Mitigating inter-cell pilot interference via network-based greedy sequence selection and exchange
10666464 ยท 2020-05-26
Assignee
Inventors
Cpc classification
H04L5/0073
ELECTRICITY
H04L5/0091
ELECTRICITY
H04L5/0048
ELECTRICITY
H04B7/0626
ELECTRICITY
International classification
H04L25/02
ELECTRICITY
Abstract
Allocation of CSI-RS or CSI pilot sequences among cells in a cooperative manner to reduce pilot inter-cell interference. Sequences in each cell occupy the same time slot, multiple subcarrier frequencies, and are orthogonal in time via properly chosen cyclic shifts. Sequences in multiple cells are chosen from a pool of non-orthogonal yet distinguishable sequences through their root indices. Exchanging root indices among cells allows a given cell to reconstruct sequences used in neighboring cells and to estimate interfering channels as the number of channel taps is usually limited, thus mitigating pilot contamination. Furthermore, a greedy selection algorithm to find combinations of sequences that further reduce the channel estimation mean-square-error is proposed.
Claims
1. A controller for inter-cell pilot interference mitigation in a mobile network comprising a plurality of base stations for serving user equipments in respective cells, wherein a different set of pilot sequences is used by each base station for estimating channel state information, CSI, of user equipments served by said base station and the different set of pilot sequences used by each base station is identified by a sequence identification parameter, the controller comprising: a transmitter adapted to transmit information about the set of pilot sequences used by a first base station of the network to at least a second base station of the network; and a processor adapted to select a first set of K sequence identification parameters (r.sub.k) from a second set of possible sequence identification parameters, K corresponding to the number of the plurality of base stations and to the number of cells of the network, and adapted to assign a distinct sequence identification parameter from the first set to each of the K base stations of the network, wherein the processor is adapted to select the set of sequence identification parameters (r.sub.k) by means of a greedy algorithm comprising: an initial phase comprising selecting a first sequence identification parameter (r.sub.k) from the second set, initializing the first set with the first sequence identification parameter, and removing the first sequence identification parameter from the second set, and a recursive phase comprising selecting the sequence identification parameter r.sub.q of the second set that minimizes a joint mean-square-error filter E.sub.q, adding the selected sequence identification parameter r.sub.q to the first set, and removing the selected sequence identification parameter r.sub.q from the second set.
2. The controller according to claim 1, wherein the set of pilot sequences used by each base station is identified by a sequence identification parameter, and wherein the transmitter is adapted to transmit information about the set of pilot sequences used by the first base station to the second base station of the network in that: the transmitter is adapted to transmit the sequence identification parameter identifying the set of pilot sequences used by the first base station to the second base station.
3. The controller according to claim 2, wherein the set of pilot sequences used by each base station is composed of Zadoff-Chu sequences comprising a root sequence (s.sub.k) and cyclically shifted versions of the root sequence, said root sequence (s.sub.k) being identified by a root index (r.sub.k), wherein the transmitter is adapted to transmit the sequence identification parameter identifying the set of pilot sequences used by the first base station to the second base station in that: the transmitter is adapted to transmit the root index (r.sub.k) identifying the root sequence (s.sub.k) used by the first base station to the second base station.
4. The controller according to claim 2, wherein the set of pilot sequences used by each base station is composed of M-Sequences, Gold sequences or Kasami sequences, and wherein the sequence identification parameter identifies the set of pilot sequences used by the first base station in that the set of pilot sequences used in the first base station can be generated from the sequence identification parameter.
5. The controller according to claim 2, wherein the transmitter is adapted to transmit the sequence identification parameter identifying the set of pilot sequences used by the first base station to the second base station in that: the transmitter is adapted to transmit indices of the set of pilot sequences used by the first base station to the second base station.
6. The controller according to claim 1, wherein the joint mean-square-error filter E.sub.q is defined as:
M.sub.q(S.sub.1{tilde over (F)}, . . . , S.sub.q{tilde over (F)}) S.sub.k is a diagonal matrix containing the elements of the respective sequence (sk) identified by the sequence identification parameter, and {tilde over (F)} is a matrix comprising first T entries of the L rows of a Fourier matrix F.sub.N corresponding to the L subcarriers occupied by the pilot sequences, T being a number of taps, and wherein C.sup.1.sub.h.sub.
