Next Article in Journal
A Joint Fault Diagnosis Scheme Based on Tensor Nuclear Norm Canonical Polyadic Decomposition and Multi-Scale Permutation Entropy for Gears
Next Article in Special Issue
Fruit-80: A Secure Ultra-Lightweight Stream Cipher for Constrained Environments
Previous Article in Journal
IBVis: Interactive Visual Analytics for Information Bottleneck Based Trajectory Clustering
Previous Article in Special Issue
Spectral and Energy Efficient Low-Overhead Uplink and Downlink Channel Estimation for 5G Massive MIMO Systems
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Revisiting Degrees of Freedom of Full-Duplex Systems with Opportunistic Transmission: An Improved User Scaling Law

1
Affiliated Institute of ETRI, Daejeon 305-390, Korea
2
Department of Electronics Engineering, Sookmyung Women’s University, Seoul 04310, Korea
3
ICT Convergence Research Team, Korea Railroad Research Institute, Eiwang 437-757, Korea
4
Department of Computer Science and Engineering, Dankook University, Yongin 16890, Korea
*
Author to whom correspondence should be addressed.
Entropy 2018, 20(3), 160; https://doi.org/10.3390/e20030160
Submission received: 5 January 2018 / Revised: 7 February 2018 / Accepted: 1 March 2018 / Published: 2 March 2018
(This article belongs to the Special Issue Information Theory and 5G Technologies)

Abstract

:
It was recently studied how to achieve the optimal degrees of freedom (DoF) in a multi-antenna full-duplex system with partial channel state information (CSI). In this paper, we revisit the DoF of a multiple-antenna full-duplex system using opportunistic transmission under the partial CSI, in which a full-duplex base station having M transmit antennas and M receive antennas supports a set of half-duplex mobile stations (MSs) having a single antenna each. Assuming no self-interference, we present a new hybrid opportunistic scheduling method that achieves the optimal sum DoF under an improved user scaling law. Unlike the state-of-the-art scheduling method, our method is designed in the sense that the scheduling role between downlink MSs and uplink MSs is well-balanced. It is shown that the optimal sum DoF of 2 M is asymptotically achievable provided that the number of MSs scales faster than SNR M , where SNR denotes the signal-to-noise ratio. This result reveals that, in our full-duplex system, better performance on the user scaling law can be obtained without extra CSI, compared to the prior work that showed the required user scaling condition (i.e., the minimum number of MSs for guaranteeing the optimal DoF) of SNR 2 M 1 . Moreover, the average interference decaying rate is analyzed. Numerical evaluation is performed to not only validate our analysis but also show superiority of the proposed method over the state-of-the-art method.

1. Introduction

1.1. Previous Work

With the increasing demands for high-speed communications, full-duplex technologies have been taken into account as a promising solution for boosting the spectral efficiency in multiuser wireless communications systems [1]. However, the potential advantage of full-duplex systems may be limited by a new challenge—the inter-terminal interference—that does not appear in half-duplex systems. The problem of inter-terminal interference in full-duplex systems has recently been studied in the literature in terms of degrees of freedom (DoF) (known as the pre-log of the sum-rate capacity in the high signal-to-noise (SNR) regime) [2,3]. In particular, if channels follow the ergodic phase fading model and full channel state information at the transmitter (CSIT) is available, then it was shown in [2] that the DoF of full-duplex systems can be ideally twice as large as that of half-duplex systems. Several inter-terminal interference cancellation schemes for a three-terminal full-duplex system were presented in [3]. In addition, the DoF of multi-antenna full-duplex systems was recently studied in [4,5]. However, there are some practical challenges as follows. First, the computational burden of such schemes will increase steeply as the system dimensions increase. Second, the node cooperation and a massive number of CSI feedback bits are required.
On the other hand, in multiuser wireless communications systems, opportunistic transmission techniques that exploit the usefulness of fading have been widely studied in the literature, where one can obtain a multiuser diversity gain as the number of users is sufficiently large. Specifically, opportunistic scheduling [6], opportunistic beamforming [7], and random beamforming [8] were introduced in single-cell broadcast channels. In particular, it was pointed that the same sum-rate scaling law as the optimal dirty-paper coding can be achieved for such broadcast channels via random beamforming with far less CSI feedback [8]. Moreover, scenarios exploiting the multiuser diversity gain were studied in cooperative networks by applying an opportunistic two-hop relaying protocol [9], a parallel opportunistic routing protocol [10], and an opportunistic network decoupling protocol [11] as well as in cognitive radio networks with opportunistic scheduling [12,13,14]. Using opportunistic communications, a certain user scaling law for achieving one DoF per user was also examined for ( n , K ) -interference channels [15]. In addition, such opportunism was utilized in multi-cell broadcast channels (or, equivalently, interfering broadcast channels) by using multi-cell random beamforming [16,17] and opportunistic interference alignment [18]. As a more challenging problem than the downlink case, the optimal DoF in multi-cell multiple access channels (or, equivalently, interfering multiple access channels) was analyzed by presenting opportunistic interference alignment strategies [19,20,21,22] and distributed scheduling protocols [23,24]. In [16,18,19,20,21], the minimum number of users required to achieve the optimal DoF was investigated (i.e., the user scaling law). It is worth noting that, for achieving these DoFs, the transmitters do not require the knowledge of the instantaneous channel realizations.
Recently, in a full-duplex system composed of a 2 M -antenna full-duplex base stations (BSs) and a large number of single-antenna half-duplex mobile stations (MSs), opportunistic beamforming and scheduling methods were proposed in [25,26]. In [25], a joint uplink–downlink opportunistic beamforming method was employed so that uplink and downlink sum capacities can be achieved under a certain user scaling condition. Unlike the beamforming method in [25], the scheme in [26] took advantage of the zero-forcing (ZF) receiver for uplink to achieve the full DoF since ZF filtering at the BS is sufficient to guarantee M DoF for uplink, which results in infinitely large sum-rates with increasing SNR. In particular, it was shown in [26] that the required user scaling law to achieve the optimal DoF is given by SNR 2 M 1 . However, the result in [26] is pessimistic in practice in the sense that too many MSs in a cell are necessary to guarantee the DoF optimality even if the optimal DoF under a certain user scaling law was originally characterized in the full-duplex system with partial CSIT [26]. Such a high user scaling law in [26] stems from the scheduling role imbalance between downlink MSs and uplink MSs since a set of downlink MSs is selected with strong responsibility to eliminate both the downlink interference and MS-to-MS interference, whereas a set of uplink MSs is arbitrarily chosen. It remains an open challenge how to significantly reduce the user scaling law without extra CSIT in the full-duplex system using opportunistic transmission.
Moreover, there have been extensive studies on scheduling and resource optimization in a variety of network scenarios including wireless networks with energy harvesting [27,28,29] and cognitive networks [30].

