Professional Documents
Culture Documents
[9] S. Katti, S. Gollakota, and D. Katabi, Embracing wireless interference: Analog network coding, in Proc. ACM SIGCOMM, Kyoto,
Japan, Aug. 2007, pp. 397408.
[10] S. Chen, W. Wang, X. Zhang, M. Peng, and D. Zhao, Capacity performance of amplify-and-forward MIMO relay with transmit antenna
selection and maximal-ratio combing, in Proc. IEEE Global Commun.
Conf., Honolulu, HI, Nov./Dec. 2009, pp. 16.
[11] M. Ding, S. Liu, H. Luo, and W. Chen, MMSE based greedy antenna
selection scheme for AF MIMO relay systems, IEEE Signal Process.
Lett., vol. 17, no. 5, pp. 433436, May 2010.
[12] Y. Zhang, G. Zheng, C. Ji, K.-K. Wong, D. J. Edwards, and T.
Cui, Near-optimal joint antenna selection for amplify-and-forward
relay networks, IEEE Trans. Wireless Commun., vol. 9, no. 8, pp.
24012407, Aug. 2010.
[13] K. T. Truong and R. W. Heath, Jr., Multimode antenna selection
for MIMO amplify-and-forward relay systems, IEEE Trans. Signal
Process., vol. 58, no. 11, pp. 58455859, Nov. 2010.
[14] H. Park and J. Chun, A two-stage antenna subset selection scheme
for amplify-and-forward MIMO relay systems, IEEE Signal Process.
Lett., vol. 17, no. 11, pp. 953956, Nov. 2010.
[15] S. W. Peters and R. W. Heath, Jr., Nonregenerative MIMO relaying
with optimal transmit antenna selection, IEEE Signal Process. Lett.,
vol. 15, pp. 421424, 2008.
[16] C. Yuen, W. H. Chin, Y. L. Guan, W. Chen, and T. Tee, Bi-directional
multi-antenna relay communications with wireless network coding, in
Proc. IEEE Veh. Technol. Conf., Singapore, May 2008, pp. 13851388.
[17] K.-S. Hwang, Y.-C. Ko, and M.-S. Alouini, Performance bounds for
two-way amplify-and-forward relaying based on relay path selection,
in Proc. IEEE Veh. Technol. Conf., Barcelona, Spain, Apr. 2009, pp.
15.
[18] M. Eslamifar, C. Yuen, W. H. Chin, and Y. L. Guan, Max-min antenna
selection for bi-directional multi-antenna relaying, in Proc. IEEE Veh.
Technol. Conf., Taipei, Taiwan, May 2010, pp. 15.
[19] M. Ju and I.-M. Kim, Relay selection with ANC and TDBC protocols
in bidirectional relay networks, IEEE Trans. Commun., vol. 58, no.
12, pp. 35003511, Dec. 2010.
[20] S. Xu and Y. Hua, Optimal design of spatial source-and-relay matrices
for a non-regenerative two-way MIMO relay system, IEEE Trans.
Wireless Commun., vol. 10, no. 5, pp. 16451655, May 2011.
[21] A. Gorokhov, D. A. Gore, and A. J. Paulraj, Receive antenna selection
for MIMO spatial multiplexing: Theory and algorithms, IEEE Trans.
Signal Process., vol. 51, no. 11, pp. 27962807, Nov. 2003.
[22] M. Gharavi-Alkhansari and A. B. Gershman, Fast antenna subset selection in MIMO systems, IEEE Trans. Signal Process., vol. 52, no.
2, pp. 339347, Feb. 2004.
[23] F. Roemer and M. Haardt, Tensor-based channel estimation and iterative refinements for two-way relaying with multiple antennas and spatial reuse, IEEE Trans. Signal Process., vol. 58, no. 11, pp. 57205735,
Nov. 2010.
[24] W. Yu, Sum-capacity computation for the Gaussian vector broadcast
channel via dual decomposition, IEEE Trans. Inf. Theory, vol. 52, no.
2, pp. 754759, Feb. 2006.
[25] H. J. Yang, J. Chun, and A. Paulraj, Asymptotic capacity of the separated MIMO two-way relay channel, IEEE Trans. Inf. Theory, vol. 57,
no. 11, pp. 75427554, Nov. 2011.
