12
IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation in Wireless Cellular Networks Ritesh Madan, Stephen P. Boyd, Fellow, IEEE, and Sanjay Lall, Senior Member, IEEE Abstract—We consider a scheduled orthogonal frequency di- vision multiplexed (OFDM) wireless cellular network where the channels from the base-station to the mobile users undergo flat fading. Spectral resources are to be divided among the users in order to maximize total user utility. We show that this problem can be cast as a nonlinear convex optimization problem, and describe an algorithm to solve it. Computational experiments show that the algorithm typically converges in around 25 iterations, where each iteration has a cost that is , with a modest constant. When the algorithm starts from an initial resource allocation that is close to optimal, convergence typically takes even fewer iterations. Thus, the algorithm can efficiently track the optimal resource allocation as the channel conditions change due to fading. We also show how our techniques can be extended to solve resource allocation problems that arise in wideband networks with frequency selective fading and when the utility of a user is also a function of the resource allocations in the past. Index Terms—Fast computation, resource allocation, sched- uling, wireless cellular networks. I. INTRODUCTION R ESOURCE allocation in wireless networks is fundamen- tally different than that in wireline networks due to the time-varying nature of the wireless channel [1]. There has been much prior work on scheduling policies in wireless networks to allocate resources among different flows based on the channels they see and the flow state [1], [2]. The flow state can consist of the average rate seen by the flow in the past [3], [4], the delay of the head-of-line packet [5], or the length of the queue [6]. Much prior work in this area can be divided into two categories: Manuscript received September 16, 2009; revised September 28, 2009; ap- proved by IEEE/ACM TRANSACATIONS ON NETWORKING Editor S.Borst. First published November 24, 2009; current version published June 16, 2010. This work was funded in part by the MARCO Focus Center for Circuit and System Solutions (C2S2, www.c2s2.org) under Contract 2003-CT-888, the AFOSR under Grant AF F49620-01-1-0365, the NSF under Grant ECS-0423905, the NSF under Grant 0529426, the DARPA/MIT under Grant 5710001848, the AFOSR under Grant FA9550-06-1-0514, the DARPA/Lockheed under Contract N66001-06-C-2021, the AFOSR/Vanderbilt under Grant FA9550-06-1-0312, the Stanford URI Architecture for Secure and Robust Distributed Infrastruc- tures (AFOSR DoD award 49620-01-1-0365), and the Sequoia Capital Stanford Graduate Fellowship. R. Madan was with the Department of Electrical Engineering, Stanford Uni- versity, Stanford, CA 94305 USA. He is now with Qualcomm-Flarion Tech- nologies, Bridgewater, NJ 08870 USA (e-mail: [email protected]). S. P. Boyd is with the Department of Electrical Engineering, Stanford Uni- versity, Stanford, CA 94305 USA (e-mail: [email protected]). S. Lall is with the Department of Electrical Engineering and the Department of Aeronautics and Astronautics, Stanford University, Stanford, CA 94305 USA (e-mail: [email protected]). Digital Object Identifier 10.1109/TNET.2009.2034850 1) Scheduling for elastic (non real-time) flows: The end-user experience for a elastic flow is modeled by a concave increasing utility function of the rate experienced by the flow [7]. The proportional fair algorithm (see, for example, [8]) where all the resources are allocated to the flow with the maximum ratio of instantaneous spectral efficiency (which depends on the channel gain) to the average rate has been analyzed in [3], [9], [10]; roughly speaking this algorithm maximizes the sum of log utilities of average rates over an asymptotically large time horizon. A more general scheduling rule where potentially multiple users can be scheduled simultaneously has been considered in [11], [12]. Most of the above work assumes that the queues have infinite backlogs, i.e., packets are always available in the buffers of all the queues; extensions to finite queues are provided in, for example, [3]. Joint design of scheduling and congestion control with modeling of queue dynamics has been considered in, for example, [4], [13]–[15]; in this case, packets are always assumed to be available at the congestion controller. 2) Scheduling for Real-Time Flows: Real-time flows are typ- ically modeled by a predetermined but unknown arrival process and a delay deadline for each packet. For such flows, we can roughly define the stability region as fol- lows: The stability region for a set of queues is defined as the set of arrival rates at the queues for which there exists a scheduling policy such that the length of any queue does not grow without bound over time (see, for example, [16]). A stabilizing policy is one which ensures that the queue lengths do not grow without bound. Stabilizing policies for a vector of arrival rates within the stability region for different wireless network models have been characterized in, for example, [5], [6], [16]–[19]. The scheduling policy in [5] minimizes the percentage of packets lost because of deadline expiry, while the delay performance of the expo- nential rule (introduced in [6]) was empirically studied in [20]. Work on providing throughput guarantees for such flows includes [21] and [22], and references therein. We note that policies to schedule a mixture of elastic (non real- time) and real-time flows have been considered in [20]. Dis- tributed algorithms for interference management to maximize the sum utilities of user signal-to-noise ratios (SNR) in cellular networks have been studied in [23], [24]. Also, related cross- layer optimization problems for resource allocation in wireless networks with different objectives have been analyzed in, for ex- ample, [25]–[27]. Resource allocation algorithms which focus on maximizing sum rate (without fairness or with minimum rate guarantees) for OFDM systems include [28]–[32]. The above summary is only a representative sample of the work in the gen- eral area of resource allocation in wireless networks. For a more 1063-6692/$26.00 © 2009 IEEE Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973

Fast Algorithms for Resource Allocation inWireless Cellular Networks

Ritesh Madan, Stephen P. Boyd, Fellow, IEEE, and Sanjay Lall, Senior Member, IEEE

Abstract—We consider a scheduled orthogonal frequency di-vision multiplexed (OFDM) wireless cellular network where thechannels from the base-station to the mobile users undergo flatfading. Spectral resources are to be divided among the users inorder to maximize total user utility. We show that this problem canbe cast as a nonlinear convex optimization problem, and describean � � algorithm to solve it. Computational experiments showthat the algorithm typically converges in around 25 iterations,where each iteration has a cost that is � �, with a modestconstant. When the algorithm starts from an initial resourceallocation that is close to optimal, convergence typically takeseven fewer iterations. Thus, the algorithm can efficiently trackthe optimal resource allocation as the channel conditions changedue to fading. We also show how our techniques can be extendedto solve resource allocation problems that arise in widebandnetworks with frequency selective fading and when the utility of auser is also a function of the resource allocations in the past.

Index Terms—Fast computation, resource allocation, sched-uling, wireless cellular networks.

