13
RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas 1* and Björn Ottersten 1,2 Abstract Multicell joint processing has originated from information-theoretic principles as a means of reaching the fundamental capacity limits of cellular networks. However, global multicell joint decoding is highly complex and in practice clusters of cooperating Base Stations constitute a more realistic scenario. In this direction, the mitigation of intercluster interference rises as a critical factor towards achieving the promised throughput gains. In this paper, two intercluster interference mitigation techniques are investigated and compared, namely interference alignment and resource division multiple access. The cases of global multicell joint processing and cochannel interference allowance are also considered as an upper and lower bound to the interference alignment scheme, respectively. Each case is modelled and analyzed using the per-cell ergodic sum-rate throughput as a figure of merit. In this process, the asymptotic eigenvalue distribution of the channel covariance matrices is analytically derived based on free-probabilistic arguments in order to quantify the sum-rate throughput. Using numerical results, it is established that resource division multiple access is preferable for dense cellular systems, while cochannel interference allowance is advantageous for highly sparse cellular systems. Interference alignment provides superior performance for average to sparse cellular systems on the expense of higher complexity. 1 Introduction Currently cellular networks carry the main bulk of wire- less traffic and as a result they risk being saturated con- sidering the ever increasing traffic imposed by internet data services. In this context, the academic community in collaboration with industry and standardization bodies have been investigating innovative network archi- tectures and communication techniques which can over- come the interference-limited nature of cellular systems. The paradigm of multicell joint processing has risen as a promising way of overcoming those limitations and has since gained increasing momentum which lead from theoretical research to testbed implementations [1]. Furthermore, the recent inclusion of CoMP (Coordi- nated Multiple Point) techniques in LTE-advanced [2] serves as a reinforcement of the latter statement. Multicell joint processing is based on the idea that sig- nal processing does not take place at individual base sta- tions (BSs), but at a central processor which can jointly serve the user terminals (UTs) of multiple cells through the spatially distributed BSs. It should be noted that the main concept of multicell joint processing is closely connected to the rationale behind Network MIMO and Distributed Antenna Systems (DAS) and those three terms are often utilized interchangeably in the literature. According to the global multicell joint processing, all the BSs of a large cellular system are assumed to be interconnected to a single central processor through an extended backhaul. However, the computational require- ments of such a processor and the large investment needed for backhaul links have hindered its realization. On the other hand, clustered multicell joint processing utilizes multiple signal processors in order to form BS clusters of limited size, but this localized cooperation introduces intercluster interference into the system, which has to be mitigated in order to harvest the full potential of multicell joint processing. In this direction, reuse of time or frequency channel resources (resource division multiple access) could provide the necessary spatial separation amongst clusters, an approach which basically mimics the principles of the traditional cellular paradigm only on a cluster scale. Another alternative would be to simply tolerate intercluster signals as * Correspondence: [email protected] 1 Interdisciplinary Centre for Security, Reliability and Trust, University of Luxembourg, 6, rue Richard Coudenhove-Kalergi, 1359 Luxembourg, Luxembourg Full list of author information is available at the end of the article Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132 http://jwcn.eurasipjournals.com/content/2011/1/132 © 2011 Chatzinotas and Ottersten; licensee Springer. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

  • Upload
    others

  • View
    22

  • Download
    0

Embed Size (px)

Citation preview

Page 1: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

RESEARCH Open Access

Interference mitigation techniques for clusteredmulticell joint decoding systemsSymeon Chatzinotas1* and Björn Ottersten1,2

Abstract

Multicell joint processing has originated from information-theoretic principles as a means of reaching thefundamental capacity limits of cellular networks. However, global multicell joint decoding is highly complex and inpractice clusters of cooperating Base Stations constitute a more realistic scenario. In this direction, the mitigation ofintercluster interference rises as a critical factor towards achieving the promised throughput gains. In this paper,two intercluster interference mitigation techniques are investigated and compared, namely interference alignmentand resource division multiple access. The cases of global multicell joint processing and cochannel interferenceallowance are also considered as an upper and lower bound to the interference alignment scheme, respectively.Each case is modelled and analyzed using the per-cell ergodic sum-rate throughput as a figure of merit. In thisprocess, the asymptotic eigenvalue distribution of the channel covariance matrices is analytically derived based onfree-probabilistic arguments in order to quantify the sum-rate throughput. Using numerical results, it is establishedthat resource division multiple access is preferable for dense cellular systems, while cochannel interferenceallowance is advantageous for highly sparse cellular systems. Interference alignment provides superior performancefor average to sparse cellular systems on the expense of higher complexity.

1 IntroductionCurrently cellular networks carry the main bulk of wire-less traffic and as a result they risk being saturated con-sidering the ever increasing traffic imposed by internetdata services. In this context, the academic communityin collaboration with industry and standardizationbodies have been investigating innovative network archi-tectures and communication techniques which can over-come the interference-limited nature of cellular systems.The paradigm of multicell joint processing has risen asa promising way of overcoming those limitations andhas since gained increasing momentum which lead fromtheoretical research to testbed implementations [1].Furthermore, the recent inclusion of CoMP (Coordi-nated Multiple Point) techniques in LTE-advanced [2]serves as a reinforcement of the latter statement.Multicell joint processing is based on the idea that sig-

nal processing does not take place at individual base sta-tions (BSs), but at a central processor which can jointly

serve the user terminals (UTs) of multiple cells throughthe spatially distributed BSs. It should be noted that themain concept of multicell joint processing is closelyconnected to the rationale behind Network MIMO andDistributed Antenna Systems (DAS) and those threeterms are often utilized interchangeably in the literature.According to the global multicell joint processing, allthe BSs of a large cellular system are assumed to beinterconnected to a single central processor through anextended backhaul. However, the computational require-ments of such a processor and the large investmentneeded for backhaul links have hindered its realization.On the other hand, clustered multicell joint processingutilizes multiple signal processors in order to form BSclusters of limited size, but this localized cooperationintroduces intercluster interference into the system,which has to be mitigated in order to harvest the fullpotential of multicell joint processing. In this direction,reuse of time or frequency channel resources (resourcedivision multiple access) could provide the necessaryspatial separation amongst clusters, an approach whichbasically mimics the principles of the traditional cellularparadigm only on a cluster scale. Another alternativewould be to simply tolerate intercluster signals as

* Correspondence: [email protected] Centre for Security, Reliability and Trust, University ofLuxembourg, 6, rue Richard Coudenhove-Kalergi, 1359 Luxembourg,LuxembourgFull list of author information is available at the end of the article

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

© 2011 Chatzinotas and Ottersten; licensee Springer. This is an Open Access article distributed under the terms of the CreativeCommons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, andreproduction in any medium, provided the original work is properly cited.

