Determining Frequency Reuse Feasibility in Device-to-Device Cellular Networks

Size: px
Start display at page:

Download "Determining Frequency Reuse Feasibility in Device-to-Device Cellular Networks"

Transcription

1 c 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. Determining Frequency Reuse Feasibility in Device-to-Device Cellular Networks Markus Klügel Technische Universität München, Arcisstr. 21, Munich, Germany Wolfgang Kellerer Technische Universität München, Arcisstr. 21, Munich, Germany Abstract Device-to-Device (D2D) communication in cellular networks allows dynamic frequency reuse even within a cell, which can increase the frequency reuse factor beyond one. To perform dynamic reuse, it must be feasible for all links to maintain a certain signal quality despite the presence of interference. This can be ensured using reuse feasibility tests. However, state of the art testing algorithms show erroneous behavior when infeasibility occurs due to limited transmission powers. In this paper we develop two testing algorithms, based on nonnegative matrix theory, that explicitly take limited transmission powers into account and show how these can be implemented in protocols. The protocols are compared with the state of the art in terms of control channel usage, speed and accuracy of decision making. We find that the proposed protocols estimate reuse feasibility more accurately than the state of the art and are comparable in terms of speed and control channel usage. I. INTRODUCTION Device-to-Device (D2D) communication has been proposed to offload local cellular traffic, i.e., traffic where source and sink are spatially nearby, from the base station [1]. One major benefit seen in D2D communication is that, due to the expected short range of links, transmission powers can be reduced, allowing the reuse of transmission resources even within a cell. However, this reuse leads to problems because it introduces a new form of interference, intracell-interference, into the cellular system. While reusing transmission resources, all communication links must maintain a certain signal to interference and noise ratio (SINR) to achieve a satisfactory link quality. This is commonly achieved by introducing spatial reuse constraints or interference power thresholds, c.f. [2]. However, these approaches often neglect the existing work on dynamic power control [3], which provides insights on inherent properties of interference and hence cannot take full advantage of reuse possibilities. To work efficiently, scheduling and reuse link selection mechanisms must take into account for which link combinations it is at all possible to achieve their signal quality targets while performing reuse. Due to the dynamics expected for D2D communication, this information needs to be acquired within tens of transmission time intervals (TTI). We investigate the problem how to check fast whether a set of links can reuse This work has been funded by the German Research Foundation (DFG) under grant number KE 1863/2-1 as part of the SPP COIN. resources and achieve signal quality targets under dynamic power control, which we call reuse feasibility. We develop two protocols to check for reuse feasibility and evaluate them in terms of speed, accuracy and control overhead. A. State of the Art The problem of determining reuse feasibility resembles call admission control problems, for which solution approaches exist. However, these have not been transferred to context of D2D-communication so far. In general, frequency reuse is possible if all links can achieve a certain SINR in the presence of mutual interference, and hence strongly depends on the used transmission powers. From a power control point of view, frequency reuse is possible if the set of transmission powers that can achieve certain SINR constraints is not empty. This condition is called feasibility of the power control problem and depends on the spectral radius of the Foschini-Matrix, a matrix derived from the channel gains and desired SINRs [3]. Determining reuse feasibility of a set of D2D links corresponds to determining the feasibility of their power control problem. Prior work on power control feasibility in wireless networks [4] [8] has been developed as a basis for calladmission control. The well-known Foschini-Miljanic power control algorithm (PCA) [9] is often assumed in this context because it is known to converge if and only if the reuse situation is feasible. Papers [4] [7] assume a set-up where several links are active already, whose PCA has converged, and new links seek admission to a channel. In [4], Bambos et al. propose that all links which want to (re)use a channel send a low-power probing tone and wait for the active PCAs to re-converge. From the interference produced by the reconverged PCAs, reuse feasibility is determined. The authors of [5] and [6] follow this approach, using a discriminant [5] and the spectral radius [6] as feasibility criterion. Ku cera et al. [7] investigate the dynamics of the Foschini-Miljanic PCA and use observations of its convergence speed to calculate the spectral radius before convergence of the PCA. The algorithm developed in [7] is shown to outperform those in [4] [6]. Lin et al. [8] show how the feasibility problem can be transformed into a linear program. The work on call admission control can also be used to test for reuse feasibility in the D2D scenario. However, current work evaluates reuse feasibility incorrectly

2 when constrained transmission powers make reuse impossible. This recognized in [5], [6], but not solved, and [4], [7] and [8] completely neglect power constraints. The protocols developed in this paper are shown to evaluate reuse feasibility correctly in all cases. P P 2 SINR 2 γ 2 F SINR 1 γ 1 II. SYSTEM MODEL & BASIC PROPERTIES We consider a set L ofn wireless links, which can be either cellular up-/downlink or D2D users. The sender of link j L transmits with a power P j and is received at the receiver of link i with power h ij P j, where h ij is a channel gain that takes account for path-loss and fading effects. The SINR of link i is: h ii P i SINR i = j i h, j = 1,2,..,N (1) ijp j +η i P P p P h P where η i is the noise power at receiver i. We assume that the quality of link i is acceptable if SINR i γ i for a given minimum SINR γ i. To take account for maximum transmission powers and that powers are nonnegative, we further require 0 P i P max,i i, where P max,i is the maximum transmission power of link i s sender. TheN SINRconstraints can be rewritten in matrix form, which leads to a compact formulation [3]: (I F) P u, (2) where P = [P 1,...,P N ] T is the vector of transmission powers, u = [γ 1 η 1 /h 11,...,γ N η N /h NN ] T is the vector of normalized noise powers, I is the N N identity matrix and F is the Foschini-Matrix with (i,j) entry F ij = γ i h ij /h ii if i j and 0 otherwise. In (2) and further on, the inequalities are taken element-wise. We now define P = { P : 0 P P max }, the set of transmission powers achievable by all transmitters with P max the vector of maximum transmission powers. Further, we define F = { P 0 : (I F) P u}, i.e., the set of power vectors fulfilling all SINR-requirements. For frequency reuse to be possible, it must be ensured that: F P. (3) Equation (3) implicitly contains that F. We now re-state some known properties of F and introduce some formulations that will be useful later on. As all channel gains and SINRconstraints are nonnegative, so are the entries of F, hence F is a nonnegative matrix. According to the Perron-Frobenius Theorem for nonnegative matrices [3], F is non-empty if and only if the spectral radius of F, i.e., its maximum modulus eigenvalue, ρ(f) 1. Each row of (2) defines a half-space of power vectors which meet the SINR constraints of the corresponding link. Hence, F is known to be a cone defined by the intersection of N such half-spaces. Because of this structure, we can decompose any P F into P = P p + P h, where P p 0 is a unique vector which solves (2) with equality and P h 0 is any vector that solves (2) for the noiseless case u =0. Pp is at the tip of the cone F and can be seen as the particular solution to (2). P h is the homogeneous solution and P P 1 Fig. 1. Structure of F and P with SINR-constraints for two links that both have P as maximum power. points from the tip of F into F. The structure of F and its relation to P p, P h and P max is depicted in Figure 1. From the decomposition of P into P p and P h we see that two cases can make frequency reuse impossible. First, F can be empty. This is the case when ρ(f) > 1, i.e., the halfspaces have no intersection for P 0. Second, P p can violate the maximum power constraint. In this case, the situation is feasible in principle but at least one sender cannot use enough transmission power to assume a state in F. We call F = the first type of infeasibility and F, F P = the second type of infeasibility, respectively, and note that the second type holds if and only if P p P max. For both types, it does not make sense to let the corresponding links reuse resources because at least one link cannot have a satisfactory signal quality. The state of the art solutions discussed in section I-A aim at calculating ρ(f) and do not solve the second type of infeasibility. This leads to wrong feasibility statements, as we will show in section V. For the rest of this paper, we assume that all links use a power-constrained Foschini-Miljanic PCA. According to this PCA, transmission powers are updated with the rule: P(k +1) = min{f P(k)+u, P max }. (4) The min{ } in (4) is taken element-wise. In the references, the PCA is controlled by the enb and hence centralized. However, it can easily be decentralized. In fact, approaches to adapt it to the D2D use-case exist already [10]. The updates can be calculated in a decentralized manner because (F P + u) i corresponds to P i γ i /SINR i [5]. Analog, (F P) i corresponds to P i γ i /, where is the signal to interference ratio

