Distributed Scheduling for Achieving Multi-User Diversity (Capacity of Opportunistic Scheduling in Heterogeneous Networks)

Size: px
Start display at page:

Download "Distributed Scheduling for Achieving Multi-User Diversity (Capacity of Opportunistic Scheduling in Heterogeneous Networks)"

Transcription

1 Distributed Scheduling for Achieving Multi-User Diversity (Capacity of Opportunistic Scheduling in Heterogeneous Networks) Sefi Kampeas, Ben-Gurion University Joint work with Asaf Cohen and Omer Gurewitz IL-Nets, May 2012

2 Outline 1 Introduction Objective Informal Definition and Related Work 2 Preliminaries Single User MIMO Capacity Gaussian Approximation 3 Point Process Approximation A Distributed Algorithm 4 Heterogeneous Users Expected Capacity QoS 5 Collision Avoidance Collision Avoidance Algorithm

3 Objective Problem: K non-uniform users. Each user is interested in gaining access to a shared medium.

4 Objective Problem: K non-uniform users. Each user is interested in gaining access to a shared medium.

5 Objective: Maximize resource utilization Whom should we give an access to? Under QoS constraints. Under fairness constraints.

6 Channel Model: y = Hx + n y C r is the received vector and r is the number of receiving antennas. x C t is the transmitted vector with total power constraint P, and t is the number of transmitting antennas. H C r t - complex Gaussian channel matrix, with i.i.d. entries, with independent real and imaginary parts, zero mean and variance 1/2. n C r - uncorrelated complex Gaussian noise, with independent real and imaginary parts, zero mean, variance 1. Base Station User H rxt User User User User User For non-uniform users, the channel matrix H of each user is drawn under a different distribution (e.g. mean and variance).

7 Channel Model: y = Hx + n y C r is the received vector and r is the number of receiving antennas. x C t is the transmitted vector with total power constraint P, and t is the number of transmitting antennas. H C r t - complex Gaussian channel matrix, with i.i.d. entries, with independent real and imaginary parts, zero mean and variance 1/2. n C r - uncorrelated complex Gaussian noise, with independent real and imaginary parts, zero mean, variance 1. Base Station User H rxt User User User User User For non-uniform users, the channel matrix H of each user is drawn under a different distribution (e.g. mean and variance).

8 Related Work: i.i.d. users Knopp & Humblet 95: Allocate more power when channel is good. Yoo & Goldsmith 06: ZFBF with user selection. Chen & Wang 06: Choose user with the maximal minimum eigenvalue of HH. Sharif & Hassibi 07: Scaling laws comparing maximal user scheduling to DPC. Choi & Andrews 08: Base station scheduling using EVT. Qin & Berry 03,06: Threshold-based. Qin & Berry, To & Choi 10: Splitting-based algorithms to reduce the channel contention. Main themes EVT/Order statistics; i.i.d. users/stations; Perfect CSI at transmitter; Collision detection in the splitting algorithms.

9 Outline Main Contribution A novel method to achieve expected capacity results under distributed, threshold-based scheduling algorithms. Approximation is based on the Poisson Point Process approximation. A simple method to reproduce existing results. Derive new expressions for the heterogeneous and QoS scenarios. Suggest and analyze a new variant of the splitting algorithm.

10 MIMO Capacity Approximation (Smith & Shafi 02) Assuming that the elements of H are i.i.d. zero-mean with finite moments. Gaussian approximation to the capacity is accurate for virtually all values of r and t. f c 14 m Ρ C log 2 1 Λ i i 1 m C Figure : Singe user MIMO capacity PDF: with m = 32 transmitting antennas and n = 128 receiving antennas vs. Gaussian Distribution with µ = 2 and σ = 0.03.

11 Extreme Value Theory Let x 1,..., x n be n i.i.d. random variables. Define M n = max i x i. If there exist a sequence of normalizing constants a n > 0 and b n such that as n, Pr(M n a n x + b n ) i.d. G(x) then G is of the generalized extreme value distribution type G(x) = exp { (1 + ξx) 1/ξ} If {x i } are Gaussian, Pr(M n a n x + b n ) e e x where a n = (2 log n) 1/2 b n = (2 log n) 1/2 1 2 (2 log n) 1/2 (log log n + log 4π).

12 Extreme Value Theory Let x 1,..., x n be n i.i.d. random variables. Define M n = max i x i. If there exist a sequence of normalizing constants a n > 0 and b n such that as n, Pr(M n a n x + b n ) i.d. G(x) then G is of the generalized extreme value distribution type G(x) = exp { (1 + ξx) 1/ξ} If {x i } are Gaussian, Pr(M n a n x + b n ) e e x where a n = (2 log n) 1/2 b n = (2 log n) 1/2 1 2 (2 log n) 1/2 (log log n + log 4π).

13 Extreme Value Theory Let x 1,..., x n be n i.i.d. random variables. Define M n = max i x i. If there exist a sequence of normalizing constants a n > 0 and b n such that as n, Pr(M n a n x + b n ) i.d. G(x) then G is of the generalized extreme value distribution type G(x) = exp { (1 + ξx) 1/ξ} If {x i } are Gaussian, Pr(M n a n x + b n ) e e x where a n = (2 log n) 1/2 b n = (2 log n) 1/2 1 2 (2 log n) 1/2 (log log n + log 4π).

14 Extreme Value Theory Let x 1,..., x n be n i.i.d. random variables. Define M n = max i x i. If there exist a sequence of normalizing constants a n > 0 and b n such that as n, Pr(M n a n x + b n ) i.d. G(x) then G is of the generalized extreme value distribution type G(x) = exp { (1 + ξx) 1/ξ} If {x i } are Gaussian, Pr(M n a n x + b n ) e e x where a n = (2 log n) 1/2 b n = (2 log n) 1/2 1 2 (2 log n) 1/2 (log log n + log 4π).

15 Max Capacity 50 f c Block Max Capacity Distribution C Figure : Maximal capacity PDF: maximum among 500 drawings which follow the Gaussian distribution, with µ = 2 and σ = The red line is the Gumbel density.

