Data-Aided Channel Estimation in Large Antenna Systems

Data-Aided Channel Estimation in Large Antenna
Systems
Junjie Ma, and Li Ping
Department of Electronic Engineering, City University of Hong Kong, Hong Kong
Emails: [email protected], [email protected]
Abstract—This paper is concerned with the uplink in a multicell large antenna system. We study a channel estimation scheme
where partially decoded data is used to estimate the channel. We
show that there are two types of interference components in this
scheme that do not vanish even when the number of antennas
grows to infinity: cross-contamination and self-contamination.
Cross contamination is in principle similar to pilot contamination
in a conventional pilot-based channel estimation scheme, while
self-contamination is unique for the data-aided scheme. The dataaided scheme can effectively suppress the contamination effect
by increasing the data frame length without causing rate loss.
This is confirmed by both analysis and simulation results.
I. I NTRODUCTION
Assume that all other system parameters, such as the
number of users, the average transmission power per user and
rate per user, are fixed in a cellular system. Then, provided
that perfect channel state information (CSI) at the base station
(BS) is available, cross user interference can be completely
suppressed when M → ∞, where M is the number of
antennas at the BS. This fact motivates the research activities
on large (or massive) antenna systems [1]–[9].
Channel estimation is a challenging problem for a large
antenna system [1]. It is shown in [1] that, if CSIR is to
be estimated using non-orthogonal pilot signals, the effect
of interference does not vanish even when M → ∞. This
phenomenon is referred to as “pilot contamination” [1]–[9].
The treatments for pilot contamination have been extensively studied [2]–[6]. However, the asynchronous transmission scheme in [2] may result in strong interference when
two closely located mobile terminals in neighboring cells
are transmitting and receiving at the same time [10]. The
coordinated estimation technique of [3] relies on specific
conditions on channel covariance matrix and the claim of
[4] is only valid for the asymptotic case of infinite antennas.
The singular value decomposition (SVD)-based blind channel
estimation scheme proposed in [5], [6] has high computational
complexity for a large antenna system.
In this paper, we study a scheme in which partially decoded
data are used to aid channel estimation [11], [12]. We analyze
the distortion at the receiver output in this scheme. We
show that there are residual interference terms that remain
bounded away from zero when M → ∞. These residual
interference terms, broadly referred to as “contamination”,
can be divided into two types. The first type, referred to as
cross-contamination, is due to the correlation among the data
signals from different users. This is in principle similar to the
correlation among the pilots in a conventional scheme [1]. The
second type, referred to as self-contamination, results from the
dependency between channel estimate and estimation error.
(Recall that these two are independent in a classical minimum
mean-square-error (MMSE) estimation for a linear Gaussian
model.)
With analysis and simulation, we show that the two types
of contamination may cause considerable error if not treated
properly. We also show that cross-contamination can be reduced by using a long data frame (as long data sequences naturally have low cross correlation), and that self-contamination
can be alleviated by iterative processing. In principle, pilot
contamination can also be mitigated by increasing the pilot
sequence length for the conventional pilot-based scheme.
However, this approach will reduce the effective data rate and
thus not desirable in practice.
II. P RELIMINARIES
A. Linear Model and LMMSE Estimation
Let b (M ×1) and w (M ×1) be two vectors of independent
identically distributed (i.i.d.) random variables with mean zero.
Assume that E[bwH ] = 0, i.e., b and w are uncorrelated.
Consider the following linear model:
a=c·b+w
(1)
where c is a fixed constant scalar. The linear minimum meansquare-error (LMMSE) estimator [13] of b upon observing a
is given by
b̂ = ϕ · a
(2)
where ϕ is a linear combining coefficient. Using (2), we can
write
b=ϕ·a+ξ
(3)
where ξ ≡ b − b̂ is referred to as the estimation error for b̂.
In (2), ϕ can be computed as [13]
ϕ=
c∗ · vb
c∗ · vb
= 2
va
|c| · vb + vw
(4)
where va , vb and vw are, respectively, the variances of the
entries of a, b and w. Also, ξ is an i.i.d zero-mean vector
uncorrelated with b̂. The variance of an entry of ξ is given by
vξ = vb −
|c|2 · vb2
.
|c|2 · vb + vw
Here vξ is also the mean square error (MSE) for b̂.
(5)
B. Gaussian Assumption and Related Properties
We now further assume that both b and w are Gaussian in
(1). The LMMSE estimator in (2) now becomes an MMSE
one [13]. The estimate b̂ and the estimation error ξ are jointly
Gaussian and mutually independent [13]. We can compute the
following quantities involving a and b,
E |aH b|2 = E |aH (ϕ · a + ξ)|2
(6)
= |ϕ|2 · E kak4 + vξ · E kak2 .
