Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2008

Open Access 01.12.2008 | Research Article

Throughput of Cellular Systems with Conferencing Mobiles and Cooperative Base Stations

verfasst von: O. Simeone, O. Somekh, G. Kramer, H. V. Poor, S. Shamai (Shitz)

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2008

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

This paper considers an enhancement to multicell processing for the uplink of a cellular system, whereby the mobile stations are allowed to exchange messages on orthogonal channels of fixed capacity (conferencing). Both conferencing among mobile stations in different cells and in the same cell (inter- and intracell conferencing, resp.) are studied. For both cases, it is shown that a rate-splitting transmission strategy, where part of the message is exchanged on the conferencing channels and then transmitted cooperatively to the base stations, is capacity achieving for sufficiently large conferencing capacity. In case of intercell conferencing, this strategy performs convolutional pre-equalization of the signal encoding the common messages in the spatial domain, where the number of taps of the finite-impulse response equalizer depends on the number of conferencing rounds. Analysis in the low signal-to-noise ratio regime and numerical results validate the advantages of conferencing as a complementary technology to multicell processing.

1. Introduction

Recent information-theoretic results have shown that high-rate transmission over networks without any infrastructure (ad hoc networks) is bound to be infeasible over a large scale [1]. Notice that this is envisaged to be true even if recent results show that, under demanding assumptions on channel state information availability and by resorting to complex transmission schemes, high-scale transmission on ad hoc networks can in principle be achieved [2]. Therefore, the solution of choice for providing broadband communications necessarily implies the support of an infrastructure made of base stations (BSs or access points) connected by a high-capacity backbone. This class of solutions includes conventional cellular systems, where BSs are regularly placed in the area of interest [3]; distributed antenna systems, which are characterized by a less regular (e.g., random) deployment [4]; and hybrid networks, where infrastructure nodes coexist with multihopping [5]. In all these networks, a solution that promises to greatly improve the overall throughput and that is gaining increasing interest in the community is multicell processing. This refers to the class of transmission/reception technologies that exploit the high-capacity backbone among the BSs to perform joint encoding/decoding at different cell sites (see [6, 7] for a list of references).
In this paper, we focus on the uplink of a cellular system and investigate a potential improvement to multicell processing. In particular, we consider a network where additional spectral resources allow nearby mobile stations (MSs) to exchange signals over finite-capacity channels that are orthogonal to the main uplink channel. This condition models the out-of-band relaying scenario for cooperative cellular networks discussed in, for example, [8], which can be realized when MSs are equipped with an orthogonal wireless interface (say Bluetooth or Wi-Fi) that is not available at the BSs. While with ordinary multicell processing only the BSs are enabled to cooperate (for joint decoding), in our setting MSs are allowed to collaborate as well, but only through finite-capacity and localized links. The limitation and localization of the inter-MS channels contrast with the typical assumption of unlimited and global connectivity among the BSs via the high-capacity backbone [3, 6, 7], which is reasonable due to topological and infrastructure constraints. However, see [9] for a recent work that considers multicell processing with limited backhaul capacity. Our goal is to bring insight into effective transmission strategies that exploit these additional system resources and into the performance gains that might be harnessed by deploying such technology.

1.1. Main Contributions

In modeling the interaction among the terminals, we follow the framework of conferencing encoders first studied in [10] in the context of a two-user multiple access channel and then extended in a number of recent works to other scenarios (see, e.g., [11, 12] and references therein). Moreover, the topology of a cellular system is abstracted according to the linear version of the model introduced in [3] (see [6, 7] for a review of related papers). We will refer to this model in the following as the linear Wyner model. Under such assumptions, we consider two scenarios: in the first, only one MS is active in each cell at any given time (intracell time-division multiple access (TDMA)) and conferencing channels exist between MSs belonging to adjacent cells (intercell conferencing); in the second, simultaneous uplink transmission by multiple MSs per cell is allowed and conferencing channels are present only among MSs sharing the same cell (intracell conferencing). These two scenarios conceivably correspond to limiting situations with either small cells, so as to enable intercell conferencings or large cells, where only connections among same-cell MSs are feasible. Our main contributions are as follows.
(i)
An achievable rate for the linear Wyner model with conferencing MSs is presented for both cases of intercell conferencing with intracell TDMA and intracell conferencing (Propositions 3 and 5). The considered transmission scheme prescribes rate splitting at the MSs, where part of the message (the "common" message) is exchanged during the conference phase among neighboring (out-of-cell or in-cell) MSs and transmitted cooperatively to the BSs.
 
(ii)
In the case of intercell conferencing, the considered transmission scheme performs convolutional pre-equalization of the signal encoding the common messages in the spatial domain, where the equalizer is a finite-impulse response (FIR) filter whose number of taps depends on the number of conferencing rounds.
 
(iii)
For both inter-and intracell conferencing, the considered transmission schemes are proved to be optimal as long as the conferencing capacity is large enough (Propositions 5 and 6).
 
(iv)
An approximate analysis in the low signal-to-noise ratio regime is presented that gives further insight into the advantages of conferencing (Sections 2.5 and 3.5).
 
(v)
It is shown that intracell TDMA is not optimal in the presence of intracell conference channels as opposed to the basic scenario without conferencing studied in [3] (Section 3).
 
Finally, numerical results validate the relevant advantages of intercell and intracell conferencing (Sections 2.6 and 3.6).
In addition to the quickly growing body of work on multicell processing for cellular systems [6, 7], there has recently been some activity around the basic idea of complementing and comparing the advantages of cooperation between BSs with some form of collaboration at the MS level as well. In [1315], the basic linear Wyner model was extended by including a layer of dedicated relay terminals, one for each cell, that forward traffic from MSs to BSs (uplink). Focusing on intracell TDMA, different transmission schemes were considered, namely half-duplex and full-duplex amplify-and-forward in [13, 15], respectively, and decode-and-forward in [14], and the respective merits of multicell processing and MS cooperative transmission technologies, and combinations thereof, were discussed. Another related work is [16], where the linear Wyner model with intracell TDMA and single-cell processing was modified by assuming that the active MS in a given cell knows (noncausally) the messages to be sent by a number of its neighbors (as might be the case in some implementations of the principle of cognitive radio).
Notation: throughout the paper, bold letters denote either vectors or matrices; upper-case letters are used for random variables, while lower-case letters indicate specific realizations of the corresponding random variable.

2. Intercell Conferencing with Intracell TDMA

In this section, we consider the first scenario of interest, which consists of a modification of the linear Wyner model with intracell TDMA where intercell conferencing channels are present.

