- Research Article
- Open Access

# On the Delay-Energy Tradeoff in Multiuser Fading Channels

- Prasanna Chaporkar
^{1}, - Kimmo Kansanen
^{1}Email author and - Ralf R. Müller
^{1}

**2009**:198903

https://doi.org/10.1155/2009/198903

© Prasanna Chaporkar et al. 2009

**Received:**16 October 2008**Accepted:**11 August 2009**Published:**5 October 2009

## Abstract

We consider the delay-energy tradeoff on a fading channel with multiuser diversity. For fixed arbitrary rates of the users, the total transmitted energy is minimized subject to a delay constraint. To achieve this goal we propose a scheme which schedules a subset of all users simultaneously. The scheduled users are allocated power to guarantee successful separation at the detector by successive decoding. In this way, we can benefit from both multiuser diversity and the near-far situation via scheduling and simultaneous transmission, respectively. We analytically show that when the number of users goes to infinity the energy required to guarantee the required user rates can be made as small as required at the cost of a higher delay "delay-energy tradeoff". We explicitly compute the delay under the proposed scheduling policy and discuss how delay differentiation can be achieved. We extend the results to multiband multiaccess channel. Finally, all the results can be generalized in a straightforward fashion to broadcast channel due to the Gaussian multiaccess-broadcast channel duality.

## Keywords

- Energy Efficiency
- Fading Channel
- Power Allocation
- Channel State Information
- Busy Period

## 1. Introduction

A comprehensive treatment of multiaccess fading channels can be found in [1, 2]. In these papers, Tse and Hanly have characterized the so-called *throughput capacity* and *delay-limited capacity* of the multiaccess block fading channel with Gaussian noise assuming that perfect channel state information (CSI) is causally available at the transmitters and the receiver. The throughput capacity region quantifies the achievable rate region with average power constraint for ergodic fading. For the delay limited capacity, each user must be given the required rate irrespective of its fading state. The aim is to obtain a coding and power allocation scheme to minimize the energy while guaranteeing the rate in every slot. Here, *slot* refers to the time duration required to transmit a block of symbols over which the fading state remains unaltered. Thus, the slot duration is smaller than the channel coherence time.

The notion of throughput capacity leads to schemes that take advantage of the different channel qualities of the users *"multiuser diversity"*. Specifically, it has been shown that in the special case of single antenna transmission and reception on a frequency nonselective channel, sum rate in the system is maximized by letting only one user with the best channel quality to transmit. Such schemes that take current channel states into account while making scheduling decisions are referred to as *"Opportunistic Scheduling"* and may result in unfair rate allocation if the fading statistics are not symmetric. In wireless systems, the fading statistics are typically not symmetric because of many reasons that include the so-called*"near-far"* effect. To alleviate this limitation, several opportunistic scheduling schemes with fairness constraints have been designed [3, 4]. Different fairness objectives will in general result in different throughput performance of the system, along with changing other performance parameters of a system [5]. Among them, Proportional Fair Scheduling (PFS) is among the most well known and has many desirable properties including provable fairness guarantees and suitability for online implementation, that is, without prior knowledge of channel statistics [6]. In spite of these desirable features, PFS suffers from two limitations. First, PFS does not provide the required rate to the users, but the rate allocation is done to maximize certain utility function and the allocated rates depend on the channel statistics of the users. Second, it does not guarantee delay as the users are scheduled in random slots, depending on their fading states and the resource allocation in the previous slots.

As discussed before, the notion of throughput capacity is relevant for delay-tolerant data applications. On the contrary, the notion of delay-limited capacity is relevant for the applications that have the strictest delay requirement, namely, the required rate should be given to each user in each slot irrespective of the channel conditions. The delay for such schemes is always one slot. Note that these schemes cannot make use of channel or multiuser diversity over time, but instead can benefit from near-far gain [7] by simultaneous transmission of users. It has been shown that simultaneous transmission (superposition coding in downlink) and successive decoding minimize energy for achieving the required rates [2]. In this signaling scheme, all the users transmit simultaneously with a coordinated power allocation, and the receiver decodes in the decreasing order of the users' channel states treating the undecoded signals as noise. One of the attractive features of this coding strategy is that given the ordered channel state sequence, the power allocation for the optimal signaling can be obtained using a greedy procedure. This has significant impact on practical implementation.

Note that opportunistic scheduling exploits channel and multiuser diversity to guarantee rates that maximize certain utility and/or guarantee fairness, while simultaneous transmission and successive decoding exploit superpositioning to guarantee the required rate and the strict delay of one slot in energy efficient fashion. Many applications cannot afford to sustain indefinite delay variability in attaining the fair rate (as in PFS) without suffering significant performance penalty [8], but they also do not need the strict delay of one slot (as in delay-limited schemes); that is, they have *limited* delay tolerance. With limited delay tolerance in multiaccess channel, it is possible to exploit both multiuser diversity and the superpositioning gain. *Our aim is to understand how delay tolerance of the application can be exploited so as to improve the energy efficiency (delay-energy tradeoff).*

