• Nenhum resultado encontrado

Paul de Kerret

N/A
N/A
Protected

Academic year: 2023

Share "Paul de Kerret"

Copied!
250
0
0

Texto

D= diag (A) Diagonal matrix whose diagonal elements are equal to the diagonal elements of the square matrix A. Π⊥A(v) Orthogonal projection of the vector v over the orthogonal complement of the space spanned by the columns of the matrix A.

Saturation des bandes de fr´equence

Une mauvaise gestion des perturbations réduirait en fait considérablement les profits et pourrait même rendre ces changements contre-productifs. Par conséquent, l'importance d'un contrôle efficace des perturbations est devenue très claire à la fois dans la communauté académique et dans l'industrie (voir [4] et ses références).

Transmission ` a partir d’un transmetteur vers de mul-

La première consiste à modéliser la connaissance imparfaite du canal avec une variable aléatoire pour ensuite maximiser les performances moyennées sur ces imperfections [20]. Il a été montré dans [23] que même une estimation décorée avec l'état actuel du canal peut conduire à une amélioration des performances par rapport à un système d'estimation sans aucune information de canal pour l'émetteur.

Coop´eration de plusieurs transmetteurs

Une question particulièrement intéressante avec l'alignement d'interférence est la question de la faisabilité de l'alignement d'interférence. Ce gain est déjà présent pour l'alignement des interférences et devient encore plus important dans le cas d'un précodage conjoint.

Figure 1.1: Le fonctionnement d’un algorithme de pr´ecodage ` a alignement d’interf´erence est d´ecrit sch´ematiquement dans la Figure a
Figure 1.1: Le fonctionnement d’un algorithme de pr´ecodage ` a alignement d’interf´erence est d´ecrit sch´ematiquement dans la Figure a

Les d´efis de l’obtention de l’information de canal aux trans-

Information de canal imparfaite aux transmetteurs

Il demande ensuite aux TX de recevoir les informations de canal relatives à l'ensemble du groupe coopératif. Plusieurs équipes de recherche ont travaillé sur la détermination de la taille optimale des groupes collaboratifs et sur l'évaluation du coût de l'évaluation des informations sur les canaux [72, 73].

Configuration ` a information de canal distribu´ee

En particulier, nous montrons comment des gains importants peuvent être obtenus en optimisant le partage des informations de canal entre les TX. Dans la première partie de cette thèse, nous étudions le précodage à partir d'informations de canaux distribués.

Figure 1.2: Dans la Figure a, chaque TX transmet directement l’estim´ee disponible vers tous les TXs
Figure 1.2: Dans la Figure a, chaque TX transmet directement l’estim´ee disponible vers tous les TXs

Publications

Conf´erences

Paul de Kerret and David Gesbert, "A practical precoding scheme for multicell MIMO channels with partial user data sharing," in proc. Xinping Yi, Paul de Kerret and David Gesbert, “The DoF of MIMO network with backhaul delays”, in Proc.

Journaux

Paul de Kerret, Xinping Yi, and David Gesbert, “On the degrees of freedom of the K-user time-correlated broadcast channel with delayed CSIT,” in proc.

Pr´ecodage conjoint avec information de canal distribu´ee

Pr´ecodage ZF avec information de canal distribu´ee

Analyse du nombre de degr´es de libert´e (DoF)

Ainsi, le précodage AP-ZF permet d'atteindre la DoF qui serait obtenue avec la meilleure estimation disponible des deux TXs. AP-ZF consiste à définir de manière aléatoire le coefficient de précodage du TX avec l'estimation la moins précise pour que le TX avec la meilleure estimation élimine les interférences.

Figure 1.3: Le d´ebit total R 1 + R 2 est pr´esent´e en fonction du rapport signal-` a-bruit pour A (1) 1 = 1, A (2)1 = 0.5, A (1)2 = 0, A (2)2 = 0.7.
Figure 1.3: Le d´ebit total R 1 + R 2 est pr´esent´e en fonction du rapport signal-` a-bruit pour A (1) 1 = 1, A (2)1 = 0.5, A (1)2 = 0, A (2)2 = 0.7.

Analyse du pr´ecodage et des canaux de feedback

Nous considérons maintenant un exemple d'information de canal pour visualiser les résultats théoriques précédents. Ce dernier résultat fournit un critère de conception des canaux de rétroaction dans le cas d'informations de canaux distribués.

Figure 1.4: Diff´erence moyenne E[ | e T 1 (u (1) 2 − u ⋆ 2 ) | 2 ] en fonction de la qualit´e de l’information de canal 2 −
Figure 1.4: Diff´erence moyenne E[ | e T 1 (u (1) 2 − u ⋆ 2 ) | 2 ] en fonction de la qualit´e de l’information de canal 2 −

Alignement d’interf´erence avec information de canal incompl`ete 26

Analyse des sc´enarios ´etroitement faisables

Il est donc possible d'aligner les interférences en fournissant uniquement les informations relatives au plus petit canal d'interférence à chaque TX. L'algorithme consiste à former d'abord les précodeurs des TX appartenant au plus petit canal d'interférence actuellement possible.

Analyse des sc´enarios largement faisables

Nous verrons dans les simulations que la réduction obtenue de la taille des informations du canal est significative. La taille des informations de canal obtenues avec notre algorithme est de 20 alors que la taille complète est de 99.

Figure 1.7: Taille moyenne de l’allocation d’information de canal en fonction du nombre d’antennes distribu´ees de mani`ere al´eatoire et uniform´ement aux TXs et aux RXs pour K = 3 paires de TX/RX.
Figure 1.7: Taille moyenne de l’allocation d’information de canal en fonction du nombre d’antennes distribu´ees de mani`ere al´eatoire et uniform´ement aux TXs et aux RXs pour K = 3 paires de TX/RX.

Conclusion et nouveaux probl`emes

Saturation of the Wireless Medium

To cope with the expected saturation of available resources in the bands currently used, the architecture of the wireless networks and their transmission schemes must be reconsidered. It has then become increasingly clear that the bottleneck of future wireless networks will be interference management [4].

Downlink Multi-user Single-cell Transmission

Gaussian multiple-input-multiple-output (MIMO) channel capacity has been obtained [7, 8] and shown to be achieved by a nonlinear scheme called dirty paper coding (DPC) in which interference is subtracted on the TX side [9] . However, the performance improvement can only be achieved at the cost of an accurate knowledge of the channel state in both TX and RX [14, 15].

Multi-cell Processing

A clear advantage of TX cooperating over conventional approaches that rely on selfish interference suppression at the RXs lies in the reduced number of antennas required with each RX to ZF residual interference. In the case of three interfering TX's with two antennas, relying on RX-based interference suppression only requires three antennas at each RX to ZF-en the interference, while only two are needed when coordination via IA is possible.

The Challenges of Obtaining CSIT

  • Imperfect CSIT
  • The Distributed Channel State Information Setting . 41
  • Contributions Presented in this Thesis
  • Other Contributions
  • Received Signal
  • Precoding Schemes with Perfect CSIT

Paul de Kerret and David Gesbert, “Degrees of freedom of network MIMO with distributed CSI,” in IEEE Trans. We present the main principles of transmission schemes in the case where the CSI is fully known at each TX.

Figure 2.1: In Figure a, the broadcast scenario is described: every RX di- di-rectly transmits its CSI in a broadcast manner to all the TXs
Figure 2.1: In Figure a, the broadcast scenario is described: every RX di- di-rectly transmits its CSI in a broadcast manner to all the TXs

Figures of Merit: Average Rate, DoF, Generalized DoF

Average Rate

Similarly, the RX beamformers at all RXs are then obtained from the TX beamformers as. Note that without loss of generality (w.l.o.g.), the noise variance is normalized to one by dividing both the numerator and the denominator in (3.13) by the noise variance which amounts to integrating the noise variance into the variance of the channel. .

Degrees-of-Freedom

The general expression in (3.13) will be rewritten in simplified forms if we consider JP or IA.

Generalized Number of Degrees-of-Freedom

This dependence of the path loss with SNR allows the network geometry to be taken into account in the analysis. The generalized DoF analysis provides an approximation of the achieved capacity in the original transmission setting.

The Distributed CSIT Configuration

Distributed CSIT

This consists of using a model where the strength of any interference links is parameterized as a function of the operating SNR. Another distributed CSIT configuration that we will consider in Chapter 8 consists of letting each TX know a subset of the channel elements perfectly, with the subset of the channel elements being different for each TX.

Figure 3.2: Joint precoding with centralized CSIT is shown in Figure a while Figure b represents the joint precoding in the distributed CSIT  con-figuration where each TX receives its own multi-user channel estimate
Figure 3.2: Joint precoding with centralized CSIT is shown in Figure a while Figure b represents the joint precoding in the distributed CSIT con-figuration where each TX receives its own multi-user channel estimate

Distributed Precoding

An example, which is studied in Chapters 4 and 5, consists of each element of ˆH(j) being taken from. A suboptimal precoding scheme consists of using a conventional precoding algorithm distributively at each TX.

Optimal Precoding with Distributed CSIT: A Team Decision

We will now reformulate the optimization problem (3.22) with the appropriate formalism to highlight how it relates to the conventional team decision problems. Finding the optimal team decision strategy is a very difficult problem as it requires solving a distributed functional optimization problem.

Summary of Objectives

Quantization for Distributed CSIT

Interestingly, this quantization scheme can be seen as insufficient in the case of distributed CSIT: The objective, which is maximized, is invariant by multiplying the codeword by a unit-rate complex number. Therefore, in the following we give an analysis of the performance of the quantization scheme (4.4) with random codes.

Distributed CSIT Model

Instead, we will use a simple model for the CSI imperfections to discuss the fundamentals of transmission. We thus also concentrate on scaling in the logarithm of the SNR of the number of quantization bits of all channel estimates.

ZF in the Two-user BC with Distributed CSIT

  • Conventional Zero Forcing
  • Robust Zero Forcing
  • Beacon Zero Forcing
  • Active-Passive Zero Forcing

As a result, we now propose a modification of the conventional ZF scheme that improves the DoF when the estimates for h1 and h2 are of different quality. However, the selection of the coefficient used for transmission at TX 1 (with the lowest CSI accuracy) remains to be discussed.

ZF in the General K-Users BC with Distributed CSIT

  • Conventional Zero Forcing
  • Beacon Zero Forcing
  • Active-Passive Zero Forcing
  • Discussion of the Results

In the proof of Theorem 4, it is in fact the scale of the interference resulting from the transmission of one current that is calculated. It then remains to determine the scale of the interference resulting from the transmission of one given data symbol.

Precoding Using Hierarchical Quantization

Hierarchical Quantization

Note that the scalar value can be sent by any of the other K−1 TXs and one scalar value must be sent for each stream. Once this is done, the decoded codeword is chosen as the representative codeword of the resulting codebook.

Conventional Zero Forcing with Hierarchical Quanti-

Active-Passive Zero Forcing with Hierarchical Quan-

The two consecutive minima come from the fact that it is not the same TX that is passive for the different currents. For K≥3, it is optimal to choose passive TX to be TXj mej=nHQ defined in (4.48), for all data streams.

Simulations

In the Two-User Case

The DoF achieved with Active-Passive ZF based on hierarchical quantization is then equal to. To emphasize the DoF (i.e., the slope of the curve in the figure), we make the SNR large.

With Arbitrary Number of Users

The DoFs achieved with the different precoding schemes for this CSIT scaling matrix are given in Table 4.1. The average sum rate achieved for this institution is shown in terms of the SNR in Fig.

Figure 4.1: Sum rate in terms of the SNR with a statistical modeling of the error from RVQ using [A (1) 1 , A (2)1 ] = [1, 0.5] and [A (1)2 , A (2)2 ] = [0, 0.7].
Figure 4.1: Sum rate in terms of the SNR with a statistical modeling of the error from RVQ using [A (1) 1 , A (2)1 ] = [1, 0.5] and [A (1)2 , A (2)2 ] = [0, 0.7].

Conclusion

ZF with Centralized CSIT

In the case of centralized CSIT, the same estimate is received at all TXs.

ZF with Distributed CSI

Broadcast Channel with Centralized CSIT

Rate Loss Analysis

In the BC with centralized CSIT, the speed loss at user i, which we denote by ∆CCSIR,i , can be bounded at high SNR if.

Feedback Design

The following theorem provides an upper bound for the rate loss as a function of the number of return bits available to B. Setting the rate loss ∆CCSIR,i less than or equal to log2(1 +b) and solving for β yields the theorem .

Simulation Results

We compare it to the average speed obtained using full CSIT and to the maximum allowable speed loss of log2(1 +b) = 1 bit.

Figure 5.2: Average rate per user versus the average SNR P with centralized CSIT.
Figure 5.2: Average rate per user versus the average SNR P with centralized CSIT.

Broadcast Channel with Distributed Limited CSI

Rate Loss Analysis

Starting from this proposition, we can then quantify the rate loss due to the distributed CSIT, as is done in the following theorem. In BC with distributed CSIT, if all the variances (σ(j)i )2 decrease polynomially with SNRP, the speed loss ∆DCSIR,i at userican will be upper limit at high SNR as.

Feedback Design

Note that because of this conjecture, the reaction rate obtained from (5.25) will not guarantee that the rate loss remains below the given threshold and one will have to use (5.24) to obtain a formal guarantee. Considering K larger, this response rate is approximately Klog2(K) greater than the response rate obtained in the centralized case, implying that the difference between the two expressions becomes increasingly large as the number of users K increases .

Simulation Results

Note that due to the different scale in the number of users, the loss achieved with BCCSI increases with the number of usersK.

Figure 5.4: Average difference E[ | e T 1 (u (1) 2 − u ⋆ 2 ) | 2 ] as a function of the CSI quality (σ (1) i ) 2 = P − 23 .
Figure 5.4: Average difference E[ | e T 1 (u (1) 2 − u ⋆ 2 ) | 2 ] as a function of the CSI quality (σ (1) i ) 2 = P − 23 .

Conclusion

This distributed CSIT setup is depicted and compared to the centralized CSIT setup in Fig. Using the results in Section 4.1.2, the variance of the estimation error can be related to the number of quantization bits as follows.

Figure 6.1: Symbolic representation of IA with precoding and distributed CSIT.
Figure 6.1: Symbolic representation of IA with precoding and distributed CSIT.

DoF Analysis with Static Coefficients and Distributed CSI

Sufficient Condition for an Arbitrary IA Scheme

However, the accuracy of the precoder design is difficult to correlate with the accuracy of the CSIT. Furthermore, obtaining a relationship between CSIT quality and precoding accuracy is particularly difficult in the case of iterative IA algorithms.

DoF Analysis in the 3-user Square MIMO IC

It is easy to see from the continuous distribution of the channel matrices that ∀η >0,∃ε >0,Pr(Hε)≥1−η. Using Theorem 2.1 from [109] for Y⋆ and Y(j) and taking into account the expectation, we can show that for some constant γ(j)>0 is independent of the SNR P,.

Simulations

We have shown that for the closed-form 3-user IA matching scheme, the achieved DoF is greater than the worst-case accuracy of the channel estimates across the TXs. Interestingly, the lower bound at RXj is limited by the accuracy of the estimates relative to the channels of all the other RXs.

Conclusion and Outlook

Distributed CSI at the TXs

Furthermore, only the exponentially asymptotic behavior in SNR is of interest in this work, so the CSIT error distribution is not relevant here. Furthermore, only the CSI requirements in TXs are investigated and different scenarios can be envisaged for sharing channel estimates (eg, direct transmission from RXs to all TXs, sharing through a backhaul,) .

Distributed Precoding

We consider a digital quantization of the channel vectors here, but the results can easily be translated to a setting using analog feedback, since digital quantization is simply used as a way to quantify the variance of the CSIT errors [19, 112] .

Optimization of the CSIT Allocation

7.8) Therefore, an interesting problem consists in finding the minimal CSIT allocation (where minimality refers to the size in Definition 2) that achieves the maximal generalized DoF of each user:. We focus here on an “achievability result” by exhibiting a CSIT allocation that achieves the maximum DoF while having a much lower magnitude than the conventional (uniform) CSIT allocation.

Preliminary Results

A Sufficient Criterion

The maximum DoF is achieved when the velocity difference ∆R,i/log2(P) tends to zero as the SNR increases, which is the result of the proposal. However, Proposition 12 does not address the main issue of determining what type of CSIT allocation can be achieved (7.10).

The Conventional CSIT Allocation is DoF Achieving . 131

After normalization, it easily follows from (7.31) that the sufficient condition in Proposition 12 is satisfied, which completes the proof. This CSIT division provides each TX with the K channel vectors with respect to the K RXs.

Distance-Based CSIT Allocation

Distance-based CSIT Allocation

With the notations defined above, the conventional CSIT assignment given in (7.21) can be rewritten as We are now looking for a CSITB(j) assignment that provides this. 7.53) Let's write down the first coefficients in particular.

Scaling Properties of the Distance-based CSIT Allo-

Then there is no path loss interference reduction and the distance-based CSIT assignment converges, as expected, to the conven- . From the finite density assumption, there are only a finite number of RXs that satisfy this condition, so the CSIT allocation size at TXj remains bounded as Kincreases.

Simulations

We can observe that reducing the CSIT allocation leads to the reduction of the slope, i.e., the DoF, while the use of more feedback bits leads to a compensation of the extinction rate. This is consistent with our theoretical result that distance-based CSIT distribution leads to a finite rate offset.

Figure 7.1: Average rate per user as a function of the SNR P for K = 36 and γ = 0.6. The TX/RX pairs are positioned at the integer values inside a square of dimensions 6 × 6
Figure 7.1: Average rate per user as a function of the SNR P for K = 36 and γ = 0.6. The TX/RX pairs are positioned at the integer values inside a square of dimensions 6 × 6

Conclusion

The proposed CSIT allocation can be seen as an alternative to grouping where hard group boundaries are replaced by a smooth decrease in the strength of cooperation. The size of a CSIT distribution F, denoted by s(F), is equal to the total number of complex channel coefficients returned to TX.

Feasibility Results

  • Results from the Literature
  • Tightly-feasible and Super-feasible Settings
  • New Formulation of the Feasibility Results
  • Generalized interference channels

Condition (8.8) requires that a number of conditions be verified that increases exponentially with the size of the network. We can note that the number of conditions to test in Theorem 13 is still exponential.

IA with Incomplete CSIT for Tightly-Feasible Channels

  • General Criterion
  • CSIT Allocation Algorithm
  • IA Algorithm for Incomplete CSIT Allocation
  • Example of Tightly-feasible Configuration

In the following we assume that the beamformers of TXs and RXs within this sub-IC are fixed and complete all IA contents within this sub-IC. By inspection of the CSIT allocation algorithm, the CSIT allocations of all TXs included in STX(j) are included in the CSIT of TXj.

Figure 8.1: Symbolic Representation of the IA algorithm with incomplete CSIT for the tightly-feasible IC (2, 3).(2, 4).(3, 5).(3, 2).(4, 2).
Figure 8.1: Symbolic Representation of the IA algorithm with incomplete CSIT for the tightly-feasible IC (2, 3).(2, 4).(3, 5).(3, 2).(4, 2).

Interference Alignment with Incomplete CSIT for Super-Feasible

CSIT Allocation Algorithm

We also define the number of RXs and the number of TXs actually in the generalized IC QK. The closely feasible sub-ICs are obtained by following similar steps as in the algorithm in section 8.3.2.

Toy-Example of the Incomplete CSIT-Algorithm in

Any antenna can be removed and the policy chosen in the algorithm is to remove the antenna on the TX with the smallest number of antennas if there is at least one TX left [Cf. The IA algorithm for incomplete CSIT sharing resulting from this CSIT assignment is symbolically depicted in Fig.

Simulations

Tightly-Feasible Setting

Since this setting is firmly executable, we can perform the CSIT assignment for firmly executable ICs described in subsection 8.3.2, which returns the CSIT allocation. The reduction of 60% of the feedback size (Cf. Subsection 8.3.4) therefore comes for nothing, which makes it particularly interesting in practice.

Figure 8.3: Average rate per user in terms of the normalized TX power for the tightly-feasible IC (2, 3).(2, 4).(3, 5).(3, 2).(4, 2) with the size of the  in-complete CSIT allocation being only equal to 40% of the size of the in-complete CSIT allocation.
Figure 8.3: Average rate per user in terms of the normalized TX power for the tightly-feasible IC (2, 3).(2, 4).(3, 5).(3, 2).(4, 2) with the size of the in-complete CSIT allocation being only equal to 40% of the size of the in-complete CSIT allocation.

Performance Evaluation of the CSIT allocation Algo-

For reference, we also show the average size of the full (conventional) CSIT allocation. If more than 12 antennas are available, each additional antenna is used by the heuristic algorithm to reduce the size of the CSIT map.

Discussion

The focus of this thesis has been the analysis of multi-antenna cooperation schemes in the case of imperfect CSI sharing between TXs. The focus of the second part of this thesis was the optimization of the spatial allocation of CSIT.

Imagem

Figure 1.1: Le fonctionnement d’un algorithme de pr´ecodage ` a alignement d’interf´erence est d´ecrit sch´ematiquement dans la Figure a
Figure 1.2: Dans la Figure a, chaque TX transmet directement l’estim´ee disponible vers tous les TXs
Figure 1.3: Le d´ebit total R 1 + R 2 est pr´esent´e en fonction du rapport signal-` a-bruit pour A (1) 1 = 1, A (2)1 = 0.5, A (1)2 = 0, A (2)2 = 0.7.
Figure 1.4: Diff´erence moyenne E[ | e T 1 (u (1) 2 − u ⋆ 2 ) | 2 ] en fonction de la qualit´e de l’information de canal 2 −
+7

Referências

Documentos relacionados

Figure 6: Survey Results 0% 10% 20% 30% 40% 50% 60% 70% 80% 90% 100% Portal designQuality of portal’s information Utility of the contents Access speed to the portal