You are on page 1of 18

I.

INTRODUCTION
Recently, unmanned aerial vehicles (UAVs) have
attracted considerable attention in many military
Wireless Relay as well as civilian applications [1—5]. An attractive
feature of using UAVs for networked communications
Communications with is that they can be quickly deployed as relays to
extend coverage and improve network connectivity
Unmanned Aerial Vehicles: [6—11]. Employing UAVs in this manner is especially
helpful in situations where nodes are widely scattered
Performance and Optimization or obstacles such as hills or large buildings deteriorate
the quality of the link between a base station (BTS)
and an access point (AP). The advantages of using
relays in more generic wireless network scenarios
have been the subject of considerable interest recently
PENGCHENG ZHAN
(e.g., see [12], [13]).
Quantenna Communications
Ayyagari in [3] presented a network architecture
KAI YU
Ericsson AB
that deployed airborne unmanned relay platforms
to form equivalent “cellular towers” in the sky for
A. LEE SWINDLEHURST, Fellow, IEEE
The University of California at Irvine
implementing rapidly deployable, broadband wireless
networks. In [2], [4], the authors are concerned
with the routing issues of a hierarchical network
In this paper, we investigate a communication system in with UAV nodes relaying messages at higher levels.
which unmanned aerial vehicles (UAVs) are used as relays Hierarchical algorithms are modified to reduce
between ground-based terminals and a network base station. routing overhead and improve the throughput.
We develop an algorithm for optimizing the performance of the Rubin proposed a protocol that synthesized the
ground-to-relay links through control of the UAV heading angle. topology of a mobile network backbone, which
To quantify link performance, we define the ergodic normalized made use of unmanned vehicles including UAVs
transmission rate (ENTR) for the links between the ground nodes [5] and dealt with the resulting network routing and
and the relay, and derive a closed-form expression for it in terms resource allocation problems. In [7] the flocking
of the eigenvalues of the channel correlation matrix. We show rules of birds and insects were used to study the
that the ENTR can be approximated as a sinusoid with an offset
UAV placement and navigation problem with the
end goal of improving network connectivity. Using
that depends on the heading of the UAV. Using this observation,
graph theory, [11] approached a similar problem
we develop a closed-form expression for the UAV heading that
by optimizing various connectivity criteria. The
maximizes the uplink network data rate while keeping the rate
feasibility of using orthogonal frequency division
of each individual link above a certain threshold. When the multiplexing (OFDM) transmission techniques for
current UAV relay assignments cannot meet the minimum link UAV wireless communication was investigated in [14].
requirements, we investigate the deployment and heading control Like [14], Palat in [8] focused on the physical layer
problem for new UAV relays as they are added to the network, aspects of UAV relay communications, and studied
and propose a smart handoff algorithm that updates node and the performance of distributed transmit beamforming
relay assignments as the topology of the network evolves. and distributed orthogonal space-time block coding
(OSTBC) schemes under ideal and nonideal UAV
flight conditions. Cheng [6] considered a special
relay communications scenario for delay-tolerant
Manuscript received August 3, 2009; revised February 9 and
August 2, 2010; released for publication August 20, 2010. applications, where the UAV relays carry data and
deliver them upon approaching the user terminals.
IEEE Log No. T-AES/47/3/941781.
Inspired by the above work on UAV
Refereeing of this contribution was handled by M. Rice. communications, this paper investigates a network
This work was conducted during the second author’s post-doctoral with multiple UAVs relaying messages from ground
research at Brigham Young University. APs to a remote BTS. Unlike [2], [4], [5], we are
not concerned with routing algorithms; the UAV acts
Authors’ addresses: P. Zhan, Quantenna Communications, 3450 W.
Warren Ave., Fremont, CA 94538; K. Yu, Ericsson AB, Kistagngen as a relay to connect the set of isolated APs to the
20, SE-16480 Stockholm, Sweden; A. Lee Swindlehurst, Dept. of BTS in a single hop. We focus instead on various
Electrical Engineering and Computer Science, The University of aspects of the network, including: the physical layer
California at Irvine, Irvine, CA 92697, E-mail: (swindle@uci.edu). communication link properties, i.e., analysis of the
link-level throughput of the proposed transmission
0018-9251/11/$26.00 °
c 2011 IEEE scheme and the symbol error rate (SER) for each

2068 IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS VOL. 47, NO. 3 JULY 2011
AP-to-UAV link, the media access control (MAC) The paper is organized as follows. Section II
layer handoff algorithm that the APs use to switch describes the mathematical models assumed in
between different UAV relays for better performance this work, including the channel model, and the
as the network evolves over time, and the network modulation and coding schemes employed. In
layer UAV relay deployment problems including UAV Section III, we derive a closed-form expression for
placement and optimal motion control. the average uplink data rate, and analyze the SER for
This paper differs from the previously cited each AP-UAV link. We also formulate in this section
literature in the assumptions made about the network, the problem of finding the optimal heading of the
the criteria used for quantifying network performance, UAVs to maximize the network ENTR. Section IV
and the development of a closed-loop UAV heading illustrates how to improve the network throughput
control process that allows this performance metric to by allowing the APs to switch relays when necessary
be optimized. We consider a tactical communications using a handoff algorithm developed for this specific
scenario, where a set of distributed APs in a remote type of network. In this section, we also discuss how
area is trying to communicate with a BTS, and a to handle situations where UAVs must be added to the
team of UAVs is deployed to help establish the network to maintain connectivity. Section V presents
communication links. We assume that, in general, some simulation results for the network protocol we
the APs and UAVs have multiple antennas, and propose. Section VI concludes the paper and gives
we use a channel model that allows us to account some insights into possible future work. Some of the
for different levels of spatial correlation at the APs critical derivations can be found in the Appendix.
and UAVs. We focus on “uplink” performance II. SYSTEM DESCRIPTION
(here, “uplink” refers to communications from the
APs to the UAVs), and we assume that the UAVs A. System Model
have sufficient bandwidth resources so that all AP We assume a multi-user uplink scenario, with a
transmissions are orthogonal and interference free. UAV deployed to relay messages from a collection of
This limits application of the proposed approach to APs to a given BTS. We further assume that the APs
situations where the number of APs is not too large. employ orthogonal transmissions so that inter-user
Even if ad hoc networks are present on the ground, interference can be ignored. We consider a general
the system-level communications are still likely to multi-antenna setting, where each AP has Ma transmit
be implemented in a hierarchical way (i.e., only a antennas, and the UAV relay has Na receive antennas.
subset of the ground communications needs to be With these assumptions, the signal from the kth AP to
routed through the relays, and even those messages the UAV can be written as
s
would likely be funneled through a smaller set of
Ek
communication centers), and thus this should not be yk = H s + nk (1)
Ma k k
a significant restriction in most practical situations.
Under the above assumptions, the primary where yk is the received signal from AP k at the
contribution of the paper is the development of UAV, Hk is the Na £ Ma channel matrix between AP
a heading control algorithm for the UAV relays k and the UAV, sk is the transmitted signal from AP
that maximizes the sum uplink transmission rate k, Ek represents the symbol energy for AP k at the
under the constraint that the rate for each AP is transmitter side, and nk is additive temporally and
above a certain threshold. We propose the use of the spatially white noise.
ergodic normalized transmission rate (ENTR) as the
performance metric for each link, and show that it B. Channel Model
can be approximated in such a way that the optimal We assume correlated Rayleigh fading channels
UAV heading can be found in closed form. Since the Hk with large scale path loss related to the distance
topology of the network is constantly changing due between each AP and the UAV, i.e.,
to the mobility of the APs and relays, the varying
Hknorm
link strengths require that the APs be periodically Hk = (2)
dk®k
reassigned to different relays for better performance.
Consequently, a handoff algorithm is developed for where dk is the distance between the kth AP and the
the network that takes into account the special motion UAV, and Hknorm is a normalized complex Gaussian
constraints of the UAV relays. When the current UAV matrix which when stacked in an Na Ma £ 1 vector has
configuration is insufficient to accommodate all the the distribution CN (0, RkH ). Although ground-to-air
APs at the specified quality of service (QoS), one communications can occur under line-of-sight
must determine where to deploy a new UAV relay conditions, we focus here on the Rayleigh case with
and how to command its motion to improve the an arbitrary (possibly rank-one) channel correlation
network’s ENTR. This problem is also addressed in matrix. For free space transmission, the path-loss
the paper. exponent ®k is unity [15], while values of ®k > 1

