-
Self-Learning Threshold-Based Load Balancing
Authors:
Diego Goldsztajn,
Sem C. Borst,
Johan S. H. van Leeuwaarden,
Debankur Mukherjee,
Philip A. Whiting
Abstract:
We consider a large-scale service system where incoming tasks have to be instantaneously dispatched to one out of many parallel server pools. The user-perceived performance degrades with the number of concurrent tasks and the dispatcher aims at maximizing the overall quality-of-service by balancing the load through a simple threshold policy. We demonstrate that such a policy is optimal on the flui…
▽ More
We consider a large-scale service system where incoming tasks have to be instantaneously dispatched to one out of many parallel server pools. The user-perceived performance degrades with the number of concurrent tasks and the dispatcher aims at maximizing the overall quality-of-service by balancing the load through a simple threshold policy. We demonstrate that such a policy is optimal on the fluid and diffusion scales, while only involving a small communication overhead, which is crucial for large-scale deployments. In order to set the threshold optimally, it is important, however, to learn the load of the system, which may be unknown. For that purpose, we design a control rule for tuning the threshold in an online manner. We derive conditions which guarantee that this adaptive threshold settles at the optimal value, along with estimates for the time until this happens. In addition, we provide numerical experiments which support the theoretical results and further indicate that our policy copes effectively with time-varying demand patterns.
△ Less
Submitted 11 September, 2023; v1 submitted 29 October, 2020;
originally announced October 2020.
-
Diversity/Parallelism Trade-off in Distributed Systems with Redundancy
Authors:
Pei Peng,
Emina Soljanin,
Philip Whiting
Abstract:
As numerous machine learning and other algorithms increase in complexity and data requirements, distributed computing becomes necessary to satisfy the growing computational and storage demands, because it enables parallel execution of smaller tasks that make up a large computing job. However, random fluctuations in task service times lead to straggling tasks with long execution times. Redundancy,…
▽ More
As numerous machine learning and other algorithms increase in complexity and data requirements, distributed computing becomes necessary to satisfy the growing computational and storage demands, because it enables parallel execution of smaller tasks that make up a large computing job. However, random fluctuations in task service times lead to straggling tasks with long execution times. Redundancy, in the form of task replication and erasure coding, provides diversity that allows a job to be completed when only a subset of redundant tasks is executed, thus removing the dependency on the straggling tasks. In situations of constrained resources (here a fixed number of parallel servers), increasing redundancy reduces the available resources for parallelism. In this paper, we characterize the diversity vs. parallelism trade-off and identify the optimal strategy, among replication, coding and splitting, which minimizes the expected job completion time. We consider three common service time distributions and establish three models that describe scaling of these distributions with the task size. We find that different distributions with different scaling models operate optimally at different levels of redundancy, and thus may require very different code rates.
△ Less
Submitted 18 December, 2021; v1 submitted 5 October, 2020;
originally announced October 2020.
-
Joint Beam Training and Data Transmission Design for Covert Millimeter-Wave Communication
Authors:
Jiayu Zhang,
Min Li,
Shihao Yan,
Chunshan Liu,
Xihan Chen,
Minjian Zhao,
Philip Whiting
Abstract:
Covert communication prevents legitimate transmission from being detected by a warden while maintaining certain covert rate at the intended user. Prior works have considered the design of covert communication over conventional low-frequency bands, but few works so far have explored the higher-frequency millimeter-wave (mmWave) spectrum. The directional nature of mmWave communication makes it attra…
▽ More
Covert communication prevents legitimate transmission from being detected by a warden while maintaining certain covert rate at the intended user. Prior works have considered the design of covert communication over conventional low-frequency bands, but few works so far have explored the higher-frequency millimeter-wave (mmWave) spectrum. The directional nature of mmWave communication makes it attractive for covert transmission. However, how to establish such directional link in a covert manner in the first place remains as a significant challenge. In this paper, we consider a covert mmWave communication system, where legitimate parties Alice and Bob adopt beam training approach for directional link establishment. Accounting for the training overhead, we develop a new design framework that jointly optimizes beam training duration, training power and data transmission power to maximize the effective throughput of Alice-Bob link while ensuring the covertness constraint at warden Willie is met. We further propose a dual-decomposition successive convex approximation algorithm to solve the problem efficiently. Numerical studies demonstrate interesting tradeoff among the key design parameters considered and also the necessity of joint design of beam training and data transmission for covert mmWave communication.
