Traffic demandaware topology control for enhanced energyefficiency of cellular networks
 Emmanuel Pollakis^{1}Email author,
 Renato L. G. Cavalcante^{1} and
 Slawomir Stanczak^{1, 2}
https://doi.org/10.1186/s136380160539y
© Pollakis et al. 2016
Received: 5 June 2015
Accepted: 26 January 2016
Published: 25 February 2016
Abstract
The service provided by current mobile networks is not adapted to spatiotemporal fluctuations in traffic demand, but such fluctuations offer opportunities for energy savings. In particular, significant gains in energy efficiency are realizable by disengaging temporarily redundant hardware components of base stations. We therefore propose a novel optimization framework that considers both the loaddependent energy radiated by the antennas and the remaining forms of energy needed for operating the base stations. The objective is to reduce the energy consumption of mobile networks, while ensuring that the data rate requirements of the users are met throughout the coverage area. Building upon sparse optimization techniques, we develop a majorizationminimization algorithm with the ability to identify energyefficient network configurations. The iterative algorithm is loadaware, has low computational complexity, and can be implemented in an online fashion to exploit load fluctuations on a short time scale. Simulations show that the algorithm can find network configurations with the energy consumption similar to that obtained with global optimization tools, which cannot be applied to real large networks. Although we consider only one currently deployed cellular technology, the optimization framework is general, potentially applicable to a large class of access technologies.
Keywords
Energy efficiency Optimization Majorizationminimization algorithm1 Introduction
The strive for ubiquitous connectivity and high throughput in the development of the fifth generation (5G) of mobile networks is envisioned to lead to highly dense network topologies providing the best possible service to users at all times. Currently, the network topology and also global network parameters are chosen to meet the quality of service (QoS) demand at peak hours and are largely static, but, as pointed out in many studies (see for instance [2–5]), the traffic load fluctuates significantly over time and space. Such spatiotemporal fluctuations create large capacity surpluses at times of low traffic demand, which in turn offers opportunities for energy savings through adaptation of the service supply to the actual demand. However, in order to utilize the capacity surpluses for significant energy savings, it is essential to reduce the energy consumed by hardware and auxiliary equipment (e.g., coolers), which is a dominant form of energy consumption in current mobile networks. In fact, for a typical network with today’s technology, base stations consume over 50 % of the total network energy budget [6]. From this, we conclude that significant energy savings can be achieved only by temporarily disengaging redundant hardware components of base stations. Hereafter, we call this energysaving mechanism network topology control.^{1} Indeed, as pointed out by [4], reducing the number of active base stations in periods of low traffic load offers a huge potential for energy savings. This effect will become even more pronounced in 5G networks because of the envisioned densification of the networks [7].
1.1 Related work
Over recent years, some research effort has been devoted to exploiting temporal and spatial redundancies in wireless systems for energy savings. For instance, references [8–10] address the problem of finding an optimal number of base stations and cell site placements so as to minimize the overall energy consumption subject to QoS requirements of users. Assuming a wireless network based on time division multiple access (TDMA), the objective of the study in [8] is to minimize the overall expected energy consumption by optimizing the number of base stations and their locations. The authors formulate the problem as a mixed integer programming problem and suggest using a simplex method together with the branch and bound algorithm. The drawback of this approach is that, due to the TDMA assumption, the analysis does not carry over to systems with intercell interference, which is one of the major challenges faced by designers of modern wireless communication systems [11, 12]. Furthermore, branch and bound methods may be slow [13], which excludes an application of these methods to realtime scenarios, even if the underlying problem is of moderate size.
References [9, 14] propose centralized and decentralized algorithms for wireless communication networks to address the problem of base station selection in the presence of traffic load fluctuations. Although the proposed approach seems to provide good solutions in reasonable time, it does not allow incorporation of different sources of energy consumption, which is of utmost importance in modern networks consisting of hierarchical structures. In addition, the authors focus on numerical evaluations to justify the approach. No analytical justification for the performance of the proposed algorithms is given.
The authors of [10] argue in favor of sleep mode techniques coupled with various network planning schemes. A genetic algorithm is used to find energyefficient network deployments, so the authors have developed a heuristic approach to put selected base stations into a sleep mode for energyefficient network operation. In addition to the lack of a mathematical justification, the main shortcoming of this work is that the proposed approach cannot incorporate other radio technologies other than universal mobile telecommunications system (UMTS) terrestrial radio access network. In contrast, as mentioned before, our optimization framework is general enough to be applied to multiradio access technology (RAT) scenarios, including the second, third, and fourth generations of cellular networks [15].
1.2 Our contribution
This paper deals with the problem of minimizing the overall energy consumption in the downlink channel of mobile (cellular) networks. By taking into account the energy consumed by hardware and auxiliary equipment, we address key shortcomings of most existing approaches to the challenge of boosting energy efficiency of cellular networks. The underlying problem is of combinatorial nature because it essentially amounts to selecting a subset of network elements corresponding to the most energyefficient network configuration, while providing the desired network coverage. More precisely, motivated by [14, 16], we formulate a combinatorial optimization problem to find a network configuration that consumes the least amount of energy, while satisfying traffic demands expressed in terms of minimum data rate requirements. In doing so, we balance different forms of energy consumption in an optimal manner by taking into account both the loaddependent energy used for transmission and the static energy consumed by hardware regardless of the actual load. Similar to [14], the technologyspecific constraints are defined to capture the QoS requirements of the users. Although our optimization framework is generic in the sense that it can be applied to multiRAT systems by incorporating different RATspecific constraints, owing to the lack of space, our focus is on a single RAT according to the long term evolution (LTE) standard.

In contrast to our previous work [1], we use a more detailed and broadly suitable energy consumption model that explicitly considers both the energy consumed by each cell (sector) at a base station and models the basic energy consumed if at least one cell is active at a base station. The model is based on the computation of the cell load, which is also used to account for the loaddependent energy consumption. Based on this energy consumption model, we derive an algorithm that is able to identify not only entire base stations for deactivation but also individual cells for base stations with multiple cells. We present an extensive evaluation showing the effect of the different energy consumption parts (static and dynamic) on the solution of the energy saving network topology.

Starting from the worstcase interference assumption used in [1], we develop a novel algorithm that uses the framework of interference calculus [17, 18] to arrive at larger energy savings by calculating more accurate values for the spectral efficiency of links.

We show how our algorithms can be applied to systems where coordinated multipoint (CoMP) strategies are employed. We also elaborate on the fact that the use of CoMP techniques render the application of some involved heuristics unnecessary.

We complete the analysis of our algorithms by including short discussions about the convergence and the complexity of our proposed algorithms.
1.3 Notation and paper organization
For a vector \(\boldsymbol {x}\in \mathbb {R}^{N}\), its ith component is \(x_{i}\in \mathbb {R}\). Similarly, for a matrix \(\mathbf {X}\in \mathbb {R}^{M\times N}\), its (i,j)th component is x _{ i,j }. Inequalities involving vectors, such as x _{1}≥x _{2}, are to be understood as componentwise inequalities. The set \(\mathbb {R}_{+}\) denotes the set of nonnegative real numbers, while \(\mathbb {R}_{++} := \mathbb {R}_{+} \backslash \{0\}\) is the set of positive real numbers.
Given a matrix \(\mathbf {X} \in \mathbb {R}^{M \times N}\), we use \(\tilde {\boldsymbol {x}}:=\text {vec}(\mathbf {X})\in \mathbb {R}^{MN}\) to denote the vector obtained by stacking the columns of X. Note that the entries of \(\tilde {\boldsymbol {x}}\) may be confined to take values on [0,1] or {0,1} depending on whether X∈[0,1]^{ M×N } or X∈{0,1}^{ M×N }.
Definition 1 (l _{0}norm).
For any vector \(\boldsymbol {x} \in \mathbb {R}^{N}\) and matrix \(\mathbf {X}\in \mathbb {R}^{M\times N}\), their l _{0}norms x_{0} and X_{0} are equal to the number of nonzero elements of x and X, respectively. For a scalar \(x \in \mathbb {R}\), x_{0}:=1 if x≠0 and x_{0}:=0 otherwise.^{2}
The remainder of this paper is organized as follows. Section 2 introduces the underlying system model, and in Section 3, we outline the general problem to solve. In Section 4, the proposed algorithm to find solutions for our optimization problem is derived based on a worstcase intercell interference assumption. Section 5 presents how to explicitly take into account a more realistic intercell interference model. We present empirical evaluations of the proposed algorithm in Section 6.
2 System model
We consider the downlink channel of a multicell LTE network with an established network topology and a central network controller. The central network controller is responsible for collecting measurements, executing the proposed algorithm, and propagating updated network configuration parameters throughout the network. In this work, as in [8–10], we assume that the mechanisms required to collect measurements and to determine when to execute our proposed algorithm are available at a central network controller.
We assume that the network consists of L base stations. Each base station has multiple sectors (called cells in the following), and we denote the set of cells belonging to base station l by \({\mathcal {S}}_{l}\). The set of all base stations is denoted by \({\mathcal {L}}\), and we use \({\mathcal {M}}:= \cup _{l\in {\mathcal {L}}} {\mathcal {S}}_{l}\) to denote the set of all M cells in the network. The cell deployment is assumed to be dense enough so that coverage areas of different cells overlap. This implies that users can be served by different neighboring cells.
2.1 Ensuring coverage via test points
In order to ensure the desired coverage anytime and everywhere in the considered area, we impose coverage constraints by adopting the concept of test points, which is widely used in network planning and optimization [19, 20].
Definition 2 (Test point).
A test point (TP) is a centroid of a predefined geographical subarea that represents an aggregated QoS requirement resulting from individual QoS demands of all potential users in this subarea.^{3} Without loss of generality, we assume N TPs with the set of all TPs denoted by \({\mathcal {N}}:=\left \{ 1,2,\ldots,N\right \}\).
Assumption 1.
The QoS requirement for a TP corresponds to the aggregated expected traffic over the respective area per unit time. This traffic requirement is expressed in terms of the minimum required data rate per TP.
Assumption 2.
If the minimum rate requirement of TP j is met, so are the requirements of the users in the associated subarea.^{4}
For services with no explicit data rate requirements (e.g., voice calls), we assume that they can be supported if a minimum data rate per service request is ensured. By Assumption 1, each TP \(j\in {\mathcal {N}}\) is assigned rate requirement r _{ j }, and we collect the rate requirements of all TPs in the vector \(\boldsymbol {r} = \left [ r_{1},r_{2}, \ldots, r_{N} \right ] \in \mathbb {R}_{++}^{N}\). In general, a TP can be assigned to any cell, and an assignment should be understood as follows. If TP \(j\in {\mathcal {N}}\) is assigned to cell \(i\in {\mathcal {M}}\), then all users in the respective subarea associated with TP j are served by cell j. The assignment of the TPs to the cells is subject to optimization in this paper. We use X=[x _{ i,j }]∈{0,1}^{ M×N } to denote the assignment matrix where x _{ i,j }=1 if TP j is assigned to cell i and x _{ i,j }=0 otherwise.
Assumption 3.
While each TP is assigned to exactly one cell, each cell can serve multiple TPs, and the set of TPs served by cell i under assignment X is denoted by \({\mathcal {N}}_{i}(\mathbf {X}) \subset {\mathcal {N}}\).
We point out that this assumption has been widely used in previous studies [9, 14, 20], and it is valid throughout the paper except for Section 4.3, where it is shown how to include scenarios in which each TP can be served by multiple cells. Note that if \({\mathcal {N}}_{i}(\mathbf {X})=\emptyset \) for some \(i\in {\mathcal {M}}\), then cell i can be deactivated for energy savings because no TP is assigned to cell i. In contrast, if \({\mathcal {N}}_{i}(\mathbf {X}) \neq \emptyset \), then cell i is active, and each TP connected to it induces some amount of cell load.
Definition 3 (Cell load).
Given the assignment \(\tilde {\boldsymbol {x}}:=\text {vec}(\mathbf {X})\), the load of cell i, denoted by \(\rho _{i}(\tilde {\boldsymbol {x}})\in [0,1]\) or simply ρ _{ i } for notational simplicity, is defined to be the ratio of the number of resource blocks requested by TPs served by cell \(i\in {\mathcal {M}}\) to the total number of resource blocks B _{ i } available at this cell.^{5}
We use ρ:=[ρ _{1},…,ρ _{ M }]^{ T }∈[0,1]^{ M } to denote the vector of all cell loads. From the definition of cell load, we have the following:
Fact 1.
The load at cell i satisfies ρ _{ i }>0 if and only if (iff) cell i serves at least one TP.
2.2 Spectral efficiency and resource usage
The optimal assignment of TPs to cells is strongly influenced by the spectral efficiency of the corresponding links. For the analysis in this paper, we adopt an OFDMAbased (Orthogonal FrequencyDivision Multiple Access (OFDMA)) model for the spectral efficiency that is widely used in the literature [11, 21, 22]. The spectral efficiency also depends on radio propagation properties. Therefore, we associate to each TP a pathloss vector and write the pathloss vectors of all TPs as columns of the pathloss matrix \(\mathbf {G}=[g_{i,j}]\in \mathbb {R}_{++}^{M \times N}\), where g _{ i,j } captures the longterm path loss and shadowing effects for a radio link from cell i to TP j.
Assumption 4 (Reliable pathloss estimates).
A reliable estimate of G is available at the central network controller.
Remark 1.
The problem of reliable estimation and tracking of the pathloss matrix is out of the scope of the paper. However, the matrix captures only longterm fading effects, so reliable estimates of G can be obtained and tracked in practice. Promising algorithmic solutions to this estimation problem are for instance presented in [23]. Moreover, in network planning problems, knowledge of G is a very common assumption in the literature [11, 20, 24].
where \(\eta _{i,j}^{\text {BW}}\in \mathbb {R}_{++}\) and \(\eta _{i,j}^{\text {SINR}}\in \mathbb {R}_{++}\) are suitably chosen constants, referred to as bandwidth and SINR efficiency, respectively. These constants depend on the overall system design, which includes the choice of scheduling protocols and multiantenna techniques. The choice of these constants has no impact on our results, so they are assumed to be arbitrary and fixed throughout the paper. For realistic values of these constants, we refer the interested reader to [11, 21].
Remark 2.
In practice, cells need to reserve some fraction of their resource blocks for signaling. If cell i has \(B^{*}_{i}\) resource blocks in total, and it needs to reserve a _{ i }>0 of its resource blocks for signaling, then the resource blocks at cell i available for allocation to TPs are \(B_{i} = B^{*}_{i}  a_{i}\).
For a fixed assignment, X cell load ρ in 3 can be efficiently computed by means of fixedpoint algorithms (c.f. Section 5). However, the assignment of TPs to cells is the main subject of our optimization problem and thus we cannot evaluate (3) easily. In order to keep the complexity of the optimization problem tractable, we lower bound the spectral efficiency.
Assumption 5 (Worstcase interference).
We have the worstcase interference scenario if all cells are fully loaded, i.e. ρ=1.
Unless otherwise stated, we use the worstcase interference assumption, which results in a lower bound on the true link spectral efficiency \(\omega _{i,j}(\boldsymbol {\rho })\geq \tilde {\omega }_{i,j}:=\omega _{i,j}(\boldsymbol {1})\) for every ρ∈[0,1]^{ M }. In general, this bound diminishes gains in energy savings when taking into account the energy consumption of hardware, and we show in Section 5 how to incorporate the actual link spectral efficiency to improve the energy savings. Nevertheless, having fully loaded cells as in Assumption 5 is desirable because it has been proven in [25] that full load (i.e., ρ=1) is optimal with respect to the transmit energy consumption (see also [26]).
Remark 3.
The worstcase interference assumption cannot exploit the full potential for energy savings, but the assumption is of high practical relevance because it is an effective way to avoid coverage holes as a result of deactivating cells based, for instance, on imperfect information.
2.3 Energy consumption model
In contrast to most works in literature, we consider a model for the energy consumption of a base station and its cells that takes into account not only the cell loaddependent transmit energy radiated by antennas but also the remaining sources of energy consumption that are independent of the cell load as long as the cell/base station is active.
Definition 4 (Active base station/cell).
Consider a particular base station \(l\in {\mathcal {L}}\) and its cells \(i\in {\mathcal {S}}_{l}\). Let ρ _{ i }∈[0,1] be the load of cell i. We say that a cell i is active iff ρ _{ i }>0 and that base station l is active iff one of its cells is active, i.e., \(\sum _{i\in {\mathcal {S}}_{l}}\rho _{i}>0\). If a cell or base station is not active it is said to be inactive.
With Definition 4, we are in the position to define the energy consumption of a base station.
Definition 5 (Energy consumption).
Given a TP assignment X inducing a cell load ρ, the energy consumption E _{ l }(ρ)≥0 of base station l is defined to be the power that the respective base station consumes per unit of time, where E _{ l }(ρ)=0 iff base station l is inactive.
 (i)
The static energy consumption of the base station c _{ l }>0 (due to shared hardware between sectors, e.g., cooling and power supply),
 (ii)
The static energy consumption e _{ i }>0 (\(i\in {\mathcal {S}}_{l}\)) of its active cells (e.g., due to power amplifiers and signal processing units), and
 (iii)
the loaddependent dynamic energy consumption of its active cells f _{ i }(ρ _{ i }) (\(i\in {\mathcal {S}}_{l}\)), where \(f_{i}:[0,1]\to \mathbb {R}_{+}\) is a given continuous function relating the energy consumption to the corresponding cell load.
For concreteness, we make the following assumption throughout the paper (see also Remark 4)
Assumption 6 (Concave dynamic energy consumption).
\(f_{i}:[0,1]\to {\mathbb {R}}_{+} \, (i\in {\mathcal {M}})\), is concave and continuously differentiable.
In particular, this assumption is satisfied by a linear dependency of the base station energy consumption and the cell load reported in current studies such as [27].
Remark 4.
In fact, the loaddependent dynamic energy consumption can also be assumed to be a convex function of the load. Moreover, we could even assume that it is a sum of convex and concave functions. The optimization framework presented in this paper can be straightforwardly extended to cover these cases.
List of variables
Variable  Symbol 

Set of all base stations  \({\mathcal {L}} = \{1,\ldots,L\}\) 
Set of all cells  \({\mathcal {M}}= \{1,\ldots,M\}\) 
Set of cells associated with base station l  \({\mathcal {S}}_{l}\subset {\mathcal {M}}\) 
Set of all test points  \({\mathcal {N}}= \{1,\ldots,N\}\) 
Set of test points served by cell i  \({\mathcal {N}}_{i}\subset {\mathcal {N}}\) 
Rate requirements of all test points  \(\boldsymbol {r} = \left [ r_{1},r_{2}, \ldots, r_{N} \right ] \in \mathbb {R}_{++}^{N}\) 
Assignment matrix  X=[x _{ i,j }]∈{0,1}^{ M×N } 
Cell load vector  ρ:=[ρ _{1},…,ρ _{ M }]^{ T }∈[0,1]^{ M } 
Pathloss matrix  \(\mathbf {G}=[g_{i,j}]\in \mathbb {R}_{++}^{M \times N}\) 
Link spectral efficiency in bits per resource block  \(\omega _{i,j}: \mathbb {R}_{+}^{M} \to \mathbb {R}_{+}\) 
Worstcase link spectral efficiency in bits per resource block  \(\tilde {\omega }_{i,j}\in \mathbb {R}_{+}\) 
Number of resource blocks available at cell i  \(B_{i}\in \mathbb {R}_{++}\) 
Static energy consumption of base station l  \(c_{l}\in \mathbb {R}_{+}\) 
Static energy consumption of cell i  \(e_{i}\in \mathbb {R}_{+}\) 
Dynamic energy consumption of cell i  \(f_{i}: [0,1]\to \mathbb {R}_{+}\) 
3 Problem statement
where the optimization variables are x _{ i,j } and ρ _{ i } (\(i \in {\mathcal {M}}, j \in {\mathcal {N}}\)). In particular, Assumption 3 is captured by (5c) together with (5e). Constraints 5b and (5d), in contrast, ensure that the cell load is in accordance with Definition 3.
To ensure feasibility of the above problem and to show the effectiveness of our approach, we consider scenarios where the rate requirements of TPs are sufficiently low for a reasonable amount of redundancies that allow for deactivation of cells. Moreover, if the traffic requirements in the system are sufficiently low or the number of cells is sufficiently large, ρ ^{⋆} is expected to be sparse with zero entries specifying cells that can be deactivated.
4 Energyefficiency optimization
The difficulty of problem (5) lies in its combinatorial nature. In fact, it can be shown that the problem is related to the classical binpacking problem, which is known to be NPhard (nondeterministic polynomialtime hard) [28]. Consequently, the complexity is expected to grow exponentially with the number of cells. On the positive side, problem (5) has a special structure that can be exploited by majorizationminimization techniques [29], which have been widely used in recent years to tackle various problems in compressed sensing [30] and machine learning [31].
where s _{ i }:=vec(S _{ i }) with S _{ i }∈{0,1}^{ M×N } being a matrix of zeros, except for its ith row, which is a row of ones. Similarly, t _{ l }:=vec(T _{ l }) with T _{ l }∈{0,1}^{ M×N } is a matrix of zeros, except for its rows \(i\in {\mathcal {S}}_{l}\), which are rows of ones. The first equality in (6) follows from Fact 1 and the definition of the l _{0}norm, which does not account for magnitudes. More precisely, if at least one TP is served by cell i (i.e., \(\sum _{j\in {\mathcal {N}}} x_{i,j}\geq 1\)), then the cell load at cell i is nonzero ρ _{ i }>0 and we have \( \rho _{i} _{0} =\left \sum _{j\in {\mathcal {N}}} x_{i,j} \right _{0}= 1\). The second equality in (6) uses vector multiplication to represent the sums in a more compact way.
Definition 6.
Given the assignment \(\tilde {\boldsymbol {x}}\) and the load dependent energy consumption \(f_{i}(\rho _{i}(\tilde {\boldsymbol {x}}))\) of cell i with \(\rho _{i}(\tilde {\boldsymbol {x}}) =\sum _{j \in {\mathcal {N}}} \frac {r_{j}}{B_{i} \tilde {\omega }_{i,j}}\,x_{i,j} \) (c.f. 5b), we define the function \(\tilde {f}_{i}:[0,1]^{NM} \to \mathbb {R}_{+} : \tilde {\boldsymbol {x}} \mapsto f_{i}(\sum _{j \in {\mathcal {N}}} \frac {r_{j}}{B_{i} \tilde {\omega }_{i,j}}\,x_{i,j})\).
where the assignment variables x _{ i,j } (\(i \in {\mathcal {M}}, j \in {\mathcal {N}}\)) are the only optimization variables.
4.1 Problem relaxation
Solving problem (11) is not straightforward because we need to minimize a nonconvex function over a convex set. Fortunately, reference [30] presents an optimization framework based on the majorizationminimization (MM) algorithm [29] to handle problems of this type. The framework can be used to decrease the value of the objective function in a computationally efficient way. For completeness, the reader can find some details of the MM algorithms in the Appendix.
4.2 Majorizationminimization (MM) algorithm
for some feasible starting point^{8} \(\tilde {\boldsymbol {x}}^{(0)}\in \mathcal {X}\). In words, the MM algorithm solves iteratively a sequence of convex optimization problems. For the chosen majorizing function, the problem to be solved in every iteration is a linear programming problem (LP), which can be typically solved efficiently with standard optimization tools.
As discussed in the Appendix, the sequence \(\{\tilde {\boldsymbol {x}}^{(n)}\}_{n\in {\mathbb N}}\subset \mathcal {X}\) for some \(\tilde {\boldsymbol {x}}^{(0)}\in \mathcal {X}\) generated by (14) produces a nonincreasing sequence \(\{h(\tilde {\boldsymbol {x}}^{(n)})\}_{n\in {\mathbb N}}\) of objective values. Therefore, as n→∞, we expect the corresponding sequence of assignment matrices \(\{\boldsymbol {X}^{(n)}\}_{n\in {\mathbb N}}\) (note that \(\tilde {\boldsymbol {x}}^{(n)} =: \text {vec}(\mathbf {X}^{(n)}) \)) to evolve towards network configurations with low energy consumption.
Note that (12) is monotonically decreasing (c.f. Appendix) and bounded from below (\(h(\tilde {\boldsymbol {x}})\geq \sum _{l\in \mathcal {L}}\hat {c}_{l} \log {\epsilon }+\sum _{i\in {\mathcal {M}}}\hat {e}_{i} \log {\epsilon }, \forall \tilde {\boldsymbol {x}}\in \mathcal {X}\)), so the sequence \(\{h(\tilde {\boldsymbol {x}}^{(n)})\}_{n\in {\mathbb N}}\) converges by the monotone convergence theorem. We emphasize that this does not imply a convergence of \(\{\tilde {\boldsymbol {x}}^{(n)}\}_{n\in {\mathbb N}}\). For properties of the sequence \(\{\tilde {\boldsymbol {x}}^{(n)}\}_{n\in {\mathbb N}}\), we refer the reader to [34].
4.3 Serving a test point with multiple cells
By Assumption 3, each TP is restricted to be served by exactly one cell. This strict limitation introduces the nonconvex constraint (5e) to the optimization problem in (5), which motivates the relaxation (8) and the heuristic mapping introduced in Algorithm 1 (Fig. 2). To avoid these heuristic approaches for which we are not guaranteed to find solutions, we assume in this section that each TP can be served by multiple cells. This assumption is implemented by using 8 directly instead of 5e. As a result, there is no need for any relaxations of the constraints or the use of heuristic mappings such as that in Algorithm 1 (Fig. 2). We only need to approximate the cost function as done in (11a) and apply the MM algorithm to the resulting optimization problem, and we note that these operations have a strong analytical justification.
The assumption of multiple cells serving one TP has a practical interpretation when considering Definition 2. It means that cells can serve only a fraction of the traffic generated in the area corresponding to some TP. In other words, we do not use a allornothing approach, where cells should serve either all users or no users in the area corresponding to a TP.
5 Loadaware energyefficiency optimization
The model presented in Section 2 assumes the worstcase interference in a fully loaded system, which leads to a lower bound on the link spectral efficiency (c.f. Assumption 5). As pointed out in Remark 3, the main rationale behind this approach is the need for avoiding coverage holes when network elements are deactivated. The price is a suboptimal performance in terms of energy efficiency because the interference is overestimated, and therefore, users may use more resource blocks than required to keep their minimum data rate requirements. An immediate consequence of this is that more cells are activated than are necessary for meeting the minimum rate requirements at the TPs. In this section, we extend the optimization problem in (11) to incorporate more precise estimates of the load induced by a given usercell assignment, which is not a trivial task because it involves load computation (with fixed assignments) that requires the solution of a system of nonlinear equations [11, 24, 36] (note that we can easily estimate the link spectral efficiency from the load by using 2).

Step 1 Compute the link spectral efficiency \(\forall _{i\in {\mathcal {M}},j\in {\mathcal {N}}}~\omega _{i,j}(\boldsymbol {\rho })\) defined in (2) for the load value obtained in the previous iteration of Step 2 of the algorithm (in the first iteration of the algorithm, we can use the worstcase spectral efficiency) and solve Problem (11) with these (fixed) link spectral efficiencies to obtain an TPcell assignment X.

Step 2 For the TPcell assignment obtained in Step 1, compute the load induced by this assignment.
Remark 5.
The convergence of Algorithm 3 is established as follows. The convergence of Step 1 of the algorithm for a fixed load is outlined in Section 4.2, which results in a monotonically decreasing energy consumption. In Step 2, we obtain better estimates for the interference caused by active cells, which let us compute the spectral efficiency of links for the next iteration. The feasibility of the resulting optimization problem is guaranteed because we only allow for deactivation of cells (we do not allow reactivation of cells deactivated in a previous iteration step).
6 Numerical evaluation
In the following, we present a numerical evaluation of the performance of the proposed algorithm in different networks. We start by outlining the basic simulation scenario followed by a comparison with two reference schemes with respect to the energy savings and computational time. Next, we present the ability of the proposed algorithm to incorporate a variety of different base station energy consumption models. Finally, we show the performance gains achieved by applying Algorithm 3 (Fig. 4) from Section 5.
6.1 Basic simulation scenario
The simulated network is located in a squareshaped area of size 2 km × 2 km, where L base stations are placed at locations chosen uniformly at random. Unless stated otherwise, each base station has three cells directed at 0°, 120°, and 240°, respectively. Traffic generated by users is represented by N TPs on an irregular grid. Hence, each TP represents the traffic requirements of an area of different sizes. To obtain spatially varying traffic requirements, we use the following traffic model in each run of the simulations. We define three circular hotspot areas with centers chosen uniformly at random within the area. There are two types of TPs: “hotspot TPs (HTP)” and “standard TPs (STP)”. Each TP in the simulation has probability 0.3 of being a HTP and probability 0.7 of being a STP. While the position of STP is chosen uniformly at random within the whole area, a HTP can be assigned uniformly at random to one of three hotspot areas. Its final position is determined in polar coordinates by sampling the distance from the hotspot center from a normal distribution and the angle from a uniform distribution. We use a wrap around model to avoid boundary effects and determine the location of TPs to be placed outside the squareshaped area. The data rate requirements of TPs are derived from a normal distribution with μ _{d}=128 kbps and variance \(\sigma _{\mathrm {d}}^{2}= 32 ~\text {kbps}^{2}\) with a lower bound of 1 kbps. The signal attenuation for links between cells and TPs follows the International Telecommunication Union (ITU) propagation model for urban macro cell environments with a horizontal antenna pattern for threesector cell sites with fixed antenna patterns [38].
Unless otherwise stated, we use the following simulation parameters: ε ^{⋆}=10^{−3}, ε=10^{−3}, B _{ i }=20 MHz, P _{ i }=40 dB, η _{SINR}=1, η _{BW}=0.83, c _{ i }=500 W, and e _{ i }=280 W. The values of the last six parameters have been chosen to mimic the behavior of commercial LTE systems. Furthermore, we use f _{ i }(ρ _{ i })=564 ρ _{ i } to model the loaddependent energy consumption, which is a value similar to the dynamic energy consumption of current macro cells with six transmit antennas [27].
The proposed algorithms are compared with a solution of the original problem in (5) and, where possible, with the centralized cell zooming approach from [9]. The solution to the problem in (5) is obtained by using Matlab 2013a in combination with IBM’s CPLEX on a Intel Core i7 computer with four cores. As shown later in this section, the computational time to solve 5 grows fast with the problem size. Therefore, to solve the problem in (5) in a reasonable time for comparison purposes, we confine our attention to small networks with M=102 cells (L=34 base stations) and N=100 TPs, unless otherwise stated. We obtained the 95 % confidence intervals depicted in the figures by applying the bias corrected and accelerated bootstrap method [39] to the outcome of 100 independent runs of the simulations. Results related to the overall network energy consumption will be normalized to the energy consumption of the network when all cells are active and fully loaded.
Definition 7 (Normalized network energy consumption).
We refer to the sparsity supporting majorizationminimization algorithm as “sMM” and to any algorithm that solves 5 directly as mixedinteger programming (MIP) algorithm. We refer to solutions obtained by the centralized cell zooming algorithm in [9] as “cCZ”. The alternating approach proposed in Section 5 is referred to as “alternating sMM” algorithm.
6.2 Notes on the complexity
The complexity of the proposed algorithm is of the same order of solving iteratively LP problems, which is a class of problems that can be solved efficiently with many standard optimization tools [33]. In our simulations for this task, we use CPLEX, which implements the dual simplex algorithm to solve LPs [35]. Typically, our proposed algorithm terminates after a few iterations (≪100) [1]. The complexity of the proposed algorithm is linear in the complexity of the simplex method, which has a polynomial time complexity on average and an exponential time worstcase complexity. In contrast, integer programming problems are typically solved by branch and cut algorithms (also in CPLEX [35]), which have an upper bound on the number of nodes 2^{ M N } and solves one LP per node resulting in an exponential complexity.
6.3 Computational performance comparison between sMM, cCZ, and MIP
The cCZ has limited capability to incorporate different energy consumption models and base stations with several sectors, so we confine ourselves to a simple base station model. We assume a homogeneous network model under which all base stations have only one omnidirectional cell, and all base stations have the same energy consumption model. More precise, we use \({\mathcal {L}} = M =100\), \({\mathcal {S}}_{l} = 1\) and (4) with c _{ l }=500, e _{ i }=280, f _{ i }(ρ _{ i })=0 (\(l\in {\mathcal {L}}\), \(i\in {\mathcal {M}}\)).
6.4 Cells with different sources of energy consumption
In contrast to other approaches to the problem of energyefficient network topology control, our optimization framework can easily deal with heterogeneous networks in which cells have different static and loaddependent energy consumptions in (4). In other words, the proposed sMM algorithm can cope with different energy consumption models of cells. It can select those network configurations that exhibit as low overall energy consumption as possible. To illustrate the impact of different energy consumption models on the optimization result, we start by varying the static energy consumption of all cells, while keeping the loaddependent energy consumption fixed. Later in this section, we show the impact of the loaddependent energy consumption by changing the weight of the loaddependent part relative to the static part.
6.5 Alternating sMM algorithm
7 Conclusions
We have introduced an optimization framework for enhancing the energy efficiency of cellular networks. In wireless systems, problems of this type are hard to solve because they are combinatorial problems, and they have a complex interference coupling structure among cells. Indeed, even with a simplifying assumption of the worstcase interference, the energy saving problem is a mixed integer programming problem that is strongly related to the binpacking problem, which in turn is known to be NPhard. As a result, we cannot expect to find optimal solutions quickly, so we focused in this study on fast suboptimal heuristics. Unlike many existing approaches in the literature, the proposed methods can naturally consider both the dynamic and static energy consumption of base stations with multiple cells in heterogeneous networks.
In the first proposed heuristic, we relaxed the mixed integer programming problem to a form suitable for the application of majorizationminimization techniques. The resulting algorithm requires the solution of a series of linear programming problems that can be efficiently solved with standard mathematical solvers. Therefore, it can be applied to largescale problems, and it is also suitable for online operation. One limitation of this first method is that it uses the worstcase interference scenario, so it can be too conservative in terms of energy savings. To address this limitation, we also proposed a twostep alternating approach that obtain accurate values of the spectral efficiency of links by using the framework of standard interference functions. Simulations show that the proposed fast heuristics are able to obtain network configurations that are competitive in terms of energy consumption against optimal algorithms.
8 Endnotes
^{1} We lend the term topology control from work in the field of ad hoc networks where it refers the task of generating a network with desired features by coordinating the nodes’ transmitting range [40, 41].
^{2} Although the l _{0}norm is not a norm, we use the term “norm” as it is a common practice in literature.
^{3} A test point becomes a user if it represents a QoS requirement of one particular user, in which case the subarea is a point corresponding to the position of this user.
^{4} The smaller the area represented by each TP, the better is this approximation. However, smaller areas imply an increased number of TPs, and the computational complexity of the proposed algorithm grows.
^{5} Note that B _{ i } can also be interpreted as the total bandwidth available at cell i, in which case ρ _{ i } is expressed in terms of the fraction of required and available bandwidth.
^{6} A resource block is defined as a portion of the available timefrequency plane spanning a number of consecutive OFDM symbols in the time domain over a number of subcarriers in the frequency domain.
^{7} This relaxation together with 7c leads to a communication scenario where multiple cells serve one TP. A more detailed discussion on the implications is presented in Section 4.3
^{8} In our experience a good starting point is derived from a feasible assignment matrix obtained by connecting each TP to the cell providing the strongest received signal strength.
^{9} Even though such setups are unlikely in practice, we use it for reasons of illustration.
9 Appendix
9.1 Majorizationminimization (MM) algorithm
Here, we briefly summarize the majorizationminimization (MM) algorithm [29], which can be seen as a generalization of the well known expectationmaximization (EM) algorithm. The presentation that follows is heavily based on that in the study in [42] (see also [1, 36]).
 C.1g majorizes h at every point in \(\mathcal {X}\), i.e.,$$\begin{array}{*{20}l} h(\mathbf{x})\le g(\mathbf{x},\mathbf{y}),\quad\forall\mathbf{x},\mathbf{y}\in \mathcal{X}, \end{array} $$(16)
 C.2g and h coincide at (x,x) so that$$\begin{array}{*{20}l} h(\mathbf{x})=g(\mathbf{x},\mathbf{x}),\quad\forall\mathbf{x}\in\mathcal{X}. \end{array} $$(17)
Irrespective of the choice of g, we can easily verify monotonicity of the objective value with the help of (16), (17), and (18): h(x ^{(n)})=g(x ^{(n)},x ^{(n)})≥g(x ^{(n+1)},x ^{(n)})≥g(x ^{(n+1)},x ^{(n+1)})=h(x ^{(n+1)}). Therefore, since the function h is bounded below when restricted to \(\mathcal {X}\) by assumption, we can conclude that \(h\left (\mathbf {x}^{(n)}\right)\to c\in \mathbb {R}\) for some c≥h(x ^{⋆}) as n→∞. However, we emphasize that this in general does not imply the convergence of the sequence {x ^{(n)}}.
This particular choice is common in, for example, sparse signal recovery [30].
Remark 6.
We note that, instead of solving the optimization problem in 18 exactly, it is sufficient for the monotonicity of the sequence {h(x ^{(n)})} that g(x ^{(n+1)},x ^{(n)})≤g(x ^{(n)},x ^{(n)}) for every \(n\in \mathbb {N}\). This observation is relevant if the righthand side of 18 can only be solved asymptotically, in which case the iteration can be truncated whenever the above inequality is satisfied.
Declarations
Acknowledgments
This work has been partly supported by the framework of the research project ComGreen under the grantnumber 01ME11010, which is funded by the German Federal Ministry of Economics and Technology (BMWi). Part of this work has been performed in the framework of the FP7 project ICT317669 METIS, which is partly funded by the European Union. The authors would like to acknowledge the contributions of their colleagues in METIS, although the views expressed are those of the authors and do not necessarily represent the project. The research leading to these results has received funding from the European Union’s Seventh Framework Programme managed by REA  Research Executive Agency (FP7/20072013) under grant agreement no 286822.
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
Authors’ Affiliations
References
 E Pollakis, RLG Cavalcante, S Stanczak, in Signal Processing Advances in Wireless Communications (SPAWC), 2012 IEEE 13th International Workshop On. Base station selection for energy efficient network operation with the majorizationminimization algorithm, (2012), pp. 219–223. doi:10.1109/SPAWC.2012.6292896.
 D Willkomm, S Machiraju, J Bolot, A Wolisz, Primary user behavior in cellular networks and implications for dynamic spectrum access. IEEE Commun. Mag.47(3), 88–95 (2009). doi:10.1109/MCOM.2009.4804392.View ArticleGoogle Scholar
 A Corliano, M Hufschmid. Energieverbrauch der mobilen Kommunikation  Schlussbericht. Technical report, Bundesamt für Energie, Schweizerische Eidgenossenschaft, Bern, Swiss, (February 2008). (in German).Google Scholar
 E Oh, B Krishnamachari, X Liu, Z Niu, Toward dynamic energyefficient operation of cellular network infrastructure. Commun. Mag. IEEE. 49(6), 56–61 (2011). doi:10.1109/MCOM.2011.5783985.View ArticleGoogle Scholar
 AlcatelLucent, 9900 Wireless Network Guardian. Tech. White Paper (2008). http://www.alcatellucent.com. Accessed 2008.
 C Han, T Harrold, S Armour, I Krikidis, S Videv, PM Grant, H Haas, JS Thompson, I Ku, CX Wang, TA Le, MR Nakhai, J Zhang, L Hanzo, Green radio: radio techniques to enable energyefficient wireless networks. IEEE Commun. Mag.49(6), 46–54 (2011). doi:10.1109/MCOM.2011.5783984.View ArticleGoogle Scholar
 RW Terry Norman, LTE infrastructure: Worldwide demand drivers and base station forecast 2012–2017. Technical report, Analysys Mason Group (May 2012).Google Scholar
 P GonzalezBrevis, J Gondzio, Y Fan, HV Poor, J Thompson, I Krikidis, PJ Chung, in Vehicular Technology Conference (VTC Spring), 2011 IEEE 73rd. Base station location optimization for minimal energy consumption in wireless networks, (2011), pp. 1–5. doi:10.1109/VETECS.2011.5956204.
 Z Niu, Y Wu, J Gong, Z Yang, Cell zooming for costefficient green cellular networks. IEEE Commun. Mag.48(11), 74–79 (2010). doi:10.1109/MCOM.2010.5621970.View ArticleGoogle Scholar
 L Chiaraviglio, D Ciullo, G Koutitas, M Meo, L Tassiulas, in Wireless Ondemand Network Systems and Services (WONS), 2012 9th Annual Conference On. Energyefficient planning and management of cellular networks, pp. 159–166. doi:10.1109/WONS.2012.6152223.
 K Majewski, M Koonert, in Telecommunications (AICT), 2010 Sixth Advanced International Conference On. Conservative cell load approximation for radio networks with shannon channels and its application to LTE network planning, (2010), pp. 219–225. doi:10.1109/AICT.2010.9.
 D LopezPerez, I Guvenc, G de la Roche, M Kountouris, TQS Quek, J Zhang, Enhanced intercell interference coordination challenges in heterogeneous networks. Wireless Commun. IEEE. 18(3), 22–30 (2011).View ArticleGoogle Scholar
 S Joshi, S Boyd, Sensor selection via convex optimization. IEEE Trans. Signal Process.57(2), 451–462 (2009).View ArticleMathSciNetGoogle Scholar
 S Zhou, J Gong, Z Yang, Z Niu, P Yang, in Proc. ACM MobiCom. Green mobile access network with dynamic base station energy saving (Beijing, China, 2009), pp. 1–3.Google Scholar
 E Pollakis, RLG Cavalcante, S Stanczak, in Signal Processing Advances in Wireless Communications (SPAWC), 2013 IEEE 14th Workshop On. Enhancing energy efficient network operation in multirat cellular environments through sparse optimization, (2013), pp. 260–264. doi:10.1109/SPAWC.2013.6612052.
 I Yamada, M Yukawa, M Yamagishi, Minimizing the Moreau envelope of nonsmooth convex functions over the fixed point set of certain quasinonexpansive mappings. FixedPoint Algorithms for Inverse Problems in Science and Engineering (Springer, New York, 2011).Google Scholar
 RD Yates, A framework for uplink power control in cellular radio systems. IEEE J. Select. Areas Commun.13(7), 1341–1348 (1995).View ArticleMathSciNetGoogle Scholar
 M Schubert, H Boche, Interference Calculus  A General Framework for Interference Management and Network Utility Optimization (Springer, Berlin, 2012).MATHGoogle Scholar
 K Tutschku, in INFOCOM ’98. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 3. Demandbased radio network planning of cellular mobile communication systems, (1998), pp. 1054–10613.Google Scholar
 E Amaldi, A Capone, F Malucelli, F Signori, in Wireless Communications and Networking, 2003. WCNC 2003. 2003 IEEE, 2. Optimization models and algorithms for downlink umts radio planning, (2003), pp. 827–8312. doi:10.1109/WCNC.2003.1200478.
 P Mogensen, W Na, IZ Kovacs, F Frederiksen, A Pokhariyal, KI Pedersen, T Kolding, K Hugl, M Kuusela, in Vehicular Technology Conference, 2007. VTC2007Spring. IEEE 65th. LTE capacity compared to the shannon bound, (2007), pp. 1234–1238. doi:10.1109/VETECS.2007.260.
 AJ Fehske, GP Fettweis, in Modeling Optimization in Mobile, Ad Hoc Wireless Networks (WiOpt), 2013 11th International Symposium On. On flow level modeling of multicell wireless networks, (2013), pp. 572–579.Google Scholar
 M Kasparick, RLG Cavalcante, S Valentin, S Stanczak, M Yukawa, Kernelbased adaptive online reconstruction of coverage maps with side information. IEEE Trans. Veh. Technol. (2015). Available at http://arxiv.org/abs/1404.0979. Accessed May 2015.
 I Siomina, D Yuan, Analysis of cell load coupling for LTE network planning and optimization. IEEE Trans. Wireless Commun.11(6), 2287–2297 (2012).View ArticleGoogle Scholar
 CK Ho, D Yuan, L Lei, S Sun, Power and load coupling in cellular networks for energy optimization. Wireless Commun. IEEE Trans.14(1), 509–519 (2015).View ArticleGoogle Scholar
 RLG Cavalcante, E Pollakis, S Stanczak, in Signal and Information Processing (GlobalSIP), 2014 IEEE Global Conference On. Power estimation in lte systems with the general framework of standard interference mappings, (2014), pp. 818–822.Google Scholar
 G Auer, O Blume, V Giannini, I Godor, MA Imran, Y Jading, E Katranaras, M Olsson, D Sabella, P Skillermark, W Wajda, D2.3: Energy efficiency analysis of the reference systems, areas of improvements and target breakdown. Technical report, INFSOICT247733 EARTH (Energy Aware Radio and NeTwork TecHnologies) (December 2010).Google Scholar
 R Cavalcante, E Pollakis, S Stanczak, S Stefanski, R Nowak, T Kürner, A Eisenblätter, D Montvila, Energy savings in cellular networks. COST IC1004 (2013). https://www.ictearth.eu/publications/deliverables/deliverables.html.
 DR Hunter, K Lange, A tutorial on MM algorithms. Am. Stat.58(1), 30–37 (2004).View ArticleMathSciNetGoogle Scholar
 EJ Candes, MB Wakin, SP Boyd, Enhancing sparsity by reweighted l _{1} minimization. J. Fourier Anal. Appl.14(5), 877–905 (2008).View ArticleMathSciNetMATHGoogle Scholar
 BK Sriperumbudur, DA Torres, GRG Lackriet, A majorizationminimization approach to the sparse generalized eigenvalue problem. Mach. Learn.85(1–2), 3–39 (2011).View ArticleMathSciNetMATHGoogle Scholar
 HH Bauschke, PL Combettes, Convex Analysis and Monotone Operator Theory in Hilbert Spaces (Springer, Springer, 2011).Google Scholar
 S Boyd, L Vandenberghe, Convex Optimization (Cambridge Univ. Press, Cambridge, U.K., 2006).Google Scholar
 C FJ Wu, On the Convergence Properties of the EM Algorithm. The Annals of statistics. 11(1), 95–103 (1983). Institute of Mathematical Statistics: http://www.jstor.org/stable/2240463.
 IBM Corp, IBM ILOG CPLEX optimization studio  CPLEX user’s manual. Tech. manual (2015). http://www.ibm.com/.
 RLG Cavalcante, S Stanczak, M Schubert, A Eisenblatter, U Turke, Toward EnergyEfficient 5G Wireless Communications Technologies: Tools for decoupling the scaling of networks from the growth of operating power. in Signal Processing Magazine, IEEE. 31(6), 24–34 (2014).View ArticleGoogle Scholar
 AJ Fehske, H Klessig, J Voigt, GP Fettweis, Concurrent loadaware adjustment of user association and antenna tilts in selforganizing radio networks. Vehicular Technol. IEEE Trans.62(5), 1974–1988 (2013).View ArticleGoogle Scholar
 3GPP, Further Advancements for EUTRA: Physical Layer Aspects (Release 9), TR 36.814 V2.0.1 (2010). http://www.3gpp.org/dynareport/36814.htm.
 B Efron, Better bootstrap confidence intervals. J. Am. Stat. Assoc.82(397), 171–185 (1987).View ArticleMathSciNetMATHGoogle Scholar
 R Ramanathan, R RosalesHain, in INFOCOM 2000. Nineteenth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE, 2. Topology control of multihop wireless networks using transmit power adjustment, (2000), pp. 404–4132.Google Scholar
 P Santi, Topology control in wireless ad hoc and sensor networks. ACM computing surveys (CSUR). 37(2), 164–194 (2005).View ArticleGoogle Scholar
 B Sriperumbudur, D Torres, GG Lanckriet, A majorizationminimization approach to the sparse generalized eigenvalue problem. Mach. Learn.85(1–2), 3–39 (2011). doi:10.1007/s1099401052263.View ArticleMathSciNetMATHGoogle Scholar
 RT Rockafellar, Convex Analysis,Princeton Mathematical Series (University Press, Princeton, 1970). http://books.google.de/books?id=QTK3RwAACAAJ. Accessed 1970.