I. INTRODUCTION

R ESOURCE allocation in wireless networks is fundamen-tally different than that in wireline networks due to the

time-varying nature of the wireless channel [1]. There has beenmuch prior work on scheduling policies in wireless networks toallocate resources among different flows based on the channelsthey see and the flow state [1], [2]. The flow state can consist ofthe average rate seen by the flow in the past [3], [4], the delay ofthe head-of-line packet [5], or the length of the queue [6]. Muchprior work in this area can be divided into two categories:

Manuscript received September 16, 2009; revised September 28, 2009; ap-proved by IEEE/ACM TRANSACATIONS ON NETWORKING Editor S.Borst. Firstpublished November 24, 2009; current version published June 16, 2010. Thiswork was funded in part by the MARCO Focus Center for Circuit and SystemSolutions (C2S2, www.c2s2.org) under Contract 2003-CT-888, the AFOSRunder Grant AF F49620-01-1-0365, the NSF under Grant ECS-0423905, theNSF under Grant 0529426, the DARPA/MIT under Grant 5710001848, theAFOSR under Grant FA9550-06-1-0514, the DARPA/Lockheed under ContractN66001-06-C-2021, the AFOSR/Vanderbilt under Grant FA9550-06-1-0312,the Stanford URI Architecture for Secure and Robust Distributed Infrastruc-tures (AFOSR DoD award 49620-01-1-0365), and the Sequoia Capital StanfordGraduate Fellowship.

R. Madan was with the Department of Electrical Engineering, Stanford Uni-versity, Stanford, CA 94305 USA. He is now with Qualcomm-Flarion Tech-nologies, Bridgewater, NJ 08870 USA (e-mail: [email protected]).

S. P. Boyd is with the Department of Electrical Engineering, Stanford Uni-versity, Stanford, CA 94305 USA (e-mail: [email protected]).

S. Lall is with the Department of Electrical Engineering and the Departmentof Aeronautics and Astronautics, Stanford University, Stanford, CA 94305 USA(e-mail: [email protected]).

Digital Object Identifier 10.1109/TNET.2009.2034850

1) Scheduling for elastic (non real-time) flows: The end-userexperience for a elastic flow is modeled by a concaveincreasing utility function of the rate experienced by theflow [7]. The proportional fair algorithm (see, for example,[8]) where all the resources are allocated to the flow withthe maximum ratio of instantaneous spectral efficiency(which depends on the channel gain) to the average ratehas been analyzed in [3], [9], [10]; roughly speaking thisalgorithm maximizes the sum of log utilities of averagerates over an asymptotically large time horizon. A moregeneral scheduling rule where potentially multiple userscan be scheduled simultaneously has been considered in[11], [12]. Most of the above work assumes that the queueshave infinite backlogs, i.e., packets are always available inthe buffers of all the queues; extensions to finite queues areprovided in, for example, [3]. Joint design of schedulingand congestion control with modeling of queue dynamicshas been considered in, for example, [4], [13]–[15]; in thiscase, packets are always assumed to be available at thecongestion controller.

2) Scheduling for Real-Time Flows: Real-time flows are typ-ically modeled by a predetermined but unknown arrivalprocess and a delay deadline for each packet. For suchflows, we can roughly define the stability region as fol-lows: The stability region for a set of queues is defined asthe set of arrival rates at the queues for which there existsa scheduling policy such that the length of any queue doesnot grow without bound over time (see, for example, [16]).A stabilizing policy is one which ensures that the queuelengths do not grow without bound. Stabilizing policiesfor a vector of arrival rates within the stability region fordifferent wireless network models have been characterizedin, for example, [5], [6], [16]–[19]. The scheduling policyin [5] minimizes the percentage of packets lost because ofdeadline expiry, while the delay performance of the expo-nential rule (introduced in [6]) was empirically studied in[20]. Work on providing throughput guarantees for suchflows includes [21] and [22], and references therein.

We note that policies to schedule a mixture of elastic (non real-time) and real-time flows have been considered in [20]. Dis-tributed algorithms for interference management to maximizethe sum utilities of user signal-to-noise ratios (SNR) in cellularnetworks have been studied in [23], [24]. Also, related cross-layer optimization problems for resource allocation in wirelessnetworks with different objectives have been analyzed in, for ex-ample, [25]–[27]. Resource allocation algorithms which focuson maximizing sum rate (without fairness or with minimum rateguarantees) for OFDM systems include [28]–[32]. The abovesummary is only a representative sample of the work in the gen-eral area of resource allocation in wireless networks. For a more

1063-6692/$26.00 © 2009 IEEE

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

Page 2: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

974 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010

complete description of prior work, we refer the reader to [2],[6], and the references therein.

In this paper, we focus on elastic flows with infinite backlogs;an extension to model constraints of finite backlogs due to con-gestion control (which can be modeled as an upper bound onthe bandwidth allocated to a user) is straightforward. We studythe problem of resource allocation in wideband OFDM wirelesscellular networks like Ultra Mobile Broadband (UMB) [33] andLong Term Evolution path for 3GPP [34]. In particular, we studythe assignment of power and spectral resources to maximize thesum-utility of the achieved data rates. The user utility can be afunction of instantaneous rate or average rate over time. For boththese cases, the solution in general can result in the distributionof resources to multiple flows at the same time. We show thatthe problem is a convex optimization problem. Hence, it can besolved in time for users using a general-purpose bar-rier method (see, for example, [35]). However, the time-varyingnature of wireless channels necessitates recomputation of an op-timal resource allocation in an online manner. This requires thedesign of faster computational algorithms to track the optimalresource allocation. We exploit the underlying structure of theproblem to derive a specialized barrier method that has a com-plexity of . We also illustrate the generality of our com-putational techniques through extensions to frequency selectivefading, where we exploit frequency diversity.

We note that our work focusses on computational algorithmsand is complementary to that in [3], [9]–[11]. The focus of thosepapers is on the asymptotic analysis when the user utility is afunction of the rate averaged over a very long time.

A. Organization

The rest of the paper is organized as follows. We first con-sider the utility for each flow to be a function of the instanta-neous rate. We describe the mathematical model and problemformulation, and prove the existence of a unique positive solu-tion in Section II. We exploit the structure of the underlying op-timization problem to obtain an algorithm and illustrate itstypical behavior through computational results in Section III. InSections IV and V, we consider frequency selective fading andthe case where the utility of a user is a function of its averagerate, respectively. In Section VI, we compare our algorithm withother standard computational approaches.

