Improving Cell-Free Massive MIMO Networks Performance A User Scheduling Approach
Improving Cell-Free Massive MIMO Networks Performance A User Scheduling Approach
Improving Cell-Free Massive MIMO Networks Performance A User Scheduling Approach
Abstract— Cell-Free (CF) massive multiple-input multiple- should be able to accommodate the traffic growth, enable new
output (MIMO) system is a distributed antenna system, wherein use cases, provide seamless connectivity and ensure that users
a large number of access points wish to simultaneously com- demands together with specific performance requirements are
municate with a relatively small number of users. Similar to
co-located massive MIMO system, pilot contamination and multi- satisfied [3]. Massive multiple-input multiple-output (MIMO)
user interference are two major impediments to CF massive emerges as an appealing technology for 5G physical-layer [4],
MIMO network performance improvement. One can mitigate [5] that enables to increase the network spectral efficiency [6].
the detrimental effect of pilot contamination and multi-user Massive MIMO, which is often referred to as co-located
interference through judicious resource allocation. In this work, massive MIMO, consists of deploying a combination of large-
we formulate and investigate the problem of frequency assign-
ment for a CF massive MIMO. The formulated optimization scale antenna arrays at the access-points (APs). Its counterpart
problem is proven to be generally NP-hard. Local optima can known as distributed massive MIMO consists of disseminating
be found by approaches such as the Lagrangian method that the serving antennas over a relatively large geographical
however, has considerably slow rates of convergence. To circum- area. An instance of distributed massive MIMO is cell-free
vent this issue, we propose an alternative solution being of two- (CF) massive MIMO system which has attracted tremendous
folds. Firstly, we reformulate the problem as a grouping strategy
which enables to attenuate the effect of intra-group multi-user attention recently from the research community [7]–[10]. Cell-
interference. In the second fold, frequencies are assigned in a non- free massive MIMO systems are composed of very large
overlapping fashion to each scheduled group to palliate the effect number of APs that simultaneously and coherently serve, on
of inter-group interference and pilot contamination. To further the same time/frequency resource, a relatively small number
improve the performance of the proposed approach, power of users [8]. This distributed configuration enables to achieve
coefficients are allocated to the users via a sequential convex
approximation (SCA)-based framework. The effectiveness of the higher coverage probability, at the expense of higher back-
proposed algorithms is then verified through extensive numerical haul overhead, than its counterpart co-located massive MIMO
simulations which demonstrate a non-negligible improvement in system [11].
the performance of the studied scenario. In a CF massive MIMO network, all APs are communi-
Index Terms— Massive multiple-input multiple-output cating with the users using same time/frequency resource.The
(MIMO), users scheduling, semidefinite programming, pilot network will incur multi-user interference that limit the per-
contamination, multi-user interference. formance of the system. It was shown in [8] that multi-user
interference can be eliminated under the assumption that the
number of transmit antennas goes to infinity. However, this
I. I NTRODUCTION condition is very untenable for practical scenarios. In addition,
the escalating number of mobile devices that are foreseen
I N THE past decades, wireless communication systems
have experienced incessant growth in terms of both mobile
connected devices and mobile data traffic. This growth is fore-
to request services from the APs will lead to unprecedented
amount of interference that needs to be prudently managed
seen to escalate during the years ahead [2]. In addition to that, in order to avoid severe performance deterioration. Therefore,
there is an increasing demand from users for higher data rate. novel and efficient approaches should be investigated given
This implies that 5G and beyond related wireless networks that traditional multi-user interference management methods
deem to be infeasible or inefficient for 5G and beyond wireless
Manuscript received February 5, 2020; revised September 15, 2020 and networks in general [12], and CF massive MIMO systems in
March 5, 2021; accepted May 14, 2021. Date of publication May 31, 2021;
date of current version November 11, 2021. This article was presented at particular.
the IEEE International Workshop on Signal Processing Advances in Wireless There exists a large body of literature focusing on the
Communications (SPAWC) 2018 [1]. The associate editor coordinating the mitigation of multi-user interference for 5G-based networks
review of this article and approving it for publication was S. K. Mohammed.
(Corresponding author: Juwendo Denis.) [13]–[18] (and references therein). The issue of interference
Juwendo Denis is with the School of Engineering and Applied Sci- management for 5G heterogeneous networks was addressed
ences (SEAS), Harvard University, Cambridge, MA 02138 USA (e-mail: in [17]. In [15], [16], [18], the authors leverage the spatial
[email protected]).
Mohamad Assaad is with the Laboratoire des Signaux et Systems (L2S, signature of the channel vectors, and invoke the princi-
CNRS), CentraleSupelec, University Paris-Saclay, 91190 Gif-sur-Yvette, ple of user scheduling, to attenuate the effect of multi-
France (e-mail: [email protected]). user interference and to reduce overhead signaling pertaining
Color versions of one or more figures in this article are available at
https://doi.org/10.1109/TWC.2021.3083139. to channel state information (CSI) acquisition. A common
Digital Object Identifier 10.1109/TWC.2021.3083139 theme in existing schemes [14]–[16], [18] is that the APs
1536-1276 © 2021 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
DENIS AND ASSAAD: IMPROVING CF MASSIVE MIMO NETWORKS PERFORMANCE 7361
are equipped with antennas in the form of uniform linear Different from [1] where we solely proposed an algorithm
array (ULA) and the covariance matrix of the user’s channel to improve favorable propagation for CF massive MIMO, the
follows a one-ring local scattering model. Although, these key contributions of this paper are as follows:
findings cannot directly apply to CF massive MIMO networks,
1) We investigate the benefits of dynamic scheduling of
the standpoint of user grouping can be exploited to design
algorithms to efficiently combat multi-user interference in cell- users for a TDD CF massive MIMO network by opti-
mizing the total downlink achievable rate subject to each
free systems.
user’s QoS requirement. The problem is formulated as
As in co-located massive MIMO, cell-free massive MIMO
networks can achieve good performance at the expense of a binary optimization problem which we prove to be an
NP-hard problem. In addition, a local solution using the
perfect CSI acquisition at the APs. For time-division duplex
(TDD) cell-free massive MIMO networks, the APs can rely Lagrangian method is provided. This Lagrangian-based
on the assumption of uplink/downlink channel reciprocity to solution, which is obtained by means of gradient-descent
approach, has however a very low rates of converge in
estimate the downlink CSI [8] from known pilot signaling of
the users. Considering the huge number of users that will be general.
2) For the purpose of providing faster convergence-based
active in 5G networks, non-orthogonal training sequences must
and more efficient approaches, we establish an alterna-
be utilized during the uplink training stage. Consequently,
the network will incur pilot contamination, a major limiting tive design optimization problem from the perspective
of user grouping. Firstly, we design a framework that
factor of the performance of massive MIMO network [6].
It has been argued in [19] that the capacity increases without partition users into group according to the level of
bound under the condition that the covariance matrices of their mutual interference. Such paradigm can palliate
intra-group multi-user interference. Secondly, groups
the users are asymptotically linearly independent and the pre-
coder is the centralized minimum mean-square error (MMSE). are scheduled on different radio resources to miti-
gate the both the effect of inter-group interference
Although this result is theoretically achievable, it is unattain-
as well as the impact of interference due to pilot
able for practical implementations. In fact, the MMSE pre-
coder requires the computation of the inverse of a matrix that contamination.