Page 2: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

cochannel interference, but obviously this schemebecomes problematic in highly dense systems. Taking allthis into account, the current paper considers the uplinkof a clustered multicell joint decoding (MJD) systemand proposes a new communication strategy for mitigat-ing intercluster interference using interference align-ment (IA). More specifically, the main contributionsherein are:

1. the channel modelling of a clustered MJD systemwith IA as intercluster interference mitigationtechnique,2. the analytical derivation of the ergodic throughputbased on free probabilistic arguments in the R-trans-form domain,3. the analytical comparison with the upper boundof global MJD, the Resource Division MultipleAccess (RDMA) scheme and the lower bound ofclustered MJD with Cochannel Interference allow-ance (CI),4. the comparison of the derived closed-form expres-sions with Monte Carlo simulations and the perfor-mance evaluation using numerical results.

The remainder of this paper is structured as follows:Section 2 reviews in detail prior work in the areas ofclustered MJD and IA. Section 3 describes the channelmodelling, free probability derivations and throughputresults for the following cases: (a) global MJD, (b) IA,(c) RDMA and (d) CI. Section 4 displays the accuracy ofthe analysis by comparing to Monte Carlo simulationsand evaluates the effect of various system parameters inthe throughput performance of clustered MJD. Section6 concludes the paper.

1.1 NotationThroughout the formulations of this paper, E[·] denotesexpectation, (·)H denotes the conjugate matrix transpose,(.)T denotes the matrix transpose, ⊙ denotes the Hada-mard product and ⊗ denotes the Kronecker product.The Frobenius norm of a matrix or vector is denoted by||·|| and the delta function by δ(·). In denotes an n × nidentity matrix, In×m an n × m matrix of ones, 0 a zeromatrix and Gn×m ∼ CN (0, In) denotes n × m Gaussian

matrix with entries drawn form a CN (0, 1) distribution.The figure of merit analyzed and compared throughoutthis paper is the ergodic per-cell sum-rate throughput.a

2 Related work2.1 Multicell joint decodingThis section reviews the literature on MJD systems bydescribing the evolution of global MJD models and sub-sequently focusing on clustered MJD approaches.2.1.1 Global MJDIt was almost three decades ago when the paradigm ofglobal MJD was initially proposed in two seminal papers[3,4], promising large capacity enhancements. The mainidea behind global MJD is the existence of a central pro-cessor (a.k.a. “hyper-receiver”) which is interconnectedto all the BSs through a backhaul of wideband, delaylessand error-free links. The central processor is assumedto have perfect channel state information (CSI) about allthe wireless links of the system. The optimal communi-cation strategy is superposition coding at the UTs andsuccessive interference cancellation at the central pro-cessor. As a result, the central processor is able tojointly decode all the UTs of the system, rendering theconcept of intercell interference void.Since then, the initial results were extended and modi-

fied by the research community for more practical pro-pagation environments, transmission techniques andbackhaul infrastructures in an attempt to more accu-rately quantify the performance gain. More specifically,it was demonstrated in [5] that Rayleigh fading pro-motes multiuser diversity which is beneficial for theergodic capacity performance. Subsequently, realisticpath-loss models and user distributions were investi-gated in [6,7] providing closed-form ergodic capacityexpressions based on the cell size, path loss exponentand geographical distribution of UTs. The beneficialeffect of MIMO links was established in [8,9], where alinear scaling of the ergodic per-cell sum-rate capacitywith the number of BS antennas was shown. However,correlation between multiple antennas has an adverseeffect as shown in [10], especially when correlationaffects the BS side. Imperfect backhaul connectivity hasalso a negative effect on the capacity performance asquantified in [11]. MJD has been also considered incombination with DS-CDMA [12], where chips act asmultiple dimensions. Finally, linear MMSE filtering[13,14] followed by single-user decoding has been con-sidered as an alternative to the optimal multiuser deco-der which requires computationally-complex successiveinterference cancellation.2.1.2 Clustered MJDClustered MJD is based on forming groups of M adjacentBSs (clusters) interconnected to a cluster processor. As aresult, it can be seen as an intermediate state between

Table 1 Parameters for throughput results

Parameter Symbol Value Range Figure

Cluster size M 4 3 - 10 2, 3

a factor a 0.5 0.1 -1 4

UTs per cell K 5 2 - 10 5

Antennas per UT n 4 3 - 11 5

UT Transmit SNR g 20dB

Number of MC iterations 103

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 2 of 13

Page 3: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

traditional cellular systems (M = 1) and global MJD (M =∞). The advantage of clustered MJD lies on the fact thatboth the size of the backhaul network and the number ofUTs to be jointly processed decrease. The benefit is two-fold; first, the extent of the backhaul network is reducedand second, the computational requirements of MJD(which depend on the number of UTs) are lower. The dis-advantage is that the sum-rate capacity performance isdegraded by intercluster interference, especially affectingthe individual rates of cluster-edge UTs. This impairmentcan be tackled using a number of techniques as describedhere. The simplest approach is to just treat it as cochannelinterference and evaluate its effect on the system capacityas in [15]. An alternative would be to use RDMA, namelyto split the time or frequency resources into orthogonalparts dedicated to cluster-edge cells [16]. This approacheliminates intercluster interference but at the same timelimits the available degrees of freedom. In DS-CDMAMJD systems, knowledge of the interfering codebooks hasbeen also used to mitigate intercluster interference [12].Finally, antenna selection schemes were investigated as asimple way of reducing the number of intercluster inter-ferers [17].

2.2 Interference alignmentThis section reviews the basic principles of IA and sub-sequently describes existing applications of IA on cellu-lar networks.2.2.1 IA preliminariesIA has been shown to achieve the degrees of freedom(dofs) for a range of interference channels [18-20]. Itsprinciple is based on aligning the interference on asignal subspace with respect to the non-intendedreceiver, so that it can be easily filtered out by sacrifi-cing some signal dimensions. The advantage is thatthis alignment does not affect the randomness of thesignals and the available dimensions with respect tothe intended receiver. The disadvantage is that the fil-tering at the non-intended receiver removes the signalenergy in the interference subspace and reduces theachievable rate. The fundamental assumptions whichrender IA feasible are that there are multiple availabledimensions (space, frequency, time or code) and thatthe transmitter is aware of the CSI towards the non-intended receiver. The exact number of neededdimensions and the precoding vectors to achieve IAare rather cumbersome to compute, but a number ofapproaches have been presented in the literaturetowards this end [21-23].2.2.2 IA and cellular networksIA has been also investigated in the context of cellularnetworks, showing that it can effectively suppresscochannel interference [23,24]. More specifically, the

downlink of an OFDMA cellular network with clus-tered BS cooperation is considered in [25], where IAis employed to suppress intracluster interference whileintercluster interference has to be tolerated as noise.Using simulations, it is shown therein that even withunit multiplexing gain the throughput performance isincreased compared to a frequency reuse scheme,especially for the cluster-centre UTs. In a similar set-ting, the authors in [26] propose an IA-based resourceallocation scheme which jointly optimizes the fre-quency-domain precoding, subcarrier user selection,and power allocation on the downlink of coordinatedmulticell OFDMA systems. In addition, authors in[24] consider the uplink of a limited-size cellular sys-tem without BS cooperation, showing that the inter-ference-free dofs can be achieved as the number ofUTs grows. Employing IA with unit multiplexing gaintowards the non-intended BSs, they study the effect ofmulti-path channels and single-path channels withpropagation delay. Furthermore, the concept ofdecomposable channel is employed to enable a modi-fied scheme called subspace IA, which is able tosimultaneously align interference towards multiplenon-intended receivers over a multidimensional space.Finally, the effect of limited feedback on cellular IAschemes has been investigated and quantified in[25,27].