II. PROBLEM FORMULATION

A. System Model

We model an OFDM wireless cellular network where spec-trum and power need to be divided between communicationflows (users) on links in a cell. We formulate an optimizationproblem which is applicable to the downlink; as we show later,extensions to the uplink can be similarly obtained. We assumean M-Quadrature Amplitude Modulation (MQAM) scheme fortransmission and a total system bandwidth, . Then, the max-imum rate (in nats/sec) at which a user, , can transmit is givenby

where is the transmit power, is the channel gain over thelink to user , is the bandwidth allocated to user , isthe noise power spectral density, and ,where BER is the desired (constant) bit error rate [36].

We denote the effective flow rate in nats/s/Hz for user by, and the fraction of bandwidth allocated to

it by . We denote the associated vectors of rates andbandwidth-fractions as and , respectively. Thepower consumption to support flow rate can be modeledas

When , the power required is 0. The power consumptionof user as a function of and has the form , wherethe function is defined as follows:

if ,otherwise.

The set is given by

We assume that each cell has a (weighted) total power con-straint of the form

where is the (weighted) total power, is thegiven maximum (weighted) total power, and are theweights. This constraint can be used to model a sum-power con-straint, with , for the downlink in a cell. For the uplink,it can also be used to model the requirement that the total inter-ference at a neighboring interfering base-station should be keptbelow some threshold.1 The weights then represent the powergains to the neighboring base-station.2 We will normalize thepower constraint by defining the normalized powerby where . Thepower constraint is then .

We first observe that is a convex function of and . Thefunction , defined for , is the perspectiveof the exponential function, and so is convex in and (see, e.g.,[35, Sec. 3.2.6]). The function is obtained from by an affinecomposition, and the addition of a linear term, and so is convex.The total power is therefore also a convex function of

1In the uplink, some mobiles may be power limited and so, it is necessary tomodel the individual power constraint for each link. Since we mainly focus onthe downlink for the rest of the paper, we do not include this in our analysis fornotational simplicity – our techniques can be generalized in a straightforwardmanner to allow for such constraints as well.

2In general we can have a total interference budget constraint at more than onebase-station – our analysis extends to this case as well. Also, a total interferencebudget constraint is a reasonable way to keep interference low at neighboringbase-stations when the frequency tones in neighboring cells hop randomly andindependently of each other [8]. Setting the interference budgets is out of thescope of our paper. For the uplink, � now represents the noise plus averageinterference power spectral density.

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

Page 3: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

MADAN et al.: FAST ALGORITHMS FOR RESOURCE ALLOCATION INWIRELESS CELLULAR NETWORKS 975

and , and so, the total power constraint is a convex constraintfor .

B. User Utility Functions

The utility for user is a function of its instantaneous rate,given by , so the total utility is

We assume that the utility functions are thricecontinuously differentiable with

for all and

Thus, (and therefore also ) is strictly increasing and strictlyconcave, and the marginal utility increases without bound as therate converges to zero. Examples of common utility functionssatisfying these conditions include and , for .

Note that the above utility function does not take into ac-count past allocations to users. We consider this extension inSection V. We show that we can use our computational tech-niques to efficiently compute a scheduling policy that is a gen-eralization of the scheduling policy in [3].

C. Maximum Utility Resource Allocation

Our goal is to choose and to maximize the total utility,subject to the power constraint and the bandwidth-fraction con-straint:

maximize

subject to

(1)

where denotes the vector with all entries one. The optimiza-tion variables are and ; the problem data are and the func-tions . The vector inequalities are componentwise;means , . For convenience we will definethe feasible set by

We now have the equivalent problem

maximize

subject to (2)

In the following section, we will show that there is a uniqueoptimal allocation which is achieved at a point withand . Hence, relaxing these strict inequalities to nonstrictinequalities, and appropriately interpreting and , does notchange the optimal solution.

The resource allocation problem (2) is a convex optimizationproblem, with variables and constraints. Roughlyspeaking, this means that its global solution can be efficientlycomputed, for example by a general interior-point method.

These methods typically converge in a few tens of iterations;each iteration in a general-purpose implementation requires

arithmetic operations (see, e.g., [35, Ch. 11] or [37]).The algorithm we describe in the next section solves the re-source allocation problem much faster by exploiting its specialstructure. The resulting interior point method converges inabout 25 to 30 iterations, where each iteration requiresoperations with a modest constant.

D. Existence and Uniqueness of a Positive Solution

In this section, we show that the resource allocation problem(1) has a unique solution , with and .We will do this by constructing a sequence of points convergingto the maximum, which must therefore lie in the closure of thefeasible set. We first show the following. (The proofs of the nextthree lemmas have been moved to the Appendix .)

Lemma 1: The closure of satisfies .The interpretation of this result is that allocating zero band-

width-fraction and positive rate to a user requires infinite power.Hence for every point in the feasible set, we must have

whenever , and in fact this holds for the closureof the feasible set also.

The next result shows that a point withfor some cannot be optimal. The idea here is that sincehas infinite slope at 0, slightly increasing and will give anincrease in utility which outweighs the decrease in the otherrates necessary to maintain the power constraint.

Lemma 2: Suppose is a sequence in with limit

and , with and . Suppose alsothat for all either or . If thereis some such that then there existssuch that

The final lemma needed shows that a point withfor some must also have . If this were not the case,we could decrease to zero, spreading this bandwidth-frac-tion among the other users, who can use the extra bandwidth-fraction to increase their rates without increasing their powers,thus giving a feasible point with larger total utility. Then usingLemma 2, we can rule out the possibility that a maximizing se-quence converges to .

Lemma 3: Suppose is a sequence in with limit

and , with and . If there is somesuch that , , then there exists such that

We now have the following theorem showing the existenceand uniqueness of the solution.

Theorem 1: There exists a unique withsuch that

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

Page 4: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

976 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010

Proof: First notice that problem (2) is feasible. That is, theset is nonempty, since for small enough the choice

, satisfies . Let

Then is finite, since is bounded and is concave. Wemust show that this optimal value is actually achieved. Suppose

is a maximizing sequence in , so that. By extracting a subsequence, we can assume that

converges to a point . Lemma 1 implies this pointlies in and since it is optimal on Lemma 3 implies that

and . Hence the optimal value is achieved in .Uniqueness now follows from strict concavity of .

III. FAST ONLINE RESOURCE ALLOCATION ALGORITHM

In this section, we describe the barrier method to compute anoptimal resource allocation. Such a method, in general, has com-plexity . However, we exploit the structure of the problemto reduce the complexity to .

