-
Learned Pulse Sha** Design for PAPR Reduction in DFT-s-OFDM
Authors:
Fabrizio Carpi,
Soheil Rostami,
Joonyoung Cho,
Siddharth Garg,
Elza Erkip,
Charlie Jianzhong Zhang
Abstract:
High peak-to-average power ratio (PAPR) is one of the main factors limiting cell coverage for cellular systems, especially in the uplink direction. Discrete Fourier transform spread orthogonal frequency-domain multiplexing (DFT-s-OFDM) with spectrally-extended frequency-domain spectrum sha** (FDSS) is one of the efficient techniques deployed to lower the PAPR of the uplink waveforms. In this wor…
▽ More
High peak-to-average power ratio (PAPR) is one of the main factors limiting cell coverage for cellular systems, especially in the uplink direction. Discrete Fourier transform spread orthogonal frequency-domain multiplexing (DFT-s-OFDM) with spectrally-extended frequency-domain spectrum sha** (FDSS) is one of the efficient techniques deployed to lower the PAPR of the uplink waveforms. In this work, we propose a machine learning-based framework to determine the FDSS filter, optimizing a tradeoff between the symbol error rate (SER), the PAPR, and the spectral flatness requirements. Our end-to-end optimization framework considers multiple important design constraints, including the Nyquist zero-ISI (inter-symbol interference) condition. The numerical results show that learned FDSS filters lower the PAPR compared to conventional baselines, with minimal SER degradation. Tuning the parameters of the optimization also helps us understand the fundamental limitations and characteristics of the FDSS filters for PAPR reduction.
△ Less
Submitted 24 April, 2024;
originally announced April 2024.
-
Neural Compress-and-Forward for the Relay Channel
Authors:
Ezgi Ozyilkan,
Fabrizio Carpi,
Siddharth Garg,
Elza Erkip
Abstract:
The relay channel, consisting of a source-destination pair and a relay, is a fundamental component of cooperative communications. While the capacity of a general relay channel remains unknown, various relaying strategies, including compress-and-forward (CF), have been proposed. For CF, given the correlated signals at the relay and destination, distributed compression techniques, such as Wyner-Ziv…
▽ More
The relay channel, consisting of a source-destination pair and a relay, is a fundamental component of cooperative communications. While the capacity of a general relay channel remains unknown, various relaying strategies, including compress-and-forward (CF), have been proposed. For CF, given the correlated signals at the relay and destination, distributed compression techniques, such as Wyner-Ziv coding, can be harnessed to utilize the relay-to-destination link more efficiently. In light of the recent advancements in neural network-based distributed compression, we revisit the relay channel problem, where we integrate a learned one-shot Wyner--Ziv compressor into a primitive relay channel with a finite-capacity and orthogonal (or out-of-band) relay-to-destination link. The resulting neural CF scheme demonstrates that our task-oriented compressor recovers "binning" of the quantized indices at the relay, mimicking the optimal asymptotic CF strategy, although no structure exploiting the knowledge of source statistics was imposed into the design. We show that the proposed neural CF scheme, employing finite order modulation, operates closely to the capacity of a primitive relay channel that assumes a Gaussian codebook. Our learned compressor provides the first proof-of-concept work toward a practical neural CF relaying scheme.
△ Less
Submitted 22 April, 2024;
originally announced April 2024.
-
Towards Efficient Device Identification in Massive Random Access: A Multi-stage Approach
Authors:
Jyotish Robin,
Elza Erkip
Abstract:
Efficient and low-latency wireless connectivity between the base station (BS) and a sparse set of sporadically active devices from a massive number of devices is crucial for random access in emerging massive machine-type communications (mMTC). This paper addresses the challenge of identifying active devices while meeting stringent access delay and reliability constraints in mMTC environments. A no…
▽ More
Efficient and low-latency wireless connectivity between the base station (BS) and a sparse set of sporadically active devices from a massive number of devices is crucial for random access in emerging massive machine-type communications (mMTC). This paper addresses the challenge of identifying active devices while meeting stringent access delay and reliability constraints in mMTC environments. A novel multi-stage active device identification framework is proposed where we aim to refine a partial estimate of the active device set using feedback and hypothesis testing across multiple stages eventually leading to an exact recovery of active devices after the final stage of processing. In our proposed approach, active devices independently transmit binary preambles during each stage, leveraging feedback signals from the BS, whereas the BS employs a non-coherent binary energy detection. The minimum user identification cost associated with our multi-stage non-coherent active device identification framework with feedback, in terms of the required number of channel-uses, is quantified using information-theoretic techniques in the asymptotic regime of total number of devices $\ell$ when the number of active devices $k$ scales as $k = Θ(1)$. Practical implementations of our multi-stage active device identification schemes, leveraging Belief Propagation (BP) techniques, are also presented and evaluated. Simulation results show that our multi-stage BP strategies exhibit superior performance over single-stage strategies, even when considering overhead costs associated with feedback and hypothesis testing.