3 Channel model and throughput analysisIn this paper, the considered system comprises a modi-fied version of Wyner’s linear cellular array [4,12,28],which has been used extensively as a tractable modelfor studying MJD scenarios [29]. In the modifiedmodel studied herein, MJD is possible for clusters ofM adjacent BSs while the focus is on the uplink.Unlike [23,24], IA is employed herein to mitigate inter-cluster interference between cluster-edge cells. Let usassume that K UTs are positioned between each pairof neighboring BSs with path loss coefficients 1 and a,respectively (Figure 1). All BSs and UTs are equippedwith n = K + 1 antennas b [10]. to enable IA over themultiple spatial dimensions for the clustered UTs. Inthis setting, four scenarios of intercluster interferenceare considered, namely global MJD, IA, RDMA and CI.It should be noted that only cluster-edge UTs employinterference mitigation techniques, while UTs in theinterior of the cluster use the optimal wideband trans-mission scheme with superposition coding as in [5].Successive interference cancellation is employed ineach cluster processor in order to recover the UT sig-nals. Furthermore, each cluster processor has full CSIfor all the wireless links in its coverage area. The fol-lowing subsections explain the mode of operation for

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 3 of 13

Page 4: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

each approach and describe the analytical derivation ofthe per-cell sum-rate throughput.

3.1 Global multicell joint decodingIn global MJD, a central processor is able to jointlydecode the signals received by neighboring clusters and,therefore, no intercluster interference takes place. Inother words, the entire cellular system can be assumedto be comprised of a single extensive cluster. As it canbe seen, this case serves as an upper bound to the IAcase. The received n × 1 symbol vector yi at any randomBS can be expressed as follows:

yi(t) = Gi,i(t)xi(t) + αGi,i+1(t)xi+1(t) + zi(t), (1)

where the n × 1 vector z denotes AWGN withE[zi] = 0 and E[zizHi ] = I. The K n × 1 vector xi denotesthe transmitted symbol vector of the ith UT group withE[xixHi ] = γ I where g is the transmit Signal to Noiseratio per UT antenna. The n × Kn channel matrixGi,i ∼ CN (0, In) includes the flat fading coefficients ofthe ith UT group towards the ith BS modelled as inde-pendent identically distributed (i.i.d.) complex circularlysymmetric (c.c.s.) random variables. Similarly, the termaGi, i+1(t)xi+1(t) represents the received signal at the ithBS originating from the UTs of the neighboring cellindexed i + 1. The scaling factor a < 1 models theamount of received intercell interference which dependson the path loss model and the density of the cellularsystemc. Another intuitive description of the a factor isthat it models the power imbalance between intra-celland inter-cell signals.Assuming a memoryless channel, the system channel

model can be written in a vectorial form as follows:

y = Hx + z, (2)

where the aggregate channel matrix has dimensionsMn × (M + 1)Kn and can be modelled as:

H = � � G (3)

with � = � ⊗ In×kn being a block-Toeplitz matrix and

G ∼ CN (0, IMn). In addition, � is a M × M + 1 Toeplitzmatrix structured as follows:

� =

⎡⎢⎢⎢⎣1 α 0 · · ·0 1 α...

. . .. . .

0 . . . 0 1

00...α

⎤⎥⎥⎥⎦ (4)

Assuming no CSI at the UTs, the per-cell capacity isgiven by the MIMO multiple access (MAC) channelcapacity:

CMJD =1ME[I(x;y—H)

]=

1ME[log det

(IMn + γHHH)] . (5)

Theorem 3.1. In the global MJD case, the per-cellcapacity for asymptotically large n converges almostsurely (a.s.) to the Marcenko-Pastur (MP) law withappropriate scaling [6,10]:

CMJDa.s.−→ KnVMP

(M

M + 1nγ(1 + α2) ,KM + 1

M

),

where VMP (γ ,β) = log(1 + γ − 1

4φ(γ ,β)

)+1βlog(1 + γβ − 1

4φ(γ ,β)

)− 1

4βγφ(γ ,β)

and φ(γ ,β) =

(√γ(1 +√

β)2

+ 1 −√

γ(1 −

√β)2

+ 1

)2

.

(6)

Proof. For the sake of completeness and to facilitatelatter derivations, an outline of the proof in [6,10] is

Cluster of M cells

G1,1 αG1,2 αGM,M+1αG0,1

MJDGM,M

Useful MJD SignalIntercluster Interference

Figure 1 Graphical representation of the considered cellular system modelled as a modified version of Wyner’s model. K UTs arepositioned between each pair of neighboring BSs with path loss coefficients 1 and a respectively. All BSs and UTs are equipped with n = K + 1antennas. The UTs positioned within the box shall be jointly processed. The red links denote intercluster interference.

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 4 of 13

Page 5: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

provided here. The derivation of this expression is basedon an asymptotic analysis in the number of antennas n® ∞:

1nCMJD = lim

x→∞1Mn

E[log det(IMn + γHHH)

]

= limx→∞E

[1Mn

Mn∑i=1

log(1 +Mγ λi

(1Mn

HHH))]

=∫ ∞

0log(1 +Mγ x)f∞

1Mn

HHH

(x)dx

= K∫ ∞

0log(1 +Mγ x)f∞

1Mn

HHH

(x)dx

= KV 1MnH

HH(Mγ )

a.s.−→ KVMP(q(�)Mγ ,K),

(7)

where li (X) and f∞X denote the eigenvalues and the

asymptotic eigenvalue probability distribution function(a.e.p.d.f.) of matrix X respectively andVX(x) = E[log(1 + xX)] denotes the Shannon transformof X with scalar parameter x. It should be noted thatγ = nγ denotes the total UT transmit power normalizedby the receiver noise powerd. The last step of the deriva-tion is based on unit rank matrices decomposition andanalysis on the R-transform domain, as presented in[6,10]. The scaling factor

q (�) �‖ �‖2/(Mn × (M + 1)Kn) (8)

is the Frobenius norm of the Σ matrix

‖�‖ �√tr{�H�} normalized by the matrix dimensions

and

q(�)(a)= q(�) =

1 + α2

M + 1(9)

where step (a) follows from [10, Eq.(34)]. □

3.2 Interference alignmentIn order to evaluate the effect of IA as an interclusterinterference mitigation technique, a simple precodingscheme is assumed for the cluster-edge UT groups,inspired by [24]. Let us assume a n × 1 unit norm refer-ence vector v with ||v||2 = n and