The second equality in (6) holds because a and ξ are mutually
independent. (As b̂ = ϕ · a and ξ are mutually independent.)
Applying a similar procedure to E |aH (b − a)|2 leads to:
E |aH (b − a)|2 = E |aH ((ϕ − 1) · a + ξ)|2
= |ϕ − 1|2 · E kak4 + vξ · E kak2 .
(7)
Eqns. (6) and (7) will be useful for discussions on interference
power in Section IV. The expectations in (6) and (7) are
computed as follows. Since a ∼ CN (0, va · I), we have
kak2 ∼ va /2 · χ2 (2M ) where χ2 (2M ) denotes the chi-square
distribution with 2M degrees of freedom. Thus,
E kak2 = va · M ;
(8a)
E kak4 = va2 · (M 2 + M ).
(8b)
III. DATA - AIDED C HANNEL E STIMATION
In this section, we study a data-aided channel estimation
scheme based on certain available a priori data information.
This information could be obtained from the output of a softinput soft-output channel decoder. For simplicity, we assume
that only partially decoded data are used in channel estimation
in this section.
A. System Model
Consider an L-cell system with the following assumptions.
Each cell contains only one user. Each base station (BS)
is equipped with M antennas while each mobile unit is
equipped with only one antenna. We will focus on the uplink
transmission of cell 1. Our task is to estimate the channel
during a frame of J consecutive symbols in time. A frame of
received signals over different antennas at the BS of cell 1 are
denoted as
X
y1m (j) = h1m x1 (j) +
him xi (j) + n1m (j),
(9)
i6=1
m = 1, . . . , M, j = 1, . . . , J
where h1m is the equivalent channel gain from the user in cell
i to the mth antenna of BS 1, xi (j) the jth symbol transmitted
by user i with unit power, n1m (j) the additive white Gaussian
noise sample with mean zero and variance N0 . The equivalent
1/2
channel him is represented as him = βi · gim , where βi includes the large scale fading factor and the transmit power, and
gim ∼ CN (0, 1) is a Rayleigh fading factor. We assume that
{βi } are known at the receiver. We will focus on a quasi-static
channel, in which the channel remains constant in a frame and
change independently from frame to frame. Denote y1 (j) ≡
[y11 (j), y12 (j), . . . , y1M (j)]T , hi ≡ [hi1 , hi2 , . . . , hiM ]T and
n1 (j) ≡ [n11 (j), n12 (j), . . . , n1M (j)]T , we can now rewrite
(9) as
X
y1 (j) = h1 x1 (j) +
hi xi (j) + n1 (j), j = 1, . . . , J. (10)
i6=1
Note that some of the above assumptions are for notational
simplicity. For example, the discussions below can also be
extended to a system with multiple users in a cell.
B. A Priori Data Information
The data symbol x1 (j) is modeled as follows:
x1 (j) = x̄1 (j) + ∆x1 (j)
(11)
where
1) {x̄1 (j)} and {∆x1 (j)} are the known and unknown
parts at the receiver side, respectively;
2) {x̄1 (j)} and {∆x1 (j)} are mutually independent; and
3) both {x̄1 (j)} and {∆x1 (j)} have i.i.d. zero mean random variables with variances given by 1 − vx and vx
respectively.
We will treat {x̄1 (j)} as the samples of a random variable.
In practice, a soft-input soft-output decoder will generate the
log-likelihood ratios (LLRs) related to x1 (j) [14]. Using the
LLRs, x̄1 (j) is computed as the mean of x1 (j). By assumption
3, the average power of x1 (j) is normalized, i.e.,
E |x1 (j)|2 = E |x̄1 (j)|2 + E |∆x1 (j)|2 = 1.
(12)
In (12), the average over the distribution of x̄1 (j) has also
been taken.
Similar modeling of a priori information has been widely
used in turbo-type iterative signal processing, e.g., [11], [15].
C. Channel Estimation
We first combine the J time samples {y1 (j), j =
1, 2, . . . , J} as follows,
z=
J
X
x̄∗1 (j)y1 (j).
(13)
j=1
For notational brevity, denote x̄1 ≡[x̄1 (1), . . . , x̄1 (J)]T ,
∆x1 ≡[∆x1 (1), . . . , ∆x1 (J)]T and xi ≡[xi (1) . . . , xi (J)]T .
