Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction

Collaborative Relay Beamforming for Secrecy

Channel Model Main Results

Channel Model Beamforming under Total Power Constraint

Junwei Zhang and Mustafa Cenk Gursoy

High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 1 / 21

University of Nebraska-Lincoln

May 2010

Outline Collaborative Relay Beamforming for Secrecy

1

Channel Model

Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model

Main Results 2

Channel Model

3

Beamforming under Total Power Constraint High-SNR Regime

Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Low-SNR Regime 4

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

5

Numerical Results

6

Conclusion

Numerical Results Conclusion 2 / 21

Introduction

Channel Model Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 3 / 21

We consider a secrecy communication channel with a source S, a destination D, an eavesdropper E, and M relays {Rm }M m=1 Related Studies Physical layer security has been studied in Gaussian channel, fading channel, Multi-anterna and Multi-user channel Collaborative-relay beamforming in perfect CSI and imperfect CSI. Secrecy relay beamfoming under total relay power constraint.

Main Results Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 4 / 21

DF Relaying under Totoal Power Constraint We obtain a closed-form solution for the achievable secrecy rate. We investigate the beamforming structure in the high- and low-SNR regimes.

DF Relaying under individual Power Constraint There is no analytical solutions available. We use the semidefinite relaxation (SDR) approach to approximate the problem as a convex semidefinite programming (SDP) problem. We also provide an alternative method by formatting the original optimization problem as a convex second-order cone programming (SOCP) problem.

Channel Model Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint

The received signal at Rm yr,m = gm xs + ηm Relay Rm first decodes the message xs and normalizes it as p xs0 = xs / Ps The Relay output xr = wm xs0 ,

High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 5 / 21

The received signals at the destination D and eavesdropper E are yd =

M X

hm wm xs0 + n0 = h† wxs0 + n0 ,

m=1

ye =

M X m=1

zm wm xs0 + n1 = z† wxs0 + n1

and

Secrecy Rate Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy

The secrecy rate is now given by

Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 6 / 21

Rs = I (xs ; yd ) − I (xs ; ye ) = log(1 + Γd ) − log(1 + Γe ) ! PM N0 + | m=1 hm wm |2 = log PM N0 + | m=1 zm wm |2 Our Goal is the joint optimization of {wm } with the aid perfect CSI and hence identify the optimum collaborative relay beamforming (CRB) direction that maximizes the secrecy rate .

Analytical Solution Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 7 / 21

We consider a total relay power constraint in the following form: ||w||2 = w† w ≤ PT . The optimization problem can now be formulated as follows: ! PM N0 + | m=1 hm wm |2 Rs (h, z, PT ) = max log PM w† w≤PT N0 + | m=1 zm wm |2 PM N0 + | m=1 hm wm |2 = log max PM 2 w† w≤PT N0 + | m=1 zm wm | = log max

w† w≤PT

= log max

w† w≤PT

N0 w† ( P I + hh† )w T N0 w† ( P I + zz† )w T

w† (N0 I + PT hh† )w w† (N0 I + PT zz† )w

= log λmax (N0 I + PT hh† , N0 I + PT zz† ) wopt = ςu where u is the eigenvector that corresponds to λmax (N0 I + PT hh† , N0 I + PT zz† ) .

High-SNR Analysis Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 8 / 21

we can see that ˜ 2) lim (Rs − log(PT )) = log(max |h† ψ|

PT →∞

˜ ψ

where ψ˜ is a unit vector on the null space of z† . Based on this observation, we can choose at high SNRs the beamforming vectors to lie in the null spaces of the eavesdropper’s channel vector, that is PM | m=1 zm wm |2 = z† w = 0. In this case, the eavesdropper can not receive any data from the relays, and secrecy is automatically guarantied. No secrecy coding is needed at the relays. Now, for large PT , the optimization problem becomes  2  M X hm wm  s.t z† w = 0 max log  w† w≤PT m=1

˜ 2 ). = log(PT ) + log(max |h† ψ| ˜ ψ

(1)

Hence, null space beamforming is optimal at high SNR. Furthermore, the optimal null space beamforming vector can be obtained explicitly.

Optimal Null Space Beamforming Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 9 / 21

⊥ we can write w = H⊥ z v, where Hz denotes the projection matrix † onto the null space of z . The power constraint † ⊥ † w † w = v † H⊥ z Hz v = v v ≤ PT . Then, the optimization problem can be recast as  2  M X max log 1 + hm wm  w† w≤PT m=1   † † = log 1 + max (w hh w) w† w≤PT   † ⊥† † ⊥ = log 1 + max (v Hz hh Hz v) v† v≤PT   † † ⊥ hh H ) = log 1 + PT λmax (H⊥ z z   † ⊥ ⊥† = log 1 + PT h Hz Hz h .

