METHOD AND DEVICE FOR ESTIMATING CHANNEL IN WIRELESS COMMUNICATION SYSTEM

Information

  • Patent Application
  • 20160248607
  • Publication Number
    20160248607
  • Date Filed
    October 06, 2014
    10 years ago
  • Date Published
    August 25, 2016
    8 years ago
Abstract
A method for estimating a channel in a wireless communication system in which a plurality of terminals and a base station communicate with each other, according to one embodiment of the present invention, comprises the steps of: receiving reference signals transmitted through a plurality of slots; and estimating a channel by using the reference signals. Here, for the channel estimation, the number of reference signals received through at least one slot among the plurality of slots is different from the number of reference signals received through the other slots.
Description
TECHNICAL FIELD

The present invention relates to a method and apparatus for estimating a channel in a wireless communication system.


BACKGROUND ART

With technology breakthroughs, mobile communication systems have evolved to provide high-speed data communication services as well as voice communication services. Recently, Long Term Evolution (LTE) systems as one of next-generation mobile communication systems in the 3rd Generation Partnership Project (3GPP) have provided services in various countries. The LTE system is a technology capable of implementing high-speed packet-based communication having a data rate of 100 Mbps or higher. Also, LTE-Advanced (LTE-A) systems are under commercialization to further improve the data rate of the LTE systems.


Multi user-multiple input multiple output (MU-MIMO) and coordinated multipoint (CoMP) in LTE systems are known to rely heavily on accurate channel state information (CSI) knowledge at a transmitter. MIMO is a technology for increasing capacity in proportional to the number of antennas being used, by using multiple antennas at a base station (BS) and a terminal. The MU-MIMO is one of MIMO schemes that distribute antenna resources or radio spatial resources to multiple users. The CoMP is a technology capable of reducing interference and improving a data rate based on cooperation among multiple BSs.


Unfortunately, in several applications, CSI feedback is subject to delay due to CSI measurement and feedback mechanism, base station implementation and/or backhaul (as in CoMP). A classical approach is to use predictive methods to estimate the current CSI based on past and outdated estimates. When the delay is severe and channel state information at a receiver (CSIR) is completely outdated, such an approach does not provide satisfactory results. Recently, another approach has been suggested to cope with delay and exploit delayed channel state information at a transmitter (CSIT). In LTE systems, CSI at a transmitter is referred to as CSIT and CSI at a receiver is referred to as CSIR.


Recent study such as MAT, Alt MAT, and GMAT as generalized MAT have drawn considerable interests in the academic literature as they have shown to be able to benefit in a two-user scenario from a 33% sum-rate increase compared to TDMA (also known as SU-MIMO in LTE-A) despite the fact that the CSI feedback is completely outdated. MAT, Alt MAT, and GMAT may refer to the following documents [1], [2], and [3]:


[1] M. Maddah-Ali and D. Tse, “Completely stale transmitter channel state information is still very useful,” IEEE Trans. Inf. Theory, vol. 58, no. 7, pp. 4418-431, 2012;


[2] S. Yang, M. Kobayashi, D. Gesbert, and X. Yi, “Degrees of freedom of time correlated miso broadcast channel with delayed csit,” IEEE Trans. Inf. Theory, vol. 59, no. 1, pp. 315˜328, 2013; and


[3] X. Yi and D. Gesbert, “Precoding methods for the MISO broadcast channel with delayed CSIT,” IEEE Trans. Wireless Commun., vol. 12, no. 5, pp. 1˜11, May 2013.


The major drawback of those schemes is that global CSI is to be known at all terminals. For example, assuming a communication environment including one BS and two users, user 1 has to know a channel between the BS and user 2. This constraint departs significantly from classical communication systems where a user is only aware of its own channel (between the BS and itself). One way to cope with the problem would be to enable CSI sharing among users through device to device (D2D) communications for instance. However it would severely increase the operation complexity and limit the benefits and applicability of the schemes.


DETAILED DESCRIPTION OF THE INVENTION
Technical Problem

The present invention provides a method and apparatus for estimating a channel in a wireless communication system, by which a CSI sharing constraint may be eliminated.


The present invention provides a method and apparatus in a wireless communication system, by which MAT, Alt MAT, and GMAT may be operated using reference signals without CSI sharing.


Technical Solution

In accordance with an aspect of the present invention, there is provided a method for performing channel estimation in a wireless communication system in which a plurality of terminals and a base station communicate with each other, the method including receiving reference signals transmitted through a plurality of slots and performing channel estimation by using the reference signals, in which for the channel estimation, a number of reference signals received through at least one of the plurality of slots is different from a number of reference signals received through the other slots.


In accordance with an aspect of the present invention, there is provided a terminal for performing channel estimation in a wireless communication system in which a plurality of terminals and a base station communicate with each other, the terminal including a receiver configured to receive signals transmitted from the base station and a controller configured to control reception of reference signals transmitted through a plurality of slots and to control performing of the channel estimation by using the reference signals, in which for the channel estimation, a number of reference signals received through at least one of the plurality of slots is different from a number of reference signals received through the other slots.





BRIEF DESCRIPTION OF DRAWINGS


FIG. 1 is a diagram for describing MAT, Alt MAT, and GMAT proposed in an embodiment of the present invention;



FIG. 2 is a diagram for describing a multi-stage procedure in a wireless communication system according to an embodiment of the present invention; and



FIG. 3 is a diagram showing comparison in degree of freedom (DoF) performance between a scheme proposed in an embodiment of the present invention and a conventional scheme.





MODE FOR CARRYING OUT THE INVENTION

In the following description of the present invention, well-known functions or structures will not be described in detail if they are determined to unnecessarily obscure the subject matter of the present invention. Hereinafter, embodiments of the present invention will be described in detail with reference to the accompanying drawings.


A description will now be made of a MAT scheme, an Alt MAT scheme, and a GMAT scheme proposed in an embodiment of the present invention. General definitions of equations used as examples in a description of each scheme may refer to the documents [1], [2], and [3] described in the background part of the specification, and thus will not be provided in this part.


1. MAT Scheme


1-1. Review of 2-User MAT Scheme:



FIG. 1 is a diagram for describing an MAT scheme in a wireless communication system according to an embodiment of the present invention. In FIG. 1, a wireless environment is assumed where there are two users (that is, two terminals) for each of which two transmission antennas and one reception antenna are provided. An example shown in FIG. 1 is intended for convenience and there may be two or more users.


Referring to FIG. 1, ht and gt represent channels between users (receivers) and a base station (BS, a transmitter), respectively. It is assumed that CSI gt-1 and ht-1 (size [1×2]) are available to a transmitter 130 at time t (that is, CSI feedback is delayed). A channel between t-1 and t is completely uncorrelated (that is, the channel is very fast fading). The BS (transmitter) 130 and each of users (receivers) 110-1 and 110-2 at time t have knowledge of other users' channel till time t-1 (global CSI knowledge). Transmission is operated in three time slots described as follows:


Slot 1: Broadcast 2×1 symbol vector x1 to user 1110-1: x1=[u11 u12]T: in this case, a signal y1 (noise will be ignored for simplicity) observed (received) in user 1110-1 is y1=h1x1, and a signal z1 observed in user 2110-2 is z1=g1x1;


Slot 2: Broadcast 2×1 symbol vector x2 to user 2110-2: x2=[v21 v22]T ([ ]T represents a transpose): in this case, a signal y2 observed in user 1 is y2=h2x2, and a signal z2 observed in user 2110-2 is z2=g2x2; and


Slot 3: Forward a mixture of overheard interference x3=[g1x1+h2x2 0]T: in this case, a signal y3 observed in user 1 is y3=h3x3, and a signal z3 observed in user 2110-2 is z3=g3x3.


After three user slots, each user combines all observations as follows:


a) For user 1,


y1=h1x1


y2=h2x2






y
3
=h
3
x
3
=h
3,1 (g1x1+h2x2)=y3′+h3,1y2 (where y3′=h3,1g1x1 and h3,1 is the first entry of h3)


or equivalently






Y=H
1
x
1
+H
2
x
2


(where Y=[y1 y2 y3]T, H1=[h1; 0; h3,1 g1], H2=[0; h2; h3,1 h2]); and


b) for user 2,


z1=g1x1


z2=g2x2






z
3
=g
3
x
3
=g
3,1(g1x1+h2x2)=z3′+g3,1z1 (where z3′=g3,1h2x2 and g3,1 is the first entry of g3)


or equivalently






Z=G
1
x
1
+G
2
x
2 (where Z=[z1 z2 z3]T, G1=[g1; 0; g3,1 g1], G2=[0; g2; g3,1 h2]).


User 1110-1 and user 2110-2 each may decode two symbols as follows:


1) With an MMSE Receiver


For user 1110-1, an MMSE receiver F1 is computed based on H1 and H2 as follows:






F
1
=H
1
H(H1H1H+H2H2H+βI3); and


For user 2110-2, an MMSE receiver F2 is computed based on G1 and G2 as follows:






F
2
=G
2
H(G2G2H+G1G1H+βI3).


2) With Interference Elimination and then MIMO Detection


For user 1110-1, the effect of y2 in y3 is removed to obtain y3′, and a 2×2 MIMO channel [y1y3′]T=[h1; h3,1 g1] x1 is solved to get x1=[u11 u12]T; and


For user 2110-2, the effect of z1 in z3 is removed to obtain z3′, and a 2×2 MIMO channel [z2 z3′]T=[g2; g3,1 h2] x2 is solved to get x2=[v21 V22]T.


Hence, with the interference elimination and then MIMO detection according to an embodiment of the present invention, each user is able to decode 2 interference-free symbols in 3 time slots, leading to a total sum-rate at high SNR or roughly 4/3 log(SNR), i.e. 33% throughput gain over a classical TDMA (SU-MIMO) approach which would transmit one symbol at a time.


1-2. Problem With MAT Scheme:


For the MMSE receiver, F1 and F2 are functions of H1 and H2 and G1 and G2, respectively. H1 and G2 are functions of CSI of the two users 110-1 and 110-2. Similarly, with the interference elimination and MIMO detection, the effective 2×2 MIMO channel of e.g., user 1, i.e., [h1; h3,1 g1], is a function of the CSI of user 2110-2. Thus, for each user, in order to decode their intended signals, the users have to be aware of the global CSI, and it is commonly assumed that CSI sharing is needed among users.


1-3. RS Strategies With MAT Scheme:


In an embodiment of the present invention, taking the foregoing problems into account, a scheme for estimating user CSI using reference signals (RSs) without CSI sharing will be proposed as below.


1) MMSE Receiver


All entries of H1, H2, G1 and G2 have to be estimated.


Assuming the use of only demodulation-reference signal (DM-RS) at the time of transmission, the system would operate in each of slots 1 through slot 3 as in Slot 1 through Slot 3:


Slot 1: transmit 2 DM-RS in order for user 1110-1 to measure h1 and user 2110-2 to measure g1;


Slot 2: transmit 2 DM-RS in order for user 1 to measure h2 and user 2 to measure g2; and


Slot 3: transmit 4 DM-RS where two DM-RS for user 1110-1 to measure h3,1 g1 and for user 2110-2 to measure g3,1 g1 and the other two DM-RS for user 1110-1 to measure h3,1 h2 and user 2110-2 to measure g3,1 h2.


This makes a total of 8 DM-RS in 3 time slots.


2) Interference Elimination and Then MIMO Detection


Channel gains h3,1 and g3,1 have to be measured in order to remove y2 in y3 and z1 in z3, respectively, and to this end, options 1 and 2 will be considered.


Option 1: One non-precoded RS (CRS/CSI-RS) every three time slots may be used to measure h3,1 and g3,1; and


Option 2: One DM-RS with appropriate precoding (i.e. [1 0]T) may be used so as to measure the non-precoded channel.


Assuming the use of only DM-RS at the time of transmission, the system would therefore operate as in Slot 1 through Slot 3:


Slot 1: transmit 2 DM-RS in order for user 1110-1 to measure h1 and user 2 to measure g1;


Slot 2: transmit 2 DM-RS in order for user 1110-1 to measure h2 and user 2110-2 to measure g2; and


Slot 3: transmit 5 DM-RS where two DM-RS for user 1110-1 to measure h3,1 g1, two DM-RS for user 2110-2 to measure g3,1 h2 and one DM-RS for user 1110-1 and user 2110-2 to measure h3,1 and g3,1, respectively.


Thus, this makes a total of 9 DM-RS in 3 time slots.


It should be noted that in the current embodiment, the number of DM-RS needed varies depending on the receiver architecture. Moreover, the number of DM-RS is not necessarily equal to the number of transmitted symbols (or layers in LTE-A systems), contrary to classical SU-MIMO and MU-MIMO transmissions in current systems (e.g. LTE-A systems).


2. GMAT Scheme


2-1. Review of 2-User GMAT Scheme:


The GMAT scheme may also assume the communication environment illustrated in FIG. 1. In the GMAT scheme, a generally precoded MAT scheme is considered such that the general transmission looks like the following. The configuration is applicable to any number of transmit antennas nt given the virtualization by the precoder. Hence, channel CSI is viewed as [1×nt] vectors.


Slot 1: Broadcast 2×1 symbol vector to user 1: x1=[u11 u12]T and precode by a weight W1 (of size nt×2): in this case, a signal y1 observed (noise will be ignored for simplicity) in user 1 is y1=h1W1x1 and a signal z1 observed in user 2 is z1=g1W1x1;


Slot 2: Broadcast 2×1 symbol vector to user 2: x2=[v21 v22]T and precode by W2 (of size nt×2): in this case, a signal y1 observed in user 1 is y2=h2W2x2, and a signal z2 observed in user 2 is z2=g2W2x2; and


Slot 3: Forward a mixture of x1 and x2 precoded by W3 and W4 (each of size nt×2): in this case, a signal y3 observed in user 1 is y3=h3 [W3x1+W4x2], and a signal z3 observed in user 2 is z3=g3 [W3x1+W4x2].


If W3=[g1W1; 0; . . . ; 0] and W4=[h2W2; 0; . . . ; 0], the strategy boils down to the classical (precoded) MAT scheme.


After 3 time slots, each user combines all observations.


a) For user 1,






Y=H
1
x
1
+H
2
x
2





(Y=[y1 y2 y3]T, H1=[h1W1; 0; h3W3], H2]0; h2W; h3W4].


b) For user 2,






Z=G
1
x
1
+G
2
x
2


(Z=[z1 z2 z3]T, G1=[g1W1; 0; g3W3], G2=[0; g2W2; g3W4].


User 1 and user 2 each may decode 2 symbols as follows:


1) With an MMSE Receiver


For user 1, an MMSE Receiver is computed based on H1 and H2 by:






F
1
=H
1
H(H1H1H+H2H2H+βI3); and


For user 2, an MMSE receiver is computed based on G1 and G2 by:






F
2
=G
2
H(G2G2H+G1G1H+βI3).


2) With Interference Elimination and then MIMO Detection for the Particular Case of:


W3 =[g1W1; 0; . . . ; 0] and W4=[h2W2; 0; . . . ; 0]


For user 1, the effect of y2 in y3 is removed to obtain y3′, and the 2×2 MIMO channel [y1 y3′]T=[h1W1; h3,1g1W1] x1is solved to get x1=[u11 u12]T; and


For user 2, the effect of z1 in z3 is removed to obtain z3′, and the 2×2 MIMO channel [z2 z3′]T=[g2W2; g3,1h2W2] x2 is solved to get x2=[v21 v22]T.


2-2. RS Strategies With GMAT Scheme:


1) MMSE Receiver


All entries of H1, H2, G1 and G2 have to be estimated.


Assuming the use of only DM-RS at the time of transmission, the system would operate as follows:


Slot 1: transmit 2 DM-RS in order for user 1 to measure h1W1 and user 2 to measure g1W1;


Slot 2: transmit 2 DM-RS in order for user 1 to measure h2W2 and user 2 to measure g2W2; and


Slot 3: transmit 4 DM-RS where two DM-RS for user 1 to measure h3W3 and for user 2 to measure g3W3 and two DM-RS for user 1 to measure h3W4 and user 2 to measure g3W4.


This makes a total of 8 DM-RS in 3 time slots.


2) Interference Elimination and Then MIMO Detection


It is not possible to perform such a receiver in the general case of W3 and W4. In the particular case of W3=[g1W1; 0; . . . ; 0] and W4=[h2W2; 0; . . . ; 0], the receiver may be used and 9 DM-RS in 3 time slots would have to be used (2 on this first slot, 2 on the second slot and 5 in the last slot), similarly to the classical MAT.


3. Alternative MAT Scheme


3-1. Review of 2-User Alt MAT Scheme:


The Alt MAT scheme may also assume the communication environment illustrated in FIG. 1. Let us assume again 2 transmission antennas as in the classical MAT. Extension to a larger number of antennas through virtualization is also possible, but does not affect the observations.


The transmission is operated in three times slots described as follows:


Slot 1: Broadcast 2 2×1 symbol vectors: x1=[u11 u12]T and x2=[v21 v22]T respectively intended to user 1 and user 2: in this case, a signal y1 (noise will be ignored for simplicity) observed in user 1 is y1=h1[x1+x2], and a signal z1 observed in user 2 is z1=g1[x1+x2];


Slot 2: Broadcast the interference overheard by user 1 as the following vector [h1 x2 0]T: in this case, a signal y2 observed in user 1 is y2=h2,1h1x2, and a signal z2 observed in user 2 is z2=g2,1h1x2; and


Slot 3: Broadcast the interference overheard by user 2 as the following vector [g1 x1 0]T: in this case, a signal y3 observed in user 1 is y3=h3,1g1x1, and a signal z3 observed in user 2 is z3=g3,1g1x1.


After 3 time slots, each user combines all observations.


a) For user 1,






Y=H
1
x
1
+H
2
x
2


(Y=[y1 y2 y3]T, H1=[h1; 0; h3,1g1], H2=[h1; h2,1h1; 0]), and


b) For user 2,






Z=G
1
x
1
+G
2
x
2


(Z=[z1 z2 z3]T, G1=[g1; 0; g3,1g1], G2=[g1; g2,1h1; 0]).


User 1 and 2 each may decode 2 symbols as follows:


1) With an MMSE Receiver


For user 1, an MMSE receiver is computed based on H1 and H2 by:






F
1
=H
1
H(H1H1H+H2H2H+βI3); and


For user 2, an MMSE receiver is computed based on G1 and G2 by:






F
2
=G
2
H(G2G2H+G1G1H+βI3).


2) With Interference Elimination and then MIMO Detection


For user 1, the effect of y2 in y1 is removed to obtain y1′, and a 2×2 MIMO channel [y1 y3]T=[h2,1 h1; h3,1 g1] x1 is solved to get x1=[u11 u12]; and


For user 2, the effect of z3 in z1 is removed to obtain z1′, and a 2×2 MIMO channel [z1′ z2]T=[g3,1 g1; g2,1 h1] x2 is solved to get x2=[v21 v22]T.


3-2. RS Strategies with Alt-MAT Scheme:


1) MMSE Receiver


All entries of H1, H2, G1 and G2 have to be estimated.


Assuming the use of only DM-RS at the time of transmission, the system would operate as follows:


Slot 1: transmit 2 DM-RS in order for user 1 to measure h1 and user 2 to measure g1;


Slot 2: transmit 2 DM-RS in order for user 1 to measure h2,1h1 and user 2 to measure g2,1h1; and


Slot 3: transmit 2 DM-RS in order for user 1 to measure h3,1g1 and user 2 to measure g3,1g1.


This makes a total of 6 DM-RS in 3 time slots.


2) Interference Elimination and then MIMO Detection


Channel gains h2,1 and g3,1 have to be measured in order to remove y2 in y1 and z3 in z1, respectively. For this end, options 1 and 2 are to be considered as below.


Option 1: one non-precoded RS (CRS/CSI-RS) in slot 2 and slot 3 may be used to measure h2,1 and g3,1; and


Option 2: use one DM-RS with appropriate precoding (i.e. [1 0]T) so as to measure the non-precoded channel.


Assuming the use of only DM-RS at the time of transmission, the system would operate as in Slot 1 through Slot 3:


Slot 1: transmit 2 DM-RS in order for user 1 to measure h1 and user 2 to measure g1;


Slot 2: transmit 3 DM-RS: two DM-RS in order for user 1 to measure h2,1h1 and user 2 to measure g2,1h1 and one DM-RS for user 1 to measure h2,1: and


Slot 3: transmit 3 DM-RS: two DM-RS in order for user 1 to measure h3,1g1 and user 2 to measure g3,1g1 and one DM-RS for user 2 to measure g3,1.


Thus, this makes a total of 8 DM-RS in 3 time slots.


It should be noted again that in the current embodiment, the number of DM-RS needed varies with the receiver architecture. In addition, the number of DM-RS is not necessarily equal to the number of transmitted symbols (or layers in LTE-A), contrary to classical SU-MIMO and MU-MIMO transmissions in current systems (e.g. LTE-A systems).


The MAT, Alt MAT, and GMAT schemes proposed in the embodiment of the present invention are also applicable to a broadcast channel. Thus, the embodiment of the present invention may be applied to MU-MIMO operating at a single BS or in scenarios where multiple BSs cooperate with each other (as in 3GPP Re1.11 CoMP). In this case, the central controller in charge of controlling the cooperating BS acts as a giant BS (or a master BS).


4. Transmission Strategy for CoMP With Backhaul Delay


In the current embodiment, an interference channel for K Tx-Rx pairs will be focused where each Tx node is equipped with K transmission antennas while each Rx node has a single antenna. For brevity, this system model is denoted by (K,1,K)-IC, where the first parameter K represents the number of transmission antennas while the last parameter K refers to the number of Tx-Rx pairs.


Each Rx perfectly estimates all its related channels (Perfect CSIR) and quantizes them to report them to the related Tx. This feedback procedure is assumed to be nearly perfect and the delay is not severe compared to the time-varying nature of the channel. Afterwards, each Tx shares CSI with others via a backhaul link. This backhaul link is assumed to be nearly perfect but not subject to severe latency. Hence, when the CSI arrives at a certain Tx, it will be completely outdated (delayed by one transmission slot and the channel is time-selective). Besides, the data is not shared among the transmitters. Consequently, the transmitters cannot perform Joint Processing, only Coordinated Beamforming/Scheduling may be carried with the presence of the perfect delayed CSIT. The current embodiment proposes a new transmission strategy to cope with the backhaul delay.


4-1. Overall Description


In the current embodiment, in each channel use, each receiver not only receives their intended symbols, but also overhears the interferences caused by the unintended symbols.


A certain overheard interference (OI) is desired by two receivers: the Rx that wishes to eliminate them; and the Rx for whom the symbols (contained in OD are intended. Then, the transmitter reconstructs those OIs using the perfect past CSI and transmit them in the following channel uses. As a consequence, all the receivers may decode their desired symbols by canceling the interference and 20 having additional linear independent observation of the desired symbols.


When there are multiple Tx-Rx pairs (for example, K≧3K≧3), there will be (2K) pairs of receivers and each pair has two related OIs. To further boost the DoF, the transmitter wishes to send those OIs using channel uses as less as possible. To this end, in the technical document “M. Maddah-Ali and D. Tse, “Completely stale transmitter channel state information is still very useful,” IEEE Trans. Inf. Theory, vol. 58, no. 7, pp. 4418-4431, 2012.”, a multi-phase procedure is proposed which turns out to be efficient and achieve the optimal DoF region in BC. In a certain phase m, the transmitter sends order-m symbols (intended for m receivers) created by the OIs. Then, at the end of phase m, order-(m+1) symbols are created and all the order-m symbols may be decoded if all the order-(m+1) are delivered to the related receivers. The transmission is performed till order-K symbols are delivered.


Nonetheless, in IC, such transmission may not be reused directly due to the fact that data is not shared among the transmitters. In other words, a certain Tx may not construct the OI created by the symbols sent from other transmitters. To overcome this, in the technical document “M. J. Abdoli, A. Ghasemi, A. K. Khandani, “On the Degrees of Freedom of K-User SISO Interference and X Channels With Delayed CSIT,” Information Theory, IEEE Transactions on, vol. 59, no. 10, pp. 6542,6561, October 2013”, a multi-phase transmission for the SISO K Tx-Rx pairs IC is built, which gives the best sum DoF performance so far for the SISO IC. The main feature of the scheme is that the order-m symbols sent from a certain Tx k consists of the symbols intended for Rx k only.


In the current embodiment, proposed schemes for the (K,1,K)-IC are built exactly on the same framework. The only difference is that the number of channel uses that employed to send order-m symbols is reduced by using multiple transmission antennas.


4-2. Transmission Scheme


4-2-1. Transmission and Decoding Flow


Before a detailed description of the current embodiment, terms used in the current embodiment will be defined as follows:


Order-m symbol, denoted by u[icustom-characterm]: An order-m symbol (sent from Tx i and consisting of the private symbols intended for Rx i only) is multicast to a certain group of m receivers, namely custom-characterm. In other words, the receivers in Sm wish to receive it and decode it, while other receivers overhear it; and


Order-(1, m) symbol, denoted by u[i|i; custom-characterm]: An order-(1, m) symbol (sent from Tx i consisting of the private symbols intended for Rx i only) is intended for the related Rx i only, but it is already known by the m receivers in the set custom-characterm.


Besides, another notation will be provided which is a generalization of the notation of order-(1, m) symbols and frequently used in the following. A symbol that is sent from Tx i consisting of the private symbols intended for Rx i only, intended for a set of receivers custom-character, but already known by Rx j, is denoted by u[icustom-character;j].



FIG. 2 is a diagram for describing a multi-stage procedure in a wireless communication system according to an embodiment of the present invention.


Referring to FIG. 2, all the private symbols are transmitted in phase 1, generating order-2 symbols. Then, all the order-2 symbols are transmitted in phase 2 (e.g. phase 2-I 203). At the end of phase 2, two types of higher-order symbols are generated, namely order-3 and order-(1, 2) symbols, which will be delivered in phase 3-I 205 and 3-II 207, respectively. By repeating this operation, a certain order-m (m≧3) symbol is transmitted in phase m-I, while order-(1, m−1) is sent in phase m-II. The transmission completes when order-K and order-(1-K) symbols are delivered.


In FIG. 2, after phase K-I 209 and K-II 211, no higher-order symbol is generated and backward decoding is carried out. Specifically, each receiver may decode order-K symbols and order-(1, K-1) symbols. Then with the knowledge of them, order-(K-1) symbols may be recovered. The same procedure is applicable to decode a certain order-m symbols (m≧2) using order-(m+1) and order-(1, m) symbols. By doing so, all the private symbols sent in phase 1201 may be recovered with the knowledge of order-2 symbols.


In the current embodiment, the sum DoF is calculated by <Equation 1>.










d
s

=


N
sym



T
1

+


N
2



DoF
2



(
K
)









[

Equation





1

]







Herein, Nsym is the total number of private symbols, T1 refers to the number of channel uses employed in phase 1201, N2 represents the number of order-2 symbols created by transmitting the Nsym fresh symbols. DoF2(K) characterizes the DoF of sending order-2 symbols in this (K,1,K)-IC. It is computed by the following recursive <Equation 2>.












DoF
m



(
K
)


=


N
m



T
m

+


N

m
+
1




DoF
m



(
k
)



+


N

1
,
m




DoF

1
,
m




(
K
)






,





2

m


K
-
1


,







DoF
K



(
K
)


=
1

,







DoF

1
,
m




(
K
)


=

m
+
1.






[

Equation





2

]







In <Equation 2>, Nm and N1,m, represent the number of order-m symbols and the number of order-(1,m) symbols, respectively. Tm is the number of channel uses employed to send order-m symbols. DoFm(K) is the DoF of sending order-m symbols in this (K,1,K)-IC (e.g. how many order-m symbols can 10 be sent per slot). Since order-K symbols are intended for all the K users in the system and each of them is equipped with a single antenna, only 1 order-K symbol can be delivered per channel use, leading to DoFK(K)=1. DoF1,m(K) is the DoF of sending order-(1, m) symbols in this (K,1,K)-IC.


In the embodiment of FIG. 2, consideration may be taken of how many fresh symbols are transmitted in phase I and how many order-2 symbols are generated and how many order-m symbols are input in a certain phase m-I and how many order-(m+1) and order-(1, m) symbols are output, and a detailed description will be made later.


4-2-2. Transmission in Phase 1


In a certain channel use, n(2≦n≦K) transmitters are active (denoting the set as custom-character, other K−n transmitters are silent). Each of them transmits n new symbols to the related receivers. The received signals at a certain Rx k (whose related Tx is active) is written as <Equation 3>.






y
k
=h
kk
H
W
k
x
kj∈N,j≠khkjHWjxj   [Equation 3]


In <Equation 3>, Wk, ∀k ∈custom-character, of size K×n, is the precoding matrix. xk, ∀k ∈custom-character, of size n×1, contains the symbols intended for Rx k. The second term represents the sum of the overheard interferences. Each of the overheard interference can be considered as an order-2 symbol. Specifically, a certain term, hkjHWjxj=u[j|k,j], is required by both Rx k and Rx j. If it is constructed by Tx j and delivered in phase 2-I 203, Rx k can use it to cancel the interference overheard in phase 1201, while Rx j will obtain another linear observation of xj. If all the order-2 symbols in this channel use is retransmitted, each receiver in custom-character will cancel all the overheard interferences and have enough linear combination of their intended symbols.


Since there are (2n) pairs of receivers in a certain channel use, (2K)×2 order-2 symbols will be generated. Moreover, since there are (nK) choices of custom-character, such transmission is repeated by (nK) times. This operation may be written as <Equation 4>.






T
1=(nK),






N
sym
=n
2×(nK),






N
2=(2n)×2×(nK).   [Equation 4]


The sum DoF expression may be rewritten as <Equation 5>.










d
s

=



n
2


1
+


n


(

n
-
1

)




DoF
2



(
K
)





.





[

Equation





5

]







In <Equation 5>, the value of n is chosen such that ds is maximized. Hence, the sum DoF performance is given by <Equation 6>.













k
=
1

K







d
k


=


max


n
=
2

,





,
K





n
2


1
+


n


(

n
-
1

)




DoF
2



(
K
)










[

Equation





6

]







4-2-3. Transmission in in Phase m (m≧2)


1) Phase m-I (m >2): Transmission of Order-m Symbols:


In a certain slot, only a certain receiver k is active (others are silent) and transmits K−m+1 order-m symbols (i.e., u[kcustom-characterm]), which are required by a certain set of receivers custom-character. Then the observations at the K−m receivers not in custom-characterm, i.e., u[k |custom-characterm; j], j∉custom-characterm, are linear independent of that observed by the receivers in custom-characterm. If these K−m observations are multicast to each receiver in custom-characterm, the order-m symbols may be decoded by all the receivers in the set custom-characterm.


This transmission is performed m(mK) times because there are (mK) choices of Sm and each choice has m recievers (for a certain set custom-characterm, each receiver k∈custom-characterm take turns to transmit their order-2 symbols, i.e., u[k |custom-characterm]). Hence, the number order-m symbols transmitted and the number of channels used may be expressed as <Equation 7>.






N
m=(K−m+1)×m(mK),






T
m
=m(mK).   [Equation 7]


In Equation 7, Nm represents the number of order-m symbols and Tm represents the number of channels used for transmission of order-m symbols.


2) Generation of Order-(m+1) Symbols:


At the end of phase m-I, a certain Tx k constructs u[k|custom-characterm; i∉custom-characterm, for all the possible choices of custom-characterm, using the perfect past CSIT. Then, for a certain set of receivers custom-characterm+1 that contains k, Tx k gathers all u[k|custom-characterm+1\j; j], ∀j ∉custom-characterm+1, j≠k and creates an order-(m+1) symbol, which is actually a linear combination (LC) of u[k|custom-characterm+1\j; j], ∀j∉custom-characterm+1, j≠k, that is, <Equation 8>.






u[k|
custom-character
m+1
]=LC(u[k|custom-characterm+1\j; j], ∀j∈E custom-characterm+1, j≠k).   [Equation 8]


For example, custom-characterm+1=(1,2,3,4), then u[1|custom-characterm+1]=LC(u[1|123; 4], u[1|134; 2], u[1|124; 3]). Clearly, there are m u[k|custom-characterm+1\j; j], ∀j ∈custom-characterm+1, j≠k. Thus, in order to deliver them to Rx j ∈ custom-characterm+1, j≠k, m−1 different u[k|custom-characterm+1] are needed because u[k|“m+1\j; j] is available at Rx j. Consequently, the total number of order-(m+1) symbols is given by <Equation 9>. This is because there are (m+1K) choices of custom-characterm+1 and each choice consists of m+1 receivers.






N
m+1=(m−1)(m+1)(m+1K),   [Equation 9]


3) Phase m-II(m≧3): Generation and Transmission of Order-(1,m) Symbols:


A certain Tx k generates m−1 different LCs of u[k|custom-characterm+1\j; j], ∀j ∈custom-characterm+1, j≠k for a certain set custom-characterm+1. However, that is not enough for Rx k to decode u[k|custom-characterm+1\j; j], ∀j ∉custom-characterm+1, j≠k because there are m u[k|custom-characterm+1\j; j], ∀j ∈custom-characterm+1, j≠k symbols. Thus, one more LC of them is needed. Then, order-(1,m) symbol may be defined as <Equation 10>.






u[k|k;
custom-character
m+1
\k]=LC(u[k|custom-characterm+1\j; j], ∀j ∈custom-characterm+1, j≠k).   [Equation 10]


It is an order-(1,m) symbol because all the elements in the linear combination are known by the other receivers in custom-characterm+1 if the transmission of phase m+1-I is finished. The total number of order-(1,m) symbols is expressed as <Equation 11> and this is because there are (m+1K) choices of custom-characterm+1 and each choice consists of m+1 receivers.






N
1,m=(m+1)(m+1K)   [Equation 11]


For a certain set custom-characterm+1, the m+1 order-(1,m) symbols are transmitted simultaneously from the m+1 transmitters. The received signal at a certain receiver may be written as <Equation 12>.






y
k
=h
kk
H
w
k
u[k|k;
custom-character
m+1
\k]+Σ
j∈
custom-character

m+1

j≠k
h
kj
H
w
j
u[j|j;
custom-character
m+1
\j]  [Equation 12]


In <Equation 12>, hkjH is the channel from Tx j to Rx k and wj is the beamformer of u[j|j; custom-characterm+1\j]. The second term may be eliminated in <Equation 12> because u[j|j; custom-characterm+1\j] contains the same symbols as u[j|j; custom-characterm+1], which will be recovered by Rx k after the transmission of phase m+1-I.


Then, Rx k may proceed to decode u[k|k; custom-characterm+2\k]. Since m+1 order-(1,m) symbols are successfully transmitted simultaneously, <Equation 13> may be obtained.






DoF
1,m(K)=m+1.   [Equation 13]


In a certain phase m in the current embodiment, since K −m+1 different order-m symbols are transmitted by one Tx per slot, the precoding matrix for these order-m symbols should have full rank. In other words, the transmission can be done using K−m+1 antennas. Specifically, in the current embodiment, K−1 antennas are needed in phase 2 while only a single antenna in phase 2. Hence, if Σk=1Kdk is maximized by n≦K−1 (n is the number of active transmitters per slot in phase 1), the above transmission is applicable to the case where each Tx is equipped with K-1 antennas. In the following description, a 3 Tx-Rx pairs example will be given.


4-2-4. Comparison With Conventional Art


With the value of Tm, Nm, Nm+1 and Ni,m given in the previous embodiment, DoF2(K) may be calculated as in <Equation 14>.











DoF
2

=

1

1
-


A
2



(
K
)





,







A
2



(
K
)


=


1

K
-
1







l
=
0


K
-
3










K
-
2
-
l



(

l
+
1

)



(

l
+
3

)



.








[

Equation





14

]







Then, the sum DoF performance for a given K may be calculated.


The DoF performance according to the present invention compared to the DoF performance of conventional Torrellas and the DoF performance of Absoli SISO is as shown in FIG. 3. In FIG. 3, reference numeral 301 represents the DoF performance of the present invention, and reference numerals 303 and 305 represent the DoF performance of conventional Torrellas and the DoF performance of Absoli SISO, respectively.


1) Difference from Torrellas Scheme:


The Torrellas scheme, proposed in Marc Torrellas, Adrian Agustin, Josep Vidal, “ON THE DEGREES OF FREEDOM OF THE K-USER MISO INTERFERENCE CHANNEL WITH IMPERFECT DELAYED CSIT”, available on arxiv: 1403.7012, is divided into two phases. New symbols are delivered in phase 1, which generate several overheard interferences (order-2 symbols). The main difference from the embodiment of the present invention is that all the overheard interferences are transmitted one by one in phase 2, such that no higher order symbols are created. The Torrellas scheme is briefly expressed as in phases 1 and 2.


Phase 1 consists of K slots, where the K transmitters in turn send K private symbols to the related receivers. In a certain slot k, Tx k is active, and the received signal at Rx k is yk=hkkHWkxk, where Wk, of size K×1 is the precoding matrix, while xk of size K×1, is the symbol vector intended for Rx k. At the same time, all the other receivers overhear xk . The overheard interference at a certain Rx j≠k is denoted by hjkHWkxk. If all hjkHWkxk, j≠k are provided to Rx k, xk may be decoded.


Phase 2 consists of (2K) slots. A certain pair of receivers, i.e., Tx k and Tx j, is active in a certain slot. They construct hjkHWkxk and hjkHWjxj, respectively using the perfect past CSIT and multicast them simultaneously. Then Rx k (resp. Rx j) can decode hjkHWkxk (resp. hkjHWjxj) as hkjHWjxj (resp. hjkHWkxk) is already available at Rx k (Rx j) in the first phase. The sum DoF performance will be








2





K


K
+
1


.




The Torrellas scheme is simple and achieves the same sum DoF performance as ours when K=3. However, for very large K, the scheme becomes time-consuming and the DoF performance is bounded by 2. Intuitively, the reason is that the order-2 symbols transmitted in our scheme rely on the transmission of higher-order symbols, which are constructed at the transmitter and the perfect past CSIT is needed. But the perfect past CSIT does not help in transmitting order-2 symbols in the Torrellas scheme.


2 Difference from Abdoli SISO:


The Abdoli scheme, proposed in “M. J. Abdoli, A. Ghasemi, A. K. Khandani, “On the Degrees of Freedom of K-User SISO Interference and X Channels With Delayed CSIT,” Information Theory, IEEE Transactions on, vol.59, 5 no.10, pp. 6542,6561, October 2013”, focuses on the SISO case. The only difference between our proposed scheme and the Abdoli scheme lies in the phase 1 and the phase m-I (m≧2), that is, the transmission of new symbols and order-m symbols.


To review the difference, let us focus on the transmission in phase 1. In the Abdoli scheme, all the Tx are active in a certain slot and each Tx transmits multiple private symbols to the related Rx. The received signal may be also written as yk=hkkHwkxkj≠khkjHwjxj. However, the second term may not be simply considered as an order-2 symbols because the channel is scalar and hkjHwjxj will align with hjjHwjxj that is received at Rx j. To overcome this, the same private symbols are transmitted in multiple slots, such that Rx k may have an observation of xj that is linearly independent of that received in Rx j. The similar problem happens in phase m-I, where the same order-m symbols have to be transmitted in multiple slots.


4-3. Example of 3 Tx-Rx Pairs


In the current embodiment, when K=3, one has DoF2(3)=6/5. Besides, to have the maximum sum DoF, the parameter n introduced in the foregoing embodiment is equal to 2 or 3, and the sum DoF is 3/2. This reveals that the transmission strategy is applicable to both the cases where each Tx node is equipped with 2 and 3 antennas. In the current embodiment, the scheme focusing on 3-antenna per Tx will be first proposed and then the achievability of the case with 2-antenn per Tx will be discussed.


In the current embodiment, the sum DoF 3/2 is achieved by sending 6 symbols per Rx in 12 slots. The transmission includes 1) through 3) phases.


1) In phase 1, 6 symbols per Rx are transmitted in 2 slots and 12 order-2 symbols are generated.


2) In phase 2-I, these order-2 symbols are transmitted in 6 slots, resulting in 3 order-3 symbols and 3 order-(1,2) symbols.


3) In phase 3-I, 3 order-3 symbols are transmitted in 3 slots and 3 order-(1;2) symbols are sent in phase 3-II using 1 slot.


Hereinbelow, the above phases will be described in more detail.


4-3-1. Phase 1


Each Tx sends 3 different symbols to its related Rx in each slot. The transmitted signal writes as <Equation 15>.






s
k(t)=Vk(t)xk(t), k=1,2,3, t=1,2   [Equation 15]


Here, Vk(t) is a 3-by-3 full-rank matrix and xk(t)=[xk1(t),xk2(t),xk3(t)]T. The received signals at Rx1, Rx2 and Rx3 are expressed as <Equation 16>.















y
1



(
t
)


=




h
11
H



(
t
)





V
1



(
t
)





x
1



(
t
)



+




h
12
H



(
t
)





V
2



(
t
)





x
2



(
t
)







u
t



[


2

1

,
2

]




+




h
13
H



(
t
)





V
3



(
t
)





x
3



(
t
)







u
t



[


3

1

,
3

]






,









y
2



(
t
)


=





h
21
H



(
t
)





V
1



(
t
)





x
1



(
t
)







u
t



[


1

1

,
2

]




+



h
22
H



(
t
)





V
2



(
t
)





x
2



(
t
)



+




h
23
H



(
t
)





V
3



(
t
)





x
3



(
t
)







u
t



[


3

2

,
3

]






,








y
3



(
t
)


=





h
31
H



(
t
)





V
1



(
t
)





x
1



(
t
)







u
t



[


1

1

,
3

]




+





h
32
H



(
t
)





V
2



(
t
)





x
2



(
t
)



+





u
t



[


2

2

,
3

]




+



h
33
H



(
t
)





V
3



(
t
)






x
3



(
t
)


.










[

Equation





16

]







Thus far, the symbols contained in x1(t) may be decoded for 1) and 2).


1) ut[2|1,2] and ut[3|1,3] are provided in order to cancel the interference observed in y1(t).


2) ut[1|1,2] and ut[1|1,3] are provided because they are linear independent observations of x1(t).


Similarly, Rx2 and Rx3 may decode their intended symbols if the interferences are removed and side information are provided. In this way, ut[k|k,j] is an order-2 symbol that should be decoded by Rx k and j. There are totally 12 order-2 symbols resulted in these two slots. The following slots are employed to multicast u1[1|1,2], u2[1|1,2], u1[2|1,2], and u2[2|1,2] to Rx1 and Rx2, u1[1|1,3], u2[1|1,3], u1[3|1,3] and u2[3|1,3] to Rx1 and Rx3 and u1[3|3,2], u2[3|3,2], u1[2|3,2] and u2[2|3,2] to Rx2 and Rx3.


4-3-2. Phase 2-I


The transmission is divided into three sub-phases and each sub-phase contains two slots. In a certain sub-phase, the order-2 symbols intended for a certain pair of receivers (e.g. Rx k and Rx j) are transmitted. During the two slots of the sub-phase, Tx k and Tx j are alternatively active and respectively transmitting the terms u1[k|k, j], u2[k|k, j] and u1[j|k, j], u2[j|k, j].


More specifically, sub-phase 2-I.1, slot 3: The transmitted and received signal write as <Equation 17>.






s
1(3)=V1(3)[u1[1|1,2], u2[1|1,2]]T,






y
1(3)=h11H(3)V1(3)[u1[1|1,2], u21|1,2]]T,






y
2(3)=h21H(3)V1(3)[u1[1|1,2], u2[1|1,2]]T,






y
3(3)=h31H(3)V1(3)[u1[1|1,2], u2[1|1,2]]T=u[1|1,2; 3],   [Equation 17]


where V1(3) is a full rank matrix of size 3×2. ui[1|1,2] and u2[1|1,2] will be decodable at Rx1 and Rx2 if u[1|1,2; 3] is provided to them as it is a linear independent observation of y1(3) and y2(3).


Sub-phase 2-I.2, slot 4: The transmitted signal and received signals write as <Equation 18>.






s
1(4)=V2(4) [u1[2|1,2],u2[2|1,2]]T,






y
1(4)=h11H(4)V2(4) [u1[2|1,2], u2[2|1,2]]T,






y
2(4)=h21H(4)V2(4) [u1[2|1,2], u2[2|1,2]]T,






y
3(4)=h31H(4)V2(4) [u1[2|1,2], u2[2|1,2]]T=u[2|1,2; 3],   [Equation 18]


where V1(4) is a full rank matrix of size 3×2. Similarly, u1[2|1,2] and u2[2|1,2] will be decodable at Rx1 and Rx2 if u[2|1,2; 3] is provided.


Following the same framework, the transmission in sub-phase 2-1.2 and 2-1.3 are summarized in Table I. To sum, the transmission is finalized if u[1|1,2; 3] and u[2|1,2; 3] are provided to Rx1 and Rx2, u[1|1,3; 2] and u[3|1,3; 2] are provided to Rx1 and Rx3, while u[2|2,3; 1] and u[3|2,3; 1] are provided to Rx2 and Rx3. To this end, the transmission in the last phase of the scheme proposed in the Abdoli SISO scheme may be reused.















TABLE 1





Subphase
Tx1
Tx2
Tx3
Rx1
Rx2
Rx3







2-I.2, slot 5






V
1



(
5
)




[





u
1



[


1
|
1

,
3

]








u
2



[


1
|
1

,
3

]





]





Silence
Silence
y1(5)
u[1|1, 3; 2]
y3(5)





2-I.2, slot 6
Silence
Silence






V
3



(
6
)




[





u
1



[


3
|
1

,
3

]








u
2



[


3
|
1

,
3

]





]





y1(6)
u[3|1, 3; 1]
y3(6)





2-I.3, slot 7
Silence






V
2



(
7
)




[





u
1



[


2
|
2

,
3

]








u
2



[


2
|
2

,
3

]





]





Silence
u[2|2, 3; 1]
y2(7)
y3(7)





2-I.3, slot 8
Silence
Silence






V
3



(
8
)




[





u
1



[


3
|
2

,
3

]








u
2



[


3
|
2

,
3

]





]





u[3|3, 2; 1]
y2(8)
y3(8)









4-3-3. Phases 3-I and 3-II


The transmission of this phase follows exactly the same footsteps as that in the Abdoli SISO scheme. Using the new order-2 symbols generated above, the order-3 symbols are constructed as in <Equation 19>:






u[1|1,2,3]=LC(u[1|1,2;3],u[1|1,3;2]),






u[2|1,2,3]=LC(u[2|1,2;3],u[2|2,3;1]),






u[3|1,2,3]=LC(u[3|1,3;2],u[3|2,3;1]),   [Equation19]


where LC represents linear combination. u[1|1,2,3], u[2|1,2,3] and u[3|1,2,3] are respectively transmitted from Tx1 in slot 9, Tx2 in slot 10 and Tx3 in slot 11 (e.g., phase 3-I), using a single antenna. Consequently, Rx1 observes three linear independent observations of u[1|1,2; 3], u[2|1,2; 3], u[2|1,2; 3] and u[3|1,3; 2] without interference since u[2|2,3; 1] and u[3|2,3; 1] may be removed from the past received signals at Rx1. The received signals at Rx2 and Rx3 follow similarly. So far, one more linear independent observation is needed to decode those four terms at each Rx. To this end, in the 12th slot (e.g. phase 3-II), each Tx creates an order-(1;2) symbol and transmits them simultaneously. The order-(1;2) symbols are given as <Equation 20>.






u[1|1;2,3]=LC(u[1|1,2;3], u[1|1,3;2]),






u[2|2;1,3]=LC(u[2|1,2;3], u[2|2,3;1]),






u[3|3;1,2]=LC(u[3|1,3;2], u[3|2,3;1]),   [Equation 20]


4-3-4. Alternative Expression for Transmission in Phase 3-I and Phase 3-II


Generally, when each Tx node is equipped with 3 transmission antennas, the transmitted signals in this phase may be written as <Equation 21>.






s
1(t)=V1(t) [u[1|1,2; 3], u[1|1,3; 2]]T,






s
2(t)=V2(t) [u[2|1,2; 3], u[2|2,3; 1]]T,






s
3(t)=V3(t) [u[3|1,3; 2], u[3|2,3; 1] T,   [Equation 21]


where t=9, 10,11,12. The received signals at Rx1 are expressed as









<

Equation





22

>
.













[





y
1



(
9
)








y
1



(
10
)








y
1



(
11
)








y
1



(
12
)





]

=







H
1

phase





3




[


u


[


1

1

,

2
;
3


]


,

u


[


1

1

,

3
;
2


]


,

u


[


2

1

,

2
;
3


]


,

u


[


3

1

,

3
;
2


]



]


T

+








H

1
,
int


phase





3




[


u


[


2

2

,

3
;
1


]


,

u


[


3

2

,

3
;
1


]



]


T





,




[

Equation





22

]







1

phase





3


=




[






h
11
H



(
9
)






V
1



(
9
)




[

:

,
1


]








h
11
H



(
9
)






V
1



(
9
)




[

:

,
2


]








h
12
H



(
9
)






V
2



(
9
)




[

:

,
1


]








h
13
H



(
9
)






V
3



(
9
)




[

:

,
1


]










h
11
H



(
10
)






V
1



(
10
)




[

:

,
1


]








h
11
H



(
10
)






V
1



(
10
)




[

:

,
2


]








h
12
H



(
10
)






V
2



(
10
)




[

:

,
1


]








h
13
H



(
10
)






V
3



(
10
)




[

:

,
1


]










h
11
H



(
11
)






V
1



(
11
)




[

:

,
1


]








h
11
H



(
11
)






V
1



(
11
)




[

:

,
2


]








h
12
H



(
11
)






V
2



(
11
)




[

:

,
1


]








h
13
H



(
11
)






V
3



(
11
)




[

:

,
1


]










h
11
H



(
12
)






V
1



(
12
)




[

:

,
1


]








h
11
H



(
12
)






V
1



(
12
)




[

:

,
2


]








h
12
H



(
12
)






V
2



(
12
)




[

:

,
1


]








h
13
H



(
12
)






V
3



(
12
)




[

:

,
1


]






]

,















H

1
,
int


phase





3


=

[






h
12
H



(
9
)






V
2



(
9
)




[

:

,
2


]








h
13
H



(
9
)






V
3



(
9
)




[

:

,
2


]










h
12
H



(
10
)






V
2



(
10
)




[

:

,
2


]








h
13
H



(
10
)






V
3



(
10
)




[

:

,
2


]










h
12
H



(
11
)






V
2



(
11
)




[

:

,
2


]








h
13
H



(
11
)






V
3



(
11
)




[

:

,
2


]










h
12
H



(
12
)






V
2



(
12
)




[

:

,
2


]








h
13
H



(
12
)






V
3



(
12
)




[

:

,
2


]






]


,












where V1k(t) [:,1] and V1k(t)[: ,2] represent the first and second column in the matrix V1k(t). The term consisting of u[2|2,3; 1] and u[3|2,3; 1] may be removed. The matrix H1phase3may be full rank almost for sure and the terms u[1|1,2; 3], u[1|1,3; 2], u[2|1,2; 3] and u[3|1,3; 2] may be decoded by Rx1.


If V1(9), V2(10) and V3(11) are row vectors, V1(10), V1(11), V2(9), V2(11), V3(9) and V3(10) are zero matrices and Vk(12), k=1,2,3 is a full rank matrix, then the transmission boils down to that in the SISO case as in the Abdoli SISO scheme.


4-3-5. Applied to 2-Transmission Antenna Case


From the above embodiment of the present invention, it can be seen that the transmission of order-2 symbols (i.e., phase 2-I) requires maximum 2 transmission antennas and even a single antenna is sufficient for the third phase. Hence, when each Tx node is equipped with 2 transmission antennas, if we send new symbols in phase I and generate 12 order-2 symbols, those order-2 symbols may be transmitted using exactly the same strategy discussed in the above embodiment.


However, when each Tx node is equipped with 2 transmission antennas, the new symbols cannot be sent in the above-described way. The reason is as follows. For Rx1, the symbol vector x1(t) contains 3 different symbols, when ut[1|1,2] and ut[1|1,3] are provided to Rx1, Rx1 still may not decode x1(t) because Tx1 has only two antennas and the terms h11V1(t), h21V1(t) and h31V1(t) are linear dependent. Hence, each Tx has to send two symbols to the related receiver at a time and repeats the transmission till there are 12 order-2 symbols to be sent.


Basically, there are 6 slots in the phase 1 and 8 symbols per Rx are transmitted. Specifically, the transmitted signals at slot 1, 2 and 3 (repeated at slot 4, 5 and 6) write as <Equation 23>.






s
i(1)=V1(1)x1(1), s2(1)=V2(1)x2(1), s3(1)=0,






s
1(2)=V1(2)x1(2), s2(2)=0, s3(2)=V3(2)x3(2),






s
1(1)=0, s2(3)=V2(3)x2(3), s3(3)=V3(3)x3(3),   [Equation 23]


where Vk(t), k=1,2,3, t=1,2,3 is a full rank 2×2 matrix, the symbol vector writes as xk(t)=[xk1(t), xk2(t)]T. As shown, in each slot, two transmitters are active sending symbols to their related receivers while the other Tx keeps silence. The received signals are expressed as <Equation 24>.















y
1



(
1
)


=




h
11
H



(
1
)





V
1



(
1
)





x
1



(
1
)



+




h
12
H



(
1
)





V
2



(
1
)





x
2



(
1
)







u
1



[


2

1

,
2

]






,









y
2



(
1
)


=





h
21
H



(
1
)





V
1



(
1
)





x
1



(
1
)







u
1



[


1

1

,
2

]




+



h
22
H



(
1
)





V
2



(
1
)





x
2



(
1
)





,









y
3



(
1
)


=

LC


(



x
1



(
1
)


,


x
2



(
1
)



)



,









y
1



(
2
)


=




h
11
H



(
2
)





V
1



(
2
)





x
1



(
2
)



+




h
13
H



(
2
)





V
3



(
2
)





x
3



(
2
)







u
1



[


3

1

,
3

]






,









y
2



(
2
)


=

LC


(



x
1



(
2
)


,


x
3



(
2
)



)



,









y
3



(
t
)


=





h
31
H



(
2
)





V
1



(
2
)





x
1



(
2
)







u
1



[


1

1

,
3

]




+



h
33
H



(
2
)





V
3



(
2
)





x
3



(
2
)





,









y
1



(
3
)


=

LC


(



x
2



(
3
)


,


x
3



(
3
)



)



,









y
2



(
3
)


=




h
22
H



(
3
)





V
2



(
3
)





x
2



(
3
)



+




h
23
H



(
3
)





V
3



(
3
)





x
3



(
3
)







u
1



[


3

2

,
3

]






,








y
3



(
3
)


=





h
32
H



(
3
)





V
2



(
3
)





x
2



(
3
)







u
1



[


2

2

,
3

]




+



h
33
H



(
3
)





V
3



(
3
)






x
3



(
3
)


.










[

Equation





24

]







In slot 1, just like the two-receiver alternative-MAT scheme proposed in “S. Yang, M. Kobayashi, D. Gesbert, and X. Yi,” degrees of freedom of time correlated miso broadcast channel with delayed csit,” IEEE Trans. Inf. Theory, 5 vol. 59, no. 1, pp. 315-328, 2013.”, if the overheard signal u1[1|1,2] and u1[2≡1,2] are provided to both Rx1 and Rx2, x1(1) and x2(1) will be decoded by Rx1 and Rx2 respectively. Similar observations may be seen from Rx1 and Rx3 in slot 2 and Rx2 and Rx3 in slot 3.


The transmissions repeat in slot 4, 5 and 6, such that there are totally 12 order-2 symbols to be sent. The equations are omitted for brevity. Consequently, 24 symbols (8 per Rx) are transmitted in 16 slots (6 in phase I and 10 in phase 2 and 3 in the foregoing embodiment). The sum DoF is 24/16=3/2.


The embodiments of the present invention may provide a new technology for multi-antenna wireless communication systems replying on outdated/delayed channel state information at the transmitter. More specifically, the embodiments of the present invention provide a scheme for performing channel estimation by relying on current LTE-A system frameworks, without depending on CSI sharing between users. Moreover, the embodiments of the present invention may provide a scheme for investigating the effect of backhaul delay on CoMP performance and solving the problem thereof.


While the embodiments have been described separately herein, two or more of the embodiments may be implemented in combination.


In the embodiments of the present invention, each of a terminal and a base station may be implemented by including a transmitter, a receiver, or a transceiver for communication over a wireless network, and a controller for controlling operations according to the foregoing embodiments.


The embodiments of the present invention may be embodied as computer-readable codes on a computer-readable recording medium. The computer-readable recording medium is any data storage device that can store data which can be thereafter read by a computer system. Examples of the computer readable recording medium include read-only memory (ROM), random-access memory (RAM), compact disk (CD)-ROMs, magnetic tapes, floppy disks, optical data storage devices, and carrier waves (data transmission through the Internet). The computer-readable recording medium can also be distributed over network coupled computer systems so that the computer-readable code is stored and executed in a distributed fashion. Also, functional programs, codes, and code segments for accomplishing the present invention can be easily construed by programmers skilled in the art to which the present invention pertains.


The embodiments of the present invention can be implemented in hardware or a combination of hardware and software. The software can be recorded to a volatile or non-volatile storage device such as a ROM irrespective of deletable or re-recordable, to a memory such as a RAM, a memory chip, a memory device, or an integrated circuit, or to a storage medium that is optically or magnetically recordable and readable by a machine (e.g. a computer), such as a CD, a digital video disc (DVD), a magnetic disk, or a magnetic tape. The storage is an example of a machine-readable storage medium suitable for storing a program or programs including instructions to implement the embodiments of the present invention.

Claims
  • 1. A method for performing channel estimation in a wireless communication system in which a plurality of terminals and a base station communicate with each other, the method comprising: receiving reference signals transmitted through a plurality of slots; andperforming channel estimation by using the reference signals,wherein for the channel estimation, a number of reference signals received through at least one of the plurality of slots is different from a number of reference signals received through the other slots.
  • 2. The method of claim 1, wherein demodulation-reference signals (DM-RSs) are used for the reference signals.
  • 3. The method of claim 1, wherein overhead interference is broadcast through at least one of the plurality of slots.
  • 4. The method of claim 1, wherein a number of reference signals used for the channel estimation varies with an architecture of a receiver.
  • 5. The method of claim 1, wherein a channel state is estimated without sharing channel state information with other terminals.
  • 6. A terminal for performing channel estimation in a wireless communication system in which a plurality of terminals and a base station communicate with each other, the terminal comprising: a receiver configured to receive signals transmitted from the base station; anda controller configured to control reception of reference signals transmitted through a plurality of slots and to control performing of the channel estimation by using the reference signals,wherein for the channel estimation, a number of reference signals received through at least one of the plurality of slots is different from a number of reference signals received through the other slots.
  • 7. The terminal of claim 6, wherein demodulation-reference signals (DM-RSs) are used for the reference signals.
  • 8. The terminal of claim 6, wherein overhead interference is broadcast through at least one of the plurality of slots.
  • 9. The terminal of claim 6, wherein a number of reference signals used for the channel estimation varies with an architecture of a receiver.
  • 10. The terminal of claim 6; wherein the controller estimates a channel state without sharing channel state information with other terminals.
PCT Information
Filing Document Filing Date Country Kind
PCT/KR2014/009395 10/6/2014 WO 00
Provisional Applications (2)
Number Date Country
61886937 Oct 2013 US
62020108 Jul 2014 US