Substituting (9) into (13), we have
z = (x̄H
1 x1 ) · h1 +
J
X
X
(x̄H
x
)
·
h
+
x̄∗1 (j)n1 (j)
i
1 i
j=1
i6=1
2
= kx̄1 k · h1 + ñ,
ñ ≡ (x̄H
1 ∆x1 )h1 +
(14)
X
(x̄H
1 xi )hi +
i6=1
J
X
x̄∗1 (j)n1 (j).
j=1
The LMMSE estimator of h1 is given by
ĥ1 = θ · z
(15a)
where ϕi · ĥ1 and ξi are independent. Substituting (19) into
(17), we have
where, based on (2) and (4), we have
θ=
kx̄1
k2
β1
P
.
· β1 + vx · β1 + i6=1 βi + N0
(15b)
Note that ñ and h1 in (14) are not mutually independent,
H
and ñ is not Gaussian (as (x̄H
1 ∆x1 )h1 and (x̄1 xi )hi are
not Gaussian). Therefore the standard linear Gaussian model
discussed in Section II-B does not apply to (14). The channel estimate ĥ1 in (15a) and the estimation error h1 − ĥ1
are not independent. This fact results in the so-called selfcontamination, as will be discussed in Section IV-C.
ξi · xi (j),
Ii = ϕi · kĥ1 k2 · xi (j) + ĥH
{z
} | 1 {z
}
|
Ii0
2
E
|Ii00 |2
To maintain low receiver complexity, a simple matched filter
(MF) detector is employed:
+
i6=1
self-interference I1
ĥH
1 hi
|
· xi (j) + ĥH
n1 (j) .
{z
} | 1 {z }
cross-interference Ii
(16)
noise N
B. Cross-interference Power
Let us first discuss the following interference term inside
the summation in (16)
i 6= 1.
(17)
We now compute the average power of Ii . Combining (14)
and (15a), we have
ĥ1 = θ · (x̄H
1 xi ) · hi + ηi
(18a)
where
ηi ≡
X
k6=i
θ · (x̄H
1 xk )hk +
J
X
θ · x̄∗1 (j)n1 (j).
= |ϕi | ·
· (M + M ),
= ei · E kĥ1 k2
i 6= 1;
(21b)
(21c)
i 6= 1
(21d)
ϕi =
∗
θ · (x̄H
1 xi ) · βi
,
vĥ1
(22a)
2
2
θ2 · |x̄H
1 xi | · βi
,
vĥ1
L
X
2
2
|x̄H
x
|
·
β
+
k
x̄
k
·
N
= θ2 ·
.
k
k
1
0
1
ei = β i −
(22b)
(22c)
k=1
In the above, kĥ1 k2 x1 (j) is the desired signal,
P
H
i6=1 ĥ1 hi · xi (j) represent the cross-interference from
other cells. Since the detection is based on ĥ1 , we treat
ĥH
1 (h1 − ĥ1 ) · x1 (j) as interference although it contains a part
of the desired signal x1 (j). We will refer to ĥH
1 (h1 −ĥ1 )·x1 (j)
as self-interference.
Ii ≡ ĥH
1 hi · xi (j),
(21a)
2
where ϕi , ei (the variance of ξi ) and vĥ1 (the variance of ĥ1 )
are respectively given by,
vĥ1
H
2
ĥH
1 y1 (j) = kĥ1 k · x1 (j) + ĥ1 (h1 − ĥ1 ) · x1 (j)
{z
} |
{z
}
|
signal S
vĥ2
1
= ei · vĥ1 · M,
A. Data Detection
X
(20)
Ii00
Using (8), we have
E |Ii0 |2 = |ϕi |2 · E kĥ1 k4
IV. DATA D ETECTION
In this section, we study the impact of channel estimation
error on the performance of data detection. For ease of
analysis, we assume that the receiver is based on a simple
matched filter (MF) detector.
i 6= 1.
(18b)
j=1
By assuming that {xi , ∀i} and x̄1 are given and fixed, (18)
becomes a standard linear Gaussian model. Based on the results in Section II-B, hi can be decomposed into the following
two parts:
hi = ϕi · ĥ1 + ξi
(19)
(The notation “E” in (21) represents expectation conditioned
on {xi , ∀i} and x̄1 . In the following, “E” could denote both
conditional and unconditional expectation, the meaning will
be clear from the context). We can also see from (16) that the
average signal power is given by
h
i
E |S|2 ≡ E kĥ1 k4 = vĥ2 · (M 2 + M ).
(23)
1
From (21a) and (23), both the power of Ii0 and S grow
with M in the order of O(M 2 ). Thus, Ii0 becomes a limiting
interference component when M → ∞. This is similar to the
pilot-contamination effect in a pilot based channel estimation
scheme [1]. In the following discussions, we will refer to Ii0
as “cross-contamination”.
