05506494 (3)
TRANSCRIPT
-
7/31/2019 05506494 (3)
1/6
Optimization of Common Air Interface in Cellular Multihop
Wireless Networks in the Presence of Traffic Variation
Beatriz Lorenzo, Student Member, IEEE Savo Glisic, Senior Member, IEEECWC, University of Oulu Telecom Laboratory, University of Oulu
Oulu, Finland Oulu, Finland
Abstract- In this paper we define the jointly optimum topology
for the duplex transmission (uplink/downlink) in multihop
cellular networks which is aware of the intercell interference and
a protocol that reconfigures the optimum topology based on the
observation of the temporal traffic in the network. In addition we
also consider the application of network coding in cellular
networks to combine the uplink and downlink transmissions and
incorporate it into the optimum bidirectional relaying with
intercell interference awareness resulting in a comprehensive
solution for 4G common air interface.
Keywords-cellular network, common air interface, intercell
interference, network coding, relay, topology control.
I. INTRODUCTIONRecently, relaying has been studied intensively for
applications in multihop cellular networks [1-5]. In [6]
relaying techniques that increase the throughput in multihop
wireless networks are analyzed by applying network coding
over bidirectional traffic flows. This technique has been
included in our approach with the focus on mitigating the
intercell interference and adapting the relaying topology to
traffic variations across the network.
Two basic coding strategies for the one-relay case were
proposed by Cover and El Gamal in [7]: decode-and-forward
(DF) and compress-and-forward(CF). Furthermore, [7, Th. 7]
provides a general lower bound on the capacity of one-relay
networks which can be achieved using a combination of DF
and CF.The relaying concept is the basis of cooperative and virtual
antenna transmission too [8-12]. The bounds of the
information theoretic capacity of a discrete memoryless
channel are given by [13] based on a timesharing approach.
The capacity analysis for the special case of degraded relay
channels by the use of superposition block Markov encoding
is presented in [14]. For other type of channels the capacity is
upper-bounded (max-flow-min-cut theorem [15]) by the
minimum of mutual information obtained by the broadcast
channel (transmission from the source to relay and
destination) and the multiple access channel (independent and
simultaneous transmission from the source and relay to the
destination). Capacity bounds and power allocation for
wireless relay channels are presented in [16] for halfduplex
relay and single-antenna terminals. Algorithms for finding the
capacity bounds for the multi-antenna terminals are given in
[17], [18].Currently considered relays are assumed to work under
half-duplex mode, by using an orthogonal duplexing (in time
or frequency) between the relay-receive phase and the relay-
transmitphase. This phase separation allows defining several
half-duplex relay protocols. The number of options leads to
the four protocol definition [19]-[20] referred to as protocol 1,
2 and 3, and forwarding. In protocol 1 the source
communicates with the relay and destination during the relay-
receive phase and in the relay-transmit phase, the relay
terminal communicates with the destination. In protocol 2
during the relay-receive phase the source only transmits to the
relay. It is assumed that the destination is not able of receiving
the message from the source in that phase. In the relay-
transmit phase source and relay transmit simultaneously to thedestination. Hence in the relay-transmit phase the channel
becomes a multiple access channel (MAC). Protocol 3 is a
combination of protocols 1 and 2. The source transmits to the
relay and the destination in the relay-receive phase and in the
relay-transmit phase, the source and the relay transmit to the
destination.Notice that the relay is transmitting during the
second phase, so that it cannot be aware of the signal
transmitted by the source in the second phase. This protocol
can achieve a betterspectral efficiency than previous ones.
Finally, the traditional forwarding protocol consists of a
transmission from the source to the relay during the relay-
receive phase and a transmission from the relay to the
destination in the relay-transmitphase.Having in mind the above results, in this paper we present
the design of a relaying protocol jointly optimizes relaying
topology, routing and scheduling in the presence of intercell
interference. By using newly developed TSL algorithm for the
search of the optimum topology we show that the optimum
choice of the relaying topology can provide significant
performance improvements. We apply network coding to
bidirectional links (uplink/downlink) and combine it with the
optimum relaying to define a new cognitive common air
interface for 4G cellular networks. We also demonstrate that a
reconfigurable relaying topology provides better network
utility and presents the framework for quantifying these
improvements for spatially and temporally varying traffic.Numerical examples show that a combination of these
components provides a flexible optimal solution for future 4G
common air interface in cellular networks.
