Next Article in Journal
Lognormality in Turbulence Energy Spectra
Next Article in Special Issue
Stealthy Secret Key Generation
Previous Article in Journal
Allostery and Epistasis: Emergent Properties of Anisotropic Networks
Previous Article in Special Issue
On the Downlink Capacity of Cell-Free Massive MIMO with Constrained Fronthaul Capacity
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Degrees-Of-Freedom in Multi-Cloud Based Sectored Cellular Networks

by
Samet Gelincik
1,* and
Ghaya Rekaya-Ben Othman
2,*
1
Institut National des Sciences Appliquées de Rennes, Université de Rennes, 20 Avenue des Buttes de Coesmes, 35708 Rennes, France
2
Laboratoire Traitement et Communication de l’Information (LTCI), Telecom Paris, Institut Polytechnique de Paris, 91120 Palaiseau, France
*
Authors to whom correspondence should be addressed.
Submission received: 15 May 2020 / Revised: 9 June 2020 / Accepted: 11 June 2020 / Published: 16 June 2020
(This article belongs to the Special Issue Wireless Networks: Information Theoretic Perspectives)

Abstract

:
This paper investigates the achievable per-user degrees-of-freedom (DoF) in multi-cloud based sectored hexagonal cellular networks (M-CRAN) at uplink. The network consists of N base stations (BS) and K N base band unit pools (BBUP), which function as independent cloud centers. The communication between BSs and BBUPs occurs by means of finite-capacity fronthaul links of capacities C F = μ F · 1 2 log ( 1 + P ) with P denoting transmit power. In the system model, BBUPs have limited processing capacity C BBU = μ BBU · 1 2 log ( 1 + P ) . We propose two different achievability schemes based on dividing the network into non-interfering parallelogram and hexagonal clusters, respectively. The minimum number of users in a cluster is determined by the ratio of BBUPs to BSs, r = K / N . Both of the parallelogram and hexagonal schemes are based on practically implementable beamforming and adapt the way of forming clusters to the sectorization of the cells. Proposed coding schemes improve the sum-rate over naive approaches that ignore cell sectorization, both at finite signal-to-noise ratio (SNR) and in the high-SNR limit. We derive a lower bound on per-user DoF which is a function of μ BBU , μ F , and r. We show that cut-set bound are attained for several cases, the achievability gap between lower and cut-set bounds decreases with the inverse of BBUP-BS ratio 1 r for μ F 2 M irrespective of μ BBU , and that per-user DoF achieved through hexagonal clustering can not exceed the per-user DoF of parallelogram clustering for any value of μ BBU and r as long as μ F 2 M . Since the achievability gap decreases with inverse of the BBUP-BS ratio for small and moderate fronthaul capacities, the cut-set bound is almost achieved even for small cluster sizes for this range of fronthaul capacities. For higher fronthaul capacities, the achievability gap is not always tight but decreases with processing capacity. However, the cut-set bound, e.g., at 5 M 6 , can be achieved with a moderate clustering size.

1. Introduction

Interference is one of the fundamental obstacles for high data rate communications in current and future cellular networks because of restricting the effect on overall spectral efficiency in bits/sec/Hz/base station. Sectorization, which has been used in 4G networks, is one solution to alleviate intra-cell interference by using multiple antennas at base stations (BS) resulting in directional beams that cover an intended sector. In the literature, sectorization is often combined with hexagonal cell models, and mostly each cell is divided into three sectors [1,2]. Here, we follow the works in [3,4,5,6] that totally ignore the interference between the sectors in the same cell. In real systems, this is not the case since the side lobes of the radiation pattern cause to observe signals from adjacent inter-cell sectors. However, we ignore it in the current work since the interference is close to the noise level and our focus will be on the sum-capacity of the sectored hexagonal network in the high signal-to-noise ratio (SNR) and the degrees of freedom (DoF) per-user.
Together with sectorization, cooperation between BSs or mobile users is a well-known technique of decreasing the detrimental effect of interference in cellular networks (see e.g., [7] and references therein). In the context of cellular networks, cooperation has mostly been used to create alternate communication paths (by having mobile users or dedicated terminals relay the transmit signals of adjacent mobiles, see, e.g., [8,9]), or to provide BSs with quantized versions of the transmit/receive signals of other BSs via backhaul links (allowing for clustered decoding, see, e.g., [10,11,12,13,14,15,16]). Cooperation makes it possible for user data to be jointly processed by several BSs at both uplink and downlink, hence imitating the benefits of virtual multiple-input multiple-output (MIMO) architecture. This framework is also known as multi-cell processing (MCP) [7,16]. The study of MCP started for uplink with the works [12,13] and for downlink with the work [14] based on full cooperation assumption. In uplink, the received signals at all BSs are relayed to a central processor (CP) via perfect backhaul links (assumed to be of infinite capacity and error free). Then, the CP decodes all user messages jointly. In contrast, in downlink, the CP encodes all messages jointly and sends each transmit signal to its corresponding BS via backhaul links and each mobile user decodes the message itself. With such a full MCP through unlimited backhaul, there is no signal causing complete interference, that is, all received or transmitted signals provide useful information in decoding at the CP or mobile users. Then, interference becomes constructive rather than destructive. Thus, it is exploited.
The exploitation of interference is also possible by implementing the full MCP with limited capacity backhaul links, which is studied for uplink in [15,16] and for downlink in [17]. In [15,16], BSs share functions of their received signals using compress-and-forward protocol ([18], Theorem 6), where each BS first quantizes its received signal and then sends the quantization codeword to the CP. Then, the CP either decodes the quantization codewords and user messages jointly, or decompress quantization codewords first and then decodes the user messages. However, in the downlink [17], the CP precodes the interference across transmit signals of BSs through joint Dirty Paper Coding (DPC) [19] under individual power constraints for each BS. Therefore, each mobile user decodes its message by cancelling precoded interference. In [16,17], it is shown that the close to optimal performance can be achieved in some scenarios by full MCP with modest capacity backhaul links.
Cloud radio access network (CRAN) is a promising architecture for 5G wireless networks [20] to exploit the interference. For a single-CRAN, each BS in the network acts only as a relay and all BSs are connected to the single base-band-unit pool (BBUP) that performs encoding/decoding functionalities, which mimics the function of a CP, over dedicated rate-limited fronthaul links. Therefore, it allows for natural implementation of full MCP with limited capacity relaying links. In some works such as [3,21,22], the performance of single-CRAN is investigated. For downlink, it is shown in [3] that, when each mobile user and sector receiver have M antennas, M / 2 DoF per-user is achievable with moderate fronthaul capacity by applying simple zero forcing scheme with smart assignment of the messages to different BSs. Similar performance can be achieved for uplink by applying the ideas in [21]. However, due to complexity, latency, connectivity, scalability, and synchronization problems, the deployment of multi-cloud radio-access-networks (M-CRAN) is recently considered in a few works such as [23,24,25,26,27,28,29,30]. For example, Reference [27] studies the problem of optimization of precoding and joint compression of baseband signals across multiple clusters of BSs in downlink. It demonstrates that the multivariate compression based solution reduces the inter-cluster interference. A similar model is studied in [28] by adding access channels from BSs to mobile users as a joint optimization parameter besides precoding and fronthaul compression optimization. Reference [29] handles the network sum power consumption minimization problem for downlink M-CRAN while fronthaul capacity, channel state information CSI error, quality of service and BS power are taken into account as optimization constraints in order to to determine the beamforming vector of each user across the network and the optimal quantization noise covariance matrix associated with each cluster. This work proposes a distributed iterative solution that achieves the performance of the case all BSs connected to a single BBUP. While the formerly mentioned works assume non-dynamic clustering for each BBUP, the authors of [30] propose and analyze dynamic clustering approach based on instantaneous CSI, where they also consider the allocation of computation resources of BBUPs as an optimization parameter.
In the present work, we consider uplink of an M-CRAN with multiple-antenna mobile users and multiple-antenna BSs. We assume N 1 BSs, K N BBUPs with limited processing capacity and limited fronthaul capacity. The main interest of this paper is to understand highest achievable per-DoF and sum-rate for limited fronthaul and BBUP processing capacity for given BBUP-BS ratio K / N . We propose two coding schemes in each of which some mobile users are deactivated to decompose the network into isolated parallelogram and hexagonal clusters, respectively. For both clustering types, the minimum number of mobile users/sectors are determined regarding a BBUP-BS ratio due to one-to-one association between BBUPs and clusters. Each BBUP collects quantized versions of the received signals of the associated cluster through fronthaul links and decodes them jointly. The considered decoding scheme is thus reminiscent of clustered decoding as performed in [10,31].
The contributions of this paper are:
  • We propose a specific non-dynamic way of silencing mobile users in parallelogram clustering. One could attempt to silence entire cells. We find an efficient way of dividing the network non-interfering parallelogram clusters by silencing mobile users mostly in single sectors of the considered cells;
  • We propose achievability schemes for both parallelogram and hexagonal clusterings and derive lower bounds on per-user DoF for both schemes in a function of fronthaul and BBUP processing capacities and BBUP-BS ratio;
  • We prove that the performance of parallelogram clustering can not be worse than hexagonal clustering for small and moderate fronthaul capacities;
  • We show by simulations that, for high fronthaul capacities, the coding scheme proposed for hexagonal clustering can show better performance than parallelogram clustering if the processing capacity is large enough according to given BBUP-BS ratio.
The upper bound is obtained through cut-set argument. In several cases, upper and lower bounds are matched. For small and moderate fronthaul capacities, the achievability gap is given as a function of fronthaul capacity and BBUP-BS ratio, and it is shown that it decreases with the inverse of the BBUP-BS ratio irrespective of BBUP processing capacity.
In the finite SNR case, we compare the proposed coding schemes with the following schemes:
  • Naive versions of both schemes where all mobile users in certain cells are deactivated,
  • Interfering versions of both schemes where the network is decomposed into non-overlapping but interfering clusters,
  • An opportunistic scheme where each message is decoded based on the received signals of three neighboring sectors that have the strongest channel gains.
Finite SNR analysis shows that, in the strong interference regime, the proposed schemes outperform all other schemes for almost all SNR range under all scenarios except two; for the 3-sector decoding scheme, low SNR range and scarce BBUP capacities and, for non-interfering schemes, moderate SNR range and high BBUP capacities.
An interesting outcome of the finite SNR analysis is that interfering clustering schemes show either close to or better performance than proposed schemes in the finite SNR range under both weak and strong interference regimes; therefore, the interfering clusterings can be employed at finite SNR values with minor performance losses, since they may be more convenient for practical systems.

