Skip to main content

Distributed energy-aware resource allocation in multi-antenna multi-carrier interference networks with statistical CSI

Abstract

Resource allocation for energy efficiency optimization in multi-carrier interference networks with multiple receive antennas is tackled. First, a one-hop network is considered, and then, the results are extended to the case of a two-hop network in which amplify-and-forward relaying is employed to enable communication. A distributed algorithm which optimizes a system-wide energy-efficient performance function, and which is guaranteed to converge to a stable equilibrium point, is provided. Unlike most previous works, in the definition of the energy efficiency, not only the users’ transmit power but also the circuit power that is required to operate the devices is taken into account. All of the proposed procedures are guaranteed to converge and only require statistical channel state information, thus lending themselves to a distributed implementation. The asymptotic regime of a saturated network in which both the active users and the number of receive antennas deployed in each receiver grow large is also analyzed. Numerical results are provided to confirm the merits of the proposed algorithms.

1 Introduction

In the recent past, the growing concerns on sustainable growth due to the exponential increase in the use of mobile communication devices, as well as the need to maximize battery life in mobile handsets, garnered a great interest for resource allocation techniques aimed at the maximization of the energy efficiency (EE), measured in bits per Joule, at the physical layer of wireless networks. While more traditional resource allocation techniques pursue the optimization of the network’s performance in terms of throughput, which usually comes at the expense of battery life, an energy-efficient resource allocation aims at the maximization of performance measures that take into account the trade-off between achieving a high throughput and saving as much battery power as possible.

Pioneering works in the area of distributed resource allocation for EE are [13]. There, the EE is defined as the ratio between the users’ throughput and the transmit power, and energy-efficient power control algorithms for the uplink of wireless networks are provided.

The results of [13] have been extended in several directions in many following studies. In [4], joint linear receiver design and power control is pursued for CDMA networks, while in [5], spreading code optimization is also plugged into the resource allocation process. In [6], the impact of widely linear filtering on the EE of wireless networks is investigated. In [7], a hierarchical approach based on Stackelberg games is used to tackle the energy-efficient power control problem, while in [8], a power control algorithm based on a repeated-game approach is proposed. In [9], the impact of relaying on the EE of wireless networks is studied.

Most of the above works deal with multiple-access-channel systems. In [10], instead, a multi-carrier interference network is considered, and the problem of distributed EE maximization through individual power allocation over the available subcarriers is investigated. However, the proposed algorithm is not guaranteed to converge to a stable equilibrium point. In [11], the uplink of multi-cell orthogonal frequency-division multiple access (OFDMA) network is considered, and a resource allocator aiming at minimizing the total transmitted power subject to individual rate constraints is studied. The results indicate that the proposed algorithm converges to a stable resource allocation policy only when the interference load is below a certain threshold. In [12], a game-theoretic approach to subcarriers, modulation format, and power allocation for transmit power minimization with rate constraints is considered. Again, the proposed game is not guaranteed to converge to an equilibrium, and for this reason, a virtual referee is introduced to dictate the resource allocation and force it to a stable and efficient equilibrium point. In [13], an auction approach to subcarrier, modulation, and coding scheme allocation in single-cell and multi-cell OFDMA networks is proposed, and the simplification is made to divide the users in each cell between interior and edge users, assuming that the inner users in each cell do not interfere with adjacent cells. In [14], energy-efficient subcarrier and transmit power allocation in the uplink of an OFDMA interference network is considered. However, in order to ensure the convergence of the resulting algorithm, subcarrier assignment is performed in a centralized fashion. In [15], a novel system-wide energy-efficient performance metric is proposed, which allows for a completely distributed and convergent power and subcarrier allocation in multi-carrier interference networks. There, the resource allocation problem is formulated as a potential game [16], with potential function given by the system-wide performance function to be maximized. Potential games for resource allocation in wireless multi-user networks have also been considered in [1719].

In [15], as in all previously cited works, as far as the definition of the EE is concerned, only the transmit power is considered, whereas a more meaningful definition of the EE is obtained when not only the transmit power but also the power that is dissipated in the electronic circuitry of each terminal in order to operate the device is accounted for [2025]. Moreover, previous works on distributed EE in interference networks deal with single-antenna systems, whereas it is confirmed that a crucial key ingredient of today’s and future wireless networks will be the use of multiple antennas, which may be very helpful in providing diversity gains and dramatically increasing the system performance in terms of effective data rates and network coverage [2628]. First, results on EE in multiple-antenna systems are [22, 29], where single-user multiple-input multiple-output (MIMO) systems are considered and the optimal energy-efficient covariance matrix is determined.

Motivated by this background, this paper extends the results of [15] in the following directions:

  • The transmitter circuit powers are taken into account in the definition of the users’ energy efficiency, which complicates the analysis.

  • Multiple-antenna receivers are considered, and unlike [15], only statistical channel state information (CSI) is assumed at the transmitter side, which reduces the amount of feedback required to implement the proposed algorithms.

  • A two-hop interference network in which communication takes place by means of an amplify-and-forward relay is also considered.

In this challenging scenario, distributed algorithms for energy-efficient joint subcarrier and power allocation are devised. The proposed algorithms require only the solution of convex problems, which makes their implementation feasible in real world systems, and will be shown to always converge to a stable equilibrium point. EE maximization will also be tackled in the asymptotic regime of a saturated interference network in which both the number of active users and of receive antennas grow large with a fixed ratio.

The remainder of this paper is organized as follows. Section 2 describes the considered system model. Section 3 investigates the energy-efficient resource allocation problem, providing the tools to devise suitable resource allocation algorithms. Section 4 contains the asymptotic analysis for saturated networks. In Section 5, the results of 3 are extended to the relay-assisted scenario, while Section 6 is devoted to the numerical results. Concluding remarks are given in Section 7.

2 System model

Consider the uplink of a K×J multi-carrier interference network. Each receiver is equipped with M receive antennas, and for all k=1,…,K, a k {1,2,…,J} denotes the intended receiver for user k. It is assumed here that receiver assignment has been performed in a previous phase, and we focus on the resource allocation problem only. Let ={1,2,,L} be the set of available subcarriers in the system, and denote by p k () the k-th user’s transmit power on subcarrier , and by hk,j,m() the complex channel gain between the k-th user and the m-th antenna of the j-th receiver on the -th subcarrier, modeled as a realization of a zero-mean Gaussian random variable with variance d k , j η M , with dk,j and η denoting the distance between the k-th mobile user and the j-th BS, and the path loss exponent, respectively. Let us also define the channel vector hk,j()= [ hk,j,1(),…,hk,j,M()]T, with (·)T denoting transpose, modeled as a zero-mean Gaussian random vector with covariance matrix Rk,j().

In the following, only statistical CSI is assumed at the transmitters’ side, in terms of second-order statistics of the channel coefficients and vectors.

Now, for all j=1,…,J, the data received on the M antennas over subcarrier can be expressed as the M-dimensional vector

r j ( ) = [ r j , 1 ( ) , , r j , M ( ) ] T = k = 1 K p k ( ) h k , j ( ) b k ( ) + w j ( ) ,
(1)

wherein b k () is the information symbol transmitted by the k-th user on the -th subcarrier frequency, w j ()=[ wj,1(),…,wj,M()]T is the additive noise term, modeled as a zero-mean Gaussian random vector with covariance matrix σ2I M . In each receiver, the received data are processed by means of maximum ratio combining (MRC). The resulting instantaneous signal-to-interference-plus-noise ratio (SINR) for the k-th user is thus expressed, for all k=1,…,K, as

γ k , a k inst ()= p k ( ) h k , a k ( ) 4 σ 2 h k , a k ( ) 2 + i k p i ( ) | h k , a k H ( ) h i , a k ( ) | 2 .
(2)

In this scenario, the aim is to devise a transmit power and subcarrier allocation algorithm that optimizes the network’s EE in a distributed way. Here, by distributed, we mean that the resource allocation process is not jointly carried out by a computational center which computes the optimum resource allocation policy, feeding back the results to the transmitters. Instead, each transmitter should allocate its own resources in a self-organizing way. This is a very important feature especially in networks that, by their own nature, lack a central control unit that dictates the resource allocation policy, which is the case for example in relevant communication systems like ad hoc networks and interference networks.

