• Keine Ergebnisse gefunden

6.7 Different Behavior in Case of Suboptimal DPC Schemes

7.2.3 Duality Theorem

(7.21) which can be shown to be equal to (7.14).

7.2.2 Zero-Forcing in the Uplink If zero-forcing constraints

GHkHUL,jTj =0, ∀k,∀j6=k ⇔ GHkHUL,jCxjHUL,jH Gk =0, ∀k,∀j6=k (7.22) are imposed, we can use a receive filterGHk =GHk,ZF of sizeM ×Dk, whose rows are an orthonormal basis of the null space ofP

j6=kHUL,jCxjHUL,jH , whereDkis the dimensionality of this null space. We obtain

rZF,k =

µlog2det

IDk+µ1GHkHUL,kCxkHUL,kH Gk

ifDk>0

0 otherwise (7.23)

withCxk = TkTkH, where we have usedGHkGk = IDk and the fact that the uplink noise covariance matrix is a scaled identity. The resulting reduced rate region isRUL,TIN−ZF(Q)⊆ RUL,TIN(Q). If a smaller number of streamssk< Dkis transmitted, we can again combine a zero-forcing filter with a second filter stageG˜Hk of sizesk×Dk, so thatGHk = ˜GHkGHk,ZFhas sizesk×M.

7.2.3 Duality Theorem

It was shown in [51], [126, Sec. 3.3] that the complex MIMO BC and MIMO MAC share the same achievable rate region under a sum power constraint if linear transceivers and proper complex signals are employed in both systems. Since the same derivation can also be applied to real-valued systems, we have the following duality lemma for the RoP MIMO BC-TIN.

Lemma 7.2.2. For any given channel matricesHkHand noise covariance matricesCηk, the rate region of the RoP MIMO BC-TIN(7.3)and the rate region of the dual RoP MIMO MAC-TIN (7.16)under a sum power constraint are the same, i.e.,RTIN(Q) =RUL,TIN(Q).

Sketch of Proof. A proof for complex systems with proper signals was given in [51, Th. IV.1]

and can be transferred to real-valued systems. We summarize the main steps in the following.

To study the uplink-to-downlink conversion, letGHk =GHk,MMSE be the uplink MMSE receive filters (7.19), and use a modal matrixWkofGHkHUL,kTkto decorrelate the streams by

7.2. Uplink-Downlink Duality 95

means of the filters from (7.20). Note that we can assumeeTsTk0Tk0Hes>0for all streamssof all usersk, which can be ensured by removing zero columns fromTk0 (and the corresponding rows fromG0Hk ) [51], i.e., we assumeTk0 to be a full-rank tall (or square) matrix.

From (7.21), the rate of thesth stream of userkis then given byrk,sUL =µlog2(1 +γk,sUL) with the signal-to-interference-and-noise ratio (SINR)

γk,sUL= (eTsG0Hk HUL,kTk0es)2

eTsG0Hk XkG0kes (7.24) in the uplink. Assuming stream-wise decoding in the downlink using the filters

Bk=G0kAk RHk =A−1k Tk0H 1

µCηk 12

(7.25) where Ak = diag(αk,s), αk,s ∈ R, the intra-user interference in the denominator of (7.6) cancels out, and we obtain the per-stream raterDLk,s =µlog2(1 +γk,sDL)with the SINR We have used (7.2), (7.13), and (7.25) to obtain this reformulation.

To achieveγULk,sk,sDL(and thusrk,sUL=rk,sDL), we need eTs

AkG0Hk XkG0kAk−Tk0HCz0

kTk0

es= 0 (7.28)

for all streamssof all usersk. As shown in detail in the proof of [51, Th. IV.1], this condition can be rewritten as a system of linear equations in the variablesα2k,s. Based on results on nonnegative matrices from [157], it can then be shown that there exists a unique set of positive scalarsα2k,ssolving this system of equations. Moreover, it can be shown that plugging in this solution into (7.25) leads to downlink transmit filters that require the same sum transmit power as the original uplink transmit filters.

The proof is completed by repeating the same reasoning for the downlink-to-uplink transformation, where the transformation rule is given by

Tk= 1

µCηk 12

R0kk GHk = ¯A−1k Bk0H (7.29) with R0k and Bk0 from (7.8). The scaling factors contained in the diagonal matrix A¯k are obtained from solving

As a basis for the further derivations in this chapter, we need to analyze the relation between maximum-entropy transmission in the downlink and in the dual uplink. The result is stated in the following theorem.