ZHAN ET AL.: WIRELESS RELAY COMMUNICATIONS WITH UAV: PERFORMANCE AND OPTIMIZATION 2069
are typical in obstructed environments. Note that example, in the 2 £ 2 case, the well-known Alamouti
log-normal shadow fading can easily be incorporated code [24] is employed. Since adaptive modulation is
into the channel model and the analysis below. used, the receiver needs to determine/predict a suitable
Assume the three-dimensional coordinates of the modulation scheme and feed this information back
kth AP and UAV are given as [xk yk hk ]T and to the transmitter. In this paper we assume that this
[xu yu hu ]T , respectively, so that dk can be calculated feedback is perfect, i.e., the transmitter knows which
as q modulation scheme to use.
dk = (xu ¡ xk )2 + (yu ¡ yk )2 + (hu ¡ hk )2 : (3)
III. SYSTEM ANALYSIS
We use the well-known Kronecker model [16, 17]
Below, we first investigate the single-link SNR
to describe the correlation matrix RkH of the multiple
and data rate. We then extend the results to the
input, multiple output (MIMO) wireless channel,
multi-link scenario. Note that we drop the subscript
i.e., RkH = RkTx − RkRx , where RkTx and RkRx are the
k for separate APs in the single-link analysis. The
normalized transmit and receive channel correlation
subscript is reintroduced when multiple links are taken
matrices for the link between the kth AP and the UAV,
into account.
respectively. The normalized channel matrix can be
expressed as A. Single-Link SNR
Hknorm = (RkRx )1=2 G[(RkTx )1=2 ]T (4) It is well known that the performance of OSTBC
where the Na £ Ma matrix G contains independent can be characterized by the following SNR expression
and identically distributed (IID) CN (0, 1) elements, based on the model in (1):
(¢)T denotes transpose, (¢)1=2 is defined such that E
R1=2 (R1=2 )H = R, and (¢)H is the Hermitian transpose. ° = kHk2F = kHk2F ½ (6)
Ma ¾n2
C. Adaptive Modulation where ½ is defined as ½ = E=Ma ¾n2 , ¾n2 is the noise
We assume that the system employs adaptive power, E is the transmit symbol energy, and k ¢ kF
modulation based on the current channel denotes the Frobenius norm. Plugging (2) into (6),
signal-to-noise ratio (SNR) for each link, denoted we obtain
kHnorm k2F
by °i . Each modulation class i is specified by a °= ½: (7)
given constellation with Zi points, and a rate ri d2®
(0 < ri · 1) channel code. The effective number In [25], the probability density function (pdf) of
of bits-per-symbol for the ith modulation class is kHnorm k2F is derived as
thus ri log2 (Zi ). The SNR thresholds that control mj
P X
the selection of the modulation classes can be X xk¡1
f(x) = Ajk e¡x=¾j u(x) (8)
chosen using a variety of criteria. Here we take the j=1 k=1
(k ¡ 1)!¾jk
approach of using the uncoded SER as the system
design target [18—20], which can be approximated as where ¾j (j = 1, 2, : : : , P) are the distinct non-zero
[21, 22]: 0s 1 eigenvalues of RH , mj denotes the multiplicity of ¾j ,
2 and Ajk can be determined by solving a system of
° d
Pe ¼ N̄e Q @ k min A
(5) linear equations [25]. Defining
2
Z n n
x ®x 1 e®x X n!
g(n, ®, x) = e dx = (¡1)n¡i (®x)i
where Pe is the symbol error probability, N̄e is the n! n! ®n+1 i!
i=0
number of nearest neighbor constellation points, and
n
®x X
dmin is the minimum separation distance between e (®x)i
= (¡1)n¡i (9)
points in the underlying constellation. Assume that ° (i) ®n+1 i!
i=0
and ° (i+1) are the predetermined SNR thresholds for
the ith and (i + 1)th modulation schemes, respectively. the cumulative distribution function (cdf) of kHnorm k2F
If ° (i+1) > °k ¸ ° (i) , the ith modulation scheme will be can be expressed as:
used to transmit the message. If °k < ° (1) , no transmit Z x
scheme will be chosen, which indicates there will F(x) = f(t)dt
be no transmission between the transmitter and the ¡1

receiver. X mj
P X · μ ¶ μ ¶¸
Ajk 1 1
= g k ¡ 1, ¡ , x ¡ g k ¡ 1, ¡ , 0
D. Orthogonal Space-Time Block Coding ¾jk ¾j ¾j
j=1 k=1

We assume that only the receiver knows the X mj


P X μ ¶
Ajk 1
channel matrix. Hence, orthogonal space-time block = g k ¡ 1, ¡ ,x : (10)
¾jk ¾j
codes (OSTBC) [23] are used to transmit the data. For j=1 k=1

2070 IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS VOL. 47, NO. 3 JULY 2011
Fig. 1. Link level transmission rate simulation: averaged and instantaneous rates.

B. Single-Link ENTR and SER that the use of ENTR leads to a simple closed-form
solution for the optimal UAV heading, even for the
We define the ENTR as the normalized raw
multiple antenna case.
transmission rate and use it as the criteria to quantify
the performance of the link. The ENTR R(t) is defined To verify the above analysis, we simulate a case
as follows: where the AP and UAV are separated by a distance
R(t) = ¯ ¢ E(log2 K(t)) (11) of 3640 m, and both have two antennas. The carrier
where, due to the use of adaptive modulation, we have frequency is assumed to be 1 GHz, the system
bandwidth is 20 kHz, the AP transmit power is 2 W,
K(t) = K (1) u(°(t) ¡ ° (1) ) and the noise power spectral density at the UAV
M ¡1
LX relay is 10¡16 W/Hz. The path-loss exponent ® is
+ (K (i+1) ¡ K (i) )u(°(t) ¡ ° (i+1) ) (12) assumed to be 1.5, which results in an effective SNR
i=1 of about 13 dB at the UAV. Seven different minimum
u(¢) is the unit-step function, LM is the total number phase-shift keying (MPSK) modulation schemes are
of modulation schemes used, and ¯ is a scalar that used in the simulations, i.e., from binary phase-shift
takes into account the rate loss when OSTBC is used. keying (BPSK) to 128 phase-shift keying (PSK),
For example, ¯ = 1 for the 2 £ 2 Alamouti code. In and for simplicity we assume no channel coding. We
(12), K (i) = Ziri represents the effective number of assume a rich scattering environment at the AP side,
constellation points for the ith modulation scheme, so that the correlation matrix at the AP side is given by
taking the channel code into account. Defining C i (t) = · ¸
1 0
(° (i) =½)d2® (t), it is straightforward to show that the RTx = :
0 1
ENTR of the AP-UAV link (i.e., the uplink between
an AP and UAV relay) can be written as At the UAV side, high spatial correlation is assumed:

(L ¡1 Z Z )
X
M C i+1 (t) 1
R(t) = ¯ ¢ log2 K (i) f(x)dx + log2 K (LM ) f(x)dx
i=1 C i (t) C LM (t)
(L ¡1 )
X
M
(i) i+1 i (LM ) LM
=¯¢ log2 K [F(C (t)) ¡ F(C (t))] + log2 K [1 ¡ F(C (t))] : (13)
i=1

· ¸
While the ENTR does not take rate loss due to 1 0:8
transmission errors into account, when compared with RRx = :
0:8 1
theoretical spectral efficiency it is likely to be more
representative of the achievable rate in a practical A simulation involving 105 random channel
adaptive modulation scheme. Additionally, we will see realizations was run to generate the plot in Fig. 1.

