CDMA Codeword Optimization: interference avoidance and convergence via class warfare
Christopher Rose
WINLAB,
Dept. of Electrical and
Computer Engineering
Rutgers University
94 Brett Road
Piscataway NJ 08854-8060
email: | crose@winlab.rutgers.edu |
Abstract
Interference avoidance has been shown to reduce total square
correlation (TSC) for given ensembles of user signature waveforms
(codewords) in a synchronous CDMA system. In all experiments we have
conducted, sequential application of interference avoidance produces
an optimal codeword set when starting from randomly chosen initial
codewords. Here we provide the first formal proof of convergence to
optimal codeword ensembles for greedy interference avoidance
algorithms augmented by a technique called ``class warfare'' whereby
users which reside in more heavily loaded areas of the signal space
purposely interfere with (attack) the reception of users in less crowded areas.
Coordination of deliberate interference by a complete class of
aggrieved user is also sometimes necessary. Such ``attacks'' and
subsequent codeword adjustment by attacked users are shown to strictly
decrease TSC. Along the way we also show, using linear algebra and a
variant of stochastic ordering, equivalence between minimization of
total square correlation (TSC) and maximization of sum capacity.
KEYWORDS: Codeword optimization, codeword adaptation, adaptive modulation, interference
avoidance
Contents
1 Introduction
2 Greedy Interference Avoidance: a brief review
3 Convergence Via Class Warfare
3.1 Some Preliminaries
3.2 Warfare Algorithm Overview
3.3 Attacking the Devil You Know
3.4 Attacking the Devil You Don't Know
3.5 Leveling the Playing Field Through Cooperation
4 Properties of Eigenvalue Sets for \@mathbf S\@mathbf ST + \@mathbf W
4.1 Bounds On Partial Sums of Ordered Eigenvalues
4.2 The Lower Bound Is the Optimal l-Constellation
5 Warfare Minimizes TSC (Maximizes Sum Capacity)
5.1 Preliminaries
5.2 The Bounds of Equation (61)
5.3 The l-Constellation Bound Is the Stopping Condition
5.4 A Level Playing Field Attained, Eventually
5.5 Practical Considerations: a quantitative sketch
6 Summary and Conclusion
A The Greedy Interference Avoidance Algorithm
B When Single User Warfare Fails
C Sum Capacity Derivation
D Proof of Theorem 5
E Acknowledgements
1 Introduction
Interference avoidance has been identified as a method to iteratively
obtain optimal signature waveforms (codewords) in multiple access
systems [1,2,3,4,5]. The notion behind
interference avoidance is that each user, with feedback from the
receiver, is allowed to adjust its waveform to minimize interference.
Empirically speaking, sequential iterative updates by all users always
results in a set of codewords which maximize various measures of
system capacity [6,7,8] and minimize a
measure of mutual interference called the total square correlation
(TSC). There are even analytic hints that interference avoidance
should always converge to an optimal ensemble [3].
Unfortunately, even copious empirical evidence where never has a
suboptimal set been obtained starting from random codewords
[1,2,3,4,5] and
strong analytic hints are unsettling and hamper work which depends on
provable convergence of greedy interference avoidance
[2,9].1
Therefore, in this paper we modify the basic greedy interference
avoidance procedure to (a) maximally reduce TSC at each iteration
and (b) to include an aggressive component whereby users
who reside in a more crowded portion of the signal space deliberately
interfere with (attack) other users in more sparsely populated
dimensions. The procedure, dubbed class warfare, allows escape
from suboptimal minima, and coupled to the finite number of possible
fixed point TSC values for greedy interference avoidance, forces
convergence to codeword sets which minimize the average mutual
interference between codewords.
Along the way it will also be shown directly via elementary linear
algebra and a variant of stochastic ordering methods that TSC
minimization is equivalent to sum capacity maximization, and thereby,
that greedy interference avoidance with class warfare achieves signal
sets which meet sum capacity bounds. We note that a slightly more
compact statement of this equivalence can be obtained by an appeal to
matrix majorization theory [11,8,12].
However, the direct approach presented here is useful in that it can
be wholly understood from first principles without collateral
references.
2 Greedy Interference Avoidance: a brief review
We assume that user signals can be represented by N ×1 vectors
sm in some arbitrary signal space.
The power of each signal vector is defined as pm = |sm|2.
Information is carried by corresponding independent zero mean, unit
mean square bm and the superposition bathed in some noise process,
represented by a N ×1 noise vector w. The result is that
the N ×1 received signal vector y is given by
where b is the M ×1 vector of modulations corresponding to each
codeword and S has M columns composed of the sm. As a concrete
example, the sm might be the ±1
chip sequences of standard CDMA codewords. However, more generally,
they could also be coefficient sequences for any convenient
orthonormal signal representation.
The total interference power experienced by user m assuming
a simple matched filter receiver is
E |
é ë
|
æ è
|
smT
|sm|
|
[ Sb- sm bm + w] |
ö ø
|
2
|
ù û
|
= |
smT(SST+ W- sm smT) sm
|sm|2
|
|
| (2) |
where
and W is the covariance matrix of the noise vector w.
Equation (2) suggests that user m could minimize the interference
seen at the receiver by choosing sm proportional to the
eigenvector associated with the minimum eigenvalue of SST+W- sm smT. This simple intuitively pleasing greedy procedure when applied
sequentially by all users, results at each iteration in the reduction of a quantity
called the total square correlation (TSC) - a measure of the average
interference seen by all users
[1,2,3,4,5]:
Furthermore, empirically speaking, the fixed point reached by this
iterative procedure invariably has the absolute minimum TSC attainable
[5]. Other procedures have also been shown to reduce TSC
[1,3], but here we consider only greedy procedures
which reduce interference for each user if at all possible. A formal
statement of the greedy algorithm used here is provided in Appendix A.
At any fixed point of the algorithm, each sm must obviously be an
eigenvector of SST+ W. Equally obvious, the sm
associated with different eigenvalues must be orthogonal
([13], pp. 212).
This orthogonality leads to the observation that if
lI is the eigenvalue for sk and lII the
eigenvalue for sl, k ¹ l, then we must also have
lI - pk £ lII since otherwise user k could
reduce its interference by setting
sk=Ö{pk}sl/|sl|.
3 Convergence Via Class Warfare
It is easily seen that there may exist many such fixed points with
differing TSC values. Thus, if we seek to show that greedy
interference avoidance can absolutely minimize TSC, we must first
provide some means of escape from local minima. Then, since
interference avoidance monotonically reduces TSC toward fixed points,
if we show that the possible number of fixed point TSC values is
finite, eventual convergence to the absolute minimum TSC is
unavoidable. To these ends we provide formal escape methods
in which users ``attack'' other users or signal dimensions by deliberate interference,
or artful encroachment on less crowded portions of the signal space.
It should be noted that since we assume all user signals are collected
at common antennas and it is the reception point which feeds optimal
codewords back to users, the notion of unilateral ``attack'' is more a
useful analogy than an operational principle. That is, class warfare
is more an analytic method to escape suboptimal minima than a distributed
algorithmic method of guaranteeing minimum TSC ``in the wild''. Of
course, as software radios become more powerful and sophisticated, a
useful systems-level paradigm might have semi-autonomous software
agents responsible for decoding each user's signal as opposed to the
centralized multiuser architectures of today
[14,15,16,17,18,19].
In such a case, where
agents may or may not collaborate directly, a warfare analogy might be
more accurate. However, since all previous numerical experiments indicate that
interference avoidance algorithms seem to converge without the help of
escape methods or which codeword is chosen for replacement at
a given step, even here the point is somewhat moot, and we reiterate
that the term class warfare is a conceptual crutch for an analytic
method of TSC minimization.
3.1 Some Preliminaries
Assume with no loss of generality that the equilibrium codeword
ensemble consists of three known sets {ak,bl,cj } such that
SST = |
Ka å
k=1
|
ak akT+ |
Kb å
l = 1
|
bl blT+ |
M-Ka-Kb å
j=1
|
cj cjT |
| (5) |
and
(W+ SST) ak = lIak,
(W+ SST) bl = lIIbl
and
(W+ SST) cj = ljcj
with lI > lII and lj ¹ lI,lII. By virtue of their different eigenvalues, codewords of different classes,
{ak,bl,cj }, are mutually orthogonal. Finally, since it is
possible that the codewords might not span ÂN, we also admit the
possibility of a set { dm } of eigenvectors for (W+SST) with cardinality Kd and associated eigenvalues lm which are
themselves mutually orthogonal as well as orthogonal to the codeword
sets {ak,bl,cj }.
For equal power codewords, each codeword from the set {ak}
suffers greater interference than each codeword from the set
{bl}. For unequal power, we can only say that set
{ak} is in a more energetic (including the set energy) portion of the
signal space than set {bl}. The assumption that the
codeword constellation be a fixed point of a greedy interference
avoidance algorithm requires lI - li £ mink|ak|2 where li is any other eigenvalue
of W+SST.
We assume a basis set {fi }, i=1,2,¼,n1, which spans
{ak} and is orthogonal to {bl} and {cj}.
Likewise we assume a basis set { yj}, j=1,2,¼,n2,
(n1+n2 £ N) which spans {bl} and is orthogonal to
{ak} and {cj}, and a basis set { qm },
m=1,2,¼,N-n1-n2 which spans both the
{cj} and {dm} and is therefore orthogonal to
{ak} and {bl}. We will later show
(Theorem 2) that we can always choose these eigenvector sets
as appropriate partitions of the eigenvector set of W. But
for this case where we assume all codewords are known, we leave
{fi }, {yj } and {qm }
as convenient bases for their respective codeword sets.
As a specific example, since all the elements of
{ak} have the same eigenvalue, lI (and similarly for
{bl}), we can assign with no loss of generality, f1 = a1/|a1| and y1=b1/|b1|.
3.2 Warfare Algorithm Overview
An ``attack'' is the placement of energy from
(aggrieved) users residing in a more crowded portion of the signal
space into a dimension occupied by (offending) users in a more
sparsely populated portion of the signal space. Such an attack adds
interference to the offending users and will elicit an avoidance
response which overall reduces TSC.
The specific method of attack is a
simple rotation of the aggrieved codeword (or set of codewords) toward
the offending user codeword (or dimension).
We will analyze three different attack methods. The first is an
attack by one user directly on another. The second is an attack by a
group of users in the same class on a dimension in the offending
class. In both these cases, TSC reduction is dependent upon a
reaction (codeword movement) by the attacked users and will be
effective only if certain requirements are met. The final method of
warfare is used when the first two are ineffective, and is actually
more of a ``migration'' than an attack since it does not depend on the
reaction of the attacked dimension but only on the coordination of the
attack by aggrieved users. If no warfare method will reduce TSC, then
it will be shown that TSC is minimized.
Loosely stated, the warfare-augmented greedy interference avoidance
algorithm is:
- Apply greedy interference avoidance until convergence to a fixed
point codeword ensemble.
-
If warfare can reduce TSC, apply it and then go to 1).
-
If warfare cannot reduce TSC, the ensemble has attained minimum TSC.
This algorithm is ``loose'' since we assume absolute convergence to
fixed point ensembles in finite time for step 1) - which is not true
for greedy interference avoidance in general. However, after
developing the warfare method based on this fixed point assumption, we
will then suggest a more formal ``practical'' algorithm which uses
finite time approximate convergence for step 1.
3.3 Attacking the Devil You Know
Consider a scenario with a single aggrieved user a1
having eigenvalue lI and a known user b1 with eigenvalue
lII < lI. We must have lI - lj £ |a1|2 = p1 where lj is any eigenvalue of W+ SST
and therefore lI - lII £ p1 since otherwise, simple
greedy interference avoidance could be used to reduce TSC. We assume that p1 = 1 with no loss of generality2 so that f1 = a1. Likewise we assume
b1 = by1 where |b1|2 = b2. The aggrieved
user a1 ``attacks'' user b1 by adjusting its codeword to
a1¢ = (cosw) f1 + (sinw) y1 |
| (6) |
so that
a1¢ (a1¢)T = (cos2 w) f1f1T + (sin2 w)y1 y1T+ |
1
2
|
(sin2w)(y1f1T+f1y1T) |
| (7) |
for some non-zero w.
User b1 will react to this
challenge by replacing b1 with b1¢, the new minimum eigenvalue
eigenvector. That is,
(W+ SST- a1 a1T + a1¢(a1¢)T - b1 b1T)b1¢ = l* b1¢ |
| (8) |
where l* is the minimum eigenvalue of
G = W+ SST- a1 a1T + a1¢(a1¢)T - b1 b1T |
| (9) |
We then note that
for i=2,3,¼, n1
for j=2,3,¼, n2, and
for m=1,2,¼, N-n1-n2.
We therefore have N-2 eigenvectors for G.
Since f1 and y1 are orthogonal to these,
the remaining two (new) eigenvectors must be linear superpositions
of f1 and y1, x
= x1 f1 + x2 y1. Depending upon
w, the best new codeword b1¢ might be one of these
two new eigenvectors, or could be another one entirely
chosen from equations (10), (11) and (12). However, we will restrict
our attention to b1¢ of the form
b1¢ = b[ (sinc) f1 + (cosc) y1 ] |
| (13) |
and note that a potentially better choice might exist. That is, by showing suitable
selection of c in equation (13) can strictly reduce TSC, we will have also
shown that a better response to attack can only decrease TSC even more.
With b1¢ as in equation (13) we then have
b1¢ (b1¢)T = b2 |
é ë
|
(sin2 c) f1f1T + (cos2 c)y1 y1T+ |
1
2
|
(sin2c)(y1f1T+f1y1T) |
ù û
|
|
| (14) |
Now we calculate the difference in TSC after the attack and response,
D = Trace[ (SST+ W)2 ] - Trace[ (G+ b1¢ (b1¢)T)2 ] |
| (15) |
Making the required substitutions and defining
|
| |
- [sin2 w- b2sin2 c]f1f1T + [sin2 w- b2 sin2 c] y1 y1T |
|
| |
|
1
2
|
[(sin2w) + b2 (sin2c)] (y1f1T+f1y1T) |
|
|
|
| (16) |
we obtain
D(w,c) = -2 Trace[ (SST+ W)Q(w,c) ]- Trace[ Q(w,c)Q(w,c) ] |
| (17) |
Performing the indicated substitution and remembering that
(SST+ W) f
= lI f and
(SST+ W) y
= lII y yields
|
| |
d(sin2w- b2 sin2 c) - [sin2 w- b2sin2 c]2 - |
1
4
|
[sin(2w) + b2 sin(2c)]2 |
|
|
|
| (18) |
where d = lI - lII. We note that 0 < d £ 1
since we assumed p1 = |a1|2 = 1.
We need to determine whether D > 0 for some choices of w. However,
we first note that for any given w, the response b1¢(c) to the attack
by a1¢(w) will maximize D [5]. Therefore, we first seek
the maximizing c for equation (18). Algebraic manipulations
and trigonometric identities applied to equation (18) yield,3
|
| |
(d-(1-b2))sin2w- |
1
2
|
b2(d+b2) |
|
| |
|
1
2
|
b2 [(d- (1-b2)) (cos2c) + cos(2c+2w) ] |
|
|
|
| (19) |
We then note that
|
max
x
|
|A cos2x + B cos(2x+2w)| = | Ö
|
(A + Bcos2w)2 + B2 sin2 2w
|
|
| (20) |
Therefore letting G = d+b2 we have for
A = G-1 and B=1,
|
| | |
| |
|
1
2
|
(G-d) G |
é ê
ë
|
1 - |
æ Ö
|
|
ù ú
û
|
|
|
|
|
| (21) |
We then note that D(w,c) > 0 relies on having
G- 1 > 0 which in turn implies G- d > 0
since d £ 1.
Thus, the positivity of equation (21) rests on whether $w
such that
(G-1) sin2 w > |
1
2
|
(G-d) G |
é ê
ë
|
1 - |
æ Ö
|
|
ù ú
û
|
|
| (22) |
and we note that the term inside the radical is non-negative so
that the right hand side of equation (22) is non-negative.
Rearranging we have
1 - 2 |
G- 1
G- d
|
|
1
G
|
sin2 w < |
æ Ö
|
|
|
| (23) |
and we again note that since the term inside the radical is non-negative
(4(G-1)sin2w/G2 £ 1 ) that
the left hand side of equation (23) is non-negative as well. So,
squaring both sides and simplifying leads to
which is true for some small enough w, so long as d > 0.
Thus,
and
suffice for the existence of an w such that D(w,c) > 0.
We summarize and generalize the result as a theorem:
Theorem 1
Suppose a single user with codeword power a2 and eigenvalue
lI attacks another user with codeword power b2 and
eigenvalue lII < lI by adjusting its codeword according to
equation (6). Further suppose that the attacked user responds
by adjusting its codeword to obtain the maximum possible SINR.
Then there exists an attack parameter w that will be successful
in strictly reducing TSC if d = lI - lII > 0
and d > a2 - b2.
This result is intuitively pleasing since it makes little sense to
engage in warfare if at best what you gain
(lII-b2) is no better than what you already have
(lI - a2). Reworking these two expressions leads directly to
b2 > a2-d. Another looser but more memorable
condition can be had by noting that since d > 0, any b2 ³ a2 allows D(w,c) > 0. Since b2 = a2 implies
equal power aggrieved and offending users, b2 > a2 implies a
weaker user attacking a stronger user. Thus, we may say that TSC can
always be strictly reduced whenever a less powerful user with
associated eigenvalue lI attacks an equal or more powerful
user with associated eigenvalue lII < lI.
3.4 Attacking the Devil You Don't Know
Now suppose that user codewords in one class are unknown to those in
another so that a directed attack against a particular user is
infeasible. However, if the background noise covariance
W is known to all users, then an aggrieved user could
measure the signal energy along dimensions (eigenvectors) of the noise
covariance and attack specific offending dimensions.
We will find the following two theorems useful. The first theorem
pertains to the relationship between equilibrium codeword sets and the
eigenspace of the noise covariance matrix W.
Theorem 2
At equilibrium, codewords with different eigenvalues reside in
mutually orthogonal spaces. These spaces are spanned by mutually
orthogonal partitions of an eigenvector set for W. Furthermore,
W shares a complete set of eigenvectors with SST+W
at equilibrium.
Proof: Theorem 2
Consider a set of codewords { ai } with cardinality m1,
dimensionality n1 and associated unique eigenvalue la.
Let us then define
where
and Z is a matrix containing the codewords with
eigenvalues other than la.
We then have
(SST+ W) ai = (AAT + ZZT + W) ai = (AAT + W)ai = la ai |
| (29) |
Note that any linear combination of the { ai } is also
an eigenvector of SST+ W since all the
ai share the same eigenvalue la.
Since AAT + W has a full set of eigenvectors and the
{ ai } are spanned by exactly n1 of them, there must be an additional
N-n1 eigenvectors fm which lie in the
orthogonal complement of {ai } and therefore satisfy
(AAT + W) fm = Wfm = lm fm |
| (30) |
so that they are eigenvectors of W as well.
Since there are exactly N-n1 of these eigenvectors, the remaining
n1 eigenvectors fi, i=1,2,¼, n1 of W
must form the basis for the set {ai}.
Extending this result, we see that for all sets of codewords with the
same eigenvalue, there must be an associated set of eigenvectors of
W which exactly spans the space of these codewords. Therefore,
equilibrium codewords which share different eigenvalues reside in
different partitions of the noise covariance signal space.
Finally, as mentioned previously, each of the eigenvectors of W which span the
codeword space can be expressed as a suitable linear combination
of codewords
j=1,2,¼,n1. Therefore, since (SST+ W)sm = la sm we can also find (SST+ W)fj = lafj with all the fj eigenvectors of SST+ W
with eigenvalue la. This completes the proof.
·
It is worth mentioning that from this point onward we will express
codewords as linear superpositions of the noise covariance eigenvector
partition in which they reside as opposed to the arbitrary basis set
used in section 3.3. The next theorem establishes a
relationship between the mutual correlations of codewords in a given
class and their projections onto a noise covariance eigenvector
contained in that class.
Theorem 3
Let fi, i=1,2,¼,N be a common complete set of
eigenvectors for W and SST+ W (Theorem 2)
with Wfi = si fi. Assume { fi },
i=1,2,¼,L exactly spans the set of codewords sk,
k=1,2,¼,K which share the same eigenvalue l, (SST+W)sk = lsk.
If we define akl = skT fl, then for
rij = siT sj we must have
|
K å
j=1
|
ail ajl(rij - ail ajl) = 0 |
| (32) |
Proof: Theorem 3
By Theorem 2 and Mercer's theorem [20] we have
SST+ W = l |
L å
i=1
|
fi fiT+ |
N å
i=L+1
|
li fi fiT |
| (33) |
where the { fi } is the complete eigenvector set for W.
Since the { sk }, k=1,2,¼,K are exactly spanned by the
fi, i=1,2,¼,L we then have
l |
L å
i=1
|
fi fiT = |
K å
k=1
|
sk skT+ |
L å
i=1
|
si fi fiT |
| (34) |
which implies
|
K å
k=1
|
sk skT = |
L å
i=1
|
(l- si) fi fiT |
| (35) |
We define Ei = l- si, the codeword energy
along eigenvector fi and note that
for aki = fiT sk we have
Ei = åk=1K aki2.
We then have
|
K å
j=1
|
ail ajl (rij - ail ajl) = |
K å
j=1
|
ail rijajl -ail2 El |
| (36) |
and note that
|
K å
j=1
|
ail rijajl = |
K å
j=1
|
flT(si siT)(sj sjT)fl = flT(si siT) |
æ è
|
L å
i=1
|
Ei fi fiT |
ö ø
|
flT = ail2El |
| (37) |
which completes the proof.
·
Now, let A be the aggrieved set of codewords with elements
ai such that (SST+ W)ai = lI ai.
We can write
where f1 is one of the eigenvectors of W which
spans the aggrieved codeword set. We note that
(SST+ W) f1 = lIf1,
that Wf1 = s1f1 and that
(SST+ W) xi = lI xi.
Let S be the (non-empty) set of offending codewords with eigenvalue
lII < lI. And by Theorem 2 let the noise
covariance dimension fN be contained in the span of S
with (SST+ W)fN = lII fN. For the
codewords { si }, i Î S in this set we write
with bi = fNT si.
As for a we note that (SST+ W)fN = lIIfN, that WfN = sNfN
and that (SST+ W) ui = lII ui.
To attack, we rotate each ai into fN as
ai¢ = ai (coswf1 + sinwfN) + xi |
| (40) |
and then script the evasion response by the offending set as
si¢ = bi (coscfN + sincf1) + ui |
| (41) |
To calculate the change in TSC we write
|
| |
aiaiT+ai2 [sin2wfN fNT-sin2wf1 f1T+coswsinw(f1 fNT + fN f1T) ] |
|
| |
ai(cosw- 1)(f1 xiT + xif1T)+aisinw(fN xiT + xifNT) |
|
|
|
| (42) |
and
|
| |
si siT+bi2 [sin2cf1 f1T-sin2cfN fNT+coscsinc(f1 fNT + fN f1T) ] |
|
| |
bi(cosc-1)(fN uiT + uifNT) +bi sinc(f1 uiT + uif1T) |
|
|
|
| (43) |
Therefore,
|
| |
SST+ |
å
i Î A
|
ai2 [sin2wfN fNT-sin2wf1 f1T+coswsinw(f1 fNT + fN f1T) ] |
|
| |
|
å
i Î A
|
ai(cosw- 1)(f1 xiT + xif1T)+ |
å
i Î A
|
aisinw(fN xiT + xifNT) |
|
| |
|
å
i Î S
|
bi2 [sin2cf1 f1T-sin2cfN fNT+coscsinc(f1 fNT + fN f1T) ] |
|
| |
|
å
i Î S
|
bi(cosc-1)(fN uiT + uifNT) + |
å
i Î S
|
bi sinc(f1 uiT + uif1T) |
|
|
|
| (44) |
We then define the total aggrieved codeword energy in f1 as
a2 = åi Î A ai2,
the total offending codeword energy in dimension fN as
b2 = åi Î S bi2 and form Q(w,c) as in section
3.3;
|
| |
(a2 sin2w- b2 sin2c)(fN fNT-f1 f1T) |
|
| |
(a2 coswsinw+b2 coscsinc)(f1 fNT + fN f1T) |
|
| |
|
å
i Î A
|
ai(cosw- 1)(f1 xiT + xif1T)+ |
å
i Î A
|
aisinw(fN xiT + xifNT) |
|
| |
|
å
i Î S
|
bi(cosc-1)(fN uiT + uifNT) + |
å
i Î S
|
bi sinc(f1 uiT + uif1T) |
|
|
|
| (45) |
We then define D(w,c) as in equation (17) and reduce it
to
|
| |
d(a2 sin2 w- b2 sin2 c)-(a2sin2 w- b2 sin2 c)2- |
1
4
|
(b2 sin2c+ a2 sin2w)2 |
|
| |
((cosw-1)2 + sin2w) |
å
i,j Î A
|
aiaj (kij - aiaj) |
|
| |
((cosc-1)2 + sin2c) |
å
i,j Î S
|
bibj (rij - bibj) |
|
|
|
| (46) |
where kij = aiT aj, i,j Î A, rij = siT sj,
i,j Î S and d = lI-lII as before.
By Theorem 3 the terms in (cosw-1)2 + sin2w
and (cosc-1)2 + sin2c must be identically zero so we
have
|
| |
d(a2 sin2 w- b2 sin2 c)-(a2sin2 w- b2 sin2 c)2- |
1
4
|
(b2 sin2c+ a2 sin2w)2 |
|
| |
a4 |
é ë
|
d
a2
|
(sin2 w- |
b2
a2
|
sin2 c)-(sin2 w- |
b2
a2
|
sin2 c)2- |
1
4
|
(sin2w+ |
b2
a2
|
sin2c)2 |
ù û
|
|
|
|
|
| (47) |
Equation (47) is identical to equation (18) within a
factor of a4 if we define [(d)\tilde] = d/a2
and [(b)\tilde] = b/a2. Therefore the result is
identical to that in section 3.3: TSC will be
strictly reduced by dimensional attack so long as [(d)\tilde] > 0
and [(d)\tilde] > 1 - [(b)\tilde]2 which reduces to d > 0 and d > a2 - b2. The only difference is that we
have launched a coordinated attack and have ``scripted'' an ensemble
response (specifically, a rotation by all offending users from the
attacked dimension fN toward the attacking signal dimension
f1) as opposed to assuming individual greedy responses by each
codeword.
3.5 Leveling the Playing Field Through Cooperation
Now suppose that application of greedy interference avoidance has
resulted in a fixed point such that there exists an eigenvector y
of SST+ W with eigenvalue lII < lI
where lI is the eigenvalue of one of the user codewords.
Further, suppose that no sufficiently powerful codeword (or none at
all) resides in the offending dimension y so that attack and response
warfare will be ineffective.4 We will show that in such a case a coordinated
migration into the offending dimension will strictly reduce TSC
unless a simple set of conditions is violated.
As with dimensional attack assume there exist codewords
{ si }, i=1,2,¼,K such that (SST+ W) si = lI si and
we assume the codewords occupy n < N dimensions.
Each codeword ``attacks'' y by forming
si¢ = coswi si + sinwi | Ö
|
pi
|
y |
| (48) |
so that
|
| |
sisiT - sin2 wi si siT+ pisin2 wi yyT |
|
|
| |
|
1
2
|
| Ö
|
pi
|
sin2wi(si yT + ysiT) |
|
|
|
| (49) |
Now we form the new S¢(S¢)T + W
as
where Q
= åi=1K [si¢(si¢)T - si siT].
Using
equation (49) we have
|
| |
- |
K å
i=1
|
sin2 wi (si siT - piyyT) |
|
| |
|
K å
i=1
|
|
1
2
|
| Ö
|
pi
|
sin2wi (si yT + ysiT) |
|
|
|
| (51) |
As found previously (see equation (17)),
the difference in TSC before and after migration is
D = -2Trace[ (SST+ W)Q] - Trace[ Q2 ]. So
defining d = lI - lII as before and
rij = siT sj we have
|
| |
d |
K å
i=1
|
pi sin2 wi- |
K å
i,j=1
|
sin2wisin2wj(rij2 + pi pj)- |
1
4
|
|
K å
i,j=1
|
| Ö
|
pi
|
| Ö
|
pj
|
rijsin2wisin2wj |
|
|
|
| (52) |
Now, for small enough wi, terms on the order of sin4(·) become insignificant
and we have
|
| |
d |
K å
i=1
|
pi wi2- |
K å
i,j=1
|
| Ö
|
pi
|
wirij | Ö
|
pj
|
wj |
|
|
|
| (53) |
If we define
where vi = Ö{pi} wi we see that
|
1
2
|
D(W) » d |
K å
i=1
|
pi wi2-vT Zv |
| (55) |
where Z is a matrix whose entries are zij = rij.
We then note that the K ×K matrix
Z = |
é ê ê ê ê
ê ê ê ë
|
|
ù ú ú ú ú
ú ú ú û
|
|
é ê ê ê
ê ê ë
|
|
ù ú ú ú
ú ú û
|
|
| (56) |
will be singular if the si are linear combinations of only n < K
eigenvectors fj. In such a case there exists a non-zero vector
v for which vT Zv
= 0. And since dåi=1K pi wi2 > 0 for any of the
wi nonzero, we can always find a set of suitably small {wi } for which D(W) > 0.
We summarize the result as a theorem:
Theorem 4
Let {si} be the set of all codewords which share a common
eigenvalue lI. Let y be an eigenvector of W
orthogonal to all the { si } and for which
(SST+ W)y
= lII y where lI - lII = d > 0.
TSC can always be strictly reduced by coordinated attack on dimension y
if the number of codewords is at least one more than the number of dimensions they span.
4 Properties of Eigenvalue Sets for SST+ W
Since TSC is the trace of (SST+ W)2 we see that TSC depends
only on the eigenvalues of SST+W, { li }. That
is, Trace[ (SST+W)2 ] = åi li2. To more easily
distinguish one eigenvalue set from another, we assume that each set
is ordered from largest to smallest and
define such ordered sets as l-constellations. We
will then derive order bounds which must be obeyed by all possible
l-constellations and show that when the bounds are met with
equality, TSC is minimized and that almost incidentally, the sum
capacity (see Appendix C) of the codeword set is maximized.
4.1 Bounds On Partial Sums of Ordered Eigenvalues
We define the eigenvalue and eigenvector set of the noise covariance
matrix W as { si } and { fi } respectively,
i=1,2, ¼, N. With no loss of generality, we assume that the
{ si } and the signal energies { pk }, k=1,2, ¼,M are ordered as si ³ si+1 and pk ³ pk+1.
For convenience, we also define P = åk=1M pk and U = åi=1N si. We will assume at least as many codewords as
dimensions (M ³ N) since if not, optimality dictates that the
codewords be contained in the space spanned by the M least noisy
dimensions - those with energies sN, sN-1, ¼,sN-M+1. Our approach is to find lower bounds to sums of
ordered eigenvalues of SST+ W, li ³ li+1.
Now, for any matrix Q with eigenvalues
{ mi } ordered from largest to smallest we have ([13], pp. 253),
|
max
xiT xj = dij
|
|
k å
i=1
|
xiT Qxi = |
k å
i=1
|
mi |
| (57) |
Consider then
SST+ W= |
M å
i=1
|
si siT+ |
N å
j=1
|
sj fj fjT |
| (58) |
and that
|
max
|x|=1
|
xT (SST+ W) x = l1 |
| (59) |
It follows immediately that l1 ³ s1 and
l1 ³ |s1|2 + sN = p1 + sN. Equally obvious is that
l1 ³ (P+U)/N [5,6,8].
Slightly less obvious is that
l1 ³ |
1
k
|
|
k å
i=1
|
(pi + sN-i+1) |
| (60) |
for k=1,2,¼, N-1. This may be shown by noting that
åi=1k li ³ åi=1k (pi + sN-i+1) and that
the minimum maximum l1 must then be at least this quantity divided
by k.
Therefore, we must have in total
l1 ³ |
max
| |
é ë
|
s1, |
max
0 < k < N
|
|
1
k
|
|
k å
i=1
|
(pi + sN-i+1), |
P+U
N
|
ù û
|
|
| (61) |
and we will show that equation (61) may be used recursively to bound
the quantity åi=1n li. In what follows
we denote the eigenvector of (SST+ W) associated with li as yi.
Since we seek the smallest possible l1 we must consider in turn each
possibility expressed in equation (61). So to start,
suppose s1 is the minmax l1 bound. To meet the
bound, no codeword can have energy along f1 since otherwise we
must have l1 > s1. So, if
y1 = ax+ Ö{1-a2} f1 where x^f1
is the eigenvector with largest eigenvalue s1, then
we must also have
which implies that $u^y1
also with eigenvalue s1. The overall implication is that we must
have l2 ³ s1 as well.
Now consider that with y1=f1 we have
l2 ³ |
max
| |
é ë
|
s2, |
max
0 < k < N-1
|
|
1
k
|
|
k å
i=1
|
(pi + sN-i+1), |
P+U - s1
N-1
|
ù û
|
|
| (63) |
and we note that since we have
|
max
| |
é ë
|
s1, |
max
0 < k < N
|
|
1
k
|
|
k å
i=1
|
(pi + sN-i+1), |
P+U
N
|
ù û
|
= s1 |
| (64) |
we must also have
|
max
| |
é ë
|
s2, |
max
0 < k < N-1
|
|
1
k
|
|
k å
i=1
|
(pi + sN-i+1), |
P+U- s1
N-1
|
ù û
|
£ s1 |
| (65) |
a bound smaller than that if y1 ¹ f1. Thus,
equation (63) is the lowest lower bound on the minmax l2
for l1 = s1 and can also be seen as a recursive
application of equation (61) after f1 has been expurgated
from the ensemble and the dimensionality of the problem decreased by
1.
Continuing sequentially with the terms in equation (61),
now suppose that instead of s1, we have p1+sN as the minmax l1 bound.
To meet this bound we must have y1 = fl and s1 = Ö{p1}fl
for any l such that sl = sN. If not then l1 must
be strictly greater than p1+sN. We then have
l2 ³ |
max
| |
é ë
|
s1, |
max
1 < k < N
|
|
1
k-1
|
|
k å
i=2
|
(pi + sN-i+1), |
P+U- p1 - sN
N-1
|
ù û
|
|
| (66) |
As before, we note
that equation (66) is a recursive application of equation (61) with s1
and fN expurgated.
Finally we consider the last term in equation (61)
and suppose that now [(p1 + p2 + sN + sN-1)/2] is
the minmax l1 bound. Since we must have l1 +l2 ³ p1 + p2 + sN + sN-1, if the minmax bound for l1 is met
with equality, we must have l2 = l1 and we are left to
bound l3 as
l3 ³ |
max
| |
é ë
|
s1, |
max
2 < k < N
|
|
1
k-2
|
|
k å
i=3
|
(pi + sN-i+1), |
P+U - p1 - p2 - sN - sN-1
N-2
|
ù û
|
|
| (67) |
which is an application of equation (61) with codewords
s1 and s2 and dimensions fN and fN-1 expurgated.
In general, if
|
max
| |
é ë
|
s1, |
max
0 < k < N
|
|
1
k
|
|
k å
i=1
|
(pi + sN-i+1), |
P+U
N
|
ù û
|
= |
1
n
|
|
n å
i=1
|
(pi + sN-i+1) |
| (68) |
and n < N we will have
|
l å
j=1
|
lj ³ |
l
n
|
|
n å
i=1
|
(pi + sN-i+1) |
| (69) |
for l £ n and
ln+1 ³ |
max
| |
é ê
ë
|
s1, |
max
n < k < N
|
|
1
k-n
|
|
k å
i=n+1
|
(pi + sN-i+1), |
P+U - |
n å
i=1
|
(pi + sN-i+1) |
N-n
|
ù ú
û
|
|
| (70) |
And once again we
note that equation (70) is simply equation (61) applied
after s1,s2,¼, sn and fN,fN-1,¼, fN-n+1
have been expurgated. Therefore, we see that equation (61) can be
used as a recursive kernel to generate the least lower bound for partial sums
of ordered eigenvalues li.
As a specific example consider, s = (26,6,4,4) and
p = (4, 3, 2, 1). Application of equation (61) has
l1 ³ s1 = 26. Expurgation of the associated
dimension leaves us with s¢ = (6,4,4) and
l1 + l2 ³ 34 = 26 + p1 + s3¢. After
expurgating p1 and s3¢ we are left with
s¢¢ = (6,4) and
p¢¢ = (3, 2, 1). Applying the bound again
we have l3 + l2 + l1 ³ 42 = 34 + (p1 + p3¢¢ +p3¢¢ + s1¢¢ + s2¢¢)/2. As
another example5, consider s = (1.1,1,0) and
p = (1, 1, 1/5). In this case l1 ³ 3/2 and
l1 + l2 ³ 3.
In general, is it clear that when the bound for åi=1n li is plotted against
n, the result must be a concave segmented arc above the line n(P+U)/N
as illustrated in FIGURE 1 for the first example.
Figure 1: Illustration of åi=1n li bounds in n for
text example.
4.2 The Lower Bound Is the Optimal l-Constellation
The definition of the constraint set in the previous section
specifies ordered eigenvalues and partial sums of eigenvalues. To this end let us
define
k=1,2,¼,N and where the xj ³ 0 are ordered xj ³ xj+1. The reader will note that FX(k)/FX(N) is exactly the
cumulative distribution function of an ordered probability
distribution xj/FX(N), i=1,2,¼,N - a variation on
stochastic ordering [21,22,23]. To avoid
confusion we note that the term ``stochastic'' is irrelevant in our
context since we do not consider random variables, but make mention
of it because the mathematics of ordered distributions is useful for our
purposes. 6
The necessary result is now stated
as a theorem.
Theorem 5
Suppose two non-negative non-increasing sequences {xj} and {rj} have
FX(k) ³ FR(k) k=1,2,¼,N-1 and FX(N) = FR(N) = 1.
For any convex function g() we must have
G(x) = åj=1N g(xj) ³ åj=1N g(rj) = G(r).
If g() is concave, then G(x) £ G(r).
A proof of this (known) result is provided in Appendix
D for convenience.
We then note that for any two ordered eigenvalue sets { lj(1) }
and { lj(2) } with åj=1N lj(i) = (P+U) and
åj=1N lj(1) ³ åj=1N lj(2),
we may normalize by P+U to obtain x and r respectively as defined
in Theorem 5. We further note that
TSC(x) = (P+U)2 |
N å
j=1
|
xj2 |
| (72) |
and (see Appendix C)
Cs(x) = |
1
2
|
|
N å
i=1
|
logxi + |
1
2
|
|
N å
i=1
|
log(P+U)- |
1
2
|
|
N å
i=1
|
logsi |
| (73) |
Since g(xj) = xj2 is convex, TSC(x) ³ TSC(r). Likewise
since g(xj) = logxj is concave we have Cs(x) £ Cs(r).
Therefore, since the bounds generated by recursive application of
equation (61) describe the ordered set of possible eigenvalues
with smallest ``stochastic'' order, TSC is minimized and Cs is
maximized by eigenvalue sets which attain the bound. For emphasis, we
state this result as a theorem.
Theorem 6
For a set of codewords { si } with ordered powers pi ³ pi+1, i=1,2,¼,M in a space of dimension N with noise
covariance W, sum capacity is maximized and TSC minimized when
the partial sums of non-increasingly ordered eigenvalues,
{li}, of SST+ W attain the lower bounds generated
by recursive application of equation (61).
The eigenvalue structure of such sets is illustrated in
FIGURE 2 We prove their existence in the next
section.
Figure 2: Illustration of optimal fixed point for a codeword ensemble with
different powers. Vertical bars denote noise covariance
dimension partitions.
5 Warfare Minimizes TSC (Maximizes Sum Capacity)
Through a progression of theorems we examine fixed points for
warfare-augmented greedy interference avoidance and show equivalence
between the implied eigenvalues of SST+ W and the
eigenvalues given by the lower bounds derived from equation (61).
We start with some preliminary theorems which will be used extensively
throughout. We follow these with theorems which parallel the three
terms in equation (61) and then a theorem which states that the only
true equilibrium for greedy interference avoidance with class warfare
is an optimum codeword ensemble. We close the section by showing that
warfare-augmented greedy interference avoidance eventually achieves an
optimum ensemble after traversing at most a finite number of
suboptimal minima.
5.1 Preliminaries
Consider FIGURE 3 which depicts the power
distribution for a general suboptimal codeword ensemble.
Figure 3: Illustration of suboptimal fixed point for a codeword ensemble with
different powers.
We would like to drive this distribution toward the optimal
distribution given in FIGURE 2. To this end,
consider the following set of assertions which establish
the codeword occupancy of the various noise covariance dimensions.
As a corollary of Theorem 1 we have
Corollary 1
Suppose single user warfare cannot reduce TSC for a given codeword set
{ si } with associated eigenvalue lI.
Then, the codeword energies pi = |si|2 for all
elements of this set must
at least as large as that for all other codewords outside the set
with eigenvalues lII < lI.
Theorem 7
Let {sk } be the set of all codewords with eigenvalue lI. Suppose
there exists a signal dimension y, an eigenvector of W with
(SST+W) y
= lIIy,
Wy
= gy and lII < lI
but TSC cannot be reduced by dimensional attack.
Then the partition of noise covariance eigenvectors fi
which spans {sk } must all have eigenvalues { si }
no larger than g, the noise covariance eigenvalue associated
with y.
Proof: Theorem 7
Let Ef be the signal energy along dimension f.
We then have lI = Ef + sf. Likewise
define the signal energy Ey as the signal energy
along y so that lII = Ey+g.
For dimensional attack to be ineffective, we must have
d £ Ef - Ey which implies
Ef+sf - (Ey+g) £ Ef - Ey
which in turn implies sf - g £ 0 for any f
in the spanning set of { sk } thus
proving the theorem.
·
The following theorem is implied directly by
Corollary 1 and Theorem 7 and is stated
without proof.
Theorem 8
Let si and sj be codewords with eigenvalues lI and
lII respectively. Let each reside in
spaces which contain largest noise covariances gi and gj
respectively. If |si| ³ |sj|, then lI ³ lII
(Corollary 1) and gi £ gj (Theorem 7).
In words, at equilibrium a higher power codeword has an eigenvalue at
least as large as that of a lower power codeword. In addition, a
higher power codeword resides in a partition of the noise covariance
space with variances at least as small the space in which a lower
power codewords resides.
It is useful to note that
Theorem 8 implies that higher power codewords command the
best noise space partitions and that lower power codewords are
relegated to higher power noise space partitions. Although this is
not in keeping with the egalitarian spirit of class warfare, it is
(unfortunately) in keeping with the physical reality that might often
makes right!
5.2 The Bounds of Equation (61)
The next three theorems address the three terms inside
the max function of equation (61) and will be used directly to
show that the warfare procedure produces eigenvalue sets which meet
the lower bound specified by recursive application of equation (61).
Theorem 9
Minmax [s1 ]:
If s1 is the minmax eigenvalue bound in equation (61)
then at equilibrium, all codewords must be orthogonal to
f1.
Proof: Theorem 9
Suppose at some equilibrium $s1 with nonzero projection onto the
eigenvector f1 associated with s1. This codeword must
then have eigenvalue lI > s1. Now we note that since
s1 is the minmax eigenvalue bound we must also have
by equation (61) that
s1 ³ (P+U)/N where P is the total codeword energy and U
is the total noise energy.
Since the eigenvalues of
SST+ W must sum to P + U, if $lI > s1 ³ (P+U)/N then
$lII with lII < s1 < lI which
in turn implies that $fi with (SST+ W)fi = lIIfi and Wfi = sifi
with si < s1 since lII ³ si. This
contradicts Theorem 7. Thus, no codeword energy can exist
along dimension f1 at equilibrium if s1 is the minmax
bound for l1.
·
Theorem 10
[Minmax [ 1/k] åi=1k (pi + sN-i+1) ]:
Define
g = |
1
k
|
|
k å
i=1
|
(pi + sN-i+1) |
| (74) |
where k is the largest integer < N such that
|
1
k
|
|
k å
i=1
|
(pi + sN-i+1) ³ |
1
n
|
|
n å
i=1
|
(pi + sN-i+1) |
| (75) |
n=1,2,¼,N-1.
If the bound of equation (61) is equal to g, then at
an equilibrium where warfare cannot reduce TSC,
the largest k codewords, s1,s2,¼,sk, will reside in the space
spanned by fN,fN-1,¼,fN-k+1 with
the smallest k noise covariances, sN,sN-1,¼,sN-k+1.
These codewords will share the same eigenvalue lI = g and
will therefore meet the lower bound for the first k eigenvalues
specified by equation (61).
Proof: Theorem 10
Let S be the set of all codewords (cardinality L) with the
largest eigenvalue lI. Assume this set spans an
n-dimensional space. By Theorem 8 these L codewords
must be the largest L codewords s1,s2,¼,sL and will
span the lowest n noise dimensions.
Now if there exists a codeword sL+1, it must have
eigenvalue lII < lI by the definition of S
as containing all codewords with eigenvalue lI. Therefore
we must have L=n since otherwise, group migration (Theorem 4) could
be applied to reduce TSC. So we must have
lI = |
1
n
|
|
n å
i=1
|
(pi + sN-i+1) |
| (76) |
and the first n eigenvalues of SST+ W are lI. However,
by equation (61) we must also have l1 ³ g which is a direct
contradiction unless
|
1
n
|
|
n å
i=1
|
(pi + sN-i+1) = g |
| (77) |
We then note that if equation (77) is true for some n < k then by
the definition of g we must also have
|
1
k-n
|
|
k å
i=n+1
|
(pi + sN-i+1) = g |
| (78) |
as well. But this is impossible since by construction we require the
largest eigenvalue outside S to be ln+1 < lI = g and recursive application of equation (61) to the remaining
codewords sL,¼,sM in noise dimensions
fN-n,fN-n-1,¼,f1 along with satisfaction of
equation (78) requires that ln+1 ³ g.
Thus, n cannot be less than k.
Now suppose n > k. Then l1 = lI £ g and
l1 ³ g is a direct contradiction owing to the
``largest k'' stipulation in the definition of g. That is,
there exists no n > k such that lI ³ g.
Thus, we must have n=k.
So in summary, if g as defined in equation (74) is the minmax
bound on l1, then at any equilibrium where warfare cannot be
used to reduce TSC, the k highest power codewords must reside in the
k lowest power noise dimensions and share the same eigenvalue
g, unique and the largest over all codewords.
·
Theorem 11
[ Minmax [(P+U)/N] ]:
If the minmax bound for l1 is (P+U)/N, then all codewords must
share the same eigenvalue lI = (P+U)/N at an equilibrium
where warfare cannot reduce TSC.
Proof: Theorem 11
As in Theorem 10, let S be the set of L highest power codewords
residing in the n lowest power noise dimensions. By Theorem 4, unless
L=n, any difference in eigenvalues can be exploited to reduce TSC. Therefore,
unless all the eigenvalues are already equal to (P+U)/N, we must have
lI = |
1
n
|
|
n å
i=1
|
(pi + sN-i+1) |
| (79) |
However, since (P+U)/N is the minmax value of l1, the structure
of equation (61) requires lI ³ (P+U)/N, a condition which can only
be met if lI = (P+U)/N. By the assumed monotonicity of eigenvalues
for SST+W, if l1 = (P+U)/N, then all the eigenvalues
must be (P+U)/N thus completing the proof.
·
5.3 The l-Constellation Bound Is the Stopping Condition
Theorem 9, Theorem 10 and Theorem 11 along
with the recursive nature of the eigenvalue bound
in equation (61) lead directly to the following theorem.
Theorem 12
The only stable codeword ensembles for warfare-augmented greedy
interference avoidance are those which meet with equality the
eigenvalue bound generated by recursive application of equation (61).
Proof: Theorem 12
Suppose the conditions of Theorem 9 are satisfied. Then at
equilibrium the bound on l1 specified by equation (61) is
met with equality since no codeword energy resides in f1. All
the codewords and remaining dimensions are orthogonal to f1.
Alternately, suppose that the conditions of Theorem 10 are satisfied for
some k < N. Then once again, the bound specified in equation (61)
is met with equality and the remaining codewords
sk+1,sk+2,¼,sM must reside in noise dimensions
fN-k,fN-k-1,¼, f1, orthogonal to codewords
s1,s2,¼,sk which reside in dimensions
fN,fN-1,¼, fN-k+1.
Similarly, if the conditions of Theorem 11 are satisfied, then the
bound specified in equation (61) is met with equality and all
the eigenvalues of SST+W are identical.
In each of these three cases, the codeword and dimension partitioning
implied by the fixed point exactly parallels the partitioning implied
by equation (61). Thus, equation (61),
Theorem 9, Theorem 10 and Theorem 11 can be
applied at each step to an independent smaller problem until no
codewords or dimensions remain.
Since at each recursive step the bound of equation (61) is met with
equality, stable equilibrium ensembles for warfare-assisted greedy interference
avoidance are only those ensembles which minimize TSC
and maximize sum capacity.
·
So in summary, recursive expurgation of largest eigenvalue signal
dimensions and codewords in the equilibrium set is identical to the
codeword/dimension expurgation and recursive application of
equation (61) used to establish the lower bound. Thus, the
equilibrium set meets the bound at every step. Therefore, the
equilibrium point for greedy interference avoidance, augmented by
warfare techniques, is a codeword ensemble which maximizes sum
capacity and minimizes TSC. Thus, a fixed point ensemble
which is stable under class warfare in general has a
codeword power distribution as depicted in
FIGURE 2.
5.4 A Level Playing Field Attained, Eventually
So far, we have provided algorithms which strictly reduce TSC at fixed
points not satisfying a set of stopping conditions, and we have shown
that only optimum codeword ensembles can satisfy the stopping
conditions. However, showing reduction can always be forced does not
guarantee that an optimal value is achieved since there could be an
infinite number of fixed point values which taken in some monotonic
sequence might approach any number of values. Therefore, we now show
that the number of possible greedy interference algorithm equilibrium
TSC values is finite and that the warfare procedure must therefore
eventually attain some unique TSC specified by the stopping
conditions.
This possibly subtle assertion bears repetition. Although the number
of possible algorithm fixed point ensembles is potentially infinite,
we can show that the number of TSC fixed point values is finite.
Since escape methods strictly reduce TSC at suboptimal equilibria,
only a finite number of TSC values need be traversed and convergence
to the optimal is assured.
For a set of codewords {ai} which spans n1 dimensions and
shares the same eigenvalue la at equilibrium, by
Theorem 2 the set must span some n1-dimensional partition
of the eigenspace of W. Let this partition be described by {yi }, i=1,2,¼,n1 where the yi are eigenvectors
of W (i.e., Wyi = si yi). If there are
m1 codewords in the set we must have
la = |
1
n1
|
|
é ë
|
m1 å
i=1
|
|ai|2 + |
n1 å
i=1
|
|Wyi|2 |
ù û
|
|
| (80) |
The maximum number of possible choices (without regard for
feasibility) for assemblages of n1 noise covariance eigenvectors and m1
codewords is (N || (n1))(M || (m1)).
Therefore, with the set ({ni},{mi})
denoting all possible (but again, potentially infeasible)
partitions of M codewords into N dimensions,
there are at most a (possibly large) but finite number of fixed point
TSC values
|
Õ
({ni},{mi})
|
|
æ è
|
N
ni
|
ö ø
|
|
æ è
|
M
mi
|
ö ø
|
|
| (81) |
This result along with those for warfare techniques and stopping rules
admits the following summarizing theorem:
Theorem 13
Greedy interference avoidance coupled with class warfare allows escape
from any fixed point which does not meet the stopping conditions for
optimality. Since there are a finite number of fixed points, the
composite algorithm is therefore guaranteed to attain the stopping
points specified in section 5.3 and therefore achieve the
minimum possible TSC and maximum sum capacity.
5.5 Practical Considerations: a quantitative sketch
In the previous development we have assumed that the warfare
procedure is started from a fixed point ensemble. In a theoretical sense, this
is perfectly acceptable since we have shown that greedy interference
avoidance does converge to such fixed points asymptotically.
However, in a practical setting, the greedy procedure would be stopped
at some point and this would be close to, but perhaps not exactly a
fixed point. Thus, for completeness, it is useful to consider the
case where the codeword ensemble is ``almost'' at a fixed point and
how warfare would be applied for such ensembles.
So, consider that greedy interference avoidance can be applied until
codewords are within some small n of being eigenvectors of
the signal plus noise covariance matrix (see Appendix A).
More formally, for suitably large l and any codeword si(l) we have
|R(l) si(l) - li(l) si(l)|2 £ n2 |
| (82) |
Now suppose single user warfare is applied. We would have exactly equation (17)
D(w,c) = -2 Trace[ (SST+ W)Q(w,c) ]- Trace[ Q(w,c)Q(w,c) ] |
| (83) |
but then instead of equation (18) we would have
|
| |
d(sin2w- b2 sin2 c) - [sin2 w- b2sin2 c]2 - |
1
4
|
[sin(2w) + b2 sin(2c)]2 |
|
|
|
|
| (84) |
where the term in O(n) comes from the term
-2 Trace[ (SST+ W)Q(w,c) ] and the imperfect
eigenvectors which comprise the matrix Q.
This basic form applies to the other types of warfare as well.
A ``practical'' warfare method would therefore apply greedy
interference avoidance until an approach to a fixed point was detected via
an initial n criterion, and then evaluate the potential
decrease in TSC after warfare. If the potential decrease were much larger
in magnitude than the O(n) term, then warfare would be applied. If not,
then greedy interference would continue to decrease |n| until such
time as warfare would be guaranteed effective. The algorithm would then stop when
TSC was within some tolerance of optimal.
Thus, we close with the following more formal statement of warfare-assisted
greedy interference avoidance:
- Apply greedy interference avoidance until convergence to within some
tolerance n of a fixed point codeword ensemble. If the fixed
point is suboptimal, choose n so that
|O(n)| is much less than the potential benefit from warfare.
-
If warfare can reduce TSC, apply it and then go to 1).
-
If warfare cannot reduce TSC, the ensemble has attained nearly minimum TSC, and
greedy interference avoidance may be further applied to reduce TSC until satisfied.
6 Summary and Conclusion
We have shown that in synchronous CDMA systems, greedy adaptation of
codewords to achieve maximum SINR (interference avoidance), augmented
by a method dubbed class warfare guarantees convergence of
codeword ensembles to optimal sets which minimize total square
correlation (TSC) and maximize sum capacity. In passing, the
equivalence between sum capacity maximization and TSC minimization was
shown. Application of the warfare procedure constitutes the first
complete analytic proof that interference avoidance algorithms produce
optimal codeword ensembles.
It must be noted, however, that in all numerical experiments
with both greedy interference avoidance
[5,4,2] and MMSE interference avoidance
[1,3], when starting from randomly
chosen initial codewords, essentially optimal sets were obtained within
approximately three cycles of codeword adaptation and never
required intervention with warfare-like methods. That is, direct
application of interference avoidance principles was enough to ensure
empirical convergence. Why this convergence to optimal codeword
ensembles is so robust for simple interference avoidance methods
remains an open question.
We note that implicit in each warfare method described is a number
of (gradient-like) directions for escape from local minima. Perhaps
careful characterization of the dimensionality of potential escape trajectories
relative those trajectories which tend to trap an ensemble in a local
minimum might prove useful. Specifically, if approach trajectories
are of zero measure, then small stochastic perturbations would
be effective in avoiding local minima as was used in recent work [10]
by Pablo Anigstein at UCB.
A The Greedy Interference Avoidance Algorithm
An informal statement of a greedy interference avoidance
algorithm would be:
- A minimum eigenvalue eigenvector, f of Ri = SST+ W- si siT
is determined.
-
si is replaced by f iff
which strictly reduces TSC. Otherwise, si is unchanged.
-
The procedure is repeated sequentially for every user i.
The algorithm is informal since no stopping criterion is supplied,
even though each iteration cannot increase TSC and TSC bounded from
below imply theoretical convergence to some TSC value. Practically,
the algorithm is run until a cycle of iterations (all codewords) does
not decrease TSC by some threshold amount.
However, TSC convergence does not necessarily imply codeword ensemble
convergence. And since warfare methods presume the attainability of
ensembles where every codeword is an eigenvector of the noise plus
signal covariance matrix, provable convergence to such sets is a
necessity. This is provided in the following theorem for a slightly
modified version of greedy interference avoidance where at each
iteration, the codeword chosen for replacement is that whose replacement
will minimize TSC. We call this variant greedy+ interference
avoidance.
Theorem 14
With iterative application of greedy+ interference avoidance,
codewords must converge to ensembles where each codeword is an eigenvector
of the signal plus noise covariance matrix R
= Ri + si siT.
Proof: Theorem 14
First we define an iteration l as a greedy interference
avoidance step where a codeword sil(l) is replaced.
We assume that codeword sil(l) is the codeword
which when replaced will produce the greatest reduction
in TSC. We then have
dil (l) = sil T (l)Ril(l)sil(l)-xil(l) T Ril(l)xil (l) ³ 0 |
| (86) |
as the difference between the TSC value at iteration l and l+1
where xil (l) is the minimum eigenvalue eigenvector of
Ril(l) [5]. We note that
and is therefore the maximum possible di(l) at iteration l.
Since greedy interference avoidance converges in TSC we have
Now consider that the difference in TSC values before and
after the potential replacement of any codeword si at iteration
l can be written as
dil(l) ³ di(l) = siT (l)Ri(l)si(l)-xi(l) T Ri(l)xi (l) ³ 0 |
| (89) |
We define the eigenvalues of Ri(l) as { lij(l) }, j=1,2,¼, N
and assume that they are ordered from largest to smallest. If we further define
the corresponding eigevectors as fij(l), j=1,2,¼, N
we can rewrite si(l) as
si(l) = |
N å
j=1
|
aij(l) fij(l) |
| (90) |
where we assume
|
N å
j=1
|
aij2(l) = |xi(l)|2 = pi |
| (91) |
This leads to
di(l) = |
N å
j=1
|
aij2(l) (lij(l) - liN(l)) |
| (92) |
Since all terms in the sum are non-negative we must have
di(l) ³ aij2(l) (lij(l) - liN(l)) |
| (93) |
for j=1,2,¼,N. Now suppose via equation (93) we define
eij(l) £ di(l) as
eij(l) = aij2(l)(lij(l) -liN(l)) |
| (94) |
Dividing by nonzero aij(l)
results in
|
eij(l)
aij(l)
|
= aij(l)lij(l)-aij(l)liN(l) |
| (95) |
To see how closely each si(l) approximates an eigenvector
of R(l) = Ri(l) + si(l)siT(l)
the signal plus noise covariance matrix at iteration l, we form the product
|
| |
|
å
j Î Ji(l)
|
lij(l) aij(l) fij(l)+pi |
å
j Î Ji(l)
|
aij(l) fij(l) |
|
|
|
| (96) |
where Ji(l) is the set of all j such that aij(l) ¹ 0.
Using equation (95) in equation (96) yields
R(l) si(l) = |
å
j Î Ji(l)
|
|
æ è
|
eij(l)
aij(l)
|
+ liN(l) aij(l) |
ö ø
|
fij(l)+pi |
å
j Î Ji(l)
|
aij(l) fij(l) |
| (97) |
Regrouping we have
R(l)si(l) = (liN(l) + pi)si(l)+ |
å
j Î Ji(l)
|
|
eij(l)
aij(l)
|
fij(l) |
| (98) |
However, since liml® ¥ di(l) = 0
and aij2(l) < pi, then
for any liml® ¥ aij(l) ¹ 0 we must have
by equation (94)
|
lim
l® ¥
|
lij(l) - liN(l) = 0 |
| (99) |
Therefore, we have
|
lim
l® ¥
|
|
eij(l)
aij(l)
|
= |
lim
l® ¥
|
aij(l)( lij(l) - liN(l) ) = 0 |
| (100) |
for any aij(l) which does not approach zero.
Thus, we can choose l such that the terms eij(l)
are arbitrarily small. This implies that for suitably large l,
all codewords si(l) are arbitrarily close to being eigenvectors
of R(l), thus completing the proof.
We define such codeword convergence as convergence in class.
·
Of course, Theorem 14 is mute on the relative values of
the liN(l) + pi which define classes. We thus have the
following corollary, stated without proof:
Corollary 2
With greedy+ interference avoidance, codewords might not necessarily
converge to a set of optimal classes, but could theoretically become
trapped in local TSC minima corresponding to a suboptimal set of
classes.
We can now formalize the greedy interference avoidance algorithm by
adding an additional step.
4. Stop if "si and some suitably small threshold n > 0 we have
| |
å
j Î Ji(l)
|
|
eij(l)
aij(l)
|
fij(l)| < n |
|
What constitutes a ``suitably small'' n is discussed in Section 5.5
where some practical issues are explored.
B When Single User Warfare Fails
Suppose
and
so that
with a TSC value of 5.
Notice that in the context of unequal power signals,
the conditions of (1) are violated by
b2=0 and d = 1 so that D £ 0.
The optimal codeword set is
s1 = |
é ê ê ê ê
ê ê ê ê ë
|
|
ù ú ú ú ú
ú ú ú ú û
|
|
| (104) |
s2 = |
é ê ê ê ê
ê ê ê ê ë
|
|
ù ú ú ú ú
ú ú ú ú û
|
|
| (105) |
where
is achieved with a TSC value of 9/2 and the users reduce their interference level
from 1 to 1/2, the absolute minimum for this case [1,7,8,5].
C Sum Capacity Derivation
We modify the approach in [6] to include the nonwhite,
possibly correlated Gaussian channel described by equation (1).
The mutual information between y and b is [24,25]
I(y;b) = h(y) - h(y|b) = h(y) - h(w) |
| (107) |
This quantity is upper bounded by assuming that y is a Gaussian random
vector. Since b and w are assumed zero mean and
independent and the components of b are also assumed independent, we have
cov(y) = SST+ W where W is the covariance of the
noise vector. This leads directly to [24,25]
Cs= |
1
2
|
log[(2 pe)N | SST+ W| ]- |
1
2
|
log[(2 pe)N |W| ] |
| (108) |
which reduces to
Cs= |
1
2
|
log| SST+ W|- |
1
2
|
log|W| |
| (109) |
We then define the eigenvalues of the noise covariance matrix W as
{ si }, i=1,¼, N. Likewise we define the eigenvalues
of the matrix SST+ W as { li }, i=1,¼, N
and obtain the sum capacity in terms of eigenvalues
Cs = |
1
2
|
|
N å
i=1
|
logli- |
1
2
|
|
N å
i=1
|
logsi |
| (110) |
Since the eigenvalues { si } are fixed, capacity maximization
depends only on the choice of the { li}.
D Proof of Theorem 5
Proof: Theorem 5
First form the function
Q(x,r) = |
N å
j=1
|
g(mxj + (1-m) rj) |
| (111) |
where m Î (0,1) and differentiate with respect to m
to obtain
|
dQ(x,r)
dm
|
= |
N å
j=1
|
g¢(mxj + (1-m) rj)(xj - rj) |
| (112) |
We note that if [(dQ(x,r))/(dm)] ³ 0 for all m Î (0,1)
then G(x) ³ G(r).
Now for notational convenience, define xj(m) = g¢(mxj +(1-m) rj) and then define Dxj(m) = xj(m) -xj-1(m) with Dx1(m) = x1(m). We then note that
for any non-negative m, the quantity mxj + (1-m) rj is a
non-increasing sequence since the xj and rj are non-increasing.
Therefore, if g() is convex, then xj(m) is non-increasing in
j which in turn implies that Dxj(m) £ 0.
We then have
|
N å
j=1
|
xj(m) xj = Dx1(m) + x2(m) (1-x1) + ¼ = |
N å
j=1
|
Dxj(m) (1-FX(j-1)) |
| (113) |
Likewise
|
N å
j=1
|
xj(m) rj = |
N å
j=1
|
Dxj(m) (1-FR(j-1)) |
| (114) |
so that
|
N å
j=1
|
xj(m) [xj-rj] = |
N å
j=1
|
Dxj(m) [FR(j-1)-FX(j-1)] ³ 0 |
| (115) |
Thus, G(x) ³ G(r). For g() concave, the reverse, G(x) £ G(r) is true.
·
E Acknowledgements
The author would like to thank Pablo Anigstein for careful early
review of the manuscript and in particular catching a
basic error in the exposition which had propagated through
an earlier manuscript and would have caused reader consternation
and great author embarassment. In addition, the author
is indebted to the anonymous reviewers who carefully read
the manuscript and offered constructive criticism and
corrections where necessary. The paper is much better as
a result of their efforts. In particular, Anonymous Reviewer B was
an analytic bulldog who did not rest until certain points about the
basic underlying algorithm (points originally taken for granted) were
settled. Reviewer B went well beyond the call of duty on this paper and
in fact, did more work than co-authors on some past papers!
I cannot thank him or her enough.
References
- [1]
-
S. Ulukus and R. D. Yates.
Iterative signature adaptation for capacity maximization of cdma
systems.
In Allerton Conf. on Comm., Control and Computing, September
1998.
- [2]
-
D. C. Popescu and C. Rose.
Interference Avoidance and Dispersive Channels. A New Look at
Multicarrier Modulation.
In Proc. 37th Allerton Conf. on Communication, Control, and
Computing, pages 505-514, Monticello, IL, September 1999.
- [3]
-
S. Ulukus and R. D. Yates.
Iterative construction of optimum signature sequence sets in
synchronous CDMA systems.
IEEE Trans. Info. Theory, 2001.
Accepted and available at http://www.winlab.rutgers.edu/ ~ ryates.
- [4]
-
C. Rose, S. Ulukus, and R. Yates.
Interference avoidance for wireless systems.
In Vehicular Technology Conference, pages 2.05-3, May 2000.
Tokyo.
- [5]
-
C. Rose, S. Ulukus, and R. Yates.
Interference Avoidance in Wireless Systems.
IEEE JSAC.
(submitted 4/2000, see
www.winlab.rutgers.edu/ ~ crose/papers/avoid16.ps).
- [6]
-
M. Rupf and J.L. Massey.
Optimum sequence multisets for synchronous code-division
multiple-access channels.
IEEE Transactions on Information Theory, 40(4):1226-1266, July
1994.
- [7]
-
P. Viswanath, V. Anantharam, and D. Tse.
Optimal Sequences, Power Control and Capacity of Spread Spectrum
Systems with Multiuser Linear Receivers.
IEEE Transactions on Information Theory, 45(6):1968-1983,
September 1999.
- [8]
-
P. Viswanath and V. Anantharam.
Optimal sequences and sum capacity of synchronous cdma systems.
IEEE Transactions on Information Theory, 45(6):1984-1991,
1999.
- [9]
-
D. C. Popescu and C. Rose.
Multiaccess Dispersive Channels: Maximizing Sum Capacity and
Interference Avoidance.
IEEE Transactions on Information Theory.
submitted 12/2000.
- [10]
-
P. Anigstein and V. Anantharam.
On the Convergence of the MMSE Algorithm for Interference
Avoidance.
In Proc. 38th Allerton Conf. on Communication, Control, and
Computing, October 2000.
- [11]
-
A.W. Marshall and I. Olkin.
Inequalities: Theory of Majorization and its Applications.
Acadmic Press, 1979.
- [12]
-
P. Viswanath and V. Anantharam.
Total Capacity of Vector Channels.
College of Engineering UCB/ERL Memorandum 99/47, U.C. Berkeley, May
1999.
- [13]
-
Gilbert Strang.
Linear Algebra and Its Applications.
Academic Press, second edition, 1992.
- [14]
-
Special issue on software radio.
IEEE Personal Communications Magazine, 6(4), August 1999.
Editors: K-C. Chen and R. Prasad and H.V. Poor.
- [15]
-
I. Seskar and N. Mandayam.
Software Defined Radio Architectures for Interference Cancellation
in DS-CDMA Systems.
IEEE Pers. Comm. Mag., 6(4):26-34, August 1999.
- [16]
-
Ivan Seskar and Narayan B. Mandayam.
A Software Radio Architecture for Linear Multiuser Detection.
IEEE JSAC, 17(5):814-823, May 1999.
- [17]
-
T. Hentschel, M. Henker, and G. Fettweis.
The Digital Front-End of Software Radio Terminals.
IEEE Personal Communications Magazine, 6(4):40-46, August
1999.
- [18]
-
A.K. Salkintzis, H. Nie, and P.T. Mathiopoulos.
ADC and DSP Challenges in the Development of Software Radio Base
Stations.
IEEE Personal Communications Magazine, 6(4):47-55, August
1999.
- [19]
-
S.P. Reichhart, B. Youmans, and R. Dygert.
The Software Radio Development System.
IEEE Personal Communications Magazine, 6(4):20-25, August
1999.
- [20]
-
H.L. Van Trees.
Detection, Estimation, and Modulation Theory, Part I.
Wiley, New York, 1968.
- [21]
-
D. Gross and C.M. Harris.
Fundamentals of Queueing Theory.
Wiley, second edition, 1985.
- [22]
-
M. Shaked and J. G. Shanthikumar.
Stochastic Orders and Their Applications.
Acadmic Press, 1994.
- [23]
-
C. Rose and R. Yates.
Minimizing the average cost of paging under delay constraints.
ACM Wireless Networks, 1(2):211-219, 1995.
- [24]
-
T.M. Cover and J.A. Thomas.
Elements of Information Theory.
Wiley-Interscience, 1991.
- [25]
-
R.G. Gallager.
Information Theory and Reliable Communication.
Wiley, 1968.
Footnotes:
1Recently, Pablo Anigstein
at UC Berkeley [10] has proven stochastic convergence for MMSE
interference avoidance [3]. Unfortunately, this simple
and elegant proof does not apply to greedy interference avoidance.
2Note that we can always
effectively set |a1| = 1 by normalizing SST + W with
|a1|2 = p1. Thus, any codeword can be used as a1
with |a1| = 1.
3The calculation
is mundane but involved. The interested reader should simply
compare equation (18) and equation (19) with a symbolic mathematics program such as
Maple© .
4See Appendix B for an
example.
5This example was provided by
P. Anigstein at UCB.
6It should also be noted that these results, when
applied to ordered distributions of eigenvalues as we do here, also go
under the heading of majorization [11]. However, here
we follow the ordered distribution approach since it is
self-contained, compact and possibly more familiar than majorization
to many readers.
File translated from
TEX
by
TTH,
version 3.05.
On 4 Mar 2002, 23:24.