3) We invoke the semidefinite relaxation (SDR) [23]
scales with the number of APs and antennas. On top of that,
the acquisition of the covariance matrix is also impeded by method to design a polynomial time solvable random-
pilot contamination during the training phase [20]. Therefore, ized procedure in the same vein of Gaussian random-
ization [23] to efficiently solve the formulated user
there is still a need to provide efficient and practical (in terms
of computation) schemes to combat pilot contamination. One grouping optimization problem.
4) In addition, we design a polynomial time solvable algo-
possible way to do so is to resort to resource allocation such
rithm based on sequential convex approximation (SCA)
as pilot assignment and power control for cell-free massive
MIMO [8], [10], [21]. In this work, we advocate that the to find an efficient local solution to the problem of fre-
quency assignment for the purpose of group scheduling.
impact of pilot contamination can be circumvented through
radio resource allocation. We establish the convergence to a stationary point of
Existing literature about performance evaluation for CF the proposed SCA-based algorithm. Moreover, we con-
sider the power control optimization problem which is
massive MIMO networks has been done considering single
frequency system. However, for dense networks such as CF efficiently solved by using an SCA-based approach.
massive MIMO network single frequency system implies The rest of this work is structured as follows. In Section II,
aggressive frequency reuse that leads to co-channel multi- the CF massive MIMO system model is presented. The
user interference that deteriorate the quality of service (QoS) resource management problem formulation is given in
of the users [22]. This might be avoided by leveraging Section III together with the Lagragian-based solution.
the fragmentation of the frequency band along with proper The user grouping approach is introduced in Section IV.
management of the resulting sub-frequency with the goal of In Section V, the description of our proposed SDR-based algo-
achieving performance enhancement. rithm is provided followed by the associated sub-frequency
Motivated by the above discussion, we investigate the band assignment as well as the problem power control allo-
impact of sub-frequency bands allocation on the issues of pilot cation. In section VI, simulation results demonstrating the
contamination and multi-user interference which are two major effectiveness of our proposed methods are provided. And we
limiting factors for the performance gains of a CF massive conclude the paper in Section VII.
MIMO system. Despite the great deal of existing works on Notation: In this paper, x ∼ CN (μ, σ 2 ) represents a
CF massive MIMO [7]–[10], [21](and references therein), circularly symmetric complex random variable drawn from
no prior work has attempted to address these issues from a Gaussian distribution with mean μ and variance σ 2 . The
the perspective of radio resource assignment. In this paper, natural logarithmic function is denoted as log(·). Given a
we consider a dynamic radio resource allocation approach and nonempty set A, |A| stands for the cardinal of A. [x]ba is
evaluate its impact on the performance of TDD CF massive the Euclidean projection of x onto the interval[a, b] while
MIMO networks. (x)+ max(0, x).
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
7362 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
j=1,j=k
that consists of M access points (APs) that serve simul-
taneously on a fully-cooperative fashion K mobiles users where wmk ∼ CN (0, 1) is the kth column of the matrix
(UEs), equipped each with a single omni-directional antenna N m,p Φ. The quality of the channel estimation is captured
as depicted in Figure 1. The APs are assumed to have each N through the mean-squared error (MSE) E{g mk − g mk 2 }.
omni-directional antennas. Furthermore, we suppose that the A good estimation quality is usually represented by a small
number of APs is much higher than the number of UEs i.e. MSE. Also, the channel estimate in (3) is corrupted by pilot
K M . All users are arbitrarily distributed over a relatively signals sent by other users, in case K > τ , leading to pilot
large geographical area. The APs and the UEs are assumed contamination which degrades user’s achievable rate [6]. It is
to be perfectly synchronized in both time and frequency. worth mentioning that, we only assume a given transmit power
Moreover, we suppose that the APs are managed by a central ρp during each training phase as this paper does not focus
processing unit (CPU) to which they are connected through on the impact of adjusting ρp on the quality of channel
a error-free back-haul link. The CPU can handle part the estimates. Similar to [25], this paper assumes imperfect chan-
physical layer information process such as data coding and nel reciprocity. Denote g mk g mk − g mk as the channel
decoding. estimation error. By considering random realizations of the
The channel of a user is considered to be frequency-flat slow MMSE channel estimate and the channel estimation error
fading on each orthogonal frequency division multiplexing mk and
during an arbitrary coherence block, it holds true that g
(OFDM) subcarrier. In the sequel, the subcarrier index will be g mk are uncorrelated and are respectively distributed as [7]
omitted for the sake of simplicity. Let g mk ∈ CN ×1 , denote ⎛ ⎞
the complex channel vector between the kth user and the mth 2
AP. It can be modeled as follows ⎜ τ ρp βmk ⎟
mk ∼ CN ⎝0,
g IN ⎠ ,
K H 2
g mk = βmk hmk (1) ρp τ j=1 βmj φk φj + 1
⎛ ⎛ ⎞ ⎞
where hmk ∼ CN (0, IN ) with IN being the N × N identity 2
⎜ ⎜ τ ρp βmk ⎟ ⎟
matrix, m = 1, · · · , M, k = 1, · · · , K, denote the small- g mk ∼ CN ⎝0,⎝βmk − K ⎠ IN ⎠
H 2
scale fading coefficients which are independent and identically ρp τ j=1 βmj φk φj + 1
distributed (i.i.d) while βmk , m = 1, · · · , M, k = 1, · · · , K, (4)
the large scale fading coefficients that include path-loss and
shadowing.