1.2. Main Contributions

In this paper, we introduce a new hybrid opportunistic scheduling method that achieves the optimal sum DoF of the full-duplex system addressed in Section 1.1, i.e., the full-duplex system consisting of a 2 M -antenna full-duplex BSs and N single-antenna half-duplex MSs, under an improved user scaling law. We consider a practical scenario that the system operates in the time-division duplexing (TDD) mode and the effective channel gain information is only available at the transmitter via offline pilot signaling sent during the scheduling period. In such a partial CSIT scenario, how to achieve the optimal DoF is a challenging task, especially for full-duplex systems since, with the existing opportunistic scheduling methods, it is not straightforward to effectively manage the inter-terminal interference that does not appear in half-duplex systems. Under the partial CSIT assumption, our method combines the following beamforming and scheduling strategies: (i) downlink random beamforming at the BS, (ii) opportunistic scheduling at both the downlink MSs and uplink MSs, and (iii) uplink ZF beamforming at the BS. More precisely, a set of downlink MSs is selected in the sense that the downlink interference is minimized, and a set of uplink MSs is selected in the sense that the MS-to-MS interference is minimized by virtue of utilizing the channel reciprocity of the TDD system, which is the most distinguishable feature compared to the scheduling method in [26]. We remark that our method only requires each MS to feed back M real values along with the corresponding beamforming vector indices, which is significantly less than the full CSIT case. As our main result, when M uplink and M downlink MSs are served through our full-duplex system with hybrid opportunistic scheduling, it is shown that the sum DoF of 2 M is achievable provided that the number of MSs, N, scales faster than SNR M . That is, the full DoF is guaranteed under an improved user scaling law without any extra CSI as it was shown in [26] that N need to scale faster than SNR 2 M 1 to guarantee the DoF optimality. The interference decaying rate, defined as the average decaying rate of the total amount of received interference and/or generating interference with respect to the number of MSs, is also analyzed asymptotically. In addition, numerical results are provided to validate our analysis. It was examined that the proposed hybrid opportunistic scheduling outperforms the state-of-the-art method in [26] in terms of achievable sum-rates.
Our main contributions are four-fold and summarized as follows:
  • A new hybrid opportunistic scheduling method is presented in the sense that the scheduling role between downlink MSs and uplink MSs is well-balanced.
  • The DoF and user scaling law are newly derived by analyzing the distributions of our scheduling metrics.
  • The average interference decaying rate is also analyzed.
  • Numerical examples are provided to not only validate our analysis but also show superiority of the proposed method over the state-of-the-art method.

1.3. Organization

The rest of this paper is organized as follows. Section 2 describes the system model and a performance metric. The proposed hybrid opportunistic scheduling method is presented in Section 3. Its DoF and user scaling laws are derived in Section 4. Numerical evaluation is shown via computer simulations in Section 5. Finally, we conclude the paper in Section 6.

2. System Model and Performance Metric

In this section, we first describe the system and channel models and then define a performance metric used in this paper.

2.1. System Model

As illustrated in Figure 1, we consider a single-cell multi-antenna full-duplex TDD system consisting of a full-duplex BS having M transmit antennas and M receive antennas and a set of N half-duplex MSs with a single antenna each, where N 2 M . Since full-duplex operation at the BS is assumed, uplink and downlink data transmission can take place simultaneously at the BS. On the other hand, each half-duplex MS can be supported by either uplink or downlink, but not simultaneously, i.e., S d S u = , where S d and S u denote the sets of downlink and uplink MSs at a given time, and is the empty set. Moreover, we assume that S d and S u have the same cardinality of M, i.e., S d = S u = M . We assume that there is no self-interference due to the full-duplex operation at the BS, i.e., self-interference due to the full-duplex operation at the BS is perfectly suppressed.
Throughout this paper, the operators C , E [ · ] , Pr { · } , and ( · ) indicate the field of complex numbers, the statistical expectation, the probability, and the transpose conjugate, respectively. Unless otherwise stated, all logarithms are assumed to be to the base 2. We use the following asymptotic notation: (i) f ( x ) = O ( g ( x ) ) means that there exist constants C and c such that f ( x ) C g ( x ) for all x > c , (ii) f ( x ) = Ω ( g ( x ) ) if g ( x ) = O ( f ( x ) ) , (iii) f ( x ) = ω ( g ( x ) ) means that lim x g ( x ) f ( x ) = 0 , and (iv) f ( x ) = Θ ( g ( x ) ) if f ( x ) = O ( g ( x ) ) and f ( x ) = Ω ( g ( x ) ) [31].

