1. Trang chủ
  2. » Khoa Học Tự Nhiên

Báo cáo hóa học: " Research Article Analysis of the Tradeoff between Delay and Source Rate in Multiuser Wireless Systems" docx

13 531 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 13
Dung lượng 0,97 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

This work addresses the limits on the information that can be transmitted over the wireless channel under the conditions stated by the MAC layer: a selected scheduling discipline and an

Trang 1

Volume 2010, Article ID 726750, 13 pages

doi:10.1155/2010/726750

Research Article

Analysis of the Tradeoff between Delay and Source Rate in

Multiuser Wireless Systems

Beatriz Soret, M Carmen Aguayo Torres, and J Tom ´as Entrambasaguas

Department of Ingenier´ıa de Comunicaciones, Universidad de M´alaga, 29071 M´alaga, Spain

Correspondence should be addressed to Beatriz Soret,bsoret@ic.uma.es

Received 25 January 2010; Revised 23 May 2010; Accepted 3 August 2010

Academic Editor: Hyunggon Park

Copyright © 2010 Beatriz Soret et al This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited This work addresses the limits on the information that can be transmitted over the wireless channel under the conditions stated

by the MAC layer: a selected scheduling discipline and an ensured level of QoS Based on the effective bandwidth theory, the joint influence of the channel fading, the data outsourcing process, and the scheduling discipline in the QoS metrics are studied We obtain a closed-form expression of the vector of attainable users’ rates Ru D t,εfor several scheduling algorithms, representing the maximum constant rate that the uth user can transmit under the selected discipline and fulfilling a target Bit Error Rate (BER) and the delay constraint given by the pair (D t,ε), where D tis the target delay andε is the probability of exceeding D t

1 Introduction

Providing Quality of Service (QoS) guarantees to different

applications is an important issue in the design of next

generation of high-speed networks The QoS metrics of

interest are likely to vary from one application to another,

but are predicted to include measures such as throughput,

Bit Error Rate (BER), and delay Unlike traditional data

com-munication, where system performance is largely measured

in terms of the average overall throughput and loss rate,

real-time communications may require QoS metrics expressed in

terms of the mean delay or its variance (jitter)

Traditional networking approaches design separately, the

physical and the medium access layer (MAC) Instead, in

future wireless networks the physical knowledge of the

wireless medium is shared with higher layers on a cross-layer

wireless build-out

User multiplexing for QoS guarantees is an active

such as, subcarrier and slot allocation, resource allocation

or scheduling Exploiting both the source diversity and the

variations in channel conditions can increase the system

throughput A scheduling scheme ideally should be able not

only to handle the uncertainty of the channel but also to

exploit it, that is, opportunistically serve users with good

channels Using such an approach leads to a system capacity that increases with the number of users (multiuser diversity) [3]

Many questions regarding the performance of most used opportunistic algorithms are still open For example, very few works consider the delay or study the treatment given to

results comes from the fact that the classical queueing theory

is no longer suitable Moreover, the result is linked to the scheduling discipline and the analysis has to be done algorithm by algorithm To the best of our knowledge, the papers with analytical results found in the literature either

the QoS metrics [8,9]

Within this context, we explore the limits on the informa-tion that can be transmitted over the wireless channel under the conditions stated by the MAC layer: an ensured level of QoS and a selected scheduling discipline In particular, both the channel fading and the scheduling algorithm determine the maximum source rate to be transmitted under some statistical QoS guarantees

suitable information-theoretic measure for delay sensitive applications over fading channels On the other hand, delay-limited capacity becomes zero for Rayleigh channels

In this case, its probabilistic version, the Capacity with

Trang 2

Probabilistic Delay Constraint, becomes useful [11] Then,

rather than ensuring a deterministic delay, a probabilistic

delay constraint is defined as the pair (D t,ε), where D tis the

target delay andε is the probability of exceeding it.

On the other hand, in multiuser communications the

capacity of the channel is no longer fully characterized by a

single number Instead, the capacity should be redefined to

consider each user’s data rate separately Thus, in a system

with U users, the capacity should take the form of a U

users [12] A capacity region is then defined as the set of all

U dimensional rate vectors that are achievable in the channel.

Furthermore, when a QoS constraint is imposed (in the form

of a probabilistic delay constraint), the data rate attainable by

each user will be closely linked to the scheduling strategy

In this paper, we obtain a closed-form expression of

the vector of users’ data rates Ru D t,ε for several scheduling

algorithms, representing the maximum constant rate that

theuth user can transmit under the selected discipline and

fulfilling a target BER and the delay constraint given by

of the individual users’ rates, where each user can have

a different delay constraint and can experience a different

channel The procedure to obtain these rates, based on the

Best Channel [3], and Proportional Fair [15] For simplicity,

the results are obtained for a CBR (Constant Bit Rate) data

explained in [16]

The remainder of the paper is organized as follows

first details the derivation of the maximum users’ rates

subject to a delay constraint for an uncorrelated Rayleigh

partic-ularized to Round Robin, Best Channel, and Proportional

Fair disciplines in Sections 3.2, 3.3, and 3.4, respectively

three particularizations for the three examples of discipline

2 Multiuser System Model

2.1 Queueing Model Figure 1 illustrates the system model

considered in this paper The channel is shared among

U users, whose incoming tra ffics are characterized by U

source processes, respectively Each user has its own queue

where the data are stored before being transmitted The

server represents the information transmitted to the shared

channel, which is decided at each instant by the scheduler

The instantaneous response of the wireless channel is, in

general, a time-variant and autocorrelated random process

Physical time is divided into units, hereinafter referred to

as symbol periods, which represent the transmission discrete

a1 [n]

a2 [n]

a U[n]

Q1 [n]

Q2 [n]

Q U[n]

C[n] =U

Scheduler

.

Figure 1: Multiuser system model

to be constant over the symbol Moreover, the scheduler allocates the channel to users in a symbol per symbol basis: every new symbol, a user is selected for transmission

It is assumed that the transmitter employs adaptive techniques, so that the transmission rate is modified dynam-ically, seeking to adapt to the time-varying conditions of the physical channel

a u[n] On his side, the wireless channel transmits at an

be transmitted by the channel

Each user has a potential rater u[n], which represents the

channel rate that he may use if the channel is assigned to him, and which depends on his channel conditions as explained in

uth, c u[n], is given by

c u[n] =

r u[n] if channel is assigned to user u,

expressed as

c[n] = U



u =1

c u[n]. (2)

Notice that in the sum above only one of the terms is nonzero, corresponding to the user allocated to the channel

represent the amount of bits per symbol generated by user u and the amount of bits per symbol of the uth

user transmitted by the server, respectively In addition,

A u[n] =

n1

m =0

a u[m]. (3)

Trang 3

And similarly the accumulated channel process of uth

user is

C u[n] =

n1

m =0

c u[m]. (4)

the equation Q u[n] = (Q u[n −1] +a u[n] − c u[n])+, with

(x)+ max(0, x).

2.2 Channel Model Every user experiences a flat Rayleigh

Furthermore, users are independent among them, that is, the

channel response seen by one user is independent from the

rest

f

γ u



γ u e

Moreover,γ u[n] is proportional to the square of z u[n]:

γ u[n] = z u[n]2E s

N0

power spectral density

We consider constant transmitted power and a

continu-ous rate policy Then, the potential channel rate of user u,

r u[n], is a function of γ u[n]:

r u[n] =log2

1 +β u γ u[n]

corresponding to the evaluation of the AWGN channel

capacity (in Shannon’s sense)

The variability of the channel over time is usually

reflected through its autocorrelation function (ACF) This

second-order statistic generally depends on the propagation

geometry, the velocity of the mobile, and the antenna

particular, a very simple model of correlation is employed:

the ACF is assumed to decay exponentially with a parameter

ρ, 0 < ρ < 1:

The use of the exponential model simplifies and speeds

up the simulations and numerical evaluations along this paper without altering the conclusions Nevertheless, any other correlation function can be used (i.e., the classical Jakes’ model [18])

2.3 Effective Bandwidth Analysis The asymptotic

log-moment generating function ofQ u[n] is defined as [13]

Λu(υ) = lim

n → ∞

1



e υQ u[n]

. (9)

Λu(υ) may be decomposed into two terms,Λu(υ) =ΛA u(υ) +

ΛC u(− υ), where ΛA u(υ) and ΛC u(υ) are the log-moment

generating functions of the accumulated source process and

If the source and channel processes are stationary and the steady state queue length exists, then the workload process

Q u[n] satisfies a Large Deviation Principle and the following

satisfied [13]:

Pr{ Q u()> B u}  e − θB u, B u −→ ∞, (10)

θ, known as the QoS exponent, is the solution toΛA u(υ) +

ΛC u(− υ) |υ = θ =0

Λu(υ)/υ, the equation to obtain θ can be expressed as

α u(υ) = α A u(υ) − α C u(− υ) υ = θ =0, (11) whereα A u(υ) and α C u(υ) are the effective bandwidth func-tions of the source process and the channel process for the

uth user, respectively.

empty,η u =Pr{ Q u[n] > 0 } By the inclusion of this term in the analysis, the following less conservative approximation for the tail probability of the queue is satisfied:

Pr{ Q u()> B u} ≈ η u · e − θB u (12)

n is denoted as D u[n] For simplicity, assume that the source

traffic from the uth user arrives to the buffer at a constant rate:

a u[n] = λ u (13)

It leads to a constant EBF for the following source process [19]:

α A u(υ) = λ u (14) The procedure to generalize the results to other traffic sources can be found in [16]

As in the queue length process, the steady state solution for the delay process exists In addition, for constant sources

D u[n] = Q u[n]

λ [n] . (15)

Trang 4

Thus, the probability of exceedingD t, denoted

through-out this paper as target delay, can be written as follows [20]:

ε =Pr

D u()> D t

≈ η u · e − θ · λ u D t

3 Uncorrelated Channel

We start the analysis of the multiuser system presented above

with the case of users experiencing an uncorrelated Rayleigh

channel (block fading model) Part of these results can be

found in [21]

3.1 Achievable Users’ Rates with a Delay Constraint Starting

a delay constraint can be calculated Each user has his own

delay constraint The effective bandwidth of the channel is

needed,α C u(υ).

With no time-correlation among samples, the

σ2

c u[n], the instantaneous channel rate for the uth user Then,

distribution ofC u[n] is computed as [19]

α C u(υ) = lim

n → ∞

1

n · ulog E



e υC u[n]

= m u+u

2σ2

u (17)

In a high load scenario, the probability that the buffer

log(ε)

D t = θ · λ u (18)

andσ2

u, then the QoS exponent is obtained by solving (11):

λ u − α C u(− θ) =0=⇒ θ(λ u) θm u,σ u2,λ u



=2(m u − λ u)

σ2

u

.

(19)

With (19) substituted into (18), the value ofλ uis worked

out and it is the achievable user rate that we were seeking It

represents the maximum source rate that may be supported

for useru with a probability ε of exceeding a delay bound D t

We denote it by Ru D t,ε:

Ru D t,ε = m u

1

u −2σ2

u



logε

D t (20)

D t,ε)

Ru D t,εapproachesm u On the other hand, as the target delay

D t orε become lower, the user has to transmit at a lower

rate in order to guarantee its own delay constraint Moreover, the influence of the scheduling algorithm and the channel conditions (SNR, target BER) are captured in the mean and the variancem uandσ2

u Thus, the evaluation of the user rates comes down to obtaining the mean and the variance of the

m u = E[c u[n]],

σ2

u = E

c2

u[n]

− m2

which in turn depends on the scheduling algorithm Three scheduling disciplines will be detailed in next sections Finally, the total system capacity CDt, is obtained as the sum of the individual user rates, each of them with its own delay constraint:

CDt,  =

U



u =1

probabilities of violation of each user, respectively

3.2 Round Robin First of all, the mean and the variance to

compute Ru D t,εunder a Round Robin strategy are calculated

without priorities, which dispenses the channel equally among the different flows independently of their priorities

assigned to the following user in a cyclic order and therefore,

c u[n] =

log2

1 +β u γ u[n]

It is known that this strategy does not work well over

c u[n] matches up with the ergodic capacity of the channel.

m1= E

log2

=log2(e) exp



1

βγ



E1



1

βγ



, (24)

Signal-to-Noise Ratio of the single user

Trang 5

Likewise, the expression of the varianceσ2with only one

user is [11]

σ2=E

log2

1 +βγ2

− m2

=log2(e)2

e1/(β ¯γ)

×



π2

6 +g2+ 2g log



1

βγ



+ log2



1

βγ



2



1

βγ

 3



[1, 1, 1], [2, 2, 2], 1

βγ



− e1/(βγ)E2



1

βγ



,

(25)

whereg is the Euler constant and pFq(n, d,z) is the

hyperge-ometric function

WhenU users share the channel under an RR discipline,

we only need to take into account that the channel is equally

u

replacing with the average Signal-to-Noise Ratio of each user

and dividing by the number of users:

m u = E

log2

1 +β u γ u



= m1

U,

σ2

u =E

log2

1 +β u γ u

2

− m2

u = σ2

U2.

(26)

The expressions above make it possible to evaluate

discipline

considered, with average SNR 5, 7 and 12 dB, respectively

The individual rates Ru D t,εare plot as a function of the target

1(Hereinafterβ uis set to 1 in all the numerical evaluations.)

whereas the dashed line is Ru D t,ε Both m u and Ru D t,ε are

plotted for each user (users marked with triangles, squares

and circles) Moreover, the system capacity normalized with

the number of users, which corresponds to the “average” rate,

is represented with no marks and thicker line

First of all, let us observe the common behaviour of

Ru D t,εfor all the user As presumed, the curve increases with

maximum attainable rate) Obviously, Ru D t,ε is always below

interpreted as QoS requirements that cannot be fulfilled with

that channel conditions, number of users and discipline

Observing the differences among users, those with better

channel conditions obtain higher rates and can demand

stringent QoS conditions, as it was expected Thus, the best

user in this example could fix a delay constraint with a target

delay of 3 symbols in contrast to the 5 symbols of the worst

user On the other hand, if the same target delay is fixed for

the three users the rate to be employed increases for better

0 0.2 0.4 0.6 0.8 1 1.2 1.4

m u

User 1

User 2 User 3 Average

D t(symbols)

u D t ,ε

R u

Figure 2: Achievable users’ rates with Round Robin scheduling

in an uncorrelated channel Three users with γ u = 5, 7, 12 dB, respectively.ε =0.1 β u =1

users (users with better channel conditions) For example,

0.7 bits/symbol, and user 3, 1.1 bits/symbol.

3.3 Best Channel Best Channel (BC) [3] strategy is adaptive

to the channel state, giving priority to those users with higher potential transmission rate The channel is assigned to the user that may transmit with the highest number of bits per symbol

c u[n] =

log2

1 +βγ u[n]

ifγ u[n] > γ k[n] ∀ k / = u,

(27)

However, under this strategy, good average SNR users get more average throughput than low SNR users

Let us defineγmax

γmax=max

u

γ u

F γmax



γ

=Pr

γmax< γ

=Pr

γ1< γ, γ2< γ, , γ U < γ

.

(29) Since the users are i.i.d., it comes down to

F γmax



γ

= U



u =1





− γ

γ u



. (30)

Trang 6

Consider the following effective SNR for the uth user

[22]:

γ u ∗ =

γ u, γ u > γ − u,

0, γ u < γ − u, (31)

follows [22]:

f u ∗



γ ∗ u



=Prob

γ u < γ − u

δ

γ u ∗



+ f u



γ ∗ u



F − u



γ ∗ u



whereδ(x) is the Dirac delta function, f u(x) is the

exponen-tial pdf in (5), andF − u(x) is the CDF of γ − u:

F − u(x) =

U



k / = u





− x

γ k



iU

(1)i·1(1− i u) exp(xb ·i)

(33)

with b = [(11)(12)· · ·(1/γ U)], 1 denotes the all-ones

U-dimensional vector, U is the set of all U-dimensional

of i.

m u = E

c

γ u



=



0 c

γ u ∗

f u ∗

γ ∗ u

dγ ∗ u (34)

be zero in the required expectation and only the second term

needs to be integrated:

f u



γ ∗ u



F − u



γ ∗ u



= −

iU

(1)i·1i u

γ uexp(xb ·i). (35)

Substituting into the mean, it yields

m u = −



0 log2

1 +β u γ u ∗



iU

(1)i·1i u

γ uexp



− γ u ∗b·i

dγ ∗ u

(36)

This integral is analogous to the single user case by simply

defining 1/γ =b·i The result is then

m u = −

iU

(1)i·1 i u

γ ub·ilog2(e) exp



β u



E1



β u



.

(37)

0 0.5 1 1.5 2

2.5

3

m u

User 1

User 2 User 3 Average

D t(symbols)

u D t ,ε

R u

Figure 3: Achievable users’ rates with Best Channel scheduling

in an uncorrelated channel Three users with γ u = 5, 7, 12 dB, respectively.ε =0.1 β u =1

Likewise, the calculation of the variance is similar to the single user case, obtaining

σ2

u = E

log22

1 +β u γ

− m2

u

= −

i∈ S

(1)i·1 i s

γ ub·i



log2(e)2

e(1 u)b·i

×



π2

6 +g2+ 2g ln



1

β u



+ ln2



1

β u



2



1

β u

 3



[1, 1, 1], [2, 2, 2],1

β u



.

(38) The same evaluation example presented for RR is shown

to BC allocation at the expenses of users with lower average

are remarkable (the asymptotic behaviour when relaxing the QoS constraint) but also the minimum target delays of each user move away For example, the worst user cannot demand

a target delay below 45 symbols for these channel conditions and scheduling, in contrast to the 2 symbols of the best user

As expected, the average rate is higher than for RR, since this algorithm maximizes the total system efficiency

It is wellknown that by exploiting the multiuser diversity one can achieve higher system capacity as the number of users increases This multiuser diversity gain is illustrated

average SNR of users follows a lognormal distribution, with

Trang 7

0 100 200 300 400 500 600 700

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

D t(symbols) U

U

=10 users

U =7 users

U =4 users

u D t ,ε

Figure 4: Multiuser diversity for BC and uncorrelated channel:

maximum achievable rate of the median user Average SNR

following lognormal shadowing with mean 10 dB and standard

deviation 4 dB.ε =0.1 β u =1

average 10 dB and standard deviation 4 dB The violation

of the median user is plot, for 4, 7, and 10 users It can be

observed that as the number of users increases, the maximum

achievable rate of the median user increases, due to multiuser

diversity

3.4 Proportional Fair Proportional Fair (PF) [15] is a

compromise-based scheduling algorithm It is intended to

improve Best Channel by maintaining a balance between two

competing interests: maximizing the total wireless network

throughput while allowing a minimum level of service to all

users Fair sharing will lower the total throughput over the

maximum possible, but it will provide more acceptable levels

to users with poorer SNR Instead of using the instantaneous

potential transmission rate of BC, PF uses as metrics the ratio

γ u[n]/γ u:

c u[n]

=

log2

1 +βγ u[n]

ifγ u[n]/γ u > γ k[n]/γ k ∀ k / = u,

(39) Therefore, we just need to do a change of variable in the

previous results for BC Let us defineΓmax:

u



γ u

γ u



Now the effective SNR for the uth user is

Γ

u =

γ u, γ u

γ u >

γ − u

γ − u,

γ u <

γ − u

γ − u .

(41)

u is expressed:

f u(x)F − u



xγ u

= − γ u ·

iU

(1)i·1i u

γ uexp



− xγ u1

(42)

m u = −

iU

(1)i·1i u

1log2(e) exp



β



E1



β



. (43)

Likewise, the calculation of the variance yields

σ2

u = E

log22

1 +β u γ

− m2

u

= −

i∈ S

(1)i·1 i s



log2(e)2

e(1 u)q·i

×



π2

6 +g2+ 2g ln



1

β uq·i



+ ln2



1

β uq·i



2



1

β u



F



[1, 1, 1], [2, 2, 2],1

β u



.

(44)

evaluated under the same conditions as it was done for RR and BC The three users have average SNR 5, 7, and 12 dB and the violation probability is set to 0.1.

It can be observed that the differences among users reduce if we compare with the BC strategy That is exactly the goal of this discipline: to maintain a balance between the total throughput and the level of service of all users Obviously, the average rate reduces to increase the fairness The achieved fairness is specially noticeable in the behaviour of the target delay, which is 10 symbols for the three users

4 Correlated Channel

In this section, a time-correlated channel is considered, meaning that the channel response of each user follows the

4.1 Achievable Users’ Rates with a Delay Constraint To face

the new problem, we split the accumulated transmission rate for theuth user, C u[n], into b blocks of length k symbols:

C u[n] =

b1

i =0

C u i[k] =

b1

i =0

k1

m =0

c u[k · i + m]. (45)

The channel correlation among the elements in the block

is considered but, with the proper selection of the block’s

Trang 8

0 10 20 30 40 50 60

0

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

D t(symbols)

User 1

User 2 User 3

m u

Average

u D t ,ε

R u

Figure 5: Achievable users’ rates with Proportional Fair scheduling

in an uncorrelated channel Three users with γ u = 5, 7, 12 dB,

respectively.ε =0.1 β u =1

the correlation of the channel If the channel is strongly

correlated, longer blocks have to be defined in order to

is a residual value of correlation between the last elements of

one block and the first elements of next one Nevertheless,

is large enough Notice that a decreasing autocorrelation

function is required, as it is the case in fading channels

is the sum of a sufficiently large number of independent

random variables, and the Central Limit Theorem can

variable with averageb · m k uand varianceb · σ2

u, wherem k u

andσ2

theuth user.

statistics to test whether an observed sample distribution

is consistent with normality In the numerical results and

simulations conducted throughout this paper, the validity of

testing for normality with the Lilliefors test for the selected

The effective bandwidth function of the Gaussian

distri-bution ofC u[n] yields

α C u(υ) = lim

n → ∞

1

n · υlog E



e υC u[n]

= m k u

k +

υ

2

σ2

u

k . (46)

R u D t,ε = m k u

1 2

m2

k u

k2 2σ2

k u

k



logε

D t (47)

Let us examine first the single user system, since this

continuous rate policy, the mean and variance of the blocks, denoted asm k1andσ2

1, are calculated as follows

In the case of the mean, it is straightforward that

m k1= k · m1 (48) For the variance, it can be written in terms of the autocovarianceKc(m) [24]:

σ k21=

k1

q =0

k1

r =0

Kc



r − q

,

Kc(m) = E[c[n]c[n + m]] − m2

c

(49)

The bivariate probability density function for Rayleigh distributed variables is needed It can be expressed as follows

f γ

γ n,γ n+m



z(m)

γ2exp





γ n+γ n+m





z(m)

γ



· I0



2Rz(m) √ γ

n γ n+m



z(m)

γ



,

(50) whereI0(u) is the modified Bessel function of the first kind

andRz(m) is the value of the ACF of the envelope z[n] for a

E[c[n]c[n + m]]

=E

c

γ n



c

γ n+m



=



γ n =0



γ n+m =0

c

γ n



c

γ n+m



f γ

γ n,γ n+m



dγ n dγ n+m

(51)

After some manipulations the autocovariance yields

Kc(m) = b

γ



p =0



I p



β,Rz(m), b2

− m2

c, (52)

z(m)) · γ) and the integral

I p(β,Rz(m), b) has the following form:

I p



β,Rz(m), b

= Rp

z(m)

p ·log(2)

·



− p

b



− ψ

1 +p

+ log(b)

+2F2

[1, 1],

2, 1− p

,b

(53) withψ(x) =(d(log( Γ(x))))/dx the digamma function.

4.2 Round Robin When U users share the channel under an

RR discipline, the channel is equally divided among users

Trang 9

0

0.2

0.4

0.6

0.8

1

1.2

1.4

D t(symbols)

User 1

User 2 User 3 Average

RRρ =0.9

RRρ =0.8

RR uncorrelated

u D t ,ε

Figure 6: Achievable users’ rates with Round Robin scheduling in

a time-correlated channel with exponential ACF of parameter ρ.

Three users withγ u =5, 7, 12 dB, respectively.ε =0.1 β u =1

σ k2u are written directly as a function ofm k1 andσ k21, by just

users:

m k u = m k1

U ,

σ k u = 1

U σ k1



γ u,β u



.

(54)

The evaluation of RR in a correlated channel is presented

for the three users The correlation follows an exponential

previous result of the uncorrelated channel is also shown

with black line The qualitative behaviour is the same as in

is remarkable: as expected, the correlation is harmful to the

increases), the achievable users’ rates decrease Moreover, it is

observed that the differences among users increase with the

time-correlation

4.3 Best Channel Similarly as done in RR, the calculation

of the maximum attainable rates in the case of Best

Channel strategy leads to the computation of the variance

of the blocks (the evaluation of the mean of the blocks is

straightforward), which comes down to the computation of

the expectationE[c u[n]c u[n + m]].

The joint pdf and CDF of two correlated Rayleigh variates

are needed We have the expressions in terms of the envelope

given by [25] (page 142, equation 6.2.):

fz(z n,z n+m)= 4z n z n+m

(1Rz(m))exp



− z n2+z2

n+m

(1Rz(m))



· I0



2 Rz(m)z n z n+m

(1Rz(m))



,

(55)

whereI0(u) is the modified Bessel function of 0th order.

143, (6.5))

Fz(z n,z m)

=1exp

− z2n



Q1 2 (1Rz(m)) z m,

2Rz(m)

(1Rz(m)) z n



exp

− z2

m



(1Rz(m)) z m,

2 (1Rz(m)) z n



,

(56) withQ1(a, b) being the Marcum Q function.

Let the effective envelope of the uth user be

z ∗ n u =

z u[n], z u[n] · γ u > z − u[n] · γ − u,

0, z u[n] · γ u > z − u[n] · γ − u, (57) wherez − u[n] =maxk / = u{ z u[n] }

This random variable, equivalent to the effective SNR defined in the uncorrelated channel, indicates the fact that the user only gets the channel if his instantaneous SNR is the highest among all the users In contrast to the uncorrelated

it is needed to calculate the expectation evaluated in two different symbols

Consider the following vector of decision:



z n ∗ u,z ∗ m u

=

(0, 0), z u[n]γ u < z − u[n]γ − u

andz u[m]γ u < z − u[m]γ − u, (z u[n], 0), z u[n]γ u > z − u[n]γ − u

andz u[m]γ u < z − u[m]γ − u, (0,z u[m]), z u[n]γ u < z − u[n]γ − u

andz u[m]γ u > z − u[m]γ − u, (z u[n], z u[m]), z u[n]γ u > z − u[n]γ − u

andz u[m]γ u > z − u[m]γ − u

(58) Notice that to calculate the expectation E[c u[n]c u[n + m]], only the last case is needed, as the other three options

Trang 10

Therefore, only the case in which the channel is assigned to

useru in both symbols n and m is required The joint pdf is

f u



z ∗ n u,z ∗ m u

F − u



z ∗ n u · γ u,z ∗ m u · γ u

where f u(z ∗ n u,z m ∗ u) is the pdf in (55) and the CDF:

F − u



z n ∗ u,z m ∗ u

= U



k / = u

F k



z ∗ n u,z ∗ m u

withF k(z ∗ n u,z m ∗ u) the CDF in (56)

Gathering together the previous expressions, the

expec-tation to be calculated is

E[c u[n]c u[m]] =E

c

z ∗ n u



c

z ∗ m u



=



z ∗

nu =0



z ∗

mu =0

c

z ∗ n u



c

z ∗ m u



f u



z ∗ n u,z ∗ m u



· F − u



z n ∗ u · γ u,z ∗ m u · γ u

dz n ∗ u dz ∗ m u

=!x = z ∗ n u;y = z m ∗ u;p = m − n"

=



x =0



y =0

log2

1 +β u x2

log2

1 +β u y2

· 4xy



p  ·exp





x2+y2





p



· I0

⎝2

%

Rz



p

xy





p

·

⎩1exp



− γ2

u x2

Q1



pγ u y,

( ) 2Rz



p





pγ u x

⎠ −exp

− γ2

u y2

·

⎣1− Q1

( ) 2Rz



p





pγ u y,

2 (1Rz(p)) γ u x

U −1

dxd y.

(61)

for the same conditions as in RR In this case, it is not

straightforward to evaluate the variance in (61) Thus, it has

been obtained by simulation methods A long trace of the

instantaneous transmission rate process is generated and the

sample variance is got from it The qualitative behaviour

already observed in the uncorrelated channel is highlighted

the time correlation of the channel

0

0

0.5 1 1.5 2 2.5 3

D t(symbols)

User 1

User 2 User 3 Average

BCρ =0.9

BCρ =0.8

BC uncorrelated

u D t ,ε

Figure 7: Achievable users’ rates with Best Channel scheduling in

a time-correlated channel with exponential ACF of parameterρ.

Three users withγ u =5, 7, 12 dB, respectively.ε =0.1 β u =1

4.4 Proportional Fair The calculation of the variance in the

PF discipline is very similar to the BC algorithm The effective

z n ∗ u =

z u[n], z u[n] > z − u[n],

0, zu[n] < z − u[n]. (62)

Now the vector of decision simplifies



z ∗ n u,z ∗ m u

=

andz u[m] < z − u[m],

(z u[n], 0), z u[n] > z − u[n]

andz u[m] < z − u[m],

(0, zu[m]), z u[n] < z − u[n]

andz u[m] > z − u[m],

(z u[n], z u[m]), z u[n] > z − u[n]

andz u[m] > z − u[m].

(63)

Like in the BC discipline, only the joint pdf of the last case

is needed, as the other three options will result in zero in the expression ofE[c u[n]c u[n + m]] This joint pdf is

f u



z ∗ n u,z ∗ m u

F − u



z n ∗ u,z ∗ m u

... with the BC strategy That is exactly the goal of this discipline: to maintain a balance between the total throughput and the level of service of all users Obviously, the average rate reduces to increase... Thus, the best

user in this example could fix a delay constraint with a target

delay of symbols in contrast to the symbols of the worst

user On the other hand, if the same... maintaining a balance between two

competing interests: maximizing the total wireless network

throughput while allowing a minimum level of service to all

users Fair sharing

Ngày đăng: 21/06/2014, 11:20

TỪ KHÓA LIÊN QUAN

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN

🧩 Sản phẩm bạn có thể quan tâm