 Research
 Open Access
 Published:
Energyefficient power control for contentionbased synchronization in OFDMA systems with discrete powers and limited feedback
EURASIP Journal on Wireless Communications and Networking volume 2013, Article number: 192 (2013)
Abstract
This work derives a distributed and iterative algorithm by which mobile terminals can selfishly control their transmit powers during the synchronization procedure specified by the IEEE 802.16 m and the 3GPP longterm evolution standards for orthogonal frequencydivision multipleaccess technologies. The proposed solution aims at maximizing the energy efficiency of the network and is derived on the basis of a finite noncooperative game in which the players have discrete action sets of transmit powers. The set of Nash equilibria of the game is investigated, and a distributed power control algorithm is proposed to achieve synchronization in an energyefficient manner under the assumption that the feedback from the base station is limited. Numerical results show that the proposed solution improves the energy efficiency as well as the timing estimation accuracy of the network compared to existing alternatives while requiring a reasonable amount of information to be exchanged on the return channel.
1 Introduction
The issue of energy efficiency has attracted considerable interest in the information and telecommunication technology community during the last decade, as witnessed by the extensive literature available on this subject (see, for example, [1] and references therein). Among others, a challenge that lies in this paradigm is to prolong the battery life of mobile terminals based on orthogonal frequencydivision multipleaccess (OFDMA) technologies such as those operating according to the IEEE 802.16 m [2] and the 3GPP longterm evolution (LTE) [3] standards. The first operation that must be accomplished by any terminal when joining the network is achieving correct synchronization with its serving base station (BS). This procedure is called initial ranging in IEEE 802.16 m [2] and random access in LTE [3]. It relies on a contentionbased approach taking place over a specified set of subcarriers, which are used by each terminal to notify its entry request by transmitting a packet consisting of a randomly chosen code. Code identification as well as multiuser timing estimation are the main tasks of the BS during this procedure. These problems have received significant attention in the past few years, and some solutions are currently available in the literature (see, for example, [4][7] and references therein). All the aforementioned works assume to increase the transmit power upon successful synchronization without taking into account any energy efficiency issue. This is motivated by the fact that the energy efficiency problem in OFDMAbased technologies has been mainly analyzed for the data transmission phase (see [8] and [9] and references therein). A first attempt to reduce the power consumption during the initial synchronization phase can be found in [10], in which a lowcomplexity and iterative algorithm is proposed to allow each synchronization terminal (ST) and the BS to locally choose the transmit power and the detection strategy, respectively. The goal is to obtain a good tradeoff between detection capabilities and power consumption while satisfying qualityofservice (QoS) requirements given in terms of timing estimation error and probability of false code lock. The proposed solution is based on a noncooperative gametheoretic formulation, and it is shown to provide significant gains in terms of reduced synchronization time and parameter estimation accuracy compared to existing alternatives based on a deterministic increase of the transmit power. Although interesting from a theoretical point of view, the analysis provided in [10] is not suited for practical applications since it relies on the assumption of a continuous set of transmit powers. Moreover, comparisons with existing alternatives are carried out assuming that STs have perfect knowledge of the signaltointerferenceplusnoise ratio (SINR) measured at the BS. A similar gametheoretic line of reasoning has been recently used for achieving synchronization in codedivision multipleaccess networks operating in a flatfading scenario [11, 12] and in a frequencyselective one [13].
Motivated by the above considerations, in this work we return to the problem discussed in [10] and extend both the power allocation approach and the numerical analysis as follows. We first assume that a finite set of transmit powers is available at each terminal. Compared to [10], this more applicationoriented assumption changes completely the nature of the energyefficient optimization problem, as the tool of finite noncooperative game theory is used to find its solution [14]. The set of Nash equilibria of the game is investigated and compared to that of the continuouspower noncooperative game discussed in [10]. The theoretical analysis of the finite game is adopted to derive an iterative and distributed power allocation algorithm for achieving synchronization under the assumption of a limited feedback from the BS. Numerical results are used to compare the performance of the proposed solution with that achieved by existing alternatives based on a deterministic increase of the transmit power (with and without contention resolution methods). It turns out that the proposed solution provides benefits in terms of energy efficiency and parameter estimation accuracy, using a reasonable amount of feedback resources.
The remainder of this paper is structured as follows.^{a} Section 2 describes the system model and introduces the problem. Section 3 formulates the game and investigates its equilibria. The analysis is used in Section 4 to derive an iterative and distributed synchronization algorithm whose performance is assessed by means of numerical results. Finally, Section 5 concludes the paper and discusses the applicability of this technique to current wireless standards.
2 System model and problem formulation
2.1 System model
We consider the uplink of an OFDMAbased system employing N subcarriers with index set {0,1,…,N  1}. To avoid aliasing problems, 2N_{ v } null subcarriers are placed at the spectrum edges. The remaining N  2N_{ v } subcarriers are grouped into synchronization subcarriers and data subcarriers. The former are used by the STs entering the network through a contentionbased synchronization procedure, while the latter are assigned to mobile terminals for data transmission and channel estimation. We denote by K the number of STs and assume that the synchronization subcarriers are divided into M subbands, each composed of a set of V adjacent subcarriers, which is called a tile. We denote by c_{ ℓ } = [c_{ ℓ } (0),c_{ ℓ } (1),…, c_{ ℓ } (M V  1)] the code chosen by the ℓ th ST and call θ_{ ℓ } the timing offset of the ℓ th ST (normalized to the sampling period T_{ s }).
As in [10], we consider a quasisynchronous system in which no interblock interference is present at the BS receiver, and we neglect any residual carrier frequency offset.^{b} Moreover, we assume that the channel frequency response is nearly flat over each tile and independent across tiles. In addition, users other than those performing synchronization have been successfully synchronized to the BS so that they do not generate significant interference. Under the above assumptions, the V  dimensional vector X(m) containing the m thtile discrete Fourier transform outputs at the BS can be written as
where p_{ ℓ } denotes the transmit power of the k th ST, C_{ ℓ } (m) = diag{c_{ ℓ } (m V),…,c_{ ℓ } (m V + V  1)}, the vector a(θ_{ ℓ }) is given by
and n(m) is the additive white Gaussian noise (AWGN) with zero mean and covariance matrix ${\sigma}_{n}^{2}{\mathbf{I}}_{V}$.
As mentioned above, the main tasks of the BS during the synchronization procedure are code detection and timing offset estimation. This is achieved by exploiting the observation vectors {X(m);m = 0,1,…,M  1}. Following [10], the k th code c_{ k } is declared as detected if the following generalized likelihood ratio test (GLRT) is satisfied:
where the threshold λ is a design parameter chosen so as to achieve a desired probability of false alarm ${\overline{\Pi}}_{\text{fa}}$, and $\Lambda \left({\widehat{\theta}}_{k}\right)$ is given by
In the above equation, ${\widehat{\theta}}_{k}$ is the maximum likelihood estimate of θ_{ k }, given by [10]
with $\overline{\theta}$ being the (normalized) round trip propagation delay for a user located at the cell boundary [15].
