- Research Article
- Open Access
- Published:

# Analysis of the Tradeoff between Delay and Source Rate in Multiuser Wireless Systems

*EURASIP Journal on Wireless Communications and Networking*
**volume 2010**, Article number: 726750 (2010)

## Abstract

This work addresses the limits on the information that can be transmitted over the wireless channel under the conditions stated by the MAC layer: a selected scheduling discipline and an ensured level of QoS. Based on the effective bandwidth theory, the joint influence of the channel fading, the data outsourcing process, and the scheduling discipline in the QoS metrics are studied. We obtain a closed-form expression of the vector of attainable users' rates for several scheduling algorithms, representing the maximum constant rate that the uth user can transmit under the selected discipline and fulfilling a target Bit Error Rate (BER) and the delay constraint given by the pair , where is the target delay and is the probability of exceeding .

## 1. Introduction

Providing Quality of Service (QoS) guarantees to different applications is an important issue in the design of next generation of high-speed networks. The QoS metrics of interest are likely to vary from one application to another, but are predicted to include measures such as throughput, Bit Error Rate (BER), and delay. Unlike traditional data communication, where system performance is largely measured in terms of the average overall throughput and loss rate, real-time communications may require QoS metrics expressed in terms of the mean delay or its variance (jitter).

Traditional networking approaches design separately, the physical and the medium access layer (MAC). Instead, in future wireless networks the physical knowledge of the wireless medium is shared with higher layers on a cross-layer basis [1], an increasingly important topic for the evolving wireless build-out.

User multiplexing for QoS guarantees is an active research topic [2] in wireless systems, under different names such as, subcarrier and slot allocation, resource allocation or scheduling. Exploiting both the source diversity and the variations in channel conditions can increase the system throughput. A scheduling scheme ideally should be able not only to handle the uncertainty of the channel but also to exploit it, that is, opportunistically serve users with good channels. Using such an approach leads to a system capacity that increases with the number of users (multiuser diversity) [3].

Many questions regarding the performance of most used opportunistic algorithms are still open. For example, very few works consider the delay or study the treatment given to each user [4, 5]. The main difficulty in obtaining analytical results comes from the fact that the classical queueing theory is no longer suitable. Moreover, the result is linked to the scheduling discipline and the analysis has to be done algorithm by algorithm. To the best of our knowledge, the papers with analytical results found in the literature either use simple channel models [6, 7] or only provide bounds on the QoS metrics [8, 9].

Within this context, we explore the limits on the information that can be transmitted over the wireless channel under the conditions stated by the MAC layer: an ensured level of QoS and a selected scheduling discipline. In particular, both the channel fading and the scheduling algorithm determine the maximum source rate to be transmitted under some statistical QoS guarantees.

In single user systems, ergodic capacity [10] is not a suitable information-theoretic measure for delay sensitive applications over fading channels. On the other hand, delay-limited capacity becomes zero for Rayleigh channels. In this case, its probabilistic version, the Capacity with Probabilistic Delay Constraint, becomes useful [11]. Then, rather than ensuring a deterministic delay, a probabilistic delay constraint is defined as the pair , where is the target delay and is the probability of exceeding it.

On the other hand, in multiuser communications the capacity of the channel is no longer fully characterized by a single number. Instead, the capacity should be redefined to consider each user's data rate separately. Thus, in a system with users, the capacity should take the form of a dimensional vector representing rates allocated to the users [12]. A capacity region is then defined as the set of all dimensional rate vectors that are achievable in the channel. Furthermore, when a QoS constraint is imposed (in the form of a probabilistic delay constraint), the data rate attainable by each user will be closely linked to the scheduling strategy.

In this paper, we obtain a closed-form expression of the vector of users' data rates for several scheduling algorithms, representing the maximum constant rate that the th user can transmit under the selected discipline and fulfilling a target BER and the delay constraint given by the pair . The total system capacity will be the sum of the individual users' rates, where each user can have a different delay constraint and can experience a different channel. The procedure to obtain these rates, based on the effective bandwidth theory [13], is similar to some previous results in a single-user system [11]. Three simple and widely employed disciplines have been analyzed: Round Robin [14], Best Channel [3], and Proportional Fair [15]. For simplicity, the results are obtained for a CBR (Constant Bit Rate) data source but they can be extended to any other traffic model as explained in [16].