In the special case when M and J
are large, we have the
following approximation for E |Ii0 |2
E |Ii0 |2 ≈
βi2
M2
·
,
1 − vx J
i 6= 1.
(24)
Due to space limitation, we put the detailed
of (24)
derivations
in [16]. We can also see from (24) that E |Ii0 |2 reduces as vx
decreases,
as can be expected. Furthermore, in [16] we show
that E |Ii00 |2 can be approximated as
E |Ii00 |2 ≈ βi · β1 · M, i 6= 1.
(25)
C. Self-interference Power
Applying a similar procedure as (19), we can decompose
h1 into two mutually independent parts as
h1 = ϕ1 · ĥ1 + ξ1 .
(26)
Then I1 can be rewritten as
I1 ≡ ĥH
h
−
ĥ
· x1 (j)
1
1
1
40
30
(27)
I100
The average power of I10 and I100 are given respectively as
E |I10 |2 = |ϕ1 − 1|2 · vĥ2 · (M 2 + M ),
(28a)
1
00 2 (28b)
E |I1 | = e1 · vĥ1 · M,
Average power (dB)
= (ϕ1 − 1) · kĥ1 k2 · x1 (j) + ĥH
ξ1 · x1 (j) .
|
{z
} | 1 {z
}
I10
cross-contamination, accurate
cross-contamination, approximate
self-contamination, accurate
self-contamination, approximate
(29)
J=1
10
J = 32
J = 64
J = 128
024
J = 1024
0
where ϕ1 and e1 can be obtained from (22a) and (22b) by
setting i = 1. For a large J and
M , we derive
in [16] the
following approximations for E |I10 |2 and E |I100 |2 ,
vx · β12 M 2
·
,
E |I10 |2 ≈
1 − vx J
00 2 E |I1 | ≈ 0.
J=3
2
J=6
J=1 4
28
20
-10 0
10
-1
-2
10
10
vx
Fig. 1. Average power of cross-contamination and self-contamination for
M = 128 and different J, SNRtarget = Ptarget /N0 = 0 dB.
(30)
Similar to (21), the power of I10 is also proportional to M 2 .
We refer to this effect as “self-contamination”. As discussed
in Section III-C, ĥ1 and h1 − ĥ1 are not independent. This
dependency essentially causes the self-contamination effect.
This effect does not exist in a conventional pilot-based scheme
[7], [8] where pilots are assumed known at the receiver.
D. Numerical Results
Consider a 7-cell cellular system with normalized cell
radius. The users are assumed to be uniformly randomly
located. Assume a fourth-power path-loss attenuation law. Let
us focus on a link from a user in cell i to the BS in cell j.
The path-loss of this link is given by γ · d−4
i→j , where γ is
a constant and di→j the distance of this link. For simplicity,
log-normal shadowing is not considered.
We adopt a power control policy [17] such that the receive
power of a user to its own BS is Ptarget . The transmit power
of this user is then Ptarget /(γ · d−4
i→i ). This implies that βi is
given by
Ptarget
−4
βi = di→1 ·
.
d−4
i→i
The average power of cross-contamination and selfcontamination against vx are plotted in Fig. 1 for different
J values. The number of antennas is fixed to be M = 128.
The solid lines are obtained by averaging (21a) and (28a)
over all possible {xi }, x̄1 and the distributions of {βi }, using
Monte Carlo simulations. For reference, the approximations
using (24) and (29) are also included.
From Fig. 1, we can see that the approximations are
reasonably accurate except when vx ≈ 1 and J is small.
The inaccuracy
is due to the assumption β1 · J · (1 − vx ) P
vx ·β1 + k6=1 βk +N0 in deriving (24) and (29). (See (38), (51)
in [16]). This approximation is loose when vx ≈ 1 and J is
relatively small. Moreover, we have the following observations
from Fig. 1:
• When vx is relatively large, both cross-contamination and
self-contamination are serious.
•
•
For a fixed J, both cross-contamination and selfcontamination decrease as vx becomes smaller. When
vx → 0, cross-contamination converges to a constant
while self-contamination vanishes completely (see (24),
(29)). In other words, when the a priori data information
is accurate, self-contamination is negligible.
Both cross-contamination and self-contamination reduce
as J becomes larger.
1
accurate
approximate
0.8
0.6
0.4
J=3
2
J=6
4
0.2
0 0
10
J=1
28
J = 1024
-1
10
-2
10
vx
Fig. 2. The power ratio of contamination for M = 128 and different J.
SNRtarget = 0 dB. {βi } are generated in the same way as in Fig. 1.