1.1. Organization

The rest of the paper is organized as follows: This section ends with some remarks on notation. The following Section 2 describes the problem definition. Section 3 presents the main results of the paper. In Section 4 and Section 5, we present the coding schemes for the parallelogram and hexagonal clusterings, respectively. Section 6 presents the achievability results for the naive schemes and Section 7 presents simulation results for DoF per-user. In Section 8, we present the results regarding the finite SNR analysis. We conclude the paper with Section 9 and some technical proofs are presented in the appendices.

1.2. Notation

We denote the set of all integers by Z , the set of positive integers by Z + , and the set of real numbers by R . For other sets, we use calligraphic letters, for example, X . We represent random variables by uppercase letters, for example, X, and their realizations by lowercase letters, for example, x. We use boldface notation for vectors, that is, upper case boldface letters such as X for random vectors and lower case boldface letters such as x for deterministic vectors.) Matrices are depicted with sans serif font, for example, H . We also write X ( n ) for the tuple of random vectors ( X 1 , , X n ) .

2. Problem Definition

2.1. Network Model

Consider the uplink communication in a cellular network consisting of N 1 hexagonal cells as depicted in Figure 1. Each single cell contains a base station (BS) equipped with 3 M directional receive antennas and is divided into three sectors, where each sector is covered by M receive antennas. Usage of directional antennas, where side lobe radiation patterns are negligible, implies that communications in the three sectors of a cell do not interfere with each other. It is assumed that different mobile users in the same sector perform orthogonal multiple-access as is typical for current 4G networks [32]. Thus, the model is restricted to a single mobile user per sector. For simplicity and symmetry, it is supposed that each mobile user is equipped with M transmit antennas.
It is assumed that the signal from a mobile user attenuates rapidly enough so that it cannot cause interference to sector receive antennas (Rx) in non-adjacent sectors. These assumptions lead to the interference graph in Figure 1, where each small circle depicts a mobile user and Rx pair. Solid black lines between any two circles represent symmetric interference between mobile users and Rxs of adjacent sectors. Let N = 1 , , N be an index set of all cells and associated BS in the network, and let T = 1 , , 3 N be index set of all sectors and their corresponding users and Rxs. Then, the observed signal at the Rx u T is given by the following discrete-time input-output relation:
y u , n = υ T u H u , υ x υ , n + z u , n , n { 1 , , n } ,
where
  • n denotes the number of channel use;
  • T u denotes the index set of mobile users whose transmitted signal is observed by Rx u (including mobile user u);
  • x v , n denotes the M-dimensional time- n signal sent by mobile user v;
  • z u , n denotes the M-dimensional i.i.d. standard Gaussian noise vector corrupting the time- n signal at Rx u; it is independent of all other noise vectors;
  • and H u , υ denotes an M-by-M dimensional random matrix with entries that are independently drawn according to a standard Gaussian distribution that models the channel from mobile user υ to Rx u.
Channel matrices are randomly drawn but assumed to be constant over the n channel uses employed for the transmission of a message. In other words, the block length of a transmission is assumed shorter than the coherence time of the channel. Realizations of the channel matrices are assumed to be known by corresponding BSs, but not by the mobile users.

2.2. Uplink Communication Model with M-CRAN Architecture

Consider the network model defined in Section 2.1. Assume that the mobile user in sector u T wishes to send its message W u , which is selected at random from the set 1 , , 2 n R u , to the BS in which its sector is located. To this end, mobile user u encodes its message with the function
f u n : W u R M × n , W u X u n
where X u n = X u , 1 , , X u , n , and X u , n R M is a column vector for n = 1 , , n , satisfying the power constraint:
1 n n = 1 n X u , n 2 P with probability 1 .
We assume that the decoding processes of receive signals during the uplink communication is performed by K N BBUPs, and that any BS j N can have access to any BBUP k 1 , , K through a one-hop fronthaul link which can be modeled as noise-free but capacity limited.
Definition 1.
Observation Function Let U k be the index set of BSs communicating with BBUP k. Each BS j U k sends an observation function, ϕ j , k n Y B j 3 n , to BBUP k, where
ϕ j , k n : R M × 3 n R ,
and
Y B j 3 n : = Y u j , 1 n , Y u j , 2 n , Y u j , 3 n ,
with u j , 1 , u j , 2 , and u j , 3 denoting the three sectors of BS j.
To account for capacity limits of the fronthaul links, we require
1 n k = 1 K H ϕ j , k n Y B j 3 n C F , j ,
where C F = μ F · 1 2 log ( 1 + P ) and μ F is fronthaul capacity prelog, which is a positive constant.
Let D k be the index set of sectors whose messages are to be decoded at BBUP k. After receiving observation functions, for each BBUP k and each u D k , BBUP k applies a deterministic and invertible function g k , u n on the relevant observation functions to decode the message W u :
W ^ u = g k , u n ϕ l , k n Y B l 3 n l U k .
Decoding is successful if, for all u T :
W ^ u = W u .
Increasing computational power of a processor leads to an increase in complexity. Hence, to take the computational limitation into consideration, we impose a complexity constraint on the BBUPs in terms of bit processing capacity per channel use. We assume that any BBUP k can implement the decoding process if and only if the sum rate of all observation functions that is sent to BBUP k satisfies
1 n j U k H ϕ j , k n Y B j 3 n C BBU , k ,
where C BBU = μ BBU · 1 2 log ( 1 + P ) and μ BBU is processing capacity prelog, which is a positive constant.

2.3. Capacity and Degrees of Freedom

A rate-tuple R u u T is said to be achievable if, for every ϵ > 0 and sufficiently large n, there exists encoding, observation, and decoding functions f u n , ϕ j , k n , and g k , j n satisfying (3), (6) and (9), such that
Pr u T W ^ u W u ϵ .
The capacity region C P , μ F , μ BBU , K is the closure of all achievable rate-tuples R u u T , and the maximum sum-rate is defined as
C P , μ F , μ BBU , K = sup u T R u
where the supremum is over all achievable rates R u u T C P , μ F , μ BBU , K .
Definition 2
(Per-User DoF). For any BBUP-BS ratio r 0 , 1 , fronthaul capacity prelog μ F > 0 and processsing capacity prelog μ BBU > 0 , the per user DoF is given as
DoF μ F , μ BBU , r : = lim N lim P C P , μ F , μ BBU , r · N | T | · 1 2 log ( 1 + P ) .
Here, note that the allowed interval of r guarantees satisfying the proposed system model restriction K N . In the following, we use the abbreviation DoF to designate the per-user DoF.

3. Main Results

We derive two lower bounds and an upper bound on the DoF. As we will show, they match in some cases. The first and second lower bounds are achieved by the schemes described in Section 4 and Section 5, respectively. Both schemes are based on deactivating a set of mobile users. In the first scheme, the mobile users are deactivated so that the remaining active users form parallelogram-like clusters. In the second, the remaining active users form hexagon-like clusters. We name the two DoF lower bounds as parallelogram bound and hexagon bound, respectively.
Theorem 1
(Lower Bound). For any μ BBU > 0 , μ F > 0 , and 0 < r 1 , the achievable DoF is given by
DoF μ BBU , μ F , r conv   hull DoF P μ BBU , μ F , r , DoF H μ BBU , μ F , r
where
DoF P μ BBU , μ F , r = max t 1 , t 2 min μ F 3 , μ BBU 3 t 1 t 2 , if μ F M max t 1 , t 2 min M + μ F t 1 t 2 1 3 t 1 t 2 , μ BBU 3 t 1 t 2 , if M μ F 2 M max t 1 , t 2 min M 2 t 1 + 2 t 2 3 + μ F t 1 t 2 t 1 t 2 + 1 3 t 1 t 2 , μ BBU 3 t 1 t 2 , if 2 M μ F 3 M max t 1 , t 2 min M 1 t 1 + t 2 3 t 1 t 2 , μ BBU 3 t 1 t 2 , if 3 M μ F
where above maximizations are over all positive integers t 1 , t 2 satisfying t 1 t 2 1 r , and
DoF H μ BBU , μ F , r = max t min μ F 3 t 2 1 9 t 2 , μ BBU 9 t 2 , if μ F 2 M max t min M 6 t 6 + μ F 3 t 2 3 t + 2 9 t 2 , μ BBU 9 t 2 , if 2 M μ F 3 M max t min M 3 t 1 3 t , μ BBU 9 t 2 , if 3 M μ F
where above maximizations are over all positive integers t satisfying t 1 3 r .
Proof. 
The proof is given in Section 4 and Section 5.  □
Remark 1.
For μ BBU > 0 and 0 < r 1
DoF P μ BBU , μ F , r DoF H μ BBU , μ F , r f o r μ F 2 M
Proof. 
The proof is given in Appendix A.  □
Theorem 2
(Cut-Set Bound). For any μ BBU > 0 , μ F > 0 and 0 < r 1 , the achievable DoF is upper bounded by
DoF μ F , μ BBU , r min μ BBU 3 · r , μ F 3 , M
Proof. 
The proof is given in Appendix B.  □
Corollary 1
(Optimality in some special cases).
  • If μ F M and μ F μ BBU 1 r , then
    DoF μ F , μ BBU , r = μ F 3 .
  • If μ F M , 1 r Z + and μ BBU μ F r , then
    DoF μ F , μ BBU , r = μ BBU 3 · r .
  • For M μ F 2 M
    DoF μ F , μ BBU , r = μ BBU 3 · r ,
    if μ BBU min M + μ F t 1 t 2 1 , μ F r and 1 r Z + , where t 1 , t 2 is the integer solution to t 1 t 2 = 1 r .
  • For 2 M μ F 3 M
    DoF μ F , μ BBU , r = μ BBU 3 · r ,
    -
    if μ BBU min M 2 t 1 + 2 t 2 3 + μ F t 1 t 2 t 1 t 2 + 1 , μ F r , 1 r Z + and 1 3 r Z + , where t 1 , t 2 is the integer solution to t 1 t 2 = 1 r that minimizes t 1 + t 2 , or
    -
    if μ BBU min M 6 t 6 + μ F 3 t 2 3 t + 2 , μ F r and 1 3 r Z + , where t = 1 3 r .
  • For 3 M μ F
    DoF μ F , μ BBU , r = μ BBU 3 · r ,
    -
    if μ BBU min M 3 t 1 t 2 t 1 t 2 , μ F r , 1 r Z + and 1 3 r Z + , where t 1 , t 2 is the integer solution to t 1 t 2 = 1 r that minimizes t 1 + t 2 , or
    -
    if μ BBU min M 9 t 2 3 t , μ F r and 1 3 r Z + where t = 1 3 r .
Proof. 
The proofs are given in Appendix C.  □
Theorem 3.
The achievability gap Δ μ F , μ BBU , r is upper bounded by
Δ μ BBU , μ F , r < μ F 3 · 1 r If μ F 2 M
Proof. 
The proof is given in Appendix D.  □

4. Uplink Scheme with Parallelogram Clustering

In the proposed uplink scheme, we deactivate a subset of mobile users so as to partition the network into non-interfering clusters of active users. These clusters have parallelogram shapes and are parametrized by positive integer pair t 1 , t 2 .

