Next Article in Journal
Discrimination of Transgenic Maize Kernel Using NIR Hyperspectral Imaging and Multivariate Data Analysis
Next Article in Special Issue
Improved Spatial Differencing Scheme for 2-D DOA Estimation of Coherent Signals with Uniform Rectangular Arrays
Previous Article in Journal
Influence of the Distribution of Tag IDs on RFID Memoryless Anti-Collision Protocols
Previous Article in Special Issue
Direction-of-Arrival Estimation with Coarray ESPRIT for Coprime Array
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Topological Interference Management for K-User Downlink Massive MIMO Relay Network Channel

1
Department of Electronics and Information Engineering, Chonbuk National University, Jeonju 561-756, Korea
2
School of Mechanical and Electrical Engineering, Guangzhou University, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Sensors 2017, 17(8), 1896; https://doi.org/10.3390/s17081896
Submission received: 1 July 2017 / Revised: 2 August 2017 / Accepted: 15 August 2017 / Published: 17 August 2017

Abstract

:
In this paper, we study the emergence of topological interference alignment and the characterizing features of a multi-user broadcast interference relay channel. We propose an alternative transmission strategy named the relay space-time interference alignment (R-STIA) technique, in which a K -user multiple-input-multiple-output (MIMO) interference channel has massive antennas at the transmitter and relay. Severe interference from unknown transmitters affects the downlink relay network channel and degrades the system performance. An additional (unintended) receiver is introduced in the proposed R-STIA technique to overcome the above problem, since it has the ability to decode the desired signals for the intended receiver by considering cooperation between the receivers. The additional receiver also helps in recovering and reconstructing the interference signals with limited channel state information at the relay (CSIR). The Alamouti space-time transmission technique and minimum mean square error (MMSE) linear precoder are also used in the proposed scheme to detect the presence of interference signals. Numerical results show that the proposed R-STIA technique achieves a better performance in terms of the bit error rate (BER) and sum-rate compared to the existing broadcast channel schemes.

1. Introduction

As the size of a wireless network increases, interference alignment becomes more complex and challenging. Hence, extensive research is being done for enlarging multiple-input-multiple-output (MIMO) communication strategies to achieve an optimal solution and to reduce the complexity of the interference channels. In particular, K -user MIMO broadcast channels (BC) with a shared relay and channel state information (CSI) are essential for enhancing the performance of a wireless broadcast channel network. It has been demonstrated in [1] that the channel state information at the transmitter (CSIT) is essential for optimizing the wireless-broadcast-channel performance. Considerable study on the design of the beamforming matrix and multiuser interference signals using the space-time interference alignment (STIA) technique is available. In [2], the authors discuss about the fully-associated interference networks, where a relay equipped with several antennas forwards the received signals instantly to the desired receivers. Precisely, the outdated CSI from all the transmitters sends the estimated CSI back to the relay with a handling delay.
Recently, the authors in [3,4] have provided a more distinguished analysis on topology interference management performance with a message passing (TIM-MP) technique for partially connected BC, where the transmitter has access only to the topological information and each receiver can pass its decoded message to another receiver. Linear minimum mean square error (MMSE) pre-equalization has been employed in [5] to precode the transmitted signal information using the Alamouti code with a precoded spatial-multiplexing technique that assists in retrieving or decoding the interference signals on the destination-side. The MMSE linear precoder achieves better error performance than the zero forcing-linear precoding method (ZL-LP) due to the presence of a large number of users and antennas at the base stations (BS) [6,7]. In order to construct a more structured and effective solution for reconstructing the interference signals, the authors in [8,9,10] introduces the retrospective interference alignment, linear precoder design and spatial multiplexing techniques, which have the ability to recover using outdated CSIT knowledge. A comparison between the downlink performance of the cell edge users and the quasi-orthogonal space-time code for MIMO systems is beneficial [11,12]. However, the authors have evaluated the performance without an inter-cell interference coordination scheme, using cooperative base stations. Moreover, the authors in [13,14] have deliberated on the topological interference alignment for MIMO relay broadcast channels under a span interference alignment method, where the desired signal information is reconstructed without appropriate CSIT knowledge.
The common assumption based on the aforementioned works is that they depend on a feedback protocol (or) delayed CSIT knowledge. The author in [15] have extended the analysis with multiuser MIMO user selection and reconfigurable antennas, for switching at the receiver-side. In [16], the author presents multiple relays or a multi-way relaying system with global CSI knowledge. In the above-mentioned schemes, the complexity of the recovered signal or the decomposed signal strength is considerably higher on the receiver-side. It is observed that increasing the number of users and relays increases the interference. In this paper, we propose a new scheme to ratify the difficulties in reconstructing a linear combination of the desired and undesired symbols, using the distributed nature of information and the delayed channel state information at the relay (CSIR) knowledge. The significant feature of this study is to reconstruct the interference signals in the MIMO interference channel from an unknown receiver with imperfect CSIR knowledge. However, this work differs from [1,2] where the authors proposed an interference alignment scheme for the K -user multiple-input-single-output (MISO) interference channel with periodic and imperfect channel knowledge, respectively. The space-time relay transmission technique assists in increasing the recovered signal strength by incorporating two unknown transmitter and relay signals efficiently. The retrieval of the desired signal information is evaluated by the combination of two unknown co-interference signals from the transmitter and the relay facilitates the reconstruction of the interference signals from the unintended (additional) receiver by considering the cooperation between the receivers. If the distance between the intended and unintended receiver is too large, the cooperation between the receivers will be affected drastically, which, in turn, will degrade the sum rate and the bit error rate (BER) performance of the proposed system.

1.1. Summary of Contribution

The main contributions of this paper are summarized as follows:
  • We consider a three-user MIMO interference channel with a shared relay, where no more than two transmitters can be active over the same time slot. At the receiver-end, the interference signals from an unknown transmitter affect the performance of the downlink relay network channel considerably.
  • The introduction of an additional (unintended) receiver incorporates one relay signal and two unknown receiver signals received from the two active transmitters aid to improving the recovered signal strength drastically at the intended receiver-end.
  • The proposed R-STIA technique assists the interference signals to align in both the time and space domains under limited CSIR knowledge by using the R-STIA transmission technique. The proposed technique also recovers and reconstructs the transmitter and relay signals at the unintended receiver-end by considering the cooperation between the receivers.
  • The motivation behind the proposed scheme is to reduce the transmitter power consumption largely by not activating more than two transmitters over the same time slot. The proposed scheme can also reduce the decoding complexity due to the presence of the additional receiver and less interference misalignment at the intended receiver-end.
  • The Alamouti space-time transmission technique and the MMSE linear precoder are employed at the transmitters and relay to detect the presence of interference signals at the unintended receiver, which, in turn, aid in improving the BER performance of the proposed scheme.
  • Numerical results confirm that the proposed R-STIA technique significantly improves the sum-rate and BER performance compared to the existing broadcast channel schemes [17,18].

1.2. Organization

The rest of this paper is organized as follows. Section 2 introduces the channel model and the formula definitions for the K -user MIMO interference channels. In Section 3, the proposed scheme for a three-user MIMO relay-aided broadcast channel is illustrated. Section 4 presents the precoded spatial-multiplexing MIMO system that assists in recovering the linear combination of intended and unintended symbols from the transmitter and relay. The generalization of the proposed scheme using the Alamouti space-time relay transmission technique is briefly discussed in Section 5. Section 6 describes the K -user relay-aided MIMO interference channel. Section 7 presents the numerical results and the paper is concluded in Section 8.

