 Research
 Open access
 Published:
Distributed energyaware resource allocation in multiantenna multicarrier interference networks with statistical CSI
EURASIP Journal on Wireless Communications and Networking volume 2013, Article number: 205 (2013)
Abstract
Resource allocation for energy efficiency optimization in multicarrier interference networks with multiple receive antennas is tackled. First, a onehop network is considered, and then, the results are extended to the case of a twohop network in which amplifyandforward relaying is employed to enable communication. A distributed algorithm which optimizes a systemwide energyefficient performance function, and which is guaranteed to converge to a stable equilibrium point, is provided. Unlike most previous works, in the definition of the energy efficiency, not only the users’ transmit power but also the circuit power that is required to operate the devices is taken into account. All of the proposed procedures are guaranteed to converge and only require statistical channel state information, thus lending themselves to a distributed implementation. The asymptotic regime of a saturated network in which both the active users and the number of receive antennas deployed in each receiver grow large is also analyzed. Numerical results are provided to confirm the merits of the proposed algorithms.
1 Introduction
In the recent past, the growing concerns on sustainable growth due to the exponential increase in the use of mobile communication devices, as well as the need to maximize battery life in mobile handsets, garnered a great interest for resource allocation techniques aimed at the maximization of the energy efficiency (EE), measured in bits per Joule, at the physical layer of wireless networks. While more traditional resource allocation techniques pursue the optimization of the network’s performance in terms of throughput, which usually comes at the expense of battery life, an energyefficient resource allocation aims at the maximization of performance measures that take into account the tradeoff between achieving a high throughput and saving as much battery power as possible.
Pioneering works in the area of distributed resource allocation for EE are [1–3]. There, the EE is defined as the ratio between the users’ throughput and the transmit power, and energyefficient power control algorithms for the uplink of wireless networks are provided.
The results of [1–3] have been extended in several directions in many following studies. In [4], joint linear receiver design and power control is pursued for CDMA networks, while in [5], spreading code optimization is also plugged into the resource allocation process. In [6], the impact of widely linear filtering on the EE of wireless networks is investigated. In [7], a hierarchical approach based on Stackelberg games is used to tackle the energyefficient power control problem, while in [8], a power control algorithm based on a repeatedgame approach is proposed. In [9], the impact of relaying on the EE of wireless networks is studied.
Most of the above works deal with multipleaccesschannel systems. In [10], instead, a multicarrier interference network is considered, and the problem of distributed EE maximization through individual power allocation over the available subcarriers is investigated. However, the proposed algorithm is not guaranteed to converge to a stable equilibrium point. In [11], the uplink of multicell orthogonal frequencydivision multiple access (OFDMA) network is considered, and a resource allocator aiming at minimizing the total transmitted power subject to individual rate constraints is studied. The results indicate that the proposed algorithm converges to a stable resource allocation policy only when the interference load is below a certain threshold. In [12], a gametheoretic approach to subcarriers, modulation format, and power allocation for transmit power minimization with rate constraints is considered. Again, the proposed game is not guaranteed to converge to an equilibrium, and for this reason, a virtual referee is introduced to dictate the resource allocation and force it to a stable and efficient equilibrium point. In [13], an auction approach to subcarrier, modulation, and coding scheme allocation in singlecell and multicell OFDMA networks is proposed, and the simplification is made to divide the users in each cell between interior and edge users, assuming that the inner users in each cell do not interfere with adjacent cells. In [14], energyefficient subcarrier and transmit power allocation in the uplink of an OFDMA interference network is considered. However, in order to ensure the convergence of the resulting algorithm, subcarrier assignment is performed in a centralized fashion. In [15], a novel systemwide energyefficient performance metric is proposed, which allows for a completely distributed and convergent power and subcarrier allocation in multicarrier interference networks. There, the resource allocation problem is formulated as a potential game [16], with potential function given by the systemwide performance function to be maximized. Potential games for resource allocation in wireless multiuser networks have also been considered in [17–19].
In [15], as in all previously cited works, as far as the definition of the EE is concerned, only the transmit power is considered, whereas a more meaningful definition of the EE is obtained when not only the transmit power but also the power that is dissipated in the electronic circuitry of each terminal in order to operate the device is accounted for [20–25]. Moreover, previous works on distributed EE in interference networks deal with singleantenna systems, whereas it is confirmed that a crucial key ingredient of today’s and future wireless networks will be the use of multiple antennas, which may be very helpful in providing diversity gains and dramatically increasing the system performance in terms of effective data rates and network coverage [26–28]. First, results on EE in multipleantenna systems are [22, 29], where singleuser multipleinput multipleoutput (MIMO) systems are considered and the optimal energyefficient covariance matrix is determined.
Motivated by this background, this paper extends the results of [15] in the following directions:

The transmitter circuit powers are taken into account in the definition of the users’ energy efficiency, which complicates the analysis.

Multipleantenna receivers are considered, and unlike [15], only statistical channel state information (CSI) is assumed at the transmitter side, which reduces the amount of feedback required to implement the proposed algorithms.

A twohop interference network in which communication takes place by means of an amplifyandforward relay is also considered.
In this challenging scenario, distributed algorithms for energyefficient joint subcarrier and power allocation are devised. The proposed algorithms require only the solution of convex problems, which makes their implementation feasible in real world systems, and will be shown to always converge to a stable equilibrium point. EE maximization will also be tackled in the asymptotic regime of a saturated interference network in which both the number of active users and of receive antennas grow large with a fixed ratio.
The remainder of this paper is organized as follows. Section 2 describes the considered system model. Section 3 investigates the energyefficient resource allocation problem, providing the tools to devise suitable resource allocation algorithms. Section 4 contains the asymptotic analysis for saturated networks. In Section 5, the results of 3 are extended to the relayassisted scenario, while Section 6 is devoted to the numerical results. Concluding remarks are given in Section 7.
2 System model
Consider the uplink of a K×J multicarrier interference network. Each receiver is equipped with M receive antennas, and for all k=1,…,K, a_{ k }∈{1,2,…,J} denotes the intended receiver for user k. It is assumed here that receiver assignment has been performed in a previous phase, and we focus on the resource allocation problem only. Let \mathcal{\mathcal{L}}=\{1,2,\dots ,L\} be the set of available subcarriers in the system, and denote by p_{ k }(ℓ) the kth user’s transmit power on subcarrier ℓ, and by h_{k,j,m}(ℓ) the complex channel gain between the kth user and the mth antenna of the jth receiver on the ℓth subcarrier, modeled as a realization of a zeromean Gaussian random variable with variance \frac{{d}_{k,j}^{\eta}}{M}, with d_{k,j} and η denoting the distance between the kth mobile user and the jth BS, and the path loss exponent, respectively. Let us also define the channel vector h_{k,j}(ℓ)= [ h_{k,j,1}(ℓ),…,h_{k,j,M}(ℓ)]^{T}, with (·)^{T} denoting transpose, modeled as a zeromean Gaussian random vector with covariance matrix R_{k,j}(ℓ).
In the following, only statistical CSI is assumed at the transmitters’ side, in terms of secondorder statistics of the channel coefficients and vectors.