ZHAN ET AL.: WIRELESS RELAY COMMUNICATIONS WITH UAV: PERFORMANCE AND OPTIMIZATION 2071
very well with our simulation results and illustrates
that the upper bound derived in the Appendix,
Section A2 accurately describes the actual SER. The
superior performance of the derived bounds compared
with the Chernoff bound is evident in this example.

C. Heading Optimization in the Multi-Link Scenario


Assuming the UAV flies with a constant speed,
the UAV dynamics are governed by the following
discrete-time model:
xut = xut¡1 + V¢ cos ±t¡1
(15)
yut = yut¡1 + V¢ sin ±t¡1
where V is the UAV speed, ±t¡1 is the UAV heading
at time step t ¡ 1, ¢ is the length of the time step,
Fig. 2. Upper bound on the SER for each AP-UAV and where we have added superscripts to xu and yu
communication link. The x-axis in figure denotes number of to indicate that the UAV position varies with time.
modulation schemes used in system, and Ng in the legend denotes The minimum length of the time step ¢, which also
number of points evaluated on grid.
determines the maximum UAV heading update rate,
is ultimately a function of how rapidly the heading
The upper plot shows the ENTR and the calculated optimization procedure can be performed. In practical
averaged transmission rate (CATR) defined as situations, however, it is unlikely that the heading rate
PNs (i)
i=1 S =Ns , where Ns is the number of channel would have to be updated more than once every few
realizations, and S (i) is the instantaneous spectral seconds, which provides ample time for implementing
efficiency of the ith channel realization. For the ith the optimization. We assume that the UAV is able
channel realization, S (i) = log2 K (i) , where K (i) is to predict the position of each AP at the next time
the effective number of constellation points for the step, which is reasonable given the likely availability
selected modulation class. Clearly, the CATR is simply of GPS information and the relatively slow update
the sample average of the ENTR random variable, interval ¢. The change in distance between the APs
which converges in probability to the expected value and the UAV over one time step can be expressed as
by the weak law of large numbers. The fact that the a function of the UAV heading ±t¡1 by plugging (15)
CATR quickly converges to the ENTR expression into the equation for dk in (3).
verifies our derivation. The lower plot in Fig. 1 The average data rate Rk (t) for each UAV k is
shows the instantaneous transmission rate of the a function of dk , and hence a function of the UAV
link. heading as well, and it is reasonable to choose the
A closed-form expression for the single link SER UAV heading to maximize the overall system data
has also been derived in [10]: rate, i.e.,

(L ¡1 Z mj · μ ¶
1 XM ¼=2 X
P X
N̄e (i)Ajk 2
½dmin (i) 1
Ps = g(k ¡ 1, ¡ + , C i+1 (t))
¼ 0 ¾jk 4 sin2 μ ¾j
i=1 j=1 k=1

μ μ ¶ ¶¸ Z mj μ μ ¶ ¶ )
2
½dmin (i) 1
¼=2 X
P
X N̄e (LM )Ajk 2
½dmin (LM )1
i LM
¡g k ¡ 1, ¡ + , C (t) dμ ¡ g k ¡ 1, ¡ + ,C (t) dμ :
2
4 sin μ ¾j 0 ¾jk 2
4 sin μ ¾j
j=1 k=1

(14)

The complexity of integrating the SER expression K


X
(14) can be reduced by resorting to the evaluation arg max RT (t) = Rk (t)
of SER bounds given in (34) of the Appendix. We ±t k=1 (16)
use the bounds derived in [26], whose tightness can s.t. Rk (t) ¸ Rmin and j±t ¡ ±t¡1 j · ¢±
be controlled through the choice of the number of
grids Ng used in the approximation. Fig. 2 shows where Rmin is the minimum data rate requirement for
that the analytical expression derived in (14) agrees each UAV-AP link, and ¢± defines the maximum

2072 IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS VOL. 47, NO. 3 JULY 2011
Fig. 3. Sinusoidal approximation for total subnet uplink communication rate.

turning radius of the UAV in one time step. The would be given by
first constraint in (16) guarantees a minimum level PK
¯ ´ (t) sin μk0 (t)
of performance for each AP, assuming that each ±t = arctan PKk=1 k k 0
(18)
AP-UAV link uses the same bandwidth. Note that k=1 ¯k ´k (t) cos μk (t)
if the bandwidth could be allocated dynamically for as derived in (47). To solve the optimization with the
different APs, it would result in a more complicated heading constraint, we simply compute ±t as above,
optimization problem since not only would the total and determine if it falls within the region determined
rate be the weighted sum of each AP-UAV link by the turning radius and the minimum rate contraint.
data rate, but also the data rate of each link would If yes, this solution is used as the UAV’s heading
be a function of bandwidth due to the white noise for the next time interval. If not, a finite number of
assumption. For some scenarios, there is no solution angles determined by both constraints is checked,
to the above problem. In such cases, a single UAV is and the one that results in the largest rate is chosen.
not enough to provide coverage for the entire network, Section IV discusses this process in more detail.
and additional UAVs are needed in order to achieve To validate our derivation, we simulated a
the minimum requirements. scenario with two APs randomly positioned on the
In general, the above optimization problem is very ground within a 2000 m-by-2000 m square and one
complicated, and does not admit a simple solution. A UAV located at [0 0 3600]T in the air. Most of the
key result of this paper is derived in the Appendix, simulation parameters are the same as in the previous
where it is shown that under some mild conditions, example, except that the bandwidth of each AP is
Rk (t) at each step t can be approximated as a sinusoid assumed to be 200 kHz and the update time interval
plus an offset: is set to 15 s. In order to make the simulation more
Rk (t) = ¯k (´k (t) cos(±t ¡ μk0 (t)) + ³k (t)): (17) realistic, we use Lee’s channel model described in
[27] to generate RTx and RRx . Besides the parameters
Expressions for the terms ´k (t) and ³k (t) can be mentioned above, we set the antenna separation at the
found in the Appendix. Using this approximation, UAV to be twice the wavelength of the transmitted
the complexity of the optimization problem is EM wave and the antenna separation at the APs
significantly reduced. The total network throughput as half the wavelength. We also assume that 40
RT (t) is thus also approximately a sinusoid plus a scatterers are uniformly placed on a circle with radius
constant offset, and if no constraints were imposed 100 wavelengths around each AP. The simulation
on the UAV turning radius, the optimal UAV heading results are plotted in Fig. 3. It is clear that the total

ZHAN ET AL.: WIRELESS RELAY COMMUNICATIONS WITH UAV: PERFORMANCE AND OPTIMIZATION 2073
uplink transmission rate is well approximated by the not met, boundary points need to be checked to
sinusoidal expression derived in the Appendix. The yield the best heading solution. To provide a better
importance of optimizing the UAV’s motion can be understanding of the constraints and the so-called
seen from the 20 kbit/s date rate difference yielded by “boundary,” we introduce a few new concepts as
simply assuming a better heading. This difference by follows. The link allowable region for the kth AP in
itself is capable of supporting an additional user for the jth subnet is defined as the range of headings −jk
voice communication in most commercial standards. where for all ± 2 −jk , we have Rjk ¸ Rmin , where Rjk is
The accuracy of the approximation can be further the data rate that the jth subnet can provide for the
improved when the update time interval is smaller kth AP. According to the sinusoidal approximation in
and the conditions stated in the Appendix are better (17), we find the link allowable region for the kth AP
satisfied. to be
8
IV. UAV CONTROL FOR ADAPTIVE HANDOFFS > [0 2¼] ¯k ³k ¡ ¯k j´k j ¸ Rmin
>
>
>
<Ø ¯k ³k + ¯k j´k j < Rmin
The assumption of mobile APs and relays causes
−jk ´
the average link SNR for each AP-UAV link to >
> [t1 t2 ] (t1 ¡ μj0,k ) ¢ (t2 ¡ μj0,k ) < 0
>
>
vary at every time update. As time goes by, the : S
original association of APs to UAVs may no longer be [0 t1 ] [t2 2¼] (t1 ¡ μj0,k ) ¢ (t2 ¡ μj0,k ) > 0
optimal, and improved network throughput could be (19)
obtained by switching some of the APs to a different where
relay host. In this section, we study the AP handoff 8 μ t¡1 ¶
> yu ¡ ykt
problem in the context of a mobile-relay-assisted >
< barctan c ´k > 0
xut¡1 ¡ xkt 2¼
network. In this section, we assume that NR airborne 0,k
μj = μ t¡1
> t¶
relays are in service, each hosting a set of APs with : b¼ + arctan yu ¡ yk c
>
´k < 0
an index set Ii , 1 · i · NR , whose elements are the xut¡1 ¡ xkt 2¼
indices of the APs that the ith UAV is servicing. We
(20)
suppose there are LAP total APs requesting service, so
and t1 and t2 are defined as
that [N NR
i=1 Ii = Q ´ fz j z = 1, 2, : : : , LAP g and \i=1 Ii =
R

