This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Capacity Scaling of Single-source Wireless Networks: Effect of Multiple Antennas

Sang-Woon Jeon,  and Sae-Young Chung,  Email: swjeon@kaist.ac.kr, sychung@ee.kaist.ac.kr School of EECS, KAIST, Daejeon, Korea
Abstract

We consider a wireless network in which a single source node located at the center of a unit area having mm antennas transmits messages to nn randomly located destination nodes in the same area having a single antenna each. To achieve the sum-rate proportional to mm by transmit beamforming, channel state information (CSI) is essentially required at the transmitter (CSIT), which is hard to obtain in practice because of the time-varying nature of the channels and feedback overhead. We show that, even without CSIT, the achievable sum-rate scales as Θ(mlogm)\Theta(m\operatorname{log}m) if a cooperation between receivers is allowed. By deriving the cut-set upper bound, we also show that Θ(mlogm)\Theta(m\operatorname{log}m) scaling is optimal. Specifically, for n=ω(m2)n=\omega(m^{2}), the simple TDMA-based quantize-and-forward is enough to achieve the capacity scaling. For n=ω(m)n=\omega(m) and n=O(m2)n=\operatorname{O}(m^{2}), on the other hand, we apply the hierarchical cooperation to achieve the capacity scaling.

Index Terms:
Cooperative MIMO, scaling law, quantize-and-forward, receiver cooperation

I Introduction

In a pioneering work of [1], Gupta and Kumar have studied the sum-rate scaling of wireless ad hoc networks as the number nn of randomly located source-destination (S-D) pairs increases in a fixed area. They showed that the sum-rate scales as Θ(n/logn)\Theta\left(\sqrt{n/\operatorname{log}n}\right) using a nearest multihop transmission. The hierarchical cooperation scheme was recently proposed in [2] improving the sum-rate scaling drastically. Specifically, the sum-rate scales almost linearly in nn that is well matched with the information-theoretic upper bound. Then a natural question is how the sum-rate scales if the number of sources and the number of destinations are not balanced. As extreme cases, we can consider a single source sending messages to the rest of the nodes or a single destination collecting messages from the rest of the nodes in the network. The work in [3] has considered the single-destination network and proved that the capacity scales as Θ(logn)\Theta\left(\operatorname{log}n\right), which is also true for the single-source network. Notice that this result indicates that adding more nodes in the network only provides a marginal gain, that is, the per-node rate tends to zero.

One of the promising approaches to resolve the unbalanced network topology is to adopt multiple antennas at the source (or at the destination). The works in [4, 5] show that having multiple antennas increases the capacity of a point-to-point link proportionally to the minimum number of transmit and receive antennas when the channel state information (CSI) is available at the receiver. This result can be directly extended to the single-destination network in which the destination has mm antennas and nn sources have a single antenna each. Thus, the sum-rate increases proportionally to mm if n=Ω(m)n=\Omega(m). For the single-source network, achieving linear scaling becomes much more challenging because the source should acquire CSI in order to apply the transmit beamforming techniques such as the dirty paper coding with optimal beamforming [6, 7] or zero-forcing beamforming [8]. From a practical point of view, it is hard to obtain CSI at the transmitter (CSIT) due to the time-varying channels and feedback overhead, especially for a large wireless network with many antennas at the source.

In this paper, we study the capacity scaling of the single-source network having multiple antennas at the source when CSI is available only at the receiver side. We mainly focus on the feasibility of the linear increase of the sum-rate proportional to the number of source antennas by using receiver cooperation only. Thus, we address the questions regarding the minimum number of required nodes in the network to achieve this linear scaling and the type of receiver cooperation that can achieve the optimal scaling law. To answer these questions, we first derive an information-theoretic upper bound and propose a cooperative multiple-input multiple-output (MIMO) scheme achieving the same scaling as the upper bound.

II System Model

In this section, we define the underlying network and channel models and explain the performance metric used in the paper. The matrix and vector operations used in the paper are summarized in Table I.

II-A Single-source Wireless Networks

We consider a single-source wireless network. There exists a single source having mm antennas at the center of the network and nn destinations each having a single antenna are uniformly distributed over a unit square area. The relation between mm and nn is given by

n=mβ,n=m^{\beta}, (1)

where β>0\beta>0. Let 𝐫0\mathbf{r}_{0} denote the position of the source and 𝐫i\mathbf{r}_{i} denote the position of the ii-th destination, where i{1,,n}i\in\{1,\cdots,n\}.

We consider a far-field channel model. The 1×m1\times m channel vector from the source to the ii-th destination at time tt is given by

𝐡0i(t)=𝐫0𝐫iα/2[ej2πθ0i,1(t),,ej2πθ0i,m(t)] for i{1,,n},\mathbf{h}_{0i}(t)={\|\mathbf{r}_{0}-\mathbf{r}_{i}\|}^{-\alpha/2}\big{[}e^{j2\pi\theta_{0i,1}(t)},\cdots,e^{j2\pi\theta_{0i,m}(t)}\big{]}\mbox{ for }i\in\{1,\cdots,n\}, (2)

where α>2\alpha>2 is the path-loss exponent and θ0i,j(t)\theta_{0i,j}(t) is the phase at time tt from the jj-th transmit antenna of the source to the ii-th destination. Now consider the channel from the ii-th to the jj-th destinations at time tt that is given by

hij(t)=𝐫i𝐫jα/2ej2πθij(t) for ij and i,j{1,,n},h_{ij}(t)={\|\mathbf{r}_{i}-\mathbf{r}_{j}\|}^{-\alpha/2}e^{j2\pi\theta_{ij}(t)}\mbox{ for }i\neq j\mbox{ and }i,j\in\{1,\cdots,n\}, (3)

where θij(t)\theta_{ij}(t) is the phase at time tt from the ii-th to the jj-th destinations. We assume fast fading in which θ0i,j(t)\theta_{0i,j}(t) and θkl(t)\theta_{kl}(t) are uniformly distributed within [0,2π)[0,2\pi) independent for different ii, jj, kk, ll, and tt. We further assume that CSI is available only at the receivers.

The received signal of the jj-th destination at time tt is given by

yj(t)=𝐡0j(t)𝐱0(t)+i=1,ijnhij(t)xi(t)+zj(t) for j{1,,n},y_{j}(t)=\mathbf{h}_{0j}(t)\mathbf{x}_{0}(t)+\sum_{i=1,i\neq j}^{n}h_{ij}(t)x_{i}(t)+z_{j}(t)\mbox{ for }j\in\{1,\cdots,n\}, (4)

where 𝐱0(t)\mathbf{x}_{0}(t) is the m×1m\times 1 transmit signal vector of the source, xi(t)x_{i}(t) is the transmit signal of the ii-th destination, and zi𝒩(0,1)z_{i}\sim\mathcal{N}_{\mathbb{C}}(0,1) is the noise of the ii-th destination that is independent for different ii and tt. Note that not all destinations transmit simultaneously at a given time and some xi(t)x_{i}(t)’s in (4) may be zero. The source and each destination have power constraints P0P_{0} and P1P_{1}, respectively. Thus 𝔼(𝐱0(t)2)P0\mathbb{E}\left(\|\mathbf{x}_{0}(t)\|^{2}\right)\leq P_{0} and 𝔼(|xi(t)|2)P1\mathbb{E}\left(|x_{i}(t)|^{2}\right)\leq P_{1} for i{1,,n}i\in\{1,\cdots,n\}. For notational convenience, we will omit time index tt in the rest of the paper.

