2014 IEEE International Conference on Acoustic, Speech and Signal Processing (ICASSP) 1

Opportunistic Interference Alignment for MIMO Interfering Broadcast Channels Hyun Jong Yang1 , Won-Yong Shin2 , Bang Chul Jung3 , and Changho Suh4 1 School of ECE, UNIST, Ulsan, Korea, E-mail: [email protected] 2 Dept. of CSE, Dankook Univ., Yongin, Korea, E-mail: [email protected] 3 Dept. of ICE, Gyeongsang National Univ., Tongyeong, Korea, E-mail: [email protected] 4 Dept. of EE, KAIST, Daejeon, Korea, E-mail: [email protected]

Abstract—In this paper, we propose an opportunistic interference alignment (OIA) technique for cellular downlink networks, which efficiently reduces the effect of inter-cell interference from base stations (BSs) in other cells and eliminates intra-cell interference among spatial streams in the same cell. We show that the user scaling per cell required to achieve a target degrees-of-freedom can be fundamentally lowered, compared with the previous results. In addition, we relate the derived user scaling law to the interference decaying rate with respect to the number of users for given signal-to-noise ratio. Simulation results show that the proposed OIA significantly outperforms the previous schemes in terms of both suminterference and achievable sum-rate even in practical environments. Index Terms—Degrees-of-freedom (DoF), opportunistic interference alignment (OIA), MIMO interfering broadcast channel (MIMO-IBC), transmit & receive beamforming, user scheduling.

I. I NTRODUCTION Interference management is one of the most challenging issues to improve a cell throughput in cellular networks. It was shown that the interference alignment (IA) technique achieves the optimal degrees-of-freedom (DoF) in the K-user interference channel with time-varying channel coefficients [1]. Subsequent works have shown that the IA is also useful for other wireless networks including multiple-input multiple-output (MIMO) interference channels [2]–[4] and cellular networks [5]–[7]. On the other hand, there have been some notable techniques that exploit the benefit of fading in a single cell network, obtaining multiuser diversity (MUD) gain: opportunistic scheduling [8], opportunistic beamforming [9], and random beamforming [10]. Moreover, scenarios with achievable MUD gain have been studied in ad hoc networks [11], cognitive radio networks [12], and multi-cell downlink and uplink networks [13], [14]. Recently, an opportunistic interference alignment (OIA) concept which combines the IA and user scheduling was proposed for interfering multiple access channels (IMAC) [15]–[17]. OIA has been known to achieve the optimal DoF in IMAC if a certain user scaling condition is satisfied even though it operates in a distributed fashion. For multi-cell downlink networks, so called interfering broadcast channel (IBC), similar techniques were also proposed [13], [18]–[21]. In [13], it (was shown that ) the optimal DoF of KM can be achieved if N = ω SNRKM −1 1 , where N , K, and M denote the number of users in a cell, total number of cells in the network, and number of transmit antennas at each BS, respectively. The authors extended the random beamforming technique, originally proposed for a single cell network in [10], to a multi-cell downlink assuming a single antenna at users. The authors of [19] obtained the same user scaling law as in [13] in the same network by using the same technique but using different derivations. In [21], the authors also considered the effect of multiple antennas at users on the required user scaling for the 1 f (x)

= ω(g(x)) implies that limx→∞

g(x) f (x)

= 0.