The system is operating according to a TDD protocol. Each A. Downlink Payload
coherence interval Tc is divided between uplink training and The downlink signal intended to each UE is precoded at the
downlink data transmission. By exploiting uplink/downlink APs with conjugate beamforming. Accordingly, the transmit
channel reciprocity [6], the downlink CSI can be estimated signal of the mth AP to all users is
through uplink training. During the uplink training phase, each
√ √
K
user is assigned a training sequence that spans τ < Tc channel
y m,d = ρd ∗mk dk
ηmk g (5)
uses. The pilot sequences used in the channel estimation
k=1
phase can be represented by a matrix Φ ∈ Cτ ×K . The kth
column of the matrix denoted by φk ∈ Cτ ×1 accounts for where dk with E{|dk |2 } = 1, denotes the data symbol intended
the pilot sequence used by the kth UE. Each element of φk for user k, ρd accounts for the downlink transmit power and
is of unit-magnitude so that it has a constant power level ηmk , the power coefficient between from the mth AP to user k
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
DENIS AND ASSAAD: IMPROVING CF MASSIVE MIMO NETWORKS PERFORMANCE 7363
chosen to satisfy E{ym,d 2 } ≤ ρd at each AP. The received III. R ESOURCE A LLOCATION P ROBLEM F ORMULATION
signal at the kth user is given by Before we proceed to formulate the radio resource allocation
⎛ ⎞ problem, let us define the binary variable ϑk ∈ {0, 1}, and
√ M K
√ ϑ = {{ϑk }Kk=1 }=1 . The value of ϑk takes one if the APs can
L
rk = ρd ⎝ ηmj g ∗mj dj ⎠ + nk ,
mk g (6)
m=1 j=1
communicate with the k UE on the th sub-frequency band,
otherwise it takes value 0. Moreover, the power coefficient
where nk ∼ CN (0, 1) denotes the additive white Gaussian allocation from one AP to any use on each sub-frequency band
noise at user k. Similarly to [7], [10], we assume that is assumed to be fixed. Our goal is to dynamically assign the
UEs have only statistical knowledge of the channel esti- available radio resources for the purpose of maximizing the
mate. Accordingly, the net downlink rate of the kth user is total throughput of the network subject to QoS constraint. The
given by [10] optimization problem is mathematically formulated as follow
K
L
Rk = B 1 −
τ
× log2 max f (ϑ)
ϑk R (9a)
k
Tc ϑ∈{0,1}(K×L)
⎛ 2 ⎞ k=1 =1
M √ L
⎜ ρ d ηmk N ν mk ⎟ k ,
m=1 s.t. Rk ≤ ϑk R ∀ , ∀k (9b)
⎝1 + M K ⎠ (7)
N ρd m=1 ηmk βmk νmk + ρd N j=k Ikj + 1 =1
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
7364 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
Proposition 1 advocates that it is impossible to find a where γ ≥ 0, υ ≥ 0 are the Lagrange multipliers. Define
polynomial time solvable algorithm capable of seeking the
∂L (ϑ, γ, υ) K
∂
R ∂
R
global optimum for problem (9) unless P = NP. Nevertheless, =−
j
ϑj γj − γk ϑk k + R
k
a local solution can be found by mean of classical approaches ∂ϑk j=k
∂ϑ k ∂ϑ k
such that Lagrangian approach.
∂R K
∂R
− ϑ
−R k
− ϑ j
k k j
∂ϑk j=k
∂ϑ
k
A. Lagrangian-Based Solution
Before proceeding in describing the Lagrangian-based fre- +ς 1 − 2ϑk
(17)
quency band allocation solution, we rewrite the binary con- The Karush-Kuhn-Tucker (KKT) conditions [31] are given by
straint ϑk ∈ {0, 1}as the difference of two concave-functions
∂L (ϑ , γ , υ )
0 ≤ ϑk ≤ 1 = 0, ∀ , ∀k
∂ϑk
L
K
2 (12) L
ϑk − ϑk ≤0 υk 1 −
ϑk
= 0, ∀k
k=1 =1
=1
and define the following set:
L
γk
Rk − k
ϑk R = 0, ∀ , ∀k
(9b)
D ϑ: =1
0≤ϑ≤1
Considering that it is extremely complicated to find a closed
Problem (9) can be equivalently recast as form solution from (17), a stationary point ϑ can be found
by invoking the gradient descent method [32] where at the nth
min − f (ϑ)
ϑ∈D iteration.
L
K
2
s.t. ϑk − ϑk ≤ 0 ∀k, ∀ (13) ϑk [n] = ϑk [n − 1]
k=1 =1 1
∂L (ϑ, γ[n − 1], υ[n − 1])
We have the following proposition −δϑ |ϑ=ϑ[n−1] ∀ , ∀k (18)
Proposition 2: For large value of ς 1, the optimization ∂ϑk 0
problem (13) is equivalent to where δϑ > 0 is a sufficiently small positive number. The
L Lagrange multipliers can be updated by the sub-gradient
K
2
min L (ϑ, ς) −f (ϑ) + ς ϑk − ϑk approach [32, Chapter 6]. The Lagrangian-based method is
ϑ
k=1 =1 summarize in Algorithm 1 where δυ > 0, δγ is a sufficiently
s.t. ϑ ∈ D (14) small positive number. Let κ1 denotes the time complexity
The proof of Proposition 2 can be derived in a similar fashion required to compute the gradient of ϑk , with a solution
as the proof of [29, Proposition 1] or [30, Proposition 2]. accuracy of 1 . The worst case computational complexity for
It can be inferred from Proposition 2 that strong duality holds. the gradient descent is O(KLκ1 log(−11 )). Since the objective
Consequently, our goal is to solve the optimization problem function is differentiable, the complexity of the sub-gradient
(14) which we rewrite as approach to calculate the Lagrange multipliers is computing
L in a similar fashion as the computational complexity of the
K
L
K
2
max k
ϑk R −ς ϑk − ϑk gradient method [33]. Then, the overall computational com-
0≤ϑ≤1 plexity of the Lagrangian-based solution to find a station-
k=1 =1 k=1 =1
L ary point to problem (15) is given by O(Kκ2 log(−1 2 ) +
s.t. Rk ≤ , ∀k
ϑk Rk
Kκ3 log(−1 −1
3 )) · O(KLκ1 log(1 )) where O(κ2 log(2 ))
−1
−1
=1 and O(κ3 log(3 )) are the computational complexity of the
L Lagrangian multiplier γ and υ, respectively. 2 , 3 are the
1≤ ϑk , ∀k (15) solution accuracy for the sub-gradient method to compute
=1 γ and υ, respectively. The convergences condition can be
The Lagrangian associated with the optimization problem (15) chosen to be (L(ϑ[n], γ[n], υ[n])−L(ϑ[n−1], γ[n−1], υ[n−
is formulated as 1]))/L(ϑ[n − 1], γ[n − 1], υ[n − 1]) < 1 . It is worth noticing
that the convergence of Algorithm 1 can be extremely slow
K L
L (ϑ, γ, υ) = γk Rk − k
ϑk R especially when higher accuracy is required since the local
k=1 =1
solution is computed by means of gradient descent and sub-
gradient approaches.
K L
+ υk 1− ϑk Although the Lagrangian-based scheme can find a local
k=1 =1 solution to problem (9), this method has rather low-rate
L
K
of convergence. This motivates us to provide an alternative
− − ς ϑ − ϑ 2
ϑlk R (16) approach with higher rates of convergence and that can enable
k k k
k=1 =1 the attenuation of the effect of multi-user interference and
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
DENIS AND ASSAAD: IMPROVING CF MASSIVE MIMO NETWORKS PERFORMANCE 7365
Algorithm 1 Lagrangian-Based Approach to Solve and we define the mutual interference weight as follow
Problem (15) Ikj + Ijk
1: Input A feasible ϑ[0] to problem (15) and a solution ωkj = ωjk (21)
accuracy 1 > 0. 2
2: Set n ← 0;
3: repeat A. Graphical Modeling
4: Initialize γ[0], υ[0] and set m ← 0; We start by constructing a spatial correlation graph that
5: repeat captures the level of interference for a set of users which
6: m ← m + 1; are active simultaneously. More specifically, we design an
7: Update γ, υ as undirected interference graph G(V, E). The set of vertices
+ V, with |V| = K, of the considered graph accounts for
L
υk [m] ← υk [m − 1] + δυ 1 −
ϑk [n] , ∀k the users in the coverage area while each edge ekj ∈ E is
=1 associated with a weight ωkj defined in (21) set to capture the
γk [m] ← (γk [m − 1] + δγ interference level. Using the constructed graph G(V, E), our
+ goal is to formulate an optimization problem to partition users
L
Rk −
ϑk [n]R
, ∀k (19) into groups. The considered optimization framework aims at
k
=1
minimizing the mutual interference weight between the users
that are assigned to the same group.
