the downlink. Conventional interference mitigation strategies are typically not effective in
high data rate and MIMO scenarios, especially for the downlink. Then in the latter part of
this dissertation, we focus on the study of interference mitigation in multiuser multicell
MIMO downlink, and investigate the potential of cooperative transmission among adjacent
base stations (BS) for effectively combating co-channel interference. Our study starts with a
quasi-synchronous model to obtain performance upper bounds, by which we also explore
some other advantages like channel rank/conditioning improvement and macro-diversity
protection. When considering a more practical channel model, in which signals from
different BSs in the downlink arrive asynchronously at each MS, we propose some novel
and effective pre-coding algorithms achieving different levels of tradeoffs between
interference mitigation and computational complexity. These algorithms are extended to the
scenarios where timing information cannot be perfectly acquired at the cooperative BSs.
In summary, we have tackled some open and interesting problems in MIMO study, in
particular, the diversity analysis for MIMO spatial multiplexing systems with antenna
selection and practical coding and decoding schemes, and the impact of ordering on the
performance of SIC (V-BLAST) receivers. The underlying geometric tools for these analyses
may find applications in other relevant fields as well. We have also endeavored to improve
the performance of MIMO systems in real operating scenarios and accelerate their
employment in future wireless networks, with contributions in fast and practical antenna
selection algorithms, and co-channel interference mitigation with base-station cooperation
explicitly considering the effect of signal asynchronism and timing errors.
Approved by:
_________________________
_________________________
_________________________
_________________________
ii
Biography
Hongyuan Zhang received his Bachelor of Science degree in Electronic Engineering in 1998 from
Tsinghua University, Beijing, China; and Master of Science degree in Electrical Engineering in
2001 from the Graduate School of Chinese Academy of Sciences, Beijing, China. In August 2001,
he started his work towards the PhD degree in Electrical Engineering at North Carolina State
University, under the guidance of Prof. Huaiyu Dai. His research topic is focused on the general
area of MIMO wireless communication systems including antenna selection and multiuser
interference mitigation technologies. From May 2005 to Dec. 2005, and from May 2006 to Aug.
2006, he worked as an intern at Mitsubishi Electric Research Labs (MERL), Cambridge, MA,
where he was dedicated in the research of base station cooperation for MIMO multiuser
interference mitigation, and made contributions to the emerging IEEE 802.11n wireless LAN
standard by proposing antenna selection training techniques. He has made publications or
submissions in the form of book chapter, major transactions, and major conference proceedings.
Nine patents were filed based on his research outcomes in MERL.
iii
Acknowledgements
First, I would like to express my deepest gratitude to my advisor, Dr. Huaiyu Dai, for his
guidance and continuous support through my PhD study. His wisdom, vision, and hard work
benefited me not only in enhancing my research skills, but also in the way I look at any problem
faced in my life. Working with him was really a great experience for me.
I am also grateful to the professors serving in my PhD committee: Dr. Brian Hughes, who
guided me in an interesting summer research project, and provided me insightful viewpoints in
my research on the diversity analysis for antenna selection and V-BLAST SIC receivers; Dr.
Alexandra Duel-Hallen and Dr. Keith Townsend, who provided valuable feedback on my
research, and useful knowledge in the general area of wireless communications, in the courses
they taught.
My gratitude is also given to my supervisors and colleagues at Mitsubishi Electric Research
Labs: Dr. Andreas Molisch, Dr. Neelesh Mehta, Dr. Daqing Gu (who is currently with NTT
Docomo Labs, Beijing, China), Dr. Koon Hoo Teo, Dr. Dong Wang (who is currently with
Philips Research North America, Briarcliff Manor, NY), and Mr. Yves-Paul Nakache. Without
the constructive discussions with them, it was not possible for me to accomplish the research at
MERL (in particular, Sections 2.4 and 4.4 in this dissertation). Special thanks should be given to
Dr. Jin Zhang, my manager at MERL, who helped me out in difficult times.
Finally, I appreciate the support from my family and my friends.
iv
Contents
List of Figures...............................................................................................................................viii
Abbreviations and Acronyms .......................................................................................................... x
Chapter 1 Introductions ................................................................................................................... 1
1.1 MIMO Communications Systems ......................................................................................... 1
1.2 Point-to-Point MIMO Systems: Antenna Selection............................................................... 2
1.3 Multiple User MIMO Systems: Interference Mitigation ....................................................... 4
1.4 Dissertation Outline ............................................................................................................... 7
Chapter 2 Antenna Selection in Point-to-Point MIMO ................................................................... 9
2.1 Introduction of Antenna Selection......................................................................................... 9
2.2 Performance Analysis of Antenna Selection: Diversity Order of MIMO-SM with Transmit
Antenna Selection - A Geometrical Approach .......................................................................... 12
2.2.1 Introduction................................................................................................................... 12
2.2.2 System Model and Problem Formulation ..................................................................... 14
2.2.3 Diversity Order and Diversity-Multiplexing Tradeoff when L = 2 ............................ 20
2.2.4 Extension to General L ................................................................................................. 38
2.2.5 Summary....................................................................................................................... 44
2.3 Antenna Selection Algorithm Designs: Fast Transmit Antenna Selection in Correlated
MIMO Channels ........................................................................................................................ 44
2.3.1 Introduction................................................................................................................... 44
2.3.2 System model and Problem Formulations .................................................................... 46
2.3.3 Gram-Schmidt (GS) Based Algorithm: A Geometric Analysis.................................... 49
2.3.4 The Gerschgorin Circles (G-circles) Based Algorithm................................................. 51
2.3.5 Numerical Results......................................................................................................... 56
2.3.6 Summary....................................................................................................................... 60
2.4 Implementing Antenna Selection in Realistic Wireless Networks ...................................... 61
2.4.1 Introduction................................................................................................................... 61
2.4.2 Introduction of 802.11n PHY and MAC....................................................................... 64
2.4.3 Mathematical Model for Antenna Selection ................................................................. 66
2.4.4 MAC-based AS Training Protocol................................................................................ 71
v
vii
List of Figures
Figure 2-1 Antenna Selection System Model ........................................................11
Figure 2-2 The Illustration of (2.6) .........................................................................17
Figure 2-3 The Illustration of the Proof for Proposition 2.1: A Graph with Size n ..25
Figure 2-4 The Exponential Behaviors of the Outage Probabilities for the
NT = N R = 3, L = 2 Scenario...............................................................................30
Figure 2-5 BER Performance of the ZF-DF Receiver with NT = N R = 3, L = 2 .......37
Figure 2-6 The Exponential Behaviors of the Outage Probabilities for the
N T = N R = 4, L = 3 Scenario .................................................................................43
Figure 2-7 Two and three dimensional examples of Gram-Schmidt process .........50
Figure 2-8 An example of G-circles.......................................................................52
Figure 2-9 Capacity performances for well- and ill-conditioned channels .............56
Figure 2-10 Capacities of RT -based selections w.r.t. different .......................57
Figure 2-11 BER performances for well- and ill-conditioned channels ..................59
Figure 2-12 MIMO-OFDM PHY .............................................................................63
Figure 2-13 11n PHY Preamble ............................................................................65
Figure 2-14 Illustration of an AS Cycle ..................................................................66
Figure 2-15 Time Variation in WLAN Channel Model B...........................................72
Figure 2-16 Transmit AS Training Example ............................................................73
Figure 2-17 Transmit AS Calibration Process .........................................................75
Figure 2-18 Results of Channel B ..........................................................................79
Figure 2-19 Results of Channel E ..........................................................................80
Figure 2-20 Results of Channel B under RF Imbalance ..........................................81
Figure 3-1 Geometric Illustration of ZF-SIC Receiver with NT = 2 ........................91
Figure 3-2 Geometric Illustration of (3.20).............................................................97
Figure 3-3 Bounds on the Diversity Multiplexing Tradeoff for SDMA-SIC Detectors
........................................................................................................................105
Figure 4-1 A Simple BS Cooperation Scenario ...................................................115
Figure 4-2 Asynchronous Interference :Symbol Overlap Diagram ......................117
Figure 4-3 Simulations of BS Cooperation Shcemes in Rayleigh Fading Channels
........................................................................................................................131
viii
ix
analog-to-digital/digital-to-analog
AGC
AP
access point
AS
antenna selection
BER
BF
beamforming
BS
base station
CBS
correlation-based selection
CCI
co-channel interference
CDF
CDMA
CDMA/CA
CISVD
CSI
DF
decision-feedback
DOD
direction of departure
DPC
dirty-paper coding
FDMA
GI
guard interval
GS
Gram-Schmidt
HS-MRC
HT-LTF
HT-STF
i.i.d.
ISI
Inter-symbol interference
JLS
JT
joint transmission
JWF
LOS
line-of-sight
MAC
medium-access control
MCS
modulation/coding sets
MEMS
micro-electro-mechanical systems
MIMO
multiple-input multiple-output
MMSE
MMSE-DF
MMSE decision-feedback
MS
mobile station
MSE
MUD
multiuser detection
MUI
multi-user interference
NLOS
non-line-of-sight
OFDM
OFDMA
PBS
power-based selection
PER
PHY
physical
PU
processing units
RF
radio frequency
RX
receive(r)
SD
spatial diversity
SDMA
SIC
SIFS
SINR
SISO
single-input single-output
SLNR
xi
SM
spatial multiplexing
SNR
STA
station
STBC
STDS
SVD
TDMA
TD-SCDMA
THP
Tomlinson-Harashima precoding
TX
transmit(er)
V-BLAST
WLAN
WMAN
ZF
zero-forcing
ZF-DF
zero-forcing decision-feedback
xii
Chapter 1
Introductions
compete with each other, and the tradeoff between them is an active research area after the
pioneering work of [104].
Built on intensive theoretical investigations, the development of MIMO systems has
already entered the stage of commercial applications: they are being considered as a key
enabling technology for boosting the effective data rate or throughput in systems such as:
3GPP [45], IEEE 802.11 WLANs [105], and IEEE 802.16 WMANs [106].
In this dissertation, both theoretical and practical aspects of MIMO systems are taken into
considerations in our study of two major topics: antenna selection in point to-point MIMO
systems, and interference mitigation in cellular multiuser MIMO networks, as will be
specified in the subsequent sections.
1.
Open-loop: the transmitter does not have CSI, so data streams are usually
transmitted in a balanced manner, in which power and modulation/coding sets (MCS)
are allocated equally [20][22].
2.
Closed-loop: the transmitter knows full or partial CSI and adapts the data streams
accordingly to achieve performance improvements. Examples of closed-loop
systems include transmitter beamforming [53][79], link adaptation [105], and
transmit antenna selection [52], one of the major focuses of this dissertation.
In general, antenna selection techniques provide a new form of diversity in MIMO systems.
In this dissertation, we focus on three aspects:
First, we study the best diversity order achieved by transmit antenna selection for MIMO
spatial multiplexing systems employing practical coding and decoding schemes. This
problem is difficult by nature and rarely addressed in literature, except some conjectures
based on numerical experiments. We have proposed a new geometrical framework for this
type of analysis and obtained some interesting results, which confirm and generalize some of
the conjectures in literature (see Section 2.2). This approach has also been extended to tackle
some previously unsolvable problems in general MIMO systems without antenna selection
(see Chapter 3).
Secondly, design of antenna selection algorithm is another important problem, which
actually is the focus for most of the papers in the area. We also propose a fast transmit
antenna selection method based on some geometrical properties of MIMO channel matrices.
This algorithm achieves significant performance improvement with very affordable
computational effort, and is amendable to different levels of CSI at the transmitter (see
Section 2.3).
Finally, we look into the issue of how to implement antenna selection techniques in a
realistic commercial system, more specifically, the emerging IEEE 802.11n high-throughput
WLAN. In this scenario, practical issues should be jointly considered, such as the increased
training overhead, distortions caused by channel variations, cost and performance loss due to
the deployment of antenna switches, and impairments caused by RF mismatches. Our goal
here is to accommodate antenna selection with the least influence from the above aspects.
With this in mind, based on the specific characteristics of WLAN channels, we propose
effective antenna selection training/calibration protocols for the emerging 802.11n standard,
which are successfully adopted in the draft specifications [105] (see Section 2.4).
and there are usually insufficient spatial dimensions due to the hardware limitations, more
effort on the transmitter/receiver design is required for interference mitigation. This scheme
is sometimes named as SDMA.
Our study mainly targets the infrastructure networks, or cellular networks [26][69][87],
which, compared with ad hoc networks, utilize base stations or access points to provide
access for mobile stations to a backbone network. Here a "cell" is defined as a specific area
serviced by a BS, through which a subscriber in the area can directly access the backbone
network a single-hop scheme. Base stations are usually connected by reliable wirelines to
centralized processing units to facilitate advanced functionalities such as handoff and
resource allocations. Therefore the performances of infrastructure based wireless networks
are usually much better than those without infrastructure, which explains why they will
continuously be relied on for fulfilling the stringent wideband requirements.
In the uplink, where the signals are transmitted from multiple MSs to a single BS,
multiple antennas at the receiver are used for detecting different data streams of different
users, exploiting multiuser detection techniques. The studies on MUD were well developed
in the 1990s, a comprehensive review of which can be found in [89] and references therein.
Note that MUD was originally discussed under the CDMA settings. Due to the similarity
between CDMA and SDMA as mentioned earlier, they can be naturally extended to the
multi-antenna systems. Some recent development on MIMO MUD can be found in [14][90].
Despite its great potential in MUI mitigation and performance enhancement, the applications
of MUD are often limited by many factors including complexity and timing accuracy (i.e.
synchronization).
In the downlink, where the signals intended for multiple users are transmitted together
from the BS, both receiver processing (MUD) [16] and transmitter pre-processing (assuming
transmitter side CSI) are explored in the literature. A detailed survey will be given in Chapter
4.
Some simple multi-user MIMO architectures already appear in realistic systems. For
example, the Chinese 3G standard TD-SCDMA employs multiuser detectors in its
synchronized uplink [47]; and one optional mode of the new IEEE 802.16e WMAN standard
applies uplink joint detection and downlink beamforming in its OFDMA PHY layer, under
multiuser MIMO settings [106].
In this dissertation, we develop some new methods in transmitter side pre-processing for
the MIMO cellular downlink. With the development of RF and baseband IC circuitry, and in
some low Doppler environment, the acquisition of full CSI at the transmitter(s) in the
downlink is made possible through, e.g. a joint training process and feedback. In cellular
systems, universal frequency reuse is beneficial regarding the network throughput, as long as
the interference can be effectively managed. Moreover, in cellular systems, intra-cell and
inter-cell interferences are often modeled and mitigated in different ways. While the former
one is well investigated, inter-cell interference is far less explored, due to its random and
uncontrollable nature in conventional cellular architectures. We propose to tackle this
problem through base station cooperation schemes (see Chapter 4). To show the potential
Chapter 2
Antenna Selection in Point-to-Point MIMO
in the near future, and the impairment caused by cross-talks between multiple integrated RF
chains may be even smaller than that caused by antenna switches used for antenna selection,
antenna selection is still beneficial in improving the system performance, since it is operated
in the RF domain, and essentially doesnot interfere with any other performance-enhancement
techniques. In another word, antenna selection is not proposed as an alternative, but rather as
an enhancement to other advanced processing (e.g. the transmit beamforming), to achieve
better performances. We will re-stress this idea in Section 2.4.
The idea of antenna selection refers to selecting an optimal sub-matrix from a complete
MIMO channel matrix according to some predetermined criterion, and switching the selected
antennas to the limited numbers of RF chains. To perform antenna selection, the complete
channel matrix is estimated by sending training frames to measure the complete channel state
information. On transmitting or receiving these AS training frames, the device conducting
antenna selection switches different antenna subsets to the RF chains so that the receiver can
estimate the corresponding subchannels matrices.
Figure 2-1 shows a point-to-point MIMO communication system, including a transmitting
station (STA A), and a receving station (STA B). Either station can operate in the receive or
transmit mode. Each station includes a set of receive RF chains, and a set of transmit RF
chains both connected to a set of antennas by switches. Generally, in MIMO devices, the
number of antennas is larger than that of RF chains. Therefore, a subset of antennas is
selected from the set of total available antennas by an antenna selection method during a
10
training phase. The selection can be initiated by either the transmitter or the receiver, and the
selection can be conducted at the transmitter and/or at the receiver.
environments, particularly with high fading correlations. In Section 2.4 we take one step
further to investigate antenna selection in commercial wireless networks. Specifically, we
propose the training and calibration methods for antenna selection in high-throughput WLAN
systems, a topic receiving little attention so far.
2.2 Performance Analysis of Antenna Selection: Diversity Order of MIMOSM with Transmit Antenna Selection - A Geometrical Approach
2.2.1 Introduction
As mentioned earlier, a major potential problem with MIMO is increased hardware cost
due to multiple analog/RF front-ends, which has recently motivated the investigation of
antenna selection techniques for MIMO systems [52].
MIMO systems can be exploited for spatial diversity or spatial multiplexing gains [104].
The majority of analytical work on MIMO antenna selection focuses on the former, including
selection combining, HS-MRC [37][79], and antenna selection with space-time coding
[1][30]. Essentially in these works, with i.i.d. Rayleigh fading, the system error performance
or outage probability can be readily analyzed through order statistics [17]. It has been shown
that the diversity order of the original full-size system can be maintained through the SNR
maximization selection criterion.
By contrast, antenna selection for MIMO systems with multiple data streams, i.e., spatial
multiplexing systems, has received less attention. The few existing analytical results
generally assume capacity-achieving joint space-time coding and optimal decoding.
Capacity-maximizing receive antenna selection is analyzed in [32] and shown to achieve the
12
same diversity order as the full-size system. In [33], it is shown that the fundamental tradeoff
between diversity and spatial multiplexing of the full-size system, obtained in [104], holds as
well for MIMO systems with antenna selection.
In practice, the multiple streams in a SM system may be uncoded or separately encoded
and sub-optimally decoded due to complexity and channel feedback overhead concerns. In
[36], several transmit antenna selection algorithms for SM with linear receivers are proposed,
and some conjectures on the achieved diversity orders are made from numerical results. To
the best of our knowledge, the exact diversity order achieved by antenna selection for
practical SM systems has not been rigorously obtained. In contrast to MIMO diversity
schemes, the key challenge that hinders accurate performance analysis is that selection is
performed among a list of inter-dependent random quantities, which are correlated in a
complex manner.
In this Section, we propose a new framework to analyze the diversity order achieved by
transmit antenna selection for SM systems with separately (and independently) encoded data
streams and linear or decision-feedback receivers (i.e., the V-BLAST structure [20][95]). In
particular, we rigorously show that the optimal diversity order is ( NT 1)( N R 1) for an
N R NT separately encoded SM system employing linear or DF receivers, when L = 2
antennas are selected from the transmit side. This should be compared with the diversity
order of a two-stream SM system without antenna selection: N R 1 . Such a diversity gain
can be tremendous for downlink high-data-rate communications, where there may be a large
number of transmit antennas at the base stations but few receive antennas at the mobiles (e.g.,
13
N R = 2 ). For DF receivers, it is also clarified that, the antenna selection rule that maximizes
the performance of the first decoded data stream is not optimal, as the freedom to choose
transmit antennas for subsequent data streams is restricted. Furthermore, following the same
geometrical approach, we give an upper bound, ( NT L + 1)( N R 1) , and a lower bound,
( NT L + 1)( N R L + 1) , on the diversity order for general L , which coincide when L = 2 .
The corresponding diversity-multiplexing tradeoff curves are also derived. Generally
speaking, our results confirm and generalize some of the conjectures in [36], thus verifying
that transmit antenna selection can achieve high data rates and robust error performance in
practical SM systems without complex coding. Furthermore, the proposed geometrical
approach may be used to solve other open problems related to MIMO communication
systems.
Among feasible sub-optimal receivers for separately encoded SM systems, we first
investigate the linear ZF receiver [89]. The analysis for the ZF-DF receiver relies heavily on
the former. Furthermore, their diversity order analyses, a study at high SNR regimes, hold for
linear MMSE and MMSE-DF receivers as well.
2.2.2 System Model and Problem Formulation
We consider a frequency non-selective block Rayleigh fading channel model, in which the
N R NT channel matrix is represented by H = [h1 , h 2 ,
normalized complex Gaussian entries with zero mean and unit variance. With transmit
14
N
antenna selection, there are a total of NU = T possible antenna subsets, defined as
L
U1 ~ U NU 1:
U1 = {h1 , h 2 ,
, hL}
U 2 = {h1 , h 2 ,
h L 1 , h L +1}
U NU = h NT L +1 ,
(2.1)
, h NT .
If the subset U j is selected, of which the L column vectors compose the channel matrix H j ,
the SM system can then be expressed as:
y=
0
L
H js + n ,
(2.2)
where the N R T matrix y is the received signal block with T the block length; n is the
circularly symmetric complex Gaussian background noise with zero mean and unit variance;
and the L T matrix s represents the transmitted signal block, with independent rows each
assuming unit average energy per symbol. Therefore, 0 is the average SNR per receive
antenna. As in [104], we assume the fading channel keeps constant for the entire data frame.
