
Smallcell architecture is widely adopted by cellular network operators to
increase network capacity. By reducing the size of cells, operators can pack
more (lowpower) base stations in an area to better serve the growing demands,
without causing extra interference. However, this approach suffers from low
spectrum temporal efficiency. When a cell becomes smaller and covers fewer
users, its total traffic fluctuates significantly due to insufficient traffic
aggregation and exhibiting a large "peaktomean" ratio. As operators
customarily provision spectrum for peak traffic, large traffic temporal
fluctuation inevitably leads to low spectrum temporal efficiency. In this
paper, we advocate devicetodevice (D2D) loadbalancing as a useful mechanism
to address the fundamental drawback of smallcell architecture. The idea is to
shift traffic from a congested cell to its adjacent underutilized cells by
leveraging intercell D2D communication, so that the traffic can be served
without using extra spectrum, effectively improving the spectrum temporal
efficiency. We provide theoretical modeling and analysis to characterize the
benefit of D2D load balancing, in terms of total spectrum requirements of all
individual cells. We also derive the corresponding cost, in terms of incurred
D2D traffic overhead. We carry out empirical evaluations based on realworld 4G
data traces to gauge the benefit and cost of D2D load balancing under practical
settings. The results show that D2D load balancing can reduce the spectrum
requirement by 25% as compared to the standard scenario without D2D load
balancing, at the expense of negligible 0.7% D2D traffic overhead.

Load balancing is an effective approach to address the spatialtemporal
fluctuation problem of mobile data traffic for cellular networks. The existing
schemes that focus on channel borrowing from neighboring cells cannot be
directly applied to future 5G wireless networks, because the neighboring cells
will reuse the same spectrum band in 5G systems. In this paper, we consider an
orthogonal frequency division multiple access~(OFDMA) ultradense small cell
network, where DevicetoDevice~(D2D) communication is advocated to facilitate
load balancing without extra spectrum. Specifically, the data traffic can be
effectively offloaded from a congested small cell to other underutilized small
cells by D2D communications. The problem is naturally formulated as a joint
resource allocation and D2D routing problem that maximizes the system sumrate.
To efficiently solve the problem, we decouple the problem into a resource
allocation subproblem and a D2D routing subproblem. The two subproblems are
solved iteratively as a monotonic optimization problem and a complementary
geometric programming problem, respectively. Simulation results show that the
data sumrate in the neighboring small cells increases 20\% on average by
offloading the data traffic in the congested small cell to the neighboring
small cell base stations~(SBSs).

The rapid emergence of electric vehicles (EVs) demands an advanced
infrastructure of publicly accessible charging stations that provide efficient
charging services. In this paper, we propose a new charging station operation
mechanism, the JoAP, which jointly optimizes the EV admission control, pricing,
and charging scheduling to maximize the charging station's profit. More
specifically, by introducing a tandem queueing network model, we analytically
characterize the average charging station profit as a function of the admission
control and pricing policies. Based on the analysis, we characterize the
optimal JoAP algorithm. Through extensive simulations, we demonstrate that the
proposed JoAP algorithm on average can achieve 330% and 531% higher profit than
a widely adopted benchmark method under two representative waitingtime penalty
rates.

In practical massive MIMO systems, a substantial portion of system resources
are consumed to acquire channel state information (CSI), leading to a
drastically lower system capacity compared with the ideal case where perfect
CSI is available. In this paper, we show that the overhead for CSI acquisition
can be largely compensated by the potential gain due to the sparsity of the
massive MIMO channel in a certain transformed domain. To this end, we propose a
novel blind detection scheme that simultaneously estimates the channel and data
by factorizing the received signal matrix. We show that by exploiting the
channel sparsity, our proposed scheme can achieve a DoF very close to the ideal
case, provided that the channel is sufficiently sparse. Specifically, the
achievable degree of freedom (DoF) has a fractional gap of only $1/T$ from the
ideal DoF, where $T$ is the channel coherence time. This is a remarkable
advance for understanding the performance limit of the massive MIMO system. We
further show that the performance advantage of our proposed scheme in the
asymptotic SNR regime carries over to the practical SNR regime. Numerical
results demonstrate that our proposed scheme significantly outperforms its
counterpart schemes in the practical SNR regime under various system
configurations.

