Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01.12.2009 | Research Article

Joint Throughput Maximization and Fair Uplink Transmission Scheduling in CDMA Systems

verfasst von: Symeon Papavassiliou, Chengzhou Li

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2009

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We study the fundamental problem of optimal transmission scheduling in a code-division multiple-access wireless system in order to maximize the uplink system throughput, while satisfying the users quality-of-service (QoS) requirements and maintaining fairness among them. The corresponding problem is expressed as a weighted throughput maximization problem, under certain power and QoS constraints, where the weights are the control parameters reflecting the fairness constraints. With the introduction of the power index capacity, it is shown that this optimization problem can be converted into a binary knapsack problem, where all the corresponding constraints are replaced by the power index capacities at some certain system power index. A two-step approach is followed to obtain the optimal solution. First, a simple method is proposed to find the optimal set of users to receive service for a given fixed target system load, and then the optimal solution is obtained as a global search within a certain range. Furthermore, a stochastic approximation method is presented to effectively identify the required control parameters. The performance evaluation reveals the advantages of our proposed policy over other existing ones and confirms that it achieves very high throughput while maintains fairness among the users, under different channel conditions and requirements.

1. Introduction

The continuous growth in traffic volume and the emergence of new services have begun to change the structure and requirements of wireless networks. Future mobile communication systems will be characterized by high throughput, integration of services, and flexibility [15]. With the demand for high data rate and support of multiple quality of service (QoS), the transmission scheduling plays a key role in the efficient resource allocation process in wireless systems. The transmission scheduling determines the time instances that a mobile user may receive service, as well as the resources that should be allocated to support the requested service, in order to make the resource distribution fair and efficient.
The fundamental problem of scheduling the users transmission and allocating the available resources in a realistic uplink code-division multiple-access (CDMA) wireless system that supports multirate multimedia services, with efficiency and fairness, is investigated and analyzed in this paper. A transmission scheduling method which achieves the maximum system throughput under the constraints of satisfying certain users QoS requirements and maintaining throughput fairness among them is provided and evaluated.
A class of scheduling schemes, namely, the opportunistic scheduling schemes, has been proven to be an effective approach to improve the system throughput by utilizing the multiuser diversity effect [6, 7] in wireless communications. Specifically, for a system with many users that have independent varying channels, with high probability there is a user with channel much stronger than its average SNR requirement. Therefore, the system throughput may be maximized by choosing the user with "relatively best" channel for transmission at a given slot. However, some fairness constraints must be imposed on the scheduling policies to ensure the fair resource allocation.
It has been shown in [8] that scheduling users one-by-one can result in higher system throughput for high data rate traffic in the CDMA downlink. However, this work does not exploit the time-varying channel conditions. In [7, 9], a high-speed data rate scheme (HDR) is introduced, where the base station schedules the downlink transmission of a single user at a given time slot with the data rates and slot lengths varying according to the specific channel condition. In [1012], a transmission scheduling scheme for multiple users, which considers both the channel condition and queueing delay/length, is proposed and shown to be throughput optimal if it is feasible. However, the fairness issue is not explicitly addressed in that work. In [1315], a framework for opportunistic scheduling that maximizes the system performance by exploiting the time-varying channel conditions of wireless networks is presented. Three categories of scheduling problems—the temporal fairness, utilitarian fairness, and minimum-performance guarantee scheduling—are studied and optimal solutions are given.
Although the downlink transmission assignment is important for several applications, the efficient uplink transmission scheduling plays an important role as well, especially with the prevailing of multimedia communications and applications. It has been argued that the downlink scheduling method is not suitable to be applied to the uplink transmission scheduling, where simultaneous transmissions may result in higher throughput [16, 17]. The uplink transmission scheduling problem is more complicated and requires further consideration of additional elements to make the corresponding scheduling policies feasible [18]. The achievable throughput in such a case depends not only on the service access time, but also on the transmission powers and the corresponding users interference. In addition, multiple users can be scheduled simultaneously to transmit in the same time slot, which is a major difference from the wireline and TDMA-like scheduling schemes, making the respective scheduling processes either inapplicable or inefficient in the CDMA environment. The simple temporal fairness scheduling, where the main resource to be shared is the time, fails to provide rational fairness in this case. As a result, the throughput optimal and fair uplink transmission scheduling problem needs to jointly consider multiple factors such as access time, transmission power, channel conditions, and number of users to be scheduled at the same time. Heuristic approaches to address the problem of short-term fairness and demonstrate the tradeoff between fairness and throughput under some special cases have been introduced in [1921].
Furthermore, how to maximize the throughput of uplink CDMA system was first analyzed in [16]. The sole purpose of uplink throughput maximization can be achieved by choosing the "best" https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq1_HTML.gif users in terms of their received power, when they transmit at their maximum power. However, such throughput maximization does not consider fairness, that is, the equal opportunity for all users to receiving service despite their channel conditions. Therefore, among the objectives of our approach in this paper is to identify the actual "best" users that should transmit in order to maximize the throughput, when the fairness constraints are introduced and respected.
In [22], several scenarios of scheduling uplink CDMA transmission with voice and data services are analyzed. With the number of voice users and their corresponding transmission rates fixed, that work attempted to maximize the throughput of data service. It was shown that when the synchronization overhead is reasonable, a smaller number of simultaneous transmission users achieve higher system throughput and at the same time lower the average transmission power. However, in this case the achievable throughput is affected by the "weakest link." Therefore, this approach can be regarded only as a static analysis that considers the relationship between the performance and the number of users chosen for transmission. The problem of identifying the actual set of users to transmit based on their channel conditions, which may reduce the impact of the "weakest link", has not yet been investigated and is one of the main objectives of our paper.
In addition, the problem of uplink CDMA scheduling is further complicated by the fact that the conventional concept of capacity used in the wireline networks, for example, total bandwidth of the physical media, is not directly applicable in the CDMA systems. In this case, the actual system capacity is not fixed and known in advance, since it is a function of several parameters such as the number of users, the channel conditions, and the transmission powers.
Therefore, in summary the main contributions of this paper are as follows. (1) Jointly consider the factors of channel capacity, number of users and their interference, transmit power, and fairness requirements. (2) Formulate an optimization problem that stresses the fairness requirement under time-varying wireless environment and proves the existence of an optimal solution based on all constraints. (3) Exploit the power index concept and power index capacity, as a novel and effective way, to treat the fairness issue in the transmission scheduling policy under the considered uncertain and dynamic environment. (4) Devise a scheduling policy that achieves throughput fairness among the users and optimal system throughput under certain constraints.

1.2. Paper Outline

The rest of the paper is organized as follows. In Section 2, the system model that is used throughout our analysis is described, and the problem of the uplink scheduling in CDMA systems is rigorously formulated as a multiconstraint optimization problem. It is demonstrated that this problem can be expressed as a weighted throughput maximization problem, under certain power and QoS constraints, where the weights are the control parameters that reflect fairness constraints. Based on the concept of power index capacity, this optimization problem is converted into a simpler linear knapsack problem in Section 3.1, where all the corresponding constraints are replaced by the users power index capacities at some certain system power index. The optimal solution of the latter problem is identified in Sections 3.2 and 3.3, while in Section 3.4, a stochastic approximation method is presented in order to effectively identify the required control parameters. Section 4 contains the performance evaluation of the proposed method, along with some numerical results and discussion, and finally Section 5 concludes the paper.