[26] A. W. Marshall and I. Olkin, Inequalities: Theory of Majorization and
Its Applications. New York: Academic, 1979.
[27] R. A. Horn and C. R. Johnson, Matrix Analysis, 4th ed. Cambridge,
U.K.: Cambridge Univ. Press, 1990.
[28] I. C. F. Ipsen and D. J. Lee, Determinant approximations, Numer.
Linear Algebra Appl. [Online]. Available: http://www4.ncsu.edu/
~ipsen.
[29] K. Lee, J. Chun, and L. Hanzo, Optimal lattice-reduction aided successive interference cancellation for MIMO systems, IEEE Trans. Wireless Commun., vol. 6, no. 7, pp. 24382443, Jul. 2007.
[30] F. Giannessi, P. Pardalos, and T. Rapcsk, Optimization Theory:
Recent Developments from Mtrahza. Dordrecht, The Netherlands:
Kluwer Academic, 2001.
6097
I. INTRODUCTION
In wireless networks, interference has been regarded as a critical
problem which limits the network throughput. Recent studies of interference alignment for wireless interference networks have shown
that the capacity of wireless networks is not limited by the interference from other users [1]. It was shown that through an interference
-user inalignment scheme, the optimal DoF K
2 is achieved in the
terference channel with time-varying channel coefficients. The idea of
interference alignment is to align undesirable (interference) signals observed by each receiver over one half of the signal space. This means
that every user in the networks is able to obtain one half of the interference-free space, and achieves 1/2 DoF so that the total DoF become K
2 . Interference alignment methods have been widely studied,
and developed for various wireless networks such as X channels [2],
[3] and multiple input multiple output (MIMO) interference channels
[4]. Beamforming design methods for efficient interference alignment
are also studied [5][7].
The DoF for the general interference channel with constant channel
coefficients (limited channel dimensions) remains an open problem for
more than two users. Only a few scenarios have been analyzed. In [1],
it is shown that the total DoF is 3M
2 in the three-user MIMO Gaussian
antennas at each node. In [4], the auinterference channel with
thors consider the + 2 user MIMO interference channel with
antennas at each transmitter and
( 2) antennas at each reRM
+ R +2
ceiver. They show that for this channel, the DoF of
R01
RM R
RM
Manuscript received October 22, 2011; revised March 05, 2012 and June
26, 2012; accepted July 22, 2012. Date of publication August 03, 2012; date
of current version October 09, 2012. The associate editor coordinating the
review of this manuscript and approving it for publication was Prof. Wolfgang
Utschick. This research was supported in part by Basic Science Research
Program (2010-0013397) and Mid-career Researcher Program (2010-0027155)
through the NRF funded by the MEST, Seoul R&BD Program (JP091007,
0423-20090051), the KETEP grant (2011T100100151), the INMAC, and
BK21.
S. Jung was with the School of Electrical Engineering and Computer Sciences, Seoul National University, Seoul 151-744, Korea. He is now with Samsung Electronics, Suwon 443-742, Korea (e-mail: csungq@wspl.snu.ac.kr).
J. Lee is with the School of Electrical Engineering and Computer Sciences,
Seoul National University, Seoul 151-744, Korea (e-mail: junglee@snu.ac.kr).
Digital Object Identifier 10.1109/TSP.2012.2211590
6098
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 60, NO. 11, NOVEMBER 2012
can be achieved without symbol extension. Although the general analysis of achievable DoF remains open, numerical approaches are proposed [8], [9]. In [8], a distributed algorithm has been proposed that
requires only local channel knowledge at each node. Each receiver is
assumed to know only the channel to its desired transmitter, and the
iterative algorithms using the reciprocity of wireless networks are proposed. In [9], the iterative interference alignment algorithm via alternating minimization is proposed. Numerical results in [8], [9] provide
important insights into the feasibility of interference alignment over a
limited number of signal dimensions. Further in [10], the feasibility
conditions for interference alignment over constant MIMO channels
are formally analyzed. They view the interference alignment problem
as a polynomial system which has multiple equations and variables. A
system is called proper if the number of variables is larger than or equal
to the number of equations. A key insight is that an improper system
is infeasible, which means that a proper system may not be feasible.