In literature, the delay-energy tradeoff is typically studied assuming no multipath fading (AWGN channel) [9, 10] or assuming noncausal CSI at transmitters and the receiver [11–14]. In an AWGN channel, the problem of minimizing energy with strict deadline requirements has been addressed using filter theory [9] and network calculus [10]. In [11], the authors have studied the delay-energy tradeoff for a single user in fading channel with a strict deadline (say slots), while in [12–14] the multiaccess fading channel is considered. In all these works, optimal offline (noncausal CSI available) algorithms that iteratively solve the underlying optimization problem have been developed, and heuristic algorithms for noncausal CSI have been proposed. Because of the equivalence between the multiplexing in time and frequency, the algorithms with noncausal CSI are more relevant when orthogonal frequency bands are available and the delay requirement is one slot, that is, in the case of a delay limited multiband multiaccess system. In their seminal work, Cheng and Verdú have obtained the capacity region for the vector Gaussian multiaccess channel [15]. Here, authors have considered the scalar Gaussian channel with ISI, which reduces to the case of independent parallel memoryless Gaussian channels through the Karhunen-Loéve expansion. No multipath fading was assumed. Fundamental results for multiband fading channels were reported in [1, 2]. Perfect CSI at the transmitter and the receiver is assumed in these works. The capacity achieving power allocation is the multiuser waterfilling scheme. The exact characterization of this scheme is considered difficult, and only iterative algorithms and their convergence properties are known [16]. The problem of providing the desired throughput to each of the users has been addressed in multiband multiaccess fading channel with white Gaussian noise [17–19]. The approach taken in these works is one to obtain an approximate multiuser waterfilling solution efficiently.

In practice, CSI is only available causally. In spite of this obvious limitation, the case with noncausal CSI has been studied in literature because of the following two reasons. First, the optimum schemes with noncausal CSI (offline schemes) provide a benchmark for all the other schemes that guarantee the required delay. Also, the structural properties of the optimal offline schemes facilitate valuable insights for designing near-optimal online schemes (schemes with causal CSI). Second, in the fixed delay case, analytically it is difficult, if not impossible, to design optimal online schemes barring the trivial cases in which future fading states can be accurately predicted. This can be seen as follows. Since the required delay is finite, any fading realization is possible with positive probability. Thus, for any given online scheme, one can play the role of an adversary and orchestrate future fading states so as to make the scheme suboptimal compared to an optimal offline scheme. In view of these reasons, instead of a fixed delay constraint, an average delay constraint is considered while designing optimal online schemes [20, 21]. From the quality of service point of view, guaranteeing the fixed delay is more desirable than guaranteeing the average delay for the real-time applications. But, if the delay variance is small, then the higher system layers can employ mechanisms like playback buffer to cope up with the delay variability. In [20, 21], a single user fading channel is considered, and the minimization of average delay for the given average power constraint has been addressed using the framework of Markov Decision Processes (MDP). Again, only the structural properties of the optimal online scheme have been derived except in certain special cases. The exact online scheme has to be obtained by solving Bellman's equations, which is computationally expensive. The results in [20, 21] for a single user case are extended to the multiaccess channel by Neely [22]. Here, the author has considered the mean system delay, that is, the average delay over all the users. We note that guaranteeing the mean system delay does not guarantee the required delay performance to individual users. In fact, such schemes tend to favor users with a better channel by providing smaller delays to these at the expense of the users with a worse channel and still maintaining the desired mean system delay. Our aim is to quantify the delay-energy tradeoff while guaranteeing the average delay of each of the users. In queueing theory literature, frameworks for designing scheduling schemes that minimize a certain utility (energy in our case) while guaranteeing bounded mean delay can be found in [23–26]. These frameworks guarantee the bounded delay but do not guarantee the desired delay to each of the users as we do.

From the previous discussion, it should be clear that the closed form expressions for the minimum energy required for guaranteeing the desired delay are not available for both online and offline schemes. Thus, the energy-delay tradeoff has to be quantified using numerical evaluations for specific scenarios of interest. Our aim is to obtain closed form expressions to quantify the delay-energy tradeoff for an average delay constraint in multiband multiaccess fading channels with causal CSI at the transmitters and the receiver. We consider a multiband system as it can model many practical systems including OFDM systems, channels with frequency selective fading, and ISI channels. The analysis targets specifically systems, where a large number of users must be supported with rate and delay guarantees. A motivating real world example could be a sensor network where sensing delays must be limited, data rates may be pre-allocated, and energy consumption should be minimal.

In our analysis, we allow for a general fading distribution and also consider random arrivals of data from the higher layers into the physical layer buffer to model real-time applications in which the symbols are generated in realtime. For analytical tractability, we use the following approach. We design a parametrized scheduling policy called *Opportunistic Superpositioning (OSP)* that exploits multiuser diversity by scheduling a set of users with high channel gains only, and among these users it uses simultaneous transmission and successive decoding to exploit superpositioning gain. One of the main challenges in designing such schemes is the quantification of performance. The quantification allows for the optimal and guaranteed control. We explicitly quantify the average per user delay in the general case, and the total energy requirement in the large system limit for the proposed policy. Thus, given the delay requirement, we can efficiently choose the appropriate parameter values so as to minimize the energy while guaranteeing the required delay. Using numerical computations, we show that allowing a little delay can yield significant energy savings. We also compare the performance of the proposed policy with PFS and the delay-limited schemes.

The paper is arranged as follows. In Section 2, we present our system model. In Section 3, we describe the OSP policy, and in Section 4 obtain analytical guarantees. In Section 5, we discuss extensions of OSP to multiband multiaccess channel and to provide delay differentiation. In Section 6, we compare the performance of OSP with PFS and delay-limited schemes using numerical computations. Finally, in Section 7, we conclude.

