Degrees-Of-Freedom in Multi-Cloud Based Sectored Cellular Networks
<p>Multi-cloud based sectored cellular network.</p> "> Figure 2
<p>Parallelogram clustering for <math display="inline"><semantics> <mrow> <mfenced separators="" open="(" close=")"> <msub> <mi>t</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>t</mi> <mn>2</mn> </msub> </mfenced> <mo>=</mo> <mfenced separators="" open="(" close=")"> <mn>2</mn> <mo>,</mo> <mn>2</mn> </mfenced> </mrow> </semantics></math>.</p> "> Figure 3
<p>Illustration of h-clusters for <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>=</mo> <mn>3</mn> </mrow> </semantics></math>. Pink, red, and blue cells represent center, corner, and null cells, respectively. Green-filled circles refer to deactivated users. All users and their sectors inside a blue dashed hexagon are associated with the same BBUP.</p> "> Figure 4
<p>The impact of <math display="inline"><semantics> <msub> <mi>r</mi> <mi>p</mi> </msub> </semantics></math>: (<b>a</b>) For various values of <math display="inline"><semantics> <msub> <mi>μ</mi> <mi mathvariant="normal">F</mi> </msub> </semantics></math>. (<b>b</b>) For various values of <math display="inline"><semantics> <msub> <mi>μ</mi> <mi>BBU</mi> </msub> </semantics></math>.</p> "> Figure 5
<p>The impact of <math display="inline"><semantics> <msub> <mi>μ</mi> <mi mathvariant="normal">F</mi> </msub> </semantics></math> at <math display="inline"><semantics> <mrow> <msub> <mi>μ</mi> <mi>BBU</mi> </msub> <mo>=</mo> <mn>428</mn> </mrow> </semantics></math>.</p> "> Figure 6
<p>The impact of <math display="inline"><semantics> <msub> <mi>μ</mi> <mi>BBU</mi> </msub> </semantics></math> at <math display="inline"><semantics> <mrow> <msub> <mi>μ</mi> <mi mathvariant="normal">F</mi> </msub> <mo>=</mo> <mn>12</mn> </mrow> </semantics></math>.</p> "> Figure 7
<p><math display="inline"><semantics> <msub> <mi mathvariant="normal">I</mi> <mi mathvariant="normal">p</mi> </msub> </semantics></math>-clustering for <math display="inline"><semantics> <mrow> <mfenced separators="" open="(" close=")"> <msub> <mi>t</mi> <mn>1</mn> </msub> <mo>,</mo> <msub> <mi>t</mi> <mn>2</mn> </msub> </mfenced> <mo>=</mo> <mfenced separators="" open="(" close=")"> <mn>4</mn> <mo>,</mo> <mn>3</mn> </mfenced> </mrow> </semantics></math>. The red lines denote a paralleogram-like shape of the clusters. The interference pattern highlighted with solid black lines depict the users in in the same <math display="inline"><semantics> <msub> <mi mathvariant="normal">I</mi> <mi mathvariant="normal">p</mi> </msub> </semantics></math>-clusters. The interference pattern highlighted with dashed lines between circles denote the borders between <math display="inline"><semantics> <msub> <mi mathvariant="normal">I</mi> <mi mathvariant="normal">p</mi> </msub> </semantics></math>-clusters.</p> "> Figure 8
<p><math display="inline"><semantics> <msub> <mi mathvariant="normal">I</mi> <mi mathvariant="normal">h</mi> </msub> </semantics></math>-clustering for <math display="inline"><semantics> <mrow> <mi>t</mi> <mo>=</mo> <mn>2</mn> </mrow> </semantics></math>. The interference pattern highlighted with solid black lines depict the users in in the same <math display="inline"><semantics> <msub> <mi mathvariant="normal">I</mi> <mi mathvariant="normal">h</mi> </msub> </semantics></math>-clusters. The interference pattern highlighted with dashed lines between circles denote the borders between <math display="inline"><semantics> <msub> <mi mathvariant="normal">I</mi> <mi mathvariant="normal">h</mi> </msub> </semantics></math>-clusters.</p> "> Figure 9
<p>Comparison of the achieved rates for different channel attenuation parameters <math display="inline"><semantics> <mi>α</mi> </semantics></math> and processing capacities <math display="inline"><semantics> <msub> <mi>μ</mi> <mi>BBU</mi> </msub> </semantics></math> when <math display="inline"><semantics> <mrow> <mi>r</mi> <mo>=</mo> <mfrac> <mn>1</mn> <mn>10</mn> </mfrac> </mrow> </semantics></math> and <math display="inline"><semantics> <mrow> <msub> <mi>μ</mi> <mi mathvariant="normal">F</mi> </msub> <mo>=</mo> <mn>15</mn> </mrow> </semantics></math>.</p> ">
Abstract
:1. Introduction
- We propose a specific non-dynamic way of silencing mobile users in parallelogram clustering. One could attempt to silence entire cells. We find an efficient way of dividing the network non-interfering parallelogram clusters by silencing mobile users mostly in single sectors of the considered cells;
- We propose achievability schemes for both parallelogram and hexagonal clusterings and derive lower bounds on per-user DoF for both schemes in a function of fronthaul and BBUP processing capacities and BBUP-BS ratio;
- We prove that the performance of parallelogram clustering can not be worse than hexagonal clustering for small and moderate fronthaul capacities;
- We show by simulations that, for high fronthaul capacities, the coding scheme proposed for hexagonal clustering can show better performance than parallelogram clustering if the processing capacity is large enough according to given BBUP-BS ratio.