3 Distributed energy-efficient resource allocation

The aim of this section is to derive a distributed energy-efficient resource allocation algorithm. The main challenge in deriving a distributed algorithm in interference networks is that typically global CSI is needed. Otherwise stated, each user also needs to know other users’ channels, which requires a too great amount of overhead information to feedback. In order to circumvent this problem, the proposed algorithm will be designed so as to require only statistical CSI at the transmitter side. Since channel statistics vary at a very slow rate compared to the actual channel realizations, feeding back only statistical CSI significantly reduces the amount of required overhead. Moreover, channel statistics can be estimated more easily than channel coefficients at the receivers. It is also to be mentioned that present multi-cell networks are typically endowed with a high-speed backhaul link which allows the receivers to exchange information with one another. Therefore, each receiver can easily learn the channel statistics also of users that are not associated to it and then feedback this information to its associated transmitters. Again, the overhead information to be exchanged on the backhaul link due to the resource allocation algorithm is quite limited since only channel statistics need to be shared. Thanks to these features, the algorithm to be developed lends itself to a distributed implementation at the transmitter side.

To begin with, we remark that since the resource allocation takes place at the transmitters, the instantaneous SINR expression (2) cannot be used for resource allocation purposes, because each transmitter only has statistical CSI. Thus, before turning to the analysis of the resource allocation algorithm, an average SINR expression is needed.

3.1 Users’ average SINR

The average power U k , a k () of the k-th user’s intended symbol, in his assigned receiver a k , on subcarrier , is given by

U k , a k ( ) = p k ( ) E | h k , a k H ( ) h k , a k ( ) | 2 = p k ( ) E | α k , a k H ( ) R k , a k ( ) α k , a k ( ) | 2 ,
(3)

with α k , a k ()= R k , a k 1 / 2 () h k , a k (). Elaborating, U k , a k () can be expressed as

U k , a k ( ) = p k ( ) E m = 1 M v = 1 M R k , a k , ( m , v ) α k , a k , ( m ) α k , a k , ( v ) 2 = p k ( ) E m = 1 M R k , a k , 2 ( m , m ) | α k , a k , ( m ) | 4 + 2 m = 1 M v = m + 1 M R k , a k , ( m , m ) R k , a k , ( v , v ) | α k , a k , ( m ) | 2 | α k , a k , ( v ) | 2 + 4 m = 1 M v = m + 1 M | R k , a k , ( m , v ) | 2 | α k , a k , ( m ) | 2 | α k , a k , ( v ) | 2 = p k ( ) m = 1 M R k , a k , 2 ( m , m ) + 4 m = 1 M v = m + 1 M | R k , a k , ( m , v ) | 2 + 2 m = 1 M R k , a k , 2 ( m , m ) + 2 m = 1 M v = m + 1 M R k , a k , ( m , m ) R k , a k , ( v , v ) = p k ( ) tr 2 ( R k , a k ( ) ) + 2 tr ( R k , a k ( ) R k , a k H ( ) ) ,

wherein we have exploited the fact that E[| α k , a k , (m) | 4 ]=3 for all m=1,…,M, because α k , a k , (m) is a standard Gaussian variable for all m=1,…,M. As for the average power of the interference-plus-noise term, we have

I k , a k ( ) = σ 2 E h k , a k ( ) 2 + i k p i ( ) tr E h i , a k ( ) h i , a k H ( ) h k , a k ( ) h k , a k H ( ) = σ 2 tr ( R k , a k ( ) ) + i k p i ( ) tr R i , a k ( ) R k , a k ( ) ,
(4)

where the last equality stems from the assumption that the vectors h i , a k () and h k , a k () are statistically independent for all ki. Finally, the k-th user’s average SINR, in his intended receiver, on subcarrier , is computed as

γ k , a k ( ) = U k , a k ( ) I k , a k ( ) = p k ( ) ( tr 2 ( R k , a k ( ) ) + 2 tr ( R k , a k ( ) R k , a k H ( ) ) σ 2 tr ( R k , a k ( ) ) + i k p i ( ) tr R i , a k ( ) R k , a k ( ) .
(5)

3.2 Proposed distributed algorithm

Having derived an average expression for the users’ SINR, we are ready to start our analysis of the resource allocation problem. Mathematically, the distributed energy-efficient resource allocation problem is formulated as the K coupled problems

max { p k ( ) } = 1 L G { p k ( ) , γ k ( ) } k = 1 , = 1 K , L k = 1 , , K s.t. p k ( ) 0 = 1 , , L , = 1 L p k ( ) P max , k k = 1 , , K ,
(6)

with G { p k ( ) , γ k ( ) } k = 1 , = 1 K , L being the energy-efficient performance metric to optimize, which will be specified shortly. For all k=1,…,K, the solution to the k-th problem in (6) yields the k-th user’s power allocation for a fixed configuration of the other users’ powers, and any fixed point of iteration (6) represents a stable resource allocation policy. We remark that for all k=1,…,K, only the transmit powers { p k ( ) } = 1 L have been indicated as the optimization variables of the generic k-th problem, because by choosing the transmit powers, each user automatically chooses also the transmit subcarriers. Indeed, a subcarrier can be discarded by simply transmitting zero power over it.

Now, traditionally, the EE of a single communication link is defined as the ratio between the achieved throughput and the transmitted power, which can be mathematically expressed as [4, 10, 30], and references therein

EE pc =R D Q ( 1 e γ ) Q p ,
(7)

wherein R is the transmit data rate, Q≥1 is the packet length, DQ is the number of information symbols contained in each packet, γ is the achieved SINR, p the transmit power, and (1−eγ)Q is the so-called efficiency function which approximates the probability of correct reception for a data-packet of length Q[4, 10, 30] and references therein. We stress that the case of bit-oriented communications, i.e., Q=1 is included as a special case in our definition of the energy efficiency and all results to follow will hold true also for Q=1. Moreover, it should be mentioned that also the case Q>1 is of practical interest in modern OFDMA systems, such as LTE [31].

Another widely used efficiency function is the achievable rate log(1+γ) [21, 23, 32]. However, such a choice applies to strictly static channels but has no information-theoretic meaning in the considered scenario where the channels are rapidly varying. In our context, an information-theoretic meaningful function would be the ergodic achievable rate E[log(1+γ)]. Such an approach, which has been considered in [22] for the simpler scenario of single-user MIMO systems, appears more challenging in interference networks and is left as future work.

In the considered multi-carrier system, for all k=1,…,K, (7) can be seen as the per-carrier EE of a given user. Then, recalling that each user is assigned L subcarriers, the EE with which the generic n-th user transmits each packet of Q bits is given by [10]

EE n =R D Q = 1 L 1 e γ n , a n ( ) Q = 1 L p n ( ) + P c , n ,
(8)

while the network’s global energy efficiency (GEE), defined as the ratio of network’s global throughput over the network’s total consumed power, is written as

GEE= n = 1 K R D Q = 1 L ( 1 e γ n , a n ( ) ) Q n = 1 K = 1 L P c , n + p n ( ) ,
(9)

wherein the circuit power Pc,n that is needed to operate transmitter n has also been included in the expression of the consumed power. From a user-centric point of view, individual maximization of (8), for all n=1,…,K should be pursued. However, this would result in iterations (6) to be not always convergent, and even if convergence occurs, the resulting power allocation policy may not be efficient from a social welfare point of view. Indeed, from a social welfare point of view, the GEE (9) would be a canonical choice as the objective G { p k ( ) , γ k ( ) } k = 1 , = 1 K , L of (6). However, the drawback of maximizing of (9) is that it might lead to unfair power allocations. Indeed, due to its additive nature, the maximum of (9) might be obtained by having users with very low channel coefficients transmit at very low powers. In order to compromise between the need to achieve improved overall EE and the need to obtain a fair resource allocation, similarly to [15], the following multiplicative version of (9) will be considered as objective of (6), namely

GEE ~ = n = 1 K R D Q = 1 L 1 e γ n , a n ( ) Q n = 1 K = 1 L p n ( ) + P c , n .
(10)

Due to its multiplicative nature, it is unlikely that a maximizer of (10) results in one of the users’ throughputs to be very low, since each user’s throughputs is a factor of the product in the numerator of (10). Moreover, (10) is also a system-wide performance function, since it is an increasing function of the players’ energy efficiencies. We stress that the maximization of products of utility functions in order to obtain fair resource allocation policies is also considered in contexts other than EE maximization [33, 34].