2.2. Channel Model

Now, let us turn to channel modeling. The received signal for downlink transmission at MS i and the received signal vector for uplink transmission at the BS, denoted by y i d C and y u C M × 1 , can be written as
y i d = β i ( d ) h i d s d + j S u β i j ( M ) h i j s j u + n i d ,
y u = i S u β i ( u ) h i u s i u + n u ,
respectively, where β i ( d ) h i d C M × 1 , β i ( u ) h i u C M × 1 , and β i j ( M ) h i j C denote the channel vectors from the BS to MS i, from MS i to the BS, and channels from MS j to MS i, respectively. Here, the channel coefficients β i ( d ) h i d , β i ( u ) β h i u , and β i j ( M ) h i j consist of the large-scale path-loss component, which is independent of SNR, and the small-scale complex fading component. More specifically, β i ( d ) , β i ( u ) , and β i j ( M ) represent the nonnegative path-loss attenuation factor between the BS and MS i for downlink, between MS i and the BS for uplink, and between two MSs i and j, respectively. We assume that each element of small-scale fading channels is independent and identically distributed (i.i.d.) according to CN 0 , 1 , where the notation CN μ , Σ indicates the complex Gaussian distribution with a mean vector μ and a covariance matrix Σ . The downlink transmit signal vector at the BS and the uplink signal at MS j, denoted by s d C M × 1 and s j u C , respectively, satisfy the average power constraints E s d 2 = 1 and E s j u 2 = 1 . The additive noise at MS i, denoted by n i d , and each element of the additive noise vector at the BS, denoted by n u , are i.i.d. complex Gaussian with zero mean and variance of N 0 , respectively.
We assume the block fading channel model, i.e., channel coefficients are constant during one coding or communication block and changes to a new independent value for every transmission block. We further assume that full CSI is available at the receiver side, but only partial CSI (effective channel gain information) is available at the transmitter side, which will be specified later on.

2.3. Performance Metric

As a performance metric, we use the sum DoF, which is defined by
DoF = lim SNR R u + R d log SNR ,
where R u and R d denote the achievable sum-rates for uplink and downlink, respectively. Note that this DoF is the pre-log of the sum-rate capacity in the high SNR regime. In the next section, we describe our new hybrid opportunistic scheduling method for the cellular multi-antenna system with one full-duplex BS and multiple half-duplex MSs. We then show that it leads to an improved user scaling law (i.e., the reduced number of MSs) for guaranteeing the optimal DoF, compared to the prior work in [26].

3. New Hybrid Opportunistic Scheduling

In the full-duplex system with one multi-antenna BS, an opportunistic scheduling method was introduced in [26] by employing uplink ZF beamforming at the BS and downlink random beamforming at the BS. In the scheduling procedure, downlink MSs were opportunistically selected in the sense of minimizing the total interference level including both downlink interference and MS-to-MS interference, whereas uplink MSs were arbitrarily chosen. For this reason, the method in [26] requires plenty of MSs so that downlink MSs who have a sufficiently small amount of the scheduling metric (shown later in this section) are finally selected while achieving M DoF for downlink. That is, a stringent user scaling condition is necessary under the method in [26] due to the scheduling role imbalance between downlink MSs and uplink MSs.
In this section, we propose another type of hybrid opportunistic scheduling such that both uplink and downlink MSs are opportunistically selected, thereby resulting in the reduced number of MSs required to achieve the full DoF. The overall procedure of our scheduling method is described according to the following steps:
  • Downlink Random Beamforming at the BS: The BS generates M orthonormal random vectors v i C M × 1 i = 1 M , where v i i = 1 M are generated according to the isotropic distribution over the M-dimensional unit sphere. Then, the BS broadcasts its generated beamforming vectors V = v 1 , , v M to all MSs over the system.
  • Downlink Scheduling Metric Calculation and Feedback: We first focus on the downlink user scheduling process. In our proposed method, we define the downlink scheduling metric of each MS i { 1 , , N } as the downlink interference. Let us suppose that MS i is served by downlink beamforming vector v m . Then, the mth downlink scheduling metric of MS i, denoted by L i , m , is expressed as
    L i , m = k = 1 , k m M β i ( d ) 2 h i ( d ) v k 2 .
    Here, MS i calculates the set of its downlink scheduling metrics L i , 1 , , L i , M and then feeds those values as well as its own user ID back to the BS.
  • Downlink User Selection: Upon receiving the sets of the downlink scheduling metrics from the all MSs, the BS selects
    π m = arg min i 1 , , N \ π l l = 1 m 1 L i , m ,
    which eventually results in the set of selected downlink MSs S d = π 1 , , π M . Then, the BS broadcasts a short signaling message representing the set of selected downlink MSs. The BS is ready for transmitting its downlink packets to MS π m using the beamforimg vector v m , where m { 1 , , M } .
  • Uplink User Scheduling Metric Calculation and Feedback: We now turn to the uplink user scheduling process by utilizing the channel reciprocity of our TDD system. The first step of uplink user scheduling is to define the uplink scheduling metric of each MS j 1 , , N \ S d as the MS-to-MS interference (i.e., the sum of the interference leakage power from itself to all MSs in S d ). Then, the uplink scheduling metric of MS j, denoted by γ j , is represented as follows:
    γ j = i S d β i j ( M ) 2 h i j 2 .
    From both the feedback signals from the selected downlink MSs and the short signaling message from the BS, each uplink MS is capable of computing the metric in Equation (6). Thus, MS j 1 , , N \ S d calculates its uplink scheduling metric γ j and feeds its value as well as its own user ID back to the BS.
  • Uplink User Selection: Upon receiving N M uplink scheduling metrics except for the selected downlink MSs in S d , the BS selects M uplink MSs having the smallest uplink scheduling metrics. That is, for m 1 , , M , the BS selects
    ϕ m = arg min j 1 , , N \ S d ϕ l l = 1 m 1 γ j ,
    which eventually results in the set of selected uplink MSs S u = ϕ 1 , , ϕ M . Then, each MS in S u is ready for transmitting its uplink packets.
  • Uplink ZF Beamforming at the BS: To decode uplink packets, the BS applies ZF receive filtering by nulling out the uplink interference without CSI at the transmitter.
For the proposed opportunistic scheduling method, we assume that each MS j 1 , , N \ S d can estimate the MS-to-MS interference γ j by overhearing feedback signals sent from the downlink MSs to report their scheduling metrics to the BS. Moreover, it is worthwhile to address the fundamental differences between our approach and two different types of scheduling methods for full-duplex systems as follows.
Remark 1.
In [25], instead of ZF beamforming, random receive beamforming for decoding uplink packets is employed at the BS. In [26], a set of downlink MSs is selected to eliminate both the downlink interference and MS-to-MS interference, whereas a set of uplink MSs is arbitrarily chosen.