2.1. System Model

We consider the uplink of a cellular system abstracted according to the linear Wyner model as sketched in the upper part of Figure 1. https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq1_HTML.gif cells are arranged into a linear array, where each cell contains https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq2_HTML.gif MSs ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq3_HTML.gif in the figure). Following [3], the signal transmitted by each MS is received only by the same-cell BS, with unitary gain, and by the two adjacent BSs with intercell gain https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq4_HTML.gif As anticipated, we consider at first the case, where only one MS transmits in each cell at any give time in a TDMA fashion (intracell TDMA). It should be remarked that this choice does not entail any loss of optimality in a basic Wyner model with no conferencing, as shown in [3]. Overall, defining as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq5_HTML.gif the input symbol of the MS active in the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq6_HTML.gif th cell, the signal received by the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq7_HTML.gif th BS reads ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq8_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq9_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq10_HTML.gif )
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq11_HTML.gif is an independent and identically distributed (i.i.d.) sequence of complex noise samples. The noise samples https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq12_HTML.gif are Gaussian with independent real and imaginary parts that each have zero mean and variance 1/2, and we write this as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq13_HTML.gif ~ CN(0,1). Notice that we assume full (symbol and codeword) synchronization among the cells. We focus on multi-cell processing, that is we assume that the signals received by the BSs, https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq14_HTML.gif , are jointly processed by a central unit that detects the transmitted signals. Finally, each MS has an average power constraint of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq15_HTML.gif so that the available power per cell is https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq16_HTML.gif . With intracell TDMA, each MS is active for a fraction https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq17_HTML.gif of the time, wherein it can transmit with power https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq18_HTML.gif , still satisfying the average power constraint. The power constraint then is given by https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq19_HTML.gif which can be interpreted as the signal-to-noise-ratio (SNR) for the system at hand. We remark at this point that in the following we will be interested in limiting results for a very large number of cells ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq20_HTML.gif ); edge effects can be handled as in [3] and we will neglect them in the presentation below, unless explicitly stated otherwise. We refer the reader to [7] for a discussion of the relevance of this asymptotic regime in practical scenarios with a limited number of cells.
We now extend the basic linear Wyner model discussed above to include conferencing among the active MSs in adjacent cells (intercell conferencing). A different variation of the Wyner model where intracell conferencing is enabled is discussed in Section 3. As shown in the lower part of Figure 1, with intercell conferencing, https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq21_HTML.gif orthogonal channels with capacity https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq22_HTML.gif (bits/symbol) are assumed to exist; each links the MS currently active in any https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq23_HTML.gif th cell to the active MS in an adjacent cell (i.e., the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq24_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq25_HTML.gif th cell, unless https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq26_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq27_HTML.gif We assume block transmission, as shown in Figure 2. Within any https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq28_HTML.gif th block and in any https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq29_HTML.gif th cell, the MS currently active generates a message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq30_HTML.gif meant to be decoded by the central processor connecting the BSs, where https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq31_HTML.gif is the number of channel uses per block and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq32_HTML.gif is the per-cell rate (bits/channel use). According to a standard information-theoretic assumption, we will consider a large block length https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq33_HTML.gif Transmission of a given set of messages https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq34_HTML.gif takes place in two successive phases (or slots). In the first phase (conferencing phase), during the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq35_HTML.gif th block, the MSs exchange information on the conferencing channels during https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq36_HTML.gif rounds (see further details below). This information collected during the conferencing phase by each active MS is then leveraged to encode the local message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq37_HTML.gif for transmission to the BSs in the ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq38_HTML.gif th block (transmission phase). Notice that, as shown in Figure 2, the conferencing phase corresponding to https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq39_HTML.gif can be carried out at the same time as the transmission phase for messages https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq40_HTML.gif given the orthogonality between the conferencing channels and uplink channel.
To formalize the model discussed in the previous paragraph, we need to specify the coding/decoding operations allowed at different terminals. Given our intracell TDMA assumption, each set of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq43_HTML.gif active MSs uses both the conferencing channels and the uplink channels for a fraction https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq44_HTML.gif of the time. In the following, we focus on a specific set of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq45_HTML.gif active MSs and, furthermore, we drop the dependence on the block index https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq46_HTML.gif for simplicity of notation. For the conferencing phase, following [10], we consider https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq47_HTML.gif rounds of conference. In each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq48_HTML.gif th round ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq49_HTML.gif ), any active https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq50_HTML.gif th MS transmits a message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq51_HTML.gif to the adjacent MSs https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq52_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq53_HTML.gif This depends on the messages received by the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq54_HTML.gif th MS during the previous rounds https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq55_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq56_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq57_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq58_HTML.gif similarly defined) as
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ2_HTML.gif
(2)
where https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq59_HTML.gif is a given deterministic function and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq60_HTML.gif a given alphabet https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq61_HTML.gif For convenience of notation, the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq62_HTML.gif messages transmitted on each link are collected in https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq63_HTML.gif vectors https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq64_HTML.gif The finite capacity of the conferencing links imposes the following constraint on the alphabets [10]:
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ3_HTML.gif
(3)
All the logarithms are to be assumed base-2 in keeping with our measure of information in bits/symbol. For the transmission phase, encoding at each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq65_HTML.gif th MS takes place according to a deterministic mapping https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq66_HTML.gif from the message set and the received conferencing messages to sequences of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq67_HTML.gif (complex) channel symbols https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq68_HTML.gif (codewords) as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq69_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq70_HTML.gif Decoding at the central processor is based on the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq71_HTML.gif signal https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq72_HTML.gif received by the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq73_HTML.gif BSs over the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq74_HTML.gif channel uses according to the deterministic mapping https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq75_HTML.gif : https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq76_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq77_HTML.gif . Following standard definitions, a per-cell rate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq78_HTML.gif is said to be achievable if there exists a sequence of encoders and decoders such that the probability of error https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq79_HTML.gif tends to zero for block length https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq80_HTML.gif

2.2. Reference Results

In this section, we discuss lower and upper bounds on the per-cell achievable rate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq81_HTML.gif in the presence of intercell conferencing. The first result is due to [3] and does not assume a priori intracell TDMA.
Proposition 1 (lower bound, no conferencing [3]).
The per-cell capacity (i.e., maximum achievable per-cell rate) in a basic linear Wyner model with no conferencing ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq82_HTML.gif ) and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq83_HTML.gif is achieved with intracell TDMA and is given by
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ4_HTML.gif
(4)
with
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ5_HTML.gif
(5)
It should be noted that the rate (4) can be understood by regarding the Wyner model of Figure 1 as an intersymbol interference (ISI) channel in the spatial domain, characterized by the channel impulse response https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq84_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq85_HTML.gif denotes the Kronecker delta function) and corresponding transfer function https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq86_HTML.gif in (5) https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq87_HTML.gif Moreover, we emphasize that the rate (4) clearly sets a lower bound on the performance achievable with intercell conferencing since it assumes https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq88_HTML.gif .
The following proposition defines a useful upper bound on the performance attainable with intercell conferencing and intracell TDMA.
Proposition 2 (upper bound, perfect conferencing).
An upper bound on the rate achievable with intercell conferencing and intracell TDMA in the linear Wyner model (with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq89_HTML.gif ) is given by
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ6_HTML.gif
(6)
with
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ7_HTML.gif
(7)
Proposition 2 follows by considering this results followed by considering the cut-set bound [17] applied to the cut that divides MSs and BSs or equivalently by assuming a perfect conferencing phase ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq90_HTML.gif ), where each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq91_HTML.gif th active MS is able to exchange the local message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq92_HTML.gif with all the other active MSs in other cells. In fact, in such an asymptotic regime, joint encoding of the set of messages https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq93_HTML.gif by all the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq94_HTML.gif MSs is feasible, and recalling the equivalence of (1) with an ISI channel, we can conclude that the optimal transmission strategy is defined by the waterfilling solution (7) [18]. Notice that the waterfilling solution is obtained for a sum-power constraint over the MSs, but given the symmetry of our setting, it also applies to the considered per-MS power constraint. It should also be remarked that this result shows that, in the limit https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq95_HTML.gif a stationary input in the spatial domain with power spectral density https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq96_HTML.gif is capacity achieving. This conclusion will be used in the next section to bring insight into the performance of intercell conferencing with finite capacity. While the upper bound (6)-(7) is reported here in integral form, in Appendix A we present a closed-form expression for (6) that holds in a specific regime of interest.

2.3. An Achievable Rate

In this section, we derive an achievable rate for the Wyner model with intercell conferencing and intracell TDMA and discuss some of the implications of this result.
Proposition 3 (achievable rate).
The following per-cell rate is achievable for the linear Wyner model with intercell conferencing and intracell TDMA for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq97_HTML.gif and any https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq98_HTML.gif :
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ8_HTML.gif
(8)
with constraints
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ9_HTML.gif
(9a)
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ10_HTML.gif
(9b)
definitions: https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq99_HTML.gif and
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ11_HTML.gif
(10)
We briefly discuss the transmission scheme that attains the rate (8) and point out some implications of this result, leaving the details of the proof of achievability to Appendix B. Again, to fix the ideas, consider the set of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq100_HTML.gif active MSs at a given time, one per cell, which employ a fraction of time https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq101_HTML.gif of both the uplink and the conferencing channels. The proposed scheme works as follows. In the conference phase, each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq102_HTML.gif th MS first splits its message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq103_HTML.gif into two parts, say private ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq104_HTML.gif ) and common ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq105_HTML.gif ). Then it shares the common part https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq106_HTML.gif with the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq107_HTML.gif neighboring MSs in cells https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq108_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq109_HTML.gif during https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq110_HTML.gif conferencing rounds. More precisely, in the first round, the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq111_HTML.gif th MS transmits its local common information https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq112_HTML.gif to the two adjacent MSs https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq113_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq114_HTML.gif , which then propagate the information towards the two edges of the network, and so on. Notice that, after the conference phase, each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq115_HTML.gif th MS is aware of the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq116_HTML.gif common messages https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq117_HTML.gif During the transmission phase, each common message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq118_HTML.gif can be then transmitted cooperatively by all the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq119_HTML.gif MSs that have acquired the information on https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq120_HTML.gif in the conferencing phase. On top of the cooperative signal encoding common information, each MS jointly encodes the private message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq121_HTML.gif Gaussian codebooks are employed and the total power https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq122_HTML.gif is divided as (9a) between the common ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq123_HTML.gif ) and private ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq124_HTML.gif ) parts.
As shown by Proposition 3, the impact of intercell conferencing, according to the scheme discussed above, is equivalent to that of allowing precoding (pre-equalization) of the common information by a https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq125_HTML.gif FIR filter https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq126_HTML.gif with frequency response https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq127_HTML.gif (10). The equivalent channel seen by the input symbols encoding the common information (say https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq128_HTML.gif is shown for illustration in Figure 3 for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq129_HTML.gif conference rounds. We emphasize that, while the number of taps increases with the number of conference rounds, the overall achievable rate may suffer according to (8). We further explore this trade-off in Section 2.6 with a numerical example.

2.4. Asymptotic Optimality of the Considered Scheme

From Proposition 3, it is easy to see that the proposed scheme is optimal under a specific asymptotic regime, as stated in the following Proposition.
Proposition 4 (asymptotic optimality).
The transmission scheme achieving the rate (8) is optimal for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq133_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq134_HTML.gif
Proof.
It is enough to prove that the rate (8) equals the upper bound (6) under the conditions in the proposition above. This follows easily by setting https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq135_HTML.gif (and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq136_HTML.gif and recalling that the optimal power spectral density https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq137_HTML.gif (7) can be approximated arbitrarily well by the frequency response https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq138_HTML.gif in (10) as the number of taps https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq139_HTML.gif increases [19] (which corresponds to perfect cooperation among the MSs).
Remark 1.
The argument in the proof above shows that under the asymptotic conditions stated in Proposition 4, it is optimal to allocate all the power to the common messages, https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq140_HTML.gif (and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq141_HTML.gif and to select the filter https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq142_HTML.gif so that https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq143_HTML.gif
Remark 2.
While in this paper we do not consider fading channels, it is apparent from the discussion above that the advantages of intercell conferencing are related to the possibility of optimizing the transmission strategy based on the knowledge of the channel structure at the MSs. Therefore, intercell conferencing is expected not to provide any performance gain over fading channels in the absence of channel state information at the MSs. This claim can be substantiated by using the results in [20], where it is shown that, in case of independent fading channels even in the presence of statistical channel state information at the transmitter (i.e., at the MSs), the optimal power allocation is asymptotically (in https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq144_HTML.gif ) uniform so that cooperation at the MSs does not provide any advantage. This result holds for channels with column-regular gain matrices (see definition in [20]). The channel considered in this paper belongs to this class when https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq145_HTML.gif .

2.5. Discussion: the Low-SNR Regime

In this section and Section 2.6, we elaborate on the performance of the considered scheme that exploits intercell conferencing. Here, this goal is pursued via an (approximate) analytical approach that focuses on the low-SNR regime according to the framework in [21], whereas in the next section we resort to numerical simulations to study the case of arbitrary SNR. The attention to the low-SNR regime is justified by the fact that, as discussed above, the advantages of intercell conferencing are (asymptotically) related to the opportunity of performing waterfilling power allocation, which is known to provide relevant gains only for low to moderate SNRs (see, e.g., [22]).
According to [21], for low SNRs the rate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq146_HTML.gif of a given transmission scheme can be described by the minimum transmit energy per bit required for reliable communication (normalized to the background noise level) https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq147_HTML.gif (which is obtained for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq148_HTML.gif ) and by the slope https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq149_HTML.gif at https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq150_HTML.gif (measured in https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq151_HTML.gif In the following, we focus for simplicity on the minimum energy per bit https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq152_HTML.gif , and use this criterion to compare the performance of intercell conferencing with the lower and upper bounds (4) and (6) in the low-SNR regime. Starting with the bounds, the minimum energy per bit is given by
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ12_HTML.gif
(11)
for the lower bound (4) (see [7]) and
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ13_HTML.gif
(12)
for the upper bound (6). The latter can be proved by noticing, similarly to [21], that when the SNR tends to zero ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq153_HTML.gif , it is optimal to allocate all the available power around the maximum value of the channel transfer function, https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq154_HTML.gif which occurs at https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq155_HTML.gif In other words, the optimal waterfilling power allocation is https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq156_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq157_HTML.gif is a Dirac delta function. Plugging https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq158_HTML.gif into (6) and using tools from [21], equality (12) is easily shown.
Let us now consider the rate (8) achievable by intercell conferencing. We start with the observation that for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq159_HTML.gif and any finite https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq160_HTML.gif we have https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq161_HTML.gif so that the first term in (8) is dominant and rate (8) is given by
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ14_HTML.gif
(13)
The optimization problem (13) (with constraints (9a) and (9b)) is generally not convex so that finding a global optimal solution is not an easy task [23]. For this reason, we focus on a suboptimal feasible solution that is asymptotically (in the sense of Proposition 4) optimal and allows to gain insight into the performance of intercell conferencing. This solution is based on the observation that, from Remark 1 and from the discussion above, the asymptotically optimal power allocation is https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq162_HTML.gif (and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq163_HTML.gif and the optimal filter https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq164_HTML.gif satisfies https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq165_HTML.gif . Accordingly, with the stated power allocation, here we design for any finite (but large) https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq166_HTML.gif the filter https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq167_HTML.gif so as to approximate the (asymptotically) optimal https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq168_HTML.gif by an ideal low-pass filter with frequency response,
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ15_HTML.gif
(14)
where the bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq169_HTML.gif satisfies https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq170_HTML.gif . Clearly, frequency response (14) can only be approximated by a FIR filter, but the approximation is acceptable for large https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq171_HTML.gif . Hence, under the low-SNR condition and assuming large https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq172_HTML.gif , the rate (13) is given by
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ16_HTML.gif
(15)
so that the minimum energy can be calculated following [21] and after some algebra (We use the second-order approximation: https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq173_HTML.gif ), as
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ17_HTML.gif
(16)
From (16), it is clear that the minimum energy per bit of intercell conferencing (16) is a decreasing function of the number of conferencing rounds https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq174_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq175_HTML.gif as expected from Proposition 4, tends to the optimal performance (12) for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq176_HTML.gif

2.6. Numerical Results

In this section, we present some numerical examples in order to assess the performance of the discussed intercell conferencing scheme. Similarly to the previous section, since the optimization problem (8) that yields the considered achievable rate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq177_HTML.gif is generally nonconvex, here we focus on a simple feasible solution that is asymptotically (in the sense of Proposition 4 https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq178_HTML.gif optimal and allows to gain interesting insight into the system performance. As discussed in Remark 1, for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq179_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq180_HTML.gif the (global) optimal power allocation is https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq181_HTML.gif (and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq182_HTML.gif ) and the optimal frequency response https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq183_HTML.gif satisfies https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq184_HTML.gif . Based on this result, for any choice of the parameters, first the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq185_HTML.gif taps of filter https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq186_HTML.gif are generated according to the frequency sampling method with target amplitude of the frequency response given by the waterfilling solution https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq187_HTML.gif [19] (the filter is scaled to satisfy the constraint (9b)). Then, for fixed filter https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq188_HTML.gif the optimization problem (8) is convex in the powers ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq189_HTML.gif ) and can be solved efficiently by using standard numerical methods [23]. Illustration of the performance of the frequency sampling filter design for different values of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq190_HTML.gif is shown in Figure 4 for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq191_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq192_HTML.gif It can be seen that with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq193_HTML.gif large enough, the FIR filter https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq194_HTML.gif in (10) is able to approximate closely the (asymptotically) optimal waterfilling solution https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq195_HTML.gif
As discussed above, increasing https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq198_HTML.gif is always beneficial to obtain a better approximation of the waterfilling strategy (7). However, due to the finite conferencing capacity https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq199_HTML.gif , it is not necessarily advantageous in terms of the achievable rate (8). To show this, Figures 5 and 6 present the achievable rate (8) versus the intercell gain https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq200_HTML.gif along with the lower bound (4) and upper bound (6) for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq201_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq202_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq203_HTML.gif respectively. Figure 5 shows that, with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq204_HTML.gif while increasing the conferencing rounds from https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq205_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq206_HTML.gif increases the achievable rate, further increments of the number of conferencing rounds https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq207_HTML.gif are disadvantageous, according to the trade-off mentioned above. With a larger capacity https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq208_HTML.gif Figure 6 shows that substantial performance gains can be harnessed by increasing the number of conference rounds, especially from https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq209_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq210_HTML.gif . Moreover, as expected from Proposition 4, having sufficiently large conference capacity https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq211_HTML.gif and sufficiently many conference rounds https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq212_HTML.gif (with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq213_HTML.gif enables the upper bound (6) to be approached.

3. Intracell Conferencing

In this section, we study a different extension of the linear Wyner model, where there exist conferencing channels that link MSs within the same cell so as to enable intracell conferencing. Due to the proximity of same-cell MSs, as detailed below, here it is assumed that a signal transmitted on the conferencing channel within any cell is overheard by all other MSs within the cell. Moreover, unlike the previous section, in the following we do not assume intracell TDMA, that is, same-cell MSs are allowed to transmit to the BSs at the same time.

3.1. System Model

The basic linear Wyner model with multiple active users per cell, say https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq222_HTML.gif is defined as follows. Denoting as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq223_HTML.gif the input symbol of the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq224_HTML.gif th MS ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq225_HTML.gif ) in the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq226_HTML.gif th cell, the signal received by the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq227_HTML.gif th BS is given by ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq228_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq229_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq230_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ18_HTML.gif
(17)
As in Section 2, the per-user power constraint is https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq231_HTML.gif so that a total power constraint per cell of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq232_HTML.gif is enforced.
The basic Wyner model is now extended to allow intracell conferencing. We consider https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq233_HTML.gif intracell multicast channels with capacity https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq234_HTML.gif one per cell; each such channel connects an MS to all the other same-cell MSs, and is accessed by only one MS at each time in a TDMA fashion (see Figure 7). Such channels are orthogonal for different cells and with respect to the main uplink channel. As in Section 2.1, transmission of a given set of messages https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq235_HTML.gif for the ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq236_HTML.gif )th MS with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq237_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq238_HTML.gif occur in two phases that are arranged in a frame structure as shown in Figure 2.
Notice that in Section 2, we considered intracell TDMA so that the total number of conferencing rounds was https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq244_HTML.gif . We again assume https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq245_HTML.gif rounds of conferencing. Each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq246_HTML.gif th MS at any https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq247_HTML.gif th round transmits a message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq248_HTML.gif to all the other MSs in the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq249_HTML.gif th cell (see Figure 7), which is a deterministic function of the previously received messages (recall (2)),
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ19_HTML.gif
(18)
for a given deterministic mapping https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq250_HTML.gif and alphabet https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq251_HTML.gif Notice that, in order to deal with multiple access to the conferencing channels of each cell by the local MSs (only one MS in each cell can access the conferencing channels at any given round), we have extended the alphabet of symbols used for conferencing with a symbol https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq252_HTML.gif , which represent no transmission. Moreover, similarly to (3), the finite capacity of the conferencing links imposes the condition,
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ20_HTML.gif
(19)
where with a slight abuse of notation, we have defined as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq253_HTML.gif the MS that uses the conferencing channel in the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq254_HTML.gif th cell at round https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq255_HTML.gif . Finally, since only one https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq256_HTML.gif th MS in cell https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq257_HTML.gif can transmit in a given round https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq258_HTML.gif , we have that if https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq259_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq260_HTML.gif then https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq261_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq262_HTML.gif
In the transmission phase, encoding at each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq263_HTML.gif th MS takes place according to a deterministic mapping https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq264_HTML.gif from the message set and the received conferencing messages to the codebook as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq265_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq266_HTML.gif Finally, decoding is based on the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq267_HTML.gif signal https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq268_HTML.gif according to the deterministic mapping https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq269_HTML.gif : https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq270_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq271_HTML.gif .