4.1. Construction of Parallelogram Clusters

For a given t 1 , t 2 pair, we define a regular parallelogram grid such that the length of sides of a parallelogram in the diagonal direction (−30 degree with horizontal axis) is t 1 cell-hop length, and the length of sides in the vertical direction is t 2 cell-hop length. Then, we fit this parallelogram grid into our figurative network in a way that the intersections of the parallelogram grid coincide with BSs, which are supposed to be at the center of the cells. Subsequently, we deactivate all mobile users coinciding with the sides of the grid. This process divides the network into parallelogram-like non-interfering clusters of active users and their sectors, and we refer to them shortly as p-clusters. In Figure 2, we present an example of parallelogram clustering for t 1 , t 2 = 2 , 2 , where users coinciding with green lines are deactivated. Throughout this section, we refer to active users as only users. Users of a p-cluster are located in:
  • t 1 1 t 2 1 BSs with three users,
  • 2 t 1 1 + 2 t 2 1 BSs with two users,
  • Single BS with one user.
Therefore, the number of users n p in a p-cluster is:
n p = 3 t 1 t 2 t 1 t 2 .
Let K = 1 , , K p , with K p K , be index set of p-clusters. We associate each p-cluster with single BBUP and denote the associated BBUP with the same index k K of the p-cluster. Let I k be the index set of BSs whose users are elements of kth p-cluster. Each BS j I k sends an observation function to k t h BBUP, i.e., U k = I k .
To be able to find a BBUP-BS ratio, we need to equally partition all BSs to BBUPs. Note that any BS j N with one user or three users is an element of a single index set I k , k K , and any BS j N with two users is an element of two different index sets, i.e., I k and I k 1 , k , k 1 K . Therefore, of the I k BSs of p-cluster k, we associate all of them with one user or three users, and half of them with two users to the BBUP k. This leads to the BBUP-BS ratio r p :
r p = 1 t 1 t 2 .
We can choose any t 1 , t 2 Z + pair to construct p-clusters that satisfies r p r :
t 1 t 2 1 r .

4.2. Coding Scheme

Each mobile user u encodes its message W u , which is uniformly distributed over the set W u = 1 , , 2 n R u , with a multi-antenna Gaussian codebook of power P. Since Rxs of silenced user observe only interference, each BS j generates its observation function for (active) Rxs through independent quantization codebooks. To generate quantization codebooks, each BS j applies a point-to-point Gaussian vector quantizer to receive signal of each Rx so that the noise-level quantization rates imposed in the following are satisfied. Let J k denote the sector index set of p-cluster k. We choose D k = J k , where D k is an index set of sectors whose messages are to be decoded at BBUP k. Each BS j I k with three users transmits a message consisting of three quantization messages of its Rxs to BBUP k and each BS j I k with two users transmits only quantization message of Rx u to BBUP k if u J k . The BS j I k with a single user transmits the only quantization message of its cell to the BBUP k. Depending on the prelogs μ BBU and μ F , there are three different quantization rates: all BSs with three users quantize each receive signal at the rate R q 1 = μ q 1 1 2 log ( 1 + P ) and all BSs with two users quantize each receive signal at the rate R q 2 = μ q 2 1 2 log ( 1 + P ) , and all BSs with one active user quantize their receive signals at the rate R q 3 = μ q 3 1 2 log ( 1 + P ) . After receiving quantization messages, each BBUP k reconstructs all observations with quantization noise term, i.e., { Y ^ u ( n ) } u D k . The input–output relationship experienced by each BBUP k is a multi-user MIMO-MAC channel ([33], Chapter 9) and [34], where the effective noise is the sum of channel and quantization noises. Since the channel matrix from mobile users of D k to Rxs of D k is known by BBUP k and is square and full rank with probability 1, each BBUP k can perform joint decoding with vanishingly small average error probability, which leads to achieving the same DoFs as if each user message is decoded in a point-to-point communication. That is, the prelogs μ q 1 , μ q 2 and μ q 3 are achieved for respective mobile users.
To be able to find DoF for asymptotic case (The limit N is only needed to eliminate edge effects.), i.e., while N , we need to equally partition deactivated users of the network to p-clusters. Note that deactivated users around a p-cluster are located on green lines of four different sides and each side is on the border of two p-clusters. Therefore, when half of the deactivated users around a p-cluster, i.e., t 1 + t 2 , are associated with the p-cluster itself, the equal partition of the deactivated users is performed. Then, the DoF of the scheme can be obtained as:
DoF P μ F , μ BBU , r = μ q 1 3 t 1 t 2 3 t 1 3 t 2 + 3 + μ q 2 2 t 1 + 2 t 2 4 + μ q 3 3 t 1 t 2
where the expression in the numerator refers to the sum-DoF in a given p-cluster and the expression in the denominator refers to the total number of active and deactivated users for a given p-cluster. In the following, we will give a policy to choose quantization rates for any t 1 , t 2 satisfying (25).

4.2.1. Case 1: μ BBU n p M

The DoF of M × M MIMO system with independently fading channels, which is our case, is M as given in [35]: the quantization rate M 2 log ( 1 + P ) is enough to describe message set W u of any user u asymptotically. Thus, here, we are not restricted by the processing capacity prelog μ BBU , i.e., the only restricting factor is fronthaul capacity prelog μ F . The main policy is to distribute transmission resources between (active) users of any given BS unless the per sector transmission capacity is more than the rate providing maximum DoF M, i.e., M 2 log ( 1 + P ) . To this end, we determine the quantization rates regarding μ F :
  • If μ F M , transmission resource of a fronthaul link is allocated equally among Rxs of a BS:
    R q 1 = μ F 3 · 1 2 log ( 1 + P ) , R q 2 = μ F 2 · 1 2 log ( 1 + P ) , R q 3 = μ F 1 2 log ( 1 + P ) ,
    and the achievable DoF is given as
    DoF P μ F , μ BBU , r = μ F 3 .
  • If M μ F 2 M , transmission resource of a fronthaul link is equally allocated among Rxs of a BS with two or three users; however, any BS with one user quantizes its received signal at the maximum rate since each fronthaul link has enough capacity to support that communication rate ( M μ F ):
    R q 1 = μ F 3 · 1 2 log ( 1 + P ) , R q 2 = μ F 2 · 1 2 log ( 1 + P ) , R q 3 = M 1 2 log ( 1 + P ) ,
    and the achievable DoF is given by
    DoF P μ F , μ BBU , r = μ F t 1 t 2 1 + M 3 t 1 t 2 .
  • If 2 M μ F 3 M , transmission resource of a fronthaul link is equally allocated among Rxs of a BS with three users; however, any BS with one or two users quantizes their receive signals at the maximum rate for each Rx since each fronthaul link has enough capacity to support that communication rate ( M μ F 2 ):
    R q 1 = μ F 3 · 1 2 log ( 1 + P ) , R q 2 = M 1 2 log ( 1 + P ) , R q 3 = M 1 2 log ( 1 + P ) ,
    and the achievable DoF is given by
    DoF P μ F , μ BBU , r = μ F t 1 t 2 t 1 t 2 + 1 + M 2 t 1 + 2 t 2 3 3 t 1 t 2 .
  • If 3 M μ F , all BSs quantize their receive signal at the maximum rate at each sector ( M μ F 3 ):
    R q 1 = R q 2 = R q 3 = M · 1 2 log ( 1 + P ) ,
    and achievable DoF is given as:
    DoF P μ F , μ BBU , r = M 1 t 1 + t 2 3 t 1 t 2 .

4.2.2. Case 2: μ BBU n p M

Under this condition, the achievable sum-DoF of a p-cluster, which is given in the numerator of (26), can be restricted by the processing capacity prelog μ BBU . If the μ BBU is not smaller than the achievable sum-DoF of a p-cluster for the given interval of μ F :
  • If μ F t 1 t 2 μ BBU n p M for μ F M ,
  • If μ F t 1 t 2 1 + M μ BBU n p M for M μ F 2 M ,
  • If μ F t 1 t 2 t 1 t 2 + 1 + M 2 t 1 + 2 t 2 3 μ BBU n p M for 2 M μ F 3 M ,
  • If μ BBU = n p M for μ F 3 M ,
The process that has been implemented in Section 4.2.1 is applied and, hence, the DoF expressions are given as in (27), (28), (29) and (30), respectively. However, if the processing capacity prelog μ BBU is smaller than the sum-DoF for the given μ F :
  • If μ BBU μ F t 1 t 2 for μ F M ,
  • If μ BBU μ F t 1 t 2 1 + M for M μ F 2 M ,
  • If μ BBU μ F t 1 t 2 t 1 t 2 + 1 + M 2 t 1 + 2 t 2 3 for 2 M μ F 3 M ,
  • If μ BBU n p M for μ F 3 M ,
We distribute the processing resource of a BBUP equally among sectors of a cluster and the quantization rate at each sector is chosen as
R q 1 = R q 2 = R q 3 = μ BBU n p · 1 2 log ( 1 + P ) ,
which leads to:
DoF P μ F , μ BBU , r = μ BBU 3 t 1 t 2 .
To provide fairness among the achievable DoFs of users, instances of the proposed scheme are time-shared so that each mobile user takes all relative positions in a p-cluster, which requires
1 r p = t 1 t 2 ,
different instances.

5. Uplink Scheme with Hexagon Clustering

The same as done in the last section, we deactivate a subset of mobile users so as to partition the network into non-interfering clusters of active users and their sectors. The shape of the clusters is hexagon and the size of the hexagons are set by a positive integer t.

