Sunteți pe pagina 1din 15

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/224131031

Convex Optimization-Based Beamforming

Article  in  IEEE Signal Processing Magazine · June 2010


DOI: 10.1109/MSP.2010.936015 · Source: IEEE Xplore

CITATIONS READS

293 3,191

5 authors, including:

N.D. Sidiropoulos Shahram Shahbazpanahi


University of Minnesota Twin Cities University of Ontario Institute of Technology
267 PUBLICATIONS   10,349 CITATIONS    144 PUBLICATIONS   3,749 CITATIONS   

SEE PROFILE SEE PROFILE

Björn Ottersten
University of Luxembourg
779 PUBLICATIONS   17,479 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

PROSAT: on-board PROcessing techniques for high throughput SATellites View project

Cooperative and Cognitive Architectures for Satellite Networks (CO2SAT) View project

All content following this page was uploaded by N.D. Sidiropoulos on 21 May 2014.

The user has requested enhancement of the downloaded file.


1

Convex Optimization-based Beamforming: From Receive


to Transmit and Network Designs
Accepted for publication in IEEE Signal Processing Magazine

c 2010 IEEE. Personal use of this material is permitted. However, permission to reprint/republish this material for
advertising or promotional purposes or for creating new collective works for resale or redistribution to servers or lists,
or to reuse any copyrighted component of this work in other works must be obtained from the IEEE.

ALEX B. GERSHMAN, NICHOLAS D. SIDIROPOULOS, SHAHRAM


SHAHBAZPANAHI, MATS BENGTSSON, AND BJÖRN OTTERSTEN

Stockholm 2010

IR–EE–SB 2010:007
1

Convex Optimization-based Beamforming: From


Receive to Transmit and Network Designs
Alex B. Gershman, Nicholas D. Sidiropoulos, Shahram Shahbazpanahi, Mats Bengtsson, and Björn Ottersten

Abstract—In this article, an overview of advanced convex lack robustness against even small mismatches in the desired
optimization approaches to multi-sensor beamforming is pre- signal steering vector [2]-[3], several authors proposed robust
sented, and connections are drawn between different types of techniques that are based on the concept of worst-case per-
optimization-based beamformers that apply to a broad class of
receive, transmit, and network beamformer design problems. It is formance optimization; see [4]-[11] and references therein.
demonstrated that convex optimization provides an indispensable One distinguishing feature of this line of work is that, using
set of tools for beamforming, enabling rigorous formulation convex optimization theory, seemingly complex robust design
and effective solution of both longstanding and emerging design problems formulated in [4]-[11] have been recast into tractable
problems. convex forms and efficiently solved using interior point algo-
rithms or other appropriate numerical techniques. Beyond the
I. I NTRODUCTION deterministic worst-case robust beamformer designs of [4]-
Beamforming is a versatile and powerful approach to re- [11], there has been a recent trend to alternatively use less
ceive, transmit, or relay signals-of-interest in a spatially selec- conservative probabilistically-constrained designs [12] which
tive way in the presence of interference and noise. Receive employ convex optimization to solve the resulting chance
beamforming is a classic yet continuously developing field programming problems. Moreover, both the worst-case and
that has a rich history of theoretical research and practical probabilistically-constrained beamforming approaches have
applications to radar, sonar, communications, microphone ar- been extended to the case of designing multi-user receivers
ray speech/audio processing, biomedicine, radio astronomy, for space-time coded multiple-input multiple-output (MIMO)
seismology and other areas [1]. In the last decade, there has communication systems [13]-[14].
been renewed interest in beamforming driven by applications Transmit beamforming is a relatively young and dynam-
in wireless communications, where multi-antenna techniques ically developing research field. Classical beamforming is
have emerged as one of the key technologies to accommodate matched to a single steering vector of interest (or, in the case
the explosive growth of the number of users and rapidly of robust beamforming, a “ball” of steering vectors around
increasing demands for new high data-rate services. the “nominal” one) and its goal is to ensure that the inner
Recently, there has been significant progress in the field product of the beamforming weight vector and the steering
of receive beamforming facilitated by convex optimization. vector of interest is large, while the inner product of the
Motivated by the fact that the traditional adaptive beam- beamforming weight vector and all other steering vectors
forming techniques such as minimum variance beamforming is small (to mitigate interference). This paradigm applies to
both receive beamforming and unicast transmit beamforming
A. B. Gershman is the corresponding author. He is with with the
Communication Systems Group, Institute of Telecommunications, Darmstadt towards a single receiver. A related but different case is that of
University of Technology, Merckstr. 25, D-64283 Darmstadt, Germany, e- multi-user transmit beamforming, which arises in the cellular
mail: gershman@nt.tu-darmstadt.de, phone: +49 6151 162813, fax: multi-user downlink when the transmitter is equipped with
+49 6151 162913. N. D. Sidiropoulos is with the Department of Elec-
tronic and Computer Engineering, Technical University of Crete, Chania multiple transmit antennas. In this case, multiple transmit
73100, Greece; e-mail: nikos@telecom.tuc.gr, phone: +30 28210 beamforming weight vectors are used to carry different co-
37227, fax: +30 28210 37542. S. Shahbazpanahi is with the Faculty of channel unicast transmissions, each meant to reach the receiver
Engineering and Applied Science, University of Ontario Institute of Tech-
nology, 2000 Simcoe Street North, Oshawa, Ontario, L1H 7K4, Canada; of one user. These vectors are then jointly designed to balance
e-mail: shahram.shahbazpanahi@uoit.ca, phone: +1 905 7213111 the interference between different transmissions. The weight
(ext. 2842), fax: +1 905 7213370. M. Bengtsson and B. Ottersten are with vector designed for a given user should have a large inner
the School of Electrical Engineering, Royal Institute of Technology, SE-
10044 Stockholm, Sweden; e-mails: mats.bengtsson@ee.kth.se and product with the steering vector of this user, and small
bjorn.ottersten@ee.kth.se, phone +46 8790 8463, fax: +46 8790 inner products with the steering vectors of all other users.
7260. B. Ottersten is also with securityandtrust.lu at the University of Luxem- This concept was pioneered in [15]-[16] where several early
bourg. The work of A. B. Gershman was supported in parts by the European
Research Council (ERC) Advanced Investigator Grants program under Grant downlink beamforming techniques have been developed in the
227477-ROSE and German Research Foundation (DFG) under Grant GE context of voice services in a cellular mobile radio network
1881/4-1. The work of S. Shahbazpanahi was supported by the National where, from the operator’s perspective, the system should
Science and Engineering Research Council of Canada (NSERC) under the
Discovery Grants program. The work of N. D. Sidiropoulos was supported provide an acceptable quality-of-service (QoS) to each user
by ARL-ERO contract W911NF-09-1-0004. The work of M. Bengtsson was and serve as many users as possible, while radiating as low
supported by the Swedish Research Council (VR). The work of B. Ottersten power as possible. An important step forward followed in [17],
has received funding from the European Research Council under the European
Community’s Seventh Framework Programme (FP7/2007-2013) / ERC grant where convex optimization methods were used to solve the
agreement no 228044. problems of [15]-[16] and their robust worst-case optimization
2

based extensions. As the robust designs of [17] are based techniques have been extensively used in these works to obtain
on several approximations and can be shown to be overly- computationally attractive (exact or approximate) solutions to
conservative, recent follow-up work has pursued less conser- originally difficult design problems.
vative robust designs based on convex optimization [18]-[19]. The main goal of this paper is to present a system-
To provide more flexibility than that of worst-case designs, atic overview of the current state of the art of advanced
outage probability-constrained downlink beamformers based optimization-based beamforming, and to explore interrela-
on chance programming have also been recently developed tionships between different types of beamformers that apply
[20], [21], [22]. to a broad class of practically important receive, transmit,
What if we wish to transmit common information to many and network beamforming problems. While the focus of this
users? The traditional way of doing this is (semi-) blind, in the article is on applications in wireless communications, several
sense that it assumes little if anything regarding the steering designs considered here are also applicable in quite different
vectors or even the spatial distribution of users listening to application contexts, such as MIMO radar.
the transmission at any given time. In traditional radio and The remainder of this paper is organized as follows. Sec-
TV broadcasting, for example, the signal is emitted either tions II, III and IV are devoted to the receive, transmit, and
isotropically or with a fixed beampattern to cover a service network beamforming problems, respectively. In Section V,
area. There are many reasons for this, including the fact that conclusions are drawn and future research directions are
analog receivers were passive devices incapable of provid- briefly discussed.
ing feedback to the transmitting station. In modern digital Notation: Uppercase and lowercase bold letters denote
wireless networks, particularly those based on subscription or matrices and vectors, respectively. E{·}, Tr(·), (·)T , and (·)H
offering location-aware services, we often have some level stand for the statistical expectation, trace of a matrix, trans-
of channel state information (CSI) at the transmitter. This pose, and Hermitian transpose, respectively. I is the identity
can be exploited to boost network reach, coverage, quality of matrix. k · k denotes the Euclidean norm of a vector or the
service, and spectral efficiency; and minimize interference to Frobenius norm of a matrix. ⊙ denotes the Schur-Hadamard
other systems (thus facilitating co-habitation, as in cognitive (element-wise) matrix or vector product, diag(a) stands for
radio). This is the premise of a recent line of work (starting a diagonal matrix whose diagonal entries are the elements of
with [23] and [24]) on multicast beamforming using convex vector a, and λmax (·) stands for the principal eigenvalue of a
optimization tools. Multicast beamforming is now part of matrix.
the current UMTS-LTE / EMBMS draft for next-generation
cellular wireless services [25], [26]. Similar ideas are currently
II. R ECEIVE B EAMFORMING
making their way through fixed wireless and local distribution
standardization committees, and are likely to influence media The output signal of a narrowband receive beamformer can
distribution to wireless hand-held devices. be written as
Information-theoretic analysis of the relay channel [39] and x(t) = wH y(t)
multiple-relay networks [40] has paved the way for more
practical network cooperation schemes. Network beamforming where w is the N × 1 vector of beamformer complex weight
is a rapidly emerging area that belongs to the general field of coefficients, y(t) is the N ×1 complex snapshot vector of array
cooperative communications [27]. The key idea of network observations, and N is the number of antenna array sensors.
beamforming is to use a “virtual array” of relay nodes that The array observation vector can be modeled as
retransmit properly weighted signals from the source to the y(t) = s(t) + n(t)
destination [28], thereby exploiting cooperation diversity. In
the simplest setting, a distributed network beamformer uses where s(t) and n(t) are the desired signal and the interference-
an adaptive complex-valued weighting of the received signal, plus-noise components of y(t), respectively. In the point signal
similar to the so-called amplify-and-forward protocol. More source case, s(t) = s(t)as where s(t) and as are the desired
advanced types of relay processing (e.g., based on the decode- signal waveform and its steering vector (spatial signature),
and-forward strategy) are also possible. An interesting fea- respectively.
ture of network beamforming is that it can be interpreted If as and the true array covariance matrix R ,
as a certain combination of receive and transmit strategies. E{y(t)yH (t)} are perfectly known, then the optimal weight
However, the main difference between the concept of network vector can be straightforwardly obtained by means of maxi-
beamforming and the more traditional concepts of receive and mizing the signal-to-interference-plus-noise ratio (SINR) [1],
transmit beamforming is that the relays can hardly exchange see Fig. 1. In the finite sample case, the true array covari-
information about their received signals, so that beamforming ance matrix
PJis unavailable and, therefore, its sample estimate
is performed in a distributed fashion. There has been a R̂ = J1 t=1 y(t)yH (t) = J1 YY H is used instead of R
rapidly growing activity in this area over the last two years. where Y , [y(1), . . . , y(J)] is the beamformer training data
Following [28], a number of new concepts and methods have matrix and J is the number of snapshots available. Then,
been proposed, see [29]-[38] and references therein. These the optimal weight vector can be approximately computed by
include multi-user and bi-directional extensions of the original solving the following convex problem [1]-[3]
approach of [28] and new beamforming strategies such as a
filter-and-forward approach [33], [34]. Convex optimization min wH R̂w s.t. wH as = 1. (1)
w
3

dependent [2], [4]. To avoid the aforementioned drawbacks of


the standard DL technique, more theoretically rigorous robust
Interferer 1 MV beamforming algorithms have been recently proposed in
[4]-[8] based on worst-case designs.

Desired The key idea of the beamformer developed in [4] and,


signal independently, in [7], is to explicitly model the steering vector
uncertainty as δ , ãs − as where ãs and as are the actual
and presumed signal steering vectors, respectively; and to
assume that the Euclidean norm of δ is upper-bounded by
a known constant ε. This corresponds to the case of spherical
uncertainty; a more general ellipsoidal uncertainty model has
been considered in [7] and [8].
The essence of the approach of [4] is to add robustness
Interferer 2 to the standard MV beamforming problem (1) by using the
distortionless response constraint which must be satisfied for
all mismatched signal steering vectors in the given spherical
uncertainty set. With such a constraint, robust MV beamformer
design has been formulated in [4] as the following optimiza-
tion problem:

Fig. 1. Illustration of receive adaptive beamforming: Polar plot of adapted min wH R̂w s.t. |wH (as + δ)| ≥ 1 ∀ kδk ≤ ε. (3)
beampattern. The beamformer output SINR is maximized by means of w
enhancing the desired signal by the beampattern mainlobe and rejecting the
interferers by beampattern nulls.

Note that the constraint in (3) warrants that the distortionless


The solution to (1) can be expressed in the following response will be maintained in the worst case, i.e., for the
familiar closed form [1]: particular choice of δ which corresponds to the smallest value
of |wH (as +δ)| provided that kδk ≤ ε. Towards converting (3)
w = β R̂−1 as (2) to convex form, it has been shown in [4] that, for reasonably
small size of the uncertainty region, ε ≤ |wH as |/kwk,
where the scalar β = (aH
s R̂
−1
as )−1
does not affect the
beamformer output SINR. The beamformer in (2) is usually
referred to as the sample matrix inversion (SMI) based mini-
mum variance (MV) technique. min |wH (as + δ)| = |wH as | − εkwk. (4)
kδk≤ε
The fact that the sample array covariance matrix R̂ is
used instead of R in (1) is known to dramatically affect the
performance of (2) as compared to the optimal beamformer Using (4) and taking into account that the objective function in
in the case when the desired signal component is present (3) remains unchanged when w undergoes an arbitrary phase
in the training samples [2], [3]. Note that the latter case is rotation, it has been shown in [4] that (3) can be converted to
typical for multi-antenna wireless communications and passive the following convex form:
source localization. Such a performance degradation caused by
signal cancellation is commonly termed as signal self-nulling.
It becomes especially strong in practical scenarios, when the
min wH R̂w s.t. wH as ≥ εkwk + 1 (5)
knowledge of as is imperfect as well [3]. w
One of the most popular ad hoc approaches to improve
the robustness of the SMI-based MV technique and to avoid
signal self-nulling is the diagonal loading (DL) method [2], where the constraint in (5) also implicitly constrains wH as to
[41] whose key idea is to regularize the solution of (1) by be real-valued and positive. The problem in (5) belongs to the
adding the quadratic penalty term γwH w to the objective class of second-order cone programming (SOCP) problems
function, where γ is a preselected DL factor. The resulting that can be easily solved (with complexity comparable to
loaded SMI (LSMI) beamformer amounts to replacing the that of the SMI-based MV beamformer) using standard and
sample covariance matrix R̂ in (2) by its diagonally loaded highly efficient convex optimization software [42]-[43] or,
counterpart, γI + R̂. alternatively, using Newton-type algorithms [7], [8], [44]. It
The main shortcoming of the traditional DL approach is that can be proved [4] that the constraint in (5) is active, i.e., it is
there is no easy and reliable way of choosing the DL factor satisfied with equality. Interestingly, the robust design in (5)
γ. Note that any fixed choice of γ can be only suboptimal, admits an adaptive DL interpretation; see our first insert to
because the optimal choice of γ is known to be scenario- appreciate this link.
4

Adaptive DL interpretation of the robust beamformer (5). Taking into account


that the constraint in (5) is active and using the Lagrange multiplier method, the
to be maintained for all norm-bounded mismatch vectors in
solution of (5) can be found by minimizing the Lagrangian function [8] the uncertainty sphere), the soft (probabilistic) constraint in
H H
L(w, λ) = w R̂w − λ(w as − εkwk − 1)
(9) maintains the distortionless response only for the mismatch
vectors δ whose probability is sufficiently high, while ignoring
where λ is the Lagrange multiplier. Computing the gradient of L(w, λ) and
equating it to zero yields the values of δ which are unlikely to occur. Therefore, the
w constraint in (9) can be interpreted as an outage probability
R̂w + λε = λas . (6)
kwk constraint maintaining this probability (pout = 1 − p) low.
Since rescaling the weight vector by an arbitrary constant does not affect the It has been shown in [12] that for both circularly symmetric
output SINR, (6) can be transformed to Gaussian and for the worst-case distribution1 of the steering
µ ¶
R̂ +
ε
I w = as (7)
vector mismatch, the chance programming problem in (9)
kwk can be tightly approximated by means of deterministic SOCP
where, for the sake of simplicity, the same notation w is used for the rescaled problems. Interestingly, the latter problems are mathematically
weight vector as for the original one in (6).
quite similar to (5). However, an important advantage of the
From (7), it can be seen that the robust beamformer (5) belongs to the class of
probability-constrained beamformers of [12] with respect to
adaptive DL techniques because its DL factor ε/kwk depends on kwk and,
their worst-case counterparts of [4] and [7] is that the former
therefore, is scenario-dependent. In contrast to the fixed DL approach, such
beamformers enable to explicitly quantify the parameters of
adaptive diagonal loading optimally matches the DL factor to the radius ε of
the uncertainty region in terms of the beamformer outage
the uncertainty sphere.
probability. This streamlines the choice of ε.
Extensions of worst-case beamformer designs: One useful Further convex optimization-based extensions of the robust
extension of the robust beamformer (5) has been developed in beamformers discussed in this section have been recently
[6]. In this work, a more general case is considered where, proposed. In [9], a semidefinite programming (SDP) approach
apart from the steering vector mismatch, there is a nonsta- has been developed to extend the beamformers of [4] and [7]
tionarity of the beamformer training data. This nonstationarity to a more general (than the spherical and ellipsoidal) class
is characterized in [6] by the matrix ∆ which models the of uncertainty models. Several broadband generalizations of
mismatch in the data matrix Y, and it is proposed to combine [4] have been proposed in [10] and [11]. Extensions of the
the robustness against interference nonstationarity and steering approaches of [4] and [12] to the problem of designing robust
vector errors using the ideas similar to that of [4] and [7]. multi-user MIMO receivers have been developed in [13] and
Correspondingly, the objective function in (3) can be modified [14], respectively.
as Before moving on, it is instructive to summarize three
max k(Y + ∆)H wk2 different approaches towards beamforming under uncertainty,
k∆k≤η
using the relatively simple case of receive beamforming as an
where η is some known upper bound on the matrix ∆. example: see our second insert.
It has been shown in [6] that the resulting modified problem Beamforming under uncertainty:
can be converted to the following convex form: • Worst-case design:
H H
min kYH wk + ηkwk s.t. wH as ≥ εkwk + 1. (8) min w R̂w s.t. |w (as + δ)| ≥ 1 ∀ kδk ≤ ε.
w
w
• Probabilistic design:
Note that, similar to (5), the problem in (8) belongs to the H H
min w R̂w s.t. Pr{|w (as + δ)| ≥ 1} > p
class of SOCP problems and, hence, it can be easily solved. w

Another useful extension of the approach of [4] and [7] Interpretation: in a long sequence of “trials” (i.i.d. draws of δ), acceptable
performance is guaranteed in p × 100% of cases; signal outage happens with
has been developed in [12]. The authors of [12] argue that, probability (at the rate of) less than 1 − p.
although the worst-case beamformer designs are known to • Expectation-based design:
result in quite robust techniques, they might be overly con- H H
min w R̂w s.t. E{|w (as + δ)|} ≥ t
w
servative because the actual worst operational conditions may
occur in practice with a very low (or even zero) probability. The latter only requires knowledge of the second-order statistics (instead of
the distribution) of h := as + δ, which is convenient. The flip side is that this
This motivated the authors of [12] to develop an alternative formulation offers no outage performance guarantee in general. For this reason,
approach to robust beamforming that provides the robustness expectation-based design is the “last resort” way of dealing with uncertainty.

only against “likely” spatial signature errors. Using this phi-


losophy, the probabilistically constrained counterpart of the III. T RANSMIT B EAMFORMING
problem (3) can be written as [12]
A. Downlink Beamforming
min wH R̂w s.t. Pr{|wH (as + δ)| ≥ 1} > p (9) For notational convenience, we consider a single base
w

where δ is assumed to be a random mismatch vector drawn station equipped with N antennas, transmitting individual
from some known distribution, Pr{·} is the probability oper- narrowband data streams to a set of M users, each having a
ator whose explicit form can be obtained from the statistical single antenna. Note that all results in this section generalize
assumptions on the steering vector errors, and p is some pre- 1 The worst-case distribution (for given covariance) of the mismatch vec-
selected probability threshold. In contrast to the deterministic tor turns out to be discrete. This result entails an intermediate restriction
constraint used in (3) (that requires the distortionless response (strengthening) of the outage constraint, see [12] for details.
5

problem can be formulated as a SOCP program


M
X
min kwm k2 (13)
{wm }M
m=1 m=1
M
X
s.t. (wkH hk )2 ≥ γk |wlH hk |2 + γk σk2 ∀ k = 1, . . . , M
l6=k

where wkH hk is real-valued and positive.


In practical cases, instantaneous CSI is often unavailable. If
the channels instead are assumed to be randomly fading with
known second-order statistics Rm = E[hm hH m ], the SINR
balancing problem can be written as
M
X
min kwm k2 (14)
{wm }M
m=1 m=1
wkH Rk wk
s.t. PM ≥ γk ∀ k = 1, . . . , M.
H + σk2
l6=k wl Rk wl
Fig. 2. Illustration of downlink beamforming, where one base station
transmits to two mobiles and another base station transmits to a third mobile,
using the strategy (14). Note that the previous case of known instantaneous channels
corresponds to setting Rm = hm hH m . Note also that here the
QoS constraints are expressed in terms of the ratio between
straightforwardly to scenarios with multiple cells, see [17]. the average signal power and the average interference plus
The signal transmitted at the base station is given by noise power. For receive beamforming, where the signal of
interest and the interference pass through independently fading
M
X channels, such a constraint provides a (tight) lower bound
y(t) = sm (t)wm (10) on the average SINR. This follows from Jensen’s inequality,
m=1 since 1/x is a convex function. See also [45], [46] for outage
bounds and other results related to this measure of SINR. For
where sm (t) and wm are the transmitted signal intended for downlink beamforming, the physical channel for the intracell
user m and the beamforming vector for this user, respectively. interference is the same as for the desired signal, but the above
The signal received at user m is given by results still hold approximately, since the effective channels
(including beamforming) will be approximately uncorrelated
xm (t) = hH
m y(t) + nm (t) (11) in the numerator and denominator for any good choice of
beamformers - at least if the number of antennas is sufficiently
where hm is the downlink channel vector of user m and nm (t) large.
is additive noise with power σm 2
. The problem in (14) is a non-convex quadratic program; in
general, such problems can be NP-hard. However, the specific
A basic (and meaningful from the network operator’s per-
problem formulation (14) exhibits much extra structure that
spective) formulation of the downlink beamforming problem
allows it to be solved efficiently. One possibility is to use
is to impose a constraint on the received SINR of each user
the idea of semidefinite relaxation [47]. Defining the matrices
and minimize the total transmitted power subject to these H
Wm , wm wm and noting that wlH Rk wl = Tr(Rk Wl ), the
constraints; this is often referred to as SINR balancing. The
problem (14) can be transformed to
formulations considered below can be extended to systems
using dirty paper coding, see e.g. [54] and references therein, M
X
which also provide connections to information-theoretic results min Tr(Wm )
{Wm }M
m=1
on the rate region. When the channel vectors hm are known, m=1
M
the resulting optimization problem can be written as X
s.t. Tr(Rk Wk ) − γk Tr(Rk Wl ) ≥ γk σk2 , (15)
M l6=k
X
min kwm k2 (12) Wk º 0, rank(Wk ) = 1, k = 1, . . . , M
{wm }M
m=1 m=1
where A º 0 means that A is positive semidefinite. The key
|wkH hk |2
s.t. PM ≥ γk ∀ k = 1, . . . , M in this transformation is that it explicitly reveals and isolates
l6=k |wlH hk |2 + σk2 the non-convex part of the problem. Except for the rank-one
constraints rank(Wk ) = 1 (k = 1, . . . , M ), the remaining
where γk denotes the desired minimum SINR for user k. As problem is convex. Dropping these constraints (thus generally
neither the objective function nor the constraints change if enlarging the feasible set), one obtains a relaxed SDP problem,
the beamforming vectors undergo a phase rotation [17], this which is convex and far easier to solve.
6

There are at least three possible interpretations of this non-zero in a sub-vector corresponding to one of the base
semidefinite relaxation stations. One proof is based on the simple observation that
the corresponding optimal matrices Wk in the semidefinite
• With the rank constraints rank(Wk ) = 1, (15) is com-
reformulation will be both block-diagonal and rank-one, which
pletely equivalent to (14). This problem can become a
is only possible if only one of the blocks is non-zero. An
relaxed version of (14) only when the matrices Wk are
alternative is to exploit the virtual uplink formulation and
allowed to have any rank.
use general results from the theory of standard interference
• It can be shown that the semidefinite relaxation of (15)
functions [49]. Algorithmically, this conceptual idea can be
is the Lagrange dual of the Lagrange dual of (14).
implemented with a computational complexity that is only
• If we allow the beamforming vectors to be randomly
K times larger than in the case with a given base station
time-varying with covariance matrix Wk = E[wk wkH ],
assignment, where K is the number of base stations.
the optimal choice of Wk is given by the semidefinite
relaxation of (15). One possible practical implementation Connection between Lagrange duality and virtual uplink. Introducing the
of such a scheme is to use a space-time code with the dual variables qk for the constraints in (14), the Lagrangian can be written as
corresponding transmit covariance matrix. M M

M

H Rk
X 2
X X H 2
L(wk , qk ) = kwm k − qk wk
 wk − wl Rk wl − σk
For general non-convex quadratic programs, semidefinite re- m=1 k=1
γk l6=k

laxation can only be used to obtain a lower bound on the and minimizing with respect to wk results in the dual problem
optimal objective function and possibly determine an ap- M M
X qk Rk X
proximate solution to the original problem, such as in the max qk σk
2
s.t. I − + qn Rn º 0, ∀ k = 1, . . . , M. (16)
{qk } γk
multicast beamforming problem described below. However, k=1 n6=k

in the specific case of (15) with dropped rank constraints, From the definition of positive definiteness, the constraints holds if and only if
P qk Rk
it turns out that the ostensible relaxation is not a relaxation, uH ( M n6=k qn Rn + I − γk )u ≥ 0 for all vectors u, i.e. (16) can be written
as
i.e., the “relaxed” problem is exactly equivalent to the original M
X uHk qk Rk uk
problem. In other words, it can be shown that the solution max
2
qk σk s.t. max PM ≤ γk , ∀ k = 1, . . . , M.
{qk } uk uH
k (
n6=k qn Rn + I)uk
to (15) with dropped rank constraints always yields rank- k=1
(17)
one matrices Wk , which directly provides the solution to For a given fixed set of uk , it is easy to see that the optimal qk is the unique
set of values where all constraints are fulfilled with equality. In particular, this
(14) using Wk = wk wkH . In optimization terminology, this equivalence must hold for the uk that maximize each constraint, so the solution
result shows that strong duality holds for problem (14), i.e., to (17) is given by the fixed point of
that the dual of (14) has the same optimal objective as the uH
k qk Rk uk
max PM = γk , ∀ k = 1, . . . , M. (18)
primal problem. This result is not so surprising, considering uk uH
k ( n6=k qn Rn + I)uk
that there are also several other algorithms available to solve The so-called virtual uplink problem associated with (14) is given by
problem (14), see [15], [48]. These algorithms are not based M
X uH k qk Rk uk
on the convex reformulation of (15) but rather on rewriting min
2
qk σk s.t. PM ≥ γk , ∀ k = 1, . . . , M
{qk ,uk } uH
k (
n6=k qn Rn + I)uk
the problem into an equivalent virtual uplink problem, that k=1
(19)
can be solved using fixed point iterations [49]. See the special where qk and uk can be interpreted as transmit powers and receive beamform-
ers, respectively, in this virtual uplink beamforming problem. A similar argument
insert on the connection between Lagrange duality and virtual shows that the optimum is given by the fixed point of (18). From the so-called
uplink. From practical experience, the algorithm in [48] is complementarity conditions, it can be seen that the optimal uk will only differ
from the optimal wk in (14) by a scaling. From standard convexity theory [52],
preferable compared to the semidefinite reformulation in terms the dual of (16), i.e., (15) with dropped rank constraints has the same optimal
of computational speed, at least so long as (15) with dropped objective as (16), which means that the proofs in [17] and [48] that (19) and (14)
are equivalent also show the equivalence to (15) with dropped rank constraints.
rank constraints is solved using general purpose SDP software See also [54] for further discussions on these connections.
PM
like [42]. Note that replacing the objective function in (19) by k=1 qk will not affect
the optimal uk . It is common to first normalize all channels corresponding to
Further modifications and extensions: Several modifica- 2
σk = 1 to get a more esthetic formulation of the virtual uplink problem (19).
tions and extensions have been proposed to the SINR bal-
ancing problem (14). For multi-cell scenarios, the problem An alternative to the SINR balancing formulation is to
can be extended to not only find the jointly optimal set consider the converse problem, namely to maximize the SINR
of transmit beamformers, but also to determine to which of each user subject to a constraint on the available transmit
base station each user should be assigned to. Surprisingly power. Unfortunately, to our knowledge, there is no convex
enough, this mixed combinatorial and non-convex quadratic formulation of the resulting optimization problem, which
problem can be solved easily, see [50], [51]. The trick is however can still be solved very efficiently using the virtual
to conceptually view all the base stations as a single virtual uplink formulation and a fixed-point iteration, see [48]. An
base station that jointly transmits to all users, and solve the alternative solution using quasi-convexity is described in [53].
corresponding beamforming problem. By making the channel An advantage of the semidefinite relaxation technique is
covariance matrices for the virtual base station block-diagonal, that it is very easy to add more constraints to the problem
the solution will not benefit from using coherent transmission formulation. For example, the transmit power of the individual
from several base stations (in contrast to so-called coherent antenna elements can be constrained, see [17]. As long as
coordinated multi-point transmission schemes that recently the corresponding constraints on the matrices Wk are linear
have been proposed for use in IMT-advanced), and it can (or convex), the problem can be solved efficiently. However,
be shown that the optimal beamforming vectors will only be there are in general no guarantees that strong duality holds
7

(i.e., that the optimal matrices Wk are rank-one) when ad-


ditional convex constraints are included. Strong duality has 90 30
been proven only for certain special cases. For example, in- 120 60

dividual power constraints per antenna are considered in [54], 20


where an efficient algorithm based on a generalization of 150 30
the virtual uplink duality is developed. In [55] it is shown +++10
that an indefinite constraint of the form wkH Ck wk = 0 or ++
wkH Ck wk ≥ 0 can be added for each user, where the matrices
Ck are indefinite Hermitian matrices, and strong duality still 180 0
holds for the resulting optimization problem. Such constraints
may, for example, be used to enforce solutions with increased +
+
path diversity in CDMA scenarios, or to constrain the relative
210 330
power transmitted to surrounding cells. This result has recently ++++
been generalized in [56], where both aforementioned types of +
indefinite constraints and
PMso-called soft-shaping interference 240 300
H
constraints of the form m=1 wm Skm wm ≤ τk with positive 270
semidefinite matrices Skm are considered. It is shown that
the semidefinite relaxation of the corresponding optimization
problems has a rank-one solution in a certain number of cases,
Fig. 3. Illustration of multicast beamforming: Polar plot of a multicast
for example when there are up to two indefinite constraints for transmit beampattern. Multicast subscriber locations are denoted by red
each user, or when there are up to two soft-shaping constraints crosses. Unlike receive beamforming or single-user transmit beamforming,
for the system. The proofs are constructive, showing how a the multicast beampattern comprises multiple lobes, each generally serving
a group of users. Unlike multi-user transmit beamforming that uses multiple
given high-rank solution can be converted into a solution with beampatterns, each carrying a different unicast stream, here a single beampat-
lower rank, under certain conditions. tern that carries a common information stream is used. Notice that the lobe
Just as for the receive beamforming problem, many papers serving the lower-left group has higher peak magnitude, to compensate for a
higher path loss experienced by distant users.
have been devoted to robust extensions that can cope with un-
certainties in the channel knowledge, due to estimation errors,
feedback quantization or delays between channel estimation
been considered where the channel vector uncertainties are
and the actual transmission, for example. Most references
assumed to be Gaussian distributed. In [57], the average MSE
consider worst-case strategies given bounds on the errors.
is optimized subject to a constraint on the total transmitted
Errors in the channel covariance matrices are considered in
power, whereas in [21], a pre-specified outage level on the
[17] and [19] where the true covariance matrix is modeled as
MSE is used.
Rm +∆m with a known bound k∆m k ≤ εm on the error term.
Replacing the numerator and denominator in (14) by a lower
and upper bound, respectively, as proposed in [17], results in B. Multicast Beamforming
a kind of diagonal loading of the matrix Rk in the numerator Consider a base station or wireless access point that uses
and denominator of the constraints in (14). Unfortunately, this N antennas to transmit common information to a pool of
approach is very conservative and the resulting optimization M users, each equipped with a single receive antenna. This
problem often does not even have a feasible solution. A problem statement corresponds to the case of single-group
less conservative approach is proposed in [19], wherein the multicast (or, equivalently, broadcast) beamforming. Let hm
worst-case matrix ∆m for each constraint is found by solving be the N × 1 complex downlink channel vector of user m and
the dual problem, and the resulting beamforming problem is w be the N × 1 complex beamforming vector. The objective
solved using the semidefinite relaxation technique. Numerical is to design w in such a way that the inner product of w
experiments in [19] indicate that the obtained solution is and each hm (m = 1, . . . , M ) is large, while the norm
always rank-one, but no proof of this empirical observation of w is small. This philosophy is rather different from the
is available. An alternative outage probability based approach robust receive or unicast transmit beamforming paradigms,
is proposed in [20], where the matrices ∆m are assumed to be because the different hm ’s need not be clustered in a small
Gaussian distributed and the SINR constraints are required to neighborhood and the resulting adapted transmit beampattern
hold with a certain probability. Again, semidefinite relaxation has multiple mainlobes; see Fig 3.
is used to solve the problem and the numerical results in [20] Formally, such a design may be stated as the following
indicate that the solution always is rank-one. optimization problem [23]:
Robustness against uncertainties in the channel vectors hm
has been considered in [18], [57], and [58] using a QoS min kwk2 s.t. |wH hm |2 ≥ σm
2
γm ∀ m = 1, . . . , M (20)
w
constraint expressed in terms of the MSE instead of SINR.
2
For exactly known channel vectors, such an MSE constraint is where σm is the additive noise power at user m, and γm is
equivalent to an SINR constraint. For partial CSI, on the other the desired signal-to-noise power ratio (SNR) at user m. The
hand, MSE constraints provide a conservative lower bound on right-hand side of each inequality in (20) can be p absorbed
the SINR, as shown in [18]. Stochastic error models have also in hm , yielding |wH h̃m |2 ≥ 1 with h̃m , hm / σm 2 γ .
m
8

Dropping the tilde sign for brevity yields the following QoS −5

formulation: −4
feasible
2 H 2
min kwk s.t. |w hm | ≥ 1 ∀ m = 1, . . . , M. (21) −3

w
−2
infeasible
Note that this formulation has a certain similarity to (12) as −1

in both cases the total transmit power is minimized subject to 0

QoS constraints. However, contrary to (12), a single weight 1


vector is used in (21).
2
An alternative formulation to the one in (21) arises from
3
an information theory standpoint. Intuitively, if one transmits
a single information-bearing signal to be decoded by a group 4

of users, the attainable information rate that can be decoded 5


−5 −4 −3 −2 −1 0 1 2 3 4 5

by all interested users is determined by the weakest link, i.e.,


the user with the smallest SNR. This suggests the following −5
“democratic” max-min-fair formulation:
−4
H 2 2
max min |w hm | s.t. kwk ≤ P −3
w m∈{1,...,M }
−2

where P is an upper bound on the allowable transmission −1


power. Without loss of generality, we may absorb P in the 0
channel vectors and henceforth set P = 1. It is also easy to 1
see that an optimal solution will use all available power, hence
2
we may replace the power inequality with equality.
3
It is important to note that beamforming does not generally
4
attain the multicast channel capacity – this may require a
higher-rank transmit covariance. The capacity-attaining strat- 5
−5 0 5
egy, however, is often impractical for a number of reasons, in-
cluding the complexity of multi-stream Shannon (de-)coding,
and incompatibility with existing and emerging standards.
Fig. 4. Peeking through shattered glass: Geometry of the feasible set in the
Beamforming, on the other hand, is simple to implement and real-valued two-dimensional case (N = 2 transmit antennas; w and {hi }M i=1
often attains a significant fraction of multicast capacity [24]. are real-valued). Top panel: M = 4; bottom panel: M = 40. The axes
T 2
correspond to the elements of w. Every constraint (w hi ) ≥ 1 excludes
Interestingly, it can be shown that the QoS and the max-
a strip perpendicular to hi and passing through the origin. The non-convex
min-fair formulations of multicast beamforming are equivalent feasible set is shown in blue, while the infeasible set is shown in red. Notice
up to scaling [24], and the scaling constant can be easily de- that both are symmetric with respect to reflection (changing the sign of both
termined. Furthermore, multicast beamformer design naturally elements of w). Since the norm of w is also invariant with respect to change
of sign, there are two optimal solutions for w, indicated by the yellow circles.
yields the optimal information-theoretic transmission strategy As the number of users/constraints (M ) increases, the glass tends to shatter
as a by-product, as we will see in the sequel. in a larger number of smaller pieces that are further away from the origin, as
How difficult is the multicast beamforming problem? It is illustrated in the bottom panel.
certainly clean-cut, and easy in the case of a single user: by
virtue of the Cauchy-Schwartz inequality, an optimal solution
is simply a scaled version of the user’s steering vector. When the pursuit of approximate solutions which can approach
we add more users, the situation becomes less clear. At this optimal performance at moderate complexity. Towards this
point, it is instructive to turn to the QoS formulation to gain end, a convex approximation strategy based on semidefinite
insight. Notice that the quadratic constraints |wH hm |2 ≥ 1 relaxation is considered next.
are non-convex. This implies that we are dealing with a non- Using |wH hm |2 = Tr(wwH hm hH m ) and defining Rm ,
convex optimization problem, as first clue. Going one step hm hHm , we may recast the max-min fair problem as follows:
further, let us visualize the structure of the feasible set in max min Tr(wwH Rm ) s.t. Tr(wwH ) = 1. (22)
w m∈{1,...,M }
the QoS formulation. Towards this end, we will consider the
special case where all vectors are real-valued and N = 2. Fig. By change of variable X , wwH , we may further restate (22)
4 illustrates the intricate structure of the “playing field” in this as
simplified scenario – and the picture is not pretty. Whereas we
could perhaps characterize the potentially interesting vertices max min Tr(XRm )
X m∈{1,...,M }
when M is small, this seems daunting for large M . It has
s.t. Tr(X) = 1, X º 0, rank(X) = 1. (23)
been shown in [24] that the multicast beamforming problem
is in fact NP-hard for M ≥ N ; it contains the partition Following the idea of semidefinite relaxation, we can drop the
problem as a special case. In plain words, this means that non-convex rank constraint rank(X) = 1 to approximate (23)
we have to give up hope of exactly solving an arbitrary by an SDP problem. Notice that this relaxation “restores” up
problem instance at reasonable complexity. This motivates to full covariance rank, yielding the capacity-optimal transmit
9

Relay 1
covariance [24], [59] (cf. first-principles definition of multicast
capacity, using Tr(XRm ) = Tr(Xhm hH H
m ) = hm Xhm , and
monotonicity of log(·)). Relay 2
g1
Destination
g2
f1
g3
Once the relaxed problem is solved, the only direct claim f2
Relay 3
one can make is that the resulting objective topt is no less than f3

the optimal max-min value of the original NP-hard problem


(since by dropping a constraint we expanded the feasible set). gN
Source
In many (but not all) cases, it turns out that the associated fN
Xopt is rank-one, which means that our relaxation was not a
relaxation after all (see also the earlier discussion for downlink
beamforming). If Xopt is rank-one, then we can find wopt for Relay N

the original problem simply by taking the principal component


Fig. 5. A relay network.
of Xopt . When Xopt has higher rank, there is more work to be
done in “rounding” Xopt to a rank-one matrix – simply taking
the principal component is not the best strategy. The prevailing
IV. R ELAY N ETWORK B EAMFORMING
rounding strategy is based on randomization: drawing i.i.d.
random vectors from a zero-mean multivariate Gaussian of Let us now consider a wireless network which consists of a
covariance Xopt and picking the best one. Details can be found source, a destination, and N relay nodes as shown in Fig. 5.
in [24]. Note that randomization can be theoretically justified Assume that due to the poor quality of the channel between the
in this context – it is possible to bound the gap to the optimal source and destination, they cannot communicate directly with
solution of the original NP-hard problem. On this issue, see each other, but the destination cooperates with the N single-
[47], [60], [61]. antenna relay nodes to receive the information transmitted by
the source node and retransmitted by the relays. We use fi
At the end of the day, one is interested in how well the over- and gi to denote the channel complex coefficients between the
all relaxation-randomization algorithm works in practice. The source and the ith relay and between the ith relay and destina-
answer is that it works very well [24], although, for the case tion, respectively. In earlier network beamformer designs [28],
of a single-group multicast, there are now better and simpler is has been assumed that the instantaneous CSI is perfectly
algorithms available as a result of considerable follow-up work known at the destination or relays. However, this assumption
[62], [63]. The power of convex optimization/approximation is often violated in practical scenarios with randomly fading
lies in its generality; for example, it can handle the case of channels. To avoid the need to know instantaneous CSI, fi
multiple (interfering) multicast groups [64]-[66], additional and gi can be modeled as random variables [29], and it can
convex constraints, etc. be assumed that their joint second-order statistics are known
at the destination node which uses this knowledge to compute
Further extensions: Robust multicast beamforming has been the relay complex weight coefficients and feed them back to
dealt with in [64]. Bridging the ground between multi-user the relay nodes. Alternatively, such second-order CSI may be
downlink and multicast beamforming, the general case of available at the relay nodes rather than destination. In the latter
multiple interfering multicast groups has been studied in case, each relay has to compute its own weight coefficient.
[62], [65], [66], and cross-layer multicast beamforming and During the first step of a two-step amplify-and-forward

admission control in [62]. Instead of (exact or approximate) protocol, the source transmits the signal P0 s to the relays,
instantaneous CSI, it is possible to use long-term average where s is the information symbol, P0 is the source transmit
CSI in the form of estimated channel correlation matrices power, and without loss of generality it is assumed that
R̂m , albeit only average QoS guarantees can be offered in E{|s|2 } = 1. The received signal at the ith relay is given
this case. Going one step further, [67] considered the case by p
when the only information available for the channel vectors is xi = P0 fi s + νi (24)
their prior distribution. This is naturally modeled as a mixture
distribution – e.g., a Gaussian mixture comprising components where νi is the noise at the ith relay whose variance is known
centered at different locations and with varying spread. Such to be σν2 . In the second step, the ith relay transmits yi which
a model can capture subscriber clustering in malls, campuses, is an amplified and phase-steered version of its received signal
or other urban “hotspots”. In this case, similarly to the receive and can be written as
and downlink beamforming techniques of [12] and [20], the yi = wi xi . (25)
pertinent design criterion is the beamformer outage probability.
While outage probability minimization also turns out to be NP- Here, wi is the complex relay beamforming weight that is used
hard, an effective approximation is again possible [67]. It is by the ith relay to adjust the phase and the amplitude of the
worth noting that this last approach is particularly appealing corresponding signal.
in practice, because the mixture model can be built using Interestingly, network beamforming can be viewed as a
historical data and/or field measurements around local points certain combination of receive and transmit beamforming
of interest. as the same weights are used for the signal reception and
10

transmission. Moreover, network beamforming is distributed (29), the following key observation [52] has been used in [29].
as each relay node knows only its own received signal, and If, for some given SNR value t, the convex feasibility problem
does not know the signals received by the other relay nodes.
find X
The signal received by the destination is given by
s.t. tr (X(R − tQ)) ≥ σn2 t, (30)
r
X Xii ≤ Pi /Dii ∀ i = 1, . . . , N ; X º 0
z= gi yi + n (26)
i=1 is feasible, then tmax ≥ t. Conversely, if (30) is not feasible,
then tmax < t. Based on this observation, one can check
where n is the receiver noise whose variance σn2 is known.
whether the optimal value tmax of the quasiconvex problem
Using (24) and (25), we can rewrite (26) as
(29) is smaller or greater than any given value t. In [29], it has
p X r r
X been proposed to use a simple bisection algorithm for solving
z = P0 wi fi gi s + wi gi νi + n . (27) (29), where (30) has to be solved at each step of this algorithm.
|
i=1
{z } |
i=1
{z } Let us start with some preselected interval [tl tu ] which is
signal component total noise, nT known to contain the optimal value tmax , the problem (30) is
then solved at the midpoint t = (tl + tu )/2. If (30) is feasible
To optimally calculate the relay weight coefficients, the des- for this value of t, then tl = t is set; otherwise tu = t is chosen.
tination SNR has to be maximized subject to some power This procedure is repeated until the difference between tu and
constraints. To illustrate the application of convex optimization tl is smaller than some preselected threshold δ.
to this problem, let us consider the individual relay power Numerical examples in [29] have shown that, similar to the
constraints. Then, the following optimization problem has to case of downlink beamforming, the so-obtained solution Xopt
be solved: is always rank-one and, therefore, no randomization is needed
to obtain the beamforming weight vector. However, no proof
max SNR s.t. Pi ≤ Pi ∀ i = 1, . . . , N (28) of this empirical observation is available in [29].
w
Summary of network beamforming algorithm.
where Pi and Pi are, respectively, the actual and maximum Step 1: Properly set the initial values of tl and tu .
allowable transmit powers of the ith relay. As in (14), we Step 2: Set t := (tl + tu )/2 and solve (30).
Step 3: If (30) is feasible, then tl := t; otherwise tu := t.
use the ratio of expected signal power to expected noise Step 4: If tu − tl < δ, then go to Step 5; otherwise go to Step 2.
power as a measure of SNR. In [29], it has been shown Step 5: Find the weight vector from the principal eigenvector of the resulting
H matrix Xopt .
2
that this is given by σ2w+wRw H Qw and Pi = Dii |wi | where
n
w , [w1 , . . . , wN ] , f , [f1 , . . . , fN ] , g , [g1 , . . . , gN ]T ,
T T One suitable choice of the initial values of tl and tu is
Q , σ¡ν2 E{ggH }, R , P0 E{(f¢ ⊙ g)(f ⊙ g)H }, D , 0 and SNRmax (Pmax ), respectively, where SNRmax (Pmax )
P0 diag [E{|f1 |2 }, . . . , E{|fN |2 }] + σν2 I, and Dii is the ith is the maximumP achievable SNR under the total relay power
N
diagonal entry of D. budget Pmax = i=1 Pi . It has been shown in [29] that
Hence, the problem in (28) can be rewritten as SNRmax (Pmax ) = Pmax λmax (G) (31)
wH Rw where G , (σn2 I + Pmax D−1/2 QD−1/2 )−1 D−1/2 RD−1/2 .
max s.t. Dii |wi |2 ≤ Pi ∀ i = 1, . . . , N. The results of [28] and [29] are applicable only when the
w σn2 + wH Qw
relays are fully synchronized at the symbol level and when the
Defining X , wwH , this optimization problem can be source-to-relay and relay-to-destination channels are frequency
rewritten as flat. When these channels are frequency selective or the time
Tr(RX) synchronization between the relays is poor, the signal replicas
max passed through different relays and/or channel paths will arrive
X σn2
+ Tr(QX)
to the destination node with different delays. This will result
s.t. Dii Xii ≤ Pi ∀ i = 1, . . . , N ; rank(X) = 1, X º 0
in inter-symbol-interference (ISI).
where Xii is the ith diagonal entry of X. Following the idea of To combat such ISI, two different approaches have been
semidefinite relaxation and dropping the non-convex rank-one presented in the literature. In [33]-[34], a filter-and-forward
constraint, the latter problem can be relaxed as protocol has been introduced for frequency selective relay
networks, and several related network beamforming techniques
max t have been developed. In these techniques, the relays deploy
X,t finite impulse response (FIR) filters to compensate for the
s.t. Tr (X(R − tQ)) ≥ σn2 t, (29) effect of source-to-relay and relay-to-destination channels; that
Xii ≤ Pi /Dii ∀ i = 1, . . . , N ; X º 0. is, the burden of mitigating ISI is put on the shoulders of
the relay nodes. One of these techniques can be viewed as
Note that, for any fixed value of t the set of feasible X in (29) an extension of (29) because it is based on maximizing the
is convex; it follows that the optimization problem in (29) is destination QoS (measured in terms of SINR) subject to the
quasiconvex. individual relay power constraints. The latter technique is
Solving (29), one can obtain the maximum achievable SNR also based on a combination of bisection search and convex
(which is the maximum value of t, denoted as tmax ). To solve feasibility problem-solving.
11

Another beamforming approach developed in [35] for asyn- tical communications engineering aspects, such as synchro-
chronous but flat-fading relay networks, suggests the relay nization, modulation, and coding; and real-time beamformer
processing to be simple (i.e., to follow the amplify-and- weight optimization to account for time-selective fading and
forward protocol), while the source and destination nodes carry other sources of temporal variation in the operational envi-
the main burden of mitigating ISI. Viewing an asynchronous ronment. Robustness issues will likely remain high in the
flat-fading relay network as an artificial multipath channel research agenda, in light of erroneous / delayed / quan-
(where each channel path corresponds to one particular relay), tized CSI encountered in practical systems. This is especially
the authors of [35] use the orthogonal frequency division true for network beamforming which is still in its infancy.
multiplexing (OFDM) scheme at the source and destination Computationally efficient implementations of beamforming
nodes to deal with this artificial multipath channel. techniques are critical for applications of beamforming in
Convex optimization has also found its application to practical systems, and it can be foreseen that this field will
multi-user (i.e., multiple-source, multiple-destination) network keep benefiting from advances in convex optimization theory -
beamforming techniques. In [30], a network of relays is used to including relevant work towards real-time convex optimization
establish communication between multiple source destination [69].
pairs. The relays amplify and phase adjust the signal they
receive from all transmitting sources by multiplying it with R EFERENCES
a complex beamforming weight. To obtain the optimal value [1] H. L. Van Trees, Optimum Array Processing, Wiley, NY, 2002.
[2] H. Cox, R. M. Zeskind, and M. H. Owen, “Robust adaptive beamform-
of beamforming weights, the total relay transmit power is ing,” IEEE Trans. Acoust., Speech, Signal Processing, vol. 35, pp. 1365-
minimized subject to QoS constraints on the received SINRs 1376, Oct. 1987.
at the destinations. It is then shown that using semidefinite [3] A. B. Gershman, “Robust adaptive beamforming in sensor arrays,”
AEU – Int. J. Electronics and Communications, vol. 53, pp. 305-314,
relaxation, this power minimization problem can be turned into Dec. 1999.
a convex SDP problem. In light of the results of [68], when [4] S. Vorobyov, A. B. Gershman, and Z.-Q. Luo, “Robust adaptive
the number source-destination pairs is less than or equal to 3, beamforming using worst-case performance optimization: A solution to
the signal mismatch problem,” IEEE Trans. Signal Process., vol. 51,
the semidefinite relaxation approach is always guaranteed to pp. 313-324, Feb. 2003.
have a rank-one solution, and therefore, in this case it is not [5] S. Shahbazpanahi, A. B. Gershman, Z.-Q. Luo, and K. M. Wong,
a relaxation but exact transformation of the original problem “Robust adaptive beamforming for general-rank signal models,” IEEE
Transactions on Signal Processing, vol. 51, pp. 2257-2269, Sept. 2003.
(note here some similarity to the downlink beamforming case, [6] S. A. Vorobyov, A. B. Gershman, Z-Q. Luo, and N. Ma, “Adaptive
where the resulting solution after semidefinite relaxation yields beamforming with joint robustness against mismatched signal steering
rank-one matrices as well). vector and interference nonstationarity,” IEEE Signal Process. Lett.,
vol. 11, pp. 108-111, Feb. 2004.
Considering the same problem as considered in [30], the [7] R. G. Lorenz and S. P. Boyd, “Robust minimum variance beamforming,”
authors of [36] use additional constraints to enforce the signals IEEE Trans. Signal Process., vol. 53, pp. 1684-1696, May 2005.
received by the destinations be all in-phase. This will turn [8] Robust Adaptive Beamforming, J. Li and P. Stoica (Eds), John Wiley &
Sons, Hoboken, NJ, 2006.
the aforementioned constrained total relay power minimization [9] S-J. Kim, A. Magnani, A. Mutapcic, S. P. Boyd, and Z-Q. Luo, “Robust
problem into an SOCP problem. As SOCP problems can be beamforming via worst-case SINR maximization,” IEEE Trans. Signal
solved with much lower computational complexity than SDP Process., vol. 56, pp. 1539-1547, Apr. 2008.
[10] A. El-Keyi, T. Kirubarajan, and A. B. Gershman, “Wideband ro-
problems, the approach of [36] to peer-to-peer network beam- bust beamforming based on worst-case performance optimization,” in
forming is computationally less expensive than that of [30]. Proc. IEEE SSP Workshop, Bordeaux, France, July 2005, pp. 265-270.
The price for this computational complexity improvement is a [11] M. Rübsamen, A. El-Keyi, A. B. Gershman, and T. Kirubarajan, “Robust
broadband adaptive beamforming using convex optimization,” chapter
small increase in the relay transmitted power. in Convex Optimization in Signal Processing and Communications,
Convex optimization has also proven instrumental in ap- D. Palomar and Y. C. Eldar, Editors, Cambridge Univ. Press, to appear.
plication to the design of beamformers for two-way (bi- [12] S. Vorobyov, H. Chen, and A. B. Gershman, “On the relationship
between robust minimum variance beamformers with probabilistic and
directional) relay networks. Such beamformers have been worst-case distortionless response constraints,” IEEE Trans. Signal Pro-
developed in [32] for three-node two-way networks with one cess., vol. 56, pp. 5719-5724, Nov. 2008.
multi-antenna relay node and two single-antenna transceivers, [13] Y. Rong, S. Shahbazpanahi, and A. B. Gershman, “Robust linear
receivers for space-time block coded multi-access MIMO systems with
and in [31] and [38] for multiple-node two-way networks imperfect channel state information,” IEEE Trans. Signal Process.,
with all single-antenna nodes involving two transceivers and vol. 53, pp. 3081-3090, Aug. 2005.
multiple relays. [14] Y. Rong, S. A. Vorobyov, and A. B. Gershman, “Robust linear receivers
for multi-access space-time block coded MIMO systems: A probabilis-
tically constrained approach,” IEEE J. Sel. Areas Commun., vol. 24,
V. C ONCLUSIONS AND F UTURE D IRECTIONS pp. 1560-1570, Aug. 2006.
In this paper, we have presented an overview of the current [15] F. Rashid-Farrokhi, K. J. R. Liu, and L. Tassiulas, “Transmit beamform-
ing and power control for cellular wireless systems,” IEEE J. Sel. Areas
state of the art of advanced optimization-based beamform- Commun., vol. 16, pp. 1437-1450, Oct. 1998.
ing with application to the receive, transmit and network [16] C. Farsakh and J. A. Nossek, “Spatial covariance-based downlink be-
beamformer design problems. Connections have been drawn ramforming in an SDMA mobile radio system,” IEEE Trans. Commun.,
vol. 46, pp. 1497-1506, Nov. 1998.
between different types of optimization-based beamformers, [17] M. Bengtsson and B. Ottersten, “Optimal and suboptimal transmit
and it has been demonstrated that convex optimization is an beamforming,” in Handbook of Antennas in Wireless Communications,
indispensable toolbox for beamformer designs. L. Godara, Editor, CRC Press, 2001.
[18] N. Vucic and H. Boche, “Robust QoS-constrained optimization of down-
Promising future research directions include beamformer link multiuser MISO systems,” IEEE Trans. Signal Process., vol. 57,
designs for frequency-selective scenarios; incorporating prac- pp. 714-725, Feb. 2009.
12

[19] I. Wajid, Y. C. Eldar, and A. B. Gershman, “Robust downlink beam- [44] J. Li, P. Stoica, and Z. Wang, “On robust Capon beamforming and
forming using covariance channel state information,” Proc. ICASSP’09, diagonal loading,” IEEE Trans. Signal Process., vol. 51, pp. 1702-1715,
Taipei, Taiwan, April 2009. July 2003.
[20] B. K. Chalise, S. Shahbazpanahi, A. Czylwik, and A. B. Gershman, “Ro- [45] S. Kandukuri and S. Boyd. “Optimal power control in interference-
bust downlink beamforming based on outage probability specifications,” limited fading wireless channels with outage-probability specifications,”
IEEE Trans. Wireless Commun., vol. 6, pp. 3498-3503, Oct. 2007. IEEE Trans. Wireless Comm., vol. 1, no. 1, pp. 46–55, Jan. 2002.
[21] N. Vucic and H. Boche, “A tractable method for chance-constrained [46] M. Bengtsson and B. Ottersten, “Signal waveform estimation from array
power control in downlink multiuser MISO systems with channel data in angular spread environment,” in Proc. 30th Asilomar Conf. Sig.,
uncertainty,” IEEE Signal Process. Lett., vol. 16, pp. 346-349, May 2009. Syst., Comput., Nov. 1996, pp. 355–359.
[22] M.B. Shenouda and T.N. Davidson, “Probabilistically-constrained ap- [47] Z.-Q. Luo, W.-K. Ma, M.-C. So, Y. Ye, and S. Zhang, “Nonconvex
proaches to the design of the multiple antenna downlink,” in Proc. 42nd quadratic optimization, semidefinite relaxation, and applications,” IEEE
Asilomar Conference on Signals, Systems and Computers, pp. 1120- Signal Processing Magazine, this issue.
1124, 26-29 Oct. 2008. [48] M. Schubert and H. Boche, “Solution of the multiuser down-
[23] N. D. Sidiropoulos and T. N. Davidson, “Broadcasting with channel link beamforming problem with individual SINR constraints,” IEEE
state information,” in Proc. IEEE SAM Workshop, Sitges, Spain, July Trans. Veh. Technology, vol. 53, pp. 18-28, Jan. 2004.
2004, pp. 489493. [49] R. D. Yates, “A framework for uplink power control in cellular radio
[24] N.D. Sidiropoulos, T.N. Davidson, Z.-Q. Luo, “Transmit beamforming systems,” IEEE J. Sel. Areas Commun., vol. 13, no. 7, pp. 1341-1347,
for physical layer multicasting,” IEEE Trans. Signal Process., vol. 54, Sep. 1995.
no. 6, part 1, pp. 2239-2251, June 2006.
[50] M. Bengtsson, “Jointly optimal downlink beamforming and base station
[25] Motorola Inc., “Long term evolution (LTE): A technical overview,” Tech-
assignment,” in Proc. ICASSP’01, Salt Lake City, UT, May 2001, vol. V,
nical White Paper, http://business.motorola.com/experiencelte/pdf/LTE
pp. 2961-2964.
%20Technical%20Overview.pdf
[26] A. Lozano, “Long-term transmit beamforming for wireless multicast- [51] R. Stridh, M. Bengtsson, and B. Ottersten, “System evaluation of
ing,” in Proc. ICASSP’07, April 2007, Honolulu, Hawaii. optimal downlink beamforming with congestion control in wireless
[27] J. N. Laneman, D. N. C. Tse, and G. W. Wornell, “Cooperative diversity communication,” IEEE Trans. Wireless Commun., vol. 5, pp. 743-751,
in wireless networks: Efficient protocols and outage behavior,” IEEE Apr. 2006.
Trans. Inform. Theory, vol. 50, pp. 3062-3080, Dec. 2004. [52] S. Boyd and L. Vandenberghe, Convex Optimization, Cambridge Uni-
[28] Y. Jing and H. Jafarkhani, “Network beamforming using re- versity Press, 2004.
lays with perfect channel information,” Proc. ICASSP’07, vol. 3, [53] A. Wiesel, Y. C. Eldar, and S. S. (Shitz), “Linear precoding via conic
pp. 473-476, Honolulu, HI, April 2007; the full paper available at optimization for fixed MIMO receivers,” IEEE Trans. Signal Process.,
http://arxiv.org/pdf/0804.1117v1. vol. 54, pp. 161-176, Jan. 2006.
[29] V. Havary-Nassab, S. Shahbazpanahi, A. Grami, and Z.-Q. Luo, “Dis- [54] W. Yu and T. Lan, “Transmitter optimization for the multi-antenna
tributed beamforming for relay networks based on second-order statistics downlink with per-antenna power constraints,” IEEE Trans. Signal
of the channel state information,” IEEE Trans. Signal Process., vol. 56, Process., vol. 55, pp. 2646-2660, June 2007.
pp. 4306-4316, Sept. 2008. [55] D. Hammarwall, M. Bengtsson, and B. Ottersten, “Downlink beamform-
[30] S. Fazeli-Dehkordy, S. Shahbazpanahi, and S. Gazor, “Multiple peer-to- ing with indefinite shaping constraints,” IEEE Trans. Signal Process.,
peer communications using a network of relays,” IEEE Trans. Signal vol. 54, pp. 3566-3580, Sep. 2006.
Process., vol. 57, pp. 3053-3062, Aug. 2009. [56] Y. Huang and D. P. Palomar, “Rank-constrained separable semidefinite
[31] V. Havary-Nassab, S. Shahbazpanahi, and A. Grami, “Optimal net- program with applications to optimal beamforming,” IEEE Trans. Signal
work beamforming for bi-directional relay networks,” Proc. ICASSP’09, Processing, to appear.
Taipei, Taiwan, April 2009. [57] M. B. Shenouda and T. N. Davidson, “On the design of linear
[32] Y.-C. Liang and R. Zhang, “Optimal analogue relaying with multi- transceivers for multiuser systems with channel uncertainty,” IEEE
antennas for physical layer network coding,” Prof. ICC’08, Bejing, J. Sel. Areas Commun., vol. 26, pp. 1015-1024, Aug. 2008.
China, May 2008, pp. 3893-3897. [58] M. B. Shenouda and T. N. Davidson, “Nonlinear and linear broadcasting
[33] H. Chen, A. B. Gershman, and S. Shahbazpanahi, “Filter-and-forward with QoS requirements: Tractable approaches for bounded channel
distributed beamforming for relay networks in frequency selective fading uncertainties,” IEEE Trans. Signal Processing, vol. 57, pp. 1936-1947,
channels,” Proc. ICASSP’09, Taipei, Taiwan, April 2009 May 2009.
[34] H. Chen, A. B. Gershman, and S. Shahbazpanahi, “Filter-and-forward [59] N. Jindal, Z.-Q. Luo, “Capacity limits of multiple antenna multicast,”
distributed beamforming in relay networks with frequency selective in Proc. IEEE Int. Symposium Inf. Theory, July 2006, Seattle, WA,
fading,” IEEE Trans. Signal Process., to appear. pp. 1841-1845.
[35] A. Abdelkader, S. Shahbazpanahi, and A. B. Gershman, “Joint sub- [60] Z.-Q. Luo, N. D. Sidiropoulos, P. Tseng, S. Zhang, “Approximation
carrier power loading and distributed beamforming in OFDM-based bounds for quadratic optimization with homogeneous quadratic con-
asynchronous relay networks,” IEEE CAMSAP’09, Aruba, Dec. 2009, straints,” SIAM J. Optimization, vol. 18, no. 1, pp. 1-28, Feb. 2007.
to appear.
[61] T.-H. Chang, Z.-Q. Luo, C.-Y. Chi, “Approximation bounds for semidef-
[36] H. Chen, A. B. Gershman, and S. Shahbazpanahi, “Distributed peer-
inite relaxation of max-min-fair multicast transmit beamforming prob-
to-peer beamforming for multiuser relay networks,” Proc. ICASSP’09,
lem,” IEEE Trans. Signal Process., vol. 56, pp. 3932-3943, Aug. 2008.
Taipei, Taiwan, April 2009.
[37] J. Joung and A. H. Sayed, “Power allocation for beamforming relay [62] E. Matskani, N. D. Sidiropoulos, Z.-Q. Luo, and L. Tassiulas, “Effi-
networks under channel uncertainties,” in Proc. Globecom’09, Honolulu, cient batch and adaptive approximation algorithms for joint multicast
Hawaii, December 2009, to appear. beamforming and admission control, IEEE Trans. Signal Process., to
[38] S. Shahbazpanahi, “A semi-closed-form solution to optimal decentral- appear.
ized beamforming for two-way relay networks,” IEEE CAMSAP’09, [63] A. Abdelkader, A.B. Gershman, N.D. Sidiropoulos, “Multiple-antenna
Aruba, Dec. 2009, to appear. multicasting using channel orthogonalization and local refinement,”
[39] T. Cover and A.E. Gamal, “Capacity theorems for the relay channel,” submitted to IEEE Trans. Signal Process., July 2009.
IEEE Trans. Inform. Theory, vol. 25, pp. 572-584, Sep. 1979. [64] E. Karipidis, N.D. Sidiropoulos, Z.-Q. Luo, “Convex transmit beam-
[40] M. Gastpar and M. Vetterli, “On the capacity of large Gaussian relay forming for downlink multicasting to multiple co-channel groups,” in
networks,” IEEE Trans. Inform. Theory, vol. 51, pp. 765-779, March Proc. ICASSP’06, May 2006, Toulouse, France.
2005. [65] E. Karipidis, N. D. Sidiropoulos, Z.-Q. Luo, “Far-field multicast beam-
[41] Y. I. Abramovich, “Controlled method for adaptive optimization of forming for uniform linear antenna arrays,” IEEE Trans. Signal Process.,
filters using the criterion of maximum SNR,” Radio Engineering and vol. 55, pp. 4916-4927, Oct. 2007.
Electronic Physics, vol. 26, pp. 87-95, March 1981. [66] E. Karipidis, N. D. Sidiropoulos, Z.-Q. Luo, “Quality of service and
[42] J. F. Sturm, “Using SeDuMi 1.02, a MATLAB toolbox for optimization max-min-fair transmit beamforming to multiple co-channel multicast
over symmetric cones,” Optim. Meth. Software, vol. 11-12, pp. 625-653, groups,” IEEE Trans. Signal Process., vol. 56, pp. 1268-1279, March
Aug. 1999; awailable at http://sedumi.ie.lehigh.edu/. 2008.
[43] M. Grant, S. Boyd, and Y. Y. Ye, “CVX: MATLAB [67] V. Ntranos, N. D. Sidiropoulos, and L. Tassiulas, “On multicast beam-
software for disciplined convex programming,” available at forming for minimum outage,” IEEE Trans. on Wireless Communica-
http://www.stanford.edu/boyd/cvx/V.1.0RC3, Feb. 2007. tions, vol. 8, pp. 3172-3181, June 2009.
13

[68] Y. Huang and S. Zhang, “Complex matrix decomposition and quadratic Best Paper Award in 1993, 2001, and 2006. Dr. Ottersten is
programming,” Mathematics of Operation Research, vol. 32, pp. 758– currently Editor-in-Chief of EURASIP S IGNAL P ROCESSING
768, Aug. 2007.
[69] J. Mattingley, S. Boyd, “Real-Time Convex Optimization in Signal J OURNAL. He is a Fellow of the IEEE and EURASIP.
Processing,” IEEE Signal Processing Magazine, this issue.
Alex B. Gershman received his Diploma and Ph.D. degrees
in Radiophysics and Electronics from the Nizhny Novgorod
State University, Russia, in 1984 and 1990, respectively. Since
2005, he is a Professor at Darmstadt University of Technology,
Germany. He has co-authored papers that received two IEEE
Signal Processing Society (SPS) Best Paper Awards in 2004
and 2005, and the IEEE Aerospace and Electronic Systems
Society (AESS) Barry Carlton Award in 2006. Prof. Gershman
served as Editor-in-Chief for the IEEE S IGNAL P ROCESSING
L ETTERS (2006–2008), and as Chair of the Sensor Array and
Multichannel Processing Technical Committee of the IEEE
SPS (2007–2008). He is a Fellow of the IEEE.
Nicholas D. Sidiropoulos graduated from the Aristotelian
University of Thessaloniki, Greece, and received his Ph.D.
in Electrical Engineering from the University of Maryland, in
1992. He was Assistant Professor at the University of Virginia,
and Associate Professor at the University of Minnesota. Since
2002, he is a Professor at the Technical University of Crete
– Greece. He received the IEEE Signal Processing Society
(SPS) Best Paper Award in 2001 and 2007, has served as SPS
Distinguished Lecturer (2008-2009), and as Chair of the Signal
Processing for Communications and Networking Technical
Committee of the IEEE SPS. Prof. Sidiropoulos is a Fellow
of IEEE.
Shahram Shahbazpanahi received his B.S., M.S., and PhD.
degrees all in Electrical Engineering, from Sharif University of
Technology, Tehran, Iran 1992, 1994, and 2001, respectively.
Since 2005, he is an Assistant Professor at the University of
Ontario Institute of Technology, Oshawa, Ontario, Canada. He
serves as Associate Editor for both the IEEE T RANSACTIONS
ON S IGNAL P ROCESSING and the IEEE S IGNAL P ROCESS -
ING L ETTERS. He is a member of the Sensor Array and
Multichannel Processing Technical Committee of the IEEE
Signal Processing Society.
Mats Bengtsson received the M.S. degree Linköping Univer-
sity, Linköping, Sweden, in 1991 and the Ph.D. degrees from
the Royal Institute of Technology (KTH), Stockholm, Sweden,
in 2000. From 1991 to 1995, he was with Ericsson Telecom
AB Karlstad. He currently holds a position as Associate
Professor in the Signal Processing Laboratory of the School of
Electrical Engineering at KTH. He serves as Associate Editor
for the IEEE T RANSACTIONS ON S IGNAL P ROCESSING.
Björn Ottersten received the M.S. degree from Linköping
University, Linköping, Sweden, in 1986 and his Ph.D. in
1989 from Stanford University, Stanford, CA. Since 1991 he
is a Professor at the Royal Institute of Technology (KTH),
Stockholm. From 2004 to 2008 he was dean of the School of
Electrical Engineering at KTH and from 1992 to 2004 he was
head of the department for Signals, Sensors, and Systems at
KTH. Dr. Ottersten is also Director of securityandtrust.lu at
the University of Luxembourg since 2009. He has co-authored
papers that received the IEEE Signal Processing Society

View publication stats

S-ar putea să vă placă și