Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01.12.2009 | Research Article

Multiuser Resource Allocation Maximizing the Perceived Quality

verfasst von: Andreas Saul, Gunther Auer

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2009

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Multiuser resource allocation for time/frequency slotted wireless communication systems is addressed. A framework for application driven cross-layer optimization (CLO) between the application (APP) layer and medium access control (MAC) layer is developed. The objective is to maximize the user-perceived quality by jointly optimizing the rate of the information bit-stream served by the APP layer and the adaptive resource assignment on the MAC layer. Assuming adaptive transmission with long-term channel state information at the transmitter (CSIT), we present a novel CLO algorithm that substantially reduces the amount of parameters to be exchanged between optimizer and layers. The proposed CLO framework supports user priorities where premium users perceive a superior service quality and have a higher chance to be served than ordinary users.

1. Introduction

With the high envisaged data rates of beyond 3rd generation (B3G) wireless communication systems [1, 2], multimedia broadband applications can be offered to mobile users. Multimedia applications are characterized by a multitude of data rate and quality of service (QoS) requirements. On the other hand, owing to the nature of the mobile radio channel, frequency selective fading, distance dependent path loss, and shadowing cause vast variations in the attainable spectral efficiency per user. The objective of multiuser resource allocation is to assign the available resources over the shared wireless medium to mobile users running different applications [3].
Orthogonal frequency division multiple access (OFDMA) provides orthogonal transmission slots in time and frequency, which may be flexibly assigned to the individual users [4, 5]. In B3G systems, this feature is exploited by the medium access control (MAC) layer to freely distribute the available bandwidth between users [6]. Provided channel state information at the transmitter (CSIT) is available, the number of transmitted information bits per slot can be adjusted to the channel conditions of a particular user.
The application (APP) layer outputs encoded applications, for example, a video stream. For the scalable video coding (SVC) extension [7, 8] of the advanced video coding (AVC) standard H.264/MPEG-4 AVC the stream may be received with a variable information bit rate. Other kinds of video streams may be encoded or transcoded [9] with the desired data rate. In general, any application may be delivered with variable information bit rate, allowing to trade user-perceived quality with data rate.
The high level of flexibility and adaptability offered by emerging system architectures provides an opportunity for dynamic allocation of resources across users and applications, to increase the network resource usage and to enhance the user satisfaction. This effectively requires interaction between system layers, a paradigm known as cross-layer design [1012]. For the multiuser resource allocation problem at hand, a global cross-layer optimization (CLO) problem is formulated: maximize the user-perceived quality by tuning the served data rate on the APP layer jointly with the adaptive resource assignment on the MAC layer. Application-driven CLO has been studied for systems supporting one single type of applications [11, 13, 14] as well as for various application classes [15].
Several publications [1517] consider a logarithmic relation between utility metric and data rate, which may result in a concave optimization problem. A more realistic utility metric, measuring the user-perceived quality, is given by the concept of mean opinion score (MOS) [18]. In [15], a framework is established that allows to mathematically formulate the MOS for multiple applications like voice, video streaming, and file download. The resulting nonconcave optimization problem may be approximated, for example, with a greedy algorithm that maximizes the sum of the MOSs for all users [19].
In this paper, the optimum multiuser resource allocation supporting multiple applications is derived in closed form for the case of adaptive transmission with long-term CSIT, assuming a logarithmic relation between utility metric and data rate. Interestingly, the cross-layer optimization problem is shown to become independent of the channel conditions but is entirely determined by the application characteristics, provided that the offered data rate at the APP layer is matched to the adaptive transmission parameters in the MAC layer. For the special case where all users share the same application class, it turns out that the overall perceived quality is maximized when all users are allocated the same bandwidth, which corresponds to equal resource sharing. This implies that users with good channel conditions transmit with higher rate and therefore enjoy better QoS, as adaptive transmission is more bandwidth efficient in this case. This is in a sharp contrast to conventional approaches for QoS provisioning that assume a fixed target rate per user [35], where users with poor channel conditions are allocated more bandwidth, so that all receivers perceive the same QoS.
The theoretical analysis serves as a basis for a novel CLO algorithm that allows for a more realistic utility function that is based on the MOS. The proposed algorithm for the underlying nonconcave optimization problem is easy to implement and exhibits significantly lower complexity than the generic solutions in [19, 20]. Moreover, priority classes can be supported in the way that premium users perceive superior service quality and are more likely to be served, even under poor channel conditions. The proposed framework also allows to cater for additional constraints, such as a guaranteed minimum perceived quality for all users.
The developed CLO framework for application driven multiuser resource allocation is evaluated by mathematical and numerical analysis. We elaborate for which application classes CLO attains the most significant gains, and the origin of these gains is identified. Furthermore, the computational cost and the overhead due to exchange of CLO related parameters between layers is studied. It is demonstrated that the overhead of the proposed CLO framework grows only linearly with the number of users and available slots, which compares to an exponentially growing overhead for conventional techniques [11, 12, 21, 22]. This is particularly relevant to B3G systems with their high degree of freedom for resource allocation, due to the large number of served users and available slots.
The remainder of this paper is structured as follows. Section2 provides an overview of the considered multiuser downlink with focus on MAC and APP layers. Section 3 introduces the CLO framework and the flow of exchanged parameters between layers and optimizer. In Section 4, the optimum multiuser resource allocation strategy is derived, assuming idealized application characteristics. The proposed CLO framework for the more realistic nonconcave optimization problem is established in Section 5, and its performance is evaluated by computer simulations in Section 6.

2. System Overview

A wireless downlink shared by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq1_HTML.gif users is considered. An application server is transferring multimedia applications via core network and base station to mobile users. There are https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq2_HTML.gif applications, which, without loss of generality, generate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq3_HTML.gif bit-streams, associated to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq4_HTML.gif different users.
In the considered shared wireless downlink the resources are divided into slots occupying a given bandwidth and time, which can be flexibly allocated to users. A scenario where mobile users travel with potentially high velocities is considered. The high dynamics of the time varying channel prohibit the utilization of instantaneous CSIT. However, long-term CSIT that includes distance dependent path loss and log-normal shadowing is assumed to be available. As the long-term CSIT is constant over the whole frequency band, multiuser scheduling corresponds to the well known packet-based generalized processor sharing (PGPS) [23]. A PGPS scheduler aims to assign slots to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq5_HTML.gif proportionally to a coefficient https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq6_HTML.gif , which serves as input parameter for the scheduler, as illustrated in Figure 1.
The long-term CSIT allows to extract the average signal-to-noise ratio (SNR) for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq7_HTML.gif , which is used to select an appropriate modulation and coding scheme for the respective user. The spectral efficiency of the selected symbol mapping and coding scheme for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq8_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq9_HTML.gif in  [bit/s/Hz]. Denote the number of symbols per slot by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq10_HTML.gif ; the number of transmitted information bits per slot for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq11_HTML.gif amounts to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq12_HTML.gif . Given user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq13_HTML.gif is assigned all available slots https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq14_HTML.gif exclusively, the maximum achievable data rate yields https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq15_HTML.gif . The actual data rate to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq16_HTML.gif by the PGPS scheduler is then given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ1_HTML.gif
(1a)
Additionally, the constraints
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ2_HTML.gif
(1b)
need to be fulfilled with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq17_HTML.gif being the set of all users; that is, the amount of assigned resources cannot be negative and the sum of all assigned resources equals the available resources.

