Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
166 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Interference Management in 5G Reverse TDD HetNets with Wireless Backhaul: A Large System Analysis (1407.6481v4)

Published 24 Jul 2014 in cs.IT and math.IT

Abstract: This work analyzes a heterogeneous network (HetNet), which comprises a macro base station (BS) equipped with a large number of antennas and an overlaid dense tier of small cell access points (SCAs) using a wireless backhaul for data traffic. The static and low mobility user equipment terminals (UEs) are associated with the SCAs while those with medium-to-high mobility are served by the macro BS. A reverse time division duplexing (TDD) protocol is used by the two tiers, which allows the BS to locally estimate both the intra-tier and inter-tier channels. This knowledge is then used at the BS either in the uplink (UL) or in the downlink (DL) to simultaneously serve the macro UEs (MUEs) and to provide the wireless backhaul to SCAs. A geographical separation of co-channel SCAs is proposed to limit the interference coming from the UL signals of MUEs. A concatenated linear precoding technique employing either zero-forcing (ZF) or regularized ZF is used at the BS to simultaneously serve MUEs and SCAs in DL while nulling interference toward those SCAs in UL. We evaluate and characterize the performance of the system through the power consumption of UL and DL transmissions under the assumption that target rates must be satisfied and imperfect channel state information is available for MUEs. The analysis is conducted in the asymptotic regime where the number of BS antennas and the network size (MUEs and SCAs) grow large with fixed ratios. Results from large system analysis are used to provide concise formulae for the asymptotic UL and DL transmit powers and precoding vectors under the above assumptions. Numerical results are used to validate the analysis in different settings and to make comparisons with alternative network architectures.

Citations (121)

Summary

We haven't generated a summary for this paper yet.