16 Extreme Value Theory - Application Capacities are approximately Gaussian. Assuming capacity follows normal distribution with µ and σ. If we schedule the best user in each time slot we get: [ ] ( ) E max C i = σ(2 log K) µ + O 1 i K log K With agreement with Choi & Andrews 08. Challenges What if the users are not identically distributed? Can we achieve this distributively?

17 Extreme Value Theory - Application Capacities are approximately Gaussian. Assuming capacity follows normal distribution with µ and σ. If we schedule the best user in each time slot we get: [ ] ( ) E max C i = σ(2 log K) µ + O 1 i K log K With agreement with Choi & Andrews 08. Challenges What if the users are not identically distributed? Can we achieve this distributively?

18 Outline 1 Introduction Objective Informal Definition and Related Work 2 Preliminaries Single User MIMO Capacity Gaussian Approximation 3 Point Process Approximation A Distributed Algorithm 4 Heterogeneous Users Expected Capacity QoS 5 Collision Avoidance Collision Avoidance Algorithm

19 A Threshold Based Distributed Algorithm Set a high threshold u, such that only a small fraction of the user will pass. Each user estimates his channel capacity. Only a user with capacity greater than threshold can transmit. Definition: unutilized slot Slot is unutilized if it idle or collision occurred. Alg. Properties Completely Distributed. Does not require channel reports.

20 A Threshold Based Distributed Algorithm Set a high threshold u, such that only a small fraction of the user will pass. Each user estimates his channel capacity. Only a user with capacity greater than threshold can transmit. Definition: unutilized slot Slot is unutilized if it idle or collision occurred. Alg. Properties Completely Distributed. Does not require channel reports.

21 A Threshold Based Distributed Algorithm Set a high threshold u, such that only a small fraction of the user will pass. Each user estimates his channel capacity. Only a user with capacity greater than threshold can transmit. Definition: unutilized slot Slot is unutilized if it idle or collision occurred. Alg. Properties Completely Distributed. Does not require channel reports.

22 Threshold Algorithm Performance Proposition The expected capacity of the above algorithm is C av = Pr (utilized slot) E[C C > u] where u is a high threshold such that a small fraction of the users will exceed it. u can be computed by ierfc. We should then find optimal threshold u. Point process motivation When threshold is high, exceedances are rare. We wish to examine these rare occurrences. Point process is an elegant way to model rare events.

23 Threshold Algorithm Performance Proposition The expected capacity of the above algorithm is C av = Pr (utilized slot) E[C C > u] where u is a high threshold such that a small fraction of the users will exceed it. u can be computed by ierfc. We should then find optimal threshold u. Point process motivation When threshold is high, exceedances are rare. We wish to examine these rare occurrences. Point process is an elegant way to model rare events.

24 Point Process Approximation x 1,..., x n is a sequence of i.i.d. random variables with distribution function F (x). max i {x 1,..., x n } is converging to G, with normalizing constants a n and b n. We construct a sequence of point processes Definition (Point Process) P n = {( i n, x ) } i b n, i = 1, 2,..., n, P n [0, 1] R a n Only large points of the process are retained in the limit process, whereas all points x i = o(b n ) can be normalized to same floor value b l.

25 Point Process Approximation x 1,..., x n is a sequence of i.i.d. random variables with distribution function F (x). max i {x 1,..., x n } is converging to G, with normalizing constants a n and b n. We construct a sequence of point processes Definition (Point Process) P n = {( i n, x ) } i b n, i = 1, 2,..., n, P n [0, 1] R a n Only large points of the process are retained in the limit process, whereas all points x i = o(b n ) can be normalized to same floor value b l.

26 Point Process Approximation x 1,..., x n is a sequence of i.i.d. random variables with distribution function F (x). max i {x 1,..., x n } is converging to G, with normalizing constants a n and b n. We construct a sequence of point processes Definition (Point Process) P n = {( i n, x ) } i b n, i = 1, 2,..., n, P n [0, 1] R a n Only large points of the process are retained in the limit process, whereas all points x i = o(b n ) can be normalized to same floor value b l.

27 Point Process Approximation x 1,..., x n is a sequence of i.i.d. random variables with distribution function F (x). max i {x 1,..., x n } is converging to G, with normalizing constants a n and b n. We construct a sequence of point processes Definition (Point Process) P n = {( i n, x ) } i b n, i = 1, 2,..., n, P n [0, 1] R a n Only large points of the process are retained in the limit process, whereas all points x i = o(b n ) can be normalized to same floor value b l.

28 Point Process Approximation Pn t t Theorem (Kallenberg 83) P n P, a non-homogeneous Poisson process, λ(t, x) = (1 + ξx) 1 ξ 1 +, Λ(B) = b B λ(b)db is the expected number of points in the set B.

29 Point Process Approximation Pn t t Theorem (Kallenberg 83) P n P, a non-homogeneous Poisson process, λ(t, x) = (1 + ξx) 1 ξ 1 +, Λ(B) = b B λ(b)db is the expected number of points in the set B.

30 Point Process Approximation Pn t t Theorem (Kallenberg 83) P n P, a non-homogeneous Poisson process, λ(t, x) = (1 + ξx) 1 ξ 1 +, Λ(B) = b B λ(b)db is the expected number of points in the set B.

31 Point Process Approximation Pn t Point Process for Gaussian Distribution B t Theorem (Kallenberg 83) P n P, a non-homogeneous Poisson process, λ(t, x) = (1 + ξx) 1 ξ 1 +, Λ(B) = b B λ(b)db is the expected number of points in the set B.

32 Usage - Threshold Arrival Rate With B v = [0, 1] (v, ), we have Λ(B v ) = (1 + ξv) 1/ξ + This gives the average exceedance rate over the threshold, that is, the number of exceedances is Poisson with parameter Λ(B v ). Inter arrival time is exponential with parameter 1 Λ(B v ).

33 Usage - Threshold Arrival Rate With B v = [0, 1] (v, ), we have Λ(B v ) = (1 + ξv) 1/ξ + This gives the average exceedance rate over the threshold, that is, the number of exceedances is Poisson with parameter Λ(B v ). Inter arrival time is exponential with parameter 1 Λ(B v ).

34 Usage - Threshold Arrival Rate With B v = [0, 1] (v, ), we have Λ(B v ) = (1 + ξv) 1/ξ + This gives the average exceedance rate over the threshold, that is, the number of exceedances is Poisson with parameter Λ(B v ). Inter arrival time is exponential with parameter 1 Λ(B v ).