3 (SIR) of link i. The PCA in (4) is known to converge towards P p if F P and to some other value at the border of the maximum power bounds otherwise [5]. Without proof, we remark that the presented protocols could in principle use any PCA that converges towards P p, instead of (4). III. MATHEMATICAL SOLUTION We now discuss several mathematical possibilities to evaluate reuse feasibility with maximum power constraints. In Section IV, the approaches will be developed into protocols. A natural solution to determine reuse feasibility is to calculate ρ(f) and P p and then check for ρ(f) < 1 and P p P max. Efficient algorithms exist for the calculation of both, however, a lot of information needs to be obtained, namely all channel gains, noise figures, maximum transmission powers and SINR requirements, causing much overhead. We will consider this approach as brute-force reference although we deem it to be impractical for a real world setup. The first observation that we make is based on the following result from nonnegative matrix theory [11]: Define r F ( P) (FP) = min i, P i 0 P i s F ( P) (FP) = max i. (5) P i 0 P i r F ( P) is the minimal and s F ( P) the maximal factor by which F distorts the components of P, i.e., r F ( P) P F P s F ( P) P holds for P > 0. Then, for all P > 0 [11]: r F ( P) ρ(f) and s F ( P) ρ(f). (6) Equality is achieved in (6) for both, r F ( P) and s F ( P) when P is the dominant eigenvector of F, i.e., the eigenvector to the largest modulus eigenvalue. Applying this result, we use that (F P) i = P i γ i / in (5), which leads to: ρ(f) min γ i, We thus can state the following proposition: ρ(f) max γ i. (7) Proposition 1: If, for some P 0, all SIRs meet the SINR constraint then F. If no SIR meets the SINR constraint then F =. Proof: If all SIRs meet the SINR constraint, 1 max γi ρ(f), hence F. If no SIR meets the SINR constraint, 1 < min γi ρ(f), hence F =. Proposition 1 can be used to check if the half-spaces of F have an intersection or not and detect the first type of infeasibility. However, it cannot be used to determine the second type of infeasibility. For the second type, we need to check whether P p is in P or not. This can be done using the following proposition: Proposition 2: If, for some 0 P P max, all SINRconstraints are met, F P. If SINR i γ i i and P i = P max,i, SINR i < γ i for some i, F P =. Proof: We note that SINR i γ i i corresponds to (I F) P u. So if the first part holds, P is in F and P, hence F P. For the second part we observe that any P for which(i F) P u holds can be written as P = P p P h, which can also be seen from Figure 1. Then P P p because P h 0. If P i = P max,i and SINR i < γ i holds for some i, then P max,i < P p,i, hence P p P max and F P =. Proposition 1 and 2 will be combined into a protocol in Section IV. For the next observation we refer to the Foschini- Miljanic PCA in (4) and notice that it can be seen as a power iteration on F with a constant added on each iteration. Following this interpretation, we see that the spectral radius of a matrix can be calculated from a power iteration in combination with the Rayleigh-quotient [12]: Let P(k) be a power iteration of the form P(k + 1) = F P(k), then for k, P converges towards the dominant eigenvector of F: lim P(k) = lim k k Fk P(0) = lim k λk 1v 1, (8) for the maximum modulus eigenvalue λ 1 (= ρ(f)) and its corresponding eigenvectorv 1. In particular, it is known that after sufficient iterations the Rayleigh-quotient R F ( P(k)) provides a good estimate of the eigenvalue [12], because: lim R F( P T (k)fp(k) P(k)) = lim k k P(k) 2 = λ2k+1 1 v 1 2 λ 2k 1 v = λ (9) Here, ( ) T is the transpose operation and the euclidean norm. Applying this to the current scenario, R F ( P(k)) can be used to estimate ρ(f). This estimation has in principle been found also by Ku cera et al. in [7], as it can be seen as a special case of their Theorem 4. However, we point out that it can only be used for calculation of ρ(f) and not to detect the second type of infeasibility, which is due to P p P max. We propose to calculate the Rayleigh-quotient not with the noiseless version of P(k + 1) but the version including the normalized noise u. That is, we introduce a feasibility test: T F ( P(k)) = P T (k) ( ) FP(k)+u P(k) 2. (10) We will now show how this test behaves for feasible and infeasible situations. Proposition 3: lim T F( P(k)) = k with c (1,ρ(F)] greater than one. Proof: See Appendix. { 1, if ρ(f) 1 and P p P max c, else IV. PROPOSED PROTOCOLS We will now develop testing protocols based on the discussion in Section III. For this, we consider a cellular wireless system with LTE-like transmission resource structure, with separate transmission- and control-channels that can be used

