Robust cross - Layer scheduling design in multi - User multi - Antenna wireless systems

Acknowledgments I AM DEEPLY INDEBTED to my supervisor, Prof. Vincent K.N. Lau for having invariably given me his patient guidance, stimulating encouragement, and deep insights into my research and my life as well. His enthusiastic attitude and extremely high efficiency has not only had a great impact on my Ph.D study, but has also given me great impetus that I would be able to cherish in my entire life. The completion of this thesis would not have been possible without his continual support. I am sincerely grateful to the Graduate School of HKU for having provided the Postgraduate Studentship during the whole Ph.D program. I would like to thank Dr. N. Wong, Prof. J. Wang, Dr. W.H Lam, and Prof. Roger Cheng for their insightful guidance, suggestions, and kind help during my study. I would also like to thank Prof. Ricky Kwok, Prof. K.L Ho, and Prof. Li chun Wang for serving on my thesis examination committee. I truly appreciate the friendship of my friends for having created a pleasant working environ- ment and for their helpful discussions. Special thanks go to Mr. Tyrone Kwok, Mr. Gan Zheng, Mr. Carson Hung, Mr. David Hui, Doctors-to-be- Xiaoshan Liu , Guanghua Yang and Shaodan Ma, Dr. Zhifeng Diao, Dr. Xiaohui Lin, and Dr. Yiqing Zhou for their kind help and insightful discussions. Many thanks go to other friends in the lab and research group. Finally, I would like to express my sincerest gratitude to my parents and my wife Ying Zheng for their deepest love and constant support. Table of Contents Declaration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . i Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ii List of Tables . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vi List of Figures . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii Abstract . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . x Abbreviations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xii Notation and used symbols . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . xv Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 Evolution and Challenge of Wireless Technology Literature Survey . . . . . . . . . . . . . . . . . Motivation and Problem Statement . . . . . . . Thesis Research and Contributions . . . . . . . Wireless Fading Channel - Characterizations and Mitigation . . . . . . . . . . 2.1.1 Large-Scale Fading . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.2 Small-Scale Fading . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.1.3 Mitigation Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . Cross-Layer Scheduling and Adaptive Design in Multi-user Wireless Network 2.2.1 Adaptive Design in Physical Layer . . . . . . . . . . . . . . . . . . . 2.2.2 MAC Layer Scheduling Model . . . . . . . . . . . . . . . . . . . . . Linear Transmit-receive Processing in Multi-antenna Base Station . . . . . . . 2.3.1 Zero-forcing Processing . . . . . . . . . . . . . . . . . . . . . . . . . 2.3.2 Transmit MMSE Processing . . . . . . . . . . . . . . . . . . . . . . . Uplink Scheduling Design with Outdated CSI . . . . . . . . . . . . . . . . . . . . . 22 Cross-Layer Downlink Scheduling and Rate Quantization Design with Imperfect CSIT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Multi-user SIMO System Model . . . . . . . . . . . . . . . . . . . . . . . 3.2.1 Channel Model with Outdated CSIT . . . . . . . . . . . . . . . . 3.2.2 Multi-user Uplink Physical Layer Model . . . . . . . . . . . . . . 3.2.3 Packet Outage Model . . . . . . . . . . . . . . . . . . . . . . . . Uplink Space Time Scheduling Design . . . . . . . . . . . . . . . . . . . 3.3.1 System Utility Function . . . . . . . . . . . . . . . . . . . . . . . 3.3.2 Optimal Solution with Perfect CSI . . . . . . . . . . . . . . . . . 3.3.3 Heuristic Solution with Perfect CSI - Genetic Algorithm . . . . . . Scheduling with Outdated CSI . . . . . . . . . . . . . . . . . . . . . . . . 3.4.1 Performance Degradation of Ideal Schedulers Due to Outdated CSI 3.4.2 Proposed Scheme A - Rate Quantization . . . . . . . . . . . . . . 3.4.3 Proposed Scheme B - Rate Discounting . . . . . . . . . . . . . . . Numerical Results and Discussions . . . . . . . . . . . . . . . . . . . . . Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Multi-user MISO System Model . . . . . . . . . . . . . . . . . . . 4.2.1 Downlink Channel Model . . . . . . . . . . . . . . . . . . 4.2.2 Imperfect CSIT Model . . . . . . . . . . . . . . . . . . . . 4.2.3 Multi-user Downlink Physical Layer Model . . . . . . . . Problem Formulation of Cross-Layer Scheduling . . . . . . . . . . 4.3.1 Instantaneous Channel Capacity and System Goodput . . . 4.3.2 Cross-Layer Design Optimization . . . . . . . . . . . . . . Solutions of the Optimization Designs . . . . . . . . . . . . . . . . 4.4.1 Combined Scheduling and Rate Quantization Optimization 4.4.2 Optimal Inner Scheduling Based on Imperfect CSIT . . . . 4.4.3 Optimal Transmission Modes Design . . . . . . . . . . . . 4.4.4 Summary of the Scheduler Solution . . . . . . . . . . . . . Numerical Results and Discussions . . . . . . . . . . . . . . . . . 4.5.1 Performance of Regular Scheduler with Imperfect CSIT . . 4.5.2 Performance of Proposed Scheduler with Imperfect CSIT . Performance Analysis of Downlink Scheduling for Voice and Data Applications . . 65 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Cross-layer Downlink Scheduling with Heterogeneous Delay Constraints . . . . . . 84 System Model . . . . . . . . . . . . . . . . . . . . . . 5.2.1 Channel model . . . . . . . . . . . . . . . . . . 5.2.2 Multi-user Physical Layer Model . . . . . . . . 5.2.3 Source Model - Voice and Data . . . . . . . . . Space Time Scheduling for Heterogeneous Users . . . . 5.3.1 Asymptotic Spatial Multiplexing Gain . . . . . 5.3.2 Scheduling Algorithm . . . . . . . . . . . . . . Numerical Results and Discussions . . . . . . . . . . . 5.4.1 Delay Performance of VoIP users . . . . . . . . 5.4.2 Spatial Multiplexing Gains on System Capacity 5.4.3 Transient Performance . . . . . . . . . . . . . . Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . System Model . . . . . . . . . . . . . . . . . . . . . . . . . . 6.2.1 Multi-user Physical Layer Model . . . . . . . . . . . . 6.2.2 Source Model - Delay Sensitive and Delay Insensitive . Formulation of the Cross-layer Design for Heterogeneous Users Solution of the Cross-Layer Optimization Problem . . . . . . . 6.4.1 Convex Optimization on (p1 , , pK ) . . . . . . . . . . . 6.4.2 Combinatorial Search on Admissible Set . . . . . . . . Numerical Results and Discussions . . . . . . . . . . . . . . . 6.5.1 Delay Performance of the Proposed Scheduler . . . . . 6.5.2 System Throughput Performance . . . . . . . . . . . . 6.5.3 Delay and Power Tradeoff . . . . . . . . . . . . . . . . Conclusions and Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 7.1 7.2 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Future Work . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 List of References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

