spectrum resources. Various collision-tolerant (CT) MAC protocols have been developed to extract the salient information contained in the collided signals by resorting to cross-layer designs [1]–[10]. Multi-packet reception (MPR) in [1]–[4] assumes that the receiver can recover a fraction of the collided signals by signal The material in this paper was presented in part at the the IEEE International Conference on Communications 2012. G. Wang and J. Wu are with the Department of Electrical Engineering, University of Arkansas, Fayetteville, AR 72701 USA. G. Zhou is with Litepoint Corp., Sunnyville, CA 94058 USA. G. Y. Li is with the School of Electrical and Computer Engineering, Georgia Institute of Technology, Atalanta, GA 30332 USA (e-mails: {wuj, wangg}@uark.edu, [email protected], [email protected]). This work was supported in part by the National Science Foundation under Grants ECCS-0917041, ECCS-1202075, and the Arkansas NASA EPSCoR Research Infrastructure Development grant. processing in the PHY layer. Iterative interference cancellation (IC) methods are used to resolve multi-user collisions in a contention-resolution diversity slotted ALOHA (CRDSA) [5] and an irregular repetition slotted ALOHA (IRSA) scheme [6] and [7]. In the CRDSA and IRSA schemes, each packet is transmitted multiple times at random slots in a frame. A successfully detected packet can be used to iteratively subtract the interference caused by its replicas. The throughput of CRDSA and IRSA drops dramatically once the normalized offered load exceeds certain point, because the IC schemes are unable to find at least one collision-free signal at the receiver to initiate the iterative IC process under heavy loads. In addition, all above techniques rely on perfect synchronization among users, which is difficult to achieve in practical systems. The limitations of iterative IC can be partly solved by using multi-user detection (MUD), which performs simulta- neous detection of signals from two or more users collided at the receiver. MUD in the PHY layer can be combined with MAC techniques to improve the spectrum and energy efficiency in wireless networks [8]–[10]. MUD techniques are often designed with multi-dimensional signals in the PHY layer, such as code-division multiple access (CDMA) [8] or orthogonal frequency division multiplexing (OFDM) [9]. An on-off accumulative transmission (OOAT) scheme in [10] can support more simultaneous users than the dimension of the received signals by repeating the same signal multiple times and using silence periods between two consecutive repetitions to reduce collisions. However, the OOAT scheme in [10] works only in flat fading channels, yet broadband communications dictate an operation environment of frequency-selective fading. In a multi-user system, two types of synchronizations are needed: the synchronization among the users, denoted as multi- user synchronization (MUS), and the synchronization of the sampling phase between the transmitter and receiver clocks, denoted as sampling phase synchronization (SPS). The SPS is usually based on correlation between a specially designed training sequence and the received signals [10], [14] and [15]. In multi-user systems, the base station (BS) first estimates the relative delays of all the users by correlation-based SPS. The estimated timing information can either assist the detection process [10], or be fed back to the users through a down-link control channel to achieve MUS [16]. All these schemes have residual timing offsets or synchronization errors, which could cause additional multiple access interference (MAI) and/or destroy the special signal structure critical to MUD [11]. The residual SPS errors may also introduce timing phase offset that will increase inter-symbol interference (ISI) and degrade

Upload: others

Post on 28-May-2022

8 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Collision-Tolerant Media Access Control for Asynchronous

Collision-Tolerant Media Access Control for Asynchronous Usersover Frequency-Selective Channels

Gang Wang, Jingxian Wu,Member, IEEE, Guoqing Zhou, and Geoffrey Ye Li,Fellow, IEEE

Abstract— In this paper, a frequency-domain cross-layercollision-tolerant (CT) media access control (MAC) scheme isproposed for the up-links of broadband wireless networks withasynchronous users. The collision tolerance is achieved with afrequency-domain on-off accumulative transmission (FD-OOAT)scheme, where the spectrum is divided into a large number oforthogonal sub-channels, and each symbol is transmitted overa small subset of the sub-channels to reduce collisions. Sucha radio resource management scheme renders a special signalstructure that enablesmulti-user detection (MUD) in the physicallayer to resolve the collisions at the MAC layer. Most existingMUDs require precise symbol level synchronization among users.The proposed scheme, however, can operate with asynchronoususers. A new theoretical framework is provided to study theimpacts of time-domain user delays on system performance.Both analytical and simulation results demonstrate that theproposed FD-OOAT structure with time-domain oversamplingis robust to user delays and the timing phase offset causedby the sampling clock difference between the transmitter andthe receiver. It is shown that the proposed scheme can achievesignificant performance gains, in terms of both the number ofusers supported and the normalized throughput.

Index Terms— Collision-tolerant media access control, asyn-chronous users, timing phase offset, and oversampling

I. I NTRODUCTION

The design of reliable broadband multi-user systems facesa number of challenges, such as frequency-selective fading,the competitions for the limited spectrum resource, and thelack of precise synchronization, etc. The main objective ofthis work is to develop a spectrum efficient communicationtechnique that can address all these challenges by exploitingthe interactions betweenphysical (PHY) layer andmediaaccess control(MAC) layer in a communication network.

In many conventional MAC schemes, signals collided ata receiver will be discarded and retransmitted. This resultsin a waste of the precious energy and spectrum resources.Various collision-tolerant (CT) MAC protocols have beendeveloped to extract the salient information contained in thecollided signals by resorting to cross-layer designs [1]–[10].Multi-packet reception(MPR) in [1]–[4] assumes that thereceiver can recover a fraction of the collided signals by signal

The material in this paper was presented in part at the the IEEE InternationalConference on Communications 2012. G. Wang and J. Wu are withtheDepartment of Electrical Engineering, University of Arkansas, Fayetteville,AR 72701 USA. G. Zhou is with Litepoint Corp., Sunnyville, CA94058USA. G. Y. Li is with the School of Electrical and Computer Engineering,Georgia Institute of Technology, Atalanta, GA 30332 USA (e-mails: {wuj,wangg}@uark.edu, [email protected], [email protected]). Thiswork was supported in part by the National Science Foundation under GrantsECCS-0917041, ECCS-1202075, and the Arkansas NASA EPSCoR ResearchInfrastructure Development grant.

processing in the PHY layer. Iterativeinterference cancellation(IC) methods are used to resolve multi-user collisions in acontention-resolution diversity slotted ALOHA(CRDSA) [5]and an irregular repetition slotted ALOHA (IRSA)scheme[6] and [7]. In the CRDSA and IRSA schemes, each packetis transmitted multiple times at random slots in a frame. Asuccessfully detected packet can be used to iteratively subtractthe interference caused by its replicas. The throughput ofCRDSA and IRSA drops dramatically once the normalizedoffered load exceeds certain point, because the IC schemes areunable to find at least one collision-free signal at the receiver toinitiate the iterative IC process under heavy loads. In addition,all above techniques rely on perfect synchronization amongusers, which is difficult to achieve in practical systems.

The limitations of iterative IC can be partly solved byusing multi-user detection(MUD), which performs simulta-neous detection of signals from two or more users collidedat the receiver. MUD in the PHY layer can be combinedwith MAC techniques to improve the spectrum and energyefficiency in wireless networks [8]–[10]. MUD techniques areoften designed with multi-dimensional signals in the PHYlayer, such ascode-division multiple access(CDMA) [8] ororthogonal frequency division multiplexing(OFDM) [9]. Anon-off accumulative transmission(OOAT) scheme in [10] cansupport more simultaneous users than the dimension of thereceived signals by repeating the same signal multiple timesand using silence periods between two consecutive repetitionsto reduce collisions. However, the OOAT scheme in [10] worksonly in flat fading channels, yet broadband communicationsdictate an operation environment of frequency-selective fading.