Each stream independently adopts a code of fixed data rate R0 2. As will be shown (see proof
of Lemma 2.1), channel coding in each data stream can provide coding gain but not diversity
gain. Throughout the paper we assume NT L and N R L . Therefore given the assumption
1
2
Without loss of generality, it is assumed that in each subset the selected columns are placed by index in increasing order.
We are mainly interested in the maximum diversity gain here, corresponding to a zero multiplexing gain scenario in [104].
15
of i.i.d. Rayleigh fading, the selected channel matrix H j has full column rank with
probability one [55].
1
where
0
L
s + G ZF n ,
(2.3)
sk =
sk + [G ZF ]k * n, 1 k L ,
(2.4)
where [G ]k * is the kth row in matrix G . The instantaneous channel capacity and error
performance of these subchannels are determined by the corresponding post-processing
SNRs, which can be directly derived from (2.4) as
0
[G ZF ]k *
L
)
k( ,jZF
=
where
1
= 0 H Hj H j , 1 k L ,
kk
L
(2.5)
stands for conjugate transpose, and []kk represents the kth diagonal element of a
matrix. Let h (k j ) be the kth column of H j , and H (k j ) the N R ( L 1) matrix resulting from
leaving out h (k j ) from H j . It is known that [89], 1/ H Hj H j
16
1
kk
the projection height3 from h (k j ) to the range of H (k j ) , or alternatively, the square of the norm
of the projection of h (k j ) onto the null space of ( H (k j ) ) . That is
T
)
k( ,jZF
=
0
L
Rk( j ) =
0
L
h (k j ) sin 2 k( j ) ,
(2.6)
where h (k j ) is the norm of h (k j ) , while k( j ) is the angle between h (k j ) and its projection on
the range of H (k j ) , defined as
( j)
k
= sin
Rk( j )
h
( j)
k
, 0 < k( j ) <
We further define
Projection height refers to the norm of the error vector, i.e., the difference between a vector and its projection onto a subspace.
17
( j)
Rmin
= min{Rk( j ) } , 1 j NU
(2.7)
k =1 L
for each subset U j , which essentially determines the system performance at high SNR
[66][89].
For
linear
MMSE
receiver,
the
spatial
equalizer
is
given
by
where (k j ) =
L[H Hj H j + L / 0 I ]kk1
1 =
0 (k j )
L
1, 1 k L ,
(2.8)
1
. Similarly, we define
[H H j + L / 0 I ]kk1
*
j
j)
(min
= min{ (k j ) } , 1 j NU .
k =1 L
(2.9)
In this section, we adopt the antenna selection rule that maximizes the post-processing
SNR of the worst data stream (as in [36]). That is, we choose the subset among (2.1) such
( j)
j)
in (2.7) or (min
in (2.9) is maximized, and we denote
that Rmin
( j)
j)
RSL = max {Rmin
} and SL = max { (min
}.
1 j NU
1 j NU
(2.10)
We will show that this selection rule is optimal for linear receivers with respect to diversity
order.
Before proceed, we first introduce some notations. The diversity order is defined as the
slope of the average frame error probability (an error is declared if any substream is decoded
unsuccessfully. By assuming coding over a single block with constant fading, this is the true error
18
probability of a code averaged over the transmitted codewords, channel fading, and additive noise.)
d = lim
We adopt the operator
f ( 0 )
(2.11)
0b to represent
log f ( 0 )
=b .
0 log( )
0
lim
log f ( x)
=b.
log x
xb to represent
(2.12)
The operators , , < , > are similarly defined. Note that according to our notation,
f ( x) g ( x) indicates f ( x) g ( x) for sufficiently small x .
Lemma 2.1: For separately encoded spatial multiplexing systems with linear ZF/MMSE
receivers, the antenna selection rule that chooses the antenna subset with the strongest
weakest data link achieves the optimal diversity order among all antenna selection rules.
Furthermore, the optimal diversity order can be evaluated as
log Pr( RSL x)
x 0
log( x)
d L = lim
opt
19
(2.13)
Remarks: Lemma 2.1 indicates that we only need to evaluate (2.13) for the optimal diversity
order of transmit antenna selection with linear ZF/MMSE receivers. We also make no claims
on the practicality of this selection algorithm, as the main focus of this section is on
theoretical analysis. Note that efficient antenna selection algorithms exist in literature (e.g.,
[37][108] and references therein), and will be further discussed in Section 2.3.
2.2.3 Diversity Order and Diversity-Multiplexing Tradeoff when L = 2
In this subsection, we discuss the main idea of our geometrical approach for L = 2 , which
also admits an exact result. Extension to the general L scenario is not trivial, as will be seen
in Section 2.2.4.
Theorem 2.1: In an N R NT spatial multiplexing system with linear ZF/MMSE or ZF/MMSE
d opt = ( NT 1)( N R 1) .
(2.14)
(2.15)
where ( x) + = max( x, 0) .
This theorem will be proved in three steps: we start with linear ZF/MMSE receivers by
evaluating (2.13) in Subsection 2.2.3.1. Then we extend the analysis to ZF/MMSE-DF
20
R1( s ) and R jk
Rkj = h k sin 2 kj ,
2
(2.16)
density function4
f||h ||2 ( x) =
k
1
1
x N R 1e x =
x N R 1e x ,
( N R 1)!
( N R )
(2.17)
, hj
0, .
2
(2.18)
21
x N R 1 .
(2.19)
From (2.19) we can see that without transmit antenna selection ( NT = L ), any data stream
with a ZF/MMSE receiver bears a diversity order of N R 1 , so does the overall error
probability. When NT > L , through the diversity-maximization transmit antenna selection
(c.f. (2.7) and (2.10))
RSL =
max
k j{1, , NT }
{min {R , R }} ,
kj
(2.20)
jk
we will show that a product gain of NT 1 on the diversity order can be achieved.
2.2.3.1 Linear ZF/MMSE Receivers
L
In the following, the optimal diversity order (2.13) for linear ZF/MMSE receivers d opt
will
be explicitly explored. Note that neither the exact PDF of RSL nor its polynomial expansion
near zero seems tractable, which motivates us to solve the problem through tight upper and
lower bounds.
By definition
Pr( RSL x) = Pr(min( R12 , R21 ) x ,min( R13 , R31 ) x,
, min( R( NT 1) NT , RNT ( NT 1) ) x)
(2.21)
N
= Pr Ai ,
i =1
, R1NT x, R23 x,
, R( NT 1) NT x}
A2 = {R12 x, R13 x,
, R1NT x, R23 x,
, RNT ( NT 1) x}
AN = {R21 x, R31 x,
, RNT 1 x, R32 x,
, RNT ( NT 1) x},
22
(2.22)
each of which corresponds to the case that one data stream from each of the NU subsets is in
outage (i.e., close to zero for sufficiently small x). For example, event A1 picks the first
element from each possible subset U1 ~ U NU , i.e., A1 = { Rkj x} . Then from (2.21)
1 k < j NT
we have:
N
(2.23)
i =1
which indicates
lim
x 0
log( x)
log Pr( A1 )
.
x 0
log( x)
L
d opt
lim
(2.24)
Clearly the lower bound in (2.24) actually is tight. However, it is generally difficult to
identify the dominant terms at high SNR from (2.22), since the cardinality grows
exponentially with NT2 . Alternatively, we take the following approach. First, we find a
common upper bound for Pr( Ai ), i , i.e., obtaining such a PU that
max Pr( Ai ) PU ,
i
(2.25)
L
which determines a lower bound for d opt
(c.f. the lower bound in (2.24))5. We then obtain a
Recall that an error probability with lower diversity order corresponds to an exponentially larger one, and vice versa.
23
(2.26)
L
and evaluate its error exponential, which gives an upper bound for d opt
(c.f. the upper bound
in (2.24)). It turns out that these two bounds coincide and represent the best achievable
diversity order, given by ( NT 1)( N R 1) .
Diversity Lower Bound
L
Proposition 2.1: d opt
( NT 1)( N R 1) .
N
Proof: Define Si as the set consisting of the NU = T random variables in Ai (see (2.22)).
2
, R1NT , R23 ,
, R( NT 1) NT = { Rkj }
1 k < j NT
, Rk N
k
T 1 NT
} , where k ~ k
1
NT
given in Appendix B, we obtain the following common upper bound for Pr( Ai ) :
Pr( Ai ) PU = [Pr( Rkj x)]( NT 1) , k j , Ai .
(2.27)
24
(2.28)
Figure 2-3 The Illustration of the Proof for Proposition 2.1: A Graph with Size n
The claim is proved as follows. A graph is drawn in Figure 2-3 to visualize Si , where the
nodes represent the transmit antenna elements and an arrow directed from node k1 to
k2 appears in the graph if Rk1k2 exists in Si . Based on the definition of Si , there is one and
only one arrow between any two nodes. For such a graph of size n, a complete path is defined
as one that goes through a series of n 1 arrows, passing each of the n nodes one and only
one time. Therefore we can find a subset Si _ indep in Si if at least one complete path exists in
the graph of size NT , passing the nodes with the order k1 k2
k NT . It is easily
shown that all graphs of size 3 contain one complete path. Now suppose that all graphs of
size n 1 contain at least one complete path. Then in any graph of size n , we can always
find a path passing n 1 nodes one and only one time, assumed in the order
k1 k2
kn 1 . From Figure 2-3, we see that if there is no complete path existing in the
25
graph of size n, the arrow between k1 and kn should be in the direction of k1 kn , otherwise
kn k1
kn 1 forms a complete path. For the same reason, the arrow between k2 and
kn 1 forms a complete
path. By repeating the same reasoning, we finally reach kn 1 kn . However, in this case
k1 k2
for any graph of size n . Thus the claim is proved for any NT by induction.
Proof: This proof is technically involved, so we divide it into three parts for ease of
illustration: (1) by some geometrical analysis Pr( A1 ) is further lower bounded (see (2.31));
(2) by Lemma B.2~B.5 in Appendix B, the probability lower bound is transformed into an
exponentially equivalent form with known statistics (see (2.35)); (3) the diversity upper
bound is explicitly evaluated (see (2.38)).
Part (1):
Given
2
Pr( A1 ) = Pr Rkj x = Pr h k sin 2 kj x ,
1 k < j N
1 k < j N
T
T
26
and by defining z =
NT 1
k =1
hk
0 = ( / 2) /( NT 1) , we have:
1 k < j N
2 k NT
T
T
(2.29)
where for the second inequality we have further restricted the ranges of the NT 1 i.i.d.
random variables {1k }k =T 2 within (0, 0 ) (c.f. Corollary B.1 in Appendix B).
N
+ 1 NT ) = sin 2 ,
(2.30)
NT
where = 1k is still in the range of (0, / 2) . Therefore (2.29) can be further lower
k =2
bounded as:
(2.31)
where we define a new set of i.i.d. random variables '12 ~ '1NT with PDF of
f '1i ( x) =
f1i ( x)
f1i ( x)dx
f1i ( x)
C
, 0 < x < 0 , 2 i NT ,
27
(2.32)
NT
i.e., the restriction of 12 ~ 1NT in the range of (0, 0 ) , and ' = '1i .
i =2
Part (2):
for x (0, 0 ) , from Lemma B.3 (whose proof requires Lemma B.2) we have
Pr(sin 2 ' x)
Pr(sin 2 '0 x) ,
(2.33)
i.e., with respect to monotonic functions, replacing the sum of a set of independent random
variables with the maximum of them does not change the associated exponential behavior.
Further by Lemma B.4, we have
Pr( z sin 2 ' x)
(2.34)
i.e., the exponential behavior is still not changed by multiplication of an independent random
variable.
Finally by Lemma B.5, we have
Pr( z sin 2 '0 x )
Pr( z sin 2 0 x ) ,
(2.35)
Part (3):
We are then left to evaluate the smallest exponential in Pr( z sin 2 0 x) in (2.35). Note that
28
Fz ( x) = 1 e x
M + NT 2
k =0
xk
,
k!
M = ( NT 1)( N R 1) ,
(2.36)
(2.37)
After some algebra presented in Appendix C, we can get the following equivalent polynomial
form as x 0 :
NT 3
1
M
k!
M
Pr(z sin 2 0 x) =
M
x + o( x ), M = ( NT 1)( N R 1) ,
M
!
(
M
k
1)!
+
+
k =0
(2.38)
where the coefficient of x M in (2.38) is always positive (also shown in Appendix C), which
completes the proof.
x4
Pr(z sin 0 x) =
+ o( x 5 ) .
120
2
To illustrate the soundness of our approach, Figure 2-4 presents by simulations the
exponential behavior of Pr(z sin 2 0 x) , together with the outage probability in (2.21) and
the probabilities representing the diversity bounds as in (2.23)(2.24). The results show a
diversity order of 4, verifying our derivations above.
With Proposition 2.1 and 2.2, (2.14) is proved for the linear receiver case.
29
Figure 2-4 The Exponential Behaviors of the Outage Probabilities for the
NT = N R = 3, L = 2 Scenario
In this subsection we continue to explore the optimal achievable diversity order for
separately encoded SM systems with transmit antenna selection and DF receivers, denoted as
DF
d opt
. As expected, the performance analysis for DF receivers will rely heavily on that for
Pe = Pe1 + Pe 2 (1 Pe1 ) ,
30
(2.39)
where Pe1 is the error probability of the first decoded data stream, and Pe 2 is that of the
second stream assuming perfect feedback. Therefore Pe
ZF/MMSE DF receiver without antenna selection, Pe1 Pe 2 is always fulfilled, so that we can
investigate its diversity order solely from the first decoded data stream, which is processed
by just a linear ZF/MMSE receiver (see, e.g. [104][66]). This may entice one to consider an
antenna selection rule that maximizes the performance of the first decoded data stream.
However, as will be shown, this antenna selection rule is generally not optimal.
Instead of seeking an optimal antenna selection rule for DF receivers like Lemma 2.1, we
DF
take the following simpler approach to evaluate d opt
, thanks to the close connection between
DF receivers and their linear counterparts. First, since for any antenna selection rule j ,
DF
DF
Pe( j ) Pe(1j ) , we have d (DF
j ) d1,( j ) , where d1,( j ) is the diversity order of the corresponding first
(2.40)
where d1,DF
opt is the best achievable diversity order of the first decoded data stream. Note that
there may be multiple choices of antenna selection rules to achieve the optimum for both
sides of (2.40), and a selection rule that is best for one may fail for the other. Nonetheless,
following a procedure similar to what we have discussed above for linear receivers, we will
DF
explicitly evaluate d1,DF
opt and derive a diversity upper bound for d opt . We then continue by
constructing a specific antenna selection algorithm whose diversity order is easy to assess
DF
and serve as a lower bound for d opt
.
31
Diversity Upper Bound - Maximizing the SNR of the First Decoded Data Stream
Proof: For fixed ordering, without loss of generality, we assume that decoding starts from
the signal transmitted from the antenna with the smallest index number in the selected
antenna subset. The antenna selection rule indicates that the post-processing SNR of the first
decoded data stream is given by (c.f. (2.20))
RSL1 = max
1 k < j NT
{R } .
(2.41)
kj
(2.42)
whose upper bound can be derived from (2.27), while its lower bound exponential behavior
evaluation directly follows (2.29)~(2.38). Therefore for arbitrary but fixed ordering
d1,DF
opt = ( NT 1)( N R 1) .
(2.43)
max
k j{1, , NT }
{max {R , R }} ,
and we have:
32
kj
jk
(2.44)
2
2
= Pr max( h k , h j ) sin 2 kj x .
1 k < j N
(2.45)
It is straightforward to upper and lower bound (2.45) as (c.f. (2.27) and (2.31)):
Pr( RSL 2 x) Pr( A1 ) Pr( Rkj x)
NT 1
k j ,
(2.46)
and
2
2
Pr( RSL 2 x) Pr max h1 , , h NT sin 2 x
NT
2
Pr hi sin 2 x .
i =1
(2.47)
The evaluation of the lower bound in (2.47) is similar as in (2.31), except that z is re-defined
NT
as z = h k
k =1
NT + N R 3
1
M
k!
M +1
x)
M
x + o( x ), M = ( NT 1)( N R 1) .
( M + k + 1)!
k =0
M!
.
Pr( RSL 2
(2.48)
Remarks: Even though RSL 2 RSL1 RSL with probability 1, no advantage in diversity order
can be achieved. Of course, some coding gain in SNR is naturally expected, which is beyond
DF
L
the scope of this paper. So d opt
d1,DF
opt = d opt . On the other hand, we anticipate the
33
performance of DF receivers is no worse than their linear counterparts at high SNR, which
will be verified below.
In [104][49], the authors have shown that optimal ordering will not increase the diversity
order in the first decoded data stream of a separately encoded SM system with DF receivers
in the L = 2 case6. As a side product, here we reach the same conclusion in the antenna
selection context.
Finally we note that this antenna selection rule is in general sub-optimal with respect to
the diversity order for the whole system. The reason is that although Pe1 in (2.39) is
minimized, Pe 2 is not affected by the selection process. Rather, it behaves the same as in a
non-selection scheme with N R -order diversity. Therefore Pe
max{Pe1 , Pe 2 } is mostly
dominated
order
by
the
second
stream,
and
the
diversity
is
given
by
34
Here we apply it in SM systems with DF receivers with the goal of minimizing the error rate,
and show that it also maximizes the diversity order, therefore verifying our observations in
[108] and revealing its great potential.
DF
Proposition 2.4: d opt
( NT 1)( N R 1) .
Proof: For simplicity we mainly focus on ZF-DF receivers. From a geometrical viewpoint,
this incremental antenna selection procedure starts by seeking the column vector with the
largest norm (or the largest projection height to the null-space); and in each of the following
steps, one column with the largest projection height to the space spanned by the selected
column vectors is chosen until the Lth antenna is selected. The detection order is the reverse
of the selection order, i.e., the stream decoded at the lth step is transmitted from the antenna
selected at the ( L l + 1)th step. The corresponding post-processing SNR for the stream
decoded at the lth step is then proportional to the maximum value among NT L + l
independent random variables distributed as 2 (2( N R L + l )) , resulting in a diversity order
of ( NT L + l )( N R L + l ) . Therefore for L = 2 , the first decoded stream achieves a diversity
order of d1 = ( NT 1)( N R 1) and the second decoded stream achieves d 2 = NT N R , and the
diversity order for the whole system equals ( NT 1)( N R 1) .
For MMSE-DF receivers, the algorithm is slightly modified: at the lth step, a column h ( l )
is selected such that:
l = arg max
l
1
[[H (l 1) , hl ] [H ( l 1) , hl ] + 1/ 0 I ]ll1
H
35
where H ( l 1) is the matrix formed by the previous selected l 1 column vectors, and
[H ( l 1) , h l ] means appending hl to the last column. Following the proof of Lemma 2.1 (in
36
Using the same geometrical approach, we can also obtain the diversity-multiplexing tradeoff
curve introduced in [104] for the separately encoded SM systems with antenna selection.
With quasi-static fading assumption, a family of codes { ( 0 )} over a block length shorter
than fading coherence time is employed, one at each SNR level. We further assume that the
rate of the code increases with SNR, so a scheme achieves a multiplexing gain r if the rate
R ( 0 ) = r log 0 . Based on the diversity order analysis in Section 2.2.3.1 and 2.2.3.2 (see
especially proof of Lemma 2.1 in Appendix A), we get the following equation:
Pe
Pe _ max
37
Pout _ max ,
where Pout _ max can be viewed as the outage probability of the worst stream for linear
receivers, and that of the first decoded data stream for DF receivers, respectively. The
diversity-multiplexing tradeoff curve d (r ) can be evaluated directly from Pout _ max as
0 :7
r
(1 )
Pr RSL L 0 L
r
M (1 )
(1 Lr )
L
,
=
0
where M = ( NT 1)( N R 1) .
Therefore (2.15) is proved and we finalize the proof of Theorem 2.1.
2.2.4 Extension to General L
Analyses in Section 2.2.3 can be partially extended to the general scenario. In particular, the
diversity lower bound can be obtained following a similar approach. In contrast, a tight
diversity upper bound could not be achieved with straightforward extension. Evaluations
become more involved as now the post-processing SNR is proportional to the squared
projection height from a column vector to a non-degenerated space. In the following, we
present our results for general L , highlight the key challenges, and finally give our
conjecture and future direction.
Our main result for general L is given below, which should be compared with Theorem
2.1.
38
(2.49)
where M L = ( NT L + 1)( N R L + 1) , and M U = ( NT L + 1)( N R 1) . The optimal diversitymultiplexing tradeoff curve is bounded as:
r
r
M L (1 ) + d opt (r ) M U (1 ) + .