Now, for all j=1,…,J, the data received on the M antennas over subcarrier ℓ can be expressed as the Mdimensional vector
wherein b_{ k }(ℓ) is the information symbol transmitted by the kth user on the ℓth subcarrier frequency, w_{ j }(ℓ)=[ w_{j,1}(ℓ),…,w_{j,M}(ℓ)]^{T} is the additive noise term, modeled as a zeromean Gaussian random vector with covariance matrix σ^{2}I_{ M }. In each receiver, the received data are processed by means of maximum ratio combining (MRC). The resulting instantaneous signaltointerferenceplusnoise ratio (SINR) for the kth user is thus expressed, for all k=1,…,K, as
In this scenario, the aim is to devise a transmit power and subcarrier allocation algorithm that optimizes the network’s EE in a distributed way. Here, by distributed, we mean that the resource allocation process is not jointly carried out by a computational center which computes the optimum resource allocation policy, feeding back the results to the transmitters. Instead, each transmitter should allocate its own resources in a selforganizing way. This is a very important feature especially in networks that, by their own nature, lack a central control unit that dictates the resource allocation policy, which is the case for example in relevant communication systems like ad hoc networks and interference networks.
3 Distributed energyefficient resource allocation
The aim of this section is to derive a distributed energyefficient resource allocation algorithm. The main challenge in deriving a distributed algorithm in interference networks is that typically global CSI is needed. Otherwise stated, each user also needs to know other users’ channels, which requires a too great amount of overhead information to feedback. In order to circumvent this problem, the proposed algorithm will be designed so as to require only statistical CSI at the transmitter side. Since channel statistics vary at a very slow rate compared to the actual channel realizations, feeding back only statistical CSI significantly reduces the amount of required overhead. Moreover, channel statistics can be estimated more easily than channel coefficients at the receivers. It is also to be mentioned that present multicell networks are typically endowed with a highspeed backhaul link which allows the receivers to exchange information with one another. Therefore, each receiver can easily learn the channel statistics also of users that are not associated to it and then feedback this information to its associated transmitters. Again, the overhead information to be exchanged on the backhaul link due to the resource allocation algorithm is quite limited since only channel statistics need to be shared. Thanks to these features, the algorithm to be developed lends itself to a distributed implementation at the transmitter side.
To begin with, we remark that since the resource allocation takes place at the transmitters, the instantaneous SINR expression (2) cannot be used for resource allocation purposes, because each transmitter only has statistical CSI. Thus, before turning to the analysis of the resource allocation algorithm, an average SINR expression is needed.
3.1 Users’ average SINR
The average power {U}_{k,{a}_{k}}\left(\ell \right) of the kth user’s intended symbol, in his assigned receiver a_{ k }, on subcarrier ℓ, is given by
with {\mathit{\alpha}}_{k,{a}_{k}}\left(\ell \right)={\mathit{R}}_{k,{a}_{k}}^{1/2}\left(\ell \right){\mathit{h}}_{k,{a}_{k}}\left(\ell \right). Elaborating, {U}_{k,{a}_{k}}\left(\ell \right) can be expressed as
wherein we have exploited the fact that E\left[\phantom{\rule{0.3em}{0ex}}\right{\alpha}_{k,{a}_{k},\ell}\left(m\right){}^{4}]=3 for all m=1,…,M, because {\alpha}_{k,{a}_{k},\ell}\left(m\right) is a standard Gaussian variable for all m=1,…,M. As for the average power of the interferenceplusnoise term, we have
where the last equality stems from the assumption that the vectors {\mathit{h}}_{i,{a}_{k}}\left(\ell \right) and {\mathit{h}}_{k,{a}_{k}}\left(\ell \right) are statistically independent for all k≠i. Finally, the kth user’s average SINR, in his intended receiver, on subcarrier ℓ, is computed as
3.2 Proposed distributed algorithm
Having derived an average expression for the users’ SINR, we are ready to start our analysis of the resource allocation problem. Mathematically, the distributed energyefficient resource allocation problem is formulated as the K coupled problems
with G\left({\left\{{p}_{k}\right(\ell ),{\gamma}_{k}(\ell \left)\right\}}_{k=1,\ell =1}^{K,L}\right) being the energyefficient performance metric to optimize, which will be specified shortly. For all k=1,…,K, the solution to the kth problem in (6) yields the kth user’s power allocation for a fixed configuration of the other users’ powers, and any fixed point of iteration (6) represents a stable resource allocation policy. We remark that for all k=1,…,K, only the transmit powers {\left\{{p}_{k}\right(\ell \left)\right\}}_{\ell =1}^{L} have been indicated as the optimization variables of the generic kth problem, because by choosing the transmit powers, each user automatically chooses also the transmit subcarriers. Indeed, a subcarrier can be discarded by simply transmitting zero power over it.
Now, traditionally, the EE of a single communication link is defined as the ratio between the achieved throughput and the transmitted power, which can be mathematically expressed as [4, 10, 30], and references therein
wherein R is the transmit data rate, Q≥1 is the packet length, D≤Q is the number of information symbols contained in each packet, γ is the achieved SINR, p the transmit power, and (1−e^{−γ})^{Q} is the socalled efficiency function which approximates the probability of correct reception for a datapacket of length Q[4, 10, 30] and references therein. We stress that the case of bitoriented communications, i.e., Q=1 is included as a special case in our definition of the energy efficiency and all results to follow will hold true also for Q=1. Moreover, it should be mentioned that also the case Q>1 is of practical interest in modern OFDMA systems, such as LTE [31].
Another widely used efficiency function is the achievable rate log(1+γ) [21, 23, 32]. However, such a choice applies to strictly static channels but has no informationtheoretic meaning in the considered scenario where the channels are rapidly varying. In our context, an informationtheoretic meaningful function would be the ergodic achievable rate E[log(1+γ)]. Such an approach, which has been considered in [22] for the simpler scenario of singleuser MIMO systems, appears more challenging in interference networks and is left as future work.
In the considered multicarrier system, for all k=1,…,K, (7) can be seen as the percarrier EE of a given user. Then, recalling that each user is assigned L subcarriers, the EE with which the generic nth user transmits each packet of Q bits is given by [10]
while the network’s global energy efficiency (GEE), defined as the ratio of network’s global throughput over the network’s total consumed power, is written as
wherein the circuit power P_{c,n} that is needed to operate transmitter n has also been included in the expression of the consumed power. From a usercentric point of view, individual maximization of (8), for all n=1,…,K should be pursued. However, this would result in iterations (6) to be not always convergent, and even if convergence occurs, the resulting power allocation policy may not be efficient from a social welfare point of view. Indeed, from a social welfare point of view, the GEE (9) would be a canonical choice as the objective G\left({\left\{{p}_{k}\right(\ell ),{\gamma}_{k}(\ell \left)\right\}}_{k=1,\ell =1}^{K,L}\right) of (6). However, the drawback of maximizing of (9) is that it might lead to unfair power allocations. Indeed, due to its additive nature, the maximum of (9) might be obtained by having users with very low channel coefficients transmit at very low powers. In order to compromise between the need to achieve improved overall EE and the need to obtain a fair resource allocation, similarly to [15], the following multiplicative version of (9) will be considered as objective of (6), namely
Due to its multiplicative nature, it is unlikely that a maximizer of (10) results in one of the users’ throughputs to be very low, since each user’s throughputs is a factor of the product in the numerator of (10). Moreover, (10) is also a systemwide performance function, since it is an increasing function of the players’ energy efficiencies. We stress that the maximization of products of utility functions in order to obtain fair resource allocation policies is also considered in contexts other than EE maximization [33, 34].