2.2 Problem formulation
Without loss of generality, we focus on the k th ST and rewrite the righthand side of (1) as
where
accounts for the contribution of the other STs plus thermal noise. To make the problem tractable, we model the channel frequency responses H_{ ℓ } (m) for m = 0,1,…,M  1 experienced by the ℓ th user across tiles as independent Gaussian random variables with zero means and powers H(m)^{2}. In these circumstances, the vector w_{ k } = [w_{ k } (0),w_{ k } (1),…,w_{ k } (M  1)]^{T} has zero mean and a variance given by
where ${\alpha}_{\ell}=1/M\sum _{m=0}^{M1}\left{H}_{\ell}\right(m){}^{2}$ is ST ℓ’s average channel power gain across the tiles. To proceed further, we let p = [p_{1},p_{2},…,p_{ K }]^{T} and denote by γ_{ k } the SINR of the k th ST over the observation vectors {X(m);m = 0,1,…,M  1}. Using (8), from (6) it easily follows that γ_{ k } takes the form [10]
where p_{∖k} = p ∖p_{ k } = [p_{1},…,p_{k1},p_{k+1},…,p_{ K }]^{T}, and ν_{ k }(p_{∖k}) is defined as
Following [10], the energyefficient optimization problem can be mathematically formalized for all STs $k\in \mathcal{K}=\{1,\dots ,K\}$ as
where ${\mathcal{P}}_{k}$ denotes the set of transmit powers and T is the duration of the cyclically extended OFDMA block, whereas $\mathsf{\text{MSE}}\left({\widehat{\theta}}_{k}\right)=\mathbb{E}\left\{\right{\widehat{\theta}}_{k}{\theta}_{k}{}^{2}\}$ is the meansquare error (MSE) of the timing estimate ${\widehat{\theta}}_{k}$, and ${\overline{\mathsf{\text{MSE}}}}_{\theta}$ is the network QoS requirement in terms of maximum timing estimation MSE. In addition, Π_{d,k}(γ_{ k }) represents the probability of correct detection of code c_{ k } given by [10]
where I_{ x }[·,·] is the incomplete beta function [16]. Unlike [10], we assume that the power strategy set ${\mathcal{P}}_{k}$ is finite and given by
where the number of power levels Q_{ k } is computed as
with Δ_{ k } > 1 being the quantization step, and ${\underline{p}}_{k}$ and ${\overline{p}}_{k}$ denoting the minimum and maximum power levels, respectively, where ${\overline{p}}_{k}$ is assumed to be sufficiently large [17].^{c} From (14) and (15), it follows that ${\pi}_{k}^{\left(1\right)}={\underline{p}}_{k}$, ${\pi}_{k}^{\left({Q}_{k}\right)}={\overline{p}}_{k}$, and ${\pi}_{k}^{\left(q\right)}={\underline{p}}_{k}\xb7{\Delta}_{k}^{q1}$.
Setting ${\mathcal{P}}_{k}$ as specified in (14) allows us to meet the technical requirements of practical systems in which transmit powers are usually equally spaced on a logarithmic scale to reduce the complexity of the frontend architecture and to increase the efficiency of power amplifiers (see, for example, the specifications provided by the IEEE 802.16 m and 3GPP LTE standards in [2] and [3], respectively). For simplicity, in all subsequent derivations, we assume that Δ_{ k } = Δ, ${\underline{p}}_{k}=\underline{p}$, and ${\overline{p}}_{k}=\overline{p}$ for all $k\in \mathcal{K}$. This also implies that Q_{ k } = Q.
As mentioned previously, the aim of this work is to solve (11) taking into account the discrete nature of the power strategy sets $\left\{{\mathcal{P}}_{k}\right\}$. In the sequel, this is achieved by resorting to the analytical tools of finite game theory [14].
3 Game formulation and analysis
Using the results illustrated in [10], it follows that the MSE in (12) can be met provided that
where γ_{req} denotes the minimum SINR such that the MSE constraint (12) is satisfied with equality, i.e., $\mathsf{\text{MSE}}\left({\widehat{\theta}}_{k}\right)={\overline{\mathsf{\text{MSE}}}}_{\theta}$. In particular, γ_{req} is found to be [10]
where ρ is defined as $\rho ={\overline{\mathsf{\text{MSE}}}}_{\theta}{\mu}^{2}\left({\widehat{\theta}}_{k}\right)$ with $\mu \left({\widehat{\theta}}_{k}\right)=\mathbb{E}\left\{{\widehat{\theta}}_{k}\right\}{\theta}_{k}$ denoting the bias of the timing estimate ${\widehat{\theta}}_{k}$. Using (16), the optimization problem in (11) can be reformulated as
where
is the power strategy subset that allows the k th ST to meet the MSE constraint in (11). For notational simplicity, in all subsequent derivations, we omit the functional dependence of ${\mathcal{A}}_{k}$ on p_{∖k}.
The power allocation problem in (18) can be formulated as a generalized^{d} noncooperative game with complete information [14], denoted by $\mathcal{G}=\phantom{\rule{0.3em}{0ex}}[\mathcal{K},\{{\mathcal{A}}_{k}\},\{{u}_{k}\left\}\right]$. In particular, $\mathcal{K}=\{1,2,\dots ,K\}$ is the player set, ${\mathcal{A}}_{k}$ is the action set of the k th player, and u_{ k } is its payoff (utility) function given by
which depends on the power allocation p through γ_{ k } as in (9). The discrete nature of ${\mathcal{A}}_{k}$ places $\mathcal{G}$ into the category of finite generalized noncooperative games. As mentioned previously, this is much different from [10], in which the continuous nature of the action sets allows us to formalize the optimization problem as an infinite generalized noncooperative game ${\mathcal{G}}_{\mathrm{c}}$.
3.1 Analysis of the equilibria
The existence and uniqueness of the generalized Nash equilibria (GNE) of $\mathcal{G}$ are studied in the following. The analysis is conducted only for pure (i.e., deterministic) strategies. This choice is motivated by the fact that, in compact strategy spaces, mixed (i.e., statistical) strategies are generally less attractive due to (a) implementation difficulties in wireless communications systems [17], as they require the presence of an arbitrator in the network to properly coordinate the players, and (b) Pareto inferiority [14] of any mixedstrategy profiles to purestrategy profiles [18] that reduces the total utility of the network.
To proceed further, we recall that a vector ${\mathbf{p}}^{\star}={\left[{p}_{1}^{\star},{p}_{2}^{\star},\dots ,{p}_{K}^{\star}\right]}^{T}$ is a purestrategy GNE of $\mathcal{G}$ if, for any $k\in \mathcal{K}$,
for all transmit powers ${p}_{k}\in {\mathcal{A}}_{k}$. Another way to define a purestrategy GNE is to make use of the concept of best response [14]. In particular, we have that a vector p^{⋆} is a GNE if each element ${p}_{k}^{\star}$ is the best response ${r}_{k}\left({\mathbf{p}}_{\setminus k}^{\star}\right)$ to the powers ${\mathbf{p}}_{\setminus k}^{\star}$ chosen by the other players, with ${r}_{k}\left({\mathbf{p}}_{\setminus k}^{\star}\right)$ being the solution of the following problem:
in which we have used (20), and we have explicitly written the functional dependence of the detection probability Π_{d,k} on ${\stackrel{~}{p}}_{k}$ and ${\mathbf{p}}_{\setminus k}^{\star}$ through γ_{ k } in (9).
Theorem 1.
Let us define the SINR γ^{⋆} as
with $\stackrel{~}{\gamma}$ being the solution of
Then, the game $\mathcal{G}$ admits purestrategy GNE provided that
The proof can be found in Appendix 1.
Theorem 2.
If condition (25) is satisfied, then the cardinality of the set${\mathcal{E}}^{\star}$ of pure GNE for $\mathcal{G}$is such that
The proof can be found in Appendix 2.
Theorem 1 provides a sufficient condition for the set of GNE not to be empty,^{e} and Theorem 2 states that the GNE is not necessarily unique. This means that the uniqueness property proven in [10] for ${\mathcal{G}}_{\mathrm{c}}$ no longer holds for $\mathcal{G}$. In other words, quantizing the set of actions makes the game $\mathcal{G}$ lose the uniqueness property for the GNE. In this context, it is interesting to show the following result.
Theorem 3.
Among all${\mathbf{p}}^{\star}\in {\mathcal{E}}^{\star}$, the smallest^{f} GNE${\mathbf{p}}_{\Delta}^{\star}$is such that
The proof can be found in Appendix 3.