978-1-4799-2893-4/14/$31.00 ©2014 IEEE

( ) optimal DoF, i.e., N = ω SNRKM −L where L denotes the number of receive antennas at users. In [18], the user scaling for given DoF in a 3-cell single-input multi-output (SIMO) downlink network is derived. In the same work, a general K-cell downlink network and multiple antennas at BSs in [20] are also taken into account. The user scaling in [20] is the same as [21], since all of these previous works are based on the multi-cell random beamforming technique. In this paper, we propose a novel OIA technique for MIMO cellular downlink networks, which efficiently reduces the effect of inter-cell interference from BSs in other cells and eliminates intracell interference due to the spatial streams dedicated to the other users in the same cell. In the proposed OIA, two cascaded precoders are used at the BSs similar to the scheme proposed in [6]. The first precoder eliminates the intra-cell interference due to the other selected users in the same cell. The second precoder plays the same role of multi-cell random beamforming. Specifically, it enables users to exactly estimate the interference subspace from the BSs. The receive beamforming vector is designed at each user using local channel state information (CSI) in a distributed manner, and each user feeds back the effective channel vector and quantity of inter-cell interference to the corresponding BS. The user selection at the BSs and design of receive beamforming vector are completely decoupled, and hence no iterative optimization as in [6] is needed. We show that the user scaling required( to achieve the optimal ) DoF of KM can be reduced to N = ω SNR(K−1)M −L+1 . In addition, the interference decaying rate with respect to N for given SNR is characterized in conjunction with the derived user scaling law. Furthermore, simulation results show that the proposed OIA significantly outperforms the previous schemes even in practical environments. II. S YSTEM AND C HANNEL M ODELS We consider K-cell MIMO IBC where each cell consists of a BS with M antennas and N users, each with L antennas. The number of users selected to receive downlink signals in each cell is denoted by S ≤ M . It is assumed that each selected user receives a single spatial stream. To consider nontrivial cases, we assume that L < (K − 1)S + 1, because all the inter-cell interference can be completely canceled at the receivers otherwise. The channel matrix from the k-th BS to the j-th user in the i-th cell is [i,j] ∈ CL×M , where i, k ∈ K , {1, . . . , K} and denoted by Hk [i,j] j ∈ N , {1, . . . , N }. Each element of Hk is assumed to be independent and identically distributed (i.i.d.) according to CN (0, 1). In addition, for given transmission block, quasi-static frequency-flat fading is assumed, i.e., channel coefficients are constant during the transmission block. From pilot signals sent from all the BSs, the j-th [i,j] user in the i-th cell can estimate the channels Hk , k = 1, . . . , K, i.e., the local CSI at the transmitter.

2444

2

[1,1]

Without loss of generality, the indices of selected users in every cell are assumed to be (1, . . . , S). The total DoF is defined by ∑K ∑S [i,j] i=1 j=1 R , (1) DoF = lim SNR→∞ log SNR where R

[i,j]

u∗[1,1] H1

P1 , η [1,1] u[1,1] [1,1]

[1,1]

H2 P2 v[2,1]

H3 P3 v[3,2]

MS1,1 H[2,1] P2 v[2,2] 2

[1,1]

H3 P3 v[3,1]

BS 1 x[1,1] x[2,1]

P1 (3-by-2 matrix)

V1 = [v[1,1] v[1,2]]

[2,1]

u[2,1]

is the achievable rate for the j-th user in the i-th cell.

H3 P3 v[3,2]

MS2,1

[2,1]

H2 P2 v[2,1] [2,1]

H3 P3 v[3,1]

III. P ROPOSED OIA FOR MIMO IBC

[2,1] u∗[2,1] H1 P1 ,

η

[2,1]

[2,1]

H2 P2 v[2,2]

A. Overall Procedure

MS1,2

1) Initialization (Reference Precoding Matrix Broadcast): The predetermined reference precoding matrix of the k-th cell is denoted by Pk = [p1,k , . . . , pS,k ], where ps,k ∈ CM ×1 is the orthonormal basis, k ∈ K, s = 1, . . . , S. The k-th BS independently generates pk,s from the isotropic distribution over the M -dimensional unit [i,j] sphere. Each user can estimate the effective channel Hk Pk if the pilots are rotated by Pk . The reference precoding matrix Pk can be regarded as cell-coordination, since it is determined prior to the user scheduling or data transmission. As explained later, in advance to the reference precoding Pk , user-specific beamforming Vk is applied in the k-th cell, but it does not change the interference structure at users. 2) Receive Beamforming & Scheduling Metric Feedback: Let us define the unit-norm weight vector at the j-th user in the i-th cell

2 by u[i,j] ∈ CL×1 , i.e., u[i,j] = 1. How to design u[i,j] shall be presented in Section IV along with the corresponding user scaling [i,j] law. From the notion of Pk and Hk , the scheduling metric of the j-th user in the i-th cell, denoted by η [i,j] , is defined by the sum of the received interference power from other cells. That is, K

2 ∑

∗ [i,j]

u[i,j] Hk Pk .