y1 = G1,1x1 + αG1,2x2 + z1 (10)

yM = GM,MxM + αGM,M+1xM+1 + zM, (11)

where y1 and yM represent the received signal vectorsat the first and last BS of the cluster, respectively. Thefirst UT group has to align its input x1 towards thenon-intended BS of the cluster on the left (see FigureA), while the Mth BS has to filter our the aligned

interference coming from the M + 1th UT group whichbelongs to the cluster on the right. These two strategiesare described in detail in the following subsections:3.2.1 Aligned interference filteringThe objective is to suppress the term aGM, M+1xM+1

which represents intercluster interference. It should benoted that UTs of the M + 1th cell are assumed to haveperfect CSI about the channel coefficients GM, M+1. Let

us also assume that xji and Gj

i,irepresent the transmitter

vector and channel matrix of the jth UT in the ithgroup towards the ith BS. In this context, the followingprecoding scheme is employed to align interference:

xjM+1 =(Gj

M,M+1

)−1vjx

jM+1, (12)

where vj = vvj is a scaled version of v which satisfies

the input power constraint E[xjM+1x

iM+1

H]= γ I.. This

precoding results in unit multiplexing gain and is by nomeans the optimal IA schemee [22] provide conditionsfor classifying a scenario as proper or improper, a prop-erty which is shown to be connected to feasibility., butit serves as a tractable way of evaluating the IA perfor-mance [23,24]. the feasibility of IA. Following thisapproach, the intercluster interference can be expressedas:

αGM,M+1xM+1 = α

K∑j=1

GjM,M+1x

jM+1 = α

K∑j=1

GjM,M+1

(Gj

M,M+1

)−1vvjx

jM+1 = αv

K∑j=1

vjxjM+1. (13)

It can be easily seen that interference has been alignedacross the reference vector and it can be removed usinga K× n zero-forcing filter Q designed so that Q is atruncated unitary matrix [19] and Qv = 0. After filter-ing, the received signal at the Mth BS can be expressedas:

yM = QGM,MxM + zM, (14)

Assuming that the system operates in high-SNRregime and is therefore interference limited, the effect ofthe AWGN noise colouring zM = QzM can be ignored,namely E[zMz

HM] = IK.

Lemma 3.1. The Shannon transform of the covariancematrix of QGM,M is equivalent to that of a K × K Gaus-sian matrix GK×K.Proof. Using the property det(I + gAB) = det(I + gBA),

it can be written that:

det(IK + γQGM,M(QGM,M)

H)= det(IK + γQGM,MGH

M,MQH)

= det(In + γGH

M,MQHQGM,M

).

(15)

The K × n truncated unitary matrix Q has K unit sin-gular values and therefore the matrix product QHQ hasK unit eigenvalues and a zero eigenvalue. Applyingeigenvalue decomposition on QHQ, the left and right

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 5 of 13

Page 6: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

eigenvectors can be absorbed by the isotropic Gaussianmatrices GH

M,M and GM,M respectively, while the zeroeigenvalue removes one of the n dimensions. Using thedefinition of Shannon transform [30], Eq. (15) yields

VQGM,M (QGM,M)H(γ ) = VGK×KG

HK×K(γ ). (16)

□Based on this lemma and for the purposes of the ana-

lysis, QGM,M is replaced by GK × K in the equivalentchannel matrix.3.2.2 Interference alignmentThe Mth BS has filtered out incoming interference fromthe cluster on the right (Figure 1), but outgoing inter-cluster interference should be also aligned to completethe analysis. This affects the first UT group whichshould align its interference towards the Mth BS of thecluster on the left (Figure 1). Following the same pre-coding scheme and using Eq. (10)

G1,1x1 =K∑j=1

Gj1,1x

j1 =

K∑j=1

Gj1,1

(Gj

0,1

)−1vvjx

j1, (17)

where Gj0,1 represents the fading coefficients of the jth

UT of the first group towards the Mth BS of the neigh-boring cluster on the left. Since the exact eigenvalue dis-

tribution of the matrix product Gj1,1

(Gj

0,1

)−1vvj is not

straightforward to derive, for the purposes of rate analy-sis it is approximated by a Gaussian vector with unitvariance. This approximation implies that IA precodingdoes not affect the statistics of the equivalent channeltowards the intended BS.3.2.3 Equivalent channel matrixTo summarize, IA has the following effects on the chan-nel matrix H used for the case of global MJD. The inter-cluster interference originating from the M + 1th UTgroup is filtered out and thus Kn vertical dimensionsare lost. During this process, one horizontal dimensionof the Mth BS is also filtered out, since it contains thealigned interference from the M + 1th UT group.Finally, the first UT group has to precode in order toalign its interference towards the Mth BS of neighboringcluster and as a result only K out of Kn dimensions arepreserved. The resulting channel matrix can bedescribed as follows:

HIA = �IA � GIA, (18)

where GIA ∼ CN (0, IMn−1)and

�IA =

⎡⎣�1

�2

�3

⎤⎦ (19)

with �1 = [In×K αIn×Kn0n×(M−2)Kn] being a n × (M - 1)Kn + K matrixf, �2 = [0(M−2)n×K�M−2×M−1 ⊗ In×Kn]being a (M - 2)n × (M - 1)Kn + K matrix and�3 = [0n−1×(M−2)Kn+K In−1×K n] being a n - 1 × (M - 1)Kn + K matrixg.Since all intercluster interference has been filtered out

and the effect of filter Q has been already incorporatedin the structure of HIA, the per-cell throughput in theIA case is still given by the MIMO MAC expression:

CIA =1ME[I(x; y|HIA)

]=

1ME[log det

(IMn−1 + γHIAHH

IA

)].

(20)

Theorem 3.2. In the IA case, the per-cell throughputcan be derived from the R-transform of the a.e.p.d.f. ofmatrix 1

nHHIAHIA.

Proof. Following an asymptotic analysis where n® ∞:

1nCIA = lim

n→∞1Mn

E[log det(IMn−1 + γHIAHH

IA)]

=Mn − 1Mn

limn→∞E

[1

Mn − 1

Mn−1∑i=1

log(1 + γ λi

(1nHIAHH

IA

))]

=Mn − 1Mn

∫ ∞

0log(1 + γ x)f∞

1nHIAHH

IA

(x)dx

=(M − 1)Kn + K

Mn

∫ ∞

0log(1 + γ x)f∞

1nH

HIAHIA

(x)dx

(21)

The a.e.p.d.f. of1nH

HIAHIAis obtained by determining

the imaginary part of the Stieltjes transform S for realarguments

f∞1nHH

IAHIA

(x) = limx→0+

�⎧⎨⎩S1

nHH

IAHIA

(x + jy)

⎫⎬⎭ (22)

considering that the Stieltjes transform is derived fromthe R-transform [31] as follows

S−11nHH

IAHIA

(z) = R1nHH

IAHIA

(−z) − 1z. (23)

□Theorem 3.3. The R-transform of the a.e.p.d.f. of

matrix 1nH

HIAHIAis given by:

R1nHH

IAHIA

(z) =3∑i=1

R1nHH

i Hi

(z, ki,βi, qi) (24)

with k, b, q parameters given by:

H1 : k1 =K + 2

MK +M − K,β1 =

KK + 1

+ K, q1 =1 + (K + 1)α2

K + 2

H2 : k2 =(M − 1)(K + 1)MK +M − K

,β2 =M − 1M − 2

K, q2 =M − 2M − 1

(1 + α2)

H3 : k3 =K + 1

MK +M − K,β3 = K + 1, q3 = 1

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 6 of 13

Page 7: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

and R1nH

Hi Higiven by theorem A.1.