A. Barrier Method

We use the barrier method to solve the optimization problemin (2) [35]. The central point for a given value ofthe barrier parameter is given by the solution of the followingproblem:

minimize

subject to (3)

As increases, becomes a more accurate approx-imation to the solution to the problem in (2). Note that theobjective function above is convex, and the above problem isa convex optimization problem. Moreover, the solution to theabove problem is unique. This follows, in particular, from thepositive-definiteness of the Hessian of the objective function,as argued in Section III-C.

We collect the variables into one vector ,. Note that we have interleaved

the rate and bandwidth-fraction variables here, so that thevariables associated with a given user are adjacent. Also, wedenote the barrier function as

and

The barrier method is then as follows.

Given strictly feasible starting point , ,, tolerance .

Repeat1) Centering Step. Minimize subject to

, starting at .

2) Update. .3) Stopping Criterion. quit if .4) Increase . .

B. Newton Method

We now describe the Newton method to compute the centralpoint , i.e., solve the problem in (3) for a given value of .The Newton step at , and the associated dual variable aregiven by following equations:

(4)

where . For the Newton method, we usea backtracking line search to ensure an adequate decrease in(see, e.g., [35, Ch.11] or [38]). The method is then as follows.

Given starting point such that , tolerance ,, .

Repeat1) Compute and .2) Stopping Criterion. quit if3) Backtracking line search on . .

while ,.

4) Update. .

C. Fast Computation of Newton Step

We now describe how we can exploit the structure of theproblem to compute the Newton step in time rather thanusing matrix inversion in (4) which has a cost of . Thegradient of the barrier function is given by

The Hessian of the barrier function is given by

. . .

Hence, it follows that

. . .

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

Page 5: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

MADAN et al.: FAST ALGORITHMS FOR RESOURCE ALLOCATION INWIRELESS CELLULAR NETWORKS 977

where the blocks not shown are all zero, and

The gradient, , of is given by

Let us denote

Then we have

. . .

It is easy to show that . Since , it followsthat . Since is a nonzero vector, it followsthat the KKT matrix on the left in (4) is invertible. Also, theKKT matrix on the left in (4) is the sum of a block-arrowmatrix and a rank-one matrix. We exploit this structureto compute the Newton step in time. Let us denote

. In particular, we have (see, forexample, [35, Appendix C])

where

(5)

and

We now obtain analytical formulas for and , which can becomputed in time. We consider the computation of indetail; the computation for is identical. It follows from (5) that

Substituting these back in (5), it follows that

To compute , we first obtain , and then obtain the other’s. Both these operations cost .

D. Convergence Analysis

We now prove the convergence of the Newton method for thisproblem for a given . The convergence of the barrier methodthen follows. Consider the minimization of . Define the setof iterates for the Newton method by , where theinitial point is chosen to be strictly feasible. For the initialvalue of , such a point is easy to find by allocating equal band-width fractions, and powers to users such that the total poweris less than 1, i.e., ; for other iterations of thebarrier method, the solution for the previous value of is guar-anteed to be strictly feasible. The Newton method is a descentmethod, i.e., , for any iteration .

We first consider the following two lemmas, the proofs ofwhich have been moved to the Appendix .

Lemma 4: For all iterations of the Newton method, isstrictly feasible.

Now, it can be shown that the iterates belong to a closed andbounded set.

Lemma 5: The set , where for any , , sare bounded above and bounded away from zero.

Since the KKT matrix on the left in (4) is invertible, andis a continuous function of , it follows that its inverse isbounded on the closed set . Also, is a continuously dif-ferentiable function of and hence, is Lipschitz con-tinuous on , and is bounded above on . The con-vergence of the Newton method then follows (see, for example,[35, Ch. 10]).

A formal complexity analysis (i.e., a bound on the numberof Newton steps required to attain an accurate solution) can becarried out, but this seems irrelevant to us, given the extremelyfast convergence of the algorithm in practice. A typical numberof steps required is 25, and often less.

E. Warm Start

The Newton method can be initialized with ,and , where such that is strictly feasible,i.e., . It can also be initialized with an approximatesolution, such as the solution of a resource allocation problemthat is ’close’. Consider, for example, the situation where wehave computed the optimal resource allocation, and then theproblem changes, but not drastically; for example, the utilityfunctions change, or the channel parameters change, or themaximum available power changes. Running the barriermethod starting from the previously computed optimal point anda larger value of typically cuts the number of iterations re-quired to 10 to 15. This can be repeated, in order to efficientlytrack the optimal resource allocation as the physical parametersor requirements change.

F. Numerical Results

In this section, we show the typical behavior of the algorithmdescribed in this paper. We consider a system ofusers in a cell. The utility function for user is taken to be

, where are generated as independent uni-form random variables on . We take , i.e., wemodel the sum-power constraint for the downlink.

We first study the convergence of our algorithm for randomlygenerated ’s. In particular, we consider each to be randomly

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

Page 6: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

978 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010

Fig. 1. Typical convergence of the barrier method. Top. Norm of residual versusiteration for two different instances. Bottom. Convergence of � � � versusiteration.

distributed over , i.e., the received signal to noise ratio(SNR) at the mobile can vary over the large range of to20 dB. Fig. 1 (top) shows the convergence of the norm of theresidual, versus cumulative Newton iteration, for two differentinstances of the problem. The bottom plot shows the conver-gence of the utility to its optimal value; note that all interme-diate iterates are feasible. This plot shows that the resource al-location obtained is close to optimal, from a practical point ofview, within 20 or so Newton iterations. Highly accurate solu-tions can be obtained in about 30 iterations or so. Both plots arequite typical; similar results are obtained as and other problemparameters are varied.

To illustrate warm-start methods, we simulated a wireless net-work with time-varying fading channels. The resulting sched-uling policy obtained by solving (1) has the following prop-erties. Users with a higher average channel gain get more re-sources on average. Users get allocated more resources whentheir instantaneous channel gain is relatively high than whentheir instantaneous channel gain is low. In our simulation, eachuser’s channel undergoes mutually independent Rayleigh fadingwith a Doppler frequency of 5 Hz and mean SNR of 0 dB. Thus,the channel completely decorrelates after 200 time-steps or so.We recomputed the optimal resource allocation at every timestep of 1 ms. Also, the variation in channel gains over time isvery high; the channel can easily swing over a range of 30 dB.

Fig. 2. Number of Newton iterations needed for reconvergence with Rayleighfading channels. (Top) Number of Newton iterations for reconvergence duringthe first 100 time-steps. (Bottom) CDF of number of Newton iterations for re-convergence over 500 time-steps.

