Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01.12.2009 | Research Article

On the Delay-Energy Tradeoff in Multiuser Fading Channels

verfasst von: Prasanna Chaporkar, Kimmo Kansanen, Ralf R. Müller

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2009

Aktivieren Sie unsere intelligente Suche um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

We consider the delay-energy tradeoff on a fading channel with multiuser diversity. For fixed arbitrary rates of the users, the total transmitted energy is minimized subject to a delay constraint. To achieve this goal we propose a scheme which schedules a subset of all users simultaneously. The scheduled users are allocated power to guarantee successful separation at the detector by successive decoding. In this way, we can benefit from both multiuser diversity and the near-far situation via scheduling and simultaneous transmission, respectively. We analytically show that when the number of users goes to infinity the energy required to guarantee the required user rates can be made as small as required at the cost of a higher delay "delay-energy tradeoff". We explicitly compute the delay under the proposed scheduling policy and discuss how delay differentiation can be achieved. We extend the results to multiband multiaccess channel. Finally, all the results can be generalized in a straightforward fashion to broadcast channel due to the Gaussian multiaccess-broadcast channel duality.

1. Introduction

A comprehensive treatment of multiaccess fading channels can be found in [1, 2]. In these papers, Tse and Hanly have characterized the so-called throughput capacity and delay-limited capacity of the multiaccess block fading channel with Gaussian noise assuming that perfect channel state information (CSI) is causally available at the transmitters and the receiver. The throughput capacity region quantifies the achievable rate region with average power constraint for ergodic fading. For the delay limited capacity, each user must be given the required rate irrespective of its fading state. The aim is to obtain a coding and power allocation scheme to minimize the energy while guaranteeing the rate in every slot. Here, slot refers to the time duration required to transmit a block of symbols over which the fading state remains unaltered. Thus, the slot duration is smaller than the channel coherence time.
The notion of throughput capacity leads to schemes that take advantage of the different channel qualities of the users "multiuser diversity". Specifically, it has been shown that in the special case of single antenna transmission and reception on a frequency nonselective channel, sum rate in the system is maximized by letting only one user with the best channel quality to transmit. Such schemes that take current channel states into account while making scheduling decisions are referred to as "Opportunistic Scheduling" and may result in unfair rate allocation if the fading statistics are not symmetric. In wireless systems, the fading statistics are typically not symmetric because of many reasons that include the so-called"near-far" effect. To alleviate this limitation, several opportunistic scheduling schemes with fairness constraints have been designed [3, 4]. Different fairness objectives will in general result in different throughput performance of the system, along with changing other performance parameters of a system [5]. Among them, Proportional Fair Scheduling (PFS) is among the most well known and has many desirable properties including provable fairness guarantees and suitability for online implementation, that is, without prior knowledge of channel statistics [6]. In spite of these desirable features, PFS suffers from two limitations. First, PFS does not provide the required rate to the users, but the rate allocation is done to maximize certain utility function and the allocated rates depend on the channel statistics of the users. Second, it does not guarantee delay as the users are scheduled in random slots, depending on their fading states and the resource allocation in the previous slots.
As discussed before, the notion of throughput capacity is relevant for delay-tolerant data applications. On the contrary, the notion of delay-limited capacity is relevant for the applications that have the strictest delay requirement, namely, the required rate should be given to each user in each slot irrespective of the channel conditions. The delay for such schemes is always one slot. Note that these schemes cannot make use of channel or multiuser diversity over time, but instead can benefit from near-far gain [7] by simultaneous transmission of users. It has been shown that simultaneous transmission (superposition coding in downlink) and successive decoding minimize energy for achieving the required rates [2]. In this signaling scheme, all the users transmit simultaneously with a coordinated power allocation, and the receiver decodes in the decreasing order of the users' channel states treating the undecoded signals as noise. One of the attractive features of this coding strategy is that given the ordered channel state sequence, the power allocation for the optimal signaling can be obtained using a greedy procedure. This has significant impact on practical implementation.
Note that opportunistic scheduling exploits channel and multiuser diversity to guarantee rates that maximize certain utility and/or guarantee fairness, while simultaneous transmission and successive decoding exploit superpositioning to guarantee the required rate and the strict delay of one slot in energy efficient fashion. Many applications cannot afford to sustain indefinite delay variability in attaining the fair rate (as in PFS) without suffering significant performance penalty [8], but they also do not need the strict delay of one slot (as in delay-limited schemes); that is, they have limited delay tolerance. With limited delay tolerance in multiaccess channel, it is possible to exploit both multiuser diversity and the superpositioning gain. Our aim is to understand how delay tolerance of the application can be exploited so as to improve the energy efficiency (delay-energy tradeoff).
In literature, the delay-energy tradeoff is typically studied assuming no multipath fading (AWGN channel) [9, 10] or assuming noncausal CSI at transmitters and the receiver [1114]. In an AWGN channel, the problem of minimizing energy with strict deadline requirements has been addressed using filter theory [9] and network calculus [10]. In [11], the authors have studied the delay-energy tradeoff for a single user in fading channel with a strict deadline (say https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq1_HTML.gif slots), while in [1214] the multiaccess fading channel is considered. In all these works, optimal offline (noncausal CSI available) algorithms that iteratively solve the underlying optimization problem have been developed, and heuristic algorithms for noncausal CSI have been proposed. Because of the equivalence between the multiplexing in time and frequency, the algorithms with noncausal CSI are more relevant when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq2_HTML.gif orthogonal frequency bands are available and the delay requirement is one slot, that is, in the case of a delay limited multiband multiaccess system. In their seminal work, Cheng and Verdú have obtained the capacity region for the vector Gaussian multiaccess channel [15]. Here, authors have considered the scalar Gaussian channel with ISI, which reduces to the case of independent parallel memoryless Gaussian channels through the Karhunen-Loéve expansion. No multipath fading was assumed. Fundamental results for multiband fading channels were reported in [1, 2]. Perfect CSI at the transmitter and the receiver is assumed in these works. The capacity achieving power allocation is the multiuser waterfilling scheme. The exact characterization of this scheme is considered difficult, and only iterative algorithms and their convergence properties are known [16]. The problem of providing the desired throughput to each of the users has been addressed in multiband multiaccess fading channel with white Gaussian noise [1719]. The approach taken in these works is one to obtain an approximate multiuser waterfilling solution efficiently.
In practice, CSI is only available causally. In spite of this obvious limitation, the case with noncausal CSI has been studied in literature because of the following two reasons. First, the optimum schemes with noncausal CSI (offline schemes) provide a benchmark for all the other schemes that guarantee the required delay. Also, the structural properties of the optimal offline schemes facilitate valuable insights for designing near-optimal online schemes (schemes with causal CSI). Second, in the fixed delay case, analytically it is difficult, if not impossible, to design optimal online schemes barring the trivial cases in which future fading states can be accurately predicted. This can be seen as follows. Since the required delay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq3_HTML.gif is finite, any fading realization is possible with positive probability. Thus, for any given online scheme, one can play the role of an adversary and orchestrate future fading states so as to make the scheme suboptimal compared to an optimal offline scheme. In view of these reasons, instead of a fixed delay constraint, an average delay constraint is considered while designing optimal online schemes [20, 21]. From the quality of service point of view, guaranteeing the fixed delay is more desirable than guaranteeing the average delay for the real-time applications. But, if the delay variance is small, then the higher system layers can employ mechanisms like playback buffer to cope up with the delay variability. In [20, 21], a single user fading channel is considered, and the minimization of average delay for the given average power constraint has been addressed using the framework of Markov Decision Processes (MDP). Again, only the structural properties of the optimal online scheme have been derived except in certain special cases. The exact online scheme has to be obtained by solving Bellman's equations, which is computationally expensive. The results in [20, 21] for a single user case are extended to the multiaccess channel by Neely [22]. Here, the author has considered the mean system delay, that is, the average delay over all the users. We note that guaranteeing the mean system delay does not guarantee the required delay performance to individual users. In fact, such schemes tend to favor users with a better channel by providing smaller delays to these at the expense of the users with a worse channel and still maintaining the desired mean system delay. Our aim is to quantify the delay-energy tradeoff while guaranteeing the average delay of each of the users. In queueing theory literature, frameworks for designing scheduling schemes that minimize a certain utility (energy in our case) while guaranteeing bounded mean delay can be found in [2326]. These frameworks guarantee the bounded delay but do not guarantee the desired delay to each of the users as we do.
From the previous discussion, it should be clear that the closed form expressions for the minimum energy required for guaranteeing the desired delay are not available for both online and offline schemes. Thus, the energy-delay tradeoff has to be quantified using numerical evaluations for specific scenarios of interest. Our aim is to obtain closed form expressions to quantify the delay-energy tradeoff for an average delay constraint in multiband multiaccess fading channels with causal CSI at the transmitters and the receiver. We consider a multiband system as it can model many practical systems including OFDM systems, channels with frequency selective fading, and ISI channels. The analysis targets specifically systems, where a large number of users must be supported with rate and delay guarantees. A motivating real world example could be a sensor network where sensing delays must be limited, data rates may be pre-allocated, and energy consumption should be minimal.
In our analysis, we allow for a general fading distribution and also consider random arrivals of data from the higher layers into the physical layer buffer to model real-time applications in which the symbols are generated in realtime. For analytical tractability, we use the following approach. We design a parametrized scheduling policy called Opportunistic Superpositioning (OSP) that exploits multiuser diversity by scheduling a set of users with high channel gains only, and among these users it uses simultaneous transmission and successive decoding to exploit superpositioning gain. One of the main challenges in designing such schemes is the quantification of performance. The quantification allows for the optimal and guaranteed control. We explicitly quantify the average per user delay in the general case, and the total energy requirement in the large system limit for the proposed policy. Thus, given the delay requirement, we can efficiently choose the appropriate parameter values so as to minimize the energy while guaranteeing the required delay. Using numerical computations, we show that allowing a little delay can yield significant energy savings. We also compare the performance of the proposed policy with PFS and the delay-limited schemes.
The paper is arranged as follows. In Section 2, we present our system model. In Section 3, we describe the OSP policy, and in Section 4 obtain analytical guarantees. In Section 5, we discuss extensions of OSP to multiband multiaccess channel and to provide delay differentiation. In Section 6, we compare the performance of OSP with PFS and delay-limited schemes using numerical computations. Finally, in Section 7, we conclude.