L
L
(2.50)
We will mainly focus on the extension for linear receivers; those for diversity order of DF
receivers and diversity-multiplexing tradeoff are relatively straightforward and will be briefly
discussed.
Employing the antenna selection method (2.10), we can then derive a similar outage
probability expression as (2.21):
U2
, min{Rk( NU ) } x)
U NU
(2.51)
N
= P r Ai ,
i =1
( j)
k
39
NT
events { Ai } are
Aj = R (ji()i ) x , 1 j N ,
1i NU
where 1 j (i ) L denotes a pick from subset U i . Clear (2.23) still holds and we proceed
with the evaluation of upper and lower bounds.
Proposition 2.5: For general L , the optimal diversity order for linear receivers can be lower
L
bounded as dopt
( NT L + 1)( NR L + 1) .
Proof: From the definition of Ai and U1 ~ U NU , in any Si (the set of random variables in Ai )
we can always find a subset bearing the form Si _ indep = Rk(1j1 ) , Rk(2j2 ) ,
, Rk N NTL+L1+1 , with
(j
NT L + 1 random variables. In this form, Rk( j ) is slightly modified from Rk( j ) with k
indicating the index of column vector in the original channel matrix H , instead of H j , i.e.,
the squared projection height from h k (instead of h (k j ) ) to the subspace spanned by the
remaining column vectors in subset U j , with the implication that h k U j . Here k1 ~ k NT L +1
are some NT L + 1 distinct integers within [1, NT ] , and U j1 ~ U jN
T L +1
is an ordered list of
NT L +1
(2.52)
(2.53)
On the other hand, for L > 2 scenarios, the derivation of a tight lower bound for Pr( A1 ) is
much more involved as compared to the L = 2 case, because the angles { k(1) } are correlated
in a complicated manner, and a general form of their joint PDF expressions is not accessible.
Nonetheless, we have the following result.
Proposition 2.6: For general L, the optimal diversity order for linear receivers can be upper
L
bounded as d opt
( NT L + 1)( N R 1) .
Proof: Since the projection height from a vector to a subspace represents the shortest distance
from the vector to any point in the subspace, we have Rk( j ) Rkl( j ) , for any h (k j ) , h l( j ) U j ,
where Rkl( j ) denotes the squared projection height from h (k j ) to hl( j ) . It is then not difficult to
build up the following lower bound:
1i NU
(2.54)
Carefully examining the first two elements in all subsets (see (2.1)) reveals that the last
expression in (2.54) bears a similar form as the Pr( A1 ) in L = 2 case (see (2.22)), replacing
NT 1 with NT L + 1 . Following the same lines as in Section 2.2.3, we have for general L
41
(2.55)
Combining the above two propositions, (2.49) is proved for linear receivers. Also, as for
the L = 2 case it is straightforward to show that (2.49) applies for the first decoded data
stream of DF receivers. Since the diversity order of the first decoded data stream is upper
.
Remarks: Note that when L = 2 , the two bounds in (2.49) and (2.50) coincide and conform to
the results obtained in Section 2.2.3. A conjecture on the diversity order of separately
encoded SM systems with transmit antenna selection and linear ZF receivers was made in
[36] based on numerical results, which actually has motivated our research: for linear ZF
receivers, when N R = L , the achievable diversity order is NT L + 1 . Our results prove its
correctness and further extend it to general N R .
42
Figure 2-6 The Exponential Behaviors of the Outage Probabilities for the
N T = N R = 4, L = 3 Scenario
In Figure 2-6 we investigate the exponential behavior of Pr( RSL x) and Pr( A1 ) for an exemplary
scenario N T = N R = 4, L = 3 through simulations. By comparing with the reference curve x 4 , we
find that both of them present a diversity of M L = 4 , verifying its achievability as we claim in
Theorem 2.2. On the other hand, it shows that in this scenario the probability lower bound Pr( A1 )
also achieves the diversity lower bound M L , revealing that the diversity orders between M L + 1 and
M U may actually not be achievable. We thus have the following conjecture, which constitutes part of
our future work. The key seems to lie on finding a better lower bound of Pr( A1 ) than (2.54).
Conjecture: for general L , the optimal transmit antenna selection achieves a diversity order exactly
equal to M L .
43
2.2.5 Summary
In Section 2.2 we have analyzed the diversity order achieved by transmit antenna selection
for separately encoded SM systems with linear and DF receivers. Using a geometric
approach, we have rigorously derived their achievable diversity order for the L = 2 scenario.
We have also used the same geometrical approach to obtain bounds on the achievable
diversity order for general L . Our results prove and extend the previous conjectures in
literature drawn from simulations, and verify the predicted potential of antenna selection for
practical spatial multiplexing systems. Furthermore, the proposed geometrical approach may
be also used to solve other open problems related to MIMO.
Besides verifying the conjecture for general L , the analysis for maximum-likelihood
receivers, joint transmitter and receiver selection, and multiuser MIMO scenarios also direct
our future research.
44
link (or other similar brute forcing methods like in [29][36]), may be too cost-inefficient to
be applied.
In this section, we try to look into the other important topic of antenna selection: the
selection algorithm designs in MIMO-SM systems.
The most common antenna selection algorithm design comes from the one that
maximizing the Shannon capacity for the selection subchannel. Hence the optimal selection
comes from the exhaustive search over all possible antenna subsets [29][56]. On the other
extreme, the simplest algorithm called power-based selection, selects the antennas with the
largest channel gains and performs well only at low SNR regime [52][54] (also note that,
PBS is optimal for AS in MIMO spatial diversity schemes, as discussed in Section 2.2.1 and
[1][30][37][79]). Some other algorithms are proposed with good trade-offs between
performance and complexity, for example, the novel near optimal iterative algorithms in
[24][31], and the fast algorithm called correlation-bases selection in [6]. All the above
algorithms require instantaneous channel state information, and may present some difficulty
in channel environments with fast fading or high mobility. On the other hand, in realistic
outdoor channels, the channel correlation is a function of the local scattering environment
and thus varies on a much slower time scale than instantaneous channel coefficients.
Compared with instantaneous CSI-based AS, there is relatively little work in the literature
done on antenna selection for capacity maximization based on channel statistic information.
For error rate minimization in spatial multiplexing systems, we can find antenna selection
algorithms based on both instantaneous CSI (e.g. [36]), and channel correlation matrices (e.g.
45
[28][57]). An important figure of merit for error rate minimization is the maximization of the
post-detect SNR in the weakest sub-stream, as discussed in the previous section. It is also
noteworthy that in most of the time the antenna subset for capacity maximization and error
probability minimization are derived almost simultaneously, as will be explained in detail
later on in this section. Finally, a noticeable work comes from [84], which is sometimes
called beam selection, and essentially generalizes antenna selection systems as mapping from
RF chains to antenna elements by a matrix composed by arbitrary phase-shift-only values,
which is realizable in the RF domain. Then the AS algorithms in [84] boil down to adapting
the mapping matrix based on full or partial CSI (i.e. the channel correlations).
In this section, our attention is paid on some fast AS algorithm designs under realistic
MIMO channels, which usually present fading correlations. Motivated by the matrix
determinant properties of Hermitian positive definite matrices, fast transmit antenna selection
algorithms are explored considering both capacity and error rate, based on both instantaneous
CSI and channel correlation matrix. Specifically, Gram-Schmidt algorithm performs near
optimal, while the novel G-circles algorithm achieves many advantages over all the other
existing schemes.
2.3.2 System model and Problem Formulations
As in the previous section, we suppose that there are NT transmit and N R receive
antennas in a spatial multiplexing MIMO system. In a block fading channel model, we select
L from NT transmit antennas and connect them to the L available RF chains. No CSI is
available at the transmitter, so the selection might be implemented at the receiver, and the
46
selected antenna indices are fed back so that the transmitter can equally allocate its power
among L selected antennas. We denote H as the N R N T complete channel matrix, and H SL
the selected N R L sub-channel. The capacity after antenna selection can be expressed as:
C = log 2 det I L + SL
SL .
L
(2.56)
where I L is an L L identity matrix, is the average received SNR at each receive antenna,
and the operator
correlation (e.g. urban outdoor downlink channel), the corresponding channel matrix can be
modeled as [37]:
H = HW R1/T 2
(2.57)
[ RT ]ik = exp 2 j (i k )
S
s =1
cos s ,
(2.58)
47
be large enough compared with , the key factor influencing the channel conditioning is the
range of DOD, or the angle spread of transmit scatterers.
H
SL . We can then
Maximizing (2.56) is equivalent to maximizing det ( L / )I L + SL
G=
,
L
/
NT
(2.59)
and let G SL be the corresponding sub-matrix after transmit antenna selection, whose first N R
rows form the N R L channel matrix H SL . By further defining
H
Z SL = G SL
G SL ,
(2.60)
we can easily get that optimal selection is actually the exhaustive search for L columns in G
that maximize det ( Z SL ) . Assuming that L rank (H ) , then Z SL is a Hermitian positive
definite square matrix, which contains real positive eigen-values [51].
Also det ( Z SL ) bears the following properties:
Property 2.1:
In the following parts of this section, fast antenna selection algorithms will be explored based
on these two properties. These algorithms target on either capacity maximization or error
48
equivalent to selecting L antennas such that the volume of the L-dimensional parallelotope
generated by the L selected column vectors in G SL is maximized.
From Property 2.1 and the analysis of Rll above, we can easily get that such volume equals to
Rll . See Figure 2-7 for two and three dimensional examples.
l
49
H SL (i.e. the ratio of the largest singular value to the smallest one is not large) with large
channel power, so that the capacity in (2.56) can be maximized.
On the other hand, if H SL approximated maximizes the channel capacity, with a high
probability it also achieves minimum error rate for SM-MIMO schemes (V-BLAST structure
[22][95]), because intuitively the channel matrix is well-balanced on each data stream, so that
the weakest link, which usually determines the system error probability, is strong.
Specifically for an V-BLAST SIC receiver, which essentially takes QR decomposition of the
(ordered) selected channel matrix H SL before the successive interference cancellation
50
procedure [57][95], the GS method is a good choice for the error rate minimization, because
in general the smallest Rll , which represents the weakest data link, can be approximately
maximized. This algorithm is fast because only vector/scalar multiplications and additions
are involved. However, it requires instantaneous CSI and cannot be implemented only based
on channel statistics.
H
are to be selected. Denoting {l } as the eigen-values of the square matrix T( L ) = H SL
H SL , it is
(l )
(2.61)
H
H
H SL ) is upper bounded by max ( H H H ) , and a large min ( H SL
H SL )
Therefore max ( H SL
basically results in a small channel conditioning number: = max / min , desirable for
capacity maximization, especially at high SNR. To avoid investigating the eigen-values of all
H
H SL ) . It can be
possible antenna subsets, we will focus on the approximation of min ( H SL
51
proved by (2.61) that min is decreased after each selection. Our strategy is: in each step we
select one column in H so that the decrease of min can be approximately minimized.
The G-circles theorem gives us an approximation of the eigen-value distributions of T( L )
[51]:
H
Theorem 2.3 (G-circles): The L eigen-values of T( L ) = H SL
H SL are trapped in the circles
[T
k l
( L)
k l
(2.62)
l h( l )
rl = h(Hk ) h( l ) .
k l
52
(2.63)
An example of G-circles for T(3) can be found in Figure 2-8. Since the eigen-values are all
real positive numbers, they are actually distributed on the real axis within the range of Gcircles. From (2.63), a large center of the lth G-circle represents a large channel gain of
transmit antenna (l), while a small radius means that antenna (l) has low correlations with all
the other selected antennas. A lower bound of min is found from (2.63):
k l
(2.64)
which is the left most point among all the L G-circles. To approximately minimize the
decrease of min in each step, we maximize the lower bound of min in (2.64), motivating the
following algorithm, where (l ) and (l ) represent selected and remaining antenna sets at
step l respectively:
Algorithm 2.1 (G-circles):
Select h (1) from H with the largest norm h (1) , (1) = {(1)}, (1) = {i}i (1)
For l=2:L
For i (l 1)
temp = (l 1) , i
LBi = min h( k )
j ,ktemp
H
( j ) h( k )
j k
End
Select (l ) = arg max LBi
(l )
( l 1)
,(l ) , (l ) (l 1) {(l )}
End
53
Initially, we select the antenna with the largest channel gain. In the following steps, selecting
one more antenna results in adding one more G-circle and the expansion of the radii of
existing G-circles. From a geometric viewpoint, the maximization of (2.64) requires selecting
one antenna with large norm and small fading correlations with all the other selected
antennas. G-circles method is simple compared with existing algorithms, because only vector
multiplication and scalar additions are involved. In particular, it is also simpler than the CBS
algorithm in [6], which requires the calculations of the correlation between any two possible
transmit antenna candidates.
On the other hand, in fast fading channels, instantaneous CSI-based transmit antenna
selection is hard to be implemented, with the concerns of both channel variation and training
overhead. Therefore it is desirable to develop antenna selection algorithms based on slowly
varying channel statistics. At high SNR, we can approximate (2.56) by the equation
H
H
det( L / I L + H SL
H SL ) det(H SL
H SL ) . If only fading correlation information is available for
H
antenna selection, we need to maximize det(H SL
H SL ) based on the knowledge of R T . The
R T corresponding to the selected antennas. From matrix determinant property [51], we can
H
det H SL
H SL = det R1/T _2 SL HWH HW R1/T _2 SL
((
= det ( R
= det R1/T _2 SL
T _ SL
54
R1/T _2 SL HWH HW
) det ( H
H
W
HW
).
(2.65)
When only R T is available for antenna selection to maximize (2.65), it is natural to get the
following fact, which is also formally proved in [84]:
Fact 2.1: To maximize (2.65) if only R T is available, L transmit antennas are chosen
in (2.64).
Note that in step 1, since all the diagonals of R T are identical, we do not have the freedom to
select the antenna with the largest channel gain. Therefore initially we simply select two
antennas with the smallest correlation.
55
56
performance loss (about 1dB). It also yields uniformly better performances over the CBS in
[6], especially for well-conditioned channels.
det R T _ SL in (2.65), which in general represents the optimal RT -based antenna selection for
capacity maximization (c.f. Fact 2.1). From Figure 2-10, we see that all the RT -based
algorithms perform near optimal for ill-conditioned channels. The RT -based G-circles
method even outperform its counterpart based on instantaneous CSI for channels with
57
< 20o , since for ill-conditioned channels RT _ SL dominates the eigen-value distributions
H
in H SL
H SL .
Finally we investigate the BER for the proposed antenna selection schemes with SIC
receivers in V-BLAST systems. QPSK modulation is employed. Generally speaking, the
error rate performances have trends similar to their capacity counterparts. From Figure 2-11,
we can see that in well-conditioned channels, the G-circles method greatly outperforms CBS.
H
The GS method performs close to the exhaustive search for the largest min (H SL
H SL ) for any
channel conditioning situation. For ill-conditioned channels, the RT -based G-circles method
performs close to the exhaustive search for the largest min (RT _ SL ) and achieves considerable
selection gain over the MIMO system without antenna selection.
58
2.3.6 Summary
In this paper, motivated by some matrix determinant properties of Hermitian positive definite
matrices, we develop fast MIMO transmit antenna selection algorithms considering both
capacity and error rate. The GS method is shown to achieve near optimal performances for
any channel conditioning situation. For the simpler G-circles method, compared with optimal
selection it reduces the complexity significantly with reasonable performance loss; compared
with the GS method, it is simpler and can be implemented only based on RT ; compared with
CBS, it is simpler with uniformly better performances and can be implemented for RT -based
selection.
Compared with Section 2.2, this section looks into the practical AS algorithm design
problems. Although not achieving optimal capacity/diversity/error probability performances,
the proposed algorithms provide good tradeoffs between performance and complexity. On
the other hand, we stress that in many practical MIMO systems with relatively small number
of antenna elements, optimal performance achieving methods (e.g. those mentioned in
Section 2.2, or in [29][36]) can be readily applied without imposing much computational
burden.
Until this point, we have explored the potential of antenna selection, and how to design
effective AS computation algorithms. Then naturally we are facing the following question:
how to encompass AS into commercial wireless systems, or more specifically, into the
wireless standards. As one particular solution in WLAN, we will present the training and
calibration methods of AS in the emerging IEEE 802.11n standard.
60
As discussed above, antenna selection is a promising technique which explores the diversity
gain of MIMO channels while maintaining spatial multiplexing gain. It is then of particular
interest for us to address the problem of how to implement it into realistic wireless systems.
On the downside, to perform antenna selection the complete channel matrix is estimated
by sending training frames to measure the complete CSI, which causes increased overhead.
Therefore the core issue of antenna selection implementations is how to make the balance
between reducing AS training overhead and maintaining appreciable performance
enhancement caused by AS. The basic answer is: the AS training protocol designs should be
closely related to the baseline PHY and MAC protocols and the wireless environment
properties. To illustrate this idea, we present our AS training/calibration protocol proposed
for the emerging IEEE 802.11n High-Throughput WLAN standard [105].
WLANs based on the IEEE 802.11 standard [53][60], currently are one of the hottest
sectors of the wireless market. While the current IEEE 802.11a standard, which is based on
OFDM, is limited to data rates of 54 Mbit/s , the emerging IEEE 802.11n high-throughput
WLAN standard combines OFDM with MIMO techniques to achieve effective data rate in
excess of 100Mbps, as observed at MAC layer service access point [105].
The modem design of 802.11n employs closed-loop schemes, which require channel-state
information at the transmitter. Since the channels in WLANs exhibit slow time variations
61
(low Doppler spread around 5Hz [107]), the transmitter CSI, obtained by feedback or
channel estimation in the reverse link, does not get stale at the instance of transmission,
making it well suited for implementing closed-loop MIMO algorithms. One good example is
transmit beamforming with fast link adaptation techniques as foreseen in the current standard
draft [105]. Another example for closed-loop MIMO is transmit AS, which is the focus of
this section.
Antenna selection is particularly beneficial for WLANs for the following reasons:
1.
2.
A potential problem of antenna selection is the increased hardware effort that is required
by the antenna selection training. If all possible antennas are trained at the beginning of each
packet, fast solid-state switches, and fast AGCs are required, leading to large switching loss
[83]; furthermore, the PHY-layer protocols have to modified considerably from the nonselection case.
In the subsequent subsections, we introduce a MAC-based AS training protocol that
eliminates all of these problems. In our scheme, different antenna subsets are trained in
multiple data packets (burst), and signaled only in the MAC headers. Numerical results show
that switching antenna subsets between packets does not significantly reduce the
performances, thanks to the low Doppler spread of WLAN channels.
62
Another important issue of implementing AS, largely ignored previously in the literature,
is the RF imbalance caused by antenna switching, because essentially different combinations
of RF chains and antenna elements may induce non-identical channel gains in the equivalent
baseband channels. We then address this problem by proposing a novel calibration
procedure.
By our efforts, the proposed training/calibration protocol has already been accepted in the
current IEEE 802.11n draft specifications [105].
In the following, after short descriptions of 802.11n MIMO-OFDM PHY and MAC
structures, we introduce the MAC-based WLAN AS training protocol; then we provide the
solutions used for addressing AS with RF imbalance, followed by numerical results.
63
achieving high-throughput, which contains both PHY layer transmission feature signaling,
and HT-STFs, HT-LFTs for receiver AGC setting and MIMO channel estimations in each
subcarrier. Finally the data payload follows the preambles in each PHY layer packet.
The MAC layer signal of 802.11n contains a MAC header and data payload. Except the
conventional contents like transmitting and receiver address, the most PHY layer packets
encompass a HT control field in their MAC headers. Such a field include the necessary
information used for achieving high-throughput features, e.g. TX BF, link adaptation and
other advanced MAC improvements. Our proposed AS training/calibration protocol will also
utilize this field. The CSMA/CA protocol in MAC theoretically guarantees that at any time
instance one station only communicates with a single peer station (like TDMA), so that we
only need to build up the system model based on point-to-point MIMO-OFDM.
65
Now we move back to antenna selection in high-throughput WLAN. For the ease of analysis
in this section, we re-define the mathematical model:
In the MIMO-OFDM system applying AS (Figure 2-1), the transmit STA A has a set of
N A antennas with nA transmit RF chains, while N B and nB are similarly defined at the
receive station B. In general each AS training cycle consists of an AS training phase and a
Several AS training fields are transmitted in each AS training phase, each of them is
transmitted from and/or received by one subset of antenna elements to be selected. The
antenna selection computation is based on the complete channel matrix composed of the
subchannels estimated from all the AS training fields. In the data transmission phase, a
relationship between a transmitted signal and a received signal in one subcarrier (for
denotation simplicity we omit the subcarrier index here) can be expressed as:
rB = FBH [ H AB FAs A + n] ,
66
(2.66)
previous discussions and from those in the literature, now we consider the realistic case, in
which the equivalent channel H AB also includes the impact of the RF responses:
(2.67)
where H AB is the actual propagation channel, C A,Tx (FA ) is a N A N A diagonal matrix whose
i-th diagonal element [C A,Tx (FA )]ii collects the RF response corresponding to the i-th transmit
antenna element, which is a function of the antenna selection matrix FA : If the i-th row in FA
contains all zeros, the i-th antenna is not selected, so [C A,Tx (FA )]ii = 0 ; If the element at the i-
th row and l-th column of FA is one, the i-th antenna is selected and is connected to the l-th
transmit RF chain during the data transmission phase. Then [CA,Tx (FA )]ii = li(Tx ) , which is a
complex number characterizing both the amplitude and phase shift of the RF response (seen
67
(2.68)
where s A,t and rB,t are the training and received vectors; TA (m) and TB (m) are the
predetermined antenna mapping matrices in the m-th AS training field, indicating the
connections of all the available RF chains to the m-th antenna subset. All these antenna
subsets
are
typically
exclusive
with
each
other.