The remainder of the paper is organized as follows. Section 2 describes the multiuser system model. Section 3 first details the derivation of the maximum users' rates subject to a delay constraint for an uncorrelated Rayleigh channel (Section 3.1). Later on, the expressions are particularized to Round Robin, Best Channel, and Proportional Fair disciplines in Sections 3.2, 3.3, and 3.4, respectively. The time-correlated channel is examined in Section 4, first of all the achievable rates (Section 4.1) and then the same three particularizations for the three examples of discipline (Sections 4.2, 4.3, and 4.4). The validation of the results by comparison with simulations is presented in Section 5. Finally, concluding remarks are given in Section 6.

## 2. Multiuser System Model

### 2.1. Queueing Model

Figure 1 illustrates the system model considered in this paper. The channel is shared among users, whose incoming traffics are characterized by source processes, respectively. Each user has its own queue where the data are stored before being transmitted. The server represents the information transmitted to the shared channel, which is decided at each instant by the scheduler. The instantaneous response of the wireless channel is, in general, a time-variant and autocorrelated random process.

Physical time is divided into units, hereinafter referred to as symbol periods, which represent the transmission discrete time unit, . The channel response of each user is assumed to be constant over the symbol. Moreover, the scheduler allocates the channel to users in a symbol per symbol basis: every new symbol, a user is selected for transmission.

It is assumed that the transmitter employs adaptive techniques, so that the transmission rate is modified dynamically, seeking to adapt to the time-varying conditions of the physical channel.

Each incoming user traffic has an instantaneous rate . On his side, the wireless channel transmits at an instantaneous rate , that is, every symbol , bits can be transmitted by the channel.

Each user has a potential rate , which represents the channel rate that he may use if the channel is assigned to him, and which depends on his channel conditions as explained in Section 2.2. Moreover, the instantaneous channel rate of user th, , is given by

Since the channel is shared among users, can be expressed as

Notice that in the sum above only one of the terms is nonzero, corresponding to the user allocated to the channel.

The effective bandwidth analysis of the queueing system is done by means of the processes and . The processes and are not necessarily white and represent the amount of bits per symbol generated by user and the amount of bits per symbol of the th user transmitted by the server, respectively. In addition, the accumulated source rate is the amount of bits generated by user from 0 to instant :

And similarly the accumulated channel process of th user is

The queue size is assumed to be infinite and denotes the length of the queue at time . The dynamics of the queueing system seen by user is characterized by the equation , with .

### 2.2. Channel Model

Every user experiences a flat Rayleigh channel with complex channel response . The envelope of the channel response is denoted by . Furthermore, users are independent among them, that is, the channel response seen by one user is independent from the rest.

Let us define as the instantaneous Signal-to-Noise Ratio of user at the receiver. With Additive White Gaussian Noise (AWGN), is exponentially distributed:

where is the average Signal-to-Noise Ratio of user .

Moreover, is proportional to the square of :

where is the average energy per symbol and is the noise power spectral density.

We consider constant transmitted power and a continuous rate policy. Then, the potential channel rate of user *u*, , is a function of :

where , under adaptive modulation, is a constant related to the target BER. Its value for uncoded QAM is [17] , where is the target BER. Further, the value represents the upper bound corresponding to the evaluation of the AWGN channel capacity (in Shannon's sense).

The variability of the channel over time is usually reflected through its autocorrelation function (ACF). This second-order statistic generally depends on the propagation geometry, the velocity of the mobile, and the antenna characteristics [18]. The autocorrelation function of the envelope of the channel response is denoted by . In Section 3, the channel response of each user is assumed to be uncorrelated, that is, is zero except for . Later, in Section 4, the time-correlation is considered. In particular, a very simple model of correlation is employed: the ACF is assumed to decay exponentially with a parameter :

The use of the exponential model simplifies and speeds up the simulations and numerical evaluations along this paper without altering the conclusions. Nevertheless, any other correlation function can be used (i.e., the classical Jakes' model [18]).

### 2.3. Effective Bandwidth Analysis

The asymptotic log-moment generating function of is defined as [13]

Since and are independent of each other, may be decomposed into two terms, , where and are the log-moment generating functions of the accumulated source process and the accumulated channel process of user , respectively.