2. Channel Model and Formula Definitions

The Gaussian K -user MIMO downlink relay network channel model is depicted in Figure 1. K -user BS share information with the associated users through a shared relay.
We consider N t x , k transmitters and N R relay with M antennas transmits independent messages to the N antenna N r x , k receivers, where M k and k { 1 , 2 , 3 , , K } . Consider that the communication over the relay functions in a half-duplex amplify and forward mode and sends an amplified version of the transmitted signal to the receiver with a processing delay. X [ k ] [ n ] C N tx , k × 1 and X [ R ] [ n ] C N R × 1 are the signal vectors from the transmitter and relay, respectively, where h K [ n ] T = [ h 1 k [ n ] , , h N t x , k k [ n ] ] and h R [ n ] T = [ h 1 R [ n ] , , h N R R [ n ] ] are the channel vectors from the transmitter and relay, respectively. We assume that the elements of the channel matrix, H [ R , K ] ( n ) , are drawn from an independent and identically distributed (i.i.d) complex Gaussian with zero mean and unit variance. The input–output relationships can be given as follows:
y j k ( n ) = h j , j [ k , k ] T ( n ) x j k ( n ) + h j , j [ k , R ] T ( n ) x j R ( n ) Desired signal + j = 1 , j k K h j , i [ k , j ] T ( n ) x i j ( n ) Interference + Z j [ k ] ( n ) ,
Y j R ( n ) = h j [ R , k ] ( n ) x j k ( n ) Relay signal + Z j [ R ] ( n ) ,
where y j k ( n ) and Y j R ( n ) are the kth receiver and relay signals, respectively, from the channel use n . h j , j [ k , k ] T ( n ) , h j , j [ k , R ] T ( n ) , and h j , i [ k , j ] T ( n ) represent the transmitter, relay, and interference channel matrices, respectively. x j k ( n ) and x j R ( n ) are the transmitter and relay signals; Z j [ k ] ( n ) and Z j [ R ] are the zero-mean additive white Gaussian noise signals for the kth receiver and relay, respectively.

Key Definitions

Definition 1.
Alamouti code (space time block code).
It is a technique used in wireless communication to transmit multiple data streams using massive antennas at the BS and a relay to exploit several received versions of data for improving the data transfer consistency and desired signal information [5,19].
Example: Alamouti code for a 2 × 2 MIMO wireless system model is given by
y [ j j ] y [ j i ] y [ i j ] * y [ i i ] * = h [ j j ] h [ j i ] h [ i j ] h [ i i ] h [ j i ] * h [ j j ] * h [ i i ] * h [ i j ] * x j k [ n ] x i k [ n ] + Z [ j j ] Z [ j i ] Z [ i j ] * Z [ i i ] * ,
where [ y j j , y i i ] T , and [ y i j , y j i ] T denote the received, desired, and interference signal vectors. h j j , h i i , and h j i , h i j are the desired and interference channel matrices, where x j k [ n ] , x i k [ n ] denote the transmitted signals; [ Z j j , Z j i ] T , [ Z i j , Z i i ] T denote the zero-mean additive white Gaussian Noise (AWGN).
Definition 2.
(Degree of freedom and achievable sum-rate).
The degree of freedom (DoF) region for this network topology is d 1 + d 2 + , , + d n 1 and, for a symmetric network, it is d s y m = 1 n [3,20]
d s y m = lim   sup P sup ( R , , R ) C R ( P ) log P , D = { ( d 1 , , d k ) R + : d i = lim   sup P R i ( P ) log P , i s . t ( R 1 , , R k ) C } .
The achievable rate for the transmitter and receiver pairs defined for the K th user is
r [ k ] = lim   sup P R [ k ] ( P ) log ( P ) .
The achievable sum-rate for the proposed K -user MIMO relay interference channel model [16,21] is expressed as
R K log 1 + h j , j [ k , k ] T ( n ) 2 P + h R j [ k , R ] T ( n ) 2 ( P R 2 ) h j , i [ k , j ] T ( n ) 2 P + 1 + 2 α h j , j [ k , k ] T ( n ) h R j [ k , R ] T ( n ) P ( P R 2 ) h j , i [ k , j ] T ( n ) 2 P + 1 .
All the users (nodes) are subject to an average power-constraint ( P ) is defined as P = S N R × σ 2 and R [ k ] ( P ) indicate the achievable rate, where (SNR) represents signal-to-noise ratio [22]. The transmitted signals, E ( X [ k ] [ n ] 2 ) P and the relay signals, E ( X [ R ] [ n ] 2 ) P R , subject to the average power constraint are briefly described, where the coefficient α represents the in-phase addition of signals coming from the transmitters and the relay. The fraction of the interference power for the desired signal is defined as follows:
q a v g = 1 k k = 1 k σ k .

3. Three-User MIMO Relay-Aided Broadcast Channel

In this section, we propose a simple three-user network topology with a shared relay, as shown in Figure 2. We summarize the important steps in the proposed optimization framework scheme shown in Figure 3. We have considered K = 3 users, where the transmitter, N t x , k and the relay, N R , have massive antennas and the receiver, N r x , k , has a single antenna [23]. We primarily focus on scenarios in which the CSIT is not known at the receiver-side, where it has access to limited CSIR knowledge only:
X ^ [ k ] [ n ] = k = 1 3 h n [ k ] [ k ] u n [ k ] .
Based on this space-time relay beamforming method, the relay forwards the received signals, while all of the three transmitters remain silent. More specifically, the space-time relay beamforming matrix can carry only two symbols for the receiver, K { 1 , 2 , 3 } , which can be denoted by V [ k ] = [ V k [ 1 ] , V k [ 2 ] , V k [ 3 ] ] C 3 × 3 and the transmitter signal vector at the relay is given by
X ^ [ R ] [ n ] = β ( V 1 [ 1 ] u ^ 1 [ 1 ] + V 2 [ 1 ] u ^ 2 [ 1 ] ) + β ( V 1 [ 2 ] u ^ 1 [ 2 ] + V 2 [ 2 ] u ^ 2 [ 2 ] ) + β ( V 1 [ 3 ] u ^ 1 [ 3 ] + V 2 [ 3 ] u ^ 2 [ 3 ] ) , = β V 1 [ 1 ] u 1 [ 1 ] + β V 2 [ 1 ] u 2 [ 1 ] + β V 1 [ 2 ] u 1 [ 2 ] + β V 2 [ 2 ] u 2 [ 2 ] + β V 1 [ 3 ] u 1 [ 3 ] + β V 2 [ 3 ] u 2 [ 3 ] ,
where β is the power normalization factor. x ˜ [ k ] [ n ] and x ˜ [ R ] [ n ] are the original symbol vectors for the transmitter and relay, respectively. Although the pre-equalization can be characterized by a pre-equalizer weight matrix, W C N t x , k × N t x , k and the precoding symbol vector, x, in terms of W , can be defined as x = W x ^ . We provide a refined analysis of the corresponding weight matrix, described under the MMSE pre-equalization.
The total Gaussian point-to-point interfering with the multiple access relay channel (PIMAC) power constraints after pre-equalization can be expressed as follows
E t r x [ R ] ( n ) x [ R ] ( n ) P ,
where † represents the conjugate transpose and the power normalization factor β is expressed as
β = P E { T r ( H u ^ u ^ H 1 ) } .
Furthermore, the MMSE pre-equalization weight matrix is selected as
W MMSE = β × a r g m i n E β 1 ( H W x ^ ) x ^ 2 , = β × H H H H H + σ z 2 σ x 2 I 1 .