However, the drawback of this approach is that the maximization of (10) is clearly more complex than that of (9). Thus, in order to obtain a mathematically treatable objective function, the traditional efficiency function (1−e^{−γ})^{Q} will be approximated by {\left({e}^{{\beta}_{n}/\gamma}\right)}^{Q}, with β_{ n } a suitable constant to be specified. Note that, similarly to (1−e^{−γ})^{Q}, the modified efficiency function {\left({e}^{{\beta}_{n}/\gamma}\right)}^{Q} is still an Sshaped^{a}, increasing function of γ, approaching zero for γ→0 and approaching unity for γ→+∞. Aiming at approximating (1−e^{−γ})^{Q} with {\left({e}^{{\beta}_{n}/\gamma}\right)}^{Q}, a natural choice for β_{ n } is to set it so as to minimize the mean square error between the two functions. Accordingly, for all n=1,…,K, β_{ n } is determined as the solution to the problem
wherein γ_{max,n} is the maximum SINR that user n can attain. For the case at hand, we have
i.e., the nth user’s SINR with interferencefree transmission. The following proposition holds.
Proposition 1
The solution to problem (11) is obtained as the solution to the equation
with Ei(·) denoting the exponential integral function.
Proof
Setting the firstorder derivative of the objective of (11) to zero yields
Applying Newton’s binomial formula to the lefthandside of (14) yields the lefthandside of (13). Next, operating the substitution y=\frac{2Q{\beta}_{n}}{x} in the righthandside of (14) yields
Hence, the thesis. □
It should be stressed that the computation of the coefficients {\left\{{\beta}_{n}\right\}}_{k=1}^{K} needs to be performed just once and can be carried out offline because each β_{ n } only depends on the constant networks parameters Q, P_{m a x,n}, σ^{2}, and E[\parallel {\mathit{h}}_{n,{a}_{n}}(\ell ){\parallel}^{2}.
In order to further motivate the validity of the modified efficiency function as a substitute for the classical one, let us consider the ratio \frac{{e}^{{\beta}_{n}/\gamma}}{1{e}^{\gamma}}. Note that for increasing γ, it converges to one. Moreover, in order to give an insight as to how large γ is required to be for \frac{{e}^{{\beta}_{n}/\gamma}}{1{e}^{\gamma}} to approach unity, Figure 1 reports such a ratio for the case γ_{max,n}=100. It is seen that for γ>0dB (that is the region of interest) \frac{{e}^{{\beta}_{n}/\gamma}}{1{e}^{\gamma}} is very close to 1.
Thus, (10) can be approximated as
and the kth problem in (6) can be restated as
Accordingly, the resource allocation algorithm can be expressed as follows:
Algorithm 1 Distributed resource allocation
Convergence in Algorithm 1 is declared when the difference between the values of the objective function (16) achieved at the end of two successive outer loops is below a predetermined tolerance. The following proposition guarantees the convergence of Algorithm 1.
Proposition 2
For any feasible initialization point{\left\{{p}_{k}^{\left(0\right)}\right(\ell \left)\right\}}_{k=1,\ell =1}^{K,L}, Algorithm 1 is guaranteed to converge.
Proof
The objective (16) depends on all of the users’ KL transmit powers. After the initialization, we have{\hat{\mathrm{GEE}}}^{\left(0\right)}({\left\{{p}_{1}^{\left(0\right)}\right(\ell \left)\right\}}_{\ell =1}^{L},\dots ,{\left\{{p}_{K}^{\left(0\right)}\right(\ell \left)\right\}}_{\ell =1}^{L}). After the first iteration of the for cycle in Algorithm 1, (16) is maximized with respect to{\left\{{p}_{1}\right(\ell \left)\right\}}_{\ell =1}^{L} while keeping the other (K−1)L powers fixed. Let us denote by{\left\{{p}_{1}^{\left(1\right)}\right(\ell \left)\right\}}_{\ell =1}^{L} the L powers resulting from such optimization. Then, after this first optimization, the new value of the objective is{\hat{\mathrm{GEE}}}^{\left(1\right)}({\left\{{p}_{1}^{1}\right(\ell \left)\right\}}_{\ell =1}^{L},{\left\{{p}_{2}^{\left(0\right)}\right(\ell \left)\right\}}_{\ell =1}^{L},\dots ,{\left\{{p}_{K}^{\left(0\right)}\right(\ell \left)\right\}}_{\ell =1}^{L}), and clearly, we have{\hat{\mathrm{GEE}}}^{\left(1\right)}\ge {\hat{\mathrm{GEE}}}^{\left(0\right)}. In the second iteration of the cycle, the powers{\left\{{p}_{2}\right(\ell \left)\right\}}_{\ell =1}^{L} are optimized. Thus, after the optimization, we have{\hat{\mathrm{GEE}}}^{\left(2\right)}({\left\{{p}_{1}^{1}\right(\ell \left)\right\}}_{\ell =1}^{L},{\left\{{p}_{2}^{\left(1\right)}\right(\ell \left)\right\}}_{\ell =1}^{L},{\left\{{p}_{3}^{\left(0\right)}\right(\ell \left)\right\}}_{\ell =1}^{L},\dots ,{\left\{{p}_{K}^{\left(0\right)}\right(\ell \left)\right\}}_{\ell =1}^{L}), and it holds{\hat{\mathrm{GEE}}}^{\left(2\right)}\ge {\hat{\mathrm{GEE}}}^{\left(1\right)}. It is seen that cyclically iterating this procedure originates a sequence of values of{\hat{\mathrm{GEE}}}^{\left(n\right)} which is nondecreasing. As a consequence, since\hat{\mathrm{GEE}}is upperbounded with respect to the transmit powers, Algorithm 1 will eventually converge. □
Now, in order to complete the resource allocation design, the solution to problem (17) remains to be tackled. Such a problem is not convex, because the objective is not concave, but it is possible to recast it as a convex problem without loss of optimality, by exploiting the result in the following proposition. Next, we will also provide an algorithm to solve problem (17) that employs the alternating maximization technique [35], rather than using the convex reformulation.
Proposition 3
For any k = 1,…, K , problem (17) can be restated as
wherein
Moreover, the objective of (18) has a unique maximizer, which lies in its concave region.