2. System Model

Consider the following system for the purpose of motivation. A sensor network is operating in an area, with a fusion center located in the center. Each sensor is stationary, but the propagation environment has enough inherent variation, that the channels between sensors and the fusion center can be considered slowly randomly varying over time. Each sensor must be polled within a reasonable time from making a measurement, which consists of a random number of bits. On the average, all sensors provide equally valuable data, and should receive an equal fraction of available system rate.
With the previous motivation in mind, we consider a multiaccess system with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq4_HTML.gif users that are placed at random in a cell. Time is slotted. Each user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq5_HTML.gif requires a certain fraction of the total rate provided in a system; that is, the required average rate of each user is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq6_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq7_HTML.gif then denotes the total average spectral efficiency of the system required to support the user rates. Alternatively, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq8_HTML.gif denotes the arrivals for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq9_HTML.gif in slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq10_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq11_HTML.gif is a random variable (r.v.). We assume that all the moments for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq12_HTML.gif are finite and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq13_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq14_HTML.gif . Note that random variables with finite support have all the moments finite. A sensor measurement usually has limited resolution due to measurement noise. In networks, the arrival rate is typically limited by the link capacities which may be large but finite. Moreover, we assume that the arrivals are independent and identically distributed (i.i.d.) across both slots and users. The arrivals are queued into an infinite buffer before served. Without loss of generality, let the system start in slot 1. Hence, users' buffers are empty at the beginning of slot 1.
We primarily discuss the uplink communication (multiaccess channel), but since the results consider total system energy expenditure, which can be interpreted as a total power constraint, the results can be generalized in a straightforward fashion to the downlink case (broadcast channel) using the Gaussian multiaccess-broadcast duality [27] in the hard fairness context [7].
Now, we describe the model for the multiaccess channel, described by the input ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq15_HTML.gif ) output ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq16_HTML.gif ) relation
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ1_HTML.gif
(1)
Each user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq17_HTML.gif experiences the channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq18_HTML.gif in slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq19_HTML.gif . The channel https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq20_HTML.gif arises as the product of two effects assumed independent, namely,path loss (denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq21_HTML.gif ) andshort-term fading (denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq22_HTML.gif ), that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq23_HTML.gif . The path loss is a function of the distance between the transmitter-receiver pair. Typically, the distance between transmitter and receiver changes very slowly with respect to the signal bandwidth. Hence, we assume that the path loss is constant from slot to slot. On the contrary, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq24_HTML.gif depends on the scattering environment around the user and changes in time depending on the channel Doppler bandwidth. We assume that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq25_HTML.gif changes from slot to slot and is i.i.d. across both users and slots. This is referred to as the block fading model [28]. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq26_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq27_HTML.gif , resp.) denote the received (transmitted, resp.) energy from user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq28_HTML.gif in slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq29_HTML.gif . Then, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq30_HTML.gif . Note that the channel is given in terms of energy attenuation. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq31_HTML.gif . Note that the fading for users is not symmetric. The distribution of pathloss for a randomly placed user is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq32_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq33_HTML.gif where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq34_HTML.gif is a generic r.v. indicating the pathloss of a randomly placed user. Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq35_HTML.gif depends on the distribution of the users' placement and the path loss function. Also, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq36_HTML.gif denote the short-term fading distribution, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq37_HTML.gif for every user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq38_HTML.gif and slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq39_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq40_HTML.gif denote the noise power spectral density.
Definition 2.1 (scheduling policy).
A scheduling policy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq41_HTML.gif is an algorithm that in each slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq42_HTML.gif determines the rate vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq43_HTML.gif and serves each user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq44_HTML.gif with rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq45_HTML.gif .
We assume that the perfect CSI is available at the transmitters and the receiver in every slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq46_HTML.gif . Thus, a scheduling policy may adapt https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq47_HTML.gif to the channel state.
Now, we discuss the energy allocation for each user in order to achieve the desired rates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq48_HTML.gif . Fix an energy allocation given by a vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq49_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq50_HTML.gif denotes the energy of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq51_HTML.gif user. The capacity region of the Gaussian multiaccess channel with the time invariant fading https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq52_HTML.gif for the energy allocation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq53_HTML.gif is the set of rate vectors https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq54_HTML.gif that satisfy [29]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ2_HTML.gif
(2)
for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq55_HTML.gif . The rates are achieved with the standard random Gaussian codebook with variance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq56_HTML.gif for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq57_HTML.gif . The signaling is as follows. All the users transmit simultaneously and the receiver decodes successively in the decreasing order of the channel states https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq58_HTML.gif . From this result, it is straightforward to see that a given rate vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq59_HTML.gif is feasible with energy allocation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq60_HTML.gif in Gaussian multiaccess channel with fading https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq61_HTML.gif if and only if (iff) there exists a permutation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq62_HTML.gif of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq63_HTML.gif such that for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq64_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ3_HTML.gif
(3)
Note that there may exist many energy allocations that can realize the rate vector https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq65_HTML.gif . Since we aim to obtain energy efficient strategies, we seek an optimal energy allocation that minimizes the sum energy while achieving the desired rates. Such energy allocation can be explicitly obtained as follows [1]. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq66_HTML.gif denote the permutation such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq67_HTML.gif . Then, the optimal energy allocation is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ4_HTML.gif
(4)
for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq68_HTML.gif . Note that for the optimal signaling, the successive decoding order depends only on channel gains, but not on rates. For convenience, from now on, we considered users to be indexed according to the ordering. We assume that once a scheduling policy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq69_HTML.gif determines the rate allocation, the corresponding power allocation is done as per (4).
We consider three performance measures, namely, stability, energy efficiency, and delay. Next, we formally define these.
Definition 2.2 (busy period).
A busy period for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq70_HTML.gif is the set of consecutive slots in which its queue length is greater than zero.
Definition 2.3 (stability).
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq71_HTML.gif denote the length of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq72_HTML.gif busy period of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq73_HTML.gif . The system is said to be strongly stable if for every user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq74_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ5_HTML.gif
(5)
Strong stability, as defined here, guarantees that each user has a bounded average per-packet delay.
Definition 2.4 (energy efficiency).
We define the energy efficiency in slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq75_HTML.gif as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ6_HTML.gif
(6)
Then, the energy efficiency is defined as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ7_HTML.gif
(7)
The energy efficiency measures the average transmitted energy the system uses per each transmitted bit.
Definition 2.5 (user delay).
Delay for the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq76_HTML.gif arrival of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq77_HTML.gif (denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq78_HTML.gif ) is the number of slots between its departure and arrival. The delay for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq79_HTML.gif is then defined as the limiting average of per-arrival delays
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ8_HTML.gif
(8)
We augment the notation to denote the dependence of various quantities on the scheduling policy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq80_HTML.gif by using https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq81_HTML.gif as a superscript, for example, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq82_HTML.gif will indicate the delay for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq83_HTML.gif under policy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq84_HTML.gif .