## 2. System Model

Consider the following system for the purpose of motivation. A sensor network is operating in an area, with a fusion center located in the center. Each sensor is stationary, but the propagation environment has enough inherent variation, that the channels between sensors and the fusion center can be considered slowly randomly varying over time. Each sensor must be polled within a reasonable time from making a measurement, which consists of a random number of bits. On the average, all sensors provide equally valuable data, and should receive an equal fraction of available system rate.

With the previous motivation in mind, we consider a multiaccess system with users that are placed at random in a cell. Time is slotted. Each user requires a certain fraction of the total rate provided in a system; that is, the required average rate of each user is , where then denotes the total average spectral efficiency of the system required to support the user rates. Alternatively, denotes the arrivals for user in slot , where is a random variable (r.v.). We assume that all the moments for are finite and for every . Note that random variables with finite support have all the moments finite. A sensor measurement usually has limited resolution due to measurement noise. In networks, the arrival rate is typically limited by the link capacities which may be large but finite. Moreover, we assume that the arrivals are independent and identically distributed (i.i.d.) across both slots and users. The arrivals are queued into an infinite buffer before served. Without loss of generality, let the system start in slot 1. Hence, users' buffers are empty at the beginning of slot 1.

We primarily discuss the uplink communication (multiaccess channel), but since the results consider total system energy expenditure, which can be interpreted as a total power constraint, the results can be generalized in a straightforward fashion to the downlink case (broadcast channel) using the Gaussian multiaccess-broadcast duality [27] in the hard fairness context [7].

Now, we describe the model for the multiaccess channel, described by the input ( ) output ( ) relation

Each user
experiences the channel
in slot
. The channel
arises as the product of two effects assumed independent, namely,*path loss* (denoted by
) and*short-term fading* (denoted by
), that is,
. The path loss is a function of the distance between the transmitter-receiver pair. Typically, the distance between transmitter and receiver changes very slowly with respect to the signal bandwidth. Hence, we assume that the path loss is constant from slot to slot. On the contrary,
depends on the scattering environment around the user and changes in time depending on the channel Doppler bandwidth. We assume that
changes from slot to slot and is i.i.d. across both users and slots. This is referred to as the block fading model [28]. Let
(
, resp.) denote the received (transmitted, resp.) energy from user
in slot
. Then,
. Note that the channel is given in terms of energy attenuation. Let
. Note that the fading for users is *not* symmetric. The distribution of pathloss for a randomly placed user is denoted by
, that is,
where
is a generic r.v. indicating the pathloss of a randomly placed user. Note that
depends on the distribution of the users' placement and the path loss function. Also, let
denote the short-term fading distribution, that is,
for every user
and slot
. Let
denote the noise power spectral density.

Definition 2.1 (scheduling policy).

A *scheduling policy*
is an algorithm that in each slot
determines the rate vector
and serves each user
with rate
.

We assume that the perfect CSI is available at the transmitters and the receiver in every slot . Thus, a scheduling policy may adapt to the channel state.

Now, we discuss the energy allocation for each user in order to achieve the desired rates . Fix an energy allocation given by a vector , where denotes the energy of the user. The capacity region of the Gaussian multiaccess channel with the time invariant fading for the energy allocation is the set of rate vectors that satisfy [29]

for every . The rates are achieved with the standard random Gaussian codebook with variance for user . The signaling is as follows. All the users transmit simultaneously and the receiver decodes successively in the decreasing order of the channel states . From this result, it is straightforward to see that a given rate vector is feasible with energy allocation in Gaussian multiaccess channel with fading if and only if (iff) there exists a permutation of such that for every

Note that there may exist many energy allocations that can realize the rate vector . Since we aim to obtain energy efficient strategies, we seek an optimal energy allocation that minimizes the sum energy while achieving the desired rates. Such energy allocation can be explicitly obtained as follows [1]. Let denote the permutation such that . Then, the optimal energy allocation is given by

for every . Note that for the optimal signaling, the successive decoding order depends only on channel gains, but not on rates. For convenience, from now on, we considered users to be indexed according to the ordering. We assume that once a scheduling policy determines the rate allocation, the corresponding power allocation is done as per (4).

We consider three performance measures, namely, stability, energy efficiency, and delay. Next, we formally define these.

Definition 2.2 (busy period).

A *busy period* for user
is the set of consecutive slots in which its queue length is greater than zero.

Definition 2.3 (stability).

*strongly stable*if for every user ,

Strong stability, as defined here, guarantees that each user has a bounded average per-packet delay.

Definition 2.4 (energy efficiency).

The energy efficiency measures the average transmitted energy the system uses per each transmitted bit.

Definition 2.5 (user delay).

We augment the notation to denote the dependence of various quantities on the scheduling policy by using as a superscript, for example, will indicate the delay for user under policy .

## 3. Opportunistic Superpositioning ( )

The scheduling policy is parametrized by a variable . To specify this dependence, we denote the OSP scheduling policy as . The scheduling decisions are taken as follows in every slot .

(i)Select all users such that .

(ii)Allocate rate to each of the chosen users so that everything in its buffer is served, for others.