35 Usage - Unutilized slot probability Unutilized slot probability Probabilities of idle time and collision can be easily computed. Idle slot Collision slot

36 Usage - Unutilized slot probability Unutilized slot probability Probabilities of idle time and collision can be easily computed. Idle slot Pn t B Point Process for Gaussian Distribution Collision slot t

37 Usage - Unutilized slot probability Unutilized slot probability Probabilities of idle time and collision can be easily computed. Idle slot Collision slot Pn t B Point Process for Gaussian Distribution Pn t B Point Process for Gaussian Distribution t t

38 Usage - Tail Distribution Set u n (v) = a n v + b n, we have Pr (x i > a n x + u n (v) x i > u n (v)) = Pr(P n (t) > x + v P n (t) > v) Pr(P(t) > x + v P(t) > v) Note that Pr(P(t) > x + v P(t) > v) = Λ(Bx+v ) Λ(B v ), As a result, in the Gaussian case, Pr(x u n (v) y x u n (v) > 0) = 1 e y an Conditional capacity is approximately exponential Expected capacity is calculated easily. Future use: Exponential mini-slots above the threshold result in uniform probability.

39 Usage - Tail Distribution Set u n (v) = a n v + b n, we have Pr (x i > a n x + u n (v) x i > u n (v)) = Pr(P n (t) > x + v P n (t) > v) Pr(P(t) > x + v P(t) > v) Note that Pr(P(t) > x + v P(t) > v) = Λ(Bx+v ) Λ(B v ), As a result, in the Gaussian case, Pr(x u n (v) y x u n (v) > 0) = 1 e y an Conditional capacity is approximately exponential Expected capacity is calculated easily. Future use: Exponential mini-slots above the threshold result in uniform probability.

40 Simulation - Tail Distribution f y Capacity Distribution given C threshold y Figure : PDF of Gaussian tail observation out of that exceeded a threshold 3.5, 1 Φ(3.5) of the observations. Green is from a direct analysis (Tylor series), Red is the previous approximation.

41 Summary Corollary The expected capacity obtained by setting a threshold u, such that k strongest users out of K users exceeds u on average, following E[C C > u] = (u + a K + o(a K )) Proposition For a threshold u, such that k strongest users out of K users exceed u on average: Pr ( utilized slot ) = ke k

42 Outline 1 Introduction Objective Informal Definition and Related Work 2 Preliminaries Single User MIMO Capacity Gaussian Approximation 3 Point Process Approximation A Distributed Algorithm 4 Heterogeneous Users Expected Capacity QoS 5 Collision Avoidance Collision Avoidance Algorithm

43 Setting In most systems, users are not i.i.d. - different users may experience different channel distribution. Moreover, users probabilities to access the channel may be changed due to QoS constraints. Straightforward application of the EVT theorem will not hold. In our model: Users may have difference expectation and variance (can be generalized to completely different distributions). Users may have pre-defined channel access probabilities. Using the point process approach, expected system capacity can be calculated.

44 Setting In most systems, users are not i.i.d. - different users may experience different channel distribution. Moreover, users probabilities to access the channel may be changed due to QoS constraints. Straightforward application of the EVT theorem will not hold. In our model: Users may have difference expectation and variance (can be generalized to completely different distributions). Users may have pre-defined channel access probabilities. Using the point process approach, expected system capacity can be calculated.

45 Main Result Theorem The expected capacity when working in single user in each slot in a non-uniform environment follows ( ) K Cav nu (u) = Λe Λ Λ i B[0,1/K] [u, ) (u + σ i a K + o(a K )) Λ where and i=1 ( ) u (σ 1 i b K +µ i ) Λ i B[0,1/K] [u, ) = K e σ i a K, Λ = K Λ i (B [0,1/K] [u, ) ), i=1 u is a threshold greater than zero that we set for all users.

46 Proof Sketch Similar to the uniform case: C nu av (u) = (1 Pr(unutilized slot)) E[C C > u] We now look at K independent drawings from the same user. We have Λ i (B [0,1/K] [up, )) = 1 u (σ i b K +µ i ) K e σ i a K Hence for all users, although non-uniform, the threshold exeedance rate is Λ = 1 u (σ i b K +µ i ) K K i=1 e σ i a K. Idle and collision probabilities can be calculated from ( K ) Pr N i = k i=1 = exp { Λ } Λk k!

47 Proof Sketch Similar to the uniform case: C nu av (u) = (1 Pr(unutilized slot)) E[C C > u] We now look at K independent drawings from the same user. We have Λ i (B [0,1/K] [up, )) = 1 u (σ i b K +µ i ) K e σ i a K Hence for all users, although non-uniform, the threshold exeedance rate is Λ = 1 u (σ i b K +µ i ) K K i=1 e σ i a K. Idle and collision probabilities can be calculated from ( K ) Pr N i = k i=1 { } Λk = exp Λ k! Pn t

48 Proof Sketch Similar to the uniform case: C nu av (u) = (1 Pr(unutilized slot)) E[C C > u] We now look at K independent drawings from the same user. We have Λ i (B [0,1/K] [up, )) = 1 u (σ i b K +µ i ) K e σ i a K Hence for all users, although non-uniform, the threshold exeedance rate is Λ = 1 u (σ i b K +µ i ) K K i=1 e σ i a K. Idle and collision probabilities can be calculated from ( K ) Pr N i = k i=1 { } Λk = exp Λ k! Pn t

49 Proof Sketch Similar to the uniform case: C nu av (u) = (1 Pr(unutilized slot)) E[C C > u] We now look at K independent drawings from the same user. We have Λ i (B [0,1/K] [up, )) = 1 u (σ i b K +µ i ) K e σ i a K Hence for all users, although non-uniform, the threshold exeedance rate is Λ = 1 u (σ i b K +µ i ) K K i=1 e σ i a K. Idle and collision probabilities can be calculated from ( K ) Pr N i = k i=1 { } Λk = exp Λ k! Pn t B

50 Proof Sketch - Cont. As a result, we have Claim The probability of unutilized slot for non-uniform users follows { } Pr( utilized slot ) = Λ exp Λ. For the conditional expected capacity, we have Claim Given that a single arrival to the threshold occurred, then the expected capacity for non-uniform users follows E[C C > u, K N i = 1] = i=1 K i=1 ( ) Λ i B[0,1/K] [up, ) (u + σ i a K + o(a K )). Λ