5.1. Construction of Hexagon Clusters

For a given design parameter t, we choose some BSs as center BSs to construct a regular grid of equilateral triangles where every three closest center BSs are 2 t cell-hops apart from each other. Therefore, the maximum distance to the closest center BS is t cell-hops and we name the BSs whose distance is cell-hops to the closest center BS as layer-“” BSs, for = 1 , , t . We determine all BSs located at t cell-hops above and below of any center BS as corner and null BSs, respectively. Then, we create solid green lines between any closest null and corner BSs (t cell-hop apart from each other), which creates hexagon grids along the entire network. Subsequently, we deactivate mobile users coinciding with solid green lines. This process divides the network hexagon-like non-interfering clusters and we shortly name as h-clusters (The hexagonal clustering is first presented in [36].). Figure 3 shows an example of partition for t = 3 . Later on, we refer to active users as only users. In an h-cluster,
  • There are three users in center BS,
  • There are 6 layer-“”, = 1 , , t 1 , BSs with 3 users around center BS, i.e., in total 3 · = 1 t 1 6 = 9 t 2 9 t ,
  • There are 6 t 3 users in layer-“t” BSs.
Therefore, the number of users in a h-cluster, n h , is:
n h = 9 t 2 3 t .
Let K = 1 , , K h , with K h K , be index set of h-clusters. We associate each h-cluster with single BBUP and denote the associated BBUP with the same index k K of the h-cluster. Let I k be the index set of BSs whose users are elements of kth h-cluster. Each I k BS sends an observation function to kth BBUP, i.e., U k = I k .
To be able to find a BBUP-BS ratio, r h , we need to equally partition all BSs to BBUPs. Note that each layer-t BS, except the one in the corner, belongs to two different index sets, i.e., I k and I k 1 , k , k 1 K . Each corner BS is an element of three different index sets, i.e., I k , I k 1 and I k 2 , k , k 1 , k 2 K . In addition, note that each null BS around a h-cluster k is on the border of three different h-clusters. To this end, of the I k BSs and null BSs around h-cluster k, we partition all layer-“”, = 1 , , t 1 , BSs including center BS, half of the layer-t BSs except corner and null BSs, and one third of corner and null BSs to the BBUP k, which leads to:
r h = 1 3 t 2 .
Since we have a given ratio r, we can choose any t Z + such that r h r , i.e.,
t 1 3 r .

5.2. Coding Scheme

Each mobile user u encodes its message W u , which is uniformly distributed over the set W u = 1 , , 2 n R u , with a multi-antenna Gaussian codebook of power P. As in Section 4, after observation at sector antennas, each BS j generates observation function for (active) Rxs through independent quantization codebooks. To generate quantization codebooks, each BS j applies a point-to-point Gaussian vector quantizer to a received signal of each Rx such that the following noise-level quantization rate constraints are met. Let J k denote the sector index set of h-cluster k. We choose D k = J k . Each BS j I k of layer-“”, = 1 , , t 1 , transmits a message consisting of three independent quantization messages of Rxs to BBUP k and each BS j I k of layer-“t” transmits only quantization message of sector u to BBUP k if u J k . Depending on the prelogs μ BBU and μ F , there are two different quantization rates: Each BS with three users quantize each receive signal at the rate R q 1 = μ q 1 1 2 log ( 1 + P ) and each BS with two users quantize each receive signal at the rate R q 2 = μ q 2 1 2 log ( 1 + P ) . That is, in h-cluster k, the receive signals of all layer-“” BSs, = 1 , , t 1 , and the receive signals of every corner BS is quantized at rate R q 1 , i.e., 9 t 2 9 t + 6 , and receive signals of layer-“t” BSs other than corner BSs are quantized at R q 2 , i.e., 6 t 6 . After obtaining quantization messages, BBUP k reconstructs all { Y ^ u ( n ) } u D k with quantization error. The input–output relationship experienced at the BBUP k is multi-user Gaussian MIMO-MAC. Then, each BBUP k performs joint decoding with vanishingly small probability of error since the channel matrix from users of D k to Rxs of D k is known by BBUP k and is square and full rank with probability 1. This leads to achieving DoFs μ q 1 and μ q 2 for respective mobile users.
To be able to find DoF for asymptotic case, i.e., N , we need to equally partition deactivated users of the network to h-clusters. The number of deactivated users around h-cluster k is 6 t . Since each deactivated user is on the border of two h-clusters, to be able to find DoF of the scheme, we partition half of them, i.e., 3 t , to users of h-cluster k, which gives the DoF expression:
DoF μ F , μ BBU , r = μ q 1 9 t 2 9 t + 6 + μ q 2 6 t 6 9 t 2 .
In the following, we will give the policy for choosing quantization rates.

5.2.1. Case 1: μ BBU n h M

In Section 4.2.1, μ F is the only limiting factor since the quantization rate M · 1 2 log ( 1 + P ) is enough to describe message W u of any user u in the asymptotic case. The policy is again to distribute transmission resources equally among (active) Rxs of any given BS. To this end, we choose the quantization rates regarding μ F :
  • If μ F 2 M , transmission resource of a fronthaul link is equally allocated between Rxs
    R q 1 = μ F 3 · 1 2 log ( 1 + P ) , R q 2 = μ F 2 · 1 2 log ( 1 + P ) ,
    and the achievable DoF is given as
    DoF μ F , μ BBU , r = μ F 3 t 2 1 9 t 2 .
  • If 2 M μ F 3 M , transmission resource of a fronthaul link is equally allocated among Rxs of a BS with three users; however, any BS with two users quantizes its receive signals at the maximum rate at each Rx since each fronthaul link has enough capacity to support that communication rate ( M μ F 2 ):
    R q 1 = μ F 3 · 1 2 log ( 1 + P ) , R q 2 = M · 1 2 log ( 1 + P ) ,
    and the achievable DoF is given as
    DoF μ F , μ BBU , r = μ F 3 t 2 3 t + 2 + M 6 t 6 9 t 2 .
  • If μ F 3 M , all BSs quantize their receive signals at the maximum quantization rate ( M μ F 3 ):
    R q 1 = R q 2 = M · 1 2 log ( 1 + P ) ,
    and the achievable DoF is given as
    DoF μ BBU , μ F , r = M 3 t 1 3 t .

5.2.2. Case 2: μ BBU n h M

Under this condition, depending on μ F , the achievable sum-DoF of a h-cluster can be restricted by the processing capacity prelog μ BBU . Achievable sum-DoF is given in the numerator of (36). Therefore, if the processing capacity prelog μ BBU is not smaller than the achievable sum-DoF of a h-cluster for the given interval of μ F :
  • If μ F 3 t 2 1 μ BBU n h M for μ F 2 M
  • If μ F 3 t 2 3 t + 2 + M 6 t 6 μ BBU n h M for 2 M μ F 3 M
  • If μ BBU = n h M for 3 M μ F
The process that has been implemented in Section 5.2.1 is applied and, hence, the DoF expressions are given as in (38), (40) and (42), respectively. However, if the processing capacity prelog μ BBU is smaller than the sum-DoF for the given μ F :
  • If μ BBU μ F 3 t 2 1 for μ F 2 M ,
  • If μ BBU μ F 3 t 2 3 t + 2 + M 6 t 6 for 2 M μ F 3 M ,
  • If μ BBU n h M for μ F 3 M ,
We distribute the processing resource of a BBUP equally among sectors of a cluster and the quantization rate at each sector is chosen as
R q 1 = R q 2 = μ BBU n h · 1 2 log ( 1 + P ) ,
which leads to:
DoF μ F , μ BBU , r = μ BBU 9 t 2 .
To provide fairness among the achievable DoFs of users, instances of the proposed scheme are time-shared so that each mobile user takes all relative positions in a h-cluster, which requires
1 r h = 3 t 2 ,
different instances.

6. DoF without Sectorization

In the two proposed achievability schemes (“p-clustering” and “h-clustering”), we considered three non-interfering sectors in each cell. Now, if we consider cells without sectors, we can naively adapt our clustering by deactivating all users in the border cells of clusters. That is, for p-clustering, it requires deactivation of all users in the cells with one or two active mobile users and, for h-clustering, it requires deactivation of all users in the corner cells and the cells with two active users. This means that the network consists of only cells with three active users and cells with no active users for both schemes. This would again partition the network into non-interfering p-clusters and h-clusters without changing the r p and r h for any given t 1 , t 2 pair or t, respectively.
By following the similar procedure introduced in Section 4 and Section 5, one can easily state the following result by simply distributing the available transmission resources equally among three Rxs of a given BS as long as the BBUP capacity is enough or, otherwise, distributing BBUP processing resources equally among the Rxs of a p-cluster/h-cluster. This leads to the following lemma:
Lemma 1
(DoF for naive scheme). For any μ BBU > 0 , μ F > 0 and 0 < r 1 , the achievable DoF in a multi cloud based non-sectored cellular network is given by
DoF naive μ BBU , μ F , r conv   hull DoF P , naive μ BBU , μ F , r , DoF H , naive μ BBU , μ F , r
where
DoF P , naive μ BBU , μ F , r = max t 1 , t 2 min μ F t 1 t 2 t 1 t 2 + 1 3 t 1 t 2 , μ BBU 3 t 1 t 2 , if μ F 3 M max t 1 , t 2 min M 1 t 1 + t 2 1 t 1 t 2 , μ BBU 3 t 1 t 2 , if μ F 3 M
and above maximizations are over all positive integers t 1 , t 2 satisfying t 1 t 2 1 r , and
DoF H , naive μ BBU , μ F , r = max t min μ F 3 t 2 3 t + 2 9 t 2 , μ BBU 9 t 2 , if μ F 3 M max t min M 3 t 2 3 t + 2 3 t 2 , μ BBU 9 t 2 , if μ F 3 M
where above maximizations are over all positive integers t satisfying t 1 3 r .
Notice that the same cut-set bound, Theorem 2, applies for the naive schemes since the observation functions, Definition 1, are defined not on the sector basis but on the BS basis.