2. System Model and Problem Formulation

In this paper, we consider a single cell DS-CDMA system with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq2_HTML.gif backlogged users at time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq3_HTML.gif . The users channel conditions are assumed to change according to some stationary stochastic process, while the uplink transmission rate is assumed to be adjustable with the variable spreading gain technique [23]. Each user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq4_HTML.gif is associated with some preassigned weight https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq5_HTML.gif according to its QoS requirement. In the following for simplicity in the presentation, we omit the notation of the specific slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq6_HTML.gif from the notations and definitions we introduce. Let us denote by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq7_HTML.gif the transmission rate of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq8_HTML.gif in the slot under consideration. We assume that the chip rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq9_HTML.gif for all mobiles is fixed, and hence the spreading gain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq10_HTML.gif of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq11_HTML.gif is defined as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq12_HTML.gif . Let us also denote by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq13_HTML.gif the required signal-to-interference and noise ratio (SINR) level of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq14_HTML.gif , by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq15_HTML.gif the corresponding channel gain, and by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq16_HTML.gif the user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq17_HTML.gif transmission power at a given slot, which, however, is limited by the maximum power value https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq18_HTML.gif . Therefore, the received SINR https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq19_HTML.gif for a user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq20_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq21_HTML.gif is the one-sided power spectral density of additive white Gaussian noise (AWGN), and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq22_HTML.gif determines the proportion of the interference from other users received power. Without loss of generality in the following, we assume https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq23_HTML.gif . Obviously, to meet the SINR requirement, the received SINR https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq24_HTML.gif has to be larger than the corresponding threshold https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq25_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq26_HTML.gif . In the following, we assume perfect power control in the system under consideration, while users are scheduled to transmit at the beginning of every fixed-length slot. The objective of the optimal scheduling policy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq27_HTML.gif is to find the optimal number of allowable users and their transmission rates, which achieves the maximum system throughput while maintaining the fairness property.

2.1. Problem Formulation

Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq28_HTML.gif denote the total throughput in slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq29_HTML.gif . Our objective function is to maximize the expectation of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq30_HTML.gif by selecting the optimal transmit power vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq31_HTML.gif and transmit rate vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq32_HTML.gif that is,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ2_HTML.gif
(2)
subject to specific SINR, maximum transmit power, and fairness constraints as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ3_HTML.gif
(3)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq33_HTML.gif denotes the mean throughput of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq34_HTML.gif in the corresponding backlogged period. It has been shown in [15, 24] that the above-constrained optimization problem can be considered as equivalent to the following problem (4), where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq35_HTML.gif is the minimal value among all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq36_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq37_HTML.gif . In (4), we transform the objective function (2) into finding the optimal transmit powers and rates that maximize the minimal normalized average rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq38_HTML.gif . Therefore,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ4_HTML.gif
(4)
Apparently, the solution of the above problem will finally make https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq39_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq40_HTML.gif since one can always reduce its throughput for the benefit of other users in order to maximize https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq41_HTML.gif . With the constraint https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq42_HTML.gif , the objective function then is generalized to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ5_HTML.gif
(5)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq43_HTML.gif is an arbitrary positive number. Here the crucial observation [24] is that the optimal scheduling policy will be the one that maximizes the sum of weighted throughputs and equalizes the normalized throughput. The maximization of mean-weighted rate in (5) is obtained by the maximization of the weighted rate in every slot, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq44_HTML.gif for every slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq45_HTML.gif . In conclusion, to obtain the optimal uplink throughput while keeping fairness, we must solve the following problem:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ6_HTML.gif
(6)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ7_HTML.gif
(7)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ8_HTML.gif
(8)
The fairness constraint, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq46_HTML.gif , is represented by the choice of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq47_HTML.gif . By adjusting the value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq48_HTML.gif , the user will get more or less opportunities to transmit data, and hence the corresponding normalized throughput is balanced. As we discuss later in this paper, the value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq49_HTML.gif can be approximated by a stochastic approximation algorithm, which has already found its application in [14, 15] under similar situations. Note that since we assume perfect power control in the CDMA system under consideration, only the equality case of (7) is considered here.
The following Proposition 1 states that the optimal solution is achieved when a user either transmits at full power or does not transmit at all.
Proposition 1.
The optimal solution that maximizes the weighted throughput of problem (6) is such that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ9_HTML.gif
(9)
Proof.
In order to minimize the multiple access interference, users transmit with the minimum required power to meet the required threshold https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq50_HTML.gif . Therefore, we consider the equality case of constraint (7). To maintain exactly the threshold https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq51_HTML.gif for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq52_HTML.gif , the achievable transmit rate is represented as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ10_HTML.gif
(10)
The objective function then becomes
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ11_HTML.gif
(11)
Differentiating twice with respect to the transmit power of a user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq53_HTML.gif , we obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ12_HTML.gif
(12)
Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq54_HTML.gif is positive number, obviously (12) is nonnegative, while the objective function is a convex function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq55_HTML.gif . Hence, the optimal solution of this problem is that the transmit power obtains the value of its boundary, that is, either 0 or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq56_HTML.gif .
In Section 3, the corresponding optimization problem is transformed to an equivalent problem of a simpler form, which facilitates the identification of the optimal solution. However, in the following we first introduce the concept of power index capacity which is used to represent the corresponding constraints, under the problem transformation.

2.2. Power Index Capacity

It has been shown in [25] that by solving the constraints (7) and (8), the following inequality must be satisfied if there exists a feasible power assignment https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq57_HTML.gif that meets the QoS requirements:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ13_HTML.gif
(13)
where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ14_HTML.gif
(14)
is defined as the power index of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq58_HTML.gif [26]. Relation (13) is the necessary and sufficient condition such that a power and rate solution is feasible under constraints (7) and (8) [25].
Let us regard https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq59_HTML.gif as the actual system load, which is the sum of power indices assigned to all backlogged users, while we assume that there is a target system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq60_HTML.gif . It should be noted that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq61_HTML.gif here is not fixed but has value https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq62_HTML.gif . The meaning and motivation for the definition of the target system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq63_HTML.gif are that the system will attempt to provide the appropriate scheduling in order to make the actual system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq64_HTML.gif reach the target load (however, it serves as an upper bound and cannot be exceeded). For an arbitrarily selected https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq65_HTML.gif in the range of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq66_HTML.gif , there exist two possible cases concerning the relationship between the actual system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq67_HTML.gif and the target system load. When considering small values for the target system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq68_HTML.gif , the system can easily make the actual system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq69_HTML.gif reach the target load under consideration, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq70_HTML.gif . On the other hand, when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq71_HTML.gif is large, especially when it approaches to 1, it may be impossible for the actual achievable system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq72_HTML.gif to reach https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq73_HTML.gif due to the limitation imposed by (13)). Let us assume that in time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq74_HTML.gif the maximum system load this system can achieve based on all users channel states and all possible user schedulings is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq75_HTML.gif . We will now consider the two cases mentioned above, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq76_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq77_HTML.gif .

2.2.1. Target Load Is Less than or Equal to Maximum System Load

If we assume https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq78_HTML.gif , then the system load can achieve the target load, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq79_HTML.gif . Therefore, (13) can be rewritten as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ15_HTML.gif
(15)
For each individual user, there is a limitation on the maximum power index that it can reach, given by (15)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ16_HTML.gif
(16)

2.2.2. Target Load Is Larger than Maximum System Load

If the target load is larger than the maximum system load, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq80_HTML.gif , it means there will be no feasible transmission power solution in (7) and (8) to achieve this target load and therefore the relationship in (15) does not hold any more. In this case, we simply apply the power index restriction of (16) to each user. The consequence is that the final achieved system load becomes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq81_HTML.gif since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq82_HTML.gif .
In fact, unless all possible transmission user sets are searched, it is unknown in advance whether or not the actual system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq83_HTML.gif can reach the chosen https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq84_HTML.gif . Therefore, applying (16) to the case https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq85_HTML.gif unifies the definition of the power index range, within which a user can be assigned a feasible power index without knowing the value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq86_HTML.gif . One key principle and rule regarding the algorithm proposed in this paper is to assign to an individual user a power index that is less than or equal to its power index capacity. In the power index assignment algorithm described in Section 3.2, the situation where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq87_HTML.gif may occur. However, it should be noted here that as proven by Theorem 1 later in the paper, the global optimal solution must be the one satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq88_HTML.gif . The target load range where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq89_HTML.gif is then not possible to be the optimal solution. The intentionally introduced restriction of (16) in the case of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq90_HTML.gif allows the algorithm to rule out such values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq91_HTML.gif due to the fact that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq92_HTML.gif in this case.