- Naive versions of both schemes where all mobile users in certain cells are deactivated,
- Interfering versions of both schemes where the network is decomposed into non-overlapping but interfering clusters,
- An opportunistic scheme where each message is decoded based on the received signals of three neighboring sectors that have the strongest channel gains.
1.1. Organization
1.2. Notation
2. Problem Definition
2.1. Network Model
- n denotes the number of channel use;
- denotes the index set of mobile users whose transmitted signal is observed by Rx u (including mobile user u);
- denotes the M-dimensional time- signal sent by mobile user v;
- denotes the M-dimensional i.i.d. standard Gaussian noise vector corrupting the time- signal at Rx u; it is independent of all other noise vectors;
- and denotes an M-by-M dimensional random matrix with entries that are independently drawn according to a standard Gaussian distribution that models the channel from mobile user to Rx u.
2.2. Uplink Communication Model with M-CRAN Architecture
2.3. Capacity and Degrees of Freedom
3. Main Results
- If and , then
- If , and , then
- For
- For
- -
- if , and , where is the integer solution to that minimizes , or
- -
- if and , where .
- For
- -
- if , and , where is the integer solution to that minimizes , or
- -
- if and where .
4. Uplink Scheme with Parallelogram Clustering
4.1. Construction of Parallelogram Clusters
- BSs with three users,
- BSs with two users,
- Single BS with one user.
4.2. Coding Scheme
4.2.1. Case 1:
- If , transmission resource of a fronthaul link is allocated equally among Rxs of a BS:
- If , transmission resource of a fronthaul link is equally allocated among Rxs of a BS with two or three users; however, any BS with one user quantizes its received signal at the maximum rate since each fronthaul link has enough capacity to support that communication rate ():
- If , transmission resource of a fronthaul link is equally allocated among Rxs of a BS with three users; however, any BS with one or two users quantizes their receive signals at the maximum rate for each Rx since each fronthaul link has enough capacity to support that communication rate ():
- If , all BSs quantize their receive signal at the maximum rate at each sector ():
4.2.2. Case 2:
- If for ,
- If for ,
- If for ,
- If for ,
- If for ,
- If for ,
- If for ,
- If for ,
5. Uplink Scheme with Hexagon Clustering
5.1. Construction of Hexagon Clusters
- There are three users in center BS,
- There are layer-“ℓ”, , BSs with 3 users around center BS, i.e., in total ,
- There are users in layer-“t” BSs.