4 Protocol 1 Direct Measurement Test (DMT) Protocol 1: enb broadcasts P T, S and T S. 2: All senders report P max,i to enb. 3: for i = 1 to N do 4: Sender i sends with P T at TTI T S + TTI i (S). 5: All receivers calculate and store h ij. 6: end for 7: All receivers report their h ij s and η i to enb. 8: enb calculates ρ(f), P p and checks for P p P max. 9: If ρ(f) < 1 and P p P max, reuse is feasible. differently at each TTI. Compared to the discussed references, where arriving calls seek admission to a channel, we assume that a controller, e.g., the enb, wants to check the reuse feasibility of a predefined set of links at a certain time instant. We imagine this check to happen on a regular basis and the output to be used for scheduling decisions of the enb. In set-ups with a high spatial density of D2D-links reusing resources, control channels might form a bottleneck as they cannot be reused. Because of this we are interested in the control overhead produced by our protocols and include it in our evaluations. We assume control traffic to be collision free and one message to carrybbyte per transported numeric value. A. Direct Measurement Test (DMT) Protocol The Direct Measurement Test Protocol implements the brute-force reference mentioned in Section III. The enb defines a transmit power P T, a probing order S and a start time T S. TTI i (S) is the relative TTI offset of link i w.r.t. T S, based on S. The protocol is described as Protocol 1. Assuming that all probing- and control-messages take one TTI for transmission, the algorithm will make a feasibility statement N +2 TTI s after T S. Control messages are sent in lines 1, 2 and 7 carrying different quantities of numeric values. We assume S = N and consider that every receiver reports N channel gains, so the number control bytes sent is CB DMT (N) = (N+2)b+Nb+N(N+1)b = Ω(bN 2 ). (11) Ω( ) here is the landau-symbol, indicating thatcb DMT grows at least as fast as( ). Although some optimization can be done, e.g., S or P max,i might be pre-defined, the main contributor to channel usage, which is the channel report by the receivers, cannot be circumvented. B. Rayleigh-Quotient Test (RQT) Protocol The following protocol is based on Proposition 3. We use that (FP +u) i = P i γ i /SINR i and hence: N T F ( P(k)) i=1 = P i(k) 2 γ i /SINR i (k) N i=1 P. (12) i(k) 2 Alternatively, R F ( P(k)) can be used, in which case SINR i becomes. All links use PCA (4) and receivers feed Protocol 2 Rayleigh Quotient Test (RQT) Protocol 1: enb broadcasts P T, T S and I. 2: for k = 1 to I do 3: All senders transmit with P i (k). 4: All receivers report γ i /SINR i (k) back to sender. 5: if k < I then 6: Senders set P i (k +1) = min{ Pi(k)γi SINR i(k),p max,i} 7: end if 8: end for 9: Senders report P i (I) and γ i /SINR i (I) back to enb. 10: enb calculates T F ( P(k)). 11: If T F ( P(k)) 1 reuse is feasible, else infeasible. information back to their senders using control channels. The enb defines an initial transmission power P T that all senders use, a starting time T S and a number of power-control iterations I 1. The protocol is described as Protocol 2. Again assuming that all probing- and control-messages (including feedback from receivers to transmitters) take one TTI, the algorithm will make a feasibility statement 2I + 1 TTI s after T S. As Proposition 3 holds in the limit, the feasibility statement made after I iterations is only true with a probability, depending on how well the PCA has converged. Control messages are sent at lines 1, 4 and 9. So the number of control bytes sent is: CB RQT (N,I) = 3b+NIb+2Nb = Ω(bIN). (13) We conclude that the RQT Protocol will cause less control traffic than the DMT Protocol, as long as I < N. However, when I > N/2, the DMT Protocol will finish faster. C. SI(N)R-Bound Test (SBT) Protocol The third protocol uses Proposition 1 and 2. All links use PCA (4) and report status updates to the enb, waiting for the algorithm to converge. In particular, user equipments (UEs) report to the enb whenever their SIR or SINR is lower than their SINR requirement. According to Proposition 1, if all UEs report their SIR at one iteration, reuse is assumed infeasible. If no UE reports at all, it is assumed feasible. Following Proposition 2, if the UEs of a link observe no further SINR changes but SINR i < γ i ( converged infeasible ), this is also reported and interpreted as infeasible. The PCA (4) is adapted such that powers are not updated if their SINR is within a threshold γ above γ i, which enforces an earlier convergence behavior. Again, the enb defines an initial transmit power P T and a starting time T S. The protocol is described as Protocol 3. Because neither the duration of the SBT Protocol, nor the number of messages per iteration are deterministic, an analytical derivation of convergence speed and control overhead of the SBT Protocol is out of scope of this paper.

5 Protocol 3 SI(N)R-Bound Test (SBT) Protocol 1: enb broadcasts P T and T S. 2: loop 3: All senders transmit { with P i (k). 4: Receivers set β i = 1,γ i SINR i (k) < γ i + γ γ i /SINR i (k), else 5: Receivers report β i back to sender. 6: Receivers report SINR i < γ i, < γ i and converged infeasible to enb 7: Senders set P i (k +1) = min{p i (k) β i,p max,i } 8: end loop 9: enb receives no message within an iteration: Feasible 10: < γ i i or converged infeasible: Infeasible Parameter Cell Radius Maximum Transmission Power Maximum D2D Link Distance Channel Model Noise Power SINR constraint γ i γ TABLE I SIMULATION PARAMETERS Value 500m 26 dbm 50m ITU-R M Urban Macro dbm 10 db i L 0.5 in linear domain Percentage TTI SBT RQT RF( P) RQT TF( P) User Density in [Users/ha] Fig. 2. Percentage of Wrong Results Produced by the Protocols 5 DMT SBT RQT RF( P) RQT TF( P) User Density in [Users/ha] Fig. 3. Convergence Speed of the Protocols V. SIMULATIVE EVALUATION We now present simulation results for the proposed protocols. The results were generated using the SimuLTEframework [13] of the OMNeT++ simulator. As the framework abstracts intracell-interference, we implemented it ourselves. We assume a single cell D2D setup of an urban macro cell, containing one randomly positioned cellular uplink user and a set of D2D links. The number and position of D2D senders follow a Poisson Point Process of defined density and D2D receivers are placed uniformly distributed within a radius of 50m of their sender. Further used simulation parameters are summarized in Table I. At a predefined time instant, the enb tests the reuse feasibility of all links with the proposed protocols. The protocols are compared against the DMT Protocol and algorithm A1 from [7], which we implement like the RQT Protocol using R F ( P(k)). In Figure 2 we compare the percentage of wrong results produced by the tests, after convergence, for different user densities. Convergence is here assumed at the first TTI after which the feasibility result of the respective protocol does not change anymore. The DMT Protocol was used as reference for the true result. It can be seen that the SBT Protocol and the RQT Protocol with T F ( P(k)) always produce the correct result after enough iterations, whereas the RQT Protocol with R F ( P(k)) can produce a significant amount of wrong results. A further investigation shows that all wrong results of R F ( P(k)) are false positive and in particular due to maximum power violations. This proves that the second type of infeasibility is not evaluated correctly by R F ( P). Figure 3 shows the mean number of TTIs needed for convergence by the protocols. It can be seen that the DMT Protocol behaves deterministic according to our analysis from Section IV. The RQT Protocols converge after 3-4 TTIs, i.e., 1-2 PCA iterations, for all densities. For high densities the RQT Protocols converge slightly faster because the set-ups become clearly infeasible. The SBT Protocol takes longest to converge for low D2D-link densities but saturates for higher densities. The number of bytes sent on control channels until convergence is shown in Figure 4. Here, b = 1 was assumed. The control traffic produced by the DMT Protocol increases quadratically, as predicted in section IV. The traffic produced by the RQT Protocols grows linearly, which is consistent with Figure 3, as the average required iterations stay nearly constant but the average number of links increases linearly. The SBT Protocol produces the least control traffic for large parts of the considered parameter range. This is notable because it also takes longest to converge. The reason for the low control traffic produced by the SBT Protocol is that UEs mainly report SINR/SIR outages. So only a subset of the UEs actually sends