3. Opportunistic Superpositioning ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq85_HTML.gif )

The scheduling policy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq86_HTML.gif is parametrized by a variable https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq87_HTML.gif . To specify this dependence, we denote the OSP scheduling policy as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq88_HTML.gif . The scheduling decisions are taken as follows in every slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq89_HTML.gif .
(i)Select all users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq90_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq91_HTML.gif .
(ii)Allocate rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq92_HTML.gif to each of the chosen users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq93_HTML.gif so that everything in its buffer is served, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq94_HTML.gif for others.
Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq95_HTML.gif (OSP) selects users based on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq96_HTML.gif and not on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq97_HTML.gif . This is for the reasons of fairness as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq98_HTML.gif has the same distribution for every user, while the distribution of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq99_HTML.gif depends on the distance of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq100_HTML.gif from the base station and is biased towards stronger channels the closer the user is to the base station. Moreover, since the pathloss is constant for each user, it suffices to determine rate allocation in each slot depending only on short-term fading which is time varying, and thus, unlike pathloss, provides diversity which can be exploited.
We refer to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq101_HTML.gif as opportunism threshold as it dictates how opportunistic OSP is in exploiting the channel diversity. The opportunism threshold plays a key role in determining delay and energy consumption in the system. We intuitively explain how. Note that appropriate choice of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq102_HTML.gif allows for eliminating users that are in deep fade in a given slot. Typically, a few users with a very bad channel dominate the total energy consumption in the system for the delay-limited schemes. Thus, even a small value of the opportunism threshold should significantly improve energy efficiency of the system. Specifically, we can expect the energy consumption to decrease monotonically with an increase in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq103_HTML.gif . But, note that as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq104_HTML.gif increases, each user is scheduled less frequently. Thus, for satisfying the rate requirements, the rate given to the scheduled users increases monotonically with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq105_HTML.gif . And providing the higher rate requires higher energy. In fact, for fixed noise power spectral density, the required energy increases exponentially with an increase in the rate. Summarizing, the opportunism threshold in OSP allows us to save energy by eliminating the users in deep fade but requires higher energy to serve scheduled users. Thus, it is not clear if the opportunism threshold should improve the system performance. It, however, turns out that the energy consumption of OSP decreases monotonically as a function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq106_HTML.gif . In other words, the energy savings caused by eliminating the worst users is more than the increase in the energy consumption to provide the higher rates to the scheduled users.
As discussed above, the users are scheduled less frequently by OSP when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq107_HTML.gif is large. So, clearly, the delay increases monotonically with an increase in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq108_HTML.gif . Thus, the opportunism threshold provides a way to achieve delay-energy tradeoff. Now, the main challenge is to quantify the delay and energy of OSP as a function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq109_HTML.gif , so as to choose the optimal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq110_HTML.gif that guarantees the required delay while minimizing the energy.