△ Less
Submitted 13 April, 2024;
originally announced April 2024.
-
Robust Distributed Compression with Learned Heegard-Berger Scheme
Authors:
Eyyup Tasci,
Ezgi Ozyilkan,
Oguzhan Kubilay Ulger,
Elza Erkip
Abstract:
We consider lossy compression of an information source when decoder-only side information may be absent. This setup, also referred to as the Heegard-Berger or Kaspi problem, is a special case of robust distributed source coding. Building upon previous works on neural network-based distributed compressors developed for the decoder-only side information (Wyner-Ziv) case, we propose learning-based sc…
▽ More
We consider lossy compression of an information source when decoder-only side information may be absent. This setup, also referred to as the Heegard-Berger or Kaspi problem, is a special case of robust distributed source coding. Building upon previous works on neural network-based distributed compressors developed for the decoder-only side information (Wyner-Ziv) case, we propose learning-based schemes that are amenable to the availability of side information. We find that our learned compressors mimic the achievability part of the Heegard-Berger theorem and yield interpretable results operating close to information-theoretic bounds. Depending on the availability of the side information, our neural compressors recover characteristics of the point-to-point (i.e., with no side information) and the Wyner-Ziv coding strategies that include binning in the source space, although no structure exploiting knowledge of the source and side information was imposed into the design.
△ Less
Submitted 6 May, 2024; v1 submitted 13 March, 2024;
originally announced March 2024.
-
Distributed Compression in the Era of Machine Learning: A Review of Recent Advances
Authors:
Ezgi Ozyilkan,
Elza Erkip
Abstract:
Many applications from camera arrays to sensor networks require efficient compression and processing of correlated data, which in general is collected in a distributed fashion. While information-theoretic foundations of distributed compression are well investigated, the impact of theory in practice-oriented applications to this day has been somewhat limited. As the field of data compression is und…
▽ More
Many applications from camera arrays to sensor networks require efficient compression and processing of correlated data, which in general is collected in a distributed fashion. While information-theoretic foundations of distributed compression are well investigated, the impact of theory in practice-oriented applications to this day has been somewhat limited. As the field of data compression is undergoing a transformation with the emergence of learning-based techniques, machine learning is becoming an important tool to reap the long-promised benefits of distributed compression. In this paper, we review the recent contributions in the broad area of learned distributed compression techniques for abstract sources and images. In particular, we discuss approaches that provide interpretable results operating close to information-theoretic bounds. We also highlight unresolved research challenges, aiming to inspire fresh interest and advancements in the field of learned distributed compression.
△ Less
Submitted 12 February, 2024;
originally announced February 2024.
-
3D Beamforming Through Joint Phase-Time Arrays
Authors:
Ozlem Yildiz,
Ahmad AlAmmouri,
Jianhua Mo,
Younghan Nam,
Elza Erkip,
Jianzhong,
Zhang
Abstract:
High-frequency wideband cellular communications over mmWave and sub-THz offer the opportunity for high data rates. However, it also presents high path loss, resulting in limited coverage. High-gain beamforming brought by the antenna array is essential to mitigate the coverage limitations. The conventional phased antenna arrays (PAA) cause high scheduling latency owing to analog beam constraints, i…
▽ More
High-frequency wideband cellular communications over mmWave and sub-THz offer the opportunity for high data rates. However, it also presents high path loss, resulting in limited coverage. High-gain beamforming brought by the antenna array is essential to mitigate the coverage limitations. The conventional phased antenna arrays (PAA) cause high scheduling latency owing to analog beam constraints, i.e., only one frequency-flat beam is generated. Recently introduced joint phase-time array (JPTA) architecture, which utilizes both true-time-delay (TTD) units and phase shifters (PSs), alleviates analog beam constraints by creating multiple frequency-dependent beams for scheduling multiple users at different directions in a frequency-division manner. One class of previous studies offered solutions with "rainbow" beams, which tend to allocate a small bandwidth per beam direction. Another class focused on uniform linear array (ULA) antenna architecture, whose frequency-dependent beams were designed along a single axis of either azimuth or elevation direction. This paper presents a novel 3D beamforming design that maximizes beamforming gain toward desired azimuth and elevation directions and across sub-bands partitioned according to scheduled users' bandwidth requirements. We provide analytical solutions and iterative algorithms to design the PSs and TTD units for a desired subband beam pattern. Through simulations of the beamforming gain, we observe that our proposed solutions outperform the state-of-the-art solutions reported elsewhere.