5.2. Coding Scheme
5.2.1. Case 1:
- If , transmission resource of a fronthaul link is equally allocated between Rxs
- If , transmission resource of a fronthaul link is equally allocated among Rxs of a BS with three users; however, any BS with two users quantizes its receive signals at the maximum rate at each Rx since each fronthaul link has enough capacity to support that communication rate ():
- If , all BSs quantize their receive signals at the maximum quantization rate ():
5.2.2. Case 2:
- If for
- If for
- If for
- If for ,
- If for ,
- If for ,
6. DoF without Sectorization
7. Numerical Results and Discussion
8. Finite SNR Analysis
- Scheme 1 is a variation of the proposed p-clustering scheme. In p-clustering, each p-cluster is surrounded by deactivated users located on the sides of -hop parellelogram, where each side has and deactivated users, respectively. For each p-cluster, we associate all deactivated users on the lower side and right side of a -hop parellelogram to the p-cluster under consideration. Subsequently, we activate all deactivated users and allow each BBUP to collect quantization messages of reactivated user sectors associated with its own p-cluster. This process partitions the network into non-overlapping but interfering paralleogram-like clusters, which we call -clusters later on; see Figure 7 for an example of . Note that -clustering requires the same BBUP-BS ratio as for a p-clustering case. With reactivation of all deactivated mobile users, there are active users in each -cluster and all cells consists of three active users. Therefore, each BS equally partitions its fronthaul transmission resources to Rxs if BBU processing resources is enough to implement the joint decoding; otherwise, the processing resources is evenly distributed among all Rxs of the -cluster, i.e., the quantization rate is chosen as
- Scheme 2 is a variation of the proposed h-clustering scheme. In h-clustering, there are 6t deactivated users around a cluster of size-t. For a specific h-cluster, we associate the deactivated users on the borders of any three adjacent h-clusters, e.g., east, southeast, and southwest, to the h-cluster under consideration. Then, we replicate this process for each h-cluster with the same relative directions of adjacent h-clusters. Subsequently, we reactivate all deactivated users and allow each BBUP k to collect the quantized received signals of sectors of reactivated users associated with its own h-cluster. This process partitions the network into interfering but non-overlapping clusters, which we call -cluster in the following, see Figure 8 for . Note that -clustering requires the same BBUP-BS ratio as for the h-clustering case. With reactivation of deactivated users, there are active users in each -cluster. Therefore, by applying similar arguments as stated above, the quantization rate for -clustering is chosen as
- Scheme 3 is a variation of the practical opportunistic schemes. The decoding depends on the realization of the channel coefficients. With the help of neighbors of the considered BS, the corresponding BBUP identifies for each user in the corresponding cell the three adjacent sectors that give the best joint decoding performance for the corresponding message. To be able to make a fair comparison between the proposed schemes and the 3-sector decoding scheme, we impose the same fronthaul rate constraint on the 3-sector decoding scheme as in the non-interfering clustering scheme (note that there is no silenced user in the 3-sector decoding case) by assuming all processing resources are used. That is, the quantization rates are chosen asThen, the BBUP collects the quantization messages and decodes the corresponding message based on them.
9. Conclusions
Author Contributions
Funding
Conflicts of Interest
Appendix A. Proof of Remark 1
Appendix A.1. Case 1:
Appendix A.1.1.
Appendix A.1.2.
Appendix A.1.3.
Appendix A.1.4.
Appendix A.2. Case 2:
Appendix A.2.1.
Appendix A.2.2.
Appendix A.2.3.
Appendix A.2.4.
Appendix B. Proof of Theorem 2
Appendix C. Proof of Corollary 1
Appendix D. Proof of Theorem 3
- If , the maximum gap occurs when and is active in upper and lower bounds, respectively. Note that this assumption imposes .
- If , the maximum gap occurs when and is active in upper and lower bound, respectively. Notice that this assumption imposes .