7. Numerical Results and Discussion

In this section, we present simulation results to evaluate the proposed coding schemes for p-clustering and h-clustering. In Figure 4a, we investigate effect of clustering size on the achievable DoF for several fronthaul capacities μ F = [ 3 , 7 , 11 ] and μ BBU = 428 . We define size of a p-cluster as inverse of r p , i.e., 1 r p = t 1 t 2 , and we denote it also with side length pair t 1 , t 2 . We define size of a h-cluster as inverse r h , i.e., 1 r h = 3 t 2 , and we denote it also with the parameter t. It is observed that, for p-clustering, when the fronthaul capacity is small, i.e., μ F M , clustering size has no effect on DoF since μ F becomes a bottleneck. In general, we see that, for both p-clustering and h-clustering, the clustering size giving highest DoF decreases with μ F . The figure verifies the Remark 1 since, for all r p = r h , p-clustering outperforms h-clustering for μ F = 3 , 7 . It is also interesting to note that, for p-clustering, the achievable DoF is not monotonically increasing(decreasing) until(after) reaching the maximum for μ F = 11 (i.e., 2 M < μ F 3 M ) since not only the clustering size but also the side length of the p-cluster is important for exploiting interference. For any r p , choosing a t 1 , t 2 pair that is the minimum in the sum gives the maximum DoF since it provides higher joint processing gain for a p-cluster for the given size (i.e., 1 r p ), i.e., the more t 1 and t 2 becomes closer to each other the more mutual information clusters have. Therefore, larger p-cluster sizes may not result in higher DoF owing to the side length effect. However, for μ F 2 M , the side lengths of p-cluster has no effect on achievable DoF for a given cluster size.
Figure 4b shows the effect of clustering size on DoF for various values of μ BBU = [ 100 , 300 , 500 ] and μ F = 12 . It is seen that, for each μ BBU , achievable DoF increases with cluster size until it becomes a bottleneck, i.e., until μ BBU becomes active in the achievability expression. Accordingly, the results clearly indicate that having more processing power makes possible larger cluster sizes and hence larger DoF.
In Figure 5, we plot the achievable DoF and cut-set bound vs μ F for M = 4 , r = 0.025 and μ BBU = 428 , which refers the case BBUP processing capacity is equal to the required processing capacity when each receive signal in a p-cluster of size t 1 , t 2 = 5 , 8 is quantized at the maximum quantization rate R q = M 2 log ( 1 + P ) . From the figure, we can deduce that almost upper bound for μ F 2 M can be reached, which means that 2 M 3 DoF is almost achievable at μ F = 2 M given that processing capacity is high enough. In Figure 5, the operating points of clustering sizes is also depicted. For μ F 8 , equivalently 2 M , any p-clustering with 1 r p = 40 gives the highest achievable DoF for the given system parameters. However, for μ F > 8 , there are several different operating points. For example, for 8 < μ F 9.4 , the h-clustering of size t = 4 is the optimal clustering size, which means, for μ F > 2 M , dividing the network into h-clusters provides higher joint processing gain than p-clustering for the same r h = r p if the BBUP processing capacity is enough. For the rest, the clustering size r p is decreasing with μ F due to the given BBUP capacity is not enough to handle the quantized data for larger cluster sizes. At the operating point μ F = 12 , which allows maximum quantization rate for each receive signal, the p-clustering of size t 1 , t 2 = 5 , 8 achieves capacity. This proves that the proposed scheme utilizes the system resources optimally at this operating point and almost 9 M 10 DoF is achievable. We plot also the lower bound on DoF achieved by the naive scheme vs. μ F for the same parameters. We can clearly see that the performance of the proposed schemes is considerably better than naive schemes due to the sectorization gain brought by nulling intra-cell interference.
In Figure 6, we plot the achievable DoF and cut-set bound as a function of processing capacity prelog μ BBU , for r = 0.025 and μ F = 12 , which means that the fronthaul capacity has no restrictive effect on the achievable DoF. The operating points of clustering sizes regarding μ BBU is also presented. The plot clearly indicates that the cut set bound is achieved until μ BBU = 428 , i.e., the processing resources is used efficiently even until achieving 9 M 10 DoF. At the rest of the μ BBU range, it is seen that the optimal clustering sizes ( 1 r p or 1 r h ) increase with μ BBU , and for most of μ BBU > 428 , h-clustering provides highest DoF. This indicates the advantage of employing h-clustering when the processing capacity is high enough. For some range of μ BBU , both h-clustering of size t = 4 and p-clustering of size t 1 , t 2 = 8 , 8 provide the highest DoF, which shows that h-clustering with lower clustering size provides higher joint processing gain than p-clustering with larger clustering sizes due to clustering geometry. The figure also depicts the lower bound achieved by the naive approach vs. μ BBU for the same parameters and the gain of sectorization is clearly seen for higher values of processing capacity.

8. Finite SNR Analysis

In this section, we compare finite SNR performances of the proposed schemes with several other schemes, which will be introduced later on. For the finite SNR case, the quantization rates for both proposed clusterings are chosen as stated in Section 4.2 and Section 5.2, but the conditions regarding a high SNR regime are not applied, i.e., the prelog of any quantization rate is not reduced to the number of antennas M. Then, each BBUP implements joint decoding for the users of the associated cluster after reconstructing all sector receive signals of the cluster. For simplicity, we present the comparisons for M = 1 throughout the section.
To evaluate the performance of the proposed schemes at finite SNR values, other than naive schemes, we compare our schemes with three different schemes:
  • Scheme 1 is a variation of the proposed p-clustering scheme. In p-clustering, each p-cluster is surrounded by deactivated users located on the sides of t 1 , t 2 -hop parellelogram, where each side has t 1 and t 2 deactivated users, respectively. For each p-cluster, we associate all deactivated users on the lower side and right side of a t 1 , t 2 -hop parellelogram to the p-cluster under consideration. Subsequently, we activate all deactivated users and allow each BBUP to collect quantization messages of reactivated user sectors associated with its own p-cluster. This process partitions the network into non-overlapping but interfering paralleogram-like clusters, which we call I p -clusters later on; see Figure 7 for an example of t 1 , t 2 = 4 , 3 . Note that I p -clustering requires the same BBUP-BS ratio r p as for a p-clustering case. With reactivation of all deactivated mobile users, there are 3 t 1 t 2 active users in each I p -cluster and all cells consists of three active users. Therefore, each BS equally partitions its fronthaul transmission resources to Rxs if BBU processing resources is enough to implement the joint decoding; otherwise, the processing resources is evenly distributed among all Rxs of the I p -cluster, i.e., the quantization rate is chosen as
    max t 1 , t 2 min μ F 3 , μ BBU 3 t 1 t 2 · 1 2 log ( 1 + P )
    over all positive integer t 1 , t 2 pairs satisfying t 1 t 2 1 r . To be able to guess the user messages, each BBUP implement joint decoding by treating out-of-cluster interference as noise.
  • Scheme 2 is a variation of the proposed h-clustering scheme. In h-clustering, there are 6t deactivated users around a cluster of size-t. For a specific h-cluster, we associate the deactivated users on the borders of any three adjacent h-clusters, e.g., east, southeast, and southwest, to the h-cluster under consideration. Then, we replicate this process for each h-cluster with the same relative directions of adjacent h-clusters. Subsequently, we reactivate all deactivated users and allow each BBUP k to collect the quantized received signals of sectors of reactivated users associated with its own h-cluster. This process partitions the network into interfering but non-overlapping clusters, which we call I h -cluster in the following, see Figure 8 for t = 2 . Note that I h -clustering requires the same BBUP-BS ratio as for the h-clustering case. With reactivation of deactivated users, there are 9 t 2 active users in each I h -cluster. Therefore, by applying similar arguments as stated above, the quantization rate for I h -clustering is chosen as
    max t min μ F 3 , μ BBU 9 t 2 · 1 2 log ( 1 + P )
    over positive integers t satisfying t 1 3 r . To be able to guess the user messages, each BBUP implement joint decoding by treating out-of-cluster interference as noise.
  • Scheme 3 is a variation of the practical opportunistic schemes. The decoding depends on the realization of the channel coefficients. With the help of neighbors of the considered BS, the corresponding BBUP identifies for each user in the corresponding cell the three adjacent sectors that give the best joint decoding performance for the corresponding message. To be able to make a fair comparison between the proposed schemes and the 3-sector decoding scheme, we impose the same fronthaul rate constraint on the 3-sector decoding scheme as in the non-interfering clustering scheme (note that there is no silenced user in the 3-sector decoding case) by assuming all processing resources are used. That is, the quantization rates are chosen as
    R q = min μ F 3 , μ BBU 3 · 1 r · 1 2 log ( 1 + P ) .
    Then, the BBUP collects the quantization messages and decodes the corresponding message based on them.
In our numerical comparison, we average the rate over 5000 independent channel realizations of the channel matrices, where for each realization all channel gains are drawn independently of each other according to a Gaussian distribution, by which we aim at modeling the random location of a mobile user. The direct channel gains of intra-sector links are drawn with variance 1 and the cross channel gains of inter-sector links are drawn with variance α 2 < 1 since any mobile user in adjacent sectors can not be closer to a sector receiver than the user in the considered sector, where α is the channel attenuation coefficient. Figure 9 presents the comparison of the performances of the proposed schemes with naive schemes, I p -clustering, I h -clustering schemes and 3-sector decoding scheme vs. SNR when r = 1 10 . The simulations are performed for different cluster sizes such that t 1 t 2 = 10 , 11 and 12 and t = 2 . However, in all the subfigures of Figure 9, we present only the ones showing relatively better performance than others to make presentation better.
As seen from all the subfigures of Figure 9, the proposed schemes provides higher sum-rates than naive schemes for all SNR range and, under all scenarios, e.g., strong interference regime at low BBUP processing capacity as in Figure 9b, or low interference regime at high BBUP capacity as in Figure 9e.
By comparing the subfigures of Figure 9 for a given α , we conclude that the proposed schemes become more efficient if the processing capacity of BBUPs increases, i.e., the allowed quantization rate increases. In addition, we can see that employing the smallest possible cluster for a given r is more advantageous for small processing capacities. For example, for α = 0.9 , while the p-clustering scheme for ( t 1 , t 2 ) = ( 5 , 2 ) shows better performance than other proposed schemes of larger cluster sizes at all SNR range for μ BBU = 30 , it outperforms the h-clustering for t = 2 only at low SNR values for μ BBU = 60 , and it does not outperform either h-clustering for t = 2 or p-clustering for ( t 1 , t 2 ) = ( 5 , 2 ) at any SNR value for μ BBU = 120 .
By comparing the subfigures of Figure 9 for a given μ BBU , we can observe that, for each μ BBU value, the SNR range in which the performance of the 3-sector decoding scheme is superior to or close to the proposed schemes decreases when the channel attenuation coefficient is higher. In addition, we see that, for μ BBU = 60 and 120 , the SNR range in which the h-clustering for t = 2 outperforms the I p -clustering for ( t 1 , t 2 ) = ( 5 , 2 ) and/or I h -clustering for t = 2 increases with the channel attenuation coefficient. We infer that the idea of isolated clustering is more advantageous at strong interference regime.
Another general conclusion that we can draw from simulation results presented in Figure 9 is that, if the processing capacity is high enough, i.e., the quantization rate is high enough, decomposing the network into hexagonal-type clusters achieves higher rates than paralellogram-type clusters especially at moderate and high SNR range even if r h = r p . This is due to geometrical structure of hexagonal-type clustering that includes more users for both h-cluster/ I h -cluster and less interfererers for I h -cluster in comparison with the parallelogram clusters for the same r h = r p .
An interesting conclusion from the finite SNR analysis is that interfering clusterings show close performance to the proposed schemes in the finite SNR range; therefore, the interfering clusterings can also be employed at finite SNR values, since it may be more convenient for practical systems.

