Table Of ContentUtility Optimization in Heterogeneous Networks via
CSMA-Based Algorithms
Matthew Andrews Lisa Zhang
Alcatel-Lucent Bell Labs, Murray Hill, NJ Alcatel-Lucent Bell Labs, Murray Hill, NJ
andrews@research.bell-labs.com ylz@research.bell-labs.com
Abstract—We study algorithms for carrier and rate allocation intheinteriorofthemacrocellitself,notjustfromneighboring
in cellular systems with distributed components such as a het- macrocells.
erogeneous LTE system with macrocells and femtocells. Existing
LTE networks with small cells represent a hybrid of tradi-
3 work on LTE systems often involves centralized techniques
tional cellular networks and traditional ad-hoc networks. On
1 or requires significant signaling, and is therefore not always
0 applicableinthepresenceoffemtocells.MoredistributedCSMA- the one hand, basestations are running the full LTE protocols
2 based algorithms (carrier-sense multiple access) were developed which allows for the many interference mitigation schemes
n in the context of 802.11 systems and have been proven to be thattheseprotocolsprovide.Ontheotherhand,theplacement
utility optimal. However, the proof typically assumes a single
a of picocells and femtocells in an LTE network is likely to be
transmissionrateoneachcarrier.Further,itreliesontheCSMA
J unstructured and so the interference configurations are likely
collision detection mechanisms to know whether a transmission
3 is feasible. to resemble a typical ad-hoc configuration. As a consequence,
InthispaperwepresentaframeworkforLTEschedulingthat there is no hope for any centralized planning, which is a
]
I is based on CSMA techniques. In particular we first prove that possibility for cellular network interference mitigation tech-
N CSMA-based algorithms can be generalized to handle multiple
niques such as frequency reuse. We therefore need distributed
transmission rates in a multi-carrier setting while maintaining
. algorithms.
s utility optimality. We then show how such an algorithm can be
c implemented in a heterogeneous LTE system where the existing We are interested in scheduling algorithms for a heteroge-
[
Channel Quality Indication (CQI) mechanism is used to decide neous system that consists of a mixture of macrocells and
3 transmission feasibility. small cells. We wish to determine the channels, or carriers,
v used by each basestation as well as the transmission rate on
8 I. INTRODUCTION each channel. This should be done in order to maximize a
5
Interferencemitigationisafundamentalprobleminwireless utilityfunctionassociatedwiththesystem.Althoughanumber
2
networks.Theexactmethodforhandlinginterferencedepends of scheduling algorithms have been proposed in the LTE
4
. on the nature of the network, e.g. whether it is a centrally context, many of them require a non-trivial amount of signal-
1
controlledcellularnetworkoramoreunstructuredad-hocnet- ing among the transmitters. For example, in some algorithms
1
2 work. For cellular networks interference can be mitigated via a scheduling decision is preceded by a calculation of how
1 techniques such as power-control, frequency reuse, and fine- the decision would affect the overall system utility, e.g. by
: grained rate control based on channel-quality measurements exchangingpartialderivativeinformationbetweenneighboring
v
i together with some aspect of central planning. On the other transmitters. This is difficult to support in heterogeneous
X
hand,forad-hocnetworks,especiallythoserunningthe802.11 networks with small cells due to the complexity of setting
r protocol, interference is typically mitigated by a distributed up the necessary communication channels.
a
collision-based random access scheme, perhaps coupled with OurmainresultistoshowthatLTEschedulinginheteroge-
a fairly coarse-grained rate-adaptation procedure. neous networks can be performed using techniques developed
In this paper we are concerned with interference mitiga- in the context of 802.11 networks. These networks utilize
tion in cellular systems with distributed components such a Carrier-Sense Multiple Access (CSMA) protocol, often
as heterogeneous 4G LTE systems that include small cells. enhanced with a Request-to-Send/Clear-to-Send (RTS/CTS)
Small cells are basestations that aim to provide high data rate mechanism [11]. In this setup, transmitters sense the channel
coverageoverasmallhigh-trafficarea.Forexample,picocells before transmitting and proceed only if no conflicting trans-
areownedbyacellularproviderandplacedonpubliclocations missions are active.
such as lamp posts. Alternatively, femtocells are owned by an TheattractivenessofthisframeworkisthatCSMAschedul-
end-userwiththeaimofimprovingcoverageinaprivatehome ing algorithms can achieve optimal throughputs without any
or business. An important property of femtocells is that they explicit signaling. Coordination is implicit in the “collision”
canoperateinClosedSubscriberGroup(CSG)modeinwhich mechanism defined by the CSMA mechanism. In particular,
the basestation restricts the set of mobile terminals that can Jiang and Walrand showed in [10] that such mechanisms can
connect to it. Another effect introduced by femtocells is that be used to achieve any set of feasible throughputs. Among
interferencetomacrocelluserscannowcomefromafemtocell the sequence of papers that followed, Liu et al.[14] presented
utility-optimal algorithms for CSMA networks with a single • In Section VIII we give an overview of past work on
carrier and single transmission rate. Two subsequent papers scheduling andresource allocation incellular and802.11
discussed implementation issues associated with these algo- networks.
rithms [13] and presented an extension to the case of a single
transmission rate on multiple carriers [15]. However, to the
best of our knowledge no previous work has looked at how
such techniques can be applied in the LTE context. II. ABSTRACTMODEL
A number of issues arise if we are to use CSMA-based
scheduling algorithms for LTE. First, LTE networks utilize an
We begin by describing an abstract model that captures the
OFDM physical layer which consists of multiple transmission
notion of multiple transmission rates on multiple carriers and
rates over multiple carriers realized by multiple adjustable
variable-power scheduling. We consider a system in which a
power levels. Hence, in addition to deciding when to transmit
set of transmitters communicate to a set of receivers via a set
on each carrier as in [10], [14], [15], the scheduler now
of links L on a set of carriers C at transmission rates from
also chooses the power level used and the transmission rate.
a set R of positive numbers. Each link is associated with a
Second, LTE networks do not have an explicit carrier sense
transmitter and a receiver, where multiple links may share a
mechanism to detect conflicting transmissions. We need to
commontransmitterbuteachlinkcorrespondsone-to-onewith
build this capability via the existing Channel Quality In-
a receiver.
dication (CQI) mechanism. Lastly, each basestation in an
LTE network typically has its own local scheduler, such as We solve a scheduling problem, i.e. at each time instant
Proportional Fair, that governs the transmissions to the users we specify for every carrier the links that are transmitting
within the cell. We need a mechanism that allows the existing on that carrier together with the associated transmission rates.
local scheduler to work with the CSMA-based algorithm. More precisely, we represent a schedule on a carrier c ∈ C
The main result of this paper is a scheduling algorithm by a vector (r0,...,rL−1) ∈ RL0 where l = |L| and R0 =
for utility maximization in heterogeneous LTE networks. Our R∪{0}. Such a schedule is feasible if it can be realized by
methodology is motivated by the CSMA analysis of [14]. an appropriate power allocation so that every link (cid:96) ∈ L can
We believe our main contribution is in showing that the transmitfromitstransmittertoitsreceiveratrater(cid:96) oncarrier
analysis can be adapted for the case of multiple per-carrier csimultaneously.Aschedulingalgorithmdescribesaschedule
transmissionratesandpowers,and(perhapsmoreimportantly) for every carrier c∈C at every time instant. Note that a link
describing how the algorithms can be implemented using the is allowed to simultaneously transmit on multiple carriers.
CQI mechanism present in LTE. Thisabstractmodelcapturesinterferenceandpowerassign-
We begin with a more abstract version of the algorithm in ments by the notion of a feasibility region, which consists
which details of the interference are abstracted away into a of all valid schedules. In the next two sections we describe
feasibility region for the transmissions. Many of the existing our basic algorithmic framework in this abstract model for
CSMA algorithms implicitly work with this notion. We ini- which we do not concern ourselves with how the system
tially assume an “oracle” that informs a transmitter whether knows whether a schedule is feasible but simply assume an
a potential transmission would disrupt existing transmissions. oracle that indicates whether a potential transmission leads
The later sections of the paper discuss how to realize such to feasibility. As mentioned before, for 802.11 networks this
a scheme in a heterogeneous LTE system in practice. We can be approximately realized by CSMA techniques coupled
structure the paper as follows. with RTS/CTS messages. In later sections we describe how
the oracle can be realized in an LTE heterogeneous network.
• In Section II we present an abstract model of a multi-
Weconsidertheproblemofsystemutilitymaximization.In
carrier system that allows for multiple transmission rates
particular let γ indicate the transmission rate on link (cid:96) on
oneachcarrier.Thismodelassumesthateachtransmitter (cid:96),c
carrierc.ForagivenconcaveutilityfunctionU(·)wewishto
knows whether a potential transmission is feasible.
maximize the aggregate utility over all links, i.e. to maximize
• In Sections III-IV we adapt the Liu et al. single-carrier (cid:80) (cid:80)
U( γ ). Note that for each link the utility function
single-rate utility maximization algorithm for CSMA to (cid:96) c (cid:96),c
is applied to the total transmission rate on the link over all
the abstract framework of Section II to address the
carriers. This coupling between the carriers implies that we
general case of multiple transmission rates on multiple
cannot simply treat each carrier as an isolated system.
carriers.
• In Sections V and VI we give a concrete model for het- A formal version of the optimization problem is given
erogeneous LTE networks with small cells, in which we below. Consider a schedule m ∈ N where N is the set
c c
address power level and interference directly instead of of feasible schedules on carrier c. If π ∈ [0,1] indicates
m
viathenotionofafeasibilityregionfortransmission.We the fraction of time that m occurs and r indicates the
(cid:96),m
also discuss practical issues such as CQI-based collision transmission rate on (cid:96) under schedule m, then γ can be
(cid:96),c
detection and incorporating a local scheduler. viewed as a weighted sum of r where π serves as the
(cid:96),m m
• In Section VII we present simulation results. weight. Throughout the paper, notations such as (cid:126)γ indicate a
Algorithm III.1 RANDACC((cid:104)(cid:96),r,c(cid:105), λ, µ, T) Algorithm III.2 MMUO
• (cid:96): link for each time frame f do
• r : rate for each link (cid:96), carrier c and rate r do
• c: carrier RANDACC((cid:104)(cid:96),r,c(cid:105), λ(cid:96),r,c[f],µ(cid:96),r,c[f], f)
• λ: channel access rate for each (cid:96) do
• µ: expected transmission duration update service received S(cid:96)[f]
• T : time frame update virtual queue q(cid:96)[f +1] according to (2)
for each (cid:96), c and r do
t← beginning of T updateλ(cid:96),r,c[f+1]andµ(cid:96),r,c[f+1]accordingto(3)
while t∈T do
x← randomly drawn from Exp(λ)
t←t+x
The algorithm MMUO (multi-carrier multi-rate utility op-
if (cid:104)(cid:96),r,c(cid:105) leads to config. in Nc then timization) approximates a solution to (1) as follows (see
x← randomly drawn from Exp(1/µ) AlgorithmIII.2).Timeisdividedintoframesoffixedduration.
(cid:96) transmits on c at r during (t,t+x] Duringeachframef,eachpotentialtransmission(cid:104)(cid:96),r,c(cid:105)calls
t←t+x the RANDACC routine with parameters λ(cid:96),r,c[f] and µ(cid:96),r,c[f].
At the end of each frame, link (cid:96) calculates the service
received during the frame (denoted by S [f]), and updates
(cid:96)
vector (γ(cid:96),c)(cid:96)∈L,c∈C. We wish to solve: a virtual queue size parameter (denoted by q(cid:96)[f]) as follows.
max f1((cid:126)γ)=(cid:88)U((cid:88)γ(cid:96),c) (1) q(cid:96)[f +1]=(cid:104)q(cid:96)[f]+b[f]·(cid:16)U(cid:48)−1(q(cid:96)[f]/V)−S(cid:96)[f](cid:17)(cid:105)qmax (2)
(cid:96)∈L c qmin
s.t. γ ≤ (cid:88) r π ∀(cid:96),c In the above equation, b is a step size function that satisfies
(cid:96),c (cid:96),m m
property(A1)(definedlater),q andq areboundsonthe
(cid:88) πmm∈=Nc1 ∀c. Tvihretuaplosqiutievueepsairzaem,eatnedr V[x]cqqommnainxmtroa=xlsmthien(amqcmicnuaxra,cmyaoxf(qtmheina,lxg)o)-.
m∈Nc rithm.
We can view this as an extension of the formulation of [15] The values of λ [f] and µ [f] stay unchanged during
(cid:96),r,c (cid:96),r,c
thatallowsformultiratetransmissions(andimplicitlyvariable eachframef,andareupdatedtoλ [f+1]andµ [f+1]
(cid:96),r,c (cid:96),r,c
transmission powers). at the end of frame f, so that
In reality the sets L and N can change over time due to
c
λ [f +1]·µ [f +1]=exp(r·q [f +1]). (3)
mobility. However, as in common in the literature we assume (cid:96),r,c (cid:96),r,c (cid:96)
that this happens on a slow enough timescale that it makes
Asweshallseein(4)theperformanceof RANDACC depends
sensetosolvetheutilitymaximizationproblemforthecurrent
on the product of λ and µ. The choice of this product is
network configuration.
explained in the proof of Theorem 4.
III. MULTI-CARRIER,MULTI-RATESCHEDULING IV. ANALYSIS
ALGORITHM
WenowshowthattheMMUOalgorithmleadstoanoptimal
We first describe a routine RANDACC (in Figure Algo- solutionto(1).Theproofbuildsuponthefollowingoptimality
rithm III.1), a continuous-time random access algorithm that properties of RANDACC that were shown in [10] for the
determines when a transmission will take place. We use special case of one carrier and 0/1 transmission rates.
(cid:104)(cid:96),r,c(cid:105) to denote the transmission on link (cid:96) ∈ L on carrier
c ∈ C at rate r ∈ R. Each transmission (cid:104)(cid:96),r,c(cid:105) is associated A. RANDACC for 0/1 Rates
with two parameters, λ(cid:96),r,c the channel access rate and µ(cid:96),r,c Suppose each link (cid:96) ∈ L calls RANDACC with parameters
which represents the expected transmission duration. After an (λ ,µ ) over a sufficiently long time frame. Let (cid:126)λ=(λ )
(cid:96) (cid:96) (cid:96) (cid:96)∈L
exponentially distributed waiting period with mean 1/λ(cid:96),r,c, and let µ(cid:126) = (µ(cid:96))(cid:96)∈L. Let m(cid:126)λ,µ(cid:126)(t) be the schedule at time t
RANDACC checks whether (cid:104)(cid:96),r,c(cid:105) leads to a valid schedule under the RANDACC routine. Recall r(cid:96),m is the transmission
in Nc at that time instant. If yes, the transmission starts rate on link (cid:96) under schedule m. In this case r(cid:96),m ∈{0,1}.
immediately and lasts for an exponentially distributed time
periodwithmeanµ .Notethataninvalidscheduleincludes Lemma 1 ([12]). The sequence of schedules m(cid:126)λ,µ(cid:126)(t) for t≥
(cid:96),r,c
the situation in which (cid:96) conflicts with itself, namely (cid:96) already 0 form a continuous time reversible Markov Chain with the
transmits on c, or (cid:96) conflicts with another link on c, both of following stationary distribution.
owpheircahteasriencaacpotunrteinduobuysNmca.nNneort,etwaolsolintkhsatmsaikneceaRscAhNedDuAliCnCg πm(cid:126)λc,µ(cid:126)c = (cid:80)Π(cid:96)Π:r(cid:96),m=1λ(cid:96)·λµ(cid:96)·µ ∀m,
decision simultaneously with zero probability and therefore m(cid:48) (cid:96):r(cid:96),m(cid:48)=1 (cid:96) (cid:96)
they make conflicting decisions with zero probability. where Π (·)=1.
(cid:96)∈∅
Further, the resulting link throughput γ(cid:126)λ,µ(cid:126) = where (cid:126)q∗ and(cid:126)γ∗ are such that ((cid:126)γ∗,(cid:126)πq(cid:126)∗) is the solution to the
(cid:96)
(cid:80)mπm(cid:126)λc,µ(cid:126)cr(cid:96),m is optimal for every link (cid:96) ∈ L in the following convex optimization problem over (cid:126)γ and (cid:126)π.
following sense. We say that a link throughput vector (cid:126)γ is
max f ((cid:126)γ,(cid:126)π)=
feasible if there exist π such that γ <(cid:80) r π . 2
m (cid:96) m∈Nc l,m m V (cid:88)U((cid:88)γ )−(cid:88) (cid:88) π logπ (7)
(cid:96),c m m
Lemma 2 ([10]). For any feasible link throughput vector (cid:126)γ,
there exists (cid:126)λ and µ(cid:126) such that (cid:96)∈L (cid:88)c c m∈Nc
s.t. γ ≤ r π ∀(cid:96),c
(cid:96),c (cid:96),m m
γ(cid:96) ≤γ(cid:96)(cid:126)λ,µ(cid:126). m∈Nc
(cid:88)
B. MMUO πm =1 ∀c.
Formultipletransmissionratesonmultiplecarriers,thegen- m∈Nc
eralization from Lemma 1 to Corollary 3 is straight-forward. Further, if (cid:126)γ† is the optimal solution to (1), then
This is because RANDACC that runs on one carrier does not
|f ((cid:126)γ∗)−f ((cid:126)γ†)|≤|C|log|∪ N |/V (8)
interferewiththatonadifferentcarrier.Further,eachrate-link 1 1 c c
pair can be treated as a distinct link. For a particular carrier
c, let vectors (cid:126)λ =(λ ) and µ(cid:126) =(µ ) .
c (cid:96),r,c (cid:96)∈L,r∈R c (cid:96),r,c (cid:96)∈L,r∈R
The assumptions of Theorem 4 are:
Recall N is the set of feasible schedules on carrier c.
c (A1) (cid:80)∞ b[f]=∞ and (cid:80)∞ b2[f]<∞.
Corollary 3. The schedule sequence m(cid:126)λc,µ(cid:126)c(t) for t≥0 is a (A2) If p(cid:126)fo=0∈(cid:60)L is a solutionft=o0
continuous time reversible Markov Chain with the following +
(cid:88) (cid:88)
stationary distribution. U(cid:48)−1(p /V)− r πp(cid:126) =0 ∀(cid:96)∈L
(cid:96) (cid:96),m m
πm(cid:126)λc,µ(cid:126)c = (cid:80) Π(cid:96):r(cid:96)Π,m>0λ(cid:96),r(cid:96)λ,m,c·µ(cid:96),·r(cid:96)µ,m,c ∀m∈Nc (4) then q ≤po ≤qc mf∈oNrcall (cid:96)∈L.
n∈Nc (cid:96):r(cid:96),n>0 (cid:96),r(cid:96),n,c (cid:96),r(cid:96),n,c min (cid:96) max
The above expression shows that the stationary distribution The parameters b[·] will only be used in the analysis, not in
only depends on the product of the parameters λ and µ. thealgorithmitself.Inaddition,theparametersqmin andqmax
Whenever MMUO invokes RANDACC, it does so with λ and areunderourcontrol.Henceforanyprobleminstancewecan
µ parameters that are set according to (3). For any vector of make sure that Assumptions (A1) and (A2) hold.
virtual queues (cid:126)q = (q ) , we denote by πq(cid:126) the resulting Proof: There are several steps in the proof. In the first
(cid:96) (cid:96)∈L
distribution on Nc from the RANDACC routine. From (4) we two steps we follow the framework of [14] to show that
have, the dynamics of MMUO can be captured by a system of
(cid:16) (cid:17) differential equations. In the third step we must deviate from
(cid:80)
exp r ·q
πq(cid:126) = (cid:96):r(cid:96),m>0 (cid:96),m (cid:96) ∀m∈N (5) the approach of [14] in order to handle multiple transmission
m (cid:80) (cid:16)(cid:80) (cid:17) c rates on multiple carriers.
exp r ·q
m(cid:48)∈Nc (cid:96):r(cid:96),m(cid:48)>0 (cid:96),m(cid:48) (cid:96) We begin by replacing the discrete time frames of MMUO
The resulting link throughput is therefore, with a more convenient continuous interpolation. For notation
(cid:88) weusesquarebrackets[·]indexedwithintegersf fordiscrete
γq(cid:126) = πq(cid:126) r ∀(cid:96),c (6)
(cid:96),c m (cid:96),m sequencesdefinedonframesf,andweuseroundbrackets(·)
m∈Nc indexedwithrealnumberstforacontinuousscaledversionof
For utility optimization, our goal is to show that the virtual time. For the discrete time sequence of virtual queue vectors
queuesunderMMUOconvergetoavector(cid:126)q∗sothattheabove (cid:126)q[f] for integral frames f = 1,2,..., we define as follows
link throughput under (cid:126)q∗ maximizes the utility as defined its continuous interpolation (cid:126)q(t) for all real positive numbers
in (1). Note that for this problem we cannot treat each carrier t. We also define a continuous version S (t) for the discrete
(cid:96)
in isolation since the throughput of a link is aggregated service sequence S [f]. For f =1,2,..., let t =(cid:80)f b[i].
(cid:96) f i=1
over all carriers. Note also that the optimization problem
For t∈[t ,t ), let
f f+1
(7) in Theorem 4 differs from that of (1) in its objective
t −t t−t
function, but shares the same constraints. The motivation of q (t) = q [f]· n+1 +q [f +1]· n
(cid:96) (cid:96) t −t (cid:96) t −t
this reformulation is to obtain a more useful set of KKT n+1 n n+1 n
conditions. Further, Theorem 4 will state that the optimal S(cid:96)(t) = S(cid:96)[f]
values of the two objective functions can be arbitrarily close.
(In other words the continuous time process t is created from
The main result of this section is captured in the following
the discrete time frames scaled by the intervals [t ,t ).)
f f+1
theorem. It relies on two standard but technical assumptions
The following lemma is shown in [14] and says that the
(A1) and (A2) which we detail below.
continuous sequence (cid:126)q(t) converges to the solution of the
Theorem4. Underassumptions(A1)and(A2),foranyinitial system of stochastic differential equations (9) which can be
condition (cid:126)q[0], MMUO converges in the following sense. viewed as a continuous version of (2). The equations are
stochastic due to the term S (t) which is the result of the
lim (cid:126)q[f]=(cid:126)q∗ (cid:96)
stochastic process of MMUO.
f←∞
Lemma5([14]). Letp(cid:126)∗bethesolutiontothefollowingsystem Hence the KKT conditions for (7) are:
of differential equations with variable p(cid:126)=(p)(cid:96)∈L. VU(cid:48)((cid:88)γ )=ν ∀(cid:96),c (11)
(cid:96),c (cid:96),c
(cid:104) (cid:105) c
p˙ = U(cid:48)−1(p /V)−S (t) ·1 , (9) (cid:88)
(cid:96) (cid:96) (cid:96) p(cid:96)∈[qmin,qmax] −1−logπm+ r(cid:96),mν(cid:96),c−ηc =0 ∀m∈Nc,∀c(12)
(cid:96)
(cid:88)
where1p(cid:96)∈[qmin,qmax] isanindicatorvariableforwhetherp(cid:96) is γ(cid:96),c ≤ r(cid:96),mπm ∀(cid:96),c (13)
intherangeof[q ,q ].Fixanytimeinstantτ.Ifp(cid:126)∗(τ)=
min max m∈Nc
(cid:126)q(τ), then lim sup (cid:107)p(cid:126)∗(t)−(cid:126)q(t)(cid:107)=0. (cid:88)
τ→∞ t∈[τ,τ+T] ν ×(γ − r π )=0 ∀(cid:96),c (14)
(cid:96),c (cid:96),c (cid:96),m m
The second step of the proof says that any fixed point m∈Nc
of the stochastic system (9) will also be a fixed point of ν(cid:96),c ≥0 ∀(cid:96),c (15)
(cid:88)
an associated deterministic system of equations. Note that π −1=0 ∀c (16)
m
the RANDACC routine may not converge to the stationary m∈Nc
distribution of (4), or equivalently (5), with the given λ and
Inequalities (11) and (12) state the gradient of the Lagrangian
µ parameters within each frame before the parameters are
L((cid:126)γ,(cid:126)π : (cid:126)ν,(cid:126)η) is zero with respect to the variables (cid:126)γ and
updated to their respective new values for the next frame.
(cid:126)π. Inequalities (13), (14) and (15) state that the first set of
HencetheserviceS (t)intheabovedifferentialequationsisa
(cid:96) constraints of (7) hold and has zero duality gap. The last
stochastic quantity. In other words, when MMUO invokes the
equality (16) states the second set of constraints of (7) hold.
wRoAuNldDAcoCnCverroguetitnoe,itisfleoancgh-tefrrammaevferaisgesu(cid:80)ffici(cid:80)ently lonrg, S·(cid:96)π(tq(cid:126)) Weintroduceanewvariablep(cid:126)=(p)(cid:96)∈L andsettheprimary
c m∈Nc (cid:96),m m variables via
and we could replace the stochastic term S (t) in (9) by its
(cid:96)
long term average. This would result in the following system π =πp(cid:126) as in (5) ∀m
m m
(10). Unfortunately, in reality, the frame f may not be long
enough. However, the following result still allows us to say and the dual variables via
that systems (9) and (10) are closely related, regardless of the
ν = p ∀(cid:96),c
convergenceofRANDACC.Asweshallsee,(10)alsoprovides (cid:96),c (cid:96) (cid:32) (cid:33)
a connection to solving (7) via the KKT conditions. (cid:88) (cid:88)
η = log exp( r q ) −1 ∀c.
c (cid:96),m (cid:96)
Lemma 6 ([14]). Every limit point of system (9) is almost m∈Nc (cid:96)
always a fixed point of the following system. We can see that the KKT conditions (12), (15) and (16) are
easily satisfied due to the definition of πp(cid:126) in (5) and as long
m
p˙(cid:96) =(cid:104)U(cid:48)−1(p(cid:96)/V)−(cid:88) (cid:88) r(cid:96),m·πmp(cid:126) (cid:105)·1p(cid:96)∈[qmin,qmax], asWp(cid:126)e∈n(cid:60)exL+t.aim to satisfy the remaining KKT conditions (11),
c m∈Nc
(13)and(14)viathesubgradientmethod.From(11),(14)and
∀(cid:96)∈L, (10)
the fact that ν is set to p , we wish to have,
(cid:96),c (cid:96)
where πmp(cid:126) is defined in (5). p(cid:96)×(U(cid:48)−1(p(cid:96)/V)−(cid:88) (cid:88) r(cid:96),mπmp(cid:126) )=0. ∀(cid:96)
In the third step of the proof we show that the system c m∈Nc
(10) leads to a solution of the optimization problem (7). (It If this does not hold (and hence we are not yet at optimality),
effectively solves the problem via the subgradient method). the standard subgradient method updates the p(cid:96) according to
For this step we must deviate from the analysis of [14] in the following system of differential equations.
order to handle the multi-carrier and multi-rate aspects of (7). (cid:88) (cid:88)
p˙ =U(cid:48)−1(p /V)− r πp(cid:126) . (17)
In particular, the Lagrangian of (7) is given by: (cid:96) (cid:96) (cid:96),m m
c m∈Nc
Due to the convexity of the problem (7) the system (17) will
L((cid:126)γ,(cid:126)π :(cid:126)ν,(cid:126)η)
(cid:32) (cid:33) eventually converge to a fixed point, p(cid:126)∗. Note that the system
= (cid:88) V ·U((cid:88)γ(cid:96),c)−(cid:88)ν(cid:96),cγ(cid:96),c (17) is identical to (10) as long as p(cid:96) ∈ [qmin,qmax] for all
(cid:96) ∈ L. Due to assumption (A2) and the definition of ν ,
(cid:96)∈L c c (cid:96),c
(cid:32) (cid:33) the solution to the dual of (7) without the constraint p ∈
(cid:96)
(cid:88) (cid:88) (cid:88) (cid:88)
+ ν(cid:96),c r(cid:96),mπm− πmlogπm [qmin,qmax] falls in the range of [qmin,qmax] and is therefore
c (cid:96)∈L m∈Nc m∈Nc equivalent to the fixed point p(cid:126)∗ of the system (17).
(cid:32) (cid:33) With p(cid:126)∗ chosen, KKT condition (11) is satisfied. We now
(cid:88) (cid:88)
− ηc πm−1 . set
c m∈Nc γ = (cid:88) πp(cid:126)∗r ∀(cid:96),c,
(cid:96),c m (cid:96),m
.
m∈Nc
which satisfy the remaining conditions of (13) and (14). of feasibility regions. For basestation i, let U be the set of
i
Finally, since associated users. To abuse notation, we also use U to denote
i
the set of links that are incident to i as there is a one-to-one
f ((cid:126)γ∗,(cid:126)π∗) ≥ f ((cid:126)γ†,(cid:126)π†)
2 2 correspondence between the users and links.
f ((cid:126)γ∗) ≤ f ((cid:126)γ†)
1 1 The maximum transmit power p for basestation i is given
i
and the entropy (cid:80)mπmlogπm ≤ log|∪c Nc|, the proof of and fixed. The scheduling problem is how to distribute pi
Theorem 4 is complete. among the resource blocks c ∈ C and among the users
We conclude by briefly summarizing in what sense we in Ui. Let pi,c(t) be the power allocation of pi on re-
have shown that MMUO is optimal. We have shown that source block c at time t; let pi,c,j(t) be the allocation
(cid:80)
an appropriate continuous interpolation of the virtual queue o(cid:26)f pi,c(t) on user j ∈ Ui. Note cpi,c(t) ≤ pi, and
dynamics approaches in the limit a vector p(cid:126)∗ that defines an pi,c,j(t) = pi,c(t) for one j ∈Ui . That is, p is
p (t) = 0 for j(cid:48) (cid:54)=j i,c
optimal dual solution of (7) (via the KKT conditions). Via i,c,j(cid:48)
allocated entirely to one chosen user j ∈U .
(3) the optimal virtual queue sizes determine channel access i
Powersettingsandtransmissionratesarerelatedthroughthe
parameters λ and µ for which the corresponding link
(cid:96),r,c (cid:96),r,c
channel quality information (CQI). CQI values are defined on
throughputsprovideanoptimalprimalsolutiontoproblem(7).
pairs of links and resource blocks. During every time slot t,
V. AMORECONCRETEMODEL:HETEROGENEOUSLTE the values of CQI (t) for all c∈C and (cid:96)∈U are reported
c,(cid:96) i
SYSTEM to basestation i. We assume that each basestation has perfect
In this section we present a more concrete model for the CQI reporting.
scheduling problem so that it more closely matches resource Let rc,(cid:96)(t) be the transmission rate along link (cid:96) on carrier
allocation in LTE heterogeneous networks. c during time slot t. Specifically, for link (cid:96)=ij between the
We begin with a brief system description. We consider basestation i and the associated user j, we define
downlink transmissions from a set of basestations to a set of
r (t) = w ·F(p (t)·CQI (t)) (18)
mobile users in a time-slotted system. We assume an OFDM- c,(cid:96) c i,c,j c,(cid:96)
based air interface in which the spectrum is divided into a set CQI (t) = gijc(t) (19)
of carriers called resource blocks (RBs), each of which can c,(cid:96) Nc+(cid:80)i(cid:48)(cid:54)=ipi(cid:48)cgi(cid:48)jc(t)
be scheduled separately. For example a 20MHz LTE system
In (19), g represents the path loss between i and j on
is typically divided into 100 resource blocks. In the time ijc
resource block c, and N is the background noise on c. Both
dimension a time slot corresponds to a Transmission Time c
g and N depend on c since radio propagation conditions
Interval (TTI) which has a typical duration of 1ms in an LTE ijc c
and background interference may be different on different
system.
frequencies. The product of p and CQI is commonly
We consider a heterogeneous network in which the bases- i,c,j c,(cid:96)
referred to as signal-to-interference-plus-noise ratio, SINR.
tations are divided into two classes, namely macrocells and
(We can therefore think of CQI as the SINR for a unit
femtocells.(Foreaseofdescriptionweusetheterms“macros” c,(cid:96)
power transmission.) In (18), w is the bandwidth of resource
and “femtos”. However, our discussions also apply directly c
block c and F(·) represents spectral efficiency as a function
to networks with picocells.) Macros typically have a much
of SINR. For example F(·) could be a suitably discretized
higher max transmit power than femtos, since macrocells
version of the Shannon function log(1+x). We assume that
provide wide-area coverage, whereas femtocells (which may
F(·) is such that r is always a member of a discrete set
be privately owned) provide focused coverage in one specific c,(cid:96)
R∪{0}.
location, e.g. a house or apartment. At any time instant
The primary scheduling decision is to determine the power
each mobile user associates with one basestation. Each macro
levels p . In the literature this problem is sometimes known
acceptsanassociationwithanymobileuser.Afemtohowever i,c
as inter-cell interference coordination (ICIC). The secondary
may be in “Closed Subscriber Group” mode (CSG) and only
scheduling decision is to allocate p to the user-level power
accept an association with a small subset of users. We remark i,c
p . Typically, each basestation in an LTE network has its
that femtos have two notable effects that are departures from i,c,j
ownlocalschedulerforuser-levelallocation,inwhichcasethe
traditional cellular networks. First, they may create strong
scheduling freedom is at the inter-cell level. For concreteness
interferencetoamacrocellfromwithinthecellitself,whereas
we assume the local scheduler uses the Proportional Fair (PF)
in a macro-only network interference to a cell mostly comes
algorithm. In the following section we give details on how
from outside that cell. Second, a mobile user may not be able
to allocate p and p . For user-level allocation p , we
toassociatewiththebasestationwiththestrongestsignalifthe i,c i,c,j i,c,j
consider two cases depending on whether a local scheduler
basestationisafemtoinCSGmodeandcannotassociatewith
exists.
the user. We assume that each mobile user associates with the
basestation for which the received signal is strongest, among
VI. IMPLEMENTATION
those that the user is able to associate with.
Unlike in the abstract model, we address basestation power In Section III we described the utility-optimal MMUO
allocation and interference directly instead of via the notion algorithm for the abstract model. In this section we present
MMUO-basedheuristicsfortheLTEresourceallocationprob- are set then which user is chosen by PF does not affect the
lem in heterogeneous networks. We address a number of interference experienced in other cells.)
issues. First, scheduling decisions need to be made in slotted The PF algorithm works as follows. For each link (cid:96) ∈ U
i
time rather than in continuous time as in MMUO. Second, basestation i maintains an estimate R of the recent average
(cid:96)
schedulingdecisionsareaboutsettingpowerlevelsratherthan transmit rate on link (cid:96), and allocates power p exclusively to
i,c
transmission rates as in MMUO. Third, we discuss how to the link (cid:96) that maximizes the ratio r˜ (t)/R , where r˜ (t)
c,(cid:96) (cid:96) c,(cid:96)
incorporatealocalschedulersuchasProportionalFair.Fourth, is the nominal rate if user j has power allocation p (t) =
i,c,j
perhaps most significantly, we show CQI-based methods for p (t). Again from (18), we have
i,c
feasibility detection. This replaces the feasibility oracle and (cid:0) (cid:1)
r˜ (t)=w ·F p (t)·CQI (t) for link (cid:96)=ij (21)
the CSMA collision detection mechanism. Lastly, since the c,(cid:96) c i,c,j c,(cid:96)
basestations are divided into two classes, macro and femto, After each scheduling decision R is updated for each link
(cid:96)
interference can be reduced by not having every basestation according to an exponential filter. This addresses the third
compete on every resource block. issue.
We begin with a basic heuristic that bypasses the last
B. Methods for Implementing the Feasibility Oracle
two issues. We then describe three methods through which
feasibility can be detected in practice. We conclude with a We now examine options for the only part of the algo-
modified heuristic in which macros and femtos have priority rithm that requires coordination among basestations, namely
on different sets of resource blocks. feasibilitydetection.Sinceresourceblockpowerassignmentis
typicallydoneonaslowertimescalethanindividualtimeslots,
A. Basic Heuristic weareinterestedindeterminingwhetherasetoftransmissions
will be feasible over multiple timeslots. In particular, we do
OurbasicheuristicworksverymuchinthespiritofMMUO.
not want to declare a transmission feasible if this is only true
To address the first issue regarding slotted time each frame
for a single timeslot due to fast fading.
now consists of an integral number of time slots. When the
We discuss multiple mechanisms which all use techniques
subroutine RANDACC is called with parameters λ and µ, the
that have been proposed in the standardization process for
time between transmission attempts (resp. the transmission
heterogeneousnetworks(e.g.[1]).Ourinitialmechanismsuse
period) is drawn from a geometric distribution with mean
the existing CQI channel with one extra piece of information
1/λ (resp. mean µ). One problem is that two links may make
which we call the activity indicator. We also allow for a
decisionsduringthesametimeslot.Wecansetthe1/λvalues
basestation to “overhear” a link to which it is not associated.
largeenoughsothatthisrarelyhappens.Ifthisdoeshappenwe
Our later mechanisms show how the algorithm could be
assume that both conflicting transmissions cease. A detailed
implemented if we indeed have a channel for exchanging
explanation of how rare collisions affect the performance of
informationbetweenbasestations(suchastheX2channelthat
utility-optimal CSMA was given in [14] and we can apply a
is defined in LTE). The bit-rate of such channels is typically
similar analysis to MMUO.
limitedandsowestressthatallweneedtoexchangeareshort
The output of MMUO, as described above, specifies the
messages such as the activity values. No detailed exchange of
transmission rate r (t) for every transmission (cid:104)(cid:96),r,c(cid:105) that
c,(cid:96) channel state is required.
takes place during time slot t. To obtain power settings,
Method1: Inthismethod,anactivityindicatorisreported
equation(18)providesthedirecttranslationfromtransmission
along with the CQI. Specifically, let y (t) be the binary
rates to power levels. (cid:96),r,c
activityindicatorthatissettooneifandonlyifMMUOmakes
p (t)= F−1(rc,(cid:96)(t)/wc), for link (cid:96)=ij. (20) a transmission (cid:104)(cid:96),r,c(cid:105) during time slot t. When CQIc,(cid:96)(t) is
i,c,j CQI (t) reported to basestation i for which (cid:96) ∈ Ui, y(cid:96),r,c(t) is also
c,(cid:96)
reported if it is set to 1. Each basestation i listens to all
For a given basestation i and resource block c, the feasibility CQI that it can decode, not just the CQI for links in U . If
i
oracle guarantees that one user j ∈ U has positive power i hears y = 1 for some (cid:96)(cid:48) on resource block c, then
i (cid:96)(cid:48),r(cid:48),c
allocation p (t). Let p (t)=p (t) for this user j. The every potential transmission (cid:104)(cid:96),r,c(cid:105), for (cid:96)∈U and r ∈R, is
i,c,j i,c i,c,j i
(cid:80)
transmission now takes place as long as p (t)≤p . This declared infeasible. Note that this method is similar in spirit
c i,c i
addresses the second issue. to the Clear-to-Send (CTS) mechanism for 802.11.
If it is the case that we can specify both user-level as Method2: ThismethodislessstringentthanMethod1in
well as inter-cell power allocations, we are done. However, declaringinfeasibility.Foreachactivityindicatory (t)=1
(cid:96),r,c
as discussed in Section V, in many instances we only have we define the safety margin to be the ratio between the
the freedom for specifying p since the user-level power is currently achievable transmission rate r˜ (t) and the actual
i,c c,(cid:96)
determined by a local scheduler such as the Proportional Fair rate r (t) that is used by MMUO. This achievable rate
c,(cid:96)
(PF) algorithm. In this case we run the MMUO algorithm “in can be computed from the CQI (t) values together with
c,(cid:96)
thebackground”tocomputethep valuesandthendetermine the current power levels. We assume that the safety margins
i,c
which user in U receives the transmission power p using are transmitted on the CQI channel along with the activity
i i,c
the PF algorithm. (We remark that once the power levels indicators. For some threshold υ >1 we say that the activity
indicator is safe if the safety margin is above υ, vulnerable if
the margin is between 1 and υ, and in outage if the margin is
below 1. (Note that if we are in outage then user (cid:96) could not
receive data at rate r for the current CQI values.) Method 2 is
thesameasmethod1exceptthatbasestationidoesnotrefrain
Fig.1. Networkconfiguration:1macroand2femtoseachwith2users.
from declaring a potential transmission on (cid:96)∈U on block c
i
feasible,evenifitoverhearsanactivityindicatory (t)=1
(cid:96)(cid:48),r(cid:48),c
as long as this indicator is currently safe.
potential to reduce interference if each class has priority on a
The exact value of υ could be a network-wide config-
different set of resource blocks. We now describe a heuristic
uredparameter.Alternativelyeachbasestationcouldgradually
to achieve this. In particular if basestation i is a macro we
lower a local estimate of υ until it observes links going into
bias it towards low numbered resource blocks by only letting
outage.
one of its users be active on a resource block if it also has
Method 3: This method applies probing to feasibility
active users on all lower numbered resource blocks. More
detection.WheneverabasestationineedstodecideifMMUO
formally, if (cid:96) ∈ U then (cid:104)(cid:96),r,c(cid:105) is feasible if for all c(cid:48) < c
could transmit on (cid:104)(cid:96),r,c(cid:105), for (cid:96) ∈ U , it briefly sets power i
i there exists (cid:96)(cid:48) ∈ U and r(cid:48) ∈ R such that y = 1.
level p on resource block c and observes the effects on i (cid:96)(cid:48),r(cid:48),c(cid:48)
i,c
Similarly, if basestation i is a femto we bias it towards high
other users. Here p is the power necessary to carry out
i,c
numbered resource blocks by only letting one of its users be
the transmission (cid:104)(cid:96),r,c(cid:105) and can be calculated as in (20).
active on a resource block if it also has active users on all
If basestation i overhears that any activity indicator moves
higher numbered resource blocks. More formally, if (cid:96) ∈ U
into outage then it sets p back to 0 and declares (cid:104)(cid:96),r,c(cid:105) i
i,c then (cid:104)(cid:96),r,c(cid:105) is feasible if for all c(cid:48) > c there exists (cid:96)(cid:48) ∈ U
infeasible. This method has the drawback that it could send i
and r(cid:48) ∈R such that y =1.
neighboringusersintooutageforshortperiods(andthiswould (cid:96)(cid:48),r(cid:48),c(cid:48)
need to rectified by more robust channel coding on the data
VII. SIMULATIONRESULTS
channels).However,ithastheadvantagethatbasestationigets
a much better sense of the “damage” that might be caused by We now provide an example to show how the algorithms
setting a particular power level p on resource block c. work. We consider a simple toy example since it allows us
i,c
Methods 4-6: The next three methods are essentially to compute the optimal schedule. We consider three omnidi-
the same as Methods 1-3. However, instead of basestations rectional basestations, 1 macro and 2 femtos, together with
overhearing activity indicators and their associated safety six users, two for each basestation. The two macro users are
status,eachbasestationwoulddirectlycommunicatetheirown at distance 100m (user 0) and 780m (user 1) respectively.
activity indicators and safety margins to all their neighboring Each femto has two users (users 2-5) at distance 10m. The
basestations. This can be done using a channel such as the exactconfigurationtogetherwiththeusernumberingisshown
X2 channel in LTE that provides communication between in Figure 1. We assume that user 1 has to be associated
neighboring basestations. Note that this is a lightweight com- with the macro since the nearby femto is in CSG mode. The
munication since the activity indicator only has 2 possible transmitpowerofthemacrois46dBmandforthefemtositis
values and the safety status has only 3 possible values. 8dBm. The system bandwidth is 5MHz and the noise density
In particular the basestations would not be exchanging any is -165dBm/Hz. We split the system bandwidth into three
detailed channel state information. resource blocks. The pathloss is represented by a COST-231
Relationship to current LTE proposals: We now briefly Hata model. In particular the path loss at distance d meters is
discuss how the above methods could fit with mechanisms assumedtobe0.525∗d−3.523.Forsimplicityweconsidertwo
that have been proposed in LTE standards for interference instantaneous transmission rates, a “low” rate of 8bits/sec/Hz
coordination. In the document [1] on RF requirements for and a “high” rate of 16bits/sec/Hz. We consider blocks.
femtos,threeoptionsareproposedforcommunicationbetween For this configuration we aim to achieve user through-
macrosandfemtos.Thefirstisdirectover-the-aircommunica- puts that solve problem (7). We can compute the follow-
tion.Thesecondisover-the-airvia“victim”users.Thiswould ing optimal solution offline via a standard subgradient al-
correspond to the overhearing methods 1-3 proposed above gorithm. For brevity we use notation of the form 0h2(cid:96)4(cid:96)
in that the victim user broadcasts channel quality information to represent a schedule, which means user 0 is receiving
thatindicatestoaninterfererwhetheritissafetotransmit.The data at the high rate and users 2 and 4 are receiving
third option is via an existing backhaul which corresponds to data at the low rate. In the optimal solution for schedules
methods 4-6 above. m∈{0h2(cid:96)4(cid:96),0h3(cid:96)4(cid:96),0h2(cid:96)5(cid:96),0h3(cid:96)5(cid:96)} we have π =8.4%,
m
Enhancedheuristic:Resourceblockprioritization:: Note for schedules m ∈ {1h4(cid:96),1h5(cid:96)} we have π = 10.7%,
m
that throughout this section we have assumed that attempts and for schedules m ∈ {2h4h,2h5h,3h4h,3h5h} we have
by a link to access resource block c are governed by λ π =11.2%. Figure 2 shows the corresponding optimal link
(cid:96),r,c m
and µ and are performed independently across resource throughputs as computed by the subgradient algorithm.
(cid:96),r,c
blocks. However, since in heterogeneous networks we have ThebehaviorofMMUOandMMUOwithProportionalFair
two classes of basestations (macros and femtos) there is are similar. In the interest of space, we present the plot for
node has a local energy based on the interference that it both
causes and receives. Nodes then pick new states based on
their local energy. Gibbs sampler techniques have also been
used to motivate greedy algorithms for LTE resource block
selection, e.g. [2]. Another popular technique, e.g. used in
[19],[18],istosetpowerlevelsaccordingtoagradientascent
approach. In particular each transmitter adjusts power levels
so as to improve network utility in its neighborhood. Both
Fig. 2. Link throughputs under the optimal solution. Top curves for
the Gibbs sampler and the gradient ascent based methods
users/links 0, 4 and 5; middle curves for users 2 and 3; bottom curve for
user1.(Notethatsomecurvescoincide.) require information exchange on how much interference each
transmitter causes to each receiver. For the Gibbs sampler
methods interference information needs to be exchanged in
order to calculate local energy levels. For the gradient ascent
methods nodes need to exchange “partial derivative” informa-
tion to indicate how the interference they experience would
be affected by a change in a neighbor’s power levels. We
remarkthatMMUOdoesnotrequiresuchdetailedinformation
exchange. It bases its calculations on CQI messages that
are already included in LTE, augmented with the activity
indicators (and possibly safety margins).
CSMA-based Algorithms: In the classic CSMA setup all
Fig.3. LinkthroughputsunderMMUOincombinationwithPF.Topcurve
for user 0; second curve for users 4 and 5; third curve for users 2 and 3; links wish to access a single channel. Jiang and Walrand
bottomcurveforuser1. [10] showed that CSMA can achieve any set of feasible
throughputs.Sincethisresult,anumberofpapershavelooked
athowtomakechannelaccessratesdependentonlocalqueue
MMUO with PF only (in Figures 3). As we can see, the link sizesinordertokeepthesystemstable,e.g.[7],[8],[5],[16],
throughputscloselyapproximatetheoptimalratesinFigure2. [17]. As already discussed, we have based our analysis on the
In both plots, user 0 (the closer user to the macro basestation) work [14] (later extended in [15], [13]) that analyzed utility
has the highest throughput while user 1 (the far user to the maximization in a CSMA setting.
macro basestation) has the lowest throughput. Among the
femto users, users 4 and 5 have higher throughputs since they IX. CONCLUSION
create less interference to a macro user than users 2 and 3. In this paper we have presented a CSMA-based scheduling
We conclude with a brief discussion of how the algorithms algorithmforheterogenousLTEnetworkswithbothmacroand
for testing feasibility work in this context. In particular sup- smallcells.Ourmaincontributionistwofold.Mathematically,
pose that we are in configuration 1h4(cid:96) and suppose that user our algorithm handles the general multiple transmission rates
3 wants to transmit at the high rate. This is infeasible. User 3 on multiple carriers and achieves utility optimality. For the
may discover this by either a) overhearing the CQI reported practical setting, the communication among the basestations
by user 1 and realizing it is sufficiently close to the minimum utilizes the existing CQI-based technology and hence the
acceptable CQI or b) briefly probing the channel at the high additional signaling is minimal.
rate and then discovering that user can no longer support its
current rate. In both cases user 3 decides not to transmit. REFERENCES
VIII. PREVIOUSWORK [1] 3GPP TR 36.921. Evolved Universal Terrestrial Radio Access (E-
UTRA);FDDHomeeNodeB(HeNB)RadioFrequency(RF)require-
We now describe how our work relates to existing tech- mentsanalysis.
niques. Prior work mainly falls into two categories, resource [2] M.Andrews,V.Capdevielle,A.Feki,andP.Gupta.Self-organizingand
self-optimizing networks. Bell Labs Technical Journal, 15(3):85 – 97,
allocationinOFDMsystemsandCSMA-basedalgorithmsfor
December2010.
802.11 networks. As we have seen, our proposal has been to [3] M. Andrews and L. Zhang. Multi-carrier multi-rate utility optimiza-
derive an algorithm based on CSMA techniques for the case tion in heterogeneous networks via csma-based algorithms. CoRR,
abs/1211.4258,2012.
of OFDM resource allocation.
[4] S. Borst, M. Markakis, and I. Saniee. Distributed power allocation
OFDMresourceallocation: LTEusesanOFDMphysical and user assignment in OFDMA cellular networks. In Proceedings of
layer. Resource allocation in OFDM systems addresses prob- the 49thAnnual Allerton Conferenceon Communication,Control, and
Computing,Monticello,Illinois,2011.
lemssuchaschannelselection,localscheduling,powercontrol
[5] S.C.Borst,J.Ghaderi,andP.A.Whiting. Backlog-basedrandomaccess
and user association, i.e. which basestation serves which user. in wireless networks: fluid limits and instability issues (invited paper).
One popular technique, e.g. used in [6], [4], [9], is a Gibbs InProceedingsofCISS2012andWiOpt2012,2012.
[6] C. S. Chen, F. Baccelli, and L. Roullet. Joint optimization of radio
sampler approach based on Interacting Particle Systems. The
resources in small and macro cell networks. In Proceedings of IEEE
main idea here is that for a given network configuration each VehicularTechnologyConference,pages1–5,May2011.
[7] J.GhaderiandR.Srikant. OnthedesignofefficientCSMAalgorithms
forwirelessnetworks. InProceedingsofCDC2010,2010.
[8] J. Ghaderi and R. Srikant. Effect of access probabilities on the
delay performance of Q-CSMA algorithms. In Proceedings of IEEE
INFOCOM2012,pages2068–2076,2012.
[9] I. Hou and P. Gupta. Distributed resource allocation for proportional
fairness in multi-band wireless systems. In Proceedings of the IEEE
InternationalSymposiumonInformationTheory,2011.
[10] L.JiangandJ.Walrand. ACSMAdistributedalgorithmforthroughput
and utility maximization in wireless networks. In Proceedings of the
ConferenceonCommunication,ControlandComputing,Monticello,IL,
2008.
[11] P. Karn. MACA - A new channel access method for packet radio.
In Proceedings of the 9th ARRL Computer Networking Conference,
London,Ontario,Canada,1990.
[12] F.Kelly.ReversibilityandStochasticNetworks.Wiley:Chichester,1979.
[13] J.Lee,Y.Yi,S.Chong,B.Nardelli,E.Knightly,andM.Chiang.Making
802.11 dcf optimal: Design, implementation, and evaluation. CoRR,
abs/1207.3740,2012.
[14] J.Liu,Y.Yi,A.Proutiere,M.Chiang,andH.V.Poor. Towardsutility-
optimalrandomaccesswithoutmessagepassing. WirelessCommunica-
tionsandMobileComputing,10:115–128,2010.
[15] A. Proutiere, Y. Yi, T. Lan, and M. Chiang. Resource allocation over
network dynamics without timescale separation. In INFOCOM, pages
406–410,2010.
[16] S. Rajagopalan, D. Shah, and J. Shin. Network adiabatic theorem: an
efficientrandomizedprotocolforcontentionresolution. InProceedings
ofSIGMETRICS/Performance2009,pages133–144,2009.
[17] D.ShahandJ.Shin.Delayoptimalqueue-basedCSMA.InProceedings
ofSIGMETRICS2010,pages373–374,2010.
[18] K. Son, S. Lee, Y. Yi, and S. Chong. Refim: A practical interfer-
ence management in heterogeneous wireless access networks. CoRR,
abs/1105.0738,2011.
[19] A. L. Stolyar and H. Viswanathan. Self-organizing dynamic fractional
frequency reuse for best-effort traffic through distributed inter-cell
coordination. InProceedingsofIEEEINFOCOM2009,2009.