η [i,j] =

(2)

BS 2 x[1,2]

P2 (3-by-2 matrix)

V2 = x[2,2]

[v[2,1] v[2,2]]

MS2,2

MS1,3 BS 3 x[1,3] x[2,3]

V3 = [v[3,1] v[3,2]]

P3 (3-by-2 matrix) MS2,3

Fig. 1.

MIMO IBC with K = 3, M = 3, S = 2, L = 3, and N = 2.

where z[i,j] ∈ CL×1 denotes the additive noise, each element of which is i.i.d. complex Gaussian with zero mean and the variance of SNR−1 . After receive beamforming at the j-th user in the i-th cell, the received signal vector can be rewitten as: y˜[i,j] = u[i,j] ∗ Hi

[i,j]

Pi v[i,j] x[i,j] + u[i,j] ∗ Hi

[i,j]

S ∑

v[s,i] x[s,i]

s=1,s̸=j

k=1,k̸=i

All the users report (2) to corresponding BSs as a scheduling metric. The role of reference precoding (Pk ) is to keep the interference structure regardless of user scheduling and each user can estimate the quantity of the received interferences from other cells according to receive beamforming. Addition to the scheduling metric in (2), each [i,j] user need to transmit its effective channel vector u[i,j] ∗ Hi Pi from the correspondin BS, taking into account the receive beamforming, to the corresponding BS for downlink beamforming at the BS. Figure 1 illustrates an example of MIMO IBC where K = 3, M = 3, S = 2, L = 3, and N = 2. 3) User Scheduling: Upon receiving N users’ scheduling metrics in the serving cell, each BS selects S users having the smallest interference. Note again that we assume without loss of generality that the j-th users, j = 1, . . . , S, in each cell have the smallest scheduling metrics and thus are selected. 4) Transmit Beamforming & Downlink Data Transmission: The transmit signal vector at the i-th BS for the j-th user in the i-th cell is given by v[i,j] x[i,j] , where x[i,j] is the transmit symbol with power of 1/S, and matrix for S users is [ the transmit beamforming ] given by Vi = v[1,i] , . . . , v[S,i] , where v[s,i] ∈ CS×1 , i ∈ K, s ∈ S , {1, . .[. , S}. The transmit ] symbol vector of the i-th cell is T

given by xi = x[1,i] , . . . , x[S,i] . Then, the received signal vector at the j-th user in the i-th cell can be written as: S ∑ [i,j] Hi Pi v[s,i] x[s,i] Pi v[i,j] x[i,j] + {z } s=1,s̸=j desired signal | {z }

[i,j]

y[i,j] = Hi |

Pi

+ u[i,j] ∗

K ∑

[i,j]

Hk

Pk Vk xk + u[i,j] ∗ z[i,j] ,

(4)

k=1,k̸=i

The linear zero-forcing (ZF) beamformer can be applied at the BSs in order to cancel the intra-cell interference among the selected users’ signals. Specifically, the transmit beamforming matrix of the i-th cell is designed by:   −1 √ [1,i] u[1,i] ∗ Hi Pi γ [i,1] √ 0 ··· 0    0 ∗ [2,i] γ [i,2] · · · 0   u[2,i] Hi Pi      Vi =  · .. ..  .. ..  ,   .. .     . . . . √ ∗ [S,i] [i,S] 0 0 ··· γ u[S,i] Hi Pi √ where γ [i,j] denotes a normalization factor for satisfying the transmit power constraint. Then, the received signal is given as: y˜[i,j] =



γ [i,j] x[i,j] + u[i,j] ∗

K ∑

[i,j]

Hk

Pk Vk xk + u[i,j] ∗ z[i,j] ,

k=1,k̸=i

where the intra-cell interference from other scheduled users in the same cell is removed. From (5), the achievable rate of the j-th user in the i-th cell is given by ) ( ( ) γ [i,j] /S · SNR , (5) R[i,j] = log2 1 + SINR[i,j] = log2 1 + 1 + I˜[i,j] 2 ∑ ∑S ∗ [i,j] Pk v[k,s] · SNR. where I˜[i,j] = K k=1,k̸=i s=1 u[i,j] Hk

intra-cell interference K ∑

+

k=1,k̸=i

|

[i,j]