51 Proof Sketch - Cont. As a result, we have Claim The probability of unutilized slot for non-uniform users follows { } Pr( utilized slot ) = Λ exp Λ. For the conditional expected capacity, we have Claim Given that a single arrival to the threshold occurred, then the expected capacity for non-uniform users follows E[C C > u, K N i = 1] = i=1 K i=1 ( ) Λ i B[0,1/K] [up, ) (u + σ i a K + o(a K )). Λ

52 Simulation Results Cav nuc u u Figure : Expected capacity v.s. threshold u. Blue - Gaussian users follow σ i U[0.03, 3] and µ i U[ 2 1, 2 + 1]. Red - all with the same channel as the strongest. Black - all with the same channel as the mean user.

53 Weighted Users (E.g., QoS) Employing QoS constraints is simply reflected in the exceedance probability of each user. Given probability vector p R K 1, each user sets a threshold. Lemma (Expected Capacity with QoS) C GOS av where = Λ ( p) ( p) Λ e K i=1 ( ) Λ (p i ) i B [0,1/K] [upi, ) Λ ( p) (σ i [ b1/pi a 1/pi log log (1 p i ) + a K ] + µi + o(a 1/pi ) ) Λ (p i ) i (B [0,1/K] [upi, )) = 1 b K +b 1/pi K e a K Λ ( p) = K i=1 ( log(1 p i )) a 1/p i Λ (p i ) i (B [0,1/K] [upi, ))

54 Outline 1 Introduction Objective Informal Definition and Related Work 2 Preliminaries Single User MIMO Capacity Gaussian Approximation 3 Point Process Approximation A Distributed Algorithm 4 Heterogeneous Users Expected Capacity QoS 5 Collision Avoidance Collision Avoidance Algorithm

55 Collision Avoidance If a collision occur, the whole slot is LOST! First, minimize the idle slot probability, Pr(idle) = e k. Next, cope with the resulted collision probability. Minimize idle probability Idle slot probability goes to zero when setting k = log K Pr(idle slot) e log K = 1/K 0.

56 Collision Avoidance If a collision occur, the whole slot is LOST! First, minimize the idle slot probability, Pr(idle) = e k. Next, cope with the resulted collision probability. Minimize idle probability Idle slot probability goes to zero when setting k = log K Pr(idle slot) e log K = 1/K 0.

57 Collision Avoidance - cont. How to deal with log K users on average? Rate users by the distance they reached from the threshold. The set of values above the threshold is divided to l bins (mini slots). A user which passed the threshold checks in which bin he lies. If the bin index is i, it waits i 1 mini-slots and checks the channel. To achieve uniform distribution over the bins, set the bins boundaries by the exponential limit distribution.

58 Collision Avoidance - cont. How to deal with log K users on average? Rate users by the distance they reached from the threshold. The set of values above the threshold is divided to l bins (mini slots). A user which passed the threshold checks in which bin he lies. If the bin index is i, it waits i 1 mini-slots and checks the channel. To achieve uniform distribution over the bins, set the bins boundaries by the exponential limit distribution.

59 Collision Avoidance - cont. How to deal with log K users on average? Rate users by the distance they reached from the threshold. The set of values above the threshold is divided to l bins (mini slots). A user which passed the threshold checks in which bin he lies. If the bin index is i, it waits i 1 mini-slots and checks the channel. To achieve uniform distribution over the bins, set the bins boundaries by the exponential limit distribution.

60 Collision Avoidance - cont. How to deal with log K users on average? Rate users by the distance they reached from the threshold. The set of values above the threshold is divided to l bins (mini slots). A user which passed the threshold checks in which bin he lies. If the bin index is i, it waits i 1 mini-slots and checks the channel. To achieve uniform distribution over the bins, set the bins boundaries by the exponential limit distribution.

61 Collision Avoidance - cont. How to deal with log K users on average? Rate users by the distance they reached from the threshold. The set of values above the threshold is divided to l bins (mini slots). A user which passed the threshold checks in which bin he lies. If the bin index is i, it waits i 1 mini-slots and checks the channel. To achieve uniform distribution over the bins, set the bins boundaries by the exponential limit distribution. P i

62 Alg. performance E C K Figure : Expected capacity v.s. the total number of users K. Bottom line represents the expected capacity for K users with CA, setting threshold that on average log K users pass threshold, placing them into ( log K ) 2 bins. Top line represents the optimal centralized scheme

63 Conclusions A simple way to reproduce existing results. Point process approximation is an elegant way to analyze threshold-based distributed scheduling systems. Using this approach, heterogeneous networks and QoS constraints, previously intractable, can now be handled. Enhanced splitting algorithms, not requiring collision detection, can also be analyzed - see full version on the arxiv. Thank You!

64 Conclusions A simple way to reproduce existing results. Point process approximation is an elegant way to analyze threshold-based distributed scheduling systems. Using this approach, heterogeneous networks and QoS constraints, previously intractable, can now be handled. Enhanced splitting algorithms, not requiring collision detection, can also be analyzed - see full version on the arxiv. Thank You!

Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity

Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity arxiv:202.09v2 [cs.it] 5 Feb 202 Dor-Joseph ampeas, Asaf Cohen and Omer Gurewitz Department of Communication

More information

Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity

Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity Opportunistic Scheduling in Heterogeneous Networks: Distributed Algorithms and System Capacity arxiv:1202.0119v4 [cs.it] 16 Jul 2012 Joseph ampeas, Asaf Cohen and Omer Gurewitz Department of Communication

More information

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland Morning Session Capacity-based Power Control Şennur Ulukuş Department of Electrical and Computer Engineering University of Maryland So Far, We Learned... Power control with SIR-based QoS guarantees Suitable

More information

Chapter 4: Continuous channel and its capacity

Chapter 4: Continuous channel and its capacity meghdadi@ensil.unilim.fr Reference : Elements of Information Theory by Cover and Thomas Continuous random variable Gaussian multivariate random variable AWGN Band limited channel Parallel channels Flat

