Добавил:
Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Advanced Wireless Networks - 4G Technologies

.pdf
Скачиваний:
47
Добавлен:
17.08.2013
Размер:
21.94 Mб
Скачать

828 QUALITY-OF-SERVICE MANAGEMENT

particular connection in accordance with the channel quality. It will use the low service rate when an MS is within a high interference (high-IF) region to reduce bandwidth waste due to retransmissions, and use the high service rate when the MS is within a low interference (low-IF) region to fulfill the QoS requirements (e.g. delay bound and loss ratio) of the MS. The high and low service rates are both determined at connection setup time. Thus, the complexity of scheduling algorithm in wireless networks can be reduced.

21.3.1 DSMC functional blocks

An MS issues a connection request to the CAC controller by specifying its QoS requirements (De,k , Rp , Rm ), its priority level e, as well as the number of blocks m to be transmitted. De,k is the delay bound required for the requested session k with a priority of e on air interface, Um . Rp and Rm , respectively, denote the peak and the minimum data rates requested by the session k. In other words, the MS requests that m blocks of the session k should be scheduled in a queue of priority level e, and transmitted at a minimum rate higher than Rm or a peak rate not higher than Rp before the delay bound De,k is reached. The minimum data rate Rm is used as the low service rate when the MS is within a high interference region. On the other side, the peak data rate Rp is not taken for granted as the high service rate when the MS is within a low interference region. Instead, the high service rate is determined by a simple calculation performed by the service rate (SR) calculator inside the radio resource manager. The SR calculator determines the admissible peak data rate (high service rate) Rp that can be supported by the BSS according to the delay bound De,k , and the minimum data rate Rm under a hypothetical interference model of the MS.

As in many examples throughout the book, the interference model is based on a twostate Markov chain with transition probabilities α and β. These parameters α and β can be collected from a user behavior profile and can be updated dynamically. After receiving the Rp from the SR calculator, the CAC controller can optionally accept, reject or renegotiate with the MS. If the connection request is accepted, the CAC controller stores the parameters (Rp, Rm , m, e) to a parameter database. The rate selector can then select and send the current data rate R to the CCU (channel codec unit) associated with the MS according to the interference level measured by the interference monitor.

The DSMC scheduling architecture can be situated in a BSS of the GPRS networks and applied to either uplink or downlink transmission. The system will adopt a certain number of priority levels. As an example, in GPRS, block transmission is classified into five scheduling priority levels, including four data priority levels and a signal priority level, which is the highest priority level [47]. The DSMC scheduling architecture follows the specification but includes a new data priority level for the retransmission blocks. The DSMC scheduling architecture [45] consists of five scheduling servers for data block transmission, one server for each priority level. Each server is responsible for scheduling data blocks transmitting through a single packet data channel (PDCH). The highest priority level, P1, is for the retransmission blocks and the lowest priority level, P5, is for the best-effort data blocks. Both P1 and P5 schedule data blocks in a first-come-first-served order. However, the scheduling servers of priority levels P2–P4 adopt the SCFQ scheduling algorithm in scheduling data blocks of QoS specific connections. In other words, multiple queues may exist in each priority of P2–P4. The queues with the same priority will be served in accordance with the SCFQ scheduling algorithm, to be explained in below.

service rate

DYNAMIC SCHEDULING ON RLC/MAC LAYER

829

The block requests of a particular priority can not be served until all the blocks of the higher priority have been served. The transmission of a block is nonpreemptive.

The SCFQ scheduling algorithm is basically a packet-based general processor sharing scheme [48, 49] without the complex virtual clock tracking mechanism. The elimination of the virtual clock tracking mechanism makes SCFQ easier to implement on a high-speed network. In SCFQ, an arrival block request is tagged with a service finish time (FT) before it is placed in a queue. The service FT tag of a block request is computed from the service time and the service starting time of the block as

FT = block length + max(FT of the tail block, FT of the serving block)

The service starting time of the block can be the FT of the tail block of the queue if the queue is nonempty, or it is the FT of the serving block. The block requests among the heads of the queues will be picked up to be served one by one in accordance with the increasing order of FT tags, and in a round-robin fashion if more than two heading blocks have the same FT tags.