In a multi-user system, two types of synchronizations areneeded: the synchronization among the users, denoted asmulti-user synchronization(MUS), and the synchronization of thesampling phase between the transmitter and receiver clocks,denoted assampling phase synchronization(SPS). The SPSis usually based on correlation between a specially designedtraining sequence and the received signals [10], [14] and [15].In multi-user systems, thebase station(BS) first estimates therelative delays of all the users by correlation-based SPS. Theestimated timing information can either assist the detectionprocess [10], or be fed back to the users through a down-linkcontrol channel to achieve MUS [16]. All these schemes haveresidual timing offsets or synchronization errors, which couldcause additionalmultiple access interference(MAI) and/ordestroy the special signal structure critical to MUD [11]. Theresidual SPS errors may also introduce timing phase offsetthat will increaseinter-symbol interference(ISI) and degrade

Page 2: Collision-Tolerant Media Access Control for Asynchronous

signal-to-noise ratio(SNR) at the receiver [12], [13].In this paper, we propose a new cross-layer CT-MAC

scheme that can support a large number of simultaneous usersoperating in frequency-selective fading, require neitherMUSnor SPS, and is also robust to timing phase offsets. Mostexisting CT-MAC schemes in the literature are developedfor flat fading channels [5]–[7], [10]. For example, timedispersion caused by frequency-selective fading will destroythe special signal structure that is critical to the originaltime-domain OOAT scheme [10]. We address this problemby developing a newfrequency-domain OOAT(FD-OOAT),where a frequency-selective channel is divided into multipleorthogonal sub-channels in the frequency domain with the helpof OFDM. Different from conventional OFDM, each symbolis transmitted over several sub-channels with a certain on-off pattern in our scheme. The frequency-domain repetitionincreases the degree-of-freedom (DoF) of the signals at thereceiver, thus enables the collision tolerance of the system.With the FD-OOAT, the relative transmission delays amongthe users in the time-domain are manifested as phase shifts inthe frequency domain, and our theoretical analysis shows thatthey have negligible impacts on system performance. There-fore, FD-OOAT does not require precise MUS or SPS, yetsynchronization is critical to most existing CT-MAC systems.More importantly, the frequency-domain operations allow usto minimize the number of users colliding on each sub-channelby using simple on-off patterns that are radically different fromthose used by the original time-domain OOAT schemes [10].

Another important contribution of this work is the devel-opment of a new theoretical framework that quantifies theimpacts of timing phase offset on system performance inmulti-user multi-carrier systems. New analytical expressionsof the frequency-domain channel coefficients are developedas functions of the timing phase offsets. Both theoretical andsimulation results demonstrate that time-domain oversamplingcan effectively remove the effects of timing phase offset formulti-carrier systems. Therefore, the proposed scheme canoperate in an asynchronous environment without incurringadditional interference or SNR degradation. The collisions inFD-OOAT are resolved by using optimum and sub-optimumMUDs, which do not require precise synchronization as mostexisting MUD schemes. An analytical performance bound isderived to quantify the performance of the proposed scheme.

The rest of this paper is organized as follows. The FD-OOAT scheme with time-domain oversampling is presented inSection II. The optimum and sub-optimum detection methodsthat can resolve collisions and collect the diversity gainsaredescribed in Section III. In Section IV, theoretical studies areperformed to quantify the impacts of multipath diversity gainand timing phase offset. Simulation results are given in SectionV, and Section VI concludes the paper.

II. FREQUENCY-DOMAIN OOAT WITH TIME-DOMAIN

OVERSAMPLING

The model of the proposed FD-OOAT scheme with time-domain oversampling are presented in this section.

A. Proposed System Structure

Consider a wireless network withN users transmitting tothe same receiver through a shared channel. Each MAC framecontainsK symbols. To achieve collision tolerance in theMAC layer, users employ the FD-OOAT in the PHY layeras shown in Fig. 1.

The entire available bandwidth,B, is divided into KMsub-channels, denoted as sub-channels0, 1, · · · ,KM − 1 inorder, with a bandwidthB0 = B

KM each. Each symbol usesM sub-channels uniformly spread over the entire frequencyband, that is, theM sub-channels with indices,{mK +k}M−1

m=0 , are assigned for thek-th symbol in the frame, fork = 0, · · · ,K − 1. During each transmission, onlyR sub-channels from theM ones for each symbol are occupied.The indicator vector of the occupied sub-channels for then-th user can be represented by a binary vector of lengthM ,pn = [pn[0], · · · , pn[M − 1]]T ∈ BM×1, whereB = {0, 1},with pn[m] = 1 if the k-th symbol is transmitted at the{mK+k}-th sub-channel, andpn[m] = 0 otherwise. Symbolsof the same user use the same transmission patternpn. Withsuch a scheme, each symbol is repeated overR sub-channels(accumulative transmission), and the utilization of the sub-channels are determined by an on-off transmission patternpn. In the example shown in Fig. 1, there areN = 5 users,M = 12 available sub-channels per symbol, andR = 4 outof the 12 available sub-channels are occupied. It is assumedthat all users use the same carrier frequency, thus the same setof sub-channels. As a result, signals from different users arealigned in the frequency domain as shown in Fig. 1.

Based on the above description, the signal transmitted onthe (mK + k)-th sub-channel of then-th user isdn[mK +k] = pn[m]snk, where snk is the k-th symbol from usern. Consequently, the signal vector of then-th user can beexpressed asdn = [dn[0], dn[1], · · · , dn[KM − 1]]T ∈ SL×1

+ ,whereL = KM , S+ = {S, 0}, and S is the modulationconstellation set with a cardinalityS = |S|.

The signal vector,dn, is converted to the time domain byapplying anL-point inverse discrete Fourier transform(IDFT)

xn = FHL· dn, (1)

wherexn = [xn[0], xn[1], · · · , xn[L−1]]T is the time-domainsignal vector,AH is the matrix Hermitian operator, andF

L∈ CL×L is theL-point discrete Fourier transform (DFT)

matrix with the (r + 1, c + 1)-th element being[FL]r,c =

1√Lexp

(

−j2π r·cL

)

, for r, c = 0, 1, · · · , L − 1. The spacebetween two consecutive time-domain samples isT1 = 1

B .Before transmission, a length-lcp cyclic prefix(CP) is added

to the time-domain signalxn to avoid interference betweenconsecutively transmitted frames. The time-domain signalspass through a transmit filter,ϕ1(t), and then transmitted overa quasi-static frequency-selective fading channel with impulseresponsegn(t). In a quasi-static channel, the fading is constantinside a frame, and varies independently from frame to frame.At the receiver, the received signals pass through a receivefilter, ϕ2(t). Define thecomposite impulse response(CIR) of

Page 3: Collision-Tolerant Media Access Control for Asynchronous

2 3 41 5 6 7 8 9 10 110

User 1

User 2

User 3

User 4

User 5

s10s10 s10s10

s20 s20s20s20

s30 s30s30s30

s40 s40s40s40

s50s50 s50s50

B0B

Fig. 1. A frequency-domain OOAT system withN = 5 users,R = 4

sub-channels occupied out ofM = 12 sub-channels for each symbol.

the channel as

hnc(t) = ϕ1(t)⊙ gn(t)⊙ ϕ2(t), (2)

where⊙ is the convolution operator. The CIR,hnc(t), includesthe effects of the physical channel and the transmit andreceive filters. The transmit receive filters are used to limit thebandwidth of the transmitted signal. For systems with root-raised-cosine (RRC) filters as the transmit and receive filters,the bandwidth ofhnc(t) is 1+α

T1, whereα is the roll-off factor

of the filter, andT1 is the space between two consecutive timedomain samples at the transmitter.