However, the drawback of this approach is that the maximization of (10) is clearly more complex than that of (9). Thus, in order to obtain a mathematically treatable objective function, the traditional efficiency function (1−eγ)Q will be approximated by e β n / γ Q , with β n a suitable constant to be specified. Note that, similarly to (1−eγ)Q, the modified efficiency function e β n / γ Q is still an S-shapeda, increasing function of γ, approaching zero for γ→0 and approaching unity for γ→+. Aiming at approximating (1−eγ)Q with e β n / γ Q , a natural choice for β n is to set it so as to minimize the mean square error between the two functions. Accordingly, for all n=1,…,K, β n is determined as the solution to the problem

min β n 0 γ max , n 1 e x ) Q e Q β n / x 2 dx,
(11)

wherein γmax,n is the maximum SINR that user n can attain. For the case at hand, we have

γ max , n = P max , n E [ h n , a n ( ) 2 ] σ 2 ,
(12)

i.e., the n-th user’s SINR with interference-free transmission. The following proposition holds.

Proposition 1

The solution to problem (11) is obtained as the solution to the equation

m = 0 Q Q m ( 1 ) m 0 γ max , n e mx x e Q β n / x = Ei 2 Q β n γ max , n
(13)

with Ei(·) denoting the exponential integral function.

Proof

Setting the first-order derivative of the objective of (11) to zero yields

0 γ max , n ( 1 e x ) Q e Q β n x x dx= 0 γ max , n e 2 Q β n x x dx.
(14)

Applying Newton’s binomial formula to the left-hand-side of (14) yields the left-hand-side of (13). Next, operating the substitution y= 2 Q β n x in the right-hand-side of (14) yields

2 Q β n γ max , n e y y dy=Ei 2 Q β n γ max , n .
(15)

Hence, the thesis. □

It should be stressed that the computation of the coefficients { β n } k = 1 K needs to be performed just once and can be carried out off-line because each β n only depends on the constant networks parameters Q, Pm a x,n, σ2, and E[ h n , a n () 2 .

In order to further motivate the validity of the modified efficiency function as a substitute for the classical one, let us consider the ratio e β n / γ 1 e γ . Note that for increasing γ, it converges to one. Moreover, in order to give an insight as to how large γ is required to be for e β n / γ 1 e γ to approach unity, Figure 1 reports such a ratio for the case γmax,n=100. It is seen that for γ>0dB (that is the region of interest) e β n / γ 1 e γ is very close to 1.

Figure 1
figure 1

The quantity e β / γ 1 e γ is plotted here versus γ for the case γ max =100 .

Thus, (10) can be approximated as

GEE ̂ = n = 1 K R D Q = 1 L e Q β n γ n , a n ( ) n = 1 K = 1 L p n ( ) + P c , n ,
(16)

and the k-th problem in (6) can be restated as

max { p k ( ) } = 1 L n = 1 K R D Q = 1 L e Q β n / γ n , a n ( ) n = 1 K = 1 L p n ( ) + P c , n s.t. p k ( ) 0 = 1 , , L , = 1 L p k ( ) P max , k .
(17)

Accordingly, the resource allocation algorithm can be expressed as follows:

Algorithm 1 Distributed resource allocation

Convergence in Algorithm 1 is declared when the difference between the values of the objective function (16) achieved at the end of two successive outer loops is below a predetermined tolerance. The following proposition guarantees the convergence of Algorithm 1.

Proposition 2

For any feasible initialization point { p k ( 0 ) ( ) } k = 1 , = 1 K , L , Algorithm 1 is guaranteed to converge.

Proof

The objective (16) depends on all of the users’ KL transmit powers. After the initialization, we have GEE ̂ ( 0 ) ( { p 1 ( 0 ) ( ) } = 1 L ,, { p K ( 0 ) ( ) } = 1 L ). After the first iteration of the for cycle in Algorithm 1, (16) is maximized with respect to { p 1 ( ) } = 1 L while keeping the other (K−1)L powers fixed. Let us denote by { p 1 ( 1 ) ( ) } = 1 L the L powers resulting from such optimization. Then, after this first optimization, the new value of the objective is GEE ̂ ( 1 ) ( { p 1 1 ( ) } = 1 L , { p 2 ( 0 ) ( ) } = 1 L ,, { p K ( 0 ) ( ) } = 1 L ), and clearly, we have GEE ̂ ( 1 ) GEE ̂ ( 0 ) . In the second iteration of the cycle, the powers { p 2 ( ) } = 1 L are optimized. Thus, after the optimization, we have GEE ̂ ( 2 ) ( { p 1 1 ( ) } = 1 L , { p 2 ( 1 ) ( ) } = 1 L , { p 3 ( 0 ) ( ) } = 1 L ,, { p K ( 0 ) ( ) } = 1 L ), and it holds GEE ̂ ( 2 ) GEE ̂ ( 1 ) . It is seen that cyclically iterating this procedure originates a sequence of values of GEE ̂ ( n ) which is non-decreasing. As a consequence, since GEE ̂ is upper-bounded with respect to the transmit powers, Algorithm 1 will eventually converge. □

Now, in order to complete the resource allocation design, the solution to problem (17) remains to be tackled. Such a problem is not convex, because the objective is not concave, but it is possible to recast it as a convex problem without loss of optimality, by exploiting the result in the following proposition. Next, we will also provide an algorithm to solve problem (17) that employs the alternating maximization technique [35], rather than using the convex reformulation.

Proposition 3

For any k = 1,…, K , problem (17) can be restated as

max { p k ( ) } = 1 L = 1 L a k ( ) p k ( ) + c k ( ) p k ( ) + log ( p k ( ) + P c , k ) s.t. p k ( ) 0 = 1 , , L , = 1 L p k ( ) P max , k ,
(18)

wherein

a k ( ) = Q β k σ 2 tr ( R k , a k ( ) ) + i k p i ( ) tr R i , a k ( ) R k , a k ( ) tr 2 ( R k , a k ( ) ) + 2 tr ( R k , a k ( ) R k , a k H ( ) )
(19)
c k ( ) = n k Q β n tr ( R k , a n ( ) R n , a n ( ) ) p n ( ) tr 2 ( R n , a n ( ) ) + 2 tr ( R n , a n ( ) R n , a n H ( ) ) .
(20)

Moreover, the objective of (18) has a unique maximizer, which lies in its concave region.

Proof

We start by observing that it is possible to apply any increasing function to (16) without changing its maximizers. Then, applying the logarithmic function yields

K ln RD Q + ln n = 1 K = 1 L e Q β n / γ n , a n ( ) p n ( ) + P c , n = K ln RD Q n = 1 K = 1 L Q β n γ n , a n ( ) + ln p n ( ) + P c , n .
(21)

Then, plugging the expression for the users’ SINRs and highlighting the terms that depend on the k-th user’s transmit powers, (21) can be rewritten as

Q β k = 1 L σ 2 tr ( R k , a k ( ) ) + i k p i ( ) tr R i , a k ( ) R k , a k ( ) p k ( ) ( tr 2 ( R k , a k ( ) ) + 2 tr ( R k , a k ( ) R k , a k H ( ) ) n k = 1 L Q β n p k ( ) tr R k , a n ( ) R n , a n ( ) p n ( ) ( tr 2 ( R n , a n ( ) ) + 2 tr ( R n , a n ( ) R n , a n H ( ) ) = 1 L ln p k ( ) + P c , k + C k ,
(22)

with C k including all the terms that do not depend on the k-th user’s transmit powers. Then, by inspection, it is seen that (56) coincides with the objective of (18), and the first part of the thesis is proved. In order to prove the second part, let us first note that (18) is not a convex problem, because its objective is not concave, as can be verified by direct computation of its Hessian. However, the objective of (18) has a unique maximum which lies within the concave region of the objective function. To prove this, let us denote each summand of the objective of (18) as the function

g k ( p k ( ) ) = a k ( ) p k ( ) + c k ( ) p k ( ) + log ( p k ( ) + P c , k ) .
(23)