21.3.2 Calculating the high service rate

In order to determine the service rate, we need to first obtain the total delay of a block. The total delay depends on the service discipline and the input traffic. Owing to the bursty nature of multimedia traffic streams, a leaky-bucket regulator, as discussed in Chapter 8, is assumed at the network interface of the sender site to regulate the block request flow of each session.

In the DSMC scheduling scheme, a block of a connection will experience queueing delay, block transmission delay, and retransmission delay. A block at the head of a queue (henceforth referred to as a ‘heading block’) may experience a priority delay, which, in turn, consists of an interpriority delay caused by all block transmissions in the higher priority levels and an intrapriority delay resulted from the SCFQ scheduling.

Each preceding block of the newly arrived block will experience a priority delay and a block transmission delay when the preceding block becomes a heading block. In addition, the newly arrived block will experience an intrapriority delay when it becomes the heading block of the queue itself. Hence, the queueing delay of a block is, thus, the summation that the priority delay and the block transmission delay experienced by all preceding blocks, plus the intrapriority delay experienced by the block. In analytical modeling the following notation will be used:

sj, session j

L, block length (b);

Phibe, block error probability when the block is transmitting within a high interference region;

Plibe, block error probability when the block is transmitting within a low-interference region;

Phi, stationary probability that the MS is within a high-interference region;

Pli, stationary probability that the MS is within a low-interference region;

830 QUALITY-OF-SERVICE MANAGEMENT

(re,k )hi, low service rate of session k of priority e;

(re,k )li, high service rate of session k of priority e;

(HDe,k )hi, heading-block delay of session k of priority e within a high-interference region;

(HDe,k )li, heading-block delay of session k of priority e within a low-interference region;

be,k , mean queue length of the session k of priority e;

we,k , mean queueing delay with the session k of priority e;

dp, data priorities.

The interpriority delay is the time that the selected heading block waits for the blocks from higher priority levels to be served. In the following, we refer to the priority level under discussion as the priority e. Let Ap,s [t1, t2] denote the amount of blocks arrived to a session with a priority p during a time interval (t1, t2) and Wp,s [t1, t2], is the number of blocks served for a session with a priority p during a time interval (t1, t2). As shown in Figure 21.7, after the (i 1)th selected heading block has been served, the ith heading block selected by the server of the priority e may encounter an interpriority delay, which is the time period (t1, t2). Each session j with a priority g higher than e must be served up within the time period (t1, t2). Thus, the amount of traffic served during the time period (t1, t2), Wg,g [t1, t2], is equal to the amount of arrival traffic to the session during the time

period (t1, t2), Ag, j [t1, t2] = Ag,g [t1, t1 + te], as in Equation (21.11). Here, t1 is the epoch of the final time of serving the (i 1)th heading block selected from the priority e and te

the interpriority delay encountered by each heading block selected from the priority e

W

g, j

[t

, t

]

=

A

g, j

[t

, t

],

t

2

> t

> t

, t

1

0

(21.11)

 

1

2

 

 

1

2

 

 

1

1

 

 

 

Let H represent the set of all priority levels higher than e. Summing up Equation (21.11) for all sessions of the priorities in H , we have the following inequality:

W

g, j

[t

, t

]

=

A

g, j

[t

, t

]

t

2

> t

> t

, t

1

0

(21.12)

g H s j g

1

2

 

g H s j g

1

2

 

 

1

1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

where sj stands for session j. The traffic Ag, j [t, t + τ ] during a time period (t, t + τ ) has an upper bound since the DSMC scheduling architecture uses a leaky bucket to regulate the flow of each session [8]. Let Ag, j (τ ) denote the upper bound of Ag, j [t, t + τ ]. From Chapter 8 and also Cruz [50], we have the following inequality according to the leaky-bucket

∑ ∑ Ag, j [t1, t2]

 

g h j g

 

 

(i-(1)th heading block

∑ ∑Wg, j [t'1, t2]

i thi heading block

g h j g

t1

t1'

te

t2'

t2"

 

Figure 21.7 Dealy caused by higher priority session to the particular priority. (Reproduced by permission of IEEE [45].)