4. Analytical Guarantees

In this section, we obtain analytical guarantees for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq111_HTML.gif . In Theorem 4.1, we show that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq112_HTML.gif is strongly stable and has a finite average busy time. This results leads to Corollary 4.2, where we quantify the user delay under the proposed scheduler https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq113_HTML.gif . In Theorem 4.5, we quantify the asymptotic energy efficiency of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq114_HTML.gif . In Theorem 4.6 we show that the asymptotic energy efficiency of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq115_HTML.gif decreases monotonically with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq116_HTML.gif . In Section 4.1, we provide a demonstration of the results using important special cases and provide connections to recent results in the literature. Therein we provide Corollary 4.8, where we show that as delay grows without bound, the energy required to stabilize the system becomes equal to the minimum energy required to provide the desired rates to each of the users in long term. Finally in Section 4.2, we discuss the implications of the analytical results.
First, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq117_HTML.gif .
Theorem 4.1 (strong stability).
For every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq118_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq119_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq120_HTML.gif is strongly stable w.p.1.
Proof.
Fix any user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq121_HTML.gif . Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq122_HTML.gif is a sequence of i.i.d. random variables, the user is scheduled is each slot w.p. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq123_HTML.gif under https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq124_HTML.gif . Moreover, each time the user is scheduled, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq125_HTML.gif serves everything in its buffer. Also, since the arrivals are i.i.d. in slots, clearly, the busy periods are geometrically distributed i.i.d. random variables with mean https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq126_HTML.gif . Thus, by the Strong Law of Large Numbers (SLLNs) for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq127_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ9_HTML.gif
(9)
Now, the result follows from Definition 2.3 as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq128_HTML.gif .
Corollary 4.2 (user delay).
The delay for any user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq129_HTML.gif under https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq130_HTML.gif is
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ10_HTML.gif
(10)
Proof.
Because the arrival and transmission of each packet are mutually independent, and these are independent from the arrivals and transmissions of other packets, we can, without loss of generality, consider the delay of each packet separately. Conditioned on the arrival time, the waiting time follows the same geometric distribution as the busy time, and the SLLN proof of Theorem 4.1 applies to user delay directly.
Note.
Users' delays do not depend on the distribution of their arrival processes given that the mean is finite. Moreover, the delays for the users are not correlated. Thus, for a given https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq131_HTML.gif , users may have different distributions for their respective arrival processes and yet receive the same delay as long as these processes are independent. Furthermore, user's delay guarantee is independent of the number of users in the system.
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq132_HTML.gif denote the fading distribution of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq133_HTML.gif who is randomly placed in a cell given that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq134_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq135_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq136_HTML.gif is an r.v. denoting the path loss of a randomly placed user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq137_HTML.gif . Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq138_HTML.gif does not depend on time as the short-term fading is i.i.d. across the slots. Now, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq139_HTML.gif denote the set of users that are chosen for service under https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq140_HTML.gif in slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq141_HTML.gif such that their channel gains are less than or equal to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq142_HTML.gif , that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq143_HTML.gif . Clearly, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq144_HTML.gif denotes the set of all the users chosen by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq145_HTML.gif in slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq146_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq147_HTML.gif denote the cardinality of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq148_HTML.gif .
Next, we obtain the energy efficiency of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq149_HTML.gif in the asymptotic case when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq150_HTML.gif , where the system exhibits a self-averaging behavior, and the required energy to support the traffic demand converges to a deterministic limit. Intuitively, this is due to the random processes of the asymptotically large system behaving deterministically according to their limiting probabilistic behavior, the distributions. Before we proceed, however, we first state two results that we use to prove the required. The first lemma shows how the sum rate of a set of users chosen by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq151_HTML.gif , having a channel state not larger than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq152_HTML.gif , converges asymptotically to a limit. The second lemma shows how the rate of any arbitrary user selected by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq153_HTML.gif asymptotically vanishes.
Lemma 4.3.
For every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq154_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ11_HTML.gif
(11)
Proof.
The proof is presented in Appendix .
Lemma 4.4.
For every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq155_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq156_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ12_HTML.gif
(12)
Proof.
The proof is presented in Appendix .
Theorem 4.5 (energy efficiency).
Asymptotically, that is, as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq157_HTML.gif , the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq158_HTML.gif under policy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq159_HTML.gif is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ13_HTML.gif
(13)
Proof.
Fix arbitrary slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq160_HTML.gif . We show that under https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq161_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq162_HTML.gif is the same in every slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq163_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq164_HTML.gif . So, for convenience, we drop https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq165_HTML.gif in the notation.
Now, from (4) and Definition 2.4, it follows that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ14_HTML.gif
(14)
Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq166_HTML.gif is a continuous function, Lemma 4.3 implies that there exists a sequence of nonnegative r.v.'s https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq167_HTML.gif independent of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq168_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq169_HTML.gif w.p.1, and
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ15_HTML.gif
(15)
Thus from (14) and (15),
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ16_HTML.gif
(16)
Now, by Lemma 4.4, we conclude for a large enough https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq170_HTML.gif that the cost of providing user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq171_HTML.gif with rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq172_HTML.gif approaches
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ17_HTML.gif
(17)
Note that the approximation becomes tighter for larger https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq173_HTML.gif . Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ18_HTML.gif
(18)
Let us consider the following term in (18):
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ19_HTML.gif
(19)
Similarly,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ20_HTML.gif
(20)
The first expectation in (19) and (20) is with respect to the distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq174_HTML.gif , while the second is with respect to the distribution of the arrival process. The relations (19) and (20) hold because the channel gains https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq175_HTML.gif 's of the chosen users can be viewed as i.i.d. variables drawn from the distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq176_HTML.gif . This can be seen as follows. Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq177_HTML.gif 's are i.i.d. irrespective of the distance between the user and receiver, the scheduling decision can be viewed as scheduling each user w.p. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq178_HTML.gif independently. Since the users are placed at random, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq179_HTML.gif is a deterministic function of distance, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq180_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq181_HTML.gif are independent, we conclude that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq182_HTML.gif 's for the chosen users are i.i.d. and each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq183_HTML.gif is distributed as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq184_HTML.gif . Thus, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq185_HTML.gif is an i.i.d. sequence. Thus, from (19) and (20), we have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ21_HTML.gif
(21)
Thus the required follows from Definition 2.4.
Note.
The energy efficiency does not depend on the distribution of the users' arrival processes but depends only on the mean as long as the processes are independent and have all the moments finite. Next we will show that the energy efficiency behaves monotonically with respect to the opportunism threshold and provide a result for the rate of energy decrease with the threshold.
Theorem 4.6 (monotonicity of energy efficiency).
Asymptotically, that is, as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq186_HTML.gif , for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq187_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ22_HTML.gif
(22)
Moreover, the decrease in energy efficiency is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq188_HTML.gif . Specifically,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ23_HTML.gif
(23)
First, we provide the intuition behind the result and then provide the proof.
Intuition
Note the following property of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq189_HTML.gif function. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq190_HTML.gif denote any sequence of nonnegative real numbers and let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq191_HTML.gif be any constant. Then,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ24_HTML.gif
(24)
Thus, under simultaneous transmission and successive decoding, we obtain
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ25_HTML.gif
(25)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq192_HTML.gif denotes the rate requirement of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq193_HTML.gif in slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq194_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq195_HTML.gif denotes the number of scheduled users scheduled under https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq196_HTML.gif .
Thus, from (25) we conclude that if the sum rate to be provided is the same, then the required sum received energy at the receiver remains the same and is independent of the individual rates. Now, note that the sum rate to be provided in every slot under https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq197_HTML.gif is asymptotically, that is, as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq198_HTML.gif , equal to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq199_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq200_HTML.gif . This can be seen as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ26_HTML.gif
(26)
Alternatively, one can apply Lemma 4.3 with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq201_HTML.gif . The converse of this result is naturally, that in the case of finite https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq202_HTML.gif the required rate served by the system is a random variable. From the above it follows that asymptotically the required sum received energy under https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq203_HTML.gif is the same in every slot independent of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq204_HTML.gif . Now, the required sum transmit energy depends on the channel states. Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq205_HTML.gif increases, only the users with a larger channel gains are selected, we intuitively expect the sum transmit energy required to achieve the given sum received energy to decrease monotonically. Now, we prove Theorem 4.6. First, we state a lemma that we use to prove the theorem.
Lemma 4.7.
Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq206_HTML.gif denote an ordered countable set of users, where the ordering is as per fading, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq207_HTML.gif whenever https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq208_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq209_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq210_HTML.gif denote two different rate requirement vectors satisfying
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ27_HTML.gif
(27)
Moreover, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq211_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq212_HTML.gif denote the energy allocation as per (4) to realize https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq213_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq214_HTML.gif , respectively. Then, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq215_HTML.gif .
Proof.
The proof is presented in Appendix .
Now, we prove Theorem 4.6.
Proof.
Let us consider two identical copies of a sample path; that is, arrivals and fading for each of the users are the same in every slot. On the first sample path, the users are served as per https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq216_HTML.gif , and on the second they are served as per https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq217_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq218_HTML.gif . Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq219_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq220_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq221_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq222_HTML.gif , as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq223_HTML.gif implies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq224_HTML.gif .
Now, fix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq225_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq226_HTML.gif and define https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq227_HTML.gif . Moreover, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq228_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq229_HTML.gif . Now, we show that for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq230_HTML.gif , it holds that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq231_HTML.gif . By Lemma 4.3, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq232_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq233_HTML.gif w.p.1 as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq234_HTML.gif . Moreover, for a randomly placed user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq235_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq236_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq237_HTML.gif whenever https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq238_HTML.gif . Thus, by the monotonicity of the probability measure, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq239_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq240_HTML.gif . Thus, as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq241_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq242_HTML.gif on any nontrivial sample path. Thus, monotonicity property follows from Lemma 4.7 as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq243_HTML.gif is arbitrary.
Now, we show the first inequality in (23). The inequality follows by observing that the fading of every chosen user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq244_HTML.gif satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq245_HTML.gif . We consider energy allocation with these worse fading states https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq246_HTML.gif for every chosen user. Now, observe that with this modified fading process, the randomness remains only in the pathloss https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq247_HTML.gif . Hence, the required follows using exactly the same arguments as that in Theorem 4.5. We, however, would like to mention that the inequality does not follow from the expressions stated in the statement of Theorem 4.5 as there the users are ordered as per https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq248_HTML.gif which may be different than that as per the pathloss considered here. Now, the second inequality in (23) follows by observing that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq249_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq250_HTML.gif in the first inequality in (23).

4.1. Example Channels

In Theorems 4.1 to 4.6, we have not assumed anything about the distribution of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq251_HTML.gif . Now, let us consider an important special case where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq252_HTML.gif has infinite support. This assumption holds for many distributions used to model multipath effects, for example, Rayleigh, Rician, and Nakagami fadings. Note that as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq253_HTML.gif (equivalently, as delay goes to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq254_HTML.gif ), opportunism threshold https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq255_HTML.gif . Thus, from Theorem 4.6,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ28_HTML.gif
(28)
The relation (28) holds for any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq256_HTML.gif with unbounded support. Though the minimal value is 0 in all the cases, the delay-energy tradeoff, that is, how quickly energy approaches the minimum when the delay is increased, depends strongly on the distribution. It can be easily seen that if the tail of the distribution is heavy, then the delay increases at a smaller rate as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq257_HTML.gif increases significantly with the increase in the delay. On the contrary, if the tail is lighter, the energy decreases at a slower rate with the increase in the delay. We explain this by considering a special class of distributions parametrized by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq258_HTML.gif . Fix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq259_HTML.gif and define https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq260_HTML.gif for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq261_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq262_HTML.gif otherwise. Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq263_HTML.gif determines how fast the tail of the distribution diminishes, for example, as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq264_HTML.gif increases the tail diminishes faster. For this distribution, clearly, delay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq265_HTML.gif . Thus, when the energy is within https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq266_HTML.gif of the minimum, which is zero as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq267_HTML.gif has unbounded support, the delay is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq268_HTML.gif . If we pick https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq269_HTML.gif , then the delay is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq270_HTML.gif , that is, the delay increases at rate strictly smaller than https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq271_HTML.gif . Constrast this with the delay-energy tradeoff obtained in [22]. In [22], Neely considers a model in which the fast fading is modelled as a Markov Chain (MC) with finite state space. In these settings, Neely shows that the delay is at least of the order of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq272_HTML.gif when the energy is in the order https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq273_HTML.gif neighborhood of minimum energy required for the stability. Note that the result holds for any transition probability matrix, and hence the steady-state distribution of the MC is used to model the fast fading. But, we have shown that the result of [22] does not hold when the fast fading distribution has unbounded support.
In the following result, we show that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq274_HTML.gif becomes energy optimal as the delay goes to infinity. From the above discussion it should be clear that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq275_HTML.gif becomes energy optimal as the delay goes to infinity when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq276_HTML.gif has unbounded support. Hence, we only focus on the case where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq277_HTML.gif is supported on a compact set. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq278_HTML.gif denote the supremum of the support.
Corollary 4.8 (energy optimality).
Let the short-term fading distribution https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq279_HTML.gif be supported on the interval https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq280_HTML.gif . As the number of users goes to infinity, for every policy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq281_HTML.gif ,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ29_HTML.gif
(29)
Moreover,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ30_HTML.gif
(30)
Thus, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq282_HTML.gif becomes asymptotically energy optimal as delay goes to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq283_HTML.gif .
Proof.
The relation (29) follows by observing that for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq284_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq285_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq286_HTML.gif . Thus, the minimum sum energy required to support rates https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq287_HTML.gif for each user when fading is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq288_HTML.gif in every slot provides a lower bound on the sum energy required to support the same rates with fading process https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq289_HTML.gif . Now, as shown in [1], optimal energy allocation in the multiaccess channel is given by (4). Now, the relation (29) follows using the arguments similar to those in Theorem 4.5, where fading process is now given by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq290_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq291_HTML.gif . Now, the relation (30) follows by taking the limit https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq292_HTML.gif in (23), implying delay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq293_HTML.gif , thus yielding (30).