Ø. In other words, the current NR UAVs are able t1 = minfÃjk , 2¼ ¡ Ãjk g, t2 = maxfÃjk , 2¼ ¡ Ãjk g
to host all of the LAP APs for the time interval of (21)
Rmin ¡ ¯k ¢ ³k
interest. If this is not the case, new UAVs need to be Ãjk ´ barccos + μj0,k c2¼
¯k ¢ j´k j
deployed. The problem of deploying new UAVs to the
network will be briefly addressed in Section IVC. For where we use b¢c2¼ to denote the mod-2¼ operation.
notational convenience, and since we focus here on a Therefore, the solution to the optimization problem is
single time step, we drop the explicit dependence on t a subset of the intersection of all −jk for each subnet.
for most variables in this section and in the Appendix. An illustration for different link allowable regions
Various handoff algorithms for cellular networks is given in Fig. 4. As can be seen from the figure,
based on received signal strength (RSS) are discussed the link allowable region is defined as the heading
in [28]. The basic idea behind these algorithms is that region where the sinusoidal curve is above the dashed
the mobile terminal, the AP in this case, measures the horizontal line.
received signal strength from various BTS over some The reachable region is defined as the set of
time window, and associates itself with the BTS that heading angles that are within the turning radius of
provides the strongest link. With some modifications, the UAV:
a similar idea can be used in developing a handoff j
Cj ´ f±t : j±t ¡ ±t¡1 j · ¢±j g (22)
algorithm for our mobile-UAV-assisted network. The
mobility of the UAV relays, the motion constraint j
where ±t¡1 is the previous heading for the jth relay
for their turning radius, and the minimum rate and ¢±j is the turning constraint for the jth relay. The
constraint for each AP in (16) complicates the handoff
intersection between −jk and Cj defines the admissible
procedure, as discussed below.
region for the kth AP with respect to the jth relay:
A. Problem Formulation
¥jk ´ −jk \ Cj : (23)
Define subnet i as the set of nodes served by
UAV relay i. Section IIIC gives an approximate A nonempty admissible region is a necessary but not
closed-form solution for the optimal UAV heading sufficient condition for the jth relay to host the kth
command for each subnet configuration when the new AP. For the jth relay to simultaneously support all
computed UAV position falls in the area reachable by nodes in the set Ij , satisfying both the minimum rate
the UAV and leads to a link throughput that satisfies and turning radius constraints, its feasible region,
the minimum rate constraint. If the constraints are defined as the intersection of the admissible regions

2074 IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS VOL. 47, NO. 3 JULY 2011
new relays have to be deployed to accommodate their
communication requirements.
The registration of an AP with a new subnet
will change the feasible region of that relay node,
thereby affecting the ability of other APs to switch
over to this subnet in the future. Hence, the order
in which the APs are handed off will affect network
performance. An optimal algorithm that solves this
handoff problem, involving a joint optimization over
all the subnets, can be formulated as follows:
jIj j
NR X
X I (i)
arg max Rj j
I1 ,:::,INR
j=1 i=1

NR
[ NR
\ (25)
s.t. Ij = Q, Ij = Ø
j=1 j=1

Sj 6= Ø, 8j 2 [1, : : : , NR ]:
Fig. 4. Illustration of link allowable region for different
scenarios, where μj0,k is angle at which maximum link rate Rk (t) is Once the AP-relay associations I1 , : : : , INR are
achieved for user k, and t1 and t2 are angles where Rk (t) = Rmin . determined, the optimal headings for the relays
(a) ¯k ³k ¡ ¯k j´k j ¸ Rmin . (b) ¯k ³k + ¯k j´k j < Rmin .
can be obtained using the method presented above.
(c) (t1 ¡ μj0,k ) ¢ (t2 ¡ μj0,k ) < 0. (d) (t1 ¡ μj0,k ) ¢ (t2 ¡ μj0,k ) > 0.
Obviously, although knowledge of the positions
of the relays and APs can be used to narrow the
of all the hosted APs, has to be nonempty: search space, the above optimization problem is very
jIj j
difficult.
\ I (i)
Sj ´ ¥j j 6= Ø (24) B. Handoff Algorithm
i=1
An ad-hoc handoff algorithm with less complexity
where jIj j is the cardinality of the set Ij . For the is presented below and an example given to clarify
potential entry of AP p into subnet q, not only does the procedure. Each AP in the network is assumed
the admissible region ¥qp have to be nonempty, but it to continuously monitor the quality of its link with
should also be compatible with the set of APs that the all relays. Link quality can be quantified in different
qth relay is currently hosting, i.e., ¥qp \ Sq 6= Ø. We ways, including achievable throughput, RSS, etc.
consider this to be a sufficient condition for allowing We use RSS as our metric in the discussion below,
an AP to register with a potential relay. We can realizing that it would have to be carefully defined
conclude that for each subnet j, if the relay’s feasible in situations involving multiple antennas. When it is
region Sj is nonempty and the computed heading falls detected that a better link than the current one exists
in the range defined by Sj , the optimal solution is for a given AP, a handoff can be requested either by
achieved by commanding the jth relay to fly at the the AP or the relay that is currently hosting the AP.1
angle determined by (18). If Sj is nonempty but the A list H is compiled of such handoff requests over
angle given by the aforementioned equation does not some time interval, and all pairs of candidate APs and
fall in Sj , the boundary points of Sj are checked to their potential new relay hosts are sorted in order of
yield the best possible solution. In this scenario, Sj decreasing RSS. The entries of H are periodically
may consist of a number of nonoverlapping regions. examined one by one to see if the admissible region
Since the total rate for the jth subnet is approximated of the candidate APs intersect with the feasible region
as an offset sinusoid and the global maximum for of the potential relays. If so, the AP is handed off to
the unconstrained solution provided by (18) does not the new relay, the feasible regions for the new and old
fall in any of these regions, the maximum value for relay are updated, and the remainder of the entries in
each region will be attained at the boundary points H that are associated with this specific AP are deleted.
that define the region. This is valid because of the If the handoff request cannot be accommodated, the
monotonicity of the sinusoidal function in each of
its half cycles. Therefore all the boundary points
1 As with most handoff procedures proposed for cellular systems, a
determined by each of these regions are checked to
handoff request should not be based on instantaneous RSS, which
find the optimal solution that yields the largest total can lead to an inefficient “ping-pong” effect in which a user rapidly
subnet rate. If Sj itself is empty, it means the APs in toggles between two or more serving BTS. Standard techniques for
Ij are not compatible; either some of the APs must avoiding this phenomenon, using for example threshold margins and
be handed off to other relays currently in service, or channel prediction, can easily be applied here.