 

 

 

 

 

 

 

DYNAMIC SCHEDULING ON RLC/MAC LAYER

831

constrained envelope function:

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

A

g, j

[t, t

+

τ ]

A

(τ )

=

σ

g,g +

ρ

g, j ·

t

 

t

0,

 

τ

0

(21.13)

 

 

 

g, j

 

 

 

 

 

 

 

 

 

where σg,g is the leaky-bucket size and ρg, j is the token arrival rate for the session j of the priority g. Therefore, from the above leaky-bucket constraint, we can derive the following inequality:

A

g, j

[t

, t

]

A

(t

2

t

)

t

2

> t

> t

, t

1

0

(21.14)

g H s j g

1

2

 

g, j

 

1

 

 

1

1

 

 

 

 

 

 

 

 

g H s j g

 

 

 

 

 

 

 

 

 

 

 

 

 

Since the retransmission of data blocks has the highest priority and there is only one retransmission queue, we can denote the arrival traffic to the retransmission queue during the period (t1, t2) as A1,1[t1, t2]. The retransmission traffic is the aggregated traffic of the retransmission of all sessions. By observing the system over a substantially long period of time, we can find that A1,1[t1, t2] also conforms to the leaky-bucket constraint, and we rewrite the above inequality Equation (21.1) as

A

1,1

[t

, t

]

+

 

 

 

 

 

 

 

 

 

A

g, j

[t

, t

]

A

 

(t

2

t

)

+

 

 

 

A

 

(t

2

t

)

 

 

 

1

 

2

 

 

 

 

 

 

 

 

 

 

 

 

 

1

2

 

 

1,1

 

1

 

 

 

 

 

g, j

 

1

 

 

 

 

 

 

 

 

 

 

 

 

g h,g =1 s j g

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

g h,g =1 s j g

 

 

 

 

 

 

 

 

 

 

t

2

> t

 

> t

, t

1

0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

(21.15)

 

 

 

 

 

 

 

1

 

1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

By using notation specified earlier we can derive the equation for A1,1(t2 t1) as

 

 

A

 

 

[t

, t

]

A

 

(t

 

 

t

)

=

 

L

×

 

 

 

 

 

s j s σs, j + ρS, j

· (t2 t1)

 

 

Pbe

×

P

 

1,1

 

 

1

 

2

 

1,1

 

 

2

 

1

 

 

 

s{dp}

 

 

 

 

 

 

 

 

L

 

 

×

 

hi

 

hi

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

s j s σs, j + ρs, j · (t2 t1)

be

× Pli

 

 

 

(21.15a)

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

+

 

 

 

 

 

 

 

 

L

 

 

 

 

 

× Pli

 

 

 

By combining Equation (21.12) and inequality Equation (21.15), we have

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

W

g, j

[t

 

, t

]

A

(t

2

t

)

+

 

 

 

 

A

(t

2

t

)

 

 

 

 

 

 

 

 

 

 

 

 

 

g h s j g

 

 

 

1

 

2

 

 

1,1

 

1

 

 

 

 

 

g, j

 

1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

g h,g =1 s j g

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

t

 

> t

> t

, t

1

0

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2

 

 

 

1

 

 

 

1

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Finally, if Ci is the link capacity of the radio band (channel) i, by applying the inequality Equation (21.13) we have

C

i ×

t

e

A

( t

e +

t

t

)

+

σ

ρ

( t

e +

t

t

)

 

 

 

 

1,1

 

 

1

1

 

i, j +

i, j ×

 

1

1

 

 

 

t

 

> t

> t

, t

 

0

 

 

 

g h,g =1 s j g

 

 

 

 

 

(21.16)

 

 

2

1

 

 

 

 

 

 

 

 

 

 

 

 

 

1

 

1

 

 

 

 

 

 

 

 

 

 

 

 

From the above inequality, we calculate the maximum value of te.