For
example,
if
0
0
0
1
and TA (2) =
1
0
0
0
0
0
.
0
68
HAB (m) = TBH (m)C B , Rx (TB (m))H AB C A,Tx (TA (m))TA (m) ,
(2.69)
and the AS computation is conducted based on the following estimated complete channel
matrix:
HAB = CB , Rx H AB CA,Tx ,
where
the
diagonal
matrix
CA,Tx
contains
(2.70)
all
non-zero
diagonal
values:
[CA,Tx ]ii = [CA,Tx (TA (m))]ii , if the i-th antenna element is trained by the m-th training field, and
CB , Rx is similarly defined. Therefore AS computation is based on the estimated complete
matrix HAB , i.e. by a certain AS criteria X , the selection can be expressed as:
{FA,opt , FB ,opt } = arg max X (FBH HAB FA ) .
(2.71)
FA , FB
(2.72)
Then X (H eq ) may not be optimal, because the RF responses of the used RF chains are
different in the two phases. This effect is called the RF imbalance. In the example of
69
11(Tx )
( Tx )
22
( Rx )
.
= C B H AB
H AB
13(Tx )
24(Tx )
(2.73)
H AB
11(Tx )
( Rx )
= C B H AB
23(Tx )
(2.74)
(Tx )
, and transmit antennas 1 and 3 may not be
there will be a distortion caused by 13(Tx ) 23
the optimal subset. For simplicity and without loss of generality, we henceforth use the
following constraint: for any selected antenna subset, a RF chain with smaller index number
always connects to an antenna with smaller index. With this constraint, in both the AS
training phase and the data transmission phase there are totally nA ( N A nA + 1) possible
connections of RF chain with antenna element at STA A, and all the possible RF responses
can be expressed as:
a11(Tx )
a12(Tx )
a22(Tx )
a23(Tx )
a1((TxN) n
a2((TxN) n
A +1)
A + 2)
70
an(Txn )
an(Tx( )n +1)
A A
an(TxN)
A
(2.75)
Given the above introductions on 802.11n PHY and MAC structure and AS models, we
are ready to present the proposed AS training protocol. The widely accepted method for AS
training is the one that sending consecutive training fields one right after another, so that the
channel variation on these training fields is minimized. This corresponds to increased number
of STFs and LTFs in the PHY preamble, as illustrated in Figure 2-13. However, this
scheme will definitely increase the overhead, and brings in burdens on PHY signaling, which
explains the reason why it is hard to be accepted in the standard [105]. Moreover, this
scheme will lead to the deployment of fast solid state antenna switches (in nano seconds),
which will cause appreciable switching loss [83]. On the other hand, the low Doppler spread
of WLAN channels (see Figure 2-15 for a WLAN channel realization [107], where channel
model B means one specific model with relatively low frequency selectivity) allows us to
propose a MAC-based AS training, in which the AS training phase is formed by a sequence
of M consecutive training packets, each containing one of the M AS training fields
transmitted from and/or received by one of the M disjoint antenna subsets. All the training
information is signaled in MAC headers, where the dedicated high-throughput control field is
already defined for signaling the new MIMO high-throughput features such as transmit
beamforming and fast link adaptations [105], as introduced in Subsection 2.4.2. Therefore the
proposed training method greatly reduces the required modifications in the standard.
71
Specifically, these training packets should be sent in burst, as illustrated in Figure 2-16, an
example of transmit AS training only. This protocol can be described as follows: the receiver
may choose to initiate the AS training cycle by sending a transmit AS request (TXASR),
whenever the current selection result gets stale. Or the transmitter can initiate its own AS
training cycle at a predetermined time, or when it observes more frequent re-transmissions of
packets. Then the transmitter sends out M = N A / n A consecutive AS training packets with
SIFS, equal to 16 s [105], each containing the regular long and short OFDM training fields
in its preamble as defined in [105], and transmitted from one subset of nA antennas. On
receiving these packets, the receiver conducts channel estimations to establish the complete
channel matrix in each subcarrier. Finally the receiver may either implement AS computation
72
and feedback the selected antenna indices, or directly feeds back the complete channel
matrices for the transmitter to conduct the selection.
The receiver AS training process can be similarly defined, except that now different AS
training packets are received by different receive antenna subsets. When both sides conduct
antenna selection, the two training processes can be done one after another. Note that these
AS training packets may also contain data payload. In that case, some back-off strategies,
e.g. applying the lower level of modulation and coding schemes, are necessary, because the
link adaptation output regarding the previously selected antenna subset is not valid after
switching. The time available for switching the antennas is now one SIFS, allowing to
implement the MEMS based switches, which have much lower switching attenuation than
solid-state switches [74].
73
74
On receiving these training packets, the receiver (STA B) estimates the corresponding
subchannels, denoted as HAB (1)...HAB ( N A nA + 1) , and feeds them back after receiving all the
training packets. The transmitter then determines its RF imbalance correction coefficients
based on all the estimated subchannel matrices fed back from STA B. When STA B also
conducts receive AS, i.e. N B > nB , it should use a predetermined subset of receive antennas,
each connected to a predetermined receive RF chain on receiving all the training packets in
Figure 4. The correction coefficients are determined as follows: by ignoring channel
estimation errors and assuming static channel during the transmission of all the AS
calibration training packets,
75
(11)
(22)
hAB
hAB
,11
,12
(11)
(22)
hAB ,22
h
HAB (1) = AB ,21
(11)
(22)
hAB
,n 1 hAB ,n 2
B
(n n )
hAB
,1n
(n n )
hAB
,2 n
,
(n n )
hAB ,n n
A A
A A
(2.76)
A A
B A
( li )
( Rx )
(Tx )
where h A B , j i = l j h A B , j i li stands for the equivalent channel coefficient involving
B
all the RF responses; hAB , jB i is the actual physical channel coefficient from transmit antenna
similarly based on different transmit RF chain and antenna element connections following
the corresponding rows in (2.75). For the i-th transmit antenna, we then do the following
calculation:
li =
( li )
AB ,nB i
for every l Li , where Li is the set of RF chain indices that are possible to be connected to
antenna i according to (2.75). Then, li is multiplied with the baseband signal transmitted
from RF chain l, whenever it is connected to antenna i. As a result, any transmission from
(Tx )
antenna i leads to a corresponding transmit RF response min{
Li }i . As special cases, transmit
antennas 1 and NA are always connected to RF chain 1 and nA , respectively following the
constraint in (2.75), so no correction is needed for the transmissions from them. By doing the
76
same calculations and by applying the results for all transmit antennas, at any time the
equivalent complete channel matrix can be expressed as:
( Tx )
, min{
,
L }i
i
, n(TxN ) } ,
A
there is no distortion between the AS training phase and the data transmission phase. Note
that these correction coefficients are applied in both the AS training phase and the data
transmission phase, and is equivalent to replacing the 1s in FA or TA(m) by the
corresponding correction coefficients { li } . The above calculations can be repeated nB times,
corresponding to jB = 1
77
when the connection constraints in (2.75) does not hold (i.e. Li contains any RF chains for
any antenna i ).
Finally, in WLAN the calibration frame exchange sequence in Figure 2-17 can be
conducted by utilizing a normal AS training phase as in Figure 2-16, where the receiver
should feedback CSI only. Consequently, the peer station does not need to know the current
AS training packets are used for normal AS training or AS calibrations, therefore no extra
signaling needs to be defined for calibrations.
2.4.6 Numerical Results
ms during the data transmission phase, so that the 10000 packets may experience sufficient
channel variations. For comparison we also simulate the AS training method where all of the
78
M=2 training fields are sent in one packet by extending its PHY preamble and ignoring the
switching loss (we call this scheme as PHY-based in the figures). The parameter TAS
defines the length of the AS training cycle. Since the channel encoding and interleaving are
conducted over all spatial data streams and all sub-carriers, it is natural to deploy the antenna
selection rule which maximizes the aggregated 2 2 MIMO channel capacity over all
subcarriers. From the PER results in channel model B (Figure 2-18), where the channel is
under relatively low level of frequency selectivity [107], we see that the proposed MACbased AS training method leads to almost the same results as PHY-based training method. It
is also noticeable that in reality the MAC-based method will even outperform the PHY-based
one by a few dBs, when considering the reduced switching loss by introducing MEMSbased antenna switches. From the same figure, we also see that the gains of applying AS in
79
WLAN are tremendous (5dB when TAS = 10ms , and more than 1dB when TAS = 100ms ). We
stress that many other effective AS rules have been developed in literature to achieve
different tradeoffs between performance gain and sensitivity to TAS , and the problem of
finding these AS rules, a topic beyond the scope of this paper, can be found in [37] and
references therein.
In channel model E (Figure 2-19), where the channel is much more frequency selective
[107], the relative gains of AS is reduced (although they are still as high as 3 dB
for TAS = 10ms ), because the less correlated sub-carriers make different antenna subsets look
more even with respect to the performance criterion (aggregated capacity or PER).
In the second scenario, RF imbalance is taken into considerations in channel B, where
the PER of 2-data stream WLAN system without AS, and MAC-based AS with and without
80
calibration (both setting TAS = 10ms ), are simulated. Each RF chain and antenna element
connection results in a baseband equivalent RF response li
( Tx )
distributed in 3dB , and phase uniformly distributed in . We can then see from Figure
2-20 that calibration alleviates the impairment caused by RF imbalance. Hence the proposed
AS calibration method, a process imposing negligible training overhead, will buy us about 2
dB gain in this scenario. It is also noteworthy that RF imbalance will degrade the
performance of 2x2 MIMO without AS, hence the gains achieved by applying AS is even
larger than in Figure 2-18.
Again we do not stress the practicability of the brute forcing AS algorithm. One the one
hand, it is not so costly in the N A = 4, nA = 2 scenario (6 possible subsets). On the other hand,
81
In this section we address two important issues for employing antenna selection techniques in
emerging high throughput WLAN systems: AS training protocol and RF imbalance
impairment mitigations. The proposed MAC-based AS training method minimizes the
amount of amendments required for accommodating AS in the new standard, and leads to
several other advantages such as ability to use switches with reduced switching loss. The
novel calibration process effectively alleviates the potential impairments caused by RF
imbalance, with negligible overhead. In general, the proposed techniques move a step closer
to the practical implementation of MIMO antenna selection techniques in high throughput
WLAN systems, and have been adopted in the recently adopted preliminary version of the
IEEE 802.11n baseline draft.
The above AS training/calibration protocol in WLAN is just one example of the
implementation of AS in commercial wireless networks. We believe that AS is also
applicable in some other similar systems, e.g. the MIMO-OFDM based WiMax wireless
access networks [106], DVB/DAB, and the 3GPP cellular networks [45].
2.5 Conclusions
In Chapter 2 we explore almost all aspects of antenna selection technology: we first investigate its
potential on achieving diversity increase; then we show that there exist practical antenna selection
82
algorithms achieving good tradeoffs between complexity and performance improvements; finally we
try to encompass antenna selection into a practical commercial wireless system, with particular
considerations on training overhead reductions and the alleviation of the impairments caused by RF
mismatches.
83
Chapter 3
The Diversity-Multiplexing Tradeoff of Ordered SIC
Receivers in MIMO Systems
3.1 Introduction
In the previous Chapter, we use geometric analytical tools to derive the diversity orders and
effective computation algorithms for antenna selection in MIMO systems. In this chapter, we
extend this approach to some other scenarios: the point-to-point or multiple access MIMO
systems deploying SIC receivers.
It is well known that MIMO fading channels can be explored to provide either spatial
multiplexing gain or diversity gain. The tradeoff between them is expressed by the diversitymultiplexing tradeoff curve [104]. In [88], the discussion of diversity-multiplexing tradeoff is
extended to multiple access channels, where the fundamental tradeoff among diversity gain,
multiplexing gain and multiple access gain are effectively characterized. The tradeoff
discussions in [104] and [88] mainly deal with the performance limits among all possible
MIMO schemes, i.e. optimal joint encoding and decoding are employed so that the channel
capacity is assumed to be achievable. There are also some discussions on sub-optimal and
84
practical encoding and decoding schemes, for example, the V-BLAST architecture [95], in
which different layers are separately encoded and transmitted without any transmitter side
channel state information [104]. The discussion on V-BLAST is naturally extended to
multiple access systems (or SDMA systems) in [88], where independent transmitters are
separately encoded, but can be jointly detected (through MUD).
This chapter is mainly focused on the impact of optimal ordering on the performance of
V-BLAST and SDMA schemes with SIC detectors, where ZF or MMSE processing is
applied in each stage for the residue interference cancellation. In [104][88], the tradeoff
curves of these schemes with fixed ordering are accurately derived. However, when ordering
is involved, only some loose performance upper bounds are provided (using genie-aided
approaches), which are shown to be still away from the optimal tradeoff curves. The
difficulty lies in that, the explicit distributions of the ordered channel gains (or capacities in
the SDMA case) are no longer accessible: it is in general a problem of order statistics among
inter-dependent random variables, an under-developed topic itself [17]. Recently, the
diversity property of the ordered SIC receivers with fixed data rate (i.e. the spatial
multiplexing gain r = 0 ) is partly analyzed for some simplified scenarios, or conjectured
from numerical results. In particular, in [66][67][49], the diversity order for a two-layer VBLAST scheme with an ordered SIC receiver is rigorously shown to be equal to that with
fixed ordering; while in [50][66] numerical results are provided to show that the diversity
order of SIC receivers in a V-BLAST system with more than two layers is not increased by
the ordering rule proposed in [95]. To the best of our knowledge, the diversity achieved by
85
ordered SIC receivers with general system settings has not been rigorously analyzed thus far.
In this chapter, using a similar geometrical approach as that proposed in Section 2.2, we
rigorously prove that ordering will not improve the performance of V-BLAST SIC receivers,
with respect to the diversity-multiplexing tradeoff, thus versifying the conjectures in [50][66].
Extending the study to SDMA SIC detectors, we give tighter bounds than those provided in
[88]. Particularly, when the data streams for different users are transmitted with fixed rate
( r = 0 ), the diversity order is not improved by applying optimal user ordering.
The rest of the chapter is organized as follows. The problem formulation is provided in
Section 3.2. Our result on the diversity-multiplexing tradeoff for ordered V-BLAST SIC
receivers with point-to-point channels is presented in Section 3.3, and is extended to multiple
access channels in Section 3.4. Finally Section 3.5 contains some concluding remarks.
We consider a frequency non-selective block Rayleigh fading channel model, for which a
point-to-point system can be expressed as:
y = Hs + n ,
(3.1)
where the N R t matrix y is the received signal block; the NT t matrix s is the transmitted
signal block, each row representing one separately encoded data layer with equal power
allocation; H = [h1 , h 2 ,
and n is the background noise matrix of size N R t . Because we focus on the non-ergodic
86
scenario in a quasi-static fading channel, where each codeword spans one fixed fading block
(i.e. in delay limited scenarios), the coding length t of each layer is actually immaterial in
our study on the diversity orders (thus can be chosen to be 1 for ease of analysis). As is
known, layered one-dimensional coding can only bring coding gain but not the diversity
gain.
Given the above channel model, following the same line as in [49] [50][66][67][88][104],
we at first apply the ZF-SIC algorithm at the receiver, with the understanding that its
diversity order analysis, a study at high SNR regimes, also applies to MMSE-SIC receivers
(as will be shown in Lemma 3.1). Specifically, in such a V-BLAST system [95] let
(l ) [1, NT ] be the transmit antenna index corresponding to the lth decoding layer. Following
the expressions listed in Subsection 2.2.2, at the first decoded layer, a spatial equalizer
g1 = H
(1)*
, where [ A](i )* is the (i)th row in the matrix A , is applied to the received signal
(3.2)
where 0 stands for the average SNR per receive antenna; s1 is the signal transmitted in
layer 1. The instantaneous channel capacity and error performance of this layer are
determined by the corresponding post-processing SNRs, which can be directly derived from
(3.2) as
0
NT
1 =
0
0
2
H
R(1), span{(2),(3)....( NT )} , 1 k NT ,
/ g1 =
/ H H (1)(1) =
NT
NT
87
(3.3)
1
(1)(1)
space spanned by h (2) ...h ( NT ) . In the lth layer, assuming perfect decision feedback, the spatial
equalizer g l is designed to null out the interference from the yet to be detected layers, then
l =
0
NT
,( NT )}
(3.4)
For a MMSE-SIC receiver, the spatial equalizer of the first layer is given by
1
g1 = ( H H H + NT / 0 I ) H H , and the post-processing SNR of the first layer is given by
(1)*
[64]:
1 =
where 1 =
N T [ H H + NT / 0 I ]
1
(1)(1)
1
. Similarly, we have l
1
[H H + NT / 0 I ](1)(1)
H
0 1
NT
0 l
NT
1 , 1 k NT ,
(3.5)
1 for l = 2...NT .
diversity order a communication system is defined as the slope of its joint error probability
Pe ( 0 ) , which indicates the probability that any layer declares erroneous reception.
R( 0 )
where R ( 0 )
0 log
0
stands for the current data rate, is concerned, a family of codes { ( 0 )} over a block length
shorter than fading coherence time is employed, one at each SNR level with the data rate
88
Lemma 2.1: ZF-SIC and MMSE-SIC receivers in V-BLAST systems have the same
NT
log Pr R(1), span{(2),(3)....( NT )} NT 0
.
d (r ) = lim
0
log(1/ 0 )
(3.6)
Proof: At first we show that the diversity order is determined by the first decoded layer,
for either ZF- or MMSE- SIC receiver, and for any ordering rule. We define Pl as the
average error probability of the lth decoding layer assuming perfect feedback (no interference
from the previously decoded layers), Pl J as the joint error probability of layers 1 to l, and
Pe as the system joint error probability. Therefore, we can naturally get P1J = P1 , Pe = PNJT
and
Pl J = Pl (1 Pl J1 ) + Pl J1 .
(3.7)
P2J = P2 (1 P1 ) + P1 .
(3.8)
max( P1 , P2 ) . By iteratively
max( P1 , P2 ,
together with identical noise statistics and transmit power across different layers, all the other
layers face less interference than layer 1. We then have Pe
89
Secondly, it was clearly shown in [104][90] that in non-ergodic scenarios the error
probability is dominated by the outage probability, then (3.6) applies to ZF-SIC receiver.
Finally, the diversity equivalence between ZF- and MMSE- SIC receivers can be verified
by (A.11) in Appendix A, then (3.6) applies to MMSE-SIC receiver as well.
detection step of the V-BLAST SIC receivers, is optimal with respect to the diversity order,
which is determined by
r
(1
)
NT
log Pr max Rk , Span{k } NT 0
(V BLAST )
,
d opt
(r ) = lim
0
log(1/ 0 )
(3.9)
where Rk , Span{k } is the squared projection height from h k to the space spanned by all the
other NT 1 column vectors.
Proof: From Lemma 2.1, since the joint error probability is determined by the first
decoded layer (i.e. Pe
Remarks: Lemma 2.1 implies two important facts: 1) for any V-BLAST SIC receiver, the
diversity order is only determined by the first decoded layer, even though error propagations
90
are present; 2) we only need to evaluate (3.6) for the diversity order properties of both ZFand MMSE- SIC receivers.
For a fixed-order V-BLAST SIC receiver, it can be assumed [49][66][104] (without loss
of generality) that detection starts from the layer corresponding to the first transmit antenna
and ends at that of the NT th antenna. So R(1), span{(2),(3)....( NT )} = R1, Span{2,3,
, NT }
and
r
(1
)
NT
log Pr R1, Span{2,3, , NT } NT 0
= ( N R NT + 1)(1 r / NT ) .
d (r ) = lim
0
log(1/ 0 )
(3.10)
When the ordering rule in [95] is taken into considerations (Section 3.3), the problem
becomes more involved, since different Rk , Span{k } in (3.9) are inter-dependent, and the exact
distribution of the post-processing SNR of the first decoding layer is in general not accessible
[88][104]. An exception is for the NT = 2 case [49][95], for which one has (see Figure 3-1)
91
Rij
hj
, 0 <ij <
of [95] is reduced to simply choosing the transmit antenna whose corresponding column
vector has a larger norm, therefore the asymptotic exponential behavior of its outage
probability can be explicitly explored. It is shown that in this case the diversity order is the
same as that of the fixed-order case [49][95]. However, the analysis for NT > 2 scenarios,
which will be rigorously derived in Section 3.3, cannot be solved with this approach.