In this paper, we consider a wireless cooperative network with an energy
harvesting relay which is powered by the energy harvested from ambient RF
waves, such as that of a data packet. At any given time, the relay operates
either in the energy harvesting (EH) mode or the data decoding (DD) mode, but
not both. Separate energy and data buffers are kept at the relay to store the
harvested energy and decoded data packets, respectively. In this paper, we
optimize a time switching policy that switches between the EH mode and DD mode
to maximize the system throughput or minimize the average transmission delay.
Both static and dynamic time switching policies are derived. In particular,
static policies are the ones where EH or DD mode is selected with a
predetermined probability. In contrast, in a dynamic policy, the mode is
selected dynamically according to the states of data and energy buffers. We
prove that the throughputoptimal static and dynamic policies keep the relay
data buffer at the boundary of stability. More specifically, we show that the
throughputoptimal dynamic policy has a thresholdbased structure. Moreover, we
prove that the delayoptimal dynamic policy also has a thresholdbased
structure and keeps at most one packet at the relay. We notice that the
delayoptimal and throughputoptimal dynamic policies coincide in most cases.
However, it is not true for optimal static policies. Finally, through extensive
numerical results, we show the efficiency of optimal dynamic policies compared
with the static ones in different conditions.

Cloud Radio Access Network (CRAN) is a promising architecture for
unprecedented capacity enhancement in nextgeneration wireless networks thanks
to the centralization and virtualization of base station processing. However,
centralized signal processing in CRANs involves high computational complexity
that quickly becomes unaffordable when the network grows to a huge size. Among
the first, this paper endeavours to design a scalable uplink signal detection
algorithm, in the sense that both the complexity per unit network area and the
total computation time remain constant when the network size grows. To this
end, we formulate the signal detection in CRAN as an inference problem over a
bipartite random geometric graph. By passing messages among neighboring nodes,
message passing (a.k.a. belief propagation) provides an efficient way to solve
the inference problem over a sparse graph. However, the traditional
messagepassing algorithm is not guaranteed to converge, because the
corresponding bipartite random geometric graph is locally dense and contains
many short loops. As a major contribution of this paper, we propose a
randomized Gaussian message passing (RGMP) algorithm to improve the
convergence. Instead of exchanging messages simultaneously or in a fixed order,
we propose to exchange messages asynchronously in a random order. The proposed
RGMP algorithm demonstrates significantly better convergence performance than
conventional message passing. The randomness of the message update schedule
also simplifies the analysis, and allows the derivation of the convergence
conditions for the RGMP algorithm. In addition, we propose a blockwise RGMP
(BRGMP) algorithm for practical implementation. The average computation time
of BRGMP remains constant when the network size increases.

Wireless powered communication network (WPCN) is a novel networking paradigm
that uses radio frequency (RF) wireless energy transfer (WET) technology to
power the information transmissions of wireless devices (WDs). When energy and
information are transferred in the same frequency band, a major design issue is
transmission scheduling to avoid interference and achieve high communication
performance. Commonly used centralized scheduling methods in WPCN may result in
high control signaling overhead and thus are not suitable for wireless networks
constituting a large number of WDs with random locations and dynamic
operations. To tackle this issue, we propose in this paper a distributed
scheduling protocol for energy and information transmissions in WPCN.
Specifically, we allow a WD that is about to deplete its battery to broadcast
an energy request buzz (ERB), which triggers WET from its associated hybrid
access point (HAP) to recharge the battery. If no ERB is sent, the WDs contend
to transmit data to the HAP using the conventional $p$persistent CSMA (carrier
sensing multiple access). In particular, we propose an energy queueing model
based on an energy decoupling property to derive the throughput performance.
Our analysis is verified through simulations under practical network
parameters, which demonstrate good throughput performance of the distributed
scheduling protocol and reveal some interesting design insights that are
different from conventional contentionbased communication network assuming the
WDs are powered with unlimited energy supplies.

Smart power grid enables intelligent automation at all levels of power system
operation, from electricity generation at power plants to power usage at
households. The key enabling factor of an efficient smart grid is its builtin
information and communication technology (ICT) that monitors the realtime
system operating state and makes control decisions accordingly. As an important
building block of the ICT system, power system state estimation is of critical
importance to maintain normal operation of the smart grid, which, however, is
under mounting threat from potential cyber attacks. In this article, we
introduce a graphbased framework for performing cybersecurity analysis in
power system state estimation. Compared to conventional arithmeticbased
security analysis, the graphical characterization of state estimation security
provides intuitive visualization of some complex problem structures and enables
efficient graphical solution algorithms, which are useful for both defending
and attacking the ICT system of smart grid. We also highlight several promising
future research directions on graphbased security analysis and its
applications in smart power grid.