△ Less
Submitted 11 July, 2020; v1 submitted 3 July, 2020;
originally announced July 2020.
-
Robust Adaptive Beam Tracking for Mobile Millimetre Wave Communications
Authors:
Chunshan Liu,
Min Li,
Lou Zhao,
Philip Whiting,
Stephen V. Hanly,
Iain B. Collings,
Minjian Zhao
Abstract:
Millimetre wave (mmWave) beam tracking is a challenging task because tracking algorithms are required to provide consistent high accuracy with low probability of loss of track and minimal overhead. To meet these requirements, we propose in this paper a new analog beam tracking framework namely Adaptive Tracking with Stochastic Control (ATSC). Under this framework, beam direction updates are made u…
▽ More
Millimetre wave (mmWave) beam tracking is a challenging task because tracking algorithms are required to provide consistent high accuracy with low probability of loss of track and minimal overhead. To meet these requirements, we propose in this paper a new analog beam tracking framework namely Adaptive Tracking with Stochastic Control (ATSC). Under this framework, beam direction updates are made using a novel mechanism based on measurements taken from only two beam directions perturbed from the current data beam. To achieve high tracking accuracy and reliability, we provide a systematic approach to jointly optimise the algorithm parameters. The complete framework includes a method for adapting the tracking rate together with a criterion for realignment (perceived loss of track). ATSC adapts the amount of tracking overhead that matches well to the mobility level, without incurring frequent loss of track, as verified by an extensive set of experiments under both representative statistical channel models as well as realistic urban scenarios simulated by ray-tracing software. In particular, numerical results show that ATSC can track dominant channel directions with high accuracy for vehicles moving at 72 km/hour in complicated urban scenarios, with an overhead of less than 1\%.
△ Less
Submitted 3 May, 2020;
originally announced May 2020.
-
Millimeter-Wave Beam Search with Iterative Deactivation and Beam Shifting
Authors:
Chunshan Liu,
Min Li,
Lou Zhao,
Philip Whiting,
Stephen V. Hanly,
Iain B. Collings
Abstract:
Millimeter Wave (mmWave) communications rely on highly directional beams to combat severe propagation loss. In this paper, an adaptive beam search algorithm based on spatial scanning, called Iterative Deactivation and Beam Shifting (IDBS), is proposed for mmWave beam alignment. IDBS does not require advance information such as the Signal-to-Noise Ratio (SNR) and channel statistics, and matches the…
▽ More
Millimeter Wave (mmWave) communications rely on highly directional beams to combat severe propagation loss. In this paper, an adaptive beam search algorithm based on spatial scanning, called Iterative Deactivation and Beam Shifting (IDBS), is proposed for mmWave beam alignment. IDBS does not require advance information such as the Signal-to-Noise Ratio (SNR) and channel statistics, and matches the training overhead to the unknown SNR to achieve satisfactory performance. The algorithm works by gradually deactivating beams using a Bayesian probability criterion based on a uniform improper prior, where beam deactivation can be implemented with low-complexity operations that require computing a low-degree polynomial or a search through a look-up table. Numerical results confirm that IDBS adapts to different propagation scenarios such as line-of-sight and non-line-of-sight and to different SNRs. It can achieve better tradeoffs between training overhead and beam alignment accuracy than existing non-adaptive algorithms that have fixed training overheads.
△ Less
Submitted 2 May, 2020;
originally announced May 2020.