8: until the subgradient approach converges Define the following variable
9: n←n+1 ;
10: Update ϑ[n] by ϑk [n] ← 1 if user k is allocated to the c-th group
1 xk,c = (22)
∂L(ϑ,γ[m],υ[m])
ϑk [n − 1] − δϑ
∂ϑk
|ϑ=ϑ[n−1] , ∀ , ∀k. 0 otherwise
0
11: until the gradient descent method converges.
12: Output the stationary solutions ϑ[n].
The user’s scheduling problem is formulated as the following
combinatorial optimization problem
C
pilot contamination. This is done from the standpoint of user max ωkj (1 − xk,c )xj,c
xk,c ∈{0,1}, ∀c,∀k
c=1 k∈V j∈V,j=k
grouping.
C
s.t. 1 ≤ xk,c ≤ α, ∀k ∈ V
IV. S CHEDULING -BASED R ESOURCE A LLOCATION c=1
Our proposed scheduling approach aims at clustering users xk,c ≤ τ, ∀c = 1, . . . , C, (23)
to palliate the effect of multi-user interference. The motivation k∈V
lies in the fact that by grouping together users that cause
small amount of interference to each other, the intra-group where C denote the total number of groups and α, the maxi-
interference can be made as small as possible. Regarding inter- mum number of groups a user is permitted to be assigned to
group interference and pilot contamination interference, their concurrently. We also refrain each group to have a maximum
effect can be alleviate by scheduling each group on different number of users, i.e τ , to avoid intra-group pilot contamina-
sub-frequency bands. tion. Problem (23) is a combinatorial optimization problem
Our scheduling procedure is executed at the CPU side and therefore very difficult to solve. In the next section,
and is involved large scale fading of the users’ channel and we propose an algorithm to seek an efficient solution to
some other parameters. The group coefficients are sent to problem (23).
the access points for downlink data payload. As discussed
subsequently, the users will be partitioned into groups from the V. S EMIDEFINITE R ELAXATION -BASED A PPROACH
perspective of graph theory. To be more specific, a weighted
graph will be constructed with the weight being the mutual In this section, we turn our attention in developing a
interference, which needs to be defined, between two users. polynomial-time solvable algorithm to find an efficient sub-
Towards this end, we consider the interference between two optimal solution to problem (23). However, let us first
users j and k (we assume that both users are assigned same rewrite the optimization problem (23) in a more compact
pilot sequence) in the absence of all the other users. It is way. Towards this end, we define the following change of
written as variables
M 2 xc (x1,c · · · , xK,c ) , yc 2xc − 1K ,
√ηmk τ ρp βmj βmk ⎛ ⎞
Ikj = N 0 w21 · · · wK1
m=1
τ ρp βmj + ρp τ βmk + 1 ⎜ w12 0 · · · wK2 ⎟
⎜ ⎟
M 2
ηmj τ ρp βmk βmj W ⎜ . .. . . .. ⎟ (24)
+ (20) ⎝ .. . . . ⎠
m=1
τ ρp βmj + ρp τ βmk + 1 w1K w2K · · · 0
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
7366 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
where 1K is a column vector which entries are 1. Using (24), Algorithm 2 A Randomized Algorithm to Solve Problem (25)
problem (23) can be equivalently reformulated as 1: input an optimal solution Zc , ∀c to problem (29).
and (25), the combinatorial optimization problem (23) can be s.t. 2 − C ≤ Tr (Qk Zc ) ≤ α, ∀k
compactly written as c=1
Tr (W1 Zc ) ≤ τ , ∀c
1
C
min z Wzc Zc 0, diag (Zc ) = 1K+1 , ∀c (29)
4 c=1 c
Problem (29) is a standard convex optimization problem.
C
Therefore, we can invoke interior-point based solvers such
s.t. 2 − C ≤ z
c Qk zc ≤ α, ∀k as CVX [35] to efficiently findingits global optimal solution
with a worst case complexity of O (K + 1)3.5 log(−1
c=1
4 ) [36]
z
c W1 zc ≤ τ , ∀c where 4 is the solution accuracy. If the optimal solution
zc ∈ {−1, 1}K+1, zc,K+1 = 1, ∀c (27) obtained in solving problem (29) is rank one, it is therefore
also the optimal solution to the optimization problem (28).
To find an efficient sub-optimal solution to problem (27),
However, it is not generally the case since problem (29) is
we resort to the semidefinite relaxation (SDR) method [23]
a relaxed instance of problem (28). Consequently, solving
which has been widely known as a powerful tools capable of
(29) cannot not always guarantee to yield an optimal solution
handling combinatorial optimization problems [34]. The appli-
Zc satisfying the rank one constraint. However, the opti-
cation of SDR method
comes
after
a key observation
namely,
mal solution Zc 0, ∀c to problem (29) can serve as a
z
c Qk zc = Tr zc Qk zc = Tr Qk zc zc . Following [23],
basis for finding an approximate solution to the optimization
SDR approach consists of making the change of variables
problem (28).
Zc = zc z
c . This change of variable is equivalent to substitut-
One suggestion for obtaining an approximate solution is
ing Zc = zc z
c by using a positive semidefinite (PSD) matrix Z
to resort to powerful randomization approaches [37] such as
together with an additional rank one constraint. Consequently,
the Gaussian randomization [23]. We propose a randomized
the combinatorial problem (27) can be equivalently recast as
procedure in the same vein as the randomized technique
1
C
in [37] that takes as input the optimal solution to problem
min Tr WZc (29) and outputs a feasible solution to problem (28). Given
4 c=1
Zc 0, ∀c, an optimal solution to problem (29), it can be
C
decomposed using Cholesky factorization as Zc = V c Vc , ∀c
s.t. 2 − C ≤ Tr (Qk Zc ) ≤ α, ∀k
with Vc = (vc,1 , · · · , vc,K+1 ). The proposed randomized
c=1
scheme is summarized below.