6 Control Bytes DMT SBT RQT RF( P) RQT TF( P) User Density in [Users/ha] Fig. 4. Bytes Sent on Control Channels Until Convergence reports and in overall, the reports sum up to be less than the regular reports produced by the other protocols. We conclude that both proposed protocols, RQT and SBT, meet the target of reliable feasibility statements. The RQT Protocol is very fast and makes reliable statements after few TTI but causes control traffic in amount linear to the number of participating links. The SBT Protocol, on the other hand, is rather slow in convergence but produces less control traffic in overall and significantly less per TTI. The right choice depends on the considered scenario. VI. CONCLUSION In this paper, we introduced two new protocols to test for reuse feasibility in D2D scenarios, the SI(N)R Bound Test Protocol and the Rayleigh Quotient Test Protocol. The latter extends the existing, rayleigh-quotient based protocol from [7] to cope with maximum transmission powers. We evaluated all protocols by means of simulation in terms of reliability, convergence speed and sent control bytes. The results show that both, SBT Protocol and RQT Protocol can achieve reliable feasibility results for all types of infeasibility. The RQT Protocol converges fast and with linearly growing control traffic, whereas the SBT Protocol is slower in general but produces less control traffic. APPENDIX Proof of Proposition 3 Proof: We will first consider the case without maximum transmission powers and then discuss their influence. We can rewrite P(k) = P p + P(k) and consider that P p = F P p +u by definition. Because F( P p + P(k))+u = P p +F P(k), limit (8) applies to P(k) and (10) turns into: lim T F( P(k)) = k ( P p + P(k)) (F( T P p + P(k))+u = lim k P p + P(k) 2 ( P = lim p +λ k 1v 1 ) T ( P p +λ k+1 1 v 1 ) k P p +λ k 1 v 1 2 ) P p 2 +(1+λ 1 )λ k 1P p T = lim v 1 +λ 2k+1 1 v 1 2 k P p 2 +2λ k 1Pp T v 1 +λ 2k 1 v (14) 1 2 It can be seen from (14) that if λ 1 1, then lim k T F ( P(k)) = 1 and if λ 1 > 1, then lim k T F ( P(k)) = λ 1. When λ 1 1 but P p P max, the PCA will converge to some vector that does not fulfill (2) [5]. However, as it does converge at all, P(k +1) = min{f P(k)+u, P max } P(k) (15) will hold for some sufficient large k, meaning that all links will either achieve their requirement with equality or reach their transmit power limit P max,i. P(k) will hence satisfy P(k) F P(k)+u element-wise. As all vector elements are nonnegative, lim T F( P T (k)(fp(k)+u) P(k)) = lim k k P T (k) P(k) > 1. (16) We could show that if λ 1 1 and P p P max, T F ( P(k)) converges to 1, that if λ 1 1 and P p P max it converges to a value larger than one and if λ 1 > 1 it converges to λ 1, which was stated. REFERENCES [1] K. Doppler, M. Rinne et al., Device-to-device communication as an underlay to lte-advanced networks, IEEE Communications Magazine, vol. 47, no. 12, pp , Dec [2] A. Asadi, Q. Wang, and V. Mancuso, A survey on device-to-device communication in cellular networks, IEEE Communications Surveys & Tutorials, no. 99, [3] T. L. Mung Chiang, Prashanth Hande and C. W. Tan, Power control in wireless cellular networks, Foundations and Trends in Networking, vol. 2, no. 4, pp , [4] N. Bambos, S. Chen, and D. Mitra, Channel probing for distributed access control in wireless communication networks, in GLOBECOM Proceedings, vol. 1, Nov 1995, pp vol.1. [5] M. Xiao, N. Shroff, and E. Chong, Distributed admission control for power-controlled cellular wireless systems, IEEE/ACM Transactions on Networking, vol. 9, no. 6, pp , Dec [6] C. Zhu and M. Corson, A distributed channel probing scheme for wireless networks, in INFOCOM Proceedings, vol. 1, 2001, pp vol.1. [7] S. Kucera, L. Kucera, and B. Zhang, Efficient distributed algorithms for dynamic access to shared multiuser channels in sinr-constrained wireless networks, IEEE Transactions on Mobile Computing, vol. 11, no. 12, pp , Dec [8] P.-C. Lin, Feasibility problem of channel spatial reuse in powercontrolled wireless communication networks, in WCNC Proceedings, 2013, pp [9] G. Foschini and Z. Miljanic, A simple distributed autonomous power control algorithm and its convergence, IEEE Transactions on Vehicular Technology, vol. 42, no. 4, pp , Nov [10] G. Fodor, D. Della Penda et al., A comparative study of power control approaches for device-to-device communications, in ICC Proceedings, June 2013, pp [11] A. Berman and R. Plemmons, Nonnegative Matrices in the Mathematical Sciences. Society for Industrial and Applied Mathematics, [12] A. Quarteroni, R. Sacco, and F. Saleri, Numerical Mathematics, ser. Texts in Applied Mathematics. Springer Berlin Heidelberg, [13] A. Virdis, G. Stea, and G. Nardini, Simulte: A modular system-level simulator for lte/lte-a networks based on omnet++, proc. of SimulTech, pp , 2014.