More information

USING multiple antennas has been shown to increase the

USING multiple antennas has been shown to increase the IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 1, JANUARY 2007 11 A Comparison of Time-Sharing, DPC, and Beamforming for MIMO Broadcast Channels With Many Users Masoud Sharif, Member, IEEE, and Babak

More information

On the Throughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States

On the Throughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States On the hroughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States Andreas Senst, Peter Schulz-Rittich, Gerd Ascheid, and Heinrich Meyr Institute for Integrated

More information

Large System Analysis of Projection Based Algorithms for the MIMO Broadcast Channel

Large System Analysis of Projection Based Algorithms for the MIMO Broadcast Channel Large System Analysis of Projection Based Algorithms for the MIMO Broadcast Channel Christian Guthy and Wolfgang Utschick Associate Institute for Signal Processing, Technische Universität München Joint

More information

A Hilbert Space for Random Processes

A Hilbert Space for Random Processes Gaussian Basics Random Processes Filtering of Random Processes Signal Space Concepts A Hilbert Space for Random Processes I A vector space for random processes X t that is analogous to L 2 (a, b) is of

More information

Space-Time Coding for Multi-Antenna Systems

Space-Time Coding for Multi-Antenna Systems Space-Time Coding for Multi-Antenna Systems ECE 559VV Class Project Sreekanth Annapureddy vannapu2@uiuc.edu Dec 3rd 2007 MIMO: Diversity vs Multiplexing Multiplexing Diversity Pictures taken from lectures

More information

7 Continuous Variables

7 Continuous Variables 7 Continuous Variables 7.1 Distribution function With continuous variables we can again define a probability distribution but instead of specifying Pr(X j) we specify Pr(X < u) since Pr(u < X < u + δ)

More information

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007 Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT ECE 559 Presentation Hoa Pham Dec 3, 2007 Introduction MIMO systems provide two types of gains Diversity Gain: each path from a transmitter

More information

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio

More information

Lecture 7 MIMO Communica2ons

Lecture 7 MIMO Communica2ons Wireless Communications Lecture 7 MIMO Communica2ons Prof. Chun-Hung Liu Dept. of Electrical and Computer Engineering National Chiao Tung University Fall 2014 1 Outline MIMO Communications (Chapter 10

More information

Approximately achieving the feedback interference channel capacity with point-to-point codes

Approximately achieving the feedback interference channel capacity with point-to-point codes Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used

More information

On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling

On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling Ruben de Francisco and Dirk T.M. Slock Eurecom Institute Sophia-Antipolis, France Email: {defranci, slock}@eurecom.fr Abstract

More information

Power Controlled FCFS Splitting Algorithm for Wireless Networks

Power Controlled FCFS Splitting Algorithm for Wireless Networks Power Controlled FCFS Splitting Algorithm for Wireless Networks Ashutosh Deepak Gore Abhay Karandikar Department of Electrical Engineering Indian Institute of Technology - Bombay COMNET Workshop, July

More information

Optimal Transmit Strategies in MIMO Ricean Channels with MMSE Receiver

Optimal Transmit Strategies in MIMO Ricean Channels with MMSE Receiver Optimal Transmit Strategies in MIMO Ricean Channels with MMSE Receiver E. A. Jorswieck 1, A. Sezgin 1, H. Boche 1 and E. Costa 2 1 Fraunhofer Institute for Telecommunications, Heinrich-Hertz-Institut 2

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University

More information

HIERARCHICAL MODELS IN EXTREME VALUE THEORY

HIERARCHICAL MODELS IN EXTREME VALUE THEORY HIERARCHICAL MODELS IN EXTREME VALUE THEORY Richard L. Smith Department of Statistics and Operations Research, University of North Carolina, Chapel Hill and Statistical and Applied Mathematical Sciences

More information

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Jin-Ghoo Choi and Seawoong Bahk IEEE Trans on Vehicular Tech, Mar 2007 *** Presented by: Anh H. Nguyen February

More information

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User

More information

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016

4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 4888 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 7, JULY 2016 Online Power Control Optimization for Wireless Transmission With Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member,

More information

Wideband Fading Channel Capacity with Training and Partial Feedback

Wideband Fading Channel Capacity with Training and Partial Feedback Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu

More information

IN this paper we consider a problem of allocating bandwidth

IN this paper we consider a problem of allocating bandwidth Resource Allocation Under Uncertainty Using the Maximum Entropy Principle Mathias Johansson, Member, IEEE, and Mikael Sternad Senior Member, IEEE Abstract In this paper we formulate and solve a problem

More information

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH : Antenna Diversity and Theoretical Foundations of Wireless Communications Wednesday, May 4, 206 9:00-2:00, Conference Room SIP Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication

More information

The exponential distribution and the Poisson process

The exponential distribution and the Poisson process The exponential distribution and the Poisson process 1-1 Exponential Distribution: Basic Facts PDF f(t) = { λe λt, t 0 0, t < 0 CDF Pr{T t) = 0 t λe λu du = 1 e λt (t 0) Mean E[T] = 1 λ Variance Var[T]

More information

A Conditional Approach to Modeling Multivariate Extremes

A Conditional Approach to Modeling Multivariate Extremes A Approach to ing Multivariate Extremes By Heffernan & Tawn Department of Statistics Purdue University s April 30, 2014 Outline s s Multivariate Extremes s A central aim of multivariate extremes is trying

More information

Overview of Extreme Value Theory. Dr. Sawsan Hilal space

Overview of Extreme Value Theory. Dr. Sawsan Hilal space Overview of Extreme Value Theory Dr. Sawsan Hilal space Maths Department - University of Bahrain space November 2010 Outline Part-1: Univariate Extremes Motivation Threshold Exceedances Part-2: Bivariate

More information

Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels

Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels Yang Wen Liang Department of Electrical and Computer Engineering The University of British Columbia April 19th, 005 Outline of Presentation

More information

SOLUTIONS TO ECE 6603 ASSIGNMENT NO. 6

SOLUTIONS TO ECE 6603 ASSIGNMENT NO. 6 SOLUTIONS TO ECE 6603 ASSIGNMENT NO. 6 PROBLEM 6.. Consider a real-valued channel of the form r = a h + a h + n, which is a special case of the MIMO channel considered in class but with only two inputs.