Therefore, the optimum null space beamforming weights vector w is †

wopt,n = H⊥ v = ς1 H⊥ H⊥ h

Low-SNR Analysis Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 10 / 21

In the low SNR regime, in which both Ps , PT → 0, we can see that lim

Ps →0

Rs = λmax (hh† − zz† ) PT

Thus, in the low SNR regime, the direction of the optimal beamforming vector approaches that of the eigenvector that corresponds to the largest eigenvalue of hh† − zz† .

Problem Statement Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 11 / 21

We now impose |wm |2 ≤ pm ∀m or equivalently |w|2 ≤ p where | · |2 denotes the element-wise norm-square operation and p is a column vector that contains the components {pm }. In what follows, the problem of interest will be the maximization of the term inside log function of Rs under individual power constraints: max 2

|w| ≤p

N0 + |

PM

N0 + |

PM

= max 2

|w| ≤p

m=1

hm wm |2

2 m=1 zm wm | † †

N0 + w hh w N0 + w† zz† w

SDR Approach Collaborative Relay Beamforming for Secrecy

Using the definition X , ww† , we can rewrite the optimization problem in as

Junwei Zhang and Mustafa Cenk Gursoy

N0 + tr(hh† X) X N0 + tr(zz† X) s.t diag(X) ≤ p rank X = 1, and

max

Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 12 / 21

X0

or equivalently as max X,t

t

s.t tr(X(hh† − tzz† )) ≥ N0 (t − 1), diag(X) ≤ p, rank X = 1, and X  0 where tr(·) represent the trace of a matrix and X  0 means that X is a symmetric positive semi-definite matrix. The optimization problem in is not convex and may not be easily solved.

SDR Approach Collaborative Relay Beamforming for Secrecy

Let us now ignore the rank constraint in That is, using a semidefinite relaxation (SDR), we aim to solve the following optimization problem:

Junwei Zhang and Mustafa Cenk Gursoy

max X,t

s.t tr(X(hh† − tzz† )) ≥ N0 (t − 1), and diag(X) ≤ p, and X  0.

Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint

Note that the optimization problem is quasiconvex. In fact, for any value of t, the feasible set in is convex. Let tmax be the maximum value of t obtained by solving the optimization problem . We can use a simple bisection algorithm to solve the quasiconvex optimization problem by solving a convex feasibility problem find

Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 13 / 21

t

X

such that tr(X(hh† − tzz† )) ≥ N0 (t − 1), and diag(X) ≤ p, and X  0 at each step.

SDR Approach Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 14 / 21

Once the maximum feasible value for tmax is obtained, one can solve min X

tr(X)

s.t tr(X(hh† − tmax zz† )) ≥ N0 (tmax − 1), and diag(X) ≤ p, and X  0 to get the solution Xopt . To solve the convex feasibility problem, one can use the well-studied interior-point based methods as well. We use the well-developed interior point method based package SeDuMi , which produces a feasibility certificate if the problem is feasible, and its popular interface Yalmip .

SOCP Approach Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 15 / 21

We can reformulate the problem as a second order cone problem. This provides us with another way of solving the optimization. The optimization problem is equivalent to max w,t

s.t

t

N0 + |h† w|2 ≥t N0 + |z† w|2

and

|w|2 ≤ p.

Observe that an arbitrary phase rotation can be added to the beamforming vector without affecting the constraint. Thus, h† w can be chosen to be real without loss of generality.

! 2 †

1 † 2

q z w

|h w| ≥

. 1 1 − N

t 0 t

SOCP Approach Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 16 / 21

Since h† w can be assumed to be real, we may take the square root of the above equation. The constraint becomes a second-order cone constraint, which is convex. The optimization problem now becomes max t w,t

r

1 †

h w≥ s.t

t

† q z w 1 − 1t N0

!



and

|w|2 ≤ p

The optimal solution of can be obtained by repeatedly checking the feasibility and using a bisection search over t with the aid of interior point methods for second order cone program. Once the maximum feasible value tmax is obtained, we can then solve the following second order cone problem (SOCP) to obtain optimum beamforming vector: min w

r s.t

||w||2

 

z† w

r   †

  h w≥ 1

1 − N tmax 0

tmax 1

and

|w|2 ≤ p

Suboptimal Approach Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 17 / 21

As shown above, the design of the beamformer under individual relay power constraints requires an iterative procedure in which, at each step, a convex feasibility problem is solved. We now propose a suboptimal beamforming vector that can be obtained without significant computational complexity. We choose aP simplified beamformer as wsim = θwopt , ||wopt ||2 = PT = pi , and we choose θ=