The intrapriority delay is delay contributed from the SCFQ scheduling delay. It is the delay during which a heading block of a session waits for the heading blocks of some other sessions with the same priority to be served. Following the results presented by

832 QUALITY-OF-SERVICE MANAGEMENT

Golestani [51], we can derive the maximum intrapriority delay of the heading block of a session k with priority e as (|κe| − 1) · (L/Ci ), where Ci represents the capacity (b/s) of link (band) i, κe represents the set of backlog sessions for priority e, and |κe| represents the number of backlog sessions in the priority e.

21.3.3 Heading-block delay

A heading block will encounter an intrapriority delay, an interpriority delay, and a block transmission delay of its own. The heading-block delay, denoted HD, for an MS depends on the transmission rates and can be derived as

(HDe,k )li = |κe| · te + (|κe| − 1)

·

 

L

+

L

 

(21.17)

Ci

(re,k )li

(HDe,k )hi = |κe| · te + (|κe| − 1)

·

 

L

+

L

(21.18)

 

 

 

Ci

(re,k )hi

where (re,k )li and (re,k )hi are the service rate (b/s) of session k of priority e, i.e. the high and low service rate, within low-IF region and high-IF region, respectively. The item on the further right-hand side in each of the above equations represents the transmission delay of the heading block of the session k with the priority e. Since te is likely to be short under the control of the leaky-bucket regulator, HD is relatively small compared with the mean duration that an MS will stay in an interference region. Therefore, it was assumed that the interference condition will not change during a heading-block delay.

The queueing delay of a data block is the time during which the block waits until the block is selected for transmission. Clearly, a data block newly arrived in a queue cannot be served by the corresponding SCFQ server until all the proceeding data blocks in the same queue have been served. Therefore, the queueing delay of a data block includes the time that the block waits for it to become a heading block itself, plus the interpriority and intrapriority delays that the block encounters when it becomes a heading block.

If be,k represent the mean queue length of a session k with a priority e then from Little’s result, from Chapter 6, the mean queue length encountered by a newly arrived data block is equal to the block arrival rate multiplied by the mean heading-block delay time. Parameter be,k is given as

be,k =

ρe,k

· (HDe,k )li · Pli + (HDe,k )hi · Phi

(21.19)

L

Now, the mean queueing delay w¯ e,k for the session k with a priority e can be calculated as

 

 

ρe,k

· (HDe,k )li · Pli+(HDe,k )hi · Fhi

2

+ |κe| · te + (|κe| − 1)

L

(21.20)

we,k =

L

 

Ci

21.3.4 Interference model

We assume that the general interference model is an interrupted poisson process with transition probabilities of α and β. Hence, the duration that an MS is within the lowregion

or the high-interferece region can be represented, respectively, by an exponential distribution 1 eα·t , denoted L(t), or 1 eβ·t , denoted H (t).

The interference state in which a block is served is determined by the starting state and the waiting time of the block. Therefore, we use an alternating renewal process to calculate

DYNAMIC SCHEDULING ON RLC/MAC LAYER

833

the probability of the interference state in which a block is served. In this alternating renewal process, the block waiting time can be divided into several renewal intervals. A renewal interval consists of two exponential distributions, L(t) and H (t). Let F(t) be the convolution sum of L(t) and H (t). We use the notation Plshi(W ) to represent the probability that a block with a waiting time W arrives when an MS is within a low-interference (IF) region and is served when the MS is within a high-IF region. Following the same convention, the notations of probabilities Plsli(W ), Fhshi(W ), and Fhsli (W ) should be self-explanatory. These probabilities can be derived as [52]:

Plsli(W ) = [1 L(W )] +

 

w

0

[1 L(W y)]d

Plshi(W ) = 1 Plsli(W )Phshi(W ) = [1 H (W )] +

Phsli (W ) = 1 Phshi(W )

Fn (y)

n=1

 

w

 

0

[1 H (W y)]d

Fn (y)

 

 

n=1

 

 

(21.21)

21.3.5 Normal delay of a newly arrived block

Both the MS-terminated downlink data block and the MS-originated uplink block transmission requests may arrive at an SCFQ queue when the MS is within either a low-IF region with a probability Pli or a high-IF region with a probability Phi. A block may be served when the MS is within a high-IF region or a low-IF region. So, the normal delay (without retransmissions) of a newly arrived data block, is equal to (be,k + 1) · H De,k , where H De,k can be (H De,k )li or (H De,k )hi. By using the above Equation (21.21), we can obtain the normal delay (N De,k ) of a block with a mean waiting time of w¯ e,k as