To quantify the contamination effect in a data-aided scheme,
we define the following ratio:
power (self-contamination + cross-contamination)
.
power (self-interference + cross-interference + noise)
(31)
The plots of δ against vx are given in Fig. 2 for different J
values. The approximate results based on (24)-(25), (29)-(30),
and (56) in [16] are also given for comparison. Again, we can
see that the contamination effect becomes marginal when J is
sufficiently large.
δ=
h
i
E kĥ1 k4
i
i
h
i P
h
SIN Rx = h
H
2 + E kĥ k2 · N
2 +
E |ĥH
0
1
1 (h1 − ĥ1 )|
i6=1 E |ĥ1 hi |
SIN Rxapp =
(32)
β12 · M 2
vx ·β12
1−vx
·
M2
J
+
P
βi2
i6=1
1−vx
E. SINR Performance
From (16), the SINR contained in the output of the MF
detector, denoted as SIN Rx , is defined in (32), as shown at
the top of the next page. Furthermore, using (24)-(25), (29)(30), and also (55)-(56) in [16], we have the approximate SINR
expression SIN Rxapp for a large M and J in (33).
In Fig. 3, SIN Rx and SIN Rxapp are plotted for various M
and J. We can see that the SINR grows as J and M increase.
Moreover, SIN Rxapp is an accurate approximation of SIN Rx ,
except when vx ≈ 1.
22
·
M2
J
(33)
+ β i · β 1 · M + β 1 · N0 · M
V. I TERATIVE C HANNEL E STIMATION AND S IGNAL
D ETECTION
In this section, we discuss an iterative joint channel estimation and data detection process [11], [12] which gradually
improves the system performance.
A. Transmitter Structure
The transmitter structure for the user in cell 1 is illustrated
in Fig. 4(a). We assume that one transmitted codeword spans
several coherence blocks. These coherence blocks may be
transmitted consecutively in time, or concurrently over different OFDM sub-carriers. In each coherence block, the first J
20
M = J = 128
18
b1
SINR (dB)
16
M = J = 64
14
(a) transmitter
M = J = 32
12
x̂1
10
Data
detector
Decoder
8
x1 , v x
accurate
approximate
6
4
2 0
10
 y  j 
p
1
Fig. 4. Transceiver structure for user 1.
F. Discussions
From Eqn. (33), we can see that:
app
• When J is fixed and M increases, SIN Rx
is bounded.
When M → ∞, the limiting value of SIN Rxapp is
vx
1−vx
Channel
Eestimator
1
10
Fig. 3. Average SINR of the data aided channel estimation scheme for
different M and J. SNRtarget = 0 dB. {βi } are generated in the same
way as in Fig. 1.
J · β12
P
· β12 + i6=1
ĥ1
 y  j 
(b) receiver
-2
-1
10
vx
SIN Rxapp ≈
(x1, p1)
Pilot
insertion
x1
Encoder
1
1−vx
· βi2
.
(34)
In this case, contamination is dominant and other interferences are negligible.
app
• When both J and M increase, SIN Rx
can be unbounded. In this case, the power of contamination and
other interferences is of the same order.
Also, note from (33) that SIN Rx is a function of vx . In the
next section, we will introduce a practical iterative processing
scheme where vx can be gradually reduced.
symbols are data symbols and the other Jp symbols are pilots.
At the transmitter side, the input binary information sequence
b1 is first processed by the encoder (which includes forward
error coding, random interleaving and signal mapping) to get
the data symbol x1 (j). The data symbols x1 is multiplexed
with the random pilot symbols p1 and transmitted through
the antennas. The received signals corresponding to data and
pilot transmissions are represented by y1 (j), j = 1, . . . , J and
y1p (j), j = J + 1, . . . , J + Jp respectively. We set Jp = 1 for
our simulations.
The receiver structure is shown in Fig. 4(b), where iterative channel estimation and signal detection is adopted. The
channel estimator and the signal detector have been discussed
in Section III and Section IV respectively. Conventioal pilot
based channel estimation is performed in the first iteration.
In subsequent iterations, data-aided channel estimation will be
employed to refine the channel estimation. For illustration purpose, we assumed that only a priori data information is used
to estimate the channel. Here, we adopt a general LMMSE
estimator which combines the information from pilot and data
[15]. The processings of the channel estimator, data detector
and decoder are executed iteratively until convergence.
B. Simulation Results
0
ACKNOWLEDGMENT
10
=1
= 100
This work was supported by a grant from the University
Grants Committee (Project No. AoE/E-02/08) of the Hong
Kong Special Administrative Region, China. The authors
would also like to thank Alcatel-Lucent Shanghai Bell Company Ltd for supporting the research work leading to this
paper.
-1
10
conventional pilot-based
SVD blind estimation
=1
= 100
-2
BER
in this scheme: cross-contamination and self-contamination.