The above result states that ${\mathbf{p}}_{\Delta}^{\star}$ is the best GNE in terms of social welfare (joint optimization) or, equivalently, it is the most efficient GNE in a social sense [19]. Note that this does not amount to saying that ${\mathbf{p}}_{\Delta}^{\star}$ is the socially optimum solution of (11), as noncooperative equilibria are known to be generally inefficient [19]. Improving the equilibrium efficiency is out of the scope of this paper and is left as a future work.
3.2 Numerical analysis
Unlike the unique GNE of ${\mathcal{G}}_{\mathrm{c}}$ in [10], the multiple equilibria of $\mathcal{G}$ cannot be expressed in a closed form as a function of the network parameters because of the ‘ arg max’ operator in (22). A numerical analysis is thus conducted to make comparisons and to evaluate the impact of the discretization of the action sets. To this aim, we concentrate on the optimal (in a social sense) ${\mathbf{p}}_{\Delta}^{\star}$ and resort to the exhaustive search method described in [20] to solve (27). The numerical results are averaged over 20,000 independent realizations of a network with the following parameters: T_{ s } = 89.28ns, N = 1,024, M = 4, V = 36, ${\overline{\Pi}}_{\text{fa}}=1{0}^{5}$, and ${\overline{\mathsf{\text{MSE}}}}_{\theta}=324$, which yield ρ = 128, λ = 0.12, γ_{req}∣_{dB}= 6.19, and ${\gamma}^{\star}{\mid}_{\text{dB}}=\stackrel{~}{\gamma}{\mid}_{\text{dB}}=7.09$ (see [10] for a detail discussion on this parameter setting). The normalized power constraints are fixed to $\underline{p}/{\sigma}_{n}^{2}{\mid}_{\text{dB}}=20$ and $\overline{p}/{\sigma}_{n}^{2}{\mid}_{\text{dB}}=+30$ for all k, whereas the ST distances d_{ k } are randomly chosen from a uniform distribution in [R/10,R] with R being the cell radius. The channel power gains are normalized to a distance R/2 and are modeled using the 6tap ITU modified vehicularA model [21] with a path loss exponent ς = 2.
Figure 1 reports the normalized MSE defined as $\mathsf{\text{NMSE}}\left({\mathbf{p}}_{\mathrm{c}}^{\star}\right)=\mathbb{E}\{\parallel {\mathbf{p}}_{\mathrm{c}}^{\star}{\mathbf{p}}_{\Delta}^{\star}{\parallel}^{2}/\parallel {\mathbf{p}}_{\mathrm{c}}^{\star}{\parallel}^{2}\}$ as a function of K for different quantization steps, where ${\mathbf{p}}_{\mathrm{c}}^{\star}$ is the unique GNE of ${\mathcal{G}}_{\mathrm{c}}$. The maximum number of STs is fixed to ⌊ 1 + V / γ ^{⋆} ⌋ = 8. Observe that the condition K ≤ 8 is required to meet (25). In addition, it represents a necessary and sufficient condition for the existence of the unique GNE ${\mathbf{p}}_{\mathrm{c}}^{\star}$[10]. As expected, $\mathsf{\text{NMSE}}\left({\mathbf{p}}_{\mathrm{c}}^{\star}\right)$ decreases as Δ becomes smaller since the discrete action sets ${\mathcal{A}}_{k}$ in $\mathcal{G}$ tend to better approximate the continuous ones in ${\mathcal{G}}_{\mathrm{c}}$. As can be seen, $\mathsf{\text{NMSE}}\left({\mathbf{p}}_{\mathrm{c}}^{\star}\right)$ increases as K increases, meaning that the difference between $\parallel {\mathbf{p}}_{\Delta}^{\star}{\parallel}^{2}$ and $\parallel {\mathbf{p}}_{\mathrm{c}}^{\star}{\parallel}^{2}$ becomes larger as the number of STs increases. In particular, we see that $\mathsf{\text{NMSE}}\left({\mathbf{p}}_{\mathrm{c}}^{\star}\right)$ is almost constant up to K = 4, whereas it rapidly increases for larger values.
To evaluate the impact of this difference on the system performance in terms of social welfare, Figure 2 reports the experimental$\sum _{k}{u}_{k}\left({\mathbf{p}}_{\Delta}^{\star}\right)/\sum _{k}{u}_{k}\left({\mathbf{p}}_{\mathrm{c}}^{\star}\right)$ as a function of K in the same operating conditions of Figure 1. As seen, the ratio$\sum _{k}{u}_{k}\left({\mathbf{p}}_{\Delta}^{\star}\right)/\sum _{k}{u}_{k}\left({\mathbf{p}}_{\mathrm{c}}^{\star}\right)$ is approximately 1 for K ≤ 6 while it increases for larger values of K. A similar behavior (not shown for the sake of brevity) is observed if the userbasis ratio${u}_{k}\left({\mathbf{p}}_{\Delta}^{\star}\right)/{u}_{k}\left({\mathbf{p}}_{\mathrm{c}}^{\star}\right)$ is considered. From these results, it follows that limiting the STs to use a discrete set of strategies${\mathcal{A}}_{k}$ increases the global system performance rather than introducing a detrimental effect. This phenomenon is known as a Braesstype paradox^{g}[22], and it has already been observed in other different contexts (such as routing in [23, 24] and wireless communications in [25, 26]). Roughly speaking, the Braesstype paradox occurs because the average number of GNEs increases when K becomes larger. For example, when Δ∣_{dB}= 1, the numerical results indicate that the average number of GNE for K = {2,3,4,5,6,7,8} is {1.0,1.1,1.2,1.3,1.7,2.7,20.9}, respectively. As mentioned before, the latter are found by solving (27) for each network realization by means of the exhaustive search procedure illustrated in [20].
4 Energyefficient distributed synchronization
In what follows, we first show how to exploit the GNE analysis provided so far to derive a practical power control algorithm for achieving synchronization in a distributed manner. The performance of the provided solution is then investigated by means of numerical results.
4.1 Implementation of the algorithm
We begin by observing the following result.
Corollary 1.
If the powers of all active STs are initialized to the lowest levels $\underline{p}$ , an iterative algorithm operating according to the best response dynamics given in (22) converges to ${\mathbf{p}}_{\Delta}^{\star}$ under the hypothesis (25).
Proof.
Since the best response dynamics reported in (22) possesses the ascending property [27] (see Appendix 1), using [28] the thesis follows. □
Denote by p_{ k } [n] the transmit power of the k th ST at the n th iteration step. Using Corollary 1, it follows that an iterative algorithm operating according to the best response dynamics in (22):
converges to the most socially efficient GNE${\mathbf{p}}_{\Delta}^{\star}$ if${p}_{k}\left[0\right]=\underline{p}$ for k = 1,2,…,K.
Note that the computation of p_{ k } [n + 1] in (28) requires knowledge of ν_{ k } (p_{∖k}[n]). Using (9), it follows that ν_{ k } (p_{∖k}[n]) can be obtained as
where γ_{ k } [n] is ST k’s SINR measured at the BS at time step n. While p_{ k } [n] is locally available at the transmitter, γ_{ k } [n] can only be estimated at the BS and sent to the k th ST on a downlink control channel. Following [10], an unbiased estimate${\widehat{\gamma}}_{k}\left[n\right]$ of γ_{ k } [n] can be computed as
To reduce the amount of information to be exchanged, we assume the quantity${\widehat{\gamma}}_{k}\left[n\right]$ to be quantized on a logarithmic scale using a uniform Bbit quantizer. This produces
where
and
is the quantizer resolution (also known at the ST side, e.g., selected by the system standard), with$\overline{\gamma}$ and$\underline{\gamma}$ being the maximum and minimum expected values for${\widehat{\gamma}}_{k}\left[n\right]$, respectively. The BS sends on a broadcast downlink channel the integer b_{ k } [n], which is used by the k th ST to retrieve the quantized version of${\widehat{\gamma}}_{k}\left[n\right]$ using (31).
