+ All Categories
Home > Documents > 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management...

4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management...

Date post: 11-Jul-2020
Category:
Upload: others
View: 0 times
Download: 0 times
Share this document with a friend
15
4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. 10, OCTOBER 2017 OFDM-Based Interference Alignment in Single-Antenna Cellular Wireless Networks Huacheng Zeng, Member, IEEE, Yi Shi, Senior Member, IEEE, Y. Thomas Hou, Fellow, IEEE , Wenjing Lou, Fellow, IEEE , Xu Yuan, Member, IEEE, Rongbo Zhu, Member, IEEE, and Jiannong Cao, Fellow, IEEE Abstract— Interference alignment (IA) is widely regarded as a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks, most results of IA are limited to information-theoretic explo- ration or physical-layer signal design. Little progress has been made so far to advance IA in cellular networks from a networking perspective. In this paper, we aim to fill this gap by studying IA in large-scale cellular networks. For the uplink, we propose an OFDM-based IA scheme and prove its feasibility at the physical layer by showing that all data streams in the IA scheme can be transported free of interference. Based on the IA scheme, we develop a cross-layer IA optimization framework that can fully translate the benefits of IA to throughput gain in cellular networks. Furthermore, we show that the IA optimization prob- lem in the downlink can be solved in the exactly same way as that in the uplink. Simulation results show that our OFDM-based IA scheme can significantly increase the user throughput and the throughput gain increases with user density in the network. Index Terms— Interference alignment, cellular networks, cross- layer optimization, throughput maximization. I. I NTRODUCTION I NTERFERENCE alignment (IA) is a promising inter- ference management technique in wireless networks as it may yield much higher throughput than we thought before. The basic idea of IA is to jointly construct sig- nals at the transmitters with the aim of squeezing inter- fering signals into a reduced-dimensional subspace at each receiver, thereby leaving larger subspace for the reception Manuscript received January 30, 2017; revised April 23, 2017 and June 6, 2017; accepted June 6, 2017. Date of publication June 12, 2017; date of current version October 16, 2017. This work was supported in part by NSF under Grants 1642873, 1617634, 1446478, 1443889, 1343222, and ONR Grant N00014-15-1-2926. H. Zeng’s work was partially sup- ported by EVPRI internal research grant from the University of Louisville. R. Zhu’s work was supported by National Science Foundation of China (Grant No. 61272497), Fundamental Research Funds for the Central Universi- ties (Grant No. CZP17043), and Youth Elite Project of State Ethnic Affairs Commission of China. J. Cao’s work was supported by a grant from the Innovation and Technology Commission of the HKSAR Government to the Hong Kong Branch of National Rail Transit Electrification and Automation Engineering Technology Research Center (Project Code: K-BBY1). The associate editor coordinating the review of this paper and approving it for publication was D. Niyato. (Corresponding author: Huacheng Zeng.) H. Zeng is with the University of Louisville, Louisville, KY 40292 USA (e-mail: [email protected]). Y. Shi, Y. T. Hou, and W. Lou are with Virginia Polytechnic Institute and State University, Blacksburg, VA 24061 USA. X. Yuan is with the University of Louisiana at Lafayette, LA, 70503 USA. R. Zhu is with South-Central University for Nationalities, Wuhan 430073, China. J. Cao is with the Hong Kong Polytechnic University, Hong Kong. Color versions of one or more of the figures in this paper are available online at http://ieeexplore.ieee.org. Digital Object Identifier 10.1109/TCOMM.2017.2714677 of desired signals. It was shown by Cadambe and Jafar in [1] that IA makes it possible for the K -user interference channel to achieve K /2 degrees of freedom (DoFs), indi- cating that the aggregate DoFs of the interference chan- nel increase linearly with the number of users. Given its huge potential, IA has gained tremendous momentum in the research community and been applied to a variety of networks (see, e.g., [2]–[5]). Along with its success in theory, IA in cellular net- works (and WLAN) has attracted significant attention due to its industrial potentials. Research efforts have produced a flourish line of results that deepen our understanding of IA in cellular networks. For example, Suh et al. [6], [7] showed that the use of IA can completely eliminate inter-cell interference if the number of users in each cell is sufficiently large. Morales- Cespedes et al. in [8] developed an IA scheme using reconfig- urable antennas to remove interference for partially connected cellular networks. Results of IA in cellular networks also include spatial IA design (see, e.g., [9]–[11]), blind IA design (see, e.g., [12], [13]), and channel state information (CSI) analysis (see, e.g., [14], [15]). Although there is a large body of work on IA in cellular networks, most of them are limited to information-theoretic exploration or physical-layer signal design. It remains open how to develop an IA scheme that can be incorporated with upper-layer user scheduling algorithm to maximize network- level throughput. This stagnation underscores the technical challenges in the exploration of cross-layer IA design from a networking perspective, which we describe as follows. First, developing an IA scheme for a generic cellular network with an arbitrary number of base stations (BS) and users is not a trivial problem, as it requires complex signal design at transmitters and onerous signal detection at receivers. Second, in a large-scale network environment, IA design is coupled with upper-layer user scheduling. An isolated design of IA at the physical layer is prone to yield an inferior performance, and thus cannot fully harvest the benefits of IA for throughput maximization. Therefore, a cross-layer IA scheme is needed. However, developing a cross-layer IA scheme together with user scheduling can easily become intractable and is a chal- lenging task. In this paper, we study OFDM-based IA in large-scale cellular networks from a networking perspective. We consider a network that consists of a set of grid-deployed BSs and a set of randomly distributed users. Each BS has a fixed service area and provides service to the users within its service area. A user may fall into the service areas of multiple BSs and 0090-6778 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
Transcript
Page 1: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. 10, OCTOBER 2017

OFDM-Based Interference Alignment inSingle-Antenna Cellular Wireless NetworksHuacheng Zeng, Member, IEEE, Yi Shi, Senior Member, IEEE, Y. Thomas Hou, Fellow, IEEE,

Wenjing Lou, Fellow, IEEE, Xu Yuan, Member, IEEE, Rongbo Zhu, Member, IEEE,and Jiannong Cao, Fellow, IEEE

Abstract— Interference alignment (IA) is widely regarded asa promising interference management technique in wirelessnetworks. Despite its rapid advances in cellular networks,most results of IA are limited to information-theoretic explo-ration or physical-layer signal design. Little progress has beenmade so far to advance IA in cellular networks from a networkingperspective. In this paper, we aim to fill this gap by studyingIA in large-scale cellular networks. For the uplink, we propose anOFDM-based IA scheme and prove its feasibility at the physicallayer by showing that all data streams in the IA scheme canbe transported free of interference. Based on the IA scheme,we develop a cross-layer IA optimization framework that canfully translate the benefits of IA to throughput gain in cellularnetworks. Furthermore, we show that the IA optimization prob-lem in the downlink can be solved in the exactly same way asthat in the uplink. Simulation results show that our OFDM-basedIA scheme can significantly increase the user throughput and thethroughput gain increases with user density in the network.

Index Terms— Interference alignment, cellular networks, cross-layer optimization, throughput maximization.

I. INTRODUCTION

INTERFERENCE alignment (IA) is a promising inter-ference management technique in wireless networks as

it may yield much higher throughput than we thoughtbefore. The basic idea of IA is to jointly construct sig-nals at the transmitters with the aim of squeezing inter-fering signals into a reduced-dimensional subspace at eachreceiver, thereby leaving larger subspace for the reception

Manuscript received January 30, 2017; revised April 23, 2017 andJune 6, 2017; accepted June 6, 2017. Date of publication June 12, 2017;date of current version October 16, 2017. This work was supported inpart by NSF under Grants 1642873, 1617634, 1446478, 1443889, 1343222,and ONR Grant N00014-15-1-2926. H. Zeng’s work was partially sup-ported by EVPRI internal research grant from the University of Louisville.R. Zhu’s work was supported by National Science Foundation of China (GrantNo. 61272497), Fundamental Research Funds for the Central Universi-ties (Grant No. CZP17043), and Youth Elite Project of State Ethnic AffairsCommission of China. J. Cao’s work was supported by a grant from theInnovation and Technology Commission of the HKSAR Government to theHong Kong Branch of National Rail Transit Electrification and AutomationEngineering Technology Research Center (Project Code: K-BBY1). Theassociate editor coordinating the review of this paper and approving it forpublication was D. Niyato. (Corresponding author: Huacheng Zeng.)

H. Zeng is with the University of Louisville, Louisville, KY 40292 USA(e-mail: [email protected]).

Y. Shi, Y. T. Hou, and W. Lou are with Virginia Polytechnic Institute andState University, Blacksburg, VA 24061 USA.

X. Yuan is with the University of Louisiana at Lafayette, LA, 70503 USA.R. Zhu is with South-Central University for Nationalities, Wuhan 430073,

China.J. Cao is with the Hong Kong Polytechnic University, Hong Kong.Color versions of one or more of the figures in this paper are available

online at http://ieeexplore.ieee.org.Digital Object Identifier 10.1109/TCOMM.2017.2714677

of desired signals. It was shown by Cadambe and Jafar in[1] that IA makes it possible for the K -user interferencechannel to achieve K/2 degrees of freedom (DoFs), indi-cating that the aggregate DoFs of the interference chan-nel increase linearly with the number of users. Given itshuge potential, IA has gained tremendous momentum in theresearch community and been applied to a variety of networks(see, e.g., [2]–[5]).

Along with its success in theory, IA in cellular net-works (and WLAN) has attracted significant attention dueto its industrial potentials. Research efforts have produced aflourish line of results that deepen our understanding of IA incellular networks. For example, Suh et al. [6], [7] showed thatthe use of IA can completely eliminate inter-cell interference ifthe number of users in each cell is sufficiently large. Morales-Cespedes et al. in [8] developed an IA scheme using reconfig-urable antennas to remove interference for partially connectedcellular networks. Results of IA in cellular networks alsoinclude spatial IA design (see, e.g., [9]–[11]), blind IA design(see, e.g., [12], [13]), and channel state information (CSI)analysis (see, e.g., [14], [15]).