3.2.2 Multiple Access MIMO Channels
For a multiple access (or SDMA) channel, multiple receive antennas can be used to
separate signals from different users transmitted in the same frequency-time slot, leading to
multiple access gains. We assume that there are K transmitters each equipped with N Tk
K
antennas, assuming that N TAll = N Tk N R . In this case (3.1) still applies, except that H is
k =1
now expressed as
H = [H1 , H 2 ,
, HK ] ,
(3.11)
, sTK ]T ,
(3.12)
in which the N Tk t sub-matrix s k is the data block from transmitter k. Data streams of one
transmitter are allowed to be jointly encoded, while those from different transmitters are
independent (which can be viewed as a generalized layered structure, each general layer
containing more than one data streams). If N Tk = 1, k , SDMA coincides with V-BLAST.
For analytical simplicity, we only investigate the ZF-SIC detector as suggested in [88].
Specifically, with fixed detection order (from user 1 to K), when detecting the data streams
for the kth transmitter, we null out the interference from transmitters k+1 to K by projecting
each column vector in H k to the null space of the space spanned by the column vectors in
H k +1...H K , after canceling the interference contributed by transmitters 1 to k-1 (fed back
NTj
(rk ) ,
(3.13)
j >k
Here for the ease of analysis, we focus on the symmetric scenario suggested by [88]:
d (r ) = d N
, N R ( K 1) NT
(r ) = [ NT - r ][ N R ( K 1) NT r ] ,
93
(3.14)
and we have the following analogues of Lemma 3.1 and Corollary 3.1, denoting (k ) as the
user index decoded in the kth stage
Lemma 3.2: For ZF-SIC multiuser detectors in SDMA systems with the symmetric setting,
the system diversity order is determined by that of the first decoded user,
d ( r ) = lim
(3.15)
max( P1 , P2 ,
symmetric settings. Finally it is shown in [104] that (3.15) determines the diversity order of
P1 , so as to Pe .
Corollary 3.2: With the settings in Lemma 3.2, the ordering rule that maximizes the per-
user capacity at each detection stage (or general layer) is optimal with respect to diversity
order, which is determined by:
( SDMA )
d opt
(r ) = lim
log(1/ 0 )
(3.16)
The proof follows straightforwardly that of Corollary 3.1, and is omitted here.
Suppose user k is chosen in the first decoding stage, its equivalent channel after nulling
can be expressed by
94
(3.17)
where hik,span{Hk } is the projection from the ith column vector in H k to the null space of the
space spanned by the channel matrices for all the other users. As indicated in [88], H kEq is
equivalent to a point-to-point MIMO channel with N T transmit and N R ( K 1) N T receive
antennas. Then Ck in (3.16) can be expressed by Ck = C ( H kEq , 0 ) , meaning the MIMO
channel capacity given the channel H kEq and SNR level 0 (assuming equal power
allocations). It was claimed in [88] that the diversity analysis, when ordering is involved, is
in general not accessible. We are able to solve it in Section 3.4, by applying the technique
proposed in the following section.
3.3 Ordered V-BLAST SIC Receiver
In this section, by applying the novel geometrical approach similar as that in Subsection
2.2.2, we rigorously prove the following Theorem:
Theorem 3.1: For general N R NT V-BLAST systems with SIC receivers, applying any
ordering rule will not change the diversity-multiplexing tradeoff of the system.
As indicated above, [49][66] verify Theorem 3.1 only for the simplest NT = 2 case, while
we will investigate the general scenario with arbitrary values of NT . As we know, an
exhaustive search among all the NT ! possible permutations targeting the minimum system
joint error probability represents the optimal ordering rule (and leads to the optimal diversity)
[66]. However, its diversity property is generally hard to analyze. Through Corollary 3.1, the
95
ordering rule proposed in [95], although not optimal in minimizing the error probability, is
optimal w.r.t. diversity order. We can then prove Theorem 3.1 by analyzing this specific
ordering rule.
We start from the fixed data rate ( r = 0 ) case. The outage probability of the first decoded
layer (c.f. (3.9)) can be upper bounded as
Pr{max Rk , Span{k } x} Pr{R1, Span{1} x}
k
for arbitrary positive value x . When x 0 , the asymptotic exponential behavior of the above
upper bound represents the diversity of non-ordered V-BLAST SIC receiver, which equals to
(3.18)
In the following we try to derive a tight probability lower bound bearing the same
diversity property.
Lemma 3.3: With the above settings, we have
Pr{max Rk , Span{k } x} x N R NT +1 .
k
(3.19)
Proof: For the ease of illustration and without loss of generality, we analyze the NT = 3
case, and the extension to general values of NT is straightforward, as will be explained at the
end of the proof. In this scenario, we can decompose h1 by Gram-Schmidt orthogonalization
and coordinate transformation [37] as (see Figure 3-2):
96
(3.20)
from
{h3 , h 2,3 }
to
{h 2 , h3 } in
the
space
span{2,3} such
that
2 =
cos 23
2
, and 3 = 3 2
.
sin 23
sin 23
97
(3.21)
It is known that the angle 23 is independent with R1, span{2,3} , as indicated in [55], so 2
and 3 are independent with R1, span{2,3} . We then have the following claim:
Pr{max Rk , Span{k } x} = Pr{R1, Span{2,3} x, R2, Span{1,3} x, R3, Span{1,2} x}
k
Pr{R1, Span{2,3} x, R2 b, R3 b, 2 b , 3 b },
(3.22)
where b is an arbitrary constant, R2 =|| h 2 ||2 and R3 =|| h3 ||2 . To prove this claim, we define
the following events:
A : R1, Span{2,3} x
B : R2 b, R3 b, 2 b , 3 b
(3.23)
Since R2, Span{1,3} is the magnitude of the projection from h 2 to the null space of span{1,3} , it
represents the shortest distance from vector h 2 to any points in span{1,3} . By choosing
{h1 , h3} as one basis of span{1,3} , together with (3.20) , it can be upper bounded as:
R2 h 2 ( 23h3 + 21h1 )
23 , 21
= min || R2 h 2 23h3
23 , 21
R2
22
R1, span{2,3} ,
(3.24)
where the inequality is derived by taking specific values of 21 and 23 , so that the
magnitudes in directions h 2 and h3 are zeros, i.e. 21 = R2 / 2 and 23 = 3 R2 / 2 . In
98
another word, we upper bound R2, Span{1,3} by (non-orthogonally) projecting h 2 onto span{1,3}
along the direction h1, span{2,3} . Similarly, we have
R3, Span{1,2}
R3
32
R1, span{2,3} .
(3.25)
It is then easy to see that given the event A B , event C is true, which proves the claim
(3.22). Also note that the random variables R2 , R3 , 2 and 3 are independent with R1, Span{2,3} ,
thus A and B are independent with each other, and the lower bound in (3.22) satisfies:
Pr{R1, Span{2,3} x, R2 b, R3 b, 2 b , 3 b}
= Pr{R1, Span{2,3} x}Pr{R2 b, R3 b, 2 b , 3 b}
(3.26)
x N R NT +1 ,
above, it is not difficult to see that the extension to the general NT scenario is straightforward.
Generally speaking, by the theorem of coordination transformation [37], (3.21) can be reshaped as:
= Q ,
where is the coordinates of h1 s projection on span{1} along the basis {h 2 , h3 ,..., h NT } ,
is its coordinates along the orthonormal basis obtained by Gram-Schmidt procedure, and
the transfer matrix Q is only associated with the directional relationships among
99
{h 2 , h3 ,..., h NT } . Both and Q are then independent with R1, span{1} [49][55], so is .
Therefore we can build up a probability lower bound as in (3.22), whose proof follows the
same line as in (3.23)(3.26).
Finally by combining (3.18) and (3.19), it is shown that the diversity of the ordered VBLAST SIC receiver is the same as the non-ordered case.
The analysis is easily extendable to r > 0 cases, where the outage is now defined as the
event that the instant code rate R ( 0 ) = r log 0 is larger than the channel capacity
conditioned on the current channel state. Therefore, from (3.9) and the analysis above, we
can easily derive the same result as (3.10), so that Theorem 3.1 is proved.
and upper bounds of the diversity-multiplexing tradeoff hold for any ordering rule:
d L (r ) d (r ) dU ( r ) ,
where d L (r ) = [ NT - r ][ N R ( K 1) NT r ] , and dU (r ) = NT [ N R ( K 1) NT ] (1 r / NT ) .
100
(3.27)
Proof: We only need to investigate the ordering rule defined in Corollary 3.2. The
diversity lower bound in (3.27) is then easy to derive, since given a data rate of r log 0 we
get (c.f. (3.16)(3.17)):
Pr{max C (H kEq , 0 ) r log 0 } Pr{C (H1Eq , 0 ) r log 0 } 0 d L ( r ) .
k
(3.28)
NT
Eq
k
NT
n =1
we get nk H kEq
2
F
k
n
2
F
, n , so
2
F
and
NT k
Pr max H
k
Eq 2
k F
( r / NT 1)
}.
2
F
r log 0
(3.29)
Therefore
101
2
F
0( r / NT 1) ,
(3.30)
and to derive the diversity upper bound in (3.27) we are left to investigate the right hand side
of (3.30).
Considering the length limitation on this paper and without loss of generality, we
investigate the simplest case, where K = 2 , NT = 2 and the channel matrices are denoted by:
H1 = [h1 , h 2 ] , and H 2 = [h3 , h 4 ] . So after nulling in the first stage we get the equivalent
channels as:
H1Eq = [h1,span{3,4} , h 2,span{3,4} ]
H 2Eq = [h3,span{1,2} , h 4,span{1,2} ].
(3.31)
2
F
(3.32)
102
(3.33)
31 , 32
R3 h3 ( 31h1 + 32h 2 )
= min || R3 h3
31 , 32
(3.34)
where the last step comes from the triangle inequality, and 31 and 32 are the solutions for
zero coefficients of h 3 and h 4 in the second equality of (3.34), expressed by:
1
31 13 23 R3
.
=
14
24
32
(3.35)
As what we argued in Section 3.3 (see (3.21)), since 13 and 14 are independent with
R1, span{3,4} , 23 and 24 are independent with R2, span{3,4} , and R3 is independent with any of the
projection heights, we have that 31 and 32 are independent with R1, span{3,4} + R2, span{3,4} . With
the same procedure, we can further derive:
R4, Span{1,2} 412 R1, span{3,4} + 422 R2, span{3,4} ,
(3.36)
where
1
41 14 24 R4
,
=
42 13 23 0
which is also independent with R1, span{3,4} + R2, span{3,4} . So if the following event E is true:
103
(3.37)
(3.38)
Given
Pr( E )
Pr( H1Eq
x)
x NT [ N R ( K 1) NT ] = 0 NT [ N R ( K 1) NT ](1 r / NT ) ,
(3.39)
(3.40)
From the analysis in (3.31)(3.40), it is easily seen that the extension to general values of
K and NT is straightforward except for more complicated mathematical expressions.
Remarks: Figure 3-3 shows the upper and lower bounds of the tradeoff curve given by
Theorem II. Note that the point d (0) upper bound in [88], expressed as NT (N R NT ) , is
derived by a genie-aided method in [88]. Therefore our result provides a tighter upper bound.
More importantly, in the scenario with fixed data rates ( r = 0 ), Theorem 3.2 tells us that the
optimal ordering will not increase the diversity order of the joint error probability among the
104
K users deploying SIC detector. In another word, the diversity order under fixed data rate is
unchanged by applying any user ordering.
Note that the tradeoff lower bound coincides with that of the non-ordering case in (3.14),
which indicates that when applying adaptive coding schemes to maintain a non-zero
multiplexing gain r , the SDMA system diversity order with SIC detector might be increased
by user ordering. However, given that the two extreme points, corresponding to r = 0 and
d (r ) = 0 respectively, are unchanged from non-ordering case, we predict that the whole
diversity-multiplexing tradeoff curve will not be improved by optimal ordering, although the
accurate analysis is still challenging for the intermediate points with r > 0 .
3.5 Conclusions
In this chapter, we utilize a geometry-based method, which is essentially the same as that
proposed in Section 2.2, to analyze the diversity-multiplexing tradeoff in point-to-point VBLAST and SDMA systems employing SIC receivers. Our results rigorously show that the
tradeoff curve for V-BLAST SIC receivers is not changed by ordering; while for SDMA, we
derive a tighter upper bound of the tradeoff curve than that in [88], and we prove that the
diversity order with fixed data rate is not changed by ordering.
Finally we stress that the diversity-multiplexing tradeoff is sometimes a loose indication
of the error probability performance, since it only characterizes the decay rate (exponential
behavior) at high SNR. Although optimal ordering does not improve the diversity order of
SIC receivers, it still provides an SNR gain (coding gain), compared with fixed-order SIC
receivers.
Note that the SIC detector in SDMA systems in our discussion is essentially a multiuser
detector applied in the simplest multiuser MIMO scenario: the synchronized uplink multiple
access channel. In the next chapter, we will consider to some more general scenarios, where
multiple users (each with multiple antennas) are located in a realistic cellular network with
universal frequency reuse. Therefore, the problem of inter-cell interference mitigation will be
our major focus.
106
Chapter 4
Interference Mitigation in Multi-User MIMO
4.1 Introduction
In the previous chapters, we mainly investigate point-to-point MIMO-SM systems. From
another standpoint, multiple data streams in SM systems can be viewed as multiple
(synchronous) users, therefore the MIMO receiver is equivalent to a multiuser detector. It is
then natural to investigate the problems of multiuser MIMO in the same frequency-time slot,
in which each user may transmit multiple data streams, and different multi-antenna users may
be located far apart and not synchronized with each other.
The receiver processing for interference mitigation is well-developed in literature (see [89]
and references therein). Some recent development on MIMO MUD can be found in [14][90].
In this chapter, we are interested in interference mitigation at the cellular downlink. In
particular, the inter-cell interference can be effectively addressed by base station cooperative
transmissions.
107
108
However, these techniques limit the achievable spectral efficiency gains and/or result in
insufficient suppression of CCI.
In recent years, several advanced techniques have been proposed to better combat the
effect of inter-cell CCI in cellular MIMO systems. Motivated by [6], MUD and turbo
decoding have been explored to significantly improve the performance of MIMO systems in
a multicell structure [13][16]. Such advanced receiver techniques improve the system
performance at the cost of increased receiver complexity. While they are readily applicable
today at base stations or access points for uplink processing of wireless networks, they still
impose challenges for the design of MSs in downlink communications, which is considered
to be the bottleneck for next generation high-speed wireless systems. Furthermore, it is also
found that there is a significant performance gap between the obtained MUD capacity and the
single-cell interference-free capacity upper bound, especially in environments with strong
CCI. This advocates a need to devote more system resources for performance enhancement
in the downlink multicell multiuser MIMO networks. The idea naturally arises to move the
CCI mitigation to the transmitter (BS) side on the downlink, where complex structure and
advanced processing can be more easily accommodated, if channel state information can be
obtained at the transmitter side either through uplink estimation or through a feedback
channel, for low user mobility scenarios such as indoor or outdoor pedestrian environments.
Joint optimization of the pre-coding designs among coordinated BSs has been proposed
[77][63] where the signal intended for an MS is transmitted from only one serving BS.
However, its very stringent dimension constraints severely limit the number of users that can
109
be handled by the system and lead to limited gains notwithstanding the significant additional
system complexity.
As multiple users in multiple cells are involved, cooperative processing at relevant base
stations can be exploited. This approach is feasible, as in the current infrastructure that is
common to both cellular communications and indoor wireless access, the base stations and
access points in the system are connected by a high-speed wired backbone that allows
information to be reliably exchanged among them. This approach is also reasonable, as in
environments with strong interference a mobile usually experiences several comparable and
weak links from surrounding radio ports, where soft handoff typically takes place in current
CDMA networks. In this scenario, cooperative processing among relevant ports transforms
the obstructive interference into constructive signals, which should offer large performance
improvement. Base station cooperation approach is proposed in [76] to enhance the downlink
sum capacity (throughput) with SISO systems employed in each cell, implementing dirtypaper coding proposed in [12]. While DPC or Tomlinson-Harashima precoding [93] can
effectively eliminate the effect of inter-cell CCI [25][53][76], both techniques are nonlinear
and may be prohibitively complicated for multi-BS systems. Linear pre-coding at the
cooperative BSs is, therefore, an attractive candidate given its good performance and the
relatively lower complexity it entails at both the BSs and the MSs [2][23][59].
Meanwhile,
transmitter
pre-coding
for
single-cell
downlink
multiuser
MIMO
communications has aroused much research interest recently (see, e.g. [19][96]). Assuming
the full set of transmitter CSI, such linear pre-coding designs combating intra-cell
110
interference in single cell downlink channels have been well developed. Based on a certain
criterion (e.g. maximum sum rate, minimum SINR or minimum power), iterative
optimizations deploying gradient methods [48] or alternate & maximize algorithms
[7][73][97] were proposed, which, however, in general suffer from non-convexity issues that
result in local suboptimum solutions, and from the complexity in the search for appropriate
initial points. To reduce the complexity introduced by the iterations, [98][85] try to optimize
some suboptimal criteria such that closed form pre-coding designs can be derived. For the
same purpose, some other authors try to design the Wiener filtering pre-coding matrices to
minimize the aggregate mean square errors (MSE) for all the users, e.g. [44][75][103].
Finally, it is a broadly accepted idea that the nullification designs which guarantee zero
interference at the MSs as in [2][9][61][80] are effective due to their simplicity and relatively
good performances. These single cell pre-coding designs then serve as a good starting point
for our proposed BS cooperative transmission.
In the first part of this Chapter, both information-theoretic DPC and some more practical
joint transmission schemes will be studied with cooperative multicell base stations for
downlink multiuser MIMO communications, assuming perfect synchronization of the signals
transmitted from cooperative BSs at each MS. Therefore the analysis here in general provides
an upper bound for achievable performance with BS cooperation, which defines a common
benchmark to gauge the efficiency of any practical scheme. Such an assumption also allows
us to explore other advantages of base station cooperative processing, e.g. channel
rank/conditioning advantage, and macro-diversity protection.
111
On the other hand, however, all the schemes proposed above and in [2][23][25][59][76]
for BS cooperation invariably assume that both the desired and the interfering signals from
different BSs arrive at each of the MSs synchronously (at the same time). While this
assumption enables the well-studied single-cell downlink transmission model to be applied in
a straightforward manner, it is fundamentally unrealizable especially for high data rate
systems. The BSs can align their transmissions so that the signals intended for any MS arrive
at that MS synchronously. However, even under the assumption of perfect BS cooperation,
the BSs cannot simultaneously control when these signals are received as interference by
other MSs.
[2][23][25][59][76], which do not account for it, especially, in high data rate regimes. To the
best of our knowledge, the problem of asynchronous interference has not been addressed in
the literature.
Given the above concerns, the second part of this chapter develops a framework for BS
cooperation in a multi-user multi-cell MIMO cellular network that explicitly accounts for
the asynchronous interference described above. We focus on linear-precoding designs given
their relatively lower complexity and satisfactory performance. Doing so also enables us to
effectively utilize the techniques developed for combating intra-cell interference in single
cell downlink channels, although the extensions are not straightforward. Three linear precoding-based algorithms are proposed to enable BS cooperation in the presence of
asynchronous interference. These algorithms provide different trade-offs between complexity
and performance in different SNR regimes. We also show that the proposed algorithms can
112
be extended to handle the under-explored scenario where even the desired signals from
different BSs do not arrive perfectly synchronously at the MSs due to practically unavoidable
timing errors or inaccuracies.
The rest of this chapter is organized as follows: in Section 4.2 we provide the system
models; and we give the analysis for the quasi-synchronous BS cooperative schemes in
Section 4.3; we then extend the discussions to asynchronous scenarios in Section 4.4; finally
we conclude this chapter in Section 4.5.
between different transmit and receive antenna pairs are assumed to undergo frequency-flat
Rayleigh fading. The baseband channel between BS b and MS k is denoted by H (kb ) . For any
MS, the BSs cooperate and jointly transmit linearly precoded signals intended for it. As
mentioned, we focus on joint linear pre-coding among the BSs. The transmit vector for MS k
from BS b is linearly pre-coded by the matrix Tk(b ) (of size NT Lk ) and takes the form
x(kb ) (m) = Tk(b ) s k (m) , where s k (m) denotes zero-mean data vector, of size Lk 1 , meant for MS
complete channel state information for all the channels between itself and all the MSs. This
can be achieved, for example, by an initial joint training phase that involves all the BSs, or by
means of adaptive tracking and feedback algorithms implemented at the MSs.