The output of the receive filter is

yc(t) =N∑

n=1

+∞∑

l=−∞

Es

Rxn[l]hnc(t− lT1 − τn) + zc(t), (3)

whereEs is the energy per symbol,τn is the relative delay ofthe n-th user,xn[l] is the l-th time-domain sample from then-th user with a sample periodT1, zc(t) = p2(t) ⊙ vc(t) isthe noise component at the output of the receive filter, withvc(t) being theadditive white Gaussian noise(AWGN) withone-sided power spectral densityN0. The relative delay,τn,introduces mis-match between the receive filter and transmitfilter, and the effects are captured as a time shift in the CIRhnc(t). It should be noted that the effects of frequency offsetsare not considered in (3). In case of non-zero frequency offsets,they can be estimated at the receiver then compensated at thetransmitter with the help of a feedback channel.

The output of the receive filter is sampled at the time instantt = iT2, whereT2 = T1/u is the sampling period at thereceiver, with the oversampling factor,u, being an integer.Denote the relative delays among the users asτn = lnT2 +τn0, whereln represents the mis-alignment among the usersin terms of receive samples, andτn0 ∈ [0, T2] is the timingphase offset between the sampling clocks at the transmitterand receiver. The discrete-time samples are

yT[i] =

N∑

n=1

ulc−1∑

l=0

Es

Rx

nT[i− l − ln]hnT

[l] + zT[i], (4)

where yT[i] = yc(iT2) and z

T[i] = zc(iT2) are theT2-

spaced samples of the received signals and noise components,respectively,h

nT[l] = hnc(lT2−τn0) is the sampled version of

the continuous-time CIRhnc(t), andxnT

[i] is the oversampledversion ofxn[i] asx

nT[i] = xn[i/u], if i/u is an integer, and

0 otherwise. It is assumed that the length of the CIR,ulc, isan integer multiple ofu, with lc being the length of the CIRwithout oversampling, which can be always met by appendingzeros to the CIR. The timing phase offsetτn0 is incorporatedin the discrete-time CIRh

nT[l]. We will study in Section IV

the impacts ofτn0 on the statistical properties of the channelcoefficients and the system performance.

With the discrete-time system model given in (4), thelength of the CP should satisfylcp ≥ lc + ld/u − 1, whereld = max{ln} is the maximum relative transmission delayamong the users. It should be noted that the proposed methodcan work for arbitrary value ofld, and a largerld means alonger CP. To achieve better spectral and energy efficiency,itis assumed in the simulations thatld ∈ [0, uK).

Due to the time span of the transmit and receive filters, theCIR coefficients,{h

nT[l]}uLc−1

l=0 , are correlated, even thoughthe underlying channel might undergo uncorrelated scattering.The correlation coefficient,cn[l1, l2] = E

[

hnT

[l1]h∗nT

[l2]]

,can be calculated as in [18, eqn. (17)].

After the removal of the CP, the received symbols can bewritten in a matrix form as

yT=

Es

R

N∑

n=1

HnT

· xn + zT, (5)

where yT

= [yT[0], · · · , y

T[uL − 1]]T ∈ CuL×1, z

T=

[zT[0], · · · , z

T[uL − 1]]T ∈ CuL×1, H

nT= [hn,1,hn,u+1,

· · · ,hn,(L−1)u+1] ∈ CuL×L, with hn,k ∈ CuL×1 be-ing the k-th column of a circulant matrixHn ∈CuL×uL. The first column ofHn ∈ CuL×uL is hn,1 =[0T

ln, hnT [0], hnT [1], · · · , hnT [ulc−1],0T

uL−ln−ulc, ]T , and0a

is a length-a all-zero vector. With the equivalent discrete-time CIR representation, mis-alignments among users arerepresented in the form of time shifts in the columns of thecirculant channel matrixHn, and the timing phase offsets areincorporated in the discrete-time CIRhnT [l].

Due to the time span of the receive filter and the over-sampling operation, the time-domain noise vector is alsocorrelated. The vector,z

T, is zero-mean complex Gaussian

distributed with a covariance matrixRzT

= E(zTzH

T) =

N0Rϕ ∈ CuL×uL, where the(m,n)-th element ofRϕ is∫ +∞−∞ ϕ2((m− n)T2 + τ)ϕ∗

2(τ)dτ [19, Lemma 2].The uL-point DFT is applied to the vectory

Tto convert

the signal to the frequency domain as

yF=

Es

R

N∑

n=1

HnF

· dn + zF, (6)

whereyF

= FuL

yT

and zF

= FuLz

Tare the frequency-

domain signal vector and noise vector, respectively, andH

nF= F

uLH

nTFH

uL∈ CuL×L is the frequency-domain

channel matrix, withFuL

∈ CuL×uL being theuL-point DFTmatrix. Due to the correlation among the noise samples in thetime domain, they are still correlated in the frequency domain.The covariance matrix ofz

Fis Rz

F= N0FuL

RϕFHuL

. It

Page 4: Collision-Tolerant Media Access Control for Asynchronous

should be noted that due to the on-off transmission, onlyRKout of theL = MK elements indn are non-zero.

From (6), signals from different users are aligned in thefrequency domain, even though they are asynchronous in thetime domain. The matrixH

nFcan be partitioned into a stack

of u sub-matrices asHnF

= [GTn0, · · · ,GT

n(u−1)]T , where

Gnv ∈ CL×L. The matrix,Gnv, is a diagonal matrix, withthe (m+ 1)-th diagonal element being [19, Corollary 1]

Gnv[m] =e−j2π ln·(vL+m)

uL

√u

ulc−1∑

l=0

hnT

[l]e−j2π (vL+m)·luL . (7)

In (7), the delay,ln, in the time-domain is manifested as aphase shift,e−j2π

ln·(vL+m)uL , in the frequency domain.

With the model given in (6) and (7), eachdn[m] isequivalently transmitted overu sub-channels with coefficients{Gnv[m]}u−1

v=0 . Due to oversampling,u sub-channels at thereceiver occupy the same bandwidth as one sub-channel atthe transmitter. However, the relative alignment of the sub-channels from different users remain unchanged. Considerthe example in Fig. 1, with the block diagonal structure ofH

nF, the sub-channels at the receiver side can be obtained

by duplicating the diagram in Fig. 1u times in the frequencydomain, then reduce the bandwidth of each sub-channel bya factor ofu. Each modulated symbol,snk, is equivalentlytransmitted overuR sub-channels in the frequency domain.Therefore, frequency diversity is achieved with the proposedFD-OOAT scheme. TheuR sub-channels spread over theentire frequency band to maximize the frequency diversity.We will quantify the frequency diversity order by resortingtoan analytical performance bound in Section IV.