Although there is a large body of work on IA in cellularnetworks, most of them are limited to information-theoreticexploration or physical-layer signal design. It remains openhow to develop an IA scheme that can be incorporated withupper-layer user scheduling algorithm to maximize network-level throughput. This stagnation underscores the technicalchallenges in the exploration of cross-layer IA design froma networking perspective, which we describe as follows. First,developing an IA scheme for a generic cellular network withan arbitrary number of base stations (BS) and users is nota trivial problem, as it requires complex signal design attransmitters and onerous signal detection at receivers. Second,in a large-scale network environment, IA design is coupledwith upper-layer user scheduling. An isolated design of IA atthe physical layer is prone to yield an inferior performance,and thus cannot fully harvest the benefits of IA for throughputmaximization. Therefore, a cross-layer IA scheme is needed.However, developing a cross-layer IA scheme together withuser scheduling can easily become intractable and is a chal-lenging task.

In this paper, we study OFDM-based IA in large-scalecellular networks from a networking perspective. We considera network that consists of a set of grid-deployed BSs and aset of randomly distributed users. Each BS has a fixed servicearea and provides service to the users within its service area.A user may fall into the service areas of multiple BSs and

0090-6778 © 2017 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

Page 2: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

ZENG et al.: OFDM-BASED IA IN SINGLE-ANTENNA CELLULAR WIRELESS NETWORKS 4493

will choose one of them as its service provider. We assumethe transmission is based on OFDM modulation and the set ofavailable subcarriers in OFDM is given. For such a network,similar to the IA scheme in [6] and [7], we study IA in thefrequency domain by projecting the weighted transmit signalsonto OFDM subcarriers. Doing so allows us to develop an IAscheme that can be easily applied to a network with heteroge-neous antenna configurations. Given that uplink and downlinkare independent in both TDD and FDD networks, we considerthem separately. Our objective is to develop an OFDM-basedIA scheme that can be jointly optimized with user schedulingto maximize the uplink/downlink user throughput in cellularnetworks. The contributions of this paper are summarized asfollows:

• For the uplink, we develop an OFDM-based IA schemefor the data transmissions from users to their serving BSs.Specifically, at each user, we propose an approach todetermine which subset of its interfering streams shouldbe selected for alignment; at each BS, we propose aprocedure to align interfering streams so that the desireddata streams can be decoded free of interference. For theproposed IA scheme, we develop a set of IA constraintsfor each user and BS, and show that if the IA constraintsare satisfied, the IA scheme is always feasible at thephysical layer.

• Based on the OFDM-based IA scheme, we developa cross-layer IA optimization framework to maximizethe user throughput for the uplink of cellular networks.To reduce the complexity of the optimization framework,we eliminate its nonlinear constraints through reformula-tion without compromising its optimality. The resultingoptimization framework is in a form that can be easilyhandled by commercial off-the-shelf (COTS) optimiza-tion solvers.

• We show the uplink-downlink duality of the IA scheme.Specifically, we show that the uplink IA scheme can beapplied to the downlink by simply switching the rolesof user and BS. Further, the downlink IA optimizationproblem has the same formulation as the uplink andtherefore can be solved in the exactly same way.

• We evaluate the throughput performance of ourIA scheme via simulation. We compare it against twoother schemes: “no-IA” scheme and “crude-IA” scheme.Simulation results show that our IA scheme has a signif-icant throughput gain over no-IA and crude-IA schemes.Further, the gain of our IA scheme increases with userdensity of the network.

The remainder of this paper is organized as follows.Section II presents related work. Section III offers aprimer of our OFDM-based IA scheme. In Section IV,we develop an OFDM-based IA scheme and prove its feasibil-ity. In Section V, we develop an IA optimization frameworkto maximize network throughput. In Section VI, we establishthe uplink-downlink duality of our IA scheme. Section VIIpresents numerical results to show the efficacy of the IAscheme and Section VIII concludes this paper.

II. RELATED WORK

The idea of IA firstly appeared in [16] and the terminologyof IA was created by Jafar and Shamai in a seminar paper forthe two-user X channel [17]. Since its emergence, the idea hasgained tremendous momentum in both industry and academia(see, e.g., [1], [5], [18]–[24]). Since there is an overwhelminglarge amount of work on IA, we cannot survey all theIA papers and therefore focus our literature survey on IA incellular networks.

In [6] and [7], Suh et al. proposed a frequency-domainIA scheme, called subspace interference alignment, for bothuplink and downlink of cellular networks. They further showedthat their IA scheme can achieve K/(

G−1√

K + 1)G−1 DoFsfor each cell, where G is the number of cells and K isthe number of users in a cell. If the number of users percell is large enough, each cell can achieve one DoF. Thisresult is significant, as it indicates that interference maynot be the dominant factor in cellular networks. Despite itssignificance, the IA scheme in [6] and [7] cannot be used inpractical networks due to its underlying assumptions, including(i) only one data stream per user, (ii) identical user numberfor each BS, (iii) restricted relationship between subcarrier anduser numbers, and (iv) a single interference collision domain.In contrast, the OFDM-based IA scheme in this paper doesnot rely on these assumptions, thereby making a concrete steptowards its practical applications in cellular networks.

In addition to its advances in the frequency domain, IA wasalso studied in the spatial domain (using multiple antennas)for cellular networks [9]–[11], [15], [25]–[27]. In [9], Zhuanget al. investigated the feasibility of IA in MIMO cellularnetworks and proposed a max-SINR algorithm to design IAsolutions. In [10], Shin et al. proposed an IA scheme todesign transmit and receive beamforming vectors for a two-cell MIMO network and showed that their IA algorithm canachieve the optimal DoF. In [11], Ntranos et al. studied spatial-domain IA in cellular MIMO networks. They showed that theirIA scheme can achieve 1/2 DoFs per antenna in the uplink ofa three-sector cellular network with one active user per sectorwhen both the user and the sector have M antennas.

Another research line of IA in cellular networks is focusedon addressing its CSI problem. In [8], Morales-Cespedeset al. studied blind IA for partially-connected cellular networksand developed a blind IA scheme based on reconfigurableantenna to remove intra-cell and inter-cell interference. In [13],Wang et al. developed a blind IA scheme for the downlinkof cellular clustered networks with reconfigurable antennas.In [12], Jose et al. studies the combination of IA and oppor-tunistic scheduling to facilitate alignment in the cellular down-link while not requiring CSI at transmitters. Rao and Lau [14]first quantified CSI feedback for IA in MIMO cellular net-works, and then derived closed-form tradeoff between theCSI feedback and IA performance. Tresch and Guillaud [15]studied the sum mutual information achieved by IA in cellularnetworks and derived its upper and lower performance boundsin the scenarios with imperfect channel knowledge.

While there is a large amount of IA results in cellularnetworks, most of them were focused on information-theoretic

Page 3: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

4494 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. 10, OCTOBER 2017

Fig. 1. Schematic diagram of IA at user i .

exploration or physical-layer signal design. Little progresshas been made to advance our understanding of IA from anetworking perspective. This paper fills this gap by devel-oping an IA scheme which can be jointly optimized withupper-layer user scheduling to maximize the throughput ofcellular networks.

III. OFDM-BASED IA IN CELLULAR

NETWORKS: A PRIMER

IA is a promising interference management technique inwireless networks. Its basic idea is to jointly design signals attransmitters using linear precoding techniques, with the aimof projecting interfering signals into a reduced-dimensionalsubspace and keeping the desired signals resolvable at eachreceiver. Generally speaking, IA can be done in three domains:spatial (MIMO), spectral (OFDM), and temporal (time slots).In this paper, we consider OFDM-based IA in the frequencydomain in cellular networks. We assume that the transmissionis using OFDM modulation and the set of subcarriers availablefor IA is given. At each transmitter, as shown in Fig. 1,IA is achieved by projecting its outgoing data streams ontothe subcarriers using linear precoding technique. As such,the core of IA is a construction of precoding vectors for theoutgoing data streams at the transmitters. Suppose that thereare K (e.g., 64) subcarriers available in the network. Then theprecoding vector for each data stream is a K × 1 complexvector. At each transmitter, we aim to design a precodingvector for each of its data streams so that its transmitted signalsoverlap as much as possible at its unintended receiver(s) whileremaining resolvable at its intended receiver(s). Table I liststhe notation that we use in the paper.

A. An ExampleConsider a small network with 2 BSs and 4 users as shown

in Fig. 2, where a solid arrow line represents a directed linkand a dashed arrow line represents a directed interference.For both BSs and users, each of them has a single antenna.We assume that CSI is available at both BSs and users.To show the benefits of IA, let’s start with a simple exampleby assuming 3 subcarriers available for data transmission (i.e.,K = 3). Note that we take K = 3 only for ease of illustrationand we will consider a larger value of K later. With K = 3,we show that by using IA, a total of 4 data streams can betransmitted from the users to their respective BSs, with 1 datastream from each user.

To show this, we first introduce the notation. For vectorsa and b, denote a := b if there exists a nonzero complexnumber c such that a = cb, i.e., a and b are in the samedirection. Denote {u1

b · · · uKb } as a set of linearly independent

basis vectors with dimension K × 1 and nonzero entries. Theindependence requirement ensures that the data streams from

TABLE I

NOTATION

the same user remain resolvable at the BS; and the nonzerorequirement ensures that all subcarriers are fully used. DenoteH j i as the frequency-domain channel matrix between user ito BS j . Due to the orthogonality of the subcarriers, H j i is adiagonal square matrix. Denote uk

i as the precoding vector forthe kth outgoing stream at user i . We construct the precodingvectors at user 1 and user 2 as follows: let u1

1 := u1b and let

u12 := H−1

22 H21u11. As a result, at BS 2, the interfering stream

from user 1 is aligned to the interfering stream from user 2,as shown in Fig. 2(a). Likewise, we construct the precodingvectors at user 3 and user 4 as follows: let u1

3 := u2b and

let u14 := H−1

24 H23u13. Then at BS 1, the interfering stream

from user 3 is aligned to the interfering stream from user 4,as shown in Fig. 2(a). By using the above precoding vectors atthe 4 users, the received data and interfering streams at each

Page 4: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

ZENG et al.: OFDM-BASED IA IN SINGLE-ANTENNA CELLULAR WIRELESS NETWORKS 4495

Fig. 2. An example of IA in the frequency domain.