-
Increasing the Raw Key Rate in Energy-Time Entanglement Based Quantum Key Distribution
Authors:
Esmaeil Karimi,
Emina Soljanin,
Philip Whiting
Abstract:
A Quantum Key Distribution (QKD) protocol describes how two remote parties can establish a secret key by communicating over a quantum and a public classical channel that both can be accessed by an eavesdropper. QKD protocols using energy-time entangled photon pairs are of growing practical interest because of their potential to provide a higher secure key rate over long distances by carrying multi…
▽ More
A Quantum Key Distribution (QKD) protocol describes how two remote parties can establish a secret key by communicating over a quantum and a public classical channel that both can be accessed by an eavesdropper. QKD protocols using energy-time entangled photon pairs are of growing practical interest because of their potential to provide a higher secure key rate over long distances by carrying multiple bits per entangled photon pair. We consider a system where information can be extracted by measuring random times of a sequence of entangled photon arrivals. Our goal is to maximize the utility of each such pair. We propose a discrete time model for the photon arrival process, and establish a theoretical bound on the number of raw bits that can be generated under this model. We first analyse a well known simple binning encoding scheme, and show that it generates significantly lower information rate than what is theoretically possible. We then propose three adaptive schemes that increase the number of raw bits generated per photon, and compute and compare the information rates they offer. Moreover, the effect of public channel communication on the secret key rates of the proposed schemes is investigated.
△ Less
Submitted 24 January, 2020;
originally announced January 2020.
-
Evaluating Load Balancing Performance in Distributed Storage with Redundancy
Authors:
Mehmet Fatih Aktas,
Amir Behrouzi-Far,
Emina Soljanin,
Philip Whiting
Abstract:
To facilitate load balancing, distributed systems store data redundantly. We evaluate the load balancing performance of storage schemes in which each object is stored at $d$ different nodes, and each node stores the same number of objects. In our model, the load offered for the objects is sampled uniformly at random from all the load vectors with a fixed cumulative value. We find that the load bal…
▽ More
To facilitate load balancing, distributed systems store data redundantly. We evaluate the load balancing performance of storage schemes in which each object is stored at $d$ different nodes, and each node stores the same number of objects. In our model, the load offered for the objects is sampled uniformly at random from all the load vectors with a fixed cumulative value. We find that the load balance in a system of $n$ nodes improves multiplicatively with $d$ as long as $d = o\left(\log(n)\right)$, and improves exponentially once $d = Θ\left(\log(n)\right)$. We show that the load balance improves in the same way with $d$ when the service choices are created with XOR's of $r$ objects rather than object replicas. In such redundancy schemes, storage overhead is reduced multiplicatively by $r$. However, recovery of an object requires downloading content from $r$ nodes. At the same time, the load balance increases additively by $r$. We express the system's load balance in terms of the maximal spacing or maximum of $d$ consecutive spacings between the ordered statistics of uniform random variables. Using this connection and the limit results on the maximal $d$-spacings, we derive our main results.
△ Less
Submitted 22 January, 2021; v1 submitted 13 October, 2019;
originally announced October 2019.
-
Explore and Eliminate: Optimized Two-Stage Search for Millimeter-Wave Beam Alignment
Authors:
Min Li,
Chunshan Liu,
Stephen V. Hanly,
Iain B. Collings,
Philip Whiting
Abstract:
Swift and accurate alignment of transmitter (Tx) and receiver (Rx) beams is a fundamental design challenge to enable reliable outdoor millimeter-wave communications. In this paper, we propose a new Optimized Two-Stage Search (OTSS) algorithm for Tx-Rx beam alignment via spatial scanning. In contrast to one-shot exhaustive search, OTSS judiciously divides the training energy budget into two stages.…
▽ More
Swift and accurate alignment of transmitter (Tx) and receiver (Rx) beams is a fundamental design challenge to enable reliable outdoor millimeter-wave communications. In this paper, we propose a new Optimized Two-Stage Search (OTSS) algorithm for Tx-Rx beam alignment via spatial scanning. In contrast to one-shot exhaustive search, OTSS judiciously divides the training energy budget into two stages. In the first stage, OTSS explores and trains all candidate beam pairs and then eliminates a set of less favorable pairs learned from the received signal profile. In the second stage, OTSS takes an extra measurement for each of the survived pairs and combines with the previous measurement to determine the best one. For OTSS, we derive an upper bound on its misalignment probability, under a single-path channel model with training codebooks having an ideal beam pattern. We also characterize the decay rate function of the upper bound with respect to the training budget and further derive the optimal design parameters of OTSS that maximize the decay rate. OTSS is proved to asymptotically outperform state-of-the-art beam alignment algorithms, and is numerically shown to achieve better performance with limited training budget and practically synthesized beams.
△ Less
Submitted 19 June, 2019; v1 submitted 2 December, 2018;
originally announced December 2018.