Replacing γ_{ k } [n] with μ_{ k } [n] into (29) and substituting the result into (28), we eventually obtain
Recalling (31), it follows that its evaluation at the ST side requires only the knowledge of b_{ k } [n].
Algorithm 1 Discrete and limited feedback best response synchronization algorithm (DLFBRSA)
Collecting all the above facts together leads to the energyefficient synchronization algorithm illustrated in Algorithm 1, which allows each ST to operate in a complete distributed manner without any knowledge of other users’ power allocation strategies (as if in a singleuser scenario).
Observe that Algorithm 1 is reminiscent of the best response synchronization algorithm (BRSA) illustrated in [10], except for the discrete action sets and the limited feedback from the BS, which makes it more suited for a practical implementation. In the sequel, we call the iterative procedure described in Algorithm 1 as discrete and limited feedback best response synchronization algorithm (DLFBRSA).
Remark 1.
An iterative algorithm using (28) as the power update criterion using γ_{ k } [n],${p}_{k}\left[0\right]=\underline{p}$ for all STs k, without the exit condition on the GLRT converges to${\mathbf{p}}_{\Delta}^{\star}$, as confirmed by Corollary 1. However, for a practical implementation, Algorithm 1 introduces (a) estimated SINRs${\widehat{\gamma}}_{k}\left[n\right]$, (b) limited feedback b_{ k } [n], and (c) the exit condition on the GLRT (step b2). These modifications affect the performance of the algorithm, and their impact will be studied in Section 4.2. Note that the minimum power initialization (step a2) is expedient to avoid the maximum power constraint${\overline{p}}_{k}$ to be violated for some steps n of the algorithm.
Remark 2.
It is worth observing that, in their most basic forms, iterative algorithms based on best response dynamics require a significant amount of information to be locally available at the player (transmitter) [29]. For example, they usually require knowledge of the number of players and of the actions played by all the other players. To overcome this problem, other algorithms based on reinforcement learning techniques have been adopted in the literature [29]. The main advantage of these solutions is that they do require each player to know only its corresponding utility. Although based on best response dynamics, DLFBRSA possesses most of the advantages shown by other reinforcement learningbased algorithms, as it allows each ST to operate in a distributed and iterative way requiring only knowledge of its own estimated SINR, as illustrated in Algorithm 1 by means of simulation results.
Remark 3.
Most of the computational complexity of DLFBRSA is represented by the exhaustive search in (34), which must be performed at each iteration step n over the Q discrete power levels of the set${\mathcal{A}}_{k}$. In those applications characterized by large values of Q, this may represent an implementation impairment. In such cases, one may resort to the supermodularity properties of the utility function u_{ k } (see Appendices 1 and 2) and reduce the search complexity looking only at the values of${\stackrel{~}{p}}_{k}\in {\mathcal{A}}_{k}$ in the neighborhood of p_{ k } [n].
4.2 Simulation results
Numerical simulations are now used to assess the performance of DLFBRSA and to make comparisons with existing alternatives. As in Section 3.2, the numerical analysis is conducted by averaging over 20,000 independent realizations of a network whose parameters are fixed as follows: T_{ s } = 89.28 ns, N = 1,024, M = 4, V = 36,${\overline{\Pi}}_{\text{fa}}=1{0}^{5}$, and${\overline{\mathsf{\text{MSE}}}}_{\theta}=324$, which yield ρ = 128, λ = 0.12, γ_{req} ∣_{dB}= 6.19, and${\gamma}^{\star}{\mid}_{\text{dB}}=\stackrel{~}{\gamma}{\mid}_{\text{dB}}=7.09$. The minimum and maximum expected values of${\widehat{\gamma}}_{k}\left[n\right]$ in (33), based on an extensive simulation campaign, are fixed to$\underline{\gamma}{\mid}_{\text{dB}}=8$ and$\overline{\gamma}{\mid}_{\text{dB}}=+16$, whereas the appropriate number of bits B is chosen later on the basis of the following numerical analysis. Without loss of generality, we concentrate on the first ST (i.e., k = 1) and assess the performance of the investigated solutions when its distance d_{1} is kept constant. All other STs are assumed to be randomly located in [R/10,R] with R being the cell radius. The normalized power constraints are fixed to$\underline{p}/{\sigma}_{n}^{2}{\mid}_{\text{dB}}=20$ and$\overline{p}/{\sigma}_{n}^{2}{\mid}_{\text{dB}}=+30$, and the same power initialization${p}_{k}\left[0\right]=\underline{p}$ is used for all STs$k\in \mathcal{K}$, which also use a common power quantization step Δ ∣_{dB} = 1.
Figure 3 reports the average normalized power expenditure${p}_{\text{avg}}/{\sigma}_{n}^{2}$ (in dB) required by ST 1 when using DLFBRSA, from the time it accesses the network until it successfully completes the synchronization procedure. The numerical results are plotted as functions of K for B = {1,2,3,8}. The results obtained with DLFBRSA when B → ∞ (i.e., with continuous SINR feedback) are used as a benchmark. Comparisons are also made with the BRSA illustrated in [10] in which the action sets are continuous and perfect knowledge of the estimated SINRs is available at the STs. The results of Figure 3 indicate that the quantization of the SINRs has only a marginal effect on the performance of DLFBRSA. In fact, it has practically the same performance for B = 3,8 and B → ∞, whereas a significant degradation is observed only for B = 1. We argue that the quantization of the estimated SINRs marginally impacts the system performance since it is basically perceived at the STs as an additional estimation error introduced by the BS (which, on the other hand, can actually exploit realvalued estimation methods). Based on the above results, in all subsequent simulations, we set B = 3. From (33), recalling that$\underline{\gamma}{\mid}_{\text{dB}}=8$ and$\overline{\gamma}{\mid}_{\text{dB}}=+16$, we have Δ_{ γ } ∣_{dB}= 3.43.
To evaluate the impact of the discretization of the action sets, we now compare the performance of BRSA with that of DLFBRSA. From Figure 3, it follows that they do perform identically when the DLFBRSA uses B ≥ 3. This seems to contradict the numerical results of Figure 2, discussed at the end of Section 3.2, which show that discretizing the set of strategies is beneficial for individual (and, consequently, global) performance. On the basis of the analysis of Section 3.2, the DLFBRSA is expected to outperform the BRSA. The motivation behind this contradictory result can be understood by recalling that the considered ST takes part in the synchronization procedure as long as it is not correctly detected by the BS. As a consequence, what really impacts on the performance of DLFBRSA and BRSA is its power evolution from the time it enters the network (n = 0) to the time step n^{exit} in which the exit conditions (detailed in step b2 of DLFBRSA) are satisfied.
To this aim, Figure 4 reports the average number of iterations${n}_{\text{avg}}^{\text{exit}}$ as a function of K, which turns out to be the same for the both the BRSA and the DLFBRSA (with B ≥ 3) with good approximation. Interestingly, numerical simulations confirm that, when 0 ≤ n ≤ n^{exit}, the difference between the power updates across the two schemes is negligible. On the contrary, the performance measured in Figure 2 corresponds to that achieved by the BRSA and the DLFBRSA schemes without the exit conditions listed in step b2 (as the GNE, computed in Section 3.2 through an exhaustive search [20], can also be achieved using the best response dynamics described in Section 4), whose convergence time is usually much higher than n^{exit}. This is the reason why the performance in terms of total energy expenditure reported in Figure 3 is similar in the two cases. On the basis of the above results, we can conclude that DFLBRSA yields the same performance of BRSA. However, this is achieved while (a) reducing the complexity of the user terminals (thanks to the discretization of the power amplifier) and (b) requiring a limited amount of feedback from the BS (thanks to the finite number of bits B used to send the estimated SINRs).