4. Precoded Spatial-Multiplexing MIMO Systems

In this section, we focus on a precoded spatial-multiplexing MIMO system to transmit the independent and separately encoded desired signals using multiple antennas at the transmitters and relay, where the common relay shares limited CSIR knowledge with the receivers, as shown in Figure 2. The three key components in relay aided three-user MIMO broadcast relay channels are as follows.
The first key component initializes the three time slots in which each user sends two independent intended symbols, u 1 ( K ) and u 2 ( K ) , using two antennas. Over each of the three time slots, the corresponding network topology of the active transmitters and the block representation of the received signals are illustrated in Figure 4, Figure 5 and Figure 6, respectively. In time slot-1, the user-1 transmitter signal is X [ 1 ] [ 1 ] = [ u 1 ( 1 ) , u 2 ( 1 ) ] T , where u 1 ( 1 ) and u 2 ( 1 ) are the respective intended symbols. In time slot-2, the user-2 transmitter signal is X [ 2 ] [ 2 ] = [ u 1 ( 2 ) , u 2 ( 2 ) ] T , where u 1 ( 2 ) and u 2 ( 2 ) are the respective intended symbols. In time slot-3, the user-3 transmitter signal is X [ 3 ] [ 3 ] = [ u 1 ( 3 ) , u 2 ( 3 ) ] T , where u 1 ( 3 ) and u 2 ( 3 ) are the corresponding intended symbols. The transmitter corresponding to each of the above-mentioned time slots, { K = 1 , 2 , 3 } , sends two independent symbols for sharing the information with the intended receiver [1]. Thus, three transmitters belonging to three time slots each send a total of six independent symbols. The intended symbols are indicated by F [ k , i ] [ W n ] , which express the linear combination of the transmitting signals from user K .
Algorithm 1 Multiuser MIMO Scheduling.
Step : 1 .   Initialize :
K { 1 , 2 , , k } ; V [ k ] = [ V k [ 1 ] , V k [ 2 ] , , V k [ k ] ] ;
Transmitter & relay signal: X ^ [ k ] [ n ] = k = 1 k h c n [ k ] [ k ] u n [ k ] ; X ^ [ R ] [ n ] = β ( V k [ 1 ] u ^ 1 [ k ] + V k [ 1 ] u ^ 2 [ k ] ) ;
β = P E { T r ( H u ^ u ^ H 1 ) } .
Step : 2 .   Repeat :
1:
for k = 1 , 2 , 3 do
2:
Compute the transmitter & relay signals at the unintended receiver:
F [ 3 , 3 ] [ W 3 ] = h [ c 3 ] [ 3 ] [ k ] u 1 [ k ] + h [ c 3 ] [ k ] [ k ] u 2 [ k ] ,
F [ 2 , 2 ] [ W 2 ] = h [ c 2 ] [ 2 ] [ k ] u 1 [ k ] + h [ c 2 ] [ k ] [ k ] u 2 [ k ] ,
β h [ R 3 ] ( 3 , R ) T [ 1 ] β h [ R 2 ] ( 2 , R ) T [ 1 ] V ( k ) [ n ] ,
3:
User-1 reconstructed signal from the transmitter and relay. Decoding: y ( 1 ) [ 1 ] = y ( 3 ) [ 1 ] + y ( 2 ) [ 1 ]
= ( h [ R 1 ] [ 1 , R ] T ( 3 ) + h [ R 2 ] [ 1 , R ] T ( 3 ) ) X [ R ] [ 3 ] + ( h [ R 3 ] [ 1 , R ] T ( 2 ) + h [ R 1 ] [ 1 , R ] T ( 2 ) ) X [ R ] [ 2 ] .
= { h [ c 2 ] [ 1 , 1 ] * ( 2 ) + h [ c 3 ] [ 1 , 1 ] ( 3 ) } u 1 [ 1 ] + { h [ c 1 ] [ 1 , 1 ] * ( 1 ) + h [ c 1 ] [ 1 , 1 ] ( 1 ) } u 2 [ 1 ] .
4:
Achievable Sum-rate for K-user MIMO relay channel:
R K log 1 + h j , j 2 P + h R j 2 ( P R 2 ) h j , i 2 P + 1 + 2 α h j , j h R j P ( P R 2 ) h j , i 2 P + 1
5:
end for.
for fixed X ^ [ k ] , [ R ] compute y ( 2 ) [ 2 ] , y ( 3 ) [ 3 ] until recovered.
The second key component is the multiuser MIMO scheduling Algorithm 1, which forces the active transmitters to be assigned during the time slots and provides the basic initialization necessary to recover the interference signals from the unintended receiver. In three time slots, the linear combination of the desired signal information is reconstructed from the unintended receiver.
The third main component initializes the channel coefficients to identify the corresponding interference signals from the relay and the transmitters. These linear combinations of the desired signal information enable the reconstruction of the interference signals from the unintended receiver in which Z [ k ] ( t ) is a realization of random variables for user K = { 1 , 2 , 3 } . Z [ k ] C N ( 0 , 1 ) impersonates the additive white Gaussian noise signal; the corresponding complex (static) channel coefficients [24,25] are h k = { R 1 , R 2 , R 3 , d 1 , d 2 , d 3 , c 1 , c 2 , c 3 } , where R k , d k , c k represent the relay signals, the directly transmitted signals, and the interference signals, respectively. In the Gaussian linear deterministic PIMAC models depicted in Figure 4, Figure 5 and Figure 6, the corresponding transmitter binary vectors are x i = F 2 q , where q = m a x { n R 1 , n R 2 , n R 3 , n d 1 , n d 2 , n d 3 , n c 1 , n c 2 , n c 3 } and the integer of n k represents the additive white Gaussian channel coefficients, n k = log 2 ( P | h k | 2 . We assume that all of the nodes have global CSIR knowledge, where the noise, Z [ k ] [ t ] , is independent and identically distributed (i.i.d) over these time slots.
Over the first time slot: Transmitters 1 and 2 are kept active because transmitter 3 is made silent, as shown in Figure 4. Under such conditions, receiver 1, F [ 1 , 1 ] [ W 1 ] and receiver 2, F [ 2 , 2 ] [ W 1 ] , can acquire the superposition of the two desired symbols. Nevertheless, receiver 3 can eavesdrop on the linear combination of the unintended interference signal from the active transmitters:
F [ 1 , 1 ] [ W 1 ] = h [ c 1 ] [ 1 , 1 ] [ 1 ] u 1 [ 1 ] + h [ c 1 ] [ 1 , 1 ] [ 1 ] u 2 [ 1 ] , F [ 2 , 2 ] [ W 1 ] = h [ c 2 ] [ 2 , 2 ] [ 1 ] u 1 [ 1 ] + h [ c 2 ] [ 2 , 2 ] [ 1 ] u 2 [ 1 ] .
In order to deliver the same linear combination of undesired signals from receiver 3, the principal idea of the proposed beamforming scheme is to select the beamforming matrix from transmitters 1 and 2 with a shared relay:
β h [ R 1 ] ( 1 , R ) T [ n ] β h [ R 2 ] ( 2 , R ) T [ n ] V ( 3 ) [ n ] = h [ c 1 ] ( 1 , 1 ) T [ n ] h [ c 2 ] ( 2 , 2 ) T [ n ] .
Over the second time slot: Transmitters 2 and 3 are kept active, whereas, transmitter 1 is made silent, as shown in Figure 5. The concept is identical as discussed for time slot 1; receiver 2, F [ 2 , 2 ] [ W 2 ] and receiver 3 , F [ 3 , 3 ] [ W 2 ] , can attain the superposition of the two desired symbols because receiver 1 can eavesdrop on the linear combination of the unintended interference signal from the active transmitters:
F [ 2 , 2 ] [ W 2 ] = h [ c 2 ] [ 2 , 2 ] [ 2 ] u 1 [ 2 ] + h [ c 2 ] [ 2 , 2 ] [ 2 ] u 2 [ 2 ] , F [ 3 , 3 ] [ W 2 ] = h [ c 3 ] [ 3 , 3 ] [ 2 ] u 1 [ 2 ] + h [ c 3 ] [ 3 , 3 ] [ 2 ] u 2 [ 2 ] .
To deliver the same linear combination of undesired signals from receiver 1, the beamforming matrix is selected from transmitters 2 and 3 with a shared relay:
β h [ R 2 ] ( 2 , R ) T [ n ] β h [ R 3 ] ( 3 , R ) T [ n ] V ( 1 ) [ n ] = h [ c 2 ] ( 2 , 2 ) T [ n ] h [ c 3 ] ( 3 , 3 ) T [ n ] .
Over the third time slot: In addition, for this time slot, we keep transmitters 3 and 1 active because transmitter 2 is kept in a silent mode, as shown in Figure 6. Receiver 3, F [ 3 , 3 ] [ W 3 ] and receiver 1, F [ 1 , 1 ] [ W 3 ] , can attain the superposition of the two desired symbols because receiver 2 can eavesdrop on the linear combination of the unintended interference signal from the active transmitters:
F [ 3 , 3 ] [ W 3 ] = h [ c 3 ] [ 3 , 3 ] [ 3 ] u 1 [ 3 ] + h [ c 3 ] [ 3 , 3 ] [ 3 ] u 2 [ 3 ] , F [ 1 , 1 ] [ W 3 ] = h [ c 1 ] [ 1 , 1 ] [ 3 ] u 1 [ 3 ] + h [ c 1 ] [ 1 , 1 ] [ 3 ] u 2 [ 3 ] .
To deliver the same linear combination of undesired signals from receiver 2, the beamforming matrix is selected from transmitters 3 and 1 with a shared relay:
β h [ R 3 ] ( 3 , R ) T [ n ] β h [ R 1 ] ( 1 , R ) T [ n ] V ( 2 ) [ n ] = h [ c 3 ] ( 3 , 3 ) T [ n ] h [ c 1 ] ( 1 , 1 ) T [ n ] .
During all three of the time slots, the relay approximates the received transmitter symbols by multiplying the receiver beamforming matrix using the two received symbols [2]:
S ^ [ k ] = u ^ 1 [ k ] u ^ 2 [ k ] = H [ c k ] [ R , k ] ( k ) 1 y [ R ] ( k ) , = u [ k ] + H [ c k ] [ R , k ] ( k ) 1 , k 1 , 2 , 3 .

