Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01.12.2009 | Research Article

Dynamic Subcarrier Allocation for Real-Time Traffic over Multiuser OFDM Systems

verfasst von: Fanglei Sun, Mingli You, Victor O. K. Li

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2009

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

A dynamic resource allocation algorithm to satisfy the packet delay requirements for real-time services, while maximizing the system capacity in multiuser orthogonal frequency division multiplexing (OFDM) systems is introduced. Our proposed cross-layer algorithm, called Dynamic Subcarrier Allocation algorithm for Real-time Traffic (DSA-RT), consists of two interactive components. In the medium access control (MAC) layer, the users' expected transmission rates in terms of the number of subcarriers per symbol and their corresponding transmission priorities are evaluated. With the above MAC-layer information and the detected subcarriers' channel gains, in the physical (PHY) layer, a modified Kuhn-Munkres algorithm is developed to minimize the system power for a certain subcarrier allocation, then a PHY-layer resource allocation scheme is proposed to optimally allocate the subcarriers under the system signal-to-noise ratio (SNR) and power constraints. In a system where the number of mobile users changes dynamically, our developed MAC-layer access control and removal schemes can guarantee the quality of service (QoS) of the existing users in the system and fully utilize the bandwidth resource. The numerical results show that DSA-RT significantly improves the system performance in terms of the bandwidth efficiency and delay performance for real-time services.

1. Introduction

Demands for real-time multimedia applications are increasing rapidly for broadband wireless networks. Orthogonal frequency division multiplexing (OFDM) is considered a promising technique in such systems. In this paper, we consider multiuser systems [1] where multiple users are allowed to transmit simultaneously on different subcarriers per OFDM symbol. Mobile users on certain OFDM subchannels may experience deep frequency-selective fading in a multipath propagation environment. Since each user may have a different subchannel impulse response, a poor subchannel for one user may be a good subchannel for another user. Clearly, if a user who suffers from poor subchannel gain can be reassigned to a better subchannel, the total throughput can be increased. This is also known as multiuser diversity. Since the subcarrier gains vary from user to user, to achieve higher system capacity and spectral efficiency, it is better to allocate subcarriers and the corresponding power dynamically according to the instantaneous channel states of all users.
To support QoS for multiple services, packet scheduling has been identified as an important mechanism in wired networks. When considering the multipath fading, high error rate, and time-varying channel capacity in wireless links, some new packet scheduling algorithms are developed, such as channel state dependent round Robin (CSD-RR) [2], feasible earliest due date (FEDD) [3], modified largest weighted delay first (M-LWDF) [4], and link-adaptive LWDF [5] algorithms. CSD-RR schedules the packets whose channel is in the "Good'' state in a Round Robin fashion. FEDD focuses on scheduling the packet which has the smallest time to expiry and whose channel is in the "Good'' state. M-LWDF schedules the packet according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq1_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq2_HTML.gif is the head-of-the-line packet delay for queue https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq3_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq4_HTML.gif is the channel capacity with respect to flow https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq5_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq6_HTML.gif are arbitrary positive constants. M-LWDF is proven to be a throughput-optimal scheduling algorithm. Link-adaptive LWDF aims to satisfy the stringent packet delay constraints, but without any guarantees. The objectives of these algorithms are to maximize the system spectral efficiency by exploiting the random channel variations and to provide QoS guarantees to the users by deferring the transmissions on the deep fading links and compensating for them when the links recover. However, all these scheduling algorithms are based on packet scheduling, and multiple frequency subcarrier scheduling, which may be implemented in multiuser OFDM systems, is not considered. In the PHY layer, the total power resource is limited. Given the required number of subcarriers of different users, how to minimize the power allocation for the users on the subcarriers under users' SNR requirements is still a problem. To solve this problem, a suboptimal subcarrier allocation algorithm based on constructive assignment and iterative improvement is proposed in [6] and adopted in [7]. The algorithm exploits the similarity between the subcarrier allocation problem and the classical assignment problem. However, the algorithm can only provide a suboptimal allocation. An optimal solution to this power minimization problem is the Kuhn-Munkres algorithm proposed for the classical assignment problem [8]. Kuhn-Munkres is based on the Hungarian algorithm [9]. OFDM subarrier allocation using this method has been studied in [10]. However, an important assumption in that paper is that the number of assigned subcarriers for the users is known. Actually, without this information, the Kuhn-Munkres algorithm cannot perform the subcarrier allocation. In addition, in most of the proposed scheduling algorithms, the dynamic variation of the number of active users in the system is ignored.
In this paper, we propose a cross-layer resource allocation scheduling algorithm, named DSA-RT, for real-time services under frequency-selective fading channel in multiuser OFDM systems. This algorithm has two cooperative components: the MAC-layer scheduling/control scheme and the PHY-layer resource allocation scheme. At the MAC layer, based on queuing theory, active users' expected resource requirements to satisfy delay constrains are calculated in terms of the number of subcarriers per OFDM symbol. With the support of our MAC-layer scheduling scheme, the number of required subcarriers and the users' transmission priorities are given. At the PHY layer, based on the modified Kuhn-Munkres algorithm, a PHY-layer resource allocation algorithm is proposed to satisfy all users' requirements under the system SNR and power constraints and to decide the real subcarrier allocation for each active user. (Users admitted to the system are termed active users. Once new users are admitted, they will be allocated resources (subcarriers) by the access control scheme.) When considering a system where the number of active users changes dynamically, if there are still subcarriers left in an OFDM symbol, the access of new mobile users will be considered. In addition, if the dropping rates of certain users violate their maximum tolerable limits, a removal scheme is triggered to remove the aggressive users so as to guarantee the QoS of the other existing users. With the cooperation of the MAC and PHY layer schemes, our proposed algorithm offers the following advantages: (1) based on queuing theory, real-time users' delay requirements can be evaluated in terms of the number of subcarriers required, leading to a more flexible scheduling algorithm which can effectively guarantee the QoS for real-time services in multiuser OFDM systems; (2) with the number of the expected subcarriers and transmission priority information from the MAC layer, the proposed PHY-layer resource allocation scheme aims to maximize the bandwidth usage under the current channel state, system SNR, and power constraints; (3) when the number of mobile users is dynamically changed, the access control and removal schemes can dynamically adjust system flows and provide delay-related guarantee for the active users in the system.
The rest of this paper is organized as follows. The system model is introduced in Section 2. The detailed description of DSA-RT is presented in Section 3. The simulation results are given in Section 4. Section 5 draws the conclusions.

2. System Model

Figure 1 shows our downlink OFDM system model at a base station (BS). As in previous work [25], channel state information (CSI) is assumed to be available at BSs. Assume that the frequency bandwidth is divided into https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq7_HTML.gif subcarriers, and there are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq8_HTML.gif active users, where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq9_HTML.gif is changed dynamically and follows a Poisson distribution. BSs are in charge of subcarrier scheduling and resource allocation. We assume a fixed modulation for all subcarriers. The total transmission power is constrained at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq10_HTML.gif and will be optimally allocated to each subcarrier.
BS establishes a queue for each user. Packets are assumed to have equal length of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq11_HTML.gif bits each. Head of line (HOL) packets of queues are scheduled on different subcarriers in different OFDM symbols based on transmission priorities obtained in Section 3. The transmission process for each user can be modelled as an M/G/1 queue. Define the average system time of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq12_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq13_HTML.gif ; the delay requirement of real-time user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq14_HTML.gif can be formulated as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq15_HTML.gif is the delay bound of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq16_HTML.gif .
Denote the channel gain obtained by user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq17_HTML.gif on subcarrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq18_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq19_HTML.gif and the number of bits supported in a subcarrier by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq20_HTML.gif . Define https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq21_HTML.gif to be an allocation indicator:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ2_HTML.gif
(2)
Our objective is to maximize the total system throughput, subject to the constraints on the total transmission power, user SNR requirements, and delay constraints. The optimization problem can be expressed as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ3_HTML.gif
(3)
subject to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ4_HTML.gif
(4)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq22_HTML.gif represents the SNR requirement of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq23_HTML.gif . C1 states that the total subcarriers allocated to all users are less than or equal to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq24_HTML.gif ; C2 shows that the total transmission power should be less than or equal to the system power limit, while satisfying all users' SNR requirements; C3 means that no more than one user transmits in the same subcarrier; C4 is the average delay requirement of each user.
The solution of the above optimization problem (3) is not explicit due to the fact that C4 is not directly related to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq25_HTML.gif . Thus in the following section, we will establish the relationship between them and give the suboptimal subcarrier allocation solution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq26_HTML.gif for each symbol with lower computational complexity.

3. Cross-Layer Algorithm Description

Based on queuing theory, the MAC-layer scheduling scheme is developed to calculate the users' transmission priorities and their corresponding specific bandwidth requirements in terms of the number of subcarriers. With the channel state information, users' SNR requirements and the system power constraints, the PHY-layer resource allocation scheme can deduce the maximum attainable throughput for each supported user. In addition, the MAC-layer access control and removal scheme will be triggered to adjust the number of users being served and provide the QoS guarantee for the active users in the system.

3.1. MAC-Layer Scheduling Scheme

In our system, we assume that each user has one type of real-time traffic. The packet arrivals of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq27_HTML.gif follow an independent Poisson process with rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq28_HTML.gif , and each user has a delay upper bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq29_HTML.gif . Furthermore, we assume that users have infinite buffers, and the same class users have the same https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq30_HTML.gif settings. Since the transmission process for each user can be modelled as an M/G/1 queue, the delay constraint on system time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq31_HTML.gif is given by [11]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ5_HTML.gif
(5)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq32_HTML.gif is the average service time and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq33_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq34_HTML.gif , a necessary condition for the delay requirement on system time in (13) is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ6_HTML.gif
(6)
By solving the above inequality, we can easily obtain the lower bound of the average transmission rate for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq35_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq36_HTML.gif is known by the supported modulation, we further scale the average transmission rate in terms of subcarriers, represented by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq37_HTML.gif . Given the per-link https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq38_HTML.gif , the waiting time of the HOL packet https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq39_HTML.gif , and the delay constraint https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq40_HTML.gif , an active user's transmission priority and exact bandwidth requirement in terms of the number of subcarriers per symbol are obtained by the following modified LWDF scheduling algorithm.
In our algorithm, the system time is scaled in terms of OFDM symbol time. The remaining time to the deadline of the HOL packet at queue https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq41_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ7_HTML.gif
(7)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq42_HTML.gif is the OFDM symbol time. The smaller the value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq43_HTML.gif is, the more urgently user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq44_HTML.gif needs to transmit the corresponding packet. In addition, if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq45_HTML.gif is the number of bits left in the HOL packet of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq46_HTML.gif , then till the due time of the packet, the average required transmission rate in terms of the number of subcarriers in the following symbol time is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ8_HTML.gif
(8)
Compared with the deduced https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq47_HTML.gif , we define the rate proportional index as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ9_HTML.gif
(9)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq48_HTML.gif is defined to indicate the urgent state. Its value could be positive or negative. If its value is below zero, this means that the required number of subcarriers exceeds the average number, which indicates that congestion may happen. It is also easily observed that the smaller the value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq49_HTML.gif , the more urgent the transmission of the corresponding HOL packet. As in LWDF algorithm, we also consider the factors of the waiting time and transmission rate for each user. However, instead of considering the users' attainable bandwidths, we consider the users' required bandwidths under the delay bound constraints, which are more important for real-time services. Our scheduling is described as follows. Once the channel is idle, each user will calculate its transmission priority by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ10_HTML.gif
(10)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq50_HTML.gif is a positive constant used to adjust the weight of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq51_HTML.gif . The function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq52_HTML.gif is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ11_HTML.gif
(11)
From the above analyses, the user with the smaller value given by (10) will enjoy a higher transmission priority. From the definition of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq53_HTML.gif , if a user's required number of subcarriers exceeds the total number https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq54_HTML.gif provided by a symbol, even if we allocate the whole symbol to this user, its delay requirement will not be met. Therefore, the HOL packet of this user will be dropped to save bandwidth for other users.
Up to now, our MAC-layer scheduling scheme gives the transmission priority list of the HOL packets according to (10) for the active users and their expected transmission rates in terms of the number of subcarriers in each symbol from (8). However these rates are only the users' expected rates. Considering the users' channel states, SNR requirements, and system power limit in the PHY layer, the real subcarrier allocation will be performed according to the following scheme.

3.2. PHY-Layer Resource Allocation Scheme

In the MAC layer, our algorithm has already considered the real-time traffic delay requirement and given the expected transmission rate in terms of the number of subcarriers and users' transmission priorities. In the PHY layer, with the different subcarriers' channel states, system SNR and power constraints, our PHY-layer scheme aims to optimize the initial allocation indicator https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq55_HTML.gif with the following constraint:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ12_HTML.gif
(12)
To solve this problem, a dynamic PHY-layer resource allocation scheme is proposed which is divided into the following steps.
(a)
Initial subcarrier allocation. With the total number of subcarrier limit https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq56_HTML.gif , we initially assign the users the required numbers of subcarriers according to their priorities till https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq57_HTML.gif subcarriers are used up or all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq58_HTML.gif users are assigned.
 
(b)
Power minimization. Given a subcarrier allocation, the following modified Kuhn-Munkres algorithm is used to obtain an optimal allocation to minimize the system power under the users' SNR requirements. Denote the minimized power as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq59_HTML.gif .
 
(c)
Power comparison. Compare https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq60_HTML.gif with the system power limit https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq61_HTML.gif , and consider the following cases:
(i)
if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq62_HTML.gif , then the power resource is fully utilized, and the current subcarrier allocation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq63_HTML.gif is the final solution;
 
(ii)
if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq64_HTML.gif , then the system power cannot support all currently assigned subcarriers. So our scheme will reduce the subcarrier allocation from the lowest priority user. Given https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq65_HTML.gif requirement for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq66_HTML.gif , among the assigned subcarriers for this user, the smaller the value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq67_HTML.gif on subcarrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq68_HTML.gif , the larger the power consumption on it. So the subcarrier reduction will be performed in ascending subcarrier gain order one by one. Then go to Step (b) in the next iteration, till the updated https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq69_HTML.gif is less than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq70_HTML.gif ;
 
(iii)
if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq71_HTML.gif , more power resource can be utilized. Then our scheme considers the remaining subcarrier resource. We represent the total number of the assigned subcarriers as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq72_HTML.gif . If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq73_HTML.gif , the subcarriers are used up, and we maintain the current https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq74_HTML.gif solution. If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq75_HTML.gif , the remaining subcarriers are assigned evenly to the current active users till the updated https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq76_HTML.gif reaches https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq77_HTML.gif . If new users' access requirements are received, the access control scheme to be introduced in the next subsection will guide the assignment.
 
 
Modified Kuhn-Munkres Algorithm
In the following, we will firstly introduced the Kuhn-Munkres algorithm to find the perfect matching with the maximum sum of edge weights for a bipartite graph. Then a modified algorithm is described for OFDM power allocation. To minimize the system power, the modified algorithm is applied with negative weights.
A graph is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq78_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq79_HTML.gif is the vertex set, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq80_HTML.gif is the edge set of the graph. If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq81_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq82_HTML.gif and each edge in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq83_HTML.gif has one endpoint in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq84_HTML.gif and the other in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq85_HTML.gif , the graph https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq86_HTML.gif is a bipartite graph, which can also be denoted as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq87_HTML.gif . The bipartite graph is very useful for some applications, such as an assignment problem which can be depicted as follows. Given a weighted complete bipartite graph https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq88_HTML.gif , where edge https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq89_HTML.gif has weight https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq90_HTML.gif , find a matching https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq91_HTML.gif from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq92_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq93_HTML.gif with maximum weight. In an application, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq94_HTML.gif could be a set of workers, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq95_HTML.gif a set of jobs, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq96_HTML.gif the earnings made by assigning worker https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq97_HTML.gif to job https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq98_HTML.gif . The goal of the assignment problem is to find the optimal (best total earnings) matching.
For a bipartite graph https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq99_HTML.gif , if the cardinalities of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq100_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq101_HTML.gif , denoted as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq102_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq103_HTML.gif , are equal, then this bipartite graph is symmetric. For single objective optimization, it has been proved that the Kuhn-Munkres algorithm can always find the maximum weight matching for a bipartite graph with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq104_HTML.gif computational complexity. The Kuhn-Munkres algorithm is based on the procedure of the Hungarian algorithm [9]. Matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq105_HTML.gif has elements https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq106_HTML.gif , which represent the earnings of assigning worker https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq107_HTML.gif to job https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq108_HTML.gif as shown in Figure 2 (a).
Step 1.
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq109_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq110_HTML.gif be the bipartite sets. Initialize two labels https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq111_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq112_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq113_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq114_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq115_HTML.gif . In Figure 2 (b), the numbers written at the left and the top of the matrix express the values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq116_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq117_HTML.gif , respectively.
Step 2.
Obtain the excess matrix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq118_HTML.gif by the following: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq119_HTML.gif . This is shown in Figure 2 (c).
Step 3.
Find the subgraph https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq120_HTML.gif that includes vertices https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq121_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq122_HTML.gif satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq123_HTML.gif and the corresponding edge https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq124_HTML.gif . Then find the maximum matching https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq125_HTML.gif of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq126_HTML.gif by the Hungarian algorithm, and underline the entries in the weight matrix. (There are various ways to find the maximum matching. See, e.g, [12].) A maximum matching is a matching with the largest possible number of edges. In this example, the maximum matching is found to be https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq127_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq128_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq129_HTML.gif , as shown in Figure 2 (d). If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq130_HTML.gif is a perfect matching, that is, the number of edges in a maximum matching is equal to the cardinality of worker set ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq131_HTML.gif ), the optimal assignment is obtained. Otherwise, go to the next step.
Step 4.
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq132_HTML.gif be a vertex cover of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq133_HTML.gif , and let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq134_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq135_HTML.gif . The vertex cover https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq136_HTML.gif is a vertex set of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq137_HTML.gif which contains at least one endpoint of each edge. In this example, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq138_HTML.gif is chosen to be the nodes corresponding to Workers 1 and 3 and Job 4. So https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq139_HTML.gif corresponds to Workers 1 and 3, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq140_HTML.gif corresponds to Job 4. Now find https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq141_HTML.gif . For example, if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq142_HTML.gif equals 1 in Figure 2, decrease https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq143_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq144_HTML.gif for the rows of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq145_HTML.gif and increase https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq146_HTML.gif by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq147_HTML.gif for the columns of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq148_HTML.gif . Then go to Step 2.
Steps 2 to 4 are repeated until the perfect matching https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq149_HTML.gif , that is, the optimal assignment, is obtained.
For a bipartite graph https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq150_HTML.gif , if the cardinalities of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq151_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq152_HTML.gif , denoted as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq153_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq154_HTML.gif , are not equal, then this bipartite graph is asymmetric. In our modified Kuhn-Munkres algorithm, we enhance an asymmetric graph to a symmetric one, and then solve the optimization problem as in the symmetric case. Firstly, suppose that the resource on both https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq155_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq156_HTML.gif cannot be reused, we append https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq157_HTML.gif all-zero rows or columns to the weight matrix to construct a square matrix, and then transform the problem to a symmetric bipartite matching, as shown in Figure 3.
Secondly, for some special cases in which the redundant resource may be reused, the modified Kuhn-Munkres algorithm reproduces the corresponding columns or rows till the matrix is transformed to a square matrix. If necessary, all-zero columns or rows will be added. If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq158_HTML.gif and the elements in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq159_HTML.gif is reusable, Figure 4 shows the case where the remaining elements in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq160_HTML.gif may reuse the elements in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq161_HTML.gif with the same probability. If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq162_HTML.gif , given the number of required elements in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq163_HTML.gif by the elements in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq164_HTML.gif , namely, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq165_HTML.gif , then the square matrix may be constructed by reproducing the rows in demand, as shown in Figure 5.
In the downlink OFDM system model, as in previous work, channel state information (CSI) is assumed to be available at base stations (BSs). In a multiuser system with frequency-selective fading, each user may experience a different channel frequency response, which is related to its location. The total frequency bandwidth is divided into https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq168_HTML.gif orthogonal subchannels, and suppose there are currently https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq169_HTML.gif active users in the system. Assume that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq170_HTML.gif is the subchannel set for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq171_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq172_HTML.gif is the cardinality of set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq173_HTML.gif . The value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq174_HTML.gif is initially obtained from the MAC layer scheduling scheme and dynamically changed by the PHY allocation scheme. Therefore, for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq175_HTML.gif , the required transmission power in time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq176_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ13_HTML.gif
(13)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq177_HTML.gif is the detected subchannel gain of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq178_HTML.gif on subchannel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq179_HTML.gif . Then the total system required power can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ14_HTML.gif
(14)
With the above problem formulation, the minimization of the system power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq180_HTML.gif as required in the second step of the PHY-layer allocation scheme may be converted to a bipartite matching problem. The edge weight for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq181_HTML.gif on subcarrier https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq182_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq183_HTML.gif . Therefore, similar to the case illustrated in Figure 5, the modified Kuhn-Munkres algorithm may be applied to give an optimal solution to the minimization of the system power.

3.3. Access Control and Removal Scheme

In real networks, the number of active users changes dynamically. Without access control, the bandwidth may be inadequate. In addition, particularly for real-time traffic, without a removal scheme, not only may the QoS of the users newly granted access not be guaranteed but also the previously granted access users will suffer from QoS degradation. Therefore, the MAC-layer access control and removal schemes are introduced in our DSA-RT algorithm.
As analyzed in the previous subsection, a new user's QoS requirements should be considered when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq184_HTML.gif and
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ15_HTML.gif
(15)
As introduced in Section 3.1, the new user's QoS requirements can be evaluated by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq185_HTML.gif . Access control will check if this requirement can be satisfied with the remaining power and subcarrier resources. If yes, the new user can be allocated subcarrier resources; otherwise, it continues to wait.
Even with access control, real-time transmission systems may still encounter an overloaded situation due to the time-varying wireless channel and variable bit rates. As presented in [13], a useful removal scheme can effectively guarantee the QoS of the existing users and will not be adversely affected by the admission of new users. Our scheme assumes that the dropping rate of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq186_HTML.gif is sampled for each constant time interval https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq187_HTML.gif , and the last sample time is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq188_HTML.gif . So the dropping rate of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq189_HTML.gif is defined by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ16_HTML.gif
(16)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq190_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq191_HTML.gif are the numbers of dropped packets and the total transmitted packets of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq192_HTML.gif during time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq193_HTML.gif . Assume https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq194_HTML.gif is the maximum dropping rate which user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq195_HTML.gif can tolerate. At each sample time or when the number of users in the system changes, our removal scheme will select the user to be removed by the following rule:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_Equ17_HTML.gif
(17)
where the selected set consists of the users whose https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq196_HTML.gif values violate their corresponding dropping rate bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq197_HTML.gif . If the traffic is bursty, we may change https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq198_HTML.gif to adjust the dropping rate more frequently.

3.4. Implementation of DSA-RT

Thanks to the cooperation of the above schemes, for each OFDM symbol, our algorithm DSA-RT can give the suboptimal solution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq199_HTML.gif of the optimization problem addressed in Section 2. The computational delay is not expected to be a problem. The number of operations required by the algorithm is approximately https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq200_HTML.gif , which translates to a computational delay of a small fraction of a symbol time with the support of current chips. In addition, if we want to lower the computational delay, multiple symbols can be combined as one scheduling unit, but this will affect the scheduling efficiency. It is a tradeoff. The flow chart of the implementation of our algorithm is shown in Figure 6.

4. Simulation Results

In this section, the performance of the proposed DSA-RT scheduling algorithm is investigated and compared with CSD-RR, FEDD, and M-LWDF [24]. We consider QPSK modulation in multiuser OFDM downlink systems. However, other modulations are supported with different SNR constraints. The IFFT size is 128, and the OFDM symbol duration is equal to 200 microseconds [14]. We consider the quasistatic flat fading channel with multipath [15]. Assume that the users arrive as a Poisson process with parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq201_HTML.gif , and their active times in the system follow the exponential distribution with mean 10 seconds. In this section, we assume that all users have the same type of real-time traffic. During each user's active time, the packet arrivals follow the Poisson distribution. The packets have a fixed length of 1000 bytes, and the mean traffic rate is 1 Mbps. The delay bound is set to be 50 milliseconds. In simulations, we consider one type of real-time traffic, so we fixed the packet length. However, if multiple types of real-time traffics are supported, a variable length is acceptable in our algorithm. In our simulations, we vary the user arrival rates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F298451/MediaObjects/13638_2009_Article_1631_IEq202_HTML.gif from 0.01 to 0.1 and compare the delay and dropping rate performance of some packet scheduling algorithms and our proposed DSA-RT algorithm. All simulations are in Matlab 7.3. The simulation time of each experiment is 100 seconds and we repeat it 100 times.
The average delay is the mean of the delay of all packets not dropped. For each successfully delivered packet, the delay is calculated as the difference between the departure and arrival times. In DSA-RT, packets which have been dropped will not re-enter the system. Figure 7 shows the delay comparisons of DAS-RT and three other packet scheduling algorithms. It is obvious that our algorithm distinctly improves the delay performance, particularly when the traffic density is high. Accordingly, as shown in Figure 8, the dropping rates of our algorithm at any user arrival rate are also much lower than the other three algorithms. DSA-RT is developed to schedule at the subcarrier level and tries to provide delay guarantees for the real-time traffics. Therefore, it has the best delay and dropping rate performance. Based on the consideration of channel state, CSD-RR has better performance than M-LWDF and FEDD. By considering the system capacity and queuing, the throughput performance of M-LWDF is optimal, but the delay performance still needs to be improved. FEDD gives the packet with the earliest deadline of the highest transmission priority. However, with the bandwidth and channel state constraints, the transmission still has a high probability to fail within its deadline. Therefore, it has the poorest performance.

5. Conclusion

In this paper, DSA-RT aims to satisfy the packet delay requirements of real-time traffics in multiuser OFDM system, while maximizing the system bandwidth efficiency. This algorithm consists of two cooperative components. At the MAC layer, based on queuing theory and the modified LWDF algorithm, active users' expected transmission rates in terms of the number of subcarreirs per symbol and their corresponding transmission priorities are deduced. With different subcarrier states, based on our modified Kuhn-Munkres algorithm, a PHY-layer resource allocation scheme is developed to satisfy the users' requirements under the system SNR and power constraints. When considering a system where the number of active users changes dynamically, the access control and removal scheme can fully utilize the bandwidth resource and guarantee the QoS of the existing users in the system. Finally, compared with other widely used scheduling algorithms, simulation results show that our proposed algorithm significantly improves the system performance for real-time users in multiuser OFDM systems.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Lawrey E: Multiuser OFDM. Proceedings of the International Symposium on Signal Processing and Its Applications (ISSPA '99), August 1999, Brisbane, Australia 761-764. Lawrey E: Multiuser OFDM. Proceedings of the International Symposium on Signal Processing and Its Applications (ISSPA '99), August 1999, Brisbane, Australia 761-764.
2.
Zurück zum Zitat Bhagwat P, Krishna A, Tripathi S: Enhancing throughput over wireless LAN's using channel state dependent packet scheduling. Proceedings of 17th Annual Joint Conference of the IEEE Computer and Communications Societie (INFOCOM '98), March 1998, San Francisco, Calif, USA 1103-1111. Bhagwat P, Krishna A, Tripathi S: Enhancing throughput over wireless LAN's using channel state dependent packet scheduling. Proceedings of 17th Annual Joint Conference of the IEEE Computer and Communications Societie (INFOCOM '98), March 1998, San Francisco, Calif, USA 1103-1111.
3.
Zurück zum Zitat Shakkottai S, Srikant R: Scheduling real-time traffic with deadlines over a wireless channel. Wireless Networks 2002, 8(1):13-26. 10.1023/A:1012763307361CrossRefMATH Shakkottai S, Srikant R: Scheduling real-time traffic with deadlines over a wireless channel. Wireless Networks 2002, 8(1):13-26. 10.1023/A:1012763307361CrossRefMATH
4.
Zurück zum Zitat Andrews M, Kumaran K, Ramanan K, Stolyar A, Whiting P, Vijayakumar R: Providing quality of service over a shared wireless link. IEEE Communications Magazine 2001, 39(2):150-153. 10.1109/35.900644CrossRef Andrews M, Kumaran K, Ramanan K, Stolyar A, Whiting P, Vijayakumar R: Providing quality of service over a shared wireless link. IEEE Communications Magazine 2001, 39(2):150-153. 10.1109/35.900644CrossRef
5.
Zurück zum Zitat Zhang YJ, Liew SC: Link-adaptive largest-weighted-throughput packet scheduling for real-time traffics in wireless OFDM networks. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '05), November-December 2005, St. Louis, Mo, USA 5: 2490-2494. Zhang YJ, Liew SC: Link-adaptive largest-weighted-throughput packet scheduling for real-time traffics in wireless OFDM networks. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '05), November-December 2005, St. Louis, Mo, USA 5: 2490-2494.
6.
Zurück zum Zitat Cheong YYW, Tsui CY, Cheng RS, Letaief KB: A realtime sub-carrier allocation scheme for multiple access downlink OFDM transmission. Proceedings of the 49th IEEE Vehicular Technology Conference (VTC '99), September 1999, Amsterdam, The Netherlands 2: 1124-1128. Cheong YYW, Tsui CY, Cheng RS, Letaief KB: A realtime sub-carrier allocation scheme for multiple access downlink OFDM transmission. Proceedings of the 49th IEEE Vehicular Technology Conference (VTC '99), September 1999, Amsterdam, The Netherlands 2: 1124-1128.
7.
Zurück zum Zitat Diao Z, Shen D, Li VOK: CPLD-PGPS scheduler in wireless OFDM systems. IEEE Transactions on Wireless Communications 2006, 5(10):2923-2931.CrossRef Diao Z, Shen D, Li VOK: CPLD-PGPS scheduler in wireless OFDM systems. IEEE Transactions on Wireless Communications 2006, 5(10):2923-2931.CrossRef
8.
Zurück zum Zitat Munkres J: Algorithms for the assignment and transportation problems. Journal of the Society for Industrial and Applied Mathematics 1957, 5(1):32-38. 10.1137/0105003MathSciNetCrossRefMATH Munkres J: Algorithms for the assignment and transportation problems. Journal of the Society for Industrial and Applied Mathematics 1957, 5(1):32-38. 10.1137/0105003MathSciNetCrossRefMATH
9.
Zurück zum Zitat Kuhn HW: The Hungarian method for the assignment problem. Naval Research Logistic Quarterly 1955, 2: 83-97. 10.1002/nav.3800020109CrossRefMathSciNetMATH Kuhn HW: The Hungarian method for the assignment problem. Naval Research Logistic Quarterly 1955, 2: 83-97. 10.1002/nav.3800020109CrossRefMathSciNetMATH
10.
Zurück zum Zitat Zhu J, Bing B, Li Y, Xu J: An adaptive subchannel allocation algorithm for OFDM-based wireless home networks. Proceedings of the 1st IEEE Consumer Communications and Networking Conference, (CCNC '04), January 2004, Las Vegas, Nev, USA 352-356. Zhu J, Bing B, Li Y, Xu J: An adaptive subchannel allocation algorithm for OFDM-based wireless home networks. Proceedings of the 1st IEEE Consumer Communications and Networking Conference, (CCNC '04), January 2004, Las Vegas, Nev, USA 352-356.
11.
Zurück zum Zitat Bertsekas D, Gallager R: Data Networks. 2nd edition. Prentice-Hall, Englewood Cliffs, NJ, USA; 1992.MATH Bertsekas D, Gallager R: Data Networks. 2nd edition. Prentice-Hall, Englewood Cliffs, NJ, USA; 1992.MATH
12.
Zurück zum Zitat West DB: Introduction to Graph Theory. Prentice-Hall, Englewood Cliffs, NJ, USA; 2001. West DB: Introduction to Graph Theory. Prentice-Hall, Englewood Cliffs, NJ, USA; 2001.
13.
Zurück zum Zitat Kwon E, Kim S-G, Lee J: Overload control with removal algorithm for real-time flows in wireless networks. Proceedings of the IEEE 63rd Vehicular Technology Conference (VTC '06), May 2006, Melbourne, Australia 3: 1127-1131. Kwon E, Kim S-G, Lee J: Overload control with removal algorithm for real-time flows in wireless networks. Proceedings of the IEEE 63rd Vehicular Technology Conference (VTC '06), May 2006, Melbourne, Australia 3: 1127-1131.
14.
Zurück zum Zitat Cai J, Shen X, Mark JW: Downlink resource management for packet transmission in OFDM wireless communication systems. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '03), December 2003, San Francisco, Calif, USA 6: 2999-3003. Cai J, Shen X, Mark JW: Downlink resource management for packet transmission in OFDM wireless communication systems. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '03), December 2003, San Francisco, Calif, USA 6: 2999-3003.
15.
Zurück zum Zitat Xiao C, Zheng YR, Beaulieu NC: Second-order statistical properties of the WSS Jakes' fading channel simulator. IEEE Transactions on Communications 2002, 50(6):888-891. 10.1109/TCOMM.2002.1010606CrossRef Xiao C, Zheng YR, Beaulieu NC: Second-order statistical properties of the WSS Jakes' fading channel simulator. IEEE Transactions on Communications 2002, 50(6):888-891. 10.1109/TCOMM.2002.1010606CrossRef
Metadaten
Titel
Dynamic Subcarrier Allocation for Real-Time Traffic over Multiuser OFDM Systems
verfasst von
Fanglei Sun
Mingli You
Victor O. K. Li
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2009/298451

Weitere Artikel der Ausgabe 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Zur Ausgabe