7. A base station for serving user equipments in a cell of a mobile network, wherein the network comprises further base stations for serving user equipments in respective further cells, wherein a different set of pilot sequences is used by each base station for estimating channel state information, CSI, of user equipments served by said base station, the base station comprising: a receiver adapted to receive information about the sets of pilot sequences used respectively by further base stations of the network, wherein the set of pilot sequences used by each base station is identified by a sequence identification parameter, and the receiver is adapted to receive the sequence identification parameters respectively identifying the sets of pilot sequences used by the further base stations; wherein the receiver is further adapted to receive an L-dimensional frequency-domain signal y comprising pilot sequences received from user equipments located in the cell served by the base station and in the further cells, wherein L is the length of the pilot sequences which are spread over L subcarriers, the base station comprising: a processor adapted to perform, for the user equipments located in the cell served by the base station and in the further cells, a joint channel estimation in the time domain; wherein the processor is adapted to generate, for each received sequence identification parameter (rk), the sequence (s.sub.k) of length L identified by the sequence identification parameter (r.sub.k), wherein the processor is adapted to generate a time frequency transfer function M defined by:
M.sub.q(S.sub.1{tilde over (F)}, . . . , S.sub.K{tilde over (F)}) wherein S.sub.k is a diagonal matrix containing the elements of the respectively generated sequence (sk), and {tilde over (F)} is a matrix comprising the first T entries of the L rows of a Fourier matrix F.sub.N corresponding to the L subcarriers occupied by the pilot sequences, T being a number of taps, wherein the processor is adapted to perform the joint channel estimation by solving a linear system of L equations defined by:
Y=Mh.sub.td+n wherein y is the frequency-domain signal received by the receiver, h.sub.td is defined as:
h.sub.td=(h.sup.H.sub.1,td, . . . h.sup.H.sub.K,td).sup.H wherein K is the number of cells comprising the cell served by the base station and the further cells, h.sub.k td is a channel impulse response, CIR, of a user equipment served by a base station k.
8. The base station according to claim 7, wherein the set of pilot sequences used by each base station is composed of Zadoff-Chu sequences comprising a root sequence (s.sub.k) and cyclically shifted versions of the root sequence, said root sequence (s.sub.k) being identified by a root index (r.sub.k), wherein the receiver is adapted to receive the sequence identification parameters respectively identifying the sets of pilot sequences used by the further base stations of the network in that: the receiver is adapted to receive the root indices (rk) identifying the respectively root sequence (s.sub.k) used by the further base stations.
9. The base station according to claim 7, wherein the set of pilot sequences used by each base station is composed of M-Sequences, Gold sequences or Kasami sequences, and wherein the sequence identification parameter identifies the set of pilot sequences used by a given base station in that the set of pilot sequences used in the given base station can be generated from the sequence identification parameter.
10. The base station according to claim 7, wherein the processor is adapted to perform the joint channel estimation by optimizing an estimation filter G defined as:
G=(M.sup.HM+.sub.n.sup.2C.sub.h.sub.
11. The base station according to claim 10, further comprising a transmitter adapted to broadcast information about the set of pilot sequences used by the base station to the user equipments served by the base station.
12. A method of inter-cell pilot interference mitigation in a mobile network comprising a plurality of base stations for serving user equipments in respective cells, wherein a different set of pilot sequences is used by each base station for estimating channel state information, CSI, of user equipments served by said base station and the different set of pilot sequences used by each base station is identified by a sequence identification parameter, the method comprising: transmitting information about the set of pilot sequences used by a first base station of the network to at least a second base station of the network; selecting a first set of K sequence identification (r.sub.k) from and a second set of possible sequence identification parameters, K corresponding to the number of the plurality of base stations and to the number of cells of the network, and adapted to assign a distinct sequence identification parameter from the first set to each of the K base stations of the network; selecting the set of sequence identification parameters (r.sub.k) by means of a greedy algorithm, the algorithm comprising: an initial phase comprising selecting a first sequence identification parameter (rk) from the second set, initializing the first set with the first sequence identification parameter, and removing the first sequence identification parameter from the second set, and a recursive phase comprising selecting the sequence identification parameter (r.sub.q) of the second set that minimizes a joint mean-square-error filter .sub.q, adding the selected identification parameter r.sub.q to the first set, and removing the selected sequence identification parameter r.sub.q from the second set.