As an environmentfriendly substitute for conventional fuelpowered vehicles,
electric vehicles (EVs) and their components have been widely developed and
deployed worldwide. The largescale integration of EVs into power grid brings
both challenges and opportunities to the system performance. On one hand, the
load demand from EV charging imposes large impact on the stability and
efficiency of power grid. On the other hand, EVs could potentially act as
mobile energy storage systems to improve the power network performance, such as
load flattening, fast frequency control, and facilitating renewable energy
integration. Evidently, uncontrolled EV charging could lead to inefficient
power network operation or even security issues. This spurs enormous research
interests in designing charging coordination mechanisms. A key design challenge
here lies in the lack of complete knowledge of events that occur in the future.
Indeed, the amount of knowledge of future events significantly impacts the
design of efficient charging control algorithms. This article focuses on
introducing online EV charging scheduling techniques that deal with different
degrees of uncertainty and randomness of future knowledge. Besides, we
highlight the promising future research directions for EV charging control.

We consider trainingbased channel estimation for a cloud radio access
network (CRAN), in which a large amount of remote radio heads (RRHs) and users
are randomly scattered over the service area. In this model, assigning
orthogonal training sequences to all users will incur a substantial overhead to
the overall network, and is even impossible when the number of users is large.
Therefore, in this paper, we introduce the notion of local orthogonality, under
which the training sequence of a user is orthogonal to those of the other users
in its neighborhood. We model the design of locally orthogonal training
sequences as a graph coloring problem. Then, based on the theory of random
geometric graph, we show that the minimum training length scales in the order
of $\ln K$, where $K$ is the number of users covered by a CRAN. This indicates
that the proposed training design yields a scalable solution to sustain the
need of largescale cooperation in CRANs. Numerical results show that the
proposed scheme outperforms other reference schemes.

We consider a twolevel profitmaximizing strategy, including planning and
control, for battery energy storage system (BESS) owners that participate in
the primary frequency control (PFC) market. Specifically, the optimal BESS
control minimizes the operating cost by keeping the state of charge (SoC) in an
optimal range. Through rigorous analysis, we prove that the optimal BESS
control is a "stateinvariant" strategy in the sense that the optimal SoC range
does not vary with the state of the system. As such, the optimal control
strategy can be computed offline once and for all with very low complexity.
Regarding the BESS planning, we prove that the the minimum operating cost is a
decreasing convex function of the BESS energy capacity. This leads to the
optimal BESS sizing that strikes a balance between the capital investment and
operating cost. Our work here provides a useful theoretical framework for
understanding the planning and control strategies that maximize the economic
benefits of BESSs in ancillary service markets.

With the increasing adoption of plugin electric vehicles (PEVs), it is
critical to develop efficient charging coordination mechanisms that minimize
the cost and impact of PEV integration to the power grid. In this paper, we
consider the optimal PEV charging scheduling, where the noncausal information
about future PEV arrivals is not known in advance, but its statistical
information can be estimated. This leads to an "online" charging scheduling
problem that is naturally formulated as a finitehorizon dynamic programming
with continuous state space and action space. To avoid the prohibitively high
complexity of solving such a dynamic programming problem, we provide a Model
Predictive Control (MPC) based algorithm with computational complexity
$O(T^3)$, where $T$ is the total number of time stages. We rigorously analyze
the performance gap between the nearoptimal solution of the MPCbased approach
and the optimal solution for any distributions of exogenous random variables.
Furthermore, our rigorous analysis shows that when the random process
describing the arrival of charging demands is firstorder periodic, the
complexity of proposed algorithm can be reduced to $O(1)$, which is independent
of $T$. Extensive simulations show that the proposed online algorithm performs
very closely to the optimal online algorithm. The performance gap is smaller
than $0.4\%$ in most cases.

In this paper, we endeavour to seek a fundamental understanding of the
potentials and limitations of trainingbased multiuser multipleinput
multipleoutput (MIMO) systems. In a multiuser MIMO system, users are
geographically separated. So, the nearfar effect plays an indispensable role
in channel fading. The existing optimal training design for conventional MIMO
does not take the nearfar effect into account, and thus is not applicable to a
multiuser MIMO system. In this work, we use the majorization theory as a basic
tool to study the tradeoff between the channel estimation quality and the
information throughput. We establish tight upper and lower bounds of the
throughput, and prove that the derived lower bound is asymptotically optimal
for throughput maximization at high signaltonoise ratio. Our analysis shows
that the optimal training sequences for throughput maximization in a multiuser
MIMO system are in general not orthogonal to each other. Furthermore, due to
the nearfar effect, the optimal training design for throughput maximization is
to deactivate a portion of users with the weakest channels in transmission.
These observations shed light on the practical design of trainingbased
multiuser MIMO systems.