4. Analysis of DoF and User Scaling

In this section, we first analyze the DoF achievability of our new hybrid opportunistic scheduling method along with the corresponding user scaling law. We then analyze the interference decaying rate with respect to the number of MSs.

4.1. User Scaling Law

For uplink transmission, it is obvious that the sum DoF of M is achievable by using the ZF receiver at the BS. Thus, we focus on analyzing how to achieve the sum DoF of M for downlink transmission.
When the sets of the selected downlink and uplink MSs, denoted by S d = π 1 , , π M and S u = ϕ 1 , , ϕ M , respectively, are determined, the received signal at MS π i for downlink transmission is rewritten as
y π i d = β π i ( d ) h π i d s d + j S u β π i j ( M ) h π i j s j u + n π i d = β π i ( d ) h π i d v i d x i d + k = 1 , k i M β π i ( d ) h π k d v k d x k d + j S u β π i j ( M ) h π i j s j u + n i d .
Thus, from Equation (8), the received signal-to-interference-plus-noise ratio (SINR) at MS π i is given by
SINR π i d = SNR β π i ( d ) 2 h π i d v i 2 SNR k = 1 , k i M β π i ( d ) 2 h π i d v k 2 + SNR j S u β π i j ( M ) 2 h π i j 2 + 1 = SNR β π i ( d ) 2 h π i d v i 2 I π i d + I π i u + 1 ,
where I π i d = SNR k = 1 , k i β π i ( d ) 2 h π i d v k 2 and I π i u = SNR j S u β π i j ( M ) 2 h π i j 2 denote the interference caused by other generated beams (i.e., the downlink interference) and the interference from the selected uplink MSs to MS π i (i.e., the MS-to-MS interference), respectively. Then, using the received SINR in Equation (9), the achievable sum-rate for downlink is given by
R d = i = 1 M log 2 1 + SINR π i ( d ) .
Now, the following theorem establishes the DoF achievability of the proposed hybrid opportunistic scheduling method presented in Section 3.
Theorem 1.
For the multi-antenna full-duplex system in Section 2, the optimal DoF of 2 M is achievable with high probability if
N = ω S N R M .
Proof. 
For uplink transmission, it is obvious that the sum DoF of M is achievable by using the ZF receiver at the BS. Thus, we focus on the achievable DoF for downlink.
Let us define P d and P u by the probabilities that the downlink interference and the MS-to-MS interference at all the selected downlink MSs are less than or equal to ϵ ˜ 1 > 0 and ϵ ˜ 2 > 0 , respectively, where ϵ ˜ 1 and ϵ ˜ 2 are small constants independent of SNR. Then, P d and P u can be expressed as
P d = lim S N R Pr SNR k = 1 , k i M β π i ( d ) 2 h π i d v k 2 ϵ ˜ 1 , i { 1 , , M }
and
P u = lim S N R Pr SNR j S u β π i j ( M ) 2 h π i j 2 ϵ ˜ 2 , i { 1 , , M } ,
respectively. Then, the sum DoF for downlink transmission, denoted by DoF d , is lower-bounded by
DoF d M · P d · P u .
Now, let us characterize two probabilities P d and P u . First, P d can be rewritten as
P d = lim S N R Pr SNR k = 1 , k i M h π i d v k 2 ϵ 1 , i { 1 , , M } = lim S N R Pr k = 1 , k i M h π i d v k 2 ϵ 1 SNR 1 , i { 1 , , M } ,
where ϵ 1 = ϵ ˜ 1 β π 1 ( d ) 1 , which is independent of SNR. Here, the term k = 1 , k i M h π i d v k 2 corresponds to the downlink scheduling metric of selected MS π i with no path-loss component and follows the chi-square distribution with 2 M degrees of freedom for i { 1 , , M } since the M-dimensional downlink channel vector h π i d is isotropically distributed. Note that the right-hand side of Equation (15) indicates the probability that there exist at least M MSs that fulfills the inequality k = 1 , k i M h π i d v k 2 ϵ 1 SNR 1 .
Thus, by denoting F ( x ) by the cumulative density function (CDF) of a chi-square random variable with 2 M degrees of freedom, it follows that
P d = 1 lim S N R i = 0 M 1 N i F ϵ 1 SNR 1 i · 1 F ϵ 1 SNR 1 N i = 1 lim S N R i = 0 M 1 N ! i ! ( N i ) ! F ϵ 1 SNR 1 i · 1 F ϵ 1 SNR 1 N 1 F ϵ 1 SNR 1 i ( a ) 1 lim S N R i = 0 M 1 N · F ϵ 1 SNR 1 i · 1 F ϵ 1 SNR 1 N 1 F ϵ 1 SNR 1 i ( b ) 1 lim S N R i = 0 M 1 N C d , 2 SNR M i · 1 C d , 1 SNR M N 1 C d , 2 SNR M i ,
where
C d , 1 = e 1 2 M M · Γ ( M ) · ϵ 1 M
and
C d , 2 = 2 ( M 1 ) M · Γ ( M ) · ϵ 1 M .
Here, Γ ( M ) = 0 t M 1 e t d t is the Gamma function; ( a ) holds from the fact that N ! i ! ( N i ) ! N i ; and ( b ) holds from the fact that (see Lemma 1 in [20])
e 1 2 M M · Γ ( M ) · x M F ( x ) 2 ( M 1 ) M · Γ ( M ) · x M .
Next, let us turn to characterizing P u as follows:
P u lim S N R Pr SNR j S u h π i j 2 ϵ 2 , i { 1 , , M } lim S N R Pr SNR j S u i = 1 M h π i j 2 ϵ 2 lim S N R Pr i = 1 M h π i j 2 ϵ 2 SNR 1 M , j S u ,
