2,757 research outputs found

    Multiuser Switched Diversity Scheduling Schemes

    Full text link
    Multiuser switched-diversity scheduling schemes were recently proposed in order to overcome the heavy feedback requirements of conventional opportunistic scheduling schemes by applying a threshold-based, distributed, and ordered scheduling mechanism. The main idea behind these schemes is that slight reduction in the prospected multiuser diversity gains is an acceptable trade-off for great savings in terms of required channel-state-information feedback messages. In this work, we characterize the achievable rate region of multiuser switched diversity systems and compare it with the rate region of full feedback multiuser diversity systems. We propose also a novel proportional fair multiuser switched-based scheduling scheme and we demonstrate that it can be optimized using a practical and distributed method to obtain the feedback thresholds. We finally demonstrate by numerical examples that switched-diversity scheduling schemes operate within 0.3 bits/sec/Hz from the ultimate network capacity of full feedback systems in Rayleigh fading conditions.Comment: Accepted at IEEE Transactions on Communications, to appear 2012, funded by NPRP grant 08-577-2-241 from QNR

    Physical-Layer Security with Multiuser Scheduling in Cognitive Radio Networks

    Full text link
    In this paper, we consider a cognitive radio network that consists of one cognitive base station (CBS) and multiple cognitive users (CUs) in the presence of multiple eavesdroppers, where CUs transmit their data packets to CBS under a primary user's quality of service (QoS) constraint while the eavesdroppers attempt to intercept the cognitive transmissions from CUs to CBS. We investigate the physical-layer security against eavesdropping attacks in the cognitive radio network and propose the user scheduling scheme to achieve multiuser diversity for improving the security level of cognitive transmissions with a primary QoS constraint. Specifically, a cognitive user (CU) that satisfies the primary QoS requirement and maximizes the achievable secrecy rate of cognitive transmissions is scheduled to transmit its data packet. For the comparison purpose, we also examine the traditional multiuser scheduling and the artificial noise schemes. We analyze the achievable secrecy rate and intercept probability of the traditional and proposed multiuser scheduling schemes as well as the artificial noise scheme in Rayleigh fading environments. Numerical results show that given a primary QoS constraint, the proposed multiuser scheduling scheme generally outperforms the traditional multiuser scheduling and the artificial noise schemes in terms of the achievable secrecy rate and intercept probability. In addition, we derive the diversity order of the proposed multiuser scheduling scheme through an asymptotic intercept probability analysis and prove that the full diversity is obtained by using the proposed multiuser scheduling.Comment: 12 pages. IEEE Transactions on Communications, 201

    Maximizing Energy Efficiency in Multiple Access Channels by Exploiting Packet Dropping and Transmitter Buffering

    Get PDF
    Quality of service (QoS) for a network is characterized in terms of various parameters specifying packet delay and loss tolerance requirements for the application. The unpredictable nature of the wireless channel demands for application of certain mechanisms to meet the QoS requirements. Traditionally, medium access control (MAC) and network layers perform these tasks. However, these mechanisms do not take (fading) channel conditions into account. In this paper, we investigate the problem using cross layer techniques where information flow and joint optimization of higher and physical layer is permitted. We propose a scheduling scheme to optimize the energy consumption of a multiuser multi-access system such that QoS constraints in terms of packet loss are fulfilled while the system is able to maximize the advantages emerging from multiuser diversity. Specifically, this work focuses on modeling and analyzing the effects of packet buffering capabilities of the transmitter on the system energy for a packet loss tolerant application. We discuss low complexity schemes which show comparable performance to the proposed scheme. The numerical evaluation reveals useful insights about the coupling effects of different QoS parameters on the system energy consumption and validates our analytical results.Comment: in IEEE trans. Wireless communications, 201

    On the Number of RF Chains and Phase Shifters, and Scheduling Design with Hybrid Analog-Digital Beamforming

    Full text link
    This paper considers hybrid beamforming (HB) for downlink multiuser massive multiple input multiple output (MIMO) systems with frequency selective channels. For this system, first we determine the required number of radio frequency (RF) chains and phase shifters (PSs) such that the proposed HB achieves the same performance as that of the digital beamforming (DB) which utilizes NN (number of transmitter antennas) RF chains. We show that the performance of the DB can be achieved with our HB just by utilizing rtr_t RF chains and 2rt(N−rt+1)2r_t(N-r_t + 1) PSs, where rt≤Nr_t \leq N is the rank of the combined digital precoder matrices of all sub-carriers. Second, we provide a simple and novel approach to reduce the number of PSs with only a negligible performance degradation. Numerical results reveal that only 20−4020-40 PSs per RF chain are sufficient for practically relevant parameter settings. Finally, for the scenario where the deployed number of RF chains (Na)(N_a) is less than rtr_t, we propose a simple user scheduling algorithm to select the best set of users in each sub-carrier. Simulation results validate theoretical expressions, and demonstrate the superiority of the proposed HB design over the existing HB designs in both flat fading and frequency selective channels.Comment: IEEE Transactions on Wireless Communications (Minor Revision

    Throughput Scaling of Wireless Networks With Random Connections

    Full text link
    This work studies the throughput scaling laws of ad hoc wireless networks in the limit of a large number of nodes. A random connections model is assumed in which the channel connections between the nodes are drawn independently from a common distribution. Transmitting nodes are subject to an on-off strategy, and receiving nodes employ conventional single-user decoding. The following results are proven: 1) For a class of connection models with finite mean and variance, the throughput scaling is upper-bounded by O(n1/3)O(n^{1/3}) for single-hop schemes, and O(n1/2)O(n^{1/2}) for two-hop (and multihop) schemes. 2) The Θ(n1/2)\Theta (n^{1/2}) throughput scaling is achievable for a specific connection model by a two-hop opportunistic relaying scheme, which employs full, but only local channel state information (CSI) at the receivers, and partial CSI at the transmitters. 3) By relaxing the constraints of finite mean and variance of the connection model, linear throughput scaling Θ(n)\Theta (n) is achievable with Pareto-type fading models.Comment: 13 pages, 4 figures, To appear in IEEE Transactions on Information Theor
    • …
    corecore