This paper considers the problem of charging station pricing and plugin
electric vehicles (PEVs) station selection. When a PEV needs to be charged, it
selects a charging station by considering the charging prices, waiting times,
and travel distances. Each charging station optimizes its charging price based
on the prediction of the PEVs' charging station selection decisions and the
other station's pricing decision, in order to maximize its profit. To obtain
insights of such a highly coupled system, we consider a onedimensional system
with two competing charging stations and Poisson arriving PEVs. We propose a
multileadermultifollower Stackelberg game model, in which the charging
stations (leaders) announce their charging prices in Stage I, and the PEVs
(followers) make their charging station selections in Stage II. We show that
there always exists a unique charging station selection equilibrium in Stage
II, and such equilibrium depends on the charging stations' service capacities
and the price difference between them. We then characterize the sufficient
conditions for the existence and uniqueness of the pricing equilibrium in Stage
I. We also develop a low complexity algorithm that efficiently computes the
pricing equilibrium and the subgame perfect equilibrium of the twostage
Stackelberg game.

Featured by centralized processing and cloud based infrastructure, Cloud
Radio Access Network (CRAN) is a promising solution to achieve an
unprecedented system capacity in future wireless cellular networks. The huge
capacity gain mainly comes from the centralized and coordinated signal
processing at the cloud server. However, fullscale coordination in a
largescale CRAN requires the processing of very large channel matrices,
leading to high computational complexity and channel estimation overhead. To
resolve this challenge, we exploit the nearsparsity of large CRAN channel
matrices, and derive a unified theoretical framework for clustering and
parallel processing. Based on the framework, we propose a dynamic nested
clustering (DNC) algorithm that not only greatly improves the system
scalability in terms of basebandprocessing and channelestimation complexity,
but also is amenable to various parallel processing strategies for different
data center architectures. With the proposed algorithm, we show that the
computation time for the optimal linear detector is greatly reduced from
$O(N^3)$ to no higher than $O(N^{\frac{42}{23}})$, where $N$ is the number of
RRHs in CRAN.

Underlaying the cellular networks, Device to Device (D2D) communication
brings the possibility to significantly improve the spectral efficiency in
cellular networks and offload the traffic relayed by the base station. However,
it creates new challenge for interference management as well. In this paper, we
consider the multicell D2D underlaid cellular network in which many D2D links
reuse the uplink resource simultaneously. The infeasibility of interference
cancellation/alignment motivates us to force the D2D users near the base
stations to work in cellular mode. Based on that, we present a distributed and
scalable mode selection scheme based on guard zone to make a good tradeoff
between decreasing interference penalty to base stations and improving spectrum
utilization. With the help of stochastic geometry, we develop an analytically
tractable framework to analyze the interference and then throughput for the two
kinds of users in the considered scenario. The results obtained by the
framework reveal that enabling D2D communication does improve the per user
throughput and that a proper guard zone can further significantly increase the
average throughput of both kinds of users. Thanks to the tractability of our
model, the optimal guard zone, which is the key parameter in our scheme, can be
efficiently obtained by finding the root of the first order derivative of the
throughput expression. Through extensive numerical analysis, we show insights
of the system and give some guidelines in system design aspect.

Accurate state estimation is of paramount importance to maintain the power
system operating in a secure and efficient state. The recently identified
coordinated data injection attacks to meter measurements can bypass the current
security system and introduce errors to the state estimates. The conventional
wisdom to mitigate such attacks is by securing meter measurements to evade
malicious injections. In this paper, we provide a novel alternative to defend
against falsedata injection attacks using covert power network topological
information. By keeping the exact reactance of a set of transmission lines from
attackers, no false data injection attack can be launched to compromise any set
of state variables. We first investigate from the attackers' perspective the
necessary condition to perform injection attack. Based on the arguments, we
characterize the optimal protection problem, which protects the state variables
with minimum cost, as a wellstudied Steiner tree problem in a graph. Besides,
we also propose a mixed defending strategy that jointly considers the use of
covert topological information and secure meter measurements when either method
alone is costly or unable to achieve the protection objective. A mixed integer
linear programming (MILP) formulation is introduced to obtain the optimal mixed
defending strategy. To tackle the NPhardness of the problem, a tree
pruningbased heuristic is further presented to produce an approximate solution
in polynomial time. The advantageous performance of the proposed defending
mechanisms is verified in IEEE standard power system testcases.