pdf128 trang | Chia sẻ: banmai | Lượt xem: 1903 | Lượt tải: 0download
Bạn đang xem trước 20 trang tài liệu Robust cross - Layer scheduling design in multi - User multi - Antenna wireless systems, để xem tài liệu hoàn chỉnh bạn click vào nút DOWNLOAD ở trên
us er th ro ug hp ut (b its /H z/s ) number of nT the contribution of nT to total data user throughput at high and low SNR Homogeneous scheduling, SNR =8dB Homogeneous scheduling, SNR =0dB Heterogeneous scheduling, SNR =8dB Heterogeneous scheduling, SNR =0dB high SNR low SNR (a) Network Capacity of data users (bits/Hz/s): 1 1.5 2 2.5 3 3.5 4 4.5 5 5.5 6 0 5 10 15 20 25 30 n u m be r o f v oi ce u se rs number of nT contribution of nT to voice capacity (number of voice users with mean time−delay ≤ 50 ms) Heterogeneous scheduling, SNR =8dB Homogeneous scheduling, SNR =8dB Heterogeneous scheduling, SNR =0dB Homogeneous scheduling, SNR =0dB high SNR low SNR (b) Voice Capacity (number of supported voice users) Figure 5.6 Spatial multiplexing gains of voice and data users (BW = 20kHz, Kdata =20, Kvoice =2, T0 = 20ms). 82 0 20 40 60 80 0 2 4 6 8 10 12 14 16 18 20 D at a: a ve ra ge th ro up ut (bi t/H z/s ); V oic e: me an tim e d ela y(m s) simulation time ( each point 2000 time slots) Homogeneous scheduling with bursty data traffic Data user throughput Voice user mean time delay λdata = 0.2 λdata = 0.7 λdata = 0.1 λdata = 0.8 (a) Homogeneous scheduling: 0 20 40 60 80 0 2 4 6 8 10 12 14 16 18 D at a: a ve ra ge th ro up ut (b it/H z/s ); V oic e: me an tim e d ela y ( ms ) simulation time ( each point 2000 time slots) the effect of bursty data traffic to voice with heterogeneous scheduling Data user throughput Voice user mean time delay λdata = 0.2 λdata = 0.7 λdata = 0.1 λdata = 0.8 (b) Heterogeneous scheduling: Figure 5.7 Transient performance of voice users in the presence of bursty data loading. BW = 20kHz, nT =4, Kdata =20, Kvoice =2, T0 = 20ms. 83 where the summation term is neglected due to the high SNR region. Hence, from (5.6), the instan- taneous capacity utility with |A| = Q is given by: Ccap(Q) = Q∑ k=1 log2 ( P0|hkwk|2 Q ) = Q∑ k=1 log2 ( P0λ (Q) k Q ) , where λ(Q)k is the largest eigenvalue of ( B∗A,kBA,k )−1 B∗A,kh ∗ khkBA,k. Consider Ccap(Q)− Ccap(Q−m) = m log2(P0) + ∑ k log2(λ (Q) k ) − ∑ k log2(λ (Q−m) k ) +Q log2(Q)− (Q−m) log2(Q−m) > 0 for large P0. Hence, we have Ccap(Q) ≥ Ccap(Q−m) for all Q ≤ nT and m ≥ 1. Therefore, the optimizing A has cardinality of nT . 84 Chapter 6 Cross-layer Downlink Scheduling with Het- erogeneous Delay Constraints 6.1 Overview In Chapter 5, we have shown that it is important to consider the effect of the source statistics, queueing delays and application level requirements into the cross-layer scheduling design. How- ever, the proposed heterogeneous scheduling design is based on a heuristic way by naively giving priority to voice users. It ensures stable delay performance but cannot guarantee any specific delay requirement for Voice users. It is also not clear how well the proposed allocation policy performs compared with the optimal performance. In this chapter, we shall focus on the design and performance analysis of cross-layer schedulers for multi-antenna systems with specific delay requirements. Similar to previous chapters, we con- sider a wireless multimedia system with a base station (with nT transmit antennas), K1 client users (with a single antenna) running delay sensitive application and K2 background data users (with a single antenna) running delay insensitive applications such as emails or FTP. In fact, different ap- plications can have very different QoS requirements. We shall propose an analytical framework to address the heterogeneous cross-layer scheduling problem, which exploits the spatial multiplexing gain and the multi-user selection diversity gains to maximize the system throughput, and at the same time fulfil the QoS requirements for heterogenous users. The physical layer performance is 85 modeled based on information theory and the delay (buffer) dynamics is modeled based on queue- ing theory. Based on the analytical framework, a novel cross-layer scheduler, which dynamically adjusts the rate, power and user selection, is obtained for the mixed user application. 6.2 System Model 6.2.1 Multi-user Physical Layer Model We consider a communication system with a base station (with nT transmit antennas), K1 delay sensitive users and K2 bursty delay insensitive users (K = K1 + K2 users with single receive antenna), which is the same as the system model in Chapter 5. Referring to the linear transmit- receive processing model introduced in Section 2.3 and Fig. 2.4, the channel fading between the base station and the k-th mobile user is characterized by the 1 × nT dimension channel vector, hk, which is modeled as a circularly symmetric complex Gaussian vector with zero mean and covariance InT . Furthermore, it is assumed that the duration of the scheduling slot (2 ms) is much shorter than the coherence time of the fading channel1. In other words, the channel fading is quasi-static within an encoding frame. We shall consider zero-forcing (ZF) approach at the base station which only has a linear order of complexity. With ZF transmit scheme, a number of orthogonal beams are formed at the base station with each beam carrying independent streams of information corresponding to the selected set of mobiles. In general, K streams of information data to K individual users at the base station transmitter are encoded independently. The vector (K × 1) of encoded symbols, U = [u1, ..., uK ], are processed by the power control diagonal matrix (K×K) √P = diag(√p1, ...,√pK) followed by the beamforming matrix (nT ×K), W = [w1, ...,wK ]. pk ≥ 0 is the average transmit power for user k and wk is the nT ×1 complex beamforming weight for user k. Hence, the nT ×1 transmitted signal X from the base station is given by: X = K∑ k=1 Xk = K∑ k=1 uk √ pkwk. (6.1) 1We are targeting for pedestrian users where the channel coherence time is of the order of 40ms. 86 The received signal of the k−th user yk is given by: yk = √ pkhkwkuk︸ ︷︷ ︸ Information + ∑ j 6=k √ pjhkwjuj︸ ︷︷ ︸ Multi-beam Interference +Zk, (6.2) where the first term contains the desired signal and the middle term represents the multi-beam interference due to simultaneous transmission of independent information streams. Using the ZF approach for the weight selections (wk), we have hkwj = 0 and hence, the multi-beam interference term is zero-out. The ZF beamforming (ZFBF) weights calculation can be found in Section 2.3. The received signal for mobile user k after ZF processing is given by yk = √ pkhkwkuk + Zk. (6.3) Hence, the maximum achievable date rate of the k-th user during the fading block is given by the maximum mutual information between uk and yk and is given by rk = log2 ( 1 + pk|hkwk|2 σ2z ) . (6.4) Let A = {k ∈ [1, K] : pk > 0} be the admissible user set (set of user indices with positive power allocation). Due to the ZF processing, we have cardinality constraint on A, i.e. |A| ≤ nT . Furthermore, we assume the total transmit power from the base station is constrained by P0, i.e.