B. Collision Tolerance

With the frequency-domain system representation in (6), thereceived information at them-th sub-channel at the BS is thesuperposition of a set of signals,{dn[m]}Nn=1. The value ofdn[m] is 0 if pn[im] = 0. Therefore, only a subset of the userscollide at them-th sub-channel. The collision order at them-th sub-channel isNc[m] =

∑Nn=1 pn [im]. The collision order

of the network is defined asNc = maxm Nc[m]. We haveNc = 2 for the system shown in Fig. 1. For a system withNusers,R repetitions, andM sub-channels per symbol, there areNR repetitions transmitted overM sub-channels, thus it canbe shown that the minimum collision order isNc =

NRM

,with ⌈a⌉ being the smallest integer no less thana.

There are many different ways to construct the position vec-tors to achieve the minimum collision order. Here we presentone simple construction scheme through cyclic shifting.

Definition 1: Given M and R, define the position vectorof the first user asp1 = [1T

R,0TM−R]

T , where1n and 0n

are length-n all-one and all-zero vectors, respectively. Theposition vector of then-th user can then be obtained bycyclically shiftingp1 to the right by(n − 1)R positions, forn = 2, · · · , N .

Lemma 1:Consider an FD-OOAT system withN users,Rrepetitions, andM sub-channels per symbol. If the position

vectors are constructed as described in Definition 1, then thecollision order of the system isNc =

NRM

.Proof: Without loss of generality, consider sub-channel

with index 0. Based on the cyclic shifting construction method,user n will transmit on sub-channel 0 if and only if thereexists a non-negative integerq such that(n − 1)R ≤ qM ≤(n − 1)R + R − 1 < nR. Sinceq is an integer, the aboveinequality can be alternatively written as

⌈ (n− 1)R

M⌉ ≤ q < ⌈nR

M⌉. (8)

For a system withN users, we thus havemax(q) ≤ ⌈NRM ⌉ −

1 < ⌈NRM ⌉. On the other hand,⌈NR

M ⌉ − 1 ≤ ⌈ (N−1)RM ⌉ ≤

max(q). Thereforemax(q) = ⌈NRM ⌉− 1. The minimum value

of q is 0. Therefore there are at most⌈NRM ⌉ values of q

satisfying the inequality. Each value ofq uniquely determinesan n, thus there are at most⌈NR

M ⌉ users transmitting at sub-channel 0. The collision orders on the other sub-channels canbe bounded in a similar manner.

It should be noted that the construction described in Def-inition 1 is not unique. We can get a set of position vectorsthat achieve the minimum collision order by performing thesame permutations on all the position vectors obtained fromDefinition 1. Since all users permute their position vectorsfollowing the same pattern, the relative collision relationshipamong theN users remains unchanged.

The oversampled FD-OOAT scheme contributes to the per-formance improvement of the wireless network from the fol-lowing perspectives. First, the on-off transmission will reducethe collision order. Second, the transmission ofR identicalsub-symbols with oversampling results in auR-dimensionalreceived signal in the frequency domain, which can be usedfor the detection of theNc-dimensional signal in the spacedomain. Third, frequency diversity is achieved by transmittingthek-th symbol inuR sub-channels. Fourth, the relative delaysamong the users in the time domain are represented as phaseshifts in the frequency domain, thus the user mis-alignmentdoes not affect the collision order in the frequency domain.

III. C OLLISION RESOLUTION WITH OPTIMUM AND

SUB-OPTIMUM DETECTIONS

In this section, optimum and sub-optimum detectors aredeveloped for the oversampled FD-OOAT system to resolvethe collisions among the users and to collect the inherentfrequency diversity. The detectors do not require precise syn-chronizations among the users. The complexity of the receiveris also studied.

A. Muti-user Detection

Since the time-domain mis-alignment among the users doesnot affect the user alignment in the frequency domain as shownin Fig. 1, thek-th symbol from one user will only interferethe k-th symbols from the other users. This is different fromthe time-domain OOAT [10], where thek-th symbol from oneuser might interfere adjacent symbols from the other users dueto the signal mis-alignment in the time-domain.

Page 5: Collision-Tolerant Media Access Control for Asynchronous

The k-th symbols from all theN users,{snk}Nn=1, canbe jointly detected by using a block ofuM received signalsamplesrk = [yT

0 , · · · ,yTu−1]

T ∈ CuM×1 with yv =[y

F[vL + k], y

F[vL + K + k], · · · , y

F[vL + (M − 1)K +

k]]T ∈ CM×1. The vectorrk defined above is obtained byextractinguM elements from the frequency-domain vectory

F, and it can be alternatively represented asrk = BkyF

,whereBk ∈ BuM×uL is obtained by extractinguM rowsfrom a size-uL identity matrix IuL, with the indices of theextracted rows beingvL+mK + k, for v = 0, · · · , u− 1 andm = 0, · · · ,M − 1.

From (6), we have

rk =

Es

RHk · sk +wk, (9)

wheresk = [s1k, s

2k, · · · , s

Nk]T ∈ SN×1 andwk = BkzF

∈CuM×1 are the modulation symbol vector and noise vector,respectively,Hk = [GT

0 , · · · ,GTu−1]

T , andGv ∈ CM×N isthe frequency-domain channel matrix with the(m + 1, n)-thelement beingpn[m]Gnv[mK+ k]. Since the elements ofwk

are extracted fromzF

, they are mutually correlated with thecovariance matrixRwk

= N0BkFuLRpFHuLB

Hk .

The optimum maximum likelihood (ML) detection of (9) is

sk = argminsk∈SN

(

rk−√

Es

RHksk

)H

R†wk

(

rk−√

Es

RHksk

)

,

(10)whereR†

wkis the pseudo-inverse ofRwk

. The ML detectionrequires the exhaustive search of a set ofSN possible signalvectors, and the complexity grows exponentially with themodulation levelS and the number of usersN .

A low-complexity detection algorithm is presented hereto balance the performance-complexity tradeoff. The sub-optimum algorithm is developed by employing an iterativesoft input soft output(SISO)block decision feedback equalizer(BDFE) [20], which performssoft successive interferencecancellation(SSIC) among theN symbols insk.

The soft input to the iterative BDFE equalizer is thea prioriprobability of the symbols,P (snk = Si), for n = 1, · · · , Nand i = 1, · · · , S, whereSi ∈ S. The a priori information isobtained from the previous detection round with an iterativedetection method. The soft output of the equalizer is theaposteriori probability of the symbols,P (snk = Si|rk), forn = 1, · · · , N and i = 1, · · · , S. With the soft output at theequalizer, define thea posteriorimean,snk, and the extrinsicinformation,βnk[i], of the symbolsn(k) as

snk =S∑

i=1

P (snk = Si|rk)Si (11a)

βnk[i] = logP (snk = Si|rk)− logP (snk = Si)(11b)

The a posteriori mean,snk, is used as soft decisions for theSSIC during the SISO-BDFE process. Details of the SISO-BDFE detection can be found in [20].

In the proposed sub-optimum detection, the SISO-BDFEwith SSIC will be performed iteratively. At the first iteration,

thea priori probability is initialized toP (snk = Si) =1S . The

extrinsic information at the output of thev-th iteration will beused as the soft input of the(v + 1)-th iteration asP (snk =Si) = cnk exp[βnk[i]], wherecnk is a normalization constantto make

∑Si=1 P (snk = Si) = 1. At the final iteration, hard

decision will be made based on thea posteriori probabilitygenerated by the SISO-BDFE as

snk = argmaxSi∈S

P (snk = Si|rk). (12)

Simulation results show that the performance of the iterativedetection algorithm usually converges after 4 iterations.

IV. PERFORMANCEANALYSIS

Theoretical analysis is performed in this section to quantifythe impacts of timing phase offsets on the performance of theproposed FD-OOAT scheme.