If the source and channel processes are stationary and the steady state queue length exists, then the workload process satisfies a Large Deviation Principle and the following steady state solution for the queue length exceeding is satisfied [13]:

where means that and , known as the QoS exponent, is the solution to

Defining the effective bandwidth function (EBF) , the equation to obtain can be expressed as

where and are the effective bandwidth functions of the source process and the channel process for the th user, respectively.

Let be the probability that the queue of user is not empty, . By the inclusion of this term in the analysis, the following less conservative approximation for the tail probability of the queue is satisfied:

The delay of the bits leaving the queue of user at symbol is denoted as . For simplicity, assume that the source traffic from the th user arrives to the buffer at a constant rate:

It leads to a constant EBF for the following source process [19]:

The procedure to generalize the results to other traffic sources can be found in [16].

As in the queue length process, the steady state solution for the delay process exists. In addition, for constant sources the delay at the queue of user can be calculated:

Thus, the probability of exceeding , denoted throughout this paper as target delay, can be written as follows [20]:

where the probability of exceeding the target delay is denoted by .

## 3. Uncorrelated Channel

We start the analysis of the multiuser system presented above with the case of users experiencing an uncorrelated Rayleigh channel (block fading model). Part of these results can be found in [21].

### 3.1. Achievable Users' Rates with a Delay Constraint

Starting from (16), the set of individual users' rates that accomplish a delay constraint can be calculated. Each user has his own delay constraint. The effective bandwidth of the channel is needed, .

With no time-correlation among samples, the accumulated transmission rate for the th user, , is simply the addition of uncorrelated and identically distributed random variables. As the Central Limit Theorem can be applied and can be considered a Gaussian random variable with average and variance , where and are the mean and the variance of , the instantaneous channel rate for the th user. Then, the effective bandwidth function for the resulting Gaussian distribution of is computed as [19]

In a high load scenario, the probability that the buffer is not empty approaches one, that is, . Under this assumption, the delay constraint is worked out from (16):

Assume that the uncorrelated channel has parameters and , then the QoS exponent is obtained by solving (11):

With (19) substituted into (18), the value of is worked out and it is the achievable user rate that we were seeking. It represents the maximum source rate that may be supported for user with a probability of exceeding a delay bound . We denote it by :

The delay constraint formed by the pair () can be different for each user. Nevertheless, we maintain the notation above for the sake of simplicity. Equation (20) shows explicitly the tradeoff between user source rate () and delay requirements (). It can be observed that for high values or , the QoS requirement relaxes and R approaches . On the other hand, as the target delay or become lower, the user has to transmit at a lower rate in order to guarantee its own delay constraint. Moreover, the influence of the scheduling algorithm and the channel conditions (SNR, target BER) are captured in the mean and the variance and . Thus, the evaluation of the user rates comes down to obtaining the mean and the variance of the channel process seen by user :

These statistics depend on the distribution of which in turn depends on the scheduling algorithm. Three scheduling disciplines will be detailed in next sections.

Finally, the total system capacity is obtained as the sum of the individual user rates, each of them with its own delay constraint:

with and being the vectors with the target delays and probabilities of violation of each user, respectively.

### 3.2. Round Robin

First of all, the mean and the variance to compute R under a Round Robin strategy are calculated.

Round Robin (RR) [14] is a fixed cyclic algorithm without priorities, which dispenses the channel equally among the different flows independently of their priorities or radio channel conditions. Transmission at symbol is assigned to the following user in a cyclic order and therefore,

It is known that this strategy does not work well over varying channels and a low efficiency in terms of system capacity and QoS differentiation is expected.

The mean and the variance of are required. With only one user () and continuous rate policy, the mean matches up with the ergodic capacity of the channel. We denote it for convenience

where is the exponential integral and is the average Signal-to-Noise Ratio of the single user.

Likewise, the expression of the variance with only one user is [11]

where is the Euler constant and is the hypergeometric function.

When users share the channel under an RR discipline, we only need to take into account that the channel is equally divided among users. Thus, the expressions of and are written directly as a function of and , by just replacing with the average Signal-to-Noise Ratio of each user and dividing by the number of users:

The expressions above make it possible to evaluate the individual users' rates in (20) under a Round Robin discipline.

An example is shown in Figure 2. Three users have been considered, with average SNR and dB, respectively. The individual rates R are plot as a function of the target delay . The other parameter, the violation probability , has been set to for all users. The parameter is set to (Hereinafter is set to in all the numerical evaluations.). The mean of each user is represented with solid line, whereas the dashed line is R. Both and R are plotted for each user (users marked with triangles, squares and circles). Moreover, the system capacity normalized with the number of users, which corresponds to the "average" rate, is represented with no marks and thicker line.

First of all, let us observe the common behaviour of R for all the user. As presumed, the curve increases with (the more relaxed the QoS requirements, the higher the maximum attainable rate). Obviously, R is always below . Moreover, values of the user rate equal to zero must be interpreted as QoS requirements that cannot be fulfilled with that channel conditions, number of users and discipline.

Observing the differences among users, those with better channel conditions obtain higher rates and can demand stringent QoS conditions, as it was expected. Thus, the best user in this example could fix a delay constraint with a target delay of symbols in contrast to the symbols of the worst user. On the other hand, if the same target delay is fixed for the three users the rate to be employed increases for *better* users (users with better channel conditions). For example, for symbols user can transmit bits/symbol, user , bits/symbol, and user , bits/symbol.

### 3.3. Best Channel

Best Channel (BC) [3] strategy is adaptive to the channel state, giving priority to those users with higher potential transmission rate. The channel is assigned to the user that may transmit with the highest number of bits per symbol

This algorithm maximizes the total system efficiency. However, under this strategy, good average SNR users get more average throughput than low SNR users.

Let us define

The CDF of can be written as

Since the users are i.i.d., it comes down to

Consider the following effective SNR for the th user [22]:

where is the maximum of the average SNR of all the users except .

The pdf of the effective SNR can be expressed as follows [22]:

where is the Dirac delta function, is the exponential pdf in (5), and is the CDF of :

with , denotes the all-ones -dimensional vector, is the set of all -dimensional vectors with entries taking values 0 of 1, that is, contains the binary words of length and is the th component of .

The mean to be computed for BC is

From (32) it can be observed that the first addend will be zero in the required expectation and only the second term needs to be integrated:

Substituting into the mean, it yields

This integral is analogous to the single user case by simply defining . The result is then

Likewise, the calculation of the variance is similar to the single user case, obtaining.

The same evaluation example presented for RR is shown in Figure 3, now for BC allocation.

The differences among users are much more noticeable than for RR. Thus, the best user is better off with the change to BC allocation at the expenses of users with lower average SNR. Notice that not only the differences in the mean are remarkable (the asymptotic behaviour when relaxing the QoS constraint) but also the minimum target delays of each user move away. For example, the worst user cannot demand a target delay below symbols for these channel conditions and scheduling, in contrast to the symbols of the best user. As expected, the average rate is higher than for RR, since this algorithm maximizes the total system efficiency.

It is wellknown that by exploiting the multiuser diversity one can achieve higher system capacity as the number of users increases. This multiuser diversity gain is illustrated in Figure 4. Lognormal shadowing is considered, so that the average SNR of users follows a lognormal distribution, with average dB and standard deviation dB. The violation probability is for all users. The maximum achievable rate of the median user is plot, for , , and users. It can be observed that as the number of users increases, the maximum achievable rate of the median user increases, due to multiuser diversity.

### 3.4. Proportional Fair

Proportional Fair (PF) [15] is a compromise-based scheduling algorithm. It is intended to improve Best Channel by maintaining a balance between two competing interests: maximizing the total wireless network throughput while allowing a minimum level of service to all users. Fair sharing will lower the total throughput over the maximum possible, but it will provide more acceptable levels to users with poorer SNR. Instead of using the instantaneous potential transmission rate of BC, PF uses as metrics the ratio :

Therefore, we just need to do a change of variable in the previous results for BC. Let us define :

Now the effective SNR for the th user is

And the second term of the pdf of is expressed:

with the all-ones -dimensional vector.

The result for the mean is analogous to that of BC:

Likewise, the calculation of the variance yields

In Figure 5, the maximum achievable users' rates are evaluated under the same conditions as it was done for RR and BC. The three users have average SNR , and dB and the violation probability is set to .

It can be observed that the differences among users reduce if we compare with the BC strategy. That is exactly the goal of this discipline: to maintain a balance between the total throughput and the level of service of all users. Obviously, the average rate reduces to increase the fairness. The achieved fairness is specially noticeable in the behaviour of the target delay, which is symbols for the three users.

## 4. Correlated Channel

In this section, a time-correlated channel is considered, meaning that the channel response of each user follows the exponential ACF described in (8).