5. Space-Time Relay Transmission

Space-time relay transmission efficiently forwards the desired signals through multiple transmitters and a shared relay to the destination. In all three of the time slots considered in Figure 4, Figure 5 and Figure 6, the receiver must use the Alamouti code to decode the interference signals. We know that the relay has a two-phase protocol and, during the first phase of the protocol, the relay receives the source broadcasted signals from multiple transmitters, while, in the second phase of the protocol, the relay transmits source signals to the destinations.
By utilizing the Alamouti method for equations (13) and (14) in time slot 1, the interference signal from the relay and transmitters can be communicated as
V [ 3 ] = 1 β h [ R 1 ] [ 1 , R ] [ 3 ] h [ R 2 ] [ 1 , R ] [ 3 ] h [ R 1 ] [ 2 , R ] [ 3 ] h [ R 2 ] [ 2 , R ] [ 3 ] 1 relay channel vector h [ c 2 ] [ 1 , 1 ] * [ 2 ] h [ c 1 ] [ 1 , 1 ] * [ 1 ] h [ c 2 ] [ 2 , 2 ] [ 1 ] h [ c 1 ] [ 2 , 2 ] [ 2 ] transmitter channel vector .
The corresponding transmitter 1 and 2 signals, recovered during time slot 1 from the unintended receiver 3 can be expressed as
y ( 3 ) [ 1 ] = ( h [ R 1 ] [ 1 , R ] T ( 3 ) + h [ R 2 ] [ 1 , R ] T ( 3 ) ) X [ R ] [ 3 ] + Z [ 1 ] ( 3 ) , = h [ c 2 ] [ 1 , 1 ] * ( 2 ) u 1 [ 1 ] + h [ c 1 ] [ 1 , 1 ] * ( 1 ) u 2 [ 1 ] + Z [ 1 ] ( 3 ) .
y ( 3 ) [ 2 ] = ( h [ R 1 ] [ 2 , R ] T ( 3 ) + h [ R 2 ] [ 2 , R ] T ( 3 ) ) X [ R ] [ 3 ] + Z [ 2 ] ( 3 ) , = h [ c 2 ] [ 2 , 2 ] ( 2 ) u 1 [ 2 ] + h [ c 1 ] [ 2 , 2 ] ( 1 ) u 2 [ 2 ] + Z [ 2 ] ( 3 ) .
Equivalently, Equations (15) and (16) are expressed for time slot 3, as mentioned below:
V [ 1 ] = 1 β h [ R 2 ] [ 2 , R ] [ 1 ] h [ R 3 ] [ 2 , R ] [ 1 ] h [ R 2 ] [ 3 , R ] [ 1 ] h [ R 3 ] [ 3 , R ] [ 1 ] 1 relay channel vector h [ c 3 ] [ 2 , 2 ] * [ 3 ] h [ c 2 ] [ 2 , 2 ] * [ 2 ] h [ c 2 ] [ 3 , 3 ] [ 2 ] h [ c 3 ] [ 3 , 3 ] [ 3 ] transmitter channel vector .
The corresponding transmitter 2 and 3 signals, recovered during time slot 2 from the unintended receiver 1, can be expressed as
y ( 1 ) [ 2 ] = ( h [ R 2 ] [ 2 , R ] T ( 1 ) + h [ R 3 ] [ 2 , R ] T ( 1 ) ) X [ R ] [ 1 ] + Z [ 2 ] ( 1 ) , = h [ c 3 ] [ 2 , 2 ] * ( 3 ) u 1 [ 2 ] + h [ c 2 ] [ 2 , 2 ] * ( 2 ) u 2 [ 2 ] + Z [ 2 ] ( 1 ) .
y ( 1 ) [ 3 ] = ( h [ R 2 ] [ 3 , R ] T ( 1 ) + h [ R 3 ] [ 3 , R ] T ( 1 ) ) X [ R ] [ 1 ] + Z [ 3 ] ( 1 ) , = h [ c 2 ] [ 3 , 3 ] ( 2 ) u 1 [ 3 ] + h [ c 3 ] [ 3 , 3 ] ( 3 ) u 3 [ 2 ] + Z [ 3 ] ( 1 ) .
Similarly, Equations (17) and (18) are represented for time slot 3, as mentioned below:
V [ 2 ] = 1 β h [ R 3 ] [ 3 , R ] [ 2 ] h [ R 1 ] [ 3 , R ] [ 2 ] h [ R 3 ] [ 1 , R ] [ 2 ] h [ R 1 ] [ 1 , R ] [ 2 ] 1 relay channel vector h [ c 1 ] [ 3 , 3 ] * [ 1 ] h [ c 3 ] [ 3 , 3 ] * [ 3 ] h [ c 3 ] [ 1 , 1 ] [ 3 ] h [ c 1 ] [ 1 , 1 ] [ 1 ] transmitter channel vector .
The corresponding transmitter 3 and 1 signals, recovered during time slot 2 from the unintended receiver 2, can be expressed as
y ( 2 ) [ 3 ] = ( h [ R 3 ] [ 3 , R ] T ( 2 ) + h [ R 1 ] [ 3 , R ] T ( 2 ) ) X [ R ] [ 2 ] + Z [ 3 ] ( 2 ) , = h [ c 1 ] [ 3 , 3 ] * ( 1 ) u 1 [ 3 ] + h [ c 3 ] [ 3 , 3 ] * ( 3 ) u 2 [ 3 ] + Z [ 3 ] ( 2 ) .
y ( 2 ) [ 1 ] = ( h [ R 3 ] [ 1 , R ] T ( 2 ) + h [ R 1 ] [ 1 , R ] T ( 2 ) ) X [ R ] [ 2 ] + Z [ 1 ] ( 2 ) , = h [ c 3 ] [ 1 , 1 ] ( 3 ) u 1 [ 1 ] + h [ c 1 ] [ 1 , 1 ] ( 1 ) u 2 [ 1 ] + Z [ 1 ] ( 2 ) .
Decoding: The overall decoding process requires the separation of the user interference signals based on the CSIR knowledge at the receiver side. Consequently, the user 1 signal is decoded based on the relay and receiver signals from y ( 1 ) [ 1 ] = y ( 3 ) [ 1 ] + y ( 2 ) [ 1 ] :
( 29 ) y ( 3 ) [ 1 ] + y ( 2 ) [ 1 ] = ( h [ R 1 ] [ 1 , R ] T ( 3 ) + h [ R 2 ] [ 1 , R ] T ( 3 ) ) X [ R ] [ 3 ] + ( h [ R 3 ] [ 1 , R ] T ( 2 ) + h [ R 1 ] [ 1 , R ] T ( 2 ) ) X [ R ] [ 2 ] recovered relay signal ( 30 ) = h [ c 2 ] [ 1 , 1 ] * ( 2 ) u 1 [ 1 ] + h [ c 1 ] [ 1 , 1 ] * ( 1 ) u 2 [ 1 ] + h [ c 3 ] [ 1 , 1 ] ( 3 ) u 1 [ 1 ] + h [ c 1 ] [ 1 , 1 ] ( 1 ) u 2 [ 1 ] recovered transmitter signal .
Similarly, we can compute the received signals y ( 2 ) [ 2 ] = y ( 3 ) [ 2 ] + y ( 1 ) [ 2 ] and y ( 3 ) [ 3 ] = y ( 1 ) [ 3 ] + y ( 2 ) [ 3 ] .
After removing the corresponding interference signals, the effective channel input–output relationship for user 1 is as follows:
y 1 [ 1 ] y 2 [ 2 ] y 1 [ 1 ] y 3 [ 3 ] y 1 [ 1 ] = ( y ( 3 ) [ 1 ] + y ( 2 ) [ 1 ] ) ( y ( 3 ) [ 2 ] + y ( 1 ) [ 2 ] ) ( y ( 3 ) [ 1 ] + y ( 2 ) [ 1 ] ) ( y ( 1 ) [ 3 ] + y ( 2 ) [ 3 ] ) y 1 [ 1 ] y 2 [ 2 ] , y 1 [ 1 ] y 3 [ 3 ] u 1 ( 1 ) u 2 ( 1 ) X 1 [ 1 ] + z 1 ( 1 ) z 2 ( 2 ) z 1 ( 1 ) z 3 ( 3 ) z 1 ( 1 ) .

