On the performance analysis of composite multipath/shadowing channels using the g-distribution

Amine Laourine*, Mohamed-Slim Alouini, Sofiène Affes, Alex Stéphenne

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

99 Scopus citations

Abstract

Composite multipath fading/shadowing environments are frequently encountered in different realistic scenarios. These channels are generally modeled as a mixture of Nakagamim multipath fading and log-normal shadowing. The resulting composite probability density function (pdf) is not available in closed form, thereby making the performance evaluation of communication links in these channels cumbersome. In this paper, we propose to model composite channels by the Gdistribution. This pdf arises when the log-normal shadowing is substituted by the Inverse-Gaussian one. This substitution will prove to be very accurate for several shadowing conditions. In this paper we conduct a performance evaluation of single-user communication systems operating in a composite channel. Our study starts by deriving an analytical expression for the outage probability. Then, we derive the moment generating function of the G-distribution, hence facilitating the calculation of average bit error probabilities. We also derive analytical expressions for the channel capacity for three adaptive transmission techniques, namely, i) optimal rate adaptation with constant power, ii) optimal power and rate adaptation, and iii) channel inversion with fixed rate.

Original languageEnglish (US)
Pages (from-to)1162-1170
Number of pages9
JournalIEEE Transactions on Communications
Volume57
Issue number4
DOIs
StatePublished - Jan 1 2009

Keywords

  • Adaptive transmission techniques
  • Fading channels information rates
  • Log normal
  • Nakagami distribution and composite distributions
  • Outage probability

ASJC Scopus subject areas

  • Electrical and Electronic Engineering

Fingerprint

Dive into the research topics of 'On the performance analysis of composite multipath/shadowing channels using the g-distribution'. Together they form a unique fingerprint.

Cite this