SpringerOpen Newsletter

Receive periodic news and updates relating to SpringerOpen.

Open Access Research Article

On the Delay-Energy Tradeoff in Multiuser Fading Channels

Prasanna Chaporkar, Kimmo Kansanen* and RalfR Müller

Author Affiliations

Department of Electronics and Telecommunications, Norwegian University of Science and Technology, 7491 Trondheim, Norway

For all author emails, please log on.

EURASIP Journal on Wireless Communications and Networking 2009, 2009:198903  doi:10.1155/2009/198903

The electronic version of this article is the complete one and can be found online at: http://jwcn.eurasipjournals.com/content/2009/1/198903


Received:16 October 2008
Revisions received:15 June 2009
Accepted:11 August 2009
Published:5 October 2009

© 2009 The Author(s).

This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

We consider the delay-energy tradeoff on a fading channel with multiuser diversity. For fixed arbitrary rates of the users, the total transmitted energy is minimized subject to a delay constraint. To achieve this goal we propose a scheme which schedules a subset of all users simultaneously. The scheduled users are allocated power to guarantee successful separation at the detector by successive decoding. In this way, we can benefit from both multiuser diversity and the near-far situation via scheduling and simultaneous transmission, respectively. We analytically show that when the number of users goes to infinity the energy required to guarantee the required user rates can be made as small as required at the cost of a higher delay "delay-energy tradeoff". We explicitly compute the delay under the proposed scheduling policy and discuss how delay differentiation can be achieved. We extend the results to multiband multiaccess channel. Finally, all the results can be generalized in a straightforward fashion to broadcast channel due to the Gaussian multiaccess-broadcast channel duality.

1. Introduction

A comprehensive treatment of multiaccess fading channels can be found in [1, 2]. In these papers, Tse and Hanly have characterized the so-called throughput capacity and delay-limited capacity of the multiaccess block fading channel with Gaussian noise assuming that perfect channel state information (CSI) is causally available at the transmitters and the receiver. The throughput capacity region quantifies the achievable rate region with average power constraint for ergodic fading. For the delay limited capacity, each user must be given the required rate irrespective of its fading state. The aim is to obtain a coding and power allocation scheme to minimize the energy while guaranteeing the rate in every slot. Here, slot refers to the time duration required to transmit a block of symbols over which the fading state remains unaltered. Thus, the slot duration is smaller than the channel coherence time.

The notion of throughput capacity leads to schemes that take advantage of the different channel qualities of the users "multiuser diversity". Specifically, it has been shown that in the special case of single antenna transmission and reception on a frequency nonselective channel, sum rate in the system is maximized by letting only one user with the best channel quality to transmit. Such schemes that take current channel states into account while making scheduling decisions are referred to as "Opportunistic Scheduling" and may result in unfair rate allocation if the fading statistics are not symmetric. In wireless systems, the fading statistics are typically not symmetric because of many reasons that include the so-called"near-far" effect. To alleviate this limitation, several opportunistic scheduling schemes with fairness constraints have been designed [3, 4]. Different fairness objectives will in general result in different throughput performance of the system, along with changing other performance parameters of a system [5]. Among them, Proportional Fair Scheduling (PFS) is among the most well known and has many desirable properties including provable fairness guarantees and suitability for online implementation, that is, without prior knowledge of channel statistics [6]. In spite of these desirable features, PFS suffers from two limitations. First, PFS does not provide the required rate to the users, but the rate allocation is done to maximize certain utility function and the allocated rates depend on the channel statistics of the users. Second, it does not guarantee delay as the users are scheduled in random slots, depending on their fading states and the resource allocation in the previous slots.

As discussed before, the notion of throughput capacity is relevant for delay-tolerant data applications. On the contrary, the notion of delay-limited capacity is relevant for the applications that have the strictest delay requirement, namely, the required rate should be given to each user in each slot irrespective of the channel conditions. The delay for such schemes is always one slot. Note that these schemes cannot make use of channel or multiuser diversity over time, but instead can benefit from near-far gain [7] by simultaneous transmission of users. It has been shown that simultaneous transmission (superposition coding in downlink) and successive decoding minimize energy for achieving the required rates [2]. In this signaling scheme, all the users transmit simultaneously with a coordinated power allocation, and the receiver decodes in the decreasing order of the users' channel states treating the undecoded signals as noise. One of the attractive features of this coding strategy is that given the ordered channel state sequence, the power allocation for the optimal signaling can be obtained using a greedy procedure. This has significant impact on practical implementation.

Note that opportunistic scheduling exploits channel and multiuser diversity to guarantee rates that maximize certain utility and/or guarantee fairness, while simultaneous transmission and successive decoding exploit superpositioning to guarantee the required rate and the strict delay of one slot in energy efficient fashion. Many applications cannot afford to sustain indefinite delay variability in attaining the fair rate (as in PFS) without suffering significant performance penalty [8], but they also do not need the strict delay of one slot (as in delay-limited schemes); that is, they have limited delay tolerance. With limited delay tolerance in multiaccess channel, it is possible to exploit both multiuser diversity and the superpositioning gain. Our aim is to understand how delay tolerance of the application can be exploited so as to improve the energy efficiency (delay-energy tradeoff).