For all k=1,…,K, the first derivative of g k (p k ()) is given by

g k ( p k ( ) ) p k ( ) = a k ( ) p k 2 ( ) c k () 1 p k ( ) + P c , k .
(24)

Setting (24) to zero and elaborating yields the equation

c k () p k 3 ()+( c k () P c , k +1) p k 2 ()= a k () p k ()+ a k () P c , k ,
(25)

which is guaranteed to admit a unique solution for positive p k (), because an increasing cubic curve with zero intercept is on the left-hand-side, while a line with positive slope and intercept is on the right-hand-side. Denoting by p k ()such a solution, it is also seen that, for all k=1,…,K, g k (p k ()) is an increasing function for p k () p k (), thus implying that p k ()is a maximizer for g k (). Hence, for all k=1,…,K, it holds that

max = 1 L g k ( p k ( ) ) = 1 L max ( g k ( p k ( ) ) ) = = 1 L g k ( p k ( ) ) ,
(26)

which shows that { p k ( ) } = 1 L is the unique maximizer of the objective of (18). Next, let us compute the Hessian of the objective of (18). It is easy to realize that all the off-diagonal components equal zero, whereas for all =1,…,L, we have

2 u k p k 2 ( ) = 1 ( p k ( ) + P c , k ) 2 2 a k ( ) p k 3 ( ) = p k 3 ( ) 2 a k ( ) ( p k ( ) + P c , k ) 2 p k 3 ( ) ( p k ( ) + P c , k ) 2 .
(27)

Thus, the resulting Hessian is a diagonal matrix with diagonal entries given by (27). Also, it is seen that (27) vanishes when p k 3 ()=2 a k () ( p k ( ) + P c , k ) 2 , which is guaranteed to admit a unique solution for positive p k () because the intersection between a positive cubic curve with zero intercept and a convex parabola with positive intercept is unique. For all =1,…,L, denote by p ̄ k ()such a solution. Then, by inspection, it can also be seen that (27) is negative for p k ()< p ̄ k (), thus implying that g k () is concave for p k ()< p ̄ k (). Consequently, u k = = 1 L g k ( p k ()) is concave when p k ()< p ̄ k ()for all =1,…,L. Now, in order to complete the proof, it is to be shown that p k () p ̄ k (), for all =1,…,L, which is equivalent to showing that the first-order derivative of g k () is negative when evaluated at p ̄ k (). To see this note that from the left-hand-side of (27), it follows that, for all =1,…,L, p ̄ k ()has to satisfy the equation a k ( ) p ̄ k 2 ( ) = p ̄ k ( ) 2 ( p ̄ k ( ) + P c , k ) 2 . Therefore, from (24), we have

g k ( p ̄ k ( ) ) p k ( ) = a k ( ) p ̄ k 2 ( ) c k () 1 p ̄ k ( ) + P c , k =
(28)
p ̄ k ( ) 2 ( p ̄ k ( ) + P c , k ) 2 c k ( ) 1 p ̄ k ( ) + P c , k = p ̄ k ( ) + 2 P c , k + 2 c k ( ) ( p ̄ k ( ) + P c , k ) 2 ( p ̄ k ( ) + P c , k ) < 0 .
(29)

Hence, the thesis. □

Thus, Proposition 3 allows to reformulate the non-convex problem (18) as a convex one by restricting the problem domain to the concave region of the objective function, which can be done by simply imposing the additional constraints p k () p ̄ k ()for all =1,…,L in (18). This causes no loss of optimality, since the global maximum has been proved to lie in the concave region of the objective function.

Moreover, since numerical algorithms might still be too complex when the network’s load grows too large or in scenarios when computational complexity is a critical issue, in the following, we provide another, even more, computationally efficient technique to solve (18), based on the alternating maximization algorithm [35]. According to the alternating maximization, a function can be cyclically maximized with respect to one (or a block of) variable, while keeping the other variables fixed. For the case at hand, this means that in each cycle, problem (18) can be solved with respect to one of the transmit powers, say p k (), while keeping the other powers {p k (q)}q fixed, thus converting problem (18) into a sequence of scalar sub-problems, each of which can be solved in closed-form. Indeed, when only the generic power p k () is to be optimized, problem (18) can be recast as

max p k ( ) g k ( p k ( ) ) s.t. p k ( ) 0 , p k ( ) P max , k q p k ( q ) .
(30)

In Proposition 2, it has already been proved that g k (p k ()) admits a unique maximizer p k () which is given by the solution to (25). Consequently, the solution to problem (30) is given by

p k ()=min P max , k ( ) q p k ( q ) , p k ( ) .
(31)

Equipped with this result, the formal alternating maximization algorithm to solve problem (18) can be stated as follows

Algorithm 2 Solution of problem (18)

Similarly as for Algorithm 2, convergence in Algorithm 2 is declared when the value of the objective of (18) after two successive outer loops is below a given threshold. Convergence of Algorithm 2 can be proved with similar algorithms as for Algorithm 1.

From (31), it also follows that for large Pmax,k, Algorithm 2 is guaranteed to converge to the global solution of (18) in L iterations. Indeed, for large Pmax,k, after L iterations of the alternating maximization, the resulting transmit powers will be p k ()= p k (), which is the global maximizer of solution of (18). In Section 6, the performance obtained using Algorithm 2 to solve (18) will be contrasted to that achieved by solving (18) through its convex reformulation.

3.3 The proposed algorithm as a potential game

In this section, we will briefly provide a different look on the proposed algorithm, showing how it fits into the framework of game theory and in particular of potential games. Let us first give some details on non-cooperative games and potential games.

In its strategic form, a gameGcan be described as a tripletG={K, { S k } k = 1 K , { u k } k = 1 K }, whereinKis the set of players (e.g., the communicating devices in a wireless network), S k is the set of all possible strategies for the k-th player, and u k represents the utility function or payoff of the k-th player; u k is a scalar function depending on the strategies taken by all players of the game. Thus, a change in strategy from one player affects all the other players as well, and triggers a dynamic process, in which players iteratively update their own strategies as a reaction to changes in the strategies of the other players. This process is mathematically represented by the set of coupled problems

max s k u k ( s k , s k ),kK,
(32)

with s k and skbeing the k-th player’s strategy and set of the other player’s strategies, respectively. The coupled problems (32) are usually referred to as best-response dynamics (BRD), because for allkK, in the k-th iteration, given the strategies of the other players sk, player k responds by choosing his own strategy s k in order to maximize his own utility function. Each fixed point of (32), if any, is termed Nash equilibrium (NE). At an NE, no user can unilaterally improve its own utility by taking a different strategy, thus implying that each user, provided that the other users’ strategies do not change, is not interested in changing his own strategy. In general, given a generic strategic-form game, convergence of the BRD to an NE is not guaranteed, even if one or more NEs exist.

We give now the formal definition of a potential game [16]. A strategic gameG= K , S k , u k is called an exact potential game if there exists a functionV: S 1 × S 2 × S K Rsuch that for anykKand for any( s k , s k ),( s k , s k ) S 1 y× S 2 × S K , we have

u k ( s k , s k ) u k ( s k , s k )=V( s k , s k )V( s k , s k ).
(33)

The function V is called the potential function of the game. A very attractive property of potential games is that at least one NE is guaranteed to exist and that the BRD always converges to an NE, provided the potential function is upper-bounded. In our scenario, it can be seen that the distributed resource allocation algorithm can be seen as a potential game G pot , with the mobile users as players, with potential function V given by (21) and utility functions given by u k =VC k , for all k=1,…,K, with C k being the additive constant that appears in (56). Thus, the resource allocation policy obtained at the fixed point of Algorithm 1 can be regarded as an NE of G pot .