13. A method for inter-cell pilot interference mitigation in a mobile network, wherein the network comprises a plurality of base stations for serving user equipments in respective further cells, wherein a different set of pilot sequences is used by each base station for estimating channel state information, CSI, of user equipments served by said base station, the method comprising: a base station of the mobile network receiving information about the sets of pilot sequences used respectively by further base stations of the mobile network, wherein the set of pilot sequences used by each base station is identified by a sequence identification parameter, and the receiver is adapted to receive the sequence identification parameters respectively identifying the sets of pilot sequences used by the further base stations; wherein the receiver is further adapted to receive an L-dimensional frequency-domain signal y comprising pilot sequences received from user equipments located in the cell served by the base station and in the further cells, wherein L is the length of the pilot sequences which are spread over L subcarriers, the base station comprising: a processor adapted to perform, for the user equipments located in the cell served by the base station and in the further cells, a joint channel estimation in the time domain; wherein the processor is adapted to generate, for each received sequence identification parameter (rk), the sequence (s.sub.k) of length L identified by the sequence identification parameter (r.sub.k), wherein the processor is adapted to generate a time frequency transfer function M defined by:
M.sub.q(S.sub.1{tilde over (F)}, . . . , S.sub.K{tilde over (F)}) wherein S.sub.k is a diagonal matrix containing the elements of the respectively generated sequence (sk), and {tilde over (F)} is a matrix comprising the first T entries of the L rows of a Fourier matrix F.sub.N corresponding to the L subcarriers occupied by the pilot sequences, T being a number of taps, wherein the processor is adapted to perform the joint channel estimation by solving a linear system of L equations defined by:
Y=Mh.sub.td+n wherein y is the frequency-domain signal received by the receiver, h.sub.td is defined as:
h.sub.td=(h.sup.H.sub.1,td, . . . , h.sup.H.sub.K,td).sup.H wherein K is the number of cells comprising the cell served by the base station and the further cells, h.sub.k,td is a channel impulse response, CIR, of a user equipment served by a base station k.
Description
BRIEF DESCRIPTION OF DRAWINGS
(1) The above aspects and implementation forms of the present application will be explained in the following description of specific embodiments in relation to the enclosed drawings, in which
(2)
(3)
(4)
(5)
(6)
(7)
(8)
(9)
DETAILED DESCRIPTION OF EMBODIMENTS
(10)
(11) The system 100 comprises a plurality of cells 101, 102, 103, as well as a plurality of base stations 111, 112, 113. Each base station 111, 112, 113 is adapted to serve user equipments (UE) 121, 122, 123 in its respective cell 101, 102, 103. Each base station is particularly responsible for the communication according to downlink (DL) and uplink (UP) with the user equipments located in its cell. The term base station is a generic term for defining an entity serving a cell, i.e. serving the user equipments located in a cell. The base station may be for example a base transceiver station (BTS) in a GSM network, a Node B in a UMTS network, or an eNodeB in LTE.
(12) In the embodiment of
(13) The communication system 100 according to the present application is for example a multi-cell orthogonal-frequency-division-duplex (OFDM) system with a total of N subcarriers. Additionally, K cooperating BSs/cells are considered, where a given bandwidth allocation consisting of L subcarriers is shared by all single-antenna users across the cells. Users in cell k send phase rotated versions of a sequence s.sub.k in the UL for the purpose of channel estimation, wherein the sequence s.sub.k is known to the corresponding BS k.