NDe,k = Pli · [(be,k + 1) · (HDe,k )li · Plsli(w¯ e,k )

+ (be,k + 1) · (HDe,k )hi · Flshi(w¯ e,k )] + Phi · [(be,k + 1) · (HDe,k )hi · Phshi(w¯ e,k )

+ (

b

e,k + 1) · (HDe,k )li · Phsli (w¯ e,k )]

(21.22)

The retransmission delay of each retransmission consists of two delays, the waiting time Ta of a selective ARQ request, and the retransmission time Tr. The transmission of a data block and the retransmission of this block may occur in either interference condition. In other words, a retransmission cycle may start and end in either interference region. Let A denote the mean retransmission delay starting from a low-IF region, whereas B denotes the mean retransmission delay starting from a high-IF region. Hence, we can describe the mean retransmission delays A and B by two cross recursive equations, as shown below. As a consequence, the retransmission delay (R De,k ) of a block can be obtained as

A= Plibe{(Ta + Tr) + A · Plsli(Ta + Tr) + B · Plshi(Ta + Tr)}

B= Phibe{(Ta + Tr) + B · Phshi(Ta + Tr) + A · PHSlow-if(Ta + Tr)}

RDe,k = Pli · A · Plsli

w¯ e,k +

 

L

+B · Plshi

w¯ e,k +

 

L

 

(re,k )li

 

(re,k )hi

 

 

+ Phi · B ·

Phshi

w¯ e,k +

 

L

 

+ A ·

Phsli

w¯ e,k +

 

L

(21.23)

 

 

 

 

 

(re,k )hi

(re,k )li

834 QUALITY-OF-SERVICE MANAGEMENT

21.3.6 High service rate of a session

By summing up the normal delay, Equation (21.22), and the retransmission delay, Equation (21.23), of a newly arrived block, the SR calculator can calculate the total delay (TDe,k ) for a newly arrived block in a session k with a priority e. For simplicity it is assumed that the low service rate of a session when the MS is within a high-IF region is a predefined value. The value of this low service rate can be chosen by a user application in accordance with the required characteristics of the media stream used in the application. For example, the low service rate can be assigned as the minimum tolerable decoding rate of a Motion Pictures Expert Group (MPEG) video stream.

If we assume that a session k with a priority e has a QoS specification for m block transmissions with air-interface delay bound De,k , then the SR calculator can calculate the high service rate of the session k with a priority e under the constraint of the inequality

TDe,k De,k /m.

21.3.6.1 Performance example

The three algorithms are compared by simulation with the same parameters as in Yang et al. [45]. The results are shown in Figure 21.8.

21.4 QoS IN OFDMA-BASED BROADBAND WIRELESS ACCESS SYSTEMS

Vector orthogonal frequency division multiplexing (VOFDM) is considered as a base for BWA systems by the Broadband Wireless Internet Forum (BWIF) [1]. The BWA system is used with existing wireless LAN technologies such as IEEE802.11 (a, b) and IEEE 802.16 Group aims to unify the BWA solutions [56]. 802.16 Group issued standards in the 10–66 GHz bands and IEEE802.16a Group was formed to develop standards to operate in the 2–11 GHz bands in which channel impairments, multipath fading and path loss become more significant with the increase in the number of subscribers.

System performance at high transmission rates depends on the ability of BWA system to provide efficient and flexible resource allocation. Recent studies [55,57] on resource allocation demonstrate that significant performance gains can be obtained if frequency hopping and adaptive modulation are used in subcarrier allocation, assuming knowledge of the channel gain in the transmitter.

The resource allocation problem has been considered in many studies. Almost all of them define the problem as a real-time resource allocation problem in which QoS requirements are fixed by the application. QoS requirement is defined as achieving a specified data transmission rate and BER of each user in each transmission. In this regard, the problem differs from the water-feeling schemes wherein the aim is to achieve Shannon capacity under the power constraint [57].

