Opportunistic Relay Selection Based on Interference Nulling in the K × N × K Channel With Interfering Relays Won-Yong Shin1 , Hyun Jong Yang2 , and Bang Chul Jung3 1

Mobile Systems Engineering, Dankook University, Yongin 448-701, Republic of Korea 2 Mobile and Wireless Group, Broadcom Corporation, Sunnyvale, CA 94086 USA 3 Department of ICE, Gyeongsang National University, Tongyeong 650-160, Republic of Korea Email: [email protected]; [email protected]; [email protected]

I. I NTRODUCTION Recent and emerging work has studied K-user two-hop relay-aided interference channels, consisting of K sourcedestination (S–D) pairs and N helping relay nodes located in the path between S–D pairs, termed the K × N × K channel. Several achievability schemes (e.g., [1]) have been known for the network, but a detailed understanding is still in progress. In [1], however, the system model under consideration assumes that there is no interfering signal between relays and the relays are full-duplex. In this extended abstract, we study the K × N × K channel with interfering relays and introduce an opportunistic relay selection based on interference nulling (ORS-IN) protocol that achieves full degrees-of-freedom (DoF) with comparatively easy implementation under the channel model. This work thus focues on the K × N × K channel with one additional assumption that N half-duplex relays interfere with each other, which is a more feasible scenario. The scheme adopts the notion of multiuser diversity gain for performing interference management over two hops. In our scheme, the scheduling strategy is presented in time-division duplexing two-hop environments with time-invariant channel coefficients, where a subset of relays is opportunistically selected in terms of producing the minimum total interference level. To improve spectral efficiency, the alternate relaying protocol in [2] is employed with a modification. As our main result, it turns out that in a high signal-to-noise ratio (SNR) regime, the ORSIN protocol with alternate half-duplex relaying still achieves the min-cut upper bound of K DoF even in the presence of inter-relay interference, provided a certain relay scaling condition is satisfied. Numerical evaluation also indicates that the ORS-IN scheme has higher sum-rates than those of the other relay selection methods at finite SNR regimes. Detailed descriptions are omitted due to the space limitation of this extended abstract. II. S YSTEM AND C HANNEL M ODELS Suppose that each source transmits its own message to the corresponding destination only through one of N relays, and thus there is no direct path between an S–D pair. Each relay node is assumed to fully decode, re-encode, and retransmit the source message i.e., decode-and-forward protocol is taken into account. Unlike the work in [1], N relays are assumed to interfere with each other. With alternate relaying, each selected

relay node toggles between the transmit and listen modes for alternate time slots of message transmission of the sources. Now, let us turn to channel modeling. Let Sk , Dk , and Ri denote the k-th source, the corresponding destination, and the i-th relay node, respectively, where k ∈ {1, · · · , K} and i ∈ {1, · · · , N }. All the channels are assumed to be Rayleigh, having zero-mean and unit variance, and to be independent across different i, k, n, and hop index. III. ACHIEVABILITY R ESULT A. ORS-IN in the K ×N ×K Channel With Interfering Relays We introduce an ORS-IN protocol, where 2K relay nodes among N candidates are opportunistically selected for data forwarding in the sense of having a sufficiently small amount of interference level. Suppose that π1 (k) and π2 (k) denote the indices of two relays communicating with the kth S–D pair for k ∈ {1, · · · , K}. In this case, the specific steps of each node during one block are described as follows: • Time slot 1: Sources transmit their first encoded symbols. A set of K selected relay nodes, Π1 = {π1 (1), · · · , π1 (K)}, operating in receive mode at each odd time slot, listens to the symbols. Other N − K relay nodes and destinations remain idle. • Time slot 2: The K sources transmit their second encoded symbols. The K relays in the set Π1 forward their first re-encoded symbols to the corresponding K destinations. Another set of K selected relay nodes, Π2 = {π2 (1), · · · , π2 (K)}, operating in receive mode at each even time slot, listens to and decodes the second symbols while being interfered with by Rπ1 (1) , · · · , Rπ1 (K) . The K destinations receive from Rπ1 (1) , · · · , Rπ1 (K) and decode the first symbols. The remaining N − 2K relays keep idle. • Time slot 3: The K sources transmit their third encoded symbols. The K relays π2 (1), · · · , π2 (K) forward their re-encoded symbols to the corresponding K destinations. Another K relays in Π1 receive and decode the third symbols while being interfered with by Rπ2 (1) , · · · , Rπ2 (K) . The K destinations receive from Rπ2 (1) , · · · , Rπ2 (K) and decode the second symbols. The remaining N − 2K relays keep idle. • The processes in time slots 2 and 3 are repeated.