Proof
We start by observing that it is possible to apply any increasing function to (16) without changing its maximizers. Then, applying the logarithmic function yields
Then, plugging the expression for the users’ SINRs and highlighting the terms that depend on the kth user’s transmit powers, (21) can be rewritten as
with C_{ k }including all the terms that do not depend on the kth user’s transmit powers. Then, by inspection, it is seen that (56) coincides with the objective of (18), and the first part of the thesis is proved. In order to prove the second part, let us first note that (18) is not a convex problem, because its objective is not concave, as can be verified by direct computation of its Hessian. However, the objective of (18) has a unique maximum which lies within the concave region of the objective function. To prove this, let us denote each summand of the objective of (18) as the function
For all k=1,…,K, the first derivative of g_{ k }(p_{ k }(ℓ)) is given by
Setting (24) to zero and elaborating yields the equation
which is guaranteed to admit a unique solution for positive p_{ k }(ℓ), because an increasing cubic curve with zero intercept is on the lefthandside, while a line with positive slope and intercept is on the righthandside. Denoting by{p}_{k}^{\ast}\left(\ell \right)such a solution, it is also seen that, for all k=1,…,K, g_{ k }(p_{ k }(ℓ)) is an increasing function for{p}_{k}\left(\ell \right)\le {p}_{k}^{\ast}\left(\ell \right), thus implying that{p}_{k}^{\ast}\left(\ell \right)is a maximizer for g_{ k }(ℓ). Hence, for all k=1,…,K, it holds that
which shows that{\left\{{p}_{k}^{\ast}\right(\ell \left)\right\}}_{\ell =1}^{L}is the unique maximizer of the objective of (18). Next, let us compute the Hessian of the objective of (18). It is easy to realize that all the offdiagonal components equal zero, whereas for all ℓ=1,…,L, we have
Thus, the resulting Hessian is a diagonal matrix with diagonal entries given by (27). Also, it is seen that (27) vanishes when{p}_{k}^{3}\left(\ell \right)=2{a}_{k}\left(\ell \right){\left({p}_{k}\right(\ell )+{P}_{c,k})}^{2}, which is guaranteed to admit a unique solution for positive p_{ k }(ℓ) because the intersection between a positive cubic curve with zero intercept and a convex parabola with positive intercept is unique. For all ℓ=1,…,L, denote by{\stackrel{\u0304}{p}}_{k}\left(\ell \right)such a solution. Then, by inspection, it can also be seen that (27) is negative for{p}_{k}\left(\ell \right)<{\stackrel{\u0304}{p}}_{k}\left(\ell \right), thus implying that g_{ k }(ℓ) is concave for{p}_{k}\left(\ell \right)<{\stackrel{\u0304}{p}}_{k}\left(\ell \right). Consequently,{u}_{k}=\sum _{\ell =1}^{L}{g}_{k}\left({p}_{k}\right(\ell \left)\right) is concave when{p}_{k}\left(\ell \right)<{\stackrel{\u0304}{p}}_{k}\left(\ell \right)for all ℓ=1,…,L. Now, in order to complete the proof, it is to be shown that{p}_{k}^{\ast}\left(\ell \right)\le {\stackrel{\u0304}{p}}_{k}\left(\ell \right), for all ℓ=1,…,L, which is equivalent to showing that the firstorder derivative of g_{ k }(ℓ) is negative when evaluated at{\stackrel{\u0304}{p}}_{k}\left(\ell \right). To see this note that from the lefthandside of (27), it follows that, for all ℓ=1,…,L,{\stackrel{\u0304}{p}}_{k}\left(\ell \right)has to satisfy the equation\frac{{a}_{k}\left(\ell \right)}{{\stackrel{\u0304}{p}}_{k}^{2}\left(\ell \right)}=\frac{{\stackrel{\u0304}{p}}_{k}\left(\ell \right)}{2{\left({\stackrel{\u0304}{p}}_{k}\right(\ell )+{P}_{c,k})}^{2}}. Therefore, from (24), we have
Hence, the thesis. □
Thus, Proposition 3 allows to reformulate the nonconvex problem (18) as a convex one by restricting the problem domain to the concave region of the objective function, which can be done by simply imposing the additional constraints{p}_{k}\left(\ell \right)\le {\stackrel{\u0304}{p}}_{k}\left(\ell \right)for all ℓ=1,…,L in (18). This causes no loss of optimality, since the global maximum has been proved to lie in the concave region of the objective function.
Moreover, since numerical algorithms might still be too complex when the network’s load grows too large or in scenarios when computational complexity is a critical issue, in the following, we provide another, even more, computationally efficient technique to solve (18), based on the alternating maximization algorithm [35]. According to the alternating maximization, a function can be cyclically maximized with respect to one (or a block of) variable, while keeping the other variables fixed. For the case at hand, this means that in each cycle, problem (18) can be solved with respect to one of the transmit powers, say p_{ k }(ℓ), while keeping the other powers {p_{ k }(q)}_{q≠ℓ} fixed, thus converting problem (18) into a sequence of scalar subproblems, each of which can be solved in closedform. Indeed, when only the generic power p_{ k }(ℓ) is to be optimized, problem (18) can be recast as
In Proposition 2, it has already been proved that g_{ k }(p_{ k }(ℓ)) admits a unique maximizer{p}_{k}^{\ast}\left(\ell \right) which is given by the solution to (25). Consequently, the solution to problem (30) is given by
Equipped with this result, the formal alternating maximization algorithm to solve problem (18) can be stated as follows
Algorithm 2 Solution of problem (18)
Similarly as for Algorithm 2, convergence in Algorithm 2 is declared when the value of the objective of (18) after two successive outer loops is below a given threshold. Convergence of Algorithm 2 can be proved with similar algorithms as for Algorithm 1.
From (31), it also follows that for large P_{max,k}, Algorithm 2 is guaranteed to converge to the global solution of (18) in L iterations. Indeed, for large P_{max,k}, after L iterations of the alternating maximization, the resulting transmit powers will be{p}_{k}\left(\ell \right)={p}_{k}^{\ast}\left(\ell \right), which is the global maximizer of solution of (18). In Section 6, the performance obtained using Algorithm 2 to solve (18) will be contrasted to that achieved by solving (18) through its convex reformulation.
3.3 The proposed algorithm as a potential game
In this section, we will briefly provide a different look on the proposed algorithm, showing how it fits into the framework of game theory and in particular of potential games. Let us first give some details on noncooperative games and potential games.
In its strategic form, a game\mathcal{G}can be described as a triplet\mathcal{G}=\{\mathcal{K},{\left\{{\mathcal{S}}_{k}\right\}}_{k=1}^{K},{\left\{{u}_{k}\right\}}_{k=1}^{K}\}, wherein\mathcal{K}is the set of players (e.g., the communicating devices in a wireless network),{\mathcal{S}}_{k}is the set of all possible strategies for the kth player, and u_{ k }represents the utility function or payoff of the kth player; u_{ k }is a scalar function depending on the strategies taken by all players of the game. Thus, a change in strategy from one player affects all the other players as well, and triggers a dynamic process, in which players iteratively update their own strategies as a reaction to changes in the strategies of the other players. This process is mathematically represented by the set of coupled problems
with s_{ k }and s_{−k}being the kth player’s strategy and set of the other player’s strategies, respectively. The coupled problems (32) are usually referred to as bestresponse dynamics (BRD), because for allk\in \mathcal{K}, in the kth iteration, given the strategies of the other players s_{−k}, player k responds by choosing his own strategy s_{ k }in order to maximize his own utility function. Each fixed point of (32), if any, is termed Nash equilibrium (NE). At an NE, no user can unilaterally improve its own utility by taking a different strategy, thus implying that each user, provided that the other users’ strategies do not change, is not interested in changing his own strategy. In general, given a generic strategicform game, convergence of the BRD to an NE is not guaranteed, even if one or more NEs exist.
We give now the formal definition of a potential game [16]. A strategic game\mathcal{G}=\left[\mathcal{K},\left\{{\mathcal{S}}_{k}\right\},\left\{{u}_{k}\right\}\right]is called an exact potential game if there exists a functionV:{\mathcal{S}}_{1}\times {\mathcal{S}}_{2}\times \dots {\mathcal{S}}_{K}\to \mathcal{R}such that for anyk\in \mathcal{K}and for any({s}_{k},{\mathit{s}}_{k}),({s}_{k}^{\ast},{\mathit{s}}_{k})\in {\mathcal{S}}_{1}y\times {\mathcal{S}}_{2}\times \dots {\mathcal{S}}_{K}, we have
The function V is called the potential function of the game. A very attractive property of potential games is that at least one NE is guaranteed to exist and that the BRD always converges to an NE, provided the potential function is upperbounded. In our scenario, it can be seen that the distributed resource allocation algorithm can be seen as a potential game{\mathcal{G}}_{\mathrm{pot}}, with the mobile users as players, with potential function V given by (21) and utility functions given by u_{ k }=V−C_{ k }, for all k=1,…,K, with C_{ k }being the additive constant that appears in (56). Thus, the resource allocation policy obtained at the fixed point of Algorithm 1 can be regarded as an NE of{\mathcal{G}}_{\mathrm{pot}}.
4 Energyefficient resource allocation in saturated networks with fairness constraint
In Section 3, an energyefficient performance function has been proposed that results at the same time in improved overall network’s performance and in a fair resource allocation to the users. This has been tackled assuming only partial CSI and thus operating with average users’ SINR expressions. In this section, a different approach is taken. The scenario in which each user k allocates his own resources to maximize the EE (8) of his own communication link is addressed. This problem will be tackled in the asymptotic regime of a saturated network in which the number of active users and the number of antennas equipped at each receiver grow to infinity with a fixed ratio\frac{K}{M}=\alpha. Unlike what happens in the nonasymptotic regime, it will be shown that in the asymptotic regime individual maximization of (8) is guaranteed to converge to an equilibrium. The problem can be formally stated as follows:
where we have denoted by{\gamma}_{k,{a}_{k}}^{\mathit{\text{as}}}\left(\ell \right)the asymptotic expression of the kth user’s SINR in the limiting case of M,K→∞, with\frac{K}{M}=\alpha. We remark that{\gamma}_{k,{a}_{k}}^{\mathit{\text{as}}}\left(\ell \right)can be evaluated as the limit of the instantaneous SINR (2), instead of the average SINR (5) because the fastfading channels that appear in (2) will be averaged out in the asymptotic regime. Indeed, recalling that{\mathit{h}}_{k,{a}_{k}}\left(\ell \right)={\mathit{R}}_{k,{a}_{k}}^{1/2}\left(\ell \right){\mathit{\alpha}}_{k,{a}_{k}}\left(\ell \right), where{\mathit{\alpha}}_{k,{a}_{k}}\left(\ell \right)is a zeromean uncorrelated Gaussian vector and that the diagonal entries of{\mathit{R}}_{k,{a}_{k}}^{1/2}\left(\ell \right)have magnitude proportional to 1/M, it is possible to leverage [36, Lemma 2.29] to show that\parallel {\mathit{h}}_{k,{a}_{k}}\left(\ell \right){\parallel}^{2}\to \mathrm{tr}\left({\mathit{R}}_{k,{a}_{k}}\right(\ell \left)\right)and\left{\mathit{h}}_{k,{a}_{k}}\right(\ell \left){\mathit{h}}_{i,{a}_{k}}^{H}\right(\ell ){}^{2}\to \mathrm{tr}({\mathit{R}}_{k,{a}_{k}}\left(\ell \right){\mathit{R}}_{i,{a}_{k}}\left(\ell \right)). Consequently, we have
and we notice that, as already anticipated, (35) does not contain the users’ channels realizations and therefore can be employed at the transmitters’ side for resource allocation purposes.
Now, in the notable case of uncorrelated fading, we have{\mathit{R}}_{k,{a}_{k}}\left(\ell \right)=\frac{1}{M}{d}_{k,{a}_{k}}^{\eta}{\mathit{I}}_{M}, and (35) becomes
Next, in order to ensure fairness among the users in terms of throughput and delay [5, 37], we enforce the constraint that each transmit signal is received with the same power in its assigned receiver, namely{p}_{i}\left(\ell \right){d}_{i,a\left(i\right)}^{\eta}={P}_{R}\left(\ell \right),\phantom{\rule{2.77626pt}{0ex}}\phantom{\rule{2.77626pt}{0ex}}\forall i\in {\mathcal{\mathcal{L}}}_{\ell}, wherein{\mathcal{\mathcal{L}}}_{\ell}is the set of users transmitting on the ℓth carrier. Then, we can write
Now, in the limit of an infinite number of users K, it is reasonable to assume that they will be uniformly distributed over the L available subcarriers, so that each subcarrier is loaded with the same number of users, and the cardinality of the set{\mathcal{\mathcal{L}}}_{\ell}can be taken to be K/L. Consequently, the sum at the denominator of (37) converges to\frac{K}{L}{\mu}_{k}, with μ_{ k }being the mean of the random variable defined as the ηth power of the ratio between the distance of a user randomly located in the network from his assigned receiver, and the distance of the same user from receiver a_{ k }. Thus, (37) becomes
and we notice that multiuser interference has been averaged out, as it was expected [26]. Equipped with this result, iterations (34) can be recast as
and the following proposition holds.
Proposition 4
Iterations (39) are guaranteed to converge to an equilibrium in K iterations.
Proof
Since multiuser interference is averaged out in the asymptotic SINR, we infer that the K problems in (39) can be decoupled and independently solved. Therefore, after all of the K users have solved their corresponding maximization problem in (39), a fixed point is reached. □
We remark that the solution to the generic kth problem in (39) can be obtained by means of the alternating maximization algorithm, in a similar fashion as for Algorithm 2.
5 Distributed energyefficient resource allocation in relayassisted systems
In this section, we show how the approach proposed in Section 3 extends to twohop, relayassisted interference networks. The system model of Section 3 will be modified by adding a fixed, singleantenna, amplifyandforward (AF) relay between transmitters and receivers. In each symbol interval, the baseband, discretetime model of the signal received by the relay on subcarrier ℓ is given by
wherein h_{ k }(ℓ) is the kth user’s complex channel coefficient to the relay on subcarrier ℓ, modeled as a realization of a zeromean Gaussian random variable with variance{\sigma}_{{h}_{k}}^{2}\left(\ell \right), while w_{ r }(ℓ) is the thermal noise on subcarrier ℓ, modeled as a realization of a zeromean complex circular Gaussian variable with variance{\sigma}_{r}^{2}. In order to avoid amplifier saturation at the relay, y_{ r }(ℓ) is to be normalized by the square root of its power P_{ t }(ℓ) [25, 38], which can be computed as
where we have exploited the fact that the noise is uncorrelated with the information symbols, and that information symbols from different users are uncorrelated with each other. After normalization, y_{ r }(ℓ) is amplified by the amplification factor{a}_{R}^{2}\left(\ell \right)subject to the power constraint\sum _{\ell =1}^{L}{a}_{R}^{2}\left(\ell \right)\le {P}_{r}, with P_{ r }denoting the available relay power. It is to be mentioned that an equivalent approach would be to avoid normalizing y_{ r }(ℓ) and considering the relay power constraint\sum _{\ell =1}^{L}{a}_{R}^{2}\left(\ell \right){P}_{t}\left(\ell \right)\le {P}_{r}. However, such an approach has the drawback that the relay power constraints should also be enforced on the transmitters. Indeed, since the relay has no control over the terms P_{ t }(ℓ), in order to guarantee that it is always possible to meet the relay power constraint, each transmitter k should allocate its transmit powers{\left\{{p}_{k}\right(\ell \left)\right\}}_{\ell =1}^{L}not only based on its maximum feasible transmit power but also so as to fulfill the relay power constraint with respect to{\left\{{p}_{k}\right(\ell \left)\right\}}_{\ell =1}^{L}, namely considering the additional constraint
This introduces a coupling between the relay and the mobile users which is not always easy to manage in distributed systems like an interference network. Instead, the normalization approach has the advantage of making the relay completely independent of the mobile users, ensuring that the relay amplifier never goes into saturation without having to enforce additional constraints on the transmitters.