More information

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California

Energy Optimal Control for Time Varying Wireless Networks. Michael J. Neely University of Southern California Energy Optimal Control for Time Varying Wireless Networks Michael J. Neely University of Southern California http://www-rcf.usc.edu/~mjneely Part 1: A single wireless downlink (L links) L 2 1 S={Totally

More information

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems

Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User MIMO Systems Multi-Input Multi-Output Systems (MIMO) Channel Model for MIMO MIMO Decoding MIMO Gains Multi-User

More information

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1 2005 Conference on Information Sciences and Systems, The Johns Hopkins University, March 6 8, 2005 Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters Alkan

More information

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture)

ECE 564/645 - Digital Communications, Spring 2018 Homework #2 Due: March 19 (In Lecture) ECE 564/645 - Digital Communications, Spring 018 Homework # Due: March 19 (In Lecture) 1. Consider a binary communication system over a 1-dimensional vector channel where message m 1 is sent by signaling

More information

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters Alkan Soysal Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland,

More information

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Rui Wang, Jun Zhang, S.H. Song and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science

More information

ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals

ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals ELEG 5633 Detection and Estimation Signal Detection: Deterministic Signals Jingxian Wu Department of Electrical Engineering University of Arkansas Outline Matched Filter Generalized Matched Filter Signal

More information

Exponential Distribution and Poisson Process

Exponential Distribution and Poisson Process Exponential Distribution and Poisson Process Stochastic Processes - Lecture Notes Fatih Cavdur to accompany Introduction to Probability Models by Sheldon M. Ross Fall 215 Outline Introduction Exponential

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

On the Capacity of MIMO Rician Broadcast Channels

On the Capacity of MIMO Rician Broadcast Channels On the Capacity of IO Rician Broadcast Channels Alireza Bayesteh Email: alireza@shannon2.uwaterloo.ca Kamyar oshksar Email: kmoshksa@shannon2.uwaterloo.ca Amir K. Khani Email: khani@shannon2.uwaterloo.ca

More information

Point Process Control

Point Process Control Point Process Control The following note is based on Chapters I, II and VII in Brémaud s book Point Processes and Queues (1981). 1 Basic Definitions Consider some probability space (Ω, F, P). A real-valued

More information

Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with Partial CSIT

Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with Partial CSIT 1 Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with artial CSIT Kaushi Josiam, Dinesh Rajan and Mandyam Srinath, Department of Electrical Engineering, Southern Methodist

More information

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems

Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and

More information

Multiaccess Communication

Multiaccess Communication Information Networks p. 1 Multiaccess Communication Satellite systems, radio networks (WLAN), Ethernet segment The received signal is the sum of attenuated transmitted signals from a set of other nodes,

More information

Limited Feedback in Wireless Communication Systems

Limited Feedback in Wireless Communication Systems Limited Feedback in Wireless Communication Systems - Summary of An Overview of Limited Feedback in Wireless Communication Systems Gwanmo Ku May 14, 17, and 21, 2013 Outline Transmitter Ant. 1 Channel N

More information

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Half-Duplex Gaussian Relay Networks with Interference Processing Relays Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

NOMA: An Information Theoretic Perspective

NOMA: An Information Theoretic Perspective NOMA: An Information Theoretic Perspective Peng Xu, Zhiguo Ding, Member, IEEE, Xuchu Dai and H. Vincent Poor, Fellow, IEEE arxiv:54.775v2 cs.it] 2 May 25 Abstract In this letter, the performance of non-orthogonal

More information

The Timing Capacity of Single-Server Queues with Multiple Flows

The Timing Capacity of Single-Server Queues with Multiple Flows The Timing Capacity of Single-Server Queues with Multiple Flows Xin Liu and R. Srikant Coordinated Science Laboratory University of Illinois at Urbana Champaign March 14, 2003 Timing Channel Information

More information

Chapter 5. Elementary Performance Analysis

Chapter 5. Elementary Performance Analysis Chapter 5 Elementary Performance Analysis 1 5.0 2 5.1 Ref: Mischa Schwartz Telecommunication Networks Addison-Wesley publishing company 1988 3 4 p t T m T P(k)= 5 6 5.2 : arrived rate : service rate 7

More information

Interactive Interference Alignment

Interactive Interference Alignment Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,

More information

The Optimality of Beamforming: A Unified View

The Optimality of Beamforming: A Unified View The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,

More information

An Analysis of the Preemptive Repeat Queueing Discipline

An Analysis of the Preemptive Repeat Queueing Discipline An Analysis of the Preemptive Repeat Queueing Discipline Tony Field August 3, 26 Abstract An analysis of two variants of preemptive repeat or preemptive repeat queueing discipline is presented: one in

More information

The Water-Filling Game in Fading Multiple Access Channels

The Water-Filling Game in Fading Multiple Access Channels The Water-Filling Game in Fading Multiple Access Channels Lifeng Lai and Hesham El Gamal arxiv:cs/05203v [cs.it] 3 Dec 2005 February, 2008 Abstract We adopt a game theoretic approach for the design and

More information

On the Capacity of Distributed Antenna Systems Lin Dai

On the Capacity of Distributed Antenna Systems Lin Dai On the apacity of Distributed Antenna Systems Lin Dai ity University of Hong Kong JWIT 03 ellular Networs () Base Station (BS) Growing demand for high data rate Multiple antennas at the BS side JWIT 03

More information

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1

requests/sec. The total channel load is requests/sec. Using slot as the time unit, the total channel load is 50 ( ) = 1 Prof. X. Shen E&CE 70 : Examples #2 Problem Consider the following Aloha systems. (a) A group of N users share a 56 kbps pure Aloha channel. Each user generates at a Passion rate of one 000-bit packet

More information

Diversity Combining Techniques

Diversity Combining Techniques Diversity Combining Techniques When the required signal is a combination of several plane waves (multipath), the total signal amplitude may experience deep fades (Rayleigh fading), over time or space.