Proof. Based on Eq.(19), the matrix HHIAHIA

can bedecomposed as the following sum:

HHIAHIA = HH

1 H1 +HH2 H2 +HH

3 H3, (25)

where H1 = Σ1 ⊙Gn×(M-1)Kn+K, H2 = Σ2 ⊙ G(M-2)n×(M-

1)Kn+K and H3 = Σ3 ⊙ Gn-1×(M-1)Kn+K. Using the propertyof free additive convolution [30] and Theorem A.1 inAppendix A, Eq. (24) holds in the R-transformdomain. □

3.3 Resource division multiple accessRDMA entails that the available time or frequencyresources are divided into two orthogonal partsassigned to cluster-edge cells in order to eliminateintercluster interference [[16], Efficient isolationscheme]. More specifically, for the first part cluster-edge UTs are inactive and the far-right cluster-edge BS

is active. For the second part, cluster-edge UTs areactive and the far-right cluster-edge BS is inactive.While the available channel resources are cut in halffor cluster-edge UTs, double the power can be trans-mitted during the second part orthogonal part toensure a fair comparison amongst various mitigationschemes. The channel modelling is similar to the onein global MJD case (Eq. (1)), although in this case thethroughput is analyzed separately for each orthogonalpart and subsequently averaged. Assuming no CSI atthe UTs, the per-cell throughput in the RDMA case isgiven by:

CRD =CRD1 + CRD2

2

=12M

(E [log det (IMn + γHRD1H

HRD1

)])+ E[log det(I(M−1)n + γHRD2H

HRD2

)],(26)

where CRD1 and CRD2 denote the capacities for the firstand second orthogonal part respectively. For the firstpart, the cluster processor receives signals from (M - 1)K UTs through all M BSs and the resulting Mn × (M -1)Kn channel matrix is structured as follows:

HRD1 = �RD1 � GMn×(M−1)Kn with HRD1 =

⎡⎣ HRD1α

HHRD1β

⎤⎦

�RD1 =

⎡⎣ �RD1α

�RD1β

⎤⎦ and �RD1α

= [αIn×Kn 0n×(M−2)Kn], �RD1β= [0n×(M−2)KnIn×Kn].

(27)

Theorem 3.4. For the first part of the RDMA case, theper-cell throughput CRD1 can be derived from the R-transform of the a.e.p.d.f of matrix 1

nHHRD1

HRD1, where:

R1nH

HRD1

HRD1

(z) = R1nB

HB(z,

1M − 1

,K, a2)+(M − 2)(1 + α2)

M − 1 − (1 + α2)K(M − 1)z+R1

nBHB(z,

1M − 1

,K, 1).(28)

Proof. Following an asymptotic analysis where n® ∞:

1nCRD1 = lim

n→∞1Mn

E[log det(IMn + γHRD1HHRD1

)]

= K∫ ∞

0log(1 + γ x)

∫ ∞

1nH

HRD1

HRD1

(x)dx.(29)

Using the matrix decomposition of Eq. (27) and freeadditive convolution [30]:

R1nH

HRD1

HRD1

(z) = R1n H

HRD1α

HRD1α

(z) +R1n H

HH(z) +R1

n HHRD1β

HRD1β

(z). (30)

Eq. (28) follows from Eq. (42) withq = (M − 2)q(�) = (M − 2)(1 + α2)/(M − 1),β = K(M − 1)/(M − 2)

and theorem A.1. □For the second part, the cluster processor receives sig-

nals from MK UTs through M - 1 BSs and the resulting(M - 1)n ×MKn channel matrix is structured as follows:

HRD2 = �RD2 � G(M−1)n×MKn with HRD2 =[HRD2

H

]

�RD2 =[HRD2

]and �RD2 = [2In×Kn αIn×Kn0n×(M−2)Kn],

(31)

where the factor 2 is due to the doubling of the trans-mitted power.Theorem 3.5. For the second part of the RDMA case,

the per-cell throughput CRD2can be derived from the R-transform of the a.e.p.d.f. of matrix 1

nHHRD2

HRD2, where:

R1nH

HRD2

HRD2 (z)=

(M − 2)(1 + α2)M − 1 − (1 + α2)K(M − 1)z

+R1nB

HB(z,

2M

, 2K, 2 + α2) (32)

Proof. Following an asymptotic analysis where n ® ∞:

1nCRD2 = lim

n→∞1Mn

E[log det(I(M−1)n + γHRD2HHRD2

)]

= KM − 1M

∫ ∞

0log(1 + γ x)f∞

1nH

HRD2

HRD2

(x)dx.(33)

The rest of this proof follows the steps of Theorem3.4. □

3.4 Cochannel interference allowanceCI is considered as a worst case scenario where no sig-nal processing is performed in order to mitigate inter-cluster interference and thus interference is treated asadditional noise [15]. As it can be seen, this case servesas a lower bound to the IA case. The channel modellingis identical with the one in global MJD case (Eq. (1)),although in this case the cluster-edge UT group contri-bution aGM, M+1(t)xM+1(t) is considered as interference.As a result, the interference channel matrix can beexpressed as:

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 7 of 13

Page 8: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

HI =[0Mn×Kn

αGn×Kn

]. (34)

Assuming no CSI at the UTs, the per-cell throughputin the CI case is given by [15,32-34]:

CCI =1ME[log det

(IMn + γHRD1H

HRD1

(IMn + γHIHH

I

)−1)]

=1ME[log det

(IMn + γHHH)]− 1

ME[log det

(IMn + γHIHH

I

)]= CMJD − CI,

(35)

where CI denotes the throughput of the interferingUT group normalized by the cluster size:

CI =1ME[I(x; y|HI)

]=

1ME[log det

(IMn + γHIHH

I

)].

(36)

Theorem 3.6. In the CI case, the per-cell throughputconverges almost surely (a.s.) to a difference of two scaledversions of the the MP law:

CCIa.s.−→ KnVMP

(M

M + 1nγ(1 + α2) ,KM + 1

M

)− Kn

MVMP(α2nγ ,K). (37)

Proof. Following an asymptotic analysis in the numberof antennas n n ®∞:

1nCI = lim

x→∞1Mn

E[log det

(IMn + γHIHH

I

)]= lim

x→∞1Mn

E[log det

(In + γ α2Gn×KnGH

n×Kn

)]a.s.−→ K

MVMP(α2γ ,K).