Tr (W1 Zc ) ≤ τ , ∀c
Zc 0, diag (Zc ) = 1K+1 , ∀c
A. Disjoint Allocation of Sub-Frequency Band
rank (Zc ) = 1, ∀c (28)
The proposed grouping strategy enables to partition together
The optimization problem (29) is a non-convex problem users that cause less interference to each other. In other
because the convexity of the constraint rank (Z) = 1. There- words, the proposed user grouping policy only tackles intra-
fore, it is as difficult to finding the optimal solution to group interference. We now turn our attention to investigate
the optimization problem (28) than solving its counterpart solutions to palliate inter-group interference. We advocate that
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
DENIS AND ASSAAD: IMPROVING CF MASSIVE MIMO NETWORKS PERFORMANCE 7367
inter-group interference can be eliminated by scheduling the The optimization problem (31) can be recast as
groups on different sub-frequency bands. The problem of
1
L C
group scheduling is formulated as max θc Rk,c (33a)
θc ∈{0,1}, ∀, ∀c L c=1
=1 k∈Γ(c)
1
L C
1
L C
max θc Rk,c
θc ∈{0,1}, ∀, ∀c L s.t. Rk ≤ θc Rk,c , ∀k (33b)
c=1
=1 k∈Γ(c) L c=1
=1
⎛ 2 ⎞
M
⎜ ρd m=1 N
,c
ηmk νmk,c ⎟
|Γ(c)| ⎜ ⎟
Rk,c xk,c B 1 −
log2 ⎜1 + M ⎟ (32)
Tc ⎝ N ρd m=1 ηmk βmk νmk,c + ρd N j∈Γ(c),j=k Ikj,c + 1 ⎠
,c K
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
7368 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
performance of this approximation can be further enhanced Secondly, the function
ψ θ;θ is a tight lower bound to
by simply using the optimal solution obtained from previous ψ (θ), that is ψ θ; θ = ψ θ . Thirdly, it holds true that
iteration and by sequentially solving the standard convex ∂ψ (θ;θ)
|θ→θ = ∂ψ(θ)
∂θ |θ→θ . Hence, our proposed Algorithm 3
problem (36). To be more specific, denote θ[n] the solution ∂θ
is special instance of the successive-upper-bound minimiza-
of the problem (36) at the nth iteration and set θ[n] = θ[n]. tion (SUM) algorithm [39]. Based on [39, Theorem 1], any
We solve the following convex optimization problem at the limit point to problem (37) generated by the SCA-based
(n + 1)-iteration Algorithm 3 is a stationary point to problem (34).
+ 1] = arg max ψ θ; θ[n]
θ[n (37)
θ∈X
6:
Update θ[n] = θ[n] . s.t. Rk ≤ θc Rk,c
, ∀k
L
=1 c=1
7: Until a predefined stopping criterion.
8:
Output the approximated solutions θ[n].
K L C
,c
N xk,c θc ηmk νmk,c ≤ 1, ∀m
k=1 =1 c=1
There are CL variables in the optimization problem ,c
ηmk ≥ 0, ∀m, ∀k, ∀ , ∀c (38)
(36) and K + C(C − 1)L linear and convex constraints.
Therefore, the worst-case computational
complexity of the where the second constraint is the total power budget con-
3
SCA-based Algorithm 3 is O (CL) (K + C(C − 1)L) . straint at each AP. Define the following change of variables:
The
stopping criterion
can be chosen
to be (ψ θ; θ[n] −
t,c ,c
ηmk
ψ θ; θ[n − 1] )/(ψ θ; θ[n − 1] ) > 5 . To further address mk
2
the efficiency of the proposed SCA-based Algorithm 3, it is ρd N 2
M
t,c νmk,c
m=1 mk
important to investigate its convergence analysis. This is done
γk,c 2
through next subsection. N ρd j∈Γ(c) M ,c
m=1 tmj βmk νmj,c + 1
|Γ(c)|
C. Convergence Analysis Δk,c = xk,c B 1 − (39)
Tc
Theorem
1: !
The sequence of objective function
+∞
By using (39), the optimization problem (38) can be equiva-
ψ θ[n]; θ[n] generated by the proposed SCA
n=1 lently reformulated as:
Algorithm 3 is a convergent sequence.
Proof: At (n + 1)-th iteration, the solution θ[n] is used 1
L C
as an iterate value (ref. step 6) to problem (37). Therefore max θc Δk,c log2 1 + γk,c
{t,c ,c
mk },{γk }
L
c=1
=1 k∈Γ(c)
+ 1]; θ[n]
ψ θ[n = ψ θ[n + 1]; θ[n]
(40a)
M
2
≥ ψ θ[n];
θ[n] s.t. N ρd t,c βmk νmj,c + 1 ≤
mj
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
DENIS AND ASSAAD: IMPROVING CF MASSIVE MIMO NETWORKS PERFORMANCE 7369
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
7370 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
DENIS AND ASSAAD: IMPROVING CF MASSIVE MIMO NETWORKS PERFORMANCE 7371
worth pointing out that simulations were running on a Win- changes of variables:
dows desktop with 4 Intel i7 cores and 8GB of RAM. Given 2
2 3
the same error of tolerance, the simulations revealed that there M N τ ρp βmk N ρd M τ ρp βmk
ak , bk + 1,
is a computation time gain of 85% of the proposed SDR+SCA ρp βmk + 1 ρp βmk + 1
2
as compared to the Lagrangian-based approach. Algorithm 1 τ ρp βmj bk Δkj
converges on average 7 times slower than the Proposed Δkj ρd N M βmk , b̃k , Δkj
ρp βmj + 1 ak ak
SDR+SCA.
We proceed to compare our approach with existing Consequently, the optimization problem (9) is reduced to
scheme [8], that is the canonical form of representing CF K
1
massive MIMO where all users are scheduled simultaneously max ϑk log2 1 + K
ϑ∈{0,1}K b̃k + j=k Δkj ϑj
over the available bandwidth. We implement the random pilot k=1
allocation scheme as well as [8, Algorithm 1] which we term 1
as : Canonical CF+ Pilot allocation and implement the power s.t. Rk ≤ ϑk log2 1 + K , ∀k (A.1)
b̃k + j=k Δkj ϑj
allocation given in [8, Algorithm 2]. Firstly, we compare the
CDF of the per-user downlink rate in Figure 4 (a). It can be which is equivalent to
seen from Figure 4 (a) that our proposed approach outperforms
the existing scheme [8]. Secondly, We provide comparison
K
ϑk
max log2 1+ K
in terms of maximum minimum downlink rate versus the ϑ∈{0,1}K b̃k + Δkj ϑj
j=k
number of APs. It can be observed from Figure 4(b) that our
k=1
ϑk
proposed scheme outperforms existing approaches. There is s.t. Rk ≤ log2 1 + K , ∀k (A.2)
a performance gain varying from 9.1% to 27% between our b̃k + j=k Δkj ϑj
proposed scheduling-based solution SDR + SCA + Power
To prove the NP-hardness, our goal is to introduce a polyno-
and the considered baseline [8]. This comparison leads us to
mial time reduction in order to transform the vertex packing
believe that partitioning users into groups followed by non-
problem into the optimization problem (A.2 ). To proceed with
overlapping group scheduling can palliate the effect of pilot
the proof, we write the following definition
contamination.
Definition 1: Consider an undirected graph G = {V, E},
where V = {1, · · · , |V|} is the set of vertices in G while
VII. C ONCLUSION E = {(j, k) : j ∈ V k ∈ V} denotes the set of edges in G.
An independent set of G is defined as a subset, say G ⊂ G,
In this work, we advocated that efficient radio resource
where no two nodes in G are connected. That is, ∀ vj , vk ∈ G
allocation can lead to diminution of the effect of pilot contam-
implies that (vj , vk ) ∈
/ E. The vertex packing problem refers
ination and can mitigate multi-user interference for a Cell-Free
as the problem of finding an independent set with a predefined
massive MIMO network. We investigated the problem of
size.
sub-frequency bands allocation. Firstly, we locally solved
Let us construct an undirected with |V| = K vertices. For any
the NP-hard problem formulation by mean of Lagrangian-
couple (vj , vk ) ∈ G, let
based method which has substantially low convergence speed.