2.2. Application Layer

The objective MOS is recommended as utility metric for voice transmission by the ITU-T [18] as a measure for the user satisfaction. Practically, the MOS may take values between 1 (not acceptable) and 4.5 (very satisfied). In [15], the MOS is extended to other services like video streaming, file download, and web browsing. The obtained mathematical model of the user-perceived quality can be used as universal utility metric for CLO, allowing for joint optimization of different application classes.
The application characteristic is mainly influenced by data rate and packet losses, described by the applications' rate-loss distortion [24]. In this paper, the perceived quality is exclusively expressed as a function of the data rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq18_HTML.gif , while packet losses are not considered as an explicit parameter. While this conveniently simplifies the analysis, this choice requires some further motivation, since certain kinds of source encoded bit-streams are sensitive to packet losses [11].
Packet losses may be caused by transmission errors over the mobile radio channel or by system overload. Regarding the wireless channel the link layer may compensate for packet losses by means of adaptive modulation and channel coding in combination with automatic repeat request (ARQ). While link adaptation ensures that transmission errors occur with low probability, low latency retransmissions of erroneous packets within the link layer [6] maintain reliable delivery of packets, at the expense of a certain rate reduction.
In an overloaded scenario, the offered load by the APP layer exceeds the capacity of the wireless link. Such an overload scenario can be effectively avoided by a fine grained adjustment of the offered data rate at the APP layer so as to match the capacity of the wireless link.
For instance, in case of video streaming, transcoding [9] or using the SVC extension of H.264/MPEG-4 AVC [7, 8] allows to vary the data rate in a rather fine granularity. As packets can be dropped at either the application server or the base station, a low latency rate adaption mechanism is feasible, at the same physical location as the scheduler in the MAC layer, effectively allowing to express perceived quality by data rate.
Moreover, the possibility to selectively drop packets offers one further opportunity to adjust the data rate. Likewise, for file downloads the data rate can also be adjusted in arbitrarily small steps. Hence, it is reasonable to assume that the application data rates can be adjusted continuously.

2.2.1. Video Streaming

We choose video streaming as one relevant example of an application class. In [25], a simple concave rate-distortion model is proposed for H.264/MPEG-4 AVC that relates the data rate of a video stream to the peak signal-to-noise ratio (PSNR):
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ3_HTML.gif
(2)
The parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq19_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq20_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq21_HTML.gif characterize a specific video stream or sequence, which is source encoded with rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq22_HTML.gif . These parameters may be determined by matching the distortion-rate model to the measured bit stream of a video.
According to [15, 26], the relationship between PSNR and MOS may be approximated by the bounded logarithmic function:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ4_HTML.gif
(3a)
with
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ5_HTML.gif
(3b)
The parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq23_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq24_HTML.gif denote the PSNR at which the perceived quality drops to "not acceptable" ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq25_HTML.gif ) and exceeds "very satisfied" ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq26_HTML.gif ), respectively.
The rate-distortion characteristic of a video typically varies over time, which means that the parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq27_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq28_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq29_HTML.gif are time variant. For example, during a scene cut a higher data rate is required to maintain a certain quality. As an example Figure 2 shows the rate-MOS model for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq30_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq31_HTML.gif of the well known "Foreman" video. The 9 different curves correspond to different parts of the video of 1 second duration each.

3. Application-Driven Cross-Layer Optimization

Cross-layer design implies that additional parameters are to be exchanged between link and APP layers, denoted as control information. Figure 3 illustrates the system architecture including the flow of control information. In the following, the architecture, functional blocks, and variables depicted in Figure 3 are described.

3.1. Layer Model

A major challenge in cross-layer design is the abstraction of parameters exchanged as control information. In order to limit the amount of control information, we introduce a layer model at the optimizer that emulates the relevant characteristics of the layer. The parameters of the layer model are determined at the corresponding layer, and only these parameters are sent as control information to the optimizer. The optimizer then tunes the model so as to identify the operating modes that maximize the chosen utility, which are then fed back to the system layers.
Figure 4 demonstrates the difference between the proposed model-based approach, and conventional parameter abstraction based on operating modes (crosses) and points (circles) [11, 12, 21, 22]. The X-axis indicates the choice of one parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq32_HTML.gif , and the Y-axis indicates the corresponding utility metric https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq33_HTML.gif . Depending on the choice of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq34_HTML.gif and further parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq35_HTML.gif that cannot be determined from Figure 4 different operating modes of the utility metric are achieved.
For instance, applied to a video stream the local utility https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq36_HTML.gif could be the PSNR or MOS, and according to (2) the parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq37_HTML.gif might represent source coding parameters such as the chosen codec, the frame rate, and the data rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq38_HTML.gif . As a second example, applied to the PHY layer the local utility might be the sum throughput of all users, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq39_HTML.gif are parameters such as the channel coefficients or the velocity of the mobile terminal.
Following the conventional idea of parameter exchange, an intralayer optimization might deliver the subset of operating modes that maximize the utility function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq40_HTML.gif , called efficient set in [22], also known as Pareto frontier. These operating modes are the crosses being located on the curve in Figure 4. A subset of operating modes is selected as operating points (circles). These are provided to the optimizer, which performs CLO by choosing the overall best operating point.
The proposed layer model is the curve in Figure 4, which represents an approximation of the utility metric https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq41_HTML.gif as a continuous function. As demonstrated in the following the proposed parameter abstraction by a layer model exhibits a significant advantage for multiuser resource allocation, due to the potentially large number of available slots.
For conventional CLO the parameters that are provided to the optimizer are the set of possible data rates for all users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq42_HTML.gif in (1). Considering an OFDMA-based B3G air interface with a large number of available slots, a prohibitive set of possible data rates is obtained. Instead of offering a set of discrete values to the optimizer, the link layer model defines the shares of the available resources per users, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq43_HTML.gif in (1), as continuous functions. The factors https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq44_HTML.gif allow the optimizer to tune the link layer model. Then, according to (1) an arbitrary number of data rate combinations https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq45_HTML.gif can be emulated at the optimizer. The only required parameters at the optimizer are the set of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq46_HTML.gif parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq47_HTML.gif . Hence, the link layer model for the optimizer is fully determined by (1). Once the optimizer has found an optimum set of coefficients https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq48_HTML.gif , these are fed back to the link layer.

3.1.2. Application Layer Model

The considered generic application characteristic resembles a bounded logarithmic relation between perceived quality and data rate as illustrated in Figure 5, described by the MOS as a function of the data rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq49_HTML.gif of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq50_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ6_HTML.gif
(4a)
with
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ7_HTML.gif
(4b)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ8_HTML.gif
(4c)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ9_HTML.gif
(4d)
The semilogarithmic plot of Figure 5 visualizes the related parameters: the parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq51_HTML.gif determines the slope of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq52_HTML.gif while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq53_HTML.gif shifts the curve along the X-axis.
Each user's application characteristic can be parametrized by only two parameters, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq54_HTML.gif , or alternatively https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq55_HTML.gif . The optimizer then tunes the model by maximizing the user-perceived quality and returns the set of optimum user data rates to the APP layer.