9. Conclusions

In this paper, we analyze the uplink per-user DoF of M-CRAN based sectored cellular networks. The main features of this paper are the following: it proposes efficient ways of decomposing the network into non-interfering clusters for M-CRAN scenarios, and it characterizes per-user DoF as a function of fronthaul and processing capacity prelogs, and BBUP-BS ratio. The lower bound is obtained through two coding schemes based on decomposing the network into non-interfering parallelogram and hexagonal clusters, respectively. In both schemes, BSs apply point-point quantization to receive signals and send the quantization messages to the associated BBUPs over fronthaul links for joint decoding.
Simulation results show that, for small and moderate fronthaul capacities, the achievability gap between lower and cut-set bounds decreases with an inverse of the BBUP-BS ratio. Therefore, the cut-set bound is almost achieved even for small cluster sizes at this range of fronthaul capacities. For higher fronthaul capacity prelogs, the achievability gap is not always tight but decreases with processing capacity prelog.
The finite SNR analysis shows that the proposed schemes outperform the naive schemes at all SNR ranges and, under all scenarios, the interfering clustering cases at all SNR range under strong interference regime when the BBUP processing capacity is scarce and moderate, and the 3-sector decoding case at all SNR range under strong interference regime if the BBUP processing capacity is moderate and high. In other scenarios for interfering clustering and 3-sector decoding cases, the proposed schemes always achieve higher sum-rates except low SNR values.
In general, the results provide valuable insights into appropriate clustering ways for mobile users/sectors, emphasizing the isolation of clusters, particularly if inter-cell interference is highly detrimental.

Author Contributions

S.G. put forward the original ideas. S.G. developed this work in discussion with G.R.-B.O.; S.G. wrote the paper with comments from G.R.-B.O. All authors have read and agreed to the published version of the manuscript.

Funding

The work of Samet Gelincik is supported by Turkish Ministry of Education.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Proof of Remark 1

By (25), any t 1 * , t 2 * pair that satisfies t 1 * t 2 * = 1 r provides the maximum number of BBUP deployment for parallelogram clustering. By (35), t * = 1 3 r is the minimum cluster size that can be created for the given r, and hence provides the maximum possible number of BBUP deployment for hexagon clustering. Note that t 1 * t 2 * 3 t * 2 for r 0 , 1 .
We now check the cases for μ F M and M μ F 2 M .

Appendix A.1. Case 1: μ F M

Proposition A1.
From (14), the achievable DoF for Parallelogram Scheme can be written as:
DoF P μ BBU , μ F , r = μ BBU 3 t 1 * t 2 * if μ BBU μ F t 1 * t 2 * μ F 3 if μ BBU μ F t 1 * t 2 *
and, from (15), the achievable DoF for Hexagon Scheme can be written as:
DoF H μ BBU , μ F , r = μ BBU 3 1 3 t * 2 , if μ BBU μ F 3 t * 2 1 max μ F 3 t 2 1 9 t 2 , μ BBU 9 t + 1 2 , if μ BBU μ F 3 t * 2 1
for t satisfying
μ F 3 t 2 1 μ BBU μ F 3 t + 1 2 1 .
Proof. 
The first part of the proposition, i.e., (A1), is straightforward. For (A2), note that, for a given μ BBU > 0 , there is a unique t Z + that satisfies (A3) and the maximization term in (A2) comes from the fact that, to implement the hexagonal scheme, we choose the design parameter t that gives the maximum DoF of among minimums found for satisfying t 1 3 r . From (15), we infer that the term μ F 3 t 2 1 9 t 2 is active in the minimization process for t t 1 3 r since μ BBU μ F 3 t 2 1 , and that the term μ BBU 9 t 2 is active in lower bound for t > t since μ BBU μ F 3 t + 1 2 1 . Therefore, the achievable DoF by hexagon scheme is given by the second term of (A2) if μ BBU μ F 3 t * 2 1 .  □
We now check all possible intervals of μ BBU regarding (A1) and (A2).

Appendix A.1.1. μ BBU min { μ F ( 3 t 1 * t 2 * ) , μ F ( 3 t * 2 1 ) }

The DoF is given as:
DoF μ BBU , μ F , r max μ BBU 3 t 1 * t 2 * , μ BBU 3 1 3 t * 2 , = μ BBU 3 t 1 * t 2 * ,
since t 1 * t 2 * 3 t * 2 for any r 0 , 1 .

Appendix A.1.2. μ F ( 3 t * 2 1 ) μ BBU μ F ( 3 t 1 * t 2 * )

The DoF is given as:
DoF μ BBU , μ F , r max μ BBU 3 t 1 * t 2 * , max μ F 3 t 2 1 9 t 2 , μ BBU 9 t + 1 2 = μ BBU 3 t 1 * t 2 *
Proof. 
Notice that the given condition on μ BBU implies t = t * and t 1 * t 2 * = 3 t * 2 ; otherwise, the imposed condition on μ BBU is not possible. In addition, notice that, even for the max μ BBU = μ F 3 t 1 * t 2 * = μ F 3 t * 2 , the following inequality holds:
μ F 3 t * 2 1 9 t * 2 μ BBU 9 t * + 1 2 t * Z + ,
and therefore
max μ F 3 t * 2 1 9 t * 2 , μ BBU 9 t * + 1 2 = μ F 3 t * 2 1 9 t * 2 .
Then, we end up with:
max μ BBU 3 t 1 * t 2 * , μ F 3 t * 2 1 9 t * 2 = μ BBU 3 t 1 * t 2 * ,
since min μ BBU = μ F 3 t * 2 1 and t 1 * t 2 * = 3 t * 2 .  □

Appendix A.1.3. μ F ( 3 t 1 * t 2 * ) μ BBU μ F ( 3 t * 2 1 )

The DoF is given as:
DoF μ BBU , μ F , r max μ BBU 3 1 3 t * 2 , μ F 3 = μ F 3
Proof. 
The condition μ BBU μ F 3 t * 2 1 implies μ BBU < μ F 3 t * 2 , then
μ F 3 μ BBU 3 1 3 t * 2 .
 □

Appendix A.1.4. μ BBU max { μ F ( 3 t 1 * t 2 * ) , μ F ( 3 t * 2 1 ) }

Thel DoF is given as:
DoF μ BBU , μ F , r max μ F 3 , max μ F 3 t 2 1 9 t 2 , μ BBU 9 t + 1 2 = μ F 3 .
Proof. 
If μ F 3 t 2 1 9 t 2 is active in the inner maximization, then
μ F 3 > μ F 3 t 2 1 9 t 2 t Z + .
If μ BBU 9 t + 1 2 is active in the inner maximization, we infer that the term μ BBU 9 t + 1 2 is active in hexagon bound when the design parameter is chosen as t + 1 , which means
μ BBU 9 t + 1 2 μ F 3 t + 1 2 1 9 t + 1 2 .
Therefore, the fact that
μ F 3 > μ F 3 t + 1 2 1 9 t + 1 2 t Z +
implies
μ F 3 > μ BBU 9 t + 1 2 .
 □

Appendix A.2. Case 2: M μ F 2 M

Proposition A2.
From (14), the achievable DoF for Parallelogram Scheme can be written as:
DoF P μ BBU , μ F , r = μ BBU 3 t 1 * t 2 * , if μ BBU M + μ F t 1 * t 2 * 1 max M + μ F t 1 t 2 1 3 t 1 t 2 , μ BBU 3 t 1 t 2 + 1 , if μ BBU M + μ F t 1 * t 2 * 1
for any pair t 1 , t 2 satisfying
M + μ F t 1 t 2 1 μ BBU M + μ F t 1 t 2 ,
and, from (15), the achievable DoF for Hexagon Scheme can be written as:
DoF H μ BBU , μ F , r = μ BBU 9 t * 2 , if μ BBU μ F 3 t * 2 1 max μ F 3 t 2 1 9 t 2 , μ BBU 9 t + 1 2 , if μ BBU μ F 3 t * 2 1
for t satisfying
μ F 3 t 2 1 μ BBU μ F 3 t + 1 2 1 .
Proof. 
For any given μ BBU > 0 , there is a unique positive integer c = t 1 t 2 that satisfies (A17). The maximization in (A16) can be inferred from (14)) by a similar approach given for (A2) in Appendix A.1. Note the DoF expression of hexagon case does not change for M μ F 2 M .  □
We now check all possible intervals for μ BBU regarding Equations (A16) and (A18).

Appendix A.2.1. μ BBU min { M + μ F ( t 1 * t 2 * 1 ) , μ F ( 3 t * 2 1 ) }

The DoF is given as:
DoF μ BBU , μ F , r max μ BBU 3 t 1 * t 2 * , μ BBU 9 t * 2 = μ BBU 3 t 1 * t 2 *
since t 1 * t 2 * 3 t * 2 for any r 0 , 1 .

