Optimality of Beamforming for MIMO Multiple Access Channels via Virtual Representation

Similar documents
Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Transmit Directions and Optimality of Beamforming in MIMO-MAC with Partial CSI at the Transmitters 1

USING multiple antennas has been shown to increase the

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints

Multiuser Capacity in Block Fading Channel

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation

Capacity optimization for Rician correlated MIMO wireless channels

Lecture 7 MIMO Communica2ons

Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels

On the Optimality of Multiuser Zero-Forcing Precoding in MIMO Broadcast Channels

Tight Lower Bounds on the Ergodic Capacity of Rayleigh Fading MIMO Channels

Multiple Antennas in Wireless Communications

The Optimality of Beamforming: A Unified View

On the Rate Duality of MIMO Interference Channel and its Application to Sum Rate Maximization

MIMO Capacity in Correlated Interference-Limited Channels

Optimal Transmit Strategies in MIMO Ricean Channels with MMSE Receiver

Transmitter optimization for distributed Gaussian MIMO channels

On the Capacity of Distributed Antenna Systems Lin Dai

MULTIPLE-input multiple-output (MIMO) wireless systems,

Lecture 5: Antenna Diversity and MIMO Capacity Theoretical Foundations of Wireless Communications 1. Overview. CommTh/EES/KTH

MULTIPLE-INPUT multiple-output (MIMO) systems

What is the Value of Joint Processing of Pilots and Data in Block-Fading Channels?

Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels

On the Fluctuation of Mutual Information in Double Scattering MIMO Channels

Parallel Additive Gaussian Channels

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

Under sum power constraint, the capacity of MIMO channels

Characterizing the Capacity for MIMO Wireless Channels with Non-zero Mean and Transmit Covariance

12.4 Known Channel (Water-Filling Solution)

Schur-convexity of the Symbol Error Rate in Correlated MIMO Systems with Precoding and Space-time Coding

On the Impact of Quantized Channel Feedback in Guaranteeing Secrecy with Artificial Noise

Diversity Multiplexing Tradeoff in Multiple Antenna Multiple Access Channels with Partial CSIT

Algebraic Multiuser Space Time Block Codes for 2 2 MIMO

Improved Sum-Rate Optimization in the Multiuser MIMO Downlink

Ergodic and Outage Capacity of Narrowband MIMO Gaussian Channels

Rate-Optimum Beamforming Transmission in MIMO Rician Fading Channels

Single-User MIMO systems: Introduction, capacity results, and MIMO beamforming

Optimum Transmission Scheme for a MISO Wireless System with Partial Channel Knowledge and Infinite K factor

Vector Channel Capacity with Quantized Feedback

MULTI-INPUT multi-output (MIMO) channels, usually

Multiple Antennas for MIMO Communications - Basic Theory

On the Capacity of Fading MIMO Broadcast Channels with Imperfect Transmitter Side-Information

Achievable Outage Rate Regions for the MISO Interference Channel

Wideband Fading Channel Capacity with Training and Partial Feedback

WE study the capacity of peak-power limited, single-antenna,

An Uplink-Downlink Duality for Cloud Radio Access Network

Uniform Power Allocation in MIMO Channels: A Game-Theoretic Approach

1402 IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 25, NO. 7, SEPTEMBER 2007

Ergodic Capacity, Capacity Distribution and Outage Capacity of MIMO Time-Varying and Frequency-Selective Rayleigh Fading Channels

WIRELESS networking constitutes an important component

Game Theoretic Solutions for Precoding Strategies over the Interference Channel

5032 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 11, NOVEMBER /$ IEEE

Spatial and Temporal Power Allocation for MISO Systems with Delayed Feedback

Degrees-of-Freedom Robust Transmission for the K-user Distributed Broadcast Channel

Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel

Degrees of Freedom Region of the Gaussian MIMO Broadcast Channel with Common and Private Messages

Linear Processing for the Downlink in Multiuser MIMO Systems with Multiple Data Streams

Optimal Data and Training Symbol Ratio for Communication over Uncertain Channels

Channel Capacity Estimation for MIMO Systems with Correlated Noise

Capacity of Block Rayleigh Fading Channels Without CSI

On the Required Accuracy of Transmitter Channel State Information in Multiple Antenna Broadcast Channels

Diversity-Multiplexing Tradeoff in MIMO Channels with Partial CSIT. ECE 559 Presentation Hoa Pham Dec 3, 2007

to reprint/republish this material for advertising or promotional purposes

CHANNEL FEEDBACK QUANTIZATION METHODS FOR MISO AND MIMO SYSTEMS

Information Theory for Wireless Communications, Part II:

On the Optimality of Beamformer Design for Zero-forcing DPC with QR Decomposition

A deterministic equivalent for the capacity analysis of correlated multi-user MIMO channels

Optimization of Multiuser MIMO Networks with Interference

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Weighted Sum Rate Optimization for Cognitive Radio MIMO Broadcast Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Pilot Optimization and Channel Estimation for Multiuser Massive MIMO Systems

Asymptotically Optimal Power Allocation for Massive MIMO Uplink

Throughput analysis for MIMO systems in the high SNR regime

Sum-Power Iterative Watefilling Algorithm

MULTIPLE-INPUT Multiple-Output (MIMO) systems

ONE of the key motivations for the use of multiple antennas

Capacity Bounds of Downlink Network MIMO Systems with Inter-Cluster Interference

Capacity Region of the Two-Way Multi-Antenna Relay Channel with Analog Tx-Rx Beamforming

On the Throughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States

User Selection Criteria for Multiuser Systems With Optimal and Suboptimal LR Based Detectors REFERENCES. Jinho Choi and Fumiyuki Adachi

On the Capacity of the Multiple Antenna Broadcast Channel

Minimum Mean Squared Error Interference Alignment

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint

ASPECTS OF FAVORABLE PROPAGATION IN MASSIVE MIMO Hien Quoc Ngo, Erik G. Larsson, Thomas L. Marzetta

PROMPTED by recent results suggesting possible extraordinary

OVER the past ten years, research (see the references in

Title. Author(s)Tsai, Shang-Ho. Issue Date Doc URL. Type. Note. File Information. Equal Gain Beamforming in Rayleigh Fading Channels

Lecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH

A New SLNR-based Linear Precoding for. Downlink Multi-User Multi-Stream MIMO Systems

On the Capacity of MIMO Rician Broadcast Channels

Sum-Rate Capacity of Poisson MIMO Multiple-Access Channels

VECTOR QUANTIZATION TECHNIQUES FOR MULTIPLE-ANTENNA CHANNEL INFORMATION FEEDBACK

Information Theory Meets Game Theory on The Interference Channel

Cooperative Interference Alignment for the Multiple Access Channel

Mutual Information and Eigenvalue Distribution of MIMO Ricean Channels

Quantifying the Performance Gain of Direction Feedback in a MISO System

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Transcription:

TO APPAR I TRANSACTIONS ON SIGNAL PROCSSING Optimality of Beamforming for MIMO Multiple Access Channels via Virtual Representation Hong Wan, Rong-Rong Chen, and Yingbin Liang Abstract Ihis paper, we consider the optimality of beamforming for achieving the ergodic capacity of multiple-input multiple-output MIMO multiple access channel MAC via virtual representation VR model. We assume that the receiver nows the channel state information CSI perfectly but that the transmitter nows only partial CSI, i.e., the channel statistics. For the single-user case, we prove that the capacity-achieving beamforming angle c.b.a. is unique, and there exists a signal-to-noise ratio SNR threshold below which beamforming is optimal and above which beamforming is strictly suboptimal. For the multi-user case, we show that the c.b.a is not unique and we obtain explicit conditions that determine the beamforming angles for a special class of correlated MAC-VR models. Under mild conditions, we show that a large class of power allocation schemes can achieve the sum-capacity within a constant as the number of users ihe system becomes large. The beamforming scheme, in particular, is showo be asymptotically capacityachieving only for certain MAC-VR models. I. INTRODUCTION The multiple-input multiple-output MIMO techniques provide powerful means to improve reliability and capacity of wireless channels. Significant amount of wor has been done to study optimal input distributions and the channel capacity of single-user and multi-user MIMO channels see, e.g., 7. Several models have been adopted to capture the spatial correlation between the channel gains corresponding to different transmitreceive antenna pairs. These models include the i.i.d. model, the Kronecer model 2, 8 0, the virtual representation VR model 4,, and the unitaryindependent-unitary UIU model 5. The i.i.d. model assumes that the channel gains are independent and identically distributed i.i.d., and the Kronecer model assumes that the correlation betweehe channel gains The material ihis paper has been presented in part at the I International Symposium on Information Theory ISIT 08. Hong Wan and Rong-Rong Chen are with Department of C, University of Utah, 50 S. Central Campus Dr. Rm. 3280, Salt Lae City, Utah, 842. Tele: 80-585-7367, Fax: 80 58-528, mail: {rchen, wan}@ece.utah.edu. Yingbin Liang is with Dept. of CS, Syracuse University, Syracuse, NY 3244. mail: yliang06@syr.edu, Tele: 609-658-330. can be written ierms of the product of the transmit correlation and the receive correlation. These two models apply only to wireless environments with rich or locally rich scattering at either the transmitter or the receiver. The VR and UIU models are more general, and both transform the MIMO channel to a domain such that the channel gains can be justified to be approximately independent. Ihis paper, we adopt the VR model, which represents the MIMO channel in a virtual angular domain with each channel gain corresponding to one virtual transmit and receive angle pair. The channel gains in the angular domain can be justified to be approximately independent of each other, although not necessarily identically distributed, because they include different signal paths corresponding to different transmit and receive angle pairs with independent random phases. The single-user MIMO channel based on VR was studied in 4. Ihis paper, we generalize this study to the MIMO multiple access channel MAC based on VR, denoted by MAC-VR. We first characterize the optimal input distributiohat achieves the sum-capacity. Then we study the optimality of beamforming, which is a simple scalar coding strategy desirable in practice. We first strengthehe conditions for the optimality of beamforming for the single-user VR model in 4 by proving that there exists a signal-to-noise ratio SNR threshold below which beamforming is optimal and above which beamforming is strictly suboptimal. This result was illustrated in 4 only numerically. For the multi-user case, we present an example to show that the capacity-achieving beamforming angle c.b.a of a given user may vary with SNR and beamforming angles of other users. This is in contrast to the single-user case in which the c.b.a. is independent of SNR. We also derive explicit conditions to determine possible c.b.a. for certain MAC-VR channels. For systems with K users, we show that as K goes to infinity, the sum-rates achieved by a large class of power allocation schemes are within a constant of the sum-capacity, and they grow ihe order of n r logk, where n r is the number of receive antennas. Furthermore, we obtain conditions under which beamforming is asymptotically capacity-

TO APPAR I TRANSACTIONS ON SIGNAL PROCSSING 2 achieving. Our study for the single-user case generalizes that in 2, 6 for the Kronecer model, and is different from 2 for the double-scattering model 3. Our study for the MAC-VR also differs from 7 which assumes perfect channel state information at the transmitter, and from 4, which assumes finite feedbac. We also note that the results we derive for the MAC-VR are applicable to the MIMO-MAC Kronecer MAC-Kr model in 9. However, certain results valid for the MAC-Kr may not hold for the MAC-VR as demonstrated in later sections. II. CHANNL MODL AND VIRTUAL RPRSNTATION We consider the K-user MIMO MAC, in which K users transmit to one base station BS with each user equipped with antennas and the BS equipped with n r antennas. The channel between each user and the BS is assumed to be a frequency-flat, MIMO fading channel. The received signal at the BS is ann r -dimensional vector Y C nr and is given by K p Y = H X +W, = where X C nt is the input vector of user that satisfies the power constraint X X, denotes the Hermitian operator, p represents the effective SNR of user at each receive antenna, W C nr is a proper complex Gaussian noise vector that consists of i.i.d. entries with zero-mean and unit-variance, and H C nr nt is the channel matrix of user. The entries of H are identically distributed with unit variance, i.e., H m,j 2 = for all m =,...,n r and j =,...,. In general, these entries are correlated because each channel gain ihe antenna domain corresponding to one transmit and receive antenna pair captures all of the signal paths. For each H, we follow 4 to consider its virtual representation H = A H r A t, where A r and A t are two-dimensional spatial Fourier matrices. The matrix H is referred to as a virtual representation of H. ach element of H, referred to as the virtual coefficient, represents the channel gain corresponding to one transmit and receive virtual angle pair. The virtual coefficients are independent and not identically distributed i.n.d. random variables and each is assumed to be a zero-mean proper complex random variable with a symmetric distribution around the origin. The independency among virtual coefficients can be justified because they correspond to different pairs of transmit and receive angles and thus capture different sets of signal paths with independent random phases. The correlation of the channel gains ihe antenna domain is implicitly determined by the i.n.d. channel gains in virtual domain and the Fourier transform betweehe two domains. A virtual representation of the MIMO MAC channel is given by K p Ỹ = H n X + W, 2 t = where X = A t X, Ỹ = A ry, and W = A rw. Due to the unitarity of A t, the input power constraint ihe virtual domain does not change, i.e., X X. Given H, we define the m,j-th element of the variance matrix V as Vm,j = Var H m,j, for m n r and j, which characterizes the second order statistics of H. Remar : It can be showhat the MAC-Kr also taes the form of 2 under unitary transformations. However, it imposes more constraints on H than MAC- VR does. For MAC-Kr, each element of H is assumed to be Gaussian distributed. This is not required for the MAC-VR. Furthermore, for MAC-VR, the elements of H are i.n.d., and thus elements of V caae any nonnegative value. For MAC-Kr, Vm,j taes on a product form: Vm,j = a m b j, for every m n r and j, 3 where{a m } and{b j } are square-roots of the eigenvalues of the receive correlation and transmit correlation matrix, respectively. III. PRLIMINARIS Ihis section, we present some preliminary results that will be used ihe proofs of the main results in Sections IV and V. Since these preliminary results can be easily derived following techniques in 4, 9, 0, the proofs are omitted for brevity. First, we show that the sum-capacity of MAC-VR is achieved whehe inputs of all users ihe virtual domain are zero-mean proper complex Gaussian and are independent of each other. Let Q = X X be the input covariance matrix of user. The sum-capacity is given by C = max log det I nr + Tr Q =,,K K = p H Q H, 4 We note that a channel matrix with arbitrary correlation in the antenna domain may not necessarily have a meaningful virtual representation with an i.n.d. channel matrix ihe angular domain.

TO APPAR I TRANSACTIONS ON SIGNAL PROCSSING 3 where the expectation is over { H, =,,K}, and the constraint on Q is due to the power constraint for user. Here we assume that { H } changes iime and the receiver nows the perfect channel state information CSI { H }. The transmitter nows only partial CSI, i.e., the channel statistics {V }, which does not change over the time duration of interest. Following techniques of 4, we can prove that the capacity-achieving covariance matrices are diagonal 5. Furthermore, a necessary and sufficient condition for the optimality of the input covariance matrices can be derived following similar approaches of 9, 0. This leads to Theorem below. Theorem : The diagonal covariance matrices { Q, =,,K} achieve the sum-capacity if and only if for every K and j, we have Tr A h j h j H Q H { = 0, if λ j > 0, 0, if λ j = 0, 5 where Q = diagλ,,λ, A = I nr + K l= p l Hl Ql Hl, and h j denotes the j-th column of H. Remar 2: Since the diagonal element λ j, j =,...,, of Q can be interpreted as the amount of transmission power allocated for the j-th virtual transmit angle, computation of the optimal covariance matrices to maximize the ergodic capacity is equivalent to finding the optimal power allocation parameters {λ j }. Although the iterative algorithm in 0 can be applied to compute the optimal power allocation, it has high complexity due to statistical averaging over fading distributions. A low-complexity algorithm that utilizes only the second order statistics of the fading distribution, i.e., the variance matrix V, can be developed for the MAC-VR following similar approaches of 6. When all users perform beamforming, i.e., each user allocates full transmission power to a virtual anglei the beamforming angle, then from 5 we obtain Corollary below that characterizes the optimality of beamforming. It is equivalent to 9, Theorem 2 for the MAC-Kr. Corollary : Consider a K-user MAC-VR in which each user performs beamforming along virtual angle i. Let A = I nr + K p l hl il hl i l. Then beamforming is l= optimal, ierms of achieving the sum-capacity 4, if and only if for every j =,, and =,,K, the following condition is satisfied f j p = h j A h j h i A h i 0. 6 IV. OPTIMALITY OF BAMFORMING A. Single-User Case It is observed in 4 numerically that there exists an SNR threshold below which beamforming is optimal and above which beamforming is suboptimal. Here we provide a mathematical proof of this threshold behavior. The ey step of the proof follows from Lemma below, which characterizes an important property of the beamforming condition f j p in 6. For K =, we assume that the user beamforms to virtual angle i, and thus we have A = I nr + p h i h i, and f jp = h j A hj h i. A hi Lemma : If f j p satisfies f j p 0, then we must have f j p > 0. Proof: Let f j p denote the derivative of f jp with respect to p. We will prove that for every j i, f jp > p +p h i 2 f j p. 7 Once 7 is proved, Lemma immediately follows because +p h 0. To prove 7, we i 2 apply the matrix inversion lemma to write f j p = u j p + v j p, where u j p = hj 2 h i 2 and +p h i 2 v j p = hj 2 h i 2 h j h i 2 p + h i 2. Due to the Cauchy- Schwartz inequality, we have h j 2 h i 2 h j h i 2 > 0 and thus v j p is a positive, strictly increasing function of p with v j p > 0. It follows that f jp > u hi 4 h j 2 h i 2 jp = +p h i 2 2 = p hi 2 h j 2 + p +p h i 2 p h i 2 +p hi 2 2 h j 2 +p hi 2 2. 8 For the second term of 8, since h j is independent of h i, we apply the inequality /x 2 > /x 2 with x = +p h i 2 to obtain h j 2 +p hi 2 2 > = 2 +p h i 2 +p h i 2 h j 2 h j 2 +p h i 2. 9

TO APPAR I TRANSACTIONS ON SIGNAL PROCSSING 4 For the third term of 8, we apply the same inequality to obtain h i 2 +p hi 2 2 = p +p hi 2 2 p +p hi 2 > +p h i 2 hi 2. +p h i 2 0 We then substitute 9 and 0 into 8 to obtain 7. Next, we characterize the threshold behavior of beamforming in Theorem 2. Theorem 2: For a single-user VR channel, the i-th virtual angle is the c.b.a. if and only if a The i-th virtual angle has a sum-variance, defined by n r j= V j,i, that is strictly larger thahe sumvariance of any other virtual angles. This condition implies that the c.b.a. is unique. b The SNR is below a threshold, i.e., p < p s, where p s is a fixed constant. Proof: It follows from Lemma thatf j p is strictly increasing at anypsuch that f j p 0. This implies that i If f j 0 0, then f j p is nonzero over p 0,, and thus we have f j p > 0 for all p > 0. ii If f j 0 < 0, thenf j p has a unique zero pointp j such thatf j p < 0 if and only if p < p j. Hence, if virtual angle i is the c.b.a, i.e., f j p 0 for some p > 0 and j i, then it follows from i that we must have f j 0 < 0. Since f j 0 = h j 2 h i 2, angle i must have the largest sum-variance. This proves Theorem 2 a. Theorem 2 b follows from ii by letting p s = min p j. j i B. Multi-User Case For the multi-user case, we first present an example to show that for the c.b.a. of a particular user is not unique, and it may vary with the SNRs and beamforming angles of other users ihe system. xample : Consider a two-user MAC-VR with = n r = 2. The variance matrices are V = 3 0 0, V 2 = 2.5 0 0.5 find that, if p,p 2 = 5 db, 0 db, the first virtual angle is the c.b.a. for both users. If p,p 2 = 3 db, 0 db, however, the second virtual angle becomes the c.b.a. for user 2, while the first angle is still the c.b.a. for user. Next, we show in Theorem 3 that whehe variance matrix satisfies certain properties, some of the virtual angles cannot be the c.b.a. of a given user. We first present a useful Lemma. Lemma 2: Assume that there exists virtual angels i,j for a user ihe MAC-VR such that V m,i V m,j for every m =,,n r. Then we have cj c i h +p c i > 0, where c j = j D h j,c i = h i D h i I, and D = nr + K. l pl hl il hl i l Proof: It suffices to show that for any fixed D, we have Ē cj c i +p c i > 0, here Ē denotes the conditional expectation over h j and h i, given D. Since c j and c i are independent given D, we obtain cj c i Ē +p c i = +p Ē c j p +p c i = p Ē+p c j Ē > p Ē+p c j Ē+p c i +p c i = p +p Ēc j +p Ēc i, 2 where the inequality follows from the Jensen s inequality /x > /x. Next, we show that Ēc j Ēc i, and thus the right-hand side of 2 is non-negative. We can write Ēc j Ēc i = Ē h j D h j Ē h i D h i = Tr D Ē h j h j h i h i. It follows from that Ē h j h j h i h i = diagv,j V,i,,V n V r,j n r,i is a diagonal matrix with non-negative entries. This, combined with D being a positive definite Hermitian matrix with positive diagonal entries, imply that Ēc j Ēc i. Theorem 3: Consider user in a K-user MAC-VR. The i-th virtual angle cannot be the c.b.a. of user if there exists another virtual angle j such that holds. Proof: It is sufficient to prove that the beamforming condition 6, with i = i, is violated for any j that satisfies, i.e., fj p > 0. To prove this, we apply the matrix inversion lemma to write. From condition 6 we fj cj c i cj c i h p j = +p + D h i h i D h j c i p +c i cj c i > +p. c i 3 The inequality above is due to the Cauchy-Schwartz inequality that c j c i h j D h i h i D h j > 0. It then follows from Lemma 2 and 3 that fj p > 0. Thus, angle i cannot be the c.b.a. of user.

TO APPAR I TRANSACTIONS ON SIGNAL PROCSSING 5 xample 2: Assume that V.5.6 0.3 =. 0.6 0.8.2 Since is satisfied for i = and j = 2, it follows from Theorem 3 that the first virtual angle cannot be the c.b.a for user. This result holds independent of the SNR and other users beamforming angles. An immediate corollary of Theorem 3 is as follows: Corollary 2: If there exists a virtual angle i such that Vm,i > Vm,j, for every m n r and j i, then angle i is the only possible c.b.a. Corollary 2 is applicable to both MAC-VR and MAC- Kr. For MAC-Kr, we see that the c.b.a. of user is the i-th angle that maximizes {b j,j =,,} defined in 3, and thus the c.b.a is unique. In comparison, the c.b.a. is not unique for MAC-VR. Such differences arise because the variance matrix for MAC-VR taes a general form, while that of MAC-Kr is restricted to the product form 3. V. POWR ALLOCATION FOR LARG SYSTMS Ihis section, we show that under mild conditions, the sum-capacity of a K-user system, denoted by CK, grows ihe order of n r logk. Furthermore, we present conditions under which the sum-rate achieved by a power allocation scheme λ is within a constant of CK as K goes to infinity. Given a power allocation λ = {λ j, =,,K,j =,, }, let A K = I nr + K K =j= p = p H Q H = I nr + λ j h j h j. The sum-rate achieved by λ is given by Iλ,K = logdeta K. We apply Jensen s inequality to obtain an upper bound Īλ,K such that Iλ,K = logdeta K logdeta K n r K p = log + λ j n V m,j t = m= = j= Īλ,K. 4 Proposition below shows that under mild conditions, Īλ,K is asymptotically tight as K. Proposition : Assume that M 4 = sup m,j, p 2 h m,j 4 <. If there exists a constant c > 0 such that λ satisfies min liminf m n r K K = j= p λ j n V m,j c > 0, 5 t then we have Iλ,K = Īλ,K + o, where o converges to zero as K. Proof. First, we write Iλ,K Īλ,K = log deta K deta K deta K = log n r + K p λ j V m,j ÃK m,i = m= = logdetãk, =j= where the m,i-th element ofãk, denoted by ÃK m,i, is given by + K p λ j h m,j h i,j = =j= + K + K =j= =j= + K =j= p λ j V m,j p λ j h m,j h i,j p λ j V m,j /+K /+K. 6 We let S K denote the numerator ihe second fraction of 6, which equals the average of the summation of independent random variables. It follows from the Strong Law of Large Number SLLN and 5 that 0= lim S K S K =limsup S K S K S K lim inf S K lim sup S K S K c limsup S K S K. Thus, for m = i we obtain lim ÃK i,i = lim SK / S K =. For m i, since S K = 0, it follows from 5 and the SLLN that lim ÃK m,i c lim S K = 0. This proves that SK S K = c lim à K converges to the identity matrix and thus lim logdet à K = 0. Assume that the distributions of the random vectors { h j } are sufficiently smooth to facilitate exchange of the limit and the expectation operator, we obtain lim Iλ,K Īλ,K = lim logdet à K = lim logdetãk = 0. Note that although both proofs apply the SLLN, the proof of Proposition differs from that of 9, Lemma 2 for the MAC-Kr ihat we provide a sufficient condition 5, which guarantees that 7 holds. From Proposition we obtain Corollary 3 below. Corollary 3: For any λ that satisfies 5, we have Iλ,K = CK+O = n r logk+o, whereo

TO APPAR I TRANSACTIONS ON SIGNAL PROCSSING 6 denotes a bounded quantity as K. Hence, Iλ,K grows ihe order of n r logk, and asymptotically it differs from the sum-capacity CK by only a constant. Setch of proof. It is sufficient to show that there exists constants u and u c such that n r logk +u c +o Iλ,K CK maxīλ,k n r logk +u +o. 7 λ From 5 we can find u c such that Īλ,K n r logk+u c. This, combined with Proposition, leads to the first inequality of 7. The last inequality of 7 utilizes M 2 = sup m,j, p Vm,j <. Next, we consider a simple example for which we can characterize the term O in Corollary 3 for various λ. The accuracy of these computations will be verified in Section VI. xample 3: Assume that all users have the samep = 2 and the same variance matrix V =. The 2 0.5 0.5 virtual elements in H are complex Gaussian distributed. Assume that each user adopts the same power allocation λ = λ,λ 2 such that λ + λ 2 = 2. For each λ that satisfies the assumptions of Proposition, we have Iλ,K = Īλ,K+o = 2logK+log2λ +0.5 λ 2 + log0.5 λ +λ 2 +o. 8 Consider the following three power allocations for which Proposition and Corollary 3 are applicable. The beamforming scheme λ BF where each user beamforms to the first virtual angle which has the largest sum-variance. Since λ = 2,λ 2 = 0, it follows from 8 that Iλ BF,K = Īλ BF,K+o = 2logK +log4+o. 9 2 The equal power allocation λ q such that λ = λ 2 =. From 8 we have Iλ q,k = Īλ q,k+o = 2logK +log5/4 +o = 2logK +.9069+o. 20 3 We can choose λ,λ 2 to maximize the summation of the two constant terms in 8. This yields the optimized solution λ = λ,λ 2 = 5/3,/3. Hence, from 8 we have Iλ,K = Īλ,K+o = 2logK +log49/2 +o = 2logK +2.0297+o. 2 The constant term in 2 is slightly greater thahat of λ BF in 9 and that ofλ q in 20. This example demonstrates that beamforming may not be asymptotically optimal for the MAC-VR, evehough it is asymptotically optimal for MAC-Kr 9, Theorem 7. Corollary 4 below provides a sufficient condition under which beamforming is asymptotically optimal for MAC-VR. Corollary 4: Beamforming is asymptotically optimal for the MAC-VR: Iλ BF,K = CK+o, as K, if each user beamforms to a virtual angle i that satisfies V m,i V m,j for every m n r and j, and there exists a constant c > 0 such that min liminf m n r K K p Vm,i c > 0. 22 = Setch of proof. Given Vm,i Vm,j, one can show that CK Īλ BF,K. Condition 22 ensures that Iλ BF,K = Īλ BF,K + o. Thus Corollary 4 follows. Considering a special case of Corollary 4 in which we let i be the virtual angle that maximizes {b j,j =,, }, then we obtaihe same result as 9, Theorem 7 that beamforming is always asymptotically optimal for MAC-Kr. In comparison, as shown in xample 3, there exists MAC-VR such that beamforming is not asymptotically optimal. This difference, again, is due to the general structure of the variance matrix for MAC- VR. VI. NUMRICAL RSULTS Ihis section, we present numerical examples to illustrate the theoretical results given in previous sections. Four power allocation schemes are considered: the equal power allocation λ q, the beamforming scheme λ BF, the optimal power allocation λ Opt found by the algorithm of 0, and a low-complexity power allocation algorithm derived based on 6 λ Low. Let Iλ denote the sum-rate achieved by λ. We first consider a singleuser system with n r = = 5. The virtual coefficients in H are assumed to be complex Gaussian distributed with the same variance matrix as the one in 4, given by V = 25 5.7 0. 0 0 0 0 0. 0 0 0 0 0 0 0 0 0.25 0 0 0 0 0.25. 23 Please refer to 4 for the physical meaning of such a variance matrix. The third virtual angle is the beamforming angle because it has the largest sum-variance. Fig.

TO APPAR I TRANSACTIONS ON SIGNAL PROCSSING 7 K=, n =5, n =5 t r 4 sum rate bits/s/hz 2 0 8 6 4 optimum low complexity Alg. equal power beamforming 0.8 0.6 0.4 0.2 0 0.2 0.4 0.29 db f p f 4 p 2 0 5 0 5 SNRdB a Single-user system with = n r = 5 0.6 0 2 4 6 8 0 2 4 6 SNRdB b Beamforming conditions, SNR threshold is at 0.29 db 2.3 =2, n r =2, SNR=3dB 40 =5, n r =5, SNR=5dB 2.25 35 sum rate 2logK b/s/hz 2.2 2.5 2. 2.05 2.95 beamforming 20 equal power 2 optimized 22 sum rate b/s/hz 30 25 20 5 equal power beamforming low compleixty Alg. upper bound.9 Fig.. 20 40 60 80 00 20 K, the number of users c Numerical verification of xample 3. Optimality of beamforming for MAC-VR. 0 5 0 5 20 25 30 35 40 45 50 K, the number of users d Optimality of beamforming for large systems a shows that Iλ Low is very close to Iλ Opt for the entire range of SNRs considered. Iλ q is near optimal only at high SNR and Iλ BF is optimal only when SNR is below the threshold of 0.29 db. This is consistent with the threshold behavior proved in Theorem 2. In Fig. b, we plot the beamforming conditions defined in Section IV-A for the third virtual angle i = 3. Since f 2 p = f p and f 5 p = f 4 p, Fig. b plots f p and f 4 p and shows that when SNR is below 0.29 db, both functions are negative and thus beamforming to the third virtual angle is optimal. In Fig. c, we examine the accuracy of Proposition and Corollary 3 by comparing the asymptotic expressions 9-2 in xample 3 with numerical values of Iλ, K obtained through Monte Carlo integration. Three functions Iλ BF,K 2logK, Iλ q,k 2logK, and Iλ,K 2logK are plotted to confirm that as K increases, they indeed converge to the predicted constants 2,.9069, and 2.0297, respectively. Fig. d considers a multi-user system in which each V is generated independently, taing a form similar to 23. The beamforming angle of user is chosen to be the virtual angle with the largest sum-variance. Because {V } satisfy conditions of Corollary 4, λ BF is asymptotically optimal. This is confirmed in Fig. d. The curve for Iλ Opt,K is not shown due to high complexity for computing λ Opt. Instead, we provide a simple sum-capacity upper bound CK n r log+km 2 as a performance benchmar for large K. Hence, the gap between Iλ BF,K and CK is less thahe small gap shown in Fig. d between Iλ BF,K and the upper bound. The gap becomes negligible as K increases, confirming the optimality of beamforming. For small K, Iλ Low,K closely approximates Iλ Opt,K not shown. For large K, Iλ Low,K and Iλ BF,K merge quicly and become indistinguishable after K 30. We note that Iλ q,k is inferior to Iλ BF,K by roughly a constant, evehough it achieves the same asymptote of n r logk = 5logK. This is consistent with Corollary 3.

TO APPAR I TRANSACTIONS ON SIGNAL PROCSSING 8 VII. CONCLUSION Ihis paper, we study the optimality of beamforming for the MAC-VR. For the single-user case, we provide a mathematical proof of the threshold behavior for the optimality of beamforming which is applicable to both Kronecer model and VR model. We present useful criteria in determining the capacity-achieving beamforming angles for a class of MAC-VR models. Due to the generality of the VR model, we demonstrate by examples that existing results for the MAC-Kr may not be valid for the MAC-VR. These include the uniqueness of the capacity-achieving beamforming angle, and the optimality of beamforming for systems with large number of users. 4 W. Dai, B. Rider, and Y. Liu, Joint beamforming for multiaccess MIMO systems with finite rate feedbac, I Transactions on Wireless Communications, vol. 8, no. 5, pp. 268 2628, May. 2009. 5 H. Wan, R.-R. Chen, and Y. Liang, Optimality of beamforming in MIMO multi-access channels via virtual representation, in Proc. I International Symposium on Information Theory ISIT 08, pp. 2573 2577, July, 2008. 6 S. Lasaulce, A. Suarez, M. Debbah, and L. Cottatellucci, Power allocation game for fading MIMO multiple access channels with antenna correlation, Conference on GameComm, Oct. 2007. RFRNCS I.. Telatar, Capacity of multi-antenna Gaussian channels, ur. Trans. Telecom, vol. 0, pp. 585 595, Nov. 999. 2 S. Jafar and A. Goldsmith, Transmitter optimization and optimality of beamforming for multiple antenna systems, I Trans. Wireless Commun., vol. 3, pp. 65 75, July 2004. 3 Z. Wang and G. B. Giannais, Outage mutual information rate of space-time MIMO channels, I Trans. on Information Theory, vol. 50, no. 4, pp. 657 662, Sep. 200. 4 V. V. Veeravalli, Y. Liang, and A. M. Sayeed, Correlated MIMO wireless channels: Capacity, optimal signaling, and asymptotics, I Transactions on informatioheory, vol. 5, pp. 2058 2072, 2005. 5 A. M.Tulino, A. Lozano, and S. Verdu, Impact of antenna correlation ohe capacity of multiantenna channels, I Trans. on Information Theory, vol. 5, pp. 249 2509, July 2005. 6. Jorswiec and H. Boche, Channel capacity and capacity range of beamforming in MIMO wireless systems under correlated fading with covariance feedbac, I Trans. on Wireless Commu., vol. 3, pp. 543 553, Sep. 2004. 7 W. Rhee, W. Yu, and J. M. Cioffi, The optimality of beamforming in uplin multiuser wireless systems, I Trans. on Wireless Commu., vol. 3, no., pp. 86 96, Jan. 2004. 8 H. Shin and J. H. Lee, Capacity of multiple-antenna fading channels: Spatial fading correlation, double scattering, and eyhole, I Trans. on Info. Theory, vol. 49, pp. 2636 2647, Oct. 2003. 9 A. Soysal and S. Uluus, Optimality of beamforming in fading multiple access channels, I Trans. on Communications, pp. 7 83, April, 2009. 0, Optimum power allocation for single-user MIMO and multi-user MIMO-MAC with partial CSI, I Trans. on Selected Areas in Communication, no. 7, pp. 402 42, Sep. 2007. A. M. Sayeed, Deconstructing multi-antenna fading channels, I Trans. Signal Processing, pp. 2563 2579, Oct, 2002. 2 X. Li, S. Jin, X. Gao, M. Mcay, and K. Wong, Transmitter optimization and beamforming optimality conditions for doublescattering MIMO channels, I Trans. Wireless Commun., vol. 7, no. 9, pp. 3647 3654, Sep. 2008. 3 D. Gesbert, H. Bolcsei, D. A. Gore, and A. J. Paulraj, Ourdoor MIMO wireless channels: Models and performance prediction, I Trans. Commun., vol. 50, no. 2, pp. 886 888, Dec. 2002.