### 4.1. Achievable Users' Rates with a Delay Constraint

To face the new problem, we split the accumulated transmission rate for the th user, , into blocks of length symbols:

The channel correlation among the elements in the block is considered but, with the proper selection of the block's length, large enough, independence among blocks may be assumed. The choice of will be closely related to the correlation of the channel. If the channel is strongly correlated, longer blocks have to be defined in order to assume independent blocks. Whatever the value of is, there is a residual value of correlation between the last elements of one block and the first elements of next one. Nevertheless, this *border* correlation is negligible when the value of is large enough. Notice that a decreasing autocorrelation function is required, as it is the case in fading channels.

Under these conditions (sufficiently long and ), is the sum of a sufficiently large number of independent random variables, and the Central Limit Theorem can be applied. Thus, approximates a Gaussian random variable with average and variance , where and are the mean and the variance of a block of size of the th user.

On the other hand, the Lilliefors test [23] is used in statistics to test whether an observed sample distribution is consistent with normality. In the numerical results and simulations conducted throughout this paper, the validity of the Gaussian approximation for has been validated by testing for normality with the Lilliefors test for the selected values of and .

The effective bandwidth function of the Gaussian distribution of yields

And the achievable rate of th user is

Let us examine first the single user system, since this result will be needed later. With only one user () and continuous rate policy, the mean and variance of the blocks, denoted as and , are calculated as follows.

In the case of the mean, it is straightforward that

For the variance, it can be written in terms of the autocovariance [24]:

The bivariate probability density function for Rayleigh distributed variables is needed. It can be expressed as follows in terms of the instantaneous SNR [25]:

where is the modified Bessel function of the first kind and is the value of the ACF of the envelope for a time lag . The expectation to be evaluated is

After some manipulations the autocovariance yields

where = / and the integral has the following form:

with the digamma function.

### 4.2. Round Robin

When users share the channel under an RR discipline, the channel is equally divided among users. Like in the uncorrelated channel, the expressions of and are written directly as a function of and , by just replacing with , with and dividing by the number of users:

The evaluation of RR in a correlated channel is presented in Figure 6. There are three users with average SNR and dB, the parameter is set to and is for the three users. The correlation follows an exponential decay and two values of are evaluated, and . The previous result of the uncorrelated channel is also shown with black line. The qualitative behaviour is the same as in the uncorrelated channel. The influence of the parameter is remarkable: as expected, the correlation is harmful to the delay performance, so that when the correlation increases ( increases), the achievable users' rates decrease. Moreover, it is observed that the differences among users increase with the time-correlation.

### 4.3. Best Channel

Similarly as done in RR, the calculation of the maximum attainable rates in the case of Best Channel strategy leads to the computation of the variance of the blocks (the evaluation of the mean of the blocks is straightforward), which comes down to the computation of the expectation .

The joint pdf and CDF of two correlated Rayleigh variates are needed. We have the expressions in terms of the envelope of the channel response . For normalized power, the pfd is given by [25] (page 142, equation 6.2.):

where is the modified Bessel function of th order.

And the CDF of the envelope of the channel is [25] (page 143, (6.5))

with being the Marcum Q function.

Let the effective envelope of the th user be

where .

This random variable, equivalent to the effective SNR defined in the uncorrelated channel, indicates the fact that the user only gets the channel if his instantaneous SNR is the highest among all the users. In contrast to the uncorrelated channel, we include the time through the subindex since it is needed to calculate the expectation evaluated in two different symbols.

Consider the following vector of decision:

Notice that to calculate the expectation only the last case is needed, as the other three options will result in zero in the evaluation of . Therefore, only the case in which the channel is assigned to user in both symbols and is required. The joint pdf is

where is the pdf in (55) and the CDF:

with the CDF in (56).

Gathering together the previous expressions, the expectation to be calculated is

The evaluation of the users' rates is presented in Figure 7 for the same conditions as in RR. In this case, it is not straightforward to evaluate the variance in (61). Thus, it has been obtained by simulation methods. A long trace of the instantaneous transmission rate process is generated and the sample variance is got from it. The qualitative behaviour already observed in the uncorrelated channel is highlighted here: the differences among users increase significantly with the time correlation of the channel.

### 4.4. Proportional Fair

The calculation of the variance in the PF discipline is very similar to the BC algorithm. The effective envelope of the th user yields

Now the vector of decision simplifies

Like in the BC discipline, only the joint pdf of the last case is needed, as the other three options will result in zero in the expression of . This joint pdf is

where is the pdf in (55) and the CDF is

where is the CDF in (56).

Finally, the expression of the expectation is

Figure 8 shows the evaluation of the users' rates for a PF discipline and with the same parameters defined before. In the uncorrelated channel, the algorithm was able to equal the users in terms of minimum target delay. When the time-correlation of the channel comes on, the algorithm cannot maintain the fairness anymore and differences among users can be observed. Like in the other two algorithms, the minimum target delay that each user can demand is related to the quality of his channel. In spite of not maintaining the fairness among users anymore, it is still the fairest of them all.

## 5. Simulation Comparison

The analytical results presented in Sections 3 and 4 are validated by comparison with simulations. In particular, the queueing system in Figure 1 is simulated. Each user sends bits to its buffer of queue length in the th symbol. The selected user depends on the scheduling algorithm: Round Robin, Best Channel, or Proportional Fair. , and are fixed (the same for all the users, for simplicity) and the users' rates are evaluated with (20). Then, the the arrival process of each user generates source data at the (constant) rate R. The simulation is run and the tail probability of exceeding the target delay is measured based on the measurements of the delay suffered by bits leaving the queue. Notice that the expected value of this tail probability, , is .

### 5.1. Uncorrelated Channel

The simulation of the uncorrelated channel is shown in Figure 9. users with average SNR's and 12 dB are simulated. . A target delay of symbols is set. The probability of exceeding the target delay, , has been set to (RR), (BC), and (PF). is measured and compared to the analytical .

The results show that the QoS requirements are accurately reached with the result for R in (20). The users' rates were obtained under the assumption that , a high load scenario that constitutes an upper bound. It has been checked in the simulations that the measured probability of a nonempty queue is very close to one in our simulations.

### 5.2. Correlated Channel

Finally, a time-correlated channel has been simulated under the same conditions of the uncorrelated channel. The only difference is that the target delay is now symbols and the correlation parameter is . Figure 10 plots the results.

The conclusions from the uncorrelated channel apply also here: the simulation results are satisfactory, approaching accurately the analytical results.

## 6. Conclusions

In this paper, we have obtained analytical expressions of the achievable users' rates in a wireless system under the conditions stated by the MAC layer: a selected scheduling discipline and a QoS constraint given in terms of a delay constraint and a BER. The delay constraint consists of a target delay and the probability of exceeding it, . Three simple and widely employed disciplines have been analyzed: Round Robin, Best Channel and Proportional Fair. The method to calculate these rates is based on the effective bandwidth theory. The analysis is done first for an uncorrelated channel and later for a time-correlated channel. The evaluation of the individual rates and the total capacity confirms the expected qualitative behaviour of the three algorithms. It is also observed that the correlation is harmful for the delay, as expected, and the maximum achievable rates decrease as the correlation increases. Moreover, the differences among users become more noticeable for more correlated channels. Finally, simulations of the algorithms were conducted to validate our outcomes.

## References

Shakkottai S, Rappaport TS, Karlsson PC: Cross-layer design for wireless networks.

*IEEE Communications Magazine*2003, 41(10):74-80. 10.1109/MCOM.2003.1235598Chen S, Cobb J: Wireless quality-of-service support.

*Wireless Networks*2006, 12(4):409-410.Knopp R, Humblet PA: Information capacity and power control in single-cell multiuser communications.

*Proceedings of the IEEE International Conference on Communications (ICC '95), June 1995, Seattle, Wash, USA*1: 331-335.Berry RA, Gallager RG: Communication over fading channels with delay constraints.

*IEEE Transactions on Information Theory*2002, 48(5):1135-1149. 10.1109/18.995554Entrambasaguas JT, Aguayo-Torres MC, Gómez G, Paris JF: Multiuser capacity and fairness evaluation of channel/QoS-aware multiplexing algorithms.

*IEEE Network*2007, 21(3):24-30.Ying L, Srikant R, Eryilmaz A, Dullerud GE: A large deviations analysis of scheduling in wireless networks.

*IEEE Transactions on Information Theory*2006, 52(11):5088-5098.Neely MJ: Delay analysis for max weight opportunistic scheduling in wireless systems.