Both analysis and simulation demonstrates that the data-aided
scheme can effectively suppress the contamination effect and
achieve improved performance in large antenna systems.
10
-3
=
10
1
=1
00
perfect CSI
data-aided: 4th iteration
R EFERENCES
-4
10
-4
-2
0
2
4
6
SNR (dB)
Fig. 5. BER performances of the pilot based channel estimation scheme, the
data-aided scheme and the SVD blind scheme. L = 7 and M = 128. β1 = 1,
βi 6= 1 for i 6= 1. J = 63, Jp = 1. A codeword spans 64 coherence blocks.
The rate-1/2 (23, 35)8 convolutional code is employed with Gray-mapped
256-QAM modulation.
The BER performances of the above iterative scheme, the
conventional pilot based one and the SVD blind estimation
scheme [6] are demonstrated in Fig. 5. In the simulations, for
simplicity, we set β1 = 1 and {βi = 0.1, i 6= 1}. This model
has been previously used in [7], [8]. Define
power of pilot symbol
ρ=
.
power of data symbol
We consider two different values for ρ: ρ = 1 and ρ = 100.
From Fig. 5, we can see that the BER performances for both
ρ values are very poor for the conventional pilot-only scheme.
As the problem is caused by the correlation among pilots,
increasing pilot power alone (even to an extremely large value
of ρ = 100) cannot solve the problem.
On the other hand, the data-aided channel estimation technique can improve the BER performance drastically. After
only 4 iterations, the performance is reasonably close to the
benchmark scheme with perfect CSI. It is also interesting
to see that the performance difference between ρ = 1 and
ρ = 100 is marginal in the region of BER< 10−4 , indicating
that the pilot power does not need to be too large in practice.
Clearly, the iterative scheme is very effective in treating
contamination.
From the figure, we can also see that the performance of the
blind SVD scheme is much better than that of the conventional
pilot only scheme, but still worse that data-aided one in the
high SNR region. Moreover, the complexity of the SVD blind
scheme is cubic of M , while that of the data-aided scheme is
linear.
VI. C ONCLUSION
We analyzed the performance of the data-aided channel estimation scheme in a multi-cell large antenna system. We showed that there are two types of contamination
[1] T. L. Marzetta, “Noncooperative cellular wireless with unlimited numbers of base station antennas,” IEEE Trans. Wireless Commun., vol. 9,
no. 11, pp. 3590–3600, 2010.
[2] F. Fernandes, A. Ashikhmin, and T. Marzetta, “Inter-cell interference
in noncooperative tdd large scale antenna systems,” IEEE J. Sel. Areas
Commun., vol. 31, no. 2, pp. 192–201, 2013.
[3] H. Yin, D. Gesbert, M. Filippou, and Y. Liu, “A coordinated approach
to channel estimation in large-scale multiple-antenna systems,” IEEE J.
Sel. Areas Commun., vol. 31, no. 2, pp. 264–273, 2013.
[4] A. Ashikhmin and T. Marzetta, “Pilot contamination precoding in multicell large scale antenna systems,” in Information Theory Proceedings
(ISIT), 2012 IEEE International Symposium on, 2012, pp. 1137–1141.
[5] H. Q. Ngo and E. Larsson, “Evd-based channel estimation in multicell
multiuser MIMO systems with very large antenna arrays,” in Acoustics,
Speech and Signal Processing (ICASSP), 2012 IEEE International
Conference on, 2012, pp. 3249–3252.
[6] M. Muller, R.and Vehkapera and L. Cottatellucci, “Blind pilot decontamination,” in Proc. ITG workshop on smart antennas, Stuttgart, May
2013.
[7] J. Hoydis, S. ten Brink, and M. Debbah, “Massive mimo in the ul/dl
of cellular networks: How many antennas do we need?” IEEE J. Sel.
Areas Commun., vol. 31, no. 2, pp. 160–171, 2013.
[8] H. Q. Ngo, E. Larsson, and T. Marzetta, “Energy and spectral efficiency
of very large multiuser mimo systems,” IEEE Trans. Commun., vol. 61,
no. 4, pp. 1436–1449, 2013.
[9] H. Ngo, E. Larsson, and T. Marzetta, “The multicell multiuser mimo
uplink with very large antenna arrays and a finite-dimensional channel,”
IEEE Trans. Commun., vol. PP, no. 99, pp. 1–12, 2013.
[10] H. Holma, S. Heikkinen, O.-A. Lehtinen, and A. Toskala, “Interference
considerations for the time division duplex mode of the umts terrestrial
radio access,” IEEE J. Sel. Areas Commun., vol. 18, no. 8, pp. 1386–
1393, 2000.