We also proposed a more appealing alternative method that 1, if vj and vk are connected.
consists of addressing the problem from the perspective of Δkj =
0, otherwise.
users partitioning. We proposed a semidefinite relaxation based
algorithm to efficiently solve the problem. In addition to that, 1
and let b̃k = 2|V| , Rk = R ≤ log2 1 + 2|V| , ∀k. The
we designed a successive convex approximation algorithm transformation of the maximum independent set problem into
to find a stationary point to the problem of sub-frequency problem (A.2 ) is given through the following Lemma.
bands allocation as well as the power control problem. The Lemma 1: Solving the special instance optimization prob-
simulation results demonstrated that the alternative proposed lem (A.2 ) is equivalent to finding a maximum independent set
scheme outperforms the Lagrangian-based solution. Moreover, G of size |G| of the undirected graph G. Moreover, the opti-
the simulation results showed that the proposed scheduling- mal solution s to problem (A.2 ) satisfies log2 1 + 2|V|
based method enables to attain a performance gain compared |G| ≤ s .
to existing schemes. Proof of Lemma 1 is given in Appendix B. Given that the
vertex packing problem is an NP-hard problem, it follows
A PPENDIX A that the optimization (A.2 ) is NP-hard. This concludes our
P ROOF OF P ROPOSITION 1 proof.
To prove that problem (9) is NP-hard, we consider investi-
gating the NP-hardness of a special case. More specifically, we A PPENDIX B
assume that L = 1 and suppose that the number of active users P ROOF OF L EMMA 1
is constrained by the number of orthogonal pilot sequences, i.e We proceed with the proof of Lemma 1 by firstly demon-
K ≤ τ . Before proceeding with the proof, define the following strating the necessary condition. Suppose that there exists an
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
7372 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
independent set G of size |G|. Define ϑk , k = 1, · · · , K as where (a) follows from the fact reducing the interference
follow: leads to higher rate. We now consider a feasible solution
D for problem (A.2 ), where D is constructing as follow
1, if k ∈ G .
ϑk = (A.3)
D = (D /S) ∪ S, S includes the same index elements as
0, otherwise.
S, with only one element being 1 and all other elements 0.
Since no two nodes in G are connected, that is Δkj = Without loss of generality, suppose that the only element with
0, ∀
(k, j) ∈ G with k = j. It follows that Rk ≤ 1 is k0 . The corresponding objective function attained with the
feasible set D is
ϑk
log2 1 + b̃ + K Δ ϑ
k j=k
= log2 1 + 2|V| . Hence, solu-
kj j
⎛ ⎞
tion provided in (A.3 ) is feasible for the optimization problem ⎜ ⎟
(A.2 ) and the corresponding objective function is
sD = log2 ⎜
⎝1 +
ϑk
⎟=
Δkj ϑj ⎠
ϑk
k∈D b̃k +
j∈D,j=k
k∈(G/S)∪{k0 }
⎛ ⎞
s = log2 1 +
k∈G b̃k + j∈G,j=k Δkj ϑj ⎜ 1 ⎟
log2 ⎜ ⎟
= log2 1 + 2|V| = |G| log2 1 + 2|V| (A.4) ⎝1 + b̃k + Δkj · 1⎠
k∈G
j∈(G/S)∪{k0 },j=k
with s ≤ s . To prove the sufficient condition, we suppose
1
= log2 1+ 1 +
that problem (A.2 ) possesses an optimal solution. Denote the
optimal objective function value s and the optimal set as D .
2|V| k∈G/S
Define the following set 1
log2 1+
G= {vk |ϑk = 1, 1 ≤ k ≤ K} ⊆ V (A.5)
1
2|V|
+ j∈(G/S)∪{k0 },j=k Δkj · 1
(b) 1
|V|
It can be inferred from (A.5 ) that set G encompasses all > log2 2 + log2 1 + 1
nodes or elements of D that have value 1. Our goal is k∈G/S
2|V|
+ j∈G,j=k Δkj · 1
to demonstrate that the set G is an independent set. Before 1
starting with the proof, we have the following claim > |S| + log2 1 + 1
Claim 1: The graph characterized by combining all nodes
k∈G/S 2|V|
+ j∈G,j=k Δkj · 1
in G is an incomplete graph. > s (A.7)
Claim 1 is proven in Appendix C. Given from Claim 1
that the graph formed by the nodes in G is not be complete The inequality (b) comes from the monotonicity of the
logarithm function, that is log2 2|V| < log2 1 + 2|V| .
graph, we need to show that no two nodes in the optimal
set are connected. This is done by contradiction. Suppose not, Equation (A.7 ) leads to sD > s . This result contra-
namely there exists a subset S ⊂ G with at least two nodes that dicts with the fact that s is the global optimum for prob-
are connected. Under this consideration, the optimal objective lem (A.2 ). Therefore, it does not exist subsets in G with
function value s is given by a least two adjacent nodes which implies that G is an
independent set.
ϑk
s = log2 1 + A PPENDIX C
k∈D b̃k + j∈D ,j=k Δkj ϑj
P ROOF OF C LAIM 1
1
= log2 1 + Suppose that the graph formed by all nodes in G is
k∈G
b̃k + j∈G,j=k Δkj · 1 complete. Then, the optimal objective value function s is
given by
1
= log2 1 + 1
+ j∈S,j=k 1 · 1 s =
ϑk
k∈S
2|V|
log2 1 +
k∈D b̃k + j∈D ,j=k Δkj ϑj
1
+ log2 1 + 1
|V| + j∈G,j=k Δkj · 1 = log2 1 +
1
(a)
k∈G/S
2
k∈G
b̃k + j∈G,j=k Δkj · 1
1
≤ |S| log2 1 + 1 + log2 1 2|V|
2|V|
+1
k∈G/S
= |G| log2 1 +
1 + (|G| − 1)2|V|
(A.8)
k∈G/S 2|V|
+ j∈G,j=k Δkj · 1 log2 1 + 2|V| . Let us
verify the sign of s̃ − s
=
|V|
|V| 2
(A.6) log2 1 + 2 − |G| log2 1 + 1+(|G|−1)2|V| . Towards that
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
DENIS AND ASSAAD: IMPROVING CF MASSIVE MIMO NETWORKS PERFORMANCE 7373
2|V| 2|V|
end, define the functions f˜(x) = x log2 1 + 1+(x−1)2 |V| value is given by 2 log2 1 + 1+2 |V| . Consequently, f˜1 (x) is
and f˜1 (x) = log2 1 + 2|V| − f˜(x) for 2 ≤ x ≤ |V|. The an increasing function of x and its minimum is attained at
derivative of f˜(x) with respect to x is given by
|V| 2|V|
log2 1 + 2 − 2 log2 1 +
∂ f˜(x) 2|V| 1 + 2|V|
= log2 1 +
∂x 1 + (x − 1)2|V| 1 + 3 · 2 + 22+|V| + 23|V|
|V|
= log2 > 0 (A.11)
−x22|V| 1 + 22+|V| + 22+2|V|
2
1 (1+(x−1)2|V| )
+ 2|V|
which means that s̃ − s > 0. This leads to a contradiction
log(2) 1 +
1+(x−1)2|V| since s is the global maximum. Therefore, the graph formed
2|V| by the nodes in G cannot be complete.