In literature, the delay-energy tradeoff is typically studied assuming no multipath fading (AWGN channel) [9, 10] or assuming noncausal CSI at transmitters and the receiver [1114]. In an AWGN channel, the problem of minimizing energy with strict deadline requirements has been addressed using filter theory [9] and network calculus [10]. In [11], the authors have studied the delay-energy tradeoff for a single user in fading channel with a strict deadline (say slots), while in [1214] the multiaccess fading channel is considered. In all these works, optimal offline (noncausal CSI available) algorithms that iteratively solve the underlying optimization problem have been developed, and heuristic algorithms for noncausal CSI have been proposed. Because of the equivalence between the multiplexing in time and frequency, the algorithms with noncausal CSI are more relevant when orthogonal frequency bands are available and the delay requirement is one slot, that is, in the case of a delay limited multiband multiaccess system. In their seminal work, Cheng and Verdú have obtained the capacity region for the vector Gaussian multiaccess channel [15]. Here, authors have considered the scalar Gaussian channel with ISI, which reduces to the case of independent parallel memoryless Gaussian channels through the Karhunen-Loéve expansion. No multipath fading was assumed. Fundamental results for multiband fading channels were reported in [1, 2]. Perfect CSI at the transmitter and the receiver is assumed in these works. The capacity achieving power allocation is the multiuser waterfilling scheme. The exact characterization of this scheme is considered difficult, and only iterative algorithms and their convergence properties are known [16]. The problem of providing the desired throughput to each of the users has been addressed in multiband multiaccess fading channel with white Gaussian noise [1719]. The approach taken in these works is one to obtain an approximate multiuser waterfilling solution efficiently.

In practice, CSI is only available causally. In spite of this obvious limitation, the case with noncausal CSI has been studied in literature because of the following two reasons. First, the optimum schemes with noncausal CSI (offline schemes) provide a benchmark for all the other schemes that guarantee the required delay. Also, the structural properties of the optimal offline schemes facilitate valuable insights for designing near-optimal online schemes (schemes with causal CSI). Second, in the fixed delay case, analytically it is difficult, if not impossible, to design optimal online schemes barring the trivial cases in which future fading states can be accurately predicted. This can be seen as follows. Since the required delay is finite, any fading realization is possible with positive probability. Thus, for any given online scheme, one can play the role of an adversary and orchestrate future fading states so as to make the scheme suboptimal compared to an optimal offline scheme. In view of these reasons, instead of a fixed delay constraint, an average delay constraint is considered while designing optimal online schemes [20, 21]. From the quality of service point of view, guaranteeing the fixed delay is more desirable than guaranteeing the average delay for the real-time applications. But, if the delay variance is small, then the higher system layers can employ mechanisms like playback buffer to cope up with the delay variability. In [20, 21], a single user fading channel is considered, and the minimization of average delay for the given average power constraint has been addressed using the framework of Markov Decision Processes (MDP). Again, only the structural properties of the optimal online scheme have been derived except in certain special cases. The exact online scheme has to be obtained by solving Bellman's equations, which is computationally expensive. The results in [20, 21] for a single user case are extended to the multiaccess channel by Neely [22]. Here, the author has considered the mean system delay, that is, the average delay over all the users. We note that guaranteeing the mean system delay does not guarantee the required delay performance to individual users. In fact, such schemes tend to favor users with a better channel by providing smaller delays to these at the expense of the users with a worse channel and still maintaining the desired mean system delay. Our aim is to quantify the delay-energy tradeoff while guaranteeing the average delay of each of the users. In queueing theory literature, frameworks for designing scheduling schemes that minimize a certain utility (energy in our case) while guaranteeing bounded mean delay can be found in [2326]. These frameworks guarantee the bounded delay but do not guarantee the desired delay to each of the users as we do.

From the previous discussion, it should be clear that the closed form expressions for the minimum energy required for guaranteeing the desired delay are not available for both online and offline schemes. Thus, the energy-delay tradeoff has to be quantified using numerical evaluations for specific scenarios of interest. Our aim is to obtain closed form expressions to quantify the delay-energy tradeoff for an average delay constraint in multiband multiaccess fading channels with causal CSI at the transmitters and the receiver. We consider a multiband system as it can model many practical systems including OFDM systems, channels with frequency selective fading, and ISI channels. The analysis targets specifically systems, where a large number of users must be supported with rate and delay guarantees. A motivating real world example could be a sensor network where sensing delays must be limited, data rates may be pre-allocated, and energy consumption should be minimal.

In our analysis, we allow for a general fading distribution and also consider random arrivals of data from the higher layers into the physical layer buffer to model real-time applications in which the symbols are generated in realtime. For analytical tractability, we use the following approach. We design a parametrized scheduling policy called Opportunistic Superpositioning (OSP) that exploits multiuser diversity by scheduling a set of users with high channel gains only, and among these users it uses simultaneous transmission and successive decoding to exploit superpositioning gain. One of the main challenges in designing such schemes is the quantification of performance. The quantification allows for the optimal and guaranteed control. We explicitly quantify the average per user delay in the general case, and the total energy requirement in the large system limit for the proposed policy. Thus, given the delay requirement, we can efficiently choose the appropriate parameter values so as to minimize the energy while guaranteeing the required delay. Using numerical computations, we show that allowing a little delay can yield significant energy savings. We also compare the performance of the proposed policy with PFS and the delay-limited schemes.

The paper is arranged as follows. In Section 2, we present our system model. In Section 3, we describe the OSP policy, and in Section 4 obtain analytical guarantees. In Section 5, we discuss extensions of OSP to multiband multiaccess channel and to provide delay differentiation. In Section 6, we compare the performance of OSP with PFS and delay-limited schemes using numerical computations. Finally, in Section 7, we conclude.

2. System Model

Consider the following system for the purpose of motivation. A sensor network is operating in an area, with a fusion center located in the center. Each sensor is stationary, but the propagation environment has enough inherent variation, that the channels between sensors and the fusion center can be considered slowly randomly varying over time. Each sensor must be polled within a reasonable time from making a measurement, which consists of a random number of bits. On the average, all sensors provide equally valuable data, and should receive an equal fraction of available system rate.