However, it was shown that proper systems may still not be feasible,
and the examples can be shown in [10].
The rational dimension framework provides a mechanism to translate the asymptotic interference alignment solutions designed for time
varying channels directly to constant coefficient channels [11], [12].
Instead of linear precoding through beamforming vectors, lattice codes
scaled by a set of rationally independent scalars are used for signaling.
Within the new framework of rational dimensions, the asymptotic
alignment of [1], [4] is achieved and the DoF characterization for the
-user (MIMO) interference channel is obtained for almost all values
of channel coefficients. In [12], it is shown that the DoF MMN
+N can
2 MIMO interference channel with
be achieved for the -user
real and constant channel coefficients. It is also shown that the total
M +N
DoF is bounded above by MMN
+N if gcd(M;N ) for the -user
2 MIMO interference channel with real and constant channel
coefficients.
In signal space domain, the conjecture of [10] between proper/improper systems and feasibility/infeasibility of linear interference alignment is settled completely in one direction, and partially in the other
by Bresler et al. [13] and Razaviyayn et al. [14]. They have shown independently that improper systems are indeed infeasible. In the other
direction, it is shown that if all the users have the same DoF , and the
number of transmit antennas k and the number of receive antennas
k are divisible by , then the properness implies the feasibility of
interference alignment for generic choice of channel coefficients. If in
and k = for all and
are divisible by ,
addition, k =
then the feasibility condition is precisely given by + ( +1).
Further, for the symmetric square case where all transmitters and receivers have antennas and each user has the same DoF , it is shown
that the feasibility condition is precisely given by N d(2K +1) . More recently, in [15][17], a DoF region of 3-user MIMO interference channel
with constant channel coefficients is analyzed independently both in
terms of linear feasibility and from an information theoretic perspective.
In this paper, we present a method to compute the upper bound of
total DoF achievable by linear interference alignment, and the DoF al2 MIMO interference channels
location for each user in -user
with constant channel coefficients in terms of the signal space domain.
We define the DoF achievable by linear interference alignment as linear
DoF (LDoF). Our methodology is similar to the results of [10] in that
the properness of a system is considered. In [10], however, properness
condition only for the symmetric system can be considered. For asymmetric systems, it is very computationally complicated to determine
whether the system is proper or not. In this paper, properness conditions
for 2 MIMO interference channels where the LDoF of each user
may be different are analyzed, and a closed-form LDoF upperbound
through properness conditions is considered. In summary, it will be
M N
K
K
M N
M N
M N
M; N
d
M N dK
d
K MK++1N 0 1
when M
is an integer, and it is
K++1N is
not an integer. It should be noted that the achievability proof is not presented here, which is still an open problem. We derived several properties of the proper systems and the LDoF allocation method. By using
these results, we propose the method to compute the properness-based
2 MIMO interference channel with conLDoF for the -user
stant channel coefficients.
Notation: Throughout this manuscript, we use the lower case with
bold fonts for vectors, and the upper case with bold fonts for matrices.
y and y are the conjugate transposes of a matrix and a vector
. The norm of column vector is denoted by k k2 , and the expectation operator is written as [1]. j j represents the cardinality of the
set . b1c and d1e denote the floor and the ceiling functions which map
a real number to the previous largest integer or the next smallest inusers, i.e.
teger, respectively. Finally, K denotes the index set of
K = f1 2 1 1 1 g.
when M
K++1N
A
a
M N
; ; ;K
K
k
M
k K
yk = Hklxl + nk ; 8k 2 K:
(1)
l=1
matrix is a complex random variable drawn from a continuous distribution without any deterministic relationship between the channel coefficients. The transmit power at transmitter is [k l k2 ] = l .
The number of independent streams transmitted by the th user is
denoted by k min( k k ), which is the DoF for the th user. Let
Kk=1 ( k 2 k k ) =( 1 2 1 1 )1 1 1 ( K 2 K K ) denote
the -user MIMO interference network, where the th transmitter and
the th receiver have k and k antennas, respectively, and the th
users DoF is k . In [10], the -user MIMO interference network is
called symmetric if k =
, k =
and k = for all , i.e.
