4,385 research outputs found

    Cooperative Power Scheduling for a Network of MIMO Links

    Get PDF
    A cooperative power scheduling algorithm developed by Wang, Krunz and Cui is extended for an ad hocnetwork of MIMO links. This algorithm, referred to as pricebased iterative water filling (PIWF) algorithm, is a distributed algorithm by which each link computes its power scheduling through an iterative and cooperative process. The cooperation among all links is achieved by adaptive price factors appliedby each link. Compared to a centralized power scheduling algorithm, the PIWF algorithm is much more efficient in computation although not as efficient in network throughput. Compared to a non-cooperative counter-part by Demirkol and Ingram where all price factors are zero, the PIWF algorithm requires additional in-network computation but is more efficient in network throughput

    Large-Scale MIMO versus Network MIMO for Multicell Interference Mitigation

    Full text link
    This paper compares two important downlink multicell interference mitigation techniques, namely, large-scale (LS) multiple-input multiple-output (MIMO) and network MIMO. We consider a cooperative wireless cellular system operating in time-division duplex (TDD) mode, wherein each cooperating cluster includes BB base-stations (BSs), each equipped with multiple antennas and scheduling KK single-antenna users. In an LS-MIMO system, each BS employs BMBM antennas not only to serve its scheduled users, but also to null out interference caused to the other users within the cooperating cluster using zero-forcing (ZF) beamforming. In a network MIMO system, each BS is equipped with only MM antennas, but interference cancellation is realized by data and channel state information exchange over the backhaul links and joint downlink transmission using ZF beamforming. Both systems are able to completely eliminate intra-cluster interference and to provide the same number of spatial degrees of freedom per user. Assuming the uplink-downlink channel reciprocity provided by TDD, both systems are subject to identical channel acquisition overhead during the uplink pilot transmission stage. Further, the available sum power at each cluster is fixed and assumed to be equally distributed across the downlink beams in both systems. Building upon the channel distribution functions and using tools from stochastic ordering, this paper shows, however, that from a performance point of view, users experience better quality of service, averaged over small-scale fading, under an LS-MIMO system than a network MIMO system. Numerical simulations for a multicell network reveal that this conclusion also holds true with regularized ZF beamforming scheme. Hence, given the likely lower cost of adding excess number of antennas at each BS, LS-MIMO could be the preferred route toward interference mitigation in cellular networks.Comment: 13 pages, 7 figures; IEEE Journal of Selected Topics in Signal Processing, Special Issue on Signal Processing for Large-Scale MIMO Communication

    Outage Efficient Strategies for Network MIMO with Partial CSIT

    Full text link
    We consider a multi-cell MIMO downlink (network MIMO) where BB base-stations (BS) with MM antennas connected to a central station (CS) serve KK single-antenna user terminals (UT). Although many works have shown the potential benefits of network MIMO, the conclusion critically depends on the underlying assumptions such as channel state information at transmitters (CSIT) and backhaul links. In this paper, by focusing on the impact of partial CSIT, we propose an outage-efficient strategy. Namely, with side information of all UT's messages and local CSIT, each BS applies zero-forcing (ZF) beamforming in a distributed manner. For a small number of UTs (K≤MK\leq M), the ZF beamforming creates KK parallel MISO channels. Based on the statistical knowledge of these parallel channels, the CS performs a robust power allocation that simultaneously minimizes the outage probability of all UTs and achieves a diversity gain of B(M−K+1)B(M-K+1) per UT. With a large number of UTs (K≥MK \geq M), we propose a so-called distributed diversity scheduling (DDS) scheme to select a subset of \Ks UTs with limited backhaul communication. It is proved that DDS achieves a diversity gain of B\frac{K}{\Ks}(M-\Ks+1), which scales optimally with the number of cooperative BSs BB as well as UTs. Numerical results confirm that even under realistic assumptions such as partial CSIT and limited backhaul communications, network MIMO can offer high data rates with a sufficient reliability to individual UTs.Comment: 26 pages, 8 figures, submitted to IEEE Trans. on Signal Processin

    Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks

    Full text link
    In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's quality of service (QoS) constraint while the eavesdroppers attempt to intercept the cognitive transmissions from CUs to CBS. We investigate the physical-layer security against eavesdropping attacks in the cognitive radio network and propose the user scheduling scheme to achieve multiuser diversity for improving the security level of cognitive transmissions with a primary QoS constraint. Specifically, a cognitive user (CU) that satisfies the primary QoS requirement and maximizes the achievable secrecy rate of cognitive transmissions is scheduled to transmit its data packet. For the comparison purpose, we also examine the traditional multiuser scheduling and the artificial noise schemes. We analyze the achievable secrecy rate and intercept probability of the traditional and proposed multiuser scheduling schemes as well as the artificial noise scheme in Rayleigh fading environments. Numerical results show that given a primary QoS constraint, the proposed multiuser scheduling scheme generally outperforms the traditional multiuser scheduling and the artificial noise schemes in terms of the achievable secrecy rate and intercept probability. In addition, we derive the diversity order of the proposed multiuser scheduling scheme through an asymptotic intercept probability analysis and prove that the full diversity is obtained by using the proposed multiuser scheduling.Comment: 12 pages. IEEE Transactions on Communications, 201
    • …
    corecore