∑ k∈A pk ≤ P0. 6.2.2 Source Model - Delay Sensitive and Delay Insensitive Consider a system with K users consisting of two classes of users (delay sensitive and delay insensitive), as shown in Fig. 6.1. Packets of each user k arrive at the user’s queue (at random arrival time) according to a Poisson process with independent rate λk, with each packet of fixed size F2. Each user k has a mean packet delay requirement τk. The nature of k-th user’s application 2In order to avoid partial delivery problem in the subsequent analysis (i.e. for simplicity of analysis, we assume a packet will not be digested over multiple time slots), the file size F defined here are assumed to be small enough compared to service rate. 87 p1 p1 p2 p1 p2 p3 p4 p1 p2 data queues Heterogeneous Scheduler p1 update data buffer p1 p1 p2 p2 p3 p3 User 1 User 2 User K User K-1 K 1 Class-1 users power constraint delay constraint queueing state Q channel state H rate allocation power allocation active user set K 2 Class-2 users Figure 6.1 Queueing model and scheduling model is thus characterized by the tuple (λk, τk), representing the average incoming traffic rate and delay requirement. We further assume that the same class users have the same tuple (λk, τk) setting. The transmission process for each user can be modeled as an M/G/1 queue [67] with non- selection vacation (If the user is not selected in current time slot). Define the average system time of user k (queueing time and transmission time) as E[Tk]: E[Tk] = E[Wk] + E[Xk], (6.5) where E[Wk] is the expected waiting time in queue before the packets start being served; E[Xk] is the average transmission time for k-th user’s packets. 6.3 Formulation of the Cross-layer Design for Heterogeneous Users The scheduling design can be modeled as an optimization problem in the resource space to maximize the system level performance under some physical layer constraints (such as the transmit power and multiplexing scheme) and network layer constraints (such as delay requirements). We 88 shall consider the average system throughput as the optimization objective. Uthp(r1, . . . , rK) = E [Gthp(r1, .., rK)] = E [∑ k∈A rk ] , (6.6) where the expectation E[·] is taken over all channel state and queue state realization; Gthp de- notes the instantaneous system goodput. The scheduling problem can be cast into the following optimization problem: Problem 6.1 Cross-Layer Formulation Choose the admissible user set policy {A(H,Q)}, the power allocation policy {pk(H,Q)} as well as the rate allocation policy {rk(H,Q)}3 so as to maximize the average system throughput in (6.6) subject to average power constraint, delay constraint and degree of freedom constraint, i.e.: max sk∈[0,1],pk≥0 E [∑ k sk log2 ( 1 + pk|hkwk|2 σ2z )] (6.7) s.t. C1 : ∑ k sk ≤ nT C2 : E[ ∑ k skpk] ≤ P0 C3 : E[Tk] ≤ τk,∀k ∈ [1 : K], where H and Q represent the channel state and queueing state respectively; sk is an indicator which has sk = 1 if user k is selected and sk = 0 otherwise. C1 is degree of freedom constraint due to the ZFBF transmit scheme; C2 is the average total power constraint; And C3 is the delay requirement of each user on average system time E[Tk]. The solution of above optimization problem (6.7) is not explicit due to the fact the average delay constraint in C3 is not in the form of optimizing parameters ({rk},{pk} and {sk}). Thus we shall first establish the relationship between system time (Tk) and transmission rate rk in the following lemma. 3Assuming perfect channel state information is available and powerful coding such as LDPC is used, the optimal rate is approximated by Shannon Capacity (6.4) 89 Lemma 5 (Equivalent Delay Constraint) A necessary and sufficient condition of delay constraint C3 in (6.7) is E[Xk] + λkE[X 2 k ] + λE[Xk](E[s¯k]/E[sk])(ts) 2 (1− λkE[s¯k]/E[sk]) ≤ τk, (6.8) where Xk is the transmission time of the packet of user k; λk and τk are respectively the incoming rate and delay requirement of user k; E[sk] denotes the selection probability of user k and E[s¯k](= 1− E[sk]) is the probability that user k is not selected. Corollory 1 In terms of transmission rate rk, a necessary condition for delay constraint in (6.8) is: E[skrk] ≥ ρk (6.9) where ρk = (2− λkts)E[sk] + λk(2τk + ts) + √ c− b2/a 4τk F, where sk is the selection indicator and a, b, c is respectively given by a = (2 − λkts)2 + 8λkτk, b = (4λkts − 8λkτk − 2λk(λkts)(2τk + ts)) and c = (λk(2τk + ts))2; F is the packet size; ts is the time slot duration (2ms). Proof 5 Please refer to Appendix 6A. With the result from Corollary 1, the cross-layer scheduling problem in Eqn. (6.7) can be reformulated as: max sk∈{0,1},pk≥0 E [∑ k sk log2 ( 1 + pk|hkwk|2 σ2z )] (6.10) s.t. C˜1 : ∑ k sk ≤ nT C˜2 : E [∑ k skpk ] ≤ P0 C˜3 : E [ sk log2(1 + pk|hkwk|2 σ2z ) ] ≥ ρk. Notice that the ρk (given by Eqn.(6.9)) is a function of selection probability, incoming rate and delay requirement. The solution of optimization problem in Eqn.(6.10) can be found by Lagrange method described in the next section. 90 6.4 Solution of the Cross-Layer Optimization Problem Note that the problem of cross-layer scheduler design in Eqn.(6.10) is a mixed convex opti- mization (on pk) and combinatorial search problem (on active set A). The optimal solution can be obtained through two steps by separating the binary variable (s1, ..., sK) from the continuous variable (p1, .., pK). 6.4.1 Convex Optimization on (p1, .., pK) Given any active user set {s1, ..., sK}, the optimizing power vector (p1, .., pK) of the optimiza- tion problem in Eqn.(6.10) is determined by the following Lagrangian: L(pk) = E [∑ k∈A log2(1 + pk|hkwk|2 σ2z ) ] −γk ( E [ log2(1 + pk|hkwk|2 σ2z ) ] − ρk ) +µ ( E[ ∑ k∈A pk]− P0 ) . (6.11) Thus for any given channel realization H, the optimal power allocation can be determined by: L˜(pk) = ∑ k∈A log2 ( 1 + pk|hkwk|2 σ2z ) − γk ( log2 ( 1 + pk|hkwk|2 σ2z ) − ρk ) + µ (∑ k pk − P0 ) . (6.12) The first order derivative on pk from above equation gives the optimal power vector, which is a result of multi-level water-filling p∗k = ( 1− γk µ − σ 2 z |hkwk|2 )+ (6.13) for all k ∈ A, where {γk} and µ are lagrangian parameters determined by KKT condition: γk ( E [ log2 ( 1 + pk|hkwk| 2 σ2z )] − ρk ) = 0 E [∑ k∈A pk ]− P0 = 0. (6.14) Since there is no closed-form solution for {γk} and µ. We shall devise a Lagrangian multiplier finder algorithm described in Appendix 6B to obtain the numerical solution of {γk} and µ. 91 6.4.2 Combinatorial Search on Admissible Set This step is to find the optimal binary vector (s1, .., sK) satisfying the constraint ∑ k sk ≤ nT . The sum rate can be maximized by exploiting the multi-user diversity gain while at the same time maintaining the delay constraints for all users. The optimal active set can be obtained by performing exhaustive search among all possible ac- tive user sets and the total search space is given by ∑nT m=1  K m . However, at moderate K and nT , the computational complexity of the optimal search algorithm is huge and is beyond imple- mentation limit. Hence, we shall apply the low-complexity genetic selection algorithm introduced in Appendix 3A (Chapter 3) for the search of A. 6.5 Numerical Results and Discussions For illustration, we consider two types of users in the system, namely the K1 delay-sensitive users and the K2 delay-insensitive users. The system bandwidth is 20kHz and the packet size is assumed to be F = 80 bits. Each simulation point is obtained by 5000 channel fading realizations. 