23
Power and Rate Control with Outage Constraints in CDMA Wireless Networks C. FISCHIONE, M. BUTUSSI, AND K. H. JOHANSSON Stockholm 2007 Automatic Control Group School of Electrical Engineering Kungliga Tekniska Hgskolan IR-EE-RT 2006:016

Power and Rate Control with Outage Constraints in CDMA

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Power and Rate Control with Outage Constraints in CDMA

Power and Rate Control with Outage

Constraints in CDMA Wireless Networks

C. FISCHIONE, M. BUTUSSI, AND K. H. JOHANSSON

Stockholm 2007

Automatic Control Group

School of Electrical Engineering

Kungliga Tekniska Hgskolan

IR-EE-RT 2006:016

Page 2: Power and Rate Control with Outage Constraints in CDMA

1

Power and Rate Control with Outage

Constraints in CDMA Wireless Networks

C. Fischione, M. Butussi, and K. H. Johansson

Abstract

We investigate a power control strategy to achieve maximum throughput for the up-link of a CDMA

wireless system with variable spreading factor. The system model includes slow and fast fading, rake

receiver, and multi-access interference caused by users with heterogeneous data sources. The quality of

the communication is expressed in terms of outage probability, while the throughput is defined as the sum

of the users transmit rates. The outage probability is accounted for by resorting to a tight approximation

based on the extended Wilkinson moment matching. A mixed integer optimization problem P1, where

the objective function is the throughput under outage probability constraints, is investigated. Problem

P1 is solved in two steps: firstly, we propose a modified problem P2 to provide feasible solutions, and

then the optimal solution is obtained with a branch-and-bound search. Numerical results are presented

and discussed to asses the validity of our approach.

Index Terms: CDMA, Outage, Distributed Computation, Combinatorial Optimization, Branch-and-Bound Search.

Work done in the framework of the HYCON Network of Excellence, contract number FP6-IST-511368. The work is alsopartially funded by the Swedish Foundation for Strategic Research and Swedish Research Council.

C. Fischione is with the Department of Electrical Engineering and Computer Science, University of California atBerkeley. M. Butussi was with University of Padova, Italy, when this work was done. K. H. Johansson is with theAutomatic Control Lab, School of Electrical Engineering, Royal Institute of Techonolgy, Stockholm, Sweden. E-mail:[email protected], [email protected], [email protected].

Part of this work is accepted for presentation at IEEE ICC 2007.

Page 3: Power and Rate Control with Outage Constraints in CDMA

2

I. INTRODUCTION

In Direct Sequence Code Division Multiple Access (DS-CDMA) wireless systems the transmit

rates can be adapted to channel conditions and traffic load by radio power control, which

keeps multi-access interference (MAI) caused by other co-channel users under acceptable levels.

Maximization of the transmit rate is a major goal in many situations. For instance, the rate

allowed at the physical layer provides a bound to the performance of the Transmission Control

Protocol (TCP), which is widely implemented over wireless systems.

Rate maximization can be cast as an optimization problem, where the objective function is

the sum of the user rates, and the constraints are expressed in terms of the Quality of Service

(QoS) to be guaranteed for each user. First, it is important that QoS constraints are properly

modelled. Second, the QoS models should be allow efficient optimization.

In this paper, we model and solve an optimization problem to maximize the up-link throughput

achievable in CDMA wireless system by power allocation. We express QoS constraints by

outage probability for any user. We provide a detailed overview on existing works in Section II,

and we highlight the original contributions of this paper in Section III. In Section IV, the rate

maximization problem is formulated, and the model is described. The constraints of the problem

are investigated in Section V. In Section VI we propose an approach to solve the optimization

problem. Numerical results are reported and commented in Section VII. Finally, Section VIII

concludes the paper.

II. RELATED WORK

One of the earliest approaches to rate maximization can be found in [1] for a dual-class CDMA

system. Optimal joint rate and power adaptation, subject to peak transmit power constraints,

and a maximum interference constraints, is studied in [2]. Adaptive code rates with multiple

orthogonal codes is considered in [3]. In [4] the power gains achieved by the scheme proposed

in [3] is shown, along with truncated rate adaptation. Extensive studies have been carried out in

the case of down-link throughput maximization and power allocation [5], [6], and [7]. In these

contributions, the goal is the throughput maximization to improve the performance of TCP when

it is employed over wireless channels. Specifically, throughput is studied under joint rate and

power adaptation with bit error rate requirements in a multi-cell VSF (Variable Spreading Factor)

WCDMA system. A dynamic rate variation is achieved by using single-code transmission with

Page 4: Power and Rate Control with Outage Constraints in CDMA

3

a VSF that varies inversely with the transmit rate. A general approach can be found in [8],

where the authors consider a single cell scenario: the constraints on the rates are expressed as

thresholds on the instantaneous minimum Signal to Interference plus Noise Ratio (SINR), under

the assumption of perfect channel estimation.

Another line of research has extended these results on instantaneous and average SINR to

the outage probability of the SINR. The outage probability is an interesting QoS measure for

delay-limited scenarios [9]. The problem of radio resource management under outage constraints

dates back at least to the work presented in [10] (see also [11]). The effects of power control

imperfections on the throughput are investigated in [12]–[14]. Specifically, in [14], the authors

propose a maximization of the system capacity (number of users) under outage requirements.

In [15], the authors considers the throughput maximization including log-normal fading channels.

The outage probability was expressed by a Gaussian approximation. This approach has later been

further developed in [16], where the channel is modelled with Rayleigh fading distributions. Both

in [15] and [16], it is shown that the problems of power minimization under outage constraints,

and the problem of outage minimization under power constraints, can be cast as a geometric

program. Furthermore, they establish an interesting relation of their approach with the Perron-

Frobeniuos theory for the solution of problems with SINR constraints.

One of the most relevant and interesting approaches to the throughput maximization with

outage constraints is investigated in [17]. In that paper, and reference therein of the same authors,

the problem of joint power minimization and multi-user detection is explored. The authors present

a general method to solve efficiently and iteratively the power allocation problem, under some

cases of mixed slow and fast fading. Furthermore, by relaxing the outage constraints with an

upper bound provided by the Jensen’s inequality on the statistical average, the authors are able

to map the outage constraints over the average SINR.

III. MAIN CONTRIBUTION

The main contribution of this paper consists in providing power allocation policies for rate

maximization in CDMA wireless system with outage constraints. First, we adopt a general model

of the SINR, which is representative of mixed slow and fast fading. The model is representative

also of rake receivers with maximal ratio combining commonly employed in CDMA systems.

Our approach can be used even in presence of the power control mechanisms of WCDMA

Page 5: Power and Rate Control with Outage Constraints in CDMA

4

system: a fast inner power control loop and a slow outer loop [18]. The system model includes

VSF under a detailed model of MAI with heterogeneous data sources (video, voice, data, etc.).

We investigate a mixed integer optimization problem P1 which is different from those in the

existing relevant contributions we have mentioned in Section II. In particular, the constraints

on the outage are expressed by resorting to the accurate log-normal approximation in [14] and

[19], which allow us to solve Problem P1 even for low outage probabilities (less than 1%). Our

contribution is original, for example, compared to the interesting works [15] –[17], which are

instead focused on mapping the outage constraint onto the average SINR. They do not include a

detailed model of the MAI and the source behavior. Furthermore, they do not include the general

model of the SINR as we do. We propose a method to solve Problem P1, which is based on

branch-and-bound search. This seems to be unexplored when considering outage constraints in

the general system model we adopt.

IV. SYSTEM DESCRIPTION AND PROBLEM FORMULATION

We consider a system scenario where K mobile users are transmitting toward a Base Station

(BS). Each user j = 1, . . . , K is associated to a traffic source type (voice, video, data, etc.),

employs the same chip time Tc, and transmits with power level Pj . The model of the physical

layer for the up-link of a single-cell asynchronous binary phase shift keying DS/CDMA system

is summarized by the following expression of the SINR [14], [20]:

SINRi(h, ν) =Pihi

N0

2Ti+

∑Kj=1

j 6=i

Pj

Gihjνj

, (1)

where the numerator is the power associated to the useful signal, and the denominator is the power

of the thermal noise plus the MAI. The random variable hj is the channel gain experienced by

the signals of user j. We adopt the Lee and Yeh multiplicative model [21, pag. 91]: hj = ljzjΩj ,

where lj is path loss, zj is the power of the fast fading component, and Ωj is the power of the

shadowing. We consider the Nakagami distribution for the fast fading [21], with correlation 1 and

parameter m, so zj has a Gamma distribution. Note that when m = 1, the fast fading distribution

reduces to a Rayleigh distribution. For any m, zi and zj , i 6= j, are statistically independent.

The shadow fading is expressed by the log-normal model Ωj = exp (ξi), where ξi is a Gaussian

random variable having average µξiand standard deviation σξi

. The random variable ξi may be

Page 6: Power and Rate Control with Outage Constraints in CDMA

5

correlated [22], with covariance Ci,j = E [ξi − E ξi][ξj − E ξj]. The binary random variable

νi indicates the activity status (on/off) of the source. Its probability distribution function is such

that Pr[νi = 1] = αi and Pr[νi = 0] = 1 − αi, where αi is the activity factor of source i. We

use vector notation h = [h1, . . . , hK ]T and ν = [ν1, . . . , νK ]T . Independence is assumed between

any pair of processes of the vectors h and ν. Observe that the SINR model (1) is general, and

takes into account also the rake receiver with Maximal Ratio Combining [23].

Let us model the rate of each user as Ri = Ri0ni, where Ri0 = 1/Ti0 is the basic rate

of user i, with basic bit time Ti0, and ni is an integer denoting the assigned rate. The rate

is assumed to be a power of two due to the spreading code structure [21]. Consequently, the

spreading factors are expressed as Gi = Gi0/ni, where Gi0 = Ti0/Tc corresponds to the basic

rate Ri0. We assume that the users’ power is expressed as Pi = pini, where pi is the power

at the basic rate Ri0 (i.e., when ni = 1). This power model is motivated by the fact that users

requiring larger rates need larger transmit powers, as shown in [14]. This model was adopted

also in [7] (and references therein), where it was observed that it has the advantage of keeping

the bit energy to noise ratio constant with respect to variations of ni. We use the notation

p = [p1, . . . , pK ]T and p−i = [p1, p2, . . . , p(i−1)p(i+1) . . . pK ]T , as well as n = [n1, n2, . . . , nK ]T

and n−i = [n1, n2, . . . , ni−1, ni+1, . . . nK ]T .

We express the problem of rate maximization as an optimization problem where the cost

function is the sum of the user rates, and the constraints are bounds on the maximum value

allowed for the outage probability, transmission powers and rates:

P : maxp,n

1Tn

s.t Pr [SINRi(h, ν) < γi] ≤ Oi , i = 1, . . . , K

nTp ≤ PT ,

pi ≥ pi0 , i = 1, . . . , K

1 ≤ ni ≤ Gi0, ni ∈ N , i = 1, . . . , K

The K size vector 1 is the all-one vector. The decision variables are the powers p and rates n.

The parameter Oi represents the maximum allowed outage probability of the SINR for user i

with respect to the threshold γi. The constraint on the total power PT is motivated by the fact that

Page 7: Power and Rate Control with Outage Constraints in CDMA

6

the receiver input of the BS can receive only a maximum amount of power [14]. For physical

reasons, powers cannot be smaller than a given value pi0. The rate constraint is motivated by

that the spreading factor is Gi = Gi0/ni ≥ 1. Moreover, N ⊂ 2N denotes the set of rates.

Remark 1: We assume that an admission control policy is used (see e.g. [20], [24]), so that

all K users can be accommodated in the system, and an interior point solution of Problem P is

given by the basic powers and rates. Therefore, P is feasible.

Solving Problem P is not easy: firstly, the outage constraints are complicated functions of

the rates and power; secondly, the power constraint PT introduces extra difficulties; thirdly, the

rates are powers of two. We approach these issues in the next sections.

V. OUTAGE PROBABILITY CONSTRAINTS

Knowledge of the outage probability is required to express the first constraint in Problem P .

Such a probability is expressed by the probability distribution function (pdf) of the SINR.

However, the expression of the SINR pdf is in general unknown. The uncertainty concerns

the statistics of the MAI, which are a mixture of the on-off activity of the sources and the

fadings. Consequently, they have to be approximated. We adopt a log-normal approximation of

the SINR pdf. Then the outage probability can be expressed as

pi

Ii(n−i,p−i)≥ γi ∀i = 1, . . . , K , (2)

where Ii(n−i,p−i) is defined as the interference function. In the following subsections, we derive

a formula for Ii(n−i,p−i) and motivate (2).

A. Log Normal Approximation

Let us rewrite the SINR in (1) as follows:

SINRi(h, ν) =zi

Li(h, ν), (3)

where

Li(h, ν) =N0

2piGi0Tc

l−1i exp (−ξi) +

K∑

j=1

j 6=i

pjnj

Gi0pi

l−1i ljzjνj exp (ξj − ξi) . (4)

Page 8: Power and Rate Control with Outage Constraints in CDMA

7

We resort to an accurate approximation of the SINR in two steps. First, we note that (4) is a

combination of log-normal random variables, weighted by one-sided random variables. Thus,

we can use the extended Wilkinson Moment matching method [14], [19], [25] to model (4)

with a log-normal random variable, so that Li(h, ν) ≈ exp (−Xi) , where Xi is a Gaussian

random variable with average µXi(n−i,p) and standard deviation σXi

(n−i,p) we derive in the

following. Notice that this method provides a tight approximation. The resulting SINR is given

by the product of a gamma random variable, zi, times a log-normal one, exp (−Xi). Then, this

product can be well approximated with an overall log-normal random variable, as proposed

in [21, pag. 92]. In summary, we have that

SINRi(h, ν) ≈ exp (Yi) , (5)

where Yi is a Gaussian random variable with average and standard deviation, respectively, as

µYi(n−i,p) = ψ(m) − ln(m) − µXi

(n−i,p) , σ2Yi

(n−i,p) = ζ(2,m) + σ2Xi

(n−i,p)

where ψ(m) is Euler’s psi function, and ζ(2,m) is Riemann’s zeta function, as defined in [21,

pag. 107].

In the following, we discuss how to derive µXi(n−i,p) and σXi

(n−i,p), and their dependence

on the power and rate coefficients. The extended Wilkinson moment matching approximation

in [19] computes the average and variance of Xi as

µXi(n−i,p) = 2 lnM

(1)i (n−i,p) − 1

2lnM

(2)i (n−i,p)

σ2Xi

(n−i,p) = lnM(2)i (n−i,p) − 2 lnM

(1)i (n−i,p) ,

where

M(1)i (n−i,p) , E h,νLi(h, ν) , (6)

M(2)i (n−i,p) , E h,νL2

i (h, ν) , (7)

where we have denoted with E h,ν· the expectation w.r.t. the distribution of h and ν. The

expressions of (6) and (7) can be derived applying the statistical expectation operator to (4),

Page 9: Power and Rate Control with Outage Constraints in CDMA

8

recalling its linear properties, and that the random vectors h and ν are independent:

M(1)i (n−i,p) =

N0

2piGi0Tc

l−1i exp (−µξi

+1

2σ2

ξi)+

K∑

j=1

j 6=i

pjnj

Gi0pi

l−1i ljµzj

zjαj exp (−µξi+ µξj

+1

2σ2

ξi+

1

2σ2

ξj− Cij)

M(2)i (n−i,p) =

K∑

j=1

j 6=i

K∑

k=1

k 6=i,j

pjpknjnk

G2i0p

2i

l−2i ljlkµzj

µzkαjαk·

exp (−2µξi+ µξj

+ µξk+ 2σ2

ξi+

1

2σ2

ξj+

1

2σ2

ξk− 2Cij − 2Cik + Cjk)+

K∑

j=1

j 6=i

p2jn

2j

G2i0p

2i

l−2i l2jρ

2zjαj exp (−2µξi

+ 2µξj+ 2σ2

ξi+ 2σ2

ξj− 4Cij)+

K∑

j=1

j 6=i

N0pjnj

G2i0p

2iTc

l−2i ljµzj

αj exp (−2µξi+ µξj

+ 2σ2ξi

+1

2σ2

ξj− 2Cij)+

N20

4p2iG

2i0T

2c

l−2i exp (−2µξi

+ 2σ2ξi)

In previous expressions, we have denoted with µzjand ρzj

the expectation and the correlation

of zj , respectively, which easily follow from the Nakagami distribution of zj .

With the approximation (5), the SINR in logarithmic units is a Gaussian random variable.

Hence the derivation of the outage probability can be easily accomplished:

Pr[SINRi(h, ν) < γi] = 1 −Q

(

ln γi − µYi(n−i,p)

σYi(n−i,p)

)

, (8)

where Q(x) = 1/√

2π∫ ∞

xe−t2/2dt is the complementary standard Gaussian distribution. From (8),

it is straightforward to show that the constraints on the outage probability in Problem P can be

rewritten asln γi − ψ(m) + ln(m) + µXi

(n−i,p)√

ζ(2,m) + σZi(n−i,p)

≥ qi , (9)

where qi = Q−1(1 −Oi).

Page 10: Power and Rate Control with Outage Constraints in CDMA

9

B. Interference Function

Now, we would like to rewrite (9) in a form that will simply the solving of Problem P . Let

us introduce the following definitions:

M(1)i (n−i,p−i) , piM

(1)i (n−i,p) ,

M(2)i (n−i,p−i) , p2

iM(2)i (n−i,p) ,

µXi(n−i,p−i) , 2 ln M

(1)i (n−i,p−i) −

1

2ln M

(2)i (n−i,p−i) ,

σ2Xi

(n−i,p−i) , ln M(2)i (n−i,p−i) − 2 ln M

(1)i (n−i,p−i) .

By looking at the expressions of (6) and (7), it is easy to see that M (1)i (n−i,p−i) and M (2)

i (n−i,p−i)

are functions neither of pi, nor of ni. Using previous definitions, (9) becomes

ln γi − ψ(m) + ln(m) − ln pi + µXi(n−i,p−i)

ζ(2,m) + σZi(n−i,p−i)

≥ qi ,

from which it follows that

pi exp (qi√

ζ(2,m) + σZi(n−i,p−i) − µXi

(n−i,p−i) − ln γi + ψ(m) − ln(m)) ≥ γi ,

We can define the interference function as

Ii(n−i,p−i) = exp (−qi

ζ(2,m) + σZi(n−i,p−i) + µXi

(n−i,p−i) + ln γi − ψ(m) + ln(m)) ,

(10)

so that it is easy to see that the constraint on the outage probability can be expressed as in (2).

Such an expression allows us to resort to the theory of standard interference function [26] [27],

as we state in the following proposition:

Proposition 1: For any given rate vector n the function

I(n,p) = [I1(n−1,p−1), . . . , Ii(n−i,p−i), . . . , IK(n−K ,p−K)]T

is a standard interference function with respect to p.

Proof: It can be verified by numerical computations that, in the range of parameters of

practical interest, the following properties of the interference function are verified:

1) I(n,p) > 0;

Page 11: Power and Rate Control with Outage Constraints in CDMA

10

2) if p ≤ p then I(n,p) ≤ I(n, p);

3) if c > 1, then cI(n,p) > I(n, cp).

Remark 2: It is possible to show that for any given rate vector p the function

I(n, p) = [I1(n−1, p−1), . . . , Ii(n−i, p−i), . . . , IK(n−K , p−K)]T

is monotone non-decreasing with respect to n.

Proposition 1 and Remark 2 will enable to find candidate solutions for Problem P through

a modified optimization problem. Afterwards, a branch-and-bound search will allow us to find

the optimal solution among the candidate set. We approach these issues in the next section.

VI. OPTIMAL SOLUTION

In previous section, we have characterized the outage probability (10). Now, we include such

an expression in Problem P , which thus can be rewritten as

P1 : maxp,n

1Tn

s.t.pi

Ii(n−i,p−i)≥ γi , i = 1, . . . , K

nTp ≤ PT ,

pi ≥ pi0 , i = 1, . . . , K

1 ≤ ni ≤ Gi0, ni ∈ N i = 1, . . . , K

Problem P1 is difficult to solve because the constraint on the total power prevents to apply

iterative algorithms as in [28] and [26]. However, since the rates vector n belongs to a discrete

set N , combinatorial optimization techniques are a good option for solving Problem P1. Whit

this goal in mind, let us note that (n,p) is the solution of Problem P1 only if the first set of

constraints of P1 holds with equality:

Theorem 1: If the pair (n,p) is a solution of Problem P1, then:

pi

Ii(n−i,p−i)= γi ∀ i = 1, . . . , K . (11)

Page 12: Power and Rate Control with Outage Constraints in CDMA

11

Proof: The proof is given by contradiction. Assume that the pair (n, p) is the optimal

solution of Problem P1 and that it does not satisfy equation (11), it follows that there exist at

least one index j such that pj

Ij(n−j ,p−j)

> γj . Then, there exists pj < pj such that the powers

vector p = [p1, . . . , pj−1, pj, pj+1, . . . , pK ]T fulfils the following equations

pj

Ij(n−j, p−j)>

pj

Ij(n−j, p−j)= γj

pi

Ii(n−i, p−i)>

pj

Ij(n−j, p−j)≥ γi ∀ i 6= j ,

nT p < PT .

Since Ij(n−j,p−j) is not function of the j-th rate, and Ii(n−i,p−i) is a continuous function

with respect to n−i, it follows that there exists nj > nj such that defining the rates vector

n = [n1, . . . , nj−1, nj, nj+1, . . . , nK ]T verifies the equations

pj

Ij(n−j, p−j)= γj

pi

Ii(n−i, p−i)> γi ∀ i 6= j ,

nT p < PT .

Therefore, starting from (n, p) we have found a pair (n, p), with rates vector n > n. This means

the objective function of the new pair is larger than before: 1T n > 1

T n, which is impossible

because we have assumed that (n, p) solves Problem P1.

Previous theorem allows us to rewrite the first constraints of Problem P1 at the equality. From

this, we propose an approach to solve Problem P1 in two steps. Firstly, we find feasible solutions

by a modified problem P2. Secondly, we solve P1 looking at the set of feasible solutions by

branch-and-bound search. We approach these tasks in the following subsections.

A. Modified problem

Let us consider the following definition:

Definition 1 (Feasible Rates Vector): A rates vector n is feasible if there exists a power vector

p such that the pair (n,p) verifies all the constraints of Problem P1.

Page 13: Power and Rate Control with Outage Constraints in CDMA

12

Algorithm 1 Solution of Problem P2.1: t := 0;2: n(t− 1) := 1 ;3: p(t− 1) := 0;4: n(t) := 1 ;5: p(t) := p0 ;6: while ‖p(t) − p(t− 1)‖2 ≥ ε do7: for i := 1 : K do8: pi(t) := Ii(n−i(t− 1),p−i(t− 1))γi

9: end for;10: t := t+ 1;11: end while;

Feasible rates vector for Problem P1 can be found by the solutions of a modified program,

which we define as

P2 : minp

nTp

s.t.pi

Ii(n−i,p−i)= γi , i = 1, . . . , K

pi ≥ pi0 , i = 1, . . . , K

1 ≤ ni ≤ Gi0, ni ∈ N , i = 1, . . . , K

Note that in this problem the decision variable is only p. Consider a pair of vectors p and n

that solve P2. These vectors provide a feasible rate vector for P1 if the cost function is less than

PT . Therefore we can explore the feasibility of a rate vector n just by solving Problem P2.

Problem P2 can be efficiently solved by recalling the properties of the interference function.

Indeed, these properties allow us to use contraction mappings, which give a low computational

cost distributed algorithm that solves Problem P2 by sequences of asynchronous powers (see

e.g. [28, Pag. 431] and [26]). The solution of Problem P2 can be found by applying Algorithm 1.

In the algorithm, p0 is a starting transmit power vector, and ε accounts for the precision of

the solution. Notice that, since the algorithm is an implementation of a contractive mapping,

convergence is ensured.

One could use Algorithm 1 to solve Problem P2 for each possible rate vector in N . Thus, the

rate vector n∗ that solves the Problem P1 could be found using a exhaustive search among all

feasible rate vectors. However, such a technique has large computational costs, as the number

Page 14: Power and Rate Control with Outage Constraints in CDMA

13

of feasible rate vectors may be very high. In the next subsection, we will present some useful

properties of the rate vectors, which together with a branch-and-bound search, allow to find the

optimal solution with reduced computational cost.

B. Branch-and-bound search

In previous section, we have seen that n is feasible if and only if Problem P2 has a solution p,

and a cost function that verifies nT p ≤ PT . Using local knowledge about specific values of n, the

set N can be reduced, namely one can find a set of a smaller size over which perform a search

to the optimal solution. We propose the reduction of N using two criteria. The first uses the

cutting-planes idea [28], whereas the second one is based on considerations about Problem P1.

Specifically, the criteria can be summarized in the following propositions.

Proposition 2: If n is feasible, a pair (n,p) is an optimal solution of P1 only if n ≥ n.

Proof: The simple proof is by contradiction. Assume that n < n. Since n is feasible it

follows that there exists a vector p such that (n, p) verifies all the constraints of the Problem P1.

But since n < n, then the cost function associated to the pair (n, p) is larger than the cost function

of (n,p), and then (n,p) cannot be a optimal solution of Problem P1.

Using Proposition 2 it follows that, if we find a feasible rate vector n the search of optimal

solution can be restricted to the set NΣ ⊂ N , where

NΣ(n) = N \ n such that n ≤ n . (12)

Proposition 3: If n is infeasible, then any n such that n ≥ n is infeasible too.

Proof: If n is not feasible, then there is no p such that the pair (n,p) verifies all constraints

of Problem P1. Let us study the cases for each constraint.

Consider the case when n does not verify the first constraint of Problem P1, then there is not

any p such that the pair (n,p) verifies such constraint. Indeed, since for any n ≥ n we have

that Ii(n−i,p−i) ≤ Ii(n−i,p−i) ∀p it follows that also for any n there is not any p so that n

verifies the first constraint.

Consider the case when n does not verify only the second constraint of Problem P1 for any

p. Assume by contradiction that there is n ≥ n which verifies the second constraints of P1, i.e.

nTp ≤ PT ≤ nT p. Then, the power vector p that solves P2 must be less than p, since n ≥ n

and nTp ≤ nT p. Now, since the first constraints of P1 are verified at the equality, we have that

Page 15: Power and Rate Control with Outage Constraints in CDMA

14

Ii(n−i,p−i) ≤ Ii(n−i, p−i), and recalling that the interference function is not decreasing with p

(given n), it follows that Ii(n−i, p−i) ≤ Ii(n−i,p−i) ≤ Ii(n−i, p−i), but this is a contradiction,

since we have that Ii(n−i, p−i) ≤ Ii(n−i, p−i), while we assumed that n ≥ n and the interference

function is not decreasing with n, (given p).

Consider the case when n does not verify the fourth constraint of Problem P1, then it obviously

follows that the same constraint is not verified for any n such that n ≥ n. This concludes the

proof.

Previous proposition allows us to say that if n is infeasible, then the set N can be reduced

by defining a set of infeasible solutions NI ⊂ N according to the following rule:

NI(n) = N \ n such that n ≥ n . (13)

In practice, Propositions 2 and 3 are useful to reduce the set of feasible rates by using a

neural network architecture, where computation and information distribution is optimized. In the

following, we define the neural network and how to use it to compute the optimal solution of

Problem P1.

We model a neural network by using an oriented graph. First, let us introduce an equivalent

representation of the vector n. Since ni = 2ri , ri ∈ N, we define the vector r with elements ri

and collect all vectors r in the set Rg, namely

Rg = r = [r1, . . . , rN ]T | ri ∈ N and 1 ≤ ri ≤ gi .

where gi is such that 2gi = G0i. Using such a vector, we define the following oriented graph:

Definition 2 (Rate Graph): The Rate Graph is an oriented graph G = (Rg, E) where Rg is

the set of nodes and E ⊂ Rg ×Rg is the set of oriented edges with (r, r) ∈ E if ‖r − r‖1 = 1

and ‖r‖1 < ‖r‖1.

The Rate Graph is a structure over which branch-and-bound distributed techniques can be

implemented. Indeed, an efficient algorithm can be implemented so that a graph’s node is able

to evaluate its own feasibility solving Problem P2 for its associated rate vector. In particular,

node r computes its own feasibility function:

f(r) =

1 if solving P2 r is feasible

0 otherwise.

Page 16: Power and Rate Control with Outage Constraints in CDMA

15

Algorithm 2 Branch-and-bound Search1: k := 0;2: Pick any A(k) ⊂ Rg;3: S(k) := Rg \ A(k);4: D := ∅;5: for any r ∈ A(k) do6: if f(r) = 1 then7: D := D ∪ r ∪ B(r);8: else9: D := D ∪ r ∪ F(r);

10: end if;11: end for;12: S := Rg \ D;13: A(k + 1) := ∅;14: for any r ∈ A(k) do15: if f(r) = 1 then16: A(k + 1) := A(k + 1) ∪ [S ∩ B(r)];17: else18: A(k + 1) := A(k + 1) ∪ [S ∩ F(r)];19: end if;20: end for;21: if A(k + 1) 6= ∅ then22: k = k + 1;23: go to step 5;24: else25: the search of the optimum is concluded;26: end if;

Each node sends the result of the feasibility function to its adjacent nodes, and, by exploiting

Propositions 2 and 3, this information exchange reduces the set of possible solutions, without

the need to solving Problem P2 for all possible rate vectors in Rg. Specifically, let us introduce

the definition of forward and backward nodes:

Definition 3 (Forward and Backward Nodes): Given a Rate Graph G and a node r ∈ Rg, the

set of Forward Nodes F(r) ⊂ Rg and Backward Nodes B(r) ⊂ Rg are defined, respectively, as:

F(r) = r ∈ Rg|(r, r) ∈ E ,

B(r) = r ∈ Rg|(r, r) ∈ E .

The branch-and-bound search is described in Algorithm 2. According to Algorithm 2, the graph

Page 17: Power and Rate Control with Outage Constraints in CDMA

16

nodes are split in three sets:

A : Active Node Set. It is the set of the nodes that are computing their own feasibility.

S : Stand-By Set. It is the set of the nodes that are waiting to compute their own feasibility.

D : Deleted Node Set. It is the set of the nodes that are deleted from the graph. A node

can be deleted from the graph by itself, if it has already computed its feasibility, or by

other nodes coherently to Propositions 2 and 3.

Lines 1–4 initialize the algorithm. In particular, defines A as any set in Rg (line 2). Then, define

S as the complementary of A, and D as the empty set (lines 3 and 4). Now, any feasible active

node in B(r) has an objective function of Problem P1 smaller than node r. From Proposition 2,

such nodes cannot improve the solution, then they are put in the deleted node set D graph (line

7). Furthermore, each active node which is not feasible has forward nodes clearly not feasible,

since nodes in F(r) have higher rates and Proposition 3 applies. Such nodes are put in the

deleted node set D (line 9). Next, nodes in D are removed from the graph, and a stand by node

set is defined in line 12. Now, a new set of active nodes has to be defined for the time step k+1

(line 13). All nodes who are in the stand-by set and are forward nodes of a feasible node, are put

in the active set at time k+ 1 (line 16), as they may exhibit a larger cost function. Furthermore,

all nodes who are in the stand-by set and are backward nodes of an infeasible node, are put

in the active set at time k + 1 (line 18). Indeed such nodes may be feasible, since they have a

reduced cost function. It is easy to see that this procedure is repeated until at the time k the

active set is emptied, when all (few) nodes in the set A(k − 1) are candidate to provide the

optimal solution of Problem P1. Note that Propositions 2 and 3 play a major role in lines 14–20,

since they avoid the computation of the solution of Problem P2 for any possible rate vector.

By applying Algorithm 2, we are able to find the exact solution of the optimization Problem P1,

since we reduce the set of candidate rate vectors to a smaller set. It is then easy to check within

that set for the optimal solution, since it has few nodes.

VII. NUMERICAL RESULTS

In this section we apply our method to the relevant case of a wireless system of third

generation, where inner loop and outer loop power control mechanisms are used [18]. It is

important to remark here that we do not compare our analytical results with simulations, since

Page 18: Power and Rate Control with Outage Constraints in CDMA

17

the outage approximations we have adopted are very good. In the following, we describe the

system parameters.

Operations of inner loop and outer loop power control are envisaged according to [14], [29]

and [18]. Specifically, the model of the SINR (1) can be used with the Rayleigh fading and the

path loss coefficients set to 1, and imposing that ψ(m)− lnm = 0 and ζ(2,m) = 0. Furthermore,

ξi assumes the meaning of residual fluctuation of the inner loop power control, so that all µξi

are 0. We consider a system with K = 4 users. The system parameters are taken from 3GPP

specifications [18]: we have used a chip time Tc = 2.610−7s (corresponding to a bandwidth of

5MHz), a power spectral density of the thermal noise has been set to N0 = Tc/10, and the

maximum spreading factors is Gi0 = 256. We assumed a value of the SINR threshold γi = 3.1.

Furthermore we assumed that PTTi0/N0 = 22dB, thus getting PT = 0.0391.

Six scenarios are discussed, denoted with A, B, C, D, E, and M. Scenarios from A to E have

uniform standard deviation of the power fluctuation ξi and the activity of the sources αi. The

sixth scenario, denoted M, has mixed values. In Tab. I, the values adopted for σξiand αi are

reported for each case.

In Fig. 1, the solution of Problem P2 for the case M is plotted as obtained with the iterative

Algorithm 1. The outage probability Oi has been set to 0.01. As it can be observed, the

convergence is very fast, and takes less than 5 iterations. For different settings of the parameters,

the behavior of the convergence remains the basically the same.

In Figs. 2 and 3, the optimal solution of Problem P1 obtained with our approach are plotted for

each scenario. Each dot of the curves is referred to a value of the outage probability constraint

(which is reported on the x axis, and it is assumed to be the same for each user). On the y

axis, the optimal objective function of Problem P1 is plotted. Algorithm 2 has been initialized in

the worst case possible, with the rates of the users set all to 1. We observed that the maximum

achievable throughput is 22. Furthermore, as the outage becomes less stringent (i.e., higher values

of the outages are allowed) the objective function obviously increases. It is also interesting to

observe that better performance is obtained when the users have low activity factors (αi = 0.2).

In fact, in such a case, the MAI seen from the users is reduced, thus enabling higher transmit

rates. Also, observe that as the standard deviations of the power control errors increase, the total

rate decreases. Once again, the reason can be found in the fact that larger fluctuations of the

power control error increases the MAI.

Page 19: Power and Rate Control with Outage Constraints in CDMA

18

In Tab. II, the number of nodes explored in the Rate Graph is reported in terms of minimum,

maximum, and average number. These figures have been computed over the interval of outage

probability used (Oi = 0.01, . . . , 0.29). An exhaustive search over all the possible rates would

have required to solve Problem P2 for 94 = 6561 times, since there are 9 possible rates per user,

and 4 users. As it can be noticed, the maximum number of nodes for which P2 is solved is 247.

Since our algorithm was initialized with the lower case of the rates, the convergence speed is

the slowest. Therefore, we believe that employing an initial guess closer to the optimal solution,

it could be possible to increase considerably the convergence speed.

VIII. CONCLUSIONS AND FUTURE WORK

In this paper, we have proposed an optimal approach to allocate the user powers to maximize

the system throughput. A general model of the physical layer of CDMA wireless system has

been considered, and quality of service has been expressed by the outage probability.

The problem can be cast as a mixed integer optimization program, where we have expressed the

constraints by the extended Wilkinson Moment matching approximation of the outage probability.

As a relevant contribution, we have shown that the outage constraints can be tracked down to the

standard interference function theory. This result enabled to derive the optimal solution of the

problem in two steps: first a modified program has been investigated to provide feasible solutions,

and then an algorithm, based on branch-and-bound search, has been proposed. Numerical results

in scenarios of practical interest confirm the validity of our approach.

Ongoing work is focused on the extension of our method to systems with limited computational

resources (as wireless sensor networks), where the implementation of simpler algorithms is a

must. We plan to investigate suboptimal solutions, where the integer constraints on the rates

are relaxed, or less accurate outage probability expressions are used. Initial results are being

obtained employing a Geometric Programming approach.

REFERENCES

[1] S. Ramakrishna and J.M. Holtzman. A Scheme for Throughput Maximization in a Dual-Class CDMA System. IEEE

Journal on Selected Areas on Communications, Vol. 16, pp. 830–844, August 1998.

[2] H. D. Schotten, H. E. Boll, A. Busboon. Adaptive Multi-code CDMA Systems for Variable Data Rate. ICPWC, 1997.

[3] B. Hashem and E. Sousa. A Combined Powe/Rate Control Scheme For Data Transmission over a DS/CDMA System.

IEEE Vehicular Technology Conf., 1998.

Page 20: Power and Rate Control with Outage Constraints in CDMA

19

[4] S. W. Kim and Y. H. Lee. Combined Rate and Power Adaptation in DS/CDMA Communications over Nakagami Fading

Channel. IEEE Transactions on Communications, Vol. 48, pp. 162-168, January 2000.

[5] E. Hossain, D. I. Kim, V. K. Bhargava. Modeling and Analysis of TCP Performance Under Joint Rate and Power Adaptation

in Multi-cell multi-rate WCDMA Systems. IEEE, May 2001.

[6] D. I. Kim, E. Hossain, V. K. Bhargava. Downlink Joint Rate and Power Allocation in Cellular Multirate WCDMA Systems.

IEEE Transaction on Wireless Communications, Vol. 2, N. 1, pp. 69-80, January 2003.

[7] E. Hossain, D. I. Kim, V. K. Bhargava. Analysis of TCP Performance Under Joint Rate and Power Adaptation in Cellular

WCDMA Networks. IEEE Transactions on Wireless Communications, Vol. 3, N. 3, May 2004.

[8] S. A. Jafar, A. J. Goldsmith. Adaptive Multirate CDMA for Uplink Throughput Maximization. IEEE Transactions Wireless

Comm, Vol. 2, N. 2, pp. 218-228, March 2003.

[9] G. Caire, G. Taricco, and E. Biglieri. Optimal Power Control for Minimum Outage Rate in Wireless Communications.

Proc. of IEEE ICC’98, Atlanta, GA, June 1998.

[10] J.A. Morrison D. Mitra. A Novel Distributed Power Control Algorithm for Classes of Services in Cellular CDMA Networks.

6th WINLAB Workshop, New Brunswick, NJ, USA, 1996.

[11] T. Heikkinen. A Model for Stochastic Power Control under Log-normal Distribution. CWIT 2001, 2001.

[12] E. Cianca, F. Graziosi, F. Santucci, M. Ruggieri. An Approach to Maximize the Capacity of a Multimedia CDMA Wireless

System. Proc. IEEE VTC’98, Ottawa, pp. 909–913, May 1998.

[13] C. Fischione, F. Graziosi, F. Santucci. Outage Performance of Power Controlled DS-CDMA Wireless Systems with

Heterogeneous Traffic Sources. Kluwer Wireless Personal Communications, Vol. 24, pp 171–187, 2002.

[14] F. Santucci, G. Durastante, F. Graziosi, C. Fischione. Power Allocation and Control in Multimedia CDMA Wireless

Systems. Kluwer Telecommunication Systems, Vol. 23, pp. 69–94, May–June 2003.

[15] S. Kandukuri, S. Boyd. Optimal Power Control in Interference-Limited Fading Wireless Channels With Outage-Probability

Specifications. IEEE Transaction on Wireless Communications, Vol. 1, pp 46–55, January 2002.

[16] K-L. Hsiung, S-J. Kim, S. Boyd. Power Control in Lognormal Fading Wireless Channel with Uptime Probability

Specifications via Robust Geometric Programming. ACC, 2005.

[17] J. Papandriopoulos, J. Evans, S. Dey. Outage-Based Power Control for Generalized Multiuser Fading Channels. IEEE

Transaction on Communications, Vol 54, No. 4, April 2006.

[18] 3GPP TS 25.214 V6.1.0. 3rd Generation Partnership Project; Technical Specification Group Radio Access Network;

Physical layer procedures (FDD).

[19] C. Fischione, F. Graziosi, F. Santucci. Approximation of a Sum of OnOff LogNormal Processes with Wireless Applications.

IEEE ICC, 2004.

[20] A. J. Goldsmith. Wireless Communications. Cambridge University Press, 2005.

[21] G. L. Stuber. Principles of Mobile Communication. Kluwer Academic Publishers, 1996.

[22] F. Graziosi and F. Santucci. A General Correlation Model for Shadow Fading in Mobile Radio Systems. IEEE

Communication Letters, Vol. 6, No. 3, March 2002.

[23] A. Shah and A. M. Haimovich. Performance Analysis of Maximal Ratio Combining and Comparison with Optimum

Combining for Mobile Radio Communications with Cochannel Interference. IEEE Transactions on Vehicular Technology,

49(4):1454–1463, July 2000.

[24] J.S. Evans and D. Everitt. Effective Bandwidth-Based Admission Control for Multiservice CDMA Cellular Networks.

IEEE Transactions on Vehicular Technology, Vol. 48, pp. 36–46, Jan. 1999.

Page 21: Power and Rate Control with Outage Constraints in CDMA

20

[25] M. Pratesi, F. Santucci, and F. Graziosi. Generalized moment matching for the linear combination of lognormal rvs:

Application to outage analysis in wireless system. IEEE Transcactions on Wireless Communications, 5(5), May 2006.

[26] J.D. Herdtner and E. K. P Chong. Analysis of a Class of distributed Asynchronous Power control Algorithm for Cellular

Wireles System. IEEE Journal on Selected Areas in Ccommunications, 18(3):436–446, March 2000.

[27] R. D. Yates. A Framework for Uplink Power Contorl in Cellular Radio System. IEEE Journal on Selected Areas in

Communications, 13, September 1995.

[28] D.P Bertsekas and J.N. Tsitsiklis. Parallel and Distribuited Computation: Numerical Methods. Athena Scientific, 1997.

[29] A. Chockalingham, P. Dietrich, L.B. Milstein, and R.R. Rao. Performance of Closed-Loop Power Control in DS-CDMA

Cellular Systems. IEEE Transaction on Vehicular Technology, 47:778–789, March 1998.

Page 22: Power and Rate Control with Outage Constraints in CDMA

21

Scenario σξiαi

A 0.5, 0.5, 0.5, 0.5 0.4, 0.4, 0.4, 0.4B 0.5, 0.5, 0.5, 0.5 0.2, 0.2, 0.2, 0.2C 0.5, 0.5, 0.5, 0.5 0.7, 0.7, 0.7, 0.7D 0.4, 0.4, 0.4, 0.4 0.4, 0.4, 0.4, 0.4E 0.6, 0.6, 0.6, 0.6 0.4, 0.4, 0.4, 0.4M 0.5, 0.6, 0.4, 0.6 0.2, 0.4, 0.2, 0.7

TABLE ISCENARIOS CONSIDERED IN THE NUMERICAL RESULTS.

Scenario min max averageA 46 247 150B 84 247 153C 47 238 137D 84 247 149E 47 247 141M 31 222 103

TABLE IINUMBER OF NODES EXPLORED TO OBTAIN THE SOLUTION OF PROBLEM P1 FOR EACH SCENARIO. A NODE IS EXPLORED

WHEN PROBLEM P2 IS SOLVED USING THE RATE VECTOR ASSOCIATED WITH THAT NODE.

1 2 3 4 510−3

10−2

Iterations

Pow

ers

User 1User 2User 3User 4

Fig. 1. Convergence of the powers for getting the solution of Problem P2 as obtained with Algorithm 1, for the case M. Thepowers are reported in log units.

Page 23: Power and Rate Control with Outage Constraints in CDMA

22

0.05 0.1 0.15 0.2 0.254

6

8

10

12

14

16

18

20

22

24

Outage Constraint

Rat

e S

um

α = 0.2 ; σ =0.5α = 0.4 ; σ =0.5α = 0.7 ; σ =0.5

Fig. 2. Optimal solution of Problem P1 as obtained with Algorithm 2 for the cases A, B, and C. In the legend, σ and α denotethat σξi

and αi are uniformly chosen.

0.05 0.1 0.15 0.2 0.254

6

8

10

12

14

16

18

20

22

24

Outage Constraint

Rat

e S

um

α = 0.4 ; σ =0.4α = 0.4 ; σ =0.6Mixed Environment

Fig. 3. Optimal solution of Problem P1 as obtained with Algorithm 2 for the cases D, E, and M. In the legend, σ and α

denote that σξiand αi are uniformly chosen.