II. SYSTEM MODEL2.1 Network and Intercell Interference Model
A. Uplink
We consider a cellular network with a set ofI={i} base
stations. Let us assume that in a reference cell with index i=r,
there is a user m(r) connected to the access point AP(r) (base
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 2010 proceedings.
978-1-4244-6398-5/10/$26.00 2010 IEEE
-
7/31/2019 05506494 (3)
2/6
station) with channel gain( )
( )r
r
mg . At the same time a cochannel
interfering userm(i)is connected to access point AP(i) in cell i,
i I-r { }i r= , with channel gain ( )( )
i
i
mg . Assuming that all the
users are expected to reach their respective access points with
the same required received power( )
( )i
i
mS , we have for the
transmitted powers( )
( )i
i
mP of the useful and interfering signal
( ) ( ) ( )( ) ( ) ( ) ;i i ii i i
m m mS g P i= I (1)
We denote by( )
( )i
r
mI the interference power level at the
position of the reference receiverAP(r) due to the interfering
cochannel signal transmitted in cell i. This can be presented as
( ) ( ) ( )
( ) ( ) ( );i i i
r r i
m m mI g P i= I-r (2)
where( )
( )i
r
mg is the gain of the channel between the interfering
userm(i) and AP(r). The signal to interference plus noise ratio
( )
( )r
r
mSINR atAP
(r) in the presence of all interfering users m(i) is
( ) ( )
( )
( ) ( )
1( ) ( )
( ) 1
( ) ( )
r i
r
i i
r r
r m m
rr imi rr m m
i r
S g
SINR N n I g
= = +
+ (3)
where ( )( ) /rr
r rmN S n SNR= = , and the channel capacity per
unit spectra can be represented as
( ) ( )
( ) ( )log(1 )r rr r
m mc SINR= + (4)
The network capacity is then given by
( )
( )r
r
mr
C c= (5)
If the radio resource management is defined as channel
assignment function A(m(r)) responsible to allocate to each
user m(r) proper channel then the optimum assignment is
defined as
( )
( )
( )( ) max ;r
r
A mA m C r= I (6)
B. Downlink
In this scenario the reference access point AP(r)is providing
power( )
( )
rm
rS to the reference user m
(r). At the same time,
interfering AP(i) providing the same signal level( )
( )
im
iS to the
userm(i), is producing interference to the useful signal of user
m(r). So, we have
( ) ( ) ( )
( ) ( ) ( ) ( ) ( ) ( )
( ) ( ) ( )
( ) ( )
( ) ( ) ( )
( ) ( ) ( ) ( ) ( )
( ) ( ) ( ) ( ) ( ) ( )
1
( ) 1 ( ) ( )
( ) ( ) ( )
,
/ ,
/
i i i
r r i i r i
r r i
m m m
i i i
m m m m m m
i i i i i i r
m m m
r r i i
i r
S g P i
I g P S g g i
SINR N g g
=
= =
= +
I
I (7)
where( )
( )
( )
im
ig is the channel gain between( )iAP and userm(i),
( )( )
( )
im
iP is the power needed at
( )iAP to provide power P for
userm(i),( )( )
( )
rm
iI is the interference power at m(r) produced by
( )iAP and( )
( )
( )
rm
rSINR is SINR at m
(r). The optimum radio
resource management is again defined by (4)-(6).
Fig. 1. Modeling interfering users positions for 2-cells.