where ϵ 2 = ϵ ˜ 2 max { β π i ϕ 1 ( M ) , , β π i ϕ M ( M ) } 1 , which is independent of SNR. Since the term i = 1 M h π i j 2 corresponds to the uplink scheduling metric γ j with no path-loss component and is the chi-square random variable with 2 M degrees of freedom for j S u , Equation (21) can further be lower-bounded by
P u 1 lim S N R i = 0 M 1 N M i F ϵ 2 SNR 1 M i · 1 F ϵ 2 SNR 1 M i N M i = 1 lim S N R i = 0 M 1 ( N M ) ! i ! ( N M i ) ! F ϵ 2 SNR 1 M i · 1 F ϵ 2 SNR 1 M N M 1 F ϵ 2 SNR 1 M i 1 lim S N R i = 0 M 1 N M · F ϵ 2 SNR 1 M i · 1 F ϵ 2 SNR 1 M N M 1 F ϵ 2 SNR 1 M i 1 lim S N R i = 0 M 1 N M C u , 2 SNR M i · 1 C u , 1 SNR M N M 1 C u , 2 SNR M i ,
where
C u , 1 = e 1 2 M M · Γ ( M ) · ϵ 2 M M ,
and
C u , 2 = 2 ( M 1 ) M · Γ ( M ) · ϵ 2 M M .
It is not difficult to show that if N = ω SNR M , then two terms 1 C d , 1 SNR M N and 1 C u , 1 SNR M N M decrease exponentially with respect to SNR , whereas other two terms N C d , 2 SNR M i and N M C u , 2 SNR M i increase polymonially for any i > 0 . In consequence, as SNR goes to infinity, both P d and P u tend to one. Hence, from Equation (14), DoF d M if N = ω SNR M , which completes the proof of this theorem. ☐
Our main result is now compared with the achievability result in [26] with respect to the user scaling law.
Remark 2.
In the multi-antenna full-duplex system consisting of a full-duplex BS having 2 M antennas (M transmit and receive antennas each) and a set of N half-duplex MSs with a single antenna each, it was shown in [26] that the optimal DoF is achievable by using opportunistic scheduling at the downlink MSs and random selection of the uplink MSs, provided that N scales faster than SNR 2 M 1 . In this work, we have proposed the hybrid opportunistic scheduling method such that both the uplink and downlink MSs are opportunistically selected, thereby resuling in the reduced number of MSs required to achieve the optimal sum DoF (i.e., 2 M DoF). Note that our scheduling method does not utilize any further CSI at the transmitters, compared to that of [26].

4.2. Interference Decaying Rate

Next, we analyze the average interference decaying rate defined as the average decaying rate of the total amount of received interference and/or generating interference with respect to the number of MSs, N. This is meaningful since the desired user scaling law is closely related to the interference decaying rate with increasing N for given SNR.
Let I min , M ( d ) denote the maximum value (i.e., the Mth smallest value) among the downlink interference levels that M selected downlink MSs compute, which is given by
I min , M ( d ) = max π m S d L π m ,
where L π m represents the downlink scheduling metric of selected MS π m and S d is the set of selected downlink MSs. In addition, let I min , M ( u ) denote the maximum value among the MS-to-MS interference levels that M selected uplink MSs compute, which is given by
I min , M ( u ) = max ϕ j S u γ ϕ j ,
where γ ϕ j is the uplink scheduling metric of selected MS ϕ j as shown in Equation (6) and S u is the set of selected uplink MSs. Since the performance of our hybrid opportunistic scheduling method is limited mainly by (1) such a selected downlink MS that receives the maximum amount of interference from other beams generated by the BS or (2) such a selected uplink MS that generates the maximum amount of interference to selected downlink MSs, it is certainly worth analyzing an asymptotic behavior of I min , 2 M max { I min , M ( d ) , I min , M ( u ) } with respect to N.
Now, we are ready to establish our second main result, which shows a lower bound on the average interference decaying rate E 1 I min , 2 M with respect to N.
Theorem 2.
For the multi-antenna full-duplex system in Section 2, the average interference decaying rate is lower-bounded by
E 1 I min , 2 M Θ N 1 / M .
Proof. 
The proof essentially follows the same steps as those in (Section III-B in [32]) and (Remark 1 in [26]), and thus a brief sketch of the proof is provided here. From the proof of Theorem 1 and the Markov’s inequality, it follows that
1 Pr I min , 2 M ϵ SNR M · SNR ϵ E max { I min , M ( d ) , I min , M ( u ) } = M · SNR ϵ E max max π m S d L π m , max ϕ j S u γ π j = Θ SNR N 1 / M
for small ϵ > 0 , which tends to zero if N = ω SNR M . Here, the first equality holds due to Equations (24) and (25). This completes the proof of Theorem 2. ☐
From the above theorem, we obtain the same scaling law as in Theorem 1. This implies that the faster interference decaying rate with respect to N, the smaller SNR exponent in the user scaling law.