Pk Vk xk +z[i,j] ,

{z

}

Hk

inter-cell interference

IV. D O F ACHIEVABILITY

(3)

For given channel instance, from (5), each selected user can achieve the optimal DoF of 1 if and only if the interference I˜[i,j] remains

2445

3

constant for increasing SNR. Since R[i,j] can be bounded as    R[i,j] ≥ log2 1 +

γ [i,j] /S · SNR 

,

(max) 2 [i,j] 1 + vi

I

(6)

is defined by } {

2 = arg max v[i′ ,j ′ ] : i′ ∈ K \ {i}, j ′ ∈ S ,

(max) vi

SNR→∞

N = ω (SNRτ ) . (7)

Proof: Using (9), P can be bounded by } {K S ∑ ∑ [i,j] η · SNR ≤ ϵ P = lim Pr

and I [i,j] is defined by I

,

[i,j]

K S

2 ∑ ∑

∗ [i,j]

u[i,j] Hk Pk v[k,s] · SNR,

SNR→∞

(8) ≥

k=1,k̸=i s=1

the optimal DoF can be achieved at each user if I [i,j] < ϵ, S, i ∈ K, for some 0 ≤ ϵ < ∞.

∀j ∈

A. Beamforming Weight Design To maximize DoF, we aim to minimize the sum∑Kthe∑achievable S [i,j] interference I through receive beamforming at the i=1 j=1 users. As in [16], [17], the following fruitful relation between the scheduling metrics and the sum-interference is used: K ∑ S ∑

I [i,j] =

i=1 j=1

K ∑ S ∑

η [i,j] · SNR.

(9)

u

[

G[i,j] ,

( ) ( ) [i,j] [i,j] Hi+1 Pi+1 , . . . , HK PK

]∗ ∈ C(K−1)S×L . (11)



G[i,j] = Ω[i,j] Σ[i,j] V[i,j] ,

≥ ··· ≥

SNR→∞

where A , Fη

(

(19)

i=1

−1

ϵSNR KS 2

) . From (15), we have

( ( ϵ )τ )N ( −τ −τ ) (1 − A)N = 1 − c0 · SNR + o SNR . (22) KS 2 Thus, (1 − A)N tends to 0 (exponentially) if and only if N scales faster than SNRτ . Now, inserting N = ω (SNRτ ) to (21) yields P tending to 1 for increasing SNR for given i, which proves the Lemma.

for 0 ≤ x < 1, where a0 is a constant determined by K, S, and L. Finally, the following theorem establishes the DoF achievability of the proposed OIA. Theorem 1 (User scaling law: Downlink IBC): The proposed downlink OIA scheme with the scheduling metric (14) achieves

(12)

where Ω ∈ C and V ( ∈ C consist ) of L [i,j] [i,j] orthonormal columns, and Σ[i,j] = diag σ1 , . . . , σL , where (K−1)S×L

[i,j] σL .

{ } SNR−1 ϵ lim Pr η [i,j] ≤ , ∀i ∈ K, ∀j ∈ S SNR→∞ KS 2

Lemma 2 (Lemma 1 [17]): The CDF of η [i,j] , denoted by Fη (x), can be written as ( ) Fη (x) = a0 x(K−1)S−L+1 + o x(K−1)S−L+1 , (23)

Let us denote the singular-value decomposition (SVD) of G[i,j] as

[i,j] σ1

(18)

i=1 j=1

u

( ) ( ) [i,j] [i,j] H1 P1 , . . . , Hi−1 Pi−1 ,

[i,j]

(17)

Note that the selected users’ η [i,j] are the minimum S values out of N i.i.d. random variables. If we denote a random variable with the same distribution of η [i,j] by η, (19) can be written by [ ] S−1 ∑( N ) i N −i P ≥ lim 1− A (1 − A) (20) i SNR→∞ i=1 [ ] S−1 ∑ i i −i N ≥ lim 1− N A (1 − A) (1 − A) , (21)

i=1 j=1

This interestingly implies that the collection of distributed effort from the users to minimize η [i,j] can reduce the sum-interference. Therefore, each user finds the beamforming vector from

2

u[i,j] = arg min η [i,j] = arg min G[i,j] u , (10) where

(16)

i=1 j=1

for any 0 < ϵ < ∞, if

(max)

where vi

constant with high probability for increasing SNR, that is, { K S } ∑ ∑ [i,j] P , lim Pr I ≤ϵ =1

(L) v[i,j] ,

(13)

(L)

where v[i,j] is the L-th column of V[i,j] . With this choice the scheduling metric is simplified to [i,j] 2

η [i,j] = σL

.