A. An Analytic Performance Lower Bound

An analytic performance lower bound on thebit-error rate(BER) of the proposed frequency-domain CT-MAC schemewith binary phase shift keying(BPSK) is developed by em-ploying the genie-aided detector [21], where a genie providesside information of the symbols from all other users such thatinterference-free detection can be performed. The genie-aidedbound is the same as the exact BER of a single user system,because it assumes that interferences from all other users canbe removed. It will be shown through simulations that thebound is very tight even when the number of users is large dueto the collision-tolerance properties of the proposed scheme.

With the interference-free assumption, the received signalcorresponding to thek-th symbol of then-th user is

rnk =

Es

Rgnk · snk +wnk, (13)

where rnk = [yTn0, · · · ,yT

n(u−1)]T ∈ CuR×1 with ynv =

[yF[vL+n1K+k], · · · , y

F[vL+nRK+k]]T ∈ CR×1, nr is the

r-th non-zero position inpn, wnk = [zTn0, · · · , zTn(u−1)]T ∈

CuR×1 with znv = [zF[vL+ n1K + k], · · · , z

F[vL+ nRK +

k]]T ∈ CR×1, and gnk = [GTn0, · · · , GT

n(u−1)]T ∈ CuR×1

with Gnv = [Gnv[n1K + k], · · · , Gnv[nRK + k]]T ∈ CR×1

being the channel coefficient vector.From the system model in (13),R repetitions of each

symbol is equivalently transmitted overuR sub-channels,which is equivalent to asingle-input multiple-output(SIMO)system. The SIMO system has correlated channel taps and iscorrupted by colored noise.

The channel coefficient vector,gnk, can be represented as

gnk =√LBnk ·F

uL· hn,1, (14)

wherehn,1 is the first column of the matrixHn, andBnk ∈BuR×uL is a binary matrix, with the(vR+r, vL+nrK+k+1)-th element being 1, forr = 1, · · · , R, v = 0, · · · , u − 1, andall other elements being zero.

The auto-correlation matrix,Rnk = E[gnkgHnk], is

Rnk = LBnkFuLRhnF

HuL

BTnk, (15)

Page 6: Collision-Tolerant Media Access Control for Asynchronous

whereRhn = E(hn,1hHn,1). Rhn can be written as a block

matrix as

Rhn =

0ln×ln 0ln×ulc 0ln×lr

0ulc×ln Rhn 0ulc×lr

0lr×ln 0lr×ulc 0lr×lr

, (16)

where lr = L − ln − ulc, and the (l1, l2)-th element ofRhn ∈ Culc×ulc is cn[l1, l2] = E

[

hnT

[l1]h∗nT

[l2]]

, and it canbe calculated from [18, eqn. (17)].

The covariance matrixRwnkof the colored noisewnk is

Rwnk= N0BnkFuL

RϕFHuLBT

nk. (17)

The covariance matrix might be rank deficient. Define thepseudo-inverse of the noise covariance matrixRwnk

R+wnk

= UnkΛ−1nkU

Hnk ∈ CuR×uR, (18)

with Unk = [unk,1,unk,2, · · · ,unk,vk ] ∈ CuR×vk , Λnk =diag[λnk,1, λnk,2, · · · , λnk,vk ] ∈ Cvk×vk , where vk is thenumber of non-zero eigenvalues ofRwnk

, Λnk is a diagonalmatrix with {λnk,i}vki=1 being the non-zero eigenvalues ofRwnk

, and {unk,i}vki=1 are the corresponding orthonormaleigenvectors.

Define the noise whitening matrixDnk = Λ−1/2nk VH

nk.Applying Dnk to both sides of (18) yields an equivalentsystem

rnk =

Es

Rgnk · snk + wnk, (19)

where rnk = Dnkrnk, gnk = Dnkgnk, and wnk =Dnkwnk with the covariance matrix ofwnk beingRwnk

=DnkRwnk

DHnk = N0Ivk .

The SNR of (19) can be written as

γ = gHnkR

+wnk

gnkγ0R, (20)

whereγ0 = Es

N0is the SNR without fading. For systems with

BPSK and Rayleigh fading, the error probability forsnk is[12]

Pnk(E) =1

π

∫ π

2

0

Lnk∏

r=1

[

1 +δnkrγ0

R sin2 θ

]−1

dθ, (21)

where Lnk is the rank of the product matrix,DnkRnkDHnk,

and δnkr , for r = 1, · · · , Lnk, are the corresponding non-zero eigenvalues. The average BER can then be calculated asP (E) = 1

NK

∑Nn=1

∑Kk=1 Pnk(E).

In the above analysis, the order of multipath diversity isLnk, which is the rank ofDnkRnkD

Hnk. The matrixRnk

corresponds to correlation of the frequency domain channelcoefficients, andDH

nkDnk = R+wnk

is the pseudo-inverse ofthe noise covariance matrix,Rwnk

.The off-diagonal elements of the matrixRwnk

are con-tributed by the correlation of the colored noise. TheuR ele-ments in the noise vector,wnk, are extracted from the size-uLfrequency-domain noise vectorz

Fbased on the transmission

patternpn, and there is at leastK sub-channels betweenany two samples inwnk. As a result, the mutual correlation

between the samples inwnk is usually very small. To measurethe mutual correlation of the samples inwnk, define a metric

ρ =1

NK

N∑

n=1

K∑

k=1

‖R′wnk

‖2‖Rwnk

‖2, (22)

whereR′wnk

is a diagonal matrix obtained by setting all off-diagonal elements ofRwnk

to 0, and‖A‖2 is the Frobeniusnorm of the matrixA. The metric0 ≤ ρ ≤ 1 measures thepercentage of energy on the diagonal ofRwnk

, and ρ = 1means thatRwnk

is a diagonal matrix. Table 1 shows thevalues of1 − ρ with u = 2, M = 12, R = 2, and variousvalues ofK. It is clear thatρ is very close to 1, and thedifference betweenρ and 1 decreases asK increases. Theresults in Table 1 demonstrate that the off-diagonal elementsof Rwnk

are negligible compared to its diagonal elements.If we ignore the off-diagonal elements ofRwnk

and approx-imate the noise vectorwnk as white noise with correlationmatrix R′

wnk, then we can simplify the error performance

analysis. With the white noise assumption, the SNR in (20)can be approximated by

γ′nk =

γ0R

u−1∑

v=0

R∑

r=1

|Gnv[nrK + k]|2φnk[vR + r], (23)

whereφnk[r] = q−1nk [r] if qnk[r] 6= 0 with qnk[r] being ther-

th diagonal element ofRwnk, andφnk[r] = 0 otherwise. The

error probability in (21) can then be approximated by using theeigenvalues of the product matrixD′

nkRnkD′Hnk , with D′

nk =

diag{

φ1/2nk [0], · · · , φ1/2

nk [uR− 1]}

being a diagonal matrix.The BER results calculated with the white approximation in(23) is very close to the exact genie-aided bound in (21), fromour simulation sinceρ is very close to1.

B. Impacts of Relative Delays

In this subsection, a theoretical framework is provided tostudy the impacts of the relative delays among the users onthe performance of the proposed FD-OOAT scheme. Fromthe analysis in the previous subsection, the performance ofthe system is dominated by the statistical properties of theSNR γ′

nk defined in (23), which in turn depends on thesquared amplitude of the channel coefficients,|Gnv[m]|2. Itshould be noted that the power and the auto-correlation of thenoise components are independent of the relative delaysτn asevident in (17).