( 2 )K , and is called asymmetric otherwise.
l E x
K
k
N ;d
d
M N; d
k
k
N ;d
M ;N
M N ;d
M
k
M N
K
M M N N d d
UH V ; j k
rank Uky Hkk Vk = dk : 8k 2 K
(3)
The DoF allocation (d1 ;d2 ; 1 1 1 ; dk ) is said to be feasible if there
exist matrices Vk and Uk satisfying the two conditions (2) and (3).
Note that the condition (3) is true almost surely because all the elements
of channel matrices are randomly generated from a continuous distribution [8]. Therefore the existence of k and k satisfying the con-
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 60, NO. 11, NOVEMBER 2012
6099
M N ;d
M d
M N MIMO
The maximum achievable LDoF that can be achieved through interference alignment over a limited number of dimensions is still an open
problem. In this section, we study the number of LDoF in terms of the
properness of previous section when the number of transmit antennas
and the number of receive antennas are the same for all the users of
network, i.e. k =
, k =
for 2 K. The -user
2
MIMO interference channel with constant channel coefficients is then
considered, and the asymmetric system in this section means that the
LDoF of each user can be different, i.e. K
k ). In other
k=1 ( 2
words, we study the maximum total LDoF tot = 1 + 1 1 1 + K ,
and the value of k ( 2 ) for the system K
k ) to be
k=1 ( 2
proper.
We start this section with a lemma that makes it easier to determine
the properness of an asymmetric system. From now on, we assume
(without loss of generality) 1 2 1 1 1 K .
Lemma 1: We assume the system K
k ) is proper.
k=1 ( 2
K +1
(
2
) = (
2
+ 1 users
Then, the system of
k
k=1
)(
2
1 ) 1 1 1( 2
K
K
+1 )( K +1 K ) is proper if
e[K +1] v[K +1] , where e[i] and v[i] are the total number of equations and the total number of variables of the system ( 2
1 )( 2
2) 1 1 1 ( 2
i ), respectively.
Proof: We denote the set of equations of the system
(
2 1)( 2 2) 1 1 1 ( 2 K ) by
MN
N k
d k K
d d
M N
M N;d
d
d
M N;d
d
M N;d
M N;d
M
d
d
M N;d M
K
M N;d M N;d
N
N N
N
I
d
Uk = u k;1 u k;2 u k;3 1 1 1 u k;d ;
(5) N;d
M N;d
M N;d M N;d M N;d
k;m ; 8m 2 f1; 1 1 1 ;dk g
where Id is the dk 2 dk identity matrix and u
are (Nk 0 dk ) 2 1 vectors. As a result, the total number of equations
kj
:
Ne and the total number of variables Nv in (2) are considered. Ne and EK = Emnjk;j 2K;k 6= j;m 2f1; 1 1 1 ;dk g;n 2f1; 1 1 1 ;dj g (12)
Nv are given by
We consider the set of equations of the system (M 2 N;d1 ) 1 1 1 (M 2
Ne =
dk dj
(6) N;dK +1 ), that is EK +1 . EK +1 can be partitioned into two sets,
k;j2K;k6=j
K
EK+1 = EK [ Enew
(13)
Nv = dk (Mk + Nk 0 2dk ):
(7)
k=1
where
y H v = 0; j 6= k; j;k 2 K;
uk;m
kj j;n
(8)
where vj;n is the nth column of precoding matrix Vj , and uk;m is the
mth column of zeroforcing matrix Uk . From (4) and (5), we note that
vj;n involves Mj 0 dj variables and uk;m involves Nk 0 dk variables.
Using the equations, the set of Ne equations is written as
kj jk;j 2K;k 6= j;m 2f1; 1 1 1 ;dk g;n 2f1; 1 1 1 ;dj g :
EK = Emn
(9)
The set of variables involved in an equation E is indicated by var(E ).
A K
k=1 (Mk 2 Nk ;dk ) system is proper if and only if
8S EK ; jS j
var(E ) = jV (S)j
(10)
E 2S
where
(
condition is satisfied.