4.2. Discussion on Analytical Results

Corollary 4.2 states that if the delay of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq294_HTML.gif has to be provided, then the policy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq295_HTML.gif can achieve it with any https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq296_HTML.gif satisfying https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq297_HTML.gif . Now, Theorem 4.6 states that choosing the largest https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq298_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq299_HTML.gif minimizes the system energy while providing the required delay when the number of users is large. Moreover, Theorem 4.5 quantifies the energy efficiency of the system for the given value https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq300_HTML.gif . Note that Corollary 4.2 and Theorems 4.5 and 4.6 together quantify the delay-energy tradeoff in the multiaccess channel. Finally, Corollary 4.8 proves the energy optimality of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq301_HTML.gif as the delay goes to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq302_HTML.gif . Moreover, Theorem 4.6 shows that the decrease in energy efficiency with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq303_HTML.gif is at least linear. Thus, given any value of energy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq304_HTML.gif greater than the minimum energy required to guarantee the rates to each of the users, there exists https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq305_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq306_HTML.gif provides the desired rate to each user while maintaining the required sum energy below https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq307_HTML.gif .
Caution has to be exercised while interpreting Corollary 4.8 as the limits are taken in two parameters, namely, the number of users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq308_HTML.gif and the user delay https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq309_HTML.gif (equivalently, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq310_HTML.gif or https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq311_HTML.gif ). Thus, the resulting limiting value depends on the relative rates at which these two parameters approach their respective limiting values. In Corollary 4.8, we first let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq312_HTML.gif and subsequently, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq313_HTML.gif . In other words, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq314_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq315_HTML.gif approach their respective limiting values, while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq316_HTML.gif is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq317_HTML.gif . This can be clearly seen in (30) as we still see the superpositioning gain apparent in the term https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq318_HTML.gif as the optimal scheduling can take advantage of the variations in the pathloss values of different users. But, if we let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq319_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq320_HTML.gif , while ensuring https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq321_HTML.gif , then exactly one user will be scheduled under https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq322_HTML.gif for sufficiently large https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq323_HTML.gif . As a result, the superpositioning gain disappears. Thus, a question arises whether the energy optimality of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq324_HTML.gif depends upon the relative rate at which https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq325_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq326_HTML.gif approach their respective limits. Before answering this question, let us look at the lower bound (29). Note that this bound is tight if we split each of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq327_HTML.gif users in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq328_HTML.gif different users (logical group) with the same pathloss, but i.i.d. short-term fading, and let these https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq329_HTML.gif users in a single logical group collectively desire the rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq330_HTML.gif , then let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq331_HTML.gif . Note that as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq332_HTML.gif , in each of the logical groups there exists a user with short-term fading https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq333_HTML.gif and scheduling such users from each of the logical groups at the rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq334_HTML.gif simultaneously minimizes the sum energy required to achieve the desired rates. Thus, in this setting, the actual number of users, accounting for each user as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq335_HTML.gif different users, goes to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq336_HTML.gif at rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq337_HTML.gif and not at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq338_HTML.gif . This shows that the tight lower bound also depends on the rate at which https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq339_HTML.gif . Thus, for a fair comparison, the users in a logical group should scale at the rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq340_HTML.gif . With these scaling laws the optimality of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq341_HTML.gif should hold. Indeed, it can be shown that in a special case https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq342_HTML.gif , while https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq343_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq344_HTML.gif , the lower and upper bounds both equal https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq345_HTML.gif w.p.1. Note that this value corresponds to scheduling a single user with the best short-term fading value, which equals https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq346_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq347_HTML.gif , in every slot.

5. Generalizations

Now, we discuss two important generalizations. First, we consider the system with multiple nonoverlapping bands. The required rate can be split over these bands. In Section 5.1, we discuss how the results in Section 4 can be generalized to this case. Second, we consider a case when the users need different delays. This is the case, when various types of applications are supported on a multiaccess channel, or when the multiaccess channel serves as an intermediate hop on the multiple hops traveled by the application in the network. In Section 5.2, we discuss how OSP can support this.

5.1. Multiband Multiaccess Channel

We consider multiaccess channel with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq348_HTML.gif bands. We assume that the fading on these bands is statistically independent. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq349_HTML.gif denote the short-term fading for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq350_HTML.gif on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq351_HTML.gif subband. Now, it is not immediately clear how the required rate should be split on the various bands in order to minimize the sum energy. But, fortunately, it has been shown that to minimize the sum energy required to realize a given rate vector on the multiband multiaccess channel, the total rate for a user should be supported on its best channel [7]. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq352_HTML.gif . Thus, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq353_HTML.gif has to be defined in terms https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq354_HTML.gif instead of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq355_HTML.gif ; that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq356_HTML.gif selects all the users with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq357_HTML.gif and provides the required rate on the best channel for every user. Now, Theorem 4.1 and Corollary 4.2 hold with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq358_HTML.gif . In Theorem 4.5, the energy efficiency becomes
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ31_HTML.gif
(31)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq359_HTML.gif denote the fading distribution of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq360_HTML.gif who is placed uniformly at random in a cell given that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq361_HTML.gif . The additional factor of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq362_HTML.gif appears because only https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq363_HTML.gif fraction of scheduled user transmit on a given band. Finally, Theorem 4.6 and Corollary 4.8 hold with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq364_HTML.gif replaced by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq365_HTML.gif .

5.2. Delay Differentiation

The users are divided into https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq366_HTML.gif classes based on their delay requirements. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq367_HTML.gif represent the fraction of users that want delays https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq368_HTML.gif respectively. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq369_HTML.gif be the largest real number that satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq370_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq371_HTML.gif . Now, OSP can use https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq372_HTML.gif instead of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq373_HTML.gif for users of class https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq374_HTML.gif . Clearly, Theorem 4.1 and Corollary 4.2 hold with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq375_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq376_HTML.gif . Moreover, energy efficiency of each class https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq377_HTML.gif can be computed along the similar lines as the proof of Theorem 4.5. Now, the energy efficiency for the system is the weighted sum (with respect to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq378_HTML.gif 's) of the energy efficiency of each class. Finally, Theorem 4.6 and Corollary 4.8 can be shown to hold for each class individually. Since, the system energy efficiency is the convex combination of the energy efficiencies of the classes, Theorem 4.6 and Corollary 4.8 follow for the whole system.