Appendix A.2.2. μ F ( 3 t * 2 1 ) μ BBU M + μ F ( t 1 * t 2 * 1 )

The DoF is given as:
DoF μ BBU , μ F , r max max μ F 3 t 2 1 9 t 2 , μ BBU 9 t + 1 2 , μ BBU 3 t 1 * t 2 * = μ BBU 3 t 1 * t 2 *
for t satisfying (A19).
Proof. 
Notice that the imposed condition on μ BBU implies t = t * since there is a unique t Z + satisfying (A19) and μ BBU μ F 3 t * 2 1 . The rest is trivial. Since max t 1 * t 2 * = 3 t * 2 ,
μ BBU 3 t 1 * t 2 * > μ BBU 9 t * + 1 2
and since the condition requires μ BBU μ F 3 t * 2 1 , then
μ BBU 3 t 1 * t 2 * μ F 3 t * 2 1 9 t * 2 .
 □

Appendix A.2.3. M + μ F ( t 1 * t 2 * 1 ) μ BBU μ F ( 3 t * 2 1 )

The DoF is given as:
DoF μ BBU , μ F , r max μ BBU 9 t * 2 , max M + μ F t 1 t 2 1 3 t 1 t 2 , μ BBU 3 t 1 t 2 + 1 = max M + μ F t 1 t 2 1 3 t 1 t 2 , μ BBU 3 t 1 t 2 + 1
for t 1 , t 2 satisfying with (A17).
Proof. 
Notice that, for any given μ BBU > 0 , (A17) holds for a unique positive integer c = t 1 t 2 . The imposed condition implies
t 1 t 2 < 3 t * 2 ,
because assuming t 1 t 2 3 t * 2 implies
M + μ F t 1 t 2 μ BBU M + μ F t 1 t 2 1 , M + μ F 3 t * 2 1 ,
which is in contradiction with the condition imposed on μ BBU μ F 3 t * 2 1 . Hence,
  • If μ BBU 3 t 1 t 2 + 1 is active in the inner maximization of (A24),
    μ BBU 3 t 1 t 2 + 1 μ BBU 9 t * 2 .
  • If M + μ F t 1 t 2 1 3 t 1 t 2 is active in the inner maximization of (A24), then
    M + μ F t 1 t 2 3 t 1 t 2 μ BBU 3 t 1 t 2 + 1
    which implies
    M + μ F t 1 t 2 3 t 1 t 2 μ BBU 9 t * 2
    by (A27).
 □

Appendix A.2.4. μ BBU max { M + μ F ( t 1 * t 2 * 1 ) , μ F ( 3 t * 2 1 ) }

The DoF is given as:
DoF μ BBU , μ F , r max max M + μ F t 1 t 2 1 3 t 1 t 2 , μ BBU 3 t 1 t 2 + 1 , max μ F 3 t 2 1 9 t 2 , μ BBU 9 t + 1 2 = max M + μ F t 1 t 2 1 3 t 1 t 2 , μ BBU 3 t 1 t 2 + 1
for t 1 , t 2 satisfying (A17) and t satisfying (A19).
Proof. 
Notice that, for any given μ BBU > 0 , Equations (A17) and (A19) hold for a unique positive integer c = t 1 t 2 and a unique t . For any given μ BBU , Equations (A17) and (A19) impose
M + μ F t 1 t 2 1 μ F 3 t + 1 2 1 ,
which implies
t 1 t 2 < 3 t + 1 2 .
Equations (A17) and (A19) also impose
μ F 3 t 2 1 M + μ F t 1 t 2 ,
which implies
t 1 t 2 > 3 t 2 .
We now check the following cases:
  • If M + μ F t 1 t 2 1 3 t 1 t 2 μ BBU 3 t 1 t 2 + 1 in the first inner maximization of (A31), then
    M + μ F t 1 t 2 1 3 t 1 t 2 μ F 3 t 2 1 9 t 2
    for any triplet t , t 1 , t 2 Z + satisfying (A34), and also
    M + μ F t 1 t 2 1 3 t 1 t 2 μ BBU 3 t 1 t 2 + 1
                  μ BBU 9 t + 1 2
    for any triplet t , t 1 , t 2 Z + satisfying (A32).
  • If μ BBU 3 t 1 t 2 + 1 M + μ F t 1 t 2 1 3 t 1 t 2 in the first maximization of (A31), then
    μ BBU 3 t 1 t 2 + 1 μ BBU 9 t + 1 2
    for any triplet t , t 1 , t 2 Z + satisfying (A32), and
    μ BBU 3 t 1 t 2 + 1 M + μ F t 1 t 2 1 3 t 1 t 2
              μ F 3 t 2 1 9 t 2
    for any triplet t , t 1 , t 2 Z + satisfying (A34).
 □
This completes the proof for Remark 1.

Appendix B. Proof of Theorem 2

For the sake of simplicity, define Y BBU k as the received signal of BBUP k:
Y BBU k = ϕ j , k n Y B j 3 n : j U k .
We obtain the first two terms of the upper bound by choosing the cut set
S = all   base   stations , j = 1 , , N S c = all   BBUPs , k = 1 , , K
and defining
X S = X j : j S Y S c = Y BBU k : k S c .
In that case, for any fixed BBUP to BS association for any given network, the total rate of all users is upper bounded by:
3 · N · R u I X S ; Y S c = H Y S c H Y S c | X S min K · μ BBU , N · μ F · 1 2 log ( 1 + P )
where second inequality comes from applying (6) and (9) to received signals of BBUPs, which gives the first two terms by Definition 2. The third term comes from the fact that, by [35], the DoF a M × M MIMO system is upper bounded by M.

Appendix C. Proof of Corollary 1

For the first item, the matching occurs when the term with μ F is active in both lower and upper bounds. For the rest, the matching occurs with the term μ BBU and is active in both lower and upper bounds. Due to Remark 1, if μ F 2 M , showing the matching cases between parallelogram lower bound and cut-set upper bound is enough. For μ F 2 M , we show the matching cases between both lower bounds and cut-set bound.
For μ F M , the term with μ F is active in upper and lower bounds if μ F μ BBU · r and μ F μ BBU t 1 t 2 , respectively. Since t 1 t 2 1 r , choosing μ F μ BBU t 1 t 2 implies μ F μ BBU · r . The term with μ BBU is active in upper and lower bound if μ BBU · r μ F and μ BBU t 1 t 2 μ F , respectively, where the matching requires t 1 t 2 = 1 r .
For M μ F 2 M , the term with μ BBU is active in both upper and lower bounds if μ BBU · r μ F and μ BBU M + μ F t 1 t 2 1 , respectively, where the matching requires t 1 t 2 = 1 r .
For 2 M μ F 3 M , the term with μ BBU is active in upper and parallelogram lower bound if μ BBU · r μ F and μ BBU M 2 t 1 + 2 t 2 3 + μ F t 1 t 2 t 1 t 2 1 , respectively, where matching requires t 1 t 2 = 1 r . If 1 r Z + , there is at least one t 1 , t 2 pair that results in t 1 t 2 = 1 r . However, unless μ BBU max t 1 , t 2 M 2 t 1 + 2 t 2 3 + μ F t 1 t 2 t 1 t 2 1 , the term with μ BBU can not be active in lower bound. This imposes choosing the pair t 1 , t 2 that minimizes t 1 + t 2 . The term with μ BBU is active in upper and hexagon lower bound if μ BBU · r μ F and μ BBU M 6 t 6 + μ F 3 t 2 3 t 2 , where matching requires t = 1 3 r .
For 3 M μ F , the matching cases can be found by applying similar procedures as in the 2 M μ F 3 M case.

Appendix D. Proof of Theorem 3

Due to Remark 1, we do the achievability gap analysis only for paralleogram clustering. We do the analysis for one of the cases which leads to the maximum achievability gap. For other cases, a similar procedure can be applied.
  • If μ F M , the maximum gap occurs when μ F 3 and μ BBU 3 t 1 t 2 is active in upper and lower bounds, respectively. Note that this assumption imposes μ F r μ BBU μ F · t 1 · t 2 .
    Δ μ BBU , μ F , r = μ F 3 μ BBU 3 · t 1 · t 2 a μ F 3 μ F · 1 r 3 · t 1 · t 2 b μ F 3 μ F · 1 r 3 · 1 r = μ F 3 1 r 1 r 1 r < μ F 3 · 1 r
    where a is due to max μ BBU = μ F · 1 r and b is due to min t 1 · t 2 = 1 r by (25).
  • If M μ F 2 M , the maximum gap occurs when μ BBU 3 · r and μ BBU 3 · t 1 · t 2 is active in upper and lower bound, respectively. Notice that this assumption imposes μ BBU min μ F · 1 r , M + μ F t 1 t 2 1 .
    Δ μ BBU , μ F , r = μ BBU · r 3 μ BBU 3 · t 1 · t 2 a μ BBU 3 r 1 1 r min μ F · 1 r , M + μ F 1 r 1 3 r 1 1 r b μ F 3 · 1 r r 1 1 r < μ F 3 · 1 r
    where a is due to min t 1 · t 2 = 1 r by (25), and b is due the fact that, if μ F · 1 r M + μ F 1 r 1 , there is equality, if M + μ F 1 r 1 μ F · 1 r , there is strict inequality.