Discussion

The proposed idea is to create a relay-aided network channel where each intended receiver experiences less interference and the unintended (additional) receiver experiences more interferences. Remarkably, the intended receivers have very weak interference, since intended receivers are affected by only one interference signal. The single unintended receiver has very strong interference because the unintended receiver is affected by two transmitter interference signals and one relay signal over the time slots. Moreover, this paper offers an efficient algorithm and a channel co-efficient for the desired, undesired, and relay signals for identifying and aligning the corresponding signals resourcefully. Subsequently, by introducing an additional (unintended) receiver at a very-strong interference region and with certain limited CSIR knowledge, the network settings are valid for recovering the combination of the three co-interference signals from transmitters and relay. By such R-STIA and Alamouti techniques, the interference signals are reconstructed at the unintended PIMAC receiver-end.
The authors in [26] proposed a Quasi Orthogonal (QO)-STIA technique for a two-user X channel, where the interference cancellation and alignment is based on only two intended receivers. The decoding complexity is reasonably high, since the receiver has to decode the intended symbols over each time slots until the desired signal is recovered. The authors in [27] proposed a distributed interference management technique for 2 × 2 X interference channel under a distributed manner. The two transmitters send the intended symbols to one desired receiver, where the interference signals are aligned based on the delayed CSIT knowledge. The distributed STIA technique has high transmitter energy consumption and a single receiver has to decode multiple intended symbols over the time slots, which will have significant impact on the decoding complexity at the receiver-end.
The proposed R-STIA transmission technique drastically decreases the interference misalignment for two intended receivers by the introduction of an additional receiver, efficient alignment and reconstruction of the interference signals. The transmitter energy consumption is subsequently reduced, since the proposed scheme activates only two transmitters over the time slots. The introduction of an additional (unintended) receiver aid in improving the desired signal strength drastically at the intended receiver-end. By considering the cooperation between the intended and unintended receivers, the decoding complexity is considerably reduced due to less interference misalignment at the intended receiver-end [28].
Although there are several other approaches for interference alignment, the proposed scheme has interesting methods for aligning the interference signals; the user 1 received signals from transmitters, Y ( 1 ) [ 1 , ] and relay, Y ( 1 ) [ R ] , are recovered and reconstructed at the unintended (additional) receiver during time slot 1. Using multiple antennas, the transmitters signals, { Y ( 3 ) [ 1 ] , Y ( 2 ) [ 1 ] } and the relay signals, Y ( 3 ) [ R ] , Y ( 2 ) [ R ] , are recovered at the unintended receiver-side, which assist in improving the receiver 1 signal strength drastically. Likewise, the received signals over time slot 2, { Y ( 2 ) [ 2 ] , Y ( R ) [ 2 ] } and time slot 3, { Y ( 3 ) [ 3 ] , Y ( R ) [ 3 ] }, can also be recovered, respectively, from the interference signals received through the additional receiver.