= log2 1 +
1 + (x − 1)2|V|
1 x22|V| R EFERENCES
−
log(2) 1 + x2|V| 1 + (x − 1)2|V|
[1] S. E. Hajri, J. Denis, and M. Assaad, “Enhancing favorable propagation
in cell-free massive MIMO through spatial user grouping,” in Proc. IEEE
The second derivative of f˜(x) with respect to x can be found 19th Int. Workshop Signal Process. Adv. Wireless Commun. (SPAWC),
as follow Jun. 2018, pp. 1–5.
[2] Cisco White Paper. (Feb. 2019). Cisco Visual Networking Index:
−22|V| Global Mobile Data Traffic Forecast Update, 2017–2022. [Online].
∂ 2 f˜(x) 1 (1+(x−1)2|V| )2 Available: https://www.cisco.com/c/en/us/solutions/collateral/service-
=
∂x2 log(2) 1 + 2|V| provider/visual-networking-index-vni/white-paper-c11-738429.pdf
1+(x−1)2|V| [3] Ericsson White Paper. (2014). 5G Radio Access. [Online]. Available:
1 22|V| (2|V| − 1 + x2 22|V| ) https://pdfs.semanticscholar.org/9a06/bcadf0f4e3770260e0193746d5365
+ b6c9114.pdf
log(2) 1 + x2|V| 2 1 + (x − 1)2|V| 2 [4] F. Rusek, D. Persson, B. K. Lau, E. G. Larsson, T. L. Marzetta, and
F. Tufvesson, “Scaling up MIMO: Opportunities and challenges with
1 22|V| very large arrays,” IEEE Signal Process. Mag., vol. 30, no. 1, pp. 40–60,
=− Jan. 2013.
log(2) 1 + x2|V| 1 + (x − 1)2|V| [5] F. Boccardi, R. W. Heath, Jr., A. Lozano, T. L. Marzetta, and P. Popovski,
1 22|V| (2|V| − 1 + x2 22|V| ) “Five disruptive technology directions for 5G,” IEEE Commun. Mag.,
+ vol. 52, no. 2, pp. 74–80, Feb. 2014.
log(2) 1 + x2|V| 2 1 + (x − 1)2|V| 2 [6] T. L. Marzetta, “Noncooperative cellular wireless with unlimited num-
bers of base station antennas,” IEEE Trans. Wireless Commun., vol. 9,
1 22|V| (21+|V| − 2 − x2|V| ) no. 11, pp. 3590–3600, Nov. 2010.
=
log(2) 1 + x2|V| 2 1 + (x − 1)2|V| 2 [7] E. Nayebi, A. Ashikhmin, T. L. Marzetta, and H. Yang, “Cell-free
massive MIMO systems,” in Proc. 49th Asilomar Conf. Signals, Syst.
Comput., Nov. 2015, pp. 695–699.
By evaluating the sign of the second derivative, it is straightfor- [8] H. Q. Ngo, A. Ashikhmin, H. Yang, E. G. Larsson, and T. L. Marzetta,
2
ward demonstrating that it is always negative for x ≥ 2 − 2|V| . “Cell-free massive MIMO versus small cells,” IEEE Trans. Wireless
∂ f˜(x) Commun., vol. 16, no. 3, pp. 1834–1850, Mar. 2017.
Therefore, the maximum value of ∂x is attained at x = 2 [9] E. Nayebi, A. Ashikhmin, T. L. Marzetta, H. Yang, and B. D. Rao,
and is equal to “Precoding and power optimization in cell-free massive MIMO sys-
tems,” IEEE Trans. Wireless Commun., vol. 16, no. 7, pp. 4445–4459,
∂ f˜(x) ∂ f˜(x) 2|V| Jul. 2017.
max = |x=2 log2 1 + [10] H. Q. Ngo, L. N. Tran, T. Q. Duong, M. Matthaiou, and E. G. Larsson,
2≤x≤|V| ∂x ∂x 1 + 2|V| “On the total energy efficiency of cell-free massive MIMO,” IEEE Trans.
1 2(1+2|V|) Green Commun. Netw., vol. 2, no. 1, pp. 25–39, Nov. 2017.
− (1+|V|)
(A.9) [11] S. Zhou, M. Zhao, X. Xu, J. Wang, and Y. Yao, “Distributed wireless
log(2) ((1 + 2 )(1 + 2|V| ) communication system: A new architecture for future public wireless
y (1+2y)
access,” IEEE Commun. Mag., vol. 41, no. 3, pp. 108–113, Mar. 2003.
2 2
Define f˜2 (y) = ln(1 + 1+2 y ) − (1+2(1+y) )(1+2y ) , y ≥ 2. The [12] E. Hossain, M. Rasti, H. Tabassum, and A. Abdelnasser, “Evolu-
tion toward 5G multi-tier cellular wireless networks: An interference
˜
derivative of f2 (y) is computed as management perspective,” IEEE Wireless Commun., vol. 21, no. 3,
pp. 118–127, Jun. 2014.
∂ f˜2 (y) 2y log(2) 22y+1 log(2) (3 · 2y + 2) [13] R. F. Ustok, P. A. Dmochowski, P. J. Smith, and M. Shafi, “Interference
= − 2 2 cancellation with jointly optimized transceivers in multiuser multicellu-
∂y (1 + 21+y ) (1 + 2y ) (1 + 2y ) (1 + 21+y )
lar networks,” IEEE Trans. Veh. Technol., vol. 67, no. 8, pp. 7219–7229,
log(2)2y 1 + 2y − 2y+1 − 22y+2 Aug. 2018.
= 2 2 ≤0 [14] J. Ma, S. Zhang, H. Li, N. Zhao, and V. C. M. Leung, “Interference-
(1 + 2y ) (1 + 21+y ) alignment and soft-space-reuse based cooperative transmission for multi-
cell massive MIMO networks,” IEEE Trans. Wireless Commun., vol. 17,
Hence, f˜2 (y) is a decreasing function of y and its maximum no. 3, pp. 1907–1922, Mar. 2018.
[15] H. Xie, F. Gao, S. Zhang, and S. Jin, “A unified transmission strategy for
value is attained at y = 2, i.e TDD/FDD massive MIMO systems with spatial basis expansion model,”
IEEE Trans. Veh. Technol., vol. 66, no. 4, pp. 3170–3184, Apr. 2017.
˜ 4 1 32
max f2 (y) = log2 1 + − = −0.1779 < 0 [16] C. Sun, X. Gao, S. Jin, M. Matthaiou, Z. Ding, and C. Xiao, “Beam divi-
2≤y 5 log(2) 45 sion multiple access transmission for massive MIMO communications,”
(A.10) IEEE Trans. Commun., vol. 63, no. 6, pp. 2170–2184, Jun. 2015.
[17] L. Sanguinetti, A. L. Moustakas, and M. Debbah, “Interference manage-
ment in 5G reverse TDD HetNets with wireless backhaul: A large system
Therefore, by combining (A.9 ) and (A.10 ), it can be con- analysis,” IEEE J. Sel. Areas Commun., vol. 33, no. 6, pp. 1187–1200,
cluded that f˜(x) is a decreasing function of x. Its maximum Jun. 2015.
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.
7374 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 20, NO. 11, NOVEMBER 2021
[18] A. Adhikary, J. Nam, J.-Y. Ahn, and G. Caire, “Joint spatial division and [36] C. Helmberg, F. Rendl, R. J. Vanderbei, and H. Wolkowicz, “An interior-
multiplexing—The large-scale array regime,” IEEE Trans. Inf. Theory, point method for semidefinite programming,” SIAM J. Optim., vol. 6,
vol. 59, no. 10, pp. 6441–6463, Oct. 2013. no. 2, pp. 342–361, 1996.
[19] E. Bjornson, J. Hoydis, and L. Sanguinetti, “Massive MIMO has [37] M. X. Goemans and D. P. Williamson, “Improved approximation algo-
unlimited capacity,” IEEE Trans. Wireless Commun., vol. 17, no. 1, rithms for maximum cut and satisfiability problems using semidefinite
pp. 574–590, Jan. 2018. programming,” J. ACM, vol. 42, no. 6, pp. 1115–1145, Nov. 1995.
[20] D. Neumann, M. Joham, and W. Utschick, “Covariance matrix estima- [38] A. Beck, A. Ben-Tal, and L. Tetruashvili, “A sequential parametric
tion in massive MIMO,” IEEE Signal Process. Lett., vol. 25, no. 6, convex approximation method with applications to nonconvex truss
pp. 863–867, Jun. 2018. topology design problems,” J. Global Optim., vol. 47, no. 1, pp. 29–51,
[21] T. C. Mai, H. Q. Ngo, M. Egan, and T. Q. Duong, “Pilot power control May 2010.
for cell-free massive MIMO,” IEEE Trans. Veh. Technol., vol. 67, no. 11, [39] M. Razaviyayn, M. Hong, and Z.-Q. Luo, “A unified convergence
pp. 11264–11268, Nov. 2018. analysis of block successive minimization methods for nonsmooth
[22] G. T. version Release 12. (2014). LTE; Scenarios and Require- optimization,” SIAM J. Optim., vol. 23, no. 2, pp. 1126–1153, Jan. 2013.
ments for Small Cell Enhancements for E-UTRA and E-UTRAN.
[Online]. Available: https://www.etsi.org/deliver/etsi_tr/136900_136999/
136932/12.01.00_60/tr_136932v120100p.pdf
[23] Z.-Q. Luo, W.-K. Ma, A. So, Y. Ye, and S. Zhang, “Semidefinite
relaxation of quadratic optimization problems,” IEEE Signal Process.
Mag., vol. 27, no. 3, pp. 20–34, May 2010.
[24] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation Juwendo Denis (Member, IEEE) received the B.E. degree in electrical
Theory. Upper Saddle River, NJ, USA: Prentice-Hall, 1993. engineering and the M.Sc. degree from the Institute of Communications
[25] E. Bjornson, J. Hoydis, M. Kountouris, and M. Debbah, “Massive Engineering, National Tsing Hua University, Hsinchu, Taiwan, in 2011 and
MIMO systems with non-ideal hardware: Energy efficiency, estima- 2013, respectively, and the Ph.D. degree in communications engineering
tion, and capacity limits,” IEEE Trans. Inf. Theory, vol. 60, no. 11, from the CEDRIC Research Laboratory, Conservatoire National des Arts
pp. 7112–7139, Nov. 2014. et Métiers, Paris, France, in 2016. He was a Postdoctoral Researcher with
[26] E. Hossain, L. B. Le, and D. Niyato, Radio Resource Management in CentraleSupelec, Gif-sur-Yvette, France and a Former Post-Doctoral Research
Multi-Tier Cellular Wireless Networks. Hoboken, NJ, USA: Wiley. Fellow with the Electrical and Computer Engineering Department, University
[27] G. Interdonato, H. Q. Ngo, P. Frenger, and E. G. Larsson, “Downlink of Illinois at Chicago. He is currently a Post-Doctoral Fellow with the
training in cell-free massive MIMO: A blessing in disguise,” IEEE Trans. School of Engineering and Applied Sciences (SEAS), Harvard University. His
Wireless Commun., vol. 18, no. 11, pp. 5153–5169, Nov. 2019. current research interests include cross-layer optimization, resource allocation,
[28] M. R. Garey and D. S. Johnson, Computers and Intractability; interference management, channel estimation and users scheduling for 5G, and
A Guide to the Theory of NP-Completeness. New York, NY, USA: beyond wireless communications systems
W. H. Freeman, 1990.
[29] A. Khalili, S. Zarandi, and M. Rasti, “Joint resource allocation and
offloading decision in mobile edge computing,” IEEE Commun. Lett.,
vol. 23, no. 4, pp. 684–687, Apr. 2019.
[30] E. Che, H. D. Tuan, and H. H. Nguyen, “Joint optimization of
cooperative beamforming and relay assignment in multi-user wireless Mohamad Assaad (Senior Member, IEEE) received the M.Sc. and Ph.D.
relay networks,” IEEE Trans. Wireless Commun., vol. 13, no. 10, degrees in telecommunications from Telecom ParisTech, France, in 2002 and
pp. 5481–5495, Oct. 2014. 2006, respectively. Since 2006, he has been with the Telecommunications
[31] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, U.K.: Department, CentraleSupélec, where he is currently a Professor. He is also
Cambridge Univ. Press, 2004. a Researcher with the Laboratoire des Signaux et Systèmes (L2S, CNRS).
[32] D. P. Bertsekas, Nonlinear Programming. Belmont, MA, USA: He has co-authored one book and more than 120 publications in journals
Athena Scientific, 1999. and conference proceedings. He has given in the past successful tutorials
[33] S. Boyd, L. Xiao, and A. Mutapcic, “Subgradient methods,” Stan- on 5G systems at various conferences including IEEE ISWCS’15 and IEEE
ford Univ., CA, USA, Tech. Rep., 2004. [Online]. Available: WCNC’16 conferences. His research interests include 5G and beyond systems,
https://web.stanford.edu/class/ee392o/subgrad_method.pdf fundamental networking aspects of wireless systems, MIMO systems, resource
[34] L. Vandenberghe and S. Boyd, “Semidefinite programming,” SIAM Rev., optimization, and machine learning in wireless networks. He also serves
vol. 38, no. 1, pp. 49–95, Mar. 1996. regularly as a TPC member or the TPC co-chair for top-tier international
[35] M. Grant and S. Boyd. (Mar. 2014). CVX: MATLAB Software for conferences. He is currently an Editor for the IEEE W IRELESS C OMMU -
Disciplined Convex Programming, Version 2.1. [Online]. Available: NICATIONS L ETTERS and the Journal of Communications and Information
http://cvxr.com/cvx Networks.
Authorized licensed use limited to: VIT University. Downloaded on December 15,2021 at 10:12:40 UTC from IEEE Xplore. Restrictions apply.