Note that (OSP) selects users based on and not on . This is for the reasons of fairness as has the same distribution for every user, while the distribution of depends on the distance of user from the base station and is biased towards stronger channels the closer the user is to the base station. Moreover, since the pathloss is constant for each user, it suffices to determine rate allocation in each slot depending only on short-term fading which is time varying, and thus, unlike pathloss, provides diversity which can be exploited.

We refer to
as *opportunism threshold* as it dictates how opportunistic OSP is in exploiting the channel diversity. The opportunism threshold plays a key role in determining delay and energy consumption in the system. We intuitively explain how. Note that appropriate choice of
allows for eliminating users that are in deep fade in a given slot. Typically, a few users with a very bad channel dominate the total energy consumption in the system for the delay-limited schemes. Thus, even a small value of the opportunism threshold should significantly improve energy efficiency of the system. Specifically, we can expect the energy consumption to decrease monotonically with an increase in
. But, note that as
increases, each user is scheduled less frequently. Thus, for satisfying the rate requirements, the rate given to the scheduled users increases monotonically with
. And providing the higher rate requires higher energy. In fact, for fixed noise power spectral density, the required energy increases exponentially with an increase in the rate. Summarizing, the opportunism threshold in OSP allows us to save energy by eliminating the users in deep fade but requires higher energy to serve scheduled users. Thus, it is not clear if the opportunism threshold should improve the system performance. It, however, turns out that the energy consumption of OSP decreases monotonically as a function of
. In other words, the energy savings caused by eliminating the worst users is more than the increase in the energy consumption to provide the higher rates to the scheduled users.

As discussed above, the users are scheduled less frequently by OSP when is large. So, clearly, the delay increases monotonically with an increase in . Thus, the opportunism threshold provides a way to achieve delay-energy tradeoff. Now, the main challenge is to quantify the delay and energy of OSP as a function of , so as to choose the optimal that guarantees the required delay while minimizing the energy.

## 4. Analytical Guarantees

In this section, we obtain analytical guarantees for . In Theorem 4.1, we show that is strongly stable and has a finite average busy time. This results leads to Corollary 4.2, where we quantify the user delay under the proposed scheduler . In Theorem 4.5, we quantify the asymptotic energy efficiency of . In Theorem 4.6 we show that the asymptotic energy efficiency of decreases monotonically with . In Section 4.1, we provide a demonstration of the results using important special cases and provide connections to recent results in the literature. Therein we provide Corollary 4.8, where we show that as delay grows without bound, the energy required to stabilize the system becomes equal to the minimum energy required to provide the desired rates to each of the users in long term. Finally in Section 4.2, we discuss the implications of the analytical results.

First, let .

Theorem 4.1 (strong stability).

For every such that , is strongly stable w.p.1.

Proof.

Now, the result follows from Definition 2.3 as .

Corollary 4.2 (user delay).

Proof.

Because the arrival and transmission of each packet are mutually independent, and these are independent from the arrivals and transmissions of other packets, we can, without loss of generality, consider the delay of each packet separately. Conditioned on the arrival time, the waiting time follows the same geometric distribution as the busy time, and the SLLN proof of Theorem 4.1 applies to user delay directly.

Note.

Users' delays do not depend on the distribution of their arrival processes given that the mean is finite. Moreover, the delays for the users are not correlated. Thus, for a given , users may have different distributions for their respective arrival processes and yet receive the same delay as long as these processes are independent. Furthermore, user's delay guarantee is independent of the number of users in the system.

Let denote the fading distribution of user who is randomly placed in a cell given that , that is, , where is an r.v. denoting the path loss of a randomly placed user . Note that does not depend on time as the short-term fading is i.i.d. across the slots. Now, let denote the set of users that are chosen for service under in slot such that their channel gains are less than or equal to , that is, . Clearly, denotes the set of all the users chosen by in slot . Let denote the cardinality of .

Next, we obtain the energy efficiency of in the asymptotic case when , where the system exhibits a self-averaging behavior, and the required energy to support the traffic demand converges to a deterministic limit. Intuitively, this is due to the random processes of the asymptotically large system behaving deterministically according to their limiting probabilistic behavior, the distributions. Before we proceed, however, we first state two results that we use to prove the required. The first lemma shows how the sum rate of a set of users chosen by , having a channel state not larger than , converges asymptotically to a limit. The second lemma shows how the rate of any arbitrary user selected by asymptotically vanishes.

Lemma 4.3.

Proof.

The proof is presented in Appendix .

Lemma 4.4.

Proof.

The proof is presented in Appendix .

Theorem 4.5 (energy efficiency).

Proof.

Fix arbitrary slot . We show that under , is the same in every slot as . So, for convenience, we drop in the notation.

Thus the required follows from Definition 2.4.

Note.

The energy efficiency does not depend on the distribution of the users' arrival processes but depends only on the mean as long as the processes are independent and have all the moments finite. Next we will show that the energy efficiency behaves monotonically with respect to the opportunism threshold and provide a result for the rate of energy decrease with the threshold.

Theorem 4.6 (monotonicity of energy efficiency).

First, we provide the intuition behind the result and then provide the proof.

Intuition

where denotes the rate requirement of user in slot and denotes the number of scheduled users scheduled under .