M + N 0 (K + 1)d 0
(11)
6100
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 60, NO. 11, NOVEMBER 2012
d min(M; N )
d + d min (max(M; N ); 2 min(M; N )) ; 8k; j 2K:
k
(16)
(17)
dd
k
k;j 2K;k6=j
d (M + N 0 2d )
k
k=1
,2
d2 +
k=1
K
k=1
,d +
tot
k;j 2K;k6=j
d2 (M + N )
tot
k=1
k=1
d2 d M + N
k
k=1
d d (M + N )
k
k=1
(18)
d2
It can be seen by Lagrangian optimization and geometry that K
k=1 k
is minimized when dk s are as close as possible with each other. This
represents that when the dk are as close as possible each other, the
required M + N for properness can be minimized. The proof for the
lemma is completed.
A. LDoF Computation
The LDoF for the general interference channel with constant channel
coefficients remains an open problem for more than two users. Only a
few scenarios have been presented. In [1], it is shown that the total
LDoF is 3M
2 in the three-user MIMO Gaussian interference channel
with M antennas at each node. In [4], the authors consider the R + 2
user MIMO interference channel with M antennas at each transmitter
and RM (R 2) antennas at each receiver. They show that the LDoF
RM
can be achieved for this channel without symbol
of RM + R +2
R 01
extension. In this subsection, we propose a method which computes the
maximum total LDoF to make a system proper and LDoF allocation for
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 60, NO. 11, NOVEMBER 2012
M N
each user in the -user 2 MIMO interference channel with constant channel coefficients. Using the results of Lemma 1 and Lemma
2, the method is given as follows.
1 +N , if we find the minimum value 2 K
When we set = M
K+1
satisfies the inequality
2
2
M + N K + K 0 n + n +K( ++ K1) 0(Kn 0 n) ;
(19)
dtot = K + K 0 n;
6101
From the method in the previous subsection, we can obtain the maximum LDoF that makes a system proper for the -user 2 MIMO
interference channel with constant channel coefficients.
Theorem 1: For the -user MIMO Gaussian interference channel
where each transmitter has
antennas, and each receiver has
antennas without symbol extension, the total LDoF to satisfy the properness condition is bounded above as
(M 2 N; dk ) = (M 2 N; + 1)K0n (M 2 N; )n :
k=1
(21)
Now, we justify the above method, and especially, the inequality (19).
MK++1N + 1 , the system Kk=1 ( 2
Since M
K++1N =
M N
dtot = d1 + d2 + 1 1 1 + dK
K MK ++ N1 I MK ++ N1 2 Z
+ K MK ++ N1 0 1 I MK ++ N1 62 Z
(20)
M N
B. Properness of a -User
2 MIMO Interference Channel
With Constant Channel Coefficients
IA
(24)
<
M
N; dk ) = (M 2 N; )K is surely proper and (M 2 N; + 1)K is d ; ; d
; ;
surely improper according to (11). The total LDoF dtot has a value in
the range which is larger than or equal to K and less than K + K . We
use the previous assumption of d1 d2 1 1 1 dK , and according to
the Lemma 2, the LDoF of users are distributed almost uniformly. For
(d1 ; 1 1 1 ; dK ) = + 1; 1 1 1 ; + 1; ; 1 1 1 ;
(25)
example, if dtot has the value K + 2, LDoF allocation (d1 ; 1 1 1 ; dK )
m01
K0m+1
is ( +1; +1; ; 1 1 1 ; ), not ( +2; ; 1 1 1 ; ). Thus we can conclude
K
that the system k=1 (M 2 N; dk ) is in the form of (M 2 N; + for the case of M + N = (K + 1) + m, m 2 f1; 1 1 1 ; K g.
1)K0n (M 2 N; )n , for n 2 K. We, Know,
consider the conditions to
Proof: It is obvious for the case that M
K++1N is an integer. dtot =
have a proper system (M 2 N; + 1) 0n (M 2 N; )n for a certain K M +N is achieved by the symmetric system of d = M +N , that is
K+1
K+1
n.
M
+N K . For this case, the symmetric system is optimal
K
0
n
M
2
N;
First of all, the symmetric part (M 2 N; +1)
of the system
K+1
since an asymmetric system can not achieve the LDoF by Lemma 2.
has to be proper, and the properness condition is simply
Now, we consider the case where M
K++1N is not an integer, and M + N
M + N 0 ( + 1)(K 0 n + 1) 0:
(22) can be expressed as (K + 1) + m where and m 2 f1; 1 1 1 ; K 0
1g are the quotient and the remainder, respectively. According to the
Now consider the (K 0 n + 1)-user system (M 2 N; + method of the previous subsection, to obtain the maximum LDoF for
1)K0n (M 2 N; ). Since the condition (22) is satis- this system, we have to find the minimum value n which satisfies the
fied and therefore (M 2 N; + 1)K 0n is proper, the inequality (19). It can be easily checked that the inequality (19) is satsystem (M 2 N; + 1)K 0n (M 2 N; ) is proper if isfied when n = K 0 m + 1, and not satisfied when n = K 0 m.