(14) A phase rotation in the frequency domain corresponds to a cyclic shift in the time domain; thus, pilots inside a cell are separated in time. The phase rotations/cyclic shifts are designed to account for time dispersion due to frequency selectivity and ensure users remain orthogonal in time, as done in LTE systems for instance. For example, LTE systems support up to 8 cyclic shifts per symbol slot (66,67 sec) in the UL, allowing 8 users to use the same symbol slot for pilot transmission. Correspondingly, the remaining pilot-interference corrupting the channel estimate of a given user comes from users in other cells transmitting their pilots using the same phase rotations as that given user. Without loss of generality, we therefore focus on users sending their corresponding sequences without any phase shifts. Each BS receives the sequence corresponding to the user in its own cell in addition to K1 sequences from other cells. For the analysis, it is sufficient to consider one BS and one of its receive antennas. The received L dimensional frequency-domain signal at one of the antennas can be written as
(15)
(16) Where h.sub.k is the frequency-domain L-dimensional CSI vector between the BS and user k at the subcarriers of interest, S.sub.k is the diagonal matrix containing the elements of s.sub.k on its main diagonal, and n is the additive white Gaussian noise vector whose elements are uncorrelated with mean zero and variance .sub.n.sup.2.
(17) In the following embodiment, it is assumed that, similarly to LTE/LTE-A systems, cyclic-extended Zadoff-Chu (ZC) sequences are used. Nonetheless, the application is not limited to ZC sequences and covers other types of sequences as will be elaborated later on. Formally, the u-th element of the cyclic-extended (CE) ZC sequence of length L and root index r is defined as:
(18)
wherein u=1, . . . , L.
(19) Here, {tilde over (L)} is the largest prime number smaller than L and (x).sub.{tilde over (L)} denotes the modulo {tilde over (L)} operation. User in cell k uses a CE ZC sequence of length L and root index r.sub.k. Thus, the elements of s.sub.k read
(20)
(21) u=1, . . . , L. Note that there exist {tilde over (L)}1 root indices when sequences of length L are used. Thus, in practice, there exist enough distinguishable root indices and corresponding pilot sequences to be used across K cells. E.g., for the smallest bandwidth allocation in LTE which corresponds to L=12 subcarriers, 10 different root indices exist and 10 different pilot sequences can be used across up to 10 cells. It is assumed that the sequences are stored at the BS/UE, so that the knowledge of a given root index at a BS/UE is enough to construct the corresponding CE ZC sequence. Additionally, it is assumed for now that the K root indices are assigned randomly to the K cells.
(22) The first part of the application covers exchanging sequence indices among BSs so that a given BS acquires the knowledge of the sequences used in the (K1) neighboring cells that is required to perform channel estimation for all K UEs simultaneously. However, even with this knowledge, the BS cannot estimate the CSI of all UEs simultaneously, due to the fact that the CSI of all users corresponds to KL variables, while the observed vector at the BS (i.e., y) has size L.
(23) Therefore, it is proposed to perform channel estimation in the time domain. If the channel impulse response (CIR) of each user has a maximum of T taps, then the received vector y can be alternatively written as
(24)
where the sub-Fourier matrix {tilde over (F)} is obtained from the first T entries of the L rows of the Fourier matrix F.sub.N corresponding to the L subcarriers of interest, and h.sub.k,td is the CIR of user k, N being the total number of subcarriers available. In OFDM systems, the number of taps T is smaller than the number of subcarriers L, see e.g. I. Maniatis, T. Weber, A. Sklavos, Y. Liu, E. Costa, H. Haas, and E. Schulz, Pilots for joint channel estimation in multi-user OFDM mobile radio systems in Proc. of the 7th IEEE Int. Symp. on Spread-Spectrum Tech. \& Appl. (ISSSTA '02), vol. 1, pp. 44-48. The value of T can be determined by the base station according to the propagation scenario or estimated by some techniques which are out of the scope of the application.
(25) This observation regarding the number of taps T being smaller than the number of subcarriers L is used to perform joint channel estimation. Namely, the BS can jointly estimate the CIR of all UEs if the number of assigned subcarriers per user is larger than the sum of user CIR taps (L>KT), and if the sequences of neighboring cells are known at the BS.
(26) In this case, it is possible to define the following matrix M and vector h.sub.td:
M(S.sub.1{tilde over (F)}, . . . , S.sub.K{tilde over (F)})
.sup.LKT(5)
h.sub.td=(h.sub.1,td.sup.H, . . . , h.sub.K,td.sup.H).sup.H.sup.KT(6) wherein M is a time frequency transfer function matrix and the second variable h.sub.td contains the stacked CIRs of all users.