-
Millimeter Wave Beam Alignment: Large Deviations Analysis and Design Insights
Authors:
Chunshan Liu,
Min Li,
Stephen V. Hanly,
Iain B. Collings,
Philip Whiting
Abstract:
In millimeter wave cellular communication, fast and reliable beam alignment via beam training is crucial to harvest sufficient beamforming gain for the subsequent data transmission. In this paper, we establish fundamental limits in beam-alignment performance under both the exhaustive search and the hierarchical search that adopts multi-resolution beamforming codebooks, accounting for time-domain t…
▽ More
In millimeter wave cellular communication, fast and reliable beam alignment via beam training is crucial to harvest sufficient beamforming gain for the subsequent data transmission. In this paper, we establish fundamental limits in beam-alignment performance under both the exhaustive search and the hierarchical search that adopts multi-resolution beamforming codebooks, accounting for time-domain training overhead. Specifically, we derive lower and upper bounds on the probability of misalignment for an arbitrary level in the hierarchical search, based on a single-path channel model. Using the method of large deviations, we characterize the decay rate functions of both bounds and show that the bounds coincide as the training sequence length goes large. We go on to characterize the asymptotic misalignment probability of both the hierarchical and exhaustive search, and show that the latter asymptotically outperforms the former, subject to the same training overhead and codebook resolution. We show via numerical results that this relative performance behavior holds in the non-asymptotic regime. Moreover, the exhaustive search is shown to achieve significantly higher worst-case spectrum efficiency than the hierarchical search, when the pre-beamforming signal-to-noise ratio (SNR) is relatively low. This study hence implies that the exhaustive search is more effective for users situated further from base stations, as they tend to have low SNR.
△ Less
Submitted 19 May, 2017; v1 submitted 13 November, 2016;
originally announced November 2016.
-
Optimal Caching and User Association in Cache-enabled Heterogeneous Wireless Networks
Authors:
Ying Cui,
Fan Lai,
Stephen Hanly,
Philip Whiting
Abstract:
Heterogenous wireless networks (Hetnets) provide a powerful approach to meet the massive growth in traffic demands, but also impose a significant challenge on backhaul. Caching at small base stations (BSs) and wireless small cell backhaul have been proposed as attractive solutions to address this new challenge. In this paper, we consider the optimal caching and user association to minimize the tot…
▽ More
Heterogenous wireless networks (Hetnets) provide a powerful approach to meet the massive growth in traffic demands, but also impose a significant challenge on backhaul. Caching at small base stations (BSs) and wireless small cell backhaul have been proposed as attractive solutions to address this new challenge. In this paper, we consider the optimal caching and user association to minimize the total time to satisfy the average demands in cached-enabled Hetnets with wireless backhaul. We formulate this problem as a mixed discrete-continuous optimization for given bandwidth and cache resources. First, we characterize the structure of the optimal solution. Specifically, we show that the optimal caching is to store the most popular files at each pico BS, and the optimal user association has a threshold form. We also obtain the closed-form optimal solution in the homogenous scenario of pico cells. Then, we analyze the impact of bandwidth and cache resources on the minimum total time to satisfy the average demands. Finally, using numerical simulations, we verify the analytical results.
△ Less
Submitted 20 April, 2016;
originally announced April 2016.
-
Design and Analysis of Transmit Beamforming for Millimetre Wave Base Station Discovery
Authors:
Chunshan Liu,
Min Li,
Iain B. Collings,
Stephen V. Hanly,
Philip Whiting
Abstract:
In this paper, we develop an analytical framework for the initial access (a.k.a. Base Station (BS) discovery) in a millimeter-wave (mm-wave) communication system and propose an effective strategy for transmitting the Reference Signals (RSs) used for BS discovery. Specifically, by formulating the problem of BS discovery at User Equipments (UEs) as hypothesis tests, we derive a detector based on the…
▽ More
In this paper, we develop an analytical framework for the initial access (a.k.a. Base Station (BS) discovery) in a millimeter-wave (mm-wave) communication system and propose an effective strategy for transmitting the Reference Signals (RSs) used for BS discovery. Specifically, by formulating the problem of BS discovery at User Equipments (UEs) as hypothesis tests, we derive a detector based on the Generalised Likelihood Ratio Test (GLRT) and characterise the statistical behaviour of the detector. The theoretical results obtained allow analysis of the impact of key system parameters on the performance of BS discovery, and show that RS transmission with narrow beams may not be helpful in improving the overall BS discovery performance due to the cost of spatial scanning. Using the method of large deviations, we identify the desirable beam pattern that minimises the average miss-discovery probability of UEs within a targeted detectable region. We then propose to transmit the RS with sequential scanning, using a pre-designed codebook with narrow and/or wide beams to approximate the desirable patterns. The proposed design allows flexible choices of the codebook sizes and the associated beam widths to better approximate the desirable patterns. Numerical results demonstrate the effectiveness of the proposed method.
△ Less
Submitted 7 September, 2016; v1 submitted 5 April, 2016;
originally announced April 2016.
-
Capacity and Stable Scheduling in Heterogeneous Wireless Networks
Authors:
Stephen V. Hanly,
Chunshan Liu,
Phil Whiting
Abstract:
Heterogeneous wireless networks (HetNets) provide a means to increase network capacity by introducing small cells and adopting a layered architecture. HetNets allocate resources flexibly through time sharing and cell range expansion/contraction allowing a wide range of possible schedulers. In this paper we define the capacity of a HetNet down link in terms of the maximum number of downloads per se…
▽ More
Heterogeneous wireless networks (HetNets) provide a means to increase network capacity by introducing small cells and adopting a layered architecture. HetNets allocate resources flexibly through time sharing and cell range expansion/contraction allowing a wide range of possible schedulers. In this paper we define the capacity of a HetNet down link in terms of the maximum number of downloads per second which can be achieved for a given offered traffic density. Given this definition we show that the capacity is determined via the solution to a continuous linear program (LP). If the solution is smaller than 1 then there is a scheduler such that the number of mobiles in the network has ergodic properties with finite mean waiting time. If the solution is greater than 1 then no such scheduler exists. The above results continue to hold if a more general class of schedulers is considered.
△ Less
Submitted 8 August, 2014;
originally announced August 2014.
-
Queue-Based Random-Access Algorithms: Fluid Limits and Stability Issues
Authors:
Javad Ghaderi,
Sem Borst,
Phil Whiting
Abstract:
We use fluid limits to explore the (in)stability properties of wireless networks with queue-based random-access algorithms. Queue-based random-access schemes are simple and inherently distributed in nature, yet provide the capability to match the optimal throughput performance of centralized scheduling mechanisms in a wide range of scenarios. Unfortunately, the type of activation rules for which t…
▽ More
We use fluid limits to explore the (in)stability properties of wireless networks with queue-based random-access algorithms. Queue-based random-access schemes are simple and inherently distributed in nature, yet provide the capability to match the optimal throughput performance of centralized scheduling mechanisms in a wide range of scenarios. Unfortunately, the type of activation rules for which throughput optimality has been established, may result in excessive queue lengths and delays. The use of more aggressive/persistent access schemes can improve the delay performance, but does not offer any universal maximum-stability guarantees. In order to gain qualitative insight and investigate the (in)stability properties of more aggressive/persistent activation rules, we examine fluid limits where the dynamics are scaled in space and time. In some situations, the fluid limits have smooth deterministic features and maximum stability is maintained, while in other scenarios they exhibit random oscillatory characteristics, giving rise to major technical challenges. In the latter regime, more aggressive access schemes continue to provide maximum stability in some networks, but may cause instability in others. Simulation experiments are conducted to illustrate and validate the analytical results.
△ Less
Submitted 24 February, 2013;
originally announced February 2013.
-
Asymptotic Behavior of the Maximum and Minimum Singular Value of Random Vandermonde Matrices
Authors:
Gabriel H. Tucci,
Philip A. Whiting
Abstract:
This work examines various statistical distributions in connection with random Vandermonde matrices and their extension to $d$--dimensional phase distributions. Upper and lower bound asymptotics for the maximum singular value are found to be $O(\log^{1/2}{N^{d}})$ and $Ω((\log N^{d} /(\log \log N^d))^{1/2})$ respectively where $N$ is the dimension of the matrix, generalizing the results in \cite{T…
▽ More
This work examines various statistical distributions in connection with random Vandermonde matrices and their extension to $d$--dimensional phase distributions. Upper and lower bound asymptotics for the maximum singular value are found to be $O(\log^{1/2}{N^{d}})$ and $Ω((\log N^{d} /(\log \log N^d))^{1/2})$ respectively where $N$ is the dimension of the matrix, generalizing the results in \cite{TW}. We further study the behavior of the minimum singular value of these random matrices. In particular, we prove that the minimum singular value is at most $N\exp(-C\sqrt{N}))$ with high probability where $C$ is a constant independent on $N$. Furthermore, the value of the constant $C$ is determined explicitly. The main result is obtained in two different ways. One approach uses techniques from stochastic processes and in particular, a construction related to the Brownian bridge. The other one is a more direct analytical approach involving combinatorics and complex analysis. As a consequence, we obtain a lower bound for the maximum absolute value of a random complex polynomial on the unit circle, which may be of independent mathematical interest. Lastly, for each sequence of positive integers ${k_p}_{p=1}^{\infty}$ we present a generalized version of the previously discussed matrices. The classical random Vandermonde matrix corresponds to the sequence $k_{p}=p-1$. We find a combinatorial formula for their moments and we show that the limit eigenvalue distribution converges to a probability measure supported on $[0,\infty)$. Finally, we show that for the sequence $k_p=2^{p}$ the limit eigenvalue distribution is the famous Marchenko--Pastur distribution.
△ Less
Submitted 16 November, 2012; v1 submitted 14 February, 2012;
originally announced February 2012.
-
Computation Alignment: Capacity Approximation without Noise Accumulation
Authors:
Urs Niesen,
Bobak Nazer,
Phil Whiting
Abstract:
Consider several source nodes communicating across a wireless network to a destination node with the help of several layers of relay nodes. Recent work by Avestimehr et al. has approximated the capacity of this network up to an additive gap. The communication scheme achieving this capacity approximation is based on compress-and-forward, resulting in noise accumulation as the messages traverse the…
▽ More
Consider several source nodes communicating across a wireless network to a destination node with the help of several layers of relay nodes. Recent work by Avestimehr et al. has approximated the capacity of this network up to an additive gap. The communication scheme achieving this capacity approximation is based on compress-and-forward, resulting in noise accumulation as the messages traverse the network. As a consequence, the approximation gap increases linearly with the network depth.
This paper develops a computation alignment strategy that can approach the capacity of a class of layered, time-varying wireless relay networks up to an approximation gap that is independent of the network depth. This strategy is based on the compute-and-forward framework, which enables relays to decode deterministic functions of the transmitted messages. Alone, compute-and-forward is insufficient to approach the capacity as it incurs a penalty for approximating the wireless channel with complex-valued coefficients by a channel with integer coefficients. Here, this penalty is circumvented by carefully matching channel realizations across time slots to create integer-valued effective channels that are well-suited to compute-and-forward. Unlike prior constant gap results, the approximation gap obtained in this paper also depends closely on the fading statistics, which are assumed to be i.i.d. Rayleigh.
△ Less
Submitted 4 February, 2013; v1 submitted 31 August, 2011;
originally announced August 2011.
-
The Degrees of Freedom of Compute-and-Forward
Authors:
Urs Niesen,
Phil Whiting
Abstract:
We analyze the asymptotic behavior of compute-and-forward relay networks in the regime of high signal-to-noise ratios. We consider a section of such a network consisting of K transmitters and K relays. The aim of the relays is to reliably decode an invertible function of the messages sent by the transmitters. An upper bound on the capacity of this system can be obtained by allowing full cooperatio…
▽ More
We analyze the asymptotic behavior of compute-and-forward relay networks in the regime of high signal-to-noise ratios. We consider a section of such a network consisting of K transmitters and K relays. The aim of the relays is to reliably decode an invertible function of the messages sent by the transmitters. An upper bound on the capacity of this system can be obtained by allowing full cooperation among the transmitters and among the relays, transforming the network into a K times K multiple-input multiple-output (MIMO) channel. The number of degrees of freedom of compute-and-forward is hence at most K. In this paper, we analyze the degrees of freedom achieved by the lattice coding implementation of compute-and-forward proposed recently by Nazer and Gastpar. We show that this lattice implementation achieves at most 2/(1+1/K)\leq 2 degrees of freedom, thus exhibiting a very different asymptotic behavior than the MIMO upper bound. This raises the question if this gap of the lattice implementation to the MIMO upper bound is inherent to compute-and-forward in general. We answer this question in the negative by proposing a novel compute-and-forward implementation achieving K degrees of freedom.
△ Less
Submitted 20 April, 2012; v1 submitted 11 January, 2011;
originally announced January 2011.
-
Eigenvalue Results for Large Scale Random Vandermonde Matrices with Unit Complex Entries
Authors:
Gabriel H. Tucci,
Philip A. Whiting
Abstract:
This paper centers on the limit eigenvalue distribution for random Vandermonde matrices with unit magnitude complex entries. The phases of the entries are chosen independently and identically distributed from the interval $[-π,π]$. Various types of distribution for the phase are considered and we establish the existence of the empirical eigenvalue distribution in the large matrix limit on a wide r…
▽ More
This paper centers on the limit eigenvalue distribution for random Vandermonde matrices with unit magnitude complex entries. The phases of the entries are chosen independently and identically distributed from the interval $[-π,π]$. Various types of distribution for the phase are considered and we establish the existence of the empirical eigenvalue distribution in the large matrix limit on a wide range of cases. The rate of growth of the maximum eigenvalue is examined and shown to be no greater than $O(\log N)$ and no slower than $O(\log N/\log\log N)$ where $N$ is the dimension of the matrix. Additional results include the existence of the capacity of the Vandermonde channel (limit integral for the expected log determinant).
△ Less
Submitted 4 October, 2010;
originally announced October 2010.
-
Channel Estimation and Linear Precoding in Multiuser Multiple-Antenna TDD Systems
Authors:
Jubin Jose,
Alexei Ashikhmin,
Phil Whiting,
Sriram Vishwanath
Abstract:
Traditional approaches in the analysis of downlink systems decouple the precoding and the channel estimation problems. However, in cellular systems with mobile users, these two problems are in fact tightly coupled. In this paper, this coupling is explicitly studied by accounting for channel training overhead and estimation error while determining the overall system throughput. The paper studies th…
▽ More
Traditional approaches in the analysis of downlink systems decouple the precoding and the channel estimation problems. However, in cellular systems with mobile users, these two problems are in fact tightly coupled. In this paper, this coupling is explicitly studied by accounting for channel training overhead and estimation error while determining the overall system throughput. The paper studies the problem of utilizing imperfect channel estimates for efficient linear precoding and user selection. It presents precoding methods that take into account the degree of channel estimation error. Information-theoretic lower and upper bounds are derived to evaluate the performance of these precoding methods. In typical scenarios, these bounds are close.
△ Less
Submitted 27 June, 2011; v1 submitted 2 December, 2008;
originally announced December 2008.
-
Scheduling and Pre-Conditioning in Multi-User MIMO TDD Systems
Authors:
Jubin Jose,
Alexei Ashikhmin,
Phil Whiting,
Sriram Vishwanath
Abstract:
The downlink transmission in multi-user multiple-input multiple-output (MIMO) systems has been extensively studied from both communication-theoretic and information-theoretic perspectives. Most of these papers assume perfect/imperfect channel knowledge. In general, the problem of channel training and estimation is studied separately. However, in interference-limited communication systems with hi…
▽ More
The downlink transmission in multi-user multiple-input multiple-output (MIMO) systems has been extensively studied from both communication-theoretic and information-theoretic perspectives. Most of these papers assume perfect/imperfect channel knowledge. In general, the problem of channel training and estimation is studied separately. However, in interference-limited communication systems with high mobility, this problem is tightly coupled with the problem of maximizing throughput of the system. In this paper, scheduling and pre-conditioning based schemes in the presence of reciprocal channel are considered to address this. In the case of homogeneous users, a scheduling scheme is proposed and an improved lower bound on the sum capacity is derived. The problem of choosing training sequence length to maximize net throughput of the system is studied. In the case of heterogeneous users, a modified pre-conditioning method is proposed and an optimized pre-conditioning matrix is derived. This method is combined with a scheduling scheme to further improve net achievable weighted-sum rate.
△ Less
Submitted 5 May, 2008; v1 submitted 27 September, 2007;
originally announced September 2007.