*IEEE Transactions on Automatic Control*2009, 54(9):2137-2150.Neely MJ, Modiano E, Rohrs CE: Power allocation and routing in multibeam satellites with time-varying channels.

*IEEE/ACM Transactions on Networking*2003, 11(1):138-152. 10.1109/TNET.2002.808401Georgiadis L, Neely MJ, Tassiulas L: Resource allocation and cross-layer control in wireless networks.

*Foundations and Trends in Networking*2006, 1(1):1-149. 10.1561/1700000002Biglieri E, Proakis J, Shamai S: Fading channels: information-theoretic and communications aspects.

*IEEE Transactions on Information Theory*1998, 44(6):2619-2692. 10.1109/18.720551Soret B, Aguayo-Torres M, Entrambasaguas J: Capacity with explicit delay guarantees for generic sources over correlated rayleigh channel.

*IEEE Transactions on Wireless Communications*2010, 9(6):1901-1911.Cover TM, Thomas JA:

*Elements of Information Theory, Wiley Series in Telecommunications*. 1st edition. 1991.Chang C, Thomas JA: Effective bandwidth in high-speed digital networks.

*IEEE Journal on Selected Areas in Communications*1995, 13(6):1091-1099. 10.1109/49.400664Hanssen MR: Opportunistic scheduling in wireless networks. In

*Term Project Report*. Department of Electronics and Telecommunications, NTNU; December 2004.Shakkottai S, Stolyar AL: Scheduling algorithms for a mixture of real-time and non-real-time data in HDR.

*Proceedings of the 17th International Teletraffic Congress (ITC '17), September 2001, Salvador da Bahia, Brazil*Soret B, Aguayo-Torres MC, Entrambasaguas JT: Capacity with probabilistic delay constraint for voice traffic in a Rayleigh channel.

*Proceedings of the IEEE International Conference on Communications (ICC '09), June 2009*Chung ST, Goldsmith AJ: Degrees of freedom in adaptive modulation: a unified view.

*IEEE Transactions on Communications*2001, 49(9):1561-1571. 10.1109/26.950343Rappaport TS:

*Wireless Communications: Principles and Practice*. Prentice-Hall, New-Delhi, India; 2002.Kelly FP: Notes on effective bandwidth. In

*Stochastic Networks: Theory and Applications*Edited by: Kelly FP, Zachary S, Zeidins I. 1996, 4: 141-168.Wu D:

*Providing quality of service guarantees in wireless networks, Ph.D. thesis*. Department of Electrical and Computer Engineering, Carnegie Mellon University; August 2003.Soret B, Aguayo-Torres MC, Entrambasaguas JT: Multiuser capacity for heterogeneous QoS constraints in uncorrelated Rayleigh channels.

*Proceedings of the Information Theory Workshop (ITW '09), October 2009*Pérez J, Ibáñez J, Santamaría I: Exact closed-form expressions for the sum capacity and individual users' rates in broadcast ergodic Rayleigh fading channels.

*Proceedings of the 8th IEEE Signal Processing Advances in Wireless Communications (SPAWC '07), June 2007*Sheskin DJ:

*Handbook of Parametric and Non-Parametric Statistical Procedures*. 3rd edition. Chapman and Hall/CRC Statistics; 2004.Papoulis A, Pillai SU:

*Probability, Random Variables and Stochastic Processes*. 4th edition. McGraw-Hill, New York, NY, USA; 2002.Simon MK, Alouini MS:

*Digital Communications over Fading Channels*. 2nd edition. Wiley Interscience, New York, NY, USA; 2005.

## Acknowledgments

This work has been partially supported by the Spanish Government and the European Union (Project TEC2007-67289) and the Andalusian Government (Project TIC-03226).

## Author information

### Authors and Affiliations

### Corresponding author

## Rights and permissions

**Open Access** This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

## About this article

### Cite this article

Soret, B., Aguayo Torres, M. & Entrambasaguas, J. Analysis of the Tradeoff between Delay and Source Rate in Multiuser Wireless Systems.
*J Wireless Com Network* **2010**, 726750 (2010). https://doi.org/10.1155/2010/726750

Received:

Revised:

Accepted:

Published:

DOI: https://doi.org/10.1155/2010/726750

### Keywords

- Round Robin
- Delay Constraint
- Multiuser Diversity
- Violation Probability
- Target Delay