References

  1. Nasri, R.; Jaziri, A. Analytical tractability of hexagonal network model with random user location. IEEE Trans. Wirel. Commun. 2016, 15, 3768–3780. [Google Scholar] [CrossRef] [Green Version]
  2. Tesfay, T.T.; Khalili, R.; Boudec, J.-Y.L.; Richter, F.; Fehske, A. Energy saving and capacity gain of micro sites in regular LTE networks. In Proceedings of the 6th ACM Workshop on Performance Monitoring and Measurement of Heterogeneous Wireless and Wired Networks—PM2HW2N ’11, Miami Beach, FL, USA, 31 October–4 November 2011. [Google Scholar]
  3. Bande, M.; El Gamal, A.; Veeravalli, V.V. Degrees of freedom in wireless interference networks with cooperative transmission and backhaul load constraints. IEEE Trans. Inf. Theory 2019, 65, 5816–5832. [Google Scholar] [CrossRef]
  4. Bande, M.; El Gamal, A.; Veeravalli, V.V. Flexible backhaul design with cooperative transmission in cellular interference networks. In Proceedings of the 2015 IEEE International Symposium on Information Theory (ISIT), Hong Kong, China, 14–19 June 2015; pp. 2431–2435. [Google Scholar]
  5. Veeravalli, V.V.; Gamal, A.E. Interference Management in Wireless Networks: Fundamental Bounds and the Role of Cooperation; Cambridge University Press: Cambridge, UK, 2018. [Google Scholar]
  6. Ntranos, V.; Maddah-Ali, M.A.; Caire, G. Cellular interference alignment. IEEE Trans. Inf. Theory 2015, 61, 1194–1217. [Google Scholar] [CrossRef] [Green Version]
  7. Gesbert, D.; Hanly, S.; Huang, H.; Shamai, S.; Simeone, O.; Yu, W. Multi-cell MIMO cooperative networks: A new look at interference. IEEE J. Sel. Areas Commun. 2010, 28, 1380–1408. [Google Scholar] [CrossRef] [Green Version]
  8. Atsan, E.; Knopp, R.; Diggavi, S.; Fragouli, C. Towards integrating quantize-map-forward relaying into LTE. In Proceedings of the 2012 IEEE Information Theory Workshop (ITW), Lausanne, Switzerland, 3–7 September 2012; pp. 212–216. [Google Scholar]
  9. Chen, J.; Mitra, U.; Gesbert, D. Optimal UAV relay placement for single user capacity maximization over terrain with obstacles. In Proceedings of the IEEE 20th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), Cannes, France, 2–5 July 2019; pp. 1–5. [Google Scholar]
  10. Katz, G.; Zaidel, B.M.; Shitz, S.S. On layered transmission in clustered cooperative cellular architectures. In Proceedings of the 2013 IEEE International Symposium on Information Theory (ISIT), Istanbul, Turkey, 7–12 July 2013; pp. 1162–1166. [Google Scholar]
  11. Simeone, O.; Poor, H.V.; Somekh, O.; Shamai, S. Local base station cooperation via finite-capacity links for the uplink of linear cellular networks. IEEE Trans. Inf. Theory 2009, 55, 190–204. [Google Scholar] [CrossRef]
  12. Hanly, S.V.; Whiting, P. Information-theoretic capacity of multi-receiver networks. Telecommun. Syst. 1993, 1, 1–42. [Google Scholar] [CrossRef]
  13. Wyner, A.D. Shannon-theoretic approach to a gaussian cellular multiple-access channel. IEEE Trans. Inf. Theory 1994, 40, 1713–1727. [Google Scholar] [CrossRef]
  14. Shamai, S.; Zaidel, B.M. Enhancing the cellular downlink capacity via co-processing at the transmitting end. In Proceedings of the IEEE VTS 53rd Vehicular Technology Conference, Spring 2001. Proceedings (Cat. No.01CH37202), Rhodes, Greece, 6–9 May 2001; Volume 3, pp. 1745–1749. [Google Scholar]
  15. Sanderovich, A.; Shamai, S.; Steinberg, Y.; Kramer, G. Communication via decentralized processing. IEEE Trans. Inf. Theory 2008, 54, 3008–3023. [Google Scholar] [CrossRef] [Green Version]
  16. Sanderovich, A.; Somekh, O.; Poor, H.V.; Shamai, S. Uplink macro diversity of limited backhaul cellular network. IEEE Trans. Inf. Theory 2009, 55, 3457–3478. [Google Scholar] [CrossRef] [Green Version]
  17. Simeone, O.; Somekh, O.; Poor, H.V.; Shamai, S. Downlink multicell processing with limited-backhaul capacity. EURASIP J. Adv. Signal Process. 2009, 2009, 1–10. [Google Scholar] [CrossRef] [Green Version]
  18. Cover, T.; El Gamal, A. Capacity theorems for the relay channel. IEEE Trans. Inf. Theory 1978, 25, 572–584. [Google Scholar] [CrossRef] [Green Version]
  19. Costa, M. Writing on dirty paper (Corresp.). IEEE Trans. Inf. Theory 1983, 29, 439–441. [Google Scholar] [CrossRef]
  20. Checko, A.; Christiansen, H.L.; Yan, Y.; Scolari, L.; Kardaras, G.; Berger, M.S.; Dittmann, L. Cloud RAN for Mobile Networks: A Technology Overview. IEEE Commun. Surv. Tutor. 2015, 17, 405–426. [Google Scholar] [CrossRef] [Green Version]
  21. Singhal, M.; Seyfi, T.; El Gamal, A. Joint Uplink-Downlink Cooperative Interference Management with Flexible Cell Associations. arXiv 2018, arXiv:1811.11986. [Google Scholar]
  22. Kang, J.; Simeone, O.; Kang, J.; Shamai, S. Layered Downlink Precoding for C-RAN Systems With Full Dimensional MIMO. IEEE Trans. Veh. Technol. 2017, 66, 2170–2182. [Google Scholar] [CrossRef]
  23. Park, S.; Simeone, O.; Shamai, S. Uplink sum-rate analysis of C-RAN with interconnected radio units. In Proceedings of the IEEE Information Theory Workshop (ITW), Kaohsiung, Taiwan, 6–10 November 2017; pp. 171–175. [Google Scholar]
  24. Kim, J.; Park, S.-H. Layered Inter-Cluster Cooperation Scheme for Backhaul-Constrained C-RAN Uplink Systems in the Presence of Inter-Cluster Interference. Entropy 2020, 22, 554. [Google Scholar] [CrossRef]
  25. Douik, A.; Dahrouj, H.; Al-Naffouri, T.Y.; Alouini, M. Distributed hybrid scheduling in multi-cloud networks using conflict graphs. IEEE Trans. Commun. 2018, 66, 209–224. [Google Scholar] [CrossRef] [Green Version]
  26. Awais, M.; Ahmed, A.; Ali, S.A.; Naeem, M.; Ejaz, W.; Anpalagan, A. Resource management in multicloud iot radio access network. IEEE Internet Things J. 2019, 6, 3014–3023. [Google Scholar] [CrossRef]
  27. Park, S.; Simeone, O.; Sahin, O.; Shamai, S. Inter-cluster design of precoding and fronthaul compression for cloud radio access networks. IEEE Wirel. Commun. Lett. 2014, 3, 369–372. [Google Scholar] [CrossRef]
  28. Park, S.; Song, C.; Lee, K. Inter-cluster design of wireless fronthaul and access links for the downlink of c-ran. IEEE Wirel. Commun. Lett. 2017, 6, 270–273. [Google Scholar] [CrossRef]
  29. Dhif-Allah, O.; Dahrouj, H.; Al-Naffouri, T.Y.; Alouini, M. Distributed robust power minimization for the downlink of multi-cloud radio access networks. IEEE Trans. Green Commun. Netw. 2018, 2, 327–335. [Google Scholar] [CrossRef]
  30. Ferdouse, L.; Anpalagan, A.; Erkucuk, S. Joint Communication and Computing Resource Allocation in 5G Cloud Radio Access Networks. IEEE Trans. Veh. Technol. 2019, 68, 9122–9135. [Google Scholar] [CrossRef]
  31. Wigger, M.; Timo, R.; Shamai, S. Conferencing in Wyner’s asymmetric interference network: Effect of number of rounds. In Proceedings of the IEEE Information Theory Workshop (ITW), Jerusalem, Israel, 26 April–1 May 2015; pp. 1–5. [Google Scholar]
  32. Sesia, S.; Toufik, I.; Baker, M. LTE-The UMTS Long Term Evolution: From Theory to Practice; Wiley: New York, NY, USA, 2009. [Google Scholar]
  33. El Gamal, A.; Kim, Y. Network Information Theory; Cambridge University Press: Cambridge, UK. [CrossRef] [Green Version]
  34. Jeon, S.; Suh, C. Degrees of Freedom of Uplink–Downlink Multiantenna Cellular Networks. IEEE Trans. Inf. Theory 2016, 62, 4589–4603. [Google Scholar] [CrossRef]
  35. Telatar, I.E. Capacity of multi-antenna gaussian channels. Eur. Trans. Telecommun. 1999, 10, 585–595. [Google Scholar] [CrossRef]
  36. Gelincik, S.; Wigger, M.; Wang, L. DoF in Sectored Cellular Systems with BS Cooperation Under a Complexity Constraint. In Proceedings of the IEEE 15th International Symposium on Wireless Communication Systems (ISWCS), Lisbon, Portugal, 28–31 August 2018; pp. 1–5. [Google Scholar]
Figure 1. Multi-cloud based sectored cellular network.
Figure 1. Multi-cloud based sectored cellular network.
Entropy 22 00668 g001
Figure 2. Parallelogram clustering for t 1 , t 2 = 2 , 2 .
Figure 2. Parallelogram clustering for t 1 , t 2 = 2 , 2 .
Entropy 22 00668 g002
Figure 3. Illustration of h-clusters for t = 3 . Pink, red, and blue cells represent center, corner, and null cells, respectively. Green-filled circles refer to deactivated users. All users and their sectors inside a blue dashed hexagon are associated with the same BBUP.
Figure 3. Illustration of h-clusters for t = 3 . Pink, red, and blue cells represent center, corner, and null cells, respectively. Green-filled circles refer to deactivated users. All users and their sectors inside a blue dashed hexagon are associated with the same BBUP.
Entropy 22 00668 g003
Figure 4. The impact of r p : (a) For various values of μ F . (b) For various values of μ BBU .
Figure 4. The impact of r p : (a) For various values of μ F . (b) For various values of μ BBU .
Entropy 22 00668 g004
Figure 5. The impact of μ F at μ BBU = 428 .
Figure 5. The impact of μ F at μ BBU = 428 .
Entropy 22 00668 g005
Figure 6. The impact of μ BBU at μ F = 12 .
Figure 6. The impact of μ BBU at μ F = 12 .
Entropy 22 00668 g006
Figure 7. I p -clustering for t 1 , t 2 = 4 , 3 . The red lines denote a paralleogram-like shape of the clusters. The interference pattern highlighted with solid black lines depict the users in in the same I p -clusters. The interference pattern highlighted with dashed lines between circles denote the borders between I p -clusters.
Figure 7. I p -clustering for t 1 , t 2 = 4 , 3 . The red lines denote a paralleogram-like shape of the clusters. The interference pattern highlighted with solid black lines depict the users in in the same I p -clusters. The interference pattern highlighted with dashed lines between circles denote the borders between I p -clusters.
Entropy 22 00668 g007
Figure 8. I h -clustering for t = 2 . The interference pattern highlighted with solid black lines depict the users in in the same I h -clusters. The interference pattern highlighted with dashed lines between circles denote the borders between I h -clusters.
Figure 8. I h -clustering for t = 2 . The interference pattern highlighted with solid black lines depict the users in in the same I h -clusters. The interference pattern highlighted with dashed lines between circles denote the borders between I h -clusters.
Entropy 22 00668 g008
Figure 9. Comparison of the achieved rates for different channel attenuation parameters α and processing capacities μ BBU when r = 1 10 and μ F = 15 .
Figure 9. Comparison of the achieved rates for different channel attenuation parameters α and processing capacities μ BBU when r = 1 10 and μ F = 15 .
Entropy 22 00668 g009

Share and Cite

MDPI and ACS Style

Gelincik, S.; Rekaya-Ben Othman, G. Degrees-Of-Freedom in Multi-Cloud Based Sectored Cellular Networks. Entropy 2020, 22, 668. https://0-doi-org.brum.beds.ac.uk/10.3390/e22060668

AMA Style

Gelincik S, Rekaya-Ben Othman G. Degrees-Of-Freedom in Multi-Cloud Based Sectored Cellular Networks. Entropy. 2020; 22(6):668. https://0-doi-org.brum.beds.ac.uk/10.3390/e22060668

Chicago/Turabian Style

Gelincik, Samet, and Ghaya Rekaya-Ben Othman. 2020. "Degrees-Of-Freedom in Multi-Cloud Based Sectored Cellular Networks" Entropy 22, no. 6: 668. https://0-doi-org.brum.beds.ac.uk/10.3390/e22060668

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop