12 random greedy greedywithhia anefficientgreedy

1
An Efficient Greedy-Based Autonomous Resource Block Assignment Scheme for 5G Cellular Networks with Self-Organizing Relaying Terminals Yaser M. M. Fouad, Ramy H. Gohary, and Halim Yanikomeroglu Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada 22-25 June 2014 IEEE International Symposium on Signal Processing Advances in Wireless Communications (SPAWC) 2014 Toronto, ON, Canada Introduction I Signal relaying enhances the wireless link quality between wireless terminals (WTs) and the base station (BS). I In practical systems, only a small portion of the connected WTs are active. I Potential gains can be achieved if inactive wireless terminals are allowed to relay the signals of other users and nearby machine type communication (MTC) devices to the BS. Figure : Terminal relaying example Previous Work I A distributed RB assignment scheme that does not depend on channel quality indicators (CQIs) was proposed. I Each RT utilizes a locally generated RB assignment sequence when allocating its RBs. I To facilitate their generation, the RB assignment sequences are endowed with a multiplicative cyclic group (MCG) structure. I The scheme selects the optimal cyclically-generated sequences by performing an exhaustive search over all MCG-structured cyclically-generated RB assignment sequences. Challenges I The computational complexity associated with the exhaustive search is exponential in the number of RTs. I Cannot be implemented in systems with large numbers of WTs; e.g., systems supporting MTC devices. I When new RTs enter the system, each RT must update its RB assignment sequence. Preliminaries I Cyclic groups: A group G is cyclic if all its elements can be generated by repeated application of the group operation on one element in G. Such an element is called a group generator. I Each group generator yields a cyclically-generated sequence. I The set of cyclically-generated sequences is enriched by considering cyclically shifted versions thereof. I Each cyclic sequence can be generated by a group generator and a cyclic shift: g (k +s i ) i (mod N + 1) N k =1 = {1,...,N }, where g i is the i th generator of the MCG of N elements, and s i is the associated cyclic shift. I There is no cyclic shift for which the sequences generated by two distinct group generators coincide. The Greedy Algorithm: Objective I Objective: Generate an ordered look-up table of group generators and cyclic shifts that can be utilized for sequences generation by RTs. I The order in the look-up table depends on the interference observed by the WTs when the cyclically-generated sequences are used for RB assignment. I Due to the absence of CQIs, the interference is measured in number of hit occurrences over all possible load combinations, whereby a hit is defined as the event in which an RB is assigned to multiple WTs concurrently. The Greedy Algorithm: Overview I The implementation of the greedy algorithm relies on pairing group generators and cyclic shifts such that their cyclically-generated sequences proceed in reversed orders. I Let S be the set containing the already selected algorithm basis and U be the set containing the group generator pairs that have yet to be selected; initially S is empty and U contains all the group generator pairs. I In each iteration, the pair that results in the minimum number of hit occurrences with respect to the ones previously selected is moved from U to S . I The procedure is repeated until the exhaustion of all pairs in U . I The pairs are then tabulated in a look-up table according to the order of selection. The Simplified Greedy Algorithm: Observations I Observation: The RBs located at the beginning of each sequence (the significant RBs) are the most significant contributors to the average number of hit occurrences. I Observation: The graphical representation of cyclic groups is unique and depends only on the number of elements in the cyclic group, whereby each cyclically-generated sequence contributes by a unique pattern that connects all the elements of the group. 1 2 4 8 5 6 3 7 9 10 Figure : Graphical representation of a cyclic group of 10 elements The Simplified Greedy Algorithm: Overview I Using the same S and U , in each iteration, the algorithm selects a group generator pair and a cyclic shift. I This pair is selected such that its pattern results in the minimum number of collisions with the significant RBs of the pairs previously added to S . Figure : Significant RBs of the cyclic group of 10 elements Simulation Setup I A setup of 3 RTs is considered. I We compare the performance of the uniformly-distributed random assignment sequences, with that of the cyclic sequences generated by the greedy algorithm, and the exhaustive search at different relative loads K N ; i.e., the ratio of the currently assigned RBs to the total number of RBs in the system. I The performance is measured by the average number of hit occurrences over all possible load combinations. I In the second simulation, each RT is assumed to know the assignment sequences of its neighbouring RTs and to be able to identify the RT with which it collided once a hit occurs; e.g, RTs use different modulation schemes. I Subsequently, the RTs identify the RBs already utilized by their neighbouring RTs and accordingly update their assignment sequences to avoid future collisions. I This avoidance technique was previously proposed in literature and referred to as the hit identification and avoidance (HIA) algorithm. Simulation Results 0 10 20 30 40 50 60 70 80 90 100 0 2 4 6 8 10 12 Average number of hits Relative load (%) Random N =16 Greedy N =16 Exhaustive N =16 Random N =40 Greedy N =40 Exhaustive N =40 Fig. 1. Comparison between random assignments in [4] and MCG structured Simulation Results 0 10 20 30 40 50 60 70 80 90 100 0 5 10 15 20 25 30 35 40 Average number of hits Relative load (%) Random N =126 Greedy with HIA N =126 Exhaustive with HIA N =126 Random N =16 Greedy with HIA N =16 Exhaustive with HIA N =16 Conclusion We proposed an efficient greedy algorithm for autonomous RB assignment with the following features: I Yields RB assignment sequences with performance comparable to that of the sequences generated by exhaustive search. I Automatically accommodates the temporal variations in the number of available RTs in practical scenarios. I The computational complexity of the greedy algorithm is polynomial in the number of RBs, and does not depend on the number of RTs, whereas the computational complexity of exhaustive search is exponential in the number of RTs.

Upload: others

Post on 23-Feb-2022

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 12 Random Greedy GreedywithHIA AnEfficientGreedy

An Efficient Greedy-Based Autonomous Resource BlockAssignment Scheme for 5G Cellular Networks with

Self-Organizing Relaying TerminalsYaser M. M. Fouad, Ramy H. Gohary, and Halim Yanikomeroglu

Department of Systems and Computer Engineering, Carleton University, Ottawa, ON, Canada

22-25 June 2014 IEEE International Symposium on Signal ProcessingAdvances in Wireless Communications (SPAWC) 2014 Toronto, ON, Canada

Introduction

I Signal relaying enhances the wireless link qualitybetween wireless terminals (WTs) and the basestation (BS).

I In practical systems, only a small portion of theconnected WTs are active.

I Potential gains can be achieved if inactive wirelessterminals are allowed to relay the signals of otherusers and nearby machine typecommunication (MTC) devices to the BS.

Figure : Terminal relaying example

Previous Work

I A distributed RB assignment scheme that does notdepend on channel quality indicators (CQIs) wasproposed.

I Each RT utilizes a locally generated RB assignmentsequence when allocating its RBs.

I To facilitate their generation, the RB assignmentsequences are endowed with a multiplicative cyclicgroup (MCG) structure.

I The scheme selects the optimal cyclically-generatedsequences by performing an exhaustive search over allMCG-structured cyclically-generated RB assignmentsequences.

Challenges

I The computational complexity associated with theexhaustive search is exponential in the number ofRTs.

I Cannot be implemented in systems with largenumbers of WTs; e.g., systems supporting MTCdevices.

I When new RTs enter the system, each RT mustupdate its RB assignment sequence.

Preliminaries

I Cyclic groups: A group G is cyclic if all itselements can be generated by repeated application ofthe group operation on one element in G. Such anelement is called a group generator.

I Each group generator yields a cyclically-generatedsequence.

I The set of cyclically-generated sequences is enrichedby considering cyclically shifted versions thereof.

I Each cyclic sequence can be generated by a groupgenerator and a cyclic shift:

g(k+si)i (mod N + 1)

N

k=1 = {1, . . . , N},

where gi is the ith generator of the MCG of Nelements, and si is the associated cyclic shift.

I There is no cyclic shift for which the sequencesgenerated by two distinct group generators coincide.

The Greedy Algorithm: Objective

I Objective: Generate an ordered look-up table of groupgenerators and cyclic shifts that can be utilized for sequencesgeneration by RTs.

I The order in the look-up table depends on the interferenceobserved by the WTs when the cyclically-generated sequences areused for RB assignment.

I Due to the absence of CQIs, the interference is measured innumber of hit occurrences over all possible load combinations,whereby a hit is defined as the event in which an RB is assignedto multiple WTs concurrently.

The Greedy Algorithm: Overview

I The implementation of the greedy algorithm relies on pairinggroup generators and cyclic shifts such that theircyclically-generated sequences proceed in reversed orders.

I Let S be the set containing the already selected algorithm basisand U be the set containing the group generator pairs that haveyet to be selected; initially S is empty and U contains all thegroup generator pairs.

I In each iteration, the pair that results in the minimum number ofhit occurrences with respect to the ones previously selected ismoved from U to S.

I The procedure is repeated until the exhaustion of all pairs in U .I The pairs are then tabulated in a look-up table according to the

order of selection.

The Simplified Greedy Algorithm: Observations

I Observation: The RBs located at the beginning of eachsequence (the significant RBs) are the most significantcontributors to the average number of hit occurrences.

I Observation: The graphical representation of cyclic groups isunique and depends only on the number of elements in the cyclicgroup, whereby each cyclically-generated sequence contributes bya unique pattern that connects all the elements of the group. 18

1

2

4

8

5

6

3

7

9

10

Fig. 3: A graphical representation of the MCG of order 10. This cyclic group has 2 pairs of

group generators. One pair is represented by the circle while the other is represented by the

inner pattern.

generated sequences are marked. We note that the contribution of an RB to the average number

of hit occurrences decreases with its location in the sequence. In particular, the first RB in the

sequence will have the highest contribution to the average number of hit occurrences whereas

the last RB will have the least contribution. Hence, when graphically evaluating the sequences,

only the firstAi RBs in a sequencei will be considered. The setAi will be referred to as the set

of effective RBs. In each of the subsequentφ(N)2

− 1 iterations, the algorithm arbitrarily selects

a group generator pair inU , constructs its pattern and marks its effective RBs. This pattern is

then rotated by a cyclic shift such that the number of hits between its effective RBs and the

ones of the patterns constructed by the pairs inS is minimized. The same procedure is repeated

for all the patterns generated by the pairs inU . After evaluating the number of hits incurred

by each pattern inU , the algorithm basis,S, is augmented by the group generator pair and

the associated cyclic shifts that correspond to the patternthat yields the minimum number of

hit occurrences between the effective RBs. The algorithm continues to iterate until|S| = φ(N)2

.

The selected group generator pairs and their cyclic shifts are then tabulated in a look-up table

according to the order with which they were included inS. As an illustrative example of the

graphical metric, consider the MCGG10 and assumeAi = 2 for all i. This cyclic group has two

pairs of group generators and its cyclically generated sequences are as follows:

April 11, 2014 DRAFT

Figure : Graphical representation of a cyclic group of 10 elements

The Simplified Greedy Algorithm: Overview

I Using the same S and U , in each iteration, the algorithm selectsa group generator pair and a cyclic shift.

I This pair is selected such that its pattern results in the minimumnumber of collisions with the significant RBs of the pairspreviously added to S.

Figure : Significant RBs of the cyclic group of 10 elements

Simulation Setup

I A setup of 3 RTs is considered.I We compare the performance of the

uniformly-distributed random assignment sequences,with that of the cyclic sequences generated by thegreedy algorithm, and the exhaustive search atdifferent relative loads K

N ; i.e., the ratio of thecurrently assigned RBs to the total number of RBs inthe system.

I The performance is measured by the average numberof hit occurrences over all possible load combinations.

I In the second simulation, each RT is assumed toknow the assignment sequences of its neighbouringRTs and to be able to identify the RT with which itcollided once a hit occurs; e.g, RTs use differentmodulation schemes.

I Subsequently, the RTs identify the RBs alreadyutilized by their neighbouring RTs and accordinglyupdate their assignment sequences to avoid futurecollisions.

I This avoidance technique was previously proposed inliterature and referred to as the hit identification andavoidance (HIA) algorithm.

Simulation Results

0 10 20 30 40 50 60 70 80 90 1000

2

4

6

8

10

12

Aver

age

nu

mb

ero

fh

its

Relative load (%)

Random N=16

Greedy N=16

Exhaustive N=16

Random N=40

Greedy N=40

Exhaustive N=40

Fig. 1. Comparison between random assignments in [4] and MCG structuredassignment with the exhaustive search [5], and the proposed greedy algorithmfor N = 16 and N = 40 RBs.

algorithm proposed herein are 9.1, 4.4, and 7.6, respectively.

Furthermore, it can be seen that the performance of the

sequences obtained by the greedy algorithm is comparable

to that of those obtained by exhaustive search. For example,

in the case of N = 16 RBs, and KN = 100%, the aver-

age number of hits observed by the greedy algorithm and

the exhaustive search are 2.9 and 1.7, respectively. Despite

its potential suboptimality, the greedy algorithm possesses a

significantly lower computational complexity when compared

with exhaustive search. This renders it suitable for systems

with practical numbers of RTs for which exhaustive search is

computationally prohibitive. �Example 2: In this example, we consider a setup similar

to the one in Example 1, but with N = 16 and N = 126.

Furthermore, each RT is assumed to know the assignment

sequences of the neighbouring RTs and to be able to identify

the RT with which it collided once a hit is detected. This

is possible, for instance, if RTs use different modulation

schemes. Utilizing this information, the RTs identify the RBs

already utilized by their neighbouring RTs. Subsequently,

when a hit occurs each RT updates its assignment sequence to

avoid the RBs already assigned by other RTs. This avoidance

technique was proposed in [5] and was referred to therein as

the hit identification and avoidance (HIA) algorithm. We note

that the HIA algorithm cannot be applied to the randomly

generated assignment sequences because those sequences do

not possess a specific structure. The performance of the MCG

structured sequences generated by exhaustive search, and the

proposed greedy algorithm with HIA, along with the random

assignments of [4] are depicted in Figure 2.

From this figure, it can be seen that cyclically-generated

sequences exhibit a significant performance improvement in

the average number of hits when the HIA algorithm is utilized.

For example, for the case of N = 16 RBs, the average

number of hits yielded by the greedy algorithm with HIA

when KN = 100% is 1.6 in contrast with 2.9 when HIA was

not utilized. Simulation results suggest that this performance

advantage increases with the number of resource blocks, N . In

addition, this figure shows that the HIA algorithm reduces the

performance gap between sequences generated by the greedy

0 10 20 30 40 50 60 70 80 90 1000

5

10

15

20

25

30

35

40

Aver

age

nu

mb

ero

fh

its

Relative load (%)

Random N=126

Greedy with HIA N=126

Exhaustive with HIA N=126

Random N=16

Greedy with HIA N=16

Exhaustive with HIA N=16

Fig. 2. Comparison between random assignments in [4] and MCG structuredassignment utilizing HIA with the exhaustive search [5], and the proposedgreedy algorithm for N = 16 and N = 126 RBs.

algorithm, and the exhaustive search. �V. CONCLUSION

In this paper, we proposed a greedy algorithm that enables

terminal relays to autonomously and efficiently assign RBs to

incoming WTs. The proposed algorithm yields a performance

comparable to the optimal one yielded by exhaustive search,

but with a significant reduction in the computational cost.

This renders the proposed algorithm attractive in systems with

practical numbers of RTs and WTs. Furthermore, the set of

sequences cyclically-generated by the greedy algorithm can

accommodate any number of RTs, provided that this number

is less than the number of cyclic sequence generators. A key

feature of this algorithm is that it automatically accommodates

the temporal variations in the number of available RTs in

practical terminal relaying scenarios.