2.2.3. Definition of Power Index Capacity

Hence, given the system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq93_HTML.gif the maximum possible power index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq94_HTML.gif a user can accept in (15) is determined by the maximum transmit power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq95_HTML.gif and the channel gain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq96_HTML.gif .
Definition 1.
In a CDMA system with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq97_HTML.gif backlogged users at time slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq98_HTML.gif , given the target system power index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq99_HTML.gif , the maximum power index that does not violate (13) for a single user whose channel gain is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq100_HTML.gif is defined as the power index capacity (PIC) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq101_HTML.gif of this user.
From (15), it can be easily found that the PIC of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq102_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ17_HTML.gif
(17)
Note that in (17) the power index capacity is limited by the target system power index. This is reasonable since a power index capacity that is greater than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq103_HTML.gif will have no practical meaning and application. Furthermore, since our focus in this paper is to find an optimal scheduling policy as well as the optimal system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq104_HTML.gif , the value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq105_HTML.gif in (17) is not determined in advance.
Intuitively, the power index represents the relationship between the transmission power and the corresponding interference that is caused to other users. If we considered that the total system power index is fixed to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq106_HTML.gif , larger power index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq107_HTML.gif for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq108_HTML.gif indicates that it has relatively higher signal-to-interference ratio compared to the other users with smaller power index, while at the same time it causes more interference to them. Accordingly, users with high-power indices may lower their transmission power to reduce the interference they may cause, which in turn means that they will have smaller power index to limit the intracell interference of the system, and therefore satisfy (13) that guarantees the existence of a feasible transmission power solution.

3. Problem Transformation and Optimal Solution

3.1. Problem Transformation

The corresponding constraints in terms of the power index can be represented as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ18_HTML.gif
(18)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ19_HTML.gif
(19)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ20_HTML.gif
(20)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ21_HTML.gif
(21)
Note that in the objective function we represent the rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq109_HTML.gif as a function of power index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq110_HTML.gif , where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ22_HTML.gif
(22)
which converts the power index into transmission rate and can be easily derived from (14) by replacing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq111_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq112_HTML.gif .
In the following, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq113_HTML.gif denote the set that contains all the power and rate vectors that satisfy constraints (7) and (8) and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq114_HTML.gif . The elements https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq115_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq116_HTML.gif represent the transmit power and rate of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq117_HTML.gif th user in the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq118_HTML.gif th vector. Similarly, we define another set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq119_HTML.gif containing the power and rate vectors https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq120_HTML.gif that satisfy constraints (19), (20), and (21). By definition, it is obvious that any power and rate vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq121_HTML.gif is feasible. However, since in constraint (21), https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq122_HTML.gif may take a value, that is, close to 1 , the required transmit power could also accordingly become larger than maximum allowable transmit power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq123_HTML.gif if we simply look at the result from (15). The following proposition states that if perfect power control is assumed, for any rate (or power index) vector that satisfies constraints (19), (20), and (21), there always exists a feasible transmit power vector.
Proposition 2.
If the power index assignment for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq124_HTML.gif backlogged users satisfies constraints (19), (20), and (21), there always exists a feasible transmit power assignment, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq125_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq126_HTML.gif .
Proof.
Let vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq127_HTML.gif be the power index vector that satisfies constraints (19), (20), and (21). Denote https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq128_HTML.gif the sum of all power indices in vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq129_HTML.gif . From the definition of power index capacity, the power index capacity of each user is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq130_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq131_HTML.gif . Based on Definition 1 and (17), we have the following relation:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ23_HTML.gif
(23)
Hence, for any user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq132_HTML.gif , the transmit rate may be chosen within range
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ24_HTML.gif
(24)
which still satisfies the above inequality and proves this proposition. The power control of the CDMA system will choose the minimal transmit power, that meets the required SINR.
The following proposition proves that the two sets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq133_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq134_HTML.gif contain the same elements, which means that (19), (20), (21) and (7), (8) impose the same constraints over our problem.
Proposition 3.
Any vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq135_HTML.gif is also included in set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq136_HTML.gif , while any vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq137_HTML.gif is also included in set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq138_HTML.gif .
Proof.
Suppose that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq139_HTML.gif , and therefore it satisfies constraints (7), (8). It is apparent that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq140_HTML.gif . Since, as shown earlier, constraints (7), and (8) can also be represented by (13) [25], https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq141_HTML.gif also satisfies (13). Using function (22), we can convert the rate vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq142_HTML.gif into the corresponding power index vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq143_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq144_HTML.gif . For a feasible power and rate vector, with known https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq145_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq146_HTML.gif [25]), we can find each user power index capacity https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq147_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq148_HTML.gif satisfies (13), based on Proposition 2 and the definition of power index capacity, we conclude that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq149_HTML.gif . That means that the assigned powers and rates in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq150_HTML.gif also satisfy the constraints (19), (20), and (21). Therefore, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq151_HTML.gif .
Let us consider vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq152_HTML.gif . As before, the rate vector part can be converted to corresponding power index vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq153_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq154_HTML.gif and hence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq155_HTML.gif due to constraints (19), (20), and (21). Note that for the case where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq156_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq157_HTML.gif . Based on the previous discussion, we can easily conclude that the power vector is feasible. Therefore,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ25_HTML.gif
(25)
which satisfies (13)), for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq158_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq159_HTML.gif . Therefore, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq160_HTML.gif .
The above proposition shows that the optimal solution can also be obtained with the new constraints since they define the same solution set. Please note that, as mentioned before, the fairness constraints in the original problem are replaced by parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq161_HTML.gif . The choice of the proper values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq162_HTML.gif that maintain fairness is discussed in detail later in this paper.
Among the new constraints, the right-hand sides of inequalities (19) and (20) are not fixed values, but are functions of the selected target system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq163_HTML.gif . Hence, whether or not the final solution is feasible also depends on the choice of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq164_HTML.gif . For any value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq165_HTML.gif , there could be many feasible solutions among which one will be the optimal. Moreover, there must exist an optimal system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq166_HTML.gif that can achieve the overall best solution. It is natural to regard the objective https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq167_HTML.gif as the function of system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq168_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq169_HTML.gif , and thus https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq170_HTML.gif is the local optimal result at some specific https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq171_HTML.gif . The maximum https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq172_HTML.gif is achieved when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq173_HTML.gif . The ultimate objective of the proposed method is to find this optimal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq174_HTML.gif and the optimal power index assignment vector under it.
In Sections 3.2 and 3.3, we propose a two-step approach to solve the optimization problem (17)–(20). More specifically, in the first step (Section 3.2), we assume a fixed https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq175_HTML.gif and then given that fixed parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq176_HTML.gif we propose a simple method (greedy algorithm) trying to find the optimal set of users to receive service. However, this optimality is not a global optimality. In general, as mentioned before, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq177_HTML.gif could get any value within the interval https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq178_HTML.gif . The global optimal solution can be obtained when parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq179_HTML.gif is chosen to be the optimal one https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq180_HTML.gif . The actual objective of the second step of our approach (Section 3.3) is to find this optimal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq181_HTML.gif , by which the global optimal set of users that will be scheduled to receive service can be identified.

3.2. Greedy Algorithm for a Given System Load

Before obtaining the best system load, we first discuss how to find the local best solution. Assuming that the value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq182_HTML.gif is known, the right-hand sides of (19) and (20) can be determined. Combining the two constraints together, we can express the optimization problem (18) by replacing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq183_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq184_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq185_HTML.gif as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ26_HTML.gif
(26)
Note that (26) is a nonlinear continuous knapsack problem with the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq186_HTML.gif taking continuous values between 0 and 1. In general, solving this type of problem is proven to be difficult or even impossible in some cases [27]. However, Proposition 1 limits the transmit power of a user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq187_HTML.gif , to either https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq188_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq189_HTML.gif for the optimal solution. This condition provides a possible method to solve the above nonlinear knapsack problem. Without loss of generality, we suppose that the optimal solution is when the first https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq190_HTML.gif users transmit at their maximum power, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq191_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq192_HTML.gif . The optimal system load is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq193_HTML.gif . The following theorem states that the power index of an individual user is equal to its power index capacity under https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq194_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq195_HTML.gif .
Theorem 1.
Let the optimal solution allow https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq196_HTML.gif users to transmit at their maximum power and the system achieves the system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq197_HTML.gif . The power index that an individual user received in this case is equal to its power index capacity, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq198_HTML.gif .
Proof.
For those users whose transmit powers are zero, the corresponding power index capacities are also zero. Therefore, their power indices are zero as well. Without loss of generality, we assume that the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq199_HTML.gif users under consideration are identified as follows: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq200_HTML.gif . Based on Proposition 1, we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ27_HTML.gif
(27)
Performing some manipulations in these https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq201_HTML.gif equations, we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ28_HTML.gif
(28)
Letting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq202_HTML.gif , we obtain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq203_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ29_HTML.gif
(29)
From the definition of power index capacity, we find that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq204_HTML.gif .
With reference to the optimal solution of problem (26), we can prove the following theorem.
Theorem 2.
The optimal solution of the constrained optimization problem (26) can be obtained by solving the following linear 0-1 knapsack problem:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ30_HTML.gif
(30)
Proof.
Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq205_HTML.gif for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq206_HTML.gif , we present the objective function of (26) as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ31_HTML.gif
(31)
Based on Proposition 1, we know that the optimal solution is achieved when the transmit power of a user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq207_HTML.gif is either https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq208_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq209_HTML.gif . According to Theorem 1, in terms of power index that means that users are assigned either their power index capacity or 0 for the chosen system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq210_HTML.gif . In the above relation (31), the solution for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq211_HTML.gif is either 1 or 0. Therefore, we can modify (31) as follows without changing the final optimal solution:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ32_HTML.gif
(32)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq212_HTML.gif .
Instead of solving for the optimal solution of the above integer knapsack problem (30), which is in principle NP-hard, we utilize a greedy algorithm (GA) in order to obtain an approximate solution. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq213_HTML.gif denote the result achieved by the approximate solution, while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq214_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq215_HTML.gif denote the corresponding results of the optimal solutions for the integer and continuous knapsack problems, respectively. It has been proven that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq216_HTML.gif [28]. Furthermore, let
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ33_HTML.gif
(33)
which is a constant value for an individual user. Let us further suppose that all backlogged users are sorted in descending order according to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq217_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq218_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq219_HTML.gif . If it is not the case, these values can be sorted in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq220_HTML.gif time through an efficient procedure. Thus, the optimal continuous solution of problem (30) is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ34_HTML.gif
(34)
An algorithm that finds the critical point https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq221_HTML.gif within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq222_HTML.gif time in a system with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq223_HTML.gif users is provided in [28]. Based on solution (34), the greedy algorithm (GA) obtains the approximate solution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq224_HTML.gif as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ35_HTML.gif
(35)
where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ36_HTML.gif
(36)
It has been shown in [28] that in worst case https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq225_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq226_HTML.gif represent the result that corresponds to the integer solution of (32) when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq227_HTML.gif is assigned a value from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq228_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq229_HTML.gif be the result when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq230_HTML.gif . From the definition of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq231_HTML.gif , we know that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq232_HTML.gif is the maximum value among all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq233_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq234_HTML.gif . Based on Proposition 1 and the analysis in the previous subsection, it is easy to find that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq235_HTML.gif    https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq236_HTML.gif . Therefore, when the optimal system power index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq237_HTML.gif is chosen, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq238_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq239_HTML.gif and the equality https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq240_HTML.gif holds only when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq241_HTML.gif , and the optimal solution can be obtained.

3.3. Optimal System Load

As we discussed in the last subsection the optimal solution of problem (26) depends on the selected system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq242_HTML.gif . Relation (17) shows that the power index capacity increases as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq243_HTML.gif decreases. At the first point when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq244_HTML.gif , the power index capacity reaches its largest value and then it decreases linearly following the value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq245_HTML.gif . Although a smaller value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq246_HTML.gif may increase the single user power index capacity at some range, the finally achieved objective function could be low due to the small system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq247_HTML.gif . On the other hand, setting large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq248_HTML.gif reduces the individual user power index capacity as (17) indicates. The consequence of smaller power index capacity is that more users are required to share https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq249_HTML.gif , and probably a small objective function should be used due to the concavity of function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq250_HTML.gif that converts the power index to throughput. Therefore, whether or not the objective function reaches its maximum value depends not only on the value of the system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq251_HTML.gif , but also on how it is shared among the candidate users. There must exist an optimal value of system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq252_HTML.gif that can achieve the maximum weighted rate.
Let the power index vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq253_HTML.gif denote the optimal solution, which can be found through the method described in the previous section for a given specific value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq254_HTML.gif . Apparently, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq255_HTML.gif is a function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq256_HTML.gif . The objective function (18) is the sum of individual weighted rates that are obtained from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq257_HTML.gif using function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq258_HTML.gif . Therefore, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq259_HTML.gif can also be regarded as a function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq260_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq261_HTML.gif be the function that gives the maximum value of the sum of weighted rates at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq262_HTML.gif . Then the original optimization problem can be rewritten as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ37_HTML.gif
(37)
The optimal solution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq263_HTML.gif of the above problem and its corresponding power index assignment by (34) with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq264_HTML.gif provides the final optimal solution of (18).
Problem (37) is a simple unconstrained maximization problem that searches for the maximum https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq265_HTML.gif within the interval https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq266_HTML.gif . The disadvantage of (37) is that it does not have an explicit expression. Hence, algorithms that rely on the first- or second-order derivatives will not be applicable in this case. Therefore, the searching process depends on the result of (34). Note that every time when a new value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq267_HTML.gif is chosen, the order of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq268_HTML.gif may be different from that of previous https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq269_HTML.gif .
The time of calculating the best result for a newly chosen https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq270_HTML.gif , including the time of reordering the users (if needed), is easily obtained as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq271_HTML.gif if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq272_HTML.gif is assumed to be large enough. Moreover, there are many possible local maximum points within the range https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq273_HTML.gif . The final optimal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq274_HTML.gif must be a global best value. Although in [29] many searching algorithms on how to locate the minimum/maximum solution within a range are described, to make these algorithms effective there must be only one extreme point in the specified range. However, in general it is not possible to know the range which contains only the global optimal value. Thus, an exhaustive search within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq275_HTML.gif would be needed. However, the following proposition provides a lower bound https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq276_HTML.gif with respect to the searching range instead of 0 in order to restrict the corresponding feasible searching range.
Proposition 4.
The lower bound of the feasible searching range is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ38_HTML.gif
(38)
Proof.
With the decrease of the target system load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq277_HTML.gif , the individual power index, provided by (14)), will keep increasing till https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq278_HTML.gif reaches the point https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq279_HTML.gif for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq280_HTML.gif , that is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq281_HTML.gif . With respect to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq282_HTML.gif , if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq283_HTML.gif its power index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq284_HTML.gif . https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq285_HTML.gif is given by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq286_HTML.gif , which varies with different users since their https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq287_HTML.gif are not likely the same. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq288_HTML.gif be the minimum among all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq289_HTML.gif 's. Once https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq290_HTML.gif all backlogged users will have the same power index capacities https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq291_HTML.gif . Define a small increment https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq292_HTML.gif and let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq293_HTML.gif . Apparently, for all users their power indices will all have small increment https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq294_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq295_HTML.gif . Maintaining the previous power index assignment and giving https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq296_HTML.gif to any backlogged user will help increase the objective function (18). We hence can keep adding https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq297_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq298_HTML.gif till it reaches https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq299_HTML.gif , which proves this proposition.
Since the optimal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq300_HTML.gif can reside between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq301_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq302_HTML.gif , we need to calculate a series of sample values after every interval https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq303_HTML.gif . Apparently, the smaller the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq304_HTML.gif the more samples we get and thereby the more accurate is the obtained result. On the other hand, it also increases the required computational time and power.
Therefore, in practice we only use reasonably small https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq305_HTML.gif in order to reduce the corresponding computational power and complexity, while still obtain a good approximation of the optimal solution. It should be noted though that in theory when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq306_HTML.gif becomes infinitely small the above methodology can be used to find the optimal solution. Specifically, there exists an algorithm with complexity of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq307_HTML.gif that guarantees the finding of the optimal solution, however its high complexity limits its applicability for real-time computations and can be used only for benchmarking purposes. Let us assume that the order in (34) is known and fixed. Under this condition, there are only https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq308_HTML.gif possible results satisfying the optimal condition in Proposition 1, that is, try the maximum transmission power in the fixed order with number of users from 1 to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq309_HTML.gif . The maximum result is the optimal one. For any two users in the possible system load range from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq310_HTML.gif , their order of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq311_HTML.gif will change at most three times. Therefore, there are totally https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq312_HTML.gif order changes for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq313_HTML.gif users. Every order change requires first the sorting operation and then the comparison operation that have complexity of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq314_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq315_HTML.gif respectively, which makes the overall complexity of this method https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq316_HTML.gif .
The optimal algorithm is described as follows.
(1)
Find the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq317_HTML.gif points of target system load, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq318_HTML.gif , between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq319_HTML.gif where the users change their orders in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq320_HTML.gif . Such points represent actually any point that for any two users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq321_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq322_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq323_HTML.gif , which is,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ39_HTML.gif
(39)
 
Based on the definition of power index capacity in (17), the above equation will have at most three solutions.
(2)
Once the order is fixed, sort all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq324_HTML.gif users by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq325_HTML.gif in descending order. The value https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq326_HTML.gif can be calculated using any number between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq327_HTML.gif since the order will be the same within this range.
 
(3)
Perform https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq328_HTML.gif rounds of calculation of objective function (6). In round https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq329_HTML.gif , let the largest https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq330_HTML.gif users transmit with their largest transmit powers.
 
(4)
Compare the result of round ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq331_HTML.gif ) to that of round https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq332_HTML.gif . If the result in round ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq333_HTML.gif ) is less than round https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq334_HTML.gif , then stop the calculation. In that case, the result of round https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq335_HTML.gif is the best result in this order between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq336_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq337_HTML.gif .
 
(5)
The largest result obtained in step (4) is the global optimal solution.
 
Once the order is fixed in the range https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq338_HTML.gif at step (2), the method provided in Section 3.2 that finds the best local solution can be applied here, which will provide the largest https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq339_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq340_HTML.gif , users with this fixed order. The only difference is that the target system load is not provided directly by a specific known value https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq341_HTML.gif , but lies within a specific range. Based on Proposition 1, according to which the users allowed to transmit will use their maximum transmission power, we perform https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq342_HTML.gif rounds of calculation in step (3) and compare the results to find the optimal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq343_HTML.gif users.

3.4. Fairness Conditions

As mentioned before, fairness is controlled by the vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq344_HTML.gif . When changing the values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq345_HTML.gif , we are actually pursuing a set of optimal fixed values https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq346_HTML.gif that balance the rate of users with varying channel conditions and hence keep fairness. Since we do not know in advance the exact distribution of the channel conditions, and the number of users may also change, it is difficult to obtain vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq347_HTML.gif in advance. Therefore, a real-time algorithm is required that is capable of converging https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq348_HTML.gif toward https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq349_HTML.gif , while maintaining the asymptotic fairness. Stochastic approximation algorithm has been proven to be effective in estimating such parameters. Note that this algorithm has been implemented in [14, 15] in order to solve similar problems. Generally, the stochastic approximation algorithm is a recursive procedure for finding the root of a real-value function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq350_HTML.gif . In many practical cases, the form of function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq351_HTML.gif is unknown. Therefore, the result with the input variable https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq352_HTML.gif cannot be obtained directly. Instead, the observations of the results, sometimes with noise, will be taken. It has been proven that the root of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq353_HTML.gif can be estimated with the observation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq354_HTML.gif by the following procedure:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ40_HTML.gif
(40)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq355_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq356_HTML.gif . We can simply let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq357_HTML.gif . In most situations, the value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq358_HTML.gif may not be directly available, but instead the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq359_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq360_HTML.gif is the observation noise. In this case, the above approximation approach still applies, with the observed value replaced by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq361_HTML.gif . The convergence of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq362_HTML.gif to the root requires https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq363_HTML.gif .
Here, we define our function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq364_HTML.gif as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ41_HTML.gif
(41)
whose root https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq365_HTML.gif will make https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq366_HTML.gif which satisfies the fairness condition (3). The noise observation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq367_HTML.gif in our case is:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ42_HTML.gif
(42)
It is easy to prove that the mean of noise https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq368_HTML.gif . Therefore, the value of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq369_HTML.gif is then recursively obtained by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ43_HTML.gif
(43)
However, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq370_HTML.gif need to know the mean of total system throughput https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq371_HTML.gif . We use a smoothed value https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq372_HTML.gif to approximate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq373_HTML.gif and update https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq374_HTML.gif as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_Equ44_HTML.gif
(44)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq375_HTML.gif is the smooth factor which determines how the estimated https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq376_HTML.gif follows the change of actual achieved system throughput. In the remaining of the paper, throughout the performance evaluation of our approach, the value https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq377_HTML.gif is chosen. The numerical results presented in Sections 4.2.2 and 4.2.3, with respect to the convergence of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq378_HTML.gif 's and the achievable fairness, demonstrate that such a method is very effective in approximating the optimal values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq379_HTML.gif and therefore controlling and maintaining fairness.

4. Performance Evaluation

In this section, we evaluate the performance of the proposed method in terms of the achievable fairness and throughput, via modeling and simulation. Furthermore, to better understand the performance of the proposed scheduling algorithm-in the following we refer to as throughput maximization and fair scheduling (MAX-FAIR)—we compare it with the maximum throughput (MAX) scheme [16], which achieves the maximum total uplink throughput by allowing only the best https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq380_HTML.gif users in terms of their received power to transmit, and with the HDR algorithm [7, 9], which is a single user scheduling algorithm. The principles and operation of HDR basically refer to a proportional fair scheduling scheme, which can be used in the uplink scheduling to demonstrate the one-at-a-time proportional fair scheduling. Following the HDR principles the transmission of a single user at a given time slot is scheduled, with the data rates and slot lengths varying according to the specific channel condition. In the MAX scheme parameter, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq381_HTML.gif is determined by iteratively comparing the throughput of best https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq382_HTML.gif users, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq383_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq384_HTML.gif is the total number of users. The throughput achieved by MAX scheme is regarded as the upper bound throughput in the uplink CDMA scheduling. On the other hand, since HDR achieves temporal fairness, we consider it here to mainly observe the difference between temporal fairness and throughput fairness and their corresponding advantages in specific cases.

4.1. Model and Assumptions

Throughout our numerical study, we consider a single cell DS-CDMA multirate system with multiple active users. All active users are continuously backlogged during the simulation and generate packets with average size of 320 bytes. The maximum transmission power is assumed the same for all users, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq385_HTML.gif , while the system chip rate is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq386_HTML.gif as defined in IS-95 and the required SINR is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq387_HTML.gif  dB for data service, the same for all users. The transmission time is divided into 1 millisecond equal length slots, which is the algorithm scheduling interval, while the simulation lasts for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq388_HTML.gif slots.
To study the impact of the channel condition variations on the system throughput and fairness performance, we model the channels through an 8-state Markov-Rayleigh fading channel model [30]. According to this model, the channel has equal steady-state probabilities of being in any of the eight states. We also assume that the coherent time is much larger than the length of a time-slot, hence the channel state is assumed to be constant within a time slot. At the beginning of each time slot, the channel model decides to transit to a new state, which can only be itself or one of its neighbor states, that is, from state https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq389_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq390_HTML.gif https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq391_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq392_HTML.gif . Table 1 summarizes the state transition probabilities for all the eight states.
Table 1
Channel state transition probability.
 
s = 1
s = 2
s = 3
s = 4
s = 5
s = 6
s = 7
s = 8
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq393_HTML.gif
0.9304
0.8419
0.8170
0.8216
0.8349
0.8590
0.8945
0.9616
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq394_HTML.gif
0
0.069
0.0879
0.0894
0.0876
0.0777
0.0637
0.0384
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq395_HTML.gif
0.0696
0.0891
0.0951
0.089
0.0775
0.0633
0.0418
0
Furthermore, four different cases with respect to the ranges of the average SNRs that are assigned to the various users are considered. Specifically, Table 2 presents the corresponding ranges and lists the assignment of the average SNRs for each user for a seven-user scenario, under all these cases. The four different cases represent four different scenarios with respect to the SNR as follows (from top to bottom): large SNR range with low SNR users, low SNR, middle SNR, and high SNR. In the next subsection, we evaluate the performance of MAX-FAIR, MAX, and HDR methods under all four cases and compare their corresponding achieved throughput and fairness.
Table 2
Simulation cases with different SNR(dB) distribution.
 
1
2
3
4
5
6
7
Case: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq396_HTML.gif
−3
−3
−3
0
0
0
3
Case: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq397_HTML.gif
−4
−4
−4
−3
−3
−3
−2
Case: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq398_HTML.gif
0
0
0
1
1
1
1
Case: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq399_HTML.gif
2
2
2
3
3
3
4
In most of the numerical results presented in the next subsection, unless otherwise is explicitly indicated, all users are assumed to have the same weight. Such a scenario allows us to better understand and compare the achievable performances of the various scheduling schemes, when users have different channel conditions. However, the operation and effectiveness of the proposed MAX-FAIR policy is also demonstrated in an environment, where users present different weights.

4.2. Numerical Results and Discussion

The numerical results presented in Sections 4.2.1 and 4.2.2 refer mainly to the impact of some of the parameters associated with the proposed MAX-FAIR algorithm on its operation and achievable performance and allow us to obtain a better understanding of its operational characteristics and properties. Then in Sections 4.2.3 and 4.2.4, comparative results about the achievable throughput and fairness of the MAX-FAIR, MAX and HDR algorithms are presented.

4.2.1. Finite System Power Index Samples

Figure 1 shows the sensitivity of the weighted throughput achieved by the MAX-FAIR algorithm as a function of the number of samples used to obtain these values. The last point in the horizontal axis corresponds to the optimal value. It should be noted that in the vertical axis, the depicted weighted throughputs are normalized over the optimal value. Moreover, the different curves provided in this figure correspond to different combinations of the SNR ranges and the number of active users. As can be seen, the more samples we choose, the closer is the obtained maximum value to the optimal value, which clearly presents the tradeoff between the accuracy and the required computational power, as discussed before in Section 3.3. For instance, we observe that in the cases with small SNR range (e.g., [0,1] dB), even 20 samples are sufficient to get satisfactory results, while for the cases with larger SNR range (e.g., [−3,3] dB), more samples may be required.
Furthermore, as it can be observed from this figure, for the case of [0,1] dB, the larger the number of active users in the system, the less sensitive is the achievable maximum result to the number of samples (i.e., the slope of the corresponding curve becomes smoother as the number of active users increases). On the other hand, when there are users with high SNR values (e.g., [−3,3] dB), the increasing number of active users makes the achieved throughput drop slightly for small number of samples. This difference in the system behavior is closely related to a different number of simultaneously served users, under different SNR ranges and channel conditions, as depicted by the different observed service patterns in Figure 2.
Specifically, in Figure 2, we present the probabilities of the number of simultaneously served users in each scheduling cycle. For this experiment, we consider 40 backlogged users in the system and perform 200 trials. In each trial, users are randomly assigned the SNRs in the designated SNR range, following the 8-state model [30] described in Section 4.1. We observe that when there are users having high SNR values, for example, in the cases of [−3,3] dB and [2,4] dB, only a small number of users (at most 2 in this experiment), are served concurrently. However, in the case that all users have small SNR values, for example, in the case of [−4,−2] dB, the number of simultaneously served users increases significantly (it is distributed between 4 and 17 in our case as can be seen by Figure 2). Such user distribution indicates that in the case that a single user cannot consume all the system resources (e.g., the case where users have low SNR values), more users will be scheduled simultaneously in order to achieve a more efficient resource utilization and as a result increase the total system throughput. This also demonstrates the advantage of our proposed scheduling algorithm over the one-by-one scheduling algorithms that have been proposed in literature. As a result, with respect to Figure 1, for the case of [0,1] dB, multiple users are scheduled to reach the maximal throughput. Increasing the number of active users enables the system to schedule more available candidates to achieve higher throughput, and therefore the achievable result is less sensitive to the number of samples. However, for the case [−3,3] dB at most only 1 or 2 users are scheduled for simultaneous transmission. In the following experiments and numerical results, we adopt the accuracy of 100 samples, which is sufficient to reach 95% of the optimal-weighted throughput.

4.2.2. Parameter Convergence by Stochastic Approximation

As described in Sections 2.1 and 3.4, parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq400_HTML.gif 's are used to represent the fairness constraints in our optimization problem formulation. Figure 3 shows the dynamic change of parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq401_HTML.gif 's as the system and time evolve, for two different cases that correspond to two different SNR ranges. A seven-user scenario is considered, while for demonstration purposes for each case the corresponding values of only two representative users are presented—one user with strong channel and one user with weak channel. As mentioned before, all the users are assigned the same weight in order to more clearly demonstrate the influence of the channel conditions on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq402_HTML.gif 's. It can be seen by this figure that the converged values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq403_HTML.gif 's have the effect of compensating users with the weak channels and reducing the priority of users with strong channels in the scheduling policy. In fact, the converged values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq404_HTML.gif 's will make both users (weak and strong) to gain proper system resources and therefore achieve fair throughput. Please note that it is the relative values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq405_HTML.gif 's that control the priority of accessing the system resources, and not their absolute values. Furthermore, it should be noted that the lower the average SNR of a weak user, the larger the gap between the weak user and a strong user, which has negative impact on the achievable system throughput, as we will see in the following subsection.

4.2.3. Throughput and Fairness Performance

Figure 4 shows the average throughputs of all the users under the MAX-FAIR, MAX, and HDR methods, for a seven-user scenario where the average SNR range is [−3,3] dB and the corresponding average SNR assignments to the seven users are as shown in Table 2. In order to better demonstrate the tradeoff between the computational complexity and the achievable throughput of MAX-FAIR approach, we obtained the corresponding results under two different cases with respect to the number of power index samples (i.e., 20 and 100 samples). As observed in this figure the MAX-FAIR with 100 power index samples achieves slightly higher throughput, however it requires five times the computational power of the MAX-FAIR with 20 power index samples.
When compared to other two scheduling schemes, MAX-FAIR presents the best throughput-fairness performance (balances the achievable throughput of all users) despite the variable channel conditions of the different users, which indicates that the fairness is well maintained under the proposed scheduling algorithm. As mentioned before in the paper, the main objective of HDR is to achieve temporal fairness. Therefore, under HDR scheduling each user throughput is closely related to its channel conditions. That is why in Figure 4 we observe that users 1, 2, and 3 have smaller throughput than users 4, 5, and 6, while user 7 has the largest throughput under the HDR scheme. Under the MAX algorithm, user 7 consumes most of the system resources and achieves much higher throughput than the rest of the users due to the fact that the objective of MAX algorithm is to achieve the highest possible total system throughput, without however considering the fairness issue. In Figure 5, we further measure and evaluate the fairness performance by the standard deviation of the average throughput under all the four different SNR cases. Among the three algorithms, MAX-FAIR algorithm has the smallest deviation for all the different cases under consideration, while the corresponding values change only slightly from case to case. We also find that in general the standard deviation increases as the SNRs become higher. This happens because small fluctuation of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq407_HTML.gif results in larger throughput change, if all the users have higher SNR levels.
Figure 6 compares the corresponding average system throughputs of the three algorithms under evaluation, for the different SNR ranges (cases). As we expected, MAX-FAIR outperforms HDR in most cases due to the simultaneous scheduling of multiple users, as has been demonstrated in Figure 2, and consequently results in higher resource utilization. However, in the case of SNR range of [−3,3] dB, MAX-FAIR achieves slightly lower throughput than the HDR. The reason of that resides in the different fairness criteria considered and satisfied in these two algorithms, namely, the throughput fairness and temporal fairness. If we examine again Figure 3, we notice that users that have low average SNR (−3 dB) (e.g., users 1, 2, and 3) finally converge to a high https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq408_HTML.gif , which enables them to have equal opportunity to transmit under the MAX-FAIR scheduling policy. Due to their weak channel conditions, their average throughputs will be low and hence the total system throughput will become lower because of the satisfaction of the throughput fairness constraint. However, as explained before since access time is not the only resource to be shared among the users in these systems, considering throughput fairness instead of temporal fairness is more meaningful in these systems and environments, despite the slightly lower total throughput that can be achieved in some cases under this consideration. One possible alternative solution is to relax the fairness constraint if the QoS permits it. Our experiments have demonstrated that after relaxing fairness to 85% of its original requirement, the MAX-FAIR catches up and outperforms the HDR.
In order to obtain a more in-depth understanding of the MAX-FAIR fairness operation, in Figure 7, we present the achieved average throughputs for all the seven users under MAX-FAIR scheme, for a scenario where the SNR range is assumed to be [−3,3] dB, and the users are assigned different weights. The different weights can be considered as the mapping of different QoS requirements. In this scenario, users 1 and 4 have weight 1, users 2 and 5 have weight 2, while users 3, 6, and 7 have weight 4. Figure 7 demonstrates that the MAX-FAIR successfully schedules the transmissions and distributes the resources so that the various users achieve throughput according to their corresponding assigned weights. Specifically users with weights 2 and 4 obtain, respectively, two times and four times the throughput achieved by users with weight 1. In this figure, we also present (on the right-hand side vertical axis) the converged values of parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq409_HTML.gif 's. Here, the different values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq410_HTML.gif 's reflect both the channel condition variations and the weight differences. Please note that the relationship between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F564692/MediaObjects/13638_2008_Article_1696_IEq411_HTML.gif and weight is not linear due to the nonlinearity between the allocated resources and throughput.

4.2.4. Number of Users

Figure 8 shows the achieved total system throughput under MAX and MAX-FAIR algorithms as a function of the number of backlogged users, for the case where the users SNRs are located within [0,1] dB range. Please note that as mentioned before MAX algorithm provides the maximum uplink transmission throughput without considering the fairness property, and therefore is assumed to provide the upper bound throughput in uplink scheduling. From this figure, we can clearly observe the great advantage of the proposed MAX-FAIR approach and its ability to achieve very high throughput, while still maintaining fairness. When the number of backlogged users reaches a certain level, for example, 35 in this experiment, the throughput becomes flat for both MAX-FAIR and MAX, which means that the chances of improving the throughput by opportunistic scheduling with multiple users have been fully utilized.

5. Conclusions

In this paper, the CDMA uplink throughput maximization problem, while maintaining throughput fairness among the various users, was considered. It was shown that such a problem can be expressed as a weighted throughput maximization problem, under certain power and QoS requirements, where the weights are the control parameters that reflect the fairness constraints. A stochastic approximation method was presented in order to effectively identify the required control parameters. The numerical results presented in the paper, with respect to the convergence of the control parameters and the achievable fairness, demonstrated that this method is very effective in approximating the optimal values and therefore controlling and maintaining fairness. Furthermore, the concept of power index capacity was used to represent all the corresponding constraints by the users power index capacities at some certain system power index. Based on this, the optimization problem under consideration was converted into a binary knapsack problem, where the optimal solution can be obtained through a global search within a specific range.
The performance of the proposed policy in terms of the achievable fairness and throughput was obtained via modeling and simulation and was compared with the performances of other scheduling algorithms. The corresponding results revealed the advantages of the proposed policy over other existing scheduling schemes and demonstrated that it achieves very high throughput, while satisfies the QoS requirements and maintains fairness among the users, under different channel conditions and requirements.

Acknowledgment

This work has been partially supported by EC EFIPSANS Project (INFSO-ICT-215549).
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Adachi F, Sawahashi M, Suda H: Wideband DS-CDMA for next-generation mobile communications systems. IEEE Communications Magazine 1998, 36(9):56-69. 10.1109/35.714618CrossRef Adachi F, Sawahashi M, Suda H: Wideband DS-CDMA for next-generation mobile communications systems. IEEE Communications Magazine 1998, 36(9):56-69. 10.1109/35.714618CrossRef
2.
Zurück zum Zitat Wong KD, Varma VK: Supporting real-time IP multimedia services in UMTS. IEEE Communications Magazine 2003, 41(11):148-155. 10.1109/MCOM.2003.1244935CrossRef Wong KD, Varma VK: Supporting real-time IP multimedia services in UMTS. IEEE Communications Magazine 2003, 41(11):148-155. 10.1109/MCOM.2003.1244935CrossRef
3.
Zurück zum Zitat Berezdivin R, Breinig R, Topp R: Next generation wireless communications concepts and technologies. IEEE Communications Magazine 2002, 40(3):108-116. 10.1109/35.989768CrossRef Berezdivin R, Breinig R, Topp R: Next generation wireless communications concepts and technologies. IEEE Communications Magazine 2002, 40(3):108-116. 10.1109/35.989768CrossRef
4.
Zurück zum Zitat Sollenberger NR, Seshadri N, Cox R: The evolution of IS-136 TDMA for third-generation wireless services. IEEE Personal Communications 1999, 6(3):8-18. 10.1109/98.772974CrossRef Sollenberger NR, Seshadri N, Cox R: The evolution of IS-136 TDMA for third-generation wireless services. IEEE Personal Communications 1999, 6(3):8-18. 10.1109/98.772974CrossRef
5.
Zurück zum Zitat Ramis J, Carrasco L, Femenias G, Riera-Palou F: Scheduling algorithms for 4G wireless networks. IFIP International Federation for Information Processing 2007, 245: 264-276.CrossRef Ramis J, Carrasco L, Femenias G, Riera-Palou F: Scheduling algorithms for 4G wireless networks. IFIP International Federation for Information Processing 2007, 245: 264-276.CrossRef
6.
Zurück zum Zitat Viswanath P, Tse DNC, Laroia R: Opportunistic beamforming using dumb antennas. IEEE Transactions on Information Theory 2002, 48(6):1277-1294. 10.1109/TIT.2002.1003822MathSciNetCrossRefMATH Viswanath P, Tse DNC, Laroia R: Opportunistic beamforming using dumb antennas. IEEE Transactions on Information Theory 2002, 48(6):1277-1294. 10.1109/TIT.2002.1003822MathSciNetCrossRefMATH
7.
Zurück zum Zitat Bender P, Black P, Grob M, Padovani R, Sindhushayana N, Viterbi A: CDMA/HDR: a bandwidth-efficient high-speed wireless data service for nomadic users. IEEE Communications Magazine 2000, 38(7):70-77. 10.1109/35.852034CrossRef Bender P, Black P, Grob M, Padovani R, Sindhushayana N, Viterbi A: CDMA/HDR: a bandwidth-efficient high-speed wireless data service for nomadic users. IEEE Communications Magazine 2000, 38(7):70-77. 10.1109/35.852034CrossRef
8.
Zurück zum Zitat Berggren F, Kim S-L, Jäntti R, Zander J: Joint power control and intracell scheduling of DS-CDMA nonreal time data. IEEE Journal on Selected Areas in Communications 2001, 19(10):1860-1870. 10.1109/49.957302CrossRef Berggren F, Kim S-L, Jäntti R, Zander J: Joint power control and intracell scheduling of DS-CDMA nonreal time data. IEEE Journal on Selected Areas in Communications 2001, 19(10):1860-1870. 10.1109/49.957302CrossRef
9.
Zurück zum Zitat Jalali A, Padovani R, Pankaj R: Data throughput of CDMA-HDR a high efficiency-high data rate personal communication wireless system. Proceedings of the 51st IEEE Vehicular Technology Conference (VTC '00), May 2000, Tokyo, Japan 3: 1854-1858. Jalali A, Padovani R, Pankaj R: Data throughput of CDMA-HDR a high efficiency-high data rate personal communication wireless system. Proceedings of the 51st IEEE Vehicular Technology Conference (VTC '00), May 2000, Tokyo, Japan 3: 1854-1858.
10.
Zurück zum Zitat M. Andrews, K. Kumaran, K. Ramanan, A. Stolyar, P.Whiting, and R. Vijayakumar, “CDMA data QoS scheduling on the forward link with variable channel conditions,” Bell Labs Technical Memorandum 10009626-000404-05TM, Bell Labs, Paris, France, April 2000. M. Andrews, K. Kumaran, K. Ramanan, A. Stolyar, P.Whiting, and R. Vijayakumar, “CDMA data QoS scheduling on the forward link with variable channel conditions,” Bell Labs Technical Memorandum 10009626-000404-05TM, Bell Labs, Paris, France, April 2000.
11.
Zurück zum Zitat Andrews M, Kumaran K, Ramanan K, Stolyar A, Whiting P, Vijayakumar R: Providing quality of service over a shared wireless link. IEEE Communications Magazine 2001, 39(2):150-154. 10.1109/35.900644CrossRef Andrews M, Kumaran K, Ramanan K, Stolyar A, Whiting P, Vijayakumar R: Providing quality of service over a shared wireless link. IEEE Communications Magazine 2001, 39(2):150-154. 10.1109/35.900644CrossRef
12.
Zurück zum Zitat Shakkottai S, Stolyar A: Scheduling for multiple flows sharing a time-varying channel: the exponential rule. Bell Labs, Paris, France; 2000. Shakkottai S, Stolyar A: Scheduling for multiple flows sharing a time-varying channel: the exponential rule. Bell Labs, Paris, France; 2000.
13.
Zurück zum Zitat Liu X, Chong EKP, Shroff NB: Transmission scheduling for efficient wireless utilization. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 2: 776-785. Liu X, Chong EKP, Shroff NB: Transmission scheduling for efficient wireless utilization. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 2: 776-785.
14.
Zurück zum Zitat Liu X, Chong EKP, Shroff NB: A framework for opportunistic scheduling in wireless networks. Computer Networks 2003, 41(4):451-474. 10.1016/S1389-1286(02)00401-2CrossRefMATH Liu X, Chong EKP, Shroff NB: A framework for opportunistic scheduling in wireless networks. Computer Networks 2003, 41(4):451-474. 10.1016/S1389-1286(02)00401-2CrossRefMATH
15.
Zurück zum Zitat Liu Y, Knightly E: Opportunistic fair scheduling over multiple wireless channels. Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), March 2003, San Francisco, Calif, USA 2: 1106-1115. Liu Y, Knightly E: Opportunistic fair scheduling over multiple wireless channels. Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), March 2003, San Francisco, Calif, USA 2: 1106-1115.
16.
Zurück zum Zitat Jafar SA, Goldsmith A: Adaptive multirate CDMA for uplink throughput maximization. IEEE Transactions on Wireless Communications 2003, 2(2):218-228. 10.1109/TWC.2003.808958CrossRef Jafar SA, Goldsmith A: Adaptive multirate CDMA for uplink throughput maximization. IEEE Transactions on Wireless Communications 2003, 2(2):218-228. 10.1109/TWC.2003.808958CrossRef
17.
Zurück zum Zitat Xu L, Shen X, Mark JW: Dynamic bandwidth allocation with fair scheduling for WCDMA systems. IEEE Wireless Communications 2002, 9(2):26-32. 10.1109/MWC.2002.998522CrossRef Xu L, Shen X, Mark JW: Dynamic bandwidth allocation with fair scheduling for WCDMA systems. IEEE Wireless Communications 2002, 9(2):26-32. 10.1109/MWC.2002.998522CrossRef
18.
Zurück zum Zitat Li C, Papavassiliou S: Fair channel-adaptive rate scheduling in wireless networks with multirate multimedia services. IEEE Journal on Selected Areas in Communications 2003, 21(10):1604-1614. 10.1109/JSAC.2003.815596CrossRef Li C, Papavassiliou S: Fair channel-adaptive rate scheduling in wireless networks with multirate multimedia services. IEEE Journal on Selected Areas in Communications 2003, 21(10):1604-1614. 10.1109/JSAC.2003.815596CrossRef
19.
Zurück zum Zitat Cho J, Hong D: Tradeoff analysis of throughput and fairness on CDMA packet downlinks with location-dependent QoS. IEEE Transactions on Vehicular Technology 2005, 54(1):259-271. 10.1109/TVT.2004.836895CrossRef Cho J, Hong D: Tradeoff analysis of throughput and fairness on CDMA packet downlinks with location-dependent QoS. IEEE Transactions on Vehicular Technology 2005, 54(1):259-271. 10.1109/TVT.2004.836895CrossRef
20.
Zurück zum Zitat Kulkarni SS, Rosenberg C: Opportunistic scheduling policies for wireless systems with short term fairness constraints. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '03), December 2003, San Francisco, Calif, USA 1: 533-537.CrossRef Kulkarni SS, Rosenberg C: Opportunistic scheduling policies for wireless systems with short term fairness constraints. Proceedings of IEEE Global Telecommunications Conference (GLOBECOM '03), December 2003, San Francisco, Calif, USA 1: 533-537.CrossRef
21.
Zurück zum Zitat Li C, Papavassiliou S: Opportunistic scheduling with short term fairness in wireless communication systems. Proceedings of the Conference on Information Sciences and Systems (CISS '04), March 2004, Princeton, NJ, USA 167-172. Li C, Papavassiliou S: Opportunistic scheduling with short term fairness in wireless communication systems. Proceedings of the Conference on Information Sciences and Systems (CISS '04), March 2004, Princeton, NJ, USA 167-172.
22.
Zurück zum Zitat Ramakrishna S, Holtzman JM: A scheme for throughput maximization in a dual-class CDMA system. IEEE Journal on Selected Areas in Communications 1998, 16(6):830-844. 10.1109/49.709447CrossRef Ramakrishna S, Holtzman JM: A scheme for throughput maximization in a dual-class CDMA system. IEEE Journal on Selected Areas in Communications 1998, 16(6):830-844. 10.1109/49.709447CrossRef
23.
Zurück zum Zitat Ottosson T, Svensson A: On schemes for multirate support in DS-CDMA systems. Wireless Personal Communications 1998, 6(3):265-287. 10.1023/A:1008844314164CrossRef Ottosson T, Svensson A: On schemes for multirate support in DS-CDMA systems. Wireless Personal Communications 1998, 6(3):265-287. 10.1023/A:1008844314164CrossRef
24.
Zurück zum Zitat Borst S, Whiting P: Dynamic rate control algorithms for HDR throughput optimization. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 2: 976-985. Borst S, Whiting P: Dynamic rate control algorithms for HDR throughput optimization. Proceedings of the 20th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '01), April 2001, Anchorage, Alaska, USA 2: 976-985.
25.
Zurück zum Zitat Sampath A, Kumar PS, Holtzman JM: Power control and resource management for a multimedia CDMA wireless system. Proceedings of the 6th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '95), September 1995, Toronto, Canada 1: 21-25.CrossRef Sampath A, Kumar PS, Holtzman JM: Power control and resource management for a multimedia CDMA wireless system. Proceedings of the 6th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '95), September 1995, Toronto, Canada 1: 21-25.CrossRef
26.
Zurück zum Zitat Li C, Papavassiliou S: Joint throughput maximization and fair scheduling in uplink DS-CDMA systems. Proceedings of IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, April 2004, Princeton, NJ, USA 193-196. Li C, Papavassiliou S: Joint throughput maximization and fair scheduling in uplink DS-CDMA systems. Proceedings of IEEE/Sarnoff Symposium on Advances in Wired and Wireless Communication, April 2004, Princeton, NJ, USA 193-196.
27.
28.
Zurück zum Zitat Martello S, Toth P: Knapsack Problems: Algorithms and Computer Implementations. John Wiley & Sons, New York, NY, USA; 1990.MATH Martello S, Toth P: Knapsack Problems: Algorithms and Computer Implementations. John Wiley & Sons, New York, NY, USA; 1990.MATH
29.
Zurück zum Zitat Miller R: Optimization: Foundations and Applications.. John Wiley & Sons, New York, NY, USA; 2000.MATH Miller R: Optimization: Foundations and Applications.. John Wiley & Sons, New York, NY, USA; 2000.MATH
30.
Zurück zum Zitat Wang H, Moayeri N: Finite-state Markov channel—a useful model for radio communication channels. IEEE Transactions on Vehicular Technology 1995, 44(1):163-171. 10.1109/25.350282CrossRef Wang H, Moayeri N: Finite-state Markov channel—a useful model for radio communication channels. IEEE Transactions on Vehicular Technology 1995, 44(1):163-171. 10.1109/25.350282CrossRef
Metadaten
Titel
Joint Throughput Maximization and Fair Uplink Transmission Scheduling in CDMA Systems
verfasst von
Symeon Papavassiliou
Chengzhou Li
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2009/564692

Weitere Artikel der Ausgabe 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Zur Ausgabe

Premium Partner