(nn+)i] according to Lemma 1, Therefore, the maximum total LDoF is
Ne[K0n+1][K(n0)n+i] Nv[K0n[+1]
K
0
where Ne
(n) and Nv
(n) are the total number
dtot = K + K 0 n = K + m 0 1
of equations and the total number of variables of the system
(M 2 N; + 1)K0n (M 2 N; d)i for a given integer i, respec= (K + 1) + m 0 0 1
tively.
= M + N 0 MK ++ N1 0 1
In the same manner, (M 2 N; + 1)K 0n (M 2 N; )2 is proper
[
K
0
n
+2]
[
K
0
n
+2]
if Ne
(n) Nv
(n), and so on. Consequently,
for the system (M 2 N; + 1)K 0n (M 2 N; )n to be proper,
= K MK ++ N1 0 1:
(26)
[
K
0
n
+
i
]
[
K
0
n
+
i
]
Ne
(n) Nv
(n)(i = 1; 1 1 1 ; n) have to be
satisfied.
[K 0n+i](n) and Nv[K 0n+i](n) through (6) and (7). It can The system (M 2 N; +1)K 0n (M 2 N; )n becomes (M 2 N; +
We obtain Ne
m01(M 2 N; )K0m+1 . Therefore, the best LDoF allocation is
[K ]
[K ]
be shown that the condition Ne (n) Nv (n) is a sufficient con- 1)
dition which covers all the other conditions including (22). That is, if given by (25).
In [10], the authors show the limitations of interference alignment
Ne[K](n) Nv[K](n), we have
over MIMO channel with constant channel coefficients. According to
the Corollary 1 of [10], the LDoF of a proper symmetric system (M 2
Ne[K0n+i](n) Nv[K0n+i](n); 8i 2 f1; 1 1 1 ; ng
N; d)K , which is normalized by a single user LDoF, is upper bounded
(23)
M + N 0 ( + 1)(K 0 n + 1) 0:
by
The rigorous proof for this is presented in the Appendix A. Therefore, if
dtot
max (M;N )
d
Ne[K](n) Nv[K](n), the system (M 2 N; +1)K0n (M 2 N; )n is
min (M;N ) 1 + min (M;N ) 0 min (M;N ) : (27)
proper, and the total LDoF of dtot = K +K 0n can be achieved. After
[K ]
[K ]
some rearrangements, the condition Ne (n) Nv (n) becomes Similar arguments can be applied to a proper asymmetric system with
symmetric number of antennas K
(19), and the inequality (19) is justified.
k=1 (M 2 N; dk ).
6102
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 60, NO. 11, NOVEMBER 2012
M N;d
dtot 1 + max (M;N ) 0 + 1 :
min (M;N )
min (M;N )
min (M;N )
(28)
M N
M;N
M N;d
M N K
m M N K
k d k
k
m k K
K
M N;d
M N K
m
m
d
k m <m
k ;d
d
d
d
(32)
2
2
C + BA++Cn 0 B +A i 0
(33)
where A = ( + 1)(K 0 n) + i;B = ( + 1)2 (K 0 n), and
C = (n 0 i). (33) is equivalent to
AC (A + C ) + A(B + 2n) 0 (A + C )(B + 2i)
2
2
2
= AC (A + C ) + A( n 0 i) 0 C (B + i)
2
2
= C (A + AC + A 0 B 0 i) 0:
(34)
Since C 0, it is equivalent to A2 + AC + A 0 B 0 2 i 0. After
some computations, we have
A2 + AC + A 0 B 0 2i
2
= A(A + C + ) 0 B 0 i
= (K + K 0 n 0 n + i)(K + K 0 n + )
0 ( + 1)2 (K 0 n) 0 2 i
= f( + 1)D + ig f( + 1)D + n + g
(35)
0 ( + 1)2 D 0 2 i
m
where D = K 0 n 2 K. We can express f( + 1)D + igf( + 1)D +
n + g by ( + 1)2D2 + 2 i + E where E > 0 is the remaining terms.