ZHAN ET AL.: WIRELESS RELAY COMMUNICATIONS WITH UAV: PERFORMANCE AND OPTIMIZATION 2075
Fig. 5. Flowchart of handoff algorithm for AP “j” to handoff to relay “i” in UAV assisted network.

corresponding entry in H is deleted, and we proceed and provides reasonable performance, as illustrated in
to the next entry. This process repeats itself until the Section V.
list H is empty. A flowchart for the proposed handoff
algorithm is shown in Fig. 5. C. UAV Deployment
An example is given here to better explain the The above discussion is based on the assumption
proposed procedure. Assume there are 5 airborne that each UAV already has a list of APs it is servicing.
relays and 10 APs requesting service. At a certain The problem of how to partition the APs into various
time instant, AP3, AP5, and AP7 are found to subnets (clusters) remains unaddressed. Furthermore,
benefit from a possible handoff, with candidate due to the mobility of both the APs and relays, the
relays (R1, R3, R5) for AP3, (R2, R4) for AP5 and signal strength of each link is always changing. It
(R1, R2, R5) for AP7. The list H is generated by is likely that, as the network evolves, situations will
sorting the RSS of all the possible pairs, and we have, arise where one or more APs cannot communicate
for example: with any of the relays even with the possibility of
handoffs as discussed above. In such circumstances,
H = f(R2, AP5), (R1, AP3), (R5, AP3), (R3, AP3), additional UAVs must be added to the network in
(R2, AP7), (R4, AP5), (R1, AP7), (R5, AP7)g: order to maintain connectivity. While one could pose
the problem in a formal way and attempt to find an
(26) optimal solution, such an approach would likely be
When the first entry of H is under consideration, the intractable and subject to immediate change due to
admissible region ¥25 is tested to see if it intersects the high degree of network mobility. Instead, we
with the feasible region of relay 2, i.e., S2 . If so, the suggest the use of simple deployment strategies and
handoff is made, and H reduces to rely on the optimal heading control and adaptive
handoff algorithms described above to adjust the relay
H = f(R1, AP3), (R5, AP3), (R3, AP3), (R2, AP7), assignments to improve network performance. Two
(R1, AP7), (R5, AP7)g: distinct situations should be considered: the initial
deployment of relays to the network, and deployment
Now the pair (R1, AP3) is checked. If AP3 is not updates that must be made as the network evolves.
allowed to hand off to relay 1 due to an empty Define the “no-service” list M ´ Q ¡ [N j=1 Ij as the
R

intersection between ¥13 and S1 , this entry is deleted set of APs that cannot be supported by the current
and (R5, AP3) is the next pair of interest. The process set of relays. In many instances, such as during a
continues until H is empty. This ad-hoc algorithm is deployment update, M will only contain a single
not optimal in the sense that the order in which the UAV. In these situations, the deployment problem is
handoffs are carried out will possibly preclude other trivial, and the new UAV is dispatched to a location
requested handoffs further down the list, handoffs near the outlying AP. The adaptive handoff process
that might lead to an improved network throughput. discussed earlier will allow the new UAV to assume
However, the proposed approach has low complexity relay control of other APs in the vicinity, and the

2076 IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS VOL. 47, NO. 3 JULY 2011
effect of these new assignments will ripple through optimal position. Once the UAV is deployed, M is
the network as the other UAVs adjust their positions updated and the process can be repeated until all APs
accordingly. When multiple APs are in M, such as at have been assigned. Again, the suboptimality of the
the initial deployment stage, a reasonable approach above approach does not concern us, as we rely on
would be to uniformly assign a set of relays in a the optimal heading control and adaptive handoff
grid that covers the area encompassed by all APs. algorithms to provide fine tuning of the network
While simple, this approach may lead to too many or performance.
too few UAVs for the given network configuration.
A simple greedy approach is described below that V. SIMULATION RESULTS
assigns one UAV at a time to the network until all
Two simulations with the same initial conditions
APs are accommodated.
are run separately to study the behavior of the
The channel model we assume implies that, on
network with and without the adaptive handoff
average, each relay has a circular coverage shape.
algorithm implemented. In the simulations, 10 APs
According to (7), at the fringe of the jth relay’s
are assumed to be moving on the ground in a straight
coverage area, the average received SNR can be
line with random initial directions. Fig. 6 shows the
expressed as
E(kHnorm k2F ) initial positions and headings of the APs and the
°̄j = 0 2®
½ (27) single UAV that is initially assigned to the network.
(dj,u )
The AP positions are randomly placed on the ground
where dj,u0
is the distance from the AP at the fringe within a 2500 m £ 2500 m square, and the initial
of the coverage area to the jth relay. For all APs in UAV is placed at [0 0 3600]T m. The deployment
the coverage area to be able to communicate at a algorithm described earlier is used to add UAVs to
minimum rate Rmin , dj,u 0
must be chosen such that the network as necessary. An uncoded system with
°̄j will lead to R(t) ¸ Rmin in (13). The complicated seven different MPSK modulation schemes are used in
expression in (13) does not provide any insight for the simulations, i.e., from BPSK to 128-PSK. Each
analytically determining dj,u 0
, although numerical of the APs is assumed to have 3 antennas and 2W
results could easily be obtained. To design the system of transmit power, and they are all assumed to be
with some error margin and also for the sake of a moving at 10 m/s. All APs are assumed to have the
simpler solution, we require that at the fringe of each same type of propagation environment with ® = 1:5,
UAV’s coverage, the APs can communicate with the 40 scatterers, and an equivalent scattering radius of
largest constellation that it is capable of achieving a 100 wavelengths. We consider a narrowband scenario
predetermined SER: where each AP has a bandwidth of 20 kHz. All
" Ã !#2 the UAVs are assumed to have 2 antennas with 2
¡1 Pe wavelengths separation and fly at a height of 3600 m.
2 Q
N̄e (K (LM ) ) The UAVs fly at a speed of 50 m/s with the heading
°̄j = 2
(28) constraint ¢± · ¼=9. The minimum transmission
dmin (K (LM ) )
rate constraint is set to be Ri,u ¸ 6:6 £ 104 bits/s.
where N̄e (¢) and dmin (¢) are defined in (5), and Pe is the The update time interval is 0.5 s, and the simulation
maximum tolerable SER. The radius of coverage for is run for 150 s. Fig. 7 shows a sample plot of
the jth relay is further determined as the instantaneous heading for UAV 1 for both the
à !1=2® handoff and nonhandoff cases during the 150 s
2
0 E(kH k
norm F ) ¢ ½ simulation. Note that after its initial deployment,
dj,u = :
°̄j the UAV typically flies in a circular holding pattern,
occasionally reversing direction or making a slight
We can evaluate E(kHnorm k2F ) by using the pdf derived shift of position.
in (8). A sample of the link data rates for the two
For an AP to be served by a given relay, the relay different networks is shown in Fig. 8. The periodic
must lie within a circular q
area whose center is at variations are due to the circular motion of the UAV
0 0 2
the AP, with radius rj,u = (dj,u ) ¡ h2 , where h is relays when the distance between the relay and AP
the altitude of the UAV. If a set of such circles is is relatively small. In general, the network without
drawn for the APs in M, those whose circles overlap handoff support has slightly higher data rates for
can share a common UAV relay. To deploy a UAV, some specific APs than the handoff-enabled network,
we find the area of overlap that involves the largest but (as shown below) this comes at the expense of
number of APs, and assign the UAV to any point in requiring more UAV relays. In fact, the jump in data
the overlap area. An algorithm for determing the area rate for AP-8 at about 130 s is due to the addition
in common among a set of circles can be found in of a relay in the nonhandoff network in the vicinity
[29]. The optimal heading algorithm described earlier of AP-8. The benefit of using our adaptive handoff
can then control the movement of the UAV to the algorithm is clearly illustrated in Fig. 9, which shows

ZHAN ET AL.: WIRELESS RELAY COMMUNICATIONS WITH UAV: PERFORMANCE AND OPTIMIZATION 2077
Fig. 6. Initial network simulation setup. Airplane represents initial position of UAV relay.

Fig. 7. Sample heading of UAV-1.

the number of UAV relays used in the two networks, the minimum communication requirements to be met
and the resulting spectral efficiency (total sum uplink using only two UAV relays throughout the entire
data rate divided by the total available bandwidth). simulation, while 3—5 relays are needed without
The use of the adaptive handoff algorithm enables proper handoffs.

2078 IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS VOL. 47, NO. 3 JULY 2011
Fig. 8. Uplink transmission rate comparison for AP-8, AP-9 and AP-10 for both handoff-enabled and nonhandoff networks.