3.2. Parameter Exchange

3.2.1. System Description

Figure 3 shows a block diagram of the considered CLO framework and illustrates the signal flow of the exchanged control information between optimizer and layers. In order to formally describe the proposed model-based method of parameter exchange and optimization, we define the vector
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ10_HTML.gif
(5)
containing the maximum data rates of all users, the vector
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ11_HTML.gif
(6)
containing the optimization coefficients, the vector
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ12_HTML.gif
(7)
containing the actual data rates of all users, and the vector
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ13_HTML.gif
(8)
The parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq56_HTML.gif describes the application characteristic for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq57_HTML.gif , which is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq58_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq59_HTML.gif for the APP layer model from Section 3.1.2. In addition more detailed information about the applications in a real system may also be contained in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq60_HTML.gif .
The link layer model described in Section3.1.1 is defined by the vector function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq61_HTML.gif with elements
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ14_HTML.gif
(9)
which is given by (1). This means that based on the optimization coefficients https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq62_HTML.gif , which reflect the resource allocation on the link layer, the achievable data rates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq63_HTML.gif of the users are determined.
The application layer models detailed in Section 3.1.2, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq64_HTML.gif , are defined by the relationship
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ15_HTML.gif
(10)
That means for each application https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq65_HTML.gif there is a corresponding application model https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq66_HTML.gif available at the optimizer. The application model establishes a relationship between the data rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq67_HTML.gif and a utility metric. As common utility metric the mean opinion score https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq68_HTML.gif is used, defined by the vector
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ16_HTML.gif
(11)
containing the MOS of all users, which according to Figure 3 is delivered to the optimizer.
The optimizer uses a utility function
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ17_HTML.gif
(12)
providing a relationship between applications. The utility function should be symmetric regarding a permutation of its arguments and monotonic for each argument. We decide to maximize the sum of the MOSs of all applications and choose the utility function
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ18_HTML.gif
(13)
Using this utility function, the optimization problem
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ19_HTML.gif
(14a)
subject to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ20_HTML.gif
(14b)
is to be solved, which delivers https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq69_HTML.gif and via (1) also https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq70_HTML.gif . The optimizer outputs the resource assignments https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq71_HTML.gif and rate allocation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq72_HTML.gif to the MAC and APP layer, respectively.

3.2.2. Required Overhead

Reviewing the exchanged parameters, we notice that the vectors https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq73_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq74_HTML.gif contain only long-term information. No instantaneous CSIT, power allocation, modulation, or schedules have to be exchanged between PHY/MAC layer and the optimizer. Likewise the APP layer model specified in Section 3.1.2 is determined by only two parameters that are slowly time varying. This has the advantage that the system is less sensitive against delays caused by parameter exchange between layers and the optimizer. Robustness against delays is of importance for CLO as base station and application server are most likely located at different physical locations so that control information is to be exchanged over the core network.
If the principles of conventional CLO systems [21] are applied to our case, all considered schedules have to be transmitted from the link layer to the optimizer. For each schedule at least the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq75_HTML.gif data rates that the users achieve are transmitted. For https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq76_HTML.gif slots there are
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ21_HTML.gif
(15)
permutations (each representing one possible schedule). However, since a PGPS scheduler does not utilize channel knowledge, all slots may be considered equally. The scheduler's task is to assign https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq77_HTML.gif users to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq78_HTML.gif slots (which means to find all combinations of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq79_HTML.gif elements, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq80_HTML.gif at a time) whereas one user may be scheduled in multiple slots (repetitions are allowed). Hence, the actual number of schedules is smaller than (15) and is given by [27]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ22_HTML.gif
(16)
This means that for the conventional system [21]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ23_HTML.gif
(17)
data rate values have to be transmitted to the optimizer and one value is fed back as the chosen schedule.
Table 1 shows some numerical examples for the number of exchanged parameters. Although conventional CLO attains a significant reduction of exchanged parameters by intralayer optimization, which allows to consider only a subset of schedules (16), the control information overhead may still be prohibitive for a high number of users and slots. In contrast, the proposed parameter abstraction needs to transmit only https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq81_HTML.gif data rates from the link layer to the optimizer, while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq82_HTML.gif values are fed back. Of particular advantage is the fact that the control information overhead is independent of the number of slots https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq83_HTML.gif .
Table 1
Number of exchanged parameters.
Number of slots
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq84_HTML.gif
52
8
Number of users
 
2
8
Exchanged parameters for:
   
all possible schedules
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq86_HTML.gif
9.0e 15
1.3e 8
only schedules with different data rates
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq87_HTML.gif
107
5.1e 4
model-based proposal
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq88_HTML.gif
3
15

4. Optimum Resource Assignment

Based on the model-based CLO framework the optimum resource allocation assuming an idealized utility is derived in closed form in this section. The mathematical analysis is the basis of an optimization algorithm presented in Section 5, which maximizes a more realistic utility.

4.1. Problem Statement

The objective is to maximize the sum MOS of all users. With the specific link model (1) and application model (4) the optimization problem (14) can be formulated as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ24_HTML.gif
(18a)
subject to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ25_HTML.gif
(18b)
As the above optimization problem is neither convex nor concave, we first define an idealized utility that produces a concave optimization problem.

4.2. Unbounded Application Characteristic

Removing the bounds in the application model (4) results in an unbounded logarithmic relation between utility metric and data rate. The unbounded optimization problem is formulated as:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ26_HTML.gif
(19a)
subject to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ27_HTML.gif
(19b)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ28_HTML.gif
(19c)
The optimization (19a) can be simplified as:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ29_HTML.gif
(20)
with the equivalent utility function
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ30_HTML.gif
(21)
The vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq89_HTML.gif contains coefficients that characterize the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq90_HTML.gif applications as defined in (4b).
Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq91_HTML.gif and, hence, the solution of the unbounded optimization problem is independent on the physical radio channel, characterized by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq92_HTML.gif , and only depends on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq93_HTML.gif , which is determined by the ratio between https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq94_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq95_HTML.gif .
For finding a closed form solution of the optimum resource assignment https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq96_HTML.gif in (19), in the following we prove the concavity of the optimization problem, derive the optimum share of resources between two users, and find a solution for the absolute resource share of a user.
Reformulating the constraint (19c) as:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ31_HTML.gif
(22)
and inserting the result into (21) yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ32_HTML.gif
(23)
Now, the first and second partial derivatives in directions of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq97_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq98_HTML.gif can be determined,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ33_HTML.gif
(24)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ34_HTML.gif
(25)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ35_HTML.gif
(26)
Considering (4b) and (4d), it follows that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq99_HTML.gif so that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ36_HTML.gif
(27)
and
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ37_HTML.gif
(28)
This means that the graph is strictly concave downwards and any extremum not being located on the domain borders maximizes the utility. Therefore, provided for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq100_HTML.gif the following condition is satisfied
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ38_HTML.gif
(29)
the global maximum is found. Setting (24) to zero yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ39_HTML.gif
(30)
Likewise, the optimum share for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq101_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq102_HTML.gif , when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq103_HTML.gif is fixed, is determined by differentiating (24) with respect to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq104_HTML.gif and setting the result to zero, which corresponds to swapping users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq105_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq106_HTML.gif in (30). By combining the result with (30) the dependency to other users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq107_HTML.gif disappears. This means that the relation between the optimum resource assignments of any two users, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq108_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq109_HTML.gif , is independent of all other users' utility functions. After some algebraic manipulations the relation
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ40_HTML.gif
(31)
between the optimization coefficients of users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq110_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq111_HTML.gif is obtained.
For finding an absolute value for the optimization coefficients https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq112_HTML.gif the relation (31) is inserted into the constraint (19c), which yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ41_HTML.gif
(32)
as the final solution of the unbounded optimization problem (19).
As a special case it can be easily seen from (32) that if all users have the same parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq113_HTML.gif , then the resources are distributed equally to the users,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ42_HTML.gif
(33)
Interestingly, given that all users use the same application, the optimum resource allocation for the unbounded problem results in an equal resource scheduler where all users are assigned the same number of slots. This implies that users experiencing a good channel receive higher data rates and therefore enjoy better QoS, as adaptive transmission is more bandwidth efficient in this case.
In summary, the optimum resource allocation for the unbounded optimization problem (32) is independent of the channel conditions; the number of assigned slots (the allocated bandwidth) is exclusively determined by the application characteristics; users with a good channel enjoy higher data rates. On the other hand, all users are given a fair share of the available resources. This is in a sharp contrast to a maximum throughput scheduler, which exclusively serves good users while users experiencing a poor channel starve for resources. The significance of this finding is that the maximized utility in (19) is an idealized measure of user-perceived quality.

4.3. Subset of Users

For solving the bounded optimization problem (18), it is useful to solve the unbounded problem only for a subset of "variable" users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq114_HTML.gif . The remaining users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq115_HTML.gif have fixed optimization coefficients https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq116_HTML.gif and are not subject to optimization. Here, the notation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq117_HTML.gif denotes the relative complement of set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq118_HTML.gif in set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq119_HTML.gif .
The constraint (19c) is rewritten as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ43_HTML.gif
(34)
Following the derivation in Section 4.2, inserting (31) gives
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ44_HTML.gif
(35)
which finally yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ45_HTML.gif
(36)

5. Optimization Algorithm Maximizing the User-Perceived Quality

Based on the analytical solution for the unbounded problem in Section 4, an optimization algorithm for the bounded problem (18) is presented in this section. In an intermediate step a solution for the upper bounded problem is derived, where the application characteristic https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq120_HTML.gif is upper bounded at an MOS of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq121_HTML.gif . Then the solution of the bounded problem is developed, and its computational complexity is assessed. Finally, the proposed CLO algorithm is extended to support different priority classes.

5.1. Upper Bounded Problem

We define the upper bounded application characteristic by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ46_HTML.gif
(37)
which gives the upper bounded optimization problem
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ47_HTML.gif
(38a)
subject to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ48_HTML.gif
(38b)
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq122_HTML.gif denote the optimum rate allocation of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq123_HTML.gif of the unbounded problem (32). In case https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq124_HTML.gif , the rate for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq125_HTML.gif may be reduced to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq126_HTML.gif without sacrificing service quality, and the retained resources can be given to users with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq127_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq128_HTML.gif . A solution of this concave problem is found by the iterative algorithm:
Step 1.
Initially, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq129_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq130_HTML.gif .
Step 2.
Solve unbounded problem (36).
Step 3.
Users with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq131_HTML.gif are moved from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq132_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq133_HTML.gif and set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq134_HTML.gif .
Step 4.
If any user has been moved in Step 3, continue with Step 2, otherwise stop.
If any of the application characteristics deviates from (4), Step 2 can be replaced by a conventional algorithm that solves the unbounded problem. Alternatively, appropriate values for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq135_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq136_HTML.gif can be chosen to approximate the real application characteristic, giving rise to a certain deviation to the exact solution. Optionally, this approximation could be used as a starting point for an applicable conventional algorithm.

5.2. Bounded Problem

We approach the bounded optimization problem (18) by dividing it into two subproblems: first, a subset of users is determined who cannot be served and therefore get no resources, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq137_HTML.gif ; second, for the remaining users the upper bounded optimization problem from Section 5.1 is solved. In case dropped users are selected appropriately in the first step, the remaining served users will always achieve data rates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq138_HTML.gif so that the solution for the bounded problem is optimum.
The following iterative algorithm for the solution of the bounded problem is formulated as follows.
Step 1.
Initially, all users are served.
Step 2.
Drop users as detailed in Steps 2.1–2.4.
Step 2.1.
If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq139_HTML.gif is fulfilled, continue with Step 3.
Step 2.2.
Solve upper bounded problem for the served users as described in Section5.1.
Step 2.3.
User https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq140_HTML.gif is dropped by setting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq141_HTML.gif .
Step 2.4.
Continue with Step 2.1.
Step 3.
Solve upper bounded problem for the served users as described in Section 5.1 and stop.
In this algorithm the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq142_HTML.gif determines how many users are served. When the objective is to maximize the sum of all users' MOS, referred to as "increase sum MOS", an appropriate strategy is to continue dropping users until this does not further improve the sum MOS.
An alternative https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq143_HTML.gif is to check
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ49_HTML.gif
(39a)
where
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ50_HTML.gif
(39b)
This condition checks whether the MOS that would be achieved with the allocated resources https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq144_HTML.gif exceeds a certain minimum https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq145_HTML.gif . Setting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq146_HTML.gif ensures that only a minimum of users are dropped, while no resources are wasted to users that would anyhow experience unacceptable service quality of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq147_HTML.gif . On the other hand, higher values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq148_HTML.gif enforce a certain minimum perceived quality. This variant of the algorithm is therefore termed "reduce outage".
As the above discussion touches upon the issue of admission control, other criteria that determine which users are admitted to the system might be introduced. For example, in a cellular system it might be desirable to give priority to users that hand over from a neighboring cell rather than to serve a user who wishes to enter the network.

5.3. Computational Complexity

An appealing feature is that the proposed optimization algorithm deterministically terminates after a certain time. To prove this the worst case run time is calculated in the following. Since in each iteration at least one user is dropped, there are at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq149_HTML.gif iterations in the outer loop. The inner loop computes the solution of the upper bounded problem. In the worst case, one user is moved from https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq150_HTML.gif to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq151_HTML.gif so that the number of iterations at most equals the number of served users. The total number of iterations is therefore upper bounded by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq152_HTML.gif .
An observation from the simulation results in Section 6 is that typically most users can transmit. Hence, the number of iterations for the outer loop is likely to be significantly smaller than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq153_HTML.gif . Likewise, trials suggest that for the inner loop it is rather unlikely that more than two iterations are required. Since the essential calculation within the inner loop is given by the closed form expression (36), the total complexity of the optimization algorithm is low.

5.4. Priority Classes

In order to support different priority classes, the utility function is adjusted in the following.
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq154_HTML.gif be a real number that reflects the priority of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq155_HTML.gif where, without loss of generality, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq156_HTML.gif indicates that user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq157_HTML.gif has a higher priority than user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq158_HTML.gif . Priority classes are incorporated to the utility function by substituting the application dependent constant https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq159_HTML.gif in (19) by the function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq160_HTML.gif , that is,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ51_HTML.gif
(40)
In the calculation of the first and second partial derivatives in direction of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq161_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq162_HTML.gif in (24), (25), and (26), https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq163_HTML.gif is treated as a constant. Therefore, the derivation of the unbounded optimization problem in Section 4.2 also applies to the priority function https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq164_HTML.gif , if the following condition holds
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ52_HTML.gif
(41)
Likewise, (4b) and (4d) strictly require a positive constant https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq165_HTML.gif , which translates to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ53_HTML.gif
(42)
Under these conditions, the conclusions from Section 4.2 apply: the utility function that supports priority classes (40) is strictly concave downwards, and the underlying optimization problem is solved by substituting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq166_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq167_HTML.gif in (31), (32), and (36).
An intuitive realization of a priority function that satisfies the constraints (41) and (42) is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_Equ54_HTML.gif
(43)
which is similar to the approach described in [19]. This function is applied for obtaining the numerical results presented in Section 6.5.
There are several possibilities how to further incorporate priority classes, for example, by adjusting the upper bound of the upper bounded optimization problem, the stop criterion or by using an alternative criterion for dropping users.

6. Performance Evaluation

The performance of the proposed CLO framework is evaluated by means of system simulations. The link layer parameters listed in Table 2 mostly follow the WINNER (World Wireless Initiative New Radio, URL: http://​www.​ist-winner.​org/​) system concept [2].
Table 2
Link layer parameters.
Transmission scheme
OFDMA
Number of subcarriers
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq168_HTML.gif
Cyclic prefix duration
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq169_HTML.gif
Symbol mapping
BPSK, 4-, 16-, 64-QAM
Channel coding
Convol., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq170_HTML.gif
Channel bandwidth
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq171_HTML.gif
Channel model
WINNER urban macro-cell [28]
Duplex ratio DL/UL
1/1
Cell radius
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq172_HTML.gif
Shadowing
log-normal, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq173_HTML.gif
Path loss
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq174_HTML.gif
Center frequency
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq175_HTML.gif
Transmit power
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq176_HTML.gif
Antenna gain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq177_HTML.gif
Noise figure
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq178_HTML.gif
Noise spectrum density
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq179_HTML.gif
Delay spread
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq180_HTML.gif
Maximum Doppler speed
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq181_HTML.gif
Slot size (freq. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq182_HTML.gif time)
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq183_HTML.gif
Number of users
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq184_HTML.gif
Number of available slots
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq185_HTML.gif
Scheduler
PGPS

6.1. Simulation Setup

We consider an OFDMA downlink that occupies a bandwidth of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq186_HTML.gif . Due to the inherent orthogonality of orthogonal frequency division multiplexing (OFDM), each subcarrier in each OFDM symbol may be assigned to a different user without causing interference, so that users can be scheduled independently in time and frequency. Adjacent subcarriers and OFDM symbols are correlated and, therefore, experience a similar channel gain. In order to limit the signaling overhead https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq187_HTML.gif symbols are grouped to form one slot.
The WINNER typical urban macrocell channel (model C2 [28]) is used, which models channel attenuation due to frequency selective fading, distance dependent path loss and log-normal shadowing [29]. Instantaneous channel variations due to velocities of mobile users are generated using Jakes' model [30]. The channel model is implemented such that the average SNR always allows transmission with the lowest supported modulation and coding scheme. This is motivated by the fact that users with lower SNR would not be able to establish a connection to the base station and, hence, cannot request to be served. While the average SNR always exceeds the given limit, the instantaneous SNR may be significantly lower due to frequency selective fading.
Mobile velocities up to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq188_HTML.gif are assumed, which implies that instantaneous CSIT may not be available. It is assumed that the average SNR over all simultaneously transmitted slots is available for link adaptation. Hence, the same modulation and coding scheme is applied to all subcarriers of one user during one slot duration. However, slots assigned to different users will typically use a different modulation and coding scheme.
The transmitter chooses the symbol mapping with cardinality https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq189_HTML.gif and code rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq190_HTML.gif of a convolutional code, based on the average SNR of each user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq191_HTML.gif (see Figure 6). Note that due to half-duplex transmission the average data rate is only half of the instantaneous data rates indicated in Figure 6. The modulation and coding scheme is selected that achieves the largest spectral efficiency https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq192_HTML.gif at a frame error rate (FER) of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq193_HTML.gif . The SNR values for which https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq194_HTML.gif are determined by reference simulations and are stored in a look-up table. It is assumed that an ARQ protocol at the link layer takes care of error events by retransmitting erroneously received packets. Due to the low occurrence of errors at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq195_HTML.gif retransmissions only have marginal impact on the throughput and will therefore not affect the perceived quality. Hence, simulations assume that packets are always received error free.
For CLO the long-term average data rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq196_HTML.gif for each user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq197_HTML.gif indicates the link capacity and is the relevant abstraction of the link layer. Figure 7 shows the cumulative distribution function (CDF) of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq198_HTML.gif , which is averaged over a large number of randomly chosen channel realizations and user locations within a cell.
Simulations are executed as follows: every 100 milliseconds independent shapshots of path loss and shadowing realizations are generated for each user according to a uniform user distribution within the cell area. Then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq200_HTML.gif is estimated and passed to the optimizer. CLO is performed to determine the optimum share of resources https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq201_HTML.gif , which is subsequently fed back to the PGPS scheduler at the MAC layer.
After the 100-millisecond snapshot, the actually achieved average data rates are determined. The actually achieved data rates may deviate from the optimizer's estimate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq202_HTML.gif . Each user's MOS is determined based on the user's application and the achieved data rate. Then, the CDF of the MOS averaged over all users is calculated.

6.2. Performance of Different Optimization Algorithms

In Figure 8, the CDF of the MOS is shown for the different resource allocation strategies and optimizer variants discussed in Section 5. The applications of all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq203_HTML.gif users are described by the same parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq204_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq205_HTML.gif (compare Figure 5). As a reference equal resource allocation with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq206_HTML.gif for all 16 users is also plotted, which is the optimum resource assignment of the unbounded optimization problem (19) (see Section 4.2). Greedy resource allocation [19], as a conventional technique for solving optimization problems, is also included for comparison. From our experience the Greedy algorithm is significantly more computationally expensive than the proposed CLO algorithm. The other two curves show the performance of the proposed algorithm, the "increase sum MOS," and the "reduce outage" variants, where the stop criterion is set to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq207_HTML.gif .
As seen in Figure 8, both variants outperform equal resource allocation and achieve a comparable average MOS as greedy resource allocation. Compared to equal resource allocation, any performance improvement of the considered optimization algorithms is due to the bounds in the MOS trajectory, since users with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq208_HTML.gif perceive the same QoS as if they were served with the reduced rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq209_HTML.gif . Likewise, users with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq210_HTML.gif perceive the same QoS as a user who is not served at all. The "reduce outage" variant serves practically all users, although some perceive a poor service quality. In contrast, the "increase sum MOS" variant tends to drop users with poor quality and assigns the freed resources to served users. This is due the objective, which aims to maximize the sum MOS of all users: a user will be dropped, if the increase in MOS of the served users outweighs the decrease in MOS of dropping a certain user.

6.3. Deviation Due to Application Model Abstraction

In Section6.2, the application is characterized by the idealized bounded logarithmic relationship (4), so that the APP layer model at the optimizer perfectly matches the application characteristics. In order to assess the benefits of CLO in a real system with real applications running, a video streaming example is chosen where the user-perceived quality is approximated as described in Section 2.2.1. Eight different H.264/MPEG-4 AVC videos in common intermediate format (CIF) resolution at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq211_HTML.gif frame rate are cut into snippets containing one group of pictures (GOP) each. With a GOP size of 32 frames the snippets contain approximately 1 second of video. Further parameters of the videos are summarized in Tables 3 and 4. The snippets are subsequently analyzed to extract the parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq212_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq213_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq214_HTML.gif for each snippet.
Table 3
Video parameters.
Video coding
H.264/MPEG-4 AVC [7]
Implementation
JSVM 9.12.2, 25 April 2008 [31]
Resolution
CIF (352 × 288)
Frame rate
30 Hz
Chroma subsampling
4:2:0
GOP size
32
GOP coding structure
I-P- https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq215_HTML.gif -P
PSNR range
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq216_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq217_HTML.gif
Table 4
Transmitted video streams.
Video name
Duration (GOP)
Average desired data rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq218_HTML.gif
Ratio https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq219_HTML.gif
Foreman
9
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq220_HTML.gif
18
Mother
9
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq221_HTML.gif
26
News
9
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq222_HTML.gif
11
Container
9
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq223_HTML.gif
22
Salesman
9
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq224_HTML.gif
40
Bus
4
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq225_HTML.gif
7
City
9
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq226_HTML.gif
13
Crew
9
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq227_HTML.gif
15
In order to assess the effect of rate variations of the video stream over time, for each 100-millisecond PHY channel snapshot a new (random) snippet of the respective video stream is used. For the proposed optimization algorithm from Section5 the parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq228_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq229_HTML.gif are estimated by the application server for each video snippet and provided to the CLO. Because the optimization algorithm is based on the bounded logarithmic relationship (4), which deviates from the actually used video model (3), the decided resource distribution will be suboptimum. For comparison CLO with greedy optimization using the exact video model (3) is also simulated.
As seen in Figure 9, for the considered real video streams similar conclusions as for the generic applications from Section 6.2 can be drawn. The considered optimizers exhibit similar performance, achieving a significantly superior MOS with respect to equal resource allocation.

6.4. Guaranteed Service Quality

It may be desirable to support the demand for minimum QoS. This may be accomplished by tuning the parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq230_HTML.gif of the stop criterion in the "reduce outage" variant of the proposed optimization algorithm. As the stop criterion controls which users are dropped from the list of active users (see Section5.2), setting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq231_HTML.gif to a value in the range https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq232_HTML.gif ensures that all served users achieve at least a minimum perceived quality of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq233_HTML.gif .
Figure 10 shows the CDF of the achieved sum MOS for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq234_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq235_HTML.gif . The higher https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq236_HTML.gif the less users achieve the required data rates due to poor channel conditions and are therefore not served. On the other hand, the served users with better channels benefit from freed resources of the dropped users, which improves their perceived quality.
Figure 11 shows the MOS, averaged over all users and channel realizations, against https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq238_HTML.gif . The choice of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq239_HTML.gif affects the overall perceived quality and the maximum is approached for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq240_HTML.gif . In case https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq241_HTML.gif , users with poor channels are served, which have only a marginal contribution to the overall sum MOS. On the other hand, if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq242_HTML.gif , an increasing number of users are denied service, which cannot be compensated by the enhanced QoS of the remaining active users. The perceived quality achieved by the "increase sum MOS" variant, which approximates the maximum sum MOS, is also indicated in Figure 10.

6.5. Traffic Priority Classes

The performance of CLO supporting different traffic priority classes developed in Section 5.4 is examined in Figure 12. The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq244_HTML.gif users, all running the same applications, are split up into two priority groups of 8 users each; premium and ordinary users are given a priority of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq245_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq246_HTML.gif , respectively.
Figure 12 shows the CDF of the sum MOS. Premium users exhibit a significantly better MOS than ordinary users and are more likely to be served.

6.6. Application Characteristic

In order to identify for which application characteristics CLO is most effective, different generic application classes are examined, characterized by their relationship between data rate and perceived quality as described by the parameters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq247_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq248_HTML.gif (see Figure 5), for the "increase sum MOS" variant of the proposed optimization algorithm. The application characteristics are the same for all users and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq249_HTML.gif is chosen. Figure 13 shows the average MOS against the required data rate for a maximum perceived quality of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq250_HTML.gif , for a system with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq251_HTML.gif users.
As seen from Figure 13, the attainable gains of CLO maximizing the sum MOS (solid lines) over equal resource allocation (dashed lines) are dependent on both https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq252_HTML.gif and the ratio https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq253_HTML.gif . For low data rate requirements the CLO gain diminishes, as there is an excess of available resources to serve all users with excellent quality https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq254_HTML.gif . For increasing data rate requirements the CLO gain depends on the ratio https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq255_HTML.gif , in the way that the CLO gain increases with decreasing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq256_HTML.gif . This is explained by the fact that for an increasing ratio https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq257_HTML.gif the MOS characteristic as a function of the data rate, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq258_HTML.gif in (4), approaches the unbounded problem addressed in Section 4.2, for which according to (33) equal resource allocation is optimum. In other words, the attainable CLO gains over equal resource allocation with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq259_HTML.gif are due to users whose rates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq260_HTML.gif are outside the logarithmic range of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq261_HTML.gif . As the logarithmic range is specified by the ratio https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq262_HTML.gif , the lower https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq263_HTML.gif the higher the gains to be achieved by optimization.

6.7. Mixed Service Classes

In Figures 1416 a scenario with two user groups is investigated. Each of the two user groups run applications of a different service class, characterized by different data rate requirements, as illustrated in Figure 14. Low- and high-rate users request a minimum data rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq264_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq265_HTML.gif , respectively.
Figure 15 shows the CLO gain in sum MOS relative to equal resource allocation against the number of users in each group. Results are plotted for different values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq266_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq267_HTML.gif , for a total number of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq268_HTML.gif users and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq269_HTML.gif . Interestingly, in some cases the overall MOS gain for scenarios with mixed service classes exceeds the case when all users are within either of the service classes. This is due to the freed resources by replacing a high-rate user by a less demanding low-rate user, which allows the remaining users to fetch some of the freed resources.
The relationship between low- and high-rate users is further investigated in Figure 16, which shows the CDF of the sum MOS for both user groups. Corresponding to the maximum in Figure 15, there are 4 users with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq270_HTML.gif and 12 users with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq271_HTML.gif . An appealing observation is that both user groups gain from CLO. While the average gain is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq272_HTML.gif , low- and high-rate users gain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq273_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq274_HTML.gif in overall perceived quality, respectively.

6.8. System Performance

In order to assess the attainable MOS gains from a system level perspective, the average sum MOS is plotted against the number of users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq275_HTML.gif in Figure 17. Two scenarios are investigated. In scenario 1, there are two groups with equal number of users, where low- and high-rate users request the rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq276_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq277_HTML.gif , respectively. It can be deduced from Figure 17 that CLO maximizing the sum MOS (solid lines) increases the number of users being served with the same average perceived quality by more than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq278_HTML.gif , compared to equal resource allocation (dashed lines). In scenario 2, all users run the same application with a desired data rate of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq279_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq280_HTML.gif , which achieves a comparably small MOS gain of at most https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq281_HTML.gif , as reported in Section6.6 for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq282_HTML.gif users. In scenario 2, CLO also enables to serve more users with the same perceived quality, although in this case the gains diminish for increasing number of users. In line with the discussion in Section 6.6, for scenario 2 gains of CLO over equal resource allocation are mainly in the region where the sum MOS is high, since then users, whose rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq283_HTML.gif is outside the logarithmic range of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq284_HTML.gif in (4), are more likely. Otherwise, equal resource allocation tends to approach the optimum resource allocation strategy, leading to diminishing CLO gains.

7. Conclusion

Resource allocation with QoS constraints where multiple users share a wireless downlink is one key challenge in the design of future wireless systems. The MOS is chosen as a universal utility metric for the user-perceived quality for CLO between link and APP layer.
Adaptive transmission based on long-term CSIT over a time and frequency selective fading channel is considered, including distance dependent path loss and log-normal shadowing. Applications are described by a rate-distortion characteristic, expressed by the MOS. With these settings a model-based CLO framework is devised, which emulates the functionalities of the system layers within the optimizer. Compared to known CLO approaches significantly less parameters need to be exchanged. Simulations of a video streaming scenario confirm that model mismatch, where the APP layer model at the optimizer is not perfectly matched to the actual application, only results in modest performance degradation.
As a metric for the user satisfaction we chose to maximize the sum MOS, which resulted in a nonconcave optimization problem. Given an idealized utility metric with an unbounded logarithmic relation between perceived quality and data rate, a concave problem is retained, so that the optimum resource allocation is derived in closed form. One noteworthy result of the analysis is that the optimum solution is independent of the physical channels and is solely described by the application characteristics.
The theoretical findings are the basis for a low complexity and easy to implement CLO algorithm for the more realistic nonconcave optimization problem. The proposed iterative optimization algorithm is significantly less complex than known optimization algorithms and has the appealing feature to deterministically terminate.
The proposed algorithm offers an additional degree of freedom to the network operator to configure its own policies, such as enhancing user satisfaction, ensuring a minimum perceived quality to all users, or to operate the wireless system with higher load so as to maximize revenue. Furthermore, different priority classes can be supported.
The attainable gains of CLO strongly depend on the application characteristics. The higher the sensitivity of the perceived quality to changes of the data rate, the more considerable the gains that can be achieved. Dependent on the application more than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F341689/MediaObjects/13638_2008_Article_1642_IEq286_HTML.gif , additional users can be served without sacrificing user satisfaction. If multiple service classes with different application characteristic are running simultaneously, all users can be expected to benefit from CLO. In some cases additional CLO gains that exploit a certain mix of service classes are observed.

Acknowledgment

This paper was presented in part at the IEEE Int. Conf. on Communications (ICC'2007), Glasgow, UK, at the IEEE Int. Symp. on Wireless Communication Systems (ISWCS'2007), Trondheim, Norway, and at the IEEE Vehicular Technology Conference (VTC'2008 Spring), Singapore.
Open AccessThis article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://​creativecommons.​org/​licenses/​by/​2.​0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat 3GPP TS 36.211 V8.5.0 Release 8 : 3rd Generation Partnership Project (3GPP); Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels and Modulation. 2008. 3GPP TS 36.211 V8.5.0 Release 8 : 3rd Generation Partnership Project (3GPP); Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels and Modulation. 2008.
2.
Zurück zum Zitat IST-4-027756 WINNER II : D6.13.14 WINNER II system concept description. 2007. IST-4-027756 WINNER II : D6.13.14 WINNER II system concept description. 2007.
3.
Zurück zum Zitat Andrews M, Kumaran K, Ramanan K, Stolyar A, Whiting P, Vijayakumar R: Providing quality of service over a shared wireless link. IEEE Communications Magazine 2001, 39(2):150-153. 10.1109/35.900644CrossRef Andrews M, Kumaran K, Ramanan K, Stolyar A, Whiting P, Vijayakumar R: Providing quality of service over a shared wireless link. IEEE Communications Magazine 2001, 39(2):150-153. 10.1109/35.900644CrossRef
4.
Zurück zum Zitat Wong CY, Cheng RS, Letaief KB, Murch RD: Multiuser OFDM with adaptive subcarrier, bit, and power allocation. IEEE Journal on Selected Areas in Communications 1999, 17(10):1747-1758. 10.1109/49.793310CrossRef Wong CY, Cheng RS, Letaief KB, Murch RD: Multiuser OFDM with adaptive subcarrier, bit, and power allocation. IEEE Journal on Selected Areas in Communications 1999, 17(10):1747-1758. 10.1109/49.793310CrossRef
5.
Zurück zum Zitat Ergen M, Coleri S, Varaiya P: QoS aware adaptive resource allocation techniques for fair scheduling in OFDMA based broadband wireless access systems. IEEE Transactions on Broadcasting 2003, 49(4):362-370. 10.1109/TBC.2003.819051CrossRef Ergen M, Coleri S, Varaiya P: QoS aware adaptive resource allocation techniques for fair scheduling in OFDMA based broadband wireless access systems. IEEE Transactions on Broadcasting 2003, 49(4):362-370. 10.1109/TBC.2003.819051CrossRef
6.
Zurück zum Zitat Sternad M, Svensson T, Ottosson T, Ahlen A, Svensson A, Brunstrom A: Towards systems beyond 3G based on adaptive OFDMA transmission. Proceedings of the IEEE 2007, 95(12):2432-2455.CrossRef Sternad M, Svensson T, Ottosson T, Ahlen A, Svensson A, Brunstrom A: Towards systems beyond 3G based on adaptive OFDMA transmission. Proceedings of the IEEE 2007, 95(12):2432-2455.CrossRef
7.
Zurück zum Zitat ITU-T Recommendation H.264 : Advanced video coding for generic audiovisual services. 2007. ITU-T Recommendation H.264 : Advanced video coding for generic audiovisual services. 2007.
8.
Zurück zum Zitat Schwarz H, Marpe D, Wiegand T: Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Transactions on Circuits and Systems for Video Technology 2007, 17(9):1103-1120.CrossRef Schwarz H, Marpe D, Wiegand T: Overview of the scalable video coding extension of the H.264/AVC standard. IEEE Transactions on Circuits and Systems for Video Technology 2007, 17(9):1103-1120.CrossRef
9.
Zurück zum Zitat Ahmad I, Wei X, Sun Y, Zhang Y-Q: Video transcoding: an overview of various techniques and research issues. IEEE Transactions on Multimedia 2005, 7(5):793-804.CrossRef Ahmad I, Wei X, Sun Y, Zhang Y-Q: Video transcoding: an overview of various techniques and research issues. IEEE Transactions on Multimedia 2005, 7(5):793-804.CrossRef
10.
Zurück zum Zitat Shakkottai S, Rappaport TS, Karlsson PC: Cross-layer design for wireless networks. IEEE Communications Magazine 2003, 41(10):74-80. 10.1109/MCOM.2003.1235598CrossRef Shakkottai S, Rappaport TS, Karlsson PC: Cross-layer design for wireless networks. IEEE Communications Magazine 2003, 41(10):74-80. 10.1109/MCOM.2003.1235598CrossRef
11.
Zurück zum Zitat Khan S, Peng Y, Steinbach E, Sgroi M, Kellerer W: Application-driven cross-layer optimization for video streaming over wireless networks. IEEE Communications Magazine 2006, 44(1):122-130.CrossRef Khan S, Peng Y, Steinbach E, Sgroi M, Kellerer W: Application-driven cross-layer optimization for video streaming over wireless networks. IEEE Communications Magazine 2006, 44(1):122-130.CrossRef
12.
Zurück zum Zitat Setton E, Yoo T, Zhu X, Goldsmith A, Girod B: Cross-layer design of ad hoc networks for real-time video streaming. IEEE Wireless Communications 2005, 12(4):59-64. 10.1109/MWC.2005.1497859CrossRef Setton E, Yoo T, Zhu X, Goldsmith A, Girod B: Cross-layer design of ad hoc networks for real-time video streaming. IEEE Wireless Communications 2005, 12(4):59-64. 10.1109/MWC.2005.1497859CrossRef
13.
Zurück zum Zitat Choi L-U, Kellerer W, Steinbach E: On cross-layer design for streaming video delivery in multiuser wireless environments. EURASIP Journal on Wireless Communications and Networking 2006, 2006:-10. Choi L-U, Kellerer W, Steinbach E: On cross-layer design for streaming video delivery in multiuser wireless environments. EURASIP Journal on Wireless Communications and Networking 2006, 2006:-10.
14.
Zurück zum Zitat van der Schaar M, Sai Shankar N: Cross-layer wireless multimedia transmission: challenges, principles, and new paradigms. IEEE Wireless Communications 2005, 12(4):50-58. 10.1109/MWC.2005.1497858CrossRef van der Schaar M, Sai Shankar N: Cross-layer wireless multimedia transmission: challenges, principles, and new paradigms. IEEE Wireless Communications 2005, 12(4):50-58. 10.1109/MWC.2005.1497858CrossRef
15.
Zurück zum Zitat Khan S, Duhovnikov S, Steinbach E, Sgroi M, Kellerer W: Application-driven cross-layer optimization for mobile multimedia communication using a common application layer quality metric. Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC '06), July 2006, Vancouver, Canada 213-218. Khan S, Duhovnikov S, Steinbach E, Sgroi M, Kellerer W: Application-driven cross-layer optimization for mobile multimedia communication using a common application layer quality metric. Proceedings of the International Wireless Communications and Mobile Computing Conference (IWCMC '06), July 2006, Vancouver, Canada 213-218.
16.
Zurück zum Zitat Sang A, Wang X, Madihian M, Gitlin RD: A flexible downlink scheduling scheme in cellular packet data systems. IEEE Transactions on Wireless Communications 2006, 5(2):568-576. 10.1109/TWC.2006.1603972CrossRef Sang A, Wang X, Madihian M, Gitlin RD: A flexible downlink scheduling scheme in cellular packet data systems. IEEE Transactions on Wireless Communications 2006, 5(2):568-576. 10.1109/TWC.2006.1603972CrossRef
17.
Zurück zum Zitat Zhang X, Tao M, Ng CS: Time sharing policy in wireless networks for variable rate transmission. Proceedings of the IEEE International Conference on Communications (ICC '07), June 2007, Glasgow, Scotland 4560-4565. Zhang X, Tao M, Ng CS: Time sharing policy in wireless networks for variable rate transmission. Proceedings of the IEEE International Conference on Communications (ICC '07), June 2007, Glasgow, Scotland 4560-4565.
18.
Zurück zum Zitat ITU-T Recommendation P.800 : Methods for subjective determination of transmission quality. International Telecommunications Union, Geneva, Switzerland, August 1996 ITU-T Recommendation P.800 : Methods for subjective determination of transmission quality. International Telecommunications Union, Geneva, Switzerland, August 1996
19.
Zurück zum Zitat Khan S, Duhovnikov S, Steinbach E, Kellerer W: MOS-based multiuser multiapplication cross-layer optimization for mobile multimedia communication. Advances in Multimedia 2007, 2007:-11. Khan S, Duhovnikov S, Steinbach E, Kellerer W: MOS-based multiuser multiapplication cross-layer optimization for mobile multimedia communication. Advances in Multimedia 2007, 2007:-11.
20.
Zurück zum Zitat Boyd SP, Vandenberghe L: Convex Optimization. 1st edition. Cambridge University Press, Cambridge, UK; 2004.CrossRefMATH Boyd SP, Vandenberghe L: Convex Optimization. 1st edition. Cambridge University Press, Cambridge, UK; 2004.CrossRefMATH
21.
Zurück zum Zitat Choi L-U, Ivrlač MT, Steinbach E, Nossek JA: Bottom-up approach to cross-layer design for video transmission over wireless channels. Proceedings of the 61st IEEE Vehicular Technology Conference (VTC '05), May-June 2005, Stockholm, Sweden 5: 3019-3023. Choi L-U, Ivrlač MT, Steinbach E, Nossek JA: Bottom-up approach to cross-layer design for video transmission over wireless channels. Proceedings of the 61st IEEE Vehicular Technology Conference (VTC '05), May-June 2005, Stockholm, Sweden 5: 3019-3023.
22.
Zurück zum Zitat Brehmer J, Guthy C, Utschick W: An efficient approximation of the OFDMA outage probability region. Proceedings of the 7th Workshop on Signal Processing Advances in Wireless Communications (SPAWC '06), July 2006, Cannes, France 1-5. Brehmer J, Guthy C, Utschick W: An efficient approximation of the OFDMA outage probability region. Proceedings of the 7th Workshop on Signal Processing Advances in Wireless Communications (SPAWC '06), July 2006, Cannes, France 1-5.
23.
Zurück zum Zitat Parekh AK, Gallager RG: A generalized processor sharing approach to flow control in integrated services networks—the single node case. Proceedings of the 11th Annual Conference of the IEEE Computer and Communications Societies (INFOCOM '92), May 1992, Florence, Italy 2: 915-924.CrossRef Parekh AK, Gallager RG: A generalized processor sharing approach to flow control in integrated services networks—the single node case. Proceedings of the 11th Annual Conference of the IEEE Computer and Communications Societies (INFOCOM '92), May 1992, Florence, Italy 2: 915-924.CrossRef
24.
Zurück zum Zitat Sullivan GJ, Wiegand T: Rate-distortion optimization for: video compression. IEEE Signal Processing Magazine 1998, 15(6):74-90. 10.1109/79.733497CrossRef Sullivan GJ, Wiegand T: Rate-distortion optimization for: video compression. IEEE Signal Processing Magazine 1998, 15(6):74-90. 10.1109/79.733497CrossRef
25.
Zurück zum Zitat Choi LU, Ivrlač MT, Steinbach E, Nossek JA: Sequence-level models for distortion-rate behaviour of compressed video. Proceedings of the International Conference on Image Processing (ICIP '05), September 2005, Genova, Italy 2: 486-489. Choi LU, Ivrlač MT, Steinbach E, Nossek JA: Sequence-level models for distortion-rate behaviour of compressed video. Proceedings of the International Conference on Image Processing (ICIP '05), September 2005, Genova, Italy 2: 486-489.
26.
Zurück zum Zitat Nemethova O, Ries M, Zavodsky M, Rupp M: PSNR-based estimation of subjective time-variant video quality for mobiles. Proceedings of the International Conference on Measurement of Audio and Video Quality in Networks (MESAQIN '06), June 2006, Prague, Czech Republic Nemethova O, Ries M, Zavodsky M, Rupp M: PSNR-based estimation of subjective time-variant video quality for mobiles. Proceedings of the International Conference on Measurement of Audio and Video Quality in Networks (MESAQIN '06), June 2006, Prague, Czech Republic
27.
Zurück zum Zitat Kreyszig E: Advanced Engineering Mathematics. 7th edition. John Wiley & Sons, New York, NY, USA; 1993.MATH Kreyszig E: Advanced Engineering Mathematics. 7th edition. John Wiley & Sons, New York, NY, USA; 1993.MATH
28.
Zurück zum Zitat IST-2003-507581 WINNER : D5.4 final report on link level and system level channel models, ver. 1.4. 2005. IST-2003-507581 WINNER : D5.4 final report on link level and system level channel models, ver. 1.4. 2005.
29.
Zurück zum Zitat Rappaport TS: Wireless Communications: Principles and Practice. 2nd edition. Prentice-Hall, Englewood Cliffs, NJ, USA; 2002.MATH Rappaport TS: Wireless Communications: Principles and Practice. 2nd edition. Prentice-Hall, Englewood Cliffs, NJ, USA; 2002.MATH
30.
Zurück zum Zitat Jakes WC: Microwave Mobile Communications. John Wiley & Sons, New York, NY, USA; 1974. Jakes WC: Microwave Mobile Communications. John Wiley & Sons, New York, NY, USA; 1974.
Metadaten
Titel
Multiuser Resource Allocation Maximizing the Perceived Quality
verfasst von
Andreas Saul
Gunther Auer
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2009/341689

Weitere Artikel der Ausgabe 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Zur Ausgabe