Theorem 7.2.1. Let(Pk =PUk)∀kandPBbe power shaping spaces fulfilling the compatibility assumption (Definition 3.1.3). If the noise vectorsηkare maximum-entropy signals with respect toPk, respectively, a rate vector is achievable with sum powerQin the RoP MIMO BC-TIN with maximum-entropy per-user input signals (with respect to the power shaping spacePB) if and only if it is achievable with the same sum powerQin the dual RoP MIMO MAC-TIN with maximum-entropy transmit signals (with respect to the power shaping spaces(Pk)∀k).

Proof. We need to show that the transformation derived in the proof of Lemma 7.2.2 leads to maximum-entropy transmission in the downlink if maximum-entropy transmission is used in the uplink and vice versa. For later use, note thatC

1

ηk2 ∈ Pkby Corollaries 2.4.1 and 2.4.2, andHUL,kis compatible with(PB,Pk)(see Proposition 2.7.2).

For the uplink-to-downlink transformation, we have to show that all Bk from (7.25) correspond to maximum-entropy transmission with respect to PB if all Tk correspond to maximum-entropy transmission with respect to Pk. To this end, we need to study the transformations between several involved power shaping spaces (amongst others due to the transformation withWk) and the properties of the matrixAkobtained from solving (7.28).

Consider the singular value decompositionTk = UkΣkVkH with a tall matrix Uk and square matricesΣk andVk. If maximum-entropy transmission is employed by userk, we have UkΣk2UkH = TkTkH ∈ Pk. Then, P¯k = {P¯ |P¯ = VkUkHP UkVkH, P ∈ Pk} is a power shaping space due to Proposition 2.6.1, andTkis compatible with(Pk,P¯k). The latter can be seen by noting thatΣk ∈P˜k ={P˜ |P˜ =UkHP Uk, P ∈ Pk}(Corollary 2.6.2 and Corollary 2.4.1) and thatP¯is obtained fromP˜by applying a transformation with the unitary matrixVk. Moreover, if maximum-entropy transmission is employed by all users,X−1∈ PB

by Corollary 2.4.2, andGHkHUL,kTk=TkHHUL,kH X−1HUL,kTk∈P¯k.

Decorrelating the streams by means of (7.20) leads to another power shaping space Pk0 = {P0 |P0 = WkHP W¯ k, P¯ ∈ P¯k}. In case of maximum-entropy transmission with Tk0Tk0H =TkTkH∈ Pk, the matrixTk0 is compatible with(Pk,Pk0). Moreover, if maximum-entropy transmission is employed by all users, G0Hk = Tk0HHUL,kH X−1 is compatible with (Pk0,PB) (see Proposition 2.7.2). For later use, note that we can chooseWk such that the projectionprojP0

ktoPk0 commutes with the projectionprojdiagto the space of diagonal matrices (see Corollary 2.6.4).

Let Ξk = Tk0HHUL,kH Xk−1HUL,kTk0. Applying the matrix inversion lemma (7.10) to X−1 = (Xk+HUL,kTk0Tk0HHUL,kH )−1, we have

X−1 =Xk−1−Xk−1HUL,kTk0 IM+Tk0HHUL,kH Xk−1HUL,kTk0−1

Tk0HHUL,kH Xk−1 (7.32) and we can show thatΞkis diagonal (e.g., [51]) since

Ξk−Ξk(IMk)−1Ξk=G0Hk HUL,kTk0 (7.33) is diagonal. Moreover, we have that

Φk=G0Hk XkG0k =Tk0HHUL,kH X−1XkX−1HUL,kTk0

k−2Ξk(IMk)−1Ξkk(IMk)−1Ξk(IMk)−1Ξk (7.34)

7.2. Uplink-Downlink Duality 97

is a nonnegative diagonal matrix. From the first line of (7.34), we can see thatΦk∈ Pk0 if all users employ maximum-entropy transmission sinceG0Hk is compatible with(Pk0,PB)in that case. We can rewrite (7.28) as

k andprojdiagcommute, the unique solution for the set of scalarsα2k,smust solve the two systems of equations The homogeneous system of equations (7.38) is solved by settingNk0 = 0for allk. From this, we see that the solution to (7.36) fulfillsA2k = Pk0 ∈ P0 for all usersk. As a result, BkBkH=G0kA2kG0Hk ∈ PB, i.e., the solution corresponds to maximum-entropy transmission in the downlink.

The proof is completed by repeating the same reasoning for the downlink-to-uplink transformation.

Due to this Theorem, we can prove all further statements in this chapter via the dual uplink whenever this is more convenient. If we do so, no further justification for switching to the uplink is given.