113
We assume a block-fading channel model with a large enough coherence time such that
the channel state remains the same over the duration during which Tk(b )
is used (the
frequency selective channels with OFDM will be discussed in Section 4.4). The coherence
time is much larger than the propagation delay between any BS-MS pair. In order to
maximize the information transmission rate for each MS, a Gaussian code book is used for
transmit data vectors. As transmit power constraints can be imposed on pre-coding matrices,
we assume, without loss of generality, that E {s k (m)s kH (m)} = I Lk , where the operator H
stands for matrix conjugate transpose, and I Lk denotes an Lk Lk identity matrix.
Furthermore, it is assumed that the transmit data vectors for different users are independent
of each other, i.e., E {s k (m)s Hj (m)} = 0 , for k j .
We assume perfect inter-BS synchronization and that the BSs know the propagation delay
from each BS to each of the MSs. (We will relax this assumption in Section 4.3) Inter-BS
synchronization can be realized by GPS, over-the-air approaches [4][70], or by a wired
backbone. Such infrastructure is already in place in current CDMA2000 and IS-95 cellular
networks to facilitate soft handoffs [53]. Timing-advance mechanisms, employed currently in
the uplink of GSM and 3GPP cellular networks [45], can then be used in the downlink to
achieve synchronization. Specifically, the BSs advance their respective transmission times to
ensure that the signals arrive at the desired MS (say, k) synchronously. However, due to the
broadcast nature of the wireless channel, MS k also inevitably receives signals intended for
other MSs. As detailed below, contrary to what is assumed in [2][23][25][59][76], these
114
signals arrive at MS k with different delay offsets and not synchronously with the data
streams intended for it.
b =1,..., B
delay, k(bk ) . Assuming a linear modulation with baseband signature waveform g (t ) , the
equivalent received baseband signal at MS k, is given by
rk (t ) =
g (t mT
k( bk ) ) H k x k ( m )
(b )
(b ) (b )
(b)
+ g (t mTS k + j ) H k x j ( m ) + n k (t ),
m j
b
( j k )
115
( B)
H
(2)
( B)
(1) H
, and n k (t ) is additive white
where Hk = H(1)
k , Hk ,..., Hk , xk (m) = xk (m) , , xk (m)
Gaussian noise. At MS k, the received baseband signal rk (t ) is passed through the filter
matched to g (t mTS k(bk ) ) (which is also delayed by k(bk ) ) to generate sufficient statistics.
The corresponding received signal component at MS k is H k Tk s k (m) , where
Tk = Tk(1) H , Tk(2) H ,...Tk( B ) H
BSs for MS k. The discrete-time received signal after matched filtering then takes the form
y k ( m) = H k Tk s k ( m) +
(b )
k
Tj( b ) i (jkb ) + n k ,
(4.1)
j
b
( jk )
As shown in Figure 4-2, the asynchronous interference to MS k from the signal transmitted
by BS b for user j arises due to two adjacent symbol transmissions with indices m(jkb ) and
m(jkb ) + 1 , where m(jkb ) = m (jkb ) / TS and x denotes the smallest integer larger than or
equal to x . Let 0 jk(b ) TS represent the delay offset (jkb ) modulo the symbol duration, TS .
116
have
i (jkb ) = ( jk(b ) TS )s j (m(jkb ) ) + ( jk(b ) )s j (m(jkb ) + 1) .
(4.2)
{ }
(b)
From (4.2), it follows that E i jk = 0 . Assuming the information signals intended for two
different users j1 and j2 are independent of each other, E {i (jbk1) i (jbk2) H } = 0, for j1 j2 k . Finally,
1
it can be shown that the correlation between i (jkb1) and i (jkb 2) , for j k , is
E {i (jkb1) i (jkb 2) H } = (jkb1,b 2) I Lk ,
0,
m(jkb2) > m(jkb1) + 1
, for j k .
where (b1,b2) =
m(jkb2) = m(jkb1) + 1
( jk(b1) ) ( jk(b2) TS ),
jk
b
b
b
b
b
b
(
1)
(
2)
(
1)
(
2)
(
2)
(
1)
( ) ( ) + ( T ) ( T ), m = m
jk
jk
S
jk
S
jk
jk
jk
(4.3)
When b1=b2=b, we have (jkb,b ) = ( jk(b ) ) 2 + ( jk(b ) TS ) 2 . Furthermore, kk(b1,b 2) = 1 for all b1
and b2.
117
As in [16], our goal is to jointly optimize the transmitter pre-coding matrices, {Tk }k =1...K ,
so as to maximize the sum of information rates over all the K users, given the channel states
H1 ,..., H K . From (4.1), the bandwidth-normalized information rate, Rk , of MS k is given by
[3][25]
Rk = log I + k 1H k Tk TkH H kH ,
(4.4)
where
k = N0I +
j ( b1,b 2)
( jk )
is the covariance matrix of noise plus interference term in (4.1). Since all the K users use the
same waveform g (t ) , the asynchronous interference correlation terms,
( b1,b 2)
jk
H Ts
k
+ nk .
(4.5)
j
( j k )
118
coding designs, which target for mitigating intra-cell interference, to the BS cooperation case
with some minor modifications, as will be seen in Section 4.3. In general, for the
synchronous case the following expression holds true for the spectral efficiencies of user k
with linear pre-coding schemes:
Rk = log I + [N0I + Hk ( j k Tk TkH )HkH ]1 Hk Tk TkH HkH ,
(4.6)
Typically the optimization has three kinds of power constraints, and we will use different
constraints in different scenarios (asynchronous and synchronous) for simplifying the
discussions, although all of them are by nature extendable to both cases. For the first one
(which will be used in Section 4.4 for the asynchronous case), we limit the power dedicated
to the transmission of each MS. This type of power constraint is motivated by power
fairness for the different users, and leads to analytically tractable solutions based on the
asynchronous model in (4.1). As a consequence, the transmit power at each BS is limited as
long as the number of users it serves is finite. Therefore, the optimization problem at hand is:
max Rk ,
{Tk _ opt }k =1..K = arg
{T }
k k =1... K
H
s.t. Trace Tk Tk PT for k = 1,..., K .
(4.7)
In this asynchronous case, an additional constraint follows from the constraints on channel
spatial dimensions: BNT Lk . This optimization problem is non-linear and not even
k
therefore need to be developed in order to determine the pre-coding matrices. One such
solution is the nullification method [2][23] (also will be mentioned in Section 4.3), which is
119
widely applied in single-cell multiuser scenarios due to its simplicity and relatively good
performance.
It
makes
all
the
transmitters
satisfy
the
zero-forcing
Tr(
T T
k
H
k
) KPT , and
(4.8)
k =1
Tr(
[b ] [b] H
k Tk
) PT(b ) , b = 1, 2, ...., B
(4.9)
k =1
120
for the current user needs to non-causally know not only the encoding of previous users
and associated CSI, but also the corresponding propagation delays, to pre-cancel the
interference from previous users. The rate of each user and the (optimal) sum rate can then
be expressed as:
max
N 0 I + H ( k ) ( j k T ( j ) TH( j ) )HH( j )
N 0 I + H ( k ) ( j > k T ( j ) TH( j ) )HH( j )
( R ( j ) _ DPC (T)) ,
(4.10)
(4.11)
Tr ( TT H ) = KPT , ( j )
where T = [T1 , T2 ,..., TK ] , and (1), (2), ....., ( K ) represents a certain user ordering. By
applying the duality of the broadcast and multiple-access channels (MAC) [43], (4.11) can be
obtained by calculating the sum rate of a dual multiple-access channel with the same total
power constraint KPT . Iterative numerical methods that jointly optimize (4.11) on the dual
uplink were proposed (see e.g. [42] and [102]) based on the iterative water-filling algorithm
proposed in [101]. Furthermore, it is shown that (4.11) is actually the saddle point (with
worst-case colored noise) of the Satos bound, which is the sum rate of a heuristic
cooperative system where both transmitters and receivers can cooperate with each other,
given by [71]:
SRSato =
max log
n + HT TT H HTH
Tr( TT H ) Pt
(4.12)
where HT = [H1T , HT2 , ... , HTK ]T and n is the noise covariance matrix.
DPC with per-base constraints is much more involved, as the MAC/BC duality does not
hold any more. DPC has not been shown to achieve the capacity region or even the sum
122
capacity with constraints (4.9). Complex iterative multistage numerical methods for
cooperative DPC with constraints (4.9) are proposed in [25][39][40], in which a small piece
of power is invested to a certain selected user until one of the BS reaches its power
constraint. The path gains corresponding to this BS are then set to zero in subsequent stages
so that no further power is allocated to these antennas. In general, (4.9) is more strict than
(4.8), so a performance degradation is expected.
Although the DPC scheme with a pooled power constraint gives us a simple performance
upper bound for BS cooperation, some unrealistic assumptions are made, such as the noncausal knowledge of interference sequence at the transmitter, which motivates the
exploration of more practical joint transmission schemes, as will be discussed in the
following.
B. Suboptimal Joint Transmission (JT) Schemes for BS Cooperation with Per-Base
Power Constraints
In this part, several suboptimal but more practical joint transmission schemes with the more
practical per-base power constraints are exploited for better understanding of the achievable
performance gains of BS cooperative processing in practice. Essentially these techniques are
counterparts of corresponding multiuser detectors, some of which have been revisited in the
co-located MIMO context recently [10][80]. These suboptimal joint transmission schemes
will be compared with both the receiver MUD approaches [13][16] and DPC approach
above. Intuitively, compared with DPC, linear pre-coding may induce more transmit power
inefficiency, as the pre-coding matrices are responsible for the mitigation of interference
123
from both previous and subsequent users, and per-base power constraints are
implemented instead of a pooled power constraint.
Before discussing these suboptimal joint transmission schemes in detail, we first propose
a simple algorithm for designing T with per-base power constraints. Let LT = k =1 Lk be the
K
overall number of data streams of K users. Suppose that a preliminary joint linear transmit
matrix G BNT LT is given, whose designs will be introduced in the sequel. Our design of T
with per-base power constraints (4.9) is given by
T = G. ,
(4.13)
where is a LT LT diagonal matrix with diagonals { l }lL=T1 each representing the allocated
power for the corresponding original data stream. Since typically LT >> B and there are only
B per-base power constraints in (4.9), we can further divide { l }lL=T1 into B groups each with
LT / B elements having the same value:
= blockdiag ( 1I LT / B , 2I LT / B , ..... , B I LT / B } .
(4.14)
Further define
Q B B
G [1] 2
1
[2] 2
G
= 1
:
G[ B ] 2
1
G[1]
2
G[2]
2
:
G
[B] 2
2
.....
.....
:
.....
G[1]
B
[2] 2
GB
,
:
2
G[BB ]
(4.15)
per-base power constraint vector, then we can calculate by solving the linear system
equation:
= [ 12 , 22 , ....., B2 ]T = Q 1P .
(4.16)
When an infeasible solution ( does not have all positive entries) is obtained, we can refine
it as:
(b )
P
= I , = min T 2 ,
b =1,2,..., B
G[b ]
(4.17)
where G [b ] is the rows of G corresponding to transmit antennas at BS b. Note that (4.16) can
utilize the full power at each BS, while in (4.17) only the BS satisfying the minimum value
can transmit with full power and any other BS transmits with a power less than its power
constraint. Nonetheless, it has been shown that designs with per-base power constraints incur
insignificant performance loss for linear joint transmission schemes compared to the
corresponding designs with pooled power constraint, thus demonstrating the applicability of
these joint transmission schemes in realistic cellular communications. These suboptimal
schemes are illustrated as follows.
Joint Transmitter Zero Forcing (JT-ZF): This approach can be viewed as the counterpart
of
the
multiuser
decorrelator,
which
employs
pseudo-inverse
of
125
Tk = G k . k ,
(4.18)
where k is the corresponding kth Lk Lk diagonal block of . With this approach, we can
k I , j = k
. Then interference from both other users and other sub 0, j k
streams of the same user are eliminated simultaneously. Just as ZF receivers eliminate the
interference at the expense of noise enhancement, ZF transmitters generally increase the
average transmit power by the same factor. Furthermore, in the rank deficient scenario where
H T H TH is singular, this approach cannot even be applied. These observations naturally
N 0 1
I) .
KPT
(4.19)
For this approach, the
(4.20)
where Vk includes the right singular vectors corresponding to the null space (zero singular
values) of HT _ k = [H1T , ..., HTk 1 , HTk +1 , ..., HTK ]T , and Vk' includes the first Lk right singular
vectors of the virtual channel H 'k = H k Vk . HT _ k usually has a non-zero null space, so
126
max i i
, or more generally the singular value distribution of
min i i
the channel matrix. Noting that equal power allocation achieves optimal performance at high
SNR in the full channel rank case, we conclude by Jensens inequality that a channel with
= 1 has the largest capacity, with the same power constraint. In rich scattering environment,
channel matrix H is assumed to have normalized i.i.d. complex Gaussian entries and thus is
well-conditioned. In realistic environments, H may get ill-conditioned due to fading
correlation, resulting from the existence of few dominant scatterers, small angle spread, and
insufficient antenna spacing [78]. Those sub-channels with l2 << 1 are essentially of no use,
even though the channel still has a full rank.
In a typical outdoor urban scenario, antenna arrays at the base stations are elevated above
urban clusters and far away from local scattering, while mobile terminals are surrounded by
rich scatterers, and the number of independent paths is limited by few far-field reflectors
[38]. Therefore, the downlink channel matrix with co-located transmit array can be modeled
by (2.57). In this case, the channel matrix may be both rank-deficient and ill-conditioned,
determined by the propagation and system parameters.
128
For BS cooperation in multicell MIMO, the overall transmit array is distributed among
cooperative base stations, so in the equivalent channel for user k, {H (kb ) }b =1...B are independent
B
with each other. The overall number of independent links is then given by rank (H (kb ) ) ,
b =1
sub-channels of H k are under deep shadow fading is much lower than a co-located MIMO
channel. Macro-diversity cannot increase the mean of the received SNR, but will greatly
reduce its variance.
4.3.3 Numerical Results
We simulate a synchronous BS cooperation scenario with B=K=3, and NT = N R = 2 .
Averaged spectral efficiencies for different pre-coding schemes are compared with each
other, where we provide the baseline schemes including the conventional single cell
signaling scheme treating inter-cell interference as noise [3][6], the 2 2 point-to-point
MIMO capacity, and the receiver MUD at each MS [16].
From Figure 4-3, which simulates the Rayleigh fading channels, we see that the
performance of MUD in [16] is still significantly away from the single-cell interference-free
case (2x2 MIMO). On the other hand, the DPC schemes for BS cooperation result in a
significant performance gain over the multiuser receivers, and they even outperform the 2x2
interference-free MIMO. As discussed above, suboptimal joint transmission schemes reduce
interference at the expense of transmitter power inefficiency, which may compromise other
gains and may result in a performance worse than 2x2 MIMO. This can be observed in
Figure 4-3. Nonetheless, all these suboptimal joint transmission schemes outperform the
multiuser receiver, thus verifying the capability of BS cooperation in practical deployment.
Furthermore, the JT-Decomp approach outperforms JT-MMSE at the cost of extra
complexity, and that JT-ZF converges to JT-MMSE at high SNR, which is a well-known
result.
130
4.3.4 Summary
In this section, cooperative processing at multicell base stations is introduced under
synchronous assumptions. In particular, the capability for co-channel interference
cancellation, channel rank/conditioning advantage, and macro-diversity protection for BS
cooperation are illustrated and verified. Although these advantages may not be achieved
132
simultaneously and may compete with each other, there is still an optimistic prediction on
overall system performance improvement, which reveals the great potential of base station
cooperative processing on meeting the ever-increasing capacity demands for wireless
communications.
On the other hand, however, we will find in the next section that when releasing the
synchronous assumption, the above mentioned nullification (JT-ZF and JT-Decomp.) or JTMMSE methods are not effective anymore, because the channel model in (4.5) should now
be replaced by (4.1) due to its asynchronous interference nature. We will then propose some
more technique involved pre-coding schemes to address the problem of interference
mitigation in asynchronous BS cooperation systems.
denote
users. When Lk = N R , for all k , the vectors y and s have the same dimensions, and the
overall system-wide MSE can be expressed as:
MSE = E y s
} {
=
E y k sk
k =1
} MSE
=
(4.21)
k =1
where MSEk stands for the MSE of MS k, and the expectation, E{.} is taken over the random
data vectors, {s k }k =1...K , and the noise, {n k }k =1...K . The optimization criterion then becomes:
134
min
(b )
MSE
k =1
b=1
, MSEk follows:
j
b
( j k )
{(
MSEk = E H k Tk s k s k + J k + n k H k Tk s k s k + J k + n k ,
B
B
B
= Trace H (kb ) Tk(b ) Tk(b ) H H (kb ) H H (kb ) Tk(b ) Tk(b ) H H (kb ) H
b =1
b =1
b =1
+ ( N 0 + 1)I N R +
(4.23)
j k ( b1,b 2)
MSEk +
k =1
k =1
b =1
(4.24)
where 1 ,..., K are the Lagrange multipliers associated with the power constraints for MSs
1,,K, respectively. As shown in Appendix A, we get the following closed-form solution for
Tk :
Tk = [Ck + k I ] H kH ,
1
(4.25)
135
K (b1b 2) (b1) H (b 2)
kj H j H j , for b1 b 2
= ( j k )
K (bb ) (b ) H (b )
kj H j H j ,
for b1 = b 2 = b.
j =1
C(kb1b 2)
(4.26)
The expression for k is given in Appendix E, and is not repeated here to save space.
B. Joint Leakage Suppression (JLS)
An alternative sub-optimal objective function, which has the advantage of allowing a userby-user optimization, can be obtained by considering leakage suppression. For MS k, we
design Tk to maximize the ratio of the desired signal power received by MS k and the total
power of the noise and the leakage of x k at other MSs. We call it the signal to leakage plus
noise ratio. Unlike SINR, which considers the interference that arrives at an MS, SLNR
considers interference that stems from the data streams intended for the MS. This is a
generalization of the SLNR approach proposed in [15][85][98] which only addressed the
simple case of a single data stream per user and did not model asynchronous interference
to the general BS cooperation scenario considered in this paper.
For analytical tractability, we restrict the space of Tk to scaled versions of semi-unitary
matrices. Thus, Tk =
PT
Q k , where the NT B Lk semi-unitary matrix Q k contains
Lk
orthonormal columns. Orthonormality ensures that there is no cross-talk among the Lk data
streams for MS k, and simplifies the receiver at MS k. Then the received signal is
136
yk =
PT
P
H k Qk sk + T
Lk
Lk
(b )
k
Q (jb ) i (jkb ) + n k ,
j
b
( jk )
where Q(kb) consists of the rows in Q k that are associated with the bth BS. The signal
component power is then
PT
P
E {s kH Q kH H kH H k Q k s k } = T Trace Q kH H kH H k Q k .
Lk
Lk
The power of the (asynchronous) interference leakage at MS j due to x k , the signal meant for
MS k, can be shown to be
P
E T
Lk
( b1, b 2)
The noise power at MS k is PNk = N 0 N R . Therefore, the SLNR for MS k is given by:
Trace Q kH M k Q k
SLNRk =
N 0 N R Lk +
j
( j k )
(4.27)
Lk
Trace Q kH M k Q k
Trace Q kH N k Q k
q klH M k q kl
l =1
Lk
l =1
q klH N k q kl
PA
T
kj
. Here, A kj is
j
( j k )
given by
H
kj(11) H (1)
H (1)
j
j
(21) (2) H (1)
H
H
j
j
A kj = kj
( B1) ( B ) H (1)
kj H j H j
H
H (2)
kj(12) H (1)
j
j
H
(2)
H
kj(22) H (2)
j
j
137
H
H (jB )
kj(1B ) H (1)
j
H
H (jB )
kj(2 B ) H (2)
j
( BB )
(B) H
( B)
kj H j H j
(4.28)
Notice that T1 ,..., TK can now be independently optimized. Even so, directly maximizing
(4.27) with respect to q k1...q kL is still analytically intractable. Therefore, we derive a lower
k
bound that can be maximized analytically. The SLNRk in (4.27) can be lower bounded as
[34]:
qH M q
SLNRk min klH k kl
l =1... Lk
q kl N k q kl
(4.29)
(4.30)
dimension dimV = Lk . Since M k is Hermitian and N k is positive-definite, the CourantFischer Max-Min Theorem [72] applies. The maximum value of (4.29) is
qH M q
max min klH k kl
q k 1 ~ q kLk l =1... L q N q
kl k kl
q H M q
min H k = Lk ( N k1M k ) ,
= max
qV
V
q Nk q
dimV = Lk
(4.31)
equality.