The relative delay can be expressed asτn = lnT2 + τn0,where ln represents the mis-alignment among the users, andτn0 ∈ [0, T2] is the timing phase offset of the sampler. It isclear from (7) thatln has no impact on the squared amplitude|Gnv[m]|2. Next we will study the impact ofτn0 on |Gnv[m]|2.

TABLE I

THE METRIC1− ρ UNDER DIFFERENTK (M = 12, R = 2 AND u = 2).

K 1 10 20 50 1001−ρ 4.9×10−3 2.3×10−4 8.9×10−5 4.0×10−5 1.8×10−5

Page 7: Collision-Tolerant Media Access Control for Asynchronous

Define thediscrete-time Fourier transform(DTFT) of theT2-spaced discrete-time CIR,h

nT[l], as

HnT

(f) =

ulc−1∑

l=0

hnT

[l]e−j2πlf , 0 ≤ f ≤ 1 (24)

SincehnT

[l] = hnc(lT2−τn0), based on the sampling theorem,the DTFT can be expressed as

HnT

(f) =1

T2

∞∑

i=−∞Hnc

(

f − i

T2

)

exp

(

−j2πτn0f − i

T2

)

,

(25)whereHnc

(

fT2

)

is the Fourier transform of the CIRhnc(t).From (7), (24), and (25), we can write the frequency-domain

channel coefficient,Gnv[m], as

Gnv[m]=e−j2π ln·(vL+m)

uL

T2√u

∞∑

i=−∞Hnc

(

vL+m

uLT2− i

T2

)

e−j2πτn0vL+m−uLi

uLT2 .

(26)The CIR,hnc(t), includes the effects of the physical chan-

nel and the transmit and receive filters. From (2), we haveHnc

(

fT2

)

= P1

(

fT2

)

Gn

(

fT2

)

P2

(

fT2

)

, where Pi

(

fT2

)

and Gn

(

fT2

)

are the Fourier transforms ofϕi(t) and gn(t),respectively. If the roll-off factor of the transmit and receivefilters is α, then the frequency domain support ofPi

(

fT2

)

is∣

fT2

∣≤ 1+α

2T1, or |f | ≤ 1+α

2u . All practical systems haveat most 100% excessive bandwidth,i.e., α ≤ 1. Therefore,Hnc

(

fT2

)

= 0 for |f | > 1u .

1) u = 1: For a system without oversampling, we haveT1 = T2, and the frequency-domain support ofPi

(

fT1

)

and

Hnc

(

fT1

)

are | fT1| < 1+α

2T1. Due to the excessive bandwidth

of the transmitted signal whenα > 0, the sampling operationat the receiver causes spectrum aliasing as shown in (25) and(26). It is apparent from (26) that the frequency-domain chan-nel coefficient is a function ofτn0. Therefore, the performanceof the system withu = 1 will be affected byτn0.

2) u ≥ 2: The frequency-domain support ofPi

(

fT2

)

and

Hnc

(

fT2

)

are | fT2| < 1+α

2uT2≤ 1

2T2for α ≤ 1. Therefore,

the sampling rate1T2

is at least twice as much as the signalbandwidth, and there is no spectrum aliasing after sampling.The channel coefficient in (26) is simplified to

Gnv[m] =e−j2π ln·(vL+m)

uL

T2√u

Hnc

(

vL+m

uLT2

)

e−j2πτn0

vL+m

uLT2 .

(27)The squared amplitude of the channel coefficient can then beexpressed as

|Gnv[m]|2 =1

T2√u

Hnc

(

vL+m

uLT2

)∣

2

. (28)

It is interesting to note that|Gnv[m]|2 is independent of theuser mis-alignmentsln or the timing phase offsetτn0. Sincethe system performance is dominated by the squared amplitude

of the channel coefficient as shown in the SNR defined in(23), the user mis-alignments or timing phase offset has a verysmall, if any, impact on the performance of the system whenu ≥ 2. Specifically, for systems with at most 100% excessivebandwidth, an oversampling factor of 2 is sufficient to avoidspectrum aliasing at the receiver, thus removes the impactsofτn0. The above analysis is corroborated by simulation resultswith both optimum and sub-optimum detectors.

V. SIMULATION RESULTS

In the simulation examples, the sample period at the trans-mitter is set toT1 = 3.69 µs, and RRC filters with a roll-off factor α = 1.0 is used for both the transmit and receivefilters. The relative delays among the users,τn, is uniformlydistributed between[0,KT1] with K = 50 unless statedotherwise. The frequency-selective fading channel follows theTypical Urban(TU) power delay profile(PDP) [22].

Fig. 2 shows the BER results of the proposed CT-MACsystem under various system configurations. There areM =12 sub-channels andR = 2 repetitions for each symbol. Thesub-optimum BDFE detection is performed with 4 iterations.The analytical results are obtained with both (21) and thewhite approximation as in (23), and the two results overlap.We have the following observations about the results. First,when N = 1, the analytical and simulation results matchperfectly for bothu = 1 and 2. Second, with the BDFEreceiver, increasingN has less impacts on the oversampledsystem withu = 2 than the system withu = 1. At BER= 2 × 10−3, increasingN from 1 to 10 results in a 1.5dB and a 0.8 dB performance loss for systems withu = 1and u = 2, respectively. This indicates that the proposedFD-OOAT system can operate properly even when there area large number of users and collisions. In addition, whenu = 2 andN = 10, the sub-optimum BDFE receiver achievesalmost the same performance as the optimum ML receiver, butwith a much lower complexity. Third, the oversampled systemconsistently outperforms the system without oversampling.The performance improvement is contributed by the additionalmultipath diversity and the insensitivity to the timing phaseoffset due to the oversampling operation. At BER =2× 10−3

and N = 10, the oversampled system outperforms its non-oversampled counterpart by 5.6 dB when BDFE is used.

The effects of the receiver timing phase offset on thesystem performance are studied through simulations in Fig.3 for single-user systems and Fig. 4 for multi-user systems,respectively. In Fig. 3, there areR = 2 repetitions andM = 12sub-channels per symbol. To have a better understanding onthe effects of timing phase offset, it is assumed thatτn0 isfixed at 0 or0.5T2 in Fig. 3. The performance of the systemwith u = 1 varies asτn0 changes, yet the performance of theoversampled system is independent ofτn0.

A similar observation is obtained in Fig. 4 for systemswith multiple users, where the BER is shown as a functionof τn0. The mis-alignment among the asynchronous users,ln, is uniformly distributed between[0, uK]. The Eb/N0 is10 dB. The BER of the oversampled system stays constant

Page 8: Collision-Tolerant Media Access Control for Asynchronous

0 5 10 15 20

10−4

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

N=1, simulation (ML)N=1, simulation (BDFE)N=1, analyticalN=10, simulation (ML)N=10, simulation (BDFE)

u=1

u=2

Fig. 2. BER performance comparison of systems withM = 12 sub-channelsper symbol,R = 2 repetitions, and different number of users.

regardless of the values ofτn0, for both the optimum andsub-optimum algorithms with different number of users. Onthe other hand, the BER of the system withu = 1 is a functionof τn0. The simulation results corroborate the theoreticalanalysis that twice oversampling is sufficient to remove theeffects of τn0 for a system with at most 100% excessivebandwidth. Therefore, the proposed oversampled FD-OOATscheme can operate effectively at the presence of both multi-user interference, user mis-alignment, and timing phase offset.