Therefore, in this section we consider the problem where K users are involved in the OFDMA system to share N subcarriers. Each user allocates nonoverlapping set of subcarriers Sk where the number of subcarriers per user is J (k). In the following, Xk (l) represents the lth subcarrier of the FFT block belonging to the kth user. Xk (l) is obtained by coding the assigned c bits with the corresponding modulation scheme. In the downlink the Xk (l) are multiplexed to form the OFDM symbol of length (N + L) with the appended guard

QoS IN OFDMA-BASED BROADBAND WIRELESS ACCESS SYSTEMS

835

Mean delay (timeslots)

Mean number of re-transmissions

18

 

 

16

SCFQ

16.823

14

CIF-Q

14.899

DSMC

 

12

 

 

 

 

 

10

 

 

10.214

 

 

8

 

 

 

 

 

6

4.841

6.480

 

4.729

5.130

4.025

4.3679

 

 

 

 

3.743

 

 

 

 

 

 

4

 

 

 

 

 

 

 

3.831

3.929

 

3.413

3.547

3.765

2

 

 

 

 

 

 

 

 

 

 

 

0

1.801

2.275

2.747

2.946

2.989

 

 

 

Mean arrival rate per session (blocks/timeslot)

 

2.5

 

 

 

 

 

 

 

SCFQ

 

 

2.10

 

 

 

 

 

2.0

 

CIF-Q

 

1.83

 

 

 

DSMC

 

 

 

 

 

 

 

1.5

1.28

1.00.81

 

0.60

 

 

 

 

0.5

0.43

0.44

0.47

0.48

0.49

 

 

 

 

 

0.13

0.15

0.17

0.19

0.23

 

 

 

 

 

 

 

 

 

 

0.0

1.801

2.275

2.747

2.946

2.989

 

Mean arrival rate per session (blocks/timeslot)

Figure 21.8 System performance. (Reproduced by permission of IEEE [45].)

prefix L in order to eliminate ISI. At the uplink, the equivalent overall OFDM symbol (with a synchronization error) has the form

K 1 j(k)1

 

x(l) =

Xk (n)e j (2π/N )[Ik (n)]l

(21.24)

k=0

n=0

 

where n = −L , . . . , N 1, and Ik (n) denotes the subcarrier assigned to the kth user. Resource allocation mechanism associates the set of subcarriers to the users with different bits loaded into them. The received signal from the jth user can be represented as

y j (l) = x(l) h j (l) + w(l)

(21.25)

where h j (t) is the baseband impulse response of the channel between BS and the jth user. y j (l) is the received signal y j (t) sampled at rate 1/T . The first L samples are discarded and

i h j (i) exp[ j2(π /N )ni] is the frequency response of the channel of the

836

QUALITY-OF-SERVICE MANAGEMENT

 

 

the N -point FFT is computed. The data of the jth user is

 

 

 

Y j (n)

=

X j (n)Hj (i j (n)) + W (n),

if i j (n) Sj

(21.26)

 

 

0,

otherwise

 

where Hj (n) := kth user.

The allocation module of the transmitter assigns subcarriers to each user according to some QoS criteria. QoS metrics in the system are rate and BER. Each user’s bit stream is transmitted using the assigned subcarriers and adaptively modulated for the number of bits assigned to the subcarrier. The power level of the modulation is adjusted to meet QoS for given fading of the channel. The transmission power for the AWGN channel can be predicted. In addition the channel gain of subcarrier n to the corresponding user k should be known. The channel gain of the subcarrier is defined as αk,n = Hk (n) PLk ,where PL is the

path loss, defined by PLk = PL (do) + 10α log10 (dk /do) + Xσ . Parameter do is the reference distance, dk is the distance between transmitter and receiver, α is the path loss component

and Xσ is a Gaussian random variable for shadowing with a standard deviation σ [58, 59].

With the known channel information, the objective of resource allocation problem can be defined as maximizing the throughput subject to a given total power constraint regarding the user’s QoS requirements.

