Chapter 8 - Multiple Access Techniques
Chapter 8 - Multiple Access Techniques
Multiple Access
Techniques for Wireless
Communications
8.1 Introduction
In wireless communications systems, it is often desirable to allow the sub-
scriber to send simultaneously informetion to the base station while receiving
information from the base station. Fm example, in conventional telephone sys-
tems, it is possible to talk and listen simultaneously, and this effect, called
duplexing, is generally required in wireless telephone 53 stems. Duplexing may
be done using frequency or time domain techniques. Frequency division duplex-
ing (FDD) provides two distinct bands of frequencies for every user. The forward
band provides traffic from the base station to the mobile, and the reverse band
provides traffic from the mobile to the base. In FDD, any duplex channel actually
consists of two simplex channels, and a device called a duplexer is used inside
each subscriber unit and base station to allow simultaneous radio transmission
and reception on the duplex channel pair. The frequency split between the for-
ward and reverse channel is constant thrcntghout the system, regardless of the
particular channel being used. Time division duplexing (TDD) uses time instead
of frequency to provide both a forward and reverse link. If the time split between
the forward and reverse time slot is small, then the transmission and reception
of data appiars simultaneous to the user. Figure 8.1 illustrates FDD and TDD
395
Reverse Forward
Channel Channel
4 Frequency split Frequency
(a)
Reverse 1 Forward
Channel j Channel
Time split Time
(b)
Figure 8.1
(a) FDD provides two simplex channels at the same time.
(b) TDD provides two simplex time slots on the same frequency.
There are several trade-otis between FDD and TDD approaches. FDD is
geared toward radio communications systems that provide individual radio fre-
quencies for each user. Because each transceiver simultaneously transmits and
receives radio signals which vary by more than 100 dB, the frequency allocation
used for the forward and reverse channels must be carefully coordinated with
out-of-band users that occupy spectrum between these two bands. Futthermore,
the frequency separation must be coordinated to permit the use of inexpensive
RF technology. TDD enables each transceiver to operate as either a transmitter
or receiver on the same frequency, and eliminates the need for separate forward
and reverse frequency bands. However, there is a time latency due to the fact
that communications is not full duplex in the truest sense.
divided into a large number of narrowband channels. The channels are usually
operated using FDD. To minimize interference between forward and reverse
links on each channel, the frequency split is made as great as possible within the
frequency spectrum, while still allowing inexpensive duplexers and a common
transceiver antenna to be used in each subscriber unit. In narrowband FDMA, a
user is assigned a particular channel which is not shared by other users in the
vicinity, and if FDD is used (that is, each channel has a forward and reverse
link), then the system is called FDMAIFDD. Narrowband TDMA, on the other
hand, allows users to share the same channel but allocates a unique time slot to
each user in a cyclical fashion on the channel, thus separating a small number of
users in time on a single channel. For narrowband TDMA, there generally are a
large number of channels allocated using either FDD or TDD, and each channel
is shared using TDMA. Such systems are called TDMAIFDD or TDMAJTDD
access systems.
Wideband systems — In wideband systems, the transmission bandwidth
of a single channel is much larger than the coherence bandwidth of the channel.
Thus, multipath fading does not greatly affect the received signal within a wide-
band channel, and frequency selective fades occur in only a small fraction of the
signal bandwidth. In wideband multiple access systems, the users are allowed to
transmit in a large part of the spectrum. A large number of transmitters are also
allowed to transmit on the same channel. TDMA allocates time slots to the many
transmitters on the same channel and allows only one transmitter to access the
channel at any instant of time, whereas spread spectrum CDMA allows all of the
transmitters to access the channe] at the same time. TDMA and CDMA systems
may use either FDD or TDD multiplexing techniques.
In addition to FDMA, TDMA, and CDMA, two other multiple access
schemes are used for wireless communications. These are packet radio (PR) and
space division multiple access (SDMA). In this chapter, the above mentioned
multiple access techniques, their performance, and their capacity in digital cellu-
lar systems are discussed. Table 8.1 shows the different multiple access tech-
niques being used in various wireless communications systems.
Table 8.1 Multiple Access TechnIques Used in Different Wireless Communication Systems
Multiple Access
Cellular System .
Technique
• If an FDMA channel is not in use, then it sits idle and cannot be used by
other users to increase or share capacity. It is essentially a wasted resource.