More information

Delay-Sensitive Packet Scheduling in Wireless Networks

Delay-Sensitive Packet Scheduling in Wireless Networks Delay-Sensitive Packet Scheduling in Wireless Networks Peijuan iu, Randall Berry, Michael. Honig ECE Department, Northwestern University 2145 Sheridan Road, Evanston, I 60208 USA fpeijuan,rberry,mhg@ece.nwu.edu

More information

Secure Multiuser MISO Communication Systems with Quantized Feedback

Secure Multiuser MISO Communication Systems with Quantized Feedback Secure Multiuser MISO Communication Systems with Quantized Feedback Berna Özbek*, Özgecan Özdoğan*, Güneş Karabulut Kurt** *Department of Electrical and Electronics Engineering Izmir Institute of Technology,Turkey

More information

Generalized MMSE Beamforming for Downlink MIMO Systems

Generalized MMSE Beamforming for Downlink MIMO Systems Generalized MMSE Beamforming for Downlin MIMO Systems youngjoo Lee, Illsoo Sohn, Donghyun Kim, and Kwang Bo Lee School of Electrical Engineering and INMC, Seoul National University (SNU, Seoul, Korea.

More information

Random Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws. Symeon Chatzinotas February 11, 2013 Luxembourg

Random Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws. Symeon Chatzinotas February 11, 2013 Luxembourg Random Matrix Theory Lecture 1 Introduction, Ensembles and Basic Laws Symeon Chatzinotas February 11, 2013 Luxembourg Outline 1. Random Matrix Theory 1. Definition 2. Applications 3. Asymptotics 2. Ensembles

More information

K User Interference Channel with Backhaul

K User Interference Channel with Backhaul 1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University

More information

Chapter 2: Random Variables

Chapter 2: Random Variables ECE54: Stochastic Signals and Systems Fall 28 Lecture 2 - September 3, 28 Dr. Salim El Rouayheb Scribe: Peiwen Tian, Lu Liu, Ghadir Ayache Chapter 2: Random Variables Example. Tossing a fair coin twice:

More information

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO

More information

Answers to selected exercises

Answers to selected exercises Answers to selected exercises A First Course in Stochastic Models, Henk C. Tijms 1.1 ( ) 1.2 (a) Let waiting time if passengers already arrived,. Then,, (b) { (c) Long-run fraction for is (d) Let waiting

More information

Approximate Capacity of Fast Fading Interference Channels with no CSIT

Approximate Capacity of Fast Fading Interference Channels with no CSIT Approximate Capacity of Fast Fading Interference Channels with no CSIT Joyson Sebastian, Can Karakus, Suhas Diggavi Abstract We develop a characterization of fading models, which assigns a number called

More information

Extreme Value Analysis and Spatial Extremes

Extreme Value Analysis and Spatial Extremes Extreme Value Analysis and Department of Statistics Purdue University 11/07/2013 Outline Motivation 1 Motivation 2 Extreme Value Theorem and 3 Bayesian Hierarchical Models Copula Models Max-stable Models

More information

Communications and Signal Processing Spring 2017 MSE Exam

Communications and Signal Processing Spring 2017 MSE Exam Communications and Signal Processing Spring 2017 MSE Exam Please obtain your Test ID from the following table. You must write your Test ID and name on each of the pages of this exam. A page with missing

More information

Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage

Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage Online Power Control Optimization for Wireless Transmission with Energy Harvesting and Storage Fatemeh Amirnavaei, Student Member, IEEE and Min Dong, Senior Member, IEEE arxiv:606.046v2 [cs.it] 26 Feb

More information

Efficient Nonlinear Optimizations of Queuing Systems

Efficient Nonlinear Optimizations of Queuing Systems Efficient Nonlinear Optimizations of Queuing Systems Mung Chiang, Arak Sutivong, and Stephen Boyd Electrical Engineering Department, Stanford University, CA 9435 Abstract We present a systematic treatment

More information

Flat Rayleigh fading. Assume a single tap model with G 0,m = G m. Assume G m is circ. symmetric Gaussian with E[ G m 2 ]=1.

Flat Rayleigh fading. Assume a single tap model with G 0,m = G m. Assume G m is circ. symmetric Gaussian with E[ G m 2 ]=1. Flat Rayleigh fading Assume a single tap model with G 0,m = G m. Assume G m is circ. symmetric Gaussian with E[ G m 2 ]=1. The magnitude is Rayleigh with f Gm ( g ) =2 g exp{ g 2 } ; g 0 f( g ) g R(G m

More information

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of

More information

Medium Access Control and Power Optimizations for Sensor Networks with Linear Receivers

Medium Access Control and Power Optimizations for Sensor Networks with Linear Receivers Medium Access Control and Power Optimizations for Sensor Networks with Linear Receivers Wenjun Li and Huaiyu Dai Department of Electrical and Computer Engineering North Carolina State University Raleigh,

More information

Exploiting Quantized Channel Norm Feedback Through Conditional Statistics in Arbitrarily Correlated MIMO Systems

Exploiting Quantized Channel Norm Feedback Through Conditional Statistics in Arbitrarily Correlated MIMO Systems Exploiting Quantized Channel Norm Feedback Through Conditional Statistics in Arbitrarily Correlated MIMO Systems IEEE TRANSACTIONS ON SIGNAL PROCESSING Volume 57, Issue 10, Pages 4027-4041, October 2009.

More information

UCSD ECE250 Handout #27 Prof. Young-Han Kim Friday, June 8, Practice Final Examination (Winter 2017)

UCSD ECE250 Handout #27 Prof. Young-Han Kim Friday, June 8, Practice Final Examination (Winter 2017) UCSD ECE250 Handout #27 Prof. Young-Han Kim Friday, June 8, 208 Practice Final Examination (Winter 207) There are 6 problems, each problem with multiple parts. Your answer should be as clear and readable

More information

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering,

Random Access Game. Medium Access Control Design for Wireless Networks 1. Sandip Chakraborty. Department of Computer Science and Engineering, Random Access Game Medium Access Control Design for Wireless Networks 1 Sandip Chakraborty Department of Computer Science and Engineering, INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR October 22, 2016 1 Chen

More information

INVERSE EIGENVALUE STATISTICS FOR RAYLEIGH AND RICIAN MIMO CHANNELS

INVERSE EIGENVALUE STATISTICS FOR RAYLEIGH AND RICIAN MIMO CHANNELS INVERSE EIGENVALUE STATISTICS FOR RAYLEIGH AND RICIAN MIMO CHANNELS E. Jorswieck, G. Wunder, V. Jungnickel, T. Haustein Abstract Recently reclaimed importance of the empirical distribution function of

More information

Exploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless

Exploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless Exploiting Partial Channel Knowledge at the Transmitter in MISO and MIMO Wireless SPAWC 2003 Rome, Italy June 18, 2003 E. Yoon, M. Vu and Arogyaswami Paulraj Stanford University Page 1 Outline Introduction

More information

MFM Practitioner Module: Quantitiative Risk Management. John Dodson. October 14, 2015

MFM Practitioner Module: Quantitiative Risk Management. John Dodson. October 14, 2015 MFM Practitioner Module: Quantitiative Risk Management October 14, 2015 The n-block maxima 1 is a random variable defined as M n max (X 1,..., X n ) for i.i.d. random variables X i with distribution function

More information

LECTURE 18. Lecture outline Gaussian channels: parallel colored noise inter-symbol interference general case: multiple inputs and outputs

LECTURE 18. Lecture outline Gaussian channels: parallel colored noise inter-symbol interference general case: multiple inputs and outputs LECTURE 18 Last time: White Gaussian noise Bandlimited WGN Additive White Gaussian Noise (AWGN) channel Capacity of AWGN channel Application: DS-CDMA systems Spreading Coding theorem Lecture outline Gaussian

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems

The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems The Effect of Channel State Information on Optimum Energy Allocation and Energy Efficiency of Cooperative Wireless Transmission Systems Jie Yang and D.R. Brown III Worcester Polytechnic Institute Department

More information

Optimization and Simulation

Optimization and Simulation Optimization and Simulation Simulating events: the Michel Bierlaire Transport and Mobility Laboratory School of Architecture, Civil and Environmental Engineering Ecole Polytechnique Fédérale de Lausanne

More information

Online Interval Coloring and Variants

Online Interval Coloring and Variants Online Interval Coloring and Variants Leah Epstein 1, and Meital Levy 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il School of Computer Science, Tel-Aviv

More information

A Probability Review

A Probability Review A Probability Review Outline: A probability review Shorthand notation: RV stands for random variable EE 527, Detection and Estimation Theory, # 0b 1 A Probability Review Reading: Go over handouts 2 5 in

More information

672 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 57, NO. 2, FEBRUARY We only include here some relevant references that focus on the complex

672 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 57, NO. 2, FEBRUARY We only include here some relevant references that focus on the complex 672 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 57, NO. 2, FEBRUARY 2009 Ordered Eigenvalues of a General Class of Hermitian Rom Matrices With Application to the Performance Analysis of MIMO Systems Luis

More information

ECE Homework Set 2

ECE Homework Set 2 1 Solve these problems after Lecture #4: Homework Set 2 1. Two dice are tossed; let X be the sum of the numbers appearing. a. Graph the CDF, FX(x), and the pdf, fx(x). b. Use the CDF to find: Pr(7 X 9).

More information

Theorem 2.1 (Caratheodory). A (countably additive) probability measure on a field has an extension. n=1

Theorem 2.1 (Caratheodory). A (countably additive) probability measure on a field has an extension. n=1 Chapter 2 Probability measures 1. Existence Theorem 2.1 (Caratheodory). A (countably additive) probability measure on a field has an extension to the generated σ-field Proof of Theorem 2.1. Let F 0 be

More information

Final Solutions Fri, June 8

Final Solutions Fri, June 8 EE178: Probabilistic Systems Analysis, Spring 2018 Final Solutions Fri, June 8 1. Small problems (62 points) (a) (8 points) Let X 1, X 2,..., X n be independent random variables uniformly distributed on

More information

ECE 4400:693 - Information Theory

ECE 4400:693 - Information Theory ECE 4400:693 - Information Theory Dr. Nghi Tran Lecture 8: Differential Entropy Dr. Nghi Tran (ECE-University of Akron) ECE 4400:693 Lecture 1 / 43 Outline 1 Review: Entropy of discrete RVs 2 Differential

More information

Perhaps the simplest way of modeling two (discrete) random variables is by means of a joint PMF, defined as follows.

Perhaps the simplest way of modeling two (discrete) random variables is by means of a joint PMF, defined as follows. Chapter 5 Two Random Variables In a practical engineering problem, there is almost always causal relationship between different events. Some relationships are determined by physical laws, e.g., voltage

More information

Multiple Antennas in Wireless Communications

Multiple Antennas in Wireless Communications Multiple Antennas in Wireless Communications Luca Sanguinetti Department of Information Engineering Pisa University luca.sanguinetti@iet.unipi.it April, 2009 Luca Sanguinetti (IET) MIMO April, 2009 1 /

More information

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Optimal power-delay trade-offs in fading channels: small delay asymptotics Optimal power-delay trade-offs in fading channels: small delay asymptotics Randall A. Berry Dept. of EECS, Northwestern University 45 Sheridan Rd., Evanston IL 6008 Email: rberry@ece.northwestern.edu Abstract

More information

Optimal Power Allocation over Parallel Gaussian Broadcast Channels

Optimal Power Allocation over Parallel Gaussian Broadcast Channels Optimal Power Allocation over Parallel Gaussian Broadcast Channels David N.C. Tse Dept. of Electrical Engineering and Computer Sciences University of California at Berkeley email: dtse@eecs.berkeley.edu

More information

Quiz 2 Date: Monday, November 21, 2016

Quiz 2 Date: Monday, November 21, 2016 10-704 Information Processing and Learning Fall 2016 Quiz 2 Date: Monday, November 21, 2016 Name: Andrew ID: Department: Guidelines: 1. PLEASE DO NOT TURN THIS PAGE UNTIL INSTRUCTED. 2. Write your name,

More information

Multiple Antennas for MIMO Communications - Basic Theory

Multiple Antennas for MIMO Communications - Basic Theory Multiple Antennas for MIMO Communications - Basic Theory 1 Introduction The multiple-input multiple-output (MIMO) technology (Fig. 1) is a breakthrough in wireless communication system design. It uses

More information

Title. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels

Title. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels Title Equal Gain Beamforming in Rayleigh Fading Channels Author(s)Tsai, Shang-Ho Proceedings : APSIPA ASC 29 : Asia-Pacific Signal Citationand Conference: 688-691 Issue Date 29-1-4 Doc URL http://hdl.handle.net/2115/39789

More information