Camera Ready TSP
Camera Ready TSP
optimization theory that provides algorithms with polynomial and decentralized (user-centric) EE power allocation policies
complexity to globally maximize fractional functions with a in a wireless network in which K transmitters (possibly) share
concave numerator and a convex denominator [16]. However, N mutually orthogonal resource blocks for data transmission.
even this powerful tool fails when interference-limited net- Unlike most previous related works, we aim at maximizing
works must be optimized. This is due to the fact that the different EE metrics while satisfying minimum rate constraints
presence of multi-user interference makes the numerator of (or quality-of-service (QoS) requirements). Moreover, we as-
EE non-concave. A common way out to this problem is to sume that the signal-to-interference-plus-noise-ratio (SINR)
rely on orthogonal or semi-orthogonal transmission schemes experienced by transmitter k at its intended receiver on re-
as well as on interference cancellation techniques (to fall back source block n takes the following general form:
to the noise-limited case). Contributions in this direction are αk,n pk,n
given in [9], [14], [15]. In [9], [15] multi-carrier networks γk,n = 2 P (1)
σk,n + φk,n pk,n + j6=k ωkj,n pj,n
are considered, and the global energy efficiency (GEE) of the
system (defined as the ratio between the sum achievable rate where pk,n is the k-th user’s transmit power over resource
and the total consumed power) is optimized using orthogonal block n, whereas αk,n , φk,n , ωkj,n are positive quantities
or semi-orthogonal subcarrier allocation schemes. In [14], that do not depend on the users’ transmit powers, but only
the authors consider a multiple-antenna system and aim to on system parameters and propagation channels. In particular,
maximize the GEE when non-linear interference cancellation αk,n and φk,n are assumed to depend only on user k’s
techniques are used. However, orthogonal interference sup- channels on resource block n, while the coefficients ωkj,n
pression schemes inevitably result in a poor resource reuse depend on the other users’ channels on resource block n. The
factor and are not practical in large networks. An alternative main motivation behind the adoption of (1) is that there exist
approach consists in handling the interference by means of several communication systems and technologies in which
heuristic solutions, typically based on the use of alternating the SINR takes this form.1 Interestingly, this is the case of
optimization techniques. Examples in this context are given some candidate technologies for 5G networks, e.g., practical
by [10] in which the minimum of the individual EEs is massive MIMO networks in which the massive amount of
maximized and also by [11], [12] where both the maximization deployed circuitry prevents the use of high-quality hardware
of GEE and of the sum of the individual EEs are considered. and thus gives rise to hardware impairments [24]. The form
While these approaches can operate in interference-limited in (1) arises also when imperfect channel state information
networks, they do not guarantee convergence and/or are not (CSI) is available due to channel estimation errors. This is
supported by strong optimality claims. Moreover, they are again a typical situation in practical massive MIMO sys-
typically tailored to the maximization of specific EE metrics. tems [25]. Other relevant examples are heterogeneous, relay-
A first attempt to provide a unified framework to tackle EE assisted interference networks (e.g. multi-cell and/or small-cell
optimization problems in a centralized way is given in [13], relay-assisted MIMO networks [26], multi-cell and/or small-
where polynomial-time algorithms to optimize the GEE as cell orthogonal frequency division multiple access (OFDMA)
well as the sum and product of the individual EEs are provided. networks [20]), and relay-assisted D2D networks [27]. Fi-
As for EE maximization through decentralized solutions, nally, other well-established communication technologies are
in [17] the authors study the Nash equilibrium problem for a also included, such as ultra wide-band systems [28], or,
group of players aiming at maximizing their own EE while sat- generally, transmissions affected by inter-symbol interference
isfying power constraints in single and multi-carrier systems, and frequency-selective fading [29]. In Section II-C we will
similarly to what was done in [18] for rate maximization. A describe in detail some examples of communication systems
quasi-variational inequality approach is taken in [19], where using candidate 5G wireless technologies, in which the SINRs
power control algorithms for networks with heterogenous users take the form in (1).
are developed. In [20], [21] a similar problem is considered,
with regard to relay-assisted systems, whereas single-user C. Contributions and paper outline
multiple-input multiple-output (MIMO) systems are consid-
The major contributions of this work are as follows:
ered in [22]. However, all of these previous works do not
account for rate requirements, and so the resulting users’ rates • A unified framework for EE optimization is developed
at the equilibrium could be fairly low. Incorporating target for both centralized and decentralized networks with rate
rates changes the setting drastically since any user’s admissible and power constraints in which the users’ SINRs take the
power allocation policy depends crucially on the policies of more general expression in (1). This allows encompassing
all other users. First results in this context are provided in [23] some of the emerging technologies for 5G.
wherein Nash equilibria are found to be the fixed points of a • The maximization of the GEE as well as of the mini-
water-filling best-response operator whose water level depends mum EE is considered in the network-centric case. Both
on the rate constraint and circuit power. problems are non-convex and thus hard to solve. We
first derive closed-form feasibility conditions, and then
exploit the tools of fractional programming and sequential
B. Motivation
1 Observe that (1) includes as a special case the SINR expression typically
The aim of this paper is to develop a unified framework for encountered in wireless communication systems, which can be obtained by
the analysis and design of both centralized (network-centric) simply letting φk,n = 0 for all k, n.
3
QK
convex optimization to develop centralized power control Accordingly, we call P , k=1 Pk the feasible set of p =
algorithms that are guaranteed to converge to a Karush- [pT1 , pT2 , . . . , pTK ]T ∈ RKN
+ .
Kuhn-Tucker (KKT) point of the non-convex problems
with affordable computational complexity.
• In the decentralized setting, the users in the network are A. Network-centric formulation
modeled as rational, self-organizing agents that engage
in a non-cooperative game wherein each one aims at Based on the user-centric EE metric (2), two relevant
maximizing its individual EE while targeting its own network-centric performance metrics are investigated in this
power and rate constraint. The existence and uniqueness work. The network GEE ψ is given by the system achievable
of Nash equilibrium points are studied and a fully dis- sum-rate over the total power consumed in the system:
tributed algorithm based on best-response dynamics is PK PN
proposed to reach equilibrium. k=1 n=1B log2 (1 + γk,n )
ψ, PK (6)
• The above scenarios are studied under the assumption pc + k=1 1T pk
that one or more resource blocks are employed for data PK
transmission. with pc = k=1 pc,k being the total circuit power dissipated
The remainder of this paper is organized as follows. Sec- in the network.2 Another important energy-efficient metric is
tion II introduces the signal model and formulates the EE the minimum of the weighted EEs, defined as
maximization problems from both network- and user-centric
perspectives. Moreover, Section II-C provides a detailed de- η, min wk ηk . (7)
k=1,...,K
scription of some 5G candidate technologies for which the
SINRs are expressed as in (1). The centralized and decentral- Within the above setting, the GEE maximization problem can
ized approaches for EE maximization in single-resource block be mathematically formulated as:
transmissions are analyzed in Sections III and IV, respectively. PK PN
The counterpart cases of multiple-resource blocks are studied ? k=1 B log2 (1 + γk,n )
n=1
in Sections V and VI. In Section VII the performance of the ψ = max ψ = max PK
p∈P p∈P pc + k=1 1T pk
proposed algorithms is numerically analyzed with reference to (8)
case-studies inspired to 5G technologies. Concluding remarks
are given in Section VIII. whereas the weighted minimum-EE maximization problem
can be written as:
II. E NERGY-E FFICIENCY P ROBLEM F ORMULATIONS
Consider a wireless interference network with K transmit- η ? = max η = max min wk ηk , (9)
ters, S receivers, and N available resource blocks (that might p∈P p∈P k=1,...,K
Table I
L IST OF F UNCTIONS AND VARIABLES
γk =
pik (1 − 2 )var{cH 2 H 2
ik hiik } + pik E{|cik hiik | } + iik 2
= σn2 (pr,n |cH 2 2 2
and σk,n k,n hik ,n | + σik ,n kck,n k ). We should
(23) stress that the above results apply to any interference network
in which the transmitters reach the receivers via an AF relay.
with iik given in (17). Plugging cik = ĥiik into the above
For example, the above scenario applies to relay-assisted
equation and taking into account that√in the presence of
multi-cell and small-cell networks [26], as well as to relay-
hardware impairments √ ĥiik ∼ CN (0, 1 − 2 ρiik IM ) and
assisted D2D networks [27].
h̃iik ∼ CN (0, (diik − 1 − 2 ρiik )IM ), the SINR is found
to be in the same form of (20). The above analysis can also Remark 3. Observe that in both scenarios described above,
be extended (as shown in the numerical results) to the case in the expression of the receive filters cik and ck,n impacts the
which hardware imperfections are experienced at the BS. SINR expressions through the coefficients αk , φk , ωkj and
the equivalent noise power σk2 . Therefore, any choice of the
Remark 2. An alternative approach for evaluating the SINR receive filters that does not depend on the transmit powers,
in massive MIMO systems relies on exploiting the large results in a SINR expression as in (1). This means that the
dimensions of the network. Basically, results from random developed framework can be applied to both MRC and zero-
matrix theory are used to compute an asymptotic expression forcing receivers whereas it does not readily apply to MMSE-
(known as deterministic equivalent) for (16) in the limit of based receivers as they depend on the transmit powers of UEs
K
M, K → ∞ with M ∈ (0, 1). Such a deterministic equivalent through the covariance matrix of the interference.
turns out to be in the same form of (1) and close to the effective
SINR even for a finite system [24], [30].
III. C ENTRALIZED P OWER C ONTROL IN N ETWORKS WITH
2) Relay-assisted CoMP interference network: Consider A S INGLE R ESOURCE B LOCK
the uplink of a two-hop multi-point to multi-point network
with S BSs each equipped with M antennas and using We start our analysis considering the case of a single
N subcarriers to communicate with K single-antenna UEs resource block, which, for example, models single-carrier
exploiting a single-antenna amplify-and-forward (AF) relay. systems. When N = 1, deeper analytical insights can be
(r) gained compared to the case with N > 1. In particular, the
Denoting by hk,n the channel from user k to the relay on
single-resource block scenario is analytically more tractable
subcarrier n, the received signal at the relay can be written as
and allows one to obtain necessary and sufficient feasibility
(r) √ (r)
X√ (r) conditions for the centralized energy-efficient optimization
xk,n = pk,n hk,n bk,n + pj,n hj,n bj,n + ζn(r) (24)
j6=k problems. On the other hand, only sufficient feasibility con-
ditions can be obtained in the multi-resource block setting
where bk,n is the information symbol transmitted by UE k on (Section V). This also applies to the distributed scenario in
(r)
subcarrier n and ζn ∼ CN (0, σn2 ) is the relay thermal noise. terms of more compact existence and uniqueness conditions
The total power received at the relay on subcarrier n is thus of the equilibria (Section IV). Instead, the corresponding
given by condition for the multi-resource block setting will be very
K cumbersome, and thus more difficult to handle. Moreover,
(r) 2
X
(r)
P̄n = pj,n hj,n + σn2 . (25) the techniques to be presented in this section carry over to
j=1 scenarios with N > 1, and are preparative for the more
involved multiple resource block scenario.
In order to avoid amplifier saturation, the received signal needs
(r) Setting N = 1 into (1) and (2) and neglecting the block
to be normalized by P̄n before being amplified by a factor
√ index, (8) and (9) reduce to:
pr,n and forwarded to the receivers. The signal received at PK
BS ik associated to transmitter k, over subcarrier n, is ? k=1 B log2 (1 + γk )
ψ = max ψ = max PK (28)
p∈P p∈P pc + k=1 pk
pk,n pr,n
r
(r)
yk,n = (r)
hik ,n hk,n bk,n + ik,n + wik ,n (26)
P̄n and
B log2 (1 + γk )
where hik ,n ∈ CM is the channel vector from the relay to BS η ? = max η = max min wk (29)
p∈P p∈P k=1,...,K pc,k + pk
ik on subcarrier n and ik,n ∈ CM is defined as
X r pj,n pr,n wherein p = [p1 , p2 , . . . , pK ]T ∈ RK+,
pr,n
r
(r)
ik,n = (r)
h h b
ik ,n j,n j,n + h ζ (r) (27)
(r) ik ,n n
αk pk
P̄ n P̄ n
γk = 2 P (30)
j6=k σk + φk pk + j6=k ωkj pj
whereas wik ,n ∼ CN (0, σi2k ,n IM ) is the thermal noise at
QK
and P , k=1 Pk with
receiver ik on subcarrier n. After linear reception by the filter
ck,n and upon plugging (25) into (26) the SINR takes the form Pk = {pk ∈ R+ : pk ≤ pk , log2 (1 + γk ) ≥ θk }. (31)
6
Algorithm 1 Network-centric EE maximization for N = 1 show how the generalized Dinkelbach’s procedure together
1: Test feasibility by Lemma 1. with sequential convex optimization can be successfully ap-
2: if Feasible then plied to solve (29).
3: Set i = 0 and choose any p(0) ∈ P;
(0) (0) (0) (0) To begin with, observe that the min(·) function is increasing
4: Set γ̃k = γk (p(0) ) and compute ak , bk as in (38);
5: repeat so that the inequality in (37) can be used to lower-bound the
6: i = i + 1; solution to (29) as
7: if GEE then
8:
(i−1)
Solve (41) with parameters ak
(i−1)
and bk and set η ? ≥ η̃ ? = max min wk η̃k (45)
(i) q∈Q k=1,...,K
(i) (i) qk
{qk }k
= arg max ψ̃i , pk
=2 ;
9: end if where
10: if Minimum EE then [bk + ak log2 (αk ) + ak qk ]
11:
(i) (i)
Solve (45) with parameters ak and bk and set η̃k = B −
(i) (i) (i)
qk
pc,k + 2qk
{qk }k = arg max η̃ i , pk = 2 ; h i
ak log2 σk2 + φk 2qk + j6=k ωkj 2qj
P
12: end if
(i) (i) (i)
13: Set γ̃k = γk (p(i) ) and compute ak , bk as in (38); −B (46)
14: until convergence pc,k + 2qk
15: end if and qk is still given by qk = log2 pk . Since each ratio in
(46) has a concave numerator and a convex denominator, η̃ ?
can be computed by means of the Generalized Dinkelbach’s
respectively concave5 and convex in {qk }k . Finally, the set algorithm, and the maximization of η can be tackled as in
Qk can be shown to be convex for all k. Indeed, the k-th rate Algorithm 1, whose convergence is stated in the following
constraint can be equivalently rewritten as proposition and proved in Appendix C.
X Proposition 2. Algorithm 1 monotonically increases the value
2qk (αk − γ k φk ) ≥ γ k σk2 + ωkj 2qj . (43) of η and converges to a point fulfilling the KKT conditions of
j6=k the epigraph-form representation of the original problem (29).
Since (33) must hold true, one gets (applying the logarithm Remark 4. Algorithm 1 can be straightforwardly specialized
function to both sides) to maximize the system sum rate and the minimum of the users’
! rates, since these two metrics coincide with the numerator of
2
X
qj
αk − γ k φk the GEE and with the minimum of the numerators of the users’
qk − log2 σk +
ωkj 2 +log2 ≥ 0 (44)
γk EEs, respectively.
j6=k
which turns out to be a convex constraint. As a consequence, IV. D ISTRIBUTED P OWER C ONTROL IN N ETWORKS WITH
(41) is a fractional problem which can be globally and A S INGLE R ESOURCE B LOCK
efficiently solved by means of fractional programming tools
A decentralized power control algorithm looks for the
[16], such as the Dinkelbach’s algorithm [39]. This leads to the
solution of the following coupled problems [17], [20], [23]:
general iterative procedure formulated in Algorithm 1 whose
convergence is proved in Appendix B. arg max ηk (pk , p−k ) ∀k (47)
pk ∈Pk (p−k )
Proposition 1. Algorithm 1 monotonically increases the GEE T
value and converges to a point fulfilling the KKT conditions where p−k = [p1 , . . . , pk−1 , pk+1 , . . . , pK ] is the inter-
of the original problem (28). ference vector containing all powers except user k’s, and
Pk (p−k ) is defined as in (31). This problem can be formulated
as the non-cooperative game in normal form:
C. Weighted Minimum EE Maximization
The key difference between (28) and (29) is that the G , {K, {Pk (p−k )}k , {ηk (pk , p−k )}k } (48)
objective function η in (29) involves K fractional functions where (in game theory parlance) K = [1, 2, . . . , K] is the
{ηk } rather than a single one. This makes (29) fall within set of players, Pk (p−k ) is player k’s strategy set, uk (p) =
the framework of generalized fractional programming, which ηk (pk , p−k ) is player k’s utility function. The K coupled
studies the maximization of functions of multiple ratios. In problems in (47) define the best-response dynamics (BRD)
this more general scenario, Dinkelbach’s algorithm fails, even of the game, while the solution of the k-th problem in (47) is
assuming that each ratio {ηk } has a concave numerator and a the k-th player’s best-response to the other players’ choices.
convex denominator. Instead, the problem can be tackled using More formally, let us define the best response Bk (p−k ) of
an extension of Dinkelbach’s algorithm known as Generalized player k to an interference vector p−k (or, equivalently, µk as
Dinkelbach’s algorithm (see Appendix A), which is guaranteed easily follows from (11)) as
to converge to the global solution of a max-min fractional
problem with limited complexity, provided each ratio has a Bk (p−k ) , arg max ηk (pk , p−k ) . (49)
pk ∈Pk (p−k )
concave numerator and a convex denominator [40]. Next, we
Any fixed point of the BRD is a Nash equilibrium of the game.
5 Recall that the log-sum-exp function is convex [38]. In general a non-cooperative game might admit zero, one, or
8
more equilibria, and even if one or more equilibria exist, the 2) The sets Pk (p−k ) vary continuously with p−k (in the
convergence of the BRD is not guaranteed. As a consequence, sense that the graph of the set-valued correspondence
crucial issues in the analysis of a non-cooperative game are p−k 7→ Pk (p−k ) is closed).
to establish the existence and uniqueness of an equilibrium, 3) Each user’s payoff function ηk (pk , p−k ) is quasi-concave
and whether implementing the BRD eventually yields an in pk for all p−k ∈ P−k .
equilibrium. In our scenario, answering these questions is In our setting, if the sufficient condition (50) is satisfied, then
more challenging due to the fact that, unlike regular non- the sets Pk (p−k ) are nonempty, convex,6 closed and bounded
cooperative games, not only the utility functions, but also for every p−k . Moreover, each of them varies continuously
the players’ strategy sets are mutually coupled, depending with p−k since the rate constraint log2 (1 + γk ) ≥ θk in
on the other players’ actions p−k . A similar non-cooperative Pk (p−k ) is itself continuous in p−k . Finally, following [20]
game is termed a generalized non-cooperative game, and ηk (pk , p−k ) is proved to be strictly pseudo-concave since it
more restrictive conditions have to be fulfilled for a (unique) is given by the ratio between a strictly concave and an affine
generalized Nash equilibrium (GNE) to exist and for the BRD function. Since any strictly pseudo-concave function is also
to converge. To begin with, the following result is given: quasi-concave [16], the third condition is fulfilled.
Lemma 2. If The following result shows that a unique GNE exists, and
that the BRD always converges to such point.
σk2 +
P
j6=k ωkj pj
pk ≥ γ k ∀k (50) Proposition 4. The game G admits a unique GNE point,
αk − φk γ k
which can be obtained by starting from any feasible power
then Bk (p−k ) takes the form vector {pk }K
k=1 and iteratively updating the transmit powers
n n oo according to (51).
Bk (p−k ) = min pk , max p?k , pk (51)
Proof: The proof builds upon the standard function frame-
wherein work [42], which states that a non-cooperative game admits
−1
σk2 +
P
γk γk ωkj pj a unique equilibrium (reachable by iteratively computing the
j6=k
pk (p−k ) , 1− = γk (52) players’ best-responses) provided the game admits at least
µk γk αk − φk γ k
one equilibrium and the best-response function is a standard
and function.7 Since we have already shown that the game admits
p?k , arg max ηk (pk , p−k ) . (53) a GNE (see Proposition 3), we are left with proving that (51)
pk ∈R+ is a standard function for all k. Towards this end, p?k (p−k ) is
Proof: The first part of the thesis easily follows from proved to be standard in [20, Appendix A]. As for the function
rewriting the rate constraints γk ≥ γ k (using (30)) as pk (p−k ) in (52), it is non-negative because γ k ≤ γ k , and it
also fulfills the monotonicity property because it is increasing
σk2 + j6=k ωkj pj
P
in all {pj }j6=k . As for the scalability property, take any β > 1,
pk ≥ γ k . (54)
αk − φk γ k then it holds
2
σk
Since pk ≤ pk for all k ∈ K, then
P
β + j6=k ωkj pj
pk (βp−k ) = βγ k (56)
σk2 + j6=k ωkj pj σk2 + j6=k ωkj pj αk − φk γ k
P P
γk ≥ γk . (55)
σk2 + j6=k ωkj pj
P
αk − φk γ k α k − φk γ k
< βγ k = βpk (p−k ) . (57)
Hence, if ∀k ∈ K (50) holds, then there always exists a power αk − φk γ k
pk ∈ [0, pk ] such that γk ≥ γ k is fulfilled. The last part of the Finally, since both p?k (p−k ) and pk (p−k ) are standard func-
proof follows by leveraging [20], where it is shown that for any tions, and since pk does not depend on p−k , we may conclude
given p−k , ηk is unimodal and thus admits a unique maximizer that (51) is also a standard function because both max(·) and
pk ∈ R+ . Accounting for the power and rate constraints and min(·) are increasing functions.
imposing (50) eventually yields (51).
Algorithm 2 Iterative algorithm to solve (47). V. C ENTRALIZED POWER CONTROL IN NETWORKS WITH
1: initialize i = 0 and ∀k pk [0] ∈ R+ in the feasible set MULTIPLE RESOURCE BLOCKS
2: repeat
3: for k = 1 to K do In this section, we turn our attention to the case in which
4: receive γk [i] from the serving access point each transmitter can use multiple resource blocks, i.e., N > 1.
5: compute µk [i] using (64) Differently from the case in which N = 1, the rate constraints
6: use µk [i] to update pk [i] in (63) in (8) and (9) are not in a convex form. Nevertheless, the
7: use µk [i] in (61) to run the Dinkelbach’s algorithm methodology used in Section III can be successfully extended
8: set λ?k [i] equal to the Dinkelbach’s output and update the
to find sufficient feasibility conditions and to derive low
power as:
n n oo complexity algorithms that converge to KKT points.
pk [i + 1] = min pk , max πk (λ?k [i]) , pk [i]
A. GEE maximization
9: end for
10: update i = i + 1 Following the same steps of Section III-B, we leverage the
11: until convergence lower bound in (37) to obtain
K X
X N
B [bk,n + ak,n log2 (αk,n ) + ak,n qk,n ]
and k=1 n=1
r ψ ≥ ψ̃ = K X
N
−
4Bµk
X
qk,n
gk (x) , γ 2k + (1 + γ k ) (59) pc + 2
x k=1 n=1
with µk and γ k given by (11) and (12), respectively. K X
X N X
2
Lemma 3. For any given p−k (or, equivalently, µk ), the B ak,n log2 σk,n +φk,n 2qk,n + ωkj,n 2qj,n
k=1 n=1 j6=k
solution to (53) is found to be (65)
−1 K X
N
νk (λ?k ) νk (λ?k )
X
qk,n
? ?
pk = πk (λk ) , 1− (60) pc + 2
µk γk k=1 n=1
where λ?k is obtained through the Dinkelbach’s algorithm as with qk,n = log2 pk,n . Although the numerator and denom-
the solution of the following equation: inator of ψ̃ in (65) are again jointly concave and convex in
{qk,n }k,n (as in the case of a single resource block), the rate
Blog2 (1 + νk (λ?k )) − λ?k (pc,k + πk (λ?k )) = 0. (61) constraints in (8) are not in a convex form yet, due to the sum
Proof: The proof is given in Appendix D. over the multiple resource blocks. To overcome this issue, we
Denote by pk [i] the transmit power of the k-th player at the resort to the same trick and lower-bound the LHS of the rate
i-th iteration step. By virtue of Proposition 4 and Lemma 3, constraint by the concave function,
it follows that an iterative algorithm operating according to N
X N
X
n n oo log2 (1 + γk,n ) ≥ [bk,n + ak,n log2 (αk,n ) + ak,n qk,n ]
pk [i + 1] = min pk , max πk (λ?k [i]) , pk [i] (62) n=1 n=1
N
where pk [i] is computed as (using (52)) X
2
X
− ak,n log2 σk,n +φk,n 2qk,n + ωkj,n 2qj,n = R̃k .
γk γ k −1
n=1 j6=k
pk [i] = 1− (63)
µk [i] γk (66)
converges to the unique GNE of G, with µk [i] being the Finally, we may write
equivalent channel gain in (11) at the i-th iteration step. The ψ ? ≥ ψ̃ ? = max ψ̃ (67)
pseudo-code is reported in Algorithm 2. q∈Q
Algorithm 3 Network-centric EE maximization for N > 1 conditions as in Section III can in principle be derived if per-
1: Set i = 0 and choose a starting point p(0) ; resource-block QoS constraints are considered. This amounts
(0) (0) (0)
2: For any k and n, set γ̃k,n = γk,n (p(0) ) and compute ak,n and to enforcing log2 (1 + γk,n ) ≥ θk,n with θk,n being such that
(0) PN
bk,n as in (38); n=1 θk,n = θk , for all k, with {θk }k given target rates.
3: if (67) or (71) is unfeasible then
4: break
5: end if VI. D ISTRIBUTED P OWER C ONTROL IN N ETWORKS WITH
6: repeat M ULTIPLE R ESOURCE B LOCKS
7: i = i + 1;
8: if GEE then As done for the single resource block case, we define
(i−1) (i−1)
9: Solve (67) with parameters ak,n and bk,n and set γ k,n h x i +
(i) (i) q
(i) νk,n (x) , 2µk,n + γ k,n − gk,n (x) (72)
{qk,n } = arg max ψ̃i , pk,n = 2 k,n ; 2µk,n B
10: end if
11: if Minimum EE then and
(i) (i)
Solve (71) with parameters ak,n and bk,n and set
r
12: 4Bµk,n
γ 2k,n +
(i) (i)
{qk,n } = arg max η̃ i , pk,n = 2 ;
(i)
qk,n gk,n (x) , 1 + γ k,n . (73)
x
13: end if
14:
(i) (i) (i)
γ̃k,n = γk,n (p(i) ) and compute ak,n and bk,n as in (38); Let us also define pk as the power vector minimizing the
15: until convergence transmit power while satisfying the rate constraints. Mathe-
matically, we have that:
pk , arg max 1T pk (74)
pk ∈RN
B. Weighted minimum EE maximization +
N
A similar approach as in Section V-A can be used to solve subject to
X
log2 (1 + γk,n ) − θk ≥ 0
(9). In particular, exploiting the fact that the min(·) function n=1
is increasing, using (37), and setting pk,n = 2qk,n allows us
from which (using the same arguments of Appendix D) one
to lower-bound η as
gets:
η≥ min wk η̃k = η̃ (69) pk,n = πk,n (λk ) ∀n (75)
k=1,...,K
Pf
8:
9: set λ?k [i] equal to the Dinkelbach output and update the
power as: 0.4
n n oo
pk,n [i + 1] = min pk,n , max πk,n (λ?k [i]) , pk,n [i] 0.3
R = 15%
0.2
10: end for R = 20%
11: update i = i + 1 0.1 R = 25%
12: until ∀k, n pk,n [i] = pk,n [i − 1] R = 30%
0
-40 -35 -30 -25 -20 -15 -10
P [dBW]
is provided in the following proposition (see Appendix E for
the proof), thus ensuring the existence and uniqueness of a Figure 1. K = 5; M = 50; τ = 10−2 . Probability of feasibility Pf versus
GNE for G when N > 1, and the convergence of the BRD. P with minimum per user-rate constraints: (a) R = 15%; (b) R = 20%;
(c) R = 25%; (d) R = 30%.
Proposition 7. The EE game G admits a unique GNE and the
BRD converges to such equilibrium whenever, for all k
K XN
hardware impairments are present at the UEs. However, we
X h γ k,n i 2
assume that hardware impairments are present at the BS, and
sk,n 1n=` +
X
2
ωkj,n sup ξk,` < 1 (82)
j=1 n=1 µk ∈Ωk ?
gk,n we denote by BS the resulting error magnitude. As observed
`,n∈Sk
j6=k in Section II-C1, this scenario results again in an SINR as in
QN µ2 ∂(1/λ0k ) (1). Indeed, following [43] and by similar steps as in Section
where Ωk , n=1 (0, αk,n ] and ξk,` , αk,` k,` ∂µk,`
whereas II-C1, the k-th UE’s SINR is written as in (1) with
Sk? , {n = 1, . . . , N : µk,n > λ0k } and sk,n is defined as 2
αk = hH
k hk , φk = 2BS hH
k Dk hk (85)
gk,n (λ0k ) − (2 + γ k,n ) γ µk,n
sk,n , γ k,n − 0 k,n . (83) ωkj = |hH
k hj |
2
+ 2BS hH
k Dj hk (86)
2αk,n 1 + γ k,n λk αk,n gk,n (λ0k )
Similarly to the single resource block case, denote by pk,n [i] with Dj = diag({|hj (m)|2 }M 2 2 H
m=1 ) and σk = σ hk hk .
the transmit power of the k-th player over block n at the i-th All channels are generated according to the Rayleigh fading
iteration step and, accordingly, compute µk,n [i] as follows: model with path-loss model as in [44]. All UEs have the
−1 same maximum feasible power pk = P ∀k and hardware-
γk,n [i] γk,n [i] dissipated power pc,k = 10 dBm ∀k. The receive noise power
µk,n [i] = 1− (84)
pk,n [i] γk is σ 2 = F BN0 , with F = 3 dB and N0 = −174 dBm/Hz.
The minimum rate constraint θk is set as a percentage Rk %
with γk,n [i] being the SINR of transmitter k over block n
of the maximum rate that user k can achieve when pk → ∞,
measured at its intended receiver at iteration i. From the
while the other users’ powers are finite, namely:
results of Proposition 7, it follows that the iterative procedure
illustrated in Algorithm 4 converges to the unique GNE of G,
Rk Rk αk
and can be implemented in a fully decentralized fashion. θk = log2 (1 + γ k ) = log2 1 + (87)
100 100 φk
Table II
K = 5; M = 50; τ = 10−2 . AVERAGE NUMBER OF REQUIRED ITERATIONS TO REACH CONVERGENCE VERSUS Pmax FOR : ( A ) A LGORITHM 1 FOR GEE
MAXIMIZATION WITH R = 20%; ( B ) A LGORITHM 1 FOR GEE MAXIMIZATION WITH R = 0%; ( C ) A LGORITHM 2 FOR DISTRIBUTED RESOURCE
ALLOCATION WITH R = 20%; ( D ) A LGORITHM 2 FOR DISTRIBUTED RESOURCE ALLOCATION WITH R = 0%.
300 250
250
200
200
150
[Mbit/J/user]
[Mbit/J]
150
100
100
Figure 2. K = 5; M = 50; τ = 10−2 . Average achieved GEE versus P Figure 3. K = 5; M = 50; τ = 10−2 . Average achieved minimum users’
for: (a) Algorithm 1 for GEE maximization with R = 20%; (b) Algorithm 1 energy efficiency versus P for: (a) Algorithm 1 for Min-EE maximization
for GEE maximization with R = 0%; (c) sum-rate maximization by adapted with R = 20%; (b) Algorithm 1 for Min-EE maximization with R = 0%;
Algorithm 1; (d) Maximum transmit power allocation. (c) Min-rate maximization by adapted Algorithm 1.
R = 0%; (c) Algorithm 1 specialized to maximize the sum- whereas it increases to 2.35 [bit/s/Hz/user] when scheme (a)
rate; (d) Maximum power allocation, i.e. pk = P for all k, is used.
considered as a baseline scheme. In scheme (a), if the problem Similar considerations can also be made when Algorithm 1
turns out to be unfeasible, the QoS constraint is relaxed and is used to maximize the minimum of the users’ EEs. Fig.
the solution from scheme (b) is taken. For low values of P , 3 compares the minimum EE (with wk = 1 for all k)
this circumstance is very frequent, and indeed schemes (a) and versus P , achieved by: (a) Algorithm 1 with R = 20%; (b)
(b) perform similarly. At the same time, schemes (b) and (c) Algorithm 1 with R = 0%; (c) min-rate maximization by
also perform similarly for low P , thus suggesting that in this adapted Algorithm 1. The results show a similar behavior as
range of P , GEE and sum-rate maximization are equivalent. for Fig. 2.
Instead, different performance are achieved for larger values Fig. 4 compares the GEE performance of the centralized
of P . Indeed, increasing P eventually allows attaining the Algorithm 1 and of its distributed counterpart Algorithm 2 for
peak of the GEE. At this point, the GEE achieved by scheme R = 0% and 20%. We observe that, while the centralized
(b) remains constant, as using the excess transmit power scheme suffers a little performance gap in terms of GEE
would only decrease the GEE. Indeed, the GEE achieved when QoS constraints are introduced, having minimum rate re-
by scheme (c) decreases, because this scheme makes use of quirements causes a larger GEE degradation in the distributed
the excess transmit power to maximize the sum-rate. Instead, scenario, especially for increasing P . This is expected because
scheme (a) strikes a balance between these two extremes. unlike the centralized scheme, in the distributed setting the
Some of the excess power is used to fulfill the QoS constraints, interference among the users is not jointly managed, which
which results in a slightly lower GEE. However, once the results in high multi-user interference, especially for large P .
constraints are met, the transmit power is not further increased Table II shows the average number of iterations required by
and the achieved GEE keeps constant. We remark that this Algorithms 1 and 2 to converge when R = 0% and R = 20%.
slight reduction of the GEE grants a higher minimum rate. Convergence is declared when kq(i) − q(i−1) k2 /kq(i) k2 ≤
In particular, in the saturation region of the GEE, the average 10−4 . It is seen that both algorithms converge after a small
minimum rate granted by scheme (b) is 1.6 [bit/s/Hz/user], number of iterations, which slightly increases for larger values
13
350
220
300 200
180
250 160
140
200
120
[Mbit/J]
[Mbit/J]
100
150
80
Figure 4. K = 5; M = 50; τ = 10−2 . Average achieved GEE versus P Figure 5. K = 3; N = 16, M = 3. Average achieved GEE versus P for:
for: (a) Algorithm 1 for GEE maximization with R = 20%; (b) Algorithm 1 (a) Algorithm 3 for GEE maximization with R = 20%; (b) Algorithm 3 for
for GEE maximization with R = 0%; (c) Algorithm 2 for distributed resource GEE maximization with R = 0%; (c) Algorithm 4 for distributed resource
allocation with R = 20%; (d) Algorithm 2 for distributed resource allocation allocation with R = 20%; (d) Algorithm 4 for distributed resource allocation
with R = 0%. with R = 0%; (e) sum-rate maximization
. by adapted Algorithm 3
that the centralized algorithms have a polynomial complexity Definition 1 (Fractional program). Let C ⊆ Rn be a convex
in each stage. This makes them of affordable complexity. set, and consider the functions f : C → R and g : C → R+ .
2) Decentralized Algorithms: As for the distributed case, A fractional program is the optimization problem
a similar analysis can be performed since the proposed al-
f (x)
gorithms consist of an outer loop, which requires to solve max . (88)
x∈C g(x)
at each stage K fractional problems with N variables and 2
constraints. Following the above arguments, we can state that Proposition 8 ([39]). An x∗ ∈ C solves (88) if and only if
the algorithms have a polynomial complexity in each stage. x∗ = arg maxx∈C {f (x) − λ∗ g(x)}, with λ∗ being the unique
Observe that the complexity of each stage does not depend zero of F (λ) = maxx∈C {f (x) − λg(x)}.
on K (as in the centralized case) but only on the number of
This result allows us to solve (88) by finding the zero of
resource blocks N and on the number of constraints (which
F (λ). An efficient algorithm to do so is the Dinkelbach’s
is two). The parameter K only scales the complexity of each
algorithm [39], reported in Algorithm 5 for the reader’s conve-
iteration in a multiplicative way.
nience. If f (x) and g(x) are concave and convex, respectively,
VIII. C ONCLUSION then the Dinkelbach’s algorithm requires to solve one convex
problem in each iteration.9 Moreover, the convergence rate of
In this paper, we have proposed a framework to develop
Dinkelbach’s algorithm is known to be super-linear [39].
centralized and decentralized power control algorithms for
EE optimization in wireless networks. Unlike most previous
Algorithm 5 Dinkelbach’s algorithm
related works, we have considered rate constraints and a more
Set ε > 0; λ = 0;
general SINR expression so as to encompass emerging 5G repeat
technologies. The resulting optimization problems have been x∗ = arg maxx∈C {f (x) − λg(x)}
tackled by an interplay of fractional programming, sequential F = f (x∗ ) − λg(x∗ );
convex optimization, and game theory. This has allowed us λ = f (x∗ )/ g(x∗ );
to derive centralized algorithms achieving first-order optimal until F ≤ ε
points of the GEE and of the minimum of the users’ EEs,
and to develop decentralized algorithms that have been shown A considerable extension of (88) is to consider the maxi-
to converge to the GNE of the associated game. The analysis mization of the minimum of a set of ratios {fi (x)/gi (x)}Ii=1 .
above has been performed in the case in which a single or This problem is usually referred to as generalized fractional
multiple resource blocks are used for transmission. Numerical programming, and has been first studied in [40], wherein an
results have been used to corroborate the theoretical results. optimization procedure is provided, based on a modification
For this purpose, two case-studies have been considered: a of Dinkelbach’s algorithm. Specifically, the auxiliary function
hardware-impaired massive MIMO network and a multi-cell to be considered is F (λ) = min1≤i≤I {fi (x) − λgi (x)}, and
multi-carrier relay-assisted network. the algorithm works as shown in Algorithm 6.
The numerical analysis indicates that the centralized algo-
rithms are quite robust to the enforcement of demanding rate Algorithm 6 Generalized Dinkelbach’s algorithm
constraints. Instead, the distributed algorithms are more sen- Set ε > 0; λ = 0;
sitive to rate constraints, especially for increasing maximum repeat
feasible powers, due to the lack of centralized interference x∗ = arg maxx∈C {min1≤i≤I [fi (x) − λgi (x)]};
management. Also, the centralized algorithms perform better F = min1≤i≤I {fi (x∗ ) − λgi (x∗ )};
λ = min1≤i≤I fi (x∗ )/ gi (x∗ );
than their distributed counterparts, both with and without until F < ε
rate constraints, at the expense of a higher computational
complexity and feedback requirements.
Then, if each ratio has a concave numerator and a convex
An important follow-up of this work is to analyze the
denominator, we can solve the generalized fractional problem
gap between the proposed centralized framework and the
by solving a sequence of convex problems,10 with a linear
global optimum of the GEE and minimum EE. To this end,
convergence rate [40].
an optimization framework is required, which allows one to
effectively determine the global solution of energy-efficient
optimization problems in interference-limited networks. This A PPENDIX B
is a challenging problem, which is still much open. An attempt In the i-th iteration of Algorithm 1, we solve (41) and
in this direction is taken in [46], wherein tools borrowed from compute the corresponding vector p(i) of transmit powers,
monotonic optimization theory, fractional programming, and which maximizes the lower-bound ψ̃i at the i-th iteration, as
sequential optimization are combined together to characterize given by (39), subject to the same constraints of the original
the global maximum of the energy efficiency in interference- problem (28). Then, the following chain of inequalities holds
limited wireless networks.
ψ(p(i) ) ≥ ψ̃i (p(i) ) ≥ ψ̃i (p(i−1) ) = ψ(p(i−1) ) (89)
A PPENDIX A
9 It is also required that λ ≥ 0 in each iteration. This can be shown to always
Major concepts from fractional programming are reviewed hold if the algorithm starts with λ = 0, and provided maxx f (x) ≥ 0.
here. For a more comprehensive overview, we refer to [16]. 10 Observe that the minimum of concave functions is also concave [38].
15
wherein the first inequality follows because ψ̃i is a lower- From (15), using (14) one gets ∂γk /∂pk = µk (1 − γγk )2 , from
k
bound of ψ, the second inequality follows because p(i) is the which (92) reduces to:
maximizer of ψ̃i , while the final equality holds because the 2
(i) (i) Bµk γk
parameters ak and bk in ψ̃i are such that the bound is tight 1− − λk = 0. (93)
in p (i−1)
. As a consequence of (89), the value of ψ increases 1 + γk γk
after each iteration, and the algorithm must converge because In the attempt of solving (91), let us study the properties
ψ is upper-bounded. of (93) as a function of γk . This amounts to studying
Next, let us denote by ψ̃ and p̃ the lower-bound of ψ and the fk (γk ) = 0 with fk (γk ) = Bµk γk2 − 2Bµk γ k + λk γ 2k γk +
power vector at convergence. By construction, p̃ maximizes γ 2k (Bµk − λk ). The first derivative of fk (γk ) with respect to
ψ̃ subject to the same constraints of the original problem γk is
(28), and therefore fulfills the associated KKT conditions. ∂fk (γk )
= 2Bµk (γk − γ k ) − λk γ 2k < 0 (94)
Such KKT conditions are the same as the KKT conditions ∂γk
of the original problem (28), except for the different objective
where the last inequality follows since 0 ≤ γk ≤ γ k , and
function. However, upon convergence of Algorithm 1, we have
µk ≥ 0, λk > 0, and γ k > 0. As a consequence, fk (γk ) is
ψ̃(p̃) = ψ(p̃) and ∇ψ̃(p̃) = ∇ψ(p̃), and the thesis follows.
a strictly decreasing function, which admits a solution if and
A PPENDIX C only if fk (0) ≥ 0 and fk (γ k ) ≤ 0 (with the equalities not
simultaneously active). Since fk (γ k ) = −λk γ 2k (1 + γ k ) < 0,
The first part of the proof follows along the same lines of
we need to ensure fk (0) = γ 2k (Bµk − λk ) ≥ 0. This trans-
Proposition 1. As for the KKT conditions, we remark that in
lates into Bµk ≥ λk . By solving the second-order equation
this case we can not directly consider the KKT conditions of
fk (γk ) = 0, one gets γk = νk (λk ) where νk (x) is defined in
(29), because the objective of (29) is not differentiable. We
(58). Plugging γk = νk (λk ) into (14) yields (60).
can remove the non-differentiability by expressing (29) in its
equivalent epigraph form:
A PPENDIX E
max t subject to ηk ≥ t ∀k. (90) 2
P µk,n in (11) as µk,n = αk,n /(σk,n + Ik,n ) where
Rewrite
{t∈R+ ,p∈P}
Now, let us consider a modified version of Algorithm 1, which Ik,n = j6=k ωkj,n pj,n . Using [17, Theorem 4], the GNE is
operates on (90) rather than on (29). In each iteration of this unique if k∂Ik /∂p−k k supIk ∈RN +
kBk (p−k )/∂Ik k < 1, for all
modified Algorithm 1, (37) is again used to lower-bound ηk k. with Ik = [Ik,1 , . . . , Ik,N ]T . From [17, Eq. (19)], we have
with η̃k . This amounts to solving an approximation of (90), v
u K
(i) N
with η̃k in place of ηk , and updating the parameters ak u X X
2
(i) k∂Ik /∂p−k k = t ωkj,n (95)
and bk as in Algorithm 1. Following similar arguments as
j=1,j6=k n=1
in the proof of Proposition 1, it follows that this modified s
version of Algorithm 1 converges to a point fulfilling the N P
N
2
|∂πk,n (λ0k ) /∂Ik,` | . (96)
P
k ∂Bk (p−k )/ ∂Ik k =
KKT conditions of (90), the only difference being that now the `=1 n=1
lower-bound is computed for the constraint function ηk rather
than for the objective function. However, since ηk ≥ η̃k , the Observe now that πk,n (λ0k )
> 0 when µk,n > λ0k (see
solution of the approximate problem is always in the feasible Appendix D). After lengthy computations (not shown for space
set of (90). Moreover, upon convergence, ηk and η̃k are equal, limitations), one gets
and so are their gradients. Therefore, the modified version ∂p?k,n h γ k,n i
of Algorithm 1 yields a power vector fulfilling the KKT = sk,n 1n=` + 0 ξk,` 1µk,n >λ0k (97)
∂Ik,` gk,n (λk )
conditions of (90). Observe now that replacing ηk with η̃k in
(90) yields the epigraph form of (45), i.e., the problem which where we have defined (for notational compactness) sk,n as
is solved in each iteration of Algorithm 1 by the Generalized in (83), whereas ξk,` is defined in the text of Proposition 7.
Dinkelbach’s method. Hence, Algorithm 1 and its modified Plugging (97) into the RHS of (96) yields
version (considered in this proof) converge to the same power v
uX X h γ k,n i2
allocation vector p̃, and hence the thesis. sk,n 1n=` + ξk,` (98)
u
0
t
? ?
gk,n (λk )
`∈Sk n∈Sk
A PPENDIX D
Using [8, Sect. II.A], it follows that solving the EE problem where Sk? , {n = 1, . . . , N : µk,n > λ0k }. Putting all the
(47) is equivalent to finding the root of the nonlinear function above results together, Proposition 7 follows.
Φ(λk ) = max {Blog (1 + γk ) − λk (pc,k + pk )} (91)
pk ∈R+
R EFERENCES
where λ?k ∈ R+ is such that Φ(λ?k ) = 0 and can be [1] A. Fehske, J. Malmodin, G. Biczók, and G. Fettweis, “The global
obtained through the Dinkelbach’s algorithm. Setting to zero footprint of mobile communications: The ecological and economic
the derivative of (91) with respect to pk yields: perspective,” IEEE Commun. Mag., pp. 55–62, Aug. 2011.
[2] Ericsson White Paper, “More than 50 billion connected devices,” Eric-
B ∂γk sson, Tech. Rep. 284 23-3149 Uen, Feb. 2011.
− λk = 0. (92) [3] “The 1000x data challenge,” Qualcomm, Tech. Rep.
1 + γk ∂pk
16
[4] “Reducing the net energy consumption in communications networks by [26] A. Zappone, E. A. Jorswieck, and S. Buzzi, “Energy efficiency and
up to 90% by 2020,” GreenTouch Green Meter Research Study, Tech. interference neutralization in two-hop MIMO interference channels,”
Rep., June 2013. IEEE Transactions on Signal Processing, vol. 62, no. 24, pp. 6481–
[5] D. Gesbert, S. Hanly, H. Huang, S. Shamai Shitz, O. Simeone, and 6495, December 2014.
W. Yu, “Multi-cell MIMO cooperative networks: A new look at inter- [27] Y. Pei and Y.-C. Liang, “Resource allocation for device-to-device com-
ference,” IEEE J. Sel. Areas Commun., vol. 28, no. 9, Dec. 2010. munications overlaying two-way cellular networks,” IEEE Transactions
[6] F. Boccardi, R. W. H. Jr., A. Lozano, T. L. Marzetta, and P. Popovski, on Wireless Communications, vol. 12, no. 7, pp. 3611–3621, July 2013.
“Five disruptive technology directions for 5G,” IEEE Communications [28] G. Bacci, M. Luise, H. V. Poor, and A. M. Tulino, “Energy efficient
Magazine, vol. 52, no. 2, pp. 74–80, February 2014. power control in impulse radio UWB wireless networks,” IEEE J. Sel.
[7] J. Hoydis, M. Kobayashi, and M. Debbah, “Green small-cell networks,” Topics. Signal Process., vol. 1, no. 3, pp. 508–520, Oct. 2007.
IEEE Vehicular Technology Magazine, vol. 6, no. 1, pp. 37 – 43, March [29] S. Buzzi, V. Massaro, and H. V. Poor, “Energy-efficient resource
2011. allocation in multipath CDMA channels with band-limited waveforms,”
[8] C. Isheden, Z. Chong, E. Jorswieck, and G. Fettweis, “Framework IEEE Trans. Signal Process., vol. 57, no. 4, pp. 1494–1510, April 2009.
for link-level energy efficiency optimization with informed transmitter,” [30] J. Hoydis, S. ten Brink, and M. Debbah, “Massive MIMO in the UL/DL
IEEE Trans. Wireless Commun., vol. 11, no. 8, pp. 2946 – 2957, 2012. of cellular networks: How many antennas do we need?” IEEE Journal
[9] D. W. K. Ng, E. S. Lo, and R. Schober, “Energy-efficient resource al- on Selected Areas in Communications, vol. 31, no. 2, pp. 160 – 171,
location in multi-cell OFDMA systems with limited backhaul capacity,” February 2013.
IEEE Trans. Wireless Commun., vol. 11, no. 10, pp. 3618–3631, Oct. [31] G. Bacci, E. Belmega, and L. Sanguinetti, “Distributed energy-efficient
2012. power optimization in cellular relay networks with minimum rate
[10] B. Du, C. Pan, W. Zhang, and M. Chen, “Distributed energy-efficient constraints,” in IEEE Intl. Conf. Acoustics, Speech and Signal Processing
power optimization for CoMP systems with max-min fairness,” IEEE (ICASSP), Florence, Italy, May 2014, pp. 7014 – 7018.
Commun. Lett., vol. 18, no. 6, pp. 999–1002, Jun. 2014. [32] E. Seneta, Non-negative Matrices and Markov Chains, 3rd ed. New
[11] S. He, Y. Huang, S. Jin, and L. Yang, “Coordinated beamforming York, NY: Springer, 2006.
for energy efficient transmission in multicell multiuser systems,” IEEE [33] B. R. Marks and G. P. Wright, “A general inner approximation algorithm
Trans. Commun., vol. 61, no. 12, pp. 4961–4971, Dec. 2013. for nonconvex mathematical programs,” Operations Research, vol. 26,
[12] S. He, Y. Huang, L. Yang, , and B. Ottersten, “Coordinated multicell no. 4, pp. 681–683, July-Aug. 1978.
multiuser precoding for maximizing weighted sum energy efficiency,” [34] M. Chiang, C. Wei, D. P. Palomar, D. O’Neill, and D. Julian, “Power
IEEE Trans. Signal Process., vol. 62, no. 3, pp. 741–751, Feb. 2014. control by geometric programming,” IEEE Trans. Wireless Commun.,
[13] L. Venturino, A. Zappone, C. Risi, and S. Buzzi, “Energy-efficient vol. 6, no. 7, pp. 2640–2651, Jul. 2007.
scheduling and power allocation in downlink OFDMA networks with [35] L. Venturino, N. Prasad, and X. Wang, “Coordinated scheduling and
base station coordination,” IEEE Trans. Wireless Commun., vol. 14, power allocation in downlink multicell OFDMA networks,” IEEE Trans.
no. 1, pp. 1–14, 2015. Veh. Technol., vol. 58, no. 6, pp. 2835–2848, Jul. 2009.
[36] D. Nguyen, L.-N. Tran, P. Pirinen, and M. Latva-aho, “Precoding for
[14] J. Xu and L. Qiu, “Energy efficiency optimization for MIMO broadcast
full duplex multiuser MIMO systems: Spectral and energy efficiency
channels,” IEEE Trans. Wireless Commun., vol. 12, no. 2, pp. 690 –
maximization,” IEEE Transactions on Signal Processing, vol. 61, no. 16,
701, Feb. 2013.
pp. 4038 – 4050, Aug 2013.
[15] Q. Xu, X. Li, H. Ji, and X. Du, “Energy-efficient resource allocation
[37] J. Papandriopoulos and J. Evans, “Low-complexity distributed algo-
for heterogeneous services in OFDMA downlink networks: Systematic
rithms for spectrum balancing in multi-user DSL networks,” in Proc.
perspective,” IEEE Trans. Veh. Technol., vol. 63, no. 5, pp. 2071–2082,
IEEE Intl. Conf. Commun. (ICC), Istanbul, Turkey, Jun. 2006, pp. 3270–
June 2014.
3275.
[16] A. Zappone and E. Jorswieck, “Energy efficiency in wireless networks [38] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge, UK:
via fractional programming theory,” Foundations and Trends R in Com- Cambridge Univ. Press, 2004.
munications and Information Theory, vol. 11, no. 3-4, pp. 185–396, [39] W. Dinkelbach, “On nonlinear fractional programming,” Management
2015. Science, vol. 13, no. 7, pp. 492–498, Mar. 1967.
[17] G. Miao, N. Himayat, G. Li, and S. Talwar, “Distributed interference- [40] J.-P. Crouzeix and J. A. Ferland, “Algorithms for generalized fractional
aware energy-efficient power optimization,” IEEE Trans. Wireless Com- programming,” Mathematical Programming, vol. 52, no. 1-3, pp. 191–
mun., vol. 10, no. 4, pp. 1323–1333, Apr. 2011. 207, 1991.
[18] G. Scutari, D. Palomar, and S. Barbarossa, “Optimal linear precoding [41] G. Debreu, “A social equilibrium existence theorem,” Proceedings of
strategies for wideband noncooperative systems based on game theory the National Academy of Science, vol. 38, pp. 886—893, 1952.
part I: Nash equilibria,” IEEE Trans. Signal Process., vol. 56, no. 3, pp. [42] R. D. Yates, “A framework for uplink power control in cellular radio
1230 – 1249, March 2008. systems,” IEEE J. Sel. Areas Commun., vol. 13, no. 7, pp. 1341–1347,
[19] I. Stupia, L. Sanguinetti, G. Bacci, and L. Vandendorpe, “Power control September 1995.
in networks with heterogeneous users: A quasi-variational inequality [43] E. Björnson, M. Matthaiou, and M. Debbah, “Massive MIMO
approach,” IEEE Trans. Signal Process., vol. vol. 63, no. 21, pp. 5691– with arbitrary non-ideal arrays: Hardware scaling laws and circuit-
5705, November 2015. aware design,” CoRR, vol. abs/1409.0875, 2014. [Online]. Available:
[20] A. Zappone, Z. Chong, E. Jorswieck, and S. Buzzi, “Energy-aware com- http://arxiv.org/abs/1409.0875
petitive power control in relay-assisted interference wireless networks,” [44] G. Calcev, D. Chizhik, B. Goransson, S. Howard, H. Huanga, A. Ko-
IEEE Trans. Wireless Commun., vol. 12, no. 4, pp. 1860–1871, Apr. giantis, A. Molisch, A. Moustakas, D. Reed, and H. Xu, “A wideband
2013. spatial channel model for system-wide simulations,” IEEE Trans. Veh.
[21] F. Shams, G. Bacci, and M. Luise, “Energy-efficient power control Technol., vol. 56, no. 2, March 2007.
for multiple-relay cooperative networks using Q-learning,” IEEE Trans. [45] S. Lasaulce and H. Tembine, Game Theory and Learning for Wireless
Wireless Commun., vol. 14, no. 3, pp. 1567 – 1580, Mar. 2015. Networks: Fundamentals and Applications, ser. Academic Press. Else-
[22] E.-V. Belmega and S. Lasaulce, “Energy-efficient precoding for multiple- vier, 2011.
antenna terminals,” IEEE Trans. Signal Process., vol. 59, no. 1, pp. [46] A. Zappone, E. Björnson, L. Sanguinetti, and E. A. Jorswieck, “Globally
329–340, Jan. 2011. optimal resource allocation for energy efficiency in wireless networks,”
[23] G. Bacci, E. Belmega, P. Mertikopoulos, and L. Sanguinetti, “Energy- IEEE Transactions on Signal Processing, submitted, 2015.
aware competitive power allocation for heterogeneous networks under
QoS constraints,” IEEE Trans. Wireless Commun., vol. 14, no. 9, pp.
4728 – 4742, Sept 2015.
[24] E. Bjornson, J. Hoydis, M. Kountouris, and M. Debbah, “Massive
MIMO systems with non-ideal hardware: Energy efficiency, estimation,
and capacity limits,” IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 7112–
7139, Nov 2014.
[25] E. Björnson, E. G. Larsson, and M. Debbah, “Massive MIMO for
maximal spectral efficiency: How many users and pilots should be
allocated?” IEEE Trans. Wireless Commun., 2015. [Online]. Available:
http://arxiv.org/pdf/1412.7102.pdf