Fig. 2 shows the number of Newton steps required to recon-verge to a very accurate optimal resource allocation, startingfrom the previously computed one. The first computation (froma generic initial resource allocation) requires 29 cumulativeNewton steps. For the rest of the time-steps we used a largervalue of such that only two centering steps were requiredfor a guaranteed duality gap of less than . About 80% ofthe time, the number of Newton iterations required for recon-vergence is less than 15. A larger number of Newton iterationsis occasionally required at times when the rate of change of thechannel is high; for example during deep fades.

IV. FREQUENCY SELECTIVE FADING

In this section, we describe an extension to the case wherethere are frequency bands such that over a given frequencyband, each user’s channel undergoes flat fading. For example, itis sufficient to choose the bandwidth of each band to be less thanthe minimum coherence bandwidth of the users [39]. Denoteby , the channel gain on the th frequency band for user .Similarly, denote the rate and bandwidth for user on the th

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

Page 7: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

MADAN et al.: FAST ALGORITHMS FOR RESOURCE ALLOCATION INWIRELESS CELLULAR NETWORKS 979

frequency band by and , respectively. Then the total rateallocated to user is

Also, the total (weighted) power consumption is given by

where .We again would like to compute a resource allocation to

maximize the total utility, i.e., solve the following optimizationproblem:

maximize

subject to

(6)

where and are in and denote the vectors of the ratesand the bandwidth-fractions given to the users in frequencyband , respectively.

The analysis to show the existence of a solution andconvergence of the barrier method is similar to that be-fore. We now illustrate an efficient method to computethe Newton step during each Newton iteration. Again, weinterleave all the variables into one vector ,

.The barrier function is given by

Also, denote

where now .Then, at each iteration of the barrier method, we solve the

following problem using Newton’s method:

maximize

subject to (7)

The Newton step for this problem can be computed through thesolution of the linear equation in (4), where now, is amatrix give by

...

where is a matrix whose entry is one for, and all other entries are zero. Now

. . .

where the blocks not shown are all zero, and s arematrices given by the following:

...

. . .

where

Thus, is the sum of a block diagonal matrix (where theblocks are 2 2) and a rank one matrix. Hence, can be in-verted in time. Now, the Hessian of is the sumof a rank one matrix and a block diagonal matrix with blocksgiven by the s, each of which can be inverted in time.Using the elimination of variables as before, it can be shown thateach Newton iteration can be performed in time – com-pare this with a general-purpose method which costs .Thus, the reduction in complexity is huge, especially because inmany systems the number of users, , can be large [33], [34].

V. SCHEDULING ALGORITHMS WITH MEMORY

We now illustrate the application of our computational tech-niques to design a scheduling heuristic which greedily maxi-mizes the sum utility of user rates at every time-step. The av-erage is computed in an online manner using an exponentialfilter. This can be used to model the behavior that the end-userexperience is a function of the scheduled rates over multipleconsecutive time-slots rather than a single scheduling decision.We focus on the downlink.

A. Utility Functions

The utility for user is a function of its average rate. We con-sider an exponential averaging filter; in particular the averagerate, , for user is computed at time as follows:

(8)

where is the rate allocated to user at time , and. Also, we assume all users are initialized with (possibly very

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

Page 8: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

980 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010

small) nonzero average rates . Then the utility of userat time is given by , so the total utility is

The assumptions on are the same as those in previous sec-tions. However, note that nowis well defined for because (and hence,

for all finite ).

B. Resource Allocation

The total (weighted) normalized power consumption wheneach user is allocated rate and bandwidth-fractionis

where and is thechannel gain for the th user at time .

Our goal is to choose and at each time to greedilymaximize the total utility subject to the power constraint andthe total bandwidth constraint. Thus, at each time , we solvethe following resource allocation problem:

maximize

subject to

(9)

The optimization variables are and ; the problem dataare , , and the functions . We refer to the re-sulting scheduling algorithm as a greedy utility maximizationalgorithm. Even though at each time-step, the solution to theabove problem is computed with high accuracy, we study theresulting scheduler over a longer time horizon only via a numer-ical experiment. Hence, when viewed over multiple time-steps,the resulting algorithm is a heuristic.

C. Relation to Asymptotically-Optimal Bandwidth Allocation

Note that when we take to be small enough and restrictpower allocation to be uniform across the entire bandwidth, theproblem in (9) can be approximated as

maximize

subject to

(10)

The above problem is thus essentially an optimization problemin the s where the objective function is a linear combinationof the s with positive coefficients:

and the constraint is a sum constraint on the s. Hence, asolution to the above optimization problem is one where all thebandwidth (and power) is allocated to a user for which

(11)

This scheduling scheme has been widely studied in the litera-ture. It has been shown that under appropriate assumptions onthe channel gain processes s and when power is uniformlyallocated across the bandwidth, the above bandwidth allocationscheme (roughly) maximizes the total utility of rates averagedover a very long time horizon [3]. Hence, we refer to this schemeas an asymptotically optimal bandwidth allocation scheme.

The above scheduling scheme is a good one for narrowbandsystems and when there are few users in the system—it exploitsmultiuser diversity well and users get scheduled after relativelyshort intervals of time. However, with the advent of fourth gen-eration wideband systems (e.g., LTE, WiMax, and UMB) weneed to consider schemes which will distribute the resourcesamong multiple users simultaneously due to the following rea-sons.

1) Wideband systems can have a total bandwidth of 20 MHz,and if all the bandwidth is allocated to one user (cell-phone), the user (cell-phone) may not even have enoughprocessing power to decode the huge burst of data. In fact,the UMB spec specifies an upper bound on the amount ofdata that can be transmitted to a user in a single time-slot[33].

2) Fourth generation systems can have thousands of flows percell and hybrid ARQ mechanisms. Consider the case wherethere are 5000 flows and each time-slot is 1 ms. More-over, assume that it takes 3 hybrid ARQ transmissions totransmit a packet. Then if all the flows experience inde-pendent and identically distributed (i.i.d.) channels, on av-erage each flow will get scheduled roughly every 15 s—thisis clearly not acceptable for many types of traffic evenwhen the individual packets do not have strict delay re-quirements. In many applications (e.g., web browsing), auser’s utility, i.e., the end-user experience is a function ofthe average rate it sees over a short time horizon in the pastrather than over a very long time horizon. Also, in manypractical systems, this will lead to TCP time-outs becausethe long interscheduling time will be interpreted as conges-tion, thereby deprecating performance.

We note that the problem formulation in (9) is for a generalvalue of and without any restriction on the powerprofile across the total bandwidth.