(38)

Eq. (37) follows from Eq. (35), (38) and Theorem3.1. □

3.5 Degrees of freedomThis section focuses on comparing the degrees of free-dom for each of the considered cases. The degrees offreedom determine the number of independent signaldimensions in the high SNR regime [35] and it is alsoknown as prelog or multiplexing gain in the literature. Itis a useful metric in cases where interference is the mainimpairment and AWGN can be considered unimportant.Theorem 3.7. The degrees of freedom per BS antenna for

the global MJD, I A, RDM A and CI cases are given by:

dMJD = 1, dIA = 1 − 1Mn

, dRN = 1 − 12M

, dCI = 1 − 1M

. (39)

Proof. Eq. (39) can be derived straightforwardly bycounting the receive dimensions of the equivalent chan-nel matrices (Eq. (3) for global MJD, Eq. (18) for IA,Eqs. (27) and (31) for RDMA, Eq. (34) for CI) and nor-malizing by the number of BS antennas. □

Lemma 3.2. The following inequalities apply for thedofs of eq. (39):

dMJD ≥ dIA ≥ dRD > dCI. (40)

Remark 3.1. It can be observed that dIA = dRD only forsingle UT per cell equipped with two antennas (K = 1, n= 2). For all other cases, dIA >dRD. Furthermore, it isworth noting that when the number of UTs K andantennas n grows to infinity, limK,n ® ∞ dIA = dMJD

which entails a multiuser gain. However, in practice thenumber of served UTs is limited by the number of anten-nas (n = K+1) which can be supported at the BS- andmore importantly at UT-side due to size limitations.

3.6 Complexity considerationsThis paragraph discusses the complexity of each schemein terms of decoding processing and required CSI. Ingeneral, the complexity of MJD is exponential with thenumber of users [36] and full CSI is required at the cen-tral processor for all users which are to be decoded.This implies that global MJD is highly complex since allsystem users have to be processed at a single point. Onthe other hand, clustering approaches reduce the num-ber of jointly-processed users and as a result complexity.Furthermore, CI is the least complex since no action istaken to mitigate intercluster interference. RDMA hasan equivalent receiver complexity with CI, but in addi-tion it requires coordination between adjacent clustersin terms of splitting the resources. For example, timedivision would require inter-cluster synchronization,while frequency division could be even static. Finally, IAis the most complex since CSI towards the non-intended BS is also needed at the transmitter in order toalign the interference. Subsequently, additional proces-sing is needed at the receiver side to filter out thealigned interference.

4 Numerical resultsThis section presents a number of numerical results inorder to illustrate the accuracy of the derived analyticalexpressions for finite dimensions and evaluate the per-formance of the aforementioned interference mitigationschemes. In the following figures, points representvalues calculated through Monte Carlo simulations,while lines refer to curves evaluated based on the analy-tical expressions of section 3. More specifically, thesimulations are performed by generating 103 instancesof random Gaussian matrices, each one representing asingle fading realization of the system. In addition, thevariance profile matrices are constructed deterministi-cally based on the considered a factors and used toshape the variance of the i.i.d. c.c.s. elements. Subse-quently, the per-cell capacities are evaluated by

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 8 of 13

Page 9: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

averaging over the system realizations using: (a) Eq. (5)for global MJD, (b) Eq. (10)-(14) and (20) for IA, (c) Eq.(26) for RDMA, (d) Eq. (35),(36) for CI. In parallel, theanalytical curves are evaluated based on: (a) theorem 3.1for global MJD, (b) theorems 3.2 and 3.3 for IA, (c) the-orems 3.4 and 3.5 for RDMA, (d) theorems 3.1 and 3.6for CI. Table 1 presents an overview of the parametervalues and ranges used for producing the numericalresults of the figures.Firstly, Figure 2 depicts the per-cell throughput versus

the cluster size M for medium a factors. It should benoted that the a factor combines the effects of cell sizeand path loss exponent as explained in [37]. As expectedthe performance of global MJD does not depend on thecluster size, since it is supposed to be infinite. For allinterference mitigation techniques, it can be seen thatthe penalty due to the clustering diminishes as the clus-ter size increases. Similar conclusions can be derived byplotting the degrees of freedom versus the cluster size

M (Figure 3). In addition, it can be observed that the IAdofs approach the global MJD dofs as the number ofUTs and antennas increases. Subsequently, Figure 4depicts the per-cell throughput versus the a factor. Forhigh a factors, RDMA performance converges to IA,whereas for low a factors RDMA performance degrades.It should be also noted that while the performance ofglobal MJD and RDMA increase monotonically with a,the performances of IA and cochannel interferencedegrade for medium a factors. Finally, Figure 5 depictsthe per-cell throughput versus the number of UTs percell K. It should be noted that the number of antennasper UT n scale jointly with K. Based on this observation,a superlinear scaling of the performance can beobserved, resulting primarily from the increase of spatialdimensions (more antennas) and secondarily from theincrease of the system power (more UTs). As it can beseen, the slope of the linear scaling is affected by theselected interference mitigation technique.

3 4 5 6 7 8 9 1035

40

45

50

Per

-cel

lCap

acity

C(n

ats/

sec/

Hz)

Cluster size M

3 4 5 6 7 8 9 1051

56

61

66

71

Per

-cel

lCap

acity

inbi

ts/s

ec/H

z

GMJD MCGMJD AnIA MCIA AnRDMA MCRDMA AnCI MCCI An

Figure 2 Per-cell throughput scaling versus the cluster size M. The performance of global MJD does not depend on the cluster size, whilefor all interference mitigation techniques, the penalty due to the clustering diminishes as the cluster size increases. Parameters: a = 0.5, K = 5, n= 4, g = 20 dB.

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 9 of 13

Page 10: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

6 ConclusionIn this paper, various techniques for mitigating inter-cluster interference in clustered MJD were investigated.The case of global MJD was initially considered as anupper bound, serving in evaluating the degradationdue to intercluster interference. Subsequently, the IAscheme was analyzed by deriving the asymptotic eigen-value distribution of the channel covariance matrixusing free-probabilistic arguments. In addition, theRDMA scheme was studied as a low complexitymethod for mitigating intercluster interference. Finally,the CI was considered as a worst-case scenario whereno interference mitigation techniques is employed.Based on these investigations it was established thatfor dense cellular systems the RDMA scheme shouldbe used as the best compromise between complexityand performance. For average to sparse cellular

systems which is the usual regime in macrocell deploy-ments, IA should be employed when the additionalcomplexity and availability of CSI at transmitter sidecan be afforded. Alternatively, CI could be preferredespecially for highly sparse cellular systems.