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence

Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Distributed Power Control for Time Varying Wireless Networks: Optimality and Convergence Tim Holliday, Nick Bambos, Peter Glynn, Andrea Goldsmith Stanford University Abstract This paper presents a new

More information

Game Theoretic Approach to Power Control in Cellular CDMA

Game Theoretic Approach to Power Control in Cellular CDMA Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University

More information

On the Stability of the Foschini-Miljanic Algorithm with Time-Delays

On the Stability of the Foschini-Miljanic Algorithm with Time-Delays On the Stability of the Foschini-Miljanic Algorithm with Time-Delays Themistoklis Charalambous, Ioannis Lestas and Glenn Vinnicombe Department of Engineering, University of Cambridge, Cambridge CB2 1PZ,

More information

Transient Analysis for Wireless Power Control

Transient Analysis for Wireless Power Control Transient Analysis for Wireless Power Control Maryam Fazel Dennice Maynard Gayme Mung Chiang 2 Control and Dynamical Systems, Caltech. 2 Electrical Engineering, Princeton University. Abstract Power control

More information

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems 2382 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 59, NO 5, MAY 2011 Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems Holger Boche, Fellow, IEEE,

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Improved MU-MIMO Performance for Future Systems Using Differential Feedback

Improved MU-MIMO Performance for Future Systems Using Differential Feedback Improved MU-MIMO Performance for Future 80. Systems Using Differential Feedback Ron Porat, Eric Ojard, Nihar Jindal, Matthew Fischer, Vinko Erceg Broadcom Corp. {rporat, eo, njindal, mfischer, verceg}@broadcom.com

More information

Distributed Robust Optimization (DRO) Part II: Wireless Power Control

Distributed Robust Optimization (DRO) Part II: Wireless Power Control Springer Optimization and Engineering manuscript No. (will be inserted by the editor) Distributed Robust Optimization (DRO) Part II: Wireless Power Control Yihong Wu Kai Yang Jianwei Huang Xiaodong Wang

More information

DOWNLINK transmit beamforming has recently received

DOWNLINK transmit beamforming has recently received 4254 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 58, NO. 8, AUGUST 2010 A Dual Perspective on Separable Semidefinite Programming With Applications to Optimal Downlink Beamforming Yongwei Huang, Member,

More information

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of

More information

Characterization of Rate Region in Interference Channels with Constrained Power

Characterization of Rate Region in Interference Channels with Constrained Power Characterization of Rate Region in Interference Channels with Constrained Power Hajar Mahdavi-Doost, Masoud Ebrahimi, and Amir K. Khandani Coding & Signal Transmission Laboratory Department of Electrical

More information

Distributed Optimization over Networks Gossip-Based Algorithms

Distributed Optimization over Networks Gossip-Based Algorithms Distributed Optimization over Networks Gossip-Based Algorithms Angelia Nedić angelia@illinois.edu ISE Department and Coordinated Science Laboratory University of Illinois at Urbana-Champaign Outline Random

More information

Vector Channel Capacity with Quantized Feedback

Vector Channel Capacity with Quantized Feedback Vector Channel Capacity with Quantized Feedback Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 9697-65 Email: syed@ece.uci.edu,

More information

Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers

Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers Efficient Computation of the Pareto Boundary for the Two-User MISO Interference Channel with Multi-User Decoding Capable Receivers Johannes Lindblom, Eleftherios Karipidis and Erik G. Larsson Linköping

More information

Minimum Mean Squared Error Interference Alignment

Minimum Mean Squared Error Interference Alignment Minimum Mean Squared Error Interference Alignment David A. Schmidt, Changxin Shi, Randall A. Berry, Michael L. Honig and Wolfgang Utschick Associate Institute for Signal Processing Technische Universität

More information

p 2 p > I (p) p > I (p) p 1

p 2 p > I (p) p > I (p) p 1 Appeared in IEEE Journal on Selected Areas in Communications, Vol 13, No 7, pp 1341-1348, Sept 1995 A Framework for Uplink Power Control in Cellular Radio Systems Roy D. Yates Wireless Information Networks

More information

Autonomous Uplink Intercell Interference Coordination in OFDMA-based Wireless Systems

Autonomous Uplink Intercell Interference Coordination in OFDMA-based Wireless Systems Autonomous Uplink Intercell Interference Coordination in OFDMA-based Wireless Systems Department of Electronics and Communications Engineering, Egypt WiOpt 11th Intl. Symposium on Modeling and Optimization

More information

Node-based Distributed Optimal Control of Wireless Networks

Node-based Distributed Optimal Control of Wireless Networks Node-based Distributed Optimal Control of Wireless Networks CISS March 2006 Edmund M. Yeh Department of Electrical Engineering Yale University Joint work with Yufang Xi Main Results Unified framework for

More information

Exploiting Quantized Channel Norm Feedback Through Conditional Statistics in Arbitrarily Correlated MIMO Systems

Exploiting Quantized Channel Norm Feedback Through Conditional Statistics in Arbitrarily Correlated MIMO Systems Exploiting Quantized Channel Norm Feedback Through Conditional Statistics in Arbitrarily Correlated MIMO Systems IEEE TRANSACTIONS ON SIGNAL PROCESSING Volume 57, Issue 10, Pages 4027-4041, October 2009.

More information

Approximate Queueing Model for Multi-rate Multi-user MIMO systems.

Approximate Queueing Model for Multi-rate Multi-user MIMO systems. An Approximate Queueing Model for Multi-rate Multi-user MIMO systems Boris Bellalta,Vanesa Daza, Miquel Oliver Abstract A queueing model for Multi-rate Multi-user MIMO systems is presented. The model is

More information

On the Throughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States

On the Throughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States On the hroughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States Andreas Senst, Peter Schulz-Rittich, Gerd Ascheid, and Heinrich Meyr Institute for Integrated

More information

Efficient Tracking and Feedback of DL-Eigenbeams in WCDMA

Efficient Tracking and Feedback of DL-Eigenbeams in WCDMA Efficient Tracking and Feedback of DL-Eigenbeams in WCDMA Wolfgang Utschick and Christopher Brunner Institute for Circuit Theory and Signal Processing Technische Universität München Abstract A tracking

More information

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 29 proceedings Optimal Power Allocation for Cognitive Radio

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels TO APPEAR IEEE INTERNATIONAL CONFERENCE ON COUNICATIONS, JUNE 004 1 Dirty Paper Coding vs. TDA for IO Broadcast Channels Nihar Jindal & Andrea Goldsmith Dept. of Electrical Engineering, Stanford University

More information

Pareto Boundary of Utility Sets for Multiuser Wireless Systems

Pareto Boundary of Utility Sets for Multiuser Wireless Systems IEEE/ACM TRANSACTIONS ON NETWORKING, VOL 19, NO 2, APRIL 2011 589 Pareto Boundary of Utility Sets for Multiuser Wireless Systems Holger Boche, Senior Member, IEEE, Siddharth Naik, Martin Schubert, Member,

More information

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012 Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications

More information

DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE

DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE DEVICE-TO-DEVICE COMMUNICATIONS: THE PHYSICAL LAYER SECURITY ADVANTAGE Daohua Zhu, A. Lee Swindlehurst, S. Ali A. Fakoorian, Wei Xu, Chunming Zhao National Mobile Communications Research Lab, Southeast

More information

Achievable Outage Rate Regions for the MISO Interference Channel

Achievable Outage Rate Regions for the MISO Interference Channel Achievable Outage Rate Regions for the MISO Interference Channel Johannes Lindblom, Eleftherios Karipidis and Erik G. Larsson Linköping University Post Print N.B.: When citing this work, cite the original