Fig. 5 demonstrates the impacts of the number of iterationson the frame error rate(FER) with the sub-optimum BDFEdetector through simulations. There areN = 10 active users,R = 2 repetitions andM = 12 sub-channels per symbol. Thelargest performance gain is achieved at the second iteration andthe performance converges at the fourth iteration for systemswith u = 1 or u = 2. At the fourth iteration and FER=4 × 10−2, the FER performance of the oversampled systemoutperforms the one without oversampling by 5.6 dB, whichis consistent with the BER improvement observed in Fig. 2.

Fig. 6 shows the normalized throughput as a function ofthe normalized offered load for various MAC schemes. Forthe FD-OOAT system, there areM = 10 sub-channels andR = 2 repetitions per symbol. All other systems haveM = 10slots per frame. The normalized offered load of all systems iscalculated asG = N

M . The normalized throughput is definedas the amount of data successfully delivered to the receiverperunit time per unit bandwidth. The normalized throughput forthe FD-OOAT scheme is calculated asN

M (1−FER). Details ofthe calculation of the normalized offered load and normalizedthroughput can be found in [10]. For the slotted ALOHA,CRDSA, and IRSA systems, the simulations are performedunder the assumption of noise-free communication,i.e., theonly source of errors for these systems is the unresolvablesignal collisions among the users. Results obtained under thenoise-free assumption represent the best possible performance

0 5 10 15 20

10−4

10−3

10−2

10−1

100

Eb/N

0 (dB)

BE

R

u=1, τn0

=0, analytical

u=1, τn0

=0, simulation

u=1, τn0

=0.5T2, analytical

u=1, τn0

=0.5T2, simulation

u=2, τn0

=0, analytical

u=2, τn0

=0, simulation

u=2, τn0

=0.5T2, analytical

u=2, τn0

=0.5T2, simulation

Fig. 3. The effects of the receiver timing phase offset on theBERperformance of the system (There areN = 1 user,M = 12 sub-channelsper symbol, andR = 2 repetitions).

0 0.2 0.4 0.6 0.8 110

−3

10−2

10−1

100

Sampling Timing Offset τn0

(T2)

BE

R

u=1,N=1 (ML)u=1,N=1 (BDFE)u=1,N=10 (ML)u=1,N=10 (BDFE)u=2,N=1 (ML)u=2,N=1 (BDFE)u=2,N=10 (ML)u=2,N=10 (BDFE)

Fig. 4. BER v.s. timing phase offset (Eb/N0 = 10 dB. There areM = 12

sub-channels per symbol, andR = 2 repetitions).

under any channel configurations. On the other hand, theresults of the proposed FD-OOAT systems are obtained in afrequency-selective fading channel withEb/N0 = 15 dB. Asshown in the figure, the slotted ALOHA, CRDSA and IRSAachieve their respective peak throughput whenG ≤ 1, andthe throughput drop dramatically whenG > 1. The proposedFD-OOAT scheme achieves the maximum throughput 1.03bps/Hz atG = 1.6 when u = 1. For the oversampledsystem withu = 2, the maximum throughput 2.06 bps/Hzis achieved atG = 2.6. Therefore, the FD-OOAT system canbe overloaded by supporting more users than the number ofsub-channels, yet all the other MAC schemes must operatewith G ≤ 1. Employing FD-OOAT increases both the number

Page 9: Collision-Tolerant Media Access Control for Asynchronous

0 5 10 15 2010

−3

10−2

10−1

100

Eb/N

0 (dB)

FE

R

1st iteration2nd iteration3rd iteration4th iteration

u=1

u=2

Fig. 5. FER performance of systems with the BDFE receiver (There areN = 10 users,M = 12 sub-channels, andR = 2 repetitions).

0.5 1 1.5 2 2.5 3 3.5 40

0.5

1

1.5

2

2.5

Normalized Offered Load

Nor

mal

ized

Thr

ough

put (

bps/

Hz)

FD−OOAT (u=2)FD−OOAT (u=1)ALOHACRDSAIRSA

Fig. 6. Normalized throughput v.s. normalized offered load.

of users supported and peak throughput. In addition, time-domain oversampling allows the FD-OOAT system to support60% more users than the system withu = 1, and improvesthe throughput by 100%.

VI. CONCLUSIONS

A cross-layer CT-MAC scheme with frequency-domainOOAT and time-domain oversampling has been proposed forbroadband wireless networks operating in frequency-selectivefading. With the help of time-domain oversampling, the pro-posed scheme can operate without precise synchronization,and it is insensitive to timing phase offsets between the sam-pling clocks at the transmitter and receiver. Simulation resultsdemonstrated that 1) the performance of the oversampledFD-OOAT system was insensitive to user mis-alignment orsampler timing phase offset; 2) significant multipath diversitygain was achieved with the oversampled FD-OOAT scheme;

3) the proposed scheme achieved a high spectral efficiency bysupporting a large number of simultaneous broadband users.An oversampled FD-OOAT withM sub-channels per symbolcould support up toN = 2.6M simultaneous users and has anormalized throughput peak at 2.06 bps/Hz with BPSK.

REFERENCES

[1] G. Mergen and L. Tong, “Receiver controlled medium access in multihopad hoc networks with multipacket reception,” inProc. IEEE MilitaryCommun. Conf. MILCOM 2001, vol. 2, pp. 1014 - 1018, 2001.

[2] L. Tong, V. Naware, and P. Venkitasubramaniam, “Signal processing inrandom access,”IEEE Sig. processing Mag., vol. 21, pp. 29-39, Sept. 2004.

[3] Q. Zhao and L. Tong, “A dynamic queue protocol for multiaccess wirelessnetworks with multipacket reception,”IEEE Trans. Wireless Commun., vol.3, pp. 2221 - 2231, Nov. 2004.

[4] R. Samano-Robles, M. Ghogho, and D. C. Mclernon, “An infinite usermodel for random access protocols assisted by multipacket reception andretransmission diversity,” inProc. IEEE Sig. Processing Advances WirelessCommun. SPAWC 2008, pp. 111 - 115, 2008.

[5] E. Casini, R. De Gaudenzi, and O. del Rio Herrero, “Contention resolutiondiversity slotted ALOHA (CRDSA): an enhanced random accessschemefor satellite access packet networks,”IEEE Trans. Wireless Commun., vol.6, pp. 1408 - 1419, Apr. 2007.

[6] G. Liva, “A slotted ALOHA scheme based on bipartite graphoptimiza-tion,” in Proc. Intern. ITG Conf. Source and Channel Coding SCC’10, Jan.2010.

[7] G. Liva, “Graph-based analysis and optimization of contention resolutiondiversity slotted ALOHA,”IEEE Trans. Commun., vol. 59, pp. 477 - 487,Feb. 2011.

[8] B. Lu, X. Wang, and J. Zhang, “Throughput of CDMA data networks withmultiuser detection, ARQ, and packet combining,”IEEE Trans. WirelessCommun., vol. 3, pp. 1576 - 1589, Sept. 2004.

[9] Y. J. Zhang and K. B. Letaief, “An efficient resource-allocation scheme forspatial multiuser access in MIMO/OFDM systems,”IEEE Trans. Commun.,vol. 53, pp. 107-116, Jan. 2005.

[10] J. Wu and G. Y. Li, “Collision-tolerant media access control with on-offaccumulative transmission,”IEEE Trans. Wireless Commun., vol. 12, pp.50-59, Jan. 2013.