4 Energy-efficient resource allocation in saturated networks with fairness constraint

In Section 3, an energy-efficient performance function has been proposed that results at the same time in improved overall network’s performance and in a fair resource allocation to the users. This has been tackled assuming only partial CSI and thus operating with average users’ SINR expressions. In this section, a different approach is taken. The scenario in which each user k allocates his own resources to maximize the EE (8) of his own communication link is addressed. This problem will be tackled in the asymptotic regime of a saturated network in which the number of active users and the number of antennas equipped at each receiver grow to infinity with a fixed ratio K M =α. Unlike what happens in the non-asymptotic regime, it will be shown that in the asymptotic regime individual maximization of (8) is guaranteed to converge to an equilibrium. The problem can be formally stated as follows:

max { p k ( ) } = 1 L R D Q = 1 L 1 e γ k , a k as ( ) Q = 1 L p k ( ) + P c , k k = 1 , , K s.t. p k ( ) 0 = 1 , , L , = 1 L p k ( ) P max , k k = 1 , , K .
(34)

where we have denoted by γ k , a k as ()the asymptotic expression of the k-th user’s SINR in the limiting case of M,K, with K M =α. We remark that γ k , a k as ()can be evaluated as the limit of the instantaneous SINR (2), instead of the average SINR (5) because the fast-fading channels that appear in (2) will be averaged out in the asymptotic regime. Indeed, recalling that h k , a k ()= R k , a k 1 / 2 () α k , a k (), where α k , a k ()is a zero-mean uncorrelated Gaussian vector and that the diagonal entries of R k , a k 1 / 2 ()have magnitude proportional to 1/M, it is possible to leverage [36, Lemma 2.29] to show that h k , a k () 2 tr( R k , a k ())and| h k , a k () h i , a k H () | 2 tr( R k , a k () R i , a k ()). Consequently, we have

γ k , a k as ( ) = lim M , K K / M α γ k , a k inst ( ) = p k ( ) tr 2 ( R k , a k ( ) ) σ 2 tr ( R k , a k ( ) ) + i k p i ( ) tr ( R k , a k ( ) R i , a k ( ) ) ,
(35)

and we notice that, as already anticipated, (35) does not contain the users’ channels realizations and therefore can be employed at the transmitters’ side for resource allocation purposes.

Now, in the notable case of uncorrelated fading, we have R k , a k ()= 1 M d k , a k η I M , and (35) becomes

γ k , a k as ()= p k ( ) d k , a ( k ) η σ 2 + 1 M i k p i ( ) d i , a ( k ) η .
(36)

Next, in order to ensure fairness among the users in terms of throughput and delay [5, 37], we enforce the constraint that each transmit signal is received with the same power in its assigned receiver, namely p i () d i , a ( i ) η = P R (),i , wherein is the set of users transmitting on the -th carrier. Then, we can write

γ k , a k as ()= P R ( ) σ 2 + P R ( ) M i d i , a ( i ) d i , a ( k ) η .
(37)

Now, in the limit of an infinite number of users K, it is reasonable to assume that they will be uniformly distributed over the L available subcarriers, so that each subcarrier is loaded with the same number of users, and the cardinality of the set can be taken to be K/L. Consequently, the sum at the denominator of (37) converges to K L μ k , with μ k being the mean of the random variable defined as the η-th power of the ratio between the distance of a user randomly located in the network from his assigned receiver, and the distance of the same user from receiver a k . Thus, (37) becomes

γ k , a k as ()= p k ( ) d k , a ( k ) η ( ) σ 2 + α L μ k p k ( ) d k , a ( k ) η ( ) ,
(38)

and we notice that multiuser interference has been averaged out, as it was expected [26]. Equipped with this result, iterations (34) can be recast as

max { p k ( ) } = 1 L R D Q = 1 L 1 exp p k ( ) d k , a ( k ) η ( ) σ 2 + α L μ k p k ( ) d k , a ( k ) η ( ) Q = 1 L p k ( ) + P c , k k = 1 , , K s.t. p k ( ) 0 = 1 , , L , = 1 L p k ( ) P max , k k = 1 , , K ,
(39)

and the following proposition holds.

Proposition 4

Iterations (39) are guaranteed to converge to an equilibrium in K iterations.

Proof

Since multiuser interference is averaged out in the asymptotic SINR, we infer that the K problems in (39) can be decoupled and independently solved. Therefore, after all of the K users have solved their corresponding maximization problem in (39), a fixed point is reached. □

We remark that the solution to the generic k-th problem in (39) can be obtained by means of the alternating maximization algorithm, in a similar fashion as for Algorithm 2.

5 Distributed energy-efficient resource allocation in relay-assisted systems

In this section, we show how the approach proposed in Section 3 extends to two-hop, relay-assisted interference networks. The system model of Section 3 will be modified by adding a fixed, single-antenna, amplify-and-forward (AF) relay between transmitters and receivers. In each symbol interval, the base-band, discrete-time model of the signal received by the relay on subcarrier is given by

y r ()= k = 1 K p k ( ) h k () b k ()+ w r (),
(40)

wherein h k () is the k-th user’s complex channel coefficient to the relay on subcarrier , modeled as a realization of a zero-mean Gaussian random variable with variance σ h k 2 (), while w r () is the thermal noise on subcarrier , modeled as a realization of a zero-mean complex circular Gaussian variable with variance σ r 2 . In order to avoid amplifier saturation at the relay, y r () is to be normalized by the square root of its power P t () [25, 38], which can be computed as

P t ()=E[| y r () | 2 ]= σ r 2 + k = 1 K p k ()| h k () | 2 ,
(41)

where we have exploited the fact that the noise is uncorrelated with the information symbols, and that information symbols from different users are uncorrelated with each other. After normalization, y r () is amplified by the amplification factor a R 2 ()subject to the power constraint = 1 L a R 2 () P r , with P r denoting the available relay power. It is to be mentioned that an equivalent approach would be to avoid normalizing y r () and considering the relay power constraint = 1 L a R 2 () P t () P r . However, such an approach has the drawback that the relay power constraints should also be enforced on the transmitters. Indeed, since the relay has no control over the terms P t (), in order to guarantee that it is always possible to meet the relay power constraint, each transmitter k should allocate its transmit powers { p k ( ) } = 1 L not only based on its maximum feasible transmit power but also so as to fulfill the relay power constraint with respect to { p k ( ) } = 1 L , namely considering the additional constraint

= 1 L a R 2 ( ) p k ( ) | h k ( ) | 2 P r = 1 L a R 2 ( ) × σ r 2 + i k K p i ( ) | h i ( ) | 2
(42)

This introduces a coupling between the relay and the mobile users which is not always easy to manage in distributed systems like an interference network. Instead, the normalization approach has the advantage of making the relay completely independent of the mobile users, ensuring that the relay amplifier never goes into saturation without having to enforce additional constraints on the transmitters.

After amplification, the signal is forwarded to the multiple-antenna receiversb. Assuming that the distance between transmitters and receivers is such that the magnitude of the signal received directly from the transmitters is negligible with respect to the relayed signal, the SINR achieved by the k-th user in its intended receiver j=a(k) after MRC reception by the filter h k g a k is given by

γ k , a k inst ()= p k ( ) a R 2 ( ) | h k ( ) | 4 g a k ( ) 4 σ 2 | h k ( ) | 4 g a k ( ) 2 p k ( ) + | h k ( ) | 2 g a k ( ) 2 a R 2 ( ) g a k ( ) 2 + σ 2 σ r 2 + i k p i ( ) | h i ( ) | 2
(43)

wherein g j () denotes the vector channel between the relay and receiver j, modeled as a realization of a zero-mean Gaussian random vector with covariance matrix R g j (). The main difference of the considered scenario with respect to one-hop systems is that the useful power p k () also appears at the denominator of the SINR, whereas in the one-hop case the SINR was simply proportional to the useful power.