(14)

Since each column of Pk is isotropically and independently distributed, the effective interference channel matrix G[i,j] is i.i.d. complex Gaussian with zero mean and unit variance. To derive the achievable DoF, we start with the following lemmas. Lemma 1: Suppose that the cumulative density function (CDF) of η [i,j] can be written without loss of generality by τ

(24)

( ) N = ω SNR(K−1)S−L+1 .

(25)

with high probability if

Then, the optimal u[i,j] is determined as u[i,j] =

DoF ≥ KS

L×L

[i,j]

τ

Fη (x) = c0 x + o (x )

(15)

for x > 0, where τ , (K − 1)S − L + 1 and c0 is a nonzero coefficient independent of x. Then the sum-interference remains

Proof: If the sum-interference remains constant for increasing SNR with probability P, the achievable rate in (6) can be further bounded by (  

) 

(max) 2 [i,j] γ / S



v i   1 +  · P, R[i,j] ≥  log (SNR) + log

2  2 

(max) 2 1/ vi

+ϵ for any 0 ≤ ϵ < ∞. Thus, the achievable DoF can be bounded by DoF ≥ KS · P.

(26)

From Lemmas 1 and 2, it is immediate to(show that P tends )to 1, and hence KS DoF is achievable if N = ω SNR(K−1)S−L+1 , which proves the theorem. Now, to relate the obtained user scaling law to the interference decaying rate with respect to N for given SNR, we introduce the

2446

4

following lemma. Lemma 3: Suppose that the CDF of η [i,j] can be written without loss of generality by (15). Then, the decaying rate of the interference received at a selected user with respect to N is given by { } ( ) 1 χ,E ≤ O N 1/τ . (27) [i,j] I Proof: For given S, suppose the worse performance case where N users are divided into S subgroups with N/S users per each and where one user with the minimum η [i,j] is selected for each subgroup. Thus, η [i,j] is the minimum of N/S i.i.d. random variables. Then, the lemma can be proved following the footsteps of [22, Theorem 3]. Specifically, let us define α such that { } 1 S Pr η [i,j] ≤ = . (28) α N From (15), we get { } ( ) 1 [i,j] Pr η ≤ = c0 α−τ + o α−τ . α From the equality between (28) and (29), we get N −1 and thus ( ) α = O N 1/τ .

Fig. 2.

Normalized sum-interference vs. N when K = 3, M = 4, L = 2.

Fig. 3.

Sum-rates vs. SNR when K = 3, M = 4, L = 2, and N = 20.

(29) ( ) = O α−τ , (30)

In addition, since 1/η [i,j] is the maximum out of N/S reversed scheduling metrics, it can be shown from (28) that { } ( )N/S 1 1 Pr ≤ α = 1 − . (31) N/S η [i,j] Now, the Markov inequality yields { } { } 1 1 E ≥ α · Pr ≥α η [i,j] η [i,j] ( ( )N/S ) 1 =α· 1− 1− N/S ( ) 1/τ =O N ,

(32) (33) (34)

( )N/S 1 where (34) follows from (30) and the fact that 1 − N/S converges to a constant for increasing N . Theorem 2: If the user scaling law is given by N = (SNRτ ), then the interference decaying rate is given by { } ( ) 1 E ≤ O N 1/τ . (35) [i,j] I Proof: Since both the user scaling law and interference decaying rate are determined by the tail CDF of the scheduling metric, it is not difficult to prove the theorem using the proofs of Theorem 1 and Lemma 3. Corollary 1: The interference decaying rate of the proposed OIA for the MIMO IBC is given by } { ( ) 1 1 ≤ O N (K−1)S−L+1 . E (36) [i,j] I Proof: The proof is immediate from Theorems 1 and 2. Remark 1: The user scaling law characterizes the trade-off between the asymptotic DoF and number of users, i.e., the more number of users, the faster DoF achievability. In addition, from Theorem 2, the user scaling law also provides the information on the interference decaying rate with respect to N for given SNR. V. S IMULATION R ESULTS In this section, the performance of the proposed OIA scheme is evaluated in comparison to the two existing schemes based on

