8th International Conference on Communications and Networking in China

Research Article

Angle Sweeping and Scheduling in Downlink Opportunistic Beamfoming Systems

  • @INPROCEEDINGS{10.1109/ChinaCom.2013.6694571,
        author={Yi Xiao and Kai Sun and Wei Huang and Sachula Meng and Meiting Wang and Bin Wang},
        title={Angle Sweeping and Scheduling in Downlink Opportunistic Beamfoming Systems},
        proceedings={8th International Conference on Communications and Networking in China},
        publisher={IEEE},
        proceedings_a={CHINACOM},
        year={2013},
        month={11},
        keywords={beam angle; opportunistic beamforming; user-scheduling; sweeping},
        doi={10.1109/ChinaCom.2013.6694571}
    }
    
  • Yi Xiao
    Kai Sun
    Wei Huang
    Sachula Meng
    Meiting Wang
    Bin Wang
    Year: 2013
    Angle Sweeping and Scheduling in Downlink Opportunistic Beamfoming Systems
    CHINACOM
    IEEE
    DOI: 10.1109/ChinaCom.2013.6694571
Yi Xiao1, Kai Sun1,*, Wei Huang1, Sachula Meng1, Meiting Wang1, Bin Wang2
  • 1: Inner Mongolia University
  • 2: Beijing University of Posts and Telecommunications
*Contact email: sunkai1501@gmail.com

Abstract

In the downlink wireless communication systems, opportunistic beamforming is a practical and widely used technique for user-scheduling. The critical element of the opportunistic beamforming is the beamforming. There are many studies focus on the channel fluctuations but put little eyes on the beam’s angle. In this paper, we investigate system performance if the beam angle changes in a sweeping way. We consider the scheme under cellular network systems and put more eyes on the slow fading channel states. The base stations equipped with smart antennas which generate beams according to the defined algorithm. An angle sweeping scheme is proposed to change the beam angle from 0 to 2*pi and bring fluctuations to the channel which make the scheduling better. By combining memory function, the proposed scheme is more practical and suitable for the few user circumstance. We also demonstrate the performance of the proposed algorithm through MATLAB simulation.