6.5.1 Delay Performance of the Proposed Scheduler Figure 6.2 illustrates the mean packet delay (given by average system time E[Tk]) of two classes users versus delay insensitive background traffic. It is observed that for the proposed optimal heterogeneous scheduler, delay constrained users maintain the target delay requirement in a stable way with respect to the increasing traffic load of class-2 delay insensitive users (For example the delay constraint for class-1 users is 5 time slots in Fig. 6.2). Hence the delay sensitive application is almost not affected by the increasing traffic loading of delay insensitive application, which is highly desirable in the wireless system where heterogeneous applications coexist. On the other hand, the mean packet delay of class-2 users increases rapidly with the increasing data traffic load. 92 0.1 0.15 0.2 0.25 0.3 0 50 100 150 200 250 300 350 The incoming rate for delay insensitive user, Power SNR = 10 dB Pa ck et m ea n de la y tim e class−1 user 1 (delay constraint 5) class−1 user 2 class−2 user (delay constraint 1000) class−2 user 2 Figure 6.2 Mean packet delay (number of time slots) of two class users versus background data traffic λ (packets/time slot) (BW = 20kHz, nT =4, ts = 2ms) 93 6.5.2 System Throughput Performance Figure 6.3 compares the proposed optimal heterogeneous scheduler with the heuristic hetero- geneous scheduler proposed in Chapter 4 (also in [68]) and the baseline Round-robin scheduler (RRS). The heuristic heterogeneous scheduling design in Chapter 4 gives priority to the delay sen- sitive users in a heuristic way regardless of their channel condition. In RRS, the users take turns to transmit regardless of their channel condition and delay requirements. With the delay requirement (τ1 = 10, τ2 = 1000 time slots), the optimal heterogeneous sched- uler has a significant capacity gain over the heuristic heterogeneous scheduler for both high SNR (solid lines, 16dB) and low SNR (dashed lines, 6dB) cases at different nT s. Notice that the pro- posed scheduler exhibits higher capacity gain over nT (by more effectively exploiting multiplexing gain and multi-user diversity gain) than the heuristic scheduler. It can be also observed that, with- out incorporating the channel state and queue state into the scheduling design, the baseline RRS scheduler suffers a significant capacity loss. 6.5.3 Delay and Power Tradeoff The delay and power tradeoff has been already analytically studied in [37]. We shall present some discussion on the delay and power tradeoff exhibited in the proposed scheduling design. For the proposed scheduling design, there exists a minimum transmit power required to meet all users’ delay constraints. This minimum power is obtained by assigning just enough power to satisfy the inequality constraint in C˜3 of Eqn. (6.10), which is given by:  E [ log2 ( (1−γk) µ |hkwk|2 σ2z )] = ρk Pmin = E ∑ k [( 1+γk µ − σ2z|hkwk|2 )+] , (6.15) where ρk is given in Eqn.(6.9). E[·] is the ensemble average in terms of channel variation. The value of minimum power can be numerically obtained in the step-2 of the iterative Lagrangian multiplier finder algorithm elaborated in Appendix 6B. The behavior of the minimum power-delay tradeoff is characterized in Fig. 6.4, which outlines the feasible power operation region. As is shown, a more stringent delay constraint requires a 94 higher total transmit power. Increasing the number of users and the incoming traffic loading (of delay sensitive users) will both result in a higher minimum power requirement. For example, increasing the user numbers from {K1 = 2, K2 = 2} to {K1 = 4, K2 = 6} doubles the required minimum power at delay constraint τ2 = 5 time slots. Appendix 6A: Proof the Lemma 5 and Corollary 1 - Proof of Lemma 5 In the proposed scheduling framework, the buffer for each user can be modeled as an M/G/1 queue [67]. Due to the fact there will be the non-section time slot when the user is not selected, it can be further modeled as an M/G/1 queue with non-selection vacation. We shall the derive delay performance of each user with the model of M/G/1 queue with non-selection based on queueing theory. Consider the j-th data packet of user k arriving its queue (For notation simplicity, we shall drop the user index k in the derivation), the average system time of this packet E[T ] (including the time spent in queue and in transmission) is given by: E[T ] = E[W ] + E[X], (6.16) where E[X] is the average transmission time for this packet; E[W ] is the expected waiting time in queue before being served. As shown in Fig. 6.5, the waiting time W consists of three parts [67]:(1) the residual time R which means the remaining time for digesting the current packet being served when j-th data packet arrives; (2) the total transmission time for the NQ packets (the sum of NQ packets’ trans- mission time ∑NQ k=1 E[Xk]) currently in the queue when j-th packet arrives ∑j−1 n=j−NQ Xn; (3) the average vacation time due to non-selection (E[ZT ]). Thus the expected waiting time E[W ] is given by: E[W ] = E[R] +NQE[X] + E[ZT ]. (6.17) The mean transmission time E[X], average residual time E[R] and the average non-selection vacation time ZT are respectively elaborated in the following. 95 2 4 6 8 10 12 0 5 10 15 Number of transmit antenna nT, K1 = 8, K2=8 Su m ra te o f a ll u se rs (b its /H z/s ) optimal sch, SNR=16dB optimal sch, SNR=6dB heuristic sch, SNR=16dB heuristic sch, SNR=6dB RRS sch, SNR=16dB RRS sch, SNR=6dB Figure 6.3 Comparison of optimal, heuristic heterogeneous schedulers and Round-Robin scheduler on Spatial multiplexing gains over nT (BW = 20kHz, K1 = 8, K2 = 8, ts = 2ms, SNR = 6 dB and 16 dB) 96 0 5 10 15 20 25 30 35 40 0 2 4 6 8 10 12 14 16 18 20 Delay constraint for 1st−class user τ1 (number of time slots) M in im um to ta l p ow er delay and minimum power tradeoff nT=4, K1=4, K2=6, λ1 = 0.4 nT=4, K1=4, K2=6, λ1 = 0.2 nT=4, K1=2, K2=2, λ1 = 0.2 Figure 6.4 Minimum transmission power versus first class users delay requirement the packet being served j-th arriving packet waiting time due to the existing N Q packets and non-selection time slot: residual time R : remaining service time of the packet being served when j-th packet arrives queue buffer for user k : with N Q packets in buffer when j-th packet arrives j-1 j-N Q X j-1 (t)+... +X j-N Q (t) + Z T (t) Figure 6.5 Waiting time model consisting of three parts 97 Mean packet transmission time E[X]: Considering i-th time slot for user k, si denotes the se- lection indicator which has si = 1 when the user is selected and si = 0 otherwise. ri is the transmission rate for the user (unvarying within the time slot (ts = 2ms)). ni refers to the total number of transmitted packets (of user k) within time slot i which is given by ni = ritsF . The average packet transmission time of the investigated user can be approximated as the total transmission time divided by the total number of packets digested, i.e: E[X] = lim N−>∞ ∑N i=1 sits∑N i=1 sini = lim N−>∞ 1 N ∑N i=1 sits 1 N ∑N i=1 si rits F = E[sj]F E[sjrj] . (6.18) Calculation of mean residual time E[R]: The mean residual time E[R] is calculated in a similar way to that of M/G/1 queues with vacations [67]. which is given by: E[R] = lim t→+∞ 1 t ∫ t 0 r(τ)dτ = lim t→+∞ ( M(t) t ∑M(t) i=1 1 2 X2i M(t) + L(t) t ∑L(t) i=1 1 2 Z2i L(t) ) = λE[X2] 2 + λE[X] 2 E[s¯] E[s] ts. (6.19) Expected waiting time modeling in terms of E[R] and E[s]: By expressing the selection prob- ability as E[s] = NQE[X] NQE[X]+E[ZT ] , the mean waiting time in (6.17) is also given by E[W ] = E[R] + NQE[X] E[s] . By applying NQ = λE[W ] (Little’s theorem) and ρ = λE[X], we obtain the following modified Pollaczek-Khinchin formula: E[W ] = E[R] 1− ρ/E[s] . (6.20) By substituting Eqn.(6.16) ∼ (6.20)to the delay constraint for user k on system time E[Tk] = E[Wk] + E[Xk] ≤ τk, the delay constraint is equivalently given by: E[Xk] + λE[X2k ] + ρ(E[s¯k]/E[sk])ts 2(1− ρ/E[sk]) ≤ τk, (6.21) which is the expression in Eqn.(6.8). - Proof of Corollary 1 98 With the fact that E[X2k ] = V ar[Xk] + (E[Xk]) 2 ≥ (E[Xk])2, a necessary condition for the delay requirement on system time in Eqn.(6.21) is achieved by: E[Xk] + λ(E[Xk]) 2 + ρ(E[s¯k]/E[sk])ts 2(1− ρ/E[sk]) ≤ E[Xk] + λE[X2k ] + ρ(E[s¯k]/E[sk])ts 2(1− ρ/E[sk]) ≤ τj. (6.22) From Eqn.(6.18), we have E[sk]F E[skrk] + λ( E[sk]F E[skrk] )2 + ρ(E[s¯k] E[sk] )ts 2(1− ρ E[sk] ) ≤ τk. (6.23) Solving the standard quadratic inequality, a necessary condition for delay constraint C3 in Eqn.(6.7) is established in terms of rate rk: E[skrk] ≥ (2− λkts)E[sk] + λj(2τk + ts) + √ c− b2 4a 4τk F , ρk, where a = (2−λkts)2+8λkτk, b = (4λkts−8λkτk−2λk(λkts)(2τk+ts)) and c = (λk(2τk+ts))2. Appendix 6B: Iterative Lagrange Multiplier Search Algorithm The optimal rate allocation and power allocation strategies in (6.4) and (6.13) are obtained in terms of the Lagrange multipliers. By substituting the power allocation (6.13) into (6.14), the Lagrange multipliers (γk and µ) is given by the solutions of the following equations: γk ( E [( log2 ( (1− γk) µ |hkwk|2 σ2z ))+] − ρk ) = 0 (6.24) and E [∑ k∈A ( 1− γk µ − σ 2 z |hkwk|2 )+] = P0. (6.25) There is no closed-form solution for the Lagrange multipliers µ and γk from the above system of equations ((6.24) and (6.25)). Thus we shall resort to the iterative numerical searching method to determine the µ and γk. A Lagrangian multiplier finder algorithm is devised based on bisection searching method. 99 According to the homogeneous characteristic among the same class of users, we only need to determine two distinct γk for all users (γ1 for class-1 user and γ2 for class-2 user). The flow chart of Lagrangian multiplier finder algorithm is illustrated in Fig. 6.6. Without loss of generality, let index j = 1 represent a particular user from class 1 and index j = 2 a particular user from class-2. The γ1 for class-1 user and γ2 for class-2 user can be respectively determined by the representative user (j = 1, 2) from each class. To find the Lagrange multiplier µ and γ = {γ1, γ2}, we define the following bisection functions. fj(µ, γ) = γj [ 1 N N∑ n=1 ( log2 [ (1 + γj) µ |hj(n)wj(n)|2 σ2z ])+ − ρj ] (6.26) and P (µ, γ) = P0 − 1 N N∑ n=1 ∑ k∈A [( 1 + γk µ − σ 2 z |hk(n)wk(n)|2 )+] , (6.27) where N is the number of time slots that is to be averaged for approximating the ensemble average in (6.24). Eqn.(6.26) is the bisection function used to determine the optimal vector γ∗ for given µ, which is based on the delay constraint equation (Eqn.(6.24)). Eqn.(6.27) is the bisection function to determine the optimal µ∗ based on the average total power constraint (Eqn.(6.25)). Notice that the ensemble average in the system of equations Eqn.(6.24) and Eqn.(6.25) is approximated by time average in the bisection functions. The Lagrangian multiplier finder algorithm consists of the following three major steps: Step 1 - Initialization: Choose an arbitrary µ, initialize a feasible search region for γ1 and γ2 denoted as [γj,0, γj,0], such that  fj(µ, γj,0) 0 for j = [1, 2] . Step 2 - bisection search on γ1 and γ2: (a) For user j = [1, 2], we shall update γj,n and {γj,n, γj,n} based on Eqn. (6.28) until |fj(µ, γ)|2 ≤ ε/2 . γj,n = γj,n + γj,n 2 , 100 γj,n+1 =  γj,n if fj(µ, γj,n) > 0γj,n if fj(µ, γj,n) < 0 and γj,n+1 =  γj,n if fj(µ, γj,n) > 0γj,n if fj(µ, γj,n) < 0 , where n is the iteration index; ε is the error tolerance for stopping criteria. (b) Repeat bisection algorithm in (a) until we find a γ∗ such that (|f1(µ, γj,n)|2+f2(µ, γj,n)|2) ≤ ε where fj(µ, γ) is given by Eqn. (6.26) for j = [1, 2]. At this moment, the total consumed power reaches the minimum power level Pmin required to satisfy all users rate constraint (constraint C˜3 in Eqn. 6.10). Step 3 - Redistribution of the remaining power by adjusting µ using bisection method: Given γ∗(µ) obtained in step 2, determine the remaining power (P (µ, γ) = P0 − Pmin) from Eqn. (6.27). As illustrated in Fig. 6.6, if P (µ, γ) < 0 , the problem is infeasible because the pro- vided power is insufficient to meet all the delay requirements. If P (µ, γ) = 0 , then {µ, γ∗} obtained in step 2 is the solution. If P (µ, γ) > 0, it means there exists remaining power to be allocated and the solution is obtained as follow. Given {µ, γ∗} obtained in Step 2, we first initialize a feasible search region of µ , denoted as [µ0, µ0] such that  P (µ, γ(µ0)) 0 . The search for the correct µ∗ is based on the following bisection iterative procedure: µn = µn + µn 2 , µn+1 =  µn if P (µn, γ∗(µn)) > 0µn if P (µn, γ∗(µn)) < 0 and µn+1 =  µn if P (µn, γ∗(µn)) > 0µn if P (µn, γ∗(µn)) < 0 . For each µn obtained from Eqn.6.28, repeat Step 1 and Step 2 to update γ∗(µn) . The iteration on µn in Eqn.6.28 terminates until |P (µn, γn)|2 < ε. The final solution for Lagrange multiplier is given by {µ∗, γ∗(µ∗)}. 101 Exit: Infeasible 0 min Is ? (Check once only) P P≥ No Exit: Feasible Yes * * 1 2 2 * Given , find { , } with bisection method till ( , ) (Step 2) µ γ γ µ ε<f γ 0 1 2 Initialize with and feasible search region of { , } (Step 1) µ µ γ γ 2 *Is ( , ( )) ?n nP µ µ ε<γ Update based on bisection method using Eqn. (17) (Step 3) nµ No Yes Figure 6.6 Flow chart of iterative lagrange multiplier algorithm. 102 Chapter 7 Conclusions and Future Work 7.1 Conclusions In this thesis, we first investigate the performance of cross-layer scheduling with imperfect CSIT (due to estimation error or outdatedness) in downlink multi-user MISO and uplink multi- user SIMO systems. We found that while the system performance (average system throughput) improves quickly as the number of antennas in the base station (nT or nR) increases (due to spatial multiplexing) with perfect CSI, the system performance suffers a significant loss on the system throughput gain in the presence of outdated CSI or imperfect CSI. This is due to the mis-scheduling and packet outage problems. To capture the effect of potential packet transmission outage due to the imperfect CSIT, we de- fine the average system goodput, which measures the average b/s/Hz successfully delivered to the K mobiles, as the performance objective. Followed by two heuristic schemes targeted for realiz- ing the potential spatial multiplexing gains, a systematic and optimal framework for the cross-layer scheduling design with imperfect CSI constraint and discrete rate set constraint are proposed. We introduce some special structures on the scheduling algorithm in order to simplify the optimization. Specifically, the problem is decomposed into two parts: the optimal inner scheduling based on im- perfect CSIT and the optimal transmission modes design based on inner scheduling output. We formulate the cross-layer design as a mixed convex and combinatorial optimization problem with respect to the imperfect CSIT statistics. By applying a Chi-square approximation on the outage probability, we obtain a closed-form solution for the rate and power adaptation for any given target 103 packet error probability. The offline transmission mode design for rate adaptation is formulated as an optimization problem equivalent to the conventional scalar quantization problem, which can be effectively solved by Lloyd algorithm. By considering the statistic of CSIT errors into the design, we have shown that the proposed schemes provide significant goodput enhancement. Robust scheduling and rate adaptation with respect to imperfect CSIT assume delay-tolerant applications (homogeneous users), in which the objective is to maximize the system goodput re- gardless of how much delay a user’s packet may experience. This is not realistic for wireless multimedia applications. In Chapters 5 and 6, cross-layer scheduling for heterogenous users appli- cation are investigated. We first propose a heuristic heterogeneous scheduling in which scheduling priority is given to delay stringent users (voice users) in a naive way. If there is any remaining resource (both power and spatial channel) after the voice user scheduling, it will be distributed to the data users in an optimal way. The proposed heterogeneous scheduler ensures a stable quality of service for voice users. Yet it cannot guarantee any explicit delay requirement due to the heuristic design. In Chapter 6, we formulate the cross-layer heterogeneous scheduling as an optimization problem with a specific delay constraint for each user. By considering the statistic of channel state and queue state into the design, the proposed scheme obtains significant throughput gain and desired delay performance. 7.2 Future Work The work presented in this thesis can be extended in various ways. Here we give some examples for potential future research. • Cross-layer scheduling with heterogeneous delay constraints and imperfect CSIT In the thesis, the cross-layer scheduling design for heterogenous users application assumed perfect CSIT for simplicity. It is straightforward to extend this work to study robust schedul- ing design with heterogeneous delay constraints for imperfect CSIT. Instead of maximizing 104 the average system throughput subject to delay requirements, the objective could be maxi- mizing the average system goodput (due to the transmission outage) or proportional fairness subject to heterogenous delay constraints. • Robust beamforming with imperfect CSIT for the cross-layer scheduling We are assuming linear Zero-forcing processing and MMSE beamforming at the base station throughout the thesis. The ZFBF and MMSE beamforming weights are obtained based on the estimated CSI as if they were perfect. This actually simplifies the design and leads to sub- optimal beamforming configuration. An interesting extension is to regard the beamforming weight as the optimization parameters in the design framework. It would be interesting to jointly optimize the beamforming weights, power allocation, rate allocation and user selec- tion to maximize the average system goodput based on the error statistic of CSIT. • Cross-layer scheduling design in multi-cell wireless systems In this thesis, we are considering cross-layer scheduling for a single cell wireless system with a centralized scheduler. Basically the base station determines the scheduling output and co- ordinates the transmission among users to maximize the system capacity (with perfect CSIT) or goodput (with imperfect CSIT). In a practical multiple cells wireless system (with multi- antenna base stations and single-antenna users), there exists multi-cell interference besides multi-user interference within the cell. The multi-cell cooperation is expected to be able to effectively reduce the interference throughout the network. An interesting approach is to put the MAC layer scheduler in the base station controller (BSC) side, which determines the rate and power allocation for the users in all cells. The centralized scheduling in BSC needs cooperation among multiple cells and may require huge communication overheads. One possible simplifying strategy is to apply a distributed/local cross-layer scheduling design within each cell, which has no cooperation with other cells. When considering the imperfect CSIT, the above problems are even more interesting and of practical value. 105 List of References [1] C. Smith and J. Meyer, 3G Wireless with WiMAX and Wi-Fi: 802.16 and 802.11. McGraw- Hill, 2005. [2] T. S. Rappaport, Wireless Communications: Principles and Practice. Prentice Hall PTR, second ed., 2002. [3] Y. Kim, B. Jeong, and J. Chung, “Beyond 3G: Vision, requirements, and enabling technolo- gies,” IEEE Commun. Mag., pp. 120–124, March 2003. [4] A. Bahai, B. Saltzberg, and M. Ergen, Multi-carrier Digital Communications: Theory and Applications of OFDM. Springer, 2004. [5] S. Dixit and R. Prasad, Wireless IP and Building the Mobile Internet. Artech House Publish- ers, 2002. [6] M. Cardei, I. Cardei, and D. Du, Resource Management in Wireless Networking. Springer, 2005. [7] V. K. Lau and R. Y. Kwok, Channel Adaptive Technologies and Cross Layer Designs for Wireless Systems with Multiple Antennas. John Wiley Sons, first ed., 2006. [8] C. Shannon, “A mathematical theory of communication,” Bell System Technical Journal, vol. 27, pp. 379–423, July 1948. [9] G. J. Foschini and M. J. Gans, “On the limits of wireless communications in a fading envi- ronment,” Wireless Personal Communications, vol. 6, pp. 315–335, November 1998. [10] E. Telatar, “Capacity of multi-antenna Gaussian channels,” European Trans on Communs., vol. 39, pp. 585–595, November 1999. [11] S. Alamouti, “A simple transmit diversity technique for wireless communications,” IEEE J. Select. Areas Commun., vol. 16, pp. 1451–1458, October 1998. [12] N. S. V. Tarokh and A. Calderbank, “Space-time codes for high data rate wireless communica- tion: Performance criterion and code construction,” IEEE Trans. on Inform. Theory, vol. 44, pp. 744–765, March 1998. 106 [13] S. Borst and P. Whiting, “The use of diversity antennas in high-speed wireless systems: ca- pacity gains, fairness issues, multi-user scheduling,” Bell labs. Tech. Mem, 2001. [14] G. J. Foschini, “Layered space-time architecture for wireless communication in a fading en- vironment when using multielement antennas,” Bell System Techn. J., vol. 1, pp. 41–59, Au- tumn 1996. [15] L. Zheng and D. Tse, “Diversity and multiplexing: a fundamental tradeoff in multiple-antenna channels,” IEEE Trans. on Inform. Theory, vol. 49, pp. 1073–1096, May 2003. [16] R. N. A. Paulraj and D. Gore, Introduction to Space-Time Wireless Communications. Cam- bridge University Press, first ed., 2003. [17] C. Chen and L. Wang, “A unified capacity analysis for wireless systems with joint antenna and multi-user diversity in Nakagami fading channels,” Communications, 2004 IEEE Inter- national Conference on, vol. 6, 2004. [18] J. R. A. Alexiou and A. Gameiro, “QoS-based multi-user scheduling in MIMO systems,” IEEE PIMRC 2005, vol. 2, pp. 837–841, September 2005. [19] C. Chen and L. Wang, “A unified capacity analysis for wireless systems with joint multiuser scheduling and antenna diversity in Nakagami fading channels,” IEEE Trans. on Communi- cations, vol. 54, pp. 469–478, March 2006. [20] A. Jalali, R. Padovani, and R. Pankaj, “Data throughput of CDMA-HDR a high efficiency- high data rate personal communication wireless system,” in Proc. IEEE Vehicular Technology Conf., vol. 3, pp. 1854–1858, May 2000. [21] P. Bender, P. Black, M. Grob, R. Padovani, N. Sindhushyana, and S. Viterbi, “CDMA/HDR: a bandwidth efficient high speed wireless data service for nomadic users ,” IEEE Commun. Mag., vol. 7, pp. 70–77, July 2000. [22] T. R. S. Shakkottai and P. Karlsson, “Cross-layer design for wireless networks,” IEEE Com- mun. Mag., vol. 41, pp. 74–80, October 2003. [23] R. Berry and E. Yeh, “Cross-layer wireless resource allocation,” IEEE Signal Processing Magazine, vol. 21, pp. 59–68, September 2004. [24] D. Tse and S. V. Hanly, “Multiaccess fading channels - Part I: polymatroid structure, opti- mal resource allocation and throughput capacities,” IEEE Trans. on Inform. Theory, vol. 44, pp. 2797–2815, November 1998. [25] K. N. Lau and Y. K. Kwok, “On the synergy between adaptive physical layer and multiple- access control for integrated voice and data services in cellular networks,” IEEE Trans. on Vehicular Technologies, pp. 1338–1351, November 2002. 107 [26] H. Viswanathan and K. Kumaran, “Rate scheduling in multiple antenna downlink,” proceed- ings of the Allerton conference on Communications and control, Monticello, IL, October 2001. [27] K. N. Lau, Y. Liu, and T. A. Chen, “Optimal Space-Time Scheduling for Wireless Commu- nications with Partial Power Feedback ,” Bell Labs Technical Journal, November 2002. [28] R. Gozali, R. Buehre, and B. Woerner, “On the performance of scheduling over space-time architectures,” Proc. IEEE Vehicular Technology Conf., pp. 420–424, September 2002. [29] T. Yoo and A. Goldsmith, “Capacity of fading MIMO channels with channel estimation er- ror,” 2004 IEEE International Conference on Communications, June 2004. [30] S.Serbetli and A.Yener, “Transmission strategies for correlated MIMO links with imperfect channel estimates,” Communications, 2005. ICC 2005. 2005 IEEE International Conference on Volume 2, May 2005. [31] M.Bengtsson, “Pragmatic multi-user spatial multiplexing with robustness to channel estima- tion errors,” IEEE ICASSP ’2003, April 2003. [32] P. Kyritsi, R. Valenzuela, and D. Cox, “Channel and capacity estimation errors,” Communi- cations Letters, IEEE, vol. 6, pp. 517–519, December 2002. [33] M. Shankar and K. Hari, “On the variations in capacity of MIMO communication system to channel perturbations,” ICPWC’2002, pp. 76–80, December 2002. [34] H. Fattah and C. Leung, “An overview of scheduling algorithms in wireless multimedia net- works,” Wireless Communications, IEEE [see also IEEE Personal Communications], vol. 9, no. 5, pp. 76–83, 2002. [35] K. Johnsson and D. Cox, “An adaptive cross-layer scheduler for improved qos support of mul- ticlass data services on wireless systems,” Selected Areas in Communications, IEEE Journal on, vol. 23, no. 2, pp. 334–343, 2005. [36] S. Z. Qingwen Liu and G. Giannakis, “Cross-layer scheduling with prescribed QoS guaran- tees in adaptive wireless networks,” Selected Areas in Communications, IEEE Journal on, vol. 23, pp. 1056–1066, May 2005. [37] R. Berry and R. Gallager, “Communication over fading channels with delay constraints,” IEEE Trans. on Inform. Theory, pp. 1135–1149, May 2002. [38] M. Kountouris, A. Pandharipande, H. Kim, and D. Gesbert, “QoS-based user scheduling for multiuser MIMO systems,” Proceedings of VTC 2005-Spring, vol. 1, pp. 211–215, May 2005. [39] B. Sklar, “Rayleigh fading channels in mobile digital communication systems Part I: Charac- terization,” IEEE Commun. Mag., pp. 90–100, July 1997. 108 [40] B. Sklar, “Rayleigh fading channels in mobile digital communication systems Part II: miti- gation,” IEEE Commun. Mag., pp. 102–109, July 1997. [41] M. Jankiraman, Space-Time Codes and MIMO Systems. Artech House, first ed., 2004. [42] B. Vucetic and J. Yuan, Space-Time coding. New York: Wiley, first ed., 2003. [43] A. Pascual-Iserte, “Channel State Information and Joint Transmitter-Receiver Design in Multi-Antenna Systems,” PhD Thesis, Universitat Politcnica de Catalunya, 2005. [44] Y. Zhang, “Adaptive Multiple Access and Resource Allocation with QoS for Broadband OFDM Wireless Networks,” PhD Thesis, Hong Kong University of Science and Technology, 2004. [45] K. N. Lau, “Optimal downlink space-time scheduling design with convex utility functions – multiple antenna systems with orthogonal beamforming,” IEEE Trans. on. Vehicular Tech- nology, pp. 1322–1333, July 2005. [46] T. Yoo and A. Goldsmith, “On the optimality of multi-antenna broadcast scheduling using zero-forcing beamforming,” IEEE JSAC Special Issue on 4G Wireless Systems, 2006, March 2006. [47] M. Schubert and H. Boche, “Solution of the multi-user downlink beamforming problem with individual SINR constraints,” IEEE Trans. on. Vehicular Technology, pp. 18–28, January 2004. [48] B. Hassibi and B. Hochwald, “How much training is needed in multiple-antenna wireless links?,” IEEE Trans. on Info. Theory, vol. 49, pp. 951–963, April 2003. [49] V. Lau and Y. Kwok, “Performance analysis of SIMO space-time scheduling with convex utility function: zero-forcing linear processing,” IEEE Tran. Veh. Technol., vol. 53, pp. 339– 350, 2004. [50] T. M. Cover and J. A. Thomas, Elements of Information Theory. John Wiley and Sons, second ed., 1991. [51] J. H. Holland, Adaptation in Natural and Artificial Systems. University of Michigan Press, first ed., 1975. [52] P. Xia, S. Zhou, and G. Giannakis, “Multiantenna adaptive modulation with beamforming based on bandwidth-constrained feedback,” IEEE Trans. on Communications, pp. 526–536, March 2005. [53] B. Hochwald, T. Marzetta, and V. Tarokh, “Multiple-antenna channel hardening and its im- plications for rate feedback and scheduling,” IEEE Trans. on Info. Theory, pp. 1893–1909, September 2004. 109 [54] M. Sharif and B. Hassibi, “On the capacity of MIMO broadcast channels with partial side information,” IEEE Trans. on Info. Theory, pp. 506–522, February 2005. [55] N. Jindal, “Finite rate feedback MIMO broadcast channels,” Information Theory and Appli- cations (ITA), inaugural workshop, UCSD, 2006. [56] P. Viswanath, D. Tse, and R. Laroia, “Opportunistic beamforming using dumb antennas,” IEEE Trans. on Info. Theory, pp. 1277–1294, June 2002. [57] S. Kay, Fundamentals of statistical signal processing, Volume I: estimation theory. Prentice Hall, first ed., 1993. [58] A. Liavas, “Tomlinson-Harashima precoding with partial channel knowledge,” IEEE Trans. on Communications, pp. 5–9, January 2005. [59] T. Richardson, M. Shokrollahi, and R. Urbanke, “Design of capacity-approaching irregular low-density parity-checkcodes,” Information Theory, IEEE Transactions on, vol. 47, no. 2, pp. 619–637, 2001. [60] G. Caire, “MIMO Downlink Joint Processing and Scheduling: a survey of classical and recent results,” Information Theory and Applications (ITA), inaugural workshop, UCSD, 2006. [61] S. Lloyd, “Least squares quantization in PCM,” IEEE Trans. on Communications, pp. 129– 137, March 1982. [62] R. M. G. Allen Gersho, Vector Quantization and Signal Compression. Kluwer Academic Publishers,London, first ed., 1991. [63] R. Heath, M. Airy, and A. Paulraj, “Multiuser diversity for MIMO wireless systems with lin- ear receivers,” Proc. of IEEE Asilomar Conf. on Signals, Systems, and Computers, pp. 1194– 1199, November 2001. [64] J. Zhang, E. Chong, and D. Tse, “Output MAI distributions of linear MMSE multiuser re- ceivers in CDMA systems,” IEEE Trans. on Inform. Theory, pp. 1128–1144, March 2001. [65] B. Goode, “Voice over Internet protocol (VoIP),” Proceedings of the IEEE., pp. 1495–1517, September 2002. [66] S. A. Kouhei Fujimoto and M. Murata, “Statistical analysis of packet delays in the Internet and tts application to playout control for streaming applications,” IEICE Trans. on Communs., pp. 1–9, May 2001. [67] D. Bertsekas and R. Gallager, Data Networks. Prentice-Hall, second ed., 1992. [68] K. N. Lau, M. L. Jiang, S. Liew, and O. C. Yue, “Performance analysis of downlink multi antenna scheduling for voice and data applications,” Proc. 42nd Allerton Conf. Commun., Control and Comp., September 2004. Meilong Jiang Dept. of Electrical and Electronic Engineering Phone: (852) 2857-8410 Room 807, CYC Building mljiang@ieee.org The University of Hong Kong, Hong Kong mljiang Research Interest 1. Cross layer design in multi-user OFDM/MIMO systems, Ad Hoc wireless systems, and relay-based wireless systems 2. Physical layer algorithm design in OFDM/MIMO-based wireless systems such as channel estima- tion, timing and frequency synchronization, space time coding, multi-user detection, interference cancellation 3. Digital baseband ASIC design, digital hardware design/prototyping for future wireless systems such as WLAN, UWB, and WiMAX Education 1. PhD, Electrical and Electronic Engineering, Jan. 2007, The University of Hong Kong, Hong Kong 2. Master of Science, Electrical and Electronic Engineering, Apr. 2002, Beijing University of Posts and Telecommunications, China 3. Bachelor of Science, Physics, 1st Honor, Jul. 1999, Nanchang University, China Research Experience Research Assistant Sep. 2005 - Dec. 2006 Cross-layer scheduling for downlink multi-user MIMO systems with heterogeneous delay constraints Research Assistant Sep. 2004 - Aug. 2005 Cross-layer scheduling and rate adaptation for downlink multi-user MIMO systems with imperfect channel state information (CSI) Research Assistant Sep. 2003 - Aug. 2004 Space-time uplink scheduling in multi-user multi-antenna systems; space-time downlink scheduling for voice and data application Technical Experience Research Assistant Feb. 2005 - Dec. 2006 Project on MBOA Ultra-wideband (UWB) Wireless Communications Chipset Design Research Assistant Feb. 2004 - Jan. 2005 Project on High Capacity Wireless LAN Access Point Chipset Design Hardware Design Engineer Mar. 2002 - Aug. 2003 Digital IF Design in CDMA2000-1X Base Station, Eastern Communications Ltd./Datang Mobile Ltd., Beijing, PRC Research Assistant Sep. 2000 - Feb. 2002 Project on FPGA implementation of RFID Reader/Writer List of Publications 1) K.N. Lau, M. L. Jiang and Y.J. Liu, ”Analysis of Space Time uplink Scheduling with Channel Estimation Error in Multiple Antennas System,” IEEE Transactions on Wireless Communications, Vol. 5, No. 6, Jun. 2006, pp. 1250-1253. 2) K.N. Lau and M. L. Jiang, ” Performance Analysis of Multi-user Downlink Space-time Scheduling for TDD Systems with Imperfect CSIT,” IEEE Transactions on Vehicular Technologies, Vol. 25, No. 1, Jan. 2006, pp. 296-305. 3) K.N Lau, M. L. Jiang, ” On the Rate Adaptation and Scheduling Design of Downlink Multi-user, Multiple-antenna Base Station with Imperfect CSIT,” under second revision, IEEE Transactions on Wireless Communications, 2006. 4) M.L. Jiang, S.W Hui, K.N. Lau and W.H. Lam, ”Cross-layer Downlink Scheduling of Multi- user Multi-Antenna Systems for Wireless Multimedia Applications with Heterogeneous Delay Con- straints,” to be submitted to IEEE Transactions on Wireless Communications, 2006. 5) M.L. Jiang, S.W Hui, K.N. Lau and W.H. Lam, ” Cross-layer Downlink Scheduling of Multi- user Multi-Antenna Systems for Wireless Multimedia Applications with Heterogeneous Delay Con- straints,” IEEE ISIT2006, Jul. 2006, Seattle, Washington, USA. 6) K.N Lau and M.L. Jiang, ” On the Rate Adaptation and Scheduling Design of Downlink Multi- user, Multiple-antenna Base Station with Imperfect CSIT,” IEEE GLOBECOM 2005, Nov. 2005, St. Louis, MO, USA. 7) M.L. Jiang and K.N. Lau, ” On the design of Uplink Multi-Antenna Space Time Scheduling with CSI error,” IEEE PIMRC 2004, Sep. 2004.. Barcelona, Spain. 8) K.N.Lau, M.L.Jiang, S. Liew and O.C. Yue, ” Performance Analysis of Downlink Multi-Antenna Scheduling for Voice and Data Applications,” Allerton Conference 2004, Sep. 2004, the Allerton House, Monticello, IL, USA.

Các file đính kèm theo tài liệu này:

  • pdfft 2.pdf
Tài liệu liên quan