II-B Performance Measure

Throughout the paper, we will analyze the capacity scaling of the single-source wireless network, which could be a function of mm and nn. We define the individual rate RindR_{\operatorname{ind}} such that for suffuciently large mm the source can transmit with at least RindR_{\operatorname{ind}} bps/Hz to each of nn destinations with high probability (whp). Then the achievable sum-rate is simply given by Rsum=nRindR_{\operatorname{sum}}=nR_{\operatorname{ind}}. For notational simplicity, ‘whp’ used in the paper means that an event occurs with high probability as mm\to\infty111Since n=mβn=m^{\beta}, nn also tends to infinity as mm\to\infty..

III Cut-Set Upper Bound

In this section, we obtain an upper bound on the sum-rate, which will be compared to the achievable sum-rate derived in the next section. Let 𝐇0\mathbf{H}_{0} denote the n×mn\times m compound MIMO channel from the source to the nn destinations that is given by

𝐇0=[𝐡01T,,𝐡0nT]T.\mathbf{H}_{0}=[\mathbf{h}_{01}^{T},\cdots,\mathbf{h}_{0n}^{T}]^{T}. (5)

From the cut-set bound, we know that the sum-rate is upper bounded by the rate across the cut dividing the source and the nn destinations. By assuming full cooperation between the destinations, the sum-rate is upper bounded by MIMO capacity. Thus, we obtain

RsummaxTr(𝚺0)1𝔼(logdet(𝐈n+P0𝐇0𝚺0𝐇0)),R_{\operatorname{sum}}\leq\underset{\operatorname{Tr}(\mathbf{\Sigma}_{0})\leq 1}{\operatorname{max}}\mathbb{E}\left(\operatorname{log}\det\left(\mathbf{I}_{n}+P_{0}\mathbf{H}_{0}\mathbf{\Sigma}_{0}\mathbf{H}_{0}^{\dagger}\right)\right), (6)

where 𝚺0\mathbf{\Sigma}_{0} denotes the m×mm\times m normalized input covariance matrix given by 1P0𝔼(𝐱0𝐱0)\frac{1}{P_{0}}\mathbb{E}(\mathbf{x}_{0}\mathbf{x}_{0}^{\dagger}).

Theorem 1

Suppose the single-source wireless network. For sufficiently large mm, RsumR_{\operatorname{sum}} scales as O(mmin{1,β}logm)\operatorname{O}(m^{\operatornamewithlimits{min}\{1,\beta\}}\operatorname{log}m) whp.

Proof:

For β>1\beta>1, from (6), we obtain

Rsum\displaystyle R_{\operatorname{sum}}\!\!\!\!\!\!\!\!\!\! (a)maxTr(𝚺0)1𝔼(logdet(𝐈m+P0𝐇0𝐇0𝚺0))\displaystyle\overset{(a)}{\leq}\underset{\operatorname{Tr}(\mathbf{\Sigma}_{0})\leq 1}{\operatorname{max}}\mathbb{E}\left(\operatorname{log}\det\left(\mathbf{I}_{m}+P_{0}\mathbf{H}_{0}^{\dagger}\mathbf{H}_{0}\mathbf{\Sigma}_{0}\right)\right) (7)
(b)maxTr(𝚺0)1logdet(𝐈m+P0𝔼(𝐇0𝐇0)𝚺0)\displaystyle\overset{(b)}{\leq}\underset{\operatorname{Tr}(\mathbf{\Sigma}_{0})\leq 1}{\operatorname{max}}\operatorname{log}\det\left(\mathbf{I}_{m}+P_{0}\mathbb{E}(\mathbf{H}_{0}^{\dagger}\mathbf{H}_{0})\mathbf{\Sigma}_{0}\right)
=(c)maxTr(𝚺0)1logdet(𝐈m+P0i=1n𝐫0𝐫iα𝚺0)\displaystyle\overset{(c)}{=}\underset{\operatorname{Tr}(\mathbf{\Sigma}_{0})\leq 1}{\operatorname{max}}\operatorname{log}\det\left(\mathbf{I}_{m}+P_{0}\sum_{i=1}^{n}\|\mathbf{r}_{0}-\mathbf{r}_{i}\|^{-\alpha}\mathbf{\Sigma}_{0}\right)
=(d)mlog(1+P0mi=1n𝐫0𝐫iα).\displaystyle\overset{(d)}{=}m\operatorname{log}\left(1+\frac{P_{0}}{m}\sum_{i=1}^{n}\|\mathbf{r}_{0}-\mathbf{r}_{i}\|^{-\alpha}\right).

Notice that (a)(a) holds since det(𝐈n+𝐀𝐀)=det(𝐈m+𝐀𝐀)\det\left(\mathbf{I}_{n}+\mathbf{A}\mathbf{A}^{\dagger}\right)=\det\left(\mathbf{I}_{m}+\mathbf{A}^{\dagger}\mathbf{A}\right), (b)(b) holds since logdet()\operatorname{log}\det(\cdot) is concave [9], (c)(c) holds since 𝔼(𝐇0𝐇0)=i=1n𝐫0𝐫iα𝐈m\mathbb{E}(\mathbf{H}_{0}^{\dagger}\mathbf{H}_{0})=\sum_{i=1}^{n}\|\mathbf{r}_{0}-\mathbf{r}_{i}\|^{-\alpha}\mathbf{I}_{m}, and (d)(d) holds since the rate is maximized by 𝚺0=1m𝐈m\mathbf{\Sigma}_{0}=\frac{1}{m}\mathbf{I}_{m} [5]. From the fact that the minimum distance between the source and any other destination is larger than n(1+ϵd)n^{-(1+\epsilon_{d})} whp, where ϵd>0\epsilon_{d}>0 is an arbitrarily small constant [2], we finally obtain Rsummlog(1+P0mβ+αβ(1+ϵd)1)R_{\operatorname{sum}}\leq m\operatorname{log}\left(1+P_{0}m^{\beta+\alpha\beta(1+\epsilon_{d})-1}\right) whp. Thus the upper bound scales as Θ(mlogm)\Theta(m\operatorname{log}m) whp.

For 0<β10<\beta\leq 1, we obtain

Rsum\displaystyle R_{\operatorname{sum}}\!\!\!\!\!\!\!\!\!\! i=1nmaxTr(𝚺0)1𝔼(log(1+P0𝐡0i𝚺0𝐡0i))\displaystyle\leq\sum_{i=1}^{n}\underset{\operatorname{Tr}(\mathbf{\Sigma}_{0})\leq 1}{\operatorname{max}}\mathbb{E}\left(\operatorname{log}\left(1+P_{0}\mathbf{h}_{0i}\mathbf{\Sigma}_{0}\mathbf{h}_{0i}^{\dagger}\right)\right) (8)
i=1n𝔼(log(1+P0𝐡0i𝐡0i))\displaystyle\leq\sum_{i=1}^{n}\mathbb{E}\left(\operatorname{log}\left(1+P_{0}\mathbf{h}_{0i}\mathbf{h}^{\dagger}_{0i}\right)\right)
=nlog(1+P0m𝐫0𝐫iα),\displaystyle=n\operatorname{log}\left(1+P_{0}m\|\mathbf{r}_{0}-\mathbf{r}_{i}\|^{-\alpha}\right),

where we use generalized Hadamard’s inequality for the first inequality and set 𝚺0=𝐈m\mathbf{\Sigma}_{0}=\mathbf{I}_{m} for the second inequality. Thus Rsummβlog(1+P0m1+αβ(1+ϵd))R_{\operatorname{sum}}\leq m^{\beta}\operatorname{log}\left(1+P_{0}m^{1+\alpha\beta(1+\epsilon_{d})}\right) whp that scales as Θ(mβlogm)\Theta(m^{\beta}\operatorname{log}m). Therefore, Theorem 1 holds. ∎

IV Quantize-And-Forward-Based Cooperative MIMO

In this section, we propose a cooperative MIMO scheme and analyze its achievable rate. We define a small region around the source, and serve the destinations in that region using a small fraction of time. Notice that it is possible to set the area of the region and time fraction such that it does not affect the overall rate scaling while making the distance between the source and the destinations outside the region as Θ(1)\Theta(1). Thus the proposed scheme is about the transmission to the destinations outside the region. For simplicity, we assume all destinations are located outside the region in the rest of the paper.

As mentioned before, due to the lack of CSI, the source cannot perform a coherent beamforming. Instead, we apply the cooperative MIMO to induce the cooperation among the destinations. We first divide the entire destinations into several groups and perform cooperative MIMO between the source and each group. Let n1n_{1} denote the number of groups and n2n_{2} denote the number of destinations in each group, where n=n1n2n=n_{1}n_{2}. We denote the ii-th destination in the kk-th group as destination (k,i)(k,i), where i{1,,n2}i\in\{1,\cdots,n_{2}\} and k{1,,n1}k\in\{1,\cdots,n_{1}\}. Denote the positions of n2n_{2} destinations in the kk-th group as {𝐫1k,,𝐫n2k}\left\{\mathbf{r}_{1}^{k},\cdots,\mathbf{r}_{n_{2}}^{k}\right\}. Without loss of generality, we assume 𝐫0𝐫ik𝐫0𝐫jk\|\mathbf{r}_{0}-\mathbf{r}^{k}_{i}\|\leq\|\mathbf{r}_{0}-\mathbf{r}^{k}_{j}\| for i<ji<j. Now consider the message transmission from the source to destination (k,i)(k,i). The proposed scheme consists of two phases. In Phase 11, the source transmits a message to destination (k,i)(k,i) by using the other nodes in the kk-th group as relays. To relay the received signals, the other nodes quantize their received signals and transmit them to destination (k,i)(k,i), which is Phase 22. Destination (k,i)(k,i) finally decodes the message based on these quantized signals. We apply the TDMA-based cooperation or the hierarchical cooperation in [2] for relaying the quantized received signals within each group. Fig. 1 illustrates the overall procedure of the proposed cooperative MIMO scheme, where the destinations in the same cell will form a group. We will explain the details of Phases 11 and 22 in the next two subsections.

IV-A Phase 1: MIMO Transmission

Using the Δ\Delta fraction of time, Phase 11 performs the following procedure.

  • n1n_{1}-TDMA is used among n1n_{1} groups.

  • n2n_{2}-TDMA is used among n2n_{2} destinations in the same group.

  • The source transmits the message of destination (k,i)(k,i) via Gaussian signaling with covariance matrix P0𝐫0𝐫n2kαm𝐈m\frac{P_{0}\|\mathbf{r}_{0}-\mathbf{r}^{k}_{n_{2}}\|^{\alpha}}{m}\mathbf{I}_{m} to the nodes in the kk-th group.

Since only the source transmits in Phase 11, from (4), the received signal of destination (k,j)(k,j) in Phase 11 is given by

yP1,jk=𝐡0jk𝐱0k+zjk=P0𝐫0𝐫n2kαm𝐡0jk𝐬0k+zjk,y^{k}_{P1,j}=\mathbf{h}^{k}_{0j}\mathbf{x}^{k}_{0}+z^{k}_{j}=\sqrt{\frac{P_{0}\|\mathbf{r}_{0}-\mathbf{r}^{k}_{n_{2}}\|^{\alpha}}{m}}\mathbf{h}^{k}_{0j}\mathbf{s}^{k}_{0}+z^{k}_{j}, (9)

where the superscript denotes the group index and 𝐬0k\mathbf{s}^{k}_{0} follows a complex Gaussian distribution with 𝒩(0,𝐈m)\mathcal{N}_{\mathbb{C}}(0,\mathbf{I}_{m}). From (2), 𝐡0ik\mathbf{h}^{k}_{0i} is given by 𝐫0𝐫ikα/2[ej2πθ0i,1k,,ej2πθ0i,mk]\|\mathbf{r}_{0}-\mathbf{r}^{k}_{i}\|^{-\alpha/2}\big{[}e^{j2\pi\theta^{k}_{0i,1}},\cdots,e^{j2\pi\theta^{k}_{0i,m}}\big{]}, where θ0i,jk\theta^{k}_{0i,j} is the phase from the jj-th antenna of the source to destination (k,i)(k,i). Let 𝐇0k=[𝐡01kT,,𝐡0n2kT]T\mathbf{H}^{k}_{0}=\left[\mathbf{h}^{kT}_{01},\cdots,\mathbf{h}^{kT}_{0n_{2}}\right]^{T}, 𝐲P1k=[yP1,1k,,yP1,n2k]T\mathbf{y}^{k}_{P1}=\left[y_{P1,1}^{k},\cdots,y_{P1,n_{2}}^{k}\right]^{T}, and 𝐳0k=[z01k,,z0n2k]T\mathbf{z}^{k}_{0}=\left[z^{k}_{01},\cdots,z^{k}_{0n_{2}}\right]^{T}. Then

𝐲P1k=𝐇0k𝐱0k+𝐳0k=P0m𝚪0k𝚯0k𝐬0k+𝐳0k,\mathbf{y}_{P1}^{k}=\mathbf{H}^{k}_{0}\mathbf{x}^{k}_{0}+\mathbf{z}^{k}_{0}=\sqrt{\frac{P_{0}}{m}}\mathbf{\Gamma}^{k}_{0}\mathbf{\Theta}^{k}_{0}\mathbf{s}^{k}_{0}+\mathbf{z}_{0}^{k}, (10)

where 𝚪0k=diag(𝐫𝐫n2kα2𝐫𝐫1kα2,,𝐫𝐫n2kα2𝐫𝐫n2kα2)\mathbf{\Gamma}^{k}_{0}=\operatornamewithlimits{diag}\left(\frac{\|\mathbf{r}-\mathbf{r}^{k}_{n_{2}}\|^{\frac{\alpha}{2}}}{\|\mathbf{r}-\mathbf{r}^{k}_{1}\|^{\frac{\alpha}{2}}},\cdots,\frac{\|\mathbf{r}-\mathbf{r}^{k}_{n_{2}}\|^{\frac{\alpha}{2}}}{\|\mathbf{r}-\mathbf{r}^{k}_{n_{2}}\|^{\frac{\alpha}{2}}}\right) and [𝚯0k]ij=ej2πθ0i,jk\left[\mathbf{\Theta}^{k}_{0}\right]_{ij}=e^{j2\pi\theta^{k}_{0i,j}}. Although the Gaussian signaling may not be optimal because the elements of 𝐇0k\mathbf{H}^{k}_{0} are not i.i.d.i.i.d. [5], we will show that it achieves the optimal capacity scaling in the next section.