(27) Then, the BS can apply the following receive MSE filter G
G=(M.sup.HM+.sub.n.sup.2C.sub.h.sub.
to get the stacked CIR estimate of all UEs:
.sub.td=(M.sup.HM+.sub.n.sup.2C.sub.h.sub.
(28) Here, C.sub.htd is the covariance matrix of h.sub.k,td.
(29) In other words, stacking the user CIRs according to the above-defined vector h.sub.td and defining the time frequency transfer function matrix M, y can be rewritten as:
y=Mh.sub.td+n(9)
which is a linear system of L equations in KT unknowns. Given the BS knows the sequences s.sub.l, l, this becomes an estimation problem which yields exactly one solution for LKT. In case L<KT, the dominant taps of each user can be estimated and the remaining ones neglected. As the number of dominant interferers is usually limited, LKT holds for a wide range of scenarios.
(30) It is to be noted that the knowledge of this covariance matrix is not necessary to implement the MSE filter. Indeed, though the MSE formulation and greedy selection algorithm depend on the covariance matrix C.sub.htd, this quantity can be replaced by an identity matrix (or a scaled version thereof) in practice. The reason for that is two-fold. First, the CIRs of UEs in different cells are usually uncorrelated and therefore the covariance matrix C.sub.htd exhibits a block diagonal structure, where the non-zero block diagonal entries correspond to individual users' taps covariance matrices. Second, under a wide range of scenarios such as outdoor environments, the scatterers corresponding to a given user are uncorrelated. Thus, the taps of each user are uncorrelated and C.sub.htd is a diagonal matrix containing the tap powers of the K users on the main diagonal and zero elsewhere. In case the tap powers are not known at the BS, C.sub.htd can be replaced by a scaled identity matrix when running the greedy algorithm. The algorithm would still exhibit the desired performance, even with a faulty knowledge of the covariance matrix.
(31) In the following, the greedy sequence selection algorithm according to the present application will be detailed.
(32) So far, the MSE estimation filter at the BS was calculated assuming the sequences are fixed. A further MSE improvement occurs with sequence selection. Note that with the chosen estimation filter, the channel estimation MSE in the time-domain reads
(33)
which is implicitly a function the user pilot sequences via M, and tr(.) denotes the trace of a matrix. An optimal set of sequences would therefore minimize . Unfortunately, such an optimization problem is of combinatorial nature, and yields no closed-form solution. A brute-force approach is not suitable in real-time applications as one has to go through a possibly huge number of combinations and might be already infeasible for more than 2 cells for large values of L. Therefore, we propose a greedy sequence selection algorithm to tackle this problem. Greedy algorithms are commonly used to find suboptimal solutions of combinatorial problems. In the context of sequence selection, a greedy algorithm selects the sequence s.sub.q with root index r.sub.q that minimizes the joint MSE at step q given sequences {s.sub.1, s.sub.2, . . . , s.sub.q1} are already chosen and fixed. At step q, the input-output transfer function M.sub.q is defined as
M.sub.q(S.sub.1{tilde over (F)}, . . . , S.sub.q{tilde over (F)})(11)
and the joint MSE reads
(34)
where C.sub.1:q,td.sup.1 is the covariance matrix of (h.sub.1,td.sup.H, . . . , h.sub.q,td.sup.H).sup.H.
(35) At the qth step of the greedy selection algorithm, one goes over {tilde over (L)}q possible sequence choices (as q1 sequences are already assigned to the first q1 users) and finds the one that results in the lowest MSE. It is summarized in Algorithm 1 in
(36) The greedy algorithm can take place in a central or a distributed manner. In a central implementation, a central controller would calculate all K sequences in the K cell network and signal the K root indices of the corresponding sequences to each BS/cell. The central controller additionally assigns the sequence to be used in each cell; however, this choice can be random. A decentralized implementation works as follows. In the first step, a given BS, say BS 1, randomly selects s.sub.1 and signals its root index to the other (K1) BSs. In the step q>=2, BS q implements step q of the greedy algorithm and calculates its sequence s.sub.q based on the sequences {s.sub.1, s.sub.2, . . . , s.sub.q1} that were already signaled by BSs who implemented steps 1 to q1. It then signals the root index of s.sub.q to the other (K1) BSs/cells. This signaling ensures all required sequences are known at the BSs.