Fig. 9. Network efficiency comparison between handoff-enabled and nonhandoff networks.

The topologies of the two networks at a few stages APs. As time elapses, some of the APs move away
of the simulation are shown in Fig. 10 and Fig. 11. from each other, and a third relay is deployed in the
Both simulations are initialized in the same way with nonhandoff network, as shown in Fig. 10(b). However,
only one UAV to begin with. However, as we can a few handoff events take place during this period
see from Figs. 10(a) and 11(a), an additional UAV to address the communication demands from all the
must immediately be deployed to support all of the APs in the handoff-enabled network, as depicted in

ZHAN ET AL.: WIRELESS RELAY COMMUNICATIONS WITH UAV: PERFORMANCE AND OPTIMIZATION 2079
Fig. 10. UAV network simulation without handoff algorithm. (a) Network configuration at t = 4 s. (b) New UAV at t = 78 s
deployment. (c) New UAV at t = 130 s. (d) Final network topology.

Fig. 11. UAV network simulation with handoff algorithm implemented. (a) Network configuration at t = 4 s. (b) Network configuration
at t = 78 s. (c) Handoff during evolution at t = 130 s. (d) Final network topology.

2080 IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS VOL. 47, NO. 3 JULY 2011
Fig. 11(b). As the AP positions change over time, APPENDIX
another relay deployment in the nonhandoff network
A. Link Level SER Analysis
happens at t ¼ 130 s (Fig. 10(c)), but appropriate
handoff events eliminate the need for additional relays In this section, we present the link level SER
in the handoff-enabled network (Fig. 11(c)). The analysis. Once the error analysis for each link has
final network topologies are shown in Figs. 10(d) been performed, the SER of the whole system can be
and 11(d). calculated.
1) Closed-Form SER Expression: The SER can be
VI. SUMMARY expressed as follows:
In this paper, we investigated the performance 0s 1
M ¡1 Z C i+1 (t)
LX
of UAVs acting as relays for ground-based nodes x½d 2 (i)

in a hierarchical wireless network. We derived Ps = N̄e (i) ¢ Q @ min A f(x)dx


C i (t) 2
i=1
expressions for the SNR distribution and the ENTR
for each AP-UAV link assuming adaptive modulation 0s 1
Z 1 2 (i)
and space-time coding when multiple antennas are x½dmin
+ N̄e (LM ) ¢ Q @ A f(x)dx:
present. A sinusoidal approximation was found C LM (t) 2
to accurately approximate the single link data
rate as a function of the UAV heading. Using this (29)
result, we derived a closed-form expression for In [30], an alternative definite integral form for the
the optimal UAV heading that achieves the highest Gaussian Q-function is given as
overall data rate in the multi-user uplink system.
Z ¼=2 μ ¶
Given the fact that the network under consideration 1 x2
is highly mobile, we also developed an adaptive Q(x) = exp ¡ dμ, x ¸ 0:
¼ 0 2 sin2 μ
handoff algorithm to dynamically adjust the UAV-AP (30)
assignments in order to improve network performance.
The benefits of the optimal heading and handoff Using this alternative form, interchanging the order of
algorithms were demonstrated via a simple simulation the integrations, and recalling the definition in (9), it
example. is straightforward to derive the SER expression given
Several simplifying assumptions were made in the in (14):
paper that could be relaxed for future work on this ÃL ¡1 Z
problem. For example, we assumed scenarios with X
M ¼=2 Z C i+1 (t)
1
a relatively small number of APs, which allowed us Ps = N̄e (i)
¼ 0 C i (t)
i=1
in turn to assume orthogonal communications (no
interference) and no bandwidth restrictions on the μ 2
¶ Z ¼=2 Z 1
x½dmin (i)
AP-UAV link. For larger networks, one would have ¢ exp ¡ f(x)dx ¢ dμ +
4 sin2 μ 0 C LM (t)
to consider the effects of interference and develop
methods (e.g., frequency reuse, beamforming, etc.) to μ 2
¶ ¶
x½dmin (LM )
mitigate its effects. Futhermore, the handoff algorithm ¢ N̄e (LM ) ¢ exp ¡ f(x)dx ¢ dμ :
4 sin2 μ
would need to be modified to take into account the
bandwidth utilization of each UAV; switching an AP (31)
to an already heavily loaded UAV may not be the 2) SER Upper Bound: In order to reduce the
best strategy even if the resulting AP signal strength computational burden of evaluating (14), an upper
is best suited for the UAV. In this paper, we treated bound for the SER is derived by resorting to the
the initial UAV deployment problem in a rather simple results of [26]. In Chiani’s work, an improved
way, ignoring the impact of the inherent delay and exponential bound for the Q function is given as
path planning that must occur between the time the
UAV is assigned to an area and when it actually Ng μ ¶
1X b i x2
arrives in the area. Finally, we assumed error-free Q(x) · ai exp ¡ (32)
communications between the UAVs, without taking 2 2
i=1
the UAV-UAV communication overhead into account where
or addressing the additional relaying that would be
required to keep the UAVs connected. Additional 2(μi ¡ μi¡1 ) 1
ai = and bi = : (33)
constraints on the motion of the UAVs would be ¼ sin2 μi
necessary in order to ensure that the UAV relay
network was connected, either via direct links or In (32), Ng determines the number of grids in the
hopping. range [0, ¼=2], and μi¡1 and μi are the boundary

ZHAN ET AL.: WIRELESS RELAY COMMUNICATIONS WITH UAV: PERFORMANCE AND OPTIMIZATION 2081
points for the ith grid. When equal-size grids are where
used, μ0 = 0, μNg = ¼=2, and μi = ¼ ¢ i=(2Ng ). Note that ° (i) ®k
¸ik = L
this bound is much better than the popular Chernoff ½k k
bound. After some manipulation, the upper bound for
Lk = (xut¡1 ¡ xkt )2 + (yut¡1 ¡ ykt )2 + hu2 + V2 ¢2
the SER is found to be given by

LM ¡1
X N̄ (i) X
P X X an Ajk · μ
mj Ng μ 2
bn ½dmin (i) 1
¶ ¶ μ μ 2
bn ½dmin (i) 1
¶ ¶¸
e
Ps · g k ¡ 1, ¡ + , C i+1 (t) ¡ g k ¡ 1, ¡ + , C i (t)
2 ¾jk 4 ¾j 4 ¾j
i=1 j=1 k=1 n=1

mj Ng μ μ ¶ ¶
N̄e (LM ) X X X an Ajk
P 2
bn ½dmin (LM ) 1
¡ g k ¡ 1, ¡ + , C LM (t) : (34)
2 ¾jk 4 ¾j
j=1 k=1 n=1

As we can see in Fig. 2, when Ng increases, the q


SER bound closely approaches the theoretical rk = (xut¡1 ¡ xkt )2 + (yut¡1 ¡ ykt )2 V¢
value. yut¡1 ¡ ykt
μk0 = arctan :
B. Approximation of F(y) and the Rate R(t) xut¡1 ¡ xkt
®
In this section, we show that the cdf F(y) of the Consider the function f(x) = ek(1+x) , where k and ®
Frobenius norm of the channel can be approximated are both constants. When x is small, linearizing f(x)
by a sinusoid under certain assumptions. Let us first around x = 0 using the Taylor expansion, we have
assume a single ring scattering model [16] (i.e., the f(x) ¼ ek + ®kek x. Therefore
APs are surrounded by the effective scatterers on a i i ¸ik ¡¸i =¾ 2rk
ring, and the UAV has no scatterers around it), and e¡y=¾ = e¡C =¾ ¼ e¡¸k =¾ ¡ ®k e k cos(± ¡ μk0 )
¾ Lk
a Kronecker structure for the channel correlation (38)
matrix (4). Under such assumptions, the channel is
y Ci ¸i ® ¸i 2r
ill-conditioned with only one dominant eigenmode. = k ¼ k + k k k cos(± ¡ μk0 ): (39)
¾ ¾ ¾ ¾ Lk
Assuming there is no spatial correlation at the APs,
k
the channel correlation matrix RH between the Let us define
UAV and the kth AP has only one distinct non-zero ¸ik ¸ik
eigenvalue ¾ with multiplicity m, where m is the ak (i) = , bk (i) = ®k cos(± ¡ μk0 )
¾ ¾
number of antennas at the AP side. Therefore, the
Laplace transform of the pdf of kHnorm k2F can be 2rk i
qk = , ck (i) = e¡¸k =¾
expressed as Lk
1
Ã(s) = (35) ¸ik ¡¸i =¾
(1 + ¾)m dk (i) = ®k e k cos(± ¡ μk0 ):
¾
and the cdf can be written as If we recall the binomial expansion theorem, we
0 y 1 have
X ( )l
m¡1 Xn μ ¶
¾ e¡y=¾ A u(y): n j n¡j
F(y) = @1 ¡ (36) (a + b)n = ab : (40)
l! j
l=0 j=0