D. Existence and Uniqueness of Solution to Problem (9)

For convenience we will redefine the feasible set by

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

Page 9: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

MADAN et al.: FAST ALGORITHMS FOR RESOURCE ALLOCATION INWIRELESS CELLULAR NETWORKS 981

We now have the equivalent problem

maximize

subject to (12)

Also, we simplify notation and drop the dependence of the vari-ables on . And, we denote

(13)

We show that the resource allocation problem (12) has a uniquesolution . The proof of the following lemma can befound in the Appendix .

Lemma 6: The set is closed.We now have the following theorem showing the existence

and uniqueness of the solution.Theorem 2: There exists a unique such that

Proof: First notice that problem (12) is feasible. That is,the set is nonempty, since for small enough the choice

, satisfies . The boundedness ofis easy to see. Since is closed, the supremum is achieved.

Uniqueness follows from strict concavity of .

E. Fast Barrier Method

The barrier method to solve problem (12) is identical to thatin Section III except that the utility function is now given by thatin (13). Hence, using our approach we can solve problem (12)in time.

F. Numerical Results

We considered a time-varying channel model similar to thatin Section III-F. In particular, we consider 300 users with i.i.d.Rayleigh fading channels with 25 Hz Doppler and mean gainof 0 dB. A typical sample path for this channel is shown inFig. 3. We again set , where weregenerated as independent uniform random variables on .Also, we set . Thus, if a user, , does not getscheduled for 100 ms, its average rate, , decays by about33%. The problem in (9) was resolved every 1 ms.

In Fig. 3, we plot the utility function as a function of time(after initial transients) for the following three resource alloca-tion schemes.

1) Greedy utility maximization: This scheme corresponds toallocating resources according to the solution of (9) whichis updated every millisecond.

2) Asymptotically-Optimal Bandwidth Allocation: All theresources are allocated to a single user according to thescheduling policy in (11).

3) Equal Resource: In this scheme, power and spectrum areequally distributed among all users at all times.

Since we use log utilities for our computations, the differencein utilities is a reasonable metric for comparison (vs. ratios of

Fig. 3. Scheduling with memory and log utilities. (Top) Typical sample path ofchannel gain. (Bottom) Evolution of utility functions with time for three differentscheduling policies.

utilities which can change a lot depending on the units of s).Also, note that the large negative values for the total utility arebecause we consider normalized rates s, and soalways. We see that the net utility for the asymptotically op-timal bandwidth allocation algorithm is lower than that for thegreedy utility maximization algorithm—this is to be expectedbecause the asymptotically optimal bandwidth allocation algo-rithm is designed for (a) very large time constants, i.e., smallvalues of , and (b) when the power allocation is restricted tobe uniform across the entire bandwidth. In fact, the equal re-source allocation algorithm outperforms the asymptotically-op-timal bandwidth allocation algorithm.

We show the evolution of the average rate of a single userin Fig. 4. At any time , the increase in average rate is dueto resources allocated to that user, while the decay is due tothe exponential averaging when no resources are allocated. Wecan see that the greedy utility maximization scheme dominatesthe equal resource scheme—this is because the equal resourcescheme does not take advantage of (a) multiuser diversity by al-locating more resources to users which have strong channels atany given time, and (b) the knowledge of difference in the co-efficients ’s in the sum utility function. Also, for most of thetime, the greedy utility maximization scheme has a higher av-erage rate than that for the asymptotically optimal bandwidthallocation scheme. This is because the asymptotically-optimalbandwidth allocation scheme allocates resources to only a singleuser at a time and the resource allocations for a given user areseparated by larger times.

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

Page 10: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

982 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010

Fig. 4. Evolution of single user’s average rate for three different resource allo-cation schemes.

VI. DISCUSSION: COMPARISON WITH OTHER COMPUTATIONAL

METHODS

Many resource allocation problems in wireless networks areeither convex or can be approximated by convex problems (e.g.,[25], [26], and [40]). While a general interior point method canbe used to solve these problems, in many cases it is possible toexploit the structure of the optimization problem to obtain fastand/or distributed algorithms. Next, we compare our approachwith two other such approaches.

A. Dual Subgradient Method

The subgradient method (applied to the dual) can also beused to solve the optimization problem (1) (see [23] for sucha method for CDMA systems). Such a method has an economicinterpretation where the dual variables act as prices for vio-lating constraints [7]. However, the rate of convergence of thismethod is highly dependent on the various condition numbersin the problem, and it will typically converge much more slowlythan the algorithm presented here. Moreover, each iteration ofthe subgradient method also has complexity, which is thesame as that for our method. Unlike the subgradient approach,the fast convergence of our method enables it to be used forfading channels, as the number of iterations required for recon-vergence after a warm start is small. However, we note that thesubgradient method can be used to derive (typically slow) dis-tributed algorithms for resource allocation problems in an adhocwireless network (e.g., [27]), or the Internet [7]; for such prob-lems exploiting the structure in the computation of the Newtonstep is typically not possible. Dual decomposition, primal de-composition, or joint primal-dual decomposition can be used(e.g., [14]).

B. Waterfilling

For the special case of log-utility functions, a waterfilling al-gorithm can be obtained to solve the problem (1), where duringeach iteration, we adjust a dual variable and recompute and

. This is similar to the waterfilling algorithm to compute thecapacity of a wireless channel—see, for example, [39, Ch. 4].

While this might appear to be a better algorithm, the complexityof this method is quite similar to the complexity of the barriermethod described in this paper. In both algorithms: 1) each iter-ation has a cost that is ; 2) around 10–25 or so steps areneeded to solve the problem; and 3) a good initial conditiongives convergence within fewer steps. We also note that the wa-terfilling approach can be used to solve the problem in [23].

VII. CONCLUSION

In this paper, we derived an efficient optimization algorithmto compute the optimal resource allocation in the downlink ofan OFDM wireless cellular network. We showed that our algo-rithm converges to the optimal solution and has a complexityof for users. Numerical results show that our algorithmconverges very fast in practice. Thus, our algorithm can beimplemented in an online manner even for OFDM networkswith high-resource granularity. Extension to frequency selec-tive fading and an application to scheduling algorithms withmemory are also discussed.

APPENDIX

Proof [Lemma 1]: Suppose is a sequence of pointsin converging to . Now suppose is such that

, and . Then we haveand hence also tends to infinity, contradicting the as-sumption that .

Proof [Lemma 2]: If then we aredone. Suppose not, and let . For define

by

ifotherwise.