(37) Each BS needs to inform UEs in its own cell the chosen sequence index via a signaling procedure. This can be done, e.g. via a broadcast channel, or in a way similar to what the current LTE is doing. In this sense, UEs are also involved. In LTE, the UL sequence to be used by a UE depends on cell-specific (cell ID) and group-specific parameters, where a cell group consists of up to 30 cells. LTE Rel-11 and later offer the possibility to override these parameters and to set other virtual cell and group parameters (e.g. for the purpose of CoMP) through the Radio Resource Control (RRC) layer. This mechanism can be used to assign the selected pilot sequence indices to UEs. Concretely, after the greedy algorithm is finished, virtual cell and group parameters corresponding to the selected pilot sequence indices can be sent by a BS to the UEs attached to this BS. The UEs will then derive the selected pilot sequence indices from the virtual cell and group parameters. Note that in LTE there is no mechanism available/standardized for exchanging the sequence indices among BSs.
(38) Transmission/exchange of the selected sequences is needed when either 1) a cluster of cooperating cells is created by the network (e.g. according a first scenario detailed below), or 2) a new cell joins the cluster (e.g. according a second scenario detailed below). This can be done quickly and in real time. In fact, the signaling overhead is rather small, namely in the order of K{circumflex over ()} 2 log2({tilde over (L)}). For the ZC sequences used in LTE, {tilde over (L)}=1022 for 10 MHz bandwidth. For K=6, L=1022, the messages to be exchanged among all K eNBs are equal to 6{circumflex over ()} 2 log2(1022) <=360 bits. As the message is small and the exchange among BSs is usually done through wired networks, it can be realized in real time. The message to be signaled from a BS to its UEs is as small as log2({tilde over (L)}) <=10 bits. The message exchange between BS and UEs can therefore be done in real time, as already realized in LTE (e.g. for CoMP).
(39) In a first scenario of the greedy sequence selection according to the application, the network assigns a group of cells to cooperate and perform joint channel estimation.
(40) In a first embodiment of the first scenario, the procedure is centralized. For example, for a network assigning a group of three cells to cooperate and perform joint channel estimation, the procedure is assumed by a central controller, as detailed in the followings: Step 1: the central controller picks a random sequence s1. Step 2: given s1, the central controller sets q=2, and finds the sequence s2 that minimizes the joint MSE, i.e. that minimizes .sub.q, assuming two cells in the network. The covariance matrix in the above-mentioned definition of .sub.q can be approximated by a scaled identity matrix. Step 3: Given s1 and s2, the central controller sets q=3 and finds the sequence s3 that minimizes the joint MSE .sub.q assuming three cells in the network. The covariance matrix in the definition of .sub.q can be approximated by a scaled identity matrix. Step 4: The central controller assigns the obtained sequences s1, s2, and s3 randomly to the three cells. He additionally signals to each cell the sequences used in the neighboring two cells for the joint channel estimation to take place as defined by equation (8). In other words, it signals sequences s2 and s3 that are used in cells 2 and 3 to cell 1 and so on.
(41) Then, the algorithm is over, as all needed sequences are signaled and joint MSE channel estimation in each cell can take place according to equation (8).
(42) A second embodiment of the first scenario is illustrated in
(43) Then, the algorithm is over, as all needed sequences are signaled and the joint MSE channel estimation in each cell can take place according to equation (8).
(44) In a second scenario of the greedy sequence selection according to the application, several cells cooperate and perform joint channel estimation according to the application and a further cell joins the cooperating cluster.
(45) In a first embodiment of the second scenario, the procedure is centralized. For example, two cells 1 and 2 are cooperating and performing joint channel estimation. Cell 1 is aware of the sequence s2 used in cell 2 and vice versa. Cell 3 now joins the cooperating cluster. The following steps show how sequence s3 in cell 3 is calculated and what needs information to be exchanged assuming a centralized implementation. Step 1: The central controller already knows the sequences s1 and s2 used in cells 1 and 2. Given this knowledge, it calculates the sequence s3 to be used in cell 3 using the greedy procedure. Step 2: It signals s3 to cells 1, 2, and 3. Additionally, it signals sequences s1 and s2 to cell 3.