With the previous motivation in mind, we consider a multiaccess system with users that are placed at random in a cell. Time is slotted. Each user requires a certain fraction of the total rate provided in a system; that is, the required average rate of each user is , where then denotes the total average spectral efficiency of the system required to support the user rates. Alternatively, denotes the arrivals for user in slot , where is a random variable (r.v.). We assume that all the moments for are finite and for every . Note that random variables with finite support have all the moments finite. A sensor measurement usually has limited resolution due to measurement noise. In networks, the arrival rate is typically limited by the link capacities which may be large but finite. Moreover, we assume that the arrivals are independent and identically distributed (i.i.d.) across both slots and users. The arrivals are queued into an infinite buffer before served. Without loss of generality, let the system start in slot 1. Hence, users' buffers are empty at the beginning of slot 1.

We primarily discuss the uplink communication (multiaccess channel), but since the results consider total system energy expenditure, which can be interpreted as a total power constraint, the results can be generalized in a straightforward fashion to the downlink case (broadcast channel) using the Gaussian multiaccess-broadcast duality [27] in the hard fairness context [7].

Now, we describe the model for the multiaccess channel, described by the input () output () relation

(1)

Each user experiences the channel in slot . The channel arises as the product of two effects assumed independent, namely,path loss (denoted by ) andshort-term fading (denoted by ), that is, . The path loss is a function of the distance between the transmitter-receiver pair. Typically, the distance between transmitter and receiver changes very slowly with respect to the signal bandwidth. Hence, we assume that the path loss is constant from slot to slot. On the contrary, depends on the scattering environment around the user and changes in time depending on the channel Doppler bandwidth. We assume that changes from slot to slot and is i.i.d. across both users and slots. This is referred to as the block fading model [28]. Let (, resp.) denote the received (transmitted, resp.) energy from user in slot . Then, . Note that the channel is given in terms of energy attenuation. Let . Note that the fading for users is not symmetric. The distribution of pathloss for a randomly placed user is denoted by , that is, where is a generic r.v. indicating the pathloss of a randomly placed user. Note that depends on the distribution of the users' placement and the path loss function. Also, let denote the short-term fading distribution, that is, for every user and slot . Let denote the noise power spectral density.

Definition 2.1 (scheduling policy).

A scheduling policy is an algorithm that in each slot determines the rate vector and serves each user with rate .

We assume that the perfect CSI is available at the transmitters and the receiver in every slot . Thus, a scheduling policy may adapt to the channel state.

Now, we discuss the energy allocation for each user in order to achieve the desired rates . Fix an energy allocation given by a vector , where denotes the energy of the user. The capacity region of the Gaussian multiaccess channel with the time invariant fading for the energy allocation is the set of rate vectors that satisfy [29]

(2)

for every . The rates are achieved with the standard random Gaussian codebook with variance for user . The signaling is as follows. All the users transmit simultaneously and the receiver decodes successively in the decreasing order of the channel states . From this result, it is straightforward to see that a given rate vector is feasible with energy allocation in Gaussian multiaccess channel with fading if and only if (iff) there exists a permutation of such that for every

(3)

Note that there may exist many energy allocations that can realize the rate vector . Since we aim to obtain energy efficient strategies, we seek an optimal energy allocation that minimizes the sum energy while achieving the desired rates. Such energy allocation can be explicitly obtained as follows [1]. Let denote the permutation such that . Then, the optimal energy allocation is given by

(4)

for every . Note that for the optimal signaling, the successive decoding order depends only on channel gains, but not on rates. For convenience, from now on, we considered users to be indexed according to the ordering. We assume that once a scheduling policy determines the rate allocation, the corresponding power allocation is done as per (4).

We consider three performance measures, namely, stability, energy efficiency, and delay. Next, we formally define these.

Definition 2.2 (busy period).

A busy period for user is the set of consecutive slots in which its queue length is greater than zero.

Definition 2.3 (stability).

Let denote the length of the busy period of user . The system is said to be strongly stable if for every user ,

(5)

Strong stability, as defined here, guarantees that each user has a bounded average per-packet delay.

Definition 2.4 (energy efficiency).

We define the energy efficiency in slot as

(6)

Then, the energy efficiency is defined as

(7)

The energy efficiency measures the average transmitted energy the system uses per each transmitted bit.

Definition 2.5 (user delay).

Delay for the arrival of user (denoted by ) is the number of slots between its departure and arrival. The delay for user is then defined as the limiting average of per-arrival delays

(8)

We augment the notation to denote the dependence of various quantities on the scheduling policy by using as a superscript, for example, will indicate the delay for user under policy .

3. Opportunistic Superpositioning ()

The scheduling policy is parametrized by a variable . To specify this dependence, we denote the OSP scheduling policy as . The scheduling decisions are taken as follows in every slot .

(i)Select all users such that .

(ii)Allocate rate to each of the chosen users so that everything in its buffer is served, for others.

Note that (OSP) selects users based on and not on . This is for the reasons of fairness as has the same distribution for every user, while the distribution of depends on the distance of user from the base station and is biased towards stronger channels the closer the user is to the base station. Moreover, since the pathloss is constant for each user, it suffices to determine rate allocation in each slot depending only on short-term fading which is time varying, and thus, unlike pathloss, provides diversity which can be exploited.

We refer to as opportunism threshold as it dictates how opportunistic OSP is in exploiting the channel diversity. The opportunism threshold plays a key role in determining delay and energy consumption in the system. We intuitively explain how. Note that appropriate choice of allows for eliminating users that are in deep fade in a given slot. Typically, a few users with a very bad channel dominate the total energy consumption in the system for the delay-limited schemes. Thus, even a small value of the opportunism threshold should significantly improve energy efficiency of the system. Specifically, we can expect the energy consumption to decrease monotonically with an increase in . But, note that as increases, each user is scheduled less frequently. Thus, for satisfying the rate requirements, the rate given to the scheduled users increases monotonically with . And providing the higher rate requires higher energy. In fact, for fixed noise power spectral density, the required energy increases exponentially with an increase in the rate. Summarizing, the opportunism threshold in OSP allows us to save energy by eliminating the users in deep fade but requires higher energy to serve scheduled users. Thus, it is not clear if the opportunism threshold should improve the system performance. It, however, turns out that the energy consumption of OSP decreases monotonically as a function of . In other words, the energy savings caused by eliminating the worst users is more than the increase in the energy consumption to provide the higher rates to the scheduled users.