If γk,n is the indicator of allocating the nth subcarrier to the kth user, the trans-

mission power

allocated to the nth subcarrier of kth user can be expressed as P

2

 

k,n =

fk (ck,n ,BERk )k,n

, where

fk (ck , n) is the required received power with unity channel gain

for reliable reception of ck,n bits per symbol. Therefore, the resource allocation problem with an imposed power constraint can be formulated as

N

 

 

 

 

maxCk ,nk ,n Rk =

ck,n γk,n for all k

 

 

n=1

 

 

 

 

K

N

fk (ck,n , BERk )

 

 

subject toPT =

 

γk,n Pmax

(21.27)

 

αk2,n

k=1 n=1

 

 

 

The limit on the total transmission power is expressed as Pmax for all n {1, . . . , N }, k {1, . . . , K } and ck,n {1, . . . , M}. If there is no power constraint, Equation (21.27) is changed in order to minimize PT subject to allocating Rk bits for all k. In other words problem is to find the values of the γk,n and the corresponding ck,n while minimizing PT .

The optimal solution in a multiuser environment with multiple modulation techniques is complicated since it needs to pick the subcarriers in balance. The problem can be classified according to each set of bits assigned to a subcarrier. For a user k, fk (ck,n ) { fk (1, BERk ), . . . , fk (M, BERk )}and M times [K N ] power matrices { Pc} can be constructed for each c. For a constant c, { f (c)} can be computed and the transmission power requirement can be found. The dimension of the indicator function is incremented and represented now by γk,n,c and defined as

γk,n,c

=

1, if ck,n = c

(21.28)

 

0, otherwise

 

The above problem can be solved with integer programming (IP). We refer to the IP approach as the optimal solution to the resource allocation problem. There are K · N · M indicator

QoS IN OFDMA-BASED BROADBAND WIRELESS ACCESS SYSTEMS

837

variables and M power matrices where the entries of each matrix for a given c can be found from

 

Pkc,n =

 

fk (c, BERk )

(21.29)

 

 

α2

 

 

 

 

k,n

 

Using Equation (21.29) as an input, the cost function now can be written as

 

K

N M

 

 

PT =

 

Pkc,n γk,n,c

(21.30)

 

k=1 n=1 c=1

 

and the description of the IP problem is

 

 

 

 

 

min

 

 

 

(21.31)

 

γk,n,c PT , for γk,n,c {0, 1}

subject to

 

 

 

 

 

N

M

 

K M

γk,n,c, 1, for all n

Rk =

c · γk,n,c, for all k, and 0

n=1 c=1

 

k=1 c=1

 

Although the optimal solution gives the exact results, from an implementation point of view, it is too complex. This leads to searching suboptimal solutions that are fast and close to the optimal solution. Suboptimal solutions, in most attempts to simplify the resource allocation, decompose the problem into two procedures, a subcarrier allocation with fixed modulation, and bit loading. Subcarrier allocation with fixed modulation deals with one Pc matrix with fixed c and then, by using bit loading scheme, the number of bits is incremented.

Subcarrier allocation is based on the fact that

fk (x, y) is a convex function [57]. We

1

¯

with

K

¯

can start with Pk,n

and we can define new Rk

k=1

Rk N , which can be obtained

by decrementing Rk properly. Then the solution to this problem can be solved with Linear Programming or Hungarian problem.

Linear programming

For simplicity, we briefly restate the problem description,

 

 

K N

Pk1,n ρk,n

 

[0, 1]

 

 

 

PT = min

ρk,n

(21.32)

 

 

k=1 n=1

 

 

 

 

subject to

 

 

 

 

N

K

 

 

 

ρk,n =

 

k k {1, . . . , K }

and

 

= 1 n {1, . . . , N }

 

R

ρk,n

 

n=1

k=1

 

 

 

After linear programming, the [K · N ] allocation matrix has entries ranging between 0 and

1. The entries are converted to integers by selecting the highest ¯ k nonzero values from

R N

columns for each k and assigning them to the kth user.

Hungarian algorithm

The problem described above can also be solved by an assignment method such as the Hungarian algorithm [58]. The Hungarian algorithm works with square matrices. Entries