(46) The procedure is over. With all necessary sequences signaled, the joint MSE channel estimation across the three cells can take place according to equation (8).
(47) A second embodiment of the second scenario is illustrated in
(48) Even though the proposed method was illustrated for CE ZC sequences, it is clear that it is not limited to such sequences. The proposed method can cover any type of sequences that can be distinguished via a parameter such as the root sequence in the case of ZC sequences. Such a parameter is referred to as the sequence identification parameter.
(49) Alternatives to ZC sequences further include M-Sequences, Gold sequences, or Kasami sequences. These sequences are, however, binary sequences consisting of 0's and 1's. Although there is no root index as in the ZC case, there do exist parameters (e.g. the random seeds) generating such sequences. Such parameters can be transmitted to the other BSs so that the corresponding sequence can be generated online. Alternatively, the whole sequences can be pre-generated, stored in BSs and/or UEs, and indexed. In this case, only the sequence indices need to be transmitted to the other BSs, i.e. need to be exchanged among the BSs.
(50) In the followings, the performance and advantages of the present application will be detailed.
(51) Link level simulations have been conducted to evaluate the performance of the proposed greedy selection algorithm. The main findings are as follows:
(52) In comparison to the state of the art (e.g. LTE), the proposed exchange of root indices improves CSI quality considerably as joint channel estimation can be performed across the K cells and the CSI of the desired user can be then recovered with most interference suppressed.
(53) The proposed greedy selection algorithm brings an additional 1 to 5 dB power gain on average in the medium to high SNR regime, compared to the case where sequences are randomly assigned by the network or randomly chosen by the cells. This is shown in
(54) The gain obtained by the greedy selection can be used to either further improve the CSI quality or reduce the pilot power transmission required to achieve a given estimation MSE. Additionally, the greedy selection ensures bad sets of sequences are not chosen. The performance of such sets can be 10 dB worse than the performance of the sequences returned by the greedy algorithm.
(55) The greedy algorithm still exhibits the desired performance even with a faulty knowledge of the covariance matrix C.sub.htd.
(56) In the followings, the differences and advantages of the present application are detailed.
(57) In comparison to the state of the art (e.g. LTE), the proposed exchange of root indices improves the CSI quality at the BS considerably. An accurate CSI is necessary for the transmission of high order modulation schemes (e.g., 64-QAM or higher).
(58) As joint channel estimation across the K cells is performed, the estimated CSI of users in neighboring cells can be used to perform UL or DL CoMP, which now according to the proposed method operate with better CSI quality and system performance.
(59) When a new cell joins the cooperating cluster, only the sequence of that given cell has to be calculated, as shown e.g. in the second scenario. This makes the dynamic allocation and grouping of clusters possible in real time, in contrast to cases where, e.g., a brute force approach has to be used to calculate the sequences.
(60) Such a brute force approach is less advantageous than the proposed greedy algorithm as it cannot be implemented in real-time but is nevertheless an alternative to the proposed greedy algorithm. Consider the scenario K=4 and L=240. Then we have {tilde over (L)}=239 and {tilde over (L)}1=238 CE ZC sequences with distinguishable root indices. A brute-force approach necessitates going over 238237236235>310.sup.9 combinations to find the one that results in the lowest MSE. Such a brute-force search is possible, but the greedy selection is however preferred. Indeed, a greedy selection only necessitates going over 237+236+235=708 combinations only, which is easily performed in real time when the 4 cell cluster is created. Comparing the required number of combinations in both cases, the greedy selection algorithm results in a huge complexity reduction.
(61) The present application has been described in conjunction with various embodiments as examples as well as implementations. However, other variations can be understood and effected by those persons skilled in the art and practicing the claimed application, from the studies of the drawings, this disclosure and the independent claims. In the claims as well as in the description the word comprising does not exclude other elements or steps and the indefinite article a or an does not exclude a plurality. A single element or other unit may fulfill the functions of several entities or items recited in the claims. The mere fact that certain measures are recited in the mutual different dependent claims does not indicate that a combination of these measures cannot be used in an advantageous implementation.