△ Less
Submitted 31 January, 2024; v1 submitted 1 January, 2024;
originally announced January 2024.
-
Neural Distributed Compressor Discovers Binning
Authors:
Ezgi Ozyilkan,
Johannes Ballé,
Elza Erkip
Abstract:
We consider lossy compression of an information source when the decoder has lossless access to a correlated one. This setup, also known as the Wyner-Ziv problem, is a special case of distributed source coding. To this day, practical approaches for the Wyner-Ziv problem have neither been fully developed nor heavily investigated. We propose a data-driven method based on machine learning that leverag…
▽ More
We consider lossy compression of an information source when the decoder has lossless access to a correlated one. This setup, also known as the Wyner-Ziv problem, is a special case of distributed source coding. To this day, practical approaches for the Wyner-Ziv problem have neither been fully developed nor heavily investigated. We propose a data-driven method based on machine learning that leverages the universal function approximation capability of artificial neural networks. We find that our neural network-based compression scheme, based on variational vector quantization, recovers some principles of the optimum theoretical solution of the Wyner-Ziv setup, such as binning in the source space as well as optimal combination of the quantization index and side information, for exemplary sources. These behaviors emerge although no structure exploiting knowledge of the source distributions was imposed. Binning is a widely used tool in information theoretic proofs and methods, and to our knowledge, this is the first time it has been explicitly observed to emerge from data-driven learning.
△ Less
Submitted 25 October, 2023;
originally announced October 2023.
-
Learned Wyner-Ziv Compressors Recover Binning
Authors:
Ezgi Ozyilkan,
Johannes Ballé,
Elza Erkip
Abstract:
We consider lossy compression of an information source when the decoder has lossless access to a correlated one. This setup, also known as the Wyner-Ziv problem, is a special case of distributed source coding. To this day, real-world applications of this problem have neither been fully developed nor heavily investigated. We propose a data-driven method based on machine learning that leverages the…
▽ More
We consider lossy compression of an information source when the decoder has lossless access to a correlated one. This setup, also known as the Wyner-Ziv problem, is a special case of distributed source coding. To this day, real-world applications of this problem have neither been fully developed nor heavily investigated. We propose a data-driven method based on machine learning that leverages the universal function approximation capability of artificial neural networks. We find that our neural network-based compression scheme re-discovers some principles of the optimum theoretical solution of the Wyner-Ziv setup, such as binning in the source space as well as linear decoder behavior within each quantization index, for the quadratic-Gaussian case. These behaviors emerge although no structure exploiting knowledge of the source distributions was imposed. Binning is a widely used tool in information theoretic proofs and methods, and to our knowledge, this is the first time it has been explicitly observed to emerge from data-driven learning.
△ Less
Submitted 7 May, 2023;
originally announced May 2023.
-
Active User Identification in Fast Fading Massive Random Access Channels
Authors:
Jyotish Robin,
Elza Erkip
Abstract:
Reliable and prompt identification of active users is critical for enabling random access in massive machine-to-machine type networks which typically operate within stringent access delay and energy constraints. In this paper, an energy efficient active user identification protocol is envisioned in which the active users simultaneously transmit On-Off Keying (OOK) modulated preambles whereas the b…
▽ More
Reliable and prompt identification of active users is critical for enabling random access in massive machine-to-machine type networks which typically operate within stringent access delay and energy constraints. In this paper, an energy efficient active user identification protocol is envisioned in which the active users simultaneously transmit On-Off Keying (OOK) modulated preambles whereas the base station uses non-coherent detection to avoid the channel estimation overheads. The minimum number of channel-uses required for active user identification in the asymptotic regime of total number of users $\ell$ when the number of active devices k scales as $k = Θ(1)$ is characterized along with an achievability scheme relying on the equivalence of activity detection to a group testing problem. A practical scheme for active user identification based on a belief propagation strategy is also proposed and its performance is compared against the theoretical bounds.
△ Less
Submitted 30 March, 2023;
originally announced March 2023.
-
Non-Coherent Active Device Identification for Massive Random Access
Authors:
Jyotish Robin,
Elza Erkip
Abstract:
Massive Machine-Type Communications (mMTC) is a key service category in the current generation of wireless networks featuring an extremely high density of energy and resource-limited devices with sparse and sporadic activity patterns. In order to enable random access in such mMTC networks, base station needs to identify the active devices while operating within stringent access delay constraints.…
▽ More
Massive Machine-Type Communications (mMTC) is a key service category in the current generation of wireless networks featuring an extremely high density of energy and resource-limited devices with sparse and sporadic activity patterns. In order to enable random access in such mMTC networks, base station needs to identify the active devices while operating within stringent access delay constraints. In this paper, an energy efficient active device identification protocol is proposed in which active devices transmit On-Off Keying (OOK) modulated preambles jointly and base station employs non-coherent energy detection avoiding channel estimation overheads. The minimum number of channel-uses required by the active user identification protocol is characterized in the asymptotic regime of total number of devices $\ell$ when the number of active devices $k$ scales as $k=Θ(1)$ along with an achievability scheme relying on the equivalence of activity detection to a group testing problem. Several practical schemes based on Belief Propagation (BP) and Combinatorial Orthogonal Matching Pursuit (COMP) are also proposed. Simulation results show that BP strategies outperform COMP significantly and can operate close to the theoretical achievability bounds. In a partial-recovery setting where few misdetections are allowed, BP continues to perform well.
△ Less
Submitted 10 March, 2023;
originally announced March 2023.
-
Feature Compression for Rate Constrained Object Detection on the Edge
Authors:
Zhongzheng Yuan,
Samyak Rawlekar,
Siddharth Garg,
Elza Erkip,
Yao Wang
Abstract:
Recent advances in computer vision has led to a growth of interest in deploying visual analytics model on mobile devices. However, most mobile devices have limited computing power, which prohibits them from running large scale visual analytics neural networks. An emerging approach to solve this problem is to offload the computation of these neural networks to computing resources at an edge server.…
▽ More
Recent advances in computer vision has led to a growth of interest in deploying visual analytics model on mobile devices. However, most mobile devices have limited computing power, which prohibits them from running large scale visual analytics neural networks. An emerging approach to solve this problem is to offload the computation of these neural networks to computing resources at an edge server. Efficient computation offloading requires optimizing the trade-off between multiple objectives including compressed data rate, analytics performance, and computation speed. In this work, we consider a "split computation" system to offload a part of the computation of the YOLO object detection model. We propose a learnable feature compression approach to compress the intermediate YOLO features with light-weight computation. We train the feature compression and decompression module together with the YOLO model to optimize the object detection accuracy under a rate constraint. Compared to baseline methods that apply either standard image compression or learned image compression at the mobile and perform image decompression and YOLO at the edge, the proposed system achieves higher detection accuracy at the low to medium rate range. Furthermore, the proposed system requires substantially lower computation time on the mobile device with CPU only.
△ Less
Submitted 14 April, 2022;
originally announced April 2022.
-
Understanding Energy Efficiency and Interference Tolerance in Millimeter Wave Receivers
Authors:
Panagiotis Skrimponis,
Seongjoon Kang,
Abbas Khalili,
Wonho Lee,
Navid Hosseinzadeh,
Marco Mezzavilla,
Elza Erkip,
Mark J. W. Rodwell,
James F. Buckwalter,
Sundeep Rangan
Abstract:
Power consumption is a key challenge in millimeter wave (mmWave) receiver front-ends, due to the need to support high dimensional antenna arrays at wide bandwidths. Recently, there has been considerable work in develo** low-power front-ends, often based on low-resolution ADCs and low-power mixers. A critical but less studied consequence of such designs is the relatively low-dynamic range which i…
▽ More
Power consumption is a key challenge in millimeter wave (mmWave) receiver front-ends, due to the need to support high dimensional antenna arrays at wide bandwidths. Recently, there has been considerable work in develo** low-power front-ends, often based on low-resolution ADCs and low-power mixers. A critical but less studied consequence of such designs is the relatively low-dynamic range which in turn exposes the receiver to adjacent carrier interference and blockers. This paper provides a general mathematical framework for analyzing the performance of mmWave front-ends in the presence of out-of-band interference. The goal is to elucidate the fundamental trade-off of power consumption, interference tolerance and in-band performance. The analysis is combined with detailed network simulations in cellular systems with multiple carriers, as well as detailed circuit simulations of key components at 140 GHz. The analysis reveals critical bottlenecks for low-power interference robustness and suggests designs enhancements for use in practical systems.
△ Less
Submitted 1 January, 2022;
originally announced January 2022.
-
Access Delay Constrained Activity Detection in Massive Random Access
Authors:
Jyotish Robin,
Elza Erkip
Abstract:
In 5G and future generation wireless systems, massive IoT networks with bursty traffic are expected to co-exist with cellular systems to serve several latency-critical applications. Thus, it is important for the access points to identify the active devices promptly with minimal resource consumption to enable massive machine-type communication without disrupting the conventional traffic. In this pa…
▽ More
In 5G and future generation wireless systems, massive IoT networks with bursty traffic are expected to co-exist with cellular systems to serve several latency-critical applications. Thus, it is important for the access points to identify the active devices promptly with minimal resource consumption to enable massive machine-type communication without disrupting the conventional traffic. In this paper, a frequency-multiplexed strategy based on group testing is proposed for activity detection which can take into account the constraints on network latency while minimizing the overall resource utilization. The core idea is that during each time-slot of active device discovery, multiple subcarriers in frequency domain can be used to launch group tests in parallel to reduce delay. Our proposed scheme is functional in the asymptotic and non-asymptotic regime of the total number of devices $(n)$ and the number of concurrently active devices $(k)$. We prove that, asymptotically, when the number of available time-slots scale as $Ω\big(\log (\frac{n}{k})\big)$, the frequency-multiplexed group testing strategy requires $O\big(k\log (\frac{n}{k})\big)$ time-frequency resources which is order-optimal and results in an $O(k)$ reduction in the number of time-slots with respect to the optimal strategy of fully-adaptive generalized binary splitting. Furthermore, we establish that the frequency-multiplexed GT strategy shows significant tolerance to estimation errors in $k$. Comparison with 3GPP standardized random access protocol for NB-IoT indicates the superiority of our proposed strategy in terms of access delay and overall resource utilization.
△ Less
Submitted 4 November, 2021;
originally announced November 2021.
-
Millimeter Wave Wireless Assisted Robot Navigation with Link State Classification
Authors:
Mingsheng Yin,
Akshaj Veldanda,
Amee Trivedi,
Jeff Zhang,
Kai Pfeiffer,
Yaqi Hu,
Siddharth Garg,
Elza Erkip,
Ludovic Righetti,
Sundeep Rangan
Abstract:
The millimeter wave (mmWave) bands have attracted considerable attention for high precision localization applications due to the ability to capture high angular and temporal resolution measurements. This paper explores mmWave-based positioning for a target localization problem where a fixed target broadcasts mmWave signals and a mobile robotic agent attempts to capture the signals to locate and na…
▽ More
The millimeter wave (mmWave) bands have attracted considerable attention for high precision localization applications due to the ability to capture high angular and temporal resolution measurements. This paper explores mmWave-based positioning for a target localization problem where a fixed target broadcasts mmWave signals and a mobile robotic agent attempts to capture the signals to locate and navigate to the target. A three-stage procedure is proposed: First, the mobile agent uses tensor decomposition methods to detect the multipath channel components and estimate their parameters. Second, a machine-learning trained classifier is then used to predict the link state, meaning if the strongest path is line-of-sight (LOS) or non-LOS (NLOS). For the NLOS case, the link state predictor also determines if the strongest path arrived via one or more reflections. Third, based on the link state, the agent either follows the estimated angles or uses computer vision or other sensor to explore and map the environment. The method is demonstrated on a large dataset of indoor environments supplemented with ray tracing to simulate the wireless propagation. The path estimation and link state classification are also integrated into a state-of-the-art neural simultaneous localization and map** (SLAM) module to augment camera and LIDAR-based navigation. It is shown that the link state classifier can successfully generalize to completely new environments outside the training set. In addition, the neural-SLAM module with the wireless path estimation and link state classifier provides rapid navigation to the target, close to a baseline that knows the target location.
△ Less
Submitted 18 February, 2022; v1 submitted 27 October, 2021;
originally announced October 2021.
-
Capacity Bounds and User Identification Costs in Rayleigh-Fading Many-Access Channel
Authors:
Jyotish Robin,
Elza Erkip
Abstract:
Many-access channel (MnAC) model allows the number of users in the system and the number of active users to scale as a function of the blocklength and as such is suited for dynamic communication systems with massive number of users such as the Internet of Things. Existing MnAC models assume a priori knowledge of channel gains which is impractical since acquiring Channel State Information (CSI) for…
▽ More
Many-access channel (MnAC) model allows the number of users in the system and the number of active users to scale as a function of the blocklength and as such is suited for dynamic communication systems with massive number of users such as the Internet of Things. Existing MnAC models assume a priori knowledge of channel gains which is impractical since acquiring Channel State Information (CSI) for massive number of users can overwhelm the available radio resources. This paper incorporates Rayleigh fading effects to the MnAC model and derives an upper bound on the symmetric message-length capacity of the Rayleigh-fading Gaussian MnAC. Furthermore, a lower bound on the minimum number of channel uses for discovering the active users is established. In addition, the performance of Noisy Combinatorial Orthogonal Matching Pursuit (N-COMP) based group testing (GT) is studied as a practical strategy for active device discovery. Simulations show that, for a given SNR, as the number of users increase, the required number of channel uses for N-COMP GT scales approximately the same way as the lower bound on minimum user identification cost. Moreover, in the low SNR regime, for sufficiently large population sizes, the number of channel uses required by N-COMP GT was observed to be within a factor of two of the lower bound when the expected number of active users scales sub-linearly with the total population size.
△ Less
Submitted 12 May, 2021;
originally announced May 2021.
-
Sparse Activity Discovery in Energy Constrained Multi-Cluster IoT Networks Using Group Testing
Authors:
Jyotish Robin,
Elza Erkip
Abstract:
Current IoT networks are characterized by an ultra-high density of devices with different energy budget constraints, typically having sparse and sporadic activity patterns. Access points require an efficient strategy to identify the active devices for a timely allocation of resources to enable massive machine-type communication. Recently, group testing based approaches have been studied to handle…
▽ More
Current IoT networks are characterized by an ultra-high density of devices with different energy budget constraints, typically having sparse and sporadic activity patterns. Access points require an efficient strategy to identify the active devices for a timely allocation of resources to enable massive machine-type communication. Recently, group testing based approaches have been studied to handle sparse activity detection in massive random access problems. In this paper, a non-adaptive group testing strategy is proposed which can take into account the energy constraints on different sensor clusters. A theoretical extension of the existing randomized group testing strategies to the case of multiple clusters is presented and the necessary constraints that the optimal sampling parameters should satisfy in order to improve the efficiency of group tests is established. The cases of fixed activity pattern where there is a fixed set of active sensors and random activity pattern where each sensor can be independently active with certain probability are examined. The theoretical results are verified and validated by Monte-Carlo simulations. In massive wireless sensor networks comprising of devices with different energy efficiencies, our proposed low-power-use mode of access can potentially extend the lifetime of battery powered sensors with finite energy budget.
△ Less
Submitted 30 March, 2021;
originally announced March 2021.
-
Interference Reduction in Virtual Cell Optimization
Authors:
Michal Yemini,
Elza Erkip,
Andrea J. Goldsmith
Abstract:
Virtual cell optimization clusters cells into neighborhoods and performs optimized resource allocation over each neighborhood. In prior works we proposed resource allocation schemes to mitigate the interference caused by transmissions in the same virtual cell. This work aims at mitigating both the interference caused by the transmissions of users in the same virtual cell and the interference betwe…
▽ More
Virtual cell optimization clusters cells into neighborhoods and performs optimized resource allocation over each neighborhood. In prior works we proposed resource allocation schemes to mitigate the interference caused by transmissions in the same virtual cell. This work aims at mitigating both the interference caused by the transmissions of users in the same virtual cell and the interference between transmissions in different virtual cells. We propose a resource allocation technique that reduces the number of users that cannot achieve their constant guaranteed bit rate, i.e., the "unsatisfied users", in an uplink virtual cell system with cooperative decoding. The proposed scheme requires only the knowledge of the number of users each base station serves and relies on creating the interference graph between base stations at the edges of virtual cells. Allocation of frequency bands to users is based on the number of users each base station would serve in a non cooperative setup. We evaluate the performance of our scheme for a mmWave system. Our numerical results show that our scheme decreases the number of users in the system whose rate falls below the guaranteed rate, set to $128$kbps, $256$kbps or $512$kbps, when compared with our previously proposed optimization methods.
△ Less
Submitted 13 November, 2021; v1 submitted 30 October, 2020;
originally announced October 2020.
-
On Throughput of Millimeter Wave MIMO Systems with Low Resolution ADCs
Authors:
Abbas Khalili,
Shahram Shahsavari,
Farhad Shirani,
Elza Erkip,
Yonina C. Eldar
Abstract:
Use of low resolution analog to digital converters (ADCs) is an effective way to reduce the high power consumption of millimeter wave (mmWave) receivers. In this paper, a receiver with low resolution ADCs based on adaptive thresholds is considered in downlink mmWave communications in which the channel state information is not known a-priori and acquired through channel estimation. A performance co…
▽ More
Use of low resolution analog to digital converters (ADCs) is an effective way to reduce the high power consumption of millimeter wave (mmWave) receivers. In this paper, a receiver with low resolution ADCs based on adaptive thresholds is considered in downlink mmWave communications in which the channel state information is not known a-priori and acquired through channel estimation. A performance comparison of low-complexity algorithms for power and ADC allocation among transmit and receive terminals, respectively, is provided. Through simulation of practical mmWave cellular networks, it is shown that the use of low resolution ADCs does not significantly degrade the system throughput (as compared to a conventional fully digital high resolution receiver) when using the adaptive threshold receiver in conjunction with simple power and ADC allocation strategies.
△ Less
Submitted 11 February, 2020;
originally announced February 2020.
-
On Optimal Multi-user Beam Alignment in Millimeter Wave Wireless Systems
Authors:
Abbas Khalili,
Shahram Shahsavari,
Mohammad A. Amir Khojastepour,
Elza Erkip
Abstract:
Directional transmission patterns (a.k.a. narrow beams) are the key to wireless communications in millimeter wave (mmWave) frequency bands which suffer from high path loss and severe shadowing. In addition, the propagation channel in mmWave frequencies incorporates only a few number of spatial clusters requiring a procedure to align the corresponding narrow beams with the angle of departure (AoD)…
▽ More
Directional transmission patterns (a.k.a. narrow beams) are the key to wireless communications in millimeter wave (mmWave) frequency bands which suffer from high path loss and severe shadowing. In addition, the propagation channel in mmWave frequencies incorporates only a few number of spatial clusters requiring a procedure to align the corresponding narrow beams with the angle of departure (AoD) of the channel clusters. The objective of this procedure, called beam alignment (BA) is to increase the beamforming gain for subsequent data communication. Several prior studies consider optimizing BA procedure to achieve various objectives such as reducing the BA overhead, increasing throughput, and reducing power consumption. While these studies mostly provide optimized BA schemes for scenarios with a single active user, there are often multiple active users in practical networks. Consequently, it is more efficient in terms of BA overhead and delay to design multi-user BA schemes which can perform beam management for multiple users collectively. This paper considers a class of multi-user BA schemes where the base station performs a one shot scan of the angular domain to simultaneously localize multiple users. The objective is to minimize the average of expected width of remaining uncertainty regions (UR) on the AoDs after receiving users' feedbacks. Fundamental bounds on the optimal performance are analyzed using information theoretic tools. Furthermore, a beam design optimization problem is formulated and a practical BA scheme, which provides significant gains compared to the beam swee** used in 5G standard is proposed.
△ Less
Submitted 28 May, 2020; v1 submitted 17 January, 2020;
originally announced January 2020.
-
Optimizing Pilots and Analog Processing for Channel Estimation in Cell-Free Massive MIMO With One-Bit ADCs
Authors:
Seok-Hwan Park,
Osvaldo Simeone,
Yonina C. Eldar,
Elza Erkip
Abstract:
In a cell-free cloud radio access network (C-RAN) architecture, uplink channel estimation is carried out by a centralized baseband processing unit (BBU) connected to distributed remote radio heads (RRHs). When the RRHs have multiple antennas and limited radio front-end resources, the design of uplink channel estimation is faced with the challenges posed by reduced radio frequency (RF) chains and o…
▽ More
In a cell-free cloud radio access network (C-RAN) architecture, uplink channel estimation is carried out by a centralized baseband processing unit (BBU) connected to distributed remote radio heads (RRHs). When the RRHs have multiple antennas and limited radio front-end resources, the design of uplink channel estimation is faced with the challenges posed by reduced radio frequency (RF) chains and one-bit analog-to-digital converters (ADCs) at the RRHs. This work tackles the problem of jointly optimizing the pilot sequences and the pre-RF chains analog combiners with the goal of minimizing the sum of mean squared errors (MSEs) of the estimated channel vectors at the BBU. The problem formulation models the impact of the ADC operation by leveraging Bussgang's theorem. An efficient solution is developed by means of an iterative alternating optimization algorithm. Numerical results validate the advantages of the proposed joint design compared to baseline schemes that randomly choose either pilots or analog combiners.
△ Less
Submitted 18 December, 2019;
originally announced December 2019.
-
Age of Information with Finite Horizon and Partial Updates
Authors:
David Ramirez,
Elza Erkip,
H. Vincent Poor
Abstract:
A resource-constrained system monitors a source of information by requesting a finite number of updates subject to random transmission delays. An a priori fixed update request policy is shown to minimize a polynomial penalty function of the age of information over arbitrary time horizons. Partial updates, compressed updates with reduced transmission and information content, in the presented model…
▽ More
A resource-constrained system monitors a source of information by requesting a finite number of updates subject to random transmission delays. An a priori fixed update request policy is shown to minimize a polynomial penalty function of the age of information over arbitrary time horizons. Partial updates, compressed updates with reduced transmission and information content, in the presented model are shown to incur an age penalty independent of the compression. Finite horizons are shown to have better performance in terms of second order statistic relative to infinite horizons.
△ Less
Submitted 2 October, 2019;
originally announced October 2019.
-
On the Rates of Convergence in Learning of Optimal Temporally Fair Schedulers
Authors:
Farhad Shirani,
Shahram Shahsavari,
Elza Erkip
Abstract:
Multi-user schedulers are designed to achieve optimal average system utility (e.g. throughput) subject to a set of fairness criteria. In this work, scheduling under temporal fairness constraints is considered. Prior works have shown that a class of scheduling strategies called threshold based strategies (TBSs) achieve optimal system utility under temporal fairness constraints. The optimal TBS thre…
▽ More
Multi-user schedulers are designed to achieve optimal average system utility (e.g. throughput) subject to a set of fairness criteria. In this work, scheduling under temporal fairness constraints is considered. Prior works have shown that a class of scheduling strategies called threshold based strategies (TBSs) achieve optimal system utility under temporal fairness constraints. The optimal TBS thresholds are determined as a function of the channel statistics. In order to provide performance guarantees for TBSs in practical scenarios --- where the scheduler learns the optimal thresholds based on the empirical observations of the channel realizations --- it is necessary to evaluate the rates of convergence of TBS thresholds to the optimal value. In this work, these rates of convergence and the effect on the resulting system utility are investigated. It is shown that the best estimate of the threshold vector is at least $ω(\frac{1}{\sqrt{t}})$ away from the optimal value, where $t$ is the number of observations of the independent and identically distributed channel realizations. Furthermore, it is shown that under long-term fairness constraints, the scheduler may achieve an average utility that is higher than the optimal long-term utility by violating the fairness criteria for a long initial period. Consequently, the resulting system utility may converge to its optimal long-term value from above. The results are verified by providing simulations of practical scheduling scenarios.
△ Less
Submitted 19 January, 2020; v1 submitted 23 May, 2019;
originally announced May 2019.
-
A General Framework for Temporal Fair User Scheduling in NOMA Systems
Authors:
Shahram Shahsavari,
Farhad Shirani,
Elza Erkip
Abstract:
Non-orthogonal multiple access (NOMA) is one of the promising radio access techniques for next generation wireless networks. Opportunistic multi-user scheduling is necessary to fully exploit multiplexing gains in NOMA systems, but compared with traditional scheduling, interrelations between users' throughputs induced by multi-user interference poses new challenges in the design of NOMA schedulers.…
▽ More
Non-orthogonal multiple access (NOMA) is one of the promising radio access techniques for next generation wireless networks. Opportunistic multi-user scheduling is necessary to fully exploit multiplexing gains in NOMA systems, but compared with traditional scheduling, interrelations between users' throughputs induced by multi-user interference poses new challenges in the design of NOMA schedulers. A successful NOMA scheduler has to carefully balance the following three objectives: maximizing average system utility, satisfying desired fairness constraints among the users and enabling real-time, and low computational cost implementations. In this paper, scheduling for NOMA systems under temporal fairness constraints is considered. Temporal fair scheduling leads to communication systems with predictable latency as opposed to utilitarian fair schedulers for which latency can be highly variable. It is shown that optimal system utility is achieved using a class of opportunistic scheduling schemes called threshold based strategies (TBS). One of the challenges in temporal fair scheduling for heterogeneous NOMA scenarios - where only specific users may be activated simultaneously - is to determine the set of feasible temporal shares. In this work, a variable elimination algorithm is proposed to accomplish this task. Furthermore, an (online) iterative algorithm based on the Robbins-Monro method is proposed to construct a TBS by finding the optimal thresholds for a given system utility metric. Various numerical simulations of practical scenarios are provided to illustrate the effectiveness of the proposed NOMA scheduling in static and mobile scenarios.
△ Less
Submitted 17 September, 2018;
originally announced September 2018.
-
Spectrum Pooling in MmWave Networks: Opportunities, Challenges, and Enablers
Authors:
Federico Boccardi,
Hossein Shokri-Ghadikolaei,
Gabor Fodor,
Elza Erkip,
Carlo Fischione,
Marios Kountouris,
Petar Popovski,
and Michele Zorzi
Abstract:
Motivated by the intrinsic characteristics of mmWave technologies, we discuss the possibility of an authorization regime that allows spectrum sharing between multiple operators, also referred to as spectrum pooling. In particular, considering user rate as the performance measure, we assess the benefit of coordination among the networks of different operators, study the impact of beamforming both a…
▽ More
Motivated by the intrinsic characteristics of mmWave technologies, we discuss the possibility of an authorization regime that allows spectrum sharing between multiple operators, also referred to as spectrum pooling. In particular, considering user rate as the performance measure, we assess the benefit of coordination among the networks of different operators, study the impact of beamforming both at the base stations and at the user terminals, and analyze the pooling performance at different frequency carriers. We also discuss the enabling spectrum mechanisms, architectures, and protocols required to make spectrum pooling work in real networks. Our initial results show that, from a technical perspective, spectrum pooling at mmWave has the potential for a more efficient spectrum use than a traditional exclusive spectrum allocation to a single operator. However, further studies are needed in order to reach a thorough understanding of this matter, and we hope that this paper will help stimulate further research in this area.
△ Less
Submitted 3 March, 2016;
originally announced March 2016.