References
- Nasri, R.; Jaziri, A. Analytical tractability of hexagonal network model with random user location. IEEE Trans. Wirel. Commun. 2016, 15, 3768–3780. [Google Scholar] [CrossRef] [Green Version]
- Tesfay, T.T.; Khalili, R.; Boudec, J.-Y.L.; Richter, F.; Fehske, A. Energy saving and capacity gain of micro sites in regular LTE networks. In Proceedings of the 6th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks—PM2HW2N ’11, Miami Beach, FL, USA, 31 October–4 November 2011. [Google Scholar]
- Bande, M.; El Gamal, A.; Veeravalli, V.V. Degrees of freedom in wireless interference networks with cooperative transmission and backhaul load constraints. IEEE Trans. Inf. Theory 2019, 65, 5816–5832. [Google Scholar] [CrossRef]
- Bande, M.; El Gamal, A.; Veeravalli, V.V. Flexible backhaul design with cooperative transmission in cellular interference networks. In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015; pp. 2431–2435. [Google Scholar]
- Veeravalli, V.V.; Gamal, A.E. Interference Management in Wireless Networks: Fundamental Bounds and the Role of Cooperation; Cambridge University Press: Cambridge, UK, 2018. [Google Scholar]
- Ntranos, V.; Maddah-Ali, M.A.; Caire, G. Cellular interference alignment. IEEE Trans. Inf. Theory 2015, 61, 1194–1217. [Google Scholar] [CrossRef] [Green Version]
- Gesbert, D.; Hanly, S.; Huang, H.; Shamai, S.; Simeone, O.; Yu, W. Multi-cell MIMO cooperative networks: A new look at interference. IEEE J. Sel. Areas Commun. 2010, 28, 1380–1408. [Google Scholar] [CrossRef] [Green Version]
- Atsan, E.; Knopp, R.; Diggavi, S.; Fragouli, C. Towards integrating quantize-map-forward relaying into LTE. In Proceedings of the 2012 IEEE Information Theory Workshop (ITW), Lausanne, Switzerland, 3–7 September 2012; pp. 212–216. [Google Scholar]
- Chen, J.; Mitra, U.; Gesbert, D. Optimal UAV relay placement for single user capacity maximization over terrain with obstacles. In Proceedings of the IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2–5 July 2019; pp. 1–5. [Google Scholar]
- Katz, G.; Zaidel, B.M.; Shitz, S.S. On layered transmission in clustered cooperative cellular architectures. In Proceedings of the 2013 IEEE International Symposium on Information Theory (ISIT), Istanbul, Turkey, 7–12 July 2013; pp. 1162–1166. [Google Scholar]
- Simeone, O.; Poor, H.V.; Somekh, O.; Shamai, S. Local base station cooperation via finite-capacity links for the uplink of linear cellular networks. IEEE Trans. Inf. Theory 2009, 55, 190–204. [Google Scholar] [CrossRef]
- Hanly, S.V.; Whiting, P. Information-theoretic capacity of multi-receiver networks. Telecommun. Syst. 1993, 1, 1–42. [Google Scholar] [CrossRef]
- Wyner, A.D. Shannon-theoretic approach to a gaussian cellular multiple-access channel. IEEE Trans. Inf. Theory 1994, 40, 1713–1727. [Google Scholar] [CrossRef]
- Shamai, S.; Zaidel, B.M. Enhancing the cellular downlink capacity via co-processing at the transmitting end. In Proceedings of the IEEE VTS 53rd Vehicular Technology Conference, Spring 2001. Proceedings (Cat. No.01CH37202), Rhodes, Greece, 6–9 May 2001; Volume 3, pp. 1745–1749. [Google Scholar]
- Sanderovich, A.; Shamai, S.; Steinberg, Y.; Kramer, G. Communication via decentralized processing. IEEE Trans. Inf. Theory 2008, 54, 3008–3023. [Google Scholar] [CrossRef] [Green Version]
- Sanderovich, A.; Somekh, O.; Poor, H.V.; Shamai, S. Uplink macro diversity of limited backhaul cellular network. IEEE Trans. Inf. Theory 2009, 55, 3457–3478. [Google Scholar] [CrossRef] [Green Version]
- Simeone, O.; Somekh, O.; Poor, H.V.; Shamai, S. Downlink multicell processing with limited-backhaul capacity. EURASIP J. Adv. Signal Process. 2009, 2009, 1–10. [Google Scholar] [CrossRef] [Green Version]
- Cover, T.; El Gamal, A. Capacity theorems for the relay channel. IEEE Trans. Inf. Theory 1978, 25, 572–584. [Google Scholar] [CrossRef] [Green Version]
- Costa, M. Writing on dirty paper (Corresp.). IEEE Trans. Inf. Theory 1983, 29, 439–441. [Google Scholar] [CrossRef]