As discussed above, the users are scheduled less frequently by OSP when is large. So, clearly, the delay increases monotonically with an increase in . Thus, the opportunism threshold provides a way to achieve delay-energy tradeoff. Now, the main challenge is to quantify the delay and energy of OSP as a function of , so as to choose the optimal that guarantees the required delay while minimizing the energy.

4. Analytical Guarantees

In this section, we obtain analytical guarantees for . In Theorem 4.1, we show that is strongly stable and has a finite average busy time. This results leads to Corollary 4.2, where we quantify the user delay under the proposed scheduler . In Theorem 4.5, we quantify the asymptotic energy efficiency of . In Theorem 4.6 we show that the asymptotic energy efficiency of decreases monotonically with . In Section 4.1, we provide a demonstration of the results using important special cases and provide connections to recent results in the literature. Therein we provide Corollary 4.8, where we show that as delay grows without bound, the energy required to stabilize the system becomes equal to the minimum energy required to provide the desired rates to each of the users in long term. Finally in Section 4.2, we discuss the implications of the analytical results.

First, let .

Theorem 4.1 (strong stability).

For every such that , is strongly stable w.p.1.

Proof.

Fix any user . Since is a sequence of i.i.d. random variables, the user is scheduled is each slot w.p. under . Moreover, each time the user is scheduled, serves everything in its buffer. Also, since the arrivals are i.i.d. in slots, clearly, the busy periods are geometrically distributed i.i.d. random variables with mean . Thus, by the Strong Law of Large Numbers (SLLNs) for

(9)

Now, the result follows from Definition 2.3 as .

Corollary 4.2 (user delay).

The delay for any user under is

(10)

Proof.

Because the arrival and transmission of each packet are mutually independent, and these are independent from the arrivals and transmissions of other packets, we can, without loss of generality, consider the delay of each packet separately. Conditioned on the arrival time, the waiting time follows the same geometric distribution as the busy time, and the SLLN proof of Theorem 4.1 applies to user delay directly.

Note.

Users' delays do not depend on the distribution of their arrival processes given that the mean is finite. Moreover, the delays for the users are not correlated. Thus, for a given , users may have different distributions for their respective arrival processes and yet receive the same delay as long as these processes are independent. Furthermore, user's delay guarantee is independent of the number of users in the system.

Let denote the fading distribution of user who is randomly placed in a cell given that , that is, , where is an r.v. denoting the path loss of a randomly placed user . Note that does not depend on time as the short-term fading is i.i.d. across the slots. Now, let denote the set of users that are chosen for service under in slot such that their channel gains are less than or equal to , that is, . Clearly, denotes the set of all the users chosen by in slot . Let denote the cardinality of .

Next, we obtain the energy efficiency of in the asymptotic case when , where the system exhibits a self-averaging behavior, and the required energy to support the traffic demand converges to a deterministic limit. Intuitively, this is due to the random processes of the asymptotically large system behaving deterministically according to their limiting probabilistic behavior, the distributions. Before we proceed, however, we first state two results that we use to prove the required. The first lemma shows how the sum rate of a set of users chosen by , having a channel state not larger than , converges asymptotically to a limit. The second lemma shows how the rate of any arbitrary user selected by asymptotically vanishes.

Lemma 4.3.

For every ,

(11)

Proof.

The proof is presented in Appendix .

Lemma 4.4.

For every and ,

(12)

Proof.

The proof is presented in Appendix .

Theorem 4.5 (energy efficiency).

Asymptotically, that is, as , the under policy is given by

(13)

Proof.

Fix arbitrary slot . We show that under , is the same in every slot as . So, for convenience, we drop in the notation.

Now, from (4) and Definition 2.4, it follows that

(14)

Since is a continuous function, Lemma 4.3 implies that there exists a sequence of nonnegative r.v.'s independent of such that w.p.1, and

(15)

Thus from (14) and (15),

(16)

Now, by Lemma 4.4, we conclude for a large enough that the cost of providing user with rate approaches

(17)

Note that the approximation becomes tighter for larger . Thus,

(18)

Let us consider the following term in (18):

(19)

Similarly,

(20)

The first expectation in (19) and (20) is with respect to the distribution , while the second is with respect to the distribution of the arrival process. The relations (19) and (20) hold because the channel gains 's of the chosen users can be viewed as i.i.d. variables drawn from the distribution . This can be seen as follows. Since 's are i.i.d. irrespective of the distance between the user and receiver, the scheduling decision can be viewed as scheduling each user w.p. independently. Since the users are placed at random, is a deterministic function of distance, and and are independent, we conclude that 's for the chosen users are i.i.d. and each is distributed as . Thus, is an i.i.d. sequence. Thus, from (19) and (20), we have

(21)

Thus the required follows from Definition 2.4.

Note.

The energy efficiency does not depend on the distribution of the users' arrival processes but depends only on the mean as long as the processes are independent and have all the moments finite. Next we will show that the energy efficiency behaves monotonically with respect to the opportunism threshold and provide a result for the rate of energy decrease with the threshold.

Theorem 4.6 (monotonicity of energy efficiency).

Asymptotically, that is, as , for every ,

(22)

Moreover, the decrease in energy efficiency is . Specifically,

(23)

First, we provide the intuition behind the result and then provide the proof.

Intuition

Note the following property of the function. Let denote any sequence of nonnegative real numbers and let be any constant. Then,

(24)

Thus, under simultaneous transmission and successive decoding, we obtain

(25)

where denotes the rate requirement of user in slot and denotes the number of scheduled users scheduled under .

Thus, from (25) we conclude that if the sum rate to be provided is the same, then the required sum received energy at the receiver remains the same and is independent of the individual rates. Now, note that the sum rate to be provided in every slot under is asymptotically, that is, as , equal to for every . This can be seen as follows:

(26)

Alternatively, one can apply Lemma 4.3 with . The converse of this result is naturally, that in the case of finite the required rate served by the system is a random variable. From the above it follows that asymptotically the required sum received energy under is the same in every slot independent of . Now, the required sum transmit energy depends on the channel states. Since increases, only the users with a larger channel gains are selected, we intuitively expect the sum transmit energy required to achieve the given sum received energy to decrease monotonically. Now, we prove Theorem 4.6. First, we state a lemma that we use to prove the theorem.

Lemma 4.7.

Let denote an ordered countable set of users, where the ordering is as per fading, that is, whenever . Let and denote two different rate requirement vectors satisfying

(27)

Moreover, let and denote the energy allocation as per (4) to realize and , respectively. Then, .

Proof.

The proof is presented in Appendix .

Now, we prove Theorem 4.6.

Proof.

Let us consider two identical copies of a sample path; that is, arrivals and fading for each of the users are the same in every slot. On the first sample path, the users are served as per , and on the second they are served as per , where . Note that for every , and , as implies .

Now, fix and and define . Moreover, let and . Now, we show that for every , it holds that . By Lemma 4.3, and w.p.1 as . Moreover, for a randomly placed user , for every whenever . Thus, by the monotonicity of the probability measure, for every . Thus, as , on any nontrivial sample path. Thus, monotonicity property follows from Lemma 4.7 as is arbitrary.

Now, we show the first inequality in (23). The inequality follows by observing that the fading of every chosen user satisfies . We consider energy allocation with these worse fading states for every chosen user. Now, observe that with this modified fading process, the randomness remains only in the pathloss . Hence, the required follows using exactly the same arguments as that in Theorem 4.5. We, however, would like to mention that the inequality does not follow from the expressions stated in the statement of Theorem 4.5 as there the users are ordered as per which may be different than that as per the pathloss considered here. Now, the second inequality in (23) follows by observing that for every in the first inequality in (23).

4.1. Example Channels

In Theorems 4.1 to 4.6, we have not assumed anything about the distribution of . Now, let us consider an important special case where has infinite support. This assumption holds for many distributions used to model multipath effects, for example, Rayleigh, Rician, and Nakagami fadings. Note that as (equivalently, as delay goes to ), opportunism threshold . Thus, from Theorem 4.6,

(28)

The relation (28) holds for any with unbounded support. Though the minimal value is 0 in all the cases, the delay-energy tradeoff, that is, how quickly energy approaches the minimum when the delay is increased, depends strongly on the distribution. It can be easily seen that if the tail of the distribution is heavy, then the delay increases at a smaller rate as increases significantly with the increase in the delay. On the contrary, if the tail is lighter, the energy decreases at a slower rate with the increase in the delay. We explain this by considering a special class of distributions parametrized by . Fix and define for and otherwise. Note that determines how fast the tail of the distribution diminishes, for example, as increases the tail diminishes faster. For this distribution, clearly, delay . Thus, when the energy is within of the minimum, which is zero as has unbounded support, the delay is . If we pick , then the delay is , that is, the delay increases at rate strictly smaller than . Constrast this with the delay-energy tradeoff obtained in [22]. In [22], Neely considers a model in which the fast fading is modelled as a Markov Chain (MC) with finite state space. In these settings, Neely shows that the delay is at least of the order of when the energy is in the order neighborhood of minimum energy required for the stability. Note that the result holds for any transition probability matrix, and hence the steady-state distribution of the MC is used to model the fast fading. But, we have shown that the result of [22] does not hold when the fast fading distribution has unbounded support.

In the following result, we show that becomes energy optimal as the delay goes to infinity. From the above discussion it should be clear that becomes energy optimal as the delay goes to infinity when has unbounded support. Hence, we only focus on the case where is supported on a compact set. Let denote the supremum of the support.

Corollary 4.8 (energy optimality).

Let the short-term fading distribution be supported on the interval . As the number of users goes to infinity, for every policy ,

(29)

Moreover,

(30)

Thus, becomes asymptotically energy optimal as delay goes to .

Proof.

The relation (29) follows by observing that for user , for every . Thus, the minimum sum energy required to support rates for each user when fading is in every slot provides a lower bound on the sum energy required to support the same rates with fading process . Now, as shown in [1], optimal energy allocation in the multiaccess channel is given by (4). Now, the relation (29) follows using the arguments similar to those in Theorem 4.5, where fading process is now given by for every . Now, the relation (30) follows by taking the limit in (23), implying delay , thus yielding (30).

4.2. Discussion on Analytical Results

Corollary 4.2 states that if the delay of has to be provided, then the policy can achieve it with any satisfying . Now, Theorem 4.6 states that choosing the largest such that minimizes the system energy while providing the required delay when the number of users is large. Moreover, Theorem 4.5 quantifies the energy efficiency of the system for the given value . Note that Corollary 4.2 and Theorems 4.5 and 4.6 together quantify the delay-energy tradeoff in the multiaccess channel. Finally, Corollary 4.8 proves the energy optimality of as the delay goes to . Moreover, Theorem 4.6 shows that the decrease in energy efficiency with is at least linear. Thus, given any value of energy greater than the minimum energy required to guarantee the rates to each of the users, there exists such that provides the desired rate to each user while maintaining the required sum energy below .

Caution has to be exercised while interpreting Corollary 4.8 as the limits are taken in two parameters, namely, the number of users and the user delay (equivalently, or ). Thus, the resulting limiting value depends on the relative rates at which these two parameters approach their respective limiting values. In Corollary 4.8, we first let and subsequently, let . In other words, and approach their respective limiting values, while is . This can be clearly seen in (30) as we still see the superpositioning gain apparent in the term as the optimal scheduling can take advantage of the variations in the pathloss values of different users. But, if we let and , while ensuring , then exactly one user will be scheduled under for sufficiently large . As a result, the superpositioning gain disappears. Thus, a question arises whether the energy optimality of depends upon the relative rate at which and approach their respective limits. Before answering this question, let us look at the lower bound (29). Note that this bound is tight if we split each of the users in different users (logical group) with the same pathloss, but i.i.d. short-term fading, and let these users in a single logical group collectively desire the rate , then let . Note that as , in each of the logical groups there exists a user with short-term fading and scheduling such users from each of the logical groups at the rate simultaneously minimizes the sum energy required to achieve the desired rates. Thus, in this setting, the actual number of users, accounting for each user as different users, goes to at rate and not at . This shows that the tight lower bound also depends on the rate at which . Thus, for a fair comparison, the users in a logical group should scale at the rate . With these scaling laws the optimality of should hold. Indeed, it can be shown that in a special case , while and , the lower and upper bounds both equal w.p.1. Note that this value corresponds to scheduling a single user with the best short-term fading value, which equals as , in every slot.

5. Generalizations

Now, we discuss two important generalizations. First, we consider the system with multiple nonoverlapping bands. The required rate can be split over these bands. In Section 5.1, we discuss how the results in Section 4 can be generalized to this case. Second, we consider a case when the users need different delays. This is the case, when various types of applications are supported on a multiaccess channel, or when the multiaccess channel serves as an intermediate hop on the multiple hops traveled by the application in the network. In Section 5.2, we discuss how OSP can support this.

5.1. Multiband Multiaccess Channel

We consider multiaccess channel with bands. We assume that the fading on these bands is statistically independent. Let denote the short-term fading for user on subband. Now, it is not immediately clear how the required rate should be split on the various bands in order to minimize the sum energy. But, fortunately, it has been shown that to minimize the sum energy required to realize a given rate vector on the multiband multiaccess channel, the total rate for a user should be supported on its best channel [7]. Let . Thus, has to be defined in terms instead of ; that is, selects all the users with and provides the required rate on the best channel for every user. Now, Theorem 4.1 and Corollary 4.2 hold with . In Theorem 4.5, the energy efficiency becomes

(31)

where denote the fading distribution of user who is placed uniformly at random in a cell given that . The additional factor of appears because only fraction of scheduled user transmit on a given band. Finally, Theorem 4.6 and Corollary 4.8 hold with replaced by .

5.2. Delay Differentiation

The users are divided into classes based on their delay requirements. Let represent the fraction of users that want delays respectively. Let be the largest real number that satisfies for every . Now, OSP can use instead of for users of class . Clearly, Theorem 4.1 and Corollary 4.2 hold with for every . Moreover, energy efficiency of each class can be computed along the similar lines as the proof of Theorem 4.5. Now, the energy efficiency for the system is the weighted sum (with respect to 's) of the energy efficiency of each class. Finally, Theorem 4.6 and Corollary 4.8 can be shown to hold for each class individually. Since, the system energy efficiency is the convex combination of the energy efficiencies of the classes, Theorem 4.6 and Corollary 4.8 follow for the whole system.

6. Numerical Examples

We consider an example system where users are placed uniformly at random in a cell except for a forbidden region with radius around the access point. The path loss exponent is two (). All users experience short-term fading with exponential energy distribution with mean one on each of the ten () independently fading bands. The explicit mathematical formulations for the channel models can be found in Appendix . The path loss model is normalized to unity at cell edge, so that the results should be normalized with a corresponding factor. This, however, has no effect on the relative numerical results, nor on the delay-energy tradeoff we report.

Figure 1 demonstrates the delay energy tradeoff exhibited by OSP. For an increase in average delay from one to three slots, an energy saving of over 3 dB is gained. Thus, even the small delay tolerance of the application can be exploited to obtain significant improvement in the energy efficiency of the system. In terms of the sensor network application provided for motivation in Section 2, this would mean the halving of the transmitted energy by buffering of a few of the most recent samples. Moreover, the energy required to support the given rate decreases monotonically as delay increases, which verifies Theorem 4.6. Note that the gain exhibits very similar behavior across various spectral efficiencies. This implies that one can use a uniform threshold over a wide range of system configurations having different spectral efficiences, while maintaining a close to optimal efficiency.

thumbnailFigure 1. Total transmitted energy as a function of delay.

Figure 2 provides a comparison between OSP and PFS. The mathematical expressions for computing the energy efficiency () of PFS can be found in [7, Theorem ] and are given in Appendix E for completeness. In the delay-limited case with the strict delay constraint of a single slot (i.e., ), OSP can outperform PFS only at high spectral efficiencies. However, as delay tolerance of the application increases, OSP can outperform PFS over a wider range of spectral efficiencies. Also, the improvement in the energy efficiency of OSP over that of PFS increases monotonically with an increase in the delay tolerance. Note that the improvement happens while guaranteeing a required rate for each user, which is not the case for PFS. A notable feature of OSP is that changing the opportunism threshold results in an approximately horizontal shift of the performance curve, which again indicates that the energy-delay tradeoff behaves in a similar manner for a wide range of system spectral efficiencies.

thumbnailFigure 2. Comparison between PFS (dashed) and OSP (solid line).

An empirical verification for the convergence of the system energy can be found in Figure 3, where the smallest and largest empirically found energy efficiencies of an ensemble of 1000 simulated systems are reported. Each system has a different random pathloss vector. The system employs hard fairness, that is, it does not allow for delay, and data is assumed to arrive at users' transmit buffers in each slot. The extreme energies converge towards the asymptotic at as the user population grows.

thumbnailFigure 3. Empirical convergence of extremes with a finite number of users.

Figure 3 indicates that the system energy efficiency deviates from asymptotic behavior at high spectral efficiency and with a small number of users. This behavior is due to the following. With a finite number of users, the transmitted rate is no longer deterministic as in the asymptotic case. Instead, the number of simultaneously scheduled users and their buffer lengths vary from slot to slot. This results in energy loss due to the convexity of the exponential rate-energy function in (4). Since the rate-energy function has the spectral efficiency as a multiplicative factor in the exponential, the loss is greater at high spectral efficiency.

7. Conclusions

We showed that by opportunistically choosing a suitable fraction of users with the best channels in each slot, we can improve the energy efficiency of the system while providing the required delay to each user. Since the policy empties the scheduled users' queues, it has good stability properties. We showed that the expected user delay is inversely proportional to the scheduling fraction. Delay can then be adjusted simply by choosing an appropriate opportunism threshold, while delay differentiation can be achieved by applying different thresholds for different delay classes. Moreover, if the application does not need any delay guarantees, then OSP can achieve any required energy efficiency () while maintaining system stability. The scheme performs well compared to PFS, while providing rate guarantees.

Acknowledgments

The work of P. Chaporkar was supported by ERCIM Fellowship and the work of K. Kansanen and R. R. Müller by the Research Council of Norway (NFR) under the NORDITE/VERDIKT programme (NFR Contract no. 172177). The authors wish to acknowledge Mr. Majid Butt for providing part of the numerical results. Parts of this paper were presented in The 3rd workshop on Resource Allocation in Wireless Networks (RAWNET 2007), April 16th, Limassol, Cyprus.

References

  1. DNC Tse, SV Hanly, Multiaccess fading channels-part I: polymatroid structure, optimal resource allocation and throughput capacities. IEEE Transactions on Information Theory 44(7), 2796–2815 (1998). Publisher Full Text OpenURL

  2. SV Hanly, DNC Tse, Multiaccess fading channels-part II: delay-limited capacities. IEEE Transactions on Information Theory 44(7), 2816–2831 (1998). Publisher Full Text OpenURL

  3. P Bender, P Black, M Grob, R Padovani, N Sindhushayana, A Viterbi, CDMA/HDR: a bandwidth-efficient high-speed wireless data service for nomadic users. IEEE Communications Magazine 38(7), 70–77 (2000). Publisher Full Text OpenURL

  4. DNC Tse, Multiuser diversity through proportional fair scheduling. Proceedings of the Communication Theory Workshop (CTW '01), May 2001

  5. EA Jorswieck, A Sezgin, X Zhang, Throughput versus fairness: channel-aware scheduling in multiple antenna downlink. EURASIP Journal on Wireless Communications and Networking 2009 (2009)

  6. P Viswanath, DNC Tse, R Laroia, Opportunistic beamforming using dumb antennas. IEEE Transactions on Information Theory 48(6), 1277–1294 (2002). Publisher Full Text OpenURL

  7. G Caire, RR Müller, R Knopp, Hard fairness versus proportional fairness in wireless communications: the single-cell case. IEEE Transactions on Information Theory 53(4), 1366–1385 (2007)

  8. TE Klein, KK Leung, H Zheng, Improved TCP performance in wireless IP networks through enhanced opportunistic scheduling algorithms. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '04), November 2004, Dallas, Tex, USA 5, 2744–2748

  9. MA Khojastepour, A Sabharwal, Delay-constrained scheduling: power efficiency, filter design, and bounds. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), March 2004, Hong Kong 3, 1938–1949

  10. MA Zafer, E Modiano, A calculus approach to minimum energy transmission policies with quality of service guarantees. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA 1, 548–559

  11. G Caire, G Taricco, E Biglieri, Optimum power control over fading channels. IEEE Transactions on Information Theory 45(5), 1468–1489 (1999). Publisher Full Text OpenURL

  12. E Uysal-Biyikoglu, A El Gamal, On adaptive transmission for energy efficiency in wireless data networks. IEEE Transactions on Information Theory 50(12), 3081–3094 (2004). Publisher Full Text OpenURL

  13. W Chen, MJ Neely, U Mitra, Energy efficient scheduling with individual packet delay constraints: offline and online results. Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), May 2007, Anchorage, Alaska, USA, 1136–1144

  14. W Chen, U Mitra, MJ Neely, Energy-efficient scheduling with individual delay constraints over a fading channel. Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '07), April 2007, 1–10

  15. R Cheng, S Verdú, Gaussian multi-access channel with ISI: capacity region and multi-user waterfilling. IEEE Transactions on Information Theory 39, 773–785 (1993). Publisher Full Text OpenURL

  16. W Yu, W Rhee, S Boyd, JM Cioffi, Iterative water-filling for Gaussian vector multiple-access channels. IEEE Transactions on Information Theory 50(1), 145–152 (2004). Publisher Full Text OpenURL

  17. J Oh, S-J Kim, JM Cioffi, Optimum power allocation and control for OFDM in multiple access channels. Proceedings of the IEEE Vehicular Technology Conference (VTC '04), 2004, Los Angeles, Calif, USA 60, 774–778

  18. T Michel, G Wunder, Solution to the sum power minimization problem under given rate requirements for the OFDM multipleaccess channel. Proceedings of the Annual Allerton Conference on Communications, Control and Computing, September 2004

  19. DD Yu, JM Cioffi, Iterative water-filling for optimal resource allocation in OFDM multiple-access and broadcast channels. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '06), November-December 2006, 1–5

  20. RA Berry, RG Gallager, Communication over fading channels with delay constraints. IEEE Transactions on Information Theory 48(5), 1135–1149 (2002). Publisher Full Text OpenURL

  21. M Goyal, A Kumar, V Sharma, Power constrained and delay optimal policies for scheduling transmission over a fading channel. Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 1, 311–320

  22. MJ Neely, Optimal energy and delay tradeoffs for multi-user wireless downlinks. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM'06), April 2006, Barcelona, Spain, 1–13

  23. P Chaporkar, S Sarkar, Stable scheduling policies for maximizing throughput in generalized constrained queueing systems. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006, Barcelona, Spain, 1–13

  24. M Neely, Energy optimal control for time varying wireless networks. Proceedings of the Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05), March 2005, Miami, Fla, USA

  25. AL Stolyar, Maximizing queueing network utility subject to stability: greedy primal-dual algorithm. Queueing Systems 50(4), 401–457 (2005). Publisher Full Text OpenURL

  26. P Chaporkar, K Kansanen, RR Müller, Power optimal scheduling for guaranteed throughput in multi-access fading channels. Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), June 2007, Nice, France, 2961–2965

  27. N Jindal, S Vishwanath, A Goldsmith, On the duality of Gaussian multiple-access and broadcast channels. IEEE Transactions on Information Theory 50(5), 768–783 (2004). Publisher Full Text OpenURL

  28. E Biglieri, J Proakis, S Shamai, Fading channels: information-theoretic and communications aspects. IEEE Transactions on Information Theory 44(6), 2619–2692 (1998). Publisher Full Text OpenURL

  29. TM Cover, JA Thomas, Elements of Information Theory, 2nd edn. (John Wiley & Sons, New York, NY, USA, 2006)

  30. G Shorak, J Wellner, Empirical Processes with Applications to Statistics (John Wiley & Sons, New York, NY, USA, 1986)

  31. W Feller, An Introduction to Probability Theory and Its Application (John Wiley & Sons, New York, NY, USA, 1961)

Appendices

A. Proof of Lemma 4.3

Proof.

First, we show that for every and

(A1)

If lies below the support of the result trivially holds as both sides of (A.1) are equal to zero. Hence, we consider in the following.

For a chosen user , the rate is equal to its total buffer occupancy in slot . Under , buffer occupancy in slot is equal to the number arrivals since the last time was scheduled. Let , where . Note that and the fading are i.i.d. across both the slots and users, and they are also mutually independent. So, clearly, are i.i.d. across the chosen users and . Moreover, for a chosen user

(A2)

We then have

(A3)

Note that as for every and and then the first limit converges to , the second to and the last one to . The final relation (A.3) follows as fading and arrivals are independent.

Now, we claim that the channel gains 's for the chosen users can be viewed as i.i.d. variables. Note that if had scheduled users based on rather than on , then for the chosen users would not be i.i.d. as the users that are nearer to the receiver are likely to be favored. Since 's are i.i.d. irrespective of the distance between the user and receiver, the scheduling decision can be viewed as scheduling each user independently w.p.. Since the users are placed at random, is a deterministic function of distance, and and are independent, we conclude that 's for the chosen users are i.i.d. and each is distributed as . Finally, (11) follows from (A.3) using the Glivenko-Cantelli Theorem [30].

B. Proof of Lemma 4.4

Proof.

For simplicity, we prove the required when has finite support, say . Let denote last time before user was scheduled, that is, . Moreover, let for each user . Note that is i.i.d. sequence and for every .

Fix any user , and observe that

(B1)

Next, fix , and consider

(B2)

Since , it follows that

(B3)

Now, the result follows by Borel-Cantelli Theorem [31] as was arbitrary.

C. Proof of Lemma 4.7

Proof.

The proof is by construction. We construct a sequence of rate vectors such that and . Let denote the energy allocation to realize . Then, we show that is a nonincreasing function of , and thus proving the required. The recursive procedure to construct is as follows.

Initialize: .

STEP :

C1. for every ,

C2. ,

C3. .

Note that satisfies for every , and for every . Thus, clearly, . Now, using induction, we prove that for every

(C1)

Note that (C.1) holds for as by initialization. Now, let (C.1) hold for every . We show (C.1) for .

Since (C.1) holds for , we know that

(C2)

This proves (C.1) for every .

Now, we show that is nonincreasing function of . From (4) and (C.1), it is clear that for every . Thus it suffices to consider

(C3)

The last inequality follows as and by suppositions in the lemma.

Now, to prove the required, we need to show that . First, note that if , then the result immediately follows. So, we consider a nontrivial case, . We know that for every , . Moreover, the sequence is monotone. Thus, exists. Moreover, by dominated convergence theorem, we can exchange the limit and summation. Thus,

(C4)

This proves the required.

D. Channel Statistics

Channel state is assumed to remain constant during one transmission slot and assume a new value for each slot independently for all slots and users. We, thus, avoid the dependence on users and time in the following.

Users are placed uniformly on a circular cell. The channel state of each user is the product of two independent ergodic random processes, path loss and short-term fading. Path loss is polynomially dependent on the distance of the user from the access point and is assumed to remain constant for a users across transmission slots. The distance dependency is parametrized by the path loss exponent , usually ranging within the interval [2, 4]. To avoid a singularity for users next to the access point, a forbidden circular region of radius is created around the access point. This model results in the following cumulative distribution of the path loss:

(D1)

Note that the model is normalized to provide unit path loss at cell border. Thus, the results reported here must be rescaled in terms of by a factor of , where denotes the actual radius of the cell. Naturally, since all results behave accordingly, all comparisons remain valid.

The short-term fading process on each band is modeled by a zero-mean Gaussian circularly symmetric random variable (i.e., Rayleigh fading), with an exponentially distributed squared envelope. It assumes a new value for each user in each slot. The multiple bands are assumed independently fading. In each slot, those users whose maximum channel gain (over all channels) are scheduled by OSP on each band, and the cumulative short-term fading distribution is given by

(D2)

where . With some algebra, the cumulative distribution for the (product) channel can be expressed as

(D3)

E. Proportional Fair Scheduling

We follow the approach of [7] in the evaluation. The average spectral efficiency of the system with PFS is given implicitly by [7]

(E1)

where denotes the distribution of the product of the random path loss and the maximum of users' short-term fading coefficients, , and is given by

(E2)

which is identical to (D.3) when , and .