6. The K -User Relay-Aided MIMO Interference Channel

In this section, we characterize the K -user MIMO interference channel with a MIMO relay under limited CSIR knowledge. We restrict the number of K -user communication pairs to be lesser than the number of transmitter antennas, M, where K M .
Time slot 1: Let us consider K -time slots, where the transmitter sends M symbols via the relay to the corresponding M-antenna receiver; here, the K -user M × 2 MIMO interference channel with a relay and an M-antenna receiver, has local CSIR knowledge. In the kth time slot, the ( 1 k K ) transmitter sends M desired symbols to the M-antenna receiver using the R-STIA technique; the symbols are X [ k ] [ k ] = [ u 1 ( k ) , u 2 ( k ) , , u M ( k ) ] T ,
y j ( k ) ( n ) = h j , j [ k , k ] T ( n ) u M [ k ] + Z j [ k ] ( n ) desired signal + noise ,
where k { 1 , 2 , 3 , , K }
y ( j ) R ( n ) = h j [ R , k ] ( n ) x j k ( k ) + Z j [ R ] ( n ) relay signal + noise .
During this time slot, the intended receiver has a weak interference and the unintended (additional) receiver has a strong interference; hence, the intended receiver has one equation, which contains M desirable symbols, whereas the unintended receiver has two equations containing M desirable symbols.
Time slot 2: The important objective of this time slot is to provide additional information to the unintended receiver, which assists in building ( K 2 ) independent equations using the u M ( k ) desired symbols. In this time slot, the receiver has CSIR knowledge for the current and past time periods because the relay forwards CSIR knowledge, such as the current and the outdated information to the receiver
X ^ [ R ] [ n ] = β ( V k [ 1 ] ( n ) u ^ 1 [ k ] + V k [ 1 ] ( n ) u ^ 2 [ k ] + , , V k [ k ] ( n ) u ^ M [ k ] ) ,
| | h [ c k ] [ K , k ] T ( n ) | | 2 h ¯ [ n c k , ] [ K , k ] T ( n ) T = β h [ c k ] [ k , R ] T ( n ) V k k ( n ) , k K .
Time slot n : where n ( K + 1 , K + 2 , , K + M 1 ) and | | h [ c k ] [ K , k ] T ( n ) | | 2 are the 2-norm of h [ c k ] [ K , k ] T ( n ) . The transmitter and relay repeatedly transmit the same symbol, until the desired symbols are received in the intended receivers. During this transmission, the unintended receiver recovers the interference signals, enabling the reconstruction of the desired signal information for the intended receivers:
y j k ( n ) = h j , j [ k , k ] T ( n ) x j k ( n ) + h j , j [ k , R ] T ( n ) x j R ( n ) , + j = 1 , j k K h j , i [ k , j ] T ( n ) x i j ( n ) + Z j [ k ] ( n ) .
Considering that the transmitter sends K ( K 1 ) linear combinations, F [ k , k ] [ W k ] , of multiple data symbols to all the desired users, such as
F [ k , k ] [ W k ] = h [ c 1 ] [ k , k ] [ n ] u 1 [ k ] + h [ c 2 ] [ k , k ] [ n ] u 2 [ n ] + , , + h [ c k ] [ k , k ] [ n ] u M [ n ] ,
the unintended (additional) receiver assists in removing the interference and decodes the ( K 1 ) data symbols reliably at the intended receiver with a very high SNR. Hence, the intended receivers can identify and remove the corresponding interference data symbols using local CSIR knowledge and the unintended-receiver information. The relay transmits the signal vector over the time slot n in the form of X ^ [ R ] [ n ] = β ( V k [ k ] ( n ) u ^ M [ k ] )
y j k ( n ) = β h j , i [ R , k ] T ( n ) j = 1 K V k [ k ] ( n ) u ^ M [ k ] + Z j [ R ] ( n ) .
It is important to design the beamforming matrices for aligning the interference signals from the transmitter and relay. To accomplish this goal, the beamforming matrices should satisfy the consecutive R-STIA conditions:
h [ c 1 ] [ 1 , k ] T ( k ) h [ c 2 ] [ ( k 1 ) , k ] T ( k ) h [ c 3 ] [ ( k + 1 ) , k ] T ( k ) . . . . h [ c k ] [ K , k ] T ( k ) K 1 × M = β h [ R 1 ] [ 1 , R ] T ( n ) h [ R 2 ] [ ( k 1 ) , R ] T ( n ) h [ R k ] [ ( k + 1 ) , R ] T ( n ) . . . . h [ R k ] [ K , R ] T ( n ) K 1 × M V k [ k ] ( n ) M × M .
It is necessary to design the beamforming matrix, V k [ k ] ( n ) , such that the intended receivers receive the same information during the time slots, until the data symbols are recovered. Where n represents time slots, n ( 1 , 2 , , k ) ,
V k [ k ] ( n ) = 1 β ( H ^ ( n ) ( H ^ ( n ) H ^ ( n ) ) H ^ ( n ) ) .
K -users transmit M data symbols, where the beamforming matrices are V k [ k ] ( n ) = C M × M . To attain this objective, the beamforming matrices should satisfy the R-STIA condition H ^ ( n ) = β H ^ ( n ) V k [ k ] ( n ) , where H ^ ( n ) represents the channel matrices containing the desired channel coefficients, after applying V k [ k ] ( n ) to the relay beamforming matrix. H ^ ( n ) , is the channel matrix from the relay to all the receivers in the nth time slot. The complementary matrix, H [ c k ] [ K , k ] T ( n ) , is denoted as follows:
H [ c k ] [ K , k ] T ( n ) = [ h [ c 1 ] [ K , k ] T ( n ) , h [ c 2 ] [ K , k ] T ( n ) , , h [ c k ] [ K , k ] T ( n ) ] .
Therefore, we can calculate the relationship between the input and output channel coefficients:
y [ c 1 ] [ 1 ] ( 1 ) y [ c 2 ] [ ( K + 1 ) ] k = 2 ( K ) y [ c k ] [ k ] ( n ) y [ c 3 ] [ ( K + 2 ) ] k = 2 ( K ) y [ c k ] [ k ] ( n ) . . . . y [ c k ] [ ( K + M 1 ) ] k = 2 ( K ) y [ c k ] [ k ] ( n ) = h [ c 1 ] [ 1 , k ] T ( 1 ) | | h [ c 2 ] [ ( k 1 ) , k ] T ( n ) | | 2 h ¯ [ c 2 ] , [ ( k 1 ) , k ] T ( n ) | | h [ c 3 ] [ ( k + 1 ) , k ] T ( n ) | | 2 h ¯ [ c 3 ] , [ ( k + 1 ) , k ] T ( n ) . . . . | | h [ c k ] [ K , k ] T ( n ) | | 2 h ¯ [ c k ] , [ K , k ] T ( n )   u k [ k ] ( n ) + z [ c 1 ] [ 1 ] ( 1 ) z ^ [ c 2 ] [ ( K + 1 ) ] k = 2 ( K ) z [ c k ] [ k ] ( n ) z ^ [ c 3 ] [ ( K + 2 ) ] k = 2 ( K ) z [ c k ] [ k ] ( n ) . . . . z ^ [ c k ] [ ( K + M 1 ) ] k = 2 ( K ) z [ c k ] [ k ] ( n ) y ^ c 1 [ 1 ] ( 1 ) = h [ c 1 ] [ 1 , 1 ] T ( 1 ) { u [ 1 ] 1 + u [ 2 ] 1 } + z ^ [ c 1 ] [ 1 ] ( 1 ) ,
where n = { 1 , 2 , 3 , , K } . We can conclude that interference-free communication is achievable without CSIT knowledge at the base station, provided the Alamouti space-time transmission technique and the MMSE precoder method are used for managing and aligning the interference signals using the delayed CSIR knowledge between the base stations and the mobile users.