5. Numerical Evaluation

In this section, we perform computer simulations to validate our analysis in Section 4. Numerical examples are also provided to evaluate the sum-rate performance of the proposed hybrid opportunistic scheduling method for finite parameters N and SNR. In our simulations, each channel coefficient in Equations (1) and (2) is generated 10 4 times for each system parameter. Unless otherwise stated, it is assumed that the large-scale path-loss component (i.e., β i ( d ) , β i ( u ) , and β i j ( M ) for all i and j) is given by 1 in our simulations.
The average interference decaying rate is first evaluated numerically according to the total number of MSs, N. Even if it seems unrealistic to have a large number of MSs in a cell, the range of parameter N is taken into account to precisely see some trends of curves varying with N. In Figure 2, the log–log plot of the average interference decaying rate versus N is shown as N increases for system parameter M { 2 , 3 } , indicating the number of transmit or receive antennas at the BS. This numerical result reveals that the interference decaying rate tends to decrease almost linearly with N, but the slopes of the curves vary according to M. The dotted lines are obtained from Theorem 2 (theoretical results) with proper biases, and, thus, only the slopes of the dotted lines are relevant. It is shown that the bound in Theorem 2 is indeed tight since the average interference decaying rates shown in Figure 2 are consistent with the user scaling law derived in Theorem 1. Moreover, it is shown that the average interference decaying rate gets increased as M increases since the user scaling law in Theorems 1 and 2 is expressed as an increasing function of M.
As shown in Figure 3, when M { 2 , 3 } , the achievable sum-rates of the proposed hybrid opportunistic scheduling method are now evaluated according to the received SNR (in dB scale) and are compared with the conventional scheduling method in [26] where downlink MSs are opportunistically selected while uplink MSs are arbitrarily selected. Note that N is set to a different scalable value according to SNR, i.e., N = SNR M , to see whether the slope of a curve follows the DoF in Theorems 1. It is obvious to see that the proposed method outperforms the conventional one in terms of sum-rates for all SNR regimes. This is because the DoF achieved by the method in [26] is surely lower than 2 M = 4 due to the fact that its user scaling law N = ω ( SNR 2 M 1 ) is not fulfilled and thus there exists more residual interference at each receiver side. It indicates that the performance gap between the two methods becomes large in the high SNR regime.
In addition, the effect of the path-loss attenuation factor on the sum-rates is examined. For convenience of an illustration, suppose that β β i ( d ) = β i ( u ) and β i j ( M ) = 1 . That is, we consider the case where both downlink and uplink channels experience the same degree of path-loss attenuation. Here, 0 < β < 1 corresponds to the case where an MS and the BS are relatively far away from each other while most MSs are co-located. On the other hand, β > 1 corresponds to the case where the distance between an MS and the BS is relatively close and MSs are separated by an obstacle (e.g., a wall). In Figure 4, the achievable sum-rates of the proposed hybrid opportunistic scheduling method versus the received SNR (in dB scale) are evaluated for M = 2 and β { 0.2 , 0.5 , 0.8 , 1.2 , 1.5 } . As β decreases, both the desired signal power at MS π i and the downlink interference power at MS π i get reduced due to a more severe path-loss attenuation between an MS and the BS. From the figure, it is shown that the sum-rates are degraded with decreasing β , which reveals that reduction on the desired signal power is more significant in determining the sum-rate performance.

6. Conclusions

A new hybrid opportunistic scheduling method was presented in multi-antenna full-duplex systems with partial CSIT where the effective channel gain information is only available at the transmitter. Unlike the prior work in [26], both the downlink and uplink MSs were opportunistically selected in the proposed method, which leads to an improved user scaling law (i.e., the reduced number of MSs). It was analyzed that the proposed method asymptotically achieves the DoF of 2 M provided that the number of MSs, N, scales faster than SNR M . That is, it was shown that the full DoF is guaranteed under the improved user scaling law without any extra CSIT compared to the state-of-the-art scheduling method in [26] that requires the user scaling condition of N = ω ( SNR 2 M 1 ) . Numerical evaluation was also shown to verify that our method outperforms the conventional one under realistic network conditions (e.g., finite N and SNR) with respect to achievable sum-rates.
Further investigation of the numerical evaluation in a more general setup, which includes different large-scale path-loss components for each link by considering the spatial location of MSs, remains for future work. Suggestions for further research in this area also include examining the effects of MS mobility on the performance via extensive computer simulations.