2.5

2

Sum-Rates (bits/s/Hz)

Now, let us describe how to choose two types of relay sets, Π1 and Π2 among N relay nodes. 1) Step 1 (The First Relay Set Selection): Let us first focus on selecting the set Π1 = {π1 (1), · · · , π1 (K)}, operating in receive and transmit modes in odd and even time slots, respectively. When Ri is assumed to serve the kth S–D pair ˜ i,k , defined as (Sk , Dk ), it computes the scheduling metric L (i) the sum of interference power received at Ri for the first hop plus (ii) the sum of interference power generating at Ri for the second hop. ˜ i,k , a timer-based According to the computed metrics L method is used for relay selection. At the beginning of every scheduling period, the relay Ri computes the set of ˜ i,1 , · · · , L ˜ i,K }, and then starts its K scheduling metrics, {L own timer with K initial values, which are proportional to the K metrics. Thus, there exist N K metrics over the whole relay nodes, and we need to compare them so as to determine who will be selected. The timer of the relay Rπ1 (k) ˆ with the ˜ ˆ ˆ among N K metrics will expire first, where least one L π1 (k),k ˆ ∈ {1, · · · , N } and kˆ ∈ {1, · · · , K}. The relay then π1 (k) transmits a short duration RTS (Request to Send) message, signaling its presence, to the other N − 1 relays. Thereafter, ˆ the relay Rπ1 (k) ˆ is first selected to forward the kth S–D pair’s packet. All the other relays are in listen mode while waiting for their timer to be set to zero (i.e., to expire). At the stage of deciding who will send the second RTS message, it is assumed that the other relays are not allowed ˆ S–D pair, and thus the assoto communicate with the kth ˜ ˜ ˆ ˜ ˆ ˜ ˆ} ciated metrics {L1,kˆ , · · · , L ˆ , Lπ1 (k)+1, ˆ , · · · , LN,k π1 (k)−1,k k are discarded with respect to timer operation. When such K RTS messages are sent out in consecutive order, Π1 = {Rπ1 (1) , · · · , Rπ1 (K) } is chosen, the timer-based algorithm for the first relay set selection terminates. 2) Step 2 (The Second Relay Set Selection): Now let us turn to choosing the set of K relay nodes (among N − K candidates), Π2 = {π2 (1), · · · , π2 (K)}, operating in receive and transmit modes in even and odd time slots, respectively. Using K RTS messages broadcasted from the K relay nodes in the set Π1 , it is possible for relay node Ri ∈ {1, · · · , N }\Π1 to compute the sum of inter-relay interference power generated from the relays in Π1 . When Ri is again assumed to serve the kth S–D pair (Sk , Dk ), it computes the metric Li,k , termed ˜ i,k (used in Step 1) total interference level, defined as (i) L plus (ii) the sum of inter-relay interference power. According to the computed metric Li,k , we also apply the timer-based method used in Step 1 for the second relay set selection. The relay Ri ∈ {1, · · · , N } \ Π1 computes the set of K interference levels, {Li,1 , · · · , Li,K }, and then starts its timer with K initial values, proportional to the K interference levels. Thus, we need to compare (N − K)K metrics over the relay nodes in the set {1, · · · , N } \ Π1 in order to determine who will be selected as the second relay set. The rest of the relay set selection protocol (i.e., RTS message exchange among relay nodes) almost follows the same line as that of Step 1. The timer-based algorithm for the second relay set

1.5

1

0.5

0 1 10

Fig. 1. 30dB.

Random selection Max-min SNR ORS-IN

10

2

10

3

N

10

4

10

5

The sum-rates versus N when K = 3, SNR = 20dB, and INRR =

selection terminates when K RTS messages are sent out in consecutive order. Then, K relay nodes having a sufficiently small amount of Li,k are selected as the second relay set Π2 . B. The Analysis of Achievable DoF Using the scaling argument bridging between the number of relays, N , and the received SNR [3], we analyze the achievable DoF of the K × N × K channel with interfering relays and the minimum N required to guarantee the achievability result. Theorem 1: Suppose that the ORS-IN scheme with alternate relaying is used for the K × N × K channel with interfering relays. Then, the total DoF are bounded by K if N scales faster than SNR3K−2 and the number of transmission symbols in one block is sufficiently large. IV. N UMERICAL E VALUATION For comparison, two baseline relay selection schemes are shown: 1) a random relay selection scheme and 2) a maxmin SNR scheme that is well-suited for relay-aided systems if interfering links are absent. Alternate relaying is also used for each of the compared schemes. Figure 1 illustrates the achievable sum-rates versus N when K = 3, SNR = 20dB, and INRR = 30dB, where INRR denotes the interrelay interference-to-noise ratio (INR). For the max-min SNR scheme, the desired channel gain grows as N increases while the interference level remains the same. In consequence, it is seen that the rate of increase in the sum-rates of the ORSIN scheme with respect to N is much higher than that of the max-min SNR scheme. ACKNOWLEDGEMENT This research was funded by the MSIP(Ministry of Science, ICT & Future Planning), Korea in the ICT R&D Program 2013. R EFERENCES [1] I. Shomorony and A. S. Avestimehr, “Degrees of freedom of two-hop wireless networks: “Everyone gets the entire cake”,” in Proc. 50th Annual Allerton Conf. on Commun., Control, and Computing, Monticello, IL, Oct. 2012. [2] F. Xue and S. Sandhu, “Cooperation in a half-duplex Gaussian diamond relay channel,” IEEE Trans. Inf. Theory, vol. 53, no. 10, pp. 3806–3814, Oct. 2007. [3] B. C. Jung, D. Park, and W.-Y. Shin, “Opportunistic interference mitigation achieves optimal degrees-of-freedom in wireless multi-cell uplink networks,” IEEE Trans. Commun., vol. 60, no. 7, pp. 1935–1944, Jul. 2012.

Opportunistic Relay Selection Based on Interference ...

code the third symbols while being interfered with by. Rπ2(1) ... own timer with K initial values, which are proportional to ... The timer of the relay Rπ1(ˆk) with the.

77KB Sizes 2 Downloads 317 Views

Recommend Documents

Codebook-Based Opportunistic Interference Alignment - IEEE Xplore
May 9, 2014 - based on the exiting zero-forcing receiver. We first propose a codebook-based OIA, in which the weight vectors are chosen from a predefined ...

Opportunistic Interference Mitigation
Then, their performance is analyzed in terms of degrees- of-freedom (DoFs). ..... For user j in the i-th cell, the user scheduling metric Li j is finally given by (2), ...

Minimax Robust Relay Selection Based on Uncertain ... - IEEE Xplore
Feb 12, 2014 - for spectrum sharing-based cognitive radios,” IEEE Trans. Signal Pro- ... Richness of wireless channels across time and frequency naturally.

Opportunistic Interference Alignment for Interference ...
This work was supported by the Industrial Strategic Technology Develop- ... [10033822, Operation framework development of large-scale intelligent and.

Opportunistic Interference Alignment for Interference ...
Simulation results show that the proposed scheme provides significant improvement in ... Section IV shows simulation results under the OIA scheme. Finally, we summarize the paper with some ..... [1] V. R. Cadambe and S. A. Jafar, “Interference alig

Opportunistic Interference Mitigation
user interference channel with time-varying channel coeffi- cients. Since then, interference management schemes based on IA have been further developed and analyzed in various wireless network environments: multiple-input multiple-output. (MIMO) inte

A Feasibility Study on Opportunistic Interference ...
a fundamental solution to achieve the optimal degrees-of- freedoms (DoF) in ... given SNR through computer simulations so that the sum-rate is maximized.

A Feasibility Study on Opportunistic Interference Alignment: Limited ...
Nov 3, 2012 - generating interference to other cells as a scheduling metric. Simulation results ... suitable performance measure that can be taken into account.

Opportunistic Interference Alignment for Random ... - IEEE Xplore
Dec 14, 2015 - the new standardization called IEEE 802.11 high-efficiency wireless ... Short Range Wireless Transmission Technology with Robustness to ...

Opportunistic Interference Alignment for MIMO ...
usage is required for the decoding of one signal block [6]. In addition, global channel state .... K-cell MIMO Interfering MAC. We show that for the antenna ...

Opportunistic Interference Alignment for MIMO ...
Feb 15, 2013 - Index Terms—Degrees-of-freedom (DoF), opportunistic inter- ... Education, Science and Technology (2010-0011140, 2012R1A1A1044151). A part of .... information of the channels from the transmitter to all receivers, i.e., its own ......

Opportunistic Interference Alignment for MIMO Interfering Multiple ...
Feb 15, 2013 - Interference management is a crucial problem in wireless ... of International Studies, Dankook University, Yongin 448-701, Republic of ... Education, Science and Technology (2010-0011140, 2012R1A1A1044151). A part of this .... informat

Opportunistic Downlink Interference Alignment - IEEE Xplore
Computer Science and Engineering, Dankook University, Yongin, 448-701, Korea. 3 ... This research was supported by the Basic Science Research Program.

Opportunistic Downlink Interference Alignment - IEEE Xplore
Electrical and Computer Engineering, UNIST, Ulsan 689-798, Korea. 2. Computer Science and Engineering, Dankook University, Yongin, 448-701, Korea. 3.

Energy-Efficient Opportunistic Interference Alignment - IEEE Xplore
Abstract—We introduce an energy-efficient distributed op- portunistic interference alignment (OIA) scheme that greatly improves the sum-rates in multiple-cell ...

Opportunistic Interference Alignment for MIMO ...
1School of ECE, UNIST, Ulsan, Korea, E-mail: [email protected]. 2Dept. of CSE .... user feeds back the effective channel vector and quantity of inter-cell.

Interference Mitigation and Capacity Enhancement based on ...
Interference Mitigation and Capacity Enhancement ba ... Dynamic Frequency Reuse for Femtocell Networks.pdf. Interference Mitigation and Capacity ...

On Selection of Candidates for Opportunistic Any-Path ... - CiteSeerX
Routing protocols for wireless networks have tradi- ... forwarding is suitable for wired networks with relatively ... reliable delivery of a packet to its destination.

On Selection of Candidates for Opportunistic Any-Path ... - CiteSeerX
Routing protocols for wireless networks have tradi- tionally focused on finding the ... on EAX to minimize the number of candidates without adversely affecting the ...

A Relay Selection Strategy Based on Power-Law and ...
We address the case of exponential and power- law ICTs, which ... Keywords—Delay Tolerant Networks; Power Law; Exponen- tial; Inter-Contact ..... f(a) + f(b). 2. (12). Applying Eq. 12 to Fi(x) on the interval Ii gives: C · Fi. (x i min + ci + x i+

Opportunistic Noisy Network Coding for Fading Relay ... - IEEE Xplore
Nov 9, 2015 - Abstract—The parallel relay network is studied, in which a single source node sends a message to a single destination node with the help of N ...

Personality-based selection Commentary on
“Reconsidering the Use of Personality Tests in Personnel Selection Contexts”: ... analytic research findings regarding the validity of personality-based assessments, and ... worked for a Fortune 500 company to develop large scale ... be driven pr

Opportunistic Interference Alignment for MIMO IMAC
scaling law required to achieve KS degrees-of-freedom (DoF), where S(≤ M) ..... SNR and the BS selects best S MSs that have higher effective. SNRs than the ...