A Proof of theoremTheorem A.1. Let A = [0 B 0] be the concatenation ofthe variance-profiled Gaussian matrix B = C ⊙ G and anumber of zero columns. Let also k be the ratio of non-zero to total columns of A, b be the ratio of horizontal tovertical dimensions of B and q the Frobenius norm of Cnormalized by the matrix dimensions. The R-transformof AH A is given by:

R1nAHA

(z, k,β , q) =k − zqk(β + 1) ±√k2(q2β2z2 − 2qβz − 2z2q2β + 1 − 2qz + z2q2 + 4zqk)

2z(qβz − k) (41)

3 4 5 6 7 8 9 100.65

0.7

0.75

0.8

0.85

0.9

0.95

1

Cluster size M

Deg

rees

offr

eedo

m

GMJDIA n = 10,K = 9IA n = 5,K = 4IA n = 3,K = 2RDMACI

Figure 3 Degrees of freedom versus the cluster size M. The IA dofs approach the global MJD dofs as the number of UTs and antennasincreases. Parameters: a = 0.5, K = 5, n = 4, g = 20 dB.

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 10 of 13

Page 11: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

Proof. Let B = C ⊙ Gn × m be a variance-profiledGaussian matrix with b = m/n and q = ||C||2/nm.According to [10], the R-transform of 1

nBHB is given by:

R1nBHB

(z) =q

1 − βqz. (42)

Using eq. (23), the Stieltjes transform of 1nB

HB can beexpressed as:

S1nBHB

(z) =−z + q − qβ ±√z2 − 2zq − 2zqβ + q2 − 2q2β + q2β2)

2zqβ. (43)

Matrix 1nA

HA has identical eigenvalues to 1nB

HB plus anumber of zero eigevalues with 0 <k < 1 defined as theratio of non-zero eigenvalues over the total number ofeigenvalues. As a result, the a.e.p.d.f. of

1nA

HAcan be

written as:

f1nAHA

(z) = kf1nBHB

(z) + (1 − k)δ(x).(44)

Using the definition of the Stieltjes transform [30]:

S 1nA

HA(z) = kS 1

nBHB(z) − 1 − k

z(45)

and employing eq. (23), the proof is complete. □

5 Competing interestsThe authors declare that they have no competinginterests.

NotesaThe term throughput is used instead of capacity sincethe described techniques are suboptimal in the informa-tion-theoretic sense and lead to achievable sum-ratesexcept for MJD which leads to MIMO MAC capacity.

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 130

40

50

60

Per

-cel

lCap

acity

C(n

ats/

sec/

Hz)

α factor

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 144

54

64

74

84

Per

-cel

lCap

acity

inbi

ts/s

ec/H

z

GMJD MCGMJD AnIA MCIA AnRDMA MCRDMA AnCI MCCI An

Figure 4 Per-cell throughput scaling versus the a factor. For high a factors, RDMA performance converges to interference alignment,whereas for low a factors RDMA performance degrades even beyond the cochannel interference bound. While the performance of global MJDand RDMA increase monotonically with a, the performances of interference alignment and cochannel interference degrade for medium afactors. Parameters: M = 4, K = 5, n = 4, g = 20 dB.

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 11 of 13

Page 12: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

bThe multiple antennas are assumed to be uncorre-lated although the analytical results can be extended inthe correlated case based on the principles described in

cFor more details on the modelling of the a para-meter, the reader is referred to [37].

dFor the purposes of the analysis the variable γ is keptfinite as the number of antennas Mn grows large, sothat the system power does not grow to infinity.

eDepending on the signal dimensions and the channelcoefficients, more than one degree of freedom per usercould be achieved. The feasibility of higher multiplexinggain has been studied in [21,22]. More specifically,authors in [21] provide an algorithm which determinesthe achievable multiplexing gain by minimizing theinterference leakage, while authors in

fThe structure of the first block of Σ1 originates in the

Gaussian approximation of1aGj

1,1(Gj0,1)

−1vvj.

gThe structure of the last block of Σ3 is based onLemma 3.1.

AcknowledgementsThis work was partially supported by the National Research Fund,Luxembourg under the CORE project “CO2SAT: Cooperative and CognitiveArchitectures for Satellite Networks”.

Author details1Interdisciplinary Centre for Security, Reliability and Trust, University ofLuxembourg, 6, rue Richard Coudenhove-Kalergi, 1359 Luxembourg,Luxembourg 2Royal Institute of Technology (KTH), Osquldas v. 10, 100 44,Stockholm, Sweden

Received: 25 March 2011 Accepted: 14 October 2011Published: 14 October 2011

References1. P Marsch, G Fettweis, Coordinated Multi-Point in Mobile Communications

From Theory to Practice, (Cambridge University Press, 2011)2. 3GPP, Simulation Assumptions for Evaluation of UL CoMP. R1-110803 http://

www.3gpp.org/ftp/tsg_ran/wg1_rl1/TSGR1_64/Docs/R1-110803.zip (2011)

2 3 4 5 6 7 8 9 1010

20

30

40

50

60

70

80

90

100

110

Per

-cel

lCap

acity

C(n

ats/

sec/

Hz)

UTs per cell K

2 3 4 5 6 7 8 9 1015

25

35

45

55

65

75

85

95

105

115

125

135

145

155

Per

-cel

lCap

acity

inbi

ts/s

ec/H

z

GMJD MCGMJD AnIA MCIA AnRDMA MCRDMA AnCI MCCI An

Figure 5 Per-cell throughput scaling versus the number of UTs per cell K. A superlinear scaling of the performance can be observed,resulting primarily from the increase of spatial dimensions (more antennas) and secondarily from the increase of the system power (more UTs).The slope of the linear scaling is affected by the selected interference mitigation technique. Parameters: M = 4, a = 0.5, g = 20 dB.

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 12 of 13

Page 13: RESEARCH Open Access Interference mitigation techniques ...RESEARCH Open Access Interference mitigation techniques for clustered multicell joint decoding systems Symeon Chatzinotas1*

3. SV Hanly, PA Whiting, Information-theoretic capacity of multi-receivernetworks. Telecommun Syst. 1, 1–42 (1993). doi:10.1007/BF02136153

4. A Wyner, Shannon-theoretic approach to a Gaussian cellular multiple-accesschannel. IEEE Trans Inf Theory 40(6), 1713–1727 (1994). doi:10.1109/18.340450

5. O Somekh, S Shamai, Shannon-theoretic approach to a Gaussian cellularmultiple-access channel with fading. IEEE Trans Inf Theory 46(4), 1401–1425(2000). doi:10.1109/18.850679

6. S Chatzinotas, M Imran, C Tzaras, On the capacity of variable density cellularsystems under multicell decoding. IEEE Commun Lett. 12(7), 496–498 (2008)

7. S Chatzinotas, MA Imran, C Tzaras, Optimal information theoretic capacityof the planar cellular uplink channel, in IEEE 9th Workshop on SignalProcessing Advances in Wireless Communications (SPAWC’08), Pernambuco,Brazil, 196–200 (2008)