It can be seen that the single closed-form solution in (4.30) is less complex than the JWF
solution in Section 4.4.1.A. As a special case, when Lk = 1 , (4.27) can be directly maximized
by applying the Rayleigh-Ritz quotient theorem [27]. This reduces to the solution in [85]:
138
SLNRk =
q kH1M k q k1
1 ( N k 1M k ) . Finally, the fact that the overall amount of interference power
q kH1N k q k1
equals that of the leakage power suggests that the JLS algorithm is still effective for
interference mitigation. This intuition is verified numerically in Section 4.4.4.
C. Controlled Iterative Singular Value Decomposition (CISVD)
The previous two approaches, while simple, optimized metrics that were different from
the sum-rate spectral efficiency metric in (4.7). In this section, we directly optimize this
metric of interest; however, this is analytically intractable and prohibitively complicated
numerically. To directly improve the spectral efficiency in our BS cooperation scenario while
keeping acceptable computational complexity, we propose an iterative optimization
algorithm called controlled iterative SVD to determine (4.7). CISVD applies the alternate &
maximize algorithm [7][98] in a greedy manner. At each iterative step, Tk is optimized by
keeping the other pre-coding matrices, {Tj } j k , fixed. Thus, each step is a water-filling power
allocation on the equivalent matrix k 1/ 2 H k with unit additive noise power. Given the nonlinear nature of the problem, the iterations are continued only as long as the target function
increases. The iterations are initialized with the JLS solution in (4.30).
CISVD consists of the following three steps:
Step 1:
For k = 1, , K , calculate T1 ,
Step 2:
For k = 1, , K , fix {Tj } j k , set H k _ equ = k 1/ 2 H k , and update the precoding matrix Tk by
, TK according to (4.30)
eigen-beamforming and water-filling power allocation based on H k _ equ with noise power 1.
139
Step 3:
Repeat step 2 until the target function in (4.7) does not increase or the increase is less than a
pre-defined threshold.
The above three steps trivially guarantee that the algorithm stops. As we shall see in Section
4.4.4, CISVD provides significant performance gains with only a small number of iterations
and is significantly faster than random, non-intelligent search methods.
4.4.2 Generalization to Imperfect Timing-Advance Case
The three joint BS pre-coding designs of the previous section assume accurate timing
advance, i.e., the desired signal components are assumed to arrive synchronously. However,
imperfect timing advances are inevitable in practical systems because of imperfect delay
estimation, user mobility, inaccurate cross-BS synchronization, and MS synchronization
errors.
Let k(b ) denote the timing advance error (jitter) of BS b in sending the signal for MS k.
Therefore, BS b now advances the time when the signal for user k, x(kb ) (m) , is transmitted by
the interval
k(b) = k(b) + k(b ) .
(4.32)
Consequently, the new delay offset at MS k due to the signal transmitted by BS b for MS j is
given by
(jkb ) = k(b ) (j b ) .
(4.33)
In addition to the MUI term, J k , in (4.1), imperfect timing advance also results in ISI. By
applying (4.32), (4.1) is modified to
140
y k ( m) =
(b )
k
(b )
k
Tj( b ) i (jkb ) + n k
j
b
( jk )
(4.34)
= H k k Tk s k (m) + O k (m) + J k + n k ,
where k(b ) = ( k(b ) ) 1 , O k (m) = k(b ) H (kb ) Tk(b ) s k (mk(b ) ) is the ISI term with k(b ) and
b
mk(b ) given by
(b )
(b )
k , mk
{
} {
if k(b ) = 0
{0, m} ,
degradation matrix due to imperfect signal synchronization (it equals I N B for perfect timing
T
advance).
From (4.34), the information rate of MS k is
Rk = log I + k 1H k k Tk TkH kH H kH ,
where the covariance of the noise plus interference term now becomes:
k = N 0I +
( b1, b 2 )
)
.
j
( b1, b 2 )
( jk )
Here the indicator function 1(.) equals 1 if the input argument is 0, and equals 0, otherwise.
The function sgn (.) is the signum function. The new asynchronous interference coefficients,
( b1,b 2)
jk
141
in (4.33), in the same way that (jkb ) was determined in (4.3). As the cooperative BSs can no
longer determine { (jkb ) } exactly, they cannot calculate { (jkb1,b 2) } exactly either. As we see
from (4.34), timing advance inaccuracy degrades performance in three ways: the power
degradation term, k , the imperfect knowledge of { (jkb1,b 2) } , and the additional ISI term, O k .
While the exact value of the jitter is, by assumption, unknown, its statistics, if known, can
certainly be determined and exploited by the cooperating BSs to mitigate the performance
degradation.
The new JWF and JLS designs incorporating the timing inaccuracy in addition to
asynchronous interference leakage are derived in Appendix F. For JWF, the joint pre-coder
of MS k is:
Tk = [Ck + k I ]1 k H kH ,
(4.35)
( jk )
=
K (bb ) (b ) H (b )
( b )2
( b )2
H (kb ) H H (kb ) ,
kj H j H j + ak + k
j =1
Ck(b1b 2)
for b1 b2,
(4.36)
for b1 = b 2 = b,
where
k(b ) = E
(b)
k
{ ( )} ,
(b )
k
k(b ) = Pr (k(b ) 0 ) E
(b )
k
{ (T
k(b1) k(b 2) = E
( b1) ( b 2 )
k k
k( b ) ) + Pr (k(b ) < 0 ) E ( b ) ( TS k( b ) ) ,
k(b 2) } ,
( b1)
k
142
k(b )2 = E
k(b )2 = E
(b)
k
(b)
k
{ }
{ } ,
{ } .
( b )2
k
( b )2
k
( b1,b 2)
jk
Given the knowledge of jitter-statistcs, the BSs can calculate the jitter-averaged
asynchronous interference leakage value, kj( b1,b 2) .
Determining the first moment of { (jkb1,b 2) } is difficult due to the modulo TS operation on
(jkb ) . However, the jitters are typically considerably smaller than the symbol duration.
Therefore, we can then assume that symbol index differences {m(jkb ) } in (4.2) do not change.
We then have jk(b ) = (jkb ) mod TS jk(b ) + k(b ) . This simplifies the calculation of the jitter-
M k = PT
( B ) (1) ( B ) H (1)
k k H k H k
H
k(1) k( B ) H (1)
H (kB )
k
k( B )2 H (kB ) H H (kB )
(4.37)
Nk = N 0 N R I + PT Akj ,
j =1
where Akj bears the same form as in (4.28), with kj(b1b 2) replacing kj(b1b 2) for j k , and
k(b1) k(b 2) Pk(b1b 2) replacing kk(b1b 2) .
143
coder performs worse than the single-cell point-to-point interference-free MIMO. To achieve
145
a spectral efficiency of 4bps/Hz, JWF requires 5 dB lower transmit power per user than JLS,
and CISVD requires 8 dB lower transmit power per user than JLS. Note, however, that JLS
involves the smallest computational effort among the three proposed schemes.
present, i.e., NT B > Lk . Figure 4-6 considers N T = 3, N R = L = 2 , and Figure 4-7 considers
k =1
NT = N R = 3, L = 2 . JLS and CISVD now achieve much higher gains than the conventional
nullification method. Over a large SNR range, CISVD even achieves a higher spectral
efficiency than the single-cell point-to-point interference-free MIMO scenario. In Figure 4-6,
JWF outperforms JLS and the conventional nullification method at low to intermediate SNRs.
146
JWF does not apply to Figure 4-7 as N R > L . Extensive investigations (not shown here)
reveal that CISVD typically stops after 5 to 7 iterations.
climbing procedure starts from the JLS result (4.30), with the following two algorithms. The
first algorithm is a random search in which we randomly generate many pre-coding matrix
pairs of T1 and T2 , each of which satisfies the power constraints, and choose the pair that
maximizes (4.7). Assuming that 10 iterations are required before the CISVD converges, we
generate 20 matrix pairs for random search to compare the two approaches fairly. The second
147
algorithm is the CISVD algorithm, but with 10 different randomly selected initial starting
points. The one with the best performance is selected. From the figure, we see that the
proposed CISVD greatly outperforms random search. Despite its ten-fold lower complexity,
CISVD with JLS as the starting point also outperforms the randomly initiated CISVD. Using
the JLS solution as the initial point is thus an important factor contributing to the
computational efficiency and superior performance of CISVD.
each assumed to be
uniformly distributed in the interval [0.1TS ,0.1TS ] and are independent of each other. The
148
figure shows that the modified JWF solution (in (4.35) and (4.36)), marginally improves the
performance over the original design (in (4.25)). However, the modified JLS solution (in
(4.37)) reduces the transmit power per user by 2.5 dB compared to the original JLS solution
(in (4.30)).
4.4.4 Summary
In Section 4.4, we investigated the impact of asynchronous interference on the downlink
performance of multi-user MIMO systems that use linear pecoding and exploit BS
149
cooperation. We saw that when cooperative BSs jointly transmit data intended for multiple
users, the timing advance can only be chosen such that the desired signal components are
perfectly aligned at their intended MSs. However, as a consequence, the different
propagation delays of the interfering signals then ensure that they are asynchronous. Not
accounting for this fact in the BS cooperation design (e.g. Section 4.3) degrades the system
performance considerably. We developed three linear pre-coding algorithms, namely JWF,
JLS, and CISVD, that markedly outperform conventional designs that ignored the
asynchronicity of interference. CISVD realizes significant spectral efficiency gains, JLS
achieves a good trade-off between interference mitigation and complexity, and JWF performs
well at low to intermediate SNRs. JLS and CISVD perform exceptionally well in channels
that have redundant spatial dimensions. By utilizing jitter-statistics, the JWF and JLS
solutions were extended to handle the practical scenario in which the timing-advance
inaccuracies exist.
4.5 Conclusions
In this chapter, we investigate the problem of downlink cooperative transmissions among the
cooperative BSs for interference mitigation. Specifically, the performance bounds are
explored in the synchronous cases, where some other advantages of BS cooperations, other
than intereference mitigations are also analyzed. Further considering more practical scenarios,
where the inter-cell interfering signals are by nature asynchronous at each MS, we present a
fundamental mathemeatical framework, and propose some novel joint pre-coding algorithms
150
for BS cooperation. These algorithms are also partly extendable to the senario with timing
errors.
Essentially, our work in this chapter constitutes a solid step towards realizing the great
potential of BS cooperation in practical interference-limited settings for multi-user MIMO
systems.
151
Chapter 5
Conclusions and Future Work
5.1 Conclusions
With the ever increasing demands for high data rate wireless communication systems, MIMO
systems have been considered as one of the key enabling techniques for current and emerging
wireless systems [45][105][106]. In this dissertation, we have studied some important
problems in point-to-point and multiuser MIMO, making certain contributions to both theory
and practice of this timely research topic.
As a promising technique that introduces diversity improvement with low cost and
relatively small overhead, antenna selection is investigated in the first part of this dissertation,
particularly on: (1) diversity property analysis in MIMO-SM systems with practical coding
and decoding schemes; (2) fast selection algorithm designs; and (3) application in
commercial wireless systems. The first two problems are addressed via novel and effective
geometric tools, while for the third a training/calibration protocol for IEEE 802.11n WLANs
152
is proposed. These geometric tools are also extended to analyze some open problems in
MIMO, the diversity-multiplexing tradeoff in V-BLAST and SDMA systems employing
ordered SIC receivers.
While some systems involve only point-to-point MIMO, many others need to address the
impairments induced by multiuser MIMO, especially for cellular systems, which undergos
severe inter-cell interference in the downlink. In the second part of this dissertation, we are
mainly concerned with the multiuser multicell downlink MIMO scenario, and investigate the
potential of cooperative transmission among adjacent base stations for effectively combating
the inter-cell interference. Our idea of interference mitigation through BS cooperation is first
exposed with a quasi-synchronous model, by which we also explore some other advantages
like channel rank/conditioning improvement and macro-diversity protection. Further
considering a more practical channel model, where signals from different BSs in the
downlink are by nature asynchronous at each MS, we propose some novel and effective
algorithms achieving different levels of tradeoffs between interference mitigation effects and
computational complexity. These algorithms are also extended to the scenarios with
additional timing errors.
5.2 Achievements
Overall, we have tackled some open and interesting problems in MIMO study, and have
also endeavored to improve the performance of MIMO systems in real operating scenarios
and accelerate their employment in future wireless networks
153
Part of this PhD work has been published or submitted for publication [108][123], which
include one book chapter, two journal papers, eight conference papers and four more journal
papers under review. The protocols in Section 4.4 (proposed during the authors internship at
MERL) have been accepted in the current draft specifications of IEEE 802.11n standard
[105]. Meanwhile, seven patents were filed at MERL.
154
Bibliography
[1]
[2]
[3]
[4]
[5]
[6]
S. Catreux, P. F. Driessen, and L. J. Greenstein, Attainable throughput of an interferencelimited multiple-input multiple-output (MIMO) cellular system, IEEE Trans.
Communications, vol. 49, no. 8, pp. 479-493, Aug 2001.
[7]
J.-H. Chang, L. Tassiulas, and F. Rashid-Farrokhi, Joint transmitter receiver diversity for
efficient space division multiaccess, IEEE Trans.Wireless Communications, vol. 1, no. 1,
pp. 16-27, Jan. 2002.
[8]
[9]
[10]
R. Choi, and R. Murch, MIMO transmit optimization for wireless communication systems,
Proc. 1st IEEE International Workshop on Electronic Design, Test and Applications, pp. 3337, Jan. 2002.
[11]
[12]
M. Costa, Writing on dirty paper, IEEE Transactions on Information Theory, vol. 29 no. 3,
pp. 439 -441, May 1983.
155
[13]
H. Dai, and H. V. Poor, Asymptotic spectral efficiency of multicell MIMO systems with
frequency-flat fading, IEEE Trans. Signal Processing, vol. 51, no. 11, pp.2976-2989, Nov.
2003.
[14]
[15]
[16]
[17]
H. A. David, Order Statistics, 3rd edition, John Wiley & Sons, 2003.
[18]
[19]
[20]
[21]
[22]
[23]
[24]
[25]
[26]
[27]
G. Golob, and C. V. Loan, Matrix computations, 3rd edition, The John Hopkins University
Press, 1996.
156
[28]
D. A. Gore, R. W. Health, Jr. and A. J. Paulraj, Statistical antenna selection for spatial
multiplexing systems, Proc. 2002 IEEE International Conference on Communications, vol.
1, pp. 450 -454 , New York City, 28 April- 2, May, 2002.
[29]
D. A. Gore, R. U. Nabar, and A. J. Paulraj, Selecting an optimal set of transmit antennas for
a low rank matrix channel, Proc. Int. Conf. Acoust., Speech and Signal Processing, Istanbul,
Turkey, June 2000.
[30]
D. A. Gore, and A. J. Paulraj, MIMO antenna subset selection with space-time coding,
IEEE Trans. Signal Processing, vol. 50, no. 10, pp. 2580-2588, Oct. 2002.
[31]
A. Gorokhov, Antenna selection algorithms for MEA transmission systems, Proc. Int.
Conf. Acoust., Speech and Signal Processing, vol. 3, pp. 2857-2860, May 2002.
[32]
A. Gorokhov, D. A. Gore, and A. J. Paulraj, Receive antenna selection for MIMO spatial
multiplexing: theory and algorithms, IEEE Trans. Signal Processing, vol. 51, no. 11, pp.
2796-2807, Nov. 2003.
[33]
A. Gorokhov, D. Gore, and A. Paulraj, Diversity versus multiplexing in MIMO systems with
antenna selection, Proc. Allerton Conf. on Communication, Control, and Computing,
Monticello, IL, Oct. 2003.
[34]
I. S. Gradsbteyn, and I. M. Ryzbik, Table of Integrals, Series, and Products, 6th Edition,
Academic Press, 2000.
[35]
[36]
R. W. Heath, and A. Paulraj, Antenna selection for spatial multiplexing systems based on
minimum error rate, Proc. IEEE International Conference on Communications 2001, ICC
01, vol. 7, pp. 2276-2280, June 2001.
[37]
[38]
[39]
[40]
[41]
Y. Jiang, X. Zheng and J. Li, Asymptotic performance analysis of V-BLAST, Proc. 2005
IEEE Global Communications Conference (GLOBECOM), St. Louis, MO, Nov. 2005.
[42]
Asilomar Conference on Signals, Systems and Computers, 2002, vol. 2, pp. 1518 -1522, Nov.
3-6, 2002.
[43]
[44]
[45]
[46]
[47]
B. Li, D. Xie, S. Cheng, J. Chen, P. Zhang, W. Zhu, and B. Li, "Recent advances on TDSCDMA in China," IEEE Communications Magazine, Jan. 2005.
[48]
[49]
[50]
S. Loyka, and F. Gagnon, Analytical framework for outage and BER analysis of the VBLAST algorithm, Proc. International Zurich Seminar on Communications (IZS), pp. 120123, Feb. 2004.
[51]
[52]
A. F. Molisch, and M. Z. Win, MIMO systems with antenna selection-an overview, IEEE
Microwave Magazine, vol. 5, no. 1, pp 46-56, Mar. 2004.
[53]
[54]
[55]
[56]
R. U. Nabar, D. A. Gore, and A. J. Paulraj, Optimal selection and use of transmit antennas in
wireless systems, Proc. Int. Conf. on Telecommunications, Acapulco, Mexico, May, 2000.
[57]
R. Narasimhan, Spatial Multiplexing with transmit antenna and constellation selection for
correlated MIMO fading channels, IEEE Trans. Signal Processing, vol. 51, no. 11, pp.
2829-2838, Nov 2003.
[58]
Nelder, J.A. and R. Mead, "A Simplex Method for Function Minimization," Computer J.,
Vol.7, pp 308-313, 1965.
158
[59]
[60]
B. O'Hara and A. Petrick, "The IEEE 802.11 Handbook: A Designer's Companion", 2nd ed.,
IEEE Standards Publications (2005).
[61]
Z. Pan, K.-K. Wong, and T.-S. Ng, "Generalized multiuser orthogonal space-division
multiplexing," IEEE Trans. Wireless Commun., vol. 3, no. 6, pp. 1969-1973, Nov. 2004.
[62]
[63]
[64]
[65]
D. Pedoe, A Course of Geometry for Colleges and Universities, Cambridge: University Press,
1970.
[66]
N. Prasad and M. K. Varanasi, Analysis of decision feedback detection for MIMO Rayleigh
fading channels and optimization of power and rate allocations, IEEE Trans. Info. Theory,
vol. 50, no. 6, pp. 1009-1025, June 2004.
[67]
[68]
[69]
[70]
[71]
H. Sato, An outer bound on the capacity region of broadcast channel, IEEE Trans. on Info.
Theory, vol. 24, pp. 374-377, May 1978.
[72]
[73]
M. Schubert, and H. Boche, Solution of the multiuser downlink beamforming problem with
individual SINR constraints, IEEE Trans. Vehicular Technology, vol. 53, no. 1, pp. 18-28,
Jan. 2004.
[74]
[75]
S. Serbetli, and A. Yener, Transceiver optimization for multiuser MIMO systems, IEEE
Trans. Signal Processing, vol. 52, pp. 214-226, Jan. 2004.
159
[76]
S. Shamai and B. M. Zaidel, Enhancing the cellular downlink capacity via co-processing at
the transmission end, Proc. 2001 Spring IEEE Vehicular Technology Conf., pp. 1745-1749,
Rhodes, Greece, May 2001.
[77]
[78]
D. Shiu, G. J. Foschini, M. J. Gans and J. M. Kahn, Fading correlation and its effect on the
capacity of multielement antenna systems, IEEE Trans. on Communications, vol. 48, no. 3,
pp. 502-513, March 2000.
[79]
M. K. Simon, and M. S. Alouini, Digital Communications over Fading Channels, New York:
John Wiley, 2000.
[80]
Q. H. Spencer, and M. Haardt, Capacity and downlink transmission algorithms for a multiuser MIMO channel, Conference Record of the Thirty-Sixth Asilomar Conference on
Signals, Systems and Computers, vol. 2, pp. 1384-1388, Nov. 2002.
[81]
[82]
W.-H. Steeb, Matrix calculus and Kronecker product with applications and C++ programs,
World Scientific, 1998.
[83]
[84]
[85]
A Tarighat, M. Sadek, and A. H. Sayed, A multi user beamforming scheme for downlink
MIMO channels based on maximizing signal-to-leakage ratios, Proc. IEEE International
Conference on Acoustics, Speech, and Signal Processing (ICASSP), vol. 3, pp. 1129-1132,
Philadelaphia, PA, March 2005.
[86]
[87]
[88]
[89]
[90]
160
[91]
[92]
[93]
[94]
[95]
[96]
K.-K. Wong; R. D. Murch, R.S.-K. Cheng, and K. B. Letaief, Optimizing the spectral
efficiency of multiuser MIMO smart antenna systems, Proc. IEEE Conference on Wireless
Communications and Networking, vol. 1, pp. 426-430, Chicago, IL Sept. 2000.