IV-B Phase 2: Quantize-and-Forward

Because each destination should collect the quantized received signals from the other n21n_{2}-1 nodes in the same group, n2(n21)n_{2}(n_{2}-1) transmission pairs should be served in each group during Phase 22. Notice that by choosing n2n_{2} transmission pairs such that each of n2n_{2} nodes becomes a transmitter and a receiver of two different pairs, we can construct n21n_{2}-1 scheduling sets as shown in Fig. 1. Now consider the transmission of n2n_{2} pairs in each scheduling set. For the communcation, we can use transmission schemes proposed for the ad hoc network model, for example the hierarchical cooperation in [2], as well as the simple TDMA to serve the pairs in each scheduling set. Using the 1Δ1-\Delta fraction of time, Phase 22 performs the following procedure.

  • 44-TDMA is used among adjacent groups, that is, one out of 44 groups are activated simultaneously.

  • (n21)(n_{2}-1)-TDMA is used among (n21)(n_{2}-1) scheduling sets in the same group.

  • One of the following two is performed.

    1. TDMA-based cooperation: n2n_{2}-TDMA is used among n2n_{2} transmission pairs in the same scheduling set.

    2. Hierarchical cooperation: Hierarchical cooperation is used among n2n_{2} transmission pairs in the same scheduling set.

  • For each transmission pair, the transmitter quantizes its received signal and transmits it to the receiver with power P1P_{1}.

Let hijkh^{k}_{ij} denote the channel from destination (k,i)(k,i) to destination (k,j)(k,j) and hijlkh^{lk}_{ij} denote the channel from destination (l,i)(l,i) to destination (k,j)(k,j). Suppose that 𝒜(t)\mathcal{A}(t) is the set of active groups at time tt, which is determined by 44-TDMA. Then the received signal of destination (k,j)(k,j) when destination (k,i)(k,i) transmits is given by

yP2,jk=hijkxik+l𝒜,lkhijlkxil+zjk,\displaystyle y_{P2,j}^{k}=h^{k}_{ij}x^{k}_{i}+\sum_{l\in\mathcal{A},l\neq k}h^{lk}_{ij}x^{l}_{i}+z^{k}_{j}, (11)

where we assume that the ii-th destination also transmits in the other active groups.

V Performance Analysis

In this section, we derive an achievable rate of the proposed scheme and analyze its scaling law.

V-A Achievable Rate

Fig. 2 illustrates the message transmission from the source to destination (k,j)(k,j). Let TT denote the block length and y¯P1,ik\underline{y}^{k}_{P1,i} denote [yP1,ik(1),,yP1,ik(T)][y^{k}_{P1,i}(1),\cdots,y^{k}_{P1,i}(T)]. In Phase 1, the source sends a message W(k,j)W(k,j) to the destinations in the kk-th group through the channel pYP1,1k,,YP1,n2k|𝐗0k()p_{Y^{k}_{P1,1},\cdots,Y^{k}_{P1,n_{2}}|\mathbf{X}^{k}_{0}}(\cdot). In Phase 2, destination (k,i)(k,i) quantizes its received signal y¯P1,ik\underline{y}^{k}_{P1,i} and transmits the quantized signal y¯^P1,ijk\underline{\hat{y}}^{k}_{P1,ij} to destination (k,j)(k,j) through the link having a finite capacity of C(k,i,j)C(k,i,j) for all i{1,,n2}i\in\{1,\cdots,n_{2}\}. Destination (k,j)(k,j) finally decodes W(k,j)W(k,j) based on the quantized outputs y¯^P1,1jk,,y¯^P1,n2jk\underline{\hat{y}}^{k}_{P1,1j},\cdots,\underline{\hat{y}}^{k}_{P1,n_{2}j}. Therefore, the source and destination (k,j)(k,j) have (2TR(k,j);T)(2^{TR(k,j)};T) channel encoder and decoder, respectively, where R(k,j)R(k,j) denotes the data rate. Destination (k,i)(k,i) and destination (k,j)(k,j) have (2TRQ(k,i,j);T)(2^{TR_{Q}(k,i,j)};T) quantizer and dequantizer, respectively, where RQ(k,i,j)R_{Q}(k,i,j) denotes the quantization rate. The achievable rates can be derived by modifying the result in [2].

Theorem 2 (Özgür, Lévêque, and Tse)

Given a probability distribution p𝐗0k()p_{\mathbf{X}^{k}_{0}}(\cdot) and n2n_{2} conditional probability distributions pY^P1,ijk|YP1,ik()p_{\hat{Y}^{k}_{P1,ij}|Y^{k}_{P1,i}}(\cdot) for i{1,,n2}i\in\{1,\cdots,n_{2}\}, the rates satisfying

RQ(k,i,j)\displaystyle R_{Q}(k,i,j)\!\!\!\!\!\!\!\!\! 1Δ4n2C(k,i,j),i{1,,n2}\displaystyle\leq\frac{1-\Delta}{4n_{2}}C(k,i,j),{~}i\in\{1,\cdots,n_{2}\} (12)
RQ(k,i,j)\displaystyle R_{Q}(k,i,j)\!\!\!\!\!\!\!\!\! ΔnI(YP1,ik;Y^P1,ijk),i{1,,n2}\displaystyle\geq\frac{\Delta}{n}I(Y^{k}_{P1,i};\hat{Y}^{k}_{P1,ij}),{~}i\in\{1,\cdots,n_{2}\} (13)
R(k,j)\displaystyle R(k,j)\!\!\!\!\!\!\!\!\! ΔnI(𝐗0k;Y^P1,1jk,,Y^P1,n2jk)\displaystyle\leq\frac{\Delta}{n}I(\mathbf{X}_{0}^{k};\hat{Y}^{k}_{P1,1j},\cdots,\hat{Y}^{k}_{P1,n_{2}j}) (14)

are achievable.

Proof:

The constraints (13) and (14) are directly obtained from Theorem II.1 in [2] by multiplying Δn\frac{\Delta}{n} because each destination is served using Δn\frac{\Delta}{n} time fraction in Phase 11. The first constraint comes from the fact that each quantizer should deliver its quantization index through a finite capacity link using 1Δ4n2\frac{1-\Delta}{4n_{2}} time fraction in Phase 22, where 14\frac{1}{4} reflects the effect of 44-TDMA. ∎

Now consider the Gaussian channel in (9) and (10). Let NijkN^{k}_{ij} be the variance of the quantization noise given by Nijk=𝔼(|YP1,ikY^P1,ijk|2)N^{k}_{ij}=\mathbb{E}(|Y^{k}_{P1,i}-\hat{Y}^{k}_{P1,ij}|^{2}). If we set the conditional probability distributions as pY^P1,ijk|YP1,ik()𝒩(yP1,ik,Nijk)p_{\hat{Y}^{k}_{P1,ij}|Y^{k}_{P1,i}}(\cdot)\sim\mathcal{N}_{\mathbb{C}}(y^{k}_{P1,i},N^{k}_{ij}) for all i{1,,n2}i\in\{1,\cdots,n_{2}\}, then

I(YP1,ik;Y^P1,ijk)log(1+𝔼(|YP1,ik|2)Nijk),I(Y^{k}_{P1,i};\hat{Y}^{k}_{P1,ij})\leq\operatorname{log}\left(1+\frac{\mathbb{E}(|Y^{k}_{P1,i}|^{2})}{N^{k}_{ij}}\right), (15)

where we use the fact that the Gaussian distribution maximizes entropy for a given received power [10]. From (12) and (13), if the following condition is satisfied

1Δ4n2C(k,i,j)Δnlog(1+𝔼(|YP1,ik|2)Nijk) for all i{1,,n2},\frac{1-\Delta}{4n_{2}}C(k,i,j)\geq\frac{\Delta}{n}\operatorname{log}\left(1+\frac{\mathbb{E}(|Y^{k}_{P1,i}|^{2})}{N_{ij}^{k}}\right)\mbox{ for all }i\in\{1,\cdots,n_{2}\}, (16)

then we can find R(k,i,j)R(k,i,j) satisfying (12) and (13) simultaneously. Thus we set NijkN^{k}_{ij} as the minimum value that satisfies (16) with equality such that

Nijk=𝔼(|YP1,ik|2)21ΔΔn4n2C(k,i,j)1.N^{k}_{ij}=\frac{\mathbb{E}(|Y^{k}_{P1,i}|^{2})}{2^{\frac{1-\Delta}{\Delta}\frac{n}{4n_{2}}C(k,i,j)}-1}. (17)

Let 𝐲^P1,jk=[y^P1,1j,,y^P1,n2j]T\hat{\mathbf{y}}^{k}_{P1,j}=[\hat{y}_{P1,1j},\cdots,\hat{y}_{P1,n_{2}j}]^{T}. Then 𝐲^P1,jk=𝐇0k𝐱0k+𝐳0k+𝐳^0jk\hat{\mathbf{y}}^{k}_{P1,j}=\mathbf{H}^{k}_{0}\mathbf{x}^{k}_{0}+\mathbf{z}^{k}_{0}+\hat{\mathbf{z}}^{k}_{0j}, where 𝔼(𝐳^0jk𝐳^0jk)=diag(N1jk,,Nn2jk)\mathbb{E}(\hat{\mathbf{z}}^{k}_{0j}\hat{\mathbf{z}}^{k\dagger}_{0j})=\operatornamewithlimits{diag}(N^{k}_{1j},\cdots,N^{k}_{n_{2}j}). Therefore, from (14), we conclude

R(k,j)=Δn𝔼(logdet(𝐈n2+P0m𝚪0k𝚯0k𝚯0k𝚪0k(𝐐jk)1))R(k,j)=\frac{\Delta}{n}\mathbb{E}\left(\operatorname{log}\det\left(\mathbf{I}_{n_{2}}+\frac{P_{0}}{m}\mathbf{\Gamma}^{k}_{0}\mathbf{\Theta}^{k}_{0}\mathbf{\Theta}^{k\dagger}_{0}\mathbf{\Gamma}^{k}_{0}(\mathbf{Q}^{k}_{j})^{-1}\right)\right) (18)

is achievable, where 𝐐jk=diag(1+N1jk,,1+Nn2jk)\mathbf{Q}^{k}_{j}=\operatornamewithlimits{diag}(1+N^{k}_{1j},\cdots,1+N^{k}_{n_{2}j}).

There exists a trade-off between the size of MIMO and the variance of the quantization noise NijkN^{k}_{ij}. If we set n2n_{2} as a small value from (17), we can make NijkN^{k}_{ij} small. The reason is that as n2n_{2} decreases, that is n1n_{1} increases, we have more spatially reusable groups in Phase 22 so that the aggregate rate of Phase 22 increases and, as a result, we can decrease NijkN^{k}_{ij}. Although small n2n_{2} has an advantage in terms of quantization noises, which increases R(k,j)R(k,j), it also decreases the size of 𝐇0k\mathbf{H}^{k}_{0}, which decreases R(k,j)R(k,j). In the next subsection, we will show that the optimal rate scaling is achievable by choosing n1n_{1} and n2n_{2} properly.

V-B Asymptotic Analysis

In this subsection, we derive RsumR_{\operatorname{sum}} of the proposed scheme in the limit of large mm. To specify n1n_{1} and n2n_{2}, we divide the network into small square cells of area nqn^{-q}, where q(0,1)q\in(0,1). Then n1n_{1} is given by nqn^{q} and n2n_{2} is approximately given by n1qn^{1-q} whp, which will be proved in Lemma 1. Before deriving the main results, we consider the following lemmas, which will be used to prove the main results.

Lemma 1

For sufficiently large mm, the number of destinations in any cell is in [(1δ)n1q,(1+δ)n1q][(1-\delta)n^{1-q},(1+\delta)n^{1-q}] whp, where δ>0\delta>0 is an arbitrarily small constant.

Proof:

We refer Lemma 4.14.1 in [2] for the proof. ∎

Lemma 2

For sufficiently large mm, 𝔼(|YP1,ik|2)\mathbb{E}(|Y^{k}_{P1,i}|^{2}) is upper bounded by P0(1+ϵp)+1P_{0}(1+\epsilon_{p})+1 whp for all ii and kk, where ϵp>0\epsilon_{p}>0 is an arbitrarily small constant.

Proof:

From (9), we obtain

𝔼(|YP1,ik|2)\displaystyle\mathbb{E}(|Y^{k}_{P1,i}|^{2})\!\!\!\!\!\!\!\!\! =𝐡0ik𝔼(𝐱0k𝐱0k)𝐡0ik+1\displaystyle=\mathbf{h}^{k}_{0i}\mathbb{E}(\mathbf{x}_{0}^{k}\mathbf{x}_{0}^{k\dagger})\mathbf{h}^{k\dagger}_{0i}+1 (20)
=P0𝐫0𝐫n2kα𝐫0𝐫ikα+1\displaystyle=P_{0}\frac{\|\mathbf{r}_{0}-\mathbf{r}^{k}_{n_{2}}\|^{\alpha}}{\|\mathbf{r}_{0}-\mathbf{r}^{k}_{i}\|^{\alpha}}+1
=P0(1+𝐫0𝐫n2k𝐫0𝐫ik𝐫0𝐫ik)α+1\displaystyle=P_{0}\left(1+\frac{\|\mathbf{r}_{0}-\mathbf{r}^{k}_{n_{2}}\|-\|\mathbf{r}_{0}-\mathbf{r}^{k}_{i}\|}{\|\mathbf{r}_{0}-\mathbf{r}^{k}_{i}\|}\right)^{\alpha}+1
P0(1+𝐫n2𝐫ik𝐫0𝐫ik)α+1\displaystyle\leq P_{0}\left(1+\frac{\|\mathbf{r}_{n_{2}}-\mathbf{r}^{k}_{i}\|}{\|\mathbf{r}_{0}-\mathbf{r}^{k}_{i}\|}\right)^{\alpha}+1
P0(1+2nq2𝐫0𝐫ik)α+1,\displaystyle\leq P_{0}\left(1+\frac{\sqrt{2}n^{-\frac{q}{2}}}{\|\mathbf{r}_{0}-\mathbf{r}^{k}_{i}\|}\right)^{\alpha}+1,

where the first inequality holds from the triangular inequality and the second inequality holds since both destinations (k,i)(k,i) and (k,n2)(k,n_{2}) are placed in the same square cell of area nqn^{-q}. Because 𝐫0𝐫ik=Θ(1)\|\mathbf{r}_{0}-\mathbf{r}^{k}_{i}\|=\Theta(1) whereas nq20n^{-\frac{q}{2}}\to 0 as nn\to\infty, 𝔼(|YP1,ik|2)\mathbb{E}(|Y^{k}_{P1,i}|^{2}) is upper bounded by P0(1+ϵp)+1P_{0}(1+\epsilon_{p})+1 whp, where ϵp>0\epsilon_{p}>0 is an arbitrarily small constant. Thus Lemma 2 holds. ∎

Lemma 3

Suppose that the TDMA-based cooperation is used within a group. For sufficiently large mm, C(k,i,j)C(k,i,j) is lower bounded by C1n21C_{1}n^{-1}_{2}, where C1>0C_{1}>0 is a constant independent of mm.

Proof:

Fig. 3 illustrates the worst interference scenario of Phase 22, where the groups in the shaded cells denote the active groups, determined by 44-TDMA, and a single transmission pair is served for given time in each active group. Let d=nq/2d=n^{-q/2} be the length of a cell. To obtain a lower bound on C(k,i,j)C(k,i,j), we assume that there exist 88 interferers at distance dd from the receiver, 1616 interferers at distance 3d3d, 3232 interferers at distance 5d5d, and so on. Then C(k,i,j)C(k,i,j) is lower bounded by

C(k,i,j)\displaystyle C(k,i,j)\!\!\!\!\!\!\!\! 1n2log(P1(2d)α1+P1i=18i((2i1)d)α)\displaystyle\geq\frac{1}{n_{2}}\operatorname{log}\left(\frac{P_{1}(\sqrt{2}d)^{-\alpha}}{1+P_{1}\sum_{i=1}^{\infty}8i((2i-1)d)^{-\alpha}}\right) (21)
1n2log(P1(2d)α+2α/2+3P1i=1i1α),\displaystyle\geq\frac{1}{n_{2}}\operatorname{log}\left(\frac{P_{1}}{(\sqrt{2}d)^{\alpha}+2^{\alpha/2+3}P_{1}\sum_{i=1}^{\infty}i^{1-\alpha}}\right),

where 1n2\frac{1}{n_{2}} comes from n2n_{2}-TDMA between transmission pairs in the same scheduling set. The first inequlity holds since we assume infinity number of interferers and the second inequality holds since we assume more interferers such that there are 88 interferers at distance dd, 1616 interferers at distance 2d2d, and so on. Notice that (2d)α0(\sqrt{2}d)^{\alpha}\to 0 as mm\to\infty and i=1i1α=ζ(α1)\sum_{i=1}^{\infty}i^{1-\alpha}=\zeta(\alpha-1), where ζ(s)i=1is\zeta(s)\triangleq\sum_{i=1}^{\infty}i^{-s} denotes the Riemann zeta-function which converges to a finite value if s>1s>1. Thus there exists a positive constant C1C_{1} satisfying C(k,i,j)C1n21C(k,i,j)\geq C_{1}n_{2}^{-1}, which completes the proof. ∎

Lemma 4

Suppose that the hierarchical cooperation is used within a group. For sufficiently large mm, C(k,i,j)C(k,i,j) is lower bounded by C2n2ϵC_{2}n_{2}^{-\epsilon} whp, where C2>0C_{2}>0 is a constant independent of mm and ϵ>0\epsilon>0 is an arbitrarily small constant.

Proof:

We refer Theorem 3.2 in [2] that all nodes can transmit with rate C2n2ϵC_{2}n_{2}^{-\epsilon} whp by the hierarchical cooperation. ∎

The following theorem shows the scaling behavior of N×MN\times M MIMO in which the channel matrix has i.i.d.i.i.d. elements. For our far-field channel, on the other hand, the channel elements are not i.i.d.i.i.d. due to the different path-loss terms. Thus we further lower the achievable rate in (18) to make the channel elements i.i.di.i.d. and apply the result of the following theorem.

Theorem 3 (Lozano and Tulino)

Consider the ergodic capacity of N×MN\times M MIMO channel given by C=𝔼(logdet(𝐈N+PM𝐇𝐇))C=\mathbb{E}\left(\operatorname{log}\det\left(\mathbf{I}_{N}+\frac{P}{M}\mathbf{H}\mathbf{H}^{\dagger}\right)\right), where the elements of 𝐇\mathbf{H} are i.i.di.i.d with unit variance. Define aMNa\triangleq\frac{M}{N}. As MM and NN tend to infinity, CN\frac{C}{N} scales whp as

{log(1+P) if a2log(1+1+4P2)loge4P(1+4P1)2 if a1alog(Pa)+O(a) if a0\begin{cases}\operatorname{log}(1+P)&\mbox{ if }a\to\infty\\ 2\operatorname{log}\left(\frac{1+\sqrt{1+4P}}{2}\right)-\frac{\operatorname{log}e}{4P}\left(\sqrt{1+4P}-1\right)^{2}&\mbox{ if }a\to 1\\ a\operatorname{log}\left(\frac{P}{a}\right)+\operatorname{O}(a)&\mbox{ if }a\to 0\\ \end{cases} (22)
Proof:

We refer the readers [11] for the proof. ∎

V-B1 TDMA-based cooperation

Consider the sum-rate scaling when the TDMA-based cooperation is applied within each group.

Theorem 4

Suppose the single-source wireless network. If the network performs the quantize-and-forward-based cooperative MIMO using the TDMA-based cooperation, for sufficiently large mm

Rsum={Θ(mlogm) if β>2Θ(mβ/2) if 0<β2R_{\operatorname{sum}}=\begin{cases}\Theta\left(m\operatorname{log}m\right)&\mbox{ if }\beta>2\\ \Theta\left(m^{\beta/2}\right)&\mbox{ if }0<\beta\leq 2\end{cases} (23)

is achievable whp, where we set Δ=12\Delta=\frac{1}{2} and q=12q=\frac{1}{2}.

Proof:

From (17) with Lemmas 2 and 3, we obtain whp that

NijkP0(1+ϵp)+121ΔΔC14nn221P0(1+ϵp)+12C14(1+δ)21NQ,1N^{k}_{ij}\leq\frac{P_{0}(1+\epsilon_{p})+1}{2^{\frac{1-\Delta}{\Delta}\frac{C_{1}}{4}\frac{n}{n^{2}_{2}}}-1}\leq\frac{P_{0}(1+\epsilon_{p})+1}{2^{\frac{C_{1}}{4(1+\delta)^{2}}}-1}\triangleq N_{Q,1} (24)

where the second inequality holds since n2(1+δ)n1qn_{2}\leq(1+\delta)n^{1-q} whp and Δ=q=12\Delta=q=\frac{1}{2}. Thus, for sufficiently large mm, R(k,j)R(k,j) in (18) is lower bounded whp as

R(k,j)\displaystyle R(k,j)\!\!\!\!\!\!\!\!\! 12n𝔼(logdet(𝐈n2+P0m(1+NQ,1)𝚪0k𝚯0k𝚯0k𝚪0k))\displaystyle\geq\frac{1}{2n}\mathbb{E}\left(\operatorname{log}\det\left(\mathbf{I}_{n_{2}}+\frac{P_{0}}{m(1+N_{Q,1})}\mathbf{\Gamma}^{k}_{0}\mathbf{\Theta}^{k}_{0}\mathbf{\Theta}^{k\dagger}_{0}\mathbf{\Gamma}^{k}_{0}\right)\right) (25)
12mβ/21mβ/2𝔼(logdet(𝐈n2+P0m(1+NQ,1)𝚯0k𝚯0k))\displaystyle\geq\frac{1}{2m^{\beta/2}}\frac{1}{m^{\beta/2}}\mathbb{E}\left(\operatorname{log}\det\left(\mathbf{I}_{n_{2}}+\frac{P_{0}}{m(1+N_{Q,1})}\mathbf{\Theta}^{k}_{0}\mathbf{\Theta}^{k\dagger}_{0}\right)\right)
12mβ/2R(k,j),\displaystyle\triangleq\frac{1}{2m^{\beta/2}}R^{\prime}(k,j),

where the second inequality holds since [𝚪0k]ii=𝐫0𝐫n2kα2𝐫0𝐫ikα21[\mathbf{\Gamma}^{k}_{0}]_{ii}=\frac{\|\mathbf{r}_{0}-\mathbf{r}^{k}_{n_{2}}\|^{\frac{\alpha}{2}}}{\|\mathbf{r}_{0}-\mathbf{r}^{k}_{i}\|^{\frac{\alpha}{2}}}\geq 1 for all i{1,,n2}i\in\{1,\cdots,n_{2}\}. Now consider the rate scaling of R(k,j)R^{\prime}(k,j). From Theorem 3, we know a=mn2[(1+δ)1m1β/2,(1δ)1m1β/2]a=\frac{m}{n_{2}}\in[(1+\delta)^{-1}m^{1-\beta/2},(1-\delta)^{-1}m^{1-\beta/2}] and P=P01+NQ,1P=\frac{P_{0}}{1+N_{Q,1}}. If β>2\beta>2, that is a0a\to 0 as mm\to\infty, R(k,j)R^{\prime}(k,j) scales as Θ(alog(Pa))\Theta(a\operatorname{log}(\frac{P}{a})) whp, which shows Θ(m1β/2logm)\Theta(m^{1-\beta/2}\operatorname{log}m) scaling. If β=2\beta=2 or a=1a=1, R(k,j)R^{\prime}(k,j) scales as Θ(1)\Theta(1) whp. Finally if 0<β<20<\beta<2 or aa\to\infty, R(k,j)R^{\prime}(k,j) scales as Θ(1)\Theta(1) whp. Thus R(k,j)R(k,j) scales whp as Θ(m1βlogm)\Theta(m^{1-\beta}\operatorname{log}m) if β>2\beta>2 and Θ(mβ/2)\Theta(m^{-\beta/2}) if 0<β20<\beta\leq 2. Since this scaling result holds for all kk and jj, we obtain whp

Rind={Θ(m1βlogm) if β>2Θ(mβ/2) if 0<β2.R_{\operatorname{ind}}=\begin{cases}\Theta\left(m^{1-\beta}\operatorname{log}m\right)&\mbox{ if }\beta>2\\ \Theta\left(m^{-\beta/2}\right)&\mbox{ if }0<\beta\leq 2.\end{cases} (26)

From the fact that Rsum=mβRindR_{\operatorname{sum}}=m^{\beta}R_{\operatorname{ind}}, we obtain (23), which completes the proof. ∎

For the ad hoc network, the hierarchical cooperation is essential to achieve the capacity scaling. For the single-source network, on the other hand, if β>2\beta>2 the simple TDMA-based cooperation is enough to achieve the capacity scaling. It suggests that if we deploy a relatively large number of destinations in the network, that is β>2\beta>2, we can reduce the network complexity drastically while still achieving the sum-rate proportional to the number of source antennas. As shown later, if 0<β20<\beta\leq 2, the hierarchical cooperation is required to achieve the capacity scaling.

V-B2 Hierarchical cooperation

Consider the sum-rate scaling when the hierarchical cooperation is applied within each group.

Theorem 5

Suppose the single-source wireless network. If the network performs the quantize-and-forward-based cooperative MIMO using the hierarchical cooperation, for sufficiently large mm,

Rsum={Θ(mlogm) if β>(1ϵ)1Θ(mβ(1ϵ)) if 0<β(1ϵ)1R_{\operatorname{sum}}=\begin{cases}\Theta\left(m\operatorname{log}m\right)&\mbox{ if }\beta>(1-\epsilon)^{-1}\\ \Theta\left(m^{\beta(1-\epsilon)}\right)&\mbox{ if }0<\beta\leq(1-\epsilon)^{-1}\end{cases} (27)

is achievable whp, where we set Δ=12\Delta=\frac{1}{2} and q=ϵq=\epsilon and ϵ>0\epsilon>0 is an arbitrarily small constant.

Proof:

Since the overall procedure is similar to the proof of Theorem 4, we briefly explain the outline of the proof. From (17) with Lemmas 2 and 4, we obtain whp that

NijkP0(1+ϵp)+121ΔΔC24n1ϵn2P0(1+ϵp)+12C24(1+δ)1NQ,2.N^{k}_{ij}\leq\frac{P_{0}(1+\epsilon_{p})+1}{2^{\frac{1-\Delta}{\Delta}\frac{C_{2}}{4}\frac{n^{1-\epsilon}}{n_{2}}}}\leq\frac{P_{0}(1+\epsilon_{p})+1}{2^{\frac{C_{2}}{4(1+\delta)}}-1}\triangleq N_{Q,2}. (28)

For sufficiently large mm,

R(k,j)12mβϵ1mβ(1ϵ)𝔼(logdet(𝐈n2+P0m(1+NQ,2)𝚯0k𝚯0k)),R(k,j)\geq\frac{1}{2m^{\beta\epsilon}}\frac{1}{m^{\beta(1-\epsilon)}}\mathbb{E}\left(\operatorname{log}\det\left(\mathbf{I}_{n_{2}}+\frac{P_{0}}{m(1+N_{Q,2})}\mathbf{\Theta}^{k}_{0}\mathbf{\Theta}^{k\dagger}_{0}\right)\right), (29)

whp. Since a[(1+δ)1m1β(1ϵ),(1δ)1m1β(1ϵ)]a\in\left[(1+\delta)^{-1}m^{1-\beta(1-\epsilon)},(1-\delta)^{-1}m^{1-\beta(1-\epsilon)}\right] and P=P01+NQ,2P=\frac{P_{0}}{1+N_{Q,2}}, from Theorem 3, we obtain whp Rind=Θ(m1βlogm)R_{\operatorname{ind}}=\Theta(m^{1-\beta}\operatorname{log}m) for β>(1ϵ)1\beta>(1-\epsilon)^{-1}, which is the case that a0a\to 0. Similarly, we obtain whp Rind=Θ(mβϵ)R_{\operatorname{ind}}=\Theta(m^{-\beta\epsilon}) for β(1ϵ)1\beta\leq(1-\epsilon)^{-1}. From the fact that Rsum=mβRindR_{\operatorname{sum}}=m^{\beta}R_{\operatorname{ind}}, we obtain (27), which completes the proof. ∎

Notice that, for β>(1ϵ)1\beta>(1-\epsilon)^{-1}, the sum-rate capacity of the single-source network scales as Θ(mlogm)\Theta(m\operatorname{log}m) whp. For 0<β(1ϵ)10<\beta\leq(1-\epsilon)^{-1}, the lower and upper bounds show a gap of Θ(mϵlogm)\Theta(m^{\epsilon}\operatorname{log}m) but it is negligible compared to Θ(mβ)\Theta(m^{\beta}) in the limit of large mm.

V-C Multiple Antennas at Destinations

Consider the effect of multiple antennas at the destinations. Let l=mγl=m^{\gamma} be the number of antennas at each destination, where γ[0,1]\gamma\in[0,1]. Then the upper bound is given by Rsum=O(mmin{1,β+γ}logm)R_{\operatorname{sum}}=\operatorname{O}(m^{\operatornamewithlimits{min}\{1,\beta+\gamma\}}\operatorname{log}m), which is directly obtained from Theorem 1 by regarding each receive antenna as a node. If we apply the TDMA-based cooperation, the rate of Phase 22 scales as Θ(lln2)=Θ(1n2)\Theta(\frac{l}{ln_{2}})=\Theta(\frac{1}{n_{2}}) since the rate increases proportionally to ll and there exist ln2ln_{2} receive antennas in a group, meaning ln2ln_{2}-TDMA is needed in a scheduling set. Thus RsumR_{\operatorname{sum}} scales whp as Θ(mlogm)\Theta(m\operatorname{log}m) for β>2(1γ)\beta>2(1-\gamma) and Θ(mβ/2+γ)\Theta(m^{\beta/2+\gamma}) for β2(1γ)\beta\leq 2(1-\gamma). If we apply the hierarchical cooperation, the rate of Phase 22 is the same as Lemma 4. Thus RsumR_{\operatorname{sum}} scales whp as Θ(mlogm)\Theta(m\operatorname{log}m) for β>(1γ)(1ϵ)1\beta>(1-\gamma)(1-\epsilon)^{-1} and Θ(mβ(1ϵ)+γ)\Theta(m^{\beta(1-\epsilon)+\gamma}) for β(1γ)(1ϵ)1\beta\leq(1-\gamma)(1-\epsilon)^{-1}. We omit the detailed procedure, which is the same as Theorems 4 and 5.

In conclusion, if multiple antennas are equipped at each destination as well as the source, then linear scaling is achievable if α+β1\alpha+\beta\geq 1 and TDMA-based cooperation can achieve the optimal scaling if β>(1γ)(1ϵ)1\beta>(1-\gamma)(1-\epsilon)^{-1}.

VI Conclusion

In this paper, we consider the capacity scaling of the single-source wireless network when the source has mm antennas. We propose the cooperative MIMO scheme using quantize-and-forward. We show that, like the single-destination network, the sum-rate proportional to mm is achievable if n=Ω(m)n=\Omega(m) even without CSIT. The sum-rate capacity scales whp as

{Θ(mlogm) if β>(1ϵ)1Ω(mβ(1ϵ)) and O(mmin{β,1}logm) if 0<β(1ϵ)1.\begin{cases}\Theta(m\operatorname{log}m)&\mbox{ if }\beta>(1-\epsilon)^{-1}\\ \Omega(m^{\beta(1-\epsilon)})\mbox{ and }\operatorname{O}(m^{\operatornamewithlimits{min}\{\beta,1\}}\operatorname{log}m)&\mbox{ if }0<\beta\leq(1-\epsilon)^{-1}.\end{cases} (30)

Note that the gap between upper and lower bounds becomes negligible for sufficiently large mm. To achieve linear capacity scaling in mm, we apply the hierarchical cooperation to relay the quantized received signals. As the number of destinations becomes large enough to satisfy β>2\beta>2, the simple TDMA-based cooperation also achieves the capacity scaling.

References

  • [1] P. Gupta and P. R. Kumar, “The capacity of wireless networks,” IEEE Trans. Inf. Theory, vol. 46, pp. 388–404, Mar. 2000.
  • [2] A. Özgür, O. Lévêque, and D. Tse, “Hierarchical cooperation achieves optimal capacity scaling in ad hoc networks,” IEEE Trans. Inf. Theory, vol. 53, pp. 3549–3572, Oct. 2007.
  • [3] H. El Gamal, “On the scaling laws of dense wireless sensor networks: the data gathering channel,” IEEE Trans. Inf. Theory, vol. 51, pp. 1229–1234, Mar. 2005.
  • [4] G. J. Foschini and M. J. Gans, “On limits of wireless communications in a fading environment when using multiple antennas,” Wireless Personal Commun., vol. 6, pp. 311–335, Mar. 1998.
  • [5] I. E. Telatar, “Capacity of multi-antenna Gaussian channels,” European Trans. on Telecommun., vol. 10, pp. 585-595, Nov. 1999.
  • [6] G. Caire and S. Shamai, “On the achievable throughput of a multiple antenna systems using beamforming and dirty paper coding,” IEEE Trans. Inf. Theory, vol. 49, pp. 1691–1706, July 2003.
  • [7] H. Weingarten, Y. Steinberg, and S. Shamai, “The capacity region of the Gaussian multiple-input multiple-output broadcast channel,” IEEE Trans. Inf. Theory, vol. 52, pp. 3936–3964, Sept. 2006.
  • [8] T. Yoo and A. Goldsmith, “On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming,” IEEE J. Select. Areas Commun., vol. 24, pp. 528–541, Mar. 2006.
  • [9] S. Boyd and L. Vandenberghe, Convex Optimazation. New York: Cambridge Univ. Press, 2004.
  • [10] T. M. Cover and J. A. Thomas, Elements of Information Theory. New York: Wiley, 1991.
  • [11] A. Lozano and A. M. Tulino, “Capacity of multiple-transmit multiple-receive antenna architecture,” IEEE Trans. Inf. Theory, vol. 48, pp. 3117–3128, Dec. 2002.
TABLE I: Summary of notations: 𝐀\mathbf{A} and 𝐚\mathbf{a} denote a matrix and vector, respectively
𝐀( or 𝐚)Conjugate transpose of 𝐀( or 𝐚)𝐀T( or 𝐚T)Transpose of 𝐀( or 𝐚)Tr(𝐀)Trace of 𝐀[𝐀]ij(i,j)-th component of 𝐀𝐈nn×n identity matrix𝐚norm of 𝐚diag(a1,,an)diagonal matrix with [diag(a1,,an)]ii=ai\begin{array}[]{|c|c|}\hline\cr\mathbf{A}^{\dagger}(\mbox{ or }\mathbf{a}^{\dagger})&\mbox{Conjugate transpose of }\mathbf{A}(\mbox{ or }\mathbf{a})\\ \hline\cr\mathbf{A}^{T}(\mbox{ or }\mathbf{a}^{T})&\mbox{Transpose of }\mathbf{A}(\mbox{ or }\mathbf{a})\\ \hline\cr\operatorname{Tr}(\mathbf{A})&\mbox{Trace of }\mathbf{A}\\ \hline\cr[\mathbf{A}]_{ij}&\mbox{$(i,j)$-th component of }\mathbf{A}\\ \hline\cr\mathbf{I}_{n}&\mbox{$n\times n$ identity matrix}\\ \hline\cr\|\mathbf{a}\|&\mbox{norm of $\mathbf{a}$}\\ \hline\cr\operatornamewithlimits{diag}(a_{1},\cdots,a_{n})&\mbox{diagonal matrix with $[\operatornamewithlimits{diag}(a_{1},\cdots,a_{n})]_{ii}=a_{i}$}\\ \hline\cr\end{array}
Refer to caption
Figure 1: The overall procedure of the proposed scheme, where the group in the shaded cells denote the active groups determined by 44-TDMA.
Refer to caption
Figure 2: Cooperative MIMO from the source to destination (k,j)(k,j).
Refer to caption
Figure 3: Worst interference for Phase 22.