[11] D. Marabissi, R. Fantacci and S. Papini, “Robust multiuser interferencecancellation for OFDM systems with frequency offset,”IEEE Trans.Wireless Commun., vol. 5, pp. 3068 - 3076, Nov. 2006.

[12] J. Wu and C. Xiao, “Performance analysis of wireless systems withdoubly selective Rayleigh fading,”IEEE Trans. Veh. Technol., vol. 56, pp.721 - 730, Mar. 2007.

[13] J. Wu, Y. R. Zheng, K. B. Letaief and C. Xiao, “On the errorperfor-mance of wireless systems with frequency-selective fadingand receivertiming phase offset,”IEEE Trans. Wireless Commun., vol. 6, pp. 720 -729, Feb. 2007.

[14] S. Tian, K. Panta, H. A. Suraweera, B. J. C. Schmidt, S. McLaughlin andJ. Armstrong, “A novel timing synchronization method for ACO-OFDMbased optical wireless communications,”IEEE Trans. Wireless Commun.,vol. 7, pp. 4958 - 4967, Dec. 2008.

[15] B. Park, H. Cheon, C. Kang, and D. Hong, “A novel timing estimationmethod for OFDM systems,”IEEE Commun. Lett., vol. 7, pp. 239-241,May 2003.

[16] M. Morelli, “Timing and frequency synchronization forthe uplink ofan OFDMA system,”IEEE Trans. Commun., vol. 52, pp. 296-306, Feb.2004.

[17] J. Lee and S. Kim, “Time and frequency synchronization for OFDMAuplink system using the SAGE algorithm,”IEEE Trans. on WirelessCommun., vol. 6, pp. 1176 - 1181, Apr. 2007.

[18] C. Xiao, J. Wu, S.-Y. Leong, Y. R. Zheng and K. B. Letaief,“A discrete-time model for triply selective MIMO Rayleigh fading channels,” IEEETrans. Wireless Commun., vol. 3, pp. 1678 - 1688, Sept. 2004.

[19] J. Wu, and Y. R. Zheng, “Oversampled orthogonal frequency divisionmultiplexing in doubly selective fading channels,”IEEE Transactions onWireless Communications, vol. 59, pp. 815 - 822, Mar. 2011.

[20] J. Wu and Y. R. Zheng, “Low complexity soft input soft output blockdecision feedback equalization,”IEEE J. Selected Areas Commun., vol. 26,pp. 281 - 289, 2008.

[21] J. R. Barry, E. A. Lee, and D. G. Messerschmitt,Digital Communica-tions, 3rd Ed., Springer, 2003.

Page 10: Collision-Tolerant Media Access Control for Asynchronous

[22] ITU-R Recommendation M.1225, “Guidelines for evaluation of radiotransmission techniques for IMT-2000,” 1997.

[23] J. Tao, J. Wu, and Y. R. Zheng, “Reliability-based turbodetection,”IEEETransactions on Wireless Communications, vol. 10, pp. 2352 - 2361, 2011.

Gang Wang received the B.S. (EE) degree fromthe Northwestern Polytechnical University, Xi′an,China, in 2005, and the M.S. (EE) degree fromBeihang University (with honor), Beijing, China, in2008. He then served as a wireless system engineerin New Postcom Equipment Co., Ltd, in Beijing,from 2008 to 2010. He is currently a Ph.D. student atthe Department of Electrical Engineering, Universityof Arkansas, Fayetteville. His current research in-terests include energy-efficient system, convex opti-mization, cross-layer design, and wireless networks,

etc. He is a member of the Golden Key International Honor Society.

Jingxian Wu (S’02-M’06) received the B.S. (EE)degree from the Beijing University of Aeronau-tics and Astronautics, Beijing, China, in 1998, theM.S. (EE) degree from Tsinghua University, Beijing,China, in 2001, and the Ph.D. (EE) degree from theUniversity of Missouri at Columbia, MO, USA, in2005. He is currently an Associate Professor with theDepartment of Electrical Engineering, University ofArkansas, Fayetteville. His research interests mainlyfocus on wireless communications and wireless net-works, including ultra-low power communications,

energy efficient communications, high mobility communications, and cross-layer optimization, etc. He is an Editor of the IEEE TRANSACTIONSON WIRELESS COMMUNICATIONS, an Associate Editor of the IEEEACCESS, and served as an Associate Editor of the IEEE TRANSACTIONSON VEHICULAR TECHNOLOGY from 2007 to 2011. He served as aCochair for the 2012 Wireless Communication Symposium of the IEEEInternational Conference on Communication, and a Cochair for the 2009 Wire-less Communication Symposium of the IEEE Global TelecommunicationsConference. Since 2006, he has served as a Technical ProgramCommitteeMember for a number of international conferences, including the IEEE GlobalTelecommunications Conference, and the IEEE International Conference onCommunications, etc.

Guoqing Zhou received the B.S. (EE) degree fromthe Shandong University of Science and Technol-ogy (SDUST), Qingdao, China, in 2002, the M.S.(EE) from Soongsil University, Seoul, South Korea,in 2008, and the PhD degree in the Departmentof Electrical Engineering, University of Arkansas,Fayetteville, USA. He is currently a RF software ap-plication engineer in LitePoint, a Teradyne company,Sunnyvale, California, USA. From 2002 to 2006, hewas a research engineer in Science & TechnologyCompany of SDUST, Qingdao, China. His research

interests include wireless communications, wireless sensor networks andunderwater acoustic communications.

Geoffrey Ye Li received his B.S.E. and M.S.E.degrees in 1983 and 1986, respectively, from theDepartment of Wireless Engineering, Nanjing Insti-tute of Technology, Nanjing, China, and his Ph.D.degree in 1994 from the Department of ElectricalEngineering, Auburn University, Alabama. He wasa Teaching Assistant and then a Lecturer with South-east University, Nanjing, China, from 1986 to 1991,a Research and Teaching Assistant with AuburnUniversity, Alabama, from 1991 to 1994, and a Post-Doctoral Research Associate with the University of

Maryland at College Park, Maryland, from 1994 to 1996. He waswithAT&T Labs - Research at Red Bank, New Jersey, as a Senior and then aPrincipal Technical Staff Member from 1996 to 2000. Since 2000, he hasbeen with the School of Electrical and Computer Engineeringat GeorgiaInstitute of Technology as an Associate and then a Full Professor. He is alsoholding the Cheung Kong Scholar title at the University of Electronic Scienceand Technology of China since March 2006. His general research interestsinclude statistical signal processing and telecommunications, with emphasis oncross-layer optimization for spectral- and energy-efficient networks, cognitiveradios, and practical techniques in LTE systems. In these areas, he haspublished over 300 referred journal and conference papers in addition to 20granted patents. His publications have been cited over 14,000 times and heis listed as a highly cited researcher by Thomson Reuters. Heonce servedor is currently serving as an editor, a member of editorial board, and aguest editor for over 10 technical journals. He organized and chaired manyinternational conferences, including technical program vice-chair of IEEEICC03 and co-chair of IEEE SPARC11. He has been awarded an IEEEFellow for his contributions to signal processing for wireless communicationssince 2006, selected as a Distinguished Lecturer for 2009 - 2010 by IEEECommunications Society, and won 2010 Stephen O. Rice Prize Paper Awardfrom IEEE Communications Society in the field of communications theoryand 2013 James Evans Avant Garde Award from IEEE Vehicular TechnologySociety to recognize leadership and continuing contributions in promotingnew technology in the field of Vehicular Communications and Electronics.