3.5 Mutually Interfering
In this case, also, the constraints on power are also ex-
pressed by (3). Instead of seeking complete indepen-
dence of different transmissions, by using of time, fre-
quency, or code segregation, in this case we make no
attempt to prevent interfence between different trans-
missions, and simply allow them to proceed simulta-
neously, with each transmitter treating the others as
white noise. We may suppose, for example, that each
uses a unique coding which ensures that its signal ap-
pears, statistically, as white noise for the others. In a
situation where transmitters are far from each other, or
where background noise is already of relatavely high
power, this approach will be nearly optimal.
4 SUM-RATE OPTIMAL
THROUGHPUT
The transmitters sharing the available spectrum are
always assumed, when time, frequency, or code re-
sources are shared, to be allocated equal shares. It is
therefore possible that higher throughputs than those
we obtain below could be attained by unequal allo-
cation of resources. Our intention in this paper is
primarily to compare the different sharing strategies
rather than to optimize throughput as such. In any
case, since focussing on total throughput would often
result in some users being allowed no resources at all,
it is unlikely that total throughput in this sense is an
appropriate objective.
In this section we determine the maximum sum-
rate throughput, per Hz, for each of the power allo-
cation and sharing schemes considered in Section 3.
We assume that each transmitter has identical access
to communication resources – allocation of these re-
sources is not optimized. Rather, it is allocation of
power to the resources which is under consideration.
Mainly we seek to compare the throughput achieved
by the alternative schemes, under different network
conditions.
In the first two cases (time segregated, and individ-
ual power constraints), the optimal power allocation
to devices is obvious. In both these cases, devices
simply transmit at their maximum power, while they
are active.
In the EMF-constrained case, set out in Subsec-
tion 3.3, the vector of power levels is P = (P
1
,... ,P
N
)
0
where
P = T
P
G
−1
u (4)
Where u is a vector of 1
0
s and ∗
0
s. If u
j
= ∗ we
require P
j
= 0. In other words, we select a subset of
sources to transmit at full power and another set of
sources that will be idle. One such selection will be
optimal.
To work out which ones should be transmitting
and which should not, consider a small change to
the power of a transmitter, along with the consequen-
tial changes to all other transmitters which keep them
within their constraint. If this change leads to more
throughput, with more power, then this should be one
of the transmitters.
The special case where all sources are transmit-
ters will occur frequently because the matrix G will
frequently have rather small off-diagonal terms. In
this case the vector u, at (4), consists of all 1’s.
The total throughput of the system is the same as the
sum rate, which is the objective of the multiplexing
and channel allocation problem considered in this pa-
per. This objective is expressed mathematically in
Equation (4) in (Chen & Oien, 2008). In their formu-
lation, the signal from each communication interferes
with all others, and appears as white noise of the same
power.
4.1 Time-segregated Transmission
In this case each transmitter operates at power P
n
= T
P
while it is transmitting. The total rate of transmission,
in bits/s/Hz, in this case is
N
∑
n=1
1
N
log
2
1 +
P
n
G
n,n
σ
2
n
. (5)
4.2 OFDMA
Because the power allocated to the bandwidth as-
signed to each transmitter is the whole of the allo-
cated power, for this transmitter, i.e. P
n
= T
P
, while
the noise is just a
1
N
-th share, and the bandwidth for
each transmitter is
1
N
-th of the whole, the total rate of
transmission, in bits/s/Hz, in this case is
N
∑
n=1
1
N
log
2
1 + N
P
n
G
n,n
σ
2
n
. (6)
4.3 EMF Constrained
The throughput in the EMF-limited case is also given
by (6), except that in this case the P
n
are given by (4).
4.4 SS-OFDM
In this case, as well as background noise, receiver n
experiences user noise, u
2
n
, which is given by the for-
mula
WINSYS 2019 - 16th International Conference on Wireless Networks and Mobile Systems
376