ACKNOWLEDGMENT

The authors would like to thank Dr. Gamini Senarath and

Dr. Petar Djukic of Huawei Technologies Canada Co., Ltd.

REFERENCES

[1] T. C.-Y. Ng and W. Yu, “Joint optimization of relay strategies andresource allocations in cooperative cellular networks,” IEEE J. Select.

Areas Commun., vol. 25, pp. 328–339, Feb. 2007.[2] T. Wang, G. B. Giannakis, and R. Wang, “Smart regenerative relays

for link-adaptive cooperative communications,” IEEE Trans. Commun.,vol. 56, Nov. 2008.

[3] W. Rhee and J. Cioffi, “Increase in capacity of multiuser OFDM sys-tem using dynamic subchannel allocation,” in Proc. IEEE Vehic. Tech.Conf. (VTC), (Tokyo), May 2000.

[4] C. Koutsimanis and G. Fodor, “A dynamic resource allocation schemefor guaranteed bit rate services in OFDMA networks,” in Proc. IEEE Int.

Conf. Commun. (ICC), (Beijing), 2008.[5] Y. M. Fouad, R. H. Gohary, and H. Yanikomeroglu, “An autonomous

resource block assignment scheme for ofdma-based relay-assisted cellularnetworks,” IEEE Trans. Wireless Commun., vol. 11, pp. 637–647, Feb.2012.

[6] Z. Kostic and N. Sollenberger, “Performance and implementation ofdynamic frequency hopping in limited-bandwidth cellular systems,” IEEE

Trans. Wireless Commun., vol. 1, pp. 28–36, Jan. 2002.[7] W. W. Adams and L. J. Goldstein, Introduction to Number Theory. New

Jersey: Prentice-Hall, Inc., 1976.[8] J. A. Gallian, Contemporary Abstract Algebra. Boston: Houghton Mifflin,

1998.[9] G. E. Andrews, The Theory of Partitions. Cambridge: Cambridge

University Press, 1976.

Simulation Results

0 10 20 30 40 50 60 70 80 90 1000

2

4

6

8

10

12

Aver

age

nu

mb

ero

fh

its

Relative load (%)

Random N=16

Greedy N=16

Exhaustive N=16

Random N=40

Greedy N=40

Exhaustive N=40

Fig. 1. Comparison between random assignments in [4] and MCG structuredassignment with the exhaustive search [5], and the proposed greedy algorithmfor N = 16 and N = 40 RBs.

algorithm proposed herein are 9.1, 4.4, and 7.6, respectively.

Furthermore, it can be seen that the performance of the

sequences obtained by the greedy algorithm is comparable

to that of those obtained by exhaustive search. For example,

in the case of N = 16 RBs, and KN = 100%, the aver-

age number of hits observed by the greedy algorithm and

the exhaustive search are 2.9 and 1.7, respectively. Despite

its potential suboptimality, the greedy algorithm possesses a

significantly lower computational complexity when compared

with exhaustive search. This renders it suitable for systems

with practical numbers of RTs for which exhaustive search is

computationally prohibitive. �Example 2: In this example, we consider a setup similar

to the one in Example 1, but with N = 16 and N = 126.

Furthermore, each RT is assumed to know the assignment

sequences of the neighbouring RTs and to be able to identify

the RT with which it collided once a hit is detected. This

is possible, for instance, if RTs use different modulation

schemes. Utilizing this information, the RTs identify the RBs

already utilized by their neighbouring RTs. Subsequently,

when a hit occurs each RT updates its assignment sequence to

avoid the RBs already assigned by other RTs. This avoidance

technique was proposed in [5] and was referred to therein as

the hit identification and avoidance (HIA) algorithm. We note

that the HIA algorithm cannot be applied to the randomly

generated assignment sequences because those sequences do

not possess a specific structure. The performance of the MCG

structured sequences generated by exhaustive search, and the

proposed greedy algorithm with HIA, along with the random

assignments of [4] are depicted in Figure 2.

From this figure, it can be seen that cyclically-generated

sequences exhibit a significant performance improvement in

the average number of hits when the HIA algorithm is utilized.