The normal operation of power system relies on accurate state estimation that
faithfully reflects the physical aspects of the electrical power grids.
However, recent research shows that carefully synthesized falsedata injection
attacks can bypass the security system and introduce arbitrary errors to state
estimates. In this paper, we use graphical methods to study defending
mechanisms against falsedata injection attacks on power system state
estimation. By securing carefully selected meter measurements, no false data
injection attack can be launched to compromise any set of state variables. We
characterize the optimal protection problem, which protects the state variables
with minimum number of measurements, as a variant Steiner tree problem in a
graph. Based on the graphical characterization, we propose both exact and
reducedcomplexity approximation algorithms. In particular, we show that the
proposed treepruning based approximation algorithm significantly reduces
computational complexity, while yielding negligible performance degradation
compared with the optimal algorithms. The advantageous performance of the
proposed defending mechanisms is verified in IEEE standard power system
testcases.

The largescale integration of plugin electric vehicles (PEVs) to the power
grid spurs the need for efficient charging coordination mechanisms. It can be
shown that the optimal charging schedule smooths out the energy consumption
over time so as to minimize the total energy cost. In practice, however, it is
hard to smooth out the energy consumption perfectly, because the future PEV
charging demand is unknown at the moment when the charging rate of an existing
PEV needs to be determined. In this paper, we propose an Online cooRdinated
CHARging Decision (ORCHARD) algorithm, which minimizes the energy cost without
knowing the future information. Through rigorous proof, we show that ORCHARD is
strictly feasible in the sense that it guarantees to fulfill all charging
demands before due time. Meanwhile, it achieves the best known competitive
ratio of 2.39. To further reduce the computational complexity of the algorithm,
we propose a novel reducedcomplexity algorithm to replace the standard convex
optimization techniques used in ORCHARD. Through extensive simulations, we show
that the average performance gap between ORCHARD and the offline optimal
solution, which utilizes the complete future information, is as small as 14%.
By setting a proper speeding factor, the average performance gap can be further
reduced to less than 6%.

In wireless locationaware networks, mobile nodes (agents) typically obtain
their positions through ranging with respect to nodes with known positions
(anchors). Transmit power allocation not only affects network lifetime,
throughput, and interference, but also determines localization accuracy. In
this paper, we present an optimization framework for robust power allocation in
network localization to tackle imperfect knowledge of network parameters. In
particular, we formulate power allocation problems to minimize the squared
position error bound (SPEB) and the maximum directional position error bound
(mDPEB), respectively, for a given power budget. We show that such formulations
can be efficiently solved via conic programming. Moreover, we design an
efficient power allocation scheme that allows distributed computations among
agents. The simulation results show that the proposed schemes significantly
outperform uniform power allocation, and the robust schemes outperform their
nonrobust counterparts when the network parameters are subject to uncertainty.

Exponential backoff (EB) is a widely adopted collision resolution mechanism
in many popular randomaccess networks including Ethernet and wireless LAN
(WLAN). The prominence of EB is primarily attributed to its asymptotic
throughput stability, which ensures a nonzero throughput even when the number
of users in the network goes to infinity. Recent studies, however, show that EB
is fundamentally unsuitable for applications that are sensitive to large delay
and delay jitters, as it induces divergent second and higherorder moments of
medium access delay. Essentially, the medium access delay follows a power law
distribution, a subclass of heavytailed distribution. To understand and
alleviate the issue, this paper systematically analyzes the tail delay
distribution of general backoff functions, with EB being a special case. In
particular, we establish a tradeoff between the tail decaying rate of medium
access delay distribution and the stability of throughput. To be more specific,
convergent delay moments are attainable only when the backoff functions $g(k)$
grows slower than exponential functions, i.e., when $g(k)\in o(r^k)$ for all
$r>1$. On the other hand, nonzero asymptotic throughput is attainable only
when backoff functions grow at least as fast as an exponential function, i.e.,
$g(k)\in\Omega(r^k)$ for some $r>1$. This implies that bounded delay moments
and stable throughput cannot be achieved at the same time. For practical
implementation, we show that polynomial backoff (PB), where $g(k)$ is a
polynomial that grows slower than exponential functions, obtains finite delay
moments and good throughput performance at the same time within a practical
range of user population. This makes PB a better alternative than EB for
multimedia applications with stringent delay requirements.

Conventionally, secrecy is achieved using cryptographic techniques beyond the
physical layer. Recent studies raise the interest of performing encryption
within the physical layer by exploiting some unique features of the physical
wireless channel. Following this spirit, we present a novel physical layer
encryption (PLE) scheme that randomizes the radio signal using a secret key
extracted from the wireless channel under the assumption of channel
reciprocity. Specifically, we propose to jointly design the encryption function
and the secretkey generation method. On one hand, we establish a sufficient
and necessary condition for the encryption function to achieve perfect secrecy.
Based on that, several candidate encryption functions are proposed and
compared. We show that, given the secret key available to the legitimate users,
perfect secrecy can be achieved without compromising the capability of the
communication channel. On the other hand, we study the practical design of the
secretkey generation method based on the channel reciprocity. We show that, by
introducing marginal system overhead, the key agreement between the legitimate
users can be done with a high success probability. The performance advantages
of the proposed PLE method is verified through comparisons against other
existing PLE methods.

Transmit power control in wireless networks has long been recognized as an
effective mechanism to mitigate cochannel interference. Due to the highly
nonconvex nature, optimal power control is known to be difficult to achieve if
a system utility is to be maximized. To date, there does not yet exist a
distributed power control algorithm that maximizes any form of system utility,
despite the importance of distributed implementation for the wireless
infrastructureless networks such as ad hoc and sensor networks. This paper
fills this gap by developing a Gibbs Sampling based Asynchronous distributed
power control algorithm (referred to as GLAD). The proposed algorithm quickly
converges to the global optimal solution regardless of the concavity,
continuity, differentiability and monotonicity of the utility function. Same as
other existing distributed power control algorithms, GLAD requires extensive
message passing among all users in the network, which leads to high signaling
overhead and high processing complexity. To address this issue, this paper
further proposes a variant of the GLAD algorithm, referred to as IGLAD, where
the prefix "I" stands for infrequent message passing. The convergence of IGLAD
can be proved regardless of the reduction in the message passing rate. To
further reduce the processing complexity at each transmitter, we develop an
enhanced version of IGLAD, referred to as NIGLAD, where only the control
messages from the neighboring links are processed. Our simulation results show
that IGLAD approximately converges to the global optimal solution regardless
of the type of the system utility function. Meanwhile, the optimality of the
solution obtained by NIGLAD depends on the selection of the neighborhood size.

In multiaccess wireless networks, transmission scheduling is a key component
that determines the efficiency and fairness of wireless spectrum allocation. At
one extreme, greedy opportunistic scheduling that allocates airtime to the user
with the largest instantaneous channel gain achieves the optimal spectrum
efficiency and transmission reliability but the poorest userlevel fairness. At
the other extreme, fixed TDMA scheduling achieves the fairest airtime
allocation but the lowest spectrum efficiency and transmission reliability. To
balance the two competing objectives, extensive research efforts have been
spent on designing opportunistic scheduling schemes that reach certain tradeoff
points between the two extremes. In this paper and in contrast to the
conventional wisdom, we find that in relayassisted cellular networks, fixed
TDMA achieves the same optimal diversity gain as greedy opportunistic
scheduling. In addition, by incorporating very limited opportunism, a simple
relaxedTDMA scheme asymptotically achieves the same optimal system reliability
in terms of outage probability as greedy opportunistic scheduling. This reveals
a surprising fact: transmission reliability and user fairness are no longer
contradicting each other in relayassisted systems. They can be both achieved
by the simple TDMA schemes. For practical implementations, we further propose a
fully distributed algorithm to implement the relaxedTDMA scheme. Our results
here may find applications in the design of nextgeneration wireless
communication systems with relay architectures such as LTEadvanced and WiMAX.

Degree of freedom (DoF) region provides an approximation of capacity region
in high signaltonoise ratio (SNR) regime, while sum DoF gives the scaling
factor. In this correspondence, we analyse the DoF region and sum DoF for
unicast layered multihop relay wireless networks with arbitrary number of
source/destination/relay nodes, arbitrary number of hops and arbitrary number
of antennas at each node. The result is valid for quite a few message
topologies. We reveal the limitation on capacity of multihop network due to
the concatenation structure and show the similarity with capacitor network.
From the analysis on bound gap and optimality condition, the ultimate capacity
of multihop network is shown to be strictly inferior to that of singlehop
network. Linear scaling law can be established when the number of hops is
fixed. At cost of channel state information at transmitters (CSIT) for each
component singlehop network, our achievable scheme avoids routing and
simplifies scheduling.