6. Numerical Examples

We consider an example system where users are placed uniformly at random in a cell except for a forbidden region with radius https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq379_HTML.gif around the access point. The path loss exponent is two ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq380_HTML.gif ). All users experience short-term fading with exponential energy distribution with mean one on each of the ten ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq381_HTML.gif ) independently fading bands. The explicit mathematical formulations for the channel models can be found in Appendix . The path loss model is normalized to unity at cell edge, so that the results should be normalized with a corresponding factor. This, however, has no effect on the relative numerical results, nor on the delay-energy tradeoff we report.
Figure 1 demonstrates the delay energy tradeoff exhibited by OSP. For an increase in average delay from one to three slots, an energy saving of over 3 dB is gained. Thus, even the small delay tolerance of the application can be exploited to obtain significant improvement in the energy efficiency of the system. In terms of the sensor network application provided for motivation in Section 2, this would mean the halving of the transmitted energy by buffering of a few of the most recent samples. Moreover, the energy required to support the given rate decreases monotonically as delay increases, which verifies Theorem 4.6. Note that the gain exhibits very similar behavior across various spectral efficiencies. This implies that one can use a uniform threshold over a wide range of system configurations having different spectral efficiences, while maintaining a close to optimal efficiency.
Figure 2 provides a comparison between OSP and PFS. The mathematical expressions for computing the energy efficiency ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq383_HTML.gif ) of PFS can be found in [7, Theorem https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq384_HTML.gif ] and are given in Appendix E for completeness. In the delay-limited case with the strict delay constraint of a single slot (i.e., https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq385_HTML.gif ), OSP can outperform PFS only at high spectral efficiencies. However, as delay tolerance of the application increases, OSP can outperform PFS over a wider range of spectral efficiencies. Also, the improvement in the energy efficiency of OSP over that of PFS increases monotonically with an increase in the delay tolerance. Note that the improvement happens while guaranteeing a required rate for each user, which is not the case for PFS. A notable feature of OSP is that changing the opportunism threshold results in an approximately horizontal shift of the performance curve, which again indicates that the energy-delay tradeoff behaves in a similar manner for a wide range of system spectral efficiencies.
An empirical verification for the convergence of the system energy can be found in Figure 3, where the smallest and largest empirically found energy efficiencies of an ensemble of 1000 simulated systems are reported. Each system has a different random pathloss vector. The system employs hard fairness, that is, it does not allow for delay, and data is assumed to arrive at users' transmit buffers in each slot. The extreme energies converge towards the asymptotic at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq386_HTML.gif as the user population grows.
Figure 3 indicates that the system energy efficiency deviates from asymptotic behavior at high spectral efficiency and with a small number of users. This behavior is due to the following. With a finite number of users, the transmitted rate is no longer deterministic as in the asymptotic case. Instead, the number of simultaneously scheduled users and their buffer lengths vary from slot to slot. This results in energy loss due to the convexity of the exponential rate-energy function in (4). Since the rate-energy function has the spectral efficiency as a multiplicative factor in the exponential, the loss is greater at high spectral efficiency.

7. Conclusions

We showed that by opportunistically choosing a suitable fraction of users with the best channels in each slot, we can improve the energy efficiency of the system while providing the required delay to each user. Since the policy empties the scheduled users' queues, it has good stability properties. We showed that the expected user delay is inversely proportional to the scheduling fraction. Delay can then be adjusted simply by choosing an appropriate opportunism threshold, while delay differentiation can be achieved by applying different thresholds for different delay classes. Moreover, if the application does not need any delay guarantees, then OSP can achieve any required energy efficiency ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq387_HTML.gif ) while maintaining system stability. The scheme performs well compared to PFS, while providing rate guarantees.

Appendices

A. Proof of Lemma 4.3

Proof.
First, we show that for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq388_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq389_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ32_HTML.gif
(A1)
If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq390_HTML.gif lies below the support of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq391_HTML.gif the result trivially holds as both sides of (A.1) are equal to zero. Hence, we consider https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq392_HTML.gif in the following.
For a chosen user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq393_HTML.gif , the rate https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq394_HTML.gif is equal to its total buffer occupancy in slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq395_HTML.gif . Under https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq396_HTML.gif , buffer occupancy in slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq397_HTML.gif is equal to the number arrivals since the last time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq398_HTML.gif was scheduled. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq399_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq400_HTML.gif . Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq401_HTML.gif and the fading are i.i.d. across both the slots and users, and they are also mutually independent. So, clearly, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq402_HTML.gif are i.i.d. across the chosen users and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq403_HTML.gif . Moreover, for a chosen user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq404_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ33_HTML.gif
(A2)
We then have
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ34_HTML.gif
(A3)
Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq405_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq406_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq407_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq408_HTML.gif and then the first limit converges to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq409_HTML.gif , the second to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq410_HTML.gif and the last one to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq411_HTML.gif . The final relation (A.3) follows as fading and arrivals are independent.
Now, we claim that the channel gains https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq412_HTML.gif 's for the chosen users can be viewed as i.i.d. variables. Note that if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq413_HTML.gif had scheduled users based on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq414_HTML.gif rather than on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq415_HTML.gif , then https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq416_HTML.gif for the chosen users would not be i.i.d. as the users that are nearer to the receiver are likely to be favored. Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq417_HTML.gif 's are i.i.d. irrespective of the distance between the user and receiver, the scheduling decision can be viewed as scheduling each user independently w.p. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq418_HTML.gif . Since the users are placed at random, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq419_HTML.gif is a deterministic function of distance, and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq420_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq421_HTML.gif are independent, we conclude that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq422_HTML.gif 's for the chosen users are i.i.d. and each https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq423_HTML.gif is distributed as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq424_HTML.gif . Finally, (11) follows from (A.3) using the Glivenko-Cantelli Theorem [30].

B. Proof of Lemma 4.4

Proof.
For simplicity, we prove the required when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq425_HTML.gif has finite support, say https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq426_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq427_HTML.gif denote last time before https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq428_HTML.gif user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq429_HTML.gif was scheduled, that is, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq430_HTML.gif . Moreover, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq431_HTML.gif for each user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq432_HTML.gif . Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq433_HTML.gif is i.i.d. sequence and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq434_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq435_HTML.gif .
Fix any user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq436_HTML.gif , and observe that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ35_HTML.gif
(B1)
Next, fix https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq437_HTML.gif , and consider
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ36_HTML.gif
(B2)
Since https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq438_HTML.gif , it follows that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ37_HTML.gif
(B3)
Now, the result follows by Borel-Cantelli Theorem [31] as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq439_HTML.gif was arbitrary.

C. Proof of Lemma 4.7

Proof.
The proof is by construction. We construct a sequence of rate vectors https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq440_HTML.gif such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq441_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq442_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq443_HTML.gif denote the energy allocation to realize https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq444_HTML.gif . Then, we show that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq445_HTML.gif is a nonincreasing function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq446_HTML.gif , and thus proving the required. The recursive procedure to construct https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq447_HTML.gif is as follows.
Initialize: https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq449_HTML.gif .
STEP https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq451_HTML.gif :
C1. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq453_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq454_HTML.gif ,
C2. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq456_HTML.gif ,
C3. https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq458_HTML.gif .
Note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq459_HTML.gif satisfies https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq460_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq461_HTML.gif , and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq462_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq463_HTML.gif . Thus, clearly, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq464_HTML.gif . Now, using induction, we prove that for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq465_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ38_HTML.gif
(C1)
Note that (C.1) holds for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq466_HTML.gif as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq467_HTML.gif by initialization. Now, let (C.1) hold for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq468_HTML.gif . We show (C.1) for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq469_HTML.gif .
Since (C.1) holds for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq470_HTML.gif , we know that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ39_HTML.gif
(C2)
This proves (C.1) for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq471_HTML.gif .
Now, we show that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq472_HTML.gif is nonincreasing function of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq473_HTML.gif . From (4) and (C.1), it is clear that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq474_HTML.gif for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq475_HTML.gif . Thus it suffices to consider
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ40_HTML.gif
(C3)
The last inequality follows as https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq476_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq477_HTML.gif by suppositions in the lemma.
Now, to prove the required, we need to show that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq478_HTML.gif . First, note that if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq479_HTML.gif , then the result immediately follows. So, we consider a nontrivial case, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq480_HTML.gif . We know that for every https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq481_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq482_HTML.gif . Moreover, the sequence https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq483_HTML.gif is monotone. Thus, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq484_HTML.gif exists. Moreover, by dominated convergence theorem, we can exchange the limit and summation. Thus,
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ41_HTML.gif
(C4)
This proves the required.