1 √ |wopt,k |/ pk

where wopt,k and pk are the kth entries of wopt and p respectively, and we choose k as k = arg max

1≤i≤M

|wopt,i |2 pi

Eavesdropper Has a Weaker Channel Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy

12 11

Introduction

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 18 / 21

10 secrecy rate (bits/symbol)

Channel Model Main Results

9 8 7 6 Total Power constraint individual power constraint, SDR approach individual power constraint, SOCP approch individual power constraint, suboptimal

5 4

0

20

40

60

80

100

P

T

Figure: Second-hop secrecy rate vs. the total relay transmit power PT for different cases. Eavesdropper has a weaker channel.

Eavesdropper Has a Stronger Channel Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy

10 9

Introduction

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 19 / 21

8 secrecy rate (bits/symbol)

Channel Model Main Results

7 6 5 4

Total Power constraint individual power constraint, SDR approach individual power constraint, SOCP approch individual power constraint, suboptimal

3 2

0

20

40

60

80

100

P

T

Figure: Second-hop secrecy rate vs. the total relay transmit power PT for different cases. Eavesdropper has a stronger channel.

NO. of Relay Changes Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy

12.5

12 Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 20 / 21

secrecy rate (bits/symbol)

Introduction 11.5

11

10.5

10 Total Power constraint individual power constraint, SDR approach individual power constraint, SOCP approch individual power constraint, suboptimal

9.5

9

2

4

6

8

10 12 NO. of Relays

14

16

18

20

Figure: Second-hop secrecy rate vs. number of relays for different cases.

Conclusion Collaborative Relay Beamforming for Secrecy Junwei Zhang and Mustafa Cenk Gursoy Introduction Channel Model Main Results

Channel Model Beamforming under Total Power Constraint High-SNR Regime Low-SNR Regime

Beamforming under Individual Power Constraint Semidefinite Relaxation (SDR) Approach Second-order Cone Program (SOCP) Approach Suboptimal Design

Numerical Results Conclusion 21 / 21

In DF, under total power constraints, we analytically determine the beamforming structure in the high- and low-SNR regimes. In DF, under individual power constraints, not having analytical solutions available, we provide an optimization framework to obtain the optimal beamforming that maximizes the secrecy rate. We use the semidefinite relaxation (SDR) approach to approximate the problem as a convex semidefinite programming (SDP) problem which can be solved efficiently. We also provide an alternative method by formatting the original optimization problem as a convex second-order cone programming (SOCP) problem that can be efficiently solved by interior point methods. Also, we describe a simplified suboptimal beamformer design under individual power constraints

Collaborative Relay Beamforming for Secrecy

Conclusion. SDR Approach. Using the definition X ww†, we can rewrite the optimization problem in as max. X. N0 + tr(hh†X). N0 + tr(zz†X). s.t diag(X) ≤ p.

511KB Sizes 1 Downloads 283 Views

Recommend Documents

Collaborative-Relay Beamforming With Perfect CSI - IEEE Xplore
particular, we optimize the relay weights jointly to maximize the received signal-to-noise ratio (SNR) at the destination terminal with both individual and total ...

Secure Relay Beamforming over Cognitive Radio ...
Mar 23, 2011 - ww† Using SDR(drop the rank one constraint ), we can express the optimization problem as max. X,t1,t2 t1t2. s.t tr (X (Dz − t2Dh)) ≥ N0(t2 − 1).

Cooperation With an Untrusted Relay: A Secrecy ...
cure communication system per Shannon's notion is possible. [2], [3]. Recent work in this area aims to find the secrecy capacity or capacity region for a variety of communication scenarios and channel models. A set of models follows the classical mod

Mo_Jianhua_WCNC13_Secure Beamforming for ...
Mo_Jianhua_WCNC13_Secure Beamforming for MIMO Two-Way Transmission with an Untrusted Relay.pdf. Mo_Jianhua_WCNC13_Secure Beamforming for ...

Mo_Jianhua_TSP14_Secure Beamforming for MIMO Two-Way ...
Mo_Jianhua_TSP14_Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay.pdf. Mo_Jianhua_TSP14_Secure Beamforming for ...

Beamforming capacity optimization for MISO ... - Georgios Paschos
pacity optimization problem by following an analytical approach that projects the ...... of Electrical Engineering and Computer Science in the University of Patras, ...

Beamforming capacity optimization for MISO ... - Georgios Paschos
achieving solution. In this paper, we solve the beamforming ca- pacity optimization problem by following an analytical approach that projects the beamforming ...

Mo_Jianhua_WCNC13_Secure Beamforming for MIMO Two-Way ...
Mo_Jianhua_WCNC13_Secure Beamforming for MIMO Two-Way Transmission with an Untrusted Relay.pdf. Mo_Jianhua_WCNC13_Secure Beamforming for ...

Mo_Jianhua_TSP14_Secure Beamforming for MIMO Two-Way ...
Mo_Jianhua_TSP14_Secure Beamforming for MIMO Two-Way Communications With an Untrusted Relay.pdf. Mo_Jianhua_TSP14_Secure Beamforming for ...

Secrecy versus patenting - CiteSeerX
inherent to an innovation process by assuming that, with probability 1 − e− j. , an innovator is successful in developing the idea into an innovation.1 Thus, the ...

Relay For Life 2017 Forms.pdf
Page 2 of 3. American Cancer Society Relay For Life. Youth Partcipaton Agreement. Every American Cancer Society Relay For Life event requires one ...

subminiature dip relay - GitHub
Bounce time ... 2) In case 5V of transistor drive circuit, it is recommended to use .... with the consideration of shock risen from transit and relay mounting, it should.

ECHO for - Virtual Community for Collaborative Care
ECHO. Colorado faculty, staff and partners have dedicated themselves to de- monopolizing knowledge in order to expand access to best-practice care.

Beamforming capacity optimization for MISO systems ...
in MISO systems, when the transmitter has both mean and covariance ... most instances of wireless communications, difficult or even ...... Signals, Systems Computers (ACSSC), Oct. 2005, pp. ... Communications and Networking, no. 8, p.

Downlink Beamforming for WCDMA based on Uplink ...
since several services will be asymmetric, i.e., on the av- ... WCDMA must be transmitted with more power than low ..... Processing, Phoenix, Arizona, Mar. 1999 ...

Neural Network Adaptive Beamforming for ... - Research at Google
network adaptive beamforming (NAB) technique to address this issue. Specifically, we use ..... locations vary across utterances; the distance between the sound source and the ..... cessing. Springer Science & Business Media, 2008, vol. 1. ... long sh

A Pseudo-Random Beamforming Technique for Time ...
The base stations equipped with multi-antennas and mobile stations (MSs) are ... vectors that make up a number of transmit beamforming matrices and wireless ...

Relay Expansion - Onion Wiki
Mar 22, 2016 - THE INFORMATION CONTAINED IN THIS DRAWING IS THE SOLE PROPERTY OF. ONION CORPORATION. ANY REPRODUCTION IN PART ...

Joint Power Allocation and Beamforming for Multiuser ...
Multiuser MIMO Two-way Relay Networks. Mohammad .... The problem is formulated and solved via the proposed iterative scheme in. Section III. Simulation results are presented in Section IV. Finally, conclusions are drawn in Section V. II. SYSTEM .....

Optimal Energy Beamforming and Data Routing for Immortal Wireless ...
transfer power to sensor nodes wirelessly. The result is that the charging of the nodes can be controlled by the system designer. In this paper, we consider such a system and investigate the optimal wireless energy transfer strategies and routing pro

Criterion for narrowband beamforming - Electronics Letters - IEEE Xplore
Introduction: When discussing adaptive array beamforming techni- ques, narrowband signal beamforming is different from wideband signal beamforming.

04.21.18 Relay Finals.pdf
3) Kojima, Matthew FR 4) Takara, Matthew JR. --- Iolani School B DQ. --- Waianae High School A DQ. --- Pearl City A DQ. --- Punahou School C DQ. --- Punahou ...

Robust Beamforming in Cognitive Radio
commission (FCC) [1], spectrum utilization depends very much upon place and time and yet most ... exploited by CR [5], but higher spectrum utilization is antici- pated if coexistence between the primary (PU) and ... achieve various objectives, such a

Collaborative Software Needs for Contract ...
industry have begun to outsource many more of their processes, and so the ... partners in business processes, such as design, forecasting, sales, and customer support. ... capacity' for the OEMs, to providing (cheap) technical manufacturing ...