We then have
f( +1)D + ig f( +1)D + n + g0( +1)2 D 02 i = E> 0; (36)
V. CONCLUSION
We analyzed the LDoF for the K -user M 2 N MIMO interfer- since D and E are clearly positive. This completes the proof.
m
m
M N
APPENDIX A
PROOF OF (23)
alent to
REFERENCES
[1] V. Cadambe and S. Jafar, Interference alignment and degrees of
freedom of the -user interference channel, IEEE Trans. Inf. Theory,
vol. 54, no. 8, pp. 34253441, Aug. 2008.
[2] S. Jafar and S. Shamai, Degrees of freedom region of the MIMO X
channel, IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 151170, Jan.
2008.
[3] V. Cadambe and S. Jafar, Interference alignment and the degrees of
freedom of wireless X networks, IEEE Trans. Inf. Theory, vol. 55, no.
9, pp. 38933908, Sep. 2009.
MIMO
[4] T. Gou and S. Jafar, Degrees of freedom of the -user
interference channel, IEEE Trans. Inf. Theory, vol. 56, no. 12, pp.
60406057, Dec. 2010.
[5] M. Shen, A. Host-Madsen, and J. Vidal, An improved interference
alignment scheme for frequency selective channels, in Proc. IEEE Int.
Symp. Inf. Theory, (ISIT), Jul. 2008, pp. 559563.
[6] S. W. Choi, S. Jafar, and S. Y. Chung, On the beamforming design
for efficient interference alignment, IEEE Commun. Lett., vol. 13, no.
11, pp. 847849, Nov. 2009.
[7] D. Kim and M. Torlak, Optimization of interference alignment beamforming vectors, IEEE J. Sel. Areas Commun., vol. 28, no. 9, pp.
14251434, Dec. 2010.
[8] K. Gomadam, V. Cadambe, and S. Jafar, A distributed numerical approach to interference alignment and applications to wireless interference networks, IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 33093322,
Jun. 2011.
[9] S. Peters and R. Heath, Interference alignment via alternating minimization, in Proc. IEEE Int. Conf. Acoust., Speech, Signal Process.
(ICASSP), Apr. 2009, pp. 24452448.
M 2N
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 60, NO. 11, NOVEMBER 2012
[10] C. Yetis, T. Gou, S. Jafar, and A. Kayran, On feasibility of interference alignment in MIMO interference networks, IEEE Trans. Signal
Process, vol. 58, no. 9, pp. 47714782, Sep. 2010.
[11] A. Motahari, S. Oveis-Gharan, M. Maddah-Ali, and A. Khandani, Real interference alignment: Exploiting the potential
of single antenna systems, Aug. 2009 [Online]. Available:
http://arxiv.org/abs/0908.2282
[12] A. Ghasemi, A. Motahari, and A. Khandani, Interference alignment
for the K user MIMO interference channel, in Proc. IEEE Int. Symp.
Inf. Theory, (ISIT), Jun. 2010, pp. 360364.
[13] G. Bresler, D. Cartwright, and D. Tse, Settling the feasibility of interference alignment for the MIMO interference channel: The symmetric
square case, Apr. 2011 [Online]. Available: http://arxiv.org/abs/1104.
0888
[14] M. Razaviyayn, G. Lyubeznik, and Z. Luo, On the degrees
of freedom achievable through interference alignment in a
MIMO interference channel, Apr. 2011 [Online]. Available:
http://arxiv.org/abs/1104.0992
[15] M. Amir, A. El-Keyi, and M. Nafie, A new achievable DoF region for
symmetric interference channel, May 2011 [Online].
the 3-user
Available: http://arxiv.org/abs/1105.4026
[16] C. Wang, T. Gou, and S. Jafar, Subspace alignment chains and the degrees of freedom of the three-user MIMO interference channel, Sep.
2011 [Online]. Available: http://arxiv.org/abs/1109.4350
[17] G. Bresler, D. Cartwright, and D. Tse, Geometry of the 3-user MIMO
interference channel, Oct. 2011 [Online]. Available: http://arxiv.org/
abs/1110.5092
[18] S. Jafar and M. Fakhereddin, Degrees of freedom for the MIMO
interference channel, IEEE Trans. Inf. Theory, vol. 53, no. 7, pp.
26372642, Jul. 2007.
M 2N
AbstractIn this paper, we address the problem of estimating the maximal value over a sensor network using wireless links between them. We
introduce two heuristic algorithms and analyze their theoretical performance. More precisely, i) we prove that their convergence time is finite with
probability one, ii) we derive an upper-bound on their mean convergence
time, and iii) we exhibit a bound on their convergence time dispersion.
Index TermsConsensus, distributed algorithms, gossip, wireless sensor
networks.
I. INTRODUCTION
Wireless Sensor Networks are systems composed of scattered agents
with limited power and computational abilities. These agents may acquire some data and communicate through a wireless link to some other
agents. Their goal is to auto-organize in order to compute a function of
6103
the collected data in a distributed fashion [1]. For instance, if temperature sensors are deployed in a hostile environment (e.g., mountains) and
one wants to know the average temperature in the region by looking at
any sensor, a simple idea would be to make the sensors randomly wake
up and average their value with another sensor so that they all converge to the average value of the initial measurements of the network.
Namely, the sensors want to achieve consensus over the average value
of the initial measurements. This problem was extensively studied in
the past few years [2][4]. However, the average is not always the most
useful value to share. Indeed, in some applications, the maximal value
may be of greater interest.
For example, if a sensor network has to transmit information periodically (e.g., the average temperature of the region in the previous
scheme) through a costly link, it would be of interest to elect the sensor
which has the most power resource to operate that communication. To
do so, one has to estimate the maximal amount of energy left in the
sensor battery (along with their ID) in a distributed fashion using the
wireless links between some of them. Another useful application deals
with distributed access control by having the network elect a node to
transmit. For instance, the agents that want to send information i) draw
a number in a common window and then ii) reach consensus over the
maximal value (and the ID of the associated agent). The sensor with
the maximal value then sends its packet to the access point.
A simple way to estimate the maximum value would be to mimic the
algorithm introduced for averaging in [3]. The agents would wake up
randomly and exchange their value with another reachable sensor randomly chosen; both sensors would then keep the maximum between
their former and received values. However, since the communications
between the sensors are wireless, it seems more natural for the initiating sensor to broadcast its value, and then the sensors which have
received the information would update their value accordingly. In this
work, we will analyze algorithms i) based on pairwise communications
and ii) based on broadcast communications. Note that an averaging algorithm based on broadcast communications has been proposed in [5],
but it does not perform well due to the non-conservation of the initial
sum. This is not an issue for estimating the maximum value since the
maximum value is preserved.
A distributed algorithm is thus relevant to estimating a maximum
value over a network through wireless communications, which we propose to address hereafter. We prove the convergence of both abovementioned algorithms and analyze their convergence speed.
This paper is organized as follows: models and algorithms are reported and linked with related works in Section II. In Section III, we
derive our mathematical results. In Section IV, numerical illustrations
are given. Concluding remarks are drawn in Section V.
II. MODELS AND ALGORITHMS
A. Assumptions on the Wireless Network
Manuscript received February 22, 2012; revised June 01, 2012 and July 24,
2012; accepted July 24, 2012. Date of publication August 03, 2012; date of
current version October 09, 2012. The associate editor coordinating the review
of this manuscript and approving it for publication was Prof. Stefano Marano.
This work was partially granted by the French Defence Agency (DGA). This
work has been presented in part at the Asilomar Conference, November 2011.
F. Iutzeler and P. Ciblat are with the Institut Mines-Tlcom/Tlcom ParisTech; CNRS LTCI, Paris 75013, France (e-mail: iutzeler@telecom-paristech.fr;
philippe.ciblat@enst.fr).
J. Jakubowicz is with the Institut Mines-Tlcom/Tlcom SudParis, Evry
91000, France (e-mail: jeremie.jakubowicz@it-sudparis.eu).
Color versions of one or more of the figures in this paper are available online
at http://ieeexplore.ieee.org.
Digital Object Identifier 10.1109/TSP.2012.2211593