3.2. Reference Results

In this section, we present relevant upper and lower bounds on the achievable rate of the linear Wyner model with intracell conferencing presented above. We first notice that a lower bound on the achievable rate is still set by (4), which corresponds to the case of no conferencing ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq272_HTML.gif ). We now discuss a useful upper bound.
Proposition 5 (upper bound, perfect conferencing).
An upper bound on the rate achievable with intracell conferencing on the Wyner model (with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq273_HTML.gif ) is given by
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ21_HTML.gif
(20)
Similarly to Proposition 2, Proposition 5 follows by assuming a perfect conferencing phase, where each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq274_HTML.gif th MS is able to deliver the entire message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq275_HTML.gif to all the other in-cell MSs. In fact, under such assumption, we observe that all the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq276_HTML.gif MSs in any https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq277_HTML.gif th cell can be seen as a "super-MS" with input symbol https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq278_HTML.gif (recall (17)) and power constraint https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq279_HTML.gif due to coherent power combining.

3.3. An Achievable Rate

Here, we provide an achievable rate for the linear Wyner model with intracell conferencing and describe the transmission scheme that is able to attain it.
Proposition 6 (achievable rate).
The following rate is achievable on the linear Wyner model with intracell processing and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq280_HTML.gif :
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ22_HTML.gif
(21)
with constraint (9a) and definition (5).
A brief sketch of the proof of achievability is in order. The details are worked out in Appendix C. Each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq281_HTML.gif th MS first splits its message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq282_HTML.gif into two parts: say private ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq283_HTML.gif ) and common ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq284_HTML.gif ). The common part https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq285_HTML.gif is then communicated to all the MSs belonging to the same cell in one conference round (a total number of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq286_HTML.gif conference rounds is thus employed). In the transmission phase, all the MSs in a cell cooperate to achieve coherent power combining on the common part of the message, which is transmitted by each user with power https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq287_HTML.gif and received with power https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq288_HTML.gif . The private message is instead jointly encoded by each MS on top of the common message and carries power https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq289_HTML.gif
Remark 3.
It should be noticed that rate (21) is achieved with multiple MSs simultaneously active in each cell. By comparison with rate (8), which is achievable with intracell TDMA, it can be seen that, in case intracell conferencing is allowed, intracell TDMA is not optimal. In fact, as explained above, simultaneous transmission of multiple MSs after intracell conferencing allows coherent power combining to be achieved. This lack of optimality of intracell TDMA in the presence of intracell conferencing clearly contrasts with the results in [3] for the case of no conferencing (see Proposition 1).

3.4. Conditional Optimality of the Considered Scheme

Similarly to the case of intercell processing, the considered scheme based on rate splitting is optimal if the conferencing capacity is large enough. However, in contrast with the previously considered scenario (see Proposition 3), here optimality is obtained for finite conferencing capacity https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq290_HTML.gif
Proposition 7 (conditional optimality).
The transmission scheme achieving the rate (8) is optimal if https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq291_HTML.gif
Proof.
We need to prove that the rate (21) equals the upper bound (20) under the conditions in the proposition above. This follows easily by setting https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq292_HTML.gif (and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq293_HTML.gif .
Remark 4.
The argument in the proof above shows that for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq294_HTML.gif it is optimal to allocate all the available power to the common messages ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq295_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq296_HTML.gif ).

3.5. Discussion: the Low-SNR Regime

For the sake of completeness, similarly to Section 2.5, here we assess the performance of intracell conferencing in the low-SNR regime by calculating the minimum energy per bit https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq297_HTML.gif required for reliable communications. This task is pretty straightforward since the advantages of intracell conferencing are related to the power gain achievable through coherent power combining, which differently from the waterfilling advantage of intercell conferencing is immediate to account for in the low-SNR regime. In particular, the energy https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq298_HTML.gif obtained by the upper bound (20) is given by
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ23_HTML.gif
(22)
which when compared to the lower bound (11), clearly shows the coherent power gain by https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq299_HTML.gif due to cooperation. As proved in Proposition 7, under the assumption https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq300_HTML.gif the achievable rate (21) attains the upper bound so that we clearly have https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq301_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq302_HTML.gif

3.6. Numerical Results

Figure 8 shows the achievable rate (21) versus the transmitted power per cell https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq303_HTML.gif along with the lower bound https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq304_HTML.gif (4) and the upper bounds https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq305_HTML.gif (6) and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq306_HTML.gif (20) for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq307_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq308_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq309_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq310_HTML.gif MSs per cell. Notice that (21) is a convex problem so that global optimality can be attained by using standard numerical methods [23]. From the figure, it is seen that increasing the intracell conferencing capacity https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq311_HTML.gif allows the upper bound https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq312_HTML.gif to be approached and eventually reached (as stated in Proposition 7). Moreover, it is interesting to observe that the best performance achievable with intracell conferencing ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq313_HTML.gif ) is preferable to the best rate attainable with intercell conferencing ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq314_HTML.gif ) lending evidence to the effectiveness of coherent power combining.

4. Conclusions

Most of the current proposals for the enhancement of cellular-based wireless networks, such as the IEEE 802.16j standard are based on cooperative technologies. Among such solutions, multicell processing, where cooperation is at the BS level, is receiving an increasing attention for its significant potential enabled by the high-capacity backbone connecting the BSs. In this paper, we have looked at an extension to this technology, where besides multicell processing, partial cooperation is allowed at the MS level as well. In particular, additional system resources are assumed to be available to provide conferencing channels of finite capacity between nearby MSs. Two limiting scenarios have been considered: one in which conferencing is allowed between MSs belonging to adjacent cells (as is reasonable for small cells) and another where conferencing is possible only among MSs belonging to the same cell. In both cases, a transmission scheme based on rate splitting and cooperative transmission has been proven to be optimal when the conferencing capacity is large enough.
A relevant extension of this work, that is currently under study, is to consider achievable rates for a two-dimensional cellular systems in the spirit of the hexagonal-cell models presented in [3]. The main problem in such scenarios is the propagation of the conferencing messages, which, given the geometry at hand, could possibly benefit from network coding.
A second open problem is that of optimal resource allocation between the conferencing and uplink channels, similar to [24].
A final interesting issue left open by this work is the establishment of capacity-achieving schemes for any value of the conferencing capacity and finite number of cell sites. The main challenge in this regard appears to be the extension of the converse result in [10] to the scenario at hand. In particular, it remains to be determined whether unlike the simpler model in [10], interactive communications among the MSs during the conferencing phase is necessary to achieve capacity. The results of this paper have shown that this is not the case in the regime of high conferencing capacity.

Appendices

A. Closed-form Expression of the upper Bound 6-7 for the Low- https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq325_HTML.gif Large-Power Regime

In this section, we reconsider the upper bound given in Proposition 1 based on waterfilling power allocation and present a closed-form analytical expression of (6)-(7) that hold in a specific regime of low intercell gain https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq326_HTML.gif and high power. We remark that in other regimes (large https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq327_HTML.gif and/or small power), we were not able to obtain such compact expressions.
Proposition 8.
Assume that https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq328_HTML.gif and
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ24_HTML.gif
(A.1)
then the upper bound (6)-(7) becomes
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ25_HTML.gif
(A.2)
Proof.
Under the assumption that the power https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq329_HTML.gif is sufficiently large so that
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ26_HTML.gif
(A.3)
(i.e., the high-power regime), the constraint (7) can be written as
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ27_HTML.gif
(A.4)
where the last equality follows from [25, formula 3.661.4] and some algebra. Hence, from (A.3) and (A.4) the high-power regime is defined by condition (A.1), and the waterfilling constant https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq330_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ28_HTML.gif
(A.5)
Finally, the rate expression is given by
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ29_HTML.gif
(A.6)
where the last equality is achieved by applying [25, formula 4.224.12].

B. Proof of Proposition 3

In this section, the proof of achievability of rate (8) stated in Proposition 3 is provided. For simplicity of notation, we consider https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq331_HTML.gif since the extension to https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq332_HTML.gif requires only straightforward modifications given the intracell TDMA assumption. We consider conference and transmission phases separately.

B.1. Conference Phase

As discussed in Section 2, the first step is to split the message of each MS into private and common parts. More precisely, as in [10], each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq333_HTML.gif th MS partitions the message set https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq334_HTML.gif into https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq335_HTML.gif bins, each containing https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq336_HTML.gif elements with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq337_HTML.gif Index https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq338_HTML.gif is used to identify the bins and index https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq339_HTML.gif to identify the given message within the bin. The index https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq340_HTML.gif is communicated via conferencing to https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq341_HTML.gif neighboring MSs in https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq342_HTML.gif rounds: in the first round each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq343_HTML.gif th MS communicates a given https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq344_HTML.gif to the two neighbors ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq345_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq346_HTML.gif ). In any https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq347_HTML.gif th round with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq348_HTML.gif the MSs propagate what they received in the previous round as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq349_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq350_HTML.gif ). At the end of the conference, message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq351_HTML.gif is known at terminals https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq352_HTML.gif The procedure explained above entails the following constraint on the common rate:
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ30_HTML.gif
(B.1)

B.2. Transmission Phase (After Conference)

After the conference, each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq353_HTML.gif th MS has two kinds of information, a private message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq354_HTML.gif with rate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq355_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq356_HTML.gif common messages https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq357_HTML.gif each with rate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq358_HTML.gif
Codebook Generation
The codebooksare generated as follows. For each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq359_HTML.gif we generate a codebook of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq360_HTML.gif independent codewords https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq361_HTML.gif according to a distribution https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq362_HTML.gif . We label these sequences as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq363_HTML.gif Now, for each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq364_HTML.gif and common messages sets https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq365_HTML.gif we generate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq366_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq367_HTML.gif ) independent codewords https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq368_HTML.gif according to a distribution https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq369_HTML.gif and label them as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq370_HTML.gif
In order to achieve rate (8), we further specialize the distributions as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq371_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq372_HTML.gif as (dropping the dependence on the time index with a slight abuse of notation)
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ31_HTML.gif
(B.2)
where https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq373_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq374_HTML.gif independent of all https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq375_HTML.gif and " https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq376_HTML.gif " denotes convolution. From (B.2) it is clear that the overall impact of conferencing here is to enable linear precoding via the FIR filter https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq377_HTML.gif of the signal encoding common messages ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq378_HTML.gif ) in the spatial domain (recall Figure 3).
Encoding
Each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq379_HTML.gif th MS encodes messages https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq380_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq381_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq382_HTML.gif
Decoding
Decoding is based on the received signal https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq383_HTML.gif and joint typicality; the decoder decides for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq384_HTML.gif , if and only if sequences ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq385_HTML.gif ) are jointly typical and no other triplet of sequences is.
Analysis of Probability of Error
From [26] (see Section 7 therein), we conclude that the following https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq386_HTML.gif conditions guarantee vanishing error probability for block length https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq387_HTML.gif :
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ32_HTML.gif
(B.3)
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ33_HTML.gif
(B.4)
for any two subsets https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq388_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq389_HTML.gif Notationwise, we have defined https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq390_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq391_HTML.gif (and similarly for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq392_HTML.gif while https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq393_HTML.gif denotes the cardinality of the argument set. In order to facilitate calculation of the required mutual information expressions, we substitute (B.2) into (1) so as to obtain the received signal as a function of "private" and "common" symbols https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq394_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq395_HTML.gif respectively,
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ34_HTML.gif
(B.5)
where
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ35_HTML.gif
(B.6)
Consider at first the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq396_HTML.gif constraints (B.3). From (B.5), it is easy to see that
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ36_HTML.gif
(B.7)
with the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq397_HTML.gif th element of the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq398_HTML.gif vector https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq399_HTML.gif being
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ37_HTML.gif
(B.8)
Since (B.8) is a regular Wyner model as in [3] and from Theorem 2.1 therein, we can conclude the dominating condition among the first https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq400_HTML.gif (B.3) is obtained for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq401_HTML.gif for example,
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ38_HTML.gif
(B.9)
(The reader is referred to [3] for a thorough discussion of the border effects in this argument.) Now consider the remaining https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq402_HTML.gif bounds (B.4). In the following, we would like to show that, coupled with (B.9), these conditions identify the achievable ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq403_HTML.gif ) region sketched in Figure 9, which is characterized by the conditions
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ39_HTML.gif
(B.10a)
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ40_HTML.gif
(B.10b)
Since the right-hand side of (B.10b) corresponds to the condition (B.4) with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq404_HTML.gif proving the previous statement amounts to (i) pointing out that the right-hand side of (B.4) https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq405_HTML.gif is a nondecreasing function of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq406_HTML.gif and (ii) showing that for private rate equal to https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq407_HTML.gif the maximum common rate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq408_HTML.gif according to (B.4) is a nonincreasing function of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq409_HTML.gif This latter conclusion can be obtained as follows. Substituting https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq410_HTML.gif into (B.4) (taken with equality), we obtain the following chain of equalities:
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ41_HTML.gif
(B.11)
where (a) is a consequence of the Markov condition https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq411_HTML.gif Now, since the channel seen by https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq412_HTML.gif is an ISI channel with channel response https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq413_HTML.gif and additive noise, we can again apply the same approach as in [3] (see proof of Theorem 2.1 therein) to show that https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq414_HTML.gif is nonincreasing with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq415_HTML.gif
Having established that the region of achievable rates ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq416_HTML.gif ) is (B.10a) and (B.10b), we now need to calculate the two right-hand sides in the limit https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq417_HTML.gif Following [3], we have
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ42_HTML.gif
(B.12)
Finally, using (B.12) with (B.1), we obtain (8).

C. Proof of Proposition 5

As for the proof of Proposition 3, we consider conference and transmission phases separately. The treatment follows closely Appendix B so that here we emphasize only the major differences.

C.1. Conference Phase

Each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq419_HTML.gif th MS splits its message into private and common parts by partitioning the message set https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq420_HTML.gif in https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq421_HTML.gif bins, each containing https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq422_HTML.gif elements with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq423_HTML.gif Index https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq424_HTML.gif is used to identify the bins and index https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq425_HTML.gif to identify the given message within the bin. From the discussion in Section 3, the conferencing messages (18) are then selected as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq426_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq427_HTML.gif so that https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq428_HTML.gif . Furthermore, the finite capacity constraints (19) impose the condition
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ43_HTML.gif
(C.1)

C.2. Transmission Phase (After Conference)

After the conference, each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq429_HTML.gif th MS has two kinds of information, a private message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq430_HTML.gif with rate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq431_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq432_HTML.gif same-cell common messages https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq433_HTML.gif each with rate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq434_HTML.gif so that the overall common message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq435_HTML.gif for the https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq436_HTML.gif th cell has rate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq437_HTML.gif
Codebook Generation
The codebooks are generated as follows. For each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq438_HTML.gif we generate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq439_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq440_HTML.gif independent codewords https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq441_HTML.gif according to a distribution https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq442_HTML.gif and label these sequences as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq443_HTML.gif Now, for each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq444_HTML.gif and for each common message https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq445_HTML.gif we generate https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq446_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq447_HTML.gif ) independent codewords https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq448_HTML.gif according to a distribution https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq449_HTML.gif and label them as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq450_HTML.gif
In order to achieve rate (21), we consider the specific distributions (dropping the dependence on the time index with a slight abuse of notation) https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq451_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq452_HTML.gif , with https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq453_HTML.gif independent of https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq454_HTML.gif
Encoding
Each https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq455_HTML.gif th MS encodes messages https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq456_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq457_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq458_HTML.gif
Decoding
Decoding is based on the received signal https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq459_HTML.gif and joint typicality; the decoder decides for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq460_HTML.gif , if and only if sequences https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq461_HTML.gif are jointly typical and no other triplet of sequences is.
Analysis of Probability of Error
Following [26] (see Section 7 therein), we conclude that the following https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq462_HTML.gif conditions guarantee vanishing error probability for block length https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq463_HTML.gif :
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ44_HTML.gif
(C.2)
for any two subsets https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq464_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq465_HTML.gif We can now follow similar steps as in Section B.2 to show that for https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq466_HTML.gif , (C.2) reduce to
https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_Equ45_HTML.gif
(C.3)
Finally, recalling that the rate per cell is given by https://static-content.springer.com/image/art%3A10.1155%2F2008%2F652325/MediaObjects/13638_2007_Article_1535_IEq467_HTML.gif and using (C.3) with (C.1), we obtain (21).