8. D Aktas, M Bacha, J Evans, S Hanly, Scaling results on the sum capacity ofcellular networks with MIMO links. IEEE Trans Inf Theory 52(7), 3264–3274(2006)

9. S Chatzinotas, MA Imran, C Tzaras, Uplink capacity of MIMO cellular systemswith multicell processing, in IEEE International Symposium on WirelessCommunication Systems (ISWCS’08), Reykjavik, Iceland, 453–457 (2008)

10. S Chatzinotas, M Imran, R Hoshyar, On the multicell processing capacity ofthe cellular MIMO up-link channel in correlated rayleigh fadingenvironment. IEEE Trans Wireless Commun. 8(7), 3704–3715 (2009)

11. O Simeone, O Somekh, H Poor, S Shamai, Distributed MIMO in multi-cellwireless systems via finite-capacity links, in Communications, Control andSignal Processing, 2008. ISCCSP 2008. 3rd International Symposium on,203–206 (2008)

12. O Somekh, B Zaidel, S Shamai, Spectral efficiency of joint multiple cell-siteprocessors for Randomly Spread DS-CDMA Systems. IEEE Trans Inf Theory53(7), 2625–2637 (2007)

13. BL Ng, J Evans, S Hanly, On the Capacity of cellular networks with globalLMMSE receiver, in IEEE International Conference on Communications, 2007.ICC ‘07, 870–876 (2007)

14. S Chatzinotas, MA Imran, R Hoshyar, B Ottersten, multicell LMMSE filteringcapacity under correlated Multiple BS Antennas in IEEE 72nd VehicularTechnology Conference (VTC’10-Fall), Ottawa, Canada (2010)

15. S Chatzinotas, B Ottersten, Free probability based capacity calculation ofmultiantenna Gaussian fading channels with cochannel interference.Physical Communication 4(3), 206–217 (2011). doi:10.1016/j.phycom.2011.03.004

16. E Katranaras, M Imran, R Hoshyar, Sum rate of linear cellular systems withclustered joint processing, in Vehicular Technology Conference, 2009. VTCSpring 2009. IEEE 69th, 1–5 (2009)

17. W Choi, J Andrews, Downlink performance and capacity of distributedantenna systems in a multicell environment. IEEE Trans Wireless Commun.6, 69–73 (2007)

18. V Cadambe, S Jafar, Interference alignment and degrees of freedom of theK -User interference channel. IEEE Trans Inf Theory 54(8), 3425–3441 (2008)

19. V Cadambe, S Jafar, Interference alignment and the degrees of freedom ofwireless X networks. IEEE Trans Inf Theory 55(9), 3893–3908 (2009)

20. S Jafar, S Shamai, Degrees of freedom region of the MIMO X channel. IEEETrans Inf Theory 54, 151–170 (2008)

21. K Gomadam, V Cadambe, S Jafar, Approaching the capacity of wirelessnetworks through distributed interference alignment, in GlobalTelecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 1–6 (2008)

22. CM Yetis, T Gou, SA Jafar, AH Kayran, On feasibility of interferencealignment in MIMO interference networks. IEEE Trans Signal Process. 58(9),4771–4782 (2010)

23. R Tresch, M Guillaud, E Riegler, On the achievability of interferencealignment in the K-user constant MIMO interference channel, in StatisticalSignal Processing, 2009. SSP ‘09. IEEE/SP 15th Workshop on, 277–280 (2009)

24. C Suh, D Tse, Interference alignment for cellular networks, inCommunication, Control, and Computing, 2008. 46th Annual AllertonConference on, 1037–1044 (2008)

25. R Tresch, M Guillaud, Cellular interference alignment with imperfect channelknowledge, in Communications Workshops, 2009. ICC Workshops 2009. IEEEInternational Conference on, 1–5 (2009)

26. B Da, R Zhang, Exploiting interference alignment in multi-cell cooperativeOFDMA resource allocation, in Submitted to GlobeComm 2011, http://arxiv.org/abs/1103.3093 (2011)

27. N Lee, W Shin, B Clerckx, Interference alignment with limited feedback ontwo-cell interfering Two-User MIMO-MAC, in ICC 2011, http://arxiv.org/abs/1010.0933 (2010)

28. O Somekh, O Simeone, Y Bar-Ness, AM Haimovich, U Spagnolini, SS Shitz,An information theoretic view of distributed antenna processing in cellularsystems, in Distributed Antenna Systems: Open Architecture for Future WirelessCommunications, ed. by Zhang Y, Hu H, Luo J (Auerbach Publications, CRCPress, New York, 2007)

29. J Xu, J Zhang, J Andrews, When does the wyner model accurately describean uplink cellular network?, in GLOBECOM 2010, 2010 IEEE GlobalTelecommunications Conference, 1–5 (2010)

30. AM Tulino, S Verdú, Random matrix theory and wireless communications.Commun Inf Theory 1, 1–182 (2004)

31. N Raj Rao, A Edelman, The polynomial method for random matrices. FoundComput Math. 8(6), 649–702 (2007)

32. GJ Foschini, MJ Gans, On limits of wireless communications in a fadingenvironment when Using multiple antennas. Wirel Pers Commun. 6(3),311–335 (1998). doi:10.1023/A:1008889222784

33. R Blum, MIMO capacity with interference. IEEE J Select Areas Commun.21(5), 793–801 (2003). doi:10.1109/JSAC.2003.810345

34. A Lozano, A Tulino, Capacity of multiple-transmit multiple-receive antennaarchitectures. Information Theory, IEEE Transactions on. 48(12), 3117–3128(2002). doi:10.1109/TIT.2002.805084

35. R Etkin, D Tse, H Wang, Gaussian Interference Channel Capacity to WithinOne Bit. IEEE Trans Inf Theory 54(12), 5534–5562 (2008)

36. S Verdú, Multiuser Detection (Cambridge University Press, UK, 1998)37. S Chatzinotas, M Imran, C Tzaras, Capacity Limits in Cooperative Cellular

Systems, in Cooperative Wireless Communications, ed. by Zhang Y, Chen HH,Guizani M (Auerbach Publications, Taylor & Francis Group, Boca Raton,2009)

doi:10.1186/1687-1499-2011-132Cite this article as: Chatzinotas and Ottersten: Interference mitigationtechniques for clustered multicell joint decoding systems. EURASIPJournal on Wireless Communications and Networking 2011 2011:132.

Submit your manuscript to a journal and benefi t from:

7 Convenient online submission

7 Rigorous peer review

7 Immediate publication on acceptance

7 Open access: articles freely available online

7 High visibility within the fi eld

7 Retaining the copyright to your article

Submit your next manuscript at 7 springeropen.com

Chatzinotas and Ottersten EURASIP Journal on Wireless Communications and Networking 2011, 2011:132http://jwcn.eurasipjournals.com/content/2011/1/132

Page 13 of 13