METHOD AND APPARATUS FOR OPPORTUNISTIC USER SCHEDULING OF TWO-CELL MULTIPLE USER MIMO

Information

  • Patent Application
  • 20130336233
  • Publication Number
    20130336233
  • Date Filed
    September 10, 2012
    12 years ago
  • Date Published
    December 19, 2013
    11 years ago
Abstract
An apparatus and a method for opportunistic user scheduling of two-cell multiple user Multiple Input Multiple Output (MIMO) by a base station, the method comprising: broadcasting signals through random beams to users; and receiving Channel Quality Information (CQI) from best K user set. The CQI is calculated based on all possible combinations of transmit beamforming vectors.
Description
FIELD OF THE INVENTION

The present invention relates generally to two-cell multiple user Multiple Input Multiple Output (MIMO), and more particularly, to a method and an apparatus for opportunistic user scheduling of two-cell multiple user MIMO.


BACKGROUND ART

Over the past few years, a significant amount of research has gone into making various techniques for enhancing spectrum reusability reality. The spatial diversity techniques such as MIMO wireless systems have been widely studied to improve the spectrum reusability. Recently, the scope of the spatial diversity is extended to MIMO network wireless systems including the interference network, relay network, and multicellular network. Network MIMO systems are now an emphasis of IMT-Advanced and beyond systems. In these networks, out-of-cell (or cross cell) interference is a major drawback. Network MIMO systems, when properly designed, could allow coordination between nodes that would increase the quality of service in an interference limited area. Before network MIMO can be deployed and used to its full potential, there are a large number of challenging issues. Many of these deal with joint processing between nodes (e.g., see the references in D. Gesbert, S. Hanly, H. Huang, S. Shamai, O. Simeone, and W. Yu, “Multi-cell MIMO cooperative networks: a new look at interference,” IEEE Jour Select. Areas in Commun., vol. 28, no. 9, pp. 1380-1408, December 2010).


Interference alignment is transmitters/receivers joint processing that generates an overlap of signal spaces occupied by undesired interference at each receiver while keeping the desired signal spaces distinct (e.g., see the references in V. Cadambe and S. Jafar, “Interference alignment and degrees of freedom of the k-user interference channel,” IEEE Trans. Info. Theory, vol 54, no. 8, pp. 3425-3441, August 2008. and C. Suh and D. Tse, “Interference Alignment for Cellular Networks,” Proc. Of Allerton Conference on Communication, Control, and Computing, September 2008. and V. Cadambe and S. Jafar, “Interference alignment and the degrees of freedom of wirelessX networks,” IEEE Trans. Info. Theory, vol 55, no. 9, pp. 3893-3908, September 2009). However, the joint processing between transmitters and receivers for interference alignment requires full channel knowledge at all nodes, which is arguably unrealistic. Recent work on the limited feedback explores the scales of the required feedback bits with respect to the required throughput or SINR (e.g., see the references Thukral and H. Bolcskei, “Interference alignment with limited feedback,” in Proc. IEEE Inrl. Symposium on Info. Theory, June, 2009. and B. Khoshnevis, W. Yu, and R. Adve, “Grassmannian beamforming for MIMO amplify-and-forward relaying,” IEEE Journals on Sel. Areas in Commun., vol. 26, pp. 1397-1407, August 2008). However, the amount of CSI feedback in (e.g., see the references in Thukral and H. Bolcskei, “Interference alignment with limited feedback,” in Proc. IEEE Inrl. Symposium on Info. Theory, June, 2009. and B. Khoshnevis, W. Yu, and R. Adve, “Grassmannian beamforming for MIMO amplify-and-forward relaying,” IEEE Journals on Sel. Areas in Commun., vol. 26, pp. 1397-1407, August 2008.) to ensure the required performance is excessive and only gives marginal performance improvement per additional feedback. In addition, the feedback scheme in (e.g., see the references in Thukral and H. Bolcskei, “Interference alignment with limited feedback,” in Proc. IEEE Inrl. Symposium on Info. Theory, June, 2009. and B. Khoshnevis, W. Yu, and R. Adve, “Grassmannian beamforming for MIMO amplify-and-forward relaying,” IEEE Journals on Sel. Areas in Commun., vol. 26, pp. 1397-1407, August 2008.) assumes huge information sharing between backhauls of the transmitter.


SUMMARY OF THE INVENTION

Accordingly, the present invention is designed to address at least the problems and/or disadvantages described above and to provide at least the advantages described below.


Accordingly, an aspect of the present invention is to provide a method for opportunistic user scheduling of two-cell multiple user MIMO.


In accordance with an aspect of the present invention, a method is provided for opportunistic user scheduling of two-cell multiple user MIMO by a base station, the method comprising: broadcasting signals through random beams to users; and receiving Channel Quality Information (CQI) from best K user set. The CQI is calculated based on all possible combinations of transmit beamforming vectors.





BRIEF DESCRIPTION OF THE DRAWINGS

The above and other aspects, features, and advantages of certain embodiments of the present invention will be more apparent from the following detailed description when taken in conjunction with the accompanying drawings, in which:



FIG. 1. illustrates system model choosing the best K user among j users on two-cell multiple user broadcasting channel;



FIG. 2 illustrates system model when the best K users Π=(π1, . . . , πx) are scheduled in each of cells;



FIG. 3 illustrates sumrates per cell for MIUS schemes;



FIG. 4 illustrates sumrate performance for MSUS schemes; and



FIG. 5 illustrates sumrate performance for MSUS employing 6 bits and 8 bits of matrix codebook.





DETAILED DESCRIPTION OF EMBODIMENTS OF THE INVENTION

Various embodiments of the present invention will now be described in detail with reference to the accompanying drawings. In the following description, specific details such as detailed configuration and components are merely provided to assist the overall understanding of these embodiments of the present invention. Therefore, it should be apparent to those skilled in the art that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present invention. In addition, descriptions of well-known functions and constructions are omitted for clarity and conciseness.


In this work, we investigate the opportunistic user scheduling in interfering multiuser MIMO network where J users are associated with each transmitter and the selected K users together with their transmitters construct a two-cell multiuser MIMO broadcast channel. Other than feeding back excessive amount of CSI to transmitter, we consider a scenario where each transmitter broadcasts random beams (known at both sides of the transmitter and receiver) to users and the user sends back its CQI to transmitter for the opportunistic user selection. Backhaul between transmitters to allow information sharing is not assumed. We present exhaustive user scheduling approach and opportunistic user alignment scheme based on the interference alignment approach in (e.g., see the references in T. Kim, D. Love, and B. Clerckx, “Spatial Degrees of Freedom of the Multicell MIMO MAC,” submitted in IEEE Global Communications, April, 2011). For the exhaustive user scheduling, random beams are the actual transmit beams, but in the opportunistic user alignment the random beams are not the actual transmit beams. It is rather used for selecting users and once the users are selected transmit beams are designed at the transmitter. For each case, we define efficient CQI measure to be fed back to transmitter for user scheduling and we also address the optimal design of the post processing matrix to minimize the interference (inter user interference+out-of-cell interference or out-of-cell interference) or to maximize the sumrate.


1. System Model



FIG. 1. Illustrates system model choosing the best K user among j users on two-cell multiple user broadcasting channel.


Referring to FIG. 1, the base station has M antennas and each user is equipped with N antennas. There are total J users in the cell and only K users (K≦J) are selected and served by each BS. We use an index mj to denote the jth user in the cell m, where jεI and I=(1, . . . , J).


We use an index mπk to indicate kth scheduled user in cell m where 5εΠ=(π1, . . . , πK)⊂I.


We assume that each user has N=Kβ antennas and each base station is equipped with M=Kβ+β antennas. The base station sends Kβ streams to provide 3 streams to each of K users in the cell. The transmitter has no access for the perfect channel state information (CSI) at users, rather it has partial CSI for scheduling users. CSI sharing among base stations through backhaul is not allowed and only partial CSI from serving users is available at the base station.


In the first step, the base station m broadcasts signals through K random beams (Vmi)ieK, K=(1, . . . , K), to users where VmiεCKβ+β)text missing or illegible when filed and Vmi*Vmi=Iβ. Then, the received signal at jth user in the cell m can be determined as shown in Equation (1).






Y
mj
=H
mj,m
s
m
+H
mj, m
s

m

+z
mi  (1)


In Equation (1), m is defined as m=(1,2)\m. The Hmj,mεCN×M denotes the channel matrix from the base station m to user mj. We assume the realizations of the channels (Hmj,m)mε(l,1),text missing or illegible when filedεtext missing or illegible when filed are mutually independent and each entries of Hmj,m has independent and identical continuous distribution. The transmit signal from the base station m can be determined as shown in Equation (2).






s
ml-1KVmixmi  (2)


Further, transmit power is constrained tr(K[smsm*])≦P, which can be written as







tr


(

K


[


s
m



s
m
*


]


)


=


tr
(




i
=
1

K








v

m





i




E


[


x

m





i




x

m





i

*


]




v

m





i

*



)



P
.






We assume equal power transmission for each user and to meet the power constraint we







E


[


x

m





i




x

m





i

*


]


=


P

κ





β


.





assume


Now, plugging Equation (2) into Equation (1) returns to Equation (3).






Y
mjl-1KHmj,mVmixmil-1KHmj, mVmixmi+zmi.  (3)


To enable the user scheduling at the base station, each user measures channel quality information based on its own channel Hmh,m, out-of-cell interference channel Hmj, m, and random beams (Vmi)ieK where the transmitter and receiver share the same random beam generation method.



FIG. 2 Illustrates system model when the best K users Π=(π1, . . . πK) are scheduled in each of cells.


Referring to FIG. 2, for Instance, the scheduled user index is given by (11, . . . , 1k) and (21, . . . , 2k).


2. Exhaustive User Searching


User mj calculates Channel Quality Information (CQI) for all the possible combinations of transmit beamforming vectors (Vmi)ieK. Prior to define CQIs for exhaustive user scheduling, first several quantities are defined below.







SIG

mj
,
i


=


E


[


(


H

mj
,
m




V

m





i




x

m





i



)




(


H

mj
,
m




V

m





i




x

m





i



)

*


]


=


P

K





β




H

mj
,
m




V

m





i




V

m





i

*



H


m





i

,
m

*










?

=


E
[


(




l

i

K








H

mj
,
m




V

m





i




x

m





l




)




(




l

i

K








H

mj
,
m




V

m





i




x

m





i




)

*


]

=


P

K





β




H

mj
,
m







l

k

K








V

m





l




V

m





l

*



H

mj
,
m

*












?

=


E
[


(




i
=
1

K








H

mj
,

m
_





V

m





l




x

m





i




)




(




i
=
1

K








H

mj
,

m
_





V

m





l




x

m





l




)

*


]

=


P

K





β




H

mj
,

m
_





?







V

m





l




V


m
_


l

*



H

mj
,

m
_


*










?



indicates text missing or illegible when filed





SIGmj,i denotes signal covariance matrix at user mj (when Vmi is used for the transmission), INTIU,mj,K\1 denotes the inter user interference covariance matrix at user mj (when Vmi is used for the transmission), and INTIU,mj,i indicates out-of-cell interference covariance matrix at user mj. Then, the achievable rate at user mj after post processing with a post processing matrix wmj,iεCN×β (with Wmj,i*Wmj,i=Iβ) can be determined as shown in Equation (4).











R

mj
,
i


=

E







log
2

(





I
β







w


m





j

,
i

*



(


SIG

mj
,
i


|

?


)




w

mj
,
i











I
β

+



w

mj
,
i

*



(

?

)




w

mj
,
i







)










?



indicates text missing or illegible when filed






(
4
)







In Equation (4), the post processing matrix Wmj,i can be determined by minimizing the interference terms INTIU,jm,i+INTIC,mj,i or by maximizing the achievable rate. We first elaborate how we can conveniently choose CQI when Wmj,i is designed to mitigate INTIU,mj,i+INTIC,mj,i. Then, we address the case when Wmj,i is determined to maximize Rmj,i.


2.1 Minimum Interference (Inter-User Interference+Out-of-Cell Interference) User Scheduling


In this case, the post processing matrix is determined to mitigate INTIU,mj,i+INTIC,mj,i. Without loss of generality, we define the rate achievable with infinite number of users scheduling (J=∞) as Rmj,i=E log2(|Iβ+{tilde over (W)}mj,i*SIGk{tilde over (W)}mj,i|).















R


m





i

,
i



-

R

mj
,
i



=




E







log
2



(




I
β

+



W
~


mj
,
i

*



SIG

m






π
k






W
~


mj
,
i






)



-










E







log
2

(





I
β

+



W

mj
,
i

*



(


SIG

mj
,
i


+

?


)




W

mj
,
i










I
β

+



W

mj
,
i

*



(


INT

IU
,
mj
,

K

\

i



+

INT

IC
,
mj



)




W

mj
,
i







)












E







log
2



(




I
β

+



W

mj
,
i

*



(

?

)




W

mj
,
i






)









=



E






tr


(


log
2



(


I
β

+



W

mj
,
i

*



(

?

)




W

mj
,
i




)


)













E







tr


(



W

mj
,
i

*



(

?

)




W

mj
,
i



)


.













?



indicates text missing or illegible when filed






(
5
)







From Equation (5), the CQI at user mj when Vmi is used for the transmission can be determined as shown in Equation (6).





αmj,i=minWmj,itr(Wmj,i*(INTIU,mk,K\i+INTIC,mj)Ŵmj,i)  (6)


Let the eigenvalue decomposition INTIU,mj,K\i+INTIC,mj=UmjΣmjUmi*. Then, the optimal filter weight Wmj,i that minimizes tr( Wmj,i*(INTIU,mj,K\i+INTIC,mjmj,i) is determined by Wmj,i=[umj,N-β+1 . . . umj,N] where umj,i denotes the ith column of Umj.


Given CQI defined in Equation (6), user mj feeds back (αmj,i)ieK, i.e., user mj evaluates interference (inter-user interference+out-of-cell interference) powers corresponding to each of K beam forming vectors. Then, receiver m determines the best K user set Π=(π1, . . . , πK)⊂I to minimize the sum interference as shown in Equation (7).





Π=(π1, . . . ,πK)=argminΠ=({tilde over (π)}2, . . . ,{tilde over (π)}K),i-1Kαmtext missing or illegible when filedi  (7)


In Equation (4), {tilde over (Π)}=({tilde over (π)}1, . . . , {tilde over (π)}K) with {tilde over (π)}1≠{tilde over (π)}2≠ . . . ≠{tilde over (π)}K denotes the all the possible K user permutation in J. Hence, finding the optimal user set Π=(π1, . . . , πK) requires total








(



I




K



)


KI

=


J
!



(

J
-
K

)

!






times of computations of Σi-1Kαuitext missing or illegible when filedi.


2.2 Maximum Sumrate User Scheduling


In this case, the post processing matrix is determined to maximize Rmj,i in Equation (4). For simplicity, denote INTmj,i=INTIU,mj,K\i+INTIC,mj.


Then, Rmj,i in Equation (4) is lower bounded by Equation (8).










R

mj
,
i


=


E







log
2



(





I
β

|



W

mj
,
i

*



(


SIG

mj
,
i


|

INT

mj
,
i



)




W

mj
,
i










I
β

+



W

mj
,
i

*



(

INT

mj
,
i


)




W

mj
,
i







)





E







log
2



(






W


m





i

,
i

*



(

SIG

mj
,
i


)




W

mj
,
i









I
β

+



W

mj
,
i

*



(

INT

mj
,
i


)




W

mj
,
i







)









.







(
8
)







The optimal Wmj,i that maximize the lower bound of Equation (8) is found as follows.


With a congruence transformation, there exists XmjεCN×N such that:






X
mi
*SIG
mj,i
X
mj=diag(c1, . . . ,cN)=Cd  (9)


where c1≧C2≧ . . . ≧CN≧0, and






X
mi*(IN+INTmj,i)Xmj=diag(s1, . . . ,sN)=Sd  (10)


where sN≧SN-1≧ . . . ≧s1>0. Then, from Equation (9) and Equation (10),






X
mj
*SIG
mj,i
X
mj
C
d
−1
=X
mi*(In+INTmj,i)XmjSd−1






SIG
mj,i
X
mj=(In+INTmj,i)XmjSd−1Cd


Implying














SIG

mj
,
i




x


m





i

,
1



=




c
1


s
1




(


I
N

+

INT

mj
,
i



)



x

mj
,
1



=



λ
l



(


I
N

+

INT

mj
,
i



)




x

mj
,
1





,





where xmj,l denotes the lth column of Xmj for l=1, 2, . . . , N. Thus, λlc1/s1 is the generalized eigenvalue of SIGmj,i and (IN+INTmj,i)) such that λ1≧λ2≧ . . . ≧λN.


Hence,












W

mj
,
i

*



(

SIG

mj
,
i


)




W

mj
,
i









I
β

+



W

mj
,
i

*



(

INT

mj
,
i


)




W

mj
,
i












i
=
1

β








λ
i

.






The equality is achieved by choosing the first β generalized eigenvectors associated with the generalized eigenvalues λ1, λ2, . . . λβ, as shown in Equation (11).






W
mj,i
=[x
mj,1
x
mj,2
. . . x
mj,β]  (11)


Now, given Wmj,i in Equation (11), CQI is defined as







α

mj
,
i


=



log
2



(






W

mj
,
i

*



(

SIG

mj
,
i


)




W

mj
,
i









I
β

|



W

mj
,
i

*



(

INT

mj
,
i


)




W

mj
,
i







)


.





User mj feeds back (αmj,i)ieK to receiver m and the receiver m determines the best K user's index set Π=(π1, . . . , πK) to maximize the sum rate such that







Π
=


(


π
1

,





,

π
K


)

=

arg







max

Π
=

(



π
~

1

,









,


π
~

K


)





J





i
=
1

K







?







,






?



indicates text missing or illegible when filed






where {tilde over (π)}1≠{tilde over (π)}2≠ . . . ≠{tilde over (π)}K.


3. Opportunistic Interference Alignment


The exhaustive use scheduling in Section 3 requires







J
!



(


?

-
K

)



?









?



indicates text missing or illegible when filed





times of calculation for finding the best user ordering. In this section, we develop a low complex user scheduling scheme which is based on ordering users in the interference alignment planes (Pm)m├(1,2) where PmεCM×N and Pm*Pm=IN. Now we rewrite Equation (3) as Equation (12).






Y
mj
=H
mj,m
P
m
s
m
+H
mj,m
P
m
s

m

+z
mi  (12)


In Equation (12),







s
m

=




i
=
1

x








V

m





i





x

m





i


.







The Vmi satisfies VmiεCN×β and tr(Vmi*Vmi)=β. We have the same equality power constraints t=(K[smsm*])=P and E[xmixmi*]=P/Kβ, as in Section 3. In this approach, contrary to Section 3, the interference alignment plains (Pm)m├(1,2) are not used for data transmission, but used for scheduling users. Once the users have been opportunistically scheduled, the transmitter performs zero-forcing by designing (Vmi)ieK.


The CQI consists of one αmj and one FmjεCβ×N. Analogous to Section 3, for scheduling the users, the post processing matrix WmjεCN×β (within Wmj*Wmj,=Iβ) can be determined by minimize the out-of-cell interference or to maximize the achievable rate.


Define:






SiG
mj
=E[(Hmj,mPmsm)(Hmj,mPmsm)*]=PHmj,mPmPm*Hmj,m*





and






INT
ICm,j
=E[(Hmj, mPmsm)(Hmj, mPmsm)*]=PHmj,mPmPm*Hmj, m*,


where SIGmj denotes the signal covariance matrix at user mj and INTIC,mj denotes the out-of-cell interference covariance matrix at user mj. Then, the mutual information after post processing between sm and Wmi*Ymi can be expressed as shown in Equation (13)










I
mj

=



log
2



(







I
β

+



w
mj
*



(


SIG
mj

+

INT

IC
,
mj



)




w
mj













I
β

+



w
mj
*



(

INT

IC
,
mj


)




w

m





i









)













.






(
13
)







3.1 Minimum Out-of-Cell Interference User Scheduling


Define CQI at user mj as shown in Equation (14).





αmj=minWmjtr(Wmj*(INTIC,mj)Ŵmj)  (14)


Let the eigenvalue decomposition INTIC,mj=UmjΣmjUmj*. Then, the optimal filter weights Wmj minimizes tr( Wmj*(INTIC,mjmj) is determined by Wmj=[nmj,N-β+1 . . . nmj,N] where umj,i denotes the ith column of Umj.


Given CQI defined in Equation (4), user mj feeds back one αmj and a matrix FmjεCβ×N. The Fmj is defined as the direction of the post processed channel matrix Wmj*Hmj,mPm where the direction of Wmj*Hmj,mPm can be extracted by SVD Wmj*Hmj,mPm=UmjRmiVmi* as Fmj=[vmj,1 . . . vmj,β]*. Note that we can employ matrix codebook or elementwise quantization for delivering Fmj to the base station m.


Then, receiver m determines K user set Π=(π1, . . . , πK) to minimize the sum out-of-cell interference such that







Π
=


(


π
1

,





,

π
K


)

=

arg






min

Π
=

(



π
~

1

,









,


π
~

K


)






,

J





i
=
1

K







?



,






?



indicates text missing or illegible when filed






where {tilde over (Π)}=({tilde over (π)}1, . . . , {tilde over (π)}K) with {tilde over (π)}1≠{tilde over (π)}2≠ . . . ≠{tilde over (π)}K denotes the all possible K user combinations in J. Hence, finding the optimal user set Π=(π1, . . . , πK) requires total







(



J




K



)

=


J
!



K
!




(

J
-
K

)

!







times of computation for Σl-1Kαmtext missing or illegible when filedik. The complexity for finding Π=(π1, . . . , πK) can be decreased if we use an efficient sorting algorithms for sorting all (αmj)ieJ such that (α1, . . . , αK)≦(αmj)i├̂π.


This easily accomplished by using fast sorting algorithms which usually requires on average I log2(J) comparisons. If we consider one addition is equivalent to one comparison, for choosing the user the exhaustive search in Section 3 requires total








J
!



(


?

-
K

)

!



K







?



indicates text missing or illegible when filed





times of additions while the opportunistic interference alignment requires only I log2(J) times of comparisons.


After selecting the users Π=(π1, . . . , πK) the transmitter determines the transmit filter weight as zero-forcing weight. Consider a stacked matrix







F

m





Π


=

[




F

m






π
1








F

m






π
2













F

m






π
K






]





and the inverse of F as F−1={tilde over (V)}. To meet the power constraint each column of {tilde over (V)}is normalized as one and we denote the normalized one as V. Then, the zero-forcing transmit vectors (Vi)ieΠ for users (mπi)ieΠ are mapped by V=[V1, V2, . . . , VK].


3.2 Maximizing Sumrate User Scheduling


The Imj in Equation (13) is lower bounded as shown in Equation (15).










I
mj

=



log
2



(







I
β

+



w
mj
*



(


SIG
mj

+

INT

IC
,
mj



)




w
mj













I
β

+



w
mj
*



(

INT

IC
,
mj


)




w
mj








)




E







log
2



(






W
mj
*



(

SIG
mj

)




W
mj








I
β

+



W
mj
*



(

INT

IC
,

m





i



)




W

m





i







)









.







(
15
)







The optimal Wmj that maximize the lower bound of Equation (15) is the first β generalized eigenvectors of (SIGmj*IN+INTIC,mj). Analogous with Section 3.2, we define the generalized eigenvalue matrix of (SIGmj*IN+INTIC,mj) as Xmj where the ith columns of Xmj corresponds to ith dominant eigenvalue λi. Hence, the bound of Equation (15) is maximized by selecting Wmj as below shown in Equation (16).






W
mj
=[x
mj,1
x
mj,2
. . . x
mj,β]  (16)


Now, given Wmj in Equation (11), we define the CQI as







α
mj

=



log
2



(






W
mj
*



(

SIG
mj

)




W
mj








I
β

|



W
mj
*



(

INT

IC
,

m





i



)




W

m





i







)


.





User mj feeds back one αmj and a matrix FmjεCβ×N to receiver m and the receiver m determines the best K user's index set Π=(π1, . . . , πJ) to maximize the sum rate such that







Π
=


(


π
1

,





,

π
K


)

=

arg






max

Π
=

(



π
~

1

,





,


π
~

K


)






,

J





i
=
1

K







?



,






?



indicates text missing or illegible when filed






where {tilde over (π)}1≠{tilde over (π)}2≠ . . . ≠{tilde over (π)}K.


After selecting the users Π=(π1, . . . , πK) the transmitter determines the transmit filter weight as zero-forcing weight. Consider a stacked matrix:








F

m





Π


=

[




F

m






π
1








F

m






π
2













F

m






π
K






]


,




and the inverse of Fas F−1={tilde over (V)}. To meet the power constraint each column of {tilde over (V)}is normalized as one and we denote the normalized one as V. Then, the zero-forcing transmit vectors (Vi)ieΠ for users (mπi)ie5Π are mapped by V=[V1V2 . . . VK].


In this section, we evaluate the proposed user scheduling schemes where the transmitter serves the best K=2 users among J users. The numbers of the transmit antennas and receive antennas are given by M=Kβ+β and N=Kβ. Throughout the simulation we assume single date stream transmission per user, we use MIUS to denote the minimum interference user scheduling (MIUS) presented in Section 2.1 and 3.1, and MSUS is used to denote the maximum sumrate user scheduling (MSUS) in Section 2.2 and 3.2.



FIG. 3 Illustrates sumrates per cell for MIUS schemes.


Referring to FIG. 3, ‘Exhaustive’ implies exhaustive user scheduling scheduling scheme in Section 2 and ‘OIA’ denotes the opportunistic interference alignment scheme in Section 3. Exhaustive user searching only needs to feedback K real CQI values (αmj,i)ieK and OIA requires to send back one real CQI αmi and the direction of the post processed channel matrix FmjεC1×K which is composed of 2K real values. The exhaustive user scheduler at the receiver need to compute








J
!



(


?

-
K

)

!



K







?



indicates text missing or illegible when filed





folds of computation, while the OIA only needs to compute I log2(J) folds of operations. As can be seen from FIG. 3, OIA shows better performance. As SNR increases the throughput enhancement for OIA is significant compared to exhaustive user selection.



FIG. 4 Illustrates sumrate performance for MSUS schemes.


Referring to FIG. 4, Compared to MIUS, MSUS yields higher throughput gain because the post processing matrix is chosen to maximize the individual throughput. The similar trend is observed as FIG. 3. However, compared to FIG. 3, the optimality of the post processing matrix design in MSUS promises the significant throughput gain especially for OIA.


In FIG. 3 and FIG. 4, we consider the feedback scenario where each user in OIA feeds back 2K+1 real scalars. In this simulation study, we investigate the effect of the quantization error when we employ the matrix codebook to quantize the post processed channel FmjεC1×K.



FIG. 5 illustrates the sumrate performance for MSUS when we employ 6 bits and 8 bits of matrix codebook. For the sake of the simplicity the codebook is randomly generated.


As can be seen from the FIG. 5, OIA can achieve better performance than exhaustive user searching at high SNR with reduced feedback amount.


While the present invention has been particularly shown and described with reference to certain embodiments thereof, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims and their equivalents.

Claims
  • 1. A method for opportunistic user scheduling of two-cell multiple user Multiple Input Multiple Output (MIMO) by a base station, the method comprising: broadcasting signals through random beams to users; andreceiving Channel Quality Information (CQI) from a best K user set,wherein the CQI is calculated based on all possible combinations of transmit beamforming vectors.
  • 2. The method of claim 1, wherein the best K user set is determined to minimize sum interference.
  • 3. The method of claim 1, wherein the best K user set is determined to maximize sum rate.
  • 4. The method of claim 1, wherein the best K user set is determined to minimize sum out-of-cell interference.
  • 5. The method of claim 1, wherein the best K user set is determined to minimize sum out-of-cell interference.
PRIORITY

This application claims priority under 35 U.S.C. §119(e) to U.S. Provisional Application No. 61/532,610, which was filed in the U.S. Patent and Trademark Office on Sep. 9, 2011, the entire content of which is incorporated herein by reference.

Provisional Applications (1)
Number Date Country
61532610 Sep 2011 US