random beamforming at the BSs. First, the max-SNR scheme is considered as a base line scheme, in which the receiver beamforming as well as the user selection is performed only to maximize the gain of desired channels. Second, the random beamforming scheme with the minimum-leakage-of-interference (LIF) OIA is considered [13], [18], [21]. In the random beamforming scheme, no zero-forcing precoding is employed at the BSs, i.e., Vk = IS , and hence intra-cell interference is not canceled at the users but only suppressed through the user scheduling and receiver beamforming. For more details, the readers are referred to [13], [18], [21]. Fig. 2 shows the normalized sum-interference versus N when K = 3, M = 4, L = 2, and SNR=20dB for various S values. Since both the random beamforming and proposed schemes are based on the OIA frame work, interference decaying rates with respect to N follow Theorem 2. Since the user scaling law of) the ( KS−L random beamforming scheme is given by N = ω SNR the ( ) interference decaying rate is given by O N −1/(KS−L) , while it is ( ) O N −1/((K−1)S−L+1) for the proposed scheme. As a result, the proposed scheme exhibits equal or faster interference decaying rates than the random beamforming scheme, as shown in Fig. 2. Fig. 3 illustrates the sum-rates versus SNR when K = 3, M = 4, L = 2, S = 3, and N = 20. Surprisingly, the rate of the random beamforming scheme is even lower than the max-SNR scheme especially in the low to mid SNR regime, because N is not large enough to suppress both the intra-cell and intercell interference. In such noise-limited case, the max-SNR sense is better than the minLIF sense. On the other hand, the proposed scheme shows always higher sum-rates than the others, exploiting the benefit of completely canceled intra-cell interference.