We can see from (13) that calculating the ENTR Note that in most of the scenarios we consider, Lk À
for the kth link would involve evaluating F(y) at 2rk and therefore qk is close to 0. In such scenarios,
the values Cki = (° (i) =½k )dk2®k , where the subscript each term in (36) can be written as
k indicates the kth link. Now assume that at time μ ¶l
1 Cki i
t ¡ 1 the UAV is at position (xut¡1 , yut¡1 , hu ), and at e¡Ck =¾
l! ¾
the next time t, the kth AP is at (xkt , ykt , 0). Recall
that dk2 = (xut ¡ xkt )2 + (yut ¡ ykt )2 + hu2 as described in 1
¼ (a (i) + bk (i)qk )l (ck (i) ¡ dk (i)qk )
Section III. By plugging the constant speed model l! k
(15) into these expressions, after some mathematical 0 1
l μ ¶
manipulations, we have 1 @X l
= ajk (i)bkl¡j (i)ql¡j
k
A (ck (i) ¡ dk (i)qk ):
μ ¶®k l! j
2r j=0
Cki = ¸ik 1 + k cos(± ¡ μk0 ) (37)
Lk (41)

2082 IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS VOL. 47, NO. 3 JULY 2011
Since qk is assumed to be a number close to zero, we reasoning similar to that above, each term can be
drop all the terms involving qk with higher than first approximated as a sinusoidal function with a dc offset:
order. Hence à !l
μ ¶l 1 Cki i
1 Cki e¡Ck =¾j ¼ ¹(l) (l) 0
k,j (i) + ºk,j (i) cos(± ¡ μk ):
i
e¡Ck =¾ l! ¾j
l! ¾
(46)
1 This expression is almost identical to (42) except
¼ (alk (i) + lal¡1
k (i)bk (i)qk )(ck (i) ¡ dk (i)qk )
l! that the subscript j is introduced to describe its
1 dependence on ¾j . Plugging the equations in, we
¼ [alk (i)ck (i) + al¡1
k (i)(lbk (i)ck (i) ¡ ak (i)dk (i))qk ]
l! have
à !l
¼ ¹(l) (l) 0
k + ºk cos(± ¡ μk ) (42) 1 ° (i) L®k k (i) ®k
(l)
¹k,j (i) = ¢ e¡° Lk =¾j ½k
l! ¾j ½k
where ¹(l) l (l)
k (i) = (1=l!)(ak (i)ck (i)) and ºk =
l à !
(1=l!)®k ak (i)ck (i)qk (l ¡ ak (i)). The above derivation 2rk ° (i) L®k k
(l) (l)
shows that each term in (36) is a sinusoid of the same ºk,j (i) = ®k ¹k,j (i) l¡ :
Lk ¾j ½k
frequency with some dc offset. Therefore, the sum of
these terms is also a sinusoid with the same frequency Similarly, (43) still holds with
but a different dc offset. When a single ring model
mj
P X t¡1
is assumed, the cdf F(y) of the channel’s Frobenius X X
Uk (i) = (¡1)2t¡1 Ajt ¹(l)
norm using the ith modulation scheme for AP k, Cki , k,j
j=1 t=1 l=0
can be approximated as
P X mj t¡1
X X (l)
Fk (i) = Uk (i) + Vk (i) cos(± ¡ μk0 ) (43) Vk (i) = (¡1)2t¡1 Ajt ºk,j :
j=1 t=1 l=0
Pm¡1 (l)
where Uk (i) = 1 ¡ l=0 ¹k (i) and Vk (i) =
Pm¡1 (l) This implies (44) still holds, which means when the
¡ l=0 ºk (i). Using (13) we can write the average
above assumption holds, the average transmission
transmission rate of AP k as
rate for each link can be approximated as a sinusoid
Rk = ¯k (´k cos(± ¡ μk0 ) + ³k ) (44) with a dc offset. Thus the sum uplink rate will be
approximated as a sum of sinusoids with the same
where frequency but different offsets. Furthermore, it can be
LM ¡1 shown that:
X
³k = log2 K (i) ¢ (Uk (i + 1) ¡ Uk (i)) K
X
i=1 RT = Rk = ¡ cos(± ¡ μ) + ¨
(LM ) (LM ) k=1
+ log2 K ¡ log2 K ¢ Uk (LM )
v
uà K !2 à K !2
LM ¡1
X u X X
(i) (LM ) ¡= t ¯k ´k cos μk0 + ¯k ´k sin μk0
´k = log2 K ¢ (Vk (i + 1) ¡ Vk (i)) ¡ log2 K ¢ Vk (LM ):
i=1 k=1 k=1 (47)
PK 0
Although the derivation above assumes a single k=1 ¯k ´k sin μk
μ = arctan PK 0
ring scattering model for the channel, we show here k=1 ¯k ´k cos μk
how the analysis can be extended to the case where K
X
the channel has more than one dominant eigenmode. ¨= ¯k ³ k :
Under this circumstance the cdf of the channel k=1
norm is derived in (10). With the definition of the
g-function in (9), we can write It can be clearly seen from the above derivation
that, if no other constraint is imposed on the UAV’s
à !l
X mj
P X t¡1
X heading, the sum rate of the system can be maximized
1 x
F(x) = (¡1)2t¡1 Ajt e¡x=¾j : by assuming the heading angle μ given in (47).
l! ¾j
j=1 t=1 l=0
(45) REFERENCES
To calculate the rate, F(x) needs to again be [1] Zhan, P., Casbeer, D., and Swindlehurst, A. L.
evaluated at Cki , and we can see that every term in A centralized control algorithm for target tracking with
the inner-most summation sign in (45) has a form UAVs.
In Proceedings of the 39th IEEE Asilomar Conference, Oct.
identical to (42), except ¾ is replaced with ¾j . Using 2005.