After amplification, the signal is forwarded to the multipleantenna receivers^{b}. Assuming that the distance between transmitters and receivers is such that the magnitude of the signal received directly from the transmitters is negligible with respect to the relayed signal, the SINR achieved by the kth user in its intended receiver j=a(k) after MRC reception by the filter{h}_{k}{\mathit{g}}_{{a}_{k}} is given by
wherein g_{ j }(ℓ) denotes the vector channel between the relay and receiver j, modeled as a realization of a zeromean Gaussian random vector with covariance matrix{\mathit{R}}_{{g}_{j}}\left(\ell \right). The main difference of the considered scenario with respect to onehop systems is that the useful power p_{ k }(ℓ) also appears at the denominator of the SINR, whereas in the onehop case the SINR was simply proportional to the useful power.
Now, in order to design a distributed resource allocation algorithm, the first step is to obtain an average expression of the SINR with respect to the users’ channels. As for the numerator{N}_{k,{a}_{k}}\left(\ell \right)of (43), leveraging the results of Section 3.1, we have
where we have also exploited the fact that h_{ k }(ℓ) and{\mathit{g}}_{{a}_{k}}\left(\ell \right)are statistically independent with one another. As for the denominator, the average of the term that depends on the useful power p_{ k }can be computed as
and the average of the remaining term can be computed similarly as
Finally, defining for notational convenience the quantities{R}_{{g}_{{a}_{k}}}\left(\ell \right)=\left({\mathrm{tr}}^{2}\left({\mathit{R}}_{{g}_{{a}_{k}}}\right(\ell \left)\right)+2\mathrm{tr}\left({\mathit{R}}_{{g}_{{a}_{k}}}\right(\ell \left){\mathit{R}}_{{g}_{{a}_{k}}}^{H}\right(\ell \left)\right)\right)and{z}_{k}\left(\ell \right)={\sigma}_{r}^{2}{\sigma}_{{h}_{k}}^{2}\left(\ell \right)\left({a}_{R}^{2}\left(\ell \right){R}_{{g}_{{a}_{k}}}\left(\ell \right)+{\sigma}^{2}\mathrm{tr}\left({\mathit{R}}_{{g}_{{a}_{k}}}\right(\ell \left)\right)\right), for all k=1,…,K, the average SINR enjoyed by the kth user in its assigned receiver on subcarrier ℓ is expressed as
Next, we follow the approach of Section 3 and consider the optimization problem (6) with (16) as objective function and the new SINR expression (48). The variables to optimize are not only the users’ powers but also the relay amplification factors{\left\{{a}_{R}^{2}\right(\ell \left)\right\}}_{\ell =1}^{L}. With respect to the choice of (16) as objective in relayassisted systems, one remark is in order. The main reason to optimize the EE in wireless networks is to limit the energy consumption of batterypowered terminals, in order to prolong their lifetime. However, fixed relays are usually linked to the electrical supply network and therefore have a virtually indefinite lifetime, which makes the investigation of energyefficient relaying protocols of little practical interest. For this reason, the power consumed by the relay will not be included in the denominator of (48) and the scenario to be tackled is that in which the relay always employs its full power to maximize (16) in order to help the mobile nodes improve their own energysaving capabilities. Then, a similar resource allocation algorithm as Algorithm 1 can be stated as follows.
Algorithm 3 Distributed resource allocation in relayassisted systems
Convergence of Algorithm 3 can be proved with similar arguments as for Algorithm 1, since after each step, the objective (16) is not decreased. In order to implement Algorithm 3, both the relay optimization problem as well as problem (17) with the new SINR expression (48) need to be solved. These two goals are accomplished in the following two sections.
5.1 Relay optimization
To begin with, we observe that only the numerator of (16) depends on{\left\{a\right(\ell \left)\right\}}_{\ell =1}^{L}, through the users’ SINRs{\gamma}_{k,{a}_{k}}\left(\ell \right). Then, the relay optimization problem can be formulated as
The following proposition holds.
Proposition 5
The objective of problem (49) is a logconcave function of{\left\{{a}_{R}^{2}\right(\ell \left)\right\}}_{\ell =1}^{L}.
Proof
Applying the logarithmic function to the objective of (49), we obtain
with{\varphi}_{n}\left(\ell \right)=3{p}_{n}\left(\ell \right){\sigma}_{{h}_{n}}^{4}\left(\ell \right){R}_{{g}_{{a}_{n}}}\left(\ell \right),{\delta}_{n}\left(\ell \right)={\sigma}_{r}^{2}{\sigma}_{{h}_{n}}^{2}\left(\ell \right){R}_{{g}_{{a}_{n}}}\left(\ell \right)+\sum _{i\ne n}{p}_{i}\left(\ell \right){\sigma}_{{h}_{n}}^{2}\left(\ell \right){\sigma}_{{h}_{i}}^{2}\left(\ell \right){R}_{{g}_{{a}_{n}}}\left(\ell \right), and{\psi}_{n}\left(\ell \right)={p}_{n}\left(\ell \right){\sigma}^{2}3{\sigma}_{{h}_{n}}^{4}\left(\ell \right)\mathrm{tr}\left({\mathit{R}}_{{g}_{{a}_{n}}}\right(\ell \left)\right)+{\sigma}_{r}^{2}{\sigma}^{2}{\sigma}_{{h}_{n}}^{2}\left(\ell \right)\mathrm{tr}\left({\mathit{R}}_{{g}_{{a}_{n}}}\right(\ell \left)\right)+\sum _{i\ne n}{p}_{i}\left(\ell \right){\sigma}^{2}{\sigma}_{{h}_{i}}^{2}\left(\ell \right){\sigma}_{{h}_{n}}^{2}\left(\ell \right)\mathrm{tr}\left({\mathit{R}}_{{g}_{{a}_{n}}}\right(\ell \left)\right). Denote by v_{ n }(ℓ) the generic summand in (50). Computing the secondorder derivative of v_{ n }(ℓ) with respect to{a}_{R}^{2}\left(\ell \right)yields
□
As a consequence, the relay amplification factors on each subcarrier can be found by solving a convex problem equivalent to (49), which is obtained by simply considering the logarithm of the objective.
5.2 Transmitters optimization
In order to solve problem (17) for all k=1,…,K, the following proposition is provided, which extends the results of Proposition 3 to the relayassisted scenario.
Proposition 6
Assume the generic kth user’s average SINR is expressed as in (48). Then, for any k = 1,…,K, problem (17) can be restated as
wherein
Moreover, the objective of (52) has a unique maximizer, which lies in its concave region.
Proof. The proof of this result follows along the same lines as the proof of Proposition 3. First, applying the logarithmic function to (16), we obtain
Next, plugging the average SINR expression (48) into (55) yields
with C_{ k }including all the terms that do not depend on the kth user’s transmit powers. Then, it can be seen that (56) coincides with the objective of (52), which proves the firstpart of the thesis. As for the second part, let us denote each summand of the objective of (18) as the function
Next, we note that f_{ k }(p_{ k }(ℓ)) can be equivalently written as
Comparing (58) with (23), it follows that, up to the constant term\frac{{\mu}_{k}\left(\ell \right)}{{\alpha}_{k}\left(\ell \right)}, for all ℓ=1,…,L, f_{ k }(p_{ k }(ℓ)) is formally equivalent to the function g_{ k }(p_{ k }(ℓ)) given by (23), which was encountered in the proof of Proposition 3. Consequently, since the constant term\frac{{\mu}_{k}\left(\ell \right)}{{\alpha}_{k}\left(\ell \right)}vanishes when computing the derivatives of (58), and since the properties that were shown to hold for g_{ k }(p_{ k }(ℓ)) in the proof of Proposition 3 were derived assuming no particular expression for the coefficients a_{ k }(ℓ) and c_{ k }(ℓ), the two functions f_{ k }(p_{ k }(ℓ)) and g_{ k }(p_{ k }(ℓ)) will enjoy similar properties and the line of reasoning employed in Proposition 3 can be replicated here to obtain the thesis. □
Therefore, similarly to the onehop case, also in the relayassisted scenario, it is possible to recast the generic kth problem in (6) in convex form without loss of generality by simply restricting the feasible set to the concave region of the objective. Moreover, for applications in which computational complexity is a major issue, a similar algorithm as Algorithm 2 can be devised resorting to the alternating maximization technique, in order to convert problem (17) into a sequence of scalar problems.
6 Numerical results
An interference network operating in a square area of 2,800×2,800 m^{2}has been considered. The network consists of J=4 receivers, each one equipped with M=4 antennas, placed at points inside the square with coordinates (700;700), (700;2,100), (2,100;700), and (2,100;2,100), respectively, and of mobile users placed randomly inside the square. Each user is assigned to the receiver toward which he has the best channel coefficient. The system bit rate has been set to R=100 kbits/s, the maximum feasible transmit power to P_{max,k}=0 dBW for all k=1,…,K, the noise power to σ^{2}=10^{−9}W, the power decay factor to η=2, and the circuit power P_{c,k}=100 dBm, for all k=1,…,K. The performance is analyzed with reference to the transmission of each single symbol, thus setting Q=1. The channel vectors{\mathit{h}}_{k,{a}_{k}}\left(\ell \right)have been modeled as zeromean Gaussian random vectors with covariance matrix\frac{{d}_{k,{a}_{k}}^{\eta}}{M}\mathit{R}, where R has been generated according to the exponential correlation model with correlation coefficient ρ. The presented results have been obtained by averaging over 10^{4}random realizations for all system parameters. The number of active users ranges up to K=15, while the number of subcarriers available to each user has been set to L=3. Thus, a very hostile operating condition is considered, since the network load ranges up to K/L=5. Figures 2 and 3 and Table 1 refer to the case ρ=0, thus addressing the notable case of independent channel coefficients. Figures 2 and 3 address the performance of Algorithm 1. Figure 2
evaluates the performance of Algorithm 1 in terms of the minimum EE, over the users, versus the number of active users. Otherwise stated, the shown performance metric is mink EE_{ k }, with EE_{ k }being the standard EE (8), achieved at the fixed point of Algorithm 1. It is to be stressed that the instantaneous EE has been plotted, meaning that once Algorithm 1 has converged, the resulting transmit powers have been used to evaluate the instantaneous achieved SINR (2) and then to compute the EE (8). The following scenarios have been contrasted:

Algorithm 1 implemented by solving the generic kth problem of (17) according to Algorithm 2

Algorithm 1 implemented by solving the generic kth problem of (17) by means of its convex reformulation.

As a benchmark, the minimum EE obtained when Algorithm 1 is run with perfect, instantaneous CSI is reported.

Initial minimum EE resulting from a random power allocation over the available subcarriers. This scenario is shown for comparison purposes, since it represents the minimum EE before the resource allocation scheme comes into play.
Results clearly show that the proposed games with statistical CSI largely improve the initial EE while suffering a limited gap with respect to the instantaneous CSI benchmark, even for very high network loads. It is also interesting to note how the performance of Algorithm 1 are virtually identical when problem (17) is solved by means of Algorithm ?? and by its convex reformulation, thus indicating that the lowcomplexity Algorithm 2 can effectively substitute standard numerical algorithms.
Figure 3 considers a similar scenario, with the difference that the shown performance metric is the social welfare function (21). Similar remarks as for Figure 2 hold.
Table 1 contrasts the average number of outer loops needed for Algorithm 1 to reach convergence when statistical and instantaneous CSI is available. As expected, the number of iterations increases with the network load, but it is still satisfactory even for high network loads. Also, it is seen that the number of required iterations with statistical CSI is only slightly lower than that with perfect CSI.
Next, we focus on the case in which the network is affected by correlated fading. In Figure 4, it has been set ρ=0.5, and a similar scenario as in Figure 2 is shown. It is seen that also with correlated fading, Algorithm 1 enjoys similar properties as with uncorrelated fading, and similar remarks as for the case ρ=0 can be made. Similar results, which are omitted for brevity’s sake, have been obtained when the performance metric is the social welfare function (21) instead of the minimum EE.
Finally, in Figure 5, the asymptotic scenario of Section 4 is addressed. In order to obtain an insight as to how large K and M need to be for the asymptotic expression (36) to be valid, the average, over the users and subcarriers, instantaneous SINR\frac{1}{\mathit{\text{KL}}}\sum _{k=1}^{K}\sum _{\ell =1}^{L}{\gamma}_{k,{a}_{k}}^{\mathit{\text{inst}}}\left(\ell \right)and its asymptotic approximation\frac{1}{\mathit{\text{KL}}}\sum _{k=1}^{K}\sum _{\ell =1}^{L}{\gamma}_{k,{a}_{k}}^{\mathit{\text{as}}}\left(\ell \right), with{\gamma}_{k,{a}_{k}}^{\mathit{\text{as}}}\left(\ell \right)expressed as in (36), have been contrasted for increasing K and M=K/α, with α=0.5. The results show that a good approximation is already obtained for K≈20.
7 Conclusions
This paper has dealt with the problem of distributed resource allocation in the uplink of a multicarrier interference network with multiple receive antennas. A performance metric that trades off between the need for improved overall EE and the need for a fair resource allocation has been proposed, and distributed resource allocation algorithms that are guaranteed to converge to a stable equilibrium have been devised, relying only on statistical CSI at the transmitters’ side. Both onehop and twohop networks have been considered. The proposed algorithms have an affordable computational load, since they only require the solution of convex problems. Individual EE maximization in onehop saturated network in which the number of users and of receive antennas in each receiver grow large with a fixed ratio has also been tackled. Also in this case, a distributed resource allocation algorithm that converges to a stable equilibrium has been designed. Finally, numerical results have been provided to assess the performance of the proposed procedures.
Endnotes
^{a} A function is said to be Sshaped if there exists a point below which it is convex and above which it is concave.
^{b} The forwarded signal is transmitted on an orthogonal channel, usually by means of frequency or time division duplex, to avoid interference with the incoming signal from the users.
References
Goodman D, Mandayam N: Power control for wireless data. IEEE Pers. Commun 2000, 7: 4854. 10.1109/98.839331
Saraydar C, Mandayam N, Goodman D: Efficient power control via pricing in wireless data networks. IEEE Trans. Commun 2002, 50(2):291303. 10.1109/26.983324
Saraydar CU, Mandayam NB, Goodman DJ: Pricing and power control in a multicell wireless data network. IEEE J. Select. Areas Commun 2001, 19(10):18831892. 10.1109/49.957304
Meshkati F, Poor HV, Schwartz SC, Mandayam NB: An energyefficient approach to power control and receiver design in wireless data networks. IEEE Trans. Commun 2005, 53(11):18851894. 10.1109/TCOMM.2005.858695
Buzzi S, Poor HV: Joint receiver and transmitter optimization for energyefficient CDMA communications. IEEE J. Select. Areas Commun 2008, 26(3):459472.
Buzzi S, Poor H, Zappone A: Transmitter waveform and widely linear receiver design: noncooperative games for wireless multipleaccess networks. IEEE Trans. Inf. Theory 2010, 56(10):48744892.
Lasaulce S, Hayel Y, El Azouzi R, Debbah M: Introducing hierarchy in energy games. IEEE Trans. Wireless Commun 2009, 8(7):38333843.
Treust M, Lasaulce S: A repeated game formulation of energyefficient decentralized power control. IEEE Trans. Wireless Commun 2010, 9(9):28602869.
Zappone A, Buzzi S, Jorswieck E: Energyefficient power control and receiver design in relayassisted DS/CDMA wireless networks via game theory. IEEE Commun. Lett 2011, 15(7):701703.
Meshkati F, Chiang M, Poor H, Schwartz S: A gametheoretic approach to energyefficient power control in multicarrier CDMA systems. IEEE J. Select. Areas Commun 2006, 24(6):11151129.
Moretti M, Todini A: A resource allocator for the uplink of multicell OFDMA systems. IEEE Trans. Wireless Commun 2007, 6(8):28072812.
Han Z, Ji Z, Liu K: Noncooperative resource competition game by virtual referee in multicell OFDMA networks. IEEE J. Select. Areas Commun 2007, 25(6):10791090.
Yang K, Prasad N, Wang X: An auction approach to resource allocation in uplink OFDMA systems. IEEE Trans. Signal Proc 2009, 57(11):44824496.
Bacci G, Bulzomato A, Luise M: Uplink power control and subcarrier assignment for an OFDMA multicellular network based on game theory. In Int. Conf. on Performance Evaluation Methodologies and Tools (ValueTools). Paris; 16–20 May 2011.
Buzzi S, Colavolpe G, Saturnino D, Zappone A: Potential games for energyefficient power control and subcarrier allocation in uplink multicell OFDMA systems. IEEE J. Select. Topics Signal Proc 2012, 6(2):89103.
Monderer D, Shapley L: Potential games. Games Econ. Behav 1996, 14: 124143. 10.1006/game.1996.0044
Scutari G, Barbarossa S, Palomar D: Potential games: a framework for vector power control problems with coupled constraints. In 2006 IEEE Internationa Conference on Acoustics, Speech and Signal Processing. Toulouse; 14.
Quang DL, Yong HC, Soong BH: An interferenceminimization potential game for OFDMAbased distributed spectrum sharing systems. IEEE Trans. Vehic. Tech 2011, 60(7):33743385.
Quang DL, Yong HC, Soong BH: Performance analysis of downlink multicell OFDMA systems based on potential game. IEEE Trans. Wireless Commun 2012, 11(9):33583367.
Betz S, Poor HV: Energy efficient communications in CDMA networks: a game theoretic analysis considering operating costs. IEEE Trans. Signal Proc 2008, 56(10):51815190.
Miao G, Himayat N, Li GY, Talwar S: Distributed interferenceaware energyefficient power optimization. IEEE Trans. Wireless Commun 2011, 10(4):13231333.
Chong Z, Jorswieck EA: Energyefficient power control for MIMO timevarying channels. IEEE Online Green Communications Conference 26–29 September 2011.
Isheden C, Chong Z, Jorswieck E, Fettweis G: Framework for linklevel energy efficiency optimization with informed transmitter. IEEE Trans. Wireless Commun 2012, 11(8):29462957.
Zappone A, Chong Z, Jorswieck E, Buzzi S: Green resource allocation in relayassisted multicarrier IC networks considering circuit dissipated power. In Third International Conference on Future Energy Systems (Eenergy 2012). Madrid; 9.
Zappone A, Chong Z, Jorswieck E, Buzzi S: Energyaware competitive power control in relayassisted interference wireless networks. IEEE Trans. Wireless Commun 2013, 12(4):18601871.
Marzetta T: Noncooperative cellular wireless with unlimited numbers of base station antennas. IEEE Trans. Wireless Commun 2010, 9(11):35903600.
Jindal N, Andrews J, Weber S: Multiantenna communication in ad hoc networks: Achieving MIMO gains with SIMO transmission. IEEE Trans. Commun 2011, 59(2):529540.
Huh H, Caire G, Papadopoulos H, Ramprashad S: Achieving massive MIMO spectral efficiency with a notsolarge number of antennas. Accessed 13 September 2011 [http://arxiv.org/abs/1107.3862] [] Accessed 13 September 2011
Belmega E, Lasaulce S: Energyefficient precoding for multipleantenna terminals. IEEE Trans. Signal Proc 2011, 59: 329340.
Meshkati F, Goldsmith A, Poor H, Schwartz S: A gametheoretic approach to energyefficient modulation in CDMA networks with delay QoS constraints. IEEE J Select. Areas Commun 2007, 25(6):10691078.
Ghosh A, Zhang J, Andrews JG, Muhamed R: Fundamentals of LTE. Upper Saddle River, NJ: Prentice Hall Communications Engineering and Emerging Technologies Series; 2011.
Ng DWK, Lo ES, Schober R: Energyefficient resource allocation in multicell OFDMA systems with limited Backhaul capacity. IEEE Trans. Wireless Commun 2012, 11(10):36183631.
Mazumdar R, Mason LG, Dougligeris C: Fairness in network optimal flow control: optimality of product forms. IEEE Trans. Commun 1991, 39(5):775782. 10.1109/26.87140
Boche H, Naik S: Revisiting proportional fairness: anonymity among users in interference coupled wireless systems. IEEE Trans. Commun 2010, 58(10):29953000.
Bertsekas D: Nonlinear Programming. Belmont, MA: Athena Scientific; 1999.
Tulino A, Verdú S: Random matrix theory and wireless communications. Hanover, MA: Now Publishers Inc; 2004.
Tse D, Hanly S: Linear multiuser receivers: Effective interference, effective bandwidth and user capacity. IEEE Trans. Inf Theory 1999, 45: 641657. 10.1109/18.749008
Ren S, van der Schaar M: Pricing and distributed power control in wireless relay networks. IEEE Trans. Signal Proc 2011, 59(6):29132926.
Acknowledgements
The work of Alessio Zappone has received funding from the German Research Foundation (DFG) project CEMRIN, under grant ZA 747/11. The work of Giuseppa Alfano, Stefano Buzzi, and Michela Meo has received funding from the European Union Seventh Framework Programme (FP7/20072013) under grant agreement no. 257740 (Network of Excellence "TREND"), from the Regional Project MASP, Regione Piemonte, Torinowireless 2009, and by the Network of Excellence NEWCOM ♯, grant agreement no. 318306.
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License (https://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
About this article
Cite this article
Zappone, A., Alfano, G., Buzzi, S. et al. Distributed energyaware resource allocation in multiantenna multicarrier interference networks with statistical CSI. J Wireless Com Network 2013, 205 (2013). https://doi.org/10.1186/168714992013205
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/168714992013205