The performance of DLFBRSA is now compared with those achieved by two alternative solutions based on a deterministic increase of the transmit power: the deterministic synchronization algorithm (DSA), in which the update rule is p_{ k } [n + 1] ∣_{dB}= p_{ k } [n]∣_{dB} + Δ ∣_{dB}, and the binary exponential backoff DSA (BEBDSA), in which p_{ k } [n + n_{ e }] ∣_{dB}= p_{ k } [n]∣_{dB} + Δ ∣_{dB}, where n_{ e } is an exponentially distributed backoff counter (see [10] for more details). In all subsequent simulations, we set Δ ∣_{dB}= 1 and${p}_{k}\left[0\right]=\underline{p}$ for k = 1,2,…,K.
Figure 5 shows${p}_{\text{avg}}/{\sigma}_{n}^{2}$ for all investigated solutions as a function of the normalized distance d_{1}/R when K = 5, and Figure 6 illustrates the average time T_{avg} needed to complete the synchronization procedure in the same operating conditions. In particular, T_{avg} is computed as T_{avg} = T_{ f } · n avgexit, where T_{ f } = 5 ms accounts for the time interval (frame time) between two successive synchronization attempts. In addition, Figure 7 shows the MSE of the timing estimate${\widehat{\theta}}_{1}$ in the same simulation setup of Figures 5 and 6. From the results of Figure 5, it follows that DLFBRSA provides roughly the same power consumption of BEBDSA, which is significantly lower than that needed by DSA. However, the results of Figure 6 show that the time required by DLFBRSA to achieve synchronization is much shorter than that needed by DSA and BEBDSA, especially when d_{1}/R increases. In addition, Figure 7 shows that the estimation accuracy with DLFBRSA is higher than that with both DSA and BEBDSA. Note also that simulation results (not reported here for the sake of brevity) show that the performance of the DLFBRSA does not change as a function of${\overline{p}}_{k}$ provided that${\overline{p}}_{k}\gg {\sigma}_{n}^{2}$, whereas the average synchronization time achieved by the deterministic increase techniques (especially the DSA) increases as${\overline{p}}_{k}$ increases. This is due to the fact that in this case colliding users transmit at comparable power levels for a longer time.
Similar conclusions can be drawn in the case of a variable number of STs K, by comparing the performance in terms of average synchronization time achieved by the DLFBRSA (obtained by scaling the average number of iterations of Figure 4 by the frame interval T_{ f }) with that provided by the DSA and the BEBDSA [10, Figure eleven]. Since the slope of the curve provided by the DLFBRSA, which scales linearly with K, is always lower that that achieved by a deterministic power increase, we can conclude that the proposed solution is particularly suitable when users are required to be synchronized in a short time interval with a limited amount of power.
Collecting all the above facts together, we may conclude that DLFBRSA provides better results in terms of energy efficiency and parameter estimation accuracy, also providing some performance that slightly depends on the transmitterreceiver distance. This is achieved at the price of a slight increase of information to be fed back over the control channel. In particular, the amount of information to be exchanged during each frame and for each${\mathbf{c}}_{\ell}\in \mathcal{C}$ is the following: 1 bit to broadcast the outcome of the GLRT and B = 3 bits to transmit the quantized SINRs. This means that a total of$4\left\mathcal{C}\right$ bits per frame time T_{ f } is required by DLFBRSA, which corresponds to a feedback rate on the order of a few tens of kilobits per second, given that$\left\mathcal{C}\right$ is usually on the order of tens to hundreds (e.g., see [2, 3]).
5 Conclusion
In this work, we have formalized the power allocation problem for energyefficient contentionbased synchronization in OFDMAbased networks as a finite constrained noncooperative game. The generalized Nash equilibria have been analytically studied and numerically evaluated. The above results have been used to derive a distributed and iterative energyefficient power control algorithm with discrete powers and limited feedback. The performance of the above solution has been evaluated and compared with alternatives by means of numerical simulations. Using realistic system parameters and widely agreedupon channel models, we have shown that the proposed solution incurs only a negligible degradation with respect to the scheme illustrated in [10], while a significant gain is achieved with respect to deterministicbased power allocation approaches (both with and without contention resolution methods). The derived technique requires a feedback on the downlink on the order of a few tens of kilobits per second, which can be easily accommodated in current IEEE 802.16 m [2] and LTE [3] standards. Since the proposed solution shows a (much) faster synchronization time than deterministic methods, it can be used to further increase the energy efficiency of mobile terminals by reducing the frequency of periodic ranging procedures, which are currently used by 4G communication systems to meet the transmission latency requirements.
Endnotes
^{a} The following notation is used throughout the paper. Matrices and vectors are denoted by boldface letters. I_{ n }, 0_{ n }, and 1_{ n } are the n × n identity matrix, the n × 1 allzero vector, and the n × 1 allone vector, respectively, whereas A = diag{a(n) ; n = 1,2,…,N} denotes an N × N diagonal matrix with entries a(n) along its main diagonal. We use$\mathbb{E}\{\xb7\}$, (·)^{T}, and (·)^{H} for expectation, transposition, and Hermitian transposition, respectively; ∥ · ∥ for the Euclidean norm of the enclosed vector; ⌊x⌋ to round x to the nearest integer towards zero; ⌊x⌉ to round x to the nearest integer; x ∣_{dB} = 10 log10x; and finally,${\left[x\right]}_{a}^{b}=\text{max}(a,min(x,b\left)\right)$.
^{b} This assumption is reasonable as long as downlink estimation errors are within a few percents of the subcarrier spacing and low mobility applications are considered [2].
^{c} In practice, it suffices that${\overline{p}}_{k}$ is at least a couple of orders of magnitude larger than the AWGN power${\sigma}_{n}^{2}$, which is normally verified in all communication standards.
^{d} The game is generalized since${\mathcal{A}}_{k}$ depends on the other STs’ power p_{∖k} (see, for example, [14] and [30] for more details).
^{e} Please note that, following the steps reported in Appendix 5, the maximum power constraint is active when deriving (25).
^{f} The smallest vector in a set of vectors refers to the componentwise comparison between vectors in that set. For example, for any two vectors$\mathbf{x},\mathbf{y}\in {\mathbb{R}}^{n}$, x < y if and only if x_{ i } < y_{ i } for all i = 1,2,…,n.
^{g} Braess’s paradox states that adding extra strategies to a network when the entities operate selfishly can, in some cases, reduce the overall performance. This is because the Nash equilibrium of such system is not necessarily optimal. In the problem at hand, this means that relying on continuous power sets does not necessarily bring benefits to the synchronization procedure due to the inefficiency of the unique Nash equilibrium of the continuouspower game.
Appendices
Appendix 1
Proof of Theorem 1
Figure 8 shows a pictorial representation of the typical shape of the utility u_{ k } (p) as a function of the power${p}_{k}={\pi}_{k}^{\left(q\right)}$ for a fixed interference p_{∖k} (all quantities are on a logarithmic scale, although the subscript ‘dB’ is suppressed for the sake of presentation). The relevant points of the utility function in terms of SINR, scaled by the quantity ν_{ k } (p_{∖k}), are also reported: in addition to γ_{req} and$\stackrel{~}{\gamma}$, defined in (17) and (24), respectively, Figure 8 also shows the inflection point$\stackrel{\u0307}{\gamma}$,$\stackrel{\u0307}{\gamma}<\stackrel{~}{\gamma}\le {\gamma}^{\star}$, such that Π_{d,k}(γ_{ k }) is strictly convex for${\gamma}_{k}<\stackrel{\u0307}{\gamma}$ and strictly concave for${\gamma}_{k}>\stackrel{\u0307}{\gamma}$. It is worth observing that$\stackrel{\u0307}{\gamma}$ is easily found from (13). Although Figure 8 depicts the case${\gamma}_{\text{req}}<\stackrel{~}{\gamma}$, the considerations drawn in the following apply in the case${\gamma}_{\text{req}}\ge \stackrel{~}{\gamma}$ as well. Circular markers report${u}_{k}\left(\right[{\pi}_{k}^{\left(q\right)},{\mathbf{p}}_{\setminus k}\left]\right)$ for$q=1,\dots ,Q$ (in this example, Q = 8). Note that the best response map defined in (22) may yield r_{ k } (p_{∖k}) < γ^{⋆} /ν_{ k }(p_{∖k}), as occurs in this example.