ZHAN ET AL.: WIRELESS RELAY COMMUNICATIONS WITH UAV: PERFORMANCE AND OPTIMIZATION 2083
[2] Xu, K., et al. [16] Shiu, D-S., et al.
Landmark routing in large wireless battlefield networks Fading correlation and its effect on the capacity of
using UAVs. multielement antenna systems.
In Proceedings of the IEEE Military Communications IEEE Transactions on Communications, 48, 3 (Mar. 2000),
Conference (MILCOM 2001), vol. 1, 2001, 561—573. 502—513.
[3] Ayyagari, A., Harrang, J. P., and Ray, S. [17] Yu, K., et al.
Airborne information and reconnaissance network. Modeling of wideband MIMO radio channels based on
In Proceedings of the IEEE Military Communications NLOS indoor measurements.
Conference, Oct. 1996, 230—234. IEEE Transactions on Vehicular Technology, 53, 3 (May
[4] Gu, D., et al. 2004), 655—665.
UAV aided intelligent routing for ad-hoc wireless network [18] Chung, S. T. and Goldsmith, A.
in single-area theater. Degrees of freedom in adaptive modulation: A unified
In Proceedings of the IEEE Wireless Communications view.
& Networking Conference (WCNC), vol. 3, 2000, IEEE Transactions on Communications, 49, 9 (Sept. 2001),
1220—1225. 1561—1571.
[5] Rubin, I., et al. [19] Ahmed, W. and Balachandran, K.
Ad hoc wireless networks with mobile backbones. Uncoded symbol error rate estimation: Methods and
In Proceedings of the IEEE Personal, Indoor, Mobile and analysis.
Radio Communications Symposium (PIMRC), vol. 1, 2004, IEEE Transactions on Vehicular Technology, 54, 6 (Nov.
566—573. 2005), 1950—1962.
[6] Cheng, C., et al. [20] Alouini, M. S., Tang, X., and Goldsmith, A.
Maximizing throughput of UAV-relaying networks with An adaptive modulation scheme for simultaneous voice
the load-carry-and-deliver paradigm. and data transmission over fading channels.
In Proceedings of the IEEE Wireless Communications & IEEE Journal on Selected Areas in Communications, 17, 5
Networking Conference (WCNC), 2007, 4417—4424. (May 1999), 837—850.
[7] Basu, P., Redi, J., and Shurbanov, V. [21] Proakis, J. G.
Coordinated flocking of UAVs for improved connectivity Digital Communications.
of mobile ground nodes. Columbus OH: McGraw-Hill, 2001.
In Proceedings of the IEEE Military Communications [22] Paulraj, A., Nabar, R., and Gore, D.
Conference (MILCOM), vol. 3, 2004, 1628—1634. Introduction to Space-Time Wireless Communications.
[8] Palat, R., Annamalau, A., and Reed, J. New York: Cambridge University Press, 2003.
Cooperative relaying for ad-hoc ground networks using [23] Tarokh, V., Jafarkhani, H., and Calderbank, A. R.
swarm UAVs. Space-time block codes from orthogonal designs.
In Proceedings of the IEEE Military Communications IEEE Transactions on Information Theory, 45, 5 (July
Conference (MILCOM), vol. 3, 2005, 1588—1594. 1999), 1456—1467.
[9] Han, Z., et al. [24] Alamouti, S. M.
Smart deployment/movement of unmanned air vehicle to A simple transmit diversity technique for wireless
improve connectivity in MANET. communications.
In Proceedings of the IEEE Wireless Communications and IEEE Journal on Selected Areas in Communications, 16, 8
Networking Conference, 2006, 252—257. (1998), 1451—1458.
[10] Zhan, P., Yu, K., and Swindlehurst, A. L. [25] Nabar, R. U., Bölcskei, H., and Paulraj, A. J.
Wireless relay communications using an unmanned aerial Outage properties of space-time block codes in correlated
vehicle. Rayleigh or Ricean fading environments.
In IEEE Workshop on Signal Processing Advances in In Proceedings of the IEEE International Conference on
Wireless Communications (SPAWC), 2006, 1—5. Acoustics, Speech, and Signal Processing, vol. 3, 2002,
[11] Han, Z., Swindlehurst, A., and Liu, K. J. R. 2381—2384.
Optimization of MANET connectivity via smart [26] Chiani, M., Dardari, D., and Simon, M. K.
deployment/movement of unmanned air vehicles. New exponential bounds and approximations for the
IEEE Transactions on Vehicular Technology, 7, (2009), computation of error probability in fading channels.
3533—3546. IEEE Transactions on Wireless Communications, 2, 4 (July
[12] Kramer, G., Gastpar, M., and Gupta, P. 2003), 840—845.
Cooperative strategies and capacity theorems for relay [27] Ertel, R. B., et al.
networks. Overview of spatial channel models for antenna array
IEEE Transactions on Information Theory, 51, 9 (2005), communication systems.
3037—3063. IEEE Personal Communications, 5, 1 (Feb. 1998), 10—22.
[13] Bölcskei, H., et al. [28] Stuber, G. L.
Capacity scaling laws in MIMO relay networks. Principles of Mobile Communication.
IEEE Transactions on Wireless Communications, 5, 6 New York: Springer, 2001.
(2006), 1433—1444. [29] Vakulenko, A.
[14] Wu, Z., Kumar, H., and Davari, A. Overlapping region of the collection of circles.
Performance evaluation of OFDM transmission in UAV http://www.mathworks.com/matlabcentral/fileexchange/,
wireless communication. 2005.
In Proceedings of the Thirty-Seventh Southeastern [30] Simon, M. K. and Alouini, M-S.
Symposium on System Theory, 2005, 6—10. A unified approach to the performance analysis of digital
[15] Rappaport, T. S. communication over generalized fading channels.
Wireless Communications, Principles and Practice. Proceedings of the IEEE, 86, 9 (1998), 1860—1877.
Upper Saddle River, NJ: Prentice-Hall PTR, 1996.

2084 IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS VOL. 47, NO. 3 JULY 2011
Pengcheng Zhan received the B.S. degree in electrical engineering from Tsinghua
University, Beijing, China in 2002, and the Ph.D. degree in electrical engineering
from Brigham Young University, Provo, UT, in 2007.
From 2008—2010, he was employed at ArrayComm, LLC, San José,
CA, where he worked on multi-antenna signal processing for wireless
communications. He joined Quantenna Communications, Fremont, CA in 2010
as a senior systems engineer, where he continues to develop signal processing
algorithms for MIMO Wi-Fi chips.

Kai Yu received a B.Eng. degree from Shanghai University, China, and an M.Sc.
degree (with distinction) from the University of Liverpool, UK, both in electrical
engineering. He received a Ph.D. degree from the Signal Processing Group, Royal
Institute of Technology (KTH), Sweden in 2005.
In 2003, he was a visiting researcher at the Smart Antennas Research Group,
Stanford University. He was a post-doctoral researcher at Brigham Young
University, Utah in 2005—2006 and a member of technical staff at Bell Labs
Research, Swindon, UK in 2006—2008. He jointed Ericsson AB in Stockholm in
Septermber 2008 as a systems manager. His current research interests are in the
general area of wireless communications and networks, especially MIMO channel
characterization, array signal processing, multi-user MIMO systems, and MIMO
mesh networks.

A. Lee Swindlehurst (M’83–SM’99–F’04) received the B.S., summa cum


laude, and M.S. degrees in electrical engineering from Brigham Young University,
Provo, UT, in 1985 and 1986, respectively, and the Ph.D. degree in electrical
engineering from Stanford University in 1991.
From 1986—1990, he was employed at ESL, Inc., of Sunnyvale, CA, where
he was involved in the design of algorithms and architectures for several radar
and sonar signal processing systems. He was on the faculty of the Department
of Electrical and Computer Engineering at Brigham Young University from
1990—2007, where he was a full professor and served as department chair from
2003—2006. During 1996—1997, he held a joint appointment as a visiting scholar
at both Uppsala University, Uppsala, Sweden, and at the Royal Institute of
Technology, Stockholm, Sweden. From 2006—07, he was on leave working as
Vice President of Research for ArrayComm LLC in San Jose, CA. He is currently
a Professor of Electrical Engineering and Computer Science at the University of
California at Irvine. His research interests include sensor array signal processing
for radar and wireless communications, detection and estimation theory, and
system identification, and he has over 190 publications in these areas.
Dr. Swindlehurst is a past secretary of the IEEE Signal Processing Society,
past Editor-in-Chief of the IEEE Journal of Selected Topics in Signal Processing,
and past member of the Editorial Boards for the EURASIP Journal on Wireless
Communications and Networking, IEEE Signal Processing Magazine, and the IEEE
Transactions on Signal Processing. He is a recipient of several paper awards: the
2000 IEEE W. R. G. Baker Prize Paper Award, the 2006 and 2010 IEEE Signal
Processing Society’s Best Paper Award, the 2006 IEEE Communications Society
Stephen O. Rice Prize in the Field of Communication Theory, and is co-author
of a paper that received the IEEE Signal Processing Society Young Author Best
Paper Award in 2001.

ZHAN ET AL.: WIRELESS RELAY COMMUNICATIONS WITH UAV: PERFORMANCE AND OPTIMIZATION 2085

You might also like