7. Numerical Results

The proposed three-user MIMO interference channel model with a shared relay as shown in Figure 2. In this section, we consider K = 3 users, where two symbols are transmitted on each sub-carrier over the time slots. We also assume that the transmitters and relay each with two antennas ( M = 2 ) and a receiver equipped with single antenna ( N = 1 ) . The MMSE linear precoder with 256 quadrature amplitude modulation (QAM) is used in the simulation. The channel vector of each transmitter and relay is considered as an i.i.d complex Gaussian with zero mean and unit variance MIMO space-time-correlated Rayleigh fading channels. We also considered that the transmit power for each transmitter ( P ) and relay ( P R ) are 50 mW are fixed throughout the simulation.
In Figure 7, the BER performance is compared in two main scenarios: with limited CSIR knowledge and with perfect CSIR knowledge [18]. Thus, the proposed scheme relies on a limited CSIR knowledge because, over a time slot, only two transmitters are active; whereas, with a perfect CSIR, the relay knows all the channel state information. At BERs of 10 3 and 10 4 , in the perfect CSIR case the SNR increases from 20 dB to 21.3 dB respectively, whereas, in the proposed limited CSIR case, the SNR varies from 18.6 dB to 21.3 dB. The simulation result shows that the perfect CSIR case performance is 1.5 dB better than the proposed limited CSIR case. This result is predictable, since the relay has only limited channel state information over the time slots.
Figure 8 displays the power allocation strategy versus the computed achievable sum-rate [17,22]. We mainly focus on three major schemes; in the proposed R-STIA technique, the sum-rate is computed for K = 3 users, under an average power constraint. The R-STIA technique is compared with the MIMO broadcast channel and the interference channel schemes, where at SNRs of 20 dB and 40 dB, the sum-rate increases from 17.5 bps/Hz to 30 bps/Hz, respectively; the MIMO broadcast channel achieves an increase from 15.7 bps/Hz to 27.4 bps/Hz and the interference channel scheme from 8.5 bps/Hz to 15.5 bps/Hz. This drastic variation in the sum-rate is predicted because, in the proposed scheme, the additional receiver and limited CSIR information enable an increase in the sum-rate compared to the MIMO broadcast and interference channel schemes.
Figure 9 presents the bit error rate versus the SNR (dB) [18]. The proposed R-STIA technique is compared with the QO-STIA and the distributed R-STBC techniques. At BERs of 10 2 and 10 3 , in the proposed technique, the SNR increases from 10.8 dB to 16.3 dB, respectively, whereas the relay QO-STIA technique achieves an SNR increase from 2.5 dB to 18 dB and the distributed STIA technique from 14 dB to 21 dB. This extreme variation is predictable because the proposed techniques relies on the MMSE linear precoder, which, in turn, helps to improve the BER performance.
In Figure 10, we plot the average run-time (seconds) versus the number of users ( K ). The proposed R-STIA technique average run-time (seconds) is compared with the distributed STIA and QO-STIA techniques. At K = 16 users case, the proposed R-STIA technique for M = 2 , N = 1 antenna settings average run-time is 60 s. However, the QO-STIA and distributed STIA techniques average run-time is 90 s and 100 s, respectively. The simulation results show that the proposed R-STIA technique enhances the average run-time performance (seconds) compared to the distributed STIA and QO-STIA techniques. This result is predictable, since the proposed R-STIA technique reduces the decoding complexity due to the presence of additional receiver and less interference misalignment at the intended receiver-end. Moreover, the cooperation between the intended and unintended receivers also helps to reduce the decoding complexity of the proposed scheme.

8. Conclusions

This paper has addressed the performance of the IA transmission for a three-user M × 2 MIMO relay-aided broadcast channel with limited CSIR knowledge. We have proposed an alternative transmission named the R-STIA technique, in which the unintended receiver incorporates two unknown receiver signals from the two active transmitters. The proposed R-STIA technique recovers and reconstructs the transmitter and relay signals at the unintended receiver-end by considering the cooperation between the receivers. In addition, the Alamouti space-time transmission and an MMSE linear precoder were employed at the transmitters and relay in order to detect the presence of interference signals at the unintended receiver. Through the numerical results, it was confirmed that the proposed R-STIA technique achieves a better sum-rate and BER performance compared to the existing broadcast channel schemes. Furthermore, the Alamouti space-time transmission and the MMSE linear precoder ensures the better alignment of the interference signals at the receiver-end.

Acknowledgments

This work was supported by the Ministry of Education Science and Technology (MEST) 2015R1A2A1A05000977, National Research Foundation (NRF), Korea.

Author Contributions

The work in this paper was completed by Poongundran Selvaprabhu under the guidance of Sunil Chinnadurai, Jun Li and Moon Ho Lee.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
R-STIARelay space-time interference alignment
MIMOMultiple-input-multiple-output
MISOMultiple-input-single-output
CSIRChannel state information at the relay
CSITChannel state information at the transmitter
STIASpace-time interference alignment
CSIChannel state information
SNRSignal-to-noise ratio
BCBroadcast channel
BSBase stations
BERBit error rate
DoFDegree of freedom
i.i.dIndependent and identically distributed
MMSEMinimum mean square error
ZL-LPZero forcing-linear precoding method
TIM-MPTopology interference management performance with a message passing
PIMACPoint-to-point interfering with multiple access relay channel
QO-STIAQuasi-orthogonal space-time interference alignment

References

  1. Lee, N.; Heath, R.W., Jr. Space-time interference alignment and degree-of-freedom regions for the MISO broadcast channel with periodic CSI feedback. IEEE Trans. Inf. Theory 2014, 60, 515–528. [Google Scholar] [CrossRef]
  2. Shin, W.; Lee, N.; Lee, J.; Poor, H.V. Guiding blind transmitters for K-user MISO interference relay channels with imperfect channel knowledge. In Proceedings of the IEEE International Symposium on Information Theory Conference, Barcelona, Spain, 10–15 July 2016; pp. 545–549. [Google Scholar]
  3. Jin, J.; Gao, X.; Li, X.; Li, S.; Wang, Z. Achievable degrees of freedom for the two-cell two-hop MIMO interference channel with half-duplex relays. IEEE Access. 2017, 5, 1376–1381. [Google Scholar] [CrossRef]
  4. Ntranos, V.; Maddah-Ali, M.A.; Caire, G. Cellular interference alignment. IEEE Trans. Inf. Theory. 2015, 61, 1194–1216. [Google Scholar] [CrossRef]
  5. Soo Cho, Y.; Kim, J.; Yang, W.Y.; Kang, C.G. MIMO-OFDM Wireless Communications with MATLAB; IEEE Press, John Wiley & Sons (Asia) Pte Ltd.: Singapore, 2010; Volume 12, pp. 294–297, 381–382. ISBN 978-0-470-82561-7. [Google Scholar]
  6. Shao, X.; Yuan, J.; Shao, Y. Error performance analysis of linear zero forcing and MMSE precoders for MIMO broadcast channels. IET Commun. 2007, 5, 1067–1074. [Google Scholar] [CrossRef]
  7. Li, Z.; Xia, X.G. A simple Alamouti space time transmission scheme for asynchronous cooperative systems. IEEE Signal Process. Lett. 2007, 14, 804–807. [Google Scholar] [CrossRef]
  8. Maleki, H.; Jafar, A.S.; Shamai, S. Retrospective interference alignment over interference networks. IEEE J. Sel. Top. Signal Process. 2012, 6, 228–240. [Google Scholar] [CrossRef]
  9. Sung, H.; Park, S.-H.; Lee, K.-J.; Lee, I. Linear precoder designs for K-user interference channels. IEEE Trans. Wirel. Commun. 2010, 9, 291–301. [Google Scholar] [CrossRef]
  10. Love, D.J.; Heath, R.W. Limited feedback unitary precoding for spatial multiplexing systems. IEEE Trans. Inf. Theory 2005, 51, 2967–2976. [Google Scholar] [CrossRef]
  11. Lee, K.-J.; Sung, H.; Park, E.; Lee, I. Joint optimization for one and two-way MIMO AF multiple-relay systems. IEEE Trans. Wirel. Commun. 2010, 9, 3671–3681. [Google Scholar] [CrossRef]
  12. Khan, M.H.A.; Chung, J.; Shin, T.; Lee, M.H. Signal constellations of quasi-orthogonal space-time codes for MIMO systems. Wirel. Pers. Commun. 2015, 85, 2003–2019. [Google Scholar] [CrossRef]
  13. Selvaprabhu, P.; Chinnadurai, S.; Song, S.; Lee, M.H. Interference alignment for K-user MIMO interference channel using multiple relays. In Proceedings of the International Conference on Information and Communication Technology Convergence, Incheon, Korea, 24–26 September 2015. [Google Scholar]
  14. Selvaprabhu, P.; Chinnadurai, S.; Song, S.; Lee, M.H. Topological interference alignment for MIMO interference broadcast channel. In Proceedings of the International Conference on Information and Communication Technology Convergence, Jeju, Korea, 19–21 October 2016. [Google Scholar]
  15. Ko, K.; Lee, J. Multiuser MIMO user selection based on chordal distance. IEEE Trans. Commun. 2012, 60, 649–654. [Google Scholar] [CrossRef]
  16. Tannious, R.-A.; Nosratinia, A. Relay-assisted interference network: degree of freedom. IEEE Trans. Inf. Theory. 2012, 58, 3780–3786. [Google Scholar] [CrossRef]
  17. Etkin, R.; Ordentlich, E. On the degrees-of-freedom of the K-user Gaussian interference channel. In Proceedings of the IEEE International Symposium on Information Theory, Seoul, Korea, 28 June–3 July 2009; pp. 1919–1923. [Google Scholar]
  18. Shen, C.; Fitz, M.P. MIMO-OFDM Beamforming for Improved Channel Estimation. IEEE J. Sel. Areas Commun. 2008, 26, 948–959. [Google Scholar] [CrossRef]
  19. Lee, J.H.; Park, D. Antenna selection and unitary precoding for interference alignment with ML receiver. IEEE Commun. Lett. 2012, 16, 1216–1219. [Google Scholar] [CrossRef]
  20. Yi, X.; Sun, H.; Jafar, S.A.; Gesbert, D. TDMA is Optimal for All-unicast DoF Region of TIM if and only if Topology is Chordal Bipartite. arXiv, 2017; arXiv:1501.07870. [Google Scholar]
  21. Gherekhloo, S.; Chaaban, A.; Di, C.; Sezgin, A. (Sub)-optimality of treating interference as noise in the cellular uplink with weak interference. IEEE Trans. Inf. Theory 2016, 62, 322–356. [Google Scholar] [CrossRef]
  22. Jindal, N.; Rhee, W.; Vishwanath, S.; Jafar, S.A.; Goldsmith, A. Sum power iterative water-filling for multi-antenna Gaussian broadcast channels. IEEE Trans. Inf. Theory. 2005, 51, 1570–1580. [Google Scholar] [CrossRef]
  23. Shu, Y.; Wang, Q.; Zhang, J.; Sun, T. Relay-aided interference alignment and neutralization for 3-cellular interference channels. In Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, Shanghai, China, 13–15 October 2014; pp. 637–641. [Google Scholar]
  24. Geng, C.; Naderializadesh, N.; Avestimehr, A.S.; Jafar, S.A. On the optimality of treating interference as noise. IEEE Trans. Inf. Theory 2015, 61, 1753–1767. [Google Scholar] [CrossRef]
  25. Ying, T.; Feng, W.; Su, W.; Jiang, W. On the degrees of freedom of MIMO X networks with non-cooperation transmitters. IEEE Trans. Wirel. Commun. 2017, 16, 2490–2504. [Google Scholar] [CrossRef]
  26. Mohaisen, I.; Lee, S.; Mohaisen, M.; Elaydi, H. Interference Alignment in 2-user X Channel System with Orthogonal and quasi-orthogonal Space-time Block Codes. J. Korea Inst. Inf. Commun. Eng. 2015, 19, 1785–1796. [Google Scholar] [CrossRef]
  27. Lee, N.; Tandom, R.; Heath, R.W. Distributed Space-Time Interference Alignment With Moderately Delayed CSIT. IEEE Trans. Wirel. Commun. 2015, 14, 1048–1059. [Google Scholar] [CrossRef]
  28. Shen, Z.; Chen, R.; Andrews, J.G.; Heath, R.W., Jr.; Evans, B.L. Low complexity user selection algorithms for multiuser MIMO systems with block diagonalization. IEEE Trans. Signal Process. 2006, 54, 3658–3663. [Google Scholar] [CrossRef]
Figure 1. The K -user multiple-input-multiple-output (MIMO) ineterfrence channel model with a shared relay.
Figure 1. The K -user multiple-input-multiple-output (MIMO) ineterfrence channel model with a shared relay.
Sensors 17 01896 g001
Figure 2. (a) simple three-user network topology with a relay and (b) side information conflict diagram.
Figure 2. (a) simple three-user network topology with a relay and (b) side information conflict diagram.
Sensors 17 01896 g002
Figure 3. Proposed optimization framework.
Figure 3. Proposed optimization framework.
Sensors 17 01896 g003
Figure 4. (a) simple network topology over the first time slot and (b) block representation of the received signal.
Figure 4. (a) simple network topology over the first time slot and (b) block representation of the received signal.
Sensors 17 01896 g004
Figure 5. (a) simple network topology over the second time slot and (b) block representation of the received signal.
Figure 5. (a) simple network topology over the second time slot and (b) block representation of the received signal.
Sensors 17 01896 g005
Figure 6. (a) simple network topology over the third time slot and (b) block representation of the received signal.
Figure 6. (a) simple network topology over the third time slot and (b) block representation of the received signal.
Sensors 17 01896 g006
Figure 7. Bit error rate (BER) performance for proposed the relay space-time interference alignment (R-STIA) with perfect and limited channel state information at the relay (CSIR) knowledge.
Figure 7. Bit error rate (BER) performance for proposed the relay space-time interference alignment (R-STIA) with perfect and limited channel state information at the relay (CSIR) knowledge.
Sensors 17 01896 g007
Figure 8. Sum-rate for the proposed relay space-time interference alignment (R-STIA) technique.
Figure 8. Sum-rate for the proposed relay space-time interference alignment (R-STIA) technique.
Sensors 17 01896 g008
Figure 9. Bit error rate (BER) performance of the proposed relay space-time interference alignment (R-STIA) with an minimum mean square error (MMSE) precoder.
Figure 9. Bit error rate (BER) performance of the proposed relay space-time interference alignment (R-STIA) with an minimum mean square error (MMSE) precoder.
Sensors 17 01896 g009
Figure 10. Average run-time versus the number of users.
Figure 10. Average run-time versus the number of users.
Sensors 17 01896 g010

Share and Cite

MDPI and ACS Style

Selvaprabhu, P.; Chinnadurai, S.; Li, J.; Lee, M.H. Topological Interference Management for K-User Downlink Massive MIMO Relay Network Channel. Sensors 2017, 17, 1896. https://doi.org/10.3390/s17081896

AMA Style

Selvaprabhu P, Chinnadurai S, Li J, Lee MH. Topological Interference Management for K-User Downlink Massive MIMO Relay Network Channel. Sensors. 2017; 17(8):1896. https://doi.org/10.3390/s17081896

Chicago/Turabian Style

Selvaprabhu, Poongundran, Sunil Chinnadurai, Jun Li, and Moon Ho Lee. 2017. "Topological Interference Management for K-User Downlink Massive MIMO Relay Network Channel" Sensors 17, no. 8: 1896. https://doi.org/10.3390/s17081896

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop