 Research
 Open access
 Published:
Powerefficient distributed resource allocation under goodput QoS constraints for heterogeneous networks
EURASIP Journal on Advances in Signal Processing volume 2016, Article number: 129 (2016)
Abstract
This work proposes a distributed resource allocation (RA) algorithm for packet bitinterleaved coded OFDM transmissions in the uplink of heterogeneous networks (HetNets), characterized by small cells deployed over a macrocell area and sharing the same band. Every user allocates its transmission resources, i.e., bits per active subcarrier, coding rate, and power per subcarrier, to minimize the power consumption while both guaranteeing a target quality of service (QoS) and accounting for the interference inflicted by other users transmitting over the same band. The QoS consists of the number of information bits delivered in errorfree packets per unit of time, or goodput (GP), estimated at the transmitter by resorting to an efficient effective SNR mapping technique. First, the RA problem is solved in the pointtopoint case, thus deriving an approximate yet accurate closedform expression for the power allocation (PA). Then, the interferencelimited HetNet case is examined, where the RA problem is described as a noncooperative game, providing a solution in terms of generalized Nash equilibrium. Thanks to the closedform of the PA, the solution analysis is based on the best response concept. Hence, sufficient conditions for existence and uniqueness of the solution are analytically derived, along with a distributed algorithm capable of reaching the game equilibrium.
1 Introduction
Future wireless networks are required to offer extremely enhanced capabilities including very high achievable data rates, very low latency, ultrahigh reliability, and the possibility to handle very high density of devices [1]. On the other hand, since this trend dramatically contributes to the pollution related to energy consumption [2], energyefficient wireless communications emerged as a viable design concept to reduce the CO_{2} emission in the next years [3]. In addition, to manage the envisioned huge demand of traffic, a very promising solution is offered by the concept of heterogeneous network (HetNet), where smallcell (SC) networks, characterized by lowcost, lowpower, and lowcoverage base stations (BSs), i.e., small BSs (SBSs), are massively deployed over the macrocell (MC) areas. Their adoption allows offloading the traffic of the macro network, thus increasing the offered data rate and spectrum reusage and providing, at the same time, a more powerefficient architecture thanks to their reduced coverage [4]. Since in HetNets SCs share the same frequency bands of the MC [5], one of the main technical effort to be made is the management of the interference, either between SC and MC users (crosstier interference) or between users in different SCs (cotier interference). Hence, the random deployment of SCs together with the heterogeneity of these networks naturally calls for decentralized resource allocation (RA) strategies [6], where every user, independently from the other ones, maximizes its performance taking into account interference experienced on its transmission band. Indeed, distributed RA strategies only require the knowledge of local channel state information (CSI), exchanged between each user and its associated BS, thereby avoiding the waste of energy associated with centralized algorithms based instead on a huge information exchange between the users and/or the network administrator [6, 7].
1.1 Related works
Most of the works on RA in HetNets focus on the improvement of the energy efficiency (EE) as in [8], where the authors study the RA problem optimizing the EE over the downlink of an orthogonal frequency division multiplexing (OFDM) cognitive radio (CR) HetNet. A joint subcarrier allocation (SA) and power allocation (PA) solution is provided to guarantee quality of service (QoS) requirements for both secondary and primary users in the cognitive HetNet. Moreover, the authors propose a lowcomplexity RA algorithm in presence of imperfect CSI. In [9], authors address a joint EE RA and interference alignment problem for downlink multipleinput multipleoutput (MIMO) transmissions in HetNets. The EE maximization problem is solved in order to provide timeslot allocation, PA, and beamforming. Unlike [8, 9], paper [10] analyzes RA techniques with different levels of CSI for uplink orthogonal frequencydivision multiple access (OFDMA) transmissions in HetNets with one macrocell and cognitive small cells. Here, the purpose of the RA is to maximize the weighted sum of instantaneous rates of all the users, providing a joint PA and SA. Article [11] discusses possible future developments for HetNet in fifthgeneration (5G) communications, where massive MIMO and mmWave technologies may be included, emphasizing that RA solutions will once again be one of the most critical issues. Besides, in this work a distributed RA problem over interference channels is tackled.
The most suited framework to study this kind of problem is identified in the theory of noncooperative games [12], as outlined in [13, 14] about the uplink power control (PC) problem for flat and frequencyselective channels, respectively. Since then, the literature on this topic has increased more and more. Worth to be cited are [15, 16], where the energyefficient PC problem for wireless data and code division multiple access (CDMA) networks is addressed, respectively, [17, 18], wherein the NCG framework is exploited to tackle the distributed PA problem for EE maximization in OFDM channels and MIMO HetNets, respectively, whereas in [19] the issue of dynamic RA is investigated in the context of multiuser cognitive networks, by exploiting a NCG for signal waveform design combined with sparsity constraints. In [20–22], the equilibrium analysis of the NCG describing the rate maximization problem in multicarrier and MIMO channels is discussed. A minimum PA game over OFDM channels with rate constraints is proposed in [23], whereas the PA problem based on the EE maximization under rate constraints is studied for HetNets in [6]. A final interesting work is presented in [24], where the authors investigate the RA problem for devicetodevice (D2D) uplink communications in MIMO cellular networks. The RA is evaluated by means of a noncooperative game that provides a joint optimization of channel allocation, power control, and precoding of the D2D users, by maximizing the sumrate of the cellular uplink network. The distributed RA solution in [24] is exploited in [25] for D2D communications in MIMO HetNets.
A common feature to all the above works is that they rely on the assumption of infinitelength Gaussian codebooks and thus employ the channel capacity as figure of merit. However, when dealing with real systems characterized by practical and finitesized modulation and coding schemes and automatic repeat request (ARQ) mechanisms, such information theoretical performance metric may offer an unreliable picture of the actual link performance [26]. In this cases, a suitable performance measure is the number of information bits delivered in errorfree packets per unit of time, named goodput (GP) for short [26, 27]. To our best knowledge, GPbased distributed RA strategies have been addressed so far in few works only, as in [28, 29]. In [28], a PC strategy for CDMA ad hoc networks is proposed, aiming at maximizing the GP to power ratio under transmission rate and power constraints, whereas in [29], a network utility maximization problem with GP flow variables under queues stability constraints is proposed for flat fading mobile adhoc networks.
1.2 Contributions
This work proposes a novel distributed RA strategy for an energyaware communication in the uplink of OFDMbased HetNets. Assuming a packetoriented bitinterleaved coded (BIC) OFDM transmission with practical modulation and coding formats and ARQ mechanisms, power consumption of all users is minimized, provided they meet a given QoS in terms of a target GP value. In order to allocate the transmission resources according to the available CSI, namely, bit loading (BL) vector, i.e., bits per active subcarrier, coding rate, and PA vector, the transmitter requires an estimate of GP, called expected goodput (EGP). The analytical formulation of such performance metric under frequencyselective fading channel scenarios is efficiently obtained resorting to the link performance prediction (LPP) method known as effective signaltonoise ratio mapping (ESM) [30] and, specifically, exploiting the ESM technique proposed in [31]. Thus, the distributed RA strategy allows every user to minimize its power consumption, meeting at the same time its QoS constraint expressed in terms of target EGP, by selfishly allocating its transmission resources. Hence, in view of all the above features (especially, the EGP evaluation for BICOFDM systems over frequencyselective fading channels), our work brings the following competitive contributions.

1)
As first step, the RA problem is analyzed for the pointtopoint case (P2P), i.e., for a single transmitter receiver pair without interference. The optimal solution as well as an approximate yet accurate closedform one, which is reminiscent of the waterfilling solution for Gaussian signaling, is derived for the PA.

2)
The RA problem is then extended to the the interferencelimited HetNet scenario. The PA problem is solved in distributed manner as a function of the BL vector and the coding rate, by modeling it as a NCG, where players, strategy, and the utility function correspond to users, PA vector, and power consumption, respectively. Due to the QoS constraints imposed on the GP level, the set of strategies of each user depends on the strategies of the other users. This is the basic reason why the solution is the generalized Nash equilibrium (GNE) [32]. To be more specific, the GNE is described by a set of fixedpoint equations based on the best response (BR) strategy of each player, wherein the BR (depending on the target EGP level) is obtained by capitalizing on the waterfillinglike solution to the PA. Sufficient conditions for the feasibility of the problem, as well as for the existence and uniqueness of the GNE, are analytically derived. Additionally, some insights on the relationship between the GNE and the pareto optimal (PO) solution are provided.

3)
A distributed RA algorithm, that allows the network to reach the equilibrium, is proposed. To support our findings, the algorithm performance is corroborated by physical layer simulations of the HetNet over realistic wireless scenarios.
Notations. Matrices are in upper case bold while column vectors are in lower case bold; [ ·]^{T} is the transpose of a matrix or a vector; ⌈x⌉ denotes the nearest greater integer than x; × denotes the Cartesian product; calligraphic mathematical symbols, e.g., \({\mathcal {A}}\), represent sets; \({\mathcal {A}}\) denotes the cardinality of the set \({\mathcal {A}}\); \({\mathcal {A}}(i)\) is the ith element of the set \({\mathcal {A}}\); \(y=[\!x]_{a}^{b}\) means y=x if a<x<b, x=a (x=b) if x≤a (x≥b); y=[ x]^{+} means y=x (y=0) if x>0 (x≤0); the square root of a vector x is intended as the vector including the square root entries of x; a⊙b denotes the elementwise multiplication between a and b; and a⊥b means a·b=0; inequalities between vectors are evaluated elementwise.
2 HetNet model
In this section, the HetNet scenario is first introduced and then the BICOFDM uplink channel with multiple access interference (MAI) is described.
2.1 HetNet scenario description
The HetNet scenario is depicted in Fig. 1 and is composed of Q+1 BSs, whose indexes belong to the set \({\mathcal {Q}}\triangleq \{0,\cdots,Q\}\). In particular, there is one macro base station (MBS), with index q = 0, and Q SBSs, with indexes q=1,⋯,Q, all of them sharing the same band B. Within the network, there exist K users belonging to the set \({\mathcal {K}} \triangleq \{1,\cdots,K\}\), each of them transmitting to one of the BSs, so that, if \({\mathcal {K}}_{q}\) denotes the set of users served by BS q, then \({\mathcal {K}}={\mathcal {K}}_{1}\cup \cdots \cup {\mathcal {K}}_{Q}\), with \({\mathcal {K}}_{q}\cap {\mathcal {K}}_{r}=\emptyset \) if q≠r. The transmission signaling between every user and the corresponding BS is based on the OFDM format, i.e., the available bandwidth B is subdivided into N orthogonal subcarriers. Further, users within the same cell, either MC or SC, transmits over orthogonal frequencies according to the OFDMA scheme [3]. Though, since SCs and MC share the same band, the same subcarrier can be used at the same time by users served by either different SBSs or the MBS, leading to intercell interference (ICI). For the sake of notation, let us define the mapping \(\phi :{\mathcal {K}} \rightarrow {\mathcal {Q}}\) to univocally associate each user \(k \in {\mathcal {K}}\) to the relevant BS \(q \in {\mathcal {Q}}\), so that ϕ(k), with ϕ(k)=q, identifies the link between user k and its BS q.
2.2 BICOFDM system description
The block diagram of the uplink between user \(k\in \mathcal {K}\) and its BS \(\phi (k)\in \mathcal {Q}\) is depicted in Fig. 2. At the transmitter side, packets coming from the upper layers (usually IP packets) are processed as follows. First, each of them is onetoone mapped to a radio link control sublayer protocol data unit (RLCPDU), composed of \(U_{k}^{(\mathrm {i})}\) bits (containing the header, payload, and cyclic redundancy check). Then, the RLCPDU is encoded producing a codeword of \(U_{k}^{(\mathrm {s})}\triangleq U_{k}^{(\mathrm {i})}/r_{k}\) coded binary symbols (CBS), where \(r_{k}\in {\mathcal D}_{r}\) is the coding rate and \({\mathcal D}_{r}\) the set of feasible coding rates. After bitinterleaving, the CBSs are Graymapped into S _{ k } complexvalued symbols, which are transmitted through a frame of \(L_{k} \triangleq \lceil S_{k}/N_{k} \rceil \) consecutive OFDM blocks, where \(N_{k} \triangleq  {\mathcal {N}}_{k}\), being \({\mathcal {N}}_{k} \subseteq {\mathcal {N}} \triangleq \{1,\ldots,N\}\). The generic OFDM block, \(\forall k \in {\mathcal {K}}\), consists of the vector \(\mathbf {x}_{k} \triangleq [x_{k,1}, \cdots, x_{k,N}]^{\mathrm {T}}\), where x _{ k,n } is a \(\phantom {\dot {i}\!}2^{m_{k,n}}\)QAM unitaryenergy symbol, being \(m_{k,n}\in {\mathcal {D}}_{m}\triangleq \{2,\cdots,m_{\max }\}\) the number of bits allocated on the nth subcarrier, if \(n\in {\mathcal N}_{k}\), and x _{ k,n }=0 if \(n\notin {\mathcal N}_{k}\). In the following, we will assume, for the sake of simplicity, uniform bit loading (BL), that is, \(m_{k,n}=m_{k}\in \mathcal {D}_{m}\), \(\forall n \in \mathcal {N}_{k}\). The vector x _{ k } is elementwise multiplied by the square root of the power allocation (PA) vector \(\mathbf {p}_{k} \triangleq [p_{k,1}, \cdots, p_{k,N}]^{\mathrm {T}}\), where p _{ k,n }>0 if \(n\in {\mathcal N}_{k}\) and p _{ k,n }=0 if \(n\notin {\mathcal N}_{k}\), such that the available power limit P _{ k } is satisfied according to
Subsequently, IFFT operation is performed, cyclic prefix (CP) is inserted and after the digitaltoanalog conversion, the OFDM signals of all the K users active in both the MC and the SCs are each transmitted in uplink over (different) frequencyselective blockfading channels, which are assumed stationary for the whole packet transmission duration.
Focusing on the kth user’s signal at the ϕ(k)th BS, \(k \in {\mathcal {K}}\), at the FFT output, the received sample on subcarrier \(n \in \mathcal {N}_{k}\) is
where h _{ j,s,n } denotes the channel coefficient between user j and BS s over subcarrier n, \(w_{k,n} \in \mathcal {N}\left (0,\sigma _{w_{k,n}}^{2}\right)\) is the zeromean complexvalued Gaussian random variable modeling the ambient noise, and
represents the ICI, which is described as additive colored Gaussian noise with zero mean and variance
As for (3), we note that since users within the same cell \(q \in {\mathcal {Q}}\) transmit according to the OFDMA scheme, then for a given subcarrier \(n \in {\mathcal {N}}\), p _{ k,n }>0 at most for one user \(k \in {\mathcal {K}}\) such that ϕ(k)=q, whereas p _{ i,n }=0 for all the other users \(i \in {\mathcal {K}}\) such that ϕ(i)=q. Finally, the signaltointerferenceplusnoise ratio (SINR) vector evaluated for kth user link results as Γ _{ k }=p _{ k }⊙γ _{ k }, where \({\boldsymbol {\gamma }}_{k} \triangleq [\gamma _{k,1},\cdots,\gamma _{k,N}]^{\mathrm {T}}\), with
3 Performance metrics background and problem formulation
In this section, a brief description of the adopted LPP metric is first given, then the optimization problem (OP) for minimum power consumption under EGP constraint satisfaction is introduced.
3.1 LPP background
As discussed in Section 1, practical modulation and coding schemes are employed; therefore, the GP metric is more suitable in giving a reliable picture of the actual link performance. Here, in order to apply the RA algorithm at the transmitter, the key issue is to get a prediction of the GP, i.e., the EGP, which in turn depends on the estimate of the link packet error rate (PER) [28, 31].
In a frequencyselective scenario as that considered in our paper, however, the expression of the PER may be hard to derive in closedform. An efficient solution to pursue is given by the ESM techniques [30], which rely on onetoone mapping Γ _{ k } into the scalar \(\overline {\gamma }_{k}\), the socalled effective SNR (ESNR). Considering that a given subcarrier of every user \(k \in {\mathcal {K}}\) can be loaded with \(m \in {\mathcal {D}}_{m}\) bits, or switchedoff, i.e., m=0, let us denote with \({\mathcal {D}}_{\mathbf {m}}\) the set collecting the \({\mathcal {D}}_{m}\cdot 2^{N}\) possible bit allocation vectors. Hence, for a given transmission mode (TM) \(\boldsymbol {\varphi }_{k} \triangleq \{r_{k},\mathbf {m}_{k}\} \in {\mathcal {D}}_{r} \times {\mathcal {D}}_{\mathbf {m}}\), the ESNR \(\overline {\gamma }_{k}\) is such that
where \(\phantom {\dot {i}\!}\text {PER}_{{\boldsymbol {\varphi }}_{k}}\) and \(\phantom {\dot {i}\!}\Phi _{r_{k}}\) denote the PER of the coded BICOFDM system over frequencyselective channel employing TM φ _{ k } and that of the equivalent coded BPSK system over AWGN channel experiencing the ESNR \(\overline {\gamma }_{k}\), respectively. Worth of being observed, \(\Phi _{r_{k}}\), according to [33, 34], is an analytic, monotonically decreasing, and convex function in the region of interest.
Among the ESM techniques proposed in the literature, the κESM method, based on the cumulant moment generating function of the loglikelihood metrics at the input of the soft decoder, is here exploited, since it offers a competitive accuracyversuscomplexity tradeoff [31]. Herein, the ESNR \(\overline {\gamma }_{k}\) is evaluated as
where \(\mathbf {p}_{k}\triangleq [\mathbf {p}_{1}^{\mathrm {T}},\cdots,\mathbf {p}_{k1}^{\mathrm {T}},\mathbf {p}_{k+1}^{\mathrm {T}},\cdots,\mathbf {p}_{K}^{\mathrm {T}}]^{\mathrm {T}}\) and \(\mathbf {p}_{k,n}\triangleq [p_{1,n},\cdots,p_{k1,n},\) p _{ k+1,n },⋯,p _{ K,n }]^{T} collect all the PA vectors and persubcarrier PA coefficients except those associated to user k, respectively, and α _{ k,μ } and ψ _{ k,μ } are constant values related to the modulation size adopted by the kth user. Their values are evaluated in [31] and reported in Table 1. It can be noted that the channel gain (5) has been explicitly expressed as a function of p _{−k,n }.
3.2 Problem formulation
Exploiting the κESM LPP method recalled in Section 3.1, the EGP metric, defined as the number of information bits delivered in errorfree packets per unit of time, is expressed in (bit/OFDM block) as [31]
with \(\breve {\zeta }_{k}\triangleq U_{k}^{(\mathrm {p})}/U_{k}^{(\mathrm {i})}\), being \(U_{k}^{(\mathrm {p})}\) the number of payload bits. Let us assume a given QoS per user in terms of a target EGP value \(\bar \zeta _{k}\). The aim is to consume the lowest power as possible, while meeting such EGP QoS constraints. Besides, due to the mutual interference, the EGP of a given user is affected by the transmission power employed by the other users. Thus, assuming the lack of a central coordinating unit, the goal of the users is to reach, in a distributed way, the optimal PA \(\mathbf {p}^{*}_{k} \triangleq [p^{*}_{k,1},\cdots,p^{*}_{k,N}]^{\mathrm {T}}\) and the optimal TM \({\boldsymbol {\varphi }}_{k}^{*}\), \(\forall k \in {\mathcal {K}}\), which satisfy the QoS constraints spending the minimum transmission power. This problem, tagged as powerefficient under guaranteed EGP OP, or PEGE for short, can thus be formalized as
A few remarks about (9) are now in order.

1)
The OP (9), when applied to a P2P BICOFDM link, has not yet been taken into consideration, and so, it lacks analysis. Therefore, the above issue is first addressed in Section 4, where we derive a closedform solution for the PA, being it useful for the subsequent case of multiple users addressed in Section 5.

2)
In view of the QoS contraints, there exists a competition among the multiple active users allowed to transmit over the same band. Thus, the problem falls in the NCG framework, which is efficiently employed to study the strategic interuser interactions [35]. Hence, the OP (9) can be formulated as a NCG, whose conditions of existence and uniqueness of the solution are analytically derived in Section 5, together with a distributed implementation of the RA algorithm.

3)
The total power constraint (1) for each user is skipped in the OP (9), since its presence makes the game analysis impractical. Hence, we assume that the optimal PA, satisfying the QoS constraint, satisfies (1) as well. Nevertheless, when introducing the distributed RA algorithm in Section 5.3, such a power constraint will be restored, giving additional comments and insights on it.
4 PEGE OP in pointtopoint links
Let us focus on the P2P communication link, that is \({\mathcal {Q}}=1\) and \({\mathcal {K}}=1\) (for this reason in the reminder of this section, the index k will be neglected in the quantities of interest). Specifically, Section 4.1 formulates the strategy to select the optimal TM and PA vector solving OP (9), whereas Section 4.2 solves the PA problem in closedform.
4.1 Problem formulation
As for the solution of OP (9), it can be pointed out that (i) even if uniform BL is chosen for each user, the choice of the active subcarriers entails again a BL procedure, since the nth component of the BL m is m _{ n }=m if subcarrier n is active, m _{ n }=0 otherwise, as described in Section 3.1; (ii) the BL and PA problems cannot be jointly solved, in that the problem is NPhard. Given the QoS constraint and the SINR vector γ, however, the OP can be efficiently yet suboptimally tackled relying on the following strategy: first, the optimal PA vector \(\mathbf {p}^{*}\triangleq [p_{1}^{*},\cdots,p_{N}^{*}]^{\mathrm {T}}\) is derived as a function of the generic TM φ, i.e., p ^{∗}≡p ^{∗}(φ), and, then, the pair TM and PA that minimizes the power consumption while satisfying the QoS constraint is selected as solution to the OP.
PA in PEGE OP for a fixed TM. Assuming a given TM φ, the optimal PA p ^{∗}(φ) solving OP (9) is obtained as
where the first constraint in (10) corresponds to the QoS constraint of (9) expressed as a function of the PA, with, in view of (7) and (8),
and
being constant values, both depending only on φ. From Eqs. (11)–(12), it is seen that, given the BL vector and the coding rate, the QoS constraint \(\bar \zeta \) can be equivalently expressed as a function of the target ESNR γ ^{∗}(φ).
Nevertheless OP (10), having a linear objective function and convex constraints, be a convex OP, due to the presence of the QoS constraint it does not present a closedform solution. Therefore, solving (10) can be approached via conventional numerical methods [36], though at the price of a high computational load. Afterward, we propose an alternative approximate yet efficient method to get a closedform solution of OP (10). Hence, the numerical computationally heavy solution will be only used as benchmark to test the accuracy of the proposed approximated closedform solution.
TM selection in PEGE OP. Given the SINR γ and assuming uniform PA across the subcarriers^{1}, first the BL procedure originally proposed in [37] is applied, with the set of feasible number of bits per subcarrier being {0,m}. As a result, we get \({\mathcal {D}}_{m}\cdot N\) possible BL vectors \(\{\overline {\mathbf {m}}^{(n,m)}\}\), n=1,⋯,N, with \(m\in {\mathcal {D}}_{m}\). As a matter of fact, \(\overline {\mathbf {m}}^{(n,m)}\) denotes the best bit allocation vector with n active subcarriers and m bits per active subcarrier. Let us denote with \({\mathcal {D}}_{\overline {\mathbf {m}}} \subset {\mathcal {D}}_{\mathbf {m}}\) the set collecting such vectors. Then, if the PA p ^{∗}(φ) are available for the TMs \({\boldsymbol {\varphi }}\in {\mathcal {D}}_{r} \times {\mathcal {D}}_{\mathbf {\overline m}}\), the OP (9) is solved by searching the best TM φ ^{∗} that both minimizes the power consumption and satisfies the QoS constraint. Formally,
The OP (13) can thus be solved by means of the pseudocode outlined in Table 2. The key points of the proposed procedure are as follows. (i) For every \(m \in {\mathcal {D}}_{m}\), the set \({\mathcal {D}}_{\overline {\mathbf {m}}}\) is efficiently found exploiting the BL strategy [37], which is based on a greedy algorithm with complexity \(\mathcal {O}(N\log N)\). (ii) The best TM is obtained carrying out an exhaustive search over the possible TMs. The latter stands for the worst case condition, in that, for a given pair {r,m}, the search is halted as soon as a feasible TM is found (step 10 of Table 2), because any other TM with the same pair {r,m} would require a larger amount of transmitted power. Indeed, for a given m, \({\overline {\mathbf {m}}}^{(n+1,m)}\) would have the same active subcarriers as \({\overline {\mathbf {m}}}^{(n,m)}\) plus an additional active subcarrier chosen among the remaining N−n ones. As a consequence, the power consumption of the former case would be greater than that of the latter one. (iii) In order to maintain an affordable complexity of the overall algorithm, a closedform expression of the PA can be derived, as illustrated in the next section.
4.2 Closedform solution for the PA problem
Let us now point out that the summation over μ in the QoS constraint prevents to easily obtain a closedform solution to the PA problem. Thus, the idea we pursue is to approximate the QoS expression in (10) by introducing a scalar β such that a possible closedform PA solution matches the optimal one earned by solving (10) via a numerical (computationally heavy) method.
Proposition 1
Approximating the lefthand side of the QoS constraint in (10) with \(\beta \sum _{n=1}^{N} {\mathrm {e}}^{\frac {p_{n}}{\rho _{n}}}\), with \(\rho _{n}\triangleq \delta /\gamma _{n}\), \(\beta \in {\mathbb {R}}^{+}\) and \(\rho \in {\mathbb {R}}^{+}\), the OP (10) turns into
So doing, the nth component of the solution p ^{⋆} to (14) can be written in closedform as the waterfillinglike solution [ 20 ]
where Θ is such that p ^{⋆} satisfies the QoS constraint in (14) with equality and represents the “waterlevel.”
Proof
The proof is given in Appendix A. □
Concerning the values of β and δ, by looking at the values assumed by the coefficients α _{ μ } and ψ _{ μ } for a given modulation order (Table 1), it follows that the lefthand side of the QoS constraint in (10) can be lower and upper bounded as
where \(\delta ^{(\mathrm {l})} \triangleq \psi _{1}\), \(\beta ^{(\mathrm {l})} \triangleq \alpha _{1}\), \(\delta ^{(\mathrm {u})} \triangleq \psi _{1}\) and \(\beta ^{(\mathrm {u})} \triangleq \sum \limits _{\mu =1}^{\sqrt {2^{m}}/2} \alpha _{\mu } \). The strict equality holds for m=2, since in this case the sum over μ reduces exactly to only one term.
Denoting with p ^{(l)} and p ^{(u)} the optimal solutions (15) when the pair {β,δ} is set in Eqs. (14)–(15) to {β ^{(l)},δ ^{(l)}} and {β ^{(u)},δ ^{(u)}}, respectively, the drawback is that the solution associated to the lower bound (LB) tends to underestimate the QoS constraint and, thus, to allocate less power compared to the optimal solution. On the other hand, the solution associated to the upper bound (UB) overestimates the QoS constraint and, thus, the performance in term of EGP are always satisfied, although at the price of spending more power than the strictly required one. Hence, the idea is to find the optimal pair {β ^{(o)},δ ^{(o)}} that minimizes the mean square error (MSE) between the exact expression of the QoS constraint in (10) and the proposed expression of the QoS constraint in (14), for every modulation order.
The results depicted in Figs. 3 and 4 for the BICOFDM link with the setup of Table 3, employing (r,m)=(1/3,4) and (r,m)=(2/5,6), respectively, show the minimum transmitted power versus the symbol energytonoise power spectral density ratio E _{ s }/N _{0}, assuming a target EGP QoS \(\bar \zeta =0.31\) bit/s/Hz. In line with (16), the PAs obtained by employing {β ^{(l)},δ ^{(l)}} and {β ^{(u)},δ ^{(u)}} lead to values of the objective function lower and higher, respectively, than the optimal ones (in accordance with the fact that they are a lower and upper bound of the QoS constraint). Conversely, the PA performance obtained with {β ^{(o)},δ ^{(o)}} closely matches that obtained via numerical methods, while exploiting an efficient closedform expression. The optimal values of {β ^{(o)},δ ^{(o)}} that, for every modulation order, minimize the MSE betweem the optimal and the proposed expression of the QoS constraint have been computed for E _{ s }/N _{0}∈ [ −6,30] dB and can be found in Table 4. In the case of multiple users access, such an approximation will be utilized for evaluating the QoS constraint in OP (9).
5 PEGE OP over multiaccess interference links
We assume now that there not exist any centralized unit, and so, users coordinate among themselves in a distributed manner in order to reach a stable RA configuration. The goal is to design a distributed algorithm so that each user minimizes its power consumption, while satisfying its QoS constraint and accounting for the interference caused by the other users exploiting the same frequencies.
5.1 Game formulation
In order to derive a distributed algorithm solving OP (9), let us consider for the time being a given TM φ _{ k } per user. Then, resorting to the QoS constraint approximation adopted in (14), the PEGE OP (9) can be reformulated as
where κ _{ k } is evaluated \(\forall k \in {\mathcal {K}}\) via (11)(12),
and β _{ k } and δ _{ k } assume values reported in Table 4. OP (17) can be solved by modeling it as a NCG [35]. Such a framework offers a powerful analytical tool that describes how rational entities interact and make appropriate choices so that they can find their own maximum utility.
Accordingly, we introduce the game \({\mathcal {G}}\triangleq \{\mathcal {K}, \mathcal {P}, \mathcal {U}\}\), described as follows:

1)
\(\mathcal {K}\triangleq \mathcal {K}_{1}\times \cdots \times \mathcal {K}_{Q}\) is the overall set of users, i.e., players.

2)
\(\mathcal {P}\triangleq \mathcal {P}_{1}\times \cdots \times \mathcal {P}_{K}\) is the set strategies, where the strategy of user k is its feasible PA set, defined as
$$ {}\begin{aligned} \mathcal{P}_{k}\triangleq\left\{p_{k,n}\;\; g_{k}(\mathbf{p}_{k},\mathbf{p}_{k})\right. &\le 0, \;\;\; p_{k,n} \\ & \left. \ge 0, \; \forall n \in \mathcal{N}_{k} \right\}, \;\; \forall k\in \mathcal{K}, \end{aligned} $$(19)with \(g_{k}(\mathbf {p}_{k},\mathbf {p}_{k})\triangleq \sum _{n\in \mathcal {N}_{k}} \beta _{k} \mathrm {e}^{\frac {p_{k,n}}{\rho _{k,n}(\mathbf {p}_{k,n})}}  \kappa _{k}\).

3)
\(\mathcal {U}\triangleq \{u_{1},\cdots,u_{K}\}\) is the set collecting the utility functions defined in (9).
By looking at the elements identifying \({\mathcal {G}}\), it worth pointing out that the QoS constraints introduce an interdependency among the strategies of the players, i.e., \({\mathcal {P}}_{k}={\mathcal {P}}_{k}(\mathbf {p}_{k},\mathbf {p}_{k})\). In other words, the set of strategies of the generic player k depends on the other players’ strategies. The solution of game (17) is thus investigated in terms of GNE, which corresponds to the case where no player can decrease his objective function by changing unilaterally its strategy to any other feasible one [32]. Equivalently, a GNE of the game is reached when every user, given the strategy profile of the others, does not get any power decrease by unilaterally changing its own strategy, still keeping the QoS constraint satisfied. Formally, the vector \(\mathbf {p}^{*} \triangleq [ {\mathbf {p}^{*}_{1}}^{\mathrm {T}}, \cdots, {\mathbf {p}^{*}_{K}}^{\mathrm {T}} ]^{\mathrm {T}} \in {{\mathcal {P}}}\), which represents now the optimum power allocation for all the users, is a GNE [35] for game \({\mathcal {G}}\) if
In order to study the game equilibrium, let us point out the following remark.
Remark 1
For a given strategy p _{−k } of the other players, the solution of (17) corresponds to the solution found for the P2P link (15). Thus, in this case the solution is unique and given, capitalizing on the approximate yet accurate closedform one, by
where the nth component of the best response (BR) operator is defined as
and \(\Theta _{k}^{*}\) is such that the optimal PA \(\mathbf {p}_{k}^{*}\) satisfies the QoS constraints with equality.
Thus, according to the definition of GNE and in view of Remark 1, the GNE of the game must satisfy the following condition.
Proposition 2
If problem (17) is feasible, i.e., if there exist a PA vector p ^{(f)}≥0 such that QoS constraints are met with equality, then there exists at least one PA p ^{∗} which is a GNE equilibrium of the game. Moreover, the GNE has to satisfy the socalled best response solution for each user, by solving the fixedpoint system of equations
with the operator BR defined as in (22).
We remark here that the fixedpoint system of Eq. (23) may lead to more than one solution, or the solution of game (17) may not exist, since there may not exist a p ^{∗} that satisfies all the QoS constraints of all the users at the same time. Thus, before going into details of how to solve (17), in the next section we focus on the feasibility conditions of OP (17), as well as on the existence and uniqueness of the GNE of the game describing OP (17).
5.2 GNE analysis
In order to derive sufficient conditions for the feasibility of OP (17) and the existence of at least a solution for the associated game, given the vector of required EGP values, or equivalently, the corresponding vector of optimal ESNR \({{\boldsymbol {\gamma }}}^{*} \triangleq [\gamma ^{*}_{1},\cdots,\gamma ^{*}_{K}]^{\mathrm {T}}\), with \(\gamma ^{*}_{k}\) defined in (12), let us introduce the following definitions:
and
where \({\bar h}_{k,\phi (k),n}\triangleq h_{k,\phi (k),n}/\delta _{k}\) and \(\tilde \gamma _{k}^{*}\triangleq \gamma ^{*}_{k} + \log \beta _{k}\), being δ _{ k } and β _{ k } constant values defined in Table 4.
Proposition 3
Given γ ^{∗}, a sufficient condition for the feasibility of (17) is that Z _{ n }(γ ^{∗}), defined in (25), is a Pmatrix.
Proof
See Appendix B. □
Capitalizing on the feasibility condition derived above, the existence of at least one GNE is guaranteed, as stated in the following proposition.
Proposition 4
Given γ ^{∗} and assuming that problem (17) is feasible, then there exists at least a bounded GNE for game (17). Furthermore, any GNE p ^{∗}, which can be equivalently expressed as \(\mathbf {p}^{*} \triangleq [ {\mathbf {q}^{*}_{1}}^{\mathrm {T}}, \cdots, {\mathbf {q}^{*}_{N}}^{\mathrm {T}} ]^{\mathrm {T}}\), with \(\mathbf {q}^{*}_{n} \triangleq \left [ {p^{*}_{1,n}}, \cdots, {p^{*}_{K,n}} \right ]^{\mathrm {T}}\), 1≤n≤N, is such that
where \(\bar {\mathbf {q}}_{n} \triangleq [\bar p_{1,n},\cdots,\bar p_{K,n}]^{\mathrm {T}}\).
Proof
See Appendix C. □
In order to better understand the physical meaning of the existence condition, let us first express the channel coefficient as a function of the path loss (PL) between the relevant transmitter and receiver pair, i.e., \({\tilde h}_{j,\phi (k),n}^{2}\triangleq h_{j,\phi (k),n}^{2}L_{j,\phi (k)}\), where L _{ j,ϕ(k)} is the path loss between between user j and BS ϕ(k) and \({\tilde h}_{j,\phi (k),n}\in {\mathcal {CN}(0,1)}\). Since a sufficient condition for the matrices {Z _{ n }} to be Pmatrices is that they satisfy the diagonal dominance condition [38], then the following corollary holds.
Corollary 1
Sufficient conditions for the matrices {Z _{ n }} to be Pmatrices, and hence for the solution set of game (17) to be nonempty, are
which can be derived by exploiting the definition of diagonal dominance of a matrix.
Thus, the above condition states that as long as the ratio between the interfering channel and the direct one, i.e, the direct channel between the transmitter and the receiver, is lower than a certain threshold, or, in other words, the interference is small enough, then a solution for game (17) exists. The threshold depends on the EGP constraints, expressed in terms of optimal ESNR, along with the modulation order adopted, via the coefficients δ _{ k } and β _{ k } (the latter contained in \(\tilde \gamma ^{*}_{k})\). Thus, the more distant the competing transmitters, the lower the interference and, thus, the higher the probability of having a nonempty solution set [21,23]. Further, it is worth noting that the condition formulated in (27) is in agreement with that derived in [23] with Gaussian signaling. In this latter case, indeed, δ _{ k }=1 and β _{ k }=1 as well, thus implying \(\tilde \gamma ^{*}_{k}=\gamma ^{*}_{k}\), and \(\gamma _{k}^{*}= \mathrm {e}^{R_{k}^{*}}1\), where \(R_{k}^{*}\) is the desired rate.
Finally, we focus on the sufficient conditions for the uniqueness of the GNE. This analysis, however, is made difficult by the presence of the QoS constraints, that introduces an interdependency among the strategy sets of the users. Thus, partly inspired by [23], the derivation of the uniqueness conditions is carried out as follows: first, a change of variable is done in order to obtain an equivalent formulation of the problem as a variational inequality (VI) problem; then, the conditions of uniqueness of the solution for the original problem are derived.
Proposition 5
Given γ ^{∗} and under the assumption that the problem is feasible, a sufficient condition for the uniqueness of the GNE for game (17) is that the matrix V(γ ^{∗}), defined in (66), is a Pmatrix.
Proof
See Appendix D. □
As expected, also the uniqueness condition depends on the target ESNR γ ^{∗} and on the ratio among the direct and interference channels, which appears on the offdiagonal elements of V(γ ^{∗}) through the parameter \(\chi _{j,k}^{(\max)}\) defined in (64). Thus, although condition of Proposition 5 is less easy to check than the one corresponding to the existence of the GNE, from (66) it can be inferred that whenever the ratio between each direct and interference channel is small, matrix V(γ ^{∗}) is likely to satisfy the diagonal dominance property and thus to be a Pmatrix, ensuring the uniqueness of the GNE.
5.3 Distributed algorithm
Since we are dealing with a decentralized implementation, where no signaling among different BSs is allowed, our aim is to derive a totally distributed algorithm. In fact, this allows every user to independently optimize its own PA, as well as TM, according to the perceived SINR, which entails the interference caused by the other users. Recalling Proposition 1, a natural scheme is a distributed and iterative algorithm based on the BR. In particular, at each iteration j, considering the generic user \(k \in {\mathcal {K}}\) and the PA \(\mathbf {p}^{(j1)}_{k}\) chosen by the other users at the previous iteration, the PA vector \(\mathbf {p}^{(j)}_{k}\) is evaluated, as function of the selected TM φ _{ k }, according to (22), \(\forall k \in {\mathcal {K}}\). This means that, to perform the update, the only information required by every user k is the SINR vector \({\boldsymbol {\gamma }}_{k}\left (\mathbf {p}^{(j1)}_{k}\right)\) in (5). This is measured at the serving BS and sent with a modest feedback rate requirement on the return channel. Then indeed, since every user is able to evaluate, at every iteration j, the best PA \(\mathbf {p}_{k}^{(j)}({{\boldsymbol {\varphi }}}_{k})\) as a function of the TM φ _{ k } and SINR, the selection of the best pair \(\{{{\boldsymbol {\varphi }}}_{k}^{(j)},\mathbf {p}_{k}^{(j)}\left ({{\boldsymbol {\varphi }}}_{k}^{(j)}\right)\}\) can be carried out in the same manner of Section 4.1 according to the algorithm in Table 2. This procedure is iterated for all the users until convergence is reached, and it is summarized in Table 5, where ε _{ p } denotes the required solution accuracy, N _{it} is the maximum number of iterations, \(\mathbf {p}^{(0)}_{k}\) and \({{\boldsymbol {\varphi }}}^{(0)}_{k}\) are an initial feasible PA vector and TM, respectively, and \({\mathcal {D}}_{\mathbf {\overline m}}^{(k,j)}\) denotes the set of best BL vectors for user k at iteration j, evaluated according to the perceived interference \({\boldsymbol {\gamma }}_{k}(\mathbf {p}_{k}^{(j)})\), \(\forall k \in {\mathcal {K}}\).
Remark 2
The proposed best responsebased algorithm converges under the same conditions for which the GNE is unique (stated in Proposition 5), which in turn requires the condition stated in Proposition 3 in order to have a nonempty solution set. In fact the condition of convergence can be demonstrated with the same approach used to derive the uniqueness condition, simply replacing the two solutions of the GNE with two PA vectors produced by the algorithm at two consecutive iterations.
Remark 3
In the formulation of game (17), we did not consider the total power constraint per user (1). Even if this constraint is intrinsically present in wireless devices, since their power cannot grow infinitely, it makes the equilibrium analysis more involved. Then, we did not take into account this constraint in the theoretical analysis, leaving it for future research. Anyway, the following observations can be done. First, algorithm in Table 5 (as well as that for the P2P case) can easily account for constraint (1) as follows: for all \(k\in {\mathcal {K}}\), in the optimal PA expression (22), based on the waterfilling like operator, the “waterlevel” must now be computed as \(\Lambda _{k} = \min \left \{ {\log \Theta _{k}^{*},\log \tilde \Theta _{k}^{*}} \right \}\), where \(\tilde \Theta _{k}^{*}\) is the “waterlevel” that, put into the waterfilling expression, returns the PA vector \(\tilde {\mathbf {p}}_{k}\) that maximizes the EGP ζ _{ k }(p _{ k }) meeting with equality the total PA constraint (1) [31]. Poorly speaking, for a given strategy p _{−k }, the best response for user k is the PA vector that meets with equality the QoS constraint if the required total PA is not greater than the maximum one, otherwise, all the power is allocated returning the highest possible value of EGP. Finally, as shown in the simulation results, practical values of the PA never reach the maximum power limit, validating the theoretical results on the equilibrium analysis done.
5.4 Relationship between GNE and PO solution
In this section, we give some insights on the relation between the GNE and the PO solution, which represents the achievable performance upper bound. Specifically, the PO solution consists in solving a multiobjective OP, where the objective function is the sum of the utility functions of every user, i.e., \(u_{\text {PO}}(\mathbf {p})=\sum _{k=1}^{K}u_{k}(\mathbf {p}_{k})\), with \(\mathbf {p} \triangleq \left [\mathbf {p}_{1}^{\mathrm {T}},\cdots,\mathbf {p}_{K}^{\mathrm {T}}\right ]^{\mathrm {T}}\), and where the set of constraints is the same than that in (17). Let us refer to this problem as POOP. Besides being a nonconvex OP, whose solution may be very hard to find, the POOP requires that every user, or a centralized entity, knows, among the others, every channel coefficient h _{ j,s,n } between any user and base station in the network. Obviously, this is unlikely to be feasible in the considered HetNet. However, in order to shed light on the relationship between the PO solution and the GNE, corresponding to the PA solution (23) based on the best response, we consider here a twouser twosubcarrier case (K=2, N=2), where user 1 is in cell 1 and user 2 is in cell 2, i.e., ϕ(1)=1 and ϕ(2)=2. The simulation setup is as follows: h _{1,1,1}=1.821, h _{1,1,2}=0.329, h _{1,2,1}=0.104, h _{1,2,2}=0.221, h _{2,2,1}=0.821, h _{2,2,2}=2.629, h _{2,1,1}=0.319, h _{2,1,2}=0.097, σ _{ w } _{ k,1}/P _{ k }=0.01, \(\forall n \in {\mathcal {N}}_{k}\), \(\forall k \in {\mathcal {K}}\), (m _{ k },r _{ k })=(2,1/3), and \(\forall k \in {\mathcal {K}}\). The PO solution is found solving the POOP with the Matlab Global Optimization Toolbox. Finally, we consider the target EGP of user 2 to be \(\bar \zeta _{2}=0.2\) (b/s/Hz), whereas we let \(\bar \zeta _{1}\) vary in the set [0.2,1] (b/s/Hz). When \(\bar \zeta _{1}=\bar \zeta _{2}\), only one GNE solution exists and is close to the PO one. Indeed, the ratio ς ^{(GNEPO)} between the total power obtained with the GNE and PO solution, respectively, is about 0.77. When \(\bar \zeta _{1}=1\) (b/s/Hz), more power needs to be allocated by user 1, yielding a higher cochannel interference. In this case indeed 2 GNE solutions arise and ς ^{(GNEPO)} drops down to about 0.56 in the worst case. From these observations, we can conclude that, as could be expected, the GNE is more efficient, i.e., closer to the PO, when the interference in the network is lower, whereas the more severe the interference, the less efficient the GNE solution. Nevertheless, we remark that the latter allows for a distributed solution suitable for the scenario under investigation.
6 Simulation results
In this section, the effectiveness of the proposed distributed RA algorithm is tested. The HetNet scenario taken into consideration for the simulations is composed of one MC and Q=4 SCs, with K _{0}=6 users connected to the MBS (coverage area of radius R _{MBS}=200 m) and K _{ q }=3, q=1,⋯,Q users connected (coverage area of radius R _{SBS}=20 m) to each SBS. Figure 5 shows a snapshot of the HetNet, whereas the packetbased BICOFDM transmission system is summarized in Table 3. Finally, the path loss models for the SC and MC are those proposed in [39].
The target EGP QoS level \({\bar \zeta }\) is compared in Fig. 6 against the actual GP (AGP) obtained by applying the proposed distributed RA algorithm, for six users randomly chosen within MC, SC 1, SC 2, and SC 3. The AGP for the generic kth user is defined as
where 𝜗(ℓ) equals 1 if the ℓth packet is correctly decoded and 0 when it is discarded, T _{ k }(ℓ) is the transmission interval of the ℓth packet, N _{a} is the number of trasmitted packets, set to 1000, each experiencing independent channel realizations and with the position of users randomly placed within their cells. In view of the effectiveness of the GP prediction based on the κESM model recalled in Section 3.1, it is apparent that the AGP performance meets for all the considered users, taken as example, the minimum target EGP. It can be noted that the same result holds for all the other users as well.
Figure 7 shows the total transmitted power and the EGP per user as a function of the number of the iterations of the distributed RA algorithm, obtained for a given channel realization and network geometry. As can be seen, the distributed RA algorithm guarantees fast convergence to the equilibrium point for all users of the HetNet, thus exhibiting a considerable robustness against the ICI effects.
Furthermore, in order to shed light about the convenience of employing as more SCs as possible in the coverage area of the MC, Fig. 8 compares the average total transmitted power spent in the HetNet versus the distance from the selected users and their BS, i.e., user 1 in the SC 1 and user 1 in the MC. Two scenarios are addressed: together with the MC, we consider the presence of Q=1 SC or Q=4 SCs, being in both cases, for a fair comparison, the total number of active users in the HetNet equal to 18. Particularly, for Q=1, K _{1}=3 users are served within the SC 1, and the 15 remaining ones belong to the MC. Conversely, for Q=4, according to the scenario of Fig. 5, three users are connected to each SBS, and only six to the MBS. For each distance, the total power is averaged over 100 independent transmitted packets and network geometry different realizations, whereas the minimum target EGP is set to \(\bar {\zeta } =2\) bit/s/Hz. As for Fig. 8, empty and solid square marks are used for the case of Q=1 SC, whereas the curves with empty and solid circle marks refer to the case of Q=4 SCs. As expected from the working of the distributed RA algorithm, the total power spent in the HetNet grows with increasing the distance, due to the fact that the minimum target EGP has to be guaranteed while allocating the minimum power to each user. Further, when the number of SCs is increased moving from Q=1 to Q=4, the interference gets higher, though slightly enough, since the SCs are not packed together. But, more users are located closer to their BS, with the result that each one will require less power, and consequently, the total power spent within the HetNet will be lower as well. Therefore, the larger number of sparse SCs, the less power is required to meet the QoS constraints in spite of higher ICI, thus corroborating the advantages of the SC concept.
Finally, let us assess the scalability of the proposed distributed RA solution when many more BSs and users are present within the MC. To this end, Fig. 9 shows the new considered scenario called dense HetNet, which is composed by a MC with eight users and eight SCs with six users for each of them, thus notably increasing the number of users and SCs compared to the scenario considered so far. On the basis of the new dense HetNet scenario, Fig. 10 depicts the convergence of power and EGP for the same users in the same geometric position of Fig. 7. Comparing results in Fig. 7 with those in Fig. 10, we point out that the algorithm is scalable since the fast convergence to the equilibrium point is still guaranteed.
7 Conclusions
This paper tackled the distributed RA problem, in the uplink of HetNets, aimed at minimizing the power consumption of each user under the satisfaction of a minimum GP constraint per user. The problem, tagged as PEGE OP, was faced by suitably decoupling the BL and coding rate allocation problem from the PA problem. First, the PEGE OP in P2P links was investigated and solved, obtaining in particular an approximate yet accurate closedform expression of the PA, in a waterfillinglike form, which depends on the QoS constraint. Then, we moved to the interference channel case, where the PA OP was described as a NCG. The relevant solution concept was identified in the GNE, due to QoS constraint that couples the strategies (i.e., the set of feasible PA vectors) of the players (i.e., the users in the HetNet transmitting over the same frequencies). Capitalizing on the closedform expression for the PA, the analysis of the GNE was carried out through the BR concept, providing sufficient conditions for the existence and uniqueness of the solution. Finally, a distributed RA algorithm, which converges to the equilibrium of the game, was derived and its performance tested through extensive numerical simulations, certifying its good convergence properties, the reduction of power consumption in the HetNet, and the close match between EGP and AGP. Further line of research on this topic will be the analysis of the impact of the total power constraint on the equilibrium.
8 \thelikesection Endnote
^{1} The BL solution found applying the algorithm in [37] clearly depends on the initial PA taken over the subcarriers. Assuming an uniform PA, however, allows to have initially all the subcarriers being active, thus, to perform BL over all the subcarriers. This approach is suboptimal yet simple and efficient, as shown by the result obtained in [31].
9 Appendix A: Proof of Proposition 1
Since both the objective function and the constraints are convex, (14) is a convex OP. Introducing the multipliers Θ, \({\boldsymbol {\nu }}\triangleq [\nu _{1},\cdots,\nu _{N}]^{T}\) and \({\boldsymbol {\lambda }}\triangleq [\lambda _{1},\cdots,\lambda _{N}]^{T}\), the associated Lagrangian is
and, applying the KKT conditions, we have necessary and sufficient condition for optimality, i.e.,
where p ^{∗} and {Θ ^{∗},ν ^{∗}} denote the optimal primal and dual variables, respectively. After some algebra, from (30) it easily follows that \(p^{*}_{n} = {\rho _{n}} \left [\log \Theta ^{*}  \log \frac {\rho _{n}}{\beta _{n}}\right ]^{+}\), where Θ ^{∗} is such that the QoS constraint in (14) holds with equality.
10 Appendix B: Proof of Proposition 3
Sufficient conditions for the feasibility of (17), i.e., there is a nonempty solution set, are derived considering that the QoS constraint must hold true \(\forall k \in {\mathcal {K}}\). This constraint can be equivalently rewritten as
so that a more stringent condition, recalling that \(\kappa _{k}=m_{k}N_{k}\mathrm {e}^{\gamma ^{*}_{k}}\), is
Exploiting the definition of ρ _{ k,n } in (18) and defining \(\tilde \gamma ^{*}_{k} \triangleq \gamma ^{*}_{k} + \log \beta _{k} > 0\) (being β _{ k }>1), after some algebra (32) becomes
The above expression can be recast into a matrix form as
that is,
where Z _{ n } and t _{ n } are defined in (25) and (24), respectively, and \(\mathbf {q}_{n} \triangleq [ p_{1,n},\cdots, p_{K,n}]^{\mathrm {T}}\).
Looking at the expression of Z _{ n } in (25), it is a Zmatrix, since all its offdiagonal entries are negative. Then, if Z _{ n } is also a Pmatrix, its inverse is nonnegative [40] and thus, since t _{ n }≥0, condition (35) is satisfied, i.e., the problem is feasible since there exist at least one solution.
11 Appendix C: Proof of Proposition 4
According to the Nash existence theorem [41], given a game in strategic form with K players, each characterized by an action space \({\mathcal {P}}_{k}\) and an utility function u _{ k }, if, \(\forall k \in {\mathcal {K}}\), (i) \({\mathcal {P}}_{k}\) is nonempty, convex and compact, (ii) \(u_{k}: {\mathcal {P}} \rightarrow \mathbb {R}\) is continuous with \({\mathcal {P}} \triangleq {\mathcal {P}}_{1}\times \cdots \times {\mathcal {P}}_{K}\), and (iii) \(\forall \mathbf {p}_{k} \in {\mathcal {P}} \backslash {\mathcal {P}}_{k}\), u _{ k } is concave on \({\mathcal {P}}_{k}\), then a Nash equilibrium exists. Conditions (ii) and (iii) and the convexity and compactness of each \({\mathcal {P}}_{k}\) easily follow by looking at their analytical expression. A sufficient condition for the nonemptiness of the sets \({\mathcal {P}}_{k}\), \(\forall k \in {\mathcal {K}}\), is given by the feasibility condition stated in Proposition 3. This proves the first part of Proposition 4.Under the feasibility condition, i.e., if Z _{ n } is a Pmatrix, then there exist at least NKsized vectors \(\mathbf {q}_{n}^{*} \triangleq [ p_{1,n}^{*},\cdots, p_{K,n}^{*}]^{\mathrm {T}}\), 1≤n≤N, which satisfy (26) in Appendix B and are thus the solution to OP (17). This proves the second part of Proposition 4.
12 Appendix D: Proof of Proposition 5
The KKT conditions of OP (17) are
Eliminating the Lagrange multiplier {ν _{ k,n }} relevant to the nonnegativity constraint of the power coefficients and making some substitutions (36) can be equivalently rewritten as the following mixed nonlinear complementary problem (MNCP):
Let us now introduce the variable
which is onetoone related to p _{ k,n }, i.e., p _{ k,n }=f ^{−1}(z _{ k,n }), and note that z _{ k,n }>0 iff p _{ k,n }>0 and z _{ k,n }=0 iff p _{ k,n }=0. Thus, upon defining \(\mathbf {z}_{k,n}\triangleq f(\mathbf {p}_{k,n})\), the system of Eq. (37) can be rewritten as
and after some algebra and taking the logarithm of the second inequality on the first line of (39), we get
with \(\kappa ^{\prime }_{k}= N_{k}\kappa _{k}/\beta _{k}\). We now define the functions \(J_{k,n}({ z}_{k,n},\mathbf {z}_{k,n})\triangleq \log \frac {{{\rho _{k,n}(\mathbf {z}_{k,n})}}}{{{\beta _{k}}}}  \log {(1z_{k,n})}\), assumed continuously differentiable over the set \(\prod _{k=1}^{K}[\!0,\kappa ^{\prime }_{k}]\). Then, it follows that Eq. (40) is the KKT condition of the variational inequality (VI) problem VI (U,J) [7], with \(U\triangleq \prod _{k\in \mathcal {K}} U_{k}\), \(U_{k} \triangleq \{\mathbf {z}_{k} \in \mathbb {R}^{N}: {\sum _{n \in {{\mathcal {N}}_{k}}} {z_{k,n}} = {\kappa ^{\prime }_{k}}}\}\), \(\mathbf {z}_{k}\triangleq [z_{k,1},\cdots,z_{k,N}]^{\mathrm {T}}\), \(\mathbf {J}\triangleq [\mathbf {J}_{1}^{T},\cdots,\mathbf {J}_{K}^{\mathrm {T}}]\) and \(\mathbf {J}_{k}\triangleq [J_{k,1},\cdots,J_{k,N}]^{\mathrm {T}}\).Thus, by definition, \(\mathbf {z}_{k}^{\star }\), ∀k, is a solution of the VI (U,J), if and only if, ∀z _{ k }∈U _{ k }, the following condition holds:
Assume now there exist two solutions \(\{ \mathbf {p}_{k}^{(1)} \}\) (\(\{ \mathbf {z}_{k}^{(1)} \}\)) and \(\{ \mathbf {p}_{k}^{(2)} \}\) (\(\{ \mathbf {z}_{k}^{(1)} \}\)) of the GNE problem and be \(\rho ^{(i)}_{k,n} \triangleq \rho _{k,n}(\mathbf {p}^{(i)}_{k,n})\), i=1,2. From (41), it follows that they must satisfy
and
Before proceeding further, let us introduce some definitions and inequalities that will be instrumental for the subsequent analysis:
where \(\{{\bar {p}}_{k,n}\}\) coefficients are given by (26).
Summing (42) and (43), and after some simple algebra, we get
Let us now recall the mean value theorem: if a function g is continuous on the closed interval [a,b], where a<b, and differentiable on the open interval (a, b), then there exists a point c in (a,b) such that g(b)−g(a)=g ^{′}(c)(b−a). Accordingly, taking g(·)= log(·), we get
Substituting the above into (47), we get
where the first inequality comes from the upper bound on s _{ k,n }≤1 (which in turn can be inferred by recalling the bound in (48) and \(\mathrm {e}^{{p_{k,n}^{(i)}}/{\rho _{k,n}^{(i)}}}\le 1\), ∀i,k,n), whereas the latter inequality comes from the triangle inequality. Thus, (49) implies
According to (38), \(z^{(2)}_{k,n}z^{(1)}_{k,n}=\mathrm {e}^{\frac {p_{k,n}^{(1)}}{\rho _{k,n}^{(1)}}}\mathrm {e}^{\frac {p_{k,n}^{(2)}}{\rho _{k,n}^{(2)}}}\), and exploiting the mean value theorem for the exponential function, we get
Moreover, by (46), \(e^{w_{k,n}}\ge e^{{\bar \gamma }^{(\max)}_{k}}\), and exploiting relation (44), (50) becomes
We now introduce the following definition
and note that
Accordingly, by noting that, due to the triangle inequality,
and that, by the mean value theorem of the logarithmic function,
we can bound (52) as follows
where in (58) we exploited the fact that e^{−x}≤1, ∀x≥0 and (46), in (59) the lower bound in (45) and in (60) the bound x+1≤e^{x}, ∀x≥0. By exploiting the upper bound in (45), and defining
inequality (60) can be further rearranged as
Hence, by defining
expression (63) can be rewritten in matrix form as
where
and
It can be noted that V is a Zmatrix. Then, if V is a Pmatrix, it must have a nonnegative inverse, implying b=0. If b=0, then the equilibrium is unique. This proves Proposition 4.
References
Ericsson, 5G Radio Access  Capabilities and technologies. Ericsson White Paper, 1–10 (2016). https://www.ericsson.com/res/docs/whitepapers/wp5g.pdf.
The Climate Group and Global eSustainability Initiative (GeSI), 2008. SMART 2020: enabling the low carbon economy in the information age. http://gesi.org/article/43. Accessed 2008.
X Sun, S Wang, Resource allocation scheme for energy saving in heterogeneous networks. Wirel. Commun. IEEE Trans. 14(8), 4407–4416 (2015).
J Hoydis, M Kobayashi, M Debbah, Green smallcell networks. Veh. Technol. Mag. IEEE. 6(1), 37–43 (2011).
N Saquib, E Hossain, LB Le, DI Kim, Interference management in OFDMA femtocell networks: issues and approaches. Wirel. Commun. IEEE. 19(3), 86–95 (2012).
G Bacci, EV Belmega, P Mertikopoulos, L Sanguinetti, Energyaware competitive power allocation for heterogeneous networks under QoS constraints. IEEE Trans. Wirel. Commun. 14(9), 4728–4742 (2015).
G Scutari, D Palomar, F Facchinei, JS Pang, Convex optimization, game theory, and variational inequality theory. IEEE Signal Process. Mag. 27(3), 35–49 (2010).
J Chen, Y Zhou, Y Kuo, Energyefficiency resource allocation for cognitive heterogeneous networks with imperfect channel state information. IET Commun. 10(11), 1312–1319 (2016).
J Ding, L Jiang, C He, Joint energyefficient resource allocation and interference alignment for hetnets. IET Commun. 10(9), 1104–1110 (2016).
N Mokari, F Alavi, S Parsaeefard, T LeNgoc, Limitedfeedback resource allocation in heterogeneous cellular networks. IEEE Trans. Veh. Technol. 65(4), 2509–2521 (2016).
TE Bogale, LB Le, Massive mimo and mmwave for 5g wireless hetnet: potential benefits and challenges. IEEE Veh. Technol. Mag. 11(1), 64–75 (2016).
D Fudenberg, J Tirole, Game Theory (MIT Press, Cambridge, 1991).
H Ji, CY Huang, Noncooperative uplink power control in cellular radio systems. Wirel. Netw. 4(3), 233–240 (1998).
W Yu, G Ginis, JM Cioffi, Distributed multiuser power control for digital subscriber lines. IEEE J. Sel. Areas Commun. 20(5), 1105–1115 (2002).
CU Saraydar, NB Mandayam, DJ Goodman, Efficient power control via pricing in wireless data networks. Trans. Commun. IEEE. 50(2), 291–303 (2002).
F Meshkati, SC Poor, HV Schwartz, NB Mandayam, An energyefficient approach to power control and receiver design in wireless data networks. Trans. Commun. IEEE. 53(11), 1885–1894 (2005).
G Miao, N Himayat, GY Li, S Talwar, Distributed interferenceaware energyefficient power optimization. IEEE Trans. Wirel. Commun. 10(4), 1323–1333 (2011).
Y Kwon, T Hwang, X Wang, Energyefficient transmit power control for multitier MIMO HetNets. IEEE J. Sel. Areas Commun. 33(10), 2070–2086 (2015).
Z Tian, G Leus, V Lottici, Joint dynamic resource allocation and waveform adaptation for cognitive networks. IEEE J. Selected Areas Commun. 29(2), 443–454 (2011).
G Scutari, DP Palomar, S Barbarossa, Optimal linear precoding strategies for wideband noncooperative systems based on game theory—Part I: Nash equilibria. IEEE Trans. Signal Process. 56(3), 1230–1249 (2008).
G Scutari, DP Palomar, S Barbarossa, Optimal linear precoding strategies for wideband noncooperative systems based on game theory—Part II: algorithms. IEEE Trans. Signal Process. 56(3), 1250–1267 (2008).
G Scutari, DP Palomar, S Barbarossa, Competitive design of multiuser MIMO systems based on game theory: a unified view. IEEE J. Sel. Areas Commun. 26(7), 1089–1103 (2008).
JS Pang, G Scutari, F Facchinei, C Wang, Distributed power allocation with rate constraints in Gaussian parallel interference channels. IEEE Trans. Inf. Theory. 54(8), 3471–3489 (2008).
W Zhong, Y Fang, S Jin, KK Wong, S Zhong, Z Qian, Joint resource allocation for devicetodevice communications underlaying uplink mimo cellular networks. IEEE J. Sel. Areas Commun. 33(1), 41–54 (2015).
W Zhong, B Fang, Z Qian, Game theoretic resource allocation for d2d mimo heterogeneous networks. Wireless Pers. Commun. 84:, 273–285 (2015).
L Xiao, M Johansson, SP Boyd, Simultaneous routing and resource allocation via dual decomposition. IEEE Trans. Commun. 52(7), 1136–1144 (2004).
D Qiao, S Choi, KG Shin, Goodput analysis and link adaptation for IEEE 802.11a wireless LANs. IEEE Trans. Mobile Comput. 1(4), 278–292 (2002).
T Kastrinogiannis, V Karyotis, S Papavassiliou, in Sarnoff Symposium, 2008 IEEE, Princeton, NJ, USA. An opportunistic combined power and rate allocation approach in cdma ad hoc networks (IEEENew Jersey, 2008), pp. 1–5.
A Giovanidis, S Stanczak, Stability and distributed power control in manets with per hop retransmissions. IEEE Trans. Commun. 59(6), 1632–1643 (2011).
YW Blankenship, PJ Sartori, BK Classon, V Desai, KL Baum, in IEEE 60th Vehicular Tech. Conf., 2004. VTC2004Fall, Los Angeles, USA, 6. Link error prediction methods for multicarrier systems (IEEELos Angeles, 2004), pp. 4175–4179.
I Stupia, V Lottici, F Giannetti, L Vandendorpe, Link resource adaptation for multiantenna bitinterleaved coded multicarrier systems. IEEE Trans. Signal Process. 60(7), 3644–3656 (2012).
F Facchinei, C Kanzow, Generalized Nash equilibrium problems. 4OR. 5(3), 173–210 (2007).
L Song, NB Mandayam, Hierarchical SIR and rate control on the forward link for CDMA data users under delay and error constraints. J. Sel. Areas Commun. 19(10), 1871–1882 (2001).
H Seo, BG Lee, Optimal transmission power for single and multihop links in wireless packet networks with ARQ capability. IEEE Trans. Commun. 55(5), 996–1006 (2007).
MJ Osborne, A Rubinstein, A Course in Game Theory (The MIT Press, Cambridge, 1994).
S Boyd, L Vandenberghe, Convex Optimization (Cambridge Univ. Press, Cambridge, 2004).
I Stupia, F Giannetti, V Lottici, R Andreotti, L Vandendorpe, AN D’Andrea, in Future Network and Mobile Summit (FUNEMS): 1618 June 2010; Florence, Italy. A greedy algorithm for goodputoriented amc in turbocoded ofdm, (2010), pp. 1–8.
RA Horn, Matrix Analysis. (CR Johnson, ed.) (Cambridge University Press, New York, 1986).
G Calcev, D Chizhik, B Goransson, S Howard, H Huang, A Kogiantis, AF Molisch, AL Moustakas, D Reed, H Xu, A wideband spatial channel model for systemwide simulations. IEEE Trans. Veh. Technol. 56(2), 389–403 (2007).
(RW Cottle, JS Pang, RE Stone, eds.), The Linear Complementarity Problem (SIAM, Academic Press, Philadelphia, 2009).
C Dutang, Existence theorems for generalized Nash equilibrium problems: an analysis of assumptions. HAL archivesouvertes (2013). https://hal.archivesouvertes.fr/hal00828948/document.
Acknowledgements
This work has been partially supported by the PRA 2016 research project 5GIOTTO funded by the University of Pisa.
Competing interests
The authors declare that they have no competing interests.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
Andreotti, R., Del Fiorentino, P., Giannetti, F. et al. Powerefficient distributed resource allocation under goodput QoS constraints for heterogeneous networks. EURASIP J. Adv. Signal Process. 2016, 129 (2016). https://doi.org/10.1186/s136340160428x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s136340160428x