BS are on 3 different directions. Therefore, 3 subcarriers aresufficient to support 4 data streams. However, if IA is not used,3 subcarriers can support only 3 data streams from the fourusers (with any combinations), since putting more than onedata stream on a subcarrier will inevitably cause interferenceon that subcarrier.

When the network has 6 subcarriers (i.e., K = 6), we showthat by using IA, 8 data streams can be transmitted from theusers to their BSs, with 2 data streams at each user. We con-struct the precoding vectors at user 1 and user 2 as follows: let[u1

1 u21] := [u1

b u2b] and let [u1

2 u22] := H−1

22 H21[u11 u2

1]. As aresult, at BS 2, the two interfering streams from user 1 arealigned to the two interfering streams from user 2, as shownin Fig. 2(b). Likewise, we construct the precoding vectorsat user 3 and user 4 as follows: let [u1

3 u23] := [u3

b u4b]

and let [u14 u2

4] := H−124 H23[u1

3 u23]. As a result, at BS 1,

the two interfering streams from users 3 are aligned to the twointerfering streams from user 4, as shown in Fig. 2(b). By usingthose precoding vectors at the 4 users, the received data andinterfering streams at each BS are on 6 directions. Therefore,6 subcarriers are sufficient to support 8 data streams. However,if IA is not used, 6 subcarriers can support only 6 datastreams from the four users (with any combinations), sinceputting more than one data stream on a subcarrier will leadto interference. Following the same token, when the networkhas 256 subcarriers, it can transport 340 data streams usingIA, in contrast of 256 data streams in the case without IA.

It is easy to see that the gain of IA for this network is 1/3.It is worth pointing out that the gain of IA becomes more

Fig. 3. The uplink transmission in a cellular network.

significant as the number of users increases. In the two-BScellular network where each BS has n users, the interferencesat each BS can be aligned to the same direction. The spectrumefficiency at each BS is n/(n + 1) and the total spectrumefficiency at the two BSs is 2n/(n + 1). Since the networkwithout IA is 1, the gain of IA is (n − 1)/(n + 1).

IV. AN OFDM-BASED IA SCHEME AND ITS FEASIBILITY

In this section, we develop an OFDM-based IA scheme forthe uplink communication in a single-antenna cellular wirelessnetwork. The IA scheme includes IA constraints at each userand BS, as well as how to construct the precoding/decodingvectors for each stream. In what follows, we first present theOFDM-based IA scheme and then prove its feasibility at thephysical layer.

A. An OFDM-Based IA Scheme

Consider a cellular network shown in Fig. 3, where eachnode (BS or user) has a single antenna. Denote N as the setof users in the network with N = |N |. Denote M as the set ofBSs in the network M = |M |. Denote T usr

j as the set of userswho choose BS j as their service provider. Denote Iusr

j as theset of users that interfere with BS j , i.e., BS j is within theinterference range of these users and BS j is not the serviceprovider of these users. Denote Ibs

i as the set of BSs thatare interfered with by user i , i.e., these BSs are within theinterference range of user i but are not chosen by user i asits service provider. In our study, we use Rayleight fadingas the channel fast fading model. For the channel realiza-tions, we assume that the CSI is available at both BSs andusers.

Consider user i that interferes with BS j , i.e., j ∈ Ibsi .

Denote Si = {ski : 1 ≤ k ≤ σi } as the set of streams from

user i , where ski is the kth stream and σi is the number of

streams at user i (i.e., σi = |Si |). Then each stream in Si isan interfering stream for BS j . At BS j , we wish to alignas many interfering streams as possible to some predefinedinterference directions.

Among the interfering streams in Si , denote Ai j as the subsetof interfering streams that can be aligned to some predefinedinterference directions at BS j . Denote αi j as the cardinality ofAi j , i.e., αi j = |Ai j |. Then, at BS j , the number of directionsoccupied by the interfering streams is reduced from σi toσi −αi j , resulting in a saving of αi j directions at BS j . Amongthe streams in Si , there may be a subset Bi of streams that are

Page 5: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

4496 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. 10, OCTOBER 2017

Fig. 4. An example of illustrating IA constraints at user i and BS j ∈ Ibsi .

not aligned to any predefined interference direction at the BSsin Ibs

i . Denote βi as the cardinality of Bi , i.e., βi = |Bi |. Thuswe have

Bi = Si\ (∪ j∈Ibsi

Ai j ).

1) Constraints at User: Consider one of the σi outgoingdata streams at user i as shown in Fig. 4(a). This outgoingdata stream interferes with all the BSs in Ibs

i (BS 1, 2, and3 in the figure). We wish to align its produced interference at asmany BSs as possible. Now the question is that the interferenceproduced by this data stream can be aligned at how manyBSs in Ibs

i . As we showed in the example in Section III,the construction of this data stream’s precoding vector canguarantee its produced interference to be aligned at one BS.Note that in some extreme circumstances (e.g., when all thechannels are exactly the same), the construction of this datastream’s precoding vector can align its produced interferenceat multiple BSs. But in a general case, the construction of thisdata stream’s precoding vector can guarantee the alignment ofits interference at only one BS.

We now consider all the σi outgoing data streams atuser i . Since each of them guarantees that one of its pro-duced interfering streams can be successfully aligned at thecorresponding BS. The construction of the σi outgoing datastreams’ precoding vectors guarantees that σi of their pro-duced interfering streams can be successfully aligned at thecorresponding BSs. To ensure the feasibility of IA, we imposeconstraint

∑j∈Ibs

iαi j ≤ σi . Recall that βi is a non-negative

integer optimization variable. The constraint can be equiva-lently translated to

βi +∑

j∈Ibsi

αi j = σi , for i ∈ N . (1)

2) Constraints at BS: At BS j (see Fig. 4(b) for example),we need to align the interfering streams in Ai j (for eachi ∈ Iusr

j ) to some predefined interference directions. To doso, we have the following two questions: (i) what should bethe set of predefined interference directions at BS j ; (ii) howto align the interfering streams in Ai j to the set of predefinedinterference directions.

There may be many possible solutions to the above twoquestions. Here, we show one solution for which we can offera feasibility proof (see Section IV-B). In our solution, forthe first question, we use ∪i∈Iusr

jBi as the set of predefined

interference directions at BS j . That is, each interfering streamin Ai j will be aligned to an interfering stream in ∪i∈Iusr

jBi .

For the second question, we align each interfering stream inAi j , i ∈ Iusr

j , to a unique interference stream in ∪k �=ik∈Iusr

jBk .

That is, each interfering stream in Ai j is aligned uniquely inthe interference subspace formed by the union of Bk overk ∈ Iusr

j except its own Bi . Here, “uniquely” means thatany two interfering streams in Ai j will not be aligned to thesame interfering stream in ∪k �=i

k∈Iusrj

Bk . Based on our proposed

solution to questions (i) and (ii), we have the followingconstraints at BS j :

αi j ≤k �=i∑

k∈Iusrj

βk, for i ∈ Iusrj , j ∈ M . (2)

3) Dimension Constraints: At BS j , the total number ofits desired data streams is

∑i∈T usr

jσi , while the number of its

unaligned interfering streams is∑

i∈Iusrj

(σi − αi j ). Since thenumber of directions for desired data streams and unalignedinterfering streams cannot exceed the number of availablesubcarriers, we have the following constraints at BS j :

i∈T usrj

σi +∑

i∈Iusrj

(σi − αi j ) ≤ K , for j ∈ M . (3)

So far we have derived three constraints for IA to character-ize its capability (i.e., the number of data streams that can besent by each user to its serving BS) without rigorous argument.In the next subsection, we show that as long as these threeconstraints are satisfied, there always exist precoding/decodingvectors so that σi data streams can be sent from user i to itsserving BS free of interference, i ∈ N .

B. Feasibility of the IA Scheme

Consider an IA scheme π with DoF vector(σ1, σ2, · · · , σN ). For each stream sk

i in π , denote uki

as its precoding vector at user i and vlj as its decoding vector

at its intended BS j . We say IA scheme π is feasible if thereexist precoding and decoding vectors so that user i can sendσi data streams to its intended BS j free of interference,i ∈ N . Then we have the following definition.

Definition 1: An IA scheme π is feasible at the physicallayer if there exist precoding and decoding vectors that meet

(vlj )

T H j iuki = 1; (4)

(vlj )

T H j i ′uk′i ′ = 0, i ′ ∈ T usr

j ∪ Iusrj ,

1 ≤ k ′ ≤ σi ′ , (i′, k ′) �= (i, k); (5)

Page 6: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

ZENG et al.: OFDM-BASED IA IN SINGLE-ANTENNA CELLULAR WIRELESS NETWORKS 4497

for i ∈ N and 1 ≤ k ≤ σi .Note that H j i , the frequency-domain channel matrix

between user i and BS j , is a diagonal complex matrix withthe kth diagonal entry being channel coefficient of the kthsubcarrier. The following theorem is the main result of therest of this subsection.

Theorem 1: For uplink IA scheme π , if its DoF vector(σ1, σ2, · · · , σN ) satisfies (1), (2), and (3), then it is feasibleat the physical layer.

Theorem 1 provides a sufficient condition to verify thefeasibility of an IA scheme. Instead of constructing precodingand decoding vectors satisfying (4) and (5) in Definition 1,Theorem 1 allows to verify the feasibility of an IA schemethrough simple calculation in (1), (2), and (3). The rest ofsection will be devoted to proving Theorem 1. Here is our roadmap. First, we construct precoding vectors for the data streamsat each user. Second, we give two lemmas to characterize thedimensions of such precoding vectors. Finally, based on thosetwo lemmas, we show that there always exists a decodingvector for each stream so that (4) and (5) in Definition 1 aresatisfied.

1) Construction of Precoding Vectors: Denote ESi = {uki :

1 ≤ k ≤ σi } as the set of precoding vectors for the streamsin Si at user i . Among the precoding vectors in ESi , denoteE Ai j as the subset of precoding vectors that correspond tothe interfering streams in Ai j ; denote E Bi as the subset ofprecoding vectors that correspond to the interfering streams inBi . Since we define a unique precoding vector for each stream,we have

|E Ai j | = αi j , for j ∈ M , i ∈ Iusrj ;

|E Bi | = βi , for i ∈ N ;E Bi = ESi \ (∪ j∈Ibs

iE Ai j ), for i ∈ N ;

E Ai j1 ∩ E Ai j2 = ∅, for i ∈ N , j1, j2 ∈ Ibsi , j1 �= j2.

We define E A = ∪i∈N , j∈Ibsi

E Ai j and E B = ∪i∈N E Bi . Then

we have ∪i∈N ESi = E A ∪E B . We first construct the precodingvectors in E B and then construct the precoding vectors in E A.

Denote {ukb : 1 ≤ k ≤ K } as a set of linear independent

complex vectors with dimension K × 1 and nonzero entries.Then, for the precoding vectors in E B , we construct each ofthem as follows:

uki := uk

b . (6)

Now we construct the precoding vectors in E A. Recall thatin IA scheme π , each interfering stream in Ai j is aligned to aninterfering stream in ∪k �=i

k∈Iusrj

Bk . Therefore, for each uki ∈ E A,

we define

uki := H−1

j i H j i ′uk′i ′ . (7)

where uk′i ′ is an precoding vector in E B (i.e., uk′

i ′ := uk′b )

and i ′ �= i .2) Properties of Precoding Vectors: Denote dim(ESi ) as the

dimension of the subspace spanned by the vectors in set ESi .Then we have the following lemma:

Lemma 1: At each user i ∈ N , the constructed precodingvectors ESi are linearly independent, i.e., dim(ESi ) = |ESi |.

A proof of Lemma 1 is given in Appendix A.At BS j , denote Q T

j as the set of its directions for its desireddata streams and Q I

j as the set of directions for its interferingstreams. Mathematically, we have

Q Tj = ∪i∈T usr

j{H j iuk

i : uki ∈ ESi },

Q Ij = ∪i∈Iusr

j{H j iuk

i : uki ∈ ESi }.

Then, we have the following lemma:Lemma 2: At each BS j ∈ M , each of its desired data

streams occupies an independent direction, i.e.,

dim(Q Tj ∪ Q I

j ) =∑

i∈T usrj

σi + dim(Q Ij ), for j ∈ M . (8)

A proof of Lemma 2 is given in Appendix B.3) Existence of Decoding Vectors: So far we have con-

structed precoding vectors for the streams at each transmitterand showed two important properties of the constructed. Forthe decoding vectors at receivers, we have the followingproposition:

Proposition 1: If the constructed precoding vectors sat-isfy (8), then there exists a decoding vector for each streamso that constraints (4) and (5) are satisfied.

A proof of Proposition 1 is given in Appendix B. Thiscompletes the proof of Theorem 1.

V. A THROUGHPUT OPTIMIZATION FRAMEWORK:COMBINING IA WITH USER SCHEDULING

A. Problem Statement

Our goal is to exploit the benefits of OFDM-based IA toincrease user throughput in cellular networks from a network-ing perspective. We consider a network that consists of a setof grid-deployed BSs and a set of randomly distributed users(see e.g., Fig. 7). Each BS has a fixed service area (a diskwith radius of its transmission range) and it only providesservice to the users within its service area. A user may fallinto the service areas of multiple BSs and will choose one ofthem as its service provider. In this section, we focus on theIA optimization for the uplink. The downlink will be consid-ered in the next section. In the uplink, a user is transmitterand it will interfere with the BSs within its interference rangeother than its service provider. We assume the transmissionuses OFDM modulation and the set of subcarriers for IA isgiven. Within the set of subcarriers, we aim to jointly optimizeIA and user scheduling so that the uplink user throughput canbe maximized at network level.

B. Our Approach

To solve this problem, we develop a cross-layer IA opti-mization framework with the objective of maximizinguser throughput. In the previous section we developed anIA scheme and showed that as long as IA constraints (1)–(3)are satisfied, user i ∈ N can send σi data streams to itsserving BS free of interference. Constraints (1)–(3) define afeasible IA design space for a cellular network that is readilyused for throughput optimization. However, constraints (1)–(3)were derived under the assumption that each user’s serving BS

Page 7: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

4498 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. 10, OCTOBER 2017

Fig. 5. Sets illustration at BS j and user i .

is given a priori and therefore can only be applied to a networkwith static user access. In a practical network, as stated earlier,a user may be within the service area of multiple BSs andcan choose any of them as its serving BS. This freedom (i.e.,user scheduling at each BS) provides another dimension forIA optimization space to improve user throughput and shouldbe incorporated into the IA design space. In what follows,we first model the user scheduling and then incorporate theuser scheduling into our developed IA constraints. Finally,we formulate a user throughput optimization framework andeliminate its nonlinear constraints without loss of optimality.

C. Combining IA Constraints With User Scheduling

As shown in Fig. 5(a), denote C usrj as the set of users within

the service area of BS j ; denote Ousrj as the set of users that

are outside the service area of BS j but can still interfere withBS j . As shown in Fig. 5(b), denote C bs

i as the set of BSs thatuser i can choose as its service provider; denote Obs

i as theset of BSs whose service areas do not cover user i but arestill inside the interference range of user i . To efficiently useIA and IC capabilities, channel quality (path loss and slowfading) should be taken into account when constructing thesesets (i.e., C usr

j , Ousrj , C bs

i , and Obsi ).

Denote xi j as a binary variable to indicate whether or notuser i chooses BS j ∈ C bs

i as its service provider. Specifically,xi j = 1 if user i chooses BS j as its service provider and0 otherwise. Since user i can choose only one BS as its serviceprovider, we have

j∈C bsi

xi j = 1, i ∈ N . (9)

Denote yi j as the complementary binary variable of xi j .That is, yi j = 1 if user i does not choose BS j ∈ C bs

i as itsservice provider and 0 otherwise. Then we have the followingconstraints.

xi j + yi j = 1, j ∈ C bsi , i ∈ N . (10)

We now show that the above BS selection (user scheduling)variables can be incorporated into (1), (2), and (3) in our IAscheme. To incorporate BS selection variables in (1), we needto first clarify Ibs

i , i.e., the set of BSs that are interfered with byuser i . Based on the definitions of Obs

i , C bsi , and yi j , we have

Ibsi = Obs

i ∪ { j : yi j = 1, j ∈ C bsi }.

Then, (1) can be rewritten as:

βi +∑

j∈Obsi

αi j +∑

j∈C bsi

αi j · yi j = σi , i ∈ N . (11)

Likewise, for (2), we need to first clarify Iusrj , i.e., the set of

users that are interfering with BS j . Based on the definitionsof Ousr

j , C usrj , and yi j , we have

Iusrj = Ousr

j ∪ {i : yi j = 1, i ∈ C usrj }. (12)

Depending on whether user i in Ousrj or C usr

j , (2) can berewritten as:

αi j ≤k �=i∑

k∈Ousrj

βk +∑

k∈C usrj

βk · ykj , i ∈ Ousrj , j ∈ M , (13)

αi j · yi j ≤∑

k∈Ousrj

βk +k �=i∑

k∈C usrj

βk · ykj , i ∈ C usrj , j ∈ M , (14)

Finally, for (3), we need to first clarify T usrj , i.e., the set of

users that choose BS j as their service provider. Based on thedefinitions of C usr

j and xi j , we have

T usrj = {i : xi j = 1, i ∈ C usr

j }.Then, (3) can be rewritten as:

i∈C usrj

σi · xi j +∑

i∈Iusrj

(σi − αi j ) ≤ K j ∈ M .

which is equivalent to∑

i∈C usrj

σi · xi j+∑

i∈C usrj

(σi − αi j ) · yi j+∑

i∈Ousrj

(σi − αi j ) ≤ K , j ∈ M ,

(15)

based on Iusrj in (12).

Constraints (9)–(15) define a feasible IA design space whenuser scheduling is jointly considered. In the sequel, we employthis IA space to study an uplink user throughput maximizationproblem in a cellular network.

D. User Throughput Optimization Framework

For simplicity, we assume that fixed modulation and codingscheme (MCS) is used for each data stream and that eachdata stream corresponds to one unit data rate. The goal is tomaximize the minimum rate among all the users. Denote rminas the minimum rate among all users. Then we have

σi ≥ rmin , i ∈ N . (16)

Based on the constraints in Section V-A, the user throughputmaximization problem can be formulated as follows:

OPT-IAraw: Max rminS.t. User scheduling: (9), (10);

IA constraints: (11), (13), (14), (15);Minimum rate constraints: (16).

Page 8: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

ZENG et al.: OFDM-BASED IA IN SINGLE-ANTENNA CELLULAR WIRELESS NETWORKS 4499

OPT-IAraw is a mixed integer nonlinear program-ming (MINLP). To eliminate the nonlinear terms in theconstraints, we employ the Reformulation-Linearization Tech-nique (RLT) in [28]. Specifically, to eliminate the nonlinearterm αi j · yi j in the constraints, we define λi j = αi j · yi j . Thisreplacement requires to add the following two constraints:

0 ≤ λi j ≤ αi j , j ∈ C bsi , i ∈ N , (17)

αi j − (1 − yi j ) · K ≤ λi j ≤ yi j · K , j ∈ C bsi , i ∈ N . (18)

Similarly, to eliminate the nonlinear term βi · yi j in theconstraints, we define μi j = βi · yi j . This replacement requiresto add the following two constraints:

0 ≤ μi j ≤ βi , j ∈ C bsi , i ∈ N , (19)

βi − (1 − yi j ) · K ≤ μi j ≤ yi j · K , j ∈ C bsi , i ∈ N . (20)

By replacing λi j = αi j · yi j and μi j = βi · yi j in theIA constraints (11), (13), (14), (15), we have the followinglinear IA constraints:

βi +∑

j∈Obsi

αi j +∑

j∈C bsi

λi j = σi , i ∈ N , (21)

αi j ≤k �=i∑

k∈Ousrj

βk +∑

k∈C usrj

μkj , i ∈ Ousrj , j ∈ M , (22)

λi j ≤∑

k∈Ousrj

βk +k �=i∑

k∈C usrj

μkj , i ∈ C usrj , j ∈ M , (23)

i∈C usrj

(σi − λi j ) +∑

i∈Ousrj

(σi − αi j ) ≤ K , j ∈ M . (24)

Then, OPT-IAraw is reformulated as follows:

OPT-IA: Max rminS.t. User scheduling: (9), (10);

IA constraints: (17), (18), (19), (20),(21), (22), (23), (24);

Minimum rate constraints: (16);

where N , M , C bsi , Obs

i , C usrj , Ousr

j , and K are known; xi j

and yi j are binary variables; rmin, σi , αi j , βi , λi j , and μi j arenon-negative integer variables.

OPT-IA is a mixed integer linear programming (MILP).Although the theoretical worst-case complexity to a generalMILP problem is exponential [29], [30], there exist highly effi-cient optimality/approximation algorithms (e.g., branch-and-bound with cutting planes [31]) and heuristics (e.g., sequentialfixing algorithm [32]). Another approach is to employ an off-the-shelf solver such as IBM CPLEX optimization solver [33],which can successfully handle a moderate-sized network. Asthe main goal of this paper is to study IA from a networkingperspective rather than developing a specific solution to anoptimization problem, we will employ the IBM CPLEX opti-mization solver to obtain numerical results in the next section.

VI. DUALITY BETWEEN UPLINK AND DOWNLINK

In the previous sections, we studied an IA scheme for theuplink of a cellular network. We now consider the downlink

Fig. 6. Downlink communication in a cellular network.

case. We will show that the IA scheme developed for uplinkcan also be applied to downlink and therefore the downlinkuser throughput maximization problem can be solved in thesame way as the uplink problem.

Consider the downlink communication as shown in Fig. 6,which has the same setting as the uplink in Fig. 3. Forthe downlink, denote π as its IA scheme with DoF vector(σ1, σ2, · · · , σN ), where σi is the number of desired datastreams at user i . At user i , denote Si = {sk

i : 1 ≤ k ≤ σi }as the set of its desired data streams and vk

i as the decodingvector of its stream sk

i . At user i ’s intended BS j , denote ulj as

the precoding vector of user i ’s stream ski . Then we have the

following theorem:Theorem 2: For downlink IA scheme π , if its DoF vector

(σ1, σ2, · · · , σN ) satisfies (1), (2), and (3), then it is feasibleat the physical layer.

A proof of Theorem 2 is given in Appendix D. Based onTheorem 2, we have the following observations on π and π :

• For user i ∈ N , if it can send σi data streams to its BSj in the uplink transmission, then it can receive σi datastreams from BS j in the downlink transmission, and viceversa.

• For the downlink problem, the precoding and decodingvectors in π are the same as the corresponding decodingand precoding vectors in π , respectively. That is, streamsk

i ’s precoding vector is stream ski ’s decoding vector and

stream ski ’s decoding vector is stream sk

i ’s precodingvector.

• Since the uplink and downlink have the same IA designspace, the downlink user throughput maximization prob-lem has the same formulation as the uplink problem.Therefore, the downlink has the same optimal userthroughput as the uplink.

VII. PERFORMANCE EVALUATION

In this section, we first use a case study to illustrate howIA scheme works in a cellular network. Then, we comparethe user throughput performance of our IA scheme againsttwo other schemes: “no-IA” scheme and “crude-IA” scheme.In no-IA scheme, a subset of subcarriers is allocated to eachuser for its data transmission, with each data or interferingstream occupying a unique subcarrier at each BS. That is,there is a complete absence of overlapping of interferingstreams on any subcarrier. We denote the user throughputmaximization problem under no-IA scheme as OPT-noIA andits formulation is given in Appendix E. In crude-IA scheme,

Page 9: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

4500 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. 10, OCTOBER 2017

Fig. 7. Cellular network instances with 4, 9, and 16 BSs.

a subset of subcarriers is allocated to each user for its datatransmission so that at a BS, each of its desired data streamsis on a unique subcarrier while the interfering streams areallowed to overlap. This problem is similar to ours exceptthat each data stream in our IA scheme is projected ontoall subcarriers and there is an optimization on the designof directions for intended data streams and interfering datastreams. In light of this key difference, we denote the userthroughput maximization problem under crude-IA scheme asOPT-crudeIA and its formulation is given in Appendix F.

A. Simulation Setting

Without loss of generality, we normalize all units fordistance, time, bandwidth, and data rate with appropri-ate dimensions. We consider cellular networks within a1000 × 1000 area for three cases: (i) 4 BSs with 100 users;(ii) 9 BSs with 100 users; and (iii) 16 BSs with 100 users.Fig. 7 illustrates our BS deployment for the three cases.In each case, to mimic the BS deployment in real-worldcellular networks, we place the BSs in grid. The 100 users arerandomly distributed in the area with a uniform probability.A user can be in “active” or “inactive” state, with equalprobability. When active, a user has a persistent traffic fortransmission; when inactive, a user is not served by any BS.For any comparison study, the state of a user is the sameunder all three schemes. To assure that each user is withinthe service area of at least one BS, we set the transmissionrange to 360 for the 4-BS case, 240 for the 9-BS case, and180 for the 16-BS case. The interference range is twice of thetransmission range and the number of subcarriers available fordata transmission is 256, unless otherwise specified.

B. A Case Study

We use the network instance in Fig. 7(b) to illustrate howIA works to improve throughput. Among the 100 users, 55 ofthem are active and 45 of them are inactive (inactive usersare not shown in the figure). The number of subcarriersavailable for IA is 256. By solving the OPT-IA problem forthis network instance, we obtain the optimal objective valueof 13. We then solve the OPT-noIA problem for this network

Fig. 8. User scheduling at each BS and interference pattern.

instance, we obtain the optimal objective value of 6. Thisindicates that our IA scheme can increase the user throughputby 117% as compared to the no-IA scheme. We also solve theOPT-crudeIA problem for this network instance, we obtain theoptimal objective value of 9. This indicates that our IA schemecan increase the user throughput by 44% as compared to thecrude-IA scheme.

We now show how our IA scheme works in this networkinstance. Fig. 8 shows the user scheduling result and inter-ference pattern in the IA solution, where a solid arrow linerepresents an established link from a user to a BS and adashed line represents an interference. Table II summarizesthe IA behavior at each BS. In this table, the first column liststhe BSs in the network; the second column lists the numberof users that choose this BS as their service provider; the thirdcolumn lists the number of desired data streams at this BS,where each user has 13 data streams to its BS; the fourthcolumn lists the dimension of the subspace for the interferingstreams at this BS, which is 256 minus the number in thethird column; the fifth column lists the number of undesiredinterfering streams (from neighboring interfering users) at this

Page 10: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

ZENG et al.: OFDM-BASED IA IN SINGLE-ANTENNA CELLULAR WIRELESS NETWORKS 4501

TABLE II

IA BEHAVIOR AT EACH BS IN THE CASE STUDY

Fig. 9. Throughput gain of our IA scheme over crude-IA scheme.

BS; the sixth column lists the interference overlapping ratio,which is the ratio of the fifth column to the fourth column.In the sixth column, a value greater than 1 indicates theexistence of interference overlapping. The large the ratio is,the more IA has been achieved at the corresponding BS.

Now let’s take a look at the row for BS 5 in Table II as anexample. As shown in Fig. 8, BS 5 is used as service providerby 12 users. Since each user has 13 outgoing data streams,the number of desired data streams at BS 5 is 156. Thus,the dimension of the subspace for the interfering streams isupper bounded by 100 (i.e., 256 − 156). As shown in Fig. 8,BS 5 is being interfered by 17 users and thus has 221(i.e., 17 × 13) interfering streams. Therefore, the interferenceoverlapping ratio at BS 5 is 221/100 = 2.21 (as shown inthe table). As indicated in Table II, interfering streams aresqueezed in a reduced-dimensional subspace at most BSs inthis network instance, making it possible to transport moredata streams than the no-IA and crude-IA schemes.

C. Throughput Gain of Our IA SchemeTo study throughput gain of our IA scheme over crude-

IA and no-IA schemes, we generate 200 randomly networkinstances with 256 subcarriers. For each network instance,we solve its OPT-IA, OPT-crudeIA, and OPT-noIA formu-lations using CPLEX optimization solver and obtain theiroptimal objective values. Fig. 9 presents the throughput gainof our IA scheme over crude-IA scheme in three cases

Fig. 10. Throughput gain of our IA scheme over no-IA scheme.

(4-BS, 9-BS, 16-BS), where x-axis is the throughput gainin percentage (i.e. the ratio of the optimal objective valuefrom OPT-IA to that from OPT-crudeIA minus one and times100) and the y-axis is the cumulative probability. From thefigure we can see that the throughput gain ranges from 10%to 70% in the three cases, indicating that our IA scheme alwaysoutperforms crude-IA scheme. On average, the throughputgain of our IA scheme over crude-IA scheme is 40.1% in the4-BS case, 34.7% in the 9-BS case, and 30.8% in the16-BS case. In the same format, Fig. 10 presents the through-put gain of our IA scheme over no-IA scheme. On average,the throughput gain of our IA scheme over no-IA scheme is96.1% in the 4-BS case, 82.0% in the 9-BS case, and 69.9%in the 16-BS case. From Fig. 9 and Fig. 10, we can see thatour IA scheme has higher throughput gain over no-IA schemethan over crude-IA scheme. This is not surprising, as the no-IAscheme does not allow any alignment whereas the crude-IAscheme allows alignment of interference on each individualsubcarrier.

1) Impact From the Number of Subcarriers: We now studythe impact of subcarrier number on the throughput gain ofour IA scheme. We generate 200 randomly network instanceswith the number of subcarriers varying from 32, 64, 128, 256,512, to 1024. Fig. 11 presents the throughput gain of our IAscheme (averaged over the 200 network instances) versus thenumber of subcarriers in 4-BS, 9-BS, and 16-BS cases. For

Page 11: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

4502 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. 10, OCTOBER 2017

Fig. 11. Impact of subcarrier number on the gain of our IA scheme.

Fig. 12. Impact of user density on the gain of our IA scheme.

example, when the network has 4 BSs and 64 subcarriers,the average throughput gain of our IA scheme is 65% overcrude-IA scheme and 121% over no-IA scheme, as shownin Fig. 11. From the figure we can see that, as the number ofsubcarriers increases, the throughput gains of our IA schemeover crude-IA scheme converge to 37.6%, 35.3%, 31.5% in4-BS, 9-BS, and 16-BS cases; and the throughput gains of IAscheme over no-IA scheme converge to 86.7%, 76.6%, 64.7%in the three cases. It should be noted that when the number ofsubcarriers is less than 64, crude-IA and no-IA schemes yieldzero throughput for most network instances.

2) Impact of User Density: Finally, we study the impact ofuser density on the throughput gain of our IA scheme overno-IA and crude-IA schemes. For each network instance (see,e.g., Fig. 7), instead of fixing user number to 100, we considerdifferent user densities: 25 users, 50 users, 100 users, and150 users (within the 1000 × 1000 square area). For eachuser density, we generate 200 network instances and computetheir averaged gain of our IA scheme. Fig. 12 presents thethroughput gain of our IA scheme in 4-BS, 9-BS, and 16-BScases, where x-axis is the number of users in the 1000×1000square area and y-axis is the averaged gain of our IA schemeover the 200 network instances. From the figure we can seethat the gain of our IA scheme over both no-IA and crude-IA schemes becomes more significant as the number of usersincreases. As we explained in Section III, this is because moreusers can achieve more alignment at each BS, thereby leavinglarger subspace available for desired data stream reception at

each BS. Therefore, our IA scheme is more suitable for adense network.

VIII. CONCLUSIONS AND FUTURE WORK

This paper studied IA in cellular networks from a network-ing perspective. We developed an OFDM-based IA schemefor cellular networks and proved its feasibility at the physicallayer. Specifically, we showed that as long as the correspond-ing IA constraints are satisfied, there always exist precodingand decoding vectors so that each data stream can be trans-ported free of interference. Such an IA scheme allows usto study network-level throughput problems without gettinginvolved into the onerous design of precoding and decodingvectors. By incorporating user scheduling into our IA scheme,we developed an uplink user throughput optimization frame-work and demonstrated the throughput gain of our IA schemeat network level. For the downlink problem, we showedthat the IA scheme developed for the uplink can also beapplied to the downlink. Furthermore, the downlink userthroughput maximization problem has the same formulationas the uplink problem and therefore can be solved in the sameway. Although the IA scheme was designed in the frequencydomain, it is a general framework which can also be used inthe temporal and spatial domains.

While the benefit of IA has been recognized in theory, thereare a number of issues needed to be addressed in order to use itin practical cellular networks, including CSI acquisition on thetransmitter side, transmission/reception coordination amongthe nodes in the network, and timing and frequency synchro-nization among the transmitters. Obviously, these issues willcompromise the throughput gain of the proposed IA scheme.In our future work, we will develop practical frequency-domain IA solutions that can address those issues whilemaximally preserving the throughput gain of IA in real-worldcellular networks.

APPENDIX APROOF OF LEMMA 1

Based on the definitions of ESi , E Bi , and E Ai j , we haveESi = E Bi ∪ (∪ j∈Ibs

iE Ai j ). According to the precoding

vector construction procedure, we know that the constructedprecoding vectors in E Bi are independent of any channelmatrices (see (6)), whereas the constructed precoding vectorsin E Ai j are determined by the channel matrices (see (7)). Giventhat the diagonal entries in the channel matrices are drawnfrom complex Gaussian distribution, we have

dim(ESi ) = dim(E Bi ∪ (∪ j∈Ibsi

E Ai j ))

= dim(E Bi ) + dim(∪ j∈Ibsi

E Ai j ). (25)

Based on (7), we know that the precoding vectors in E Ai j

is determined by the channel matrix H j i . Since the channelmatrices in {H j i : j ∈ Ibs

i } are randomly independent of eachother, we have

dim(∪ j∈Ibsi

E Ai j ) =∑

j∈Ibsi

dim(E Ai j ). (26)

Page 12: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

ZENG et al.: OFDM-BASED IA IN SINGLE-ANTENNA CELLULAR WIRELESS NETWORKS 4503

To analyze dim(E Ai j ), we divide the precoding vectors inE Ai j into different groups based on the their corresponding

value of i ′ in (7): {E Ai′i j : i ′ ∈ Iusr

j , i ′ �= i}. Thus we have

E Ai j = ∪i ′ �=ii ′∈Iusr

jE Ai′

i j , where E Ai′i j := H−1

j i H j i ′E Bi′ with E Bi′ ⊆E Bi′ . Based on the precoding vector construction procedure,we have

dim(E Ai′i j )

(a)= dim(E Bi′ )(b)= |E Bi′ | (c)= |E Ai′

i j |, (27)

where (a) follows from our mild assumption that channelmatrix has full rank [34, Ch. 1]; (b) follows from the factthat the precoding vectors in EBi′ are constructed by (6);(c) follows from the fact that in our IA scheme, each interfer-ing streams in Ai j is aligned to a unique interfering stream inBi ′ with i ′ �= i .

Based on the definitions and (27), we have

dim(E Ai j ) = dim(∪i ′ �=ii ′∈Iusr

jE Ai′

i j )(a)=

i ′ �=i∑

i ′∈Iusrj

dim(E Ai′i j )

=i ′ �=i∑

i ′∈Iusrj

|E Ai′i j | = |E Ai j |, (28)

where (a) follows from the fact that the channel matrices{H j i ′ : i ′ ∈ Iusr

j , i ′ �= i} are drawn complex Gaussiandistribution and independent of each other.

Based on (25), (26), and (28), we conclude

dim(ESi ) = dim(E Bi ) + dim(∪ j∈Ibsi

E Ai j )

= |E Bi | +∑

j∈Ibsi

dim(E Ai j )

= |E Bi | +∑

j∈Ibsi

|E Ai j |

= |ESi |.This complete the proof.

APPENDIX BPROOF OF LEMMA 2

Consider a BS j ∈ M as shown in Fig. 4(b). Denote Q I,Alij

as the set of aligned interfering stream directions. DenoteQ I,Def

j as the set of predefined interfering stream directions.

Denote Q I,Effj as the set of “effective” interfering stream

directions. Then we have

Q I,Alij = ∪i∈Iusr

j{H j iuk

i : uki ∈ E Ai j },

Q I,Defj = ∪i∈Iusr

j{H j iuk

i : uki ∈ E Bi },

Q I,Effj = ∪i∈Iusr

j{H j iuk

i : uki ∈ ESi \E Ai j }.

Since E Bi ⊆ ESi \E Ai j , we have Q I,Defj ⊆ Q I,Eff

j . Based onthe precoding vector construction procedure, we know that foreach H j iuk

i ∈ Q I,Alij , there exists a H j i ′uk′

i ′ ∈ Q I,Effj such that

H j iuki := H j i ′uk′

i ′ . Consequentially, we have span(Q I,Alij ) ⊆

span(Q I,Defj ). Thus we have

span(Q Ij ) = span(Q I,Eff

j ∪ Q I,Alij ) = span(Q I,Eff

j ). (29)

We now argue that the signal subspace Q Tj is linearly

independent of the “effective” interference subspace Q I,Effj at

BS j . This is true for the following two reasons. First, based onthe given constraint (3), we have |Q T

j ∪Q I,Effj | = ∑

i∈T usrj

σi +∑

i∈Iusrj

(σi − αi j ) ≤ K . Thus, the number of directions in

Q Tj ∪ Q I,Eff

j is bounded by the total available dimension (i.e.,the number of subcarriers K ). Second, the channel matrices{H j i : i ∈ T usr

j ∪Iusrj } are frequency-selective and are randomly

independent of each other. These properties of the channelmatrices are attributive to the network environment. For thesetwo reasons, we have

dim(Q Tj ∪ Q I,Eff

j ) = dim(Q Tj ) + dim(Q I,Eff

j ). (30)

To characterize the dimension of the signal (desired datastream) subspace at BS j , we have

dim(Q Tj ) = dim(∪i∈T usr

j{H j iuk

i : uki ∈ ESi })

(a)=∑

i∈T usrj

dim({H j iuki : uk

i ∈ ESi })

(b)=∑

i∈T usrj

dim(ESi )

(c)=∑

i∈T usrj

σi , (31)

where (a) holds due to the random independence of the channelmatrices {H j i : i ∈ T usr

j } and |Q Tj | ≤ K ; (b) follows from

our mild assumption that H j i has full rank; (c) follows fromLemma 1 and |ESi | = σi .

Based on (29) and (31), we have

dim(Q Tj ∪ Q I

j )(a)= dim(Q T

j ∪ Q I,Effj )

(b)= dim(Q Tj ) + dim(Q I,Eff

j )

(c)=∑

i∈T usrj

σi + dim(Q Ij ), (32)

where (a) and (c) hold due to (29); (b) holds due to (31).Combining (32) and Lemma 1, we conclude that Theorem 1

holds. This completes the proof.

APPENDIX CPROOF OF PROPOSITION 1

We show that if the precoding vectors satisfy constraint (8),then there exist a set of decoding vectors that satisfy (4) and (5)in Definition 1. Specifically, we argue that if constraint (8) issatisfied, then the following linear system is consistent (i.e.,the system has at least one feasible solution):

(vlj )

T H j iuki = 1,

(vlj )

T H j i ′uk′i ′ = 0, i ′ ∈ T usr

j ∪ Iusrj ,

1 ≤ k ′ ≤ σi ′ , (i′, k ′) �= (i, k)

where vlj is variable vector while H’s and u’s are known.

Based on the definition of Q Tj and Q I

j , we know

Q Tj ∪ Q I

j = {H j i ′uk′i ′ : i ′ ∈ T usr

j ∪ Iusrj , 1 ≤ k ′ ≤ σi ′ }.

Page 13: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

4504 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. 10, OCTOBER 2017

It is easy to see that Q Tj ∪ Q I

j is the set of coefficient-vectors of this linear system. Moreover, this system has K freevariables and at most K linearly independent equations. If wecan show that vector H j iuk

i is not a linear combination ofother vectors in Q T

j ∪Q Ij , then this system is consistent. Next,

we argue this point by contradiction.Suppose that H j iuk

i is a linear combination of other vectorsin Q T

j ∪ Q Ij . Given H j iuk

i ∈ Q Tj , we have

dim(Q Tj ∪ Q I

j ) < |Q Tj | + dim(Q I

j ) =∑

i∈Iusrj

σi + dim(Q Ij ).

This contradicts the given condition in (8). Therefore, we con-clude that the linear system is consistent. This completes theproof.

APPENDIX DPROOF OF THEOREM 2

We prove it by construction. Consider an uplink IA schemeπ with its DoF vector (σ1, σ2, · · · , σN ) = (σ1, σ2, · · · , σN ).Since (σ1, σ2, · · · , σN ) satisfies (1), (2), and (3), based onTheorem 1, we know that the uplink IA scheme π is feasible.Further, for each stream sk

i in uplink IA scheme π , thereexist a precoding vector uk

i and a decoding vector vlj that

satisfy (4) and (5).To show that downlink IA scheme π is feasible, we con-

struct each stream ski ’s precoding and decoding vectors as

follows: ulj = vl

j and vki = uk

i , where vlj and uk

i are decodingand precoding vectors in the uplink IA scheme π and can beenconstructed in (6) and (7). Now we argue that by using theseprecoding and decoding vectors, each steam sk

i in downlinkIA scheme π can be transported free of interference.

We first check the transfer function of stream ski as follows:

(vki )

T H j i ulj

(a)= (uki )

T H j ivlj

(b)= [(vlj )

T H j iuki ]T (c)= 1, (33)

where (a) follows from ulj = vl

j and vki = uk

i ; (b) follows fromthe fact that H j i is a diagonal matrix, i.e., (H j i)

T = H j i ; and(c) follows from (4).

We then check whether the interference can be completelycanceled. For stream sk

i , it suffers from interference from thestreams that correspond to precoding vectors vl′

j ′ with j ′ ∈Ibs

i ∪ { j}, 1 ≤ l ′ ≤ ∑i ′∈T j ′ σi ′ , and ( j ′, l ′) �= ( j, l). Based

on (5), we have

(vki )

T H j i ul′j ′ = (uk

i )T H j ivl′

j ′ = [(vl′j ′)T H j iuk

i ]T = 0, (34)

for j ′ ∈ Ibsi ∪ { j}, 1 ≤ l ′ ≤ ∑

i ′∈T j ′ σi ′ , and ( j ′, l ′) �= ( j, l).

(33) and (34) assure that each stream ski (i ∈ N , 1 ≤

k ≤ σi ) can be transported free of interference in the downlink.Therefore, we conclude that IA scheme π is feasible for thedownlink. This completes the proof.

APPENDIX ENETWORK THROUGHPUT OPTIMIZATION

UNDER NO-IA SCHEME

In the no-IA scheme, a subset of subcarriers is allocated toeach user for its data transmission such that at each BS, eachdata or interfering stream occupies a unique subcarrier. That

is, there is a complete absence of overlapping of interferingstreams on any subcarrier. Denote K as the set of subcarriersin the network. Denote wik as a binary variable to indicatewhether the kth subcarrier is used by user i . Specifically,wik = 1 if the kth subcarrier is used for data transmission atuser i and wik = 0 otherwise. Thus, the number of outgoingstreams from user i can be expressed as

σi =∑

k∈K

wik , i ∈ N . (35)

At BS j ∈ M , a subcarrier k ∈ K can be used by onlyone user within its transmission range and interference range.Otherwise, it will cause interference collision or overlapping.Thus, we have the following constraints:

i∈T j ∪I j

wik ≤ 1, k ∈ K , j ∈ M . (36)

Therefore, the throughput maximization problem under no-IA scheme can be formulated as follows:

OPT-noIA: Max rminS.t. (16), (35), (36);

where wik and σi are variables; while C usrj , Ousr

j , N , M , Kare known a priori based on the network topology and setting.

APPENDIX FNETWORK THROUGHPUT OPTIMIZATION UNDER

CRUDE-IA SCHEME

We formulate the same network throughput problem underthe crude-IA scheme. In the crude-IA scheme, a subset ofsubcarriers is allocated to each user for its data transmissionsuch that at each BS, each of its desired data streams is on aunique subcarrier while the interfering streams are allowed tooverlap.

Recall that K is the set of subcarriers in the network andwik is a binary variable indicating whether the kth subcarrieris used at user i . Then, the number of outgoing streams fromuser i can be expressed as

σi =∑

k∈K

wik , i ∈ N . (37)

Consider an BS j ∈ M and its serving users (i.e. users inT usr

j ). To avoid transmission conflict, at most one of the usersin T usr

j can use the kth subcarrier for data stream transmission.Thus we have

∑i∈T usr

jwik ≤ 1. If none of the users in T usr

juses the kth subcarrier for data stream transmission, then thissubcarrier can accommodate any amount of interference (i.e.,1N

∑i∈Iusr

jwik ≤ 1). Combining these two cases, the inter-

ference avoidance scheme can be modeled by the followingconstraint:

i∈T usrj

wik + 1

N

i∈Iusrj

wik ≤ 1, j ∈ M , k ∈ K . (38)

Recall that C usrj is the set of users within the transmission

range of BS j and Ousrj is the set of users within the interfer-

ence range of BS j . A user may be within the transmission

Page 14: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

ZENG et al.: OFDM-BASED IA IN SINGLE-ANTENNA CELLULAR WIRELESS NETWORKS 4505

range of multiple BSs and we use xi j to indicate which BSis serving for it. Thus we have T usr

j = {i : i ∈ C usrj , xi j = 1}

and Iusrj = Ousr

j ∪ {i : i ∈ C usrj , xi j = 0}. Then the interference

avoidance constraints in the network can be expressed as∑

i∈C usrj

xi j wik + 1

N

i∈C usrj

(1 − xi j )wik + 1

N

i∈Ousrj

wik ≤ 1,

j ∈ M , k ∈ K . (39)

To eliminate the nonlinear term xi j wik in (39), we define anew variable as follows:

qi jk = xi j wik , j ∈ M , i ∈ C usrj , k ∈ K . (40)

Given that both xi j and wik are binary variables, it it easyto verify that constraint (40) is equivalent to the combinationof the following three linear constraints:

qi jk ≤ xi j , i ∈ C usrj , j ∈ M , k ∈ K . (41)

qi jk ≤ wik , i ∈ C usrj , j ∈ M , k ∈ K . (42)

qi jk ≥ xi j + wik − 1, i ∈ C usrj , j ∈ M , k ∈ K . (43)

Replacing xi j wik by qi jk in interference avoidance con-straint (39), we have

N − 1

N

i∈C usrj

qi j k + 1

N

i∈C usrj ∪Ousr

j

wik ≤ 1, j ∈ M , k ∈ K .

(44)

Therefore, the throughput maximization problem undercrude-IA scheme can be formulated as follows:

OPT-crudeIA: Max rminS.t. (9), (16), (44), (41), (42), (43), (37),

where xi j , wik , σi , qi jk , and rmin are variables; while C usrj ,

Ousrj , N , N , M , K are known a priori based on the network

topology and setting.

ACKNOWLEDGMENT

Part of W. Lou’s work was completed while she was servingas a Program Director at the NSF. Any opinion, findings,and conclusions or recommendations expressed in this paperare those of the authors and do not reflect the views of theNSF. The authors thank Virginia Tech Advanced ResearchComputing for giving them access to the BlueRidge computercluster.

REFERENCES

[1] V. R. Cadambe and S. A. Jafar, “Interference alignment and degrees offreedom of the K -user interference channel,” IEEE Trans. Inf. Theory,vol. 54, no. 8, pp. 3425–3441, Aug. 2008.

[2] V. R. Cadambe and S. A. Jafar, “Interference alignment and the degreesof freedom of wireless X networks,” IEEE Trans. Inf. Theory, vol. 55,no. 9, pp. 3893–3908, Sep. 2009.

[3] T. Gou and S. A. Jafar, “Degrees of freedom of the K user M×NMIMO interference channel,” IEEE Trans. Inf. Theory, vol. 56, no. 12,pp. 6040–6057, Dec. 2010.

[4] N. Lee, J.-B. Lim, and J. Chun, “Degrees of freedom of the MIMOY channel: Signal space alignment for network coding,” IEEE Trans.Inf. Theory, vol. 56, no. 7, pp. 3332–3342, Jul. 2010.

[5] S. A. Jafar, “Interference alignment—A new look at signal dimensions ina communication network,” Found. Trends Commun. Inf. Theory, vol. 7,no. 1, pp. 1–134, 2011.

[6] C. Suh and D. Tse, “Interference alignment for cellular networks,”in Proc. IEEE Annu. Allerton Conf. Commun., Control, Comput.,Sep. 2008, pp. 1037–1044.

[7] C. Suh, M. Ho, and D. N. C. Tse, “Downlink interference alignment,”IEEE Trans. Commun., vol. 59, no. 9, pp. 2616–2626, Sep. 2011.

[8] M. Morales-Céspedes, J. Plata-Chaves, D. Toumpakaris, S. A. Jafar, andA. G. Armada, “Blind interference alignment for cellular networks,”IEEE Trans. Signal Process., vol. 63, no. 1, pp. 41–56, Jan. 2015.

[9] B. Zhuang, R. A. Berry, and M. L. Honig, “Interference alignment inMIMO cellular networks,” in Proc. IEEE Int. Conf. Acoust., SpeechSignal Process. (ICASSP), May 2011, pp. 3356–3359.

[10] W. Shin, N. Lee, J.-B. Lim, C. Shin, and K. Jang, “On the design ofinterference alignment scheme for two-cell MIMO interfering broadcastchannels,” IEEE Trans. Wireless Commun., vol. 10, no. 2, pp. 437–442,Feb. 2011.

[11] V. Ntranos, M. A. Maddah-Ali, and G. Caire, “Cellular interferencealignment,” IEEE Trans. Inf. Theory, vol. 61, no. 3, pp. 1194–1217,Mar. 2015.

[12] J. Jose, S. Subramanian, X. Wu, and J. Li, “Opportunistic interferencealignment in cellular downlink,” in Proc. IEEE Annu. Allerton Conf.Commun., Control, Comput. (Allerton), Oct. 2012, pp. 1529–1534.

[13] C. Wang, H. C. Papadopoulos, S. A. Ramprashad, and G. Caire, “Designand operation of blind interference alignment in cellular and cluster-based systems,” in Proc. IEEE Inf. Theory Appl. Workshop (ITA),Feb. 2011, pp. 1–10.

[14] X. Rao and V. K. N. Lau, “Interference alignment with partial CSIfeedback in MIMO cellular networks,” IEEE Trans. Signal Process.,vol. 62, no. 8, pp. 2100–2110, Apr. 2014.

[15] R. Tresch and M. Guillaud, “Cellular interference alignment with imper-fect channel knowledge,” in Proc. IEEE Int. Conf. Commun. Workshops,Jun. 2009, pp. 1–5.

[16] M. A. Maddah-Ali, A. S. Motahari, and A. K. Khandani, “Signaling overMIMO multi-base systems: Combination of multi-access and broadcastschemes,” in Proc. IEEE Int. Symp. Inf. Theory (ISIT), Jul. 2006,pp. 2104–2108.

[17] S. A. Jafar and S. Shamai (Shitz), “Degrees of freedom region of theMIMO X channel,” IEEE Trans. Inf. Theory, vol. 54, no. 1, pp. 151–170,Jan. 2008.

[18] S. A. Jafar, “Blind interference alignment,” IEEE J. Sel. Topics SignalProcess., vol. 6, no. 3, pp. 216–227, Jun. 2012.

[19] S. A. Jafar, “The ergodic capacity of phase-fading interference net-works,” IEEE Trans. Inf. Theory, vol. 57, no. 12, pp. 7685–7694,Dec. 2011.

[20] S. Gollakota, S. D. Perli, and D. Katabi, “Interference alignment andcancellation,” SIGCOMM Comput. Commun. Rev., vol. 39, pp. 159–170,Aug. 2009.

[21] F. Adib, S. Kumar, O. Aryan, S. Gollakota, and D. Katabi, “Interferencealignment by motion,” in Proc. ACM MobiCom, Sep. 2013, pp. 279–290.

[22] O. El Ayach, S. W. Peters, and R. W. Heath, Jr., “The feasibility ofinterference alignment over measured MIMO-OFDM channels,” IEEETrans. Veh. Technol., vol. 59, no. 9, pp. 4309–4321, Nov. 2010.

[23] L. E. Li, R. Alimi, D. Shen, H. Viswanathan, and Y. R. Yang, “A gen-eral algorithm for interference alignment and cancellation in wirelessnetworks,” in Proc. IEEE INFOCOM, Mar. 2010, pp. 1–9.

[24] K. Gomadam, V. R. Cadambe, and S. A. Jafar, “A distributed numericalapproach to interference alignment and applications to wireless interfer-ence networks,” IEEE Trans. Inf. Theory, vol. 57, no. 6, pp. 3309–3322,Jun. 2011.

[25] B. C. Jung and W.-Y. Shin, “Opportunistic interference alignment forinterference-limited cellular TDD uplink,” IEEE Commun. Lett., vol. 15,no. 2, pp. 148–150, Feb. 2011.

[26] B. Niu and A. M. Haimovich, “Interference subspace tracking fornetwork interference alignment in cellular systems,” in Proc. IEEEGLOBECOM, Nov./Dec. 2009, pp. 1–5.

[27] R. Tresch and M. Guillaud, “Clustered interference alignment in largecellular networks,” in Proc. IEEE Int. Symp. Pers., Indoor Mobile RadioCommun., Sep. 2009, pp. 1024–1028.

[28] H. D. Sherali and W. P. Adams, A Reformulation-Linearization Tech-nique for Solving Discrete and Continuous Nonconvex Problems. Nor-well, MA, USA: Springer, 2013.

[29] M. R. Gary and D. S. Johnson, Computers Intractability: A Guide toTheory NP-Completeness. New York, NY, USA: Freeman, 1979.

[30] A. Schrijver, Theory of Linear and Integer Programming. Hoboken, NJ,USA: Wiley, 1998.

Page 15: 4492 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. … · a promising interference management technique in wireless networks. Despite its rapid advances in cellular networks,

4506 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 65, NO. 10, OCTOBER 2017

[31] S. Sharma, Y. Shi, Y. T. Hou, H. D. Sherali, and S. Kompella, “Cooper-ative communications in multi-hop wireless networks: Joint flow routingand relay node assignment,” in Proc. IEEE INFOCOM, Mar. 2010,pp. 1–9.

[32] Y. T. Hou, Y. Shi, and H. D. Sherali, “Spectrum sharing for multi-hopnetworking with cognitive radios,” IEEE J. Sel. Areas Commun., vol. 26,no. 1, pp. 146–155, Jan. 2008.

[33] (2015). IBM ILOG CPLEX Optimization Solver, accessed onDec. 15, 2016. [Online]. Available: http://www-01.ibm.com/software/integration/optimization/cplex-optimizer

[34] R. A. Horn and C. R. Johnson, Matrix Analysis. Cambridge, U.K.:Cambridge Univ. Press, 2012.

Huacheng Zeng (M’15) received the Ph.D. degreein computer engineering from Virginia Tech,Blacksburg, VA, USA, in 2015. He is currently anAssistant Professor of Electrical and Computer Engi-neering with the University of Louisville, Louisville,KY, USA. His research focuses on developing prac-tice solutions to advancing wireless communicationsystems and enabling innovative wireless applica-tions. He was a recipient of the ACM WUWNET2014 Best Student Paper Award.

Yi Shi (S’02–M’08–SM’13) is currently a SeniorResearch Scientist with Intelligent Automation Inc.,Rockville, MD, USA, and an Adjunct Assistant Pro-fessor with Virginia Tech. He has authored one book,five book chapters, and more than 120 papers onwireless network algorithm design and optimization.His research focuses on optimization and algorithmdesign for wireless networks and social networks. Hehas co-organized several IEEE and ACM workshops,and he has been a TPC Member of many majorIEEE and ACM conferences. He was a recipient of

the IEEE INFOCOM 2008 Best Paper Award, the IEEE INFOCOM 2011Best Paper Award Runner-Up, and the ACM WUWNet 2014 Best StudentPaper Award. He is an Editor of the IEEE COMMUNICATIONS SURVEYS

AND TUTORIALS. He has named an IEEE COMMUNICATIONS SURVEYS ANDTUTORIALS Exemplary Editor in 2014.

Y. Thomas Hou (F’14) received the Ph.D. degreefrom the NYU Tandon School of Engineering (for-merly Polytechnic University) in 1998. From 1997to 2002, he was a member of the Research Staffwith the Fujitsu Laboratories of America, Sunnyvale,CA, USA. He is currently a Bradley DistinguishedProfessor of Electrical and Computer Engineeringwith Virginia Tech, Blacksburg, VA, USA, whichhe joined in 2002. He has authored over 100 journalpapers and 130 conference papers in networkingrelated areas. He authored/co-authored two graduate

textbooks: Applied Optimization Methods for Wireless Networks (CambridgeUniversity Press, 2014) and Cognitive Radio Communications and Net-works: Principles and Practices (Academic Press/Elsevier, 2009). His currentresearch focuses on developing innovative solutions to complex science andengineering problems arising from wireless and mobile networks. His paperswere recognized by five best paper awards from the IEEE and two paperawards from the ACM. He holds five U.S. patents. He is also a DistinguishedLecturer of the IEEE Communications Society. He was/is on the editorialboards of a number of IEEE and ACM transactions and journals. He is theSteering Committee Chair of the IEEE INFOCOM Conference and a memberof the IEEE Communications Society Board of Governors.

Wenjing Lou (F’15) received the Ph.D. degree inelectrical and computer engineering from the Uni-versity of Florida. She is currently a Professor withthe Computer Science Department, Virginia Tech.Her research interests are in the broad area of wire-less networks, with special emphases on wirelesssecurity and cross-layer network optimization. Since2014, she has been serving as a Program Director atthe National Science Foundation. She is the SteeringCommittee Chair of the IEEE Conference on Com-munications and Network Security.

Xu Yuan (S’13–M’16) received the B.S. degreefrom the Department of Information Security,Nankai University, in 2009, and the Ph.D. degreefrom the Bradley Department of Electrical andComputer Engineering, Virginia Tech, Blacksburg,VA, USA, in 2016. From 2016 to 2017, he wasa Post-Doctoral Fellow of Electrical and ComputerEngineering with the University of Toronto, Toronto,ON, Canada. He is currently an Assistant Professorwith the School of Computing and Informatics at theUniversity of Louisiana at Lafayette, LA, USA. His

research interest focuses on cloud computing security, algorithm design andoptimization for spectrum sharing, coexistence, and cognitive radio networks.

Rongbo Zhu (M’10) received the Ph.D. degreein communication and information systems fromShanghai Jiao Tong University, China, in 2006. Hewas a Visiting Scholar with Virginia Tech from 2011to 2012. He is currently a Professor with the Collegeof Computer Science, South-Central University forNationalities, China. His research interests includeperformance optimization and protocol design ofwireless networks.

Jiannong Cao (F’15) received the B.Sc. degree incomputer science from Nanjing University, Nanjing,China, and the M.Sc. and Ph.D. degrees in computerscience from Washington State University, Pullman,WA, USA. He is currently a Chair Professor andthe Head of the Department of Computing, TheHong Kong Polytechnic University, Hong Kong. Hehas co-authored three books, co-edited nine books,and authored over 300 papers in major internationaljournals and conference proceedings. His researchinterests include parallel and distributed computing,

wireless networks and mobile computing, big data and cloud computing,pervasive computing, and fault tolerant computing. He is a Senior Memberof the China Computer Federation and a member of the ACM. He was theChair of the Technical Committee on Distributed Computing of the IEEEComputer Society from 2012 to 2014. He has served as an Associate Editorand a member of the editorial boards of many international journals, includingthe ACM Transactions on Sensor Networks, the IEEE TRANSACTIONS ONCOMPUTERS, the IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED

SYSTEMS, the IEEE NETWORKS, PERVASIVE AND MOBILE COMPUTING

JOURNAL, and Peer-to-Peer Networking and Applications. He has also servedas a Chair and a member of organizing/program committees for many interna-tional conferences, including PERCOM, INFOCOM, ICDCS, IPDPS, ICPP,RTSS, DSN, ICNP, SRDS, MASS, PRDC, ICC, GLOBECOM, and WCNC.


Recommended