• After the assignment of a voice channel, the base station and the mobile
transmit simultaneously and continuously.
• The bandwidths of FDMA channels are relatively narrow (30 kHz) as each
channel supports only one circuit per carrier That is, FDMA is usually
implemented in narrowband systems.
• The symbol time is large as compared to the average delay spread. This
implies that the amount of intersymbol interference is low and, thus, little or
no equalization is required in FDMA narrowband systems.
• The complexity of FDMA mobile systems is lower when compared to TDMA
systems, though this is changing as digital signal processing methods
improve for TDMA.
• Since FDMA is a continuous transmission scheme, fewer bits are needed for
overhead purposes (such as synchronization and framing bits) as compared
to TDMA.
• FDMA systems have higher cell site system costs as compared to TDMA sys-
tems, because of the single channel per carrier design, and the need to use
costly bandpass filters to eliminate spurious radiation at the base station.
• The FDMA mobile unit uses duplexers since both the transmitter and
receiver operate at the same time. This results in an increase in the cost of
FDMA subscriber zmits and base stations.
• FDMA requires tight RF filtering to minimize adjacent channel interference.
Example 8.1
Find the intermodulation frequencies generated if a base station transmits two
carrier frequencies at 1930 MHz and 1932 MHz that are amplified by a satu-
rated clipping amplifier. If the mobile radio band is allocated from 1920 MHz to
1940 MHz, designate the lM frequencies that lie inside and outside the band.
The frequencies in the table marked with an asterisk (*) are the frequencies
that lie outside the mobile radio band.
The first U.S. analog cellular system, the Advanced Mobile Phone System
(AMPS), is based on FDMAIFDD. A single user occupies a single channel while
the call is in progress, and the single channel is actually two simplex channels
which are frequency duplexed with a 45 MHz split. When a call is completed, or
when a handoff occurs, the channel is vacated so that another mobile subscriber
may use it. Multiple or simultaneous users are accommodated in AMPS by giv-
ing each user a unique channel. Voice signals are sent on the forward channel
from the base station to mobile unit, and on the reverse channel from the mobile
unit to the base station. In AMPS, analog narrowband frequency modulation
(NBFM) is used to modulate the carrier. The number of channels that can be
simultaneously supported in a FDMA system is given by
=
N (8.1)
Code
Frequency
Ti me
Figure 8.2
FDMA where different channels are assigned different frequency bands.
Example 8.2
B guard is 10 kHz, and is 30 kHz, find the number of
channels available in an FDMA system.
the forward link channels and half would be used for reverse link channels. In
TDMAIFDD systems, an identical or similar frame structure would be used
solely for either forward or reverse transmission, but the carrier frequencies
would be different for the forward and reverse links. In general, TDMAJFDD sys-
tems intentionally induce several time slots of delay between the forward and
reverse time slots of a particular user, so that duplexers are not required in the
subscriber unit.
Code
Frequency
Ti inc
Figure 8.3
TDMA scheme where each channel occupies a cyclically repeating time slot.
Figure 8.4
TDMA frame structure.
= Nrbr+Ntbp+Ntbg+Nrbg (8.2)
where, Nr is the number of reference bursts per frame, N, is the n,umber of traf-
fic bursts per frame, br is the number of overhead bits per reference burst, is
the number of overhead bits per preamble in each slot, and bg is the number of
equivalent bits in each guard time interval. The total number of bits per frame,
bT, is
= l'f 1? (8.3)
where Tf is the frame duration, and R is the channel bit rate. The frame effi-
ciency is thus given as
(8.4)
where m is the maximum number of TDMA users supported on each radio chan-
nel. Note that two guard bands, one at the low end of the allocated frequency
band and one at the high end, are required to ensure that users at the edge of the
band do not "bleed over" into an adjacent radio service.
Example 8.3
Consider Global System for Mobile, which is a TDMAJFDD system that uses 25
MHz for the forward link, which is broken into radio channels of 200 kHz. IfS
speech channels are supported on a single radio channel, and if no guard band
is assumed, find the number of simultaneous users that can be accommodated
in GSM.
Example 8.4
If GSM uses a frame structure where each frame consists of S time slots, and
each time slot contains 156.25 bits, and data is transmitted at 270.833 kbps in
the channel, find (a) the time duration of a bit, (b) the time duration of a slot,
(c) the time duration of a frame, and (d) how long must a user occupying a sin-
gle time slot must wait between two simultaneous transmissions.
Example 8.5
If a normal GSM time slot consists of 6 trailing bits, 8.25 guard bits, 26 train-
ing bits, and 2 traffic bursts of 58 bits of data, find the frame efficiency.
Code
Channel I
Channel 2
Channel 3
Frequency
Time
Figure 8.5
CDMA in which each channel is assigned a unique PN code which is orthogona' to PN codes used by
other users.
such that they do not appear equal at the base station receiver, then the near-far
problem occurs.
The near-far problem occurs when many mobile users share the same chan-
nel. In general, the strongest received mobile signal will capture the demodula-
tor at a base station. In CDMA, stronger received signal levels raise the noise
floor at the base station demodulators for the weaker signals, thereby decreasing
the probability that weaker signals will be received. lb combat the near-far prob-
lem, power control is used in most CDMA implementations. Power control is pro-
vided by each base station in a cellular system and assures that each mobile
within the base station coverage area provides the same signal level to the base
station receiver. This solves the problem of a nearby subscriber overpowering the
base station receiver and drowning out the signals of far away subscribers.
Power control is implemented at the base station by rapidly sampling the radio
signal strength indicator (RSSI) levels of each mobile and then sending a power
change command over the forward radio link. Despite the use of power control
within each cell, out-of-cell mobiles provide interference which is not under the
control of the receiving base station. The features of CDMA including the follow-
ing:
Many users of a CDMA system share the same frequency. Either TDD or
FDD may be used.
Unlike TDMA or FDMA, CDMA has a soft capacity limit. Increasing the
number of users in a CIJMA system raises the noise floor in a linear manner.
Thus, there is no absolute limit on the number of users in CDMA. Rather,
the system performance gradually degrades for all users as the number of
users is increased, and improves as the number of users is decreased.
Multipath fading may be substantially reduced because the signal is spread
over a large spectrum. If the spread spectrum bandwidth is greater than the
coherence bandwidth of the channel, the inherent frequency diversity will
mitigate the effects of small-scale fading.
• Channel data rates are very high in CDMA systems. Consequently, the sym-
bol (chip) duration is very short and usually much less than the channel
delay spread. Since PN sequences have low autocorrelation, multipath which
is delayed by more than a chip will appear as noise. A RAKE receiver can be
used to improve reception by collecting time delayed versions of the required
signal.
• Since CDMA uses co-channel cells, it can use macroscopic spatial diversity to
provide soft handoff. Soft handoff is performed by the MSC, which can simul-
taneously monitor a particular user from two or more base stations. The
MSC may chose the best version of the signal at any time without switching
frequencies.
• Self-jamming is a problem in CDMA system. Self-jamming arises from the
fact that the spreading sequences of different users are not exactly orthogo-
nal, hence in the despreading of a particular PN code, non-zero contributions
to the receiver decision statistic for a desired user arise from the transmis-
sions of other users in the system.
• The near-far problem occurs at a CDMA receiver if an undesired user has a
high detected power as compared to the desired user.
mm
Figure 8.6
Wideband CDMA
Spectrum of wideband CDMA compared to the spectrum of a hybrid, frequency division, direct se-
quence multiple access.
Burst transmission
in this channel
/ / Alternate channels
thatmay be used for other
/
bursts
Figure 8.7
Frequency spectrum of a hybrid FEUDS system.
TCDMA has an advantage in that it avoids the near-far effect since only one user
transmits at a time within a cell.
Time Division Frequency Hopping (TDFH) — This multiple access
technique has an advantage in severe multipath or when severe co-channel
interference occurs. The subscriber can hop to a new frequency at the start of a
new TDMA frame, thus avoiding a severe fade or erasure event on a particular
channel. This technique has been adopted for the GSM standard, where the hop-
ping sequence is predefined and the subscriber is allowed to hop only on certain
frequencies which are assigned to a cell. This scheme also avoids co-channel
interference problems between neighboring cells if two interfering base station
transmitters are made to transmit on different frequencies at different times.
The use of TDFH can increase the capacity of GSM by several fold [Gud92].
Chapter 10 describes the GSM standard in more detail.
a
at once and appear to be best suited for TDMA and CDMA base station architec-
tures.
Figure 8.8
a
A spatially filtered base station antenna serving different users by using spot beams.
The reverse link presents the most difficulty in cellular systems for several
reasons [Lib94b]. First, the base station has complete control over the power of
all the transmitted signals on the forward link. However, because of thfTerent
radio propagation paths between each user and the base station, the transmitted
power from each subscriber unit must be dynamically controlled to prevent any
single user from driving up the interference level for all other users. Second,
transmit power is limited by battery consumption at the subscriber unit, there-
fore there are limits on the degree to which power may be controlled on the
reverse link. If the base station antenna is made to spatially filter each desired
user so that more energy is detected from each subscriber, then the reverse link
for each user is improved and less power is required.
Adaptive antennas used at the base station (and eventually at the sub-
scriber units) promise to mitigate some of the problems on the reverse link. In
the limiting case of infinitesimal beamwidth and infinitely fast tracking ability,
adaptive antennas implement optimal SDMA, thereby providing a unique chan-
nel that is free from the interference of all other users in the cell. With SDMA,
all users within the system would be able to communicate at the same time
using the same channel. In addition, a perfect adaptive antenna system would be
able to track individual multipath components for each user and combine them
in an optimal manner to collect all of the available signal energy from each user.
The perfect adaptive antenna system is not feasible since it requires infinitely
large antennas. However, section 8.7.2 illustrates what gains might be achieved
using reasonably sized arrays with moderate directivities.
Transmitter 2 i
Packet A
I
I
I I
I I
I
I I I
4 I
1
Vulnerable Period (2t)
time
Packet A will collide with packets B and C because of overlap in transmission time.
Figure 8.9
Vulnerable period for a packet using the ALOHA protocol.
'lb study packet radio protocols, it is assumed that all packets sent by all
users have a constant packet length and fixed, channel data rate, and all other
users may generate new packets at random time intervals. Furthermore, it is
is received), the terminal waits for a random period of time and retransmits the
message. As the number of users increase, a greater delay occurs because the
probability of collision increases.
For the ALOHA protocol, the vulnerable period is double the packet dura-
tion (see Figure 8.9). Thus, the probability of no collision during the interval of
2-c is found by evaluating Pr (n) given as
Pr(n) = at n = 0 (8.10)
One may evaluate the mean of equation (8.10) to determine the average
number of packets sent during 2t (This is useful in determining the average
offered traffic). The probability of no collision is Pr (0) = The throughput
of the ALOHA protocol is found by using Equation (8.7) as
T= Re_ZR (8.11)
8.6.1.2 Slotted ALOHA
In slotted ALOHA, time is divided into equal time slots of length greater
than the packet duration t. The subscribers each have synchronized clocks and
transmit a message only at the beginning of a new time slot, thus resulting in a
discrete distribution of packets. This prevents partial collisions, where one
packet collides with a portion of another As the number of users increase, a
greater delay will occur due to complete collisions and the resulting repeated
transmissions of those packets originally lost. The number of slots which a trans-
mitter waits prior to retransmitting also determines the delay characteristics of
the traffic. The vulnerable period for slotted ALOHA is only one packet duration,
since partial collisions are prevented through synchronization. The probability
that no other packets will be generated during the vulnerable period is The
throughput for the case of slotted ALOHA is thus given by
T = Re_R (8.12)
Figure 8.10 illustrates how ALOHA and slotted ALOHA systems trade-off
throughput for delay.
Example 8.6
Determine the maximum throughput that can be achieved using ALOHA and
slotted ALOHA protocols.
Rmax = Ii2
Thus the best traffic utilization one can hope for using ALOHA is 0.184
Erlangs.
The maximum throughput for slotted ALOHA is found by taking the derivative
of Equation (8.12) and equating it to zero.
dl' -R
—Re
-B
0
Rmax = I
Maximum throughput is found by substituting Rmax in equation (8.12), and
this value can be seen as the maximum throughput in Figure 8.10.
T = e' = 0.3679
Notice that slotted ALOHA provides a maximum channel utilization of 0.368
Erlangs, double that of ALOHA.
td = (8.13)
near-tbr effect. The capture effect offers both advantages and disadvantages in
practical systems. Because a particular transmitter may capture an intended
receiver, many packets may survive despite collision on the channel. However, a
strong transmitter may make it impossible for the receiver to detect a much
weaker transmitter which is attempting to communicate to the same receiver.
This problem is known as the hidden transmitter problem.
A useful parameter in analyzing the capture effects in packet radio proto-
cols is the minimum power ratio of an arriving packet, relative to the other col-
liding packets, such that it is received. This ratio is called the capture ratio, and
is dependent upon the receiver and the modulation used.
In summary, packet radio techniques support mobile transmitters sending
bursty traffic in the form of data packets using random access. Ideal channel
throughput can be increased if terminals synchronize their packet transmissions
into common time slots, such that the risk of partial packet overlap is avoided.
With high traffic loads, both unslotted and slotted ALOHA protocols become inef-
ficient, since the contention between all transmitted packets exposes most of the
offered traffic to collisions, and thus results ih multiple retransmissions and
increased delays. To reduce this situation CSMA can be used where the trans-
mitter first listens either to the common radio channel or to a separate dedicated
acknowledgment control channel from the base station. In a real world mobile
system, the CSMA protocols may fail to detect ongoing radio transmissions of
packets subject to deep fading on the reverse channel path. Utilization of an
ALOHA channel can be improved by deliberately introducing differences
between the transmit powers of multiple users competing for the base station
receiver. The Table 8.2 below shows the multiple access techniques which should
be used for different types of traffic conditions.
Table 8.2 Mufliple Access Techniques for Different Traffic Types
Type of Traffic Multip!e Access Technique
Bursty, short messages Contention protocols
Bursty, long messages, large number of Reservation Protocols
users
Bursty, long messages, small number of Reservation protocols with fixed
users TDMA reservation channel
Stream or deterministic (voice) FDMA, TDMA. CDMA
Figure 8.11
Illustration of forward channel interference for a cluster size ofN = 4. Shown here are four co-channel
base stations which interfere with the serving base station. The distance from the serving base sta-
tion to the user is D0, and interferers are a distance from the user.
c (815)
M
where n0 is the path loss exponent in the desired cell, D0 is the distance from
the desired base station to the mobile, Dk is the distance of the k th cell from the
mobile, and is the path loss exponent to the k th interfering base station. If
only the six closest interfering cells are considered, and all are approximately at
the same distance D and have similar path loss exponents equal to that in the
desired cell, then C/I is given by
C
—= (8.16)
(8.17)
6D Inn,,
Thus, from Equation (8.14), the co-channel reuse factor is
)I/fl
= (6(c) (8.18)
I
The radio capacity of a cellular system is defined as
B
radio channels/cell (8.19)
= C
where m is the radio capacity metric, is the totai allocated spectrum for the
system, is the channel bandwidth, and N is the number of cells in a fre-
quency reuse pattern. As shown in Chapter 2, N is related to the co-channel
reuse factor Q by
4' = (8.20)
From Equations (8.18), (8.19), and (8.20), the radio capacity is given as
m (8.21)
=
=
B
m= radio channels/cell (8.22)
RI Zfl
In order to provide the same voice quality, (C/I) mm may be lower in a dig-
ital systems when compared to an analog system. the minimum
required C/I is about 12 dB for narrowband digital systems and 18 dB for nar-
rowband analog FM systems, although exact values are determined by subjec-
tive listening tests in real-world propagation conditions. Each digital wireless
standard has a different (C/I) mm' and in order to compare different systems,
an equivalent C/I must be used. If and m are kept constant in Equation
(8.22), then it is clear that B0 and (C/I) nun are related by
C C
(8.23)
(r)eq =
Example 8.7
Evaluate four different cellular radio standards, and choose the one with the
maximum radio capacity.
System AB0 =30 kHz, (C/I)mjn = 18 dB
System B:80 =25 kHz, (C/I)mmn = 14 dB
System CB0 =12.5 kHz, (C/I)mmn = 12 dB
System D:B0 =6.25 kHz, = 9 dB
c —
ER
b b_ ER
CC (824
I - I
where is channel bit rate, Eb is the energy per bit, is the rate of the chan-
nel code and is the energy per code symbol. From equations (8.23) and (8.24),
the ratio of C/I to (C/I) eq is given as
c ECRC
=
(8.25)
= ECRC'
(i)eq
The relationship between RC and is always linear, and if the interfer-
ence level I is the same in the mobile environment for two different digital sys-
tems, then equation (8.25) can be rewritten as
=
(8.26)
Equation (8.26) shows that if is reduced by half, then the energy code symbol
increases eight times. This gives the relationship between Eb/No and BC in a
digital cellular system.