Then for all . Also define by

ifotherwise

where and . For sufficiently large we havefor all

Pick such a . Hence

and therefore for sufficiently small

and hence for sufficiently small we haveand hence . Now we have

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

Page 11: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

MADAN et al.: FAST ALGORITHMS FOR RESOURCE ALLOCATION INWIRELESS CELLULAR NETWORKS 983

Now if , as we have

and if then as

Hence for sufficiently small

as desired.Proof [Lemma 3]: If then we are

done. Suppose not, and let . Defineby

if

otherwise.

Then and . For any we have

if

If then for some we have and hence. Also clearly if then .

Now for define by

if andotherwise.

Since is continuous, there exists sufficiently small sothat . Pick such an . Then since is increasingwe have

Now either and , in which case the proof is com-plete, or there is some such that . In thiscase the conditions of Lemma 2 hold, and this then gives thedesired result.

Proof [Lemma 4]: is strictly feasible by assumption.Now we use induction to prove the lemma.

Consider iteration , and assume thatis strictly feasible. Denote the Newton step by .Now, let be the minimum value of such that for some , wehave or , or

. Thus, is the minimum value offor which is not strictly feasible.We claim that as , ,i.e., the step length returned by the line search algorithm is lessthan , which implies that the th iterate is strictly feasible.

Note that and are finite for all. Now assume that . Then is upper

bounded. Similarly andare upper bounded for all . Also,

is upper bounded by 1. Hence, it follows from the def-inition of that that as ,

, as claimed above.Proof [Lemma 5]: For all , . By the

above lemma, all iterates are strictly feasible. Since forall , the s are bounded above by 1, which impliesthat is bounded above. Also, forall , i.e., is bounded above by zero.Since is an increasing function of the s and decreasingfunction of the s, and for all , it follows that

s are bounded above by a constant for all . This alsoimplies that is bounded above by some for .

Now, we show that s and s are bounded away from zerofor all . To see this, first note that , ,

, and are all bounded above for all. Thus, it follows that as or

for any . Then, the claim follows since the Newtonmethod is a descent method, i.e.,for any iteration .

Proof [Lemma 6]: We show that the complement of , i.e.,is open. Note that is the union of the following sets:

It is easy to see that and are open. Since, the union ofopen sets is open, it is sufficient to show thatis open. To do this, consider a point .Hence, either or or – ineach of these cases there exists an –ball around which iscontained in .

REFERENCES

[1] S. Shakkottai, T. Rappaport, and P. Karlsson, “Cross-layer design forwireless networks,” IEEE Commun. Mag., vol. 41, no. 10, pp. 74–80,Oct. 2003.

[2] L. Georgiadis, M. J. Neely, and L. Tassiulas, “Resource allocation andcross-layer control in wireless networks,” Found. Trends Netw., vol. 1,no. 1, pp. 1–144, 2006.

[3] H. J. Kushner and P. A. Whiting, “Convergence of proportional-fairsharing algorithms under general conditions,” IEEE Trans. WirelessCommun., vol. 3, no. 4, pp. 1250–1259, Jul. 2004.

[4] A. Stolyar, “Greedy primal-dual algorithm for dynamic resource allo-cation in complex networks,” Queue. Syst., vol. 54, pp. 203–220, 2006.

[5] S. Shakkottai and R. Srikant, “Scheduling real-time traffic with dead-lines over a wireless channel,” ACM/Baltzer Wireless Netw. J., vol. 8,no. 1, pp. 13–26, 2002.

[6] S. Shakkottai and A. Stolyar, “Scheduling for multiple flows sharinga time-varying channel: The exponential rule,” Amer. Math. Soc., ser.2A,, vol. 207, Memory of F. Karpelevich, pp. 185–202, 2002.

[7] F. P. Kelly, A. Maulloo, and D. Tan, “Rate control for communicationnetworks: Shadow prices, proportional fairness and stability,” J. Oper.Res. Soc., vol. 49, pp. 237–252, 1998.

[8] D. Tse and P. Viswanath, Fundamentals of Wireless Communcation.Cambridge, U.K.: Cambridge Univ. Press, 2005.

[9] J. M. Holtzman, “Asymptotic analysis of proportional fair algorithm,”in Proc. 2001 12th IEEE Int. Symp. Pers., Indoor, Mobile RadioCommun., , Sep./Oct. 2001, vol. 2, pp. F–33–F–37.

[10] S. Borst, “User-level performance of channel-aware scheduling algo-rithms in wireless data networks,” in Proc. IEEE INFOCOM, Mar.30–Apr. 3, 2003, vol. 1, pp. 321–331.

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.

Page 12: IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. …boyd/papers/pdf/fast_tdma.pdfIEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010 973 Fast Algorithms for Resource Allocation

984 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 18, NO. 3, JUNE 2010

[11] A. Stolyar, “On the asymptotic optimality of the gradient schedulingalgorithm for multi-user throughput allocation,” Oper. Res., vol. 53,pp. 12–25, 2005.

[12] J. Huang, V. G. Subramanian, R. Agrawal, and R. Berry, “Downlinkscheduling and resource allocation for OFDM systems,” in Proc. CISS,2006, pp. 1272–1279.

[13] A. Eryilmaz and R. Srikant, “Fair resource allocation in wireless net-works using queue-length-based scheduling and congestion control,”in Proc. IEEE INFOCOM, 2005, vol. 3, pp. 1794–1803.

[14] B. Johansson and M. Johansson, “Mathematical decomposition tech-niques for distributed cross-layer optimization of data networks,” IEEEJ. Sel. Areas Commun., vol. 24, no. 8, pp. 1535–1547, Aug. 2006.

[15] L. Chen, S. H. Low, M. Chiang, and J. C. Doyle, “Cross-layer con-gestion control, routing and scheduling design in ad hoc wireless net-works,” in Proc. IEEE INFOCOM, Apr. 2006, pp. 1–13.

[16] M. Andrews, K. Kumaran, K. Ramanan, A. Stolyar, R. Vijayakumar,and P. Whiting, “Scheduling in a queueing system with asynchronouslyvarying service rates,” Probab. Eng. Inf. Sci., vol. 18, pp. 191–217,2004.

[17] L. Tassiulas and A. Ephremides, “Stability properties of constrainedqueueing systems and scheduling policies for maximum throughput inmultihop radio networks,” in Proc. 29th IEEE CDC, Dec. 5–7, 1990,vol. 4, pp. 2130–2132.

[18] M. Neely, E. Modiano, and C. Rohrs, “Power and server allocationin a multi-beam satellite with time-varying channels,” in Proc. IEEEINFOCOM, 2002, pp. 1451–1460.

[19] M. Neely, E. Modiano, and C. Rohrs, “Dynamic power allocation androuting for time-varying wireless networks,” in Proc. IEEE INFOCOM,2003.

[20] S. Shakkottai and A. Stolyar, “Scheduling algorithms for a mixture ofreal-time and non-real-time data in HDR,” in Proc. ITC-17, 2001, pp.793–804.

[21] N. Chen and S. Jordan, “Throughput in processor-sharing queues,”IEEE Trans. Autom. Control, vol. 52, no. 2, pp. 299–305, Feb. 2007.

[22] N. Chen and S. Jordan, “Downlink scheduling with probabilisticguarantees on short-term average throughputs,” in Proc. IEEE WCNC,2008, pp. 1865–1870.

[23] P. Tinnakornsrisuphap and C. Lott, “On the fairness and stability ofthe reverse-link MAC layer in CDMA2000 1xEV-DO,” in Proc. IEEEGLOBECOM, 2004, vol. 1, pp. 144–148.

[24] P. Hande, S. Rangan, and M. Chiang, “Distributed uplink power controlfor optimal SIR assignment in cellular data networks,” in Proc. IEEEINFOCOM, Apr. 2006, pp. 1–13.

[25] D. O’Neill, D. Julian, and S. Boyd, “Adaptive management of net-work resources,” in Proc. IEEE Veh. Technol. Conf., 2003, vol. 3, pp.1929–1933.

[26] U. C. Kozat, I. Koutsopoulos, and L. Tassiulas, “A framework for cross-layer design of energy-efficient communication with QoS provisioningin multi-hop wireless networks,” in Proc. IEEE INFOCOM, 2004, vol.2, pp. 1446–1456.

[27] M. Johansson, L. Xiao, and S. Boyd, “Simultaneous routing and re-source allocation in CDMA wireless data networks,” in Proc. IEEEICC, 2003, vol. 1, pp. 51–55.

[28] J. Jang and K. B. Lee, “Transmit power adaptation for multiuser OFDMsystems,” IEEE J. Sel. Areas Commun., vol. 21, no. 2, pp. 171–178,2003.

[29] L. M. C. Hoo, B. Halder, J. Tellado, and J. M. Cioffi, “Multiusertransmit optimization for multicarrier broadcast channels: AsymptoticFDMA capacity region and algorithms,” IEEE Trans. Commun., vol.52, no. 6, pp. 922–930, Jun. 2004.

[30] Y. Zhang and K. Letaief, “Multiuser adaptive subcarrier and bit allo-cation with adaptive cell selection for OFDM systems,” IEEE Trans.Wireless Commun., vol. 3, no. 5, pp. 1566–1575, Sep. 2004.

[31] H. Yin and H. Liu, “An efficient multiuser loading algorithmfor OFDM-based broadband wireless systems,” in Proc. IEEEGLOBECOM, 2000, vol. 1, pp. 103–107.

[32] K. Seong, M. Mohseni, and J. M. Cioffi, “Optimal resource allocationfor OFDMA downlink systems,” in Proc. ISIT, 2006, pp. 1394–1398.

[33] “Ultra mobile broadband (UMB),” [Online]. Available: http://www.3gpp2.org/Public_html/specs/tsgc.cfm

[34] “UTRA-UTRAN long term evolution (LTE),” [Online]. Available:http://www.3gpp.org/Highlights/LTE/LTE.htm

[35] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge,U.K.: Cambridge Univ. Press, 2004.

[36] G. J. Foschini and J. Salz, “Digital communications over fading radiochannels,” Bell Syst. Tech. J., pp. 429–456, 1983.

[37] S. Wright, Primal-Dual Interior-Point Methods. Singapore: SIAM,2003.

[38] C. T. Kelley, Solving Nonlinear Equations with Newton’s Method.Singapore: SIAM, 2003.

[39] A. J. Goldsmith, Wireless Communcations. Cambridge, U.K.: Cam-bridge Univ. Press, 2005.

[40] S. Cui, R. Madan, A. J. Goldsmith, and S. Lall, “Joint routing, MAC,and link layer optimization in sensor networks with energy constraints,”in Proc. IEEE ICC, 2005, vol. 2, pp. 725–729.

Ritesh Madan received the B.Tech. degree fromthe Indian Institute of Technology (IIT) Bombay,Bombay, India, in 2001, and the M.S. and Ph.D.degrees from Stanford University, Stanford, CA,in 2003 and 2006, respectively, all in electricalengineering.

Currently, he is with Qualcomm-Flarion Technolo-gies, Bridgewater, NJ. At Stanford University, he wasa recipient of the Sequoia Capital Stanford GraduateFellowship. He has held visiting research positionsat Mitsubishi Electric Research Labs (MERL), Cam-

bridge, MA, and at the Tata Institute of Fundamental Research (TIFR), Mumbai,India. His research interests include wireless networks, convex optimization,networked control, and dynamic programming.

Stephen P. Boyd (S’82–M’85–SM’97–F’99) re-ceived the A.B. degree in mathematics from HarvardUniversity, Cambridge, MA, in 1980, and the Ph.D.degree in electrical engineering and computer sci-ence from the University of California, Berkeley, in1985.

In 1985, he joined the faculty at Stanford Univer-sity, Stanford, CA, where he is currently the SamsungProfessor of Engineering and a Professor of electricalengineering in the Information Systems Laboratory.His current research focus is on convex optimization

applications in control, signal processing, and circuit design.

Sanjay Lall (S’92–M’96–SM’09) received the B.A.degree in mathematics and the Ph.D. degree in en-gineering from the University of Cambridge, Cam-bridge, U.K.

Currently, he is an Associate Professor of electricalengineering, Associate Professor of aeronautics andastronautics, and Vance D. and Arlene C. CoffmanFaculty Scholar at Stanford University, Stanford,CA. Until 2000, he was a Research Fellow at theCalifornia Institute of Technology, Pasadena, in theDepartment of Control and Dynamical Systems,

and prior to that, he was a NATO Research Fellow at Massachusetts Instituteof Technology, Cambridge, in the Laboratory for Information and DecisionSystems. His research focuses on the development of advanced engineeringmethodologies for the design of control systems which occur in a wide varietyof aerospace, mechanical, electrical and chemical systems.

Prof. Lall received the George S. Axelby Outstanding Paper Award by theIEEE Control Systems Society in 2007, the NSF CAREER Award in 2007,the Presidential Early Career Award for Scientists and Engineers (PECASE) in2007, and the Graduate Service Recognition Award from Stanford Universityin 2005.

Authorized licensed use limited to: Stanford University. Downloaded on June 29,2010 at 15:03:59 UTC from IEEE Xplore. Restrictions apply.