Now, in order to design a distributed resource allocation algorithm, the first step is to obtain an average expression of the SINR with respect to the users’ channels. As for the numerator N k , a k ()of (43), leveraging the results of Section 3.1, we have

E N k , a k ( ) = p k ( ) a R 2 ( ) E | h k ( ) | 4 E | g a k H ( ) g a k ( ) | 2 = p k ( ) a R 2 ( ) 3 σ h k 4 ( ) tr 2 ( R g a k ( ) ) + 2 tr ( R g a k ( ) R g a k H ( ) ) ,
(44)

where we have also exploited the fact that h k () and g a k ()are statistically independent with one another. As for the denominator, the average of the term that depends on the useful power p k can be computed as

p k ( ) σ 2 E | h k ( ) | 4 E g a k ( ) 2 = p k ( ) σ 2 3 σ h k 4 ( ) tr ( R g a k ( ) ) ,
(45)

and the average of the remaining term can be computed similarly as

E | h k ( ) | 2 a R 2 ( ) g a k ( ) 4 + σ 2 g a k ( ) 2 × E σ r 2 + i k p i ( ) | h i ( ) | 2 =
(46)
σ h k 2 ( ) a R 2 ( ) tr 2 ( R g a k ( ) ) + 2 tr ( R g a k ( ) R g a k H ( ) ) + σ 2 tr ( R g a k ( ) ) σ r 2 + i k p i ( ) σ h i 2 ( )
(47)

Finally, defining for notational convenience the quantities R g a k ()= tr 2 ( R g a k ( ) ) + 2 tr ( R g a k ( ) R g a k H ( ) ) and z k ()= σ r 2 σ h k 2 () a R 2 ( ) R g a k ( ) + σ 2 tr ( R g a k ( ) ) , for all k=1,…,K, the average SINR enjoyed by the k-th user in its assigned receiver on subcarrier is expressed as

Next, we follow the approach of Section 3 and consider the optimization problem (6) with (16) as objective function and the new SINR expression (48). The variables to optimize are not only the users’ powers but also the relay amplification factors { a R 2 ( ) } = 1 L . With respect to the choice of (16) as objective in relay-assisted systems, one remark is in order. The main reason to optimize the EE in wireless networks is to limit the energy consumption of battery-powered terminals, in order to prolong their lifetime. However, fixed relays are usually linked to the electrical supply network and therefore have a virtually indefinite lifetime, which makes the investigation of energy-efficient relaying protocols of little practical interest. For this reason, the power consumed by the relay will not be included in the denominator of (48) and the scenario to be tackled is that in which the relay always employs its full power to maximize (16) in order to help the mobile nodes improve their own energy-saving capabilities. Then, a similar resource allocation algorithm as Algorithm 1 can be stated as follows.

Algorithm 3 Distributed resource allocation in relay-assisted systems

Convergence of Algorithm 3 can be proved with similar arguments as for Algorithm 1, since after each step, the objective (16) is not decreased. In order to implement Algorithm 3, both the relay optimization problem as well as problem (17) with the new SINR expression (48) need to be solved. These two goals are accomplished in the following two sections.

γ k , a k ()= p k ( ) a R 2 ( ) 3 σ h k 4 ( ) R g a k ( ) p k ( ) σ 2 3 σ h k 4 ( ) tr ( R g a k ( ) ) + z k ( ) + i k p i ( ) σ h i 2 ( ) σ h k 2 ( ) σ 2 tr ( R g a k ( ) ) + a R 2 ( ) R g a k ( )
(48)

5.1 Relay optimization

To begin with, we observe that only the numerator of (16) depends on { a ( ) } = 1 L , through the users’ SINRs γ k , a k (). Then, the relay optimization problem can be formulated as

max { a R 2 ( ) } = 1 L n = 1 K = 1 L e Q β n / γ n , a n ( ) s.t. a R 2 ( ) 0 = 1 , , L , = 1 L a R 2 ( ) P r .
(49)

The following proposition holds.

Proposition 5

The objective of problem (49) is a log-concave function of { a R 2 ( ) } = 1 L .

Proof

Applying the logarithmic function to the objective of (49), we obtain

ln n = 1 K = 1 L e Q β n / γ n , a n ( ) =Q n = 1 K = 1 L β n γ n , a n ( ) =Q n = 1 K = 1 L β n ( a R 2 ( ) δ n ( ) + ψ n ( ) ) a R 2 ( ) ϕ n ( ) ,
(50)

with ϕ n ()=3 p n () σ h n 4 () R g a n (), δ n ()= σ r 2 σ h n 2 () R g a n ()+ i n p i () σ h n 2 () σ h i 2 () R g a n (), and ψ n ()= p n () σ 2 3 σ h n 4 ()tr( R g a n ())+ σ r 2 σ 2 σ h n 2 ()tr( R g a n ())+ i n p i () σ 2 σ h i 2 () σ h n 2 ()tr( R g a n ()). Denote by v n () the generic summand in (50). Computing the second-order derivative of v n () with respect to a R 2 ()yields

2 v n ( ) 2 a R 2 ( ) = 2 Q β n ψ n ( ) ϕ n ( ) ( a R 2 ( ) ) 3 0
(51)

As a consequence, the relay amplification factors on each subcarrier can be found by solving a convex problem equivalent to (49), which is obtained by simply considering the logarithm of the objective.

5.2 Transmitters optimization

In order to solve problem (17) for all k=1,…,K, the following proposition is provided, which extends the results of Proposition 3 to the relay-assisted scenario.

Proposition 6

Assume the generic k-th user’s average SINR is expressed as in (48). Then, for any k = 1,…,K, problem (17) can be restated as

max { p k ( ) } = 1 L = 1 L p k ( ) μ k ( ) + ν k ( ) p k ( ) α k ( ) + λ k ( ) p k ( ) + ln p k ( ) + P c , k s.t. p k ( ) 0 = 1 , , L , = 1 L p k ( ) P max , k .
(52)

wherein

μ k ( ) = Q β k σ 2 3 σ h k 4 ( ) tr ( R g a k ( ) ) , ν k ( ) = Q β k z k ( ) + i k p i ( ) σ h k 2 ( ) σ h i 2 ( ) σ 2 tr ( R g a k ( ) ) + a R 2 ( ) R g a k ( )
(53)
α k ( ) = 3 a R 2 ( ) σ h k 4 ( ) R g a k ( ) , λ k ( ) = Q n k β n σ 2 σ h k 2 ( ) σ h n 2 ( ) tr ( R g a n ( ) ) + a R 2 ( ) σ h n 2 ( ) σ h k 2 ( ) R g a n ( ) 3 a R 2 ( ) σ h n 4 ( ) R g a n ( ) p n ( ) .
(54)

Moreover, the objective of (52) has a unique maximizer, which lies in its concave region.

Proof. The proof of this result follows along the same lines as the proof of Proposition 3. First, applying the logarithmic function to (16), we obtain

Kln RD Q +ln n = 1 K = 1 L e Q β n / γ n , a n ( ) p n ( ) + P c , n =Kln RD Q n = 1 K = 1 L Q β n γ n , a n ( ) + ln p n ( ) + P c , n .
(55)

Next, plugging the average SINR expression (48) into (55) yields

Q β k = 1 L p k ( ) σ 2 3 σ h k 4 ( ) tr ( R g a k ( ) ) + z k ( ) + i k p i ( ) σ h k 2 ( ) σ h i 2 ( ) σ 2 tr ( R g a k ( ) ) + a R 2 ( ) R g a k ( ) p k ( ) 3 a R 2 ( ) σ h k 4 ( ) R g a k ( ) n k = 1 L p k ( ) Q β n σ 2 σ h k 2 ( ) σ h n 2 ( ) tr ( R g a n ( ) ) + a R 2 ( ) σ h n 2 ( ) σ h k 2 ( ) R g a n ( ) p n ( ) 3 a R 2 ( ) σ h n 4 ( ) R g a n ( ) = 1 L ln p k ( ) + P c , k + C k ,
(56)

with C k including all the terms that do not depend on the k-th user’s transmit powers. Then, it can be seen that (56) coincides with the objective of (52), which proves the firstpart of the thesis. As for the second part, let us denote each summand of the objective of (18) as the function

f k ( p k ())= p k ( ) μ k ( ) + ν k ( ) p k ( ) α k ( ) + λ k ( ) p k ( ) + ln p k ( ) + P c , k .
(57)

Next, we note that f k (p k ()) can be equivalently written as

f k ( p k ())= μ k ( ) α k ( ) + ν k ( ) / α k ( ) p k ( ) + λ k ( ) p k ( ) + ln p k ( ) + P c , k .
(58)

Comparing (58) with (23), it follows that, up to the constant term μ k ( ) α k ( ) , for all =1,…,L, f k (p k ()) is formally equivalent to the function g k (p k ()) given by (23), which was encountered in the proof of Proposition 3. Consequently, since the constant term μ k ( ) α k ( ) vanishes when computing the derivatives of (58), and since the properties that were shown to hold for g k (p k ()) in the proof of Proposition 3 were derived assuming no particular expression for the coefficients a k () and c k (), the two functions f k (p k ()) and g k (p k ()) will enjoy similar properties and the line of reasoning employed in Proposition 3 can be replicated here to obtain the thesis. □

Therefore, similarly to the one-hop case, also in the relay-assisted scenario, it is possible to recast the generic k-th problem in (6) in convex form without loss of generality by simply restricting the feasible set to the concave region of the objective. Moreover, for applications in which computational complexity is a major issue, a similar algorithm as Algorithm 2 can be devised resorting to the alternating maximization technique, in order to convert problem (17) into a sequence of scalar problems.

6 Numerical results

An interference network operating in a square area of 2,800×2,800 m2has been considered. The network consists of J=4 receivers, each one equipped with M=4 antennas, placed at points inside the square with coordinates (700;700), (700;2,100), (2,100;700), and (2,100;2,100), respectively, and of mobile users placed randomly inside the square. Each user is assigned to the receiver toward which he has the best channel coefficient. The system bit rate has been set to R=100 kbits/s, the maximum feasible transmit power to Pmax,k=0 dBW for all k=1,…,K, the noise power to σ2=10−9W, the power decay factor to η=2, and the circuit power Pc,k=100 dBm, for all k=1,…,K. The performance is analyzed with reference to the transmission of each single symbol, thus setting Q=1. The channel vectors h k , a k ()have been modeled as zero-mean Gaussian random vectors with covariance matrix d k , a k η M R, where R has been generated according to the exponential correlation model with correlation coefficient ρ. The presented results have been obtained by averaging over 104random realizations for all system parameters. The number of active users ranges up to K=15, while the number of subcarriers available to each user has been set to L=3. Thus, a very hostile operating condition is considered, since the network load ranges up to K/L=5. Figures 2 and 3 and Table 1 refer to the case ρ=0, thus addressing the notable case of independent channel coefficients. Figures 2 and 3 address the performance of Algorithm 1. Figure 2

Figure 2
figure 2

ρ = 0. Minimum EE [bits/J].(blue solid line with circle) Fixed point of Algorithm 1 with alternating maximization; (red dashed line with diamond) fixed point of Algorithm 1 with convex reformulation of problem (18); (black solid line) Algorithm 1 implemented with instantaneous, perfect CSI; (blue dashed line) initial minimum EE.

Figure 3
figure 3

ρ = 0. Achieved value of (21). (Blue solid line with circle) Fixed point of Algorithm 1 with alternating maximization; (red dashed line with diamond) fixed point of Algorithm 1 with convex reformulation of problem (18); (black solid line) fixed point of Algorithm 1 implemented with instantaneous, perfect CSI.

Table 1 ρ = 0, average number of outer loops needed for Algorithm 1 to converge versus the number of active users

evaluates the performance of Algorithm 1 in terms of the minimum EE, over the users, versus the number of active users. Otherwise stated, the shown performance metric is mink EE k , with EE k being the standard EE (8), achieved at the fixed point of Algorithm 1. It is to be stressed that the instantaneous EE has been plotted, meaning that once Algorithm 1 has converged, the resulting transmit powers have been used to evaluate the instantaneous achieved SINR (2) and then to compute the EE (8). The following scenarios have been contrasted:

  • Algorithm 1 implemented by solving the generic k-th problem of (17) according to Algorithm 2

  • Algorithm 1 implemented by solving the generic k-th problem of (17) by means of its convex reformulation.

  • As a benchmark, the minimum EE obtained when Algorithm 1 is run with perfect, instantaneous CSI is reported.

  • Initial minimum EE resulting from a random power allocation over the available subcarriers. This scenario is shown for comparison purposes, since it represents the minimum EE before the resource allocation scheme comes into play.

Results clearly show that the proposed games with statistical CSI largely improve the initial EE while suffering a limited gap with respect to the instantaneous CSI benchmark, even for very high network loads. It is also interesting to note how the performance of Algorithm 1 are virtually identical when problem (17) is solved by means of Algorithm ?? and by its convex reformulation, thus indicating that the low-complexity Algorithm 2 can effectively substitute standard numerical algorithms.

Figure 3 considers a similar scenario, with the difference that the shown performance metric is the social welfare function (21). Similar remarks as for Figure 2 hold.

Table 1 contrasts the average number of outer loops needed for Algorithm 1 to reach convergence when statistical and instantaneous CSI is available. As expected, the number of iterations increases with the network load, but it is still satisfactory even for high network loads. Also, it is seen that the number of required iterations with statistical CSI is only slightly lower than that with perfect CSI.

Next, we focus on the case in which the network is affected by correlated fading. In Figure 4, it has been set ρ=0.5, and a similar scenario as in Figure 2 is shown. It is seen that also with correlated fading, Algorithm 1 enjoys similar properties as with uncorrelated fading, and similar remarks as for the case ρ=0 can be made. Similar results, which are omitted for brevity’s sake, have been obtained when the performance metric is the social welfare function (21) instead of the minimum EE.

Figure 4
figure 4

ρ=0.5 , minimum EE [bits/J]. (Blue solid line with circle) Fixed point of Algorithm 1 with alternating maximization; (red dashed line with diamond) fixed point of Algorithm 1 with convex reformulation of problem (18); (black solid line) Algorithm 1 implemented with instantaneous, perfect CSI; (blue dashed line) initial minimum EE.

Finally, in Figure 5, the asymptotic scenario of Section 4 is addressed. In order to obtain an insight as to how large K and M need to be for the asymptotic expression (36) to be valid, the average, over the users and subcarriers, instantaneous SINR 1 KL k = 1 K = 1 L γ k , a k inst ()and its asymptotic approximation 1 KL k = 1 K = 1 L γ k , a k as (), with γ k , a k as ()expressed as in (36), have been contrasted for increasing K and M=K/α, with α=0.5. The results show that a good approximation is already obtained for K≈20.

Figure 5
figure 5

Average instantaneous SINR against its asymptotic approximation. α = 0.5.

7 Conclusions

This paper has dealt with the problem of distributed resource allocation in the uplink of a multi-carrier interference network with multiple receive antennas. A performance metric that trades off between the need for improved overall EE and the need for a fair resource allocation has been proposed, and distributed resource allocation algorithms that are guaranteed to converge to a stable equilibrium have been devised, relying only on statistical CSI at the transmitters’ side. Both one-hop and two-hop networks have been considered. The proposed algorithms have an affordable computational load, since they only require the solution of convex problems. Individual EE maximization in one-hop saturated network in which the number of users and of receive antennas in each receiver grow large with a fixed ratio has also been tackled. Also in this case, a distributed resource allocation algorithm that converges to a stable equilibrium has been designed. Finally, numerical results have been provided to assess the performance of the proposed procedures.

Endnotes

a A function is said to be S-shaped if there exists a point below which it is convex and above which it is concave.

b The forwarded signal is transmitted on an orthogonal channel, usually by means of frequency or time division duplex, to avoid interference with the incoming signal from the users.

References

  1. Goodman D, Mandayam N: Power control for wireless data. IEEE Pers. Commun 2000, 7: 48-54. 10.1109/98.839331

    Article  Google Scholar 

  2. Saraydar C, Mandayam N, Goodman D: Efficient power control via pricing in wireless data networks. IEEE Trans. Commun 2002, 50(2):291-303. 10.1109/26.983324

    Article  Google Scholar 

  3. Saraydar CU, Mandayam NB, Goodman DJ: Pricing and power control in a multicell wireless data network. IEEE J. Select. Areas Commun 2001, 19(10):1883-1892. 10.1109/49.957304

    Article  Google Scholar 

  4. Meshkati F, Poor HV, Schwartz SC, Mandayam NB: An energy-efficient approach to power control and receiver design in wireless data networks. IEEE Trans. Commun 2005, 53(11):1885-1894. 10.1109/TCOMM.2005.858695

    Article  Google Scholar 

  5. Buzzi S, Poor HV: Joint receiver and transmitter optimization for energy-efficient CDMA communications. IEEE J. Select. Areas Commun 2008, 26(3):459-472.

    Article  Google Scholar 

  6. Buzzi S, Poor H, Zappone A: Transmitter waveform and widely linear receiver design: noncooperative games for wireless multiple-access networks. IEEE Trans. Inf. Theory 2010, 56(10):4874-4892.

    Article  MathSciNet  Google Scholar 

  7. Lasaulce S, Hayel Y, El Azouzi R, Debbah M: Introducing hierarchy in energy games. IEEE Trans. Wireless Commun 2009, 8(7):3833-3843.

    Article  Google Scholar 

  8. Treust M, Lasaulce S: A repeated game formulation of energy-efficient decentralized power control. IEEE Trans. Wireless Commun 2010, 9(9):2860-2869.

    Article  Google Scholar 

  9. Zappone A, Buzzi S, Jorswieck E: Energy-efficient power control and receiver design in relay-assisted DS/CDMA wireless networks via game theory. IEEE Commun. Lett 2011, 15(7):701-703.

    Article  Google Scholar 

  10. Meshkati F, Chiang M, Poor H, Schwartz S: A game-theoretic approach to energy-efficient power control in multicarrier CDMA systems. IEEE J. Select. Areas Commun 2006, 24(6):1115-1129.

    Article  Google Scholar 

  11. Moretti M, Todini A: A resource allocator for the uplink of multi-cell OFDMA systems. IEEE Trans. Wireless Commun 2007, 6(8):2807-2812.

    Article  Google Scholar 

  12. Han Z, Ji Z, Liu K: Non-cooperative resource competition game by virtual referee in multi-cell OFDMA networks. IEEE J. Select. Areas Commun 2007, 25(6):1079-1090.

    Article  Google Scholar 

  13. Yang K, Prasad N, Wang X: An auction approach to resource allocation in uplink OFDMA systems. IEEE Trans. Signal Proc 2009, 57(11):4482-4496.

    Article  MathSciNet  Google Scholar 

  14. Bacci G, Bulzomato A, Luise M: Uplink power control and subcarrier assignment for an OFDMA multicellular network based on game theory. In Int. Conf. on Performance Evaluation Methodologies and Tools (ValueTools). Paris; 16–20 May 2011.

    Google Scholar 

  15. Buzzi S, Colavolpe G, Saturnino D, Zappone A: Potential games for energy-efficient power control and subcarrier allocation in uplink multicell OFDMA systems. IEEE J. Select. Topics Signal Proc 2012, 6(2):89-103.

    Article  Google Scholar 

  16. Monderer D, Shapley L: Potential games. Games Econ. Behav 1996, 14: 124-143. 10.1006/game.1996.0044

    Article  MathSciNet  Google Scholar 

  17. Scutari G, Barbarossa S, Palomar D: Potential games: a framework for vector power control problems with coupled constraints. In 2006 IEEE Internationa Conference on Acoustics, Speech and Signal Processing. Toulouse; 14.

    Google Scholar 

  18. Quang DL, Yong HC, Soong BH: An interference-minimization potential game for OFDMA-based distributed spectrum sharing systems. IEEE Trans. Vehic. Tech 2011, 60(7):3374-3385.

    Article  Google Scholar 

  19. Quang DL, Yong HC, Soong BH: Performance analysis of downlink multi-cell OFDMA systems based on potential game. IEEE Trans. Wireless Commun 2012, 11(9):3358-3367.

    Article  Google Scholar 

  20. Betz S, Poor HV: Energy efficient communications in CDMA networks: a game theoretic analysis considering operating costs. IEEE Trans. Signal Proc 2008, 56(10):5181-5190.

    Article  MathSciNet  Google Scholar 

  21. Miao G, Himayat N, Li GY, Talwar S: Distributed interference-aware energy-efficient power optimization. IEEE Trans. Wireless Commun 2011, 10(4):1323-1333.

    Article  Google Scholar 

  22. Chong Z, Jorswieck EA: Energy-efficient power control for MIMO time-varying channels. IEEE Online Green Communications Conference 26–29 September 2011.

    Google Scholar 

  23. Isheden C, Chong Z, Jorswieck E, Fettweis G: Framework for link-level energy efficiency optimization with informed transmitter. IEEE Trans. Wireless Commun 2012, 11(8):2946-2957.

    Google Scholar 

  24. Zappone A, Chong Z, Jorswieck E, Buzzi S: Green resource allocation in relay-assisted multicarrier IC networks considering circuit dissipated power. In Third International Conference on Future Energy Systems (E-energy 2012). Madrid; 9.

    Google Scholar 

  25. Zappone A, Chong Z, Jorswieck E, Buzzi S: Energy-aware competitive power control in relay-assisted interference wireless networks. IEEE Trans. Wireless Commun 2013, 12(4):1860-1871.

    Article  Google Scholar 

  26. Marzetta T: Noncooperative cellular wireless with unlimited numbers of base station antennas. IEEE Trans. Wireless Commun 2010, 9(11):3590-3600.

    Article  Google Scholar 

  27. Jindal N, Andrews J, Weber S: Multi-antenna communication in ad hoc networks: Achieving MIMO gains with SIMO transmission. IEEE Trans. Commun 2011, 59(2):529-540.

    Article  Google Scholar 

  28. Huh H, Caire G, Papadopoulos H, Ramprashad S: Achieving massive MIMO spectral efficiency with a not-so-large number of antennas. Accessed 13 September 2011 [http://arxiv.org/abs/1107.3862] [] Accessed 13 September 2011

  29. Belmega E, Lasaulce S: Energy-efficient precoding for multiple-antenna terminals. IEEE Trans. Signal Proc 2011, 59: 329-340.

    Article  MathSciNet  Google Scholar 

  30. Meshkati F, Goldsmith A, Poor H, Schwartz S: A game-theoretic approach to energy-efficient modulation in CDMA networks with delay QoS constraints. IEEE J Select. Areas Commun 2007, 25(6):1069-1078.

    Article  Google Scholar 

  31. Ghosh A, Zhang J, Andrews JG, Muhamed R: Fundamentals of LTE. Upper Saddle River, NJ: Prentice Hall Communications Engineering and Emerging Technologies Series; 2011.

    Google Scholar 

  32. Ng DWK, Lo ES, Schober R: Energy-efficient resource allocation in multi-cell OFDMA systems with limited Backhaul capacity. IEEE Trans. Wireless Commun 2012, 11(10):3618-3631.

    Article  Google Scholar 

  33. Mazumdar R, Mason LG, Dougligeris C: Fairness in network optimal flow control: optimality of product forms. IEEE Trans. Commun 1991, 39(5):775-782. 10.1109/26.87140

    Article  Google Scholar 

  34. Boche H, Naik S: Revisiting proportional fairness: anonymity among users in interference coupled wireless systems. IEEE Trans. Commun 2010, 58(10):2995-3000.

    Article  Google Scholar 

  35. Bertsekas D: Nonlinear Programming. Belmont, MA: Athena Scientific; 1999.

    Google Scholar 

  36. Tulino A, Verdú S: Random matrix theory and wireless communications. Hanover, MA: Now Publishers Inc; 2004.

    Google Scholar 

  37. Tse D, Hanly S: Linear multiuser receivers: Effective interference, effective bandwidth and user capacity. IEEE Trans. Inf Theory 1999, 45: 641-657. 10.1109/18.749008

    Article  MathSciNet  Google Scholar 

  38. Ren S, van der Schaar M: Pricing and distributed power control in wireless relay networks. IEEE Trans. Signal Proc 2011, 59(6):2913-2926.

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The work of Alessio Zappone has received funding from the German Research Foundation (DFG) project CEMRIN, under grant ZA 747/1-1. The work of Giuseppa Alfano, Stefano Buzzi, and Michela Meo has received funding from the European Union Seventh Framework Programme (FP7/2007-2013) under grant agreement no. 257740 (Network of Excellence "TREND"), from the Regional Project MASP, Regione Piemonte, Torinowireless 2009, and by the Network of Excellence NEWCOM , grant agreement no. 318306.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alessio Zappone.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Zappone, A., Alfano, G., Buzzi, S. et al. Distributed energy-aware resource allocation in multi-antenna multi-carrier interference networks with statistical CSI. J Wireless Com Network 2013, 205 (2013). https://doi.org/10.1186/1687-1499-2013-205

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2013-205

Keywords