An Overview of Algorithms for Downlink Transmit Beamforming A. Lee Swindlehurstand Chris Peel Brigham Young University phone: 801-422-4343 email:
[email protected] email:
[email protected] Quentin Spencer Distribution Control Systems, Inc. email:
[email protected] Abstract Downlink beamforming refers to the problem of using an array of antennas at a particular node (e.g., a basestation) in a wireless network to communicate simultaneously with multiple co-channel users. The users in the network may have a single antenna, and hence no ability for spatial discrimination, or they may have multiple antennas and the ability to perform some type of interference suppression. The primary issue is how to balance the need for high, received signal power for each user against the interference produced by the signal at other points in the network. In this presentation, we describe several approaches to this problem: channel inversion, regularized channel inversion, channel block diagonalization, coordinated transmit/receive beamforming, and dirty-paper coding. While the basic idea behind these algorithms is the same, namely the use of channel information at the transmitter to predict and then counteract the interference produced at each node in the network, each of the algorithms is based on achieving a different performance objective. Typical performance criteria include zero-interference transmission, minimum transmit power subject to a minimum signal-to-interference plus noise ratio at each receiver, or maximum throughput subject to a given transmit power constraint. We compare the various goals of the above algorithms, and detail their respective advantages and disadvantages in terms of computational complexity, required transmit power, network throughput, and assumed receiver capabilities. The results of several simulation studies are presented to quantify these comparisons.
Report Documentation Page
FormApproved OMB No. 0704-0188
Public reporting burden for the collection of information is estimated to average 1 hour per response, including the time for reviewing instructions, searching existing data sources, gathering and maintaining the data needed, and completing and reviewing the collection of information. Send comments regarding this burden estimate or any other aspect of this collection of information, including suggestions for reducing this burden, to Washington Headquarters Services, Directorate for Information Operations and Reports, 1215 Jefferson Davis Highway, Suite 1204, Arlington VA 22202-4302. Respondents should be aware that notwithstanding any other provision of law, no person shall be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT DATE
2. REPORT TYPE
20 DEC 2004
3. DATES COVERED
N/A
4. TITLE AND SUBTITLE
5a. CONTRACT NUMBER
An Overview of Algorithms for Downlink Transmit Beamforming
5b. GRANT NUMBER 5c. PROGRAM ELEMENT NUMBER
6. AUTHOR(S)
5d. PROJECT NUMBER 5e. TASK NUMBER 5f. WORK UNIT NUMBER
7. PERFORMING ORGANIZATION NAME(S) AND ADDRESS(ES)
8. PERFORMING ORGANIZATION
Brigham Young University
REPORT NUMBER
9. SPONSORING/MONITORING AGENCY NAME(S) AND ADDRESS(ES)
10. SPONSOR/MONITOR'S ACRONYM(S) 11. SPONSOR/MONITOR'S REPORT NUMBER(S)
12. DISTRIBUTION/AVAILABILITY STATEMENT
Approved for public release, distribution unlimited 13. SUPPLEMENTARY NOTES
See also, ADMOO1741 Proceedings of the Twelfth Annual Adaptive Sensor Array Processing Workshop, 16-18 March 2004 (ASAP-12, Volume 1)., The original document contains color images. 14. ABSTRACT 15. SUBJECT TERMS 16. SECURITY CLASSIFICATION OF: a. REPORT
b. ABSTRACT
c. THIS PAGE
unclassified
unclassified
unclassified
17. LIMITATION OF
18. NUMBER
ABSTRACT
OF PAGES
UU
29
19a. NAME OF RESPONSIBLE PERSON
Standard Form 298 (Rev. 8-98) Pirscribed by ANSI StdZ39-18
An Overview of Algorithms for Downlink Transmit Beamforming A. Lee Swindlehurst, Chris Peel, Quentin Spencer Brigham Young University Provo, UT USA
Presentation Outline Background
"*
- Single-User vs. Multi-User MIMO Scenarios - Mathematical Notation
Algorithms for Single-Antenna Users
"*
-
Channel Inversion Regularized Channel Inversion Vector Modulo Pre-Coding Interference-Balancing Methods for Power Control
Algorithms for Multiple-Antenna Users
"*
- Joint Transmit/Receive Beamforming - One vs. Multiple Sub-Channels per User
* Experimental Results * Summary A. Lee Swindlehurst
Electrical & Computer Engineering
Brigham Young University
Single-User, Point-to-Point MIMO
T s I•
Space-
Wireless
Time Encoder
Channel
N Transmit Antennas "*Receive "* Under
Space-
Time Decoder
S
M Receive Antennas
processing is centralized, assume CSI at receiver (rCSI)
ideal conditions (e.g., independent Rayleigh fading) - capacity grows linearly with min(N,M) - capacity growth is independent of CSI at the transmitter (xCSI)
"*Ifchannel
A. Lee Swindlehurst
T-
is rank deficient, xCSI is much more important Electrical & Computer Engineering
Brigham Young University
Multi-User MIMO Downlink STime
s, M
T
SpaceTime
Decoder
S
Wireless -
T
(Channel
Encoder
Space-• Time
S311••/•
T
Space-
$2
Decoder
NTransmitTie3 ._ Decoder
Antennas
M Total Receive Antennas
* Receive processing is distributed, only local rCSI is available * Without xCSI, no capacity growth at high SNR due to interference, even in the ideal case A. Lee Swindlehurst
Electrical & Computer Engineering
Brigham Young University
MU-MIMO Capacity Example 8x8 Single User
8x{4,4} Multi-User
8 Total Receive Antennas
8 Transmit Antennas
8 Receive Antennas
8 Transmit Antennas
One User 50
Uninformed Transmit --
Full CSI: Water-Filling
0
10
15
20
Two Users
50
Transmit Full CSI: Block Diagonal
-Uninformed
•25
-
rd
0
A. Lee Swindlehurst
5
10 SNR (dB)
Electrical & Computer Engineering
-
15
-
20
Brigham Young University
Mathematical Notation Assume P users, each with m antennas, d data streams transmitted to each user (m _ d). Signal received by user 1: P
x -HTsl +LHkTks + n, k=2 mxNsub-channel matrix
N x d transmit beamformer
dataother intended for users
Assume each user's data stream is scaled so that
:
X=
s, = 1.