A GNE in the game$\mathcal{G}$ exists provided that the K sets${\mathcal{A}}_{k}\left({\mathbf{p}}_{\setminus k}\right)\subseteq {\mathcal{P}}_{k}$,$k\in \mathcal{K}$, are nonempty, which translates, using (19), into ensuring that there exists at least a power level${\pi}_{k}^{\left(q\right)}\in {\mathcal{P}}_{k}$ such that${\pi}_{k}^{\left(q\right)}\ge {\gamma}_{\text{req}}/{\nu}_{k}\left({\mathbf{p}}_{\setminus k}\right)$ for all k. Since γ_{req} ≤ γ^{⋆} by hypothesis, it is sufficient to show that${\gamma}^{\star}/{\nu}_{k}\left({\mathbf{p}}_{\setminus k}^{\star}\right)\le {r}_{k}\left({\mathbf{p}}_{\setminus k}^{\star}\right)={p}_{k}^{\star}\le {\overline{p}}_{k}$ for all$k\in \mathcal{K}$. By following the same steps as in [11], we can derive the sufficient condition (25), which becomes also necessary in the case γ^{⋆} = γ_{req}. Note that, unlike [11], here we cannot derive a necessary condition that holds for any$\stackrel{~}{\gamma}>{\gamma}_{\text{req}}$, because of the inequality γ^{⋆}/ν_{ k } (p_{∖k}) ≤ r_{ k } (p_{∖k}) that is originated from using a finite set, and hence, GNE might exist even though (25) is not fulfilled. This is also in accordance to what is highlighted in (22), as an equilibrium can exist even if${p}_{k}^{\star}<{\gamma}^{\star}/{\nu}_{k}\left({\mathbf{p}}_{\setminus k}^{\star}\right)$, provided that γ^{⋆} > γ_{req}.
To proceed further with the proof of existence, it is useful to introduce the following definition:
Definition 1
([27]). A best response r_{ k } (p_{∖k}) possesses the ascending property if${r}_{k}\left({\mathbf{p}}_{\setminus k}\right)\le {r}_{k}\left({\mathbf{p}}_{\setminus k}^{\prime}\right)$ for all$k\in \mathcal{K}$ when${\mathbf{p}}_{\setminus k}\ne {\mathbf{p}}_{\setminus k}^{\prime}$ is such that${p}_{\ell}\le {p}_{\ell}^{\prime}\phantom{\rule{0.3em}{0ex}}\forall \ell \ne k$.
To show that the best response (22) is ascending, let us define r_{ k } = r_{ k } (p_{∖k}),${r}_{k}^{\prime}={r}_{k}\left({\mathbf{p}}_{\setminus k}^{\prime}\right)$, ν_{ k } = ν_{ k } (p_{∖k}), and${\nu}_{k}^{\prime}={\nu}_{k}\left({\mathbf{p}}_{\setminus k}^{\prime}\right)$ for notational convenience. Note that assuming${\mathbf{p}}_{\setminus k}\ne {\mathbf{p}}_{\setminus k}^{\prime}$ with${p}_{\ell}\le {p}_{\ell}^{\prime}\phantom{\rule{0.3em}{0ex}}\forall \ell \ne k$ implies that${\nu}_{k}>{\nu}_{k}^{\prime}$. Let us consider two different cases:

1.
r _{ k } < γ ^{⋆}/ν _{ k }: in this domain,${u}_{k}\left(\right[{p}_{k},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)$ is an increasing function of p _{ k }. Hence, power vector${\mathbf{p}}_{\setminus k}^{\prime}$’s best response is${r}_{k}^{\prime}=\text{arg}\underset{{p}_{k}}{\text{max}}{u}_{k}\left(\right[{p}_{k},\underset{\setminus k}{\overset{\prime}{\mathbf{p}}}\left]\phantom{\rule{0.3em}{0ex}}\right)\ge {r}_{k}$.

2.
r _{ k } ≥ γ ^{⋆}/ν _{ k }: in this domain, since${\nu}_{k}>{\nu}_{k}^{\prime}$, both u _{ k } ([p _{ k },p _{∖k}]) and${u}_{k}\left(\right[{p}_{k},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)$ are decreasing functions of p _{ k }. Hence, for r _{ k } to be a best response, the condition u _{ k } ([r _{ k },p _{∖k}]) > u _{ k } ([r _{ k }/Δ,p _{∖k}]) must hold, with r _{ k }/Δ < γ ^{⋆}/ν _{ k }. Due to the asymmetry of u _{ k }([p _{ k },p _{∖k}]) with respect to the point of maximum γ ^{⋆}/ν _{ k }, r _{ k }/Δ < p ̌_{ k }, where p ̌_{ k },$2{\gamma}^{\star}/{\nu}_{k}{r}_{k}<{\stackrel{\u030c}{p}}_{k}<{\gamma}^{\star}/{\nu}_{k}<{\gamma}^{\star}/{\nu}_{k}^{\prime}$, is the power level such that u _{ k }([p ̌_{ k },p _{∖k}]) = u _{ k }([r _{ k },p _{∖k}]). Since${u}_{k}\left(\right[{p}_{k},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)$ is increasing in the region${p}_{k}<{\gamma}^{\star}/{\nu}_{k}^{\prime}$,${u}_{k}\left(\right[{\stackrel{\u030c}{p}}_{k},{\mathbf{p}}_{\setminus k}\left]\phantom{\rule{0.3em}{0ex}}\right)<{u}_{k}\left(\right[{\stackrel{\u030c}{p}}_{k}^{\prime},{\mathbf{p}}_{\setminus k}\left]\phantom{\rule{0.3em}{0ex}}\right)$, where${\stackrel{\u030c}{p}}_{k}^{\prime}>{\stackrel{\u030c}{p}}_{k}$ is the counterpart power on${u}_{k}\left(\right[{p}_{k},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)$ such that${u}_{k}\left(\right[{\stackrel{\u030c}{p}}_{k}^{\prime},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)={u}_{k}\left(\right[{r}_{k},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)$, where the inequality${\stackrel{\u030c}{p}}_{k}^{\prime}>{\stackrel{\u030c}{p}}_{k}$ follows from the fact the maximum of${u}_{k}\left(\right[{p}_{k},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)$ is placed at${\gamma}^{\star}/{\nu}_{k}^{\prime}>{\gamma}^{\star}/{\nu}_{k}$. Hence,${u}_{k}\left(\right[{r}_{k}/\Delta ,{\mathbf{p}}_{\setminus k}\left]\phantom{\rule{0.3em}{0ex}}\right)<{u}_{k}\left(\right[{\stackrel{\u030c}{p}}_{k}^{\prime},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)={u}_{k}\left(\right[{r}_{k},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)$, which implies that${r}_{k}^{\prime}={r}_{k}$.
As a conclusion, r_{ k } (p_{∖k}) is an ascending best response function. In particular, if (25) is satisfied, this implies that r_{ k } (p_{∖k})≥r_{ k }(p ̇_{∖k}) for all k and for all p such that${p}_{k}\ge {\stackrel{\u0307}{p}}_{k}$, where the vector p ̇= [p ̇_{1},…,p ̇_{ K }]^{T} is the minimum componentwise power allocation such that${\gamma}_{k}={\nu}_{k}\left({\stackrel{\u0307}{\mathbf{p}}}_{\setminus k}\right){\stackrel{\u0307}{p}}_{k}\ge \stackrel{\u0307}{\gamma}$ for all${\stackrel{\u0307}{p}}_{k}$, with$\stackrel{\u0307}{\gamma}<\stackrel{~}{\gamma}$ defined above. In other words, the equilibrium points of$\mathcal{G}$ (if any) are equal to the equilibria of a modified (generalized) game, which differs from$\mathcal{G}$ as now the strategy space is the subset of${\mathcal{P}}_{k}$ such that any vector allocation p is such that${p}_{k}\ge {\stackrel{\u0307}{p}}_{k}$, and hence,${\gamma}_{k}\ge \stackrel{\u0307}{\gamma}$. To conclude the proof, let us introduce the following definition:
Definition 2
([14, 31]). A game is supermodular if u_{ k } (p) has increasing differences in p= [p_{ k },p_{∖k}], i.e., if
for all p and p^{′} such that, for all k,${p}_{k}\le {p}_{k}^{\prime}$, and${p}_{\ell}\le {p}_{\ell}^{\prime}$ for all ℓ ≠ k.