A comparison can now be made between the spectrum efficiency for FDMA
and TDMA. In FDMA, is divided into M channels, each with bandwidth BC.
Therefore, the radio capacity for FDMA is given by
B
m (8.27)
/2(C
Consider the case where a multichannel FDMA system occupies the same
spectrum as a single channel TUMA system with multiple time slots. The carrier
and interference terms for the first access technique (in this case FDMA) can be
written as, C = EbB,,, I = whereas the second access technique (in this
case TDMA) has carrier and interference terms represented by C' =
1' = where Rb and Rb' are the radio transmission rates of two digital sys-
tems, E,, is the energy per bit, and 4 represents the interference power per
Hertz. The terms C' and r are the parameters for the TDMA channels, and the
terms C and I apply to the FDMA channels.
Erainple 8.8
Consider an FDMA system with three channels, each having a bandwidth of 10
kHz and a transmission rate of 10 kbps. A TDMA system has three time slots,
channel bandwidth of 30 kHz, and a transmission rate of 30 kbps.
For the TDMA scheme, the received carrier-to-interference ratio for a single
user is measw-ed for 1/3 of the time the channel is in use. For example, C/f
can be measured in 333.3 ms in one secondS Thus C/I' is given by
E bits
G'=ER= b b
= 3RE
b b
= 3C (E.&8.1)
Bandwidth (MHz) 25 25 25 25
Voice Channels 833 1000 2500 3000
Frequency Reuse (Cluster sizes) 7 4 or 3 7 or 4 7 or 4
Channels/Site 119 250 or 333 357 or 625 429 or 750
Traffic (Erlangs/sq. km) 11.9 27.7 or 40 41 or 74.8 50 or 90.8
Capacity Gain 1.0 2.3 or 3.4 3.5 or 6.3 4.2 or 7.6
SNR (&28)
= (N-I)S = (N- I)
In addition to SNR, bit energy-to-noise ratio is an important parameter in
communication systems. It is obtained by dividing the signal power by the base-
band information bit rate, R, and the interference power by the total RF band-
width, W. The SNR at the base station receiver can be represented in terms of
E5/N0 given by
E,,- S/R - W/R 829
N0 - (N-I)(S/W) - N-I (
Equation (8.29) does not take into account the background thermal noise,
in the spread bandwidth. To take this noise into consideration, E6/N0 can be
represented as
— W/R
(830)
(N—1)+(1/S)
The number of users that can access the system is thus given as
N= (8.31)
where W/R is called the processing gain. The background noise determines the
cell radius for a given transmitter power.
In order to achieve an increase in capacity, the interference due to other
users should be reduced. This can be done by decreasing the denominator of
equations (8.28) or (8.29). The first technique for reducing interference is
anterma sectorization. As an example, a cell site with three antennas, each hav-
ing a beam width of 1200, has interference N0' which is one-third of the interfer-
ence received by an onini-directional antenna. This increases the capacity by a
factor of 3 since three times as many users may now be served within a sector
while matching the performance of the omni-directional antenna system. Look-
ing at it another way, the same number of users in an omni-directional cell may
now be served in 1/3rd the area. The second technique involves the monitoring of
voice activity such that each transmitter is switched off during periods of no
voice activity. Voice activity is denoted by a factor a, and the interference term in
equation (8.29) becomes (N3 — 1) a, where N3 is the number of users per sector.
With the use of these two techniques, the new average value of Eb/No' within a
sector is given as
— WI.!?
(8 32)
(N3—I)a+(rj/S)
When the number of users is large and the system is interference limited
rather than noise limited, the number of users can be shown to be
N3 = +! W/R (8.33)
I
aE6
N0'
If the voice activity factor is assumed to hate a value of 3/8, and three sectors per
cell site are used, Equation (8.33) demonstrates that the SNR increases by a fac-
tor of 8, which leads to an 8 fold increase in the number of users compared to an
omni-directional antenna system with no voice activity detection.
CDMA Power Control — In CDMA, the system capacity is maximized if
each mobile transmitter power level is controlled so that its signal arrives at the
cell site with the minimum required signal-to-interference ratio [Sa191]. If the
signal powers of all mobile transmitters within an area covered by a cell site are
controlled, then the total signal power received at the cell site from all mobiles
will be equal to the average received power times the number of mobiles operat-