[11] H. Schoeneich and P. A. Hoeher, “Iterative pilot-layer aided channel estimation with emphasis on interleave-division multiple access systems,”
EURASIP Journal on Applied Signal Processing, vol. 2006, 2006.
[12] M. Zhao, Z. Shi, and M. Reed, “Iterative turbo channel estimation for
ofdm system over rapid dispersive fading channel,” IEEE Trans. Wireless
Commun., vol. 7, no. 8, pp. 3174–3184, 2008.
[13] S. M. Kay, Fundamentals of Statistical Signal Processing: Estimation
Theory. Upper Saddle River, NJ: Prentice Hall PTR, 1993.
[14] L. Ping, J. Tong, X. Yuan, and Q. Guo, “Superposition coded modulation
and iterative linear mmse detection,” IEEE J. Sel. Areas Commun.,
vol. 27, no. 6, pp. 995–1004, 2009.
[15] M. Nicoli, S. Ferrara, and U. Spagnolini, “Soft-iterative channel estimation: Methods and performance analysis,” IEEE Trans. Signal Process.,
vol. 55, no. 6, pp. 2993–3006, 2007.
[16] J. Ma and L. Ping, “Detailed derivations of the approximate
interference, signal and noise power.” [Online]. Available: https:
//www.dropbox.com/s/9icesqs3sms3ng5/Derivation.pdf
[17] K. Gilhousen, I. Jacobs, R. Padovani, A. Viterbi, J. Weaver, L.A., and
I. Wheatley, C.E., “On the capacity of a cellular cdma system,” IEEE
Trans. Veh. Technol., vol. 40, no. 2, pp. 303–312, 1991.
A PPENDIX A
A PPROXIMATIONS OF THE I NTERFERENCE , S IGNAL AND N OISE P OWER
The power of cross and self interferences for fixed {xi } and x̄1 are given in (21) and (28) respectively. We need to further
average (21) and (28) over the distribution of {xi } and x̄1 . In what follows, we will derive simple approximate expressions
for the average interference, signal and noise power when both J and M are large.
A. Cross-interference Power
Substituting (22c) into (22a) and (22b), we have
2 2
· βi ,
|ϕi |2 · vĥ2 = θ2 · x̄H
1 xi
1
X
2
x̄H
· βk + kx̄1 k2 · N0 · βi .
ei · vĥ1 = θ2 ·
1 xk
(35a)
(35b)
k6=i
Averaging (35) over {xi , ∀i} (conditioned on x̄1 ) and substituting in the definition of θ in (15b), we have
h
i
kx̄1 k2 · βi2 · β12
E{xi } |ϕi |2 · vĥ2 = 2 ,
P
1
kx̄1 k2 · β1 + vx · β1 + k6=1 βk + N0
P
h
i
kx̄1 k2 · β1 + vx · β1 + k6=1,k6=i βk + N0 · kx̄1 k2 · βi · β12
E{xi } ei · vĥ1 =
.
2
P
kx̄1 k2 · β1 + vx · β1 + k6=1 βk + N0
(36a)
(36b)
From assumption 3 in Section III-B, x̄1 is also random and the entries are i.i.d. with mean zero and variance 1 − vx . By the
law of large numbers,
1
a.s.
· kx̄1 k2 −−−−→ 1 − vx .
(37)
J→∞
J
a.s.
where −−−−→ denotes almost sure convergence as J tends to infinity. Approximating kx̄1 k2 by J · (1 − vx ) and noting that
J→∞
P
β1 · J · (1 − vx ) vx · β1 + k6=1 βk + N0 for a large J, we have
i
h
βi2
E{xi },x̄1 |ϕi |2 · vĥ2 ≈
, i 6= 1,
1
J · (1 − vx )
h
i
E{xi },x̄1 ei · vĥ1 ≈ βi · β1 , i 6= 1.
(38a)
(38b)
Combining (38) and (21), we finally arrive at the following approximate expressions for E[|Ii0 |2 ] and E[|Ii00 |2 ] when both M
and J are large.
βi2
M2
E |Ii0 |2 ≈
·
, i 6= 1,
1 − vx J
00 2 E |Ii | ≈ βi · β1 · M, i 6= 1.
(39)
B. Self-interference Power
We first consider I100 given in (28b). The expression for e1 · vĥ1 is given in (35b) by setting i = 1. Similar to the treatment
of Ii00 , i 6= 1, taking average over {xi , ∀i} (conditioned on x̄1 ), we have
P
2
3
k6=1 βk + N0 · kx̄1 k · β1
E{xi } e1 · vĥ1 =
(40)
2 .