D. Channel Statistics

Channel state is assumed to remain constant during one transmission slot and assume a new value for each slot independently for all slots and users. We, thus, avoid the dependence on users and time in the following.
Users are placed uniformly on a circular cell. The channel state of each user is the product of two independent ergodic random processes, path loss and short-term fading. Path loss is polynomially dependent on the distance of the user from the access point and is assumed to remain constant for a users across transmission slots. The distance dependency is parametrized by the path loss exponent https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq485_HTML.gif , usually ranging within the interval [2, 4]. To avoid a singularity for users next to the access point, a forbidden circular region of radius https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq486_HTML.gif is created around the access point. This model results in the following cumulative distribution of the path loss:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ42_HTML.gif
(D1)
Note that the model is normalized to provide unit path loss at cell border. Thus, the results reported here must be rescaled in terms of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq487_HTML.gif by a factor of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq488_HTML.gif , where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq489_HTML.gif denotes the actual radius of the cell. Naturally, since all results behave accordingly, all comparisons remain valid.
The short-term fading process on each band https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq490_HTML.gif is modeled by a zero-mean Gaussian circularly symmetric random variable (i.e., Rayleigh fading), with an exponentially distributed squared envelope. It assumes a new value for each user in each slot. The multiple bands are assumed independently fading. In each slot, those users https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq491_HTML.gif whose maximum channel gain (over all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq492_HTML.gif channels) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq493_HTML.gif are scheduled by OSP on each band, and the cumulative short-term fading distribution is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ43_HTML.gif
(D2)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq494_HTML.gif . With some algebra, the cumulative distribution for the (product) channel can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ44_HTML.gif
(D3)

E. Proportional Fair Scheduling

We follow the approach of [7] in the evaluation. The average spectral efficiency of the system with PFS is given implicitly by [7]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ45_HTML.gif
(E1)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq495_HTML.gif denotes the distribution of the product of the random path loss and the maximum of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq496_HTML.gif users' short-term fading coefficients, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq497_HTML.gif , and is given by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_Equ46_HTML.gif
(E2)
which is identical to (D.3) when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq498_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq499_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F198903/MediaObjects/13638_2008_Article_1603_IEq500_HTML.gif .