Acknowledgments

This work was supported by the National Science Foundation under Grants CNS-06-26611 and CNS-06-25637, and by a Marie Curie Outgoing International Fellowship within the 6th European Community Framework Program and by the European Commission in the framework of the FP7 Network of Excellence in Wireless COMmunications NEWCOM++.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Gupta P, Kumar PR: The capacity of wireless networks. IEEE Transactions on Information Theory 2000, 46(2):388-404. 10.1109/18.825799CrossRefMathSciNetMATH Gupta P, Kumar PR: The capacity of wireless networks. IEEE Transactions on Information Theory 2000, 46(2):388-404. 10.1109/18.825799CrossRefMathSciNetMATH
2.
Zurück zum Zitat Ozgur A, Leveque O, Tse D: How does the information capacity of ad hoc networks scale? Proceedings of the 44th Annual Allerton Conference on Communication, Control, and Computing, September 2006, Monticello, Ill, USA Ozgur A, Leveque O, Tse D: How does the information capacity of ad hoc networks scale? Proceedings of the 44th Annual Allerton Conference on Communication, Control, and Computing, September 2006, Monticello, Ill, USA
3.
Zurück zum Zitat Wyner AD: Shannon-theoretic approach to a Gaussian cellular multiple-access channel. IEEE Transactions on Information Theory 1994, 40(6):1713-1727. 10.1109/18.340450CrossRefMathSciNetMATH Wyner AD: Shannon-theoretic approach to a Gaussian cellular multiple-access channel. IEEE Transactions on Information Theory 1994, 40(6):1713-1727. 10.1109/18.340450CrossRefMathSciNetMATH
4.
Zurück zum Zitat Zhou S, Zhao M, Xu X, Wang J, Yao Y: Distributed wireless communication system: a new architecture for future public wireless access. IEEE Communications Magazine 2003, 41(3):108-113. 10.1109/MCOM.2003.1186553CrossRef Zhou S, Zhao M, Xu X, Wang J, Yao Y: Distributed wireless communication system: a new architecture for future public wireless access. IEEE Communications Magazine 2003, 41(3):108-113. 10.1109/MCOM.2003.1186553CrossRef
5.
Zurück zum Zitat Zemlianov A, de Veciana G: Capacity of ad hoc wireless networks with infrastructure support. IEEE Journal on Selected Areas in Communications 2005, 23(3):657-667.CrossRef Zemlianov A, de Veciana G: Capacity of ad hoc wireless networks with infrastructure support. IEEE Journal on Selected Areas in Communications 2005, 23(3):657-667.CrossRef
6.
Zurück zum Zitat Shamai (Shitz) S, Somekh O, Zaidel BM: Multi-cell communications: an information theoretic perspective. Proceedings of the 3rd Joint Workshop on Communications and Coding (JWCC '04), October 2004, Donnini, Italy Shamai (Shitz) S, Somekh O, Zaidel BM: Multi-cell communications: an information theoretic perspective. Proceedings of the 3rd Joint Workshop on Communications and Coding (JWCC '04), October 2004, Donnini, Italy
7.
Zurück zum Zitat Somekh O, Simeone O, Bar-Ness Y, Haimovich A, Spagnolini U, Shamai (Shitz) S: An information theoretic view of distributed antenna processing in cellular systems. In Distributed Antenna Systems: Open Architecture for Future Wireless Communications. Auerbach Publications, CRC Press, New York, NY, USA; 2007. Somekh O, Simeone O, Bar-Ness Y, Haimovich A, Spagnolini U, Shamai (Shitz) S: An information theoretic view of distributed antenna processing in cellular systems. In Distributed Antenna Systems: Open Architecture for Future Wireless Communications. Auerbach Publications, CRC Press, New York, NY, USA; 2007.
8.
Zurück zum Zitat Le L, Hossain E: Multihop cellular networks: potential gains, research challenges, and a resource allocation framework. IEEE Communications Magazine 2007, 45(9):66-73.CrossRef Le L, Hossain E: Multihop cellular networks: potential gains, research challenges, and a resource allocation framework. IEEE Communications Magazine 2007, 45(9):66-73.CrossRef
9.
Zurück zum Zitat Sanderovich A, Somekh O, Shamai (Shitz) S: Uplink macro-diversity with limited backhaul capacity. Proceedings of the International Symposium on Information Theory (ISIT '07), June 2007, Nice, France Sanderovich A, Somekh O, Shamai (Shitz) S: Uplink macro-diversity with limited backhaul capacity. Proceedings of the International Symposium on Information Theory (ISIT '07), June 2007, Nice, France
10.
Zurück zum Zitat Willems FMJ: Informationtheoretical results for the discrete memoryless multiple access channel, Ph.D. thesis. Katholieke Universiteit Leuven, Leuven, Belgium; 1982. Willems FMJ: Informationtheoretical results for the discrete memoryless multiple access channel, Ph.D. thesis. Katholieke Universiteit Leuven, Leuven, Belgium; 1982.
11.
Zurück zum Zitat Maric I, Yates RD, Kramer G: The discrete memoryless compound multiple access channel with conferencing encoders. Proceedings of the International Symposium on Information Theory (ISIT '05), September 2005, Adelaide, Australia 407-410. Maric I, Yates RD, Kramer G: The discrete memoryless compound multiple access channel with conferencing encoders. Proceedings of the International Symposium on Information Theory (ISIT '05), September 2005, Adelaide, Australia 407-410.
12.
Zurück zum Zitat Ng CTK, Maric I, Goldsmith AJ, Shamai (Shitz) S, Yates RD: Iterative and one-shot conferencing in relay channels. Proceedings of the IEEE Information Theory Workshop (ITW '06), March 2006, Punta del Este, Uruguay 193-197. Ng CTK, Maric I, Goldsmith AJ, Shamai (Shitz) S, Yates RD: Iterative and one-shot conferencing in relay channels. Proceedings of the IEEE Information Theory Workshop (ITW '06), March 2006, Punta del Este, Uruguay 193-197.
13.
Zurück zum Zitat Simeone O, Somekh O, Bar-Ness Y, Spagnolini U: Uplink throughput of TDMA cellular systems with multicell processing and amplify-and-forward cooperation between mobiles. IEEE Transactions on Wireless Communications 2007, 6(8):2942-2951.CrossRef Simeone O, Somekh O, Bar-Ness Y, Spagnolini U: Uplink throughput of TDMA cellular systems with multicell processing and amplify-and-forward cooperation between mobiles. IEEE Transactions on Wireless Communications 2007, 6(8):2942-2951.CrossRef
14.
Zurück zum Zitat Simeone O, Somekh O, Bar-Ness Y, Spagnolini U: Low-SNR analysis of cellular systems with cooperative base stations and mobiles. Proceedings of the 14th Asilomar Conference on Signals, Systems and Computers (ACSSC '06), October-November 2006, Pacific Grove, Calif, USA 626-630. Simeone O, Somekh O, Bar-Ness Y, Spagnolini U: Low-SNR analysis of cellular systems with cooperative base stations and mobiles. Proceedings of the 14th Asilomar Conference on Signals, Systems and Computers (ACSSC '06), October-November 2006, Pacific Grove, Calif, USA 626-630.
15.
Zurück zum Zitat Somekh O, Simeone O, Poor HV, Shamai (Shitz) S: Cellular systems with full-duplex amplify-and-forward relaying and cooperative base stations. Proceedings of the International Symposium on Information Theory (ISIT '07), June 2007, Nice, France Somekh O, Simeone O, Poor HV, Shamai (Shitz) S: Cellular systems with full-duplex amplify-and-forward relaying and cooperative base stations. Proceedings of the International Symposium on Information Theory (ISIT '07), June 2007, Nice, France
16.
Zurück zum Zitat Lapidoth A, Shamai (Shitz) S, Wigger M: A linear interference network with local side-information. Proceedings of the International Symposium on Information Theory (ISIT '07), June 2007, Nice, France Lapidoth A, Shamai (Shitz) S, Wigger M: A linear interference network with local side-information. Proceedings of the International Symposium on Information Theory (ISIT '07), June 2007, Nice, France
17.
Zurück zum Zitat Cover TM, Thomas JA: Elements of Information Theory. John Wiley & Sons, New York, NY, USA; 2006.MATH Cover TM, Thomas JA: Elements of Information Theory. John Wiley & Sons, New York, NY, USA; 2006.MATH
18.
Zurück zum Zitat Hirt W, Massey JL: Capacity of the discrete-time Gaussian channel with intersymbol interference. IEEE Transactions on Information Theory 1988, 34(3):380-388.CrossRefMathSciNetMATH Hirt W, Massey JL: Capacity of the discrete-time Gaussian channel with intersymbol interference. IEEE Transactions on Information Theory 1988, 34(3):380-388.CrossRefMathSciNetMATH
19.
Zurück zum Zitat Oppenheim AV, Schafer RW, Buck JR: Discrete-Time Signal Processing. Prentice Hall, Upper Saddle River, NJ, USA; 1999. Oppenheim AV, Schafer RW, Buck JR: Discrete-Time Signal Processing. Prentice Hall, Upper Saddle River, NJ, USA; 1999.
20.
Zurück zum Zitat Tulino AM, Lozano A, Verdú S: Impact of antenna correlation on the capacity of multiantenna channels. IEEE Transactions on Information Theory 2005, 51(7):2491-2509. 10.1109/TIT.2005.850094CrossRefMATH Tulino AM, Lozano A, Verdú S: Impact of antenna correlation on the capacity of multiantenna channels. IEEE Transactions on Information Theory 2005, 51(7):2491-2509. 10.1109/TIT.2005.850094CrossRefMATH
21.
Zurück zum Zitat Verdú S: Spectral efficiency in the wideband regime. IEEE Transactions on Information Theory 2002, 48(6):1319-1343. 10.1109/TIT.2002.1003824CrossRefMATH Verdú S: Spectral efficiency in the wideband regime. IEEE Transactions on Information Theory 2002, 48(6):1319-1343. 10.1109/TIT.2002.1003824CrossRefMATH
22.
Zurück zum Zitat Telatar E: Capacity of multi-antenna Gaussian channels. European Transactions on Telecommunications 1999, 10(6):585-595. 10.1002/ett.4460100604CrossRef Telatar E: Capacity of multi-antenna Gaussian channels. European Transactions on Telecommunications 1999, 10(6):585-595. 10.1002/ett.4460100604CrossRef
23.
Zurück zum Zitat Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2004.CrossRefMATH Boyd S, Vandenberghe L: Convex Optimization. Cambridge University Press, Cambridge, UK; 2004.CrossRefMATH
24.
Zurück zum Zitat Ng CTK, Jindal N, Goldsmith AJ, Mitra U: Capacity gain from two-transmitter and two-receiver cooperation. IEEE Transactions on Information Theory 2007, 53(10):3822-3827.CrossRefMathSciNet Ng CTK, Jindal N, Goldsmith AJ, Mitra U: Capacity gain from two-transmitter and two-receiver cooperation. IEEE Transactions on Information Theory 2007, 53(10):3822-3827.CrossRefMathSciNet
25.
Zurück zum Zitat Gradshteyn IS, Ryzhik IM: Table of Integrals, Series, and Products. Academic Press, Boston, Mass, USA; 1994.MATH Gradshteyn IS, Ryzhik IM: Table of Integrals, Series, and Products. Academic Press, Boston, Mass, USA; 1994.MATH
26.
Zurück zum Zitat Slepian D, Wolf JK: A coding theorem for multiple access channels with correlated sources. Bell System Technical Journal 1973, 52(7):1037-1076.CrossRefMathSciNetMATH Slepian D, Wolf JK: A coding theorem for multiple access channels with correlated sources. Bell System Technical Journal 1973, 52(7):1037-1076.CrossRefMathSciNetMATH
Metadaten
Titel
Throughput of Cellular Systems with Conferencing Mobiles and Cooperative Base Stations
verfasst von
O. Simeone
O. Somekh
G. Kramer
H. V. Poor
S. Shamai (Shitz)
Publikationsdatum
01.12.2008
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2008/652325

Weitere Artikel der Ausgabe 1/2008

EURASIP Journal on Wireless Communications and Networking 1/2008 Zur Ausgabe