2447

5

ACKNOWLEDGEMENT This research was supported by the ICT Standardization program of MISP (The Ministry of Science, ICT & Future Planning). R EFERENCES [1] V. R. Cadambe and S. A. Jafar, “Interference alignment and degrees of freedom of the K-user interference channel,” IEEE Trans. Inf. Theory, vol. 54, no. 8, pp. 3425–3441, Aug. 2008. [2] K. Gomadam, V. R. Cadambe, and S. A. Jafar, “A distributed numerical approach to interference alignment and applications to wireless interference networks,” IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3309–3322, Jun. 2011. [3] T. Gou and S. A. Jafar, “Degrees of freedom of the K-user M × N MIMO interference channel,” IEEE Trans. Inf. Theory, vol. 56, no. 12, pp. 6040–6057, Dec. 2010. [4] F. Sun and E. de Carvalho, “A leakage-based MMSE beamforming design for a MIMO interference channel,” IEEE Signal Process. Lett., vol. 19, no. 6, pp. 368-371, June 2012. [5] T. Kim, F. Sun, and A. Paulraj, “Low-complexity MMSE precoding for coordinated multipoint with per-antenna power constraint,” IEEE Signal Process. Lett., vol. 20, no. 4, pp. 395-398, Apr. 2013. [6] C. Suh, M. Ho, and D. Tse, “Downlink interference alignment,” IEEE Trans. Commun., vol. 59, no. 9, pp. 2616–2626, Sep. 2011. [7] C. Suh and D. Tse, “Interference alignment for celluar networks,” in Proc. 46th Annual Allerton Conf. on Commun., Control, and Computing, Monticello, IL, Sep. 2008. [8] R. Knopp and P. Humblet, “Information capacity and power control in single cell multiuser communications,” in Proc. IEEE Int. Conf. Commun. (ICC), Seattle, WA, Jun. 1995, pp. 331–335. [9] P. Viswanath, D. N. C. Tse, and R. Laroia, “Opportunistic beamforming using dumb antennas,” IEEE Trans. Inf. Theory, vol. 48, no. 6, pp. 1277–1294, Aug. 2002. [10] M. Sharif and B. Hassibi, “On the capacity of MIMO broadcast channels with partial side information,” IEEE Trans. Inf. Theory, vol. 51, no. 2, pp. 506–522, Feb. 2005. [11] W.-Y. Shin, S.-Y. Chung, and Y. H. Lee, “Parallel opportunistic routing in wireless networks,” IEEE Trans. Inf. Theory, to appear. [12] T. W. Ban, W. Choi, B. C. Jung, and D. K. Sung, “Multi-user diversity in a spectrum sharing system,” IEEE Trans. Wireless Commun., vol. 8, no. 1, pp. 102-106, Jan. 2009. [13] W.-Y. Shin and and B. C. Jung, “Network coordinated opportunistic beamforming in downlink cellular networks,” IEICE Trans. Commun., vol. E95-B, no. 4, pp. 1393–1396, Apr. 2012. [14] W. -Y. Sin, D. Park, and B. C. Jung, “Can one achieve multiuser diversity in uplink multi-cell networks?,” IEEE Trans. Commun., vol. 60, no. 12, pp. 3535-3540, Dec. 2012. [15] B. C. Jung and W.-Y. Shin, “Opportunistic interference alignment for interference-limited cellular TDD uplink,” IEEE Commun. Lett., vol. 15, no. 2, pp. 148–150, Feb. 2011. [16] B. C. Jung, D. Park, and W.-Y. Shin, “Opportunistic interference mitigation achievs optimal degrees-of-freedom in wireless multi-cell uplink networks,” IEEE Trans. Commun., vol. 60, no. 7, pp. 1935–1944, Jul. 2012. [17] H. J. Yang, W. -Y. Shin, B. C. Jung, A. Paulraj, “Opportunistic interference alignment for MIMO interfering multiple-access channels,” IEEE Trans. Wireless Commun., vol. 12, no. 5, pp. 2180–2192, May 2013. [18] J. H. Lee and W. Choi, “On the achievable DoF and user scaling law of opportunistic interference alignment in 3-transmitter MIMO interference channels,” IEEE Trans. Wireless Commun., vol. 12, no. 6, pp. 2743-2753, Jun. 2013. [19] H. D. Nguyen, R. Zhang, and H. T. Hui, “Multi-cell random beamforming: Achievable rate and degrees-of-freedom region,” IEEE Trans. Signal Processing, vol. 61, no. 14, pp. 3532-3544, Jul. 2013. [20] J. H. Lee, W. Choi, and B. D. Rao, “Multiuser diversity in interfering broadcast channels: achievable degrees of freedom and user scaling law,” IEEE Trans. Wireless Commun., to appear. [21] H. D. Nguyen, R. Zhang, and H. T. Hui, “Effect of receive spatial diversity on the degrees-of-freedom region in multi-cell random beamforming,” http://arxiv.org/pdf/1303.5947.pdf. [22] J. Jose, S. Subramanian, X. Wu, and J. Li, “Opportunistic interference alignment in cellular downlink,” 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2012, pp. 15291545.

2448

Opportunistic Interference Alignment for MIMO ...

1School of ECE, UNIST, Ulsan, Korea, E-mail: [email protected]. 2Dept. of CSE .... user feeds back the effective channel vector and quantity of inter-cell.

263KB Sizes 2 Downloads 460 Views

Recommend Documents

Opportunistic Interference Alignment for MIMO ...
Feb 15, 2013 - Index Terms—Degrees-of-freedom (DoF), opportunistic inter- ... Education, Science and Technology (2010-0011140, 2012R1A1A1044151). A part of .... information of the channels from the transmitter to all receivers, i.e., its own ......

Opportunistic Interference Alignment for MIMO Interfering Multiple ...
Feb 15, 2013 - Interference management is a crucial problem in wireless ... of International Studies, Dankook University, Yongin 448-701, Republic of ... Education, Science and Technology (2010-0011140, 2012R1A1A1044151). A part of this .... informat

Opportunistic Interference Alignment for MIMO ...
usage is required for the decoding of one signal block [6]. In addition, global channel state .... K-cell MIMO Interfering MAC. We show that for the antenna ...

Opportunistic Interference Alignment for MIMO IMAC
scaling law required to achieve KS degrees-of-freedom (DoF), where S(≤ M) ..... SNR and the BS selects best S MSs that have higher effective. SNRs than the ...

Opportunistic Interference Alignment for MIMO IMAC
From a Genie-aided removal of all the inter-cell interferences, we obtain K parallel MAC systems. Under the basic assumption that S MSs in a cell transmit.

Opportunistic Interference Alignment for MIMO IMAC: Effect of User ...
Then, their performance is analyzed in terms of user scaling law required to .... A. Each MS reports this metric to the associated BS, and each. BS selects S MSs ...

Opportunistic Interference Alignment for Interference ...
This work was supported by the Industrial Strategic Technology Develop- ... [10033822, Operation framework development of large-scale intelligent and.

Opportunistic Interference Alignment for Interference ...
Simulation results show that the proposed scheme provides significant improvement in ... Section IV shows simulation results under the OIA scheme. Finally, we summarize the paper with some ..... [1] V. R. Cadambe and S. A. Jafar, “Interference alig

Opportunistic Interference Alignment for Random ... - IEEE Xplore
Dec 14, 2015 - the new standardization called IEEE 802.11 high-efficiency wireless ... Short Range Wireless Transmission Technology with Robustness to ...

Codebook-Based Opportunistic Interference Alignment - IEEE Xplore
May 9, 2014 - based on the exiting zero-forcing receiver. We first propose a codebook-based OIA, in which the weight vectors are chosen from a predefined ...

Opportunistic Downlink Interference Alignment - IEEE Xplore
Computer Science and Engineering, Dankook University, Yongin, 448-701, Korea. 3 ... This research was supported by the Basic Science Research Program.

Opportunistic Downlink Interference Alignment - IEEE Xplore
Electrical and Computer Engineering, UNIST, Ulsan 689-798, Korea. 2. Computer Science and Engineering, Dankook University, Yongin, 448-701, Korea. 3.

Energy-Efficient Opportunistic Interference Alignment - IEEE Xplore
Abstract—We introduce an energy-efficient distributed op- portunistic interference alignment (OIA) scheme that greatly improves the sum-rates in multiple-cell ...

On Interference Alignment for Multi-hop MIMO Networks
determine a subset of interfering streams for IA. Based on this. IA model ... the performance of a network throughput optimization problem under our proposed IA ...

A Feasibility Study on Opportunistic Interference Alignment: Limited ...
Nov 3, 2012 - generating interference to other cells as a scheduling metric. Simulation results ... suitable performance measure that can be taken into account.

Opportunistic Interference Mitigation
Then, their performance is analyzed in terms of degrees- of-freedom (DoFs). ..... For user j in the i-th cell, the user scheduling metric Li j is finally given by (2), ...

Opportunistic Interference Mitigation
user interference channel with time-varying channel coeffi- cients. Since then, interference management schemes based on IA have been further developed and analyzed in various wireless network environments: multiple-input multiple-output. (MIMO) inte

Downlink Interference Alignment - Stanford University
Paper approved by N. Jindal, the Editor for MIMO Techniques of the. IEEE Communications ... Interference-free degrees-of-freedom ...... a distance . Based on ...

Downlink Interference Alignment - Stanford University
cellular networks, multi-user MIMO. I. INTRODUCTION. ONE of the key performance metrics in the design of cellular systems is that of cell-edge spectral ...

Interference Alignment for Cellular Networks
scheme that approaches to interference-free degree-of-freedom. (dof) as the number K of ... space (instead of one dimension) for simultaneous alignments at multiple non-intended ..... of frequency-domain channels. So the matrix Ha can be.

Feasibility Conditions for Interference Alignment
Dec 1, 2009 - Bezout's and Bernshtein's Theorems (Overview) - 1. ▻ Both provide # of solutions → Prove solvability indirectly .... Page 101 ...

Downlink Interference Alignment
Wireless Foundations. U.C. Berkeley. GLOBECOM 2010. Dec. 8. Joint work .... Downlink: Implementation Benefits. 2. 1. 1. K. Fix K-dim reference plane, indep. of ...