Acknowledgments

The work of P. Chaporkar was supported by ERCIM Fellowship and the work of K. Kansanen and R. R. Müller by the Research Council of Norway (NFR) under the NORDITE/VERDIKT programme (NFR Contract no. 172177). The authors wish to acknowledge Mr. Majid Butt for providing part of the numerical results. Parts of this paper were presented in The 3rd workshop on Resource Allocation in Wireless Networks (RAWNET 2007), April 16th, Limassol, Cyprus.
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://​creativecommons.​org/​licenses/​by/​2.​0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat Tse DNC, Hanly SV: Multiaccess fading channels-part I: polymatroid structure, optimal resource allocation and throughput capacities. IEEE Transactions on Information Theory 1998, 44(7):2796-2815. 10.1109/18.737513MathSciNetCrossRefMATH Tse DNC, Hanly SV: Multiaccess fading channels-part I: polymatroid structure, optimal resource allocation and throughput capacities. IEEE Transactions on Information Theory 1998, 44(7):2796-2815. 10.1109/18.737513MathSciNetCrossRefMATH
2.
Zurück zum Zitat Hanly SV, Tse DNC: Multiaccess fading channels-part II: delay-limited capacities. IEEE Transactions on Information Theory 1998, 44(7):2816-2831. 10.1109/18.737514MathSciNetCrossRefMATH Hanly SV, Tse DNC: Multiaccess fading channels-part II: delay-limited capacities. IEEE Transactions on Information Theory 1998, 44(7):2816-2831. 10.1109/18.737514MathSciNetCrossRefMATH
3.
Zurück zum Zitat Bender P, Black P, Grob M, Padovani R, Sindhushayana N, Viterbi A: CDMA/HDR: a bandwidth-efficient high-speed wireless data service for nomadic users. IEEE Communications Magazine 2000, 38(7):70-77. 10.1109/35.852034CrossRef Bender P, Black P, Grob M, Padovani R, Sindhushayana N, Viterbi A: CDMA/HDR: a bandwidth-efficient high-speed wireless data service for nomadic users. IEEE Communications Magazine 2000, 38(7):70-77. 10.1109/35.852034CrossRef
4.
Zurück zum Zitat Tse DNC: Multiuser diversity through proportional fair scheduling. Proceedings of the Communication Theory Workshop (CTW '01), May 2001 Tse DNC: Multiuser diversity through proportional fair scheduling. Proceedings of the Communication Theory Workshop (CTW '01), May 2001
5.
Zurück zum Zitat Jorswieck EA, Sezgin A, Zhang X: Throughput versus fairness: channel-aware scheduling in multiple antenna downlink. EURASIP Journal on Wireless Communications and Networking 2009, 2009:-13. Jorswieck EA, Sezgin A, Zhang X: Throughput versus fairness: channel-aware scheduling in multiple antenna downlink. EURASIP Journal on Wireless Communications and Networking 2009, 2009:-13.
6.
Zurück zum Zitat Viswanath P, Tse DNC, Laroia R: Opportunistic beamforming using dumb antennas. IEEE Transactions on Information Theory 2002, 48(6):1277-1294. 10.1109/TIT.2002.1003822MathSciNetCrossRefMATH Viswanath P, Tse DNC, Laroia R: Opportunistic beamforming using dumb antennas. IEEE Transactions on Information Theory 2002, 48(6):1277-1294. 10.1109/TIT.2002.1003822MathSciNetCrossRefMATH
7.
Zurück zum Zitat Caire G, Müller RR, Knopp R: Hard fairness versus proportional fairness in wireless communications: the single-cell case. IEEE Transactions on Information Theory 2007, 53(4):1366-1385.CrossRefMathSciNetMATH Caire G, Müller RR, Knopp R: Hard fairness versus proportional fairness in wireless communications: the single-cell case. IEEE Transactions on Information Theory 2007, 53(4):1366-1385.CrossRefMathSciNetMATH
8.
Zurück zum Zitat Klein TE, Leung KK, Zheng H: Improved TCP performance in wireless IP networks through enhanced opportunistic scheduling algorithms. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '04), November 2004, Dallas, Tex, USA 5: 2744-2748.CrossRef Klein TE, Leung KK, Zheng H: Improved TCP performance in wireless IP networks through enhanced opportunistic scheduling algorithms. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '04), November 2004, Dallas, Tex, USA 5: 2744-2748.CrossRef
9.
Zurück zum Zitat Khojastepour MA, Sabharwal A: Delay-constrained scheduling: power efficiency, filter design, and bounds. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), March 2004, Hong Kong 3: 1938-1949. Khojastepour MA, Sabharwal A: Delay-constrained scheduling: power efficiency, filter design, and bounds. Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), March 2004, Hong Kong 3: 1938-1949.
10.
Zurück zum Zitat Zafer MA, Modiano E: A calculus approach to minimum energy transmission policies with quality of service guarantees. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA 1: 548-559.CrossRef Zafer MA, Modiano E: A calculus approach to minimum energy transmission policies with quality of service guarantees. Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA 1: 548-559.CrossRef
11.
Zurück zum Zitat Caire G, Taricco G, Biglieri E: Optimum power control over fading channels. IEEE Transactions on Information Theory 1999, 45(5):1468-1489. 10.1109/18.771147MathSciNetCrossRefMATH Caire G, Taricco G, Biglieri E: Optimum power control over fading channels. IEEE Transactions on Information Theory 1999, 45(5):1468-1489. 10.1109/18.771147MathSciNetCrossRefMATH
12.
Zurück zum Zitat Uysal-Biyikoglu E, El Gamal A: On adaptive transmission for energy efficiency in wireless data networks. IEEE Transactions on Information Theory 2004, 50(12):3081-3094. 10.1109/TIT.2004.838355MathSciNetCrossRefMATH Uysal-Biyikoglu E, El Gamal A: On adaptive transmission for energy efficiency in wireless data networks. IEEE Transactions on Information Theory 2004, 50(12):3081-3094. 10.1109/TIT.2004.838355MathSciNetCrossRefMATH
13.
Zurück zum Zitat Chen W, Neely MJ, Mitra U: Energy efficient scheduling with individual packet delay constraints: offline and online results. Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), May 2007, Anchorage, Alaska, USA 1136-1144. Chen W, Neely MJ, Mitra U: Energy efficient scheduling with individual packet delay constraints: offline and online results. Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), May 2007, Anchorage, Alaska, USA 1136-1144.
14.
Zurück zum Zitat Chen W, Mitra U, Neely MJ: Energy-efficient scheduling with individual delay constraints over a fading channel. Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '07), April 2007 1-10. Chen W, Mitra U, Neely MJ: Energy-efficient scheduling with individual delay constraints over a fading channel. Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '07), April 2007 1-10.
15.
Zurück zum Zitat Cheng R, Verdú S: Gaussian multi-access channel with ISI: capacity region and multi-user waterfilling. IEEE Transactions on Information Theory 1993, 39: 773-785. 10.1109/18.256487CrossRef Cheng R, Verdú S: Gaussian multi-access channel with ISI: capacity region and multi-user waterfilling. IEEE Transactions on Information Theory 1993, 39: 773-785. 10.1109/18.256487CrossRef
16.
Zurück zum Zitat Yu W, Rhee W, Boyd S, Cioffi JM: Iterative water-filling for Gaussian vector multiple-access channels. IEEE Transactions on Information Theory 2004, 50(1):145-152. 10.1109/TIT.2003.821988MathSciNetCrossRefMATH Yu W, Rhee W, Boyd S, Cioffi JM: Iterative water-filling for Gaussian vector multiple-access channels. IEEE Transactions on Information Theory 2004, 50(1):145-152. 10.1109/TIT.2003.821988MathSciNetCrossRefMATH
17.
Zurück zum Zitat Oh J, Kim S-J, Cioffi JM: Optimum power allocation and control for OFDM in multiple access channels. Proceedings of the IEEE Vehicular Technology Conference (VTC '04), 2004, Los Angeles, Calif, USA 60: 774-778. Oh J, Kim S-J, Cioffi JM: Optimum power allocation and control for OFDM in multiple access channels. Proceedings of the IEEE Vehicular Technology Conference (VTC '04), 2004, Los Angeles, Calif, USA 60: 774-778.
18.
Zurück zum Zitat Michel T, Wunder G: Solution to the sum power minimization problem under given rate requirements for the OFDM multipleaccess channel. Proceedings of the Annual Allerton Conference on Communications, Control and Computing, September 2004 Michel T, Wunder G: Solution to the sum power minimization problem under given rate requirements for the OFDM multipleaccess channel. Proceedings of the Annual Allerton Conference on Communications, Control and Computing, September 2004
19.
Zurück zum Zitat Yu DD, Cioffi JM: Iterative water-filling for optimal resource allocation in OFDM multiple-access and broadcast channels. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '06), November-December 2006 1-5. Yu DD, Cioffi JM: Iterative water-filling for optimal resource allocation in OFDM multiple-access and broadcast channels. Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '06), November-December 2006 1-5.
20.
Zurück zum Zitat Berry RA, Gallager RG: Communication over fading channels with delay constraints. IEEE Transactions on Information Theory 2002, 48(5):1135-1149. 10.1109/18.995554MathSciNetCrossRefMATH Berry RA, Gallager RG: Communication over fading channels with delay constraints. IEEE Transactions on Information Theory 2002, 48(5):1135-1149. 10.1109/18.995554MathSciNetCrossRefMATH
21.
Zurück zum Zitat Goyal M, Kumar A, Sharma V: Power constrained and delay optimal policies for scheduling transmission over a fading channel. Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 1: 311-320. Goyal M, Kumar A, Sharma V: Power constrained and delay optimal policies for scheduling transmission over a fading channel. Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA 1: 311-320.
22.
Zurück zum Zitat Neely MJ: Optimal energy and delay tradeoffs for multi-user wireless downlinks. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM'06), April 2006, Barcelona, Spain 1-13. Neely MJ: Optimal energy and delay tradeoffs for multi-user wireless downlinks. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM'06), April 2006, Barcelona, Spain 1-13.
23.
Zurück zum Zitat Chaporkar P, Sarkar S: Stable scheduling policies for maximizing throughput in generalized constrained queueing systems. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006, Barcelona, Spain 1-13. Chaporkar P, Sarkar S: Stable scheduling policies for maximizing throughput in generalized constrained queueing systems. Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006, Barcelona, Spain 1-13.
24.
Zurück zum Zitat Neely M: Energy optimal control for time varying wireless networks. Proceedings of the Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05), March 2005, Miami, Fla, USA Neely M: Energy optimal control for time varying wireless networks. Proceedings of the Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05), March 2005, Miami, Fla, USA
25.
Zurück zum Zitat Stolyar AL: Maximizing queueing network utility subject to stability: greedy primal-dual algorithm. Queueing Systems 2005, 50(4):401-457. 10.1007/s11134-005-1450-0MathSciNetCrossRefMATH Stolyar AL: Maximizing queueing network utility subject to stability: greedy primal-dual algorithm. Queueing Systems 2005, 50(4):401-457. 10.1007/s11134-005-1450-0MathSciNetCrossRefMATH
26.
Zurück zum Zitat Chaporkar P, Kansanen K, Müller RR: Power optimal scheduling for guaranteed throughput in multi-access fading channels. Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), June 2007, Nice, France 2961-2965. Chaporkar P, Kansanen K, Müller RR: Power optimal scheduling for guaranteed throughput in multi-access fading channels. Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), June 2007, Nice, France 2961-2965.
27.
Zurück zum Zitat Jindal N, Vishwanath S, Goldsmith A: On the duality of Gaussian multiple-access and broadcast channels. IEEE Transactions on Information Theory 2004, 50(5):768-783. 10.1109/TIT.2004.826646MathSciNetCrossRefMATH Jindal N, Vishwanath S, Goldsmith A: On the duality of Gaussian multiple-access and broadcast channels. IEEE Transactions on Information Theory 2004, 50(5):768-783. 10.1109/TIT.2004.826646MathSciNetCrossRefMATH
28.
Zurück zum Zitat Biglieri E, Proakis J, Shamai S: Fading channels: information-theoretic and communications aspects. IEEE Transactions on Information Theory 1998, 44(6):2619-2692. 10.1109/18.720551MathSciNetCrossRefMATH Biglieri E, Proakis J, Shamai S: Fading channels: information-theoretic and communications aspects. IEEE Transactions on Information Theory 1998, 44(6):2619-2692. 10.1109/18.720551MathSciNetCrossRefMATH
29.
Zurück zum Zitat Cover TM, Thomas JA: Elements of Information Theory. 2nd edition. John Wiley & Sons, New York, NY, USA; 2006.MATH Cover TM, Thomas JA: Elements of Information Theory. 2nd edition. John Wiley & Sons, New York, NY, USA; 2006.MATH
30.
Zurück zum Zitat Shorak G, Wellner J: Empirical Processes with Applications to Statistics. John Wiley & Sons, New York, NY, USA; 1986. Shorak G, Wellner J: Empirical Processes with Applications to Statistics. John Wiley & Sons, New York, NY, USA; 1986.
31.
Zurück zum Zitat Feller W: An Introduction to Probability Theory and Its Application. John Wiley & Sons, New York, NY, USA; 1961. Feller W: An Introduction to Probability Theory and Its Application. John Wiley & Sons, New York, NY, USA; 1961.
Metadaten
Titel
On the Delay-Energy Tradeoff in Multiuser Fading Channels
verfasst von
Prasanna Chaporkar
Kimmo Kansanen
Ralf R. Müller
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2009/198903

Weitere Artikel der Ausgabe 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Zur Ausgabe