For example, for the case of N = 16 RBs, the average

number of hits yielded by the greedy algorithm with HIA

when KN = 100% is 1.6 in contrast with 2.9 when HIA was

not utilized. Simulation results suggest that this performance

advantage increases with the number of resource blocks, N . In

addition, this figure shows that the HIA algorithm reduces the

performance gap between sequences generated by the greedy

0 10 20 30 40 50 60 70 80 90 1000

5

10

15

20

25

30

35

40

Aver

age

nu

mb

ero

fh

its

Relative load (%)

Random N=126

Greedy with HIA N=126

Exhaustive with HIA N=126

Random N=16

Greedy with HIA N=16

Exhaustive with HIA N=16

Fig. 2. Comparison between random assignments in [4] and MCG structuredassignment utilizing HIA with the exhaustive search [5], and the proposedgreedy algorithm for N = 16 and N = 126 RBs.

algorithm, and the exhaustive search. �V. CONCLUSION

In this paper, we proposed a greedy algorithm that enables

terminal relays to autonomously and efficiently assign RBs to

incoming WTs. The proposed algorithm yields a performance

comparable to the optimal one yielded by exhaustive search,

but with a significant reduction in the computational cost.

This renders the proposed algorithm attractive in systems with

practical numbers of RTs and WTs. Furthermore, the set of

sequences cyclically-generated by the greedy algorithm can

accommodate any number of RTs, provided that this number

is less than the number of cyclic sequence generators. A key

feature of this algorithm is that it automatically accommodates

the temporal variations in the number of available RTs in

practical terminal relaying scenarios.

ACKNOWLEDGMENT

The authors would like to thank Dr. Gamini Senarath and

Dr. Petar Djukic of Huawei Technologies Canada Co., Ltd.

REFERENCES

[1] T. C.-Y. Ng and W. Yu, “Joint optimization of relay strategies andresource allocations in cooperative cellular networks,” IEEE J. Select.

Areas Commun., vol. 25, pp. 328–339, Feb. 2007.[2] T. Wang, G. B. Giannakis, and R. Wang, “Smart regenerative relays

for link-adaptive cooperative communications,” IEEE Trans. Commun.,vol. 56, Nov. 2008.

[3] W. Rhee and J. Cioffi, “Increase in capacity of multiuser OFDM sys-tem using dynamic subchannel allocation,” in Proc. IEEE Vehic. Tech.Conf. (VTC), (Tokyo), May 2000.

[4] C. Koutsimanis and G. Fodor, “A dynamic resource allocation schemefor guaranteed bit rate services in OFDMA networks,” in Proc. IEEE Int.

Conf. Commun. (ICC), (Beijing), 2008.[5] Y. M. Fouad, R. H. Gohary, and H. Yanikomeroglu, “An autonomous

resource block assignment scheme for ofdma-based relay-assisted cellularnetworks,” IEEE Trans. Wireless Commun., vol. 11, pp. 637–647, Feb.2012.

[6] Z. Kostic and N. Sollenberger, “Performance and implementation ofdynamic frequency hopping in limited-bandwidth cellular systems,” IEEE

Trans. Wireless Commun., vol. 1, pp. 28–36, Jan. 2002.[7] W. W. Adams and L. J. Goldstein, Introduction to Number Theory. New

Jersey: Prentice-Hall, Inc., 1976.[8] J. A. Gallian, Contemporary Abstract Algebra. Boston: Houghton Mifflin,

1998.[9] G. E. Andrews, The Theory of Partitions. Cambridge: Cambridge

University Press, 1976.

Conclusion

We proposed an efficient greedy algorithm for autonomousRB assignment with the following features:I Yields RB assignment sequences with performance

comparable to that of the sequences generated byexhaustive search.

I Automatically accommodates the temporal variationsin the number of available RTs in practical scenarios.

I The computational complexity of the greedyalgorithm is polynomial in the number of RBs, anddoes not depend on the number of RTs, whereas thecomputational complexity of exhaustive search isexponential in the number of RTs.