- Checko, A.; Christiansen, H.L.; Yan, Y.; Scolari, L.; Kardaras, G.; Berger, M.S.; Dittmann, L. Cloud RAN for Mobile Networks: A Technology Overview. IEEE Commun. Surv. Tutor. 2015, 17, 405–426. [Google Scholar] [CrossRef] [Green Version]
- Singhal, M.; Seyfi, T.; El Gamal, A. Joint Uplink-Downlink Cooperative Interference Management with Flexible Cell Associations. arXiv 2018, arXiv:1811.11986. [Google Scholar]
- Kang, J.; Simeone, O.; Kang, J.; Shamai, S. Layered Downlink Precoding for C-RAN Systems With Full Dimensional MIMO. IEEE Trans. Veh. Technol. 2017, 66, 2170–2182. [Google Scholar] [CrossRef]
- Park, S.; Simeone, O.; Shamai, S. Uplink sum-rate analysis of C-RAN with interconnected radio units. In Proceedings of the IEEE Information Theory Workshop (ITW), Kaohsiung, Taiwan, 6–10 November 2017; pp. 171–175. [Google Scholar]
- Kim, J.; Park, S.-H. Layered Inter-Cluster Cooperation Scheme for Backhaul-Constrained C-RAN Uplink Systems in the Presence of Inter-Cluster Interference. Entropy 2020, 22, 554. [Google Scholar] [CrossRef]
- Douik, A.; Dahrouj, H.; Al-Naffouri, T.Y.; Alouini, M. Distributed hybrid scheduling in multi-cloud networks using conflict graphs. IEEE Trans. Commun. 2018, 66, 209–224. [Google Scholar] [CrossRef] [Green Version]
- Awais, M.; Ahmed, A.; Ali, S.A.; Naeem, M.; Ejaz, W.; Anpalagan, A. Resource management in multicloud iot radio access network. IEEE Internet Things J. 2019, 6, 3014–3023. [Google Scholar] [CrossRef]
- Park, S.; Simeone, O.; Sahin, O.; Shamai, S. Inter-cluster design of precoding and fronthaul compression for cloud radio access networks. IEEE Wirel. Commun. Lett. 2014, 3, 369–372. [Google Scholar] [CrossRef]
- Park, S.; Song, C.; Lee, K. Inter-cluster design of wireless fronthaul and access links for the downlink of c-ran. IEEE Wirel. Commun. Lett. 2017, 6, 270–273. [Google Scholar] [CrossRef]
- Dhif-Allah, O.; Dahrouj, H.; Al-Naffouri, T.Y.; Alouini, M. Distributed robust power minimization for the downlink of multi-cloud radio access networks. IEEE Trans. Green Commun. Netw. 2018, 2, 327–335. [Google Scholar] [CrossRef]
- Ferdouse, L.; Anpalagan, A.; Erkucuk, S. Joint Communication and Computing Resource Allocation in 5G Cloud Radio Access Networks. IEEE Trans. Veh. Technol. 2019, 68, 9122–9135. [Google Scholar] [CrossRef]
- Wigger, M.; Timo, R.; Shamai, S. Conferencing in Wyner’s asymmetric interference network: Effect of number of rounds. In Proceedings of the IEEE Information Theory Workshop (ITW), Jerusalem, Israel, 26 April–1 May 2015; pp. 1–5. [Google Scholar]
- Sesia, S.; Toufik, I.; Baker, M. LTE-The UMTS Long Term Evolution: From Theory to Practice; Wiley: New York, NY, USA, 2009. [Google Scholar]
- El Gamal, A.; Kim, Y. Network Information Theory; Cambridge University Press: Cambridge, UK. [CrossRef] [Green Version]
- Jeon, S.; Suh, C. Degrees of Freedom of Uplink–Downlink Multiantenna Cellular Networks. IEEE Trans. Inf. Theory 2016, 62, 4589–4603. [Google Scholar] [CrossRef]
- Telatar, I.E. Capacity of multi-antenna gaussian channels. Eur. Trans. Telecommun. 1999, 10, 585–595. [Google Scholar] [CrossRef]
- Gelincik, S.; Wigger, M.; Wang, L. DoF in Sectored Cellular Systems with BS Cooperation Under a Complexity Constraint. In Proceedings of the IEEE 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 28–31 August 2018; pp. 1–5. [Google Scholar]
© 2020 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gelincik, S.; Rekaya-Ben Othman, G. Degrees-Of-Freedom in Multi-Cloud Based Sectored Cellular Networks. Entropy 2020, 22, 668. https://doi.org/10.3390/e22060668
Gelincik S, Rekaya-Ben Othman G. Degrees-Of-Freedom in Multi-Cloud Based Sectored Cellular Networks. Entropy. 2020; 22(6):668. https://doi.org/10.3390/e22060668
Chicago/Turabian StyleGelincik, Samet, and Ghaya Rekaya-Ben Othman. 2020. "Degrees-Of-Freedom in Multi-Cloud Based Sectored Cellular Networks" Entropy 22, no. 6: 668. https://doi.org/10.3390/e22060668