More information

POWER CONTROL plays an important role in the design of

POWER CONTROL plays an important role in the design of 1566 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 52, NO. 9, SEPTEMBER 2004 Convergence Theorem for a General Class of Power-Control Algorithms Kin Kwong Leung, Chi Wan Sung, Member, IEEE, Wing Shing Wong,

More information

Throughput Maximization for Delay-Sensitive Random Access Communication

Throughput Maximization for Delay-Sensitive Random Access Communication 1 Throughput Maximization for Delay-Sensitive Random Access Communication Derya Malak, Howard Huang, and Jeffrey G. Andrews arxiv:1711.02056v2 [cs.it] 5 Jun 2018 Abstract Future 5G cellular networks supporting

More information

User Association with Unequal User Priorities in Heterogeneous Cellular Networks

User Association with Unequal User Priorities in Heterogeneous Cellular Networks User Association with Unequal User Priorities in Heterogeneous Cellular Networks Youjia Chen, Jun Li, Member, IEEE, Zihuai Lin, Senior Member, IEEE, Guoqiang Mao, Senior Member, IEEE, and Branka Vucetic,

More information

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations Rui Wang, Jun Zhang, S.H. Song and K. B. Letaief, Fellow, IEEE Dept. of ECE, The Hong Kong University of Science

More information

I. Introduction. Index Terms Multiuser MIMO, feedback, precoding, beamforming, codebook, quantization, OFDM, OFDMA.

I. Introduction. Index Terms Multiuser MIMO, feedback, precoding, beamforming, codebook, quantization, OFDM, OFDMA. Zero-Forcing Beamforming Codebook Design for MU- MIMO OFDM Systems Erdem Bala, Member, IEEE, yle Jung-Lin Pan, Member, IEEE, Robert Olesen, Member, IEEE, Donald Grieco, Senior Member, IEEE InterDigital

More information

Information in Aloha Networks

Information in Aloha Networks Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha

More information

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, ACCEPTED AND TO APPEAR IN 05 Optimal Power Allocation With Statistical QoS Provisioning for DD and Cellular Communications Over Underlaying Wireless Networks

More information

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu

PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS. Pratik Patil, Binbin Dai, and Wei Yu PERFORMANCE COMPARISON OF DATA-SHARING AND COMPRESSION STRATEGIES FOR CLOUD RADIO ACCESS NETWORKS Pratik Patil, Binbin Dai, and Wei Yu Department of Electrical and Computer Engineering University of Toronto,

More information

Distributed Geometric-Programming-Based Power Control in Cellular Cognitive Radio Networks

Distributed Geometric-Programming-Based Power Control in Cellular Cognitive Radio Networks Distributed Geometric-Programming-Based Power Control in Cellular Cognitive Radio Networks Qingqing Jin, Dongfeng Yuan, Zhangyu Guan Wireless Mobile Communication and Transmission WMCT Lab School of Information

More information

USING multiple antennas has been shown to increase the

USING multiple antennas has been shown to increase the IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 1, JANUARY 2007 11 A Comparison of Time-Sharing, DPC, and Beamforming for MIMO Broadcast Channels With Many Users Masoud Sharif, Member, IEEE, and Babak

More information

arxiv: v3 [cs.it] 4 Aug 2017

arxiv: v3 [cs.it] 4 Aug 2017 THE ROLE OF ASYMPTOTIC FUNCTIONS IN NETWORK OPTIMIZATION AND FEASIBILITY STUDIES Renato L. G. Cavalcante and S. Stańczak Fraunhofer Heinrich Hertz Institute and Technical University of Berlin email: {renato.cavalcante,

More information

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation

On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract

More information

Power Control in Cellular Networks: Taxonomy and Recent Results

Power Control in Cellular Networks: Taxonomy and Recent Results Power Control in Cellular Networks: Taxonomy and Recent Results Mung Chiang Electrical Engineering Department, Princeton University RAWNET April 16, 2007 Overview Three major types of resource constraints:

More information

Practical Interference Alignment and Cancellation for MIMO Underlay Cognitive Radio Networks with Multiple Secondary Users

Practical Interference Alignment and Cancellation for MIMO Underlay Cognitive Radio Networks with Multiple Secondary Users Practical Interference Alignment and Cancellation for MIMO Underlay Cognitive Radio Networks with Multiple Secondary Users Tianyi Xu Dept. Electrical & Computer Engineering University of Delaware Newark,

More information

SINR Model with Best Server Association for High Availability Studies of Wireless Networks

SINR Model with Best Server Association for High Availability Studies of Wireless Networks SINR Model with Best Server Association for High Availability Studies of Wireless Networks 1 David Öhmann, Ahmad Awada, Ingo Viering, Meryem Simsek, Gerhard P. Fettweis arxiv:1510.04503v2 [cs.ni] 29 Oct

More information

Lecture 15 Perron-Frobenius Theory

Lecture 15 Perron-Frobenius Theory EE363 Winter 2005-06 Lecture 15 Perron-Frobenius Theory Positive and nonnegative matrices and vectors Perron-Frobenius theorems Markov chains Economic growth Population dynamics Max-min and min-max characterization

More information

Agreement algorithms for synchronization of clocks in nodes of stochastic networks

Agreement algorithms for synchronization of clocks in nodes of stochastic networks UDC 519.248: 62 192 Agreement algorithms for synchronization of clocks in nodes of stochastic networks L. Manita, A. Manita National Research University Higher School of Economics, Moscow Institute of

More information

Multiuser Downlink Beamforming: Rank-Constrained SDP

Multiuser Downlink Beamforming: Rank-Constrained SDP Multiuser Downlink Beamforming: Rank-Constrained SDP Daniel P. Palomar Hong Kong University of Science and Technology (HKUST) ELEC5470 - Convex Optimization Fall 2018-19, HKUST, Hong Kong Outline of Lecture

More information

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS Jesus Perez and Ignacio Santamaria Advanced Signal Processing Group, University of Cantabria, Spain, https://gtas.unican.es/

More information

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control 962 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control Junshan Zhang, Student Member, IEEE, and Edwin

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR Chee Wei Tan, Mung Chiang ¾ and R. Srikant City University of Hong Kong ¾ Princeton

More information

On the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints

On the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints 1 On the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints arxiv:1901.07719v1 [cs.it] 23 Jan 2019 Shahram Shahsavari, Farhad Shirani and Elza Erkip Dept. of Electrical and

More information

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications

Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Uniqueness of Generalized Equilibrium for Box Constrained Problems and Applications Alp Simsek Department of Electrical Engineering and Computer Science Massachusetts Institute of Technology Asuman E.

More information

Information Theory for Wireless Communications, Part II:

Information Theory for Wireless Communications, Part II: Information Theory for Wireless Communications, Part II: Lecture 5: Multiuser Gaussian MIMO Multiple-Access Channel Instructor: Dr Saif K Mohammed Scribe: Johannes Lindblom In this lecture, we give the

More information

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel Stefano Rini, Ernest Kurniawan and Andrea Goldsmith Technische Universität München, Munich, Germany, Stanford University,

More information

Power Control in Multi-Carrier CDMA Systems

Power Control in Multi-Carrier CDMA Systems A Game-Theoretic Approach to Energy-Efficient ower Control in Multi-Carrier CDMA Systems Farhad Meshkati, Student Member, IEEE, Mung Chiang, Member, IEEE, H. Vincent oor, Fellow, IEEE, and Stuart C. Schwartz,

More information

Seeking Foschini s Genie: Optimal Rates and Powers in Wireless Networks

Seeking Foschini s Genie: Optimal Rates and Powers in Wireless Networks 1 Seeking Foschini s Genie: Optimal Rates and Powers in Wireless Networks Dan ONeill, David Julian, and Stephen Boyd Department of Electrical Engineering Stanford University dconeill,djulian,boyd@stanford.edu

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

Front Inform Technol Electron Eng

Front Inform Technol Electron Eng Interference coordination in full-duplex HetNet with large-scale antenna arrays Zhao-yang ZHANG, Wei LYU Zhejiang University Key words: Massive MIMO; Full-duplex; Small cell; Wireless backhaul; Distributed

More information

Interactive Interference Alignment

Interactive Interference Alignment Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,

More information

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems Behrouz Khoshnevis and Wei Yu Department of Electrical and Computer Engineering University of Toronto, Toronto, Ontario,

More information

Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems. Ali Ramezani-Kebrya

Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems. Ali Ramezani-Kebrya Resource Management and Interference Control in Distributed Multi-Tier and D2D Systems by Ali Ramezani-Kebrya A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy

More information

A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources

A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources A Single-letter Upper Bound for the Sum Rate of Multiple Access Channels with Correlated Sources Wei Kang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College

More information

QoS Constrained Information Theoretic Capacity Maximization in CDMA Systems. Ph.D. Candidacy Exam Presentation

QoS Constrained Information Theoretic Capacity Maximization in CDMA Systems. Ph.D. Candidacy Exam Presentation QoS Constrained Information Theoretic Capacity Maximization in CDMA Systems Ph.D. Candidacy Exam Presentation Arash Abadpour Department of Electrical and Computer Engineering University of Manitoba July

More information

Cognitive Multiple Access Networks

Cognitive Multiple Access Networks Cognitive Multiple Access Networks Natasha Devroye Email: ndevroye@deas.harvard.edu Patrick Mitran Email: mitran@deas.harvard.edu Vahid Tarokh Email: vahid@deas.harvard.edu Abstract A cognitive radio can

More information

5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER /$ IEEE

5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER /$ IEEE 5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER 2009 Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks Jun Fang, Member, IEEE, and Hongbin

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2)

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2) IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 361 Uplink Downlink Duality Via Minimax Duality Wei Yu, Member, IEEE Abstract The sum capacity of a Gaussian vector broadcast channel

More information

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Cell throughput analysis of the Proportional Fair scheduler in the single cell environment Jin-Ghoo Choi and Seawoong Bahk IEEE Trans on Vehicular Tech, Mar 2007 *** Presented by: Anh H. Nguyen February

More information

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Project Title IEEE 802.6 Broadband Wireless Access Working Group Codebook based pre-coding MIMO Date Submitted Source(s) 2008-05-05 Jaewan Kim, Wookbong Lee, Bin-chul Ihm Voice:

More information

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks

Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Distributed power allocation for D2D communications underlaying/overlaying OFDMA cellular networks Marco Moretti, Andrea Abrardo Dipartimento di Ingegneria dell Informazione, University of Pisa, Italy

More information

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks

Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless Networks Communications and Networ, 2010, 2, 87-92 doi:10.4236/cn.2010.22014 Published Online May 2010 (http://www.scirp.org/journal/cn Performance Analysis of a Threshold-Based Relay Selection Algorithm in Wireless

More information

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National

More information

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications

Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Energy minimization based Resource Scheduling for Strict Delay Constrained Wireless Communications Ibrahim Fawaz 1,2, Philippe Ciblat 2, and Mireille Sarkiss 1 1 LIST, CEA, Communicating Systems Laboratory,

More information

Statistical Modeling of Co-Channel Interference

Statistical Modeling of Co-Channel Interference Statistical Modeling of Co-Channel Interference Kapil Gulati, Aditya Chopra, Brian L. Evans and Keith R. Tinsley The University of Texas at Austin, Austin, Texas 7871 Email: gulati,chopra,bevans}@ece.utexas.edu

More information

Massive MIMO for Maximum Spectral Efficiency Mérouane Debbah

Massive MIMO for Maximum Spectral Efficiency Mérouane Debbah Security Level: Massive MIMO for Maximum Spectral Efficiency Mérouane Debbah www.huawei.com Mathematical and Algorithmic Sciences Lab HUAWEI TECHNOLOGIES CO., LTD. Before 2010 Random Matrices and MIMO

More information

Characterization of SINR Region for Interfering Links with Constrained Power

Characterization of SINR Region for Interfering Links with Constrained Power SUBMITTED TO IEEE TRANSACTIONS ON INFORMATION THEORY Characterization of SINR Region for Interfering Links with Constrained Power Hajar Mahdavi-Doost, Masoud Ebrahimi, and Amir K. Khandani Abstract In

More information

Coverage and Area Spectral Efficiency of Clustered Device-to-Device Networks

Coverage and Area Spectral Efficiency of Clustered Device-to-Device Networks Coverage and Area Spectral Efficiency of Clustered Device-to-Device Networks Mehrnaz Afshang, Harpreet S. Dhillon, and Peter Han Joo Chong Abstract This paper develops a new spatial model for deviceto-device

More information

Decentralized Detection In Wireless Sensor Networks

Decentralized Detection In Wireless Sensor Networks Decentralized Detection In Wireless Sensor Networks Milad Kharratzadeh Department of Electrical & Computer Engineering McGill University Montreal, Canada April 2011 Statistical Detection and Estimation

More information

NOMA: Principles and Recent Results

NOMA: Principles and Recent Results NOMA: Principles and Recent Results Jinho Choi School of EECS GIST September 2017 (VTC-Fall 2017) 1 / 46 Abstract: Non-orthogonal multiple access (NOMA) becomes a key technology in 5G as it can improve

More information

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu

More information

Node-Based Distributed Optimal Control of Wireless Networks

Node-Based Distributed Optimal Control of Wireless Networks Node-Based Distributed Optimal Control of Wireless Networks Yufang Xi and Edmund M. Yeh Department of Electrical Engineering Yale University New Haven CT 06520 USA Email: {yufang.xi edmund.yeh}@yale.edu

More information

ON BEAMFORMING WITH FINITE RATE FEEDBACK IN MULTIPLE ANTENNA SYSTEMS

ON BEAMFORMING WITH FINITE RATE FEEDBACK IN MULTIPLE ANTENNA SYSTEMS ON BEAMFORMING WITH FINITE RATE FEEDBACK IN MULTIPLE ANTENNA SYSTEMS KRISHNA KIRAN MUKKAVILLI ASHUTOSH SABHARWAL ELZA ERKIP BEHNAAM AAZHANG Abstract In this paper, we study a multiple antenna system where

More information

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks

Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks Optimal Power Allocation With Statistical QoS Provisioning for D2D and Cellular Communications Over Underlaying Wireless Networks Wenchi Cheng, Xi Zhang, Senior Member, IEEE, and Hailin Zhang, Member,

More information

Approximate Algorithms for Maximizing the Capacity of the Reverse Link in Multiple Class CDMA Systems

Approximate Algorithms for Maximizing the Capacity of the Reverse Link in Multiple Class CDMA Systems Approximate Algorithms for Maximizing the Capacity of the Reverse Link in Multiple Class CDMA Systems Arash Abadpour and Attahiru Sule Alfa Department of Electrical and Computer Engineering, University

More information

OPTIMIZATION OF ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS

OPTIMIZATION OF ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS OPTIMIZATION OF ENERGY CONSUMPTION IN WIREESS SENSOR NETWORKS Angela Feistel, Marcin Wiczanowski, Sławomir Stańczak Heinrich-Hertz Chair, EECS, University of Technology Berlin, Einsteinufer 25, 10587 Berlin,

More information

Channel Allocation Using Pricing in Satellite Networks

Channel Allocation Using Pricing in Satellite Networks Channel Allocation Using Pricing in Satellite Networks Jun Sun and Eytan Modiano Laboratory for Information and Decision Systems Massachusetts Institute of Technology {junsun, modiano}@mitedu Abstract

More information

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS The 20 Military Communications Conference - Track - Waveforms and Signal Processing TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS Gam D. Nguyen, Jeffrey E. Wieselthier 2, Sastry Kompella,

More information

Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding

Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding RadioVetenskap och Kommunikation (RVK 08) Proceedings of the twentieth Nordic Conference on Radio

More information

Random Matrices and Wireless Communications

Random Matrices and Wireless Communications Random Matrices and Wireless Communications Jamie Evans Centre for Ultra-Broadband Information Networks (CUBIN) Department of Electrical and Electronic Engineering University of Melbourne 3.5 1 3 0.8 2.5

More information

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm

Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm Lattice Reduction Aided Precoding for Multiuser MIMO using Seysen s Algorithm HongSun An Student Member IEEE he Graduate School of I & Incheon Korea ahs3179@gmail.com Manar Mohaisen Student Member IEEE

More information

Polar codes for the m-user MAC and matroids

Polar codes for the m-user MAC and matroids Research Collection Conference Paper Polar codes for the m-user MAC and matroids Author(s): Abbe, Emmanuel; Telatar, Emre Publication Date: 2010 Permanent Link: https://doi.org/10.3929/ethz-a-005997169

More information

Resource Allocation for D2D Communications with Partial Channel State Information

Resource Allocation for D2D Communications with Partial Channel State Information Resource Allocation for D2D Communications with Partial Channel State Information Anushree Neogi, Prasanna Chaporkar and Abhay Karandikar arxiv:1711.820v2 [cs.it] 8 Nov 27 Abstract Enhancement of system

More information

Bit Error Rate Estimation for a Joint Detection Receiver in the Downlink of UMTS/TDD

Bit Error Rate Estimation for a Joint Detection Receiver in the Downlink of UMTS/TDD in Proc. IST obile & Wireless Comm. Summit 003, Aveiro (Portugal), June. 003, pp. 56 60. Bit Error Rate Estimation for a Joint Detection Receiver in the Downlink of UTS/TDD K. Kopsa, G. atz, H. Artés,

More information

Power Control in Random Networks: The Effect of Disorder in User Positions

Power Control in Random Networks: The Effect of Disorder in User Positions 8th International Workshop on Spatial Stochastic Models for Wireless Networks, 4 May 202 Power Control in Random Networks: The Effect of Disorder in User Positions Aris L. Moustakas Physics Dept., Univ.

More information

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers Pramod Viswanath, Venkat Anantharam and David.C. Tse {pvi, ananth, dtse}@eecs.berkeley.edu

More information

P e = 0.1. P e = 0.01

P e = 0.1. P e = 0.01 23 10 0 10-2 P e = 0.1 Deadline Failure Probability 10-4 10-6 10-8 P e = 0.01 10-10 P e = 0.001 10-12 10 11 12 13 14 15 16 Number of Slots in a Frame Fig. 10. The deadline failure probability as a function

More information

FAST POWER CONTROL IN CELLULAR NETWORKS BASED ON SHORT-TERM CORRELATION OF RAYLEIGH FADING

FAST POWER CONTROL IN CELLULAR NETWORKS BASED ON SHORT-TERM CORRELATION OF RAYLEIGH FADING FAST POWER CONTROL IN CELLULAR NETWORKS BASED ON SHORT-TERM CORRELATION OF RAYLEIGH FADING Zvi Rosberg Radio Commun. Systems Lab., KTH, Stockholm, Sweden and Haifa Research Lab., Science and Technology,

More information

communication networks

communication networks Positive matrices associated with synchronised communication networks Abraham Berman Department of Mathematics Robert Shorten Hamilton Institute Douglas Leith Hamilton Instiute The Technion NUI Maynooth

More information

On the Optimality of Multiuser Zero-Forcing Precoding in MIMO Broadcast Channels

On the Optimality of Multiuser Zero-Forcing Precoding in MIMO Broadcast Channels On the Optimality of Multiuser Zero-Forcing Precoding in MIMO Broadcast Channels Saeed Kaviani and Witold A. Krzymień University of Alberta / TRLabs, Edmonton, Alberta, Canada T6G 2V4 E-mail: {saeed,wa}@ece.ualberta.ca

More information

The Optimality of Beamforming: A Unified View

The Optimality of Beamforming: A Unified View The Optimality of Beamforming: A Unified View Sudhir Srinivasa and Syed Ali Jafar Electrical Engineering and Computer Science University of California Irvine, Irvine, CA 92697-2625 Email: sudhirs@uciedu,

More information

Decentralized Admission Control and Resource Allocation for Power-Controlled Wireless Networks

Decentralized Admission Control and Resource Allocation for Power-Controlled Wireless Networks Decentralized Admission Control and Resource Allocation for Power-Controlled Wireless Networks S lawomir Stańczak 1,2 joint work with Holger Boche 1,2, Marcin Wiczanowski 1 and Angela Feistel 2 1 Fraunhofer

More information