To prove that the utility u_{ k } (p), which is twice differentiable, satisfies (35), we can show, using [31], that it possesses the necessary and sufficient condition ∂^{2}u_{ k } (p)/∂ p_{ ℓ }∂ p_{ k } ≥ 0 for any two components p_{ ℓ }≠p_{ k }. Using (20), we can easily derive
where the inequality follows from the fact that${\Pi}_{\mathrm{d},k}^{\mathrm{\prime \prime}}\left({\gamma}_{k}\right)={\partial}^{2}{\Pi}_{\mathrm{d},k}\left({\gamma}_{k}\right)/\partial {\gamma}_{k}^{2}\le 0$ for$\stackrel{\u0307}{\gamma}\le {\gamma}_{k}\le \stackrel{~}{\gamma}$ and f(γ_{ k }) = γ_{ k } · ∂ Π_{d,k}(γ_{ k })/∂ γ_{ k }  Π_{d,k}(γ_{ k }) > 0 for${\gamma}_{k}\le \stackrel{~}{\gamma}$ (see [10, 11] for further details). Proving the property of supermodularity concludes the proof, as supermodular games admit purestrategy equilibria [14]. As a consequence, the original game$\mathcal{G}$ has purestrategy GNE, under the sufficient condition (25).
Appendix 2
Proof of Theorem 2
To show that the GNE of the game$\mathcal{G}$ is not necessarily unique, we use a counterexample. Let us focus on one GNE p^{⋆}, whose existence is ensured by Theorem 1, and let us suppose that p^{⋆} is such that${p}_{k}^{\star}\le {\gamma}^{\star}/\left({\nu}_{k}^{\prime}\sqrt{\Delta}\right)$, where${\nu}_{k}^{\prime}={\nu}_{k}\left({\mathbf{p}}_{\setminus k}^{\prime}\right)$ is obtained using the vector${\mathbf{p}}_{\setminus k}^{\prime}=\Delta {\mathbf{p}}^{\star}$ such that all components are scaled by the quantization step Δ, i.e.,${p}_{k}^{\prime}=\Delta {p}_{k}^{\star}$. Under this hypothesis, p^{′} is also a GNE of$\mathcal{G}$, i.e.,${r}_{k}\left({p}_{\setminus k}^{\prime}\right)={p}_{k}^{\prime}\phantom{\rule{0.3em}{0ex}}\forall k\in \mathcal{K}$.
To show this property, let us note first that${\nu}_{k}^{\star}<{\nu}_{k}^{\prime}<{\nu}_{k}^{\star}/\Delta $, where${\nu}_{k}^{\star}={\nu}_{k}\left({\mathbf{p}}_{\setminus k}^{\star}\right)$. Hence, if${p}_{k}^{\star}\le {\gamma}^{\star}/\left({\nu}_{k}^{\prime}\Delta \right)$ is the best response${p}_{k}^{\star}={r}_{k}\left({\mathbf{p}}_{\setminus k}^{\star}\right)$, it implies that${p}_{k}^{\prime}=\Delta {p}_{k}^{\star}\le {\gamma}^{\star}/{\nu}_{k}^{\prime}$ is also${p}_{k}^{\prime}={r}_{k}\left({\mathbf{p}}_{\setminus k}^{\prime}\right)$, as${p}_{k}^{\prime}{\gamma}^{\star}/{\nu}_{k}^{\prime}<{p}_{k}^{\star}{\gamma}^{\star}/{\nu}_{k}^{\star}$ and${u}_{k}\left(\right[{p}_{k},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)$ is an increasing function of p_{ k }. If${\gamma}^{\prime}/\left({\nu}_{k}^{\star}\Delta \right)<{p}_{k}^{\star}\le {\gamma}^{\prime}/\left({\nu}_{k}^{\star}\sqrt{\Delta}\right)$, then${\gamma}^{\prime}/{\nu}_{k}^{\star}<{p}_{k}^{\prime}\le {\gamma}^{\star}\sqrt{\Delta}/{\nu}_{k}^{\star}$, i.e.,${p}_{k}^{\prime}=\Delta {p}_{k}^{\star}$ is greater than the point of maximum${\gamma}^{\prime}/{\nu}_{k}^{\star}$. Furthermore,${p}_{k}^{\prime}{\gamma}^{\star}/{\nu}_{k}^{\prime}<{p}_{k}^{\star}{\gamma}^{\star}/{\nu}_{k}^{\prime}$. Due to the asymmetry of${u}_{k}\left(\right[{p}_{k},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)$, this ensures that${u}_{k}\left(\right[{p}_{k}^{\prime},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)>{u}_{k}\left(\right[{p}_{k}^{\star},{\mathbf{p}}_{\setminus k}^{\prime}\left]\phantom{\rule{0.3em}{0ex}}\right)$, and thus,${p}_{k}^{\prime}={r}_{k}\left({\mathbf{p}}_{\setminus k}^{\prime}\right)$. As a conclusion, p^{′} = Δ p^{⋆} is also a GNE of$\mathcal{G}$, and this concludes the proof.
Note that, when K ≫ 1 (e.g., K = ⌊1 + V/γ^{⋆}⌋), it is often the case that$\sum _{\ell \ne k}{\alpha}_{\ell}{p}_{\ell}^{\star}\gg {\sigma}_{n}^{2}$, ∀k. Hence,${\nu}_{k}^{\prime}\gtrsim {\nu}_{k}^{\star}/\Delta $, and the condition${p}_{k}^{\star}\le {\gamma}^{\star}/\left({\nu}_{k}^{\prime}\sqrt{\Delta}\right)$ occurs frequently. This is the reason why the number of GNE increases as K increases. However, such condition is not necessary, and other GNE might exist, e.g., vectors p^{′} in which some elements are ${p}_{k}^{\prime}=\Delta {p}_{k}^{\star}$ and some others are ${p}_{k}^{\prime}={p}_{k}^{\star}$.