P
kx̄1 k2 · β1 + vx · β1 + k6=1 βk + N0
Again, approximating kx̄1 k2 by J · (1 − vx ), we have
h
i
1
.
=O
J
M
J
E{xi },x̄1 e1 · vĥ1
(41)
Combining (28b) and (41), we have
E |I100 |2 = O
≈ 0.
(42)
In the above, E |I100 |2 is approximated as zero since it is of a smaller order compared with E |I10 |2 , as will be seen from
the following discussions.
We now consider the average power of I10 in (28a), given by
E |I10 |2 = |ϕ1 − 1|2 · vĥ2 · (M 2 + M ).
(43)
1
I10
Ii0 ,
Ii00
I10 .
The average of
over {xi , ∀i} is not so easy, as compared with that of
and
We next first approximate
simpler form by using the law of large numbers. To this end, combining (22a), (22c) and (15b), we have
P
1
2
·
k
x̄
k
·
β
+
v
·
β
+
β
+
N
1
1
x
1
0
k6=1 k
J
x̄H
1 x1
·
.
ϕ1 =
P
2
2
1
1
1
H
H
2
J }
· β1 + k6=1 J 2 · x̄1 xk · βk + J · kx̄1 k · N0 | {z
J 2 · x̄1 x1
|
{z
}
B
I10
into a
(44)
A
In the following, we will derive the asymptotic value for the term A as J → ∞. The derivations are based on the following
results:
1
a.s.
· kx̄1 k2 −−−−→ 1 − vx ,
(45a)
J→∞
J
a.s.
1
· x̄H
−−−→ 0,
(45b)
1 ∆x1 −
J→∞
J
a.s.
1
· x̄H
−−−→ 0,
(45c)
1 xi −
J→∞
J
1 H 2 a.s.
· x̄1 x1 −−−−→ (1 − vx )2 .
(45d)
J→∞
J2
2 as
Eqns. (45a)-(45c) are direct applications of the law of large numbers. To prove (45d), we first rewrite J −2 · x̄H
1 x1
1 H 2
1
· x̄1 x1 = 2 x̄H
(x̄1 + ∆x1 )(x̄1 + ∆x1 )H x̄1
J2
J 1
1 = 2 kx̄1 k4 + kx̄1 k2 · x̄H
1 ∆x1
J
2 H
.
+ kx̄1 k2 · ∆xH
1 x̄1 + x̄1 ∆x1
The result in (45d) can then be verified by applying (45a)-(45c) to (46).
Combining (45) and (44), we have
1
a.s.
.
A −−−−→
J→∞ 1 − vx
Substituting (15b) into (22c), vĥ1 is rewritten as
P
L
1
H
2
2
·
|
x̄
x
|
·
β
+
k
x̄
k
·
N
· β12
2
k
k
1
0
1
k=1
J
vĥ1 =
2 .
P
1
2·β +v ·β +
·
k
x̄
k
β
+
N
1
1
x
1
0
k6=1 k
J2
Using (45), it can be shown that
a.s.
vĥ1 −−−−→ β1
J→∞
Now keeping the term B and substituting in the asymptotic values of A and vĥ1 in (47) and (49), we have
2
1
x̄H x1
· 1
− 1 · β12
|ϕ1 − 1|2 · vĥ2 ≈ 1
1 − vx
J
2
1
kx̄1 k2 + x̄H
1 ∆x1
≈
·
− 1 · β12
1 − vx
J
2
1
x̄H
1 ∆x1 2
≈
·
· β1
1 − vx
J
where we have used (45a) in the last step. By taking expectation of the above expression, we finally have
i
h
vx · β12
E{x1 },x̄1 |ϕ1 − 1|2 · vĥ2 ≈
.
1
J · (1 − vx )
Combining (51) and (28a), we have
vx · β12 M 2
E |I10 |2 ≈
·
.
1 − vx J
(46)
(47)
(48)
(49)
(50a)
(50b)
(50c)
(51)
(52)
C. Signal and Noise Power
Conditioned on {x1 } and x̄1 , the signal and noise power are respectively given by (see (16) and (8))
i
h
E[|S|2 ] ≡ E kĥ1 k4 = vĥ2 · (M 2 + M ),
i1
h
2
2
E[|N | ] ≡ N0 · E kĥ1 k = vĥ1 · N0 · M.
(53)
(54)
a.s.
As shown in (49), vĥ1 −−−−→ β1 . We then approximate the signal and noise power as follows for a large M and J
J→∞
E[|S|2 ] ≈ β12 · M 2 ,
(55)
E[|N |2 ] ≈ β1 · N0 · M.
(56)