Thus, from (25) we conclude that if the sum rate to be provided is the same, then the required sum received energy at the receiver remains the same and is independent of the individual rates. Now, note that the sum rate to be provided in every slot under is asymptotically, that is, as , equal to for every . This can be seen as follows:

Alternatively, one can apply Lemma 4.3 with . The converse of this result is naturally, that in the case of finite the required rate served by the system is a random variable. From the above it follows that asymptotically the required sum received energy under is the same in every slot independent of . Now, the required sum transmit energy depends on the channel states. Since increases, only the users with a larger channel gains are selected, we intuitively expect the sum transmit energy required to achieve the given sum received energy to decrease monotonically. Now, we prove Theorem 4.6. First, we state a lemma that we use to prove the theorem.

Lemma 4.7.

Moreover, let and denote the energy allocation as per (4) to realize and , respectively. Then, .

Proof.

The proof is presented in Appendix .

Now, we prove Theorem 4.6.

Proof.

Let us consider two identical copies of a sample path; that is, arrivals and fading for each of the users are the same in every slot. On the first sample path, the users are served as per , and on the second they are served as per , where . Note that for every , and , as implies .

Now, fix and and define . Moreover, let and . Now, we show that for every , it holds that . By Lemma 4.3, and w.p.1 as . Moreover, for a randomly placed user , for every whenever . Thus, by the monotonicity of the probability measure, for every . Thus, as , on any nontrivial sample path. Thus, monotonicity property follows from Lemma 4.7 as is arbitrary.

Now, we show the first inequality in (23). The inequality follows by observing that the fading of every chosen user satisfies . We consider energy allocation with these worse fading states for every chosen user. Now, observe that with this modified fading process, the randomness remains only in the pathloss . Hence, the required follows using exactly the same arguments as that in Theorem 4.5. We, however, would like to mention that the inequality does not follow from the expressions stated in the statement of Theorem 4.5 as there the users are ordered as per which may be different than that as per the pathloss considered here. Now, the second inequality in (23) follows by observing that for every in the first inequality in (23).

### 4.1. Example Channels

In Theorems 4.1 to 4.6, we have not assumed anything about the distribution of . Now, let us consider an important special case where has infinite support. This assumption holds for many distributions used to model multipath effects, for example, Rayleigh, Rician, and Nakagami fadings. Note that as (equivalently, as delay goes to ), opportunism threshold . Thus, from Theorem 4.6,

The relation (28) holds for any with unbounded support. Though the minimal value is 0 in all the cases, the delay-energy tradeoff, that is, how quickly energy approaches the minimum when the delay is increased, depends strongly on the distribution. It can be easily seen that if the tail of the distribution is heavy, then the delay increases at a smaller rate as increases significantly with the increase in the delay. On the contrary, if the tail is lighter, the energy decreases at a slower rate with the increase in the delay. We explain this by considering a special class of distributions parametrized by . Fix and define for and otherwise. Note that determines how fast the tail of the distribution diminishes, for example, as increases the tail diminishes faster. For this distribution, clearly, delay . Thus, when the energy is within of the minimum, which is zero as has unbounded support, the delay is . If we pick , then the delay is , that is, the delay increases at rate strictly smaller than . Constrast this with the delay-energy tradeoff obtained in [22]. In [22], Neely considers a model in which the fast fading is modelled as a Markov Chain (MC) with finite state space. In these settings, Neely shows that the delay is at least of the order of when the energy is in the order neighborhood of minimum energy required for the stability. Note that the result holds for any transition probability matrix, and hence the steady-state distribution of the MC is used to model the fast fading. But, we have shown that the result of [22] does not hold when the fast fading distribution has unbounded support.

In the following result, we show that becomes energy optimal as the delay goes to infinity. From the above discussion it should be clear that becomes energy optimal as the delay goes to infinity when has unbounded support. Hence, we only focus on the case where is supported on a compact set. Let denote the supremum of the support.

Corollary 4.8 (energy optimality).

Thus, becomes asymptotically energy optimal as delay goes to .

Proof.

The relation (29) follows by observing that for user , for every . Thus, the minimum sum energy required to support rates for each user when fading is in every slot provides a lower bound on the sum energy required to support the same rates with fading process . Now, as shown in [1], optimal energy allocation in the multiaccess channel is given by (4). Now, the relation (29) follows using the arguments similar to those in Theorem 4.5, where fading process is now given by for every . Now, the relation (30) follows by taking the limit in (23), implying delay , thus yielding (30).

### 4.2. Discussion on Analytical Results

Corollary 4.2 states that if the delay of has to be provided, then the policy can achieve it with any satisfying . Now, Theorem 4.6 states that choosing the largest such that minimizes the system energy while providing the required delay when the number of users is large. Moreover, Theorem 4.5 quantifies the energy efficiency of the system for the given value . Note that Corollary 4.2 and Theorems 4.5 and 4.6 together quantify the delay-energy tradeoff in the multiaccess channel. Finally, Corollary 4.8 proves the energy optimality of as the delay goes to . Moreover, Theorem 4.6 shows that the decrease in energy efficiency with is at least linear. Thus, given any value of energy greater than the minimum energy required to guarantee the rates to each of the users, there exists such that provides the desired rate to each user while maintaining the required sum energy below .

Caution has to be exercised while interpreting Corollary 4.8 as the limits are taken in two parameters, namely, the number of users and the user delay (equivalently, or ). Thus, the resulting limiting value depends on the relative rates at which these two parameters approach their respective limiting values. In Corollary 4.8, we first let and subsequently, let . In other words, and approach their respective limiting values, while is . This can be clearly seen in (30) as we still see the superpositioning gain apparent in the term as the optimal scheduling can take advantage of the variations in the pathloss values of different users. But, if we let and , while ensuring , then exactly one user will be scheduled under for sufficiently large . As a result, the superpositioning gain disappears. Thus, a question arises whether the energy optimality of depends upon the relative rate at which and approach their respective limits. Before answering this question, let us look at the lower bound (29). Note that this bound is tight if we split each of the users in different users (logical group) with the same pathloss, but i.i.d. short-term fading, and let these users in a single logical group collectively desire the rate , then let . Note that as , in each of the logical groups there exists a user with short-term fading and scheduling such users from each of the logical groups at the rate simultaneously minimizes the sum energy required to achieve the desired rates. Thus, in this setting, the actual number of users, accounting for each user as different users, goes to at rate and not at . This shows that the tight lower bound also depends on the rate at which . Thus, for a fair comparison, the users in a logical group should scale at the rate . With these scaling laws the optimality of should hold. Indeed, it can be shown that in a special case , while and , the lower and upper bounds both equal w.p.1. Note that this value corresponds to scheduling a single user with the best short-term fading value, which equals as , in every slot.

## 5. Generalizations

Now, we discuss two important generalizations. First, we consider the system with multiple nonoverlapping bands. The required rate can be split over these bands. In Section 5.1, we discuss how the results in Section 4 can be generalized to this case. Second, we consider a case when the users need different delays. This is the case, when various types of applications are supported on a multiaccess channel, or when the multiaccess channel serves as an intermediate hop on the multiple hops traveled by the application in the network. In Section 5.2, we discuss how OSP can support this.

### 5.1. Multiband Multiaccess Channel

We consider multiaccess channel with bands. We assume that the fading on these bands is statistically independent. Let denote the short-term fading for user on subband. Now, it is not immediately clear how the required rate should be split on the various bands in order to minimize the sum energy. But, fortunately, it has been shown that to minimize the sum energy required to realize a given rate vector on the multiband multiaccess channel, the total rate for a user should be supported on its best channel [7]. Let . Thus, has to be defined in terms instead of ; that is, selects all the users with and provides the required rate on the best channel for every user. Now, Theorem 4.1 and Corollary 4.2 hold with . In Theorem 4.5, the energy efficiency becomes

where denote the fading distribution of user who is placed uniformly at random in a cell given that . The additional factor of appears because only fraction of scheduled user transmit on a given band. Finally, Theorem 4.6 and Corollary 4.8 hold with replaced by .

### 5.2. Delay Differentiation

The users are divided into classes based on their delay requirements. Let represent the fraction of users that want delays respectively. Let be the largest real number that satisfies for every . Now, OSP can use instead of for users of class . Clearly, Theorem 4.1 and Corollary 4.2 hold with for every . Moreover, energy efficiency of each class can be computed along the similar lines as the proof of Theorem 4.5. Now, the energy efficiency for the system is the weighted sum (with respect to 's) of the energy efficiency of each class. Finally, Theorem 4.6 and Corollary 4.8 can be shown to hold for each class individually. Since, the system energy efficiency is the convex combination of the energy efficiencies of the classes, Theorem 4.6 and Corollary 4.8 follow for the whole system.

## 6. Numerical Examples

We consider an example system where users are placed uniformly at random in a cell except for a forbidden region with radius around the access point. The path loss exponent is two ( ). All users experience short-term fading with exponential energy distribution with mean one on each of the ten ( ) independently fading bands. The explicit mathematical formulations for the channel models can be found in Appendix . The path loss model is normalized to unity at cell edge, so that the results should be normalized with a corresponding factor. This, however, has no effect on the relative numerical results, nor on the delay-energy tradeoff we report.

Figure 3 indicates that the system energy efficiency deviates from asymptotic behavior at high spectral efficiency and with a small number of users. This behavior is due to the following. With a finite number of users, the transmitted rate is no longer deterministic as in the asymptotic case. Instead, the number of simultaneously scheduled users and their buffer lengths vary from slot to slot. This results in energy loss due to the convexity of the exponential rate-energy function in (4). Since the rate-energy function has the spectral efficiency as a multiplicative factor in the exponential, the loss is greater at high spectral efficiency.

## 7. Conclusions

We showed that by opportunistically choosing a suitable fraction of users with the best channels in each slot, we can improve the energy efficiency of the system while providing the required delay to each user. Since the policy empties the scheduled users' queues, it has good stability properties. We showed that the expected user delay is inversely proportional to the scheduling fraction. Delay can then be adjusted simply by choosing an appropriate opportunism threshold, while delay differentiation can be achieved by applying different thresholds for different delay classes. Moreover, if the application does not need any delay guarantees, then OSP can achieve any required energy efficiency ( ) while maintaining system stability. The scheme performs well compared to PFS, while providing rate guarantees.

## Appendices

### A. Proof of Lemma 4.3

Proof.

If lies below the support of the result trivially holds as both sides of (A.1) are equal to zero. Hence, we consider in the following.

Note that as for every and and then the first limit converges to , the second to and the last one to . The final relation (A.3) follows as fading and arrivals are independent.

Now, we claim that the channel gains 's for the chosen users can be viewed as i.i.d. variables. Note that if had scheduled users based on rather than on , then for the chosen users would not be i.i.d. as the users that are nearer to the receiver are likely to be favored. Since 's are i.i.d. irrespective of the distance between the user and receiver, the scheduling decision can be viewed as scheduling each user independently w.p. . Since the users are placed at random, is a deterministic function of distance, and and are independent, we conclude that 's for the chosen users are i.i.d. and each is distributed as . Finally, (11) follows from (A.3) using the Glivenko-Cantelli Theorem [30].

### B. Proof of Lemma 4.4

Proof.

For simplicity, we prove the required when has finite support, say . Let denote last time before user was scheduled, that is, . Moreover, let for each user . Note that is i.i.d. sequence and for every .

Now, the result follows by Borel-Cantelli Theorem [31] as was arbitrary.

### C. Proof of Lemma 4.7

Proof.

The proof is by construction. We construct a sequence of rate vectors such that and . Let denote the energy allocation to realize . Then, we show that is a nonincreasing function of , and thus proving the required. The recursive procedure to construct is as follows.

Initialize: .

STEP :

C1. for every ,

C2. ,

C3. .

Note that (C.1) holds for as by initialization. Now, let (C.1) hold for every . We show (C.1) for .

This proves (C.1) for every .

The last inequality follows as and by suppositions in the lemma.

This proves the required.

### D. Channel Statistics

Channel state is assumed to remain constant during one transmission slot and assume a new value for each slot independently for all slots and users. We, thus, avoid the dependence on users and time in the following.

Users are placed uniformly on a circular cell. The channel state of each user is the product of two independent ergodic random processes, path loss and short-term fading. Path loss is polynomially dependent on the distance of the user from the access point and is assumed to remain constant for a users across transmission slots. The distance dependency is parametrized by the path loss exponent , usually ranging within the interval [2, 4]. To avoid a singularity for users next to the access point, a forbidden circular region of radius is created around the access point. This model results in the following cumulative distribution of the path loss:

Note that the model is normalized to provide unit path loss at cell border. Thus, the results reported here must be rescaled in terms of by a factor of , where denotes the actual radius of the cell. Naturally, since all results behave accordingly, all comparisons remain valid.

The short-term fading process on each band is modeled by a zero-mean Gaussian circularly symmetric random variable (i.e., Rayleigh fading), with an exponentially distributed squared envelope. It assumes a new value for each user in each slot. The multiple bands are assumed independently fading. In each slot, those users whose maximum channel gain (over all channels) are scheduled by OSP on each band, and the cumulative short-term fading distribution is given by

where . With some algebra, the cumulative distribution for the (product) channel can be expressed as

### E. Proportional Fair Scheduling

We follow the approach of [7] in the evaluation. The average spectral efficiency of the system with PFS is given implicitly by [7]

where denotes the distribution of the product of the random path loss and the maximum of users' short-term fading coefficients, , and is given by

which is identical to (D.3) when , and .

## Declarations

### Acknowledgments

The work of P. Chaporkar was supported by ERCIM Fellowship and the work of K. Kansanen and R. R. Müller by the Research Council of Norway (NFR) under the NORDITE/VERDIKT programme (NFR Contract no. 172177). The authors wish to acknowledge Mr. Majid Butt for providing part of the numerical results. Parts of this paper were presented in The 3rd workshop on Resource Allocation in Wireless Networks (RAWNET 2007), April 16th, Limassol, Cyprus.

