Qos-Based Power Allocation For Cellular Networks Using Matlab
Qos-Based Power Allocation For Cellular Networks Using Matlab
using MATLAB
by
Ahmed Abdelhadi
University of Houston
Table of Contents
List of Figures iv
Chapter 1. Introduction 1
1.1 Motivation, Background, and Related Work . . . . . . . . . . . 1
1.2 Users’ Utilities of Different CQIs . . . . . . . . . . . . . . . . . 3
Bibliography 13
ii
List of Tables
iii
List of Figures
iv
Chapter 1
Introduction
This article presents the MATLAB code for the simulation results in [1]. We
first start with a concise background on the motivation of the problem and pro-
vide relevant references on the topic. We follow this by presenting MATLAB
Simulation code and results of [1].
1
in [61,62] and weighted fair queuing (WFQ) shown in [63,64] for delay-tolerant
traffic. Real-time traffic is addressed in [65] and optimality is shown in [66,67]
using convex optimization [68] and the corresponding sensitivity analysis is
shown in [69]. Extensions to include LTE resource blocks are shown in [70–72]
while users with multi-applications in [73–75].
The utilization of federal spectrum for commercial uses was recommended
by the President’s Council of Advisers on Science and Technology (PCAST)
[76], e.g. radar band [77, 78] can be utilized by commercial mobile networks
[79, 80] to increase QoE [81–84] with interference mitigation techniques [85–
87]. The system of choice is the multiple input multiple output (MIMO)
radars [88–97] which outperforms phased-array radars [88–90] in waveform
degrees of freedom making it more suitable for co-existence scenarios with
MIMO communications networks [98–102]. The advantage of spatial diversity
in MIMO radar [103–114] enhances the throughput gain when co-existing with
MIMO communications networks [115–120].
Wireless communication networks benefit from the co-existence scenario with
improvements in throughput and QoE for delay-tolerant traffic [121–124] and
real-time traffic [125–129] in various communications settings [130–132]. Wire-
less allocations algorithms developed to enhance QoE are shown in [133, 134]
applying optimization techniques in [135–141]. Other prior non-convex op-
timization techniques are shown in [142–146]. Spectrum sharing scenarios
between radar and communications networks discussed in [147–150] are ad-
dressed in [151–153].
Emerging wireless technologies encompass Machine-to-Machine (M2M) com-
munications scenarios due to the various applications of M2M, e.g. industrial
automation, smart homes and power systems [154–157]. Technology specific
schedulers such as weighted round robin, deficit round robin, weighted fair
scheduling, and throughput-optimal maximum weight scheduler [158–161] are
applicable to LTE [162, 163]. However, the resource allocation techniques dis-
cussed here are more generic and hence applicable to various emerging M2M
applications as shown in [164, 165].
The resource allocation method shown in [1] and the code presented in the
next section are applicable to many systems, e.g. ad-hoc networks [166–173],
2
M2M communications in [174–176], Internet of Things (IoT) [177–179], multi-
cast networks [180, 181], smart power systems [182, 183] and WiFi networks
[184–189].
3 PT = 40/15; % W; 46dBm
4 alpha = 3.5;
5 d = 1:500; %m
6 snr_dist = SNRDist(PT, d, alpha);
7
3
Table 1.1: Utility parameters [1]
CQI Code Rate
Index Modulation X 1024 Efficiency a b
1 QPSK 78 0.1523 0.8676 6.2257
2 QPSK 120 0.2344 0.8761 6.1657
3 QPSK 193 0.3880 0.8466 6.3812
4 QPSK 308 0.6016 0.8244 6.5526
5 QPSK 449 0.8770 0.8789 6.1467
6 QPSK 602 1.1758 1.0188 5.3029
7 16QAM 378 1.4766 0.5077 9.8303
8 16QAM 490 1.9141 0.6086 8.1999
9 16QAM 616 2.4063 0.7524 6.6333
10 64QAM 466 2.7305 0.3697 12.5005
11 64QAM 567 3.3223 0.4722 9.7873
12 64QAM 666 3.9023 0.6248 7.3974
13 64QAM 722 4.5234 0.8376 5.5177
14 64QAM 873 5.1152 1.1510 4.0153
15 64QAM 948 5.5547 1.6471 2.8058
and the function SNRDist used is shown below. This function calculates the
power limit for users at different distances in different modulations where PT
is the total power in dBm, d is the distance and the carrier frequency is 800
4
20 CQI =15
CQI =14
CQI =13
15
CQI =12
CQI =11
10 CQI =10
SNR (dB)
CQI =9
CQI =8
5
CQI =7
CQI =6
0
CQI =5
CQI =4
CQI =3
-5 CQI =2
CQI =1
-10
0 50 100 150 200 250 300 350 400
Distance (m)
MHz.