Acknowledgments

This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (2017R1D1A1A09000835) and by the Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIT) (2014-0-00532, Development of PS-LTE System and Terminal for National Public Safety Service).

Author Contributions

Haksoo Kim wrote the simulation code and performed experiments; Juyeop Kim in part designed the system model; Sang Won Choi in part designed the protocol; and Won-Yong Shin conceived and designed the overall protocol, and derived the main theorem.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Aryafar, E.; Khojastepour, M.; Sundaresan, K.; Rangarajan, S.; Chiang, M. MIDU: Enabling MIMO full-duplex. In Proceedings of the ACM Annual International Conference on Mobile Computing and Networking (MobiCom), Istanbul, Turkey, 22–26 August 2012; pp. 257–268. [Google Scholar]
  2. Sahai, A.; Diggavi, S.N.; Sabharwal, A. On degrees-of-freedom of full-duplex uplink/downlink channel. In Proceedings of the IEEE Information Theory Workshop (ITW), Sevilla, Spain, 9–13 September 2013; pp. 1–5. [Google Scholar]
  3. Bai, J.; Sabharwal, A. Distributed full-duplex via wireless side channels: Bounds and protocols. IEEE Trans. Wirel. Commun. 2013, 12, 4162–4173. [Google Scholar] [CrossRef]
  4. Elmahdy, A.M.; El-Keyi, A.; Mohasseb, Y.; ElBatt, T.; Nafie, M.; Seddik, K.G.; Khattab, T. Degrees of freedom of the full-duplex asymmetric MIMO three-way channel with unicast and broadcast messages. IEEE Trans. Commun. 2017, 65, 3276–3287. [Google Scholar]
  5. Chae, S.H.; Lim, S.H.; Jeon, S.-W. Degrees of freedom of full-duplex multiantenna cellular networks. IEEE Trans. Wirel. Commun. 2018, 17, 982–995. [Google Scholar] [CrossRef]
  6. Knopp, R.; Humblet, P. Information capacity and power control in single cell multiuser communications. In Proceedings of the IEEE International Conference on Communications (ICC), Seattle, WA, USA, 18–22 June 1995; pp. 331–335. [Google Scholar]
  7. Viswanath, P.; Tse, D.N.C.; Laroia, R. Opportunistic beamforming using dumb antennas. IEEE Trans. Inf. Theory 2002, 48, 1277–1294. [Google Scholar] [CrossRef]
  8. Sharif, M.; Hassibi, B. On the capacity of MIMO broadcast channels with partial side information. IEEE Trans. Inf. Theory 2005, 51, 506–522. [Google Scholar] [CrossRef]
  9. Cui, S.; Haimovich, A.M.; Somekh, O.; Poor, H.V. Opportunistic relaying in wireless networks. IEEE Trans. Inf. Theory 2009, 55, 5121–5137. [Google Scholar] [CrossRef]
  10. Shin, W.-Y.; Chung, S.-Y.; Lee, Y.H. Parallel opportunistic routing in wireless networks. IEEE Trans. Inf. Theory 2013, 59, 6290–6300. [Google Scholar] [CrossRef]
  11. Shin, W.-Y.; Mai, V.V.; Jung, B.C.; Yang, H.J. Opportunistic network decoupling with virtual full-duplex operation in multi-source interfering relay networks. IEEE Trans. Mobile Comput. 2017, 16, 2321–2333. [Google Scholar] [CrossRef]
  12. Ban, T.W.; Choi, W.; Jung, B.C.; Sung, D.K. Multi-user diversity in a spectrum sharing system. IEEE Trans. Wirel. Commun. 2009, 8, 102–106. [Google Scholar] [CrossRef]
  13. Tajer, A.; Wang, X. Multiuser diversity gain in cognitive networks. IEEE/ACM Trans. Netw. 2010, 18, 1766–1779. [Google Scholar] [CrossRef]
  14. Shen, C.; Fitz, M.P. Opportunistic spatial orthogonalization and its application in fading cognitive radio networks. IEEE J. Sel. Top. Signal Process. 2011, 5, 182–189. [Google Scholar] [CrossRef]
  15. Tajer, A.; Wang, X. (n,k)-user interference channels: Degrees of freedom. IEEE Trans. Inf. Theory 2008, 58, 5338–5353. [Google Scholar] [CrossRef]
  16. Shin, W.-Y.; Jung, B.C. Network coordinated opportunistic beamforming in downlink cellular networks. IEICE Trans. Commun. 2012, E95-B, 1393–1396. [Google Scholar] [CrossRef]
  17. Nguyen, H.D.; Zhang, R.; Hui, H.T. Multi-cell random beamforming: Achievable rate and degrees of freedom region. IEEE Trans. Signal Process. 2013, 14, 3532–3544. [Google Scholar] [CrossRef]
  18. Yang, H.J.; Shin, W.-Y.; Jung, B.C.; Suh, C.; Paulraj, A. Opportunistic downlink interference alignment for multi-cell MIMO networks. IEEE Trans. Wirel. Commun. 2017, 16, 1533–1548. [Google Scholar] [CrossRef]
  19. Jung, B.C.; Shin, W.-Y. Opportunistic interference alignment for interference-limited cellular TDD uplink. IEEE Commun. Lett. 2011, 15, 148–150. [Google Scholar] [CrossRef]
  20. Jung, B.C.; Park, D.; Shin, W.-Y. Opportunistic interference mitigation achieves optimal degrees-of-freedom in wireless multi-cell uplink networks. IEEE Trans. Commun. 2012, 60, 1935–1944. [Google Scholar] [CrossRef]