## Authors’ Affiliations

## References

- Tse DNC, Hanly SV: Multiaccess fading channels-part I: polymatroid structure, optimal resource allocation and throughput capacities.
*IEEE Transactions on Information Theory*1998, 44(7):2796-2815. 10.1109/18.737513MathSciNetView ArticleMATHGoogle Scholar - Hanly SV, Tse DNC: Multiaccess fading channels-part II: delay-limited capacities.
*IEEE Transactions on Information Theory*1998, 44(7):2816-2831. 10.1109/18.737514MathSciNetView ArticleMATHGoogle Scholar - Bender P, Black P, Grob M, Padovani R, Sindhushayana N, Viterbi A: CDMA/HDR: a bandwidth-efficient high-speed wireless data service for nomadic users.
*IEEE Communications Magazine*2000, 38(7):70-77. 10.1109/35.852034View ArticleGoogle Scholar - Tse DNC: Multiuser diversity through proportional fair scheduling.
*Proceedings of the Communication Theory Workshop (CTW '01), May 2001*Google Scholar - Jorswieck EA, Sezgin A, Zhang X: Throughput versus fairness: channel-aware scheduling in multiple antenna downlink.
*EURASIP Journal on Wireless Communications and Networking*2009, 2009:-13.Google Scholar - Viswanath P, Tse DNC, Laroia R: Opportunistic beamforming using dumb antennas.
*IEEE Transactions on Information Theory*2002, 48(6):1277-1294. 10.1109/TIT.2002.1003822MathSciNetView ArticleMATHGoogle Scholar - Caire G, Müller RR, Knopp R: Hard fairness versus proportional fairness in wireless communications: the single-cell case.
*IEEE Transactions on Information Theory*2007, 53(4):1366-1385.View ArticleMathSciNetMATHGoogle Scholar - Klein TE, Leung KK, Zheng H: Improved TCP performance in wireless IP networks through enhanced opportunistic scheduling algorithms.
*Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '04), November 2004, Dallas, Tex, USA*5: 2744-2748.View ArticleGoogle Scholar - Khojastepour MA, Sabharwal A: Delay-constrained scheduling: power efficiency, filter design, and bounds.
*Proceedings of the 23rd Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '04), March 2004, Hong Kong*3: 1938-1949.Google Scholar - Zafer MA, Modiano E: A calculus approach to minimum energy transmission policies with quality of service guarantees.
*Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM '05), March 2005, Miami, Fla, USA*1: 548-559.View ArticleGoogle Scholar - Caire G, Taricco G, Biglieri E: Optimum power control over fading channels.
*IEEE Transactions on Information Theory*1999, 45(5):1468-1489. 10.1109/18.771147MathSciNetView ArticleMATHGoogle Scholar - Uysal-Biyikoglu E, El Gamal A: On adaptive transmission for energy efficiency in wireless data networks.
*IEEE Transactions on Information Theory*2004, 50(12):3081-3094. 10.1109/TIT.2004.838355MathSciNetView ArticleMATHGoogle Scholar - Chen W, Neely MJ, Mitra U: Energy efficient scheduling with individual packet delay constraints: offline and online results.
*Proceedings of the 26th IEEE International Conference on Computer Communications (INFOCOM '07), May 2007, Anchorage, Alaska, USA*1136-1144.Google Scholar - Chen W, Mitra U, Neely MJ: Energy-efficient scheduling with individual delay constraints over a fading channel.
*Proceedings of the 5th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt '07), April 2007*1-10.Google Scholar - Cheng R, Verdú S: Gaussian multi-access channel with ISI: capacity region and multi-user waterfilling.
*IEEE Transactions on Information Theory*1993, 39: 773-785. 10.1109/18.256487View ArticleGoogle Scholar - Yu W, Rhee W, Boyd S, Cioffi JM: Iterative water-filling for Gaussian vector multiple-access channels.
*IEEE Transactions on Information Theory*2004, 50(1):145-152. 10.1109/TIT.2003.821988MathSciNetView ArticleMATHGoogle Scholar - Oh J, Kim S-J, Cioffi JM: Optimum power allocation and control for OFDM in multiple access channels.
*Proceedings of the IEEE Vehicular Technology Conference (VTC '04), 2004, Los Angeles, Calif, USA*60: 774-778.Google Scholar - Michel T, Wunder G: Solution to the sum power minimization problem under given rate requirements for the OFDM multipleaccess channel.
*Proceedings of the Annual Allerton Conference on Communications, Control and Computing, September 2004*Google Scholar - Yu DD, Cioffi JM: Iterative water-filling for optimal resource allocation in OFDM multiple-access and broadcast channels.
*Proceedings of the IEEE Global Telecommunications Conference (GLOBECOM '06), November-December 2006*1-5.Google Scholar - Berry RA, Gallager RG: Communication over fading channels with delay constraints.
*IEEE Transactions on Information Theory*2002, 48(5):1135-1149. 10.1109/18.995554MathSciNetView ArticleMATHGoogle Scholar - Goyal M, Kumar A, Sharma V: Power constrained and delay optimal policies for scheduling transmission over a fading channel.
*Proceedings of the 22nd Annual Joint Conference on the IEEE Computer and Communications Societies (INFOCOM '03), March-April 2003, San Francisco, Calif, USA*1: 311-320.Google Scholar - Neely MJ: Optimal energy and delay tradeoffs for multi-user wireless downlinks.
*Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM'06), April 2006, Barcelona, Spain*1-13.Google Scholar - Chaporkar P, Sarkar S: Stable scheduling policies for maximizing throughput in generalized constrained queueing systems.
*Proceedings of the 25th IEEE International Conference on Computer Communications (INFOCOM '06), April 2006, Barcelona, Spain*1-13.Google Scholar - Neely M: Energy optimal control for time varying wireless networks.
*Proceedings of the Proceedings of the 24th Annual Joint Conference of the IEEE Computer and Communications Societies (INFOCOM'05), March 2005, Miami, Fla, USA*Google Scholar - Stolyar AL: Maximizing queueing network utility subject to stability: greedy primal-dual algorithm.
*Queueing Systems*2005, 50(4):401-457. 10.1007/s11134-005-1450-0MathSciNetView ArticleMATHGoogle Scholar - Chaporkar P, Kansanen K, Müller RR: Power optimal scheduling for guaranteed throughput in multi-access fading channels.
*Proceedings of the IEEE International Symposium on Information Theory (ISIT '07), June 2007, Nice, France*2961-2965.Google Scholar - Jindal N, Vishwanath S, Goldsmith A: On the duality of Gaussian multiple-access and broadcast channels.
*IEEE Transactions on Information Theory*2004, 50(5):768-783. 10.1109/TIT.2004.826646MathSciNetView ArticleMATHGoogle Scholar - Biglieri E, Proakis J, Shamai S: Fading channels: information-theoretic and communications aspects.
*IEEE Transactions on Information Theory*1998, 44(6):2619-2692. 10.1109/18.720551MathSciNetView ArticleMATHGoogle Scholar - Cover TM, Thomas JA:
*Elements of Information Theory*. 2nd edition. John Wiley & Sons, New York, NY, USA; 2006.MATHGoogle Scholar - Shorak G, Wellner J:
*Empirical Processes with Applications to Statistics*. John Wiley & Sons, New York, NY, USA; 1986.Google Scholar - Feller W:
*An Introduction to Probability Theory and Its Application*. John Wiley & Sons, New York, NY, USA; 1961.Google Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.