In MATLAB:
1 function snrdB = SNRDist(PT, d, alpha)
2
3 Pr_w = PT*(9/64)./((4*pi*d).ˆalpha);
4 Pr_dBm = 10*log10(Pr_w*1000);%dBm
5 NoiseFlow = -97;%dBm
6 snrdB = Pr_dBm - NoiseFlow;
7
8 end
5
1
0.9
0.8
CQI = 15
Pi = 5.22 W
0.7 CQI = 1
Prob of Sucess Pkt reception
Pi = 23.24 W
0.6
0.5
0.4
0.3
0.2
0.1
0
0 5 10 15 20 25 30 35
P tx (W)
Figure 1.2: CDFs of successful packet reception of different users with different
CQIs represented by a sigmoid utlity using Table 1.1 as in [1].
6
Chapter 2
In [1] simulation, the system model consists of one base station and multi-
ple users connected to it at different distances and hence experience different
channel quality, i.e. channel quality indicator (CQI), that is represented in this
study by a sigmoid utility function as shown in section 1.2. The system model
7
is shown in Figure 2.1 where users closer to base station experience higher
CQI while those far away experience lower CQI. The power allocation aims at
maximizing the utilities, i.e. probability of successful reception, with an upper
limit on the power per user to ensure the base station can accommodate all
the users.
• The algorithms starts by users initializing the bids wi (1) and sending to
the base station.
• The algorithm exits if the difference between the current bid and previous
bid is less than a pre-specified threshold δ.
PM
wi (n)
• The price is evaluated using p(n) = i=1
PT
and sent to all users.
• The new shadow price is used to calculate the power Pi that maximizes
log Ui (Pi ) − p(n)Pi . The power is limted to the pr-specified power limi-
tation criteria as in [1].
• The new limited power value is used to compute the new bid wi (n) =
p(n)Pi (n).
In MATLAB:
8
1 global a b
2
3 load parameter_CQI.mat
4 %users
5 a = parameter_a;
6 b = parameter_b;
7 %%
8 c = (1+exp(a.*b))./(exp(a.*b));
9 d = 1./(1+exp(a.*b));
10
9
35 P_limit(i) = PowerLimit(PT, P);
36 end
37
38 w_sim(time,:) = w;
39 P_sim(time,:) = P_limit;
40 delta = min(abs(w-w_old));
41
42
43 end
44 %%
45 figure
46 plot(t_sim,w_sim,’LineWidth’,1.5);
47 ylabel(’bids sent by user’,’FontSize’,18);
48 xlabel(’Iterations’,’FontSize’,18);
49
50 %
51 figure
52 plot(t_sim,P_sim,’LineWidth’,1.5);
53 ylabel(’Power allocated for user’,’FontSize’,18);
54 xlabel(’Iterations’,’FontSize’,18);
55
56 %%
57 figure
58 for t = 1:15
59 plot(t_sim,P_sim(:,t),’Color’, rand(1,3),’LineWidth
’,2)
60 hold on
61 end
62 ylabel(’Power allocated for user’,’FontSize’,18);
63 xlabel(’Iterations’,’FontSize’,18);
64 xlim([0 54])
65
66 figure
67 for t = 1:15
68 plot(t_sim,w_sim(:,t),’Color’, rand(1,3),’LineWidth
’,2)
69 hold on
10
70 end
71 ylabel(’Bids sent by user’,’FontSize’,18);
72 xlabel(’Iterations’,’FontSize’,18);
73 xlim([0 54])
14
UE1 UE 2 UE 3 UE 4 UE 5 UE 6 UE 7 UE 8 UE 9 UE 10 UE11 UE 12 UE 13 UE 14 UE 15
12
Power allocated for user
10
2
0 10 20 30 40 50 60 70
Iterations
Figure 2.2: Power allocation for 15 users at different locations from the base
station.
11
6
UE1 UE2 UE3 UE4 UE5 UE6 UE7 UE8 UE9 UE10 UE11 UE12 UE13 UE14 UE15
5
Bids sent by user
0
0 10 20 30 40 50 60 70
Iterations
Figure 2.3: Corresponding bids by 15 users at different locations from the base
station.
12
Bibliography
[3] I. Research, “Mobile VoIP subscribers will near 410 million by 2015;
VoLTE still a long way off,” 2010.
[7] H. Ekstrom, “QoS control in the 3GPP evolved packet system,” 2009.
13
[10] S. Qaiyum, I. A. Aziz, and J. B. Jaafar, “Analysis of big data and quality-
of-experience in high-density wireless network,” in 2016 3rd Interna-
tional Conference on Computer and Information Sciences (ICCOINS),
pp. 287–292, Aug 2016.
14
[21] P. Ranjan, K. Sokol, and H. Pan, “Settling for Less - a QoS Compro-
mise Mechanism for Opportunistic Mobile Networks,” in SIGMETRICS
Performance Evaluation, 2011.
[24] I. Jung, I. J., Y. Y., H. E., and H. Yeom, “Enhancing QoS and En-
ergy Efficiency of Realtime Network Application on Smartphone Using
Cloud Computing,” in IEEE Asia-Pacific Services Computing Confer-
ence (APSCC), 2011.
15
[32] S. Blake, “An Architecture for Differentiated Services,” 1998.
16
[45] J. Andrews, A. Ghosh, and R. Muhamed, “Fundamenytals of wimax:
Understanding broadband wireless netwroking,” 2007.
[48] N. Ahmed and H. Yan, “Access control for MPEG video applications us-
ing neural network and simulated annealing,” in Mathematical Problems
in Engineering, 2004.
[50] G. Gorbil and I. Korpeoglu, “Supporting QoS traffic at the network layer
in multi-hop wireless mobile networks,” in Wireless Communications and
Mobile Computing Conference (IWCMC), 2011.
17
[54] R. Prabhu and B. Daneshrad, “An energy-efficient water-filling algo-
rithm for ofdm systems,” in IEEE International Conference on Commu-
nications (ICC), 2010.
18
[64] A. Demers, S. Keshav, and S. Shenker, “Analysis and simulation of a
fair queueing algorithm,” 1989.
19
[74] J. Lee, R. Mazumdar, and N. Shroff, “Downlink power allocation for
multi-class wireless systems,” 2005.
20
[84] H. Shajaiah, A. Abdelhadi, and T. C. Clancy, “Robust resource allo-
cation with joint carrier aggregation in multi-carrier cellular networks,”
IEEE Transactions on Cognitive Communications and Networking, vol. 4,
no. 1, pp. 53–65, 2018.
21
[92] A. Khawar, A. Abdel-Hadi, and T. C. Clancy, “MIMO radar waveform
design for coexistence with cellular systems,” in IEEE International
Symposium on Dynamic Spectrum Access Networks: SSPARC Work-
shop (IEEE DySPAN 2014 - SSPARC Workshop), (McLean, USA), Apr.
2014.
22
[101] E. Jorswieck, H. Boche, and M. Weckerle, “Optimal transmitter and
jamming strategies in gaussian mimo channels,” in Vehicular Technology
Conf. VTC 2005-Spring. IEEE 61st, vol. 2, pp. 978 – 982, May 2005.
[102] D. Peng, L. Peng, C. Yin, and G. Yue, “The spatial diversity algorithms
of carrier frequency offset synchronization for MIMO-OFDM systems,”
in Wireless, Mobile and Multimedia Networks, 2006 IET International
Conference on, November 2006.
23
[109] R. Y. X. Li, Z. Zhang, and W. Cheng, “Research of constructing method
of complete complementary sequence in integrated radar and communi-
cation,” in IEEE Conference on Signal Processing, vol. 3, pp. 1729–1732,
2012.
24
[118] L. Lightfoot, L. Zhang, and T. Li, “Performance of QO-STBC-OFDM
in partial-band noise jamming,” in Information Sciences and Systems,
44th Annu. Conf. on, pp. 1 –6, Mar. 2010.
[119] M. Han, T. Yu, J. Kim, K. Kwak, S. Han, and D. Hong, “An efficient
channel estimation algorithm under narrow-band jamming for OFDM
systems,” in Military Communications Conference. IEEE, Oct. 2006.
[126] S. Shenker, “Fundamental design issues for the future internet,” 1995.
25
[128] M. Ghorbanzadeh, A. Abdelhadi, and C. Clancy, “Centralized resource
allocation,” in Cellular Communications Systems in Congested Environ-
ments, pp. 37–60, Springer, 2017.
[133] A. Abdelhadi and C. Clancy, “An optimal resource allocation with joint
carrier aggregation in 4G-LTE,” in Computing, Networking and Com-
munications (ICNC), 2015 International Conference on, pp. 138–142,
Feb 2015.
26
[138] H. Tuy, Convex Analysis and Global Optimization. Springer Publishing
Company, Incorporated, 2nd ed., 2016.
27
[148] F. Sanders, J. Carrol, G. Sanders, and R. Sole, “Effects of radar inter-
ference on lte base station receiver performance,” 2013.
28
[157] E. Hossain, Z. Han, and H. V. Poor, Smart Grid Communications and
Networking. Cambridge University Press, 2012.
[158] J. Nagle, “On Packet Switches with Infinite Storage,” IEEE Transactions
on Communications, vol. 35, pp. 435–438, Apr 1987.
29
[167] A. Abdelhadi, Multicast networks: capacity, algorithms, and implemen-
tation. PhD thesis, University of Texas at Austin, 2011.
30
[176] A. Kumar, A. Abdelhadi, and T. C. Clancy, “A delay optimal MAC and
packet scheduler for heterogeneous M2M uplink,” CoRR, vol. abs/1606.06692,
2016.
31
[185] S. Chieochan and E. Hossain, “Wireless Fountain Coding with IEEE
802.11e Block ACK for Media Streaming in Wireline-cum-WiFi Net-
works: A Performance Study,” IEEE Transactions on Mobile Comput-
ing, vol. 10, pp. 1416–1433, Oct 2011.
32