2.2 Relaying and scheduling
We will use notation ( ) ( ) ( ) ( )2 1 2 1
( , , , )r r i ir m m m m , to denote
simultaneous transmission (relaying) on reference cell rI
from user ( ) ( )1 2
r rm to m and interfering users from
( ) ( )
1 2
i im to m
( i I-r) position in all interfering cells. Under these conditions
the corresponding link capacity will be denoted as( ) ( ) ( ) ( ) ( )
2 1 2 1( , , , )r r r i ic m m m m . This capacity can be calculated by
the following set of equations
( ) ( ) ( ) ( ) ( ) ( )
2 2 2 2 2 2( ) ( ) ( ) ( ) ( ) ( )1 1 1 1 1 1
( ) ( ) ( ) ( ) ( ) ( )2 2 2 2 2 2
( ) ( ) ( ) ( ) ( ) ( )1 1 1 1 1 1
( ) ( ) ( ) ( ) ( ) ( )
( ) ( ) ( ) ( ) ( ) ( )
;
/
r r r i i i
r r r i i i
r i r i r i
i i i r i i
m m m m m mm m m m m m
m m m m m m
m m m m m m
S P g S P g
I P g S g g
= =
= =
( )
( )2
( )( )12
( ) ( )1 2
( )1
( ) ( )2 2
( ) ( )1 1
( )
( ) ( ) ( )
2 1 ( )
1
( ) ( )1
,
/
r
rr
r r
i
r i
i i
m
mm i i
m m
r mi r
m m
r m mi r
SSINR
n I
N g g
= =+
= +
m m
(8)
( ) ( )( ) (1) (2) ( ) (1) (2)
1 1 1 1 2 2 2 2( , ,..., ); ( , ,..., );c cN Ni im m m m m m i= = m m I-r
( )( )2
( )1
( ) ( ) ( ) ( ) ( ) ( ) ( )
2 1 2 1 2 1( , , , ) log 1 ( , ) ;
r
r
mr r r i i i i
mc m m SINR i= + m m m mI
-r
where Nc is the number of cells. We define now the multihop
(Hhops) route as a series of relaying transmissions
( ) ( ) ( ) ( ) ( ) ( ) ( ) ( ) ( )
1 2 1 1 2 1( , ,..., , , , ,..., , )r r r r r i i i i
H H H Hm m m m m m m m (9)
The capacity of the route is defined as( )
( )
( ) ( ) ( ) ( ) ( ) ( )
1 1min ( , , , ); 2,...,r
r
r r r i i
h h h h hc c m m h H
= =m m (10)
( )( )2
( ) ( )1
( ) ( ) ( ) ( ) ( )
1 1log 1 ( , , , )
r
r r
mr r r i i
h h h hmc SINR m m
= + m m
-a-
-b-
1 2 2 13
1 2 23
R
3 1 3 2
1 3
2 3
AP(r) AP(i)
1 2 2 13
1 2 23
3 1 3 2
1 3
2 3
-a-
-b-
3 1
22
11
22
3 3
m(r)= 0
uplink
downlink
0 = m(i)
m(r)= 0 0=m(i)
AP(r) AP(i)
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 2010 proceedings.
-
7/31/2019 05506494 (3)
3/6
which is equal to the minimum link capacity on the route.
The optimum set of relaying routes is defined as
{ }( )
( )
( ) ( ) ( ) ( )
,max ; where ;
r
r
r
Hr
C C c r
= = I (11)
In order to reduce the interference produced by the
concurrent transmission of the different relaying segments, a
scheduling in different time slots is introduced in the sequel.
This scheduling will also solve the constraint that nodes in awireless network can not receive and transmit the signal
simultaneously on the same channel.
2.3. Two Dimensional Relaying Topology
The cochannel interference can be further reduced by
scheduling different transmissions in different channels (time
slots). All necessary transmissions between all users and their
respective access points should be completed in B slots
(scheduling cycle) in both directions: uplink and downlink.
As an illustration, for the two cells scenario and notation
shown in Fig.1, a possible (feasible) topology is shown in
Fig.1b. For a systematic presentation of the problem the cell
area is divided into concentric rings (three rings for each cell
in Fig.1). It is assumed that one cochannel user from each ring
has unidirectional connection with the corresponding access
point. For the uplink, the topology consists of four partial
topologies representing transmissions in four consecutive time
slots (B=4). In the first time slot (the first partial topology)
there are two simultaneous transmissions: packet originating
from ring 3 in cell #ris transmitted from ring 3 to ring 2 and at
the same time packet originating from ring 1 of cell #i is
transmitted from ring 1 to access point AP(i). In the second
time slot (the second partial topology), packet originating from
ring 3 in cell #ris transmitted from ring 2 to AP(r) and at the
same time packet originating from ring 2 of cell #i is
transmitted from ring 2 to access point AP(i)
. Similarly the
same notation is then used for transmission in time slot 3 and
4. Similar topology for the downlink is presented in the lower
part of Fig.1b. These seven partial topologies together are
referred to as apossible orfeasibletwo dimensional(time and
space) topology and will be represented in the sequel by a
given topology index t. For this concept (11) becomes
{ }(2) (2) (2, )
( 2, )
(2, ) ( ) ( ) ( )
, ,max ;where
r
r
r
B Hr
C C c
= = (12)
rIand (2 ) is the two dimensional relaying topology to be
elaborated in more detail in the next section.
2.4 Bidirectional Relaying and Network Coding
In this section we additionally introduce network coding andcombine it with the previous results on optimum relaying to
achieve further improvements in system performance.
Let us assume that the hops are indexed in increasing order
for uplink as h(up)
and for downlink as h(down)
. By combining
the uplink and downlink traffic from the previous hop at hop h
as ( , ) ( ) ( )1 1
down up down up
h h hy y y = the number of overall time slots
needed for transmission in cycle B can be reduced. The
optimization process defined by (12) now becomes
{ }( 2) ( 2) ( 2, )
( 2, )
(2, ) ( ) ( ) ( )
, , ,max ; where
r
r
r
B Hr
C C c
= = (13)
and ( ) ( )up down = .
To elaborate this concept in more detail an example of
possible topology that includes network coding is shown in
Fig.3 for two cell scenario from Fig.1a. The traffic between
users and access point is bidirectional, so given a schedule that
alternates the transmissions between the different rings, after
certain number of time slots all intermediate users (m(i)
, i I)
have information frames buffered for transmission in both
directions. Whenever an opportunity arises, the intermediate
users combine two information frames, one for each direction,
with a simpleXOR operation and send it to its neighbors in a
single omnidirectional transmission. Both receiving nodes
already know one of the frames combined, while the other
frame is new. Thus, one transmission allows two users to
decode a new packet, effectively doubling the capacity of the
path, reducing the power consumption of the transmitter node
and reducing the number of time slots required to complete the
transmission.
If we denote by n(i)
the number of rings in cell i and
( )
1
cNi
i
N n=
= the total number of rings in the network, the
vector( )
( )
( ) ( ) ( ) ( )
1( ,..., ),i
i
i i i i n
n = R defines the amount of
generated source traffic by the users situated in the different
rings in cell i to be transmitted to the access point AP(i)
on the
uplink, and( )
( )
( ) ( ) ( ) ( )
1( ,..., ),i
i
i i i i n
n = R the traffic that the
access pointAP(i)
is transmitting to the users on the downlink.
For the same traffic vectors (i)
, (i)
the base station can
schedule the transmission through different channels (time
slots) resulting in temporal and spatial MAC protocol. The
network traffic on the uplink and downlink is defined as( )(1) (2)
1( , ,..., ) ( ,..., )cN
N = = and(1) (2)
( , ,...,=
( ) 1) ( ,..., )cN N = respectively.The base stations jointly assign an access vector
( )(1) (2)
1( , ,..., ) ( ,..., )cN
Na a= =a a a a , where each component
(0,1)na , to the different rings to give them permission to
transmit. With an=1 the users from ring n are allowed to
transmit otherwise not. In the two cell case a=(a(1),a(2)), the
first half of the coefficients represents the permissions to
transmit for the rings in cell #rand the second half for rings in
cell #i, i I-r. We consider symmetric bidirectional
transmission (duplex connection) in the sense that the access
point will only transmit to the users situated in the rings
activated by a.The transmission schedule presented in Fig. 2 defines a
possible topology for two cell scenario and access vectora=1.
In this case all rings have duplex connection and the topology
consists of eight partial topologies representing transmissions
in eight consecutive time slots. In the first time slot (the first
partial topology) there are two simultaneous transmissions;
packet originating from the access point AP(r) (addressed to
user in ring 3) is transmitted to ring 2 in cell #r and at the
same time packet originating from ring 2 (addressed to access
pointAP(i)) of cell i is transmitted from ring 2 to ring 1. In the
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 2010 proceedings.
-
7/31/2019 05506494 (3)
4/6
second time slot (the second partial topology), packet
originating from access point AP(r) (addressed to user in ring
1) is transmitted to ring 1, at the same time packet originating
from ring 3 (addressed to access point AP(r)
) is transmitted
from ring 3 to 2 and, packet originating at AP(i) (addressed to
user in ring 2) is transmitted to ring 1 in the adjacent cell.
Similarly the same notation is then used for transmission in
time slot from 3 to 8. As already discussed earlier these eight
partial topologies together are referred to as a possible twodimensional(time and space) topology and will be represented
in the sequel by a given topology index (t).
So there will be limited interference transmission for 3
users per cell in 8 channels (8 slots in Fig. 2) giving the
intercell throughput 6/8=3/4, as opposed to the 6/12=1/2 in a
conventional TDMA system where each cell uses a half of
available channels (slots). Although scheduling in Fig.1b
requires 7 time slots it also assumes transmissions over three
rings which requires higher power.
Fig. 2. Possible schedule by using network coding.
III. PROTOCOL DESCRIPTIONThe examples of topologies presented in the previous
section are based on intuition and we need a systematic
approach to the system optimization. For these purposes we
introduce the following definitions. Fori
I,
- We define topology matrix ( ) ( ) ( )2 1( , )
i i iT m m = T with
( ) ( )
2 1( , ) 1,i iT m m = if user
( )
1
im is transmitting to ( )
2
im and 0,
otherwise with indexes ( ) ( ) ( )1 2, 0,1, 2,...,
i i im m n= , ( ) ( )2 1
i im m< .
Each ( ) ( )2 1
( , )i im m pair is represented by a specific link index l
as shown in Fig. 3 for the case of two cells. With this notation
the vector of equivalent (source + relayed) rates in cell i is
2 2 1( )1
( ) ( ) ( ) ( ) ( )
2 1( , )i
i i i i i
m sm m
m
x x T m m x= + (14)
where2
( ) ( )i i
mx = x for each direction of the traffic. The
overall topology matrix will be formally defined asT=diag[T
(i)] and ( )i = x x is the vector of the overall
aggregate rate.
Fig.3. Link notation
For simplicity, in the sequel we will describe the protocol
for only one direction of the traffic and then at the end of the
section make comments on how we extend the protocol for
bidirectional case.
- The routing matrix (or relaying matrix) R=[rln] has
entries rln=1 if source n (n=1,2,..,N) is using linkl(l=1,2,..,L)
and 0 otherwise. Recall that, parameterN is the number of
overall rings in the network. Parameters( )1
iln lmr r= are
calculated as ( ) ( )1 2
( )2
( ) ( )2 1( , )i i
i
i i
lm lmm
r r T m m= and,
( )1
( ) ( )
2 1( , )i
i i
m
L T m m= .
- The scheduling set will be combined with the routing
matrix R resulting into two dimensional routing protocol
characterized by extended routing matrix (2) R . By
assuming that the scheduling cycle within the maximum
clique has B steps, the optimization process will include:
a) Utility function
( )1/ log( ) /n n nn
U B a x P = (15)
where Pn is the aggregate power needed for transmission of
information from the source n to the access point on the uplink
or viceversa on the downlink, an is the access parameter as
defined in the previous section.
b) Constraint )( )2()2()2()2( RcxR with the following
definitions ofextended system parameters
( ) ( )(2) (2)
(2) (2)
(1), (2).. ( ) ; (1), (2).. ( )
( ) , 1,2,.., ; ,
T T T T T T T T B B
diag b b B R
= =
= =
x x x x c c c c
R R R x R
(15a)
where c are the logical link capacities calculated as discussed
in Section II which capture the functional dependency of
power control and interference level in the network.
c) Each component of the set of feasible routes in should provide directional connection for each terminal to the
corresponding access point. This means that the sequence of
links generated in a clique cycle must provide connection for
all terminals to the corresponding access point. To define thisconstraint explicitly we introduce the link hopping distance hl
and the vectorh = {hl}. hl represents the number of rings thatlink l is hoping over, from its transmitter/receiver to the
corresponding receiver/transmitter. Similarly the source
hopping distance is denoted as d = {hn}. The sum of linkhopping distances on the route from source n to the access
point should be equal to the source hopping distance
( ) ( )T
b
b b =R h d (15b)
( )1
( ) ( ) ( ) ( ) ( )
2 2 2 1 1( ) ( , )i
i i i i i
n m sm m
m
x x T m m x = = + I T x x
(15c)
The formulation of the problem obtained by equations (15a)-
(15c) can be summarized as:
,
(2) (2) (2) (2)
(2 )
: maximize
subject to ( ); ( ) ( )
( ) ; ,
T
b
n
U
b b
R
=
=
T x
P
R x c R R h d
I T x x R x R
(16)
-c-
AP(r) AP(i)
m(r)=0 1 2 2 1 0=m(i)3
- -
( )2
i
( )
1
r ( )3
r
( ) ( )
3 3
r r
( )3
r
( )
2
r
( )
2
r
( )
1
r
( ) ( )
2 2
r r
slot: 12
3
4
5
6
7
8
( )
3
r
( )
2
i
( ) ( )
2 2
i i
( )
1
i
( )
3
i
( )3
i
( ) ( )
3 3
i i
( )
3
i
( )
1
i
l3 l9
1
2
3
4
(i) (i)
2 1m ,m 3 2
l6l4
l2
l31 5
1
2
3
l1
l5
1
AP(r) AP(i)
l11
l12 l10
l8
l7
(r) (r)
2 1m ,m
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 2010 proceedings.
-
7/31/2019 05506494 (3)
5/6
In the case of bidirectional traffic an independent set of
equations (15) should be written for both directions and (16)
should be modified to include overall utility function
U=U(up)
+U(down)
with separate set of constrains for both
directions.
IV. SIMULATION RESULTSIn this section, we provide several numerical examples to
illustrate the performance of the proposed protocol. Wecalculate the link capacities ( ) ( ) ( ) ( ) ( )
2 1 2 1( , , , )r r r i ic m m m m as
specified in Section II. While the analysis is general, for
simplicity in this section, the channel gains used to calculate
( )( )2
( )1
( ) ( ) ( )
2 1,r
r
m i i
mSIR m m are
( )2
( ) ( ) ( )1 2 1
( )1 /
r
i r i
m
m m mg d and
( )2
( ) ( ) ( )1 2 1
( ) 1/i
i i i
m
m m mg d , where ( ) ( )
2 1r i
m md is the distance between the
reference receiver in ring2m and interfering transmitter in ring
( )
1
im , analogous for ( ) ( )2 1i i
m md and, is the propagation constant.
In the simulations we use =4, and SNR=10. The calculation of
the distances is straightforward from the geometry presented in
Fig.1a.
In the sequel we present the utility for different access
vectors a versus the topology index (t) for the scenario
presented in Fig. 1a. The resulting topologies, indexed by t,
represent a certain combination of the active in B slots and
will be represented formally as (2) ( ) ( ) ( )b b
b b
T L l = = .
In Fig. 4, the utility function is shown for a=[010100].
With this access vector user from ring 2 in cell # r and user
from ring 1 in cell #i have permission to transmit. The
maximum utility is obtained for topology index t=478
(u478=0.8739) by using network coding. We see a significant
improvement compared with the maximum utility with no
coding obtained for topology index t=215 (u215=0.6640).
The optimum topologies for both cases are given by
{ }478 1, 7, 4, 1, 4, 7,{ },{ },{ },{ , }down down up up down upT l l l l l l = and
{ }215 1, 4, 4, 7, 7, 1,{ },{ },{ , },{ },{ }down up down up down upT l l l l l l =
100 200 300 400 500 600-0.1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
Topology Index (t)
UtilityFunction
a=[010100]
no coding
coding
Fig. 4. Utility function for access vectora=[010100].
In Fig. 5, the utility function versus the topology index for
a=[010010] is shown. With this access vector user in ring 2, in
both cells have permission to transmit. As the number of
topologies obtained for this access vector is very high, we plot
the segment of topologies close to the optimum topology. The
maximum utility is u=0.6991 by using network coding, and
with no coding the maximum utility is u=0.5826. Both are
smaller than in the previous case due to higher interference
level. As several topologies provide the maximum utility, in
Fig. 6 we show the transmission pattern for one of the
optimum topologies (t=7) in the case with no coding for theprevious access vector defined by the set of links
{ }7 1, 10, 4, 7, 4, 1, 7, 10,{ },{ },{ , },{ },{ },{ },{ }down up down up up up down downT l l l l l l l l = .We can see that isolated short range transmissions are
favored which can simultaneously reduce the intercell
interference and power consumption.
In Fig. 7 we plot the transmission pattern for topology
{ }5621 1, 4, 7, 1, 4, 10, 7, 10,{ },{ },{ },{ , },{ }down up down up down up up downT l l l l l l l l = that corresponds to one of the topologies with coding that
provides the maximum utility fora=[010010]. We can see an
improvement in the number of slots needed with coding (5
slots) compared to 7 slots in the case with no coding. So for
the same type of isolated and short range transmissions the
utility function is improved by reducing the number of slots.
0 1000 2000 3000 4000 5000 6000-0.1
0
0.1
0.2
0.3
0.4
0.5
0.6
0.7
Topology Index (t)
UtilityFunction
a=[010010]
no codingcoding
Fig. 5. Utility function for access vectora=[010010].
Fig. 6. Representation of the transmission pattern definedby the topology index t=7
1 221
1 2 4(r) (r)
2 1m ,m
(i) (i)
2 1m ,m32
l1
123AP(r)
AP(i)
Time slot 1
1 21
l10
23AP(r)
AP(i)
Time slot 2
1 2 332
l4
123AP(r)
Time slot 3
l7
Time slot 4
3
3 453Time slot 7
AP(r)
AP(i)
2 1
1
l10
AP(i)
1 2 332
l4
123AP(r) 1 AP
(i)
1 2 332
l1
123AP(r)
AP(i)
1Time slot 5
1 2 3 123
AP(r)
Time slot 6l7
AP(i)
1
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 2010 proceedings.
-
7/31/2019 05506494 (3)
6/6
Fig. 7. Representation of the transmission pattern definedby the topology index t=5621
In Fig. 8 we represent the overall capacity for the previous
access vector a. For the optimum topologies with coding we
can see that the overall capacity of the system improves by a
factor 4 compared with the case without coding.
1000 2000 3000 4000 5000 60004
6
8
10
12
14
16
Topology Index (t)
OverallCapacity
a=[010010]
no coding
coding
Fig. 8. Overall capacity for a=[010010].
V. CONCLUSIONIn this paper we present some solutions on intercell
interference aware optimum relaying topology that includes
bidirectional links and network coding. The utility function
used in the optimization process drives the solution towards
the topology favoring simultaneously isolated and short range
transmissions. As expected, within these solutions further
improvements are obtained by using network coding to reduce
the number of slots needed for transmission. For example, for
access vector a=[010100], the maximum utility obtained is
u=0.8739 by using network coding, which is a significant
improvement compared with the maximum utility with no
coding u=0.6640. For a=[010010], the maximum utility is
u=0.6991 by using network coding, and with no coding
u=0.5826. Both values are smaller than in the previous case
due to higher interference level.
REFERENCES
[1] H. Wu, C. Qiao, S. De, O. Tonguz, Integrated Cellular and Ad HocRelaying Systems: iCAR, IEEE Journal on Selected Areas inCommunications, , vol. 19, no. 10, Oct. 2001, pp. 210515.
[2] R. Pabst et al., Relay-Based Deployment Concepts for Wireless andMobile Broadband Radio, IEEE Commun. Mag., vol. 42, no. 9, Sept.2004, pp. 8089.
[3] Y. Liu, R. Hoshyar, X. Yang, R. Tafazolli, Integrated Radio ResourceAllocation for Multihop Cellular Networks With Fixed Relay Stations,
IEEE Journal on Selected Areas in Communications, vol. 24, issue
11, Nov. 2006, pp. 2137 2146.
[4] L. Long, E. Hossain, Multihop Cellular Networks: Potential Gains,Research Challenges, and a Resource Allocation Framework, IEEE
Commun. Magazine, vol. 45, issue 9, Sept. 2007, pp. 66 73.[5] X. Shen, Z. Ma, W. Wang, K. Zheng, G. Liu, B. Fan, Multihop cellular
networks toward LTE-advanced, IEEE Vehicular TechnologyMagazine, vol. 4, issue 3, Sept. 2009, pp. 40-47.
[6] P. Popovski, H. Yomo, Wireless Network Coding by Amplify-and-Forward for Bi-Directional Traffic Flows, IEEE Communications
Letters, vol. 11, no.1, January 2007.[7] T. Cover and A. E. Gamal, Capacity theorems for the relay channel,
IEEE Trans. Inf. Theory, vol. 25, no. 5, pp. 572584, Sept. 1979.[8] A. Sendonaris, E. Erkip, B. Aazhang, User cooperation diversity-part I:
System description, IEEE Trans. on Communications, vol. 51, no. 11,pp. 1927-1938, Nov. 2003.
[9] J. Laneman, D.N.C. Tse, G.W. Wornell, Cooperative diversity inwireless networks: Efficient protocols and outage behavior, IEEETrans. Information Theory, vol. 50 no. 12, pp. 3062 3080. Dec. 2004.
[10] A. Wittneben, B. Rankov, Impact of cooperative relays on the capacityof rank deficient MIMO channels, in Proc. IST Mobile & WirelessCommunications Summit(IST-2003), Aveiro (Portugal), June 2003.
[11] M. Dohler, Virtual Antenna Arrays, PhD Thesis, Kings CollegeLondon, London, UK, 2003.
[12] M. Dohler, E. Lefranc, A.H. Aghvami, "Virtual Antenna Arrays forFuture Wireless Mobile Communication Systems", ICT 2002,Conference CD-ROM, Beijing, China, June 2002.
[13] E.C. van der Meulen, Three-terminal communication channels, Adv.Appl. Prob., vol. 3, pp. 120-154, 1971.
[14] T.M. Cover, A.A. El Gamal, Capacity theorems for the relay channel,IEEE Trans. on Information Theory, vol. 25, no. 5, pp. 474-584, Sept.1979.
[15] T.M. Cover, J.A. Thomas. Elements of Information Theory. John Wiley& Sons, 1991.
[16] A. Host-Madsen, J. Zhang, Capacity bounds and power allocation forwireless relay channels, IEEE Trans. on Information Theory, vol. 51,no. 6, pp. 2020-2040, June 2005.
[17] B. Wang, J. Zhang, A. Host-Madsen, On the capacity of MIMO relaychannels, IEEE Trans. on Information Theory, vol. 51, no. 1, pp 29-43,Jan. 2005.
[18] A. Host-Madsen, Capacity bounds for cooperative diversity, IEEETrans. on Information Theory, vol 52, no. 4, pp. 1522-1544, April 2006.
[19] R. Nabar, H. Blcskei, F. Kneubhler, Fading relay channels:performance limits and spacetime signal design,IEEE Journal SelectedAreas Communications (JSAC), vol. 22, no. 6, pp. 1099-1109, Aug.
2004.[20] H. Ochiani, P. Mitran, V. Tarokh, Variable rate two phase collaborative
communications protocols for wireless networks, IEEE Trans. on
Information Theory, vol. 52, no. 9, pp.4299-4313, Sep. 2006.
Time slot 1
Time slot 2
Time slot 3
Time slot 5
1 2 3 4(r) (r)2 1m ,m
(i) (i)2 1m ,m
32l1
123AP
(r)AP
(i)
1 2 332l4
123AP
(i)
1 2 3 4
l7
123AP
(r)
34531 2
AP(r)
AP(i)2 1
1
l7l10
3 4
l153
Time slot 41 2
AP(i)2 1
l4 l10
AP(r)
AP(i)1
1
AP(r)
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the WCNC 2010 proceedings.