[97]
K.-K. Wong, R. S.-K. Cheng, K. B. Letaief, and R. D. Murch Adaptive antennas at the
mobile and base stations in an OFDM/TDMA system, IEEE Trans. Communications, vol.
49, no. 1, pp. 195-206, Jan. 2001.
[98]
[99]
[100]
W. Yu, and J. Cioffi, Trellis precoding for the broadcast channel, Proc. IEEE Global
Telecommunications Conference, 2001. GLOBECOM 01, vol. 2, pp. 1344-1348, Nov. 2001.
[101]
W. Yu, W. Rhee, S. Boyd, and J. M. Ciofli, Iterative water-filling for Gaussian vector
multiple access channels, Proc. 2001 IEEE International Symposium on Information
Theory, pp. 322, Washington, DC, 24-29 June. 2001.
[102]
W. Yu, A dual decomposition to the sum power Gaussian vector multiple access channel
sum capacity problem, Proc. 2003 IEEE Conference on Information Sciences and Systems,
the Johns Hopkins University, March, 2003.
[103]
J. Zhang, Y. Wu, S. Zhou, and J. Wang, Joint linear transmitter and receiver design for the
downlink of multuser MIMO systems, IEEE Communication Letters, vol. 9, no. 11, pp. 991993, Nov. 2005.
[104]
161
[105]
IEEE P802.11n/D1.0: Draft Amendment to Wireless LAN Media Access Control (MAC) and
Physical Layer (PHY) Specifications: Enhancements for Higher Throughput, Mar. 2006.
[106]
Draft IEEE Standard for LAN/MAN, Part 16: Air Interface for Fixed and Mobile Broadband
Wireless Access Systems, IEEE P802.16e/D12, Dec. 2005.
[107]
IEEE P802.11 Wireless LANs TGn Channel Models, IEEE 802.11-03/940r4, May 2004.
[108]
H. Zhang, and H. Dai, Chap 6: Cellular Networks: Design fundamentals and interference
mitigation, Modeling and Simulation of Wireless Networks: analysis, evaluation and
enhancement of QoS for wireless multimedia, Nova Science, to appear 2006.
[109]
H. Zhang, H. Dai, Q. Zhou, and B. L. Hughes, Transmit antenna selection for spatial
multiplexing systems: a geometrical approach, IEEE Trans. Info. Theory, submitted and
revised.
[110]
[111]
[112]
[113]
H. Zhang, and H. Dai, Fast MIMO transmit antenna selection algorithms: a geometric
approach, IEEE Communication Letters, to appear.
[114]
[115]
[116]
H. Zhang, and H. Dai, Fast transmit antenna selection algorithms for MIMO systems with
fading correlation, Proc. Vehicular Technology Conference, Fall 2004, VTC Fall 04, Sept.
2004.
[117]
H. Zhang, H. Dai and B. L. Hughes, On the diversity-multiplexing tradeoff for ordered SIC
receivers over MIMO channels, 2006 IEEE International Conference on Communications
(ICC), Istanbul, Turkey, June 2006.
[118]
H. Zhang, and H. Dai, On the diversity order of transmit antenna selection for spatial
multiplexing systems, Proc. IEEE Global Telecommunications Conference, GLOBECOM
2005, Nov. 2005.
[119]
H. Zhang and H. Dai, A Geometrical Analysis on Transmit Antenna Selection for Spatial
Multiplexing Systems with Linear Receivers, Proc. 2005 IEEE International Symposium on
Information Theory (ISIT), Adelaide, Australia, Sept. 2005.
162
[120]
H. Zhang, N. B. Mehta, A. F. Molisch, J. Zhang, and H. Dai, Base station cooperation with
asynchronous interference in downlink multiuser MIMO cellular networks, submitted to ICC
07.
[121]
H. Zhang, and H. Dai, Delay constrained multiuser scheduling schemes based on upperlayer performance, Proc. IEEE Wireless Communications and Networking Conference
2006, WCNC 06, Apr. 2006.
[122]
H. Zhang, H. Dai and Q. Zhou, Base station cooperation for multiuser MIMO: joint
transmission and BS selection, Proc. 2005 Conference on Information Sciences and
Systems, CISS05, John Hopkins University, Mar. 2005.
[123]
H. Zhang, and H. Dai, On the capacity of distributed MIMO systems, Proc. 2004
Conference on Information Sciences and Systems, CISS 04, Princeton University, Mar. 17-19,
2004.
163
Appendix
164
Appendix A
Proof of Lemma 2.1
Proof: Suppose subset U j is selected following an arbitrary antenna selection rule, which
may be channel dependent. Given any channel realization H , let the corresponding selected
( j)
antenna subset be H j (as in (2.2)). Let random variable Rmin
denote the minimum squared
projection height for this antenna selection rule (c.f. (2.7)). We claim that the optimal
diversity order achieved for this antenna selection rule is given by
( j)
log Pr( Rmin
x)
.
x 0
log( x)
d (Lj ) = lim
(A.1)
( j)
with probability 1, the lemma
Since our antenna selection rule (2.10) dictates RSL Rmin
readily follows.
The claim of (A.1) is proved as follows. Let us consider a linear ZF receiver first. For
block fading channels, given any channel realization H , let Pe( j ) ( H) and Pel( j ) (H) denote
the conditional error probability of the whole frame and the lth substream, respectively,
assuming optimal one-dimensional coding for each substream. The worst link, with
)
conditional error probability Pe(_jmax
(H ) = max Pel( j ) (H) , has instantaneous post-detection
l
SNR
0 ( j )
Rmin (H ) 9. The corresponding average error probabilities are denoted as Pe( j ) , Pel( j )
L
)
and Pe(_jmax
. Clearly we have
( j)
( j)
Rmin
(H ) refers to the realization of Rmin
with respect to H .
165
)
Pe(_jmax
(H ) Pe( j ) (H) Pel( j ) (H ) ,
(A.2)
l =1
which leads to
L
)
max Pel( j ) Pe(_jmax
Pe( j ) Pel( j ) .
l
(A.3)
l =1
Since the upper and lower bounds above bear the same diversity order [104][89], we have
)
)
Pe( j ) Pe(_jmax
E { Pe(_jmax
(H )} .
(A.4)
)
It is known from Lemma 5 of [104] that the error probability Pe(_jmax
is (uniformly) lower
( j)
bounded by the corresponding outage probability, given by Pr log 1 + 0 Rmin
R0 ,
L
where R0 is the fixed data rate (see Section 2.2.2). Therefore the diversity order is upper
bounded by
d (ZFj)
( j ) L R0
log Pr Rmin
(2 1)
( j)
0
log Pr( Rmin
x)
lim
= lim
.
0
x
0
log( 0 )
log( x)
(A.5)
The above error probability lower bound is obtained without specifying any coding
scheme. On the other hand, the error probability with uncoded square M-QAM signaling can
serve as an upper bound [68][104]:
)
)
Pe(_jmax
Pe(_jmax_
QAM 4 P ( s0 s1 ) ,
(A.6)
where P( s0 s1 ) denotes the pairwise error probability between two closest QAM
constellation points. By Eq. (21) in [104], we have
166
3
( j)
P( s0 s1 ) P 0 Rmin
< 1 .
M 1
L
(A.7)
We therefore obtain
( j)
log Pr( Rmin
x)
,
x 0
log( x)
d (ZFj) lim
(A.8)
and thus have proved the claim of (A.1) for a linear ZF receiver. An immediate conclusion
from analysis above is that, one-dimensional channel coding has no impact on system
diversity order.
Note that the above analysis (see (A.3)) also indicates that
( j)
log Pr( Rmin
x)
x 0
log( x)
d (ZFj) = lim
)
log Pr( min { k( ,jZF
} 1)
k =1L
= lim
log(1/ 0 )
)
log Pr( k( ,jZF
1)
= min lim
k =1L 0
(A.9)
(A.10)
log(1/ 0 )
MMSE
( j)
= lim
)
log Pr( min { k( ,jMMSE
} 1)
k =1L
log(1/ 0 )
)
log Pr( k( ,jMMSE
1)
= min lim
log(1/ 0 )
k =1L 0
(A.11)
0 ( j ) H
(hk )
L
( j)
I H k
(( H )
( j) H
k
167
H (k j )
(H )
( j) H
k
( j)
hk ,
(A.12)
( j)
k , MMSE
1
H
0 ( j ) H
L
( j)
( j) H
( j)
= ( h k ) I H k ( H k ) H k + I ( H (k j ) ) h (k j ) .
L
0
( j)
k , MMSE
( j)
k , ZF
= (h
(A.13)
, we have
( j) H
k
H A
( j)
k
( j)
k
L ( j)
( j)
( j) H
( j)
( j)
A k + I A k ( H k ) h k k ( 0 ) .
(A.14)
(A.15)
)
Another key observation is that, k( j ) ( 0 ) is statistically independent with k( ,jZF
, as the latter
is proportional to the squared norm of the projection of h (k j ) onto the null space of ( H (k j ) ) ,
T
while the former is the correlation of h (k j ) with a vector in the range of H (k j ) [55][35].
Furthermore, as 0 , it can be shown that
a .s .
k( j ) ( 0 ) k( j ) ,
(A.16)
i.e., it converges almost surely to a positive random variable with finite mean. This
observation was also made in [37] where the PDF of k( j ) was explicitly given. For our
purpose, it is sufficient to know that Pr(k( j ) 1/ 2) is a positive probability of O(1) (the
same order as 1). We thus have
168
)
log Pr( k( ,jMMSE
1)
log(1/ 0 )
)
log Pr( k( ,jZF
+ k( j ) ( 0 ) 1)
log(1/ 0 )
)
log Pr( k( ,jZF
1/ 2)
log(1/ 0 )
log Pr(k( j ) ( 0 ) 1/ 2)
+
log(1/ 0 )
(A.17)
with
log Pr( k( j ) ( 0 ) 1/ 2)
log Pr( k( j ) 1/ 2)
= lim
=0,
0
0
log(1/ 0 )
log(1/ 0 )
lim
(A.18)
where (A.18) is due to the fact that almost sure convergence always leads to convergence in
distribution. (A.17) and (A.18) together gives rise to
)
)
Pr( k( ,jMMSE
1) Pr( k( ,jZF
1) ,
(A.19)
169
Appendix B
Lemmas Used for Proving Theorem 2.1
Lemma B.1: For any permutation of the integer array 1 ~ NT , denoted as k1 ~ k NT , we have
k
T 1) NT
k
T 1) NT
(B.1)
Proof: Essentially Rki ki+1 is only a function of h ki and h ki+1 , denoted as Rki ki+1 = g (h ki , h ki+1 ) ,
therefore the conditional PDF of
sequence admits:
f ( Rki ki+1 | Rki1ki , , Rk1k2 ) = f ( g (h ki , h ki+1 ) | g (h ki1 , h ki ), , g (h k1 , h k2 ))
where the second equality holds because the states of h k1 ~ h ki1 do not affect h ki and h ki+1 .
Consequently, the above sequence forms a Markov chain.
We are left to prove the independence between
Rki ki+1 = h ki
2
Rki1ki . Given
sin 2 ki+1ki and Rki1ki = h ki1 sin 2 ki1ki , together with the independence between
2
h ki and h ki1 , and between vector norms and directions (angles) [55], we only need to
170
invariant) and is independent with ki , [h ki1 , h ki+1 ] is still i.i.d. Gaussian. Because ki+1ki and
ki1ki are unchanged after the rotation, and equal to the angles between h ki+1 and e1 , and
between h ki1 and e1 , respectively (see Figure B-1), given the fact that h ki+1 and h ki1 are
independent, it is straightforward to show that ki+1ki and ki1ki are independent, so are
Rki ki+1 and Rki1ki , and Lemma B.1 follows.
171
CorollaryB.1: 12 , 13 , , 1NT are jointly independent.
Proof: Using the same rotation approach as above, if we rotate [h1 , h 2 , , h NT ] as a whole
such that h1 is parallel to e1 , h 2 , , h NT are jointly independent vectors; their angles with e1 ,
which are equal to 12 , 13 , , 1NT , respectively, are also jointly independent.
nk
K
Pr k x x k =1 .
k =1
(B.2)
Proof: At first we evaluate the exponential behavior of Pr(1 + 2 x) . Note that the
following expression assumes x 0 :
x 1
Pr(1 + 2 x) = f2 ( 2 )d 2 f1 (1 )d1
0
0
f ( ) F ( x )d
1
n1 1
1
x
n2
+ o(1n1 1 ) . ( x 1 ) n2 + o(( x 1 ) n2 ) d1
n1 1
1
x n1 + n2 ,
172
+ o(1n1 1 ) d1
n0 nk
K
Pr m k x Pr m max k x x k =1 .
k
k =1
(B.3)
nk
Pr[max k x] = Fk ( x) x k =1 .
k
(B.4)
k =1
nk
K
Pr k x x k =1 .
k =1
(B.5)
n0 nk
nk
Pr[m(max k ) x] = Pr[max k m ( x)] [m ( x)] k =1 x k =1 .
1
173
(B.6)
Similarly,
K
n0 nk
K
Pr m k x x k =1
k =1
(B.7)
Lemma B.4:
Pr(ab1 x) Pr(ab2 x) x na .
(B.8)
Proof: We have
1
x
Pr(ab1 x) = Pr(a ) f b1 ( y ).dy
y
0
=
x
x
0 Pr(a y ) fb1 ( y).dy + Pr(a y ) fb1 ( y ).dy
(B.9)
and similarly,
Pr(ab2 x) =
x
x
0 Pr(a y ) fb2 ( y).dy + Pr(a y ) fb2 ( y).dy
(B.10)
f b2 ( x) = c2 x nb 1 + o( x nb 1 )
(B.11)
x
Since Pr(a ) is positive, and is a decreasing function of y, when x 0 we have
y
1
x
x
t12 ( x) Pr(a ) fb1 ( y ).dy Pr(a ) x na .
(B.12)
(B.13)
x
t11 ( x) t21 ( x) Pr(a ) y nb 1.dy .
0
y
(B.14)
If t12 ( x ) > x na or t22 ( x ) > x na , t11 ( x ) t21 ( x ) x na dominate and (B.8) follows. We are left
to check the case t12 ( x ) t22 ( x ) x na , which together with (B.14) leads to (B.8) as well.
175
Proof: From (2.18)(2.32) the PDF of '0 = max '1k is derived through results in order
k
statistics:
f '0 ( ) =
where C =
M
[sin 2 ]M 1 sin 2 ,
NT 1
C
(B.15)
F sin
M
= NT 1
C
F sin
z
t = sin
2
M
=
C NT 1
t1 =
f ' ( ).d
0
[sin 2 ]M 1 sin 2 .d
a0
x M 1
0 Fz t t .dt
(B.16)
t
a0
1
( x / a0 ) M 1
Ma0M
= NT 1 Fz
t1 .dt1 ,
C
t1
0
where a0 = sin 2 0 is a positive real number. On the other hand, by applying (2.37) we have
Pr( z sin 2 0 x) =
/2
=M
x
Fz 2 f0 ( ).d
sin
/2
t = sin 2
x
Fz 2
sin
M 1
2
[sin ] sin 2 .d
(B.17)
x
= M Fz t M 1.dt.
t
0
By comparing (B.16) and (B.17), we get Pr( z sin 2 '0 x) Pr( z sin 2 0 x) .
176
Appendix C
The Derivation of (2.38)
We continue the evaluation of (B.17) to derive the polynomial expansion of Pr( z sin 2 0 x) :
1
x
Pr( z sin 0 x) = M Fz t M 1.dt
t
0
2
m =1/ t
= M Fz ( mx )
1
m M +1
.dm
(C.1)
M + NT 2
mk xk 1
= M 1 e mx
.dm
k ! m M +1
k =0
1
= 1 P1 ( x) P2 ( x),
where
P1 ( x) = M
k =0
xk
EM +1k ( x)
k!
and
P2 ( x) = M
M + NT 2
k = M +1
xk
E ( k M 1) ( x)
k!
with
e xm
Ek ( x) = k dm the integral exponential function. From [34], we have the following
m
1
recursive rules:
Ek +1 ( x) =
1 x
(e xEk ( x))
k
Ek +1 ( x) =
e x
k!
k 1
(1)i (k i 1)! xi +
i =0
(1) k k
x E1 ( x).
k!
P1 ( x) = Me x ck x k ,
k =0
177
where ck =
i =0
(1) k i ( M k 1)!
, for k M 1 . We can expand e x by its Taylors series
( M i )!i !
=M
n
(1)n k
1
k (1)i M
=
i
n ! k =0 M 1 i =0
k
n
n n
(
1)
1 n
k (1) k M 1
=
n ! k =0 M 1
k
(1) n
=
n!
(1)
k =0
n=0
n 1,
=
k 0, 0 < n M 1,
M
k M 1
= (1)
. With a similar approach, we
i
k
(1)
i
i =0
can obtain aM =
1
, therefore
M!
P1 ( x) = 1
1 M
x + o( x M ) .
M!
(C.2)
M + NT 2
k = M +1
(k M 1)! k M 1 x i + M
k!
i =0 i !
178
where bM = M
NT 3
(C.3)
k!
k!
( M + k + 1)! = M ( M + 1)! ,
k =1
therefore
NT 3
k =0
k!
k!
<
( M + k + 1)! k =0 ( M + k + 1)!
k!
1
1
1
1
,
+
=
+
=
( M + 1)! M ( M + 1)! ( M + 1)! M .M !
k =1 ( M + k + 1)!
179
Appendix D
Lemma Used for Proving Proposition 2.5
Lemma D.1: For any NT L + 1 distinct integers within [1, NT ] , denoted as an ordered list
k1 ~ k NT L +1 , and any NT L + 1 different subsets from U1 ~ U NU , denoted as an ordered list
U j1 ~ U jN
T L +1
(j
)
Pr Rk(1j1 ) x, Rk(2j2 ) x, , Rk N NTL+L1+1 x = Pr( Rk(1j1 ) x)
T
( NT L +1)
(D.1)
where Rk( j ) is modified from Rk( j ) with k indicating the index of column vector in the original
channel matrix H , instead of H j 10.
Proof: From the definition, Rk(1j1 ) = Ph k1 , where P = I BB is the projection matrix to the
2
}{
Rk(1j1 ) = VV H h k1
180
= V H h k1 ,
(D.2)
where the second equality follows by the fact that a unitary transformation preserves length.
From the definition of P , the unitary matrix V H is independent of h k1 . Therefore the
conditional PDF
f Rk(1j1 ) | U j1 \ h k1
}) = f ( V
h k1
) = f ( h ) = f ( R ) ,
2
k1
( j1 )
k1
{U
(D.3)
j1
\ h k1 , and
the second equality comes from the rotationally invariant property of the i.i.d. Gaussian
10
Lemma B.1 is a special case of Lemma D.1. However, the proof of Lemma B.1 bears some interesting
geometric elements, and is needed for Corollary B.1 and Proposition 2.2.
181
Appendix E
Derivation of JWF Solution in (4.25)
Using matrix calculus [82], the optimal precoding matrices, {Tk(b ) }k =1..K ,b =1... B , to be used by
each of the B BSs for all the K MSs are the solutions of the following set of Lagrangian
equations
A
=2
Tk(b )
j b=1
( jk )
( bb) ( b ) H
H j H (jb) Tk(b)
kj
, for b = 1,..., B .
(E.1)
=0
where
bki = U kH H kH H k U k
ii
NT B
equation
i =1
NT B
} (
i =1
Therefore
ki
= PT .
( x + bki ) 2
182
is
one
of
the
ki
,
2
k + bki )
roots
of
the
Appendix F
Derivations of JWF and JLS Solutions in (4.35), (4.36), and (4.37)
1. Modified JWF solution: In (4.34), the mean value of MSEk , obtained by averaging over
{ k(b ) } , can be shown to be:
MSEk = Trace k(b )2 H (kb ) Tk(b ) Tk(b ) H H (kb ) H k(b ) H (kb ) Tk(b ) + Tk(b ) H H (kb ) H + ( N 0 + 1)I N R
b =1
b =1
(F.1)
j k ( b1,b 2)
( b1,b 2)
In a manner similar to (4.35) and (4.36), maximizing the Lagrange objective function,
) MSE +
k =1
k =1
B (b ) H (b )
Trace Tk Tk PT ,
b =1
results in (E.1).
2. Modified JLS solution: From (4.34), the power of received desired signal component at
MS k, averaged over {k(b ) } , is given by
Pk =
PT
1
E ( b ) Trace ( Q kH kH H kH H k k Q k ) = Trace ( Q kH M k Q k ) ,
Lk {k }
Lk
where Mk follows from (4.37). When x k is transmitted for MS k, the jitter-statisticsaveraged MUI power it causes at MS j ( j k ) is given by
PL _ kj =
PT
Lk
( b1,b 2)
PT
Lk
( b1,b 2)
Deriving a corresponding lower bound (as in (4.29)) for modified SLNR expression,
SLNRk =
Pk
K
PNk + PL _ kj
j =1
184