H1 [T
_
System equation:
Noise and unmodeled interference
•
1
r
... T_]
s1 +
-
+
xI
-XPTotal # of receive antennas: M= mP
A. Lee Swindlehurst
Hp
Sp-
np-
HTs+n
Electrical & Computer Engineering
Brigham Young University
Presentation Outline
Algorithms for Single-Antenna Users -
Channel Inversion Regularized Channel Inversion Vector Modulo Pre-Coding Interference-Balancing Methods for Power Control
A. Lee Swindlehurst
Electrical & Computer Engineering
Brigham Young University
Special Case: Single Antenna Users Assume each user has m
=
1 antenna, and N _ M = P.
Channel Inversion Transmitter "pre-inverts" the channel. Transmit beamformers are columns of the pseudo-inverse:
Tc, =yH*(HH*)I To maintain fixed transmit power p, must scale signal:
Y=
H
s*(HH*) 1 S Ideally, channel inversion eliminates all inter-user interference:
x = HTcjs+n =yHH*(HH*)1S+n
ys+n
"*problems
obviously arise when channel is (nearly) rank deficient "*problem isn't noise amplification, instead it is signal attenuation due to power constraints "* what about in the "ideal" case, e.g., with independent Rayleigh fading? A. Lee Swindlehurst
Electrical & Computer Engineering
Brigham Young University
Capacity of Channel Inversion Assume elements of H are independent, Rayleigh w/ unit variance, N = P = M and s - Q (0, ).
A bad sigqn:XA = s*(HH*-lS
is distributed as* p(X)= N and
E(X)=-o
!!
Capacity** for large N:
lim Cc=-
N-->oo
:
(Tp2
Iog 2 (e)
No capacity growth with # of users/antennas
*
Hochwald & Vishwanath, Proc. 4 0th Allerton Conf., October, 2002
**
Peel, Hochwald & Swindlehurst, Proc. 4lstAIlerton Conf., October 2003
A. Lee Swindlehurst
Electrical & Computer Engineering
Brigham Young University
Regularized Channel Inversion A simple fix is to regularize the inverse: (To maximize SINR @ the receivers, choose*
N2
Trci
y H*(HH*+
N1yp *Peel, Hochwald, Swindlehurst: "Avector perturbation technique for near-capacity multi-antenna, multi-user submitted to IEEE Trans. Comm.) communication, Part I",
Linear growth with N is recovered:
N=1 0
p=lOdB 30
Sum Capacity
Sum CapacityI
70
Inversion ...................... , Channel inversion
Regularized Inversion Channel inversion
-Regularized
25
-.-
-
..
• 50
i
00 . •"i
.------.... ...... .....:. .......... ........ 1..................
Ni
ci, 40"
.........
30 ..
0
C). 20-
.....u .
.. . ....... .. .. .... .. .. .. .. .. .. .. .. S..
2
6
8
-
N A. Lee Swindlehurst
.,.* ........ ...
.. ........... .....................
-10
Electrical & Computer Engineering
-5
..
I-
10 . ...... ... .. .......... , • . .
10
.........................
.........
.............
0
.. ............ ....... ........ '- .............
. .... :. ...... ....• ... .......... . . . . . . . . . . . .
5
p (dB)
10
15
20
25
Brigham Young University
What's the real issue? "* The
regularization "quick fix" helps, but there is still a significant performance gap
"* Ultimately,
problems arise when s happens to lie in the direction of the "largest" singular vector of (HH)- 1
"* IDEA:
could we perturb s to eliminate this possibility, i.e., min (s +s)*(HH*)l(s + s) Sp
and still decode s at the receivers, without knowledge of Sp ? "* Yes,
using a little "trick": modulo pre-coding* *M. Tomlinson, "New automatic equaliser employing modulo arithmetic," Elec. Letters, March, 1971 H. Harashima & H. Miyakawa, "Matched transmission technique for channels with intersymbol interference," IEEE Trans. Comm., August, 1972
A. Lee Swindlehurst
Electrical & Computer Engineering
Brigham Young University
Vector Modulo Pre-coding Use a perturbation of the form
SP =,Cc =t(a+ jb) where -cis real and a,b are vectors of integers. For channel inversion: x = HTc,(S + s±)+ n = YHH*(HH*)'(s + s±)+n =
ys + y-c + n
Assuming receivers know y, perfect decoding is possible w/out noise using the mod-function: "O"=
At receiver k,
(mod-function applied to
real & imaginary parts separately)
fj- xk = f,(sk +u ak +ibk) = s, -cmust be chosen large enough to avoid mod-function ambiguities: A. Lee Swindlehurst
dmax =constellation "size"
u= 2(dmax + A/2),
Electrical & Computer Engineering
A=constellation "spacing"
Brigham Young University
Vector Modulo Pre-coding (cont.) * Choose c to solve integer-lattice least-squares problem (sphere encoding): min (s+Ta+Tjb)*(HH*)-'(s+Ta+Tjb) aeL/bGL
* : --> ,oo = standard ch. inversion
10
Tx antennas, 10 users (1Rx each), 4QPSK.
............. 100
"* can
regularize this approach too
......
- - - - - -. .---. . ---. . . .-
--. ----
--. -- -. .. ----. --. ---. -. -------__--
* provides linear capacity growth w/N
... ....
.. . . . . . . . .. . . .
........
-i
i
i-
-
-
-
-
- ,,
10 -----------------------------------..........\ , N
4--
get closer, one must resort to
o
"dirty paper" techniques, which lead
A. Lee Swindlehurst
. .I,.
.... - , .... .... ... :: : ...--:: --.. ... ---------------......... .. 0~~~..
'-
to much more complex receivers
' '
°--
with outer turbo code, this approach
"* to
. .. . . '
101 n
gets within 3-4 dB of capacity
- --- --- -....
. . . . . . . . . . . . . . . ------:.--. .--. -. .-.:. .----
•
--.-------.---.---.---.---.---.-------.---...--..... -
-
10
-3
-2
Channel Inversion ------------Successive Inversion-------a R
_._
vector Perturbation V, Regularized Pert. 0 2 4
Electrical & Computer Engineering
I
6 p (dB)
8
------10 12 14
Brigham Young University
-
An Alternative Based on Power Control (Interference Balancing) With a single antenna at each receiver, the columns of T= [ t, ... tp ] represent the transmit beamformers for each user, and each channel is a row vector Hi = hi*
xi = htisi +I hktkSk + n k~i
~
interference
from signals
sent to other users
In the power controlformulation, minimize total transmitted power subject to a certain QoS constraint, usually measured by SINR:
P
*
minLtkk,= tk k=1
s.t.
t*h.h*ht Z tkkkt hht+ l~
2
>- P ,
i
P
~
k#i
Can be posed as a convex, semi-definite optimization & efficiently solved using (for example) interior-point methods. See Rashid-Farrokhi, Liu, Tassiulas, "Transmit beamforming and power control for cellular wireless systems," IEEE J. Sel. Areas in Comm., October, 1998 Bengtsson & Ottersten "Optimal and sub-optimal transmit beamforming," Handbook of Antennas in Wireless Comm., CRC Press, August, 2001
A. Lee Swindlehurst
Electrical & Computer Engineering
Brigham Young University
Presentation Outline
Algorithms for Multiple-Antenna Users - Joint Transmit/Receive Beamforming - One vs. Multiple Sub-Channels per User
A. Lee Swindlehurst
Electrical & Computer Engineering
Brigham Young University
Multiple-Antenna Users Recall system equation for P users with m antennas each:
H-
X=
:
1
... T -]s,
-
:
+
= HTs+n "* If
N > M = mP, we could diagonalize HT, but such an approach would be sub-optimal, since it would ignore spatial discrimination at the receivers
"* From
the standpoint of capacity, it is better to b/ock-diagonalize HT, and then use water-filling to allocate power to all available spatial channels* *Q. Spencer and A. Swindlehurst, "Zero-forcing methods for downlink spatial multiplexing in multi-user MIMO channels," IEEE Trans. Sig. Proc., February, 2004
* Disadvantage is that capacity may be achieved at the expense of weak users; e.g., 1-2 strong users may take a dominant share of available power A. Lee Swindlehurst
Electrical & Computer Engineering
Brigham Young University
Multiple-Antenna User Example 4 xmit antennas, 4 total rcv antennas, Rayleigh fading channel Capacity CCDFS form7 - 4 at 10 dB SNR ... Inversion
Block Diag. Blind Tx
S0.9" Ica 0.8
L
,0. A
x
060.6 {1,1,1,1} x'4'
-
0.5 0.4-
L
{2,2} x 4
2 0.2 00
1 User
-
2
4
6
8
10
12
14
16
Capacity (bits/use) A. Lee Swindlehurst
Electrical & Computer Engineering
Brigham Young University
Joint Tx-Rx Design Problem: 1 Sub-Channel per User It is unlikely that N > M = mP. Can multiplex up to N data streams with N antennas. Assume 1 stream is sent to each of P _