Appendix 3
Proof of Theorem 3
By using relation (21), ${u}_{k}\left({\mathbf{p}}_{\Delta}^{\star}\right)={u}_{k}\left(\right[{p}_{\Delta ,k}^{\star},{\mathbf{p}}_{\Delta ,\setminus k}^{\star}\left]\right)\ge {u}_{k}\left(\right[{p}_{k},{\mathbf{p}}_{\Delta ,\setminus k}^{\star}\left]\phantom{\rule{0.3em}{0ex}}\right)$ for all k and for all ${p}_{k}\in {\mathcal{P}}_{k}$. In particular, ${u}_{k}\left(\right[{p}_{\Delta ,k}^{\star},{\mathbf{p}}_{\Delta ,\setminus k}^{\star}\left]\phantom{\rule{0.3em}{0ex}}\right)\ge {u}_{k}\left(\right[{p}_{k}^{\star},{\mathbf{p}}_{\Delta ,\setminus k}^{\star}\left]\phantom{\rule{0.3em}{0ex}}\right)$ for any ${p}_{k}^{\star}$ in any ${\mathbf{p}}^{\star}\in {\mathcal{E}}^{\star}$, ${\mathbf{p}}^{\star}\ne {\mathbf{p}}_{\Delta}^{\star}$. Note also that ${\gamma}_{k}^{\prime}={\nu}_{k}\left({\mathbf{p}}_{\Delta ,\setminus k}^{\star}\right){p}_{k}^{\star}\ge {\nu}_{k}\left({\mathbf{p}}_{\setminus k}^{\star}\right){p}_{k}^{\star}={\gamma}_{k}^{\star}$ for all k, and ${\gamma}_{k}^{\prime}>{\gamma}_{k}^{\star}$ for some k, under the hypothesis ${p}_{\Delta ,k}^{\star}\le {p}_{k}^{\star}$ for all k, ${\mathbf{p}}_{\Delta}^{\star}\ne {\mathbf{p}}^{\star}$. As a consequence, ${u}_{k}\left(\right[{p}_{k}^{\star},{\mathbf{p}}_{\Delta ,\setminus k}^{\star}\left]\phantom{\rule{0.3em}{0ex}}\right)={\Pi}_{\mathrm{d},k}\left({\gamma}_{k}^{\prime}\right)/{p}_{k}^{\star}\ge {\Pi}_{\mathrm{d},k}\left({\gamma}_{k}^{\star}\right)/{p}_{k}^{\star}={u}_{k}\left({\mathbf{p}}^{\star}\right)$. Since ${u}_{k}\left({\mathbf{p}}_{\Delta}^{\star}\right)\ge {u}_{k}\left({\mathbf{p}}^{\star}\right)$ for all $k\in \mathcal{K}$, with strict inequality for some k, (27) follows.
References
 1.
Zhang H, Gladisch A, Pickavet M, Tao Z, Mohr W: Energy efficiency in communications. IEEE Commun. Mag 2010, 48(11):4849.
 2.
IEEE 80216 Broadband Wireless Access Working Group: IEEE Standard for Local and Metropolitan Area Networks  Part 16: Air Interface for Broadband Wireless Access Systems  Amendment 3: Advanced Air Interface. Tech. Rep. IEEE 802.16m2011. IEEE Computer Society, Washington; 2011.
 3.
3GPP Technical Specification Group: LTE; Evolved Universal Terrestrial Radio Access (EUTRA); Physical Channels and Modulation (Release 10). Tech. Rep. 3GPP TS 36.211 v. 10.4.0. European Telecommunications Standards Institute, Sophia Antipolis; 2011.
 4.
Fu X, Li Y, Minn H: A new ranging method for OFDMA systems. IEEE Trans. Commun 2007, 6(2):659669.
 5.
Ruan M, Reed M, Shi Z: Successive multiuser detection and interference cancelation for contention based OFDMA ranging channel. IEEE Trans. Wireless Commun 2010, 9(2):481487.
 6.
Sanguinetti L, Morelli M: An initial ranging scheme for the IEEE 802.16 OFDMA uplink. IEEE Trans. Wireless Commun 2012, 11(9):32043215.
 7.
Sanguinetti L, Morelli M, Marchetti L: A random access algorithm for LTE systems. Trans. Emerging Telecommun. Technol. 2013, 24: 4958. 10.1002/ett.2575
 8.
Miao G, Himayat N, Li G, Talwar S: Distributed interferenceaware energyefficient power optimization. IEEE Trans. Wireless Commun 2011, 10(4):13231333.
 9.
Buzzi S, Colavolpe G, Saturnino D, Zappone A: Potential games for energyefficient power control and subcarrier allocation in uplink multicell OFDMA systems. IEEE J. Sel. Topics Signal Process 2012, 6(2):89103.
 10.
Bacci G, Sanguinetti L, Luise M, Poor HV: A gametheoretic approach for energyefficient contentionbased synchronization in OFDMA systems. IEEE Trans. Signal Process 2013, 61(5):12581271.
 11.
Bacci G, Luise M: A gametheoretic perspective on code synchronization for CDMA wireless systems. IEEE J. Sel. Areas Commun 2012, 30: 107118.
 12.
Bacci G, Luise M: A preBayesian game for CDMA power control during network association. IEEE J. Sel. Topics Signal Process 2012, 6(2):7688.
 13.
Bacci G: Energyefficient power control for CDMA code acquisition over frequencyselective channels. IEEE Commun. Lett 2012, 16(3):364367.
 14.
Fudenberg D, Tirole J: Game Theory. Cambridge: MIT Press; 1991.
 15.
Morelli M: Timing and frequency synchronization for the uplink of an OFDMA system. IEEE Trans. Commun 2004, 52(2):296306. 10.1109/TCOMM.2003.822699
 16.
Abramowitz M, Stegun IA: Handbook of Mathematical Functions. Dover, New York; 1965.
 17.
Lasaulce S, Tembine H: Game Theory and Learning in Wireless Networks: Fundamentals and Applications. Academic, Oxford; 2011.
 18.
Félegyházi M: Noncooperative behavior in wireless networks. PhD thesis, École Polytechnique Fédérale de Lausanne (EFPL), 2007.
 19.
Lasaulce S, Debbah M, Altman E: Methodologies for analyzing equilibria in wireless games. IEEE Signal Process. Mag 2009, 26(5):4152.
 20.
Peyton H Young: Strategic Learning and its Limits. Oxford University Press, Oxford; 2004.
 21.
ITU Radiocommunication Sector (ITUR): Guidelines for Evaluation of Radio Transmission Technologies for IMT2000. Recommendation ITUR M.1225. International Telecommunication Union, Geneva; 1997.
 22.
Perlaza SM: Game theoretic approaches to spectrum sharing in decentralized selfconfiguring networks. PhD thesis,. École Nationale Supérieure des Télécommunications, 2011
 23.
Roughgarden T: Selfish Routing and the Price of Anarchy. MIT Press, Cambridge; 2005.
 24.
Altman E, Boulogne T, El R Azouzi, Jimenez T, Wynter L: A survey on networking games in telecommunications. Comput. Oper. Res 2006, 33(2):286311. 10.1016/j.cor.2004.06.005
 25.
Altman E, Kamble V, Kameda H: A Braess type paradox in power control over interference channels. Proc. Int. Symp. Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, Berlin, 1–3 Apr 2008
 26.
Rose L, Perlaza SM, Debbah M: On the Nash equilibria in decentralized parallel interference channels. Proc. IEEE Int. Conf. Commun. Kyoto, 5–9 June 2011
 27.
Altman E, Altman Z, Smodular games and power control in wireless networks: IEEE Trans. Autom. Control. 2003, 48(5):839842. 10.1109/TAC.2003.811264
 28.
Yates RD: A framework for uplink power control in cellular radio systems. IEEE J. Sel. Areas Commun 1995, 13(9):13411347.
 29.
Rose L, Perlaza SM, Lasaulce S, Debbah M: Learning equilibria with partial information in decentralized wireless networks. IEEE Commun. Mag 2011, 49(8):136142.
 30.
Facchinei F, Kanzow C: Generalized Nash equilibrium problems. Q. J. Oper. Res 2007, 5(3):173210. 10.1007/s1028800700544
 31.
Topkis DM: Equilibrium points in nonzerosum nperson submodular games. SIAM J. Control Optimization 1979, 17(6):773787. 10.1137/0317054
Acknowledgements
The research leading to these results has received funding from the People Programme (Marie Curie Actions) of the European Union’s Seventh Framework Programme (FP7/20072013) under REA grant agreement no. PIOFGA2011302520 GRANDCRU (Gametheoretic Resource Allocation for wireless Networks based on Distributed and Cooperative Relaying Units).
Author information
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Bacci, G., Sanguinetti, L., Luise, M. et al. Energyefficient power control for contentionbased synchronization in OFDMA systems with discrete powers and limited feedback. J Wireless Com Network 2013, 192 (2013). https://doi.org/10.1186/168714992013192
Received:
Accepted:
Published:
Keywords
 Power Allocation
 Mobile Terminal
 Noncooperative Game
 Limited Feedback
 Channel Frequency Response