  21. Yang, H.J.; Shin, W.-Y.; Jung, B.C.; Paulraj, A. Opportunistic interference alignment for MIMO interfering multiple-access channels. IEEE Trans. Wirel. Commun. 2013, 12, 2180–2192. [Google Scholar] [CrossRef]
  22. Yang, H.J.; Jung, B.C.; Shin, W.-Y.; Paulraj, A. Codebook-based opportunistic interference alignment. IEEE Trans. Signal Process. 2014, 62, 2922–2937. [Google Scholar] [CrossRef]
  23. Shin, W.-Y.; Park, D.; Jung, B.C. Can one achieve multiuser diversity in uplink multi-cell networks? IEEE Trans. Commun. 2012, 60, 3535–3540. [Google Scholar] [CrossRef]
  24. Jung, B.C.; Kim, S.M.; Shin, W.-Y.; Yang, H.J. Optimal multiuser diversity in multi-cell MIMO uplink networks: User scaling law and beamforming design. Entropy 2017, 16, 393. [Google Scholar] [CrossRef]
  25. Karakus, C.; Diggavi, S.N. Opportunistic scheduling for full-duplex uplink-downlink networks. In Proceedings of the IEEE International Conference on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015; pp. 1019–1023. [Google Scholar]
  26. Mai, V.V.; Kim, J.; Jeon, S.-W.; Choi, S.W.; Seo, B.; Shin, W.-Y. Degrees of freedom of millimeter wave full-duplex systems with partial CSIT. IEEE Commun. Lett. 2016, 20, 1042–1045. [Google Scholar] [CrossRef]
  27. Zhang, H.; Huang, S.; Jiang, C.; Long, K.; Leung, V.C.M.; Poor, H.V. Energy efficient user association and power allocation in millimeter-wave-based ultra dense networks with energy harvesting base stations. IEEE J. Sel. Areas Commun. 2017, 35, 1936–1947. [Google Scholar] [CrossRef]
  28. Zhang, H.; Du, J.; Cheng, J.; Long, K.; Leung, V.C.M. Incomplete CSI based resource optimization in SWIPT enabled heterogeneous networks: A non-cooperative game theoretic approach. IEEE Trans. Wirel. Commun. 2017. [Google Scholar] [CrossRef]
  29. Mai, V.V.; Shin, W.-Y.; Ishibashi, K. Wireless power transfer for distributed estimation in sensor networks. IEEE J. Sel. Top. Signal Process. 2017, 11, 549–562. [Google Scholar] [CrossRef]
  30. Zhang, H.; Nie, Y.; Cheng, J.; Leung, V.C.M.; Nallanathan, A. Sensing time optimization and power control for energy efficient cognitive small cell with imperfect hybrid spectrum sensing. IEEE Trans. Wirel. Commun. 2017, 16, 730–743. [Google Scholar] [CrossRef]
  31. Knuth, D.E. Big Omicron and big Omega and big Theta. ACM SIGACT News 1976, 8, 18–24. [Google Scholar] [CrossRef]
  32. Jose, J.; Subramanian, S.; Wu, X.; Li, J. Opportunistic interference alignment in cellular downlink. In Proceedings of the 50th Annual Allerton Conference on Communication, Control and Conputing, Urbana-Champaign, IL, USA, 1–5 October 2012; pp. 1529–1534. [Google Scholar]
Figure 1. The multi-antenna full-duplex system when M = 2 and N = 15 .
Figure 1. The multi-antenna full-duplex system when M = 2 and N = 15 .
Entropy 20 00160 g001
Figure 2. The average interference decaying rate versus N when M { 2 , 3 } .
Figure 2. The average interference decaying rate versus N when M { 2 , 3 } .
Entropy 20 00160 g002
Figure 3. The achievable sum-rates versus SNR. (a) M = 2 ; (b) M = 3 .
Figure 3. The achievable sum-rates versus SNR. (a) M = 2 ; (b) M = 3 .
Entropy 20 00160 g003
Figure 4. The achievable sum-rates versus SNR when M = 2 and β { 0.2 , 0.5 , 0.8 , 1.2 , 1.5 } .
Figure 4. The achievable sum-rates versus SNR when M = 2 and β { 0.2 , 0.5 , 0.8 , 1.2 , 1.5 } .
Entropy 20 00160 g004

Share and Cite

MDPI and ACS Style

Kim, H.; Kim, J.; Choi, S.W.; Shin, W.-Y. Revisiting Degrees of Freedom of Full-Duplex Systems with Opportunistic Transmission: An Improved User Scaling Law. Entropy 2018, 20, 160. https://doi.org/10.3390/e20030160

AMA Style

Kim H, Kim J, Choi SW, Shin W-Y. Revisiting Degrees of Freedom of Full-Duplex Systems with Opportunistic Transmission: An Improved User Scaling Law. Entropy. 2018; 20(3):160. https://doi.org/10.3390/e20030160

Chicago/Turabian Style

Kim, Haksoo, Juyeop Kim, Sang Won Choi, and Won-Yong Shin. 2018. "Revisiting Degrees of Freedom of Full-Duplex Systems with Opportunistic Transmission: An Improved User Scaling Law" Entropy 20, no. 3: 160. https://doi.org/10.3390/e20030160

APA Style

Kim, H., Kim, J., Choi, S. W., & Shin, W. -Y. (2018). Revisiting Degrees of Freedom of Full-Duplex Systems with Opportunistic Transmission: An Improved User Scaling Law. Entropy, 20(3), 160. https://doi.org/10.3390/e20030160

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop