power control algorithms in wireless communication

Upload: gzb012

Post on 03-Apr-2018

216 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    1/19

    Distributed Power Control Algorithms in Wireless Networking

    Project Report

    EE 359 Wireless Communications

    Winter 2009

    Jeffrey Mounzer

    Stanford University

    [email protected]

    Advisor: Professor Nick Bambos

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    2/19

    2

    Table of Contents

    Abstract .3

    1 Introduction ............................................................................................................................. 4

    2 Literature Survey ..................................................................................................................... 5

    2.1 Wireless Network Model and the Foschini-Miljanic DPC Algorithm ............................... 5

    2.2 The Backlog-Driven Distributed Power Control Approach .............................................. 7

    2.2.1 Mobile power management for wireless communication networks .................... 7

    2.2.2 Power-induced time division on asynchronous channels ..................................... 8

    2.2.3 Power-Controlled Multiple Access Schemes for Next-Generation Wireless Packet

    Networks ................................................................................................................................ 8

    2.2.4 Distributed Backlog-Driven Power Control in Wireless Networking ................... 12

    3 Simulation of Distributed Power Control Algorithms............................................................ 13

    3.1 Simulation Design ........................................................................................................... 13

    3.2 Results ............................................................................................................................ 14

    4 Future Work ........................................................................................................................... 17

    4.1 Simulation Extensions .................................................................................................... 17

    4.2 Proving the Structural Properties of Backlog-Driven DPC ............................................. 17

    4.3 Design of Stronger DPC Algorithms................................................................................ 18

    5 Conclusion ............................................................................................................................. 18

    6 References ............................................................................................................................. 19

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    3/19

    3

    Abstract

    In wireless networks, transmitter power control can play an important role in improving a number of key

    performance parameters, including energy usage, network capacity, and network reliability. As wireless

    ad hoc networks become more prevalent, it is critical that power control algorithms operate in a

    distributed fashion, since centralized network controllers are rarely available for such systems. This

    project explores the evolution of distributed power control (DPC) algorithms over the last 15 years

    through a literature review and simulations, and it examines future research directions in this field. In

    particular, we consider the emergence of backlog-aware algorithms for DPC, which exploit the tradeoff

    between power and delay to induce cooperation between links in the network. The simulations that

    were conducted provide a comprehensive platform for the evaluation of such algorithms, which was

    largely lacking in the literature.

    Several interesting aspects of backlog-aware algorithms are highlighted by our simulation results. The

    most powerful result is a validation of the intuition that backlog-aware algorithms, by relying on

    teamwork between links, can provide significant performance gains as compared to competitive

    algorithms such as the seminal Foschini-Miljanic approach. These gains are particularly large when the

    network is under duress either when the load is too great for the links to clear their queues, or when

    the cross-link interference becomes large. In addition to presenting and discussing the simulation

    results, this work also describes the next steps in this line of research, including extending the currently-

    used simulations, overcoming difficulties in the comparison of different algorithms, mathematically

    proving the observed structural properties of backlog-aware DPC techniques, and designing better

    algorithms for future systems.

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    4/19

    4

    1 IntroductionTransmitter power control can significantly improve a number of critical performance parameters for

    wireless communication networks; it can serve to minimize energy usage, improve network capacity,

    and mitigate the effects of cross-link interference [2, 4-5]. For networks with centralized controllers(e.g., a cellular network with a base station), the power control problem is relatively simple. However,

    in ad hoc networks which lack a central regulator, power control proves to be much more difficult and

    interesting [5]. In general, it is necessary for each transmitter in an ad hoc network to regulate its own

    power autonomously (this is called distributed power control, or DPC), since centralized coordination

    between transmitters is very difficult and susceptible to such problems as having a single point of

    failure. As wireless ad hoc networks become more prevalent (for example, in wireless LAN technologies

    [5]), it is important to develop high-performance DPC algorithms to meet the challenges presented by

    future wireless systems. This report explores the evolution of DPC algorithms over the last 15 years

    through a literature review and simulations, and it examines future research directions in this field.

    The starting point for much of the research done in DPC is an algorithm proposed by Foschini and

    Miljanic [1], which describes a constant signal-to-interference ratio (SIR) approach. At its core, this

    approach is competitive each link attempts to continuously maintain its target SIR by overcoming the

    interference presented by all the other links. The later works considered in this report explore a

    fundamentally different approach in order to improve upon the Foschini-Miljanic algorithm [2-5]. The

    unifying theme of these later efforts is the power versus delay tradeoff [4], in which performance

    parameters such as throughput and power consumption are improved by allowing the SIRs of the

    various links to fluctuate and letting transmitters delay sending information when the interference is

    high. The algorithms that are based on this approach allow the links to cooperate instead of compete.

    In particular, as is shown through our simulations, networks designed using these algorithms exhibit a

    soft TDMA effect, in which the links coordinate themselves to take turns transmitting at high power,

    even though their power control algorithms are completely distributed.

    While the papers considered in our survey devote much of their effort to the design of the various DPC

    algorithms, the literature is much more sparse with regard to evaluating their performance. This

    provided the motivation for our development of a comprehensive simulation platform with which we

    can closely examine various performance parameters of DPC algorithms and compare them with each

    other. This platform, built in MATLAB, allows a large range of network parameters to be modified,

    including the number of transmitters and receivers and their spatial distributions, packet arrival rates,

    and channel models.

    For this project, three algorithms are simulated, taken from the paper by Bambos and Kandukuri

    entitled Power-Controlled Multiple Access Schemes for Next-Generation Wireless Packet Networks

    [4]. One of these algorithms is a slight modification of the basic Foschini-Miljanic algorithm, which is

    essentially competitive in nature. The other two algorithms, based on backlog-driven DPC, are more

    cooperative. Our simulations provide a much more rigorous validation of some of Bambos and

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    5/19

    5

    Kandukuris results than is presented in their paper. Furthermore, our simulations illuminate some

    important attributes of backlog-driven DPC that are not directly addressed in their results. Our key

    conclusion drawn from the simulations is that backlog-driven DPC algorithms perform significantly

    better than the Foschini-Miljanic approach when the network is under duress either when the load

    becomes very large or when the cross-link interference is high. These characteristics can be extremely

    useful for real ad hoc networks because they can prevent network failures in periods of high congestion.

    The simulation platform and associated results provide a stepping stone to future research in this area.

    Using the insight gained from our simulations, we can determine which structural properties of backlog-

    driven DPC are the most prominent and desirable, and we can move forward with both proving these

    properties mathematically and with using them to design the next generation of DPC algorithms. As we

    show, there is significant research yet to be done in this field.

    The remainder of this report is organized as follows. In Section 2, the evolution of DPC algorithms for

    wireless networks is examined through a literature review, which includes the seminal work of Foschini-

    Miljanic [1] and a subsequent series of papers that employ backlog-aware DPC approaches. Section 3

    describes the simulation that was undertaken as part of this project, including an explanation of the

    simulation design and a presentation and discussion of the results. Next, we look at future directions for

    this line of research in Section 4, and Section 5 provides some concluding remarks.

    2 Literature SurveyIn the literature survey portion of this report, we mainly consider five papers on DPC. Throughout the

    survey, our focus will be on the power control algorithms and associated results presented in these

    papers, although there are certainly many other interesting aspects that could be discussed. We begin

    with a description, based on the concise formulation in [6], of the simple network model that is used

    throughout papers in this research area, and then proceed to the seminal work of Foschini and Miljanic

    entitled A Simple Distributed Autonomous Power Control Algorithm and its Convergence [1] in Section

    2.1. After reviewing this paper, which introduces what we shall refer to as the constant SIR algorithm,

    we will proceed in Section 2.2 to briefly discuss two papers by Rulnick and Bambos [2,3] that show the

    beginning of the movement toward backlog-aware DPC. Finally, we will take a look (also in Section 2.2)

    at works by Bambos and Kandukuri [4] and by Dua and Bambos [5], both of which display the trend

    toward more sophisticated approaches to backlog-driven DPC through dynamic programming

    techniques.

    2.1 Wireless Network Model and the Foschini-Miljanic DPC AlgorithmIn order to establish a standard upon which we can compare various DPC algorithms, we begin this

    section with a description of a simple wireless network model. This model or a slight variant is used in

    all of the papers that we consider in this report, and it provides the framework for the simulations that

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    6/19

    6

    are conducted. Although it is presented in several places (see, for example, [7] Chapter 14.4), we will

    largely follow the exposition provided in [6]. Once this framework is established, we will describe the

    operation of the basic Foschini-Miljanic algorithm, which serves as a baseline metric for all of the other

    papers we will look at.

    Consider a channel in which there are N links, and let Gij be the power gain from the transmitter of linkj

    to the receiver of link i. Although the wireless channel typically exhibits path loss, shadowing, and

    multipath fading as components of this gain [7], all of the papers that we consider in this report take the

    gain to be deterministic (e.g., a function of path loss only). A commonly used measure of link quality of

    service is the SIR, which we define as

    = = (1)where Pi is the transmit power of link i and

    > 0is the thermal noise power at the receiver of link i [6].

    Lets also assume that each link has a minimum SIR threshold that must be met in order to meet itsquality of service requirements. We will see that in the Foschini-Miljanic algorithm, the objective is to

    simultaneously satisfy all of these thresholds for all links in the network, whereas for the backlog-aware

    techniques, this requirement is relaxed to achieve other performance benefits. Lets call the threshold

    for link ii. Setting up our basic equation in matrix form, the Foschini-Miljanic objective is to achieve

    (I F)P u, with P 0 component-wise, where P = (P1, P2, , PN) is the vector of transmitter powers,

    = , , , (2)is a vector of normalized noise and interference powers, and

    = for i,j {1,2,,N}, (3)where is the indicator function which equals 1 if ij and 0 if i=j [6].The matrix Fis nonnegative element-wise and irreducible, so by the Perron-Frobenius theorem, the

    maximum modulus eigenvalue ofF, F, is real, positive, and simple, and its corresponding eigenvector is

    component-wise positive. Furthermore, the existence of a vector P 0 satisfying (I F)P u is

    equivalent to F < 1 and also to the fact that (I F)-1exists and is component-wise positive [6]. If any of

    these conditions hold, then the power vector

    = ( ) (4)is the Pareto optimal solution which satisfies all the minimum SIR thresholds simultaneously [6]. By

    Pareto optimal, we mean that it is the solution which minimizes the transmit power of each user

    clearly, a desirable situation.

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    7/19

    7

    The landmark result obtained by Foschini and Miljanic can be summarized as follows: as long as there

    exists a vector under the conditions described above (equivalently, as long as F < 1), then a simpleiterative DPC algorithm for the links in the network will always result in exponentially fast convergence

    to [1]. In their own words, Foschini and Miljanic describe the algorithm as:Each user proceeds to iteratively reset its power level to what it needs to be to have acceptable

    performance as if the other users were not going to change their power level. Yet the other

    users are following the same algorithm and, therefore, are changing their power levels. [1]

    Rather remarkably, as Foschini and Miljanic go on to show, this iterative approach results in

    exponentially fast convergence to anytime such a vector exists for the overall system. In equationform, for each link, the algorithm can be written as

    ( + 1) = () ( ) (5)where we use the discrete-time index kand we recall that is the minimum SIR threshold for link i. It isimportant to observe that each link makes its power decision for the next step autonomously the nextpower level chosen is simply a function of the links individual SIR target, its current power level, and its

    own observed SIR. If there does not exist a vector which solves the equation (I F)P u accordingto the requirements above, then this algorithm will result in all of the transmitter powers diverging to

    infinity [1].

    This simple algorithm, which we shall refer to for convenience as the constant SIR algorithm (since the

    goal of the algorithm is to maintain a constant link SIR) provides an often-used baseline metric for the

    evaluation of other DPC algorithms. For our purposes in the simulations below, we use a slightly

    modified form of this algorithm (described in Section 2.2.4) to compare it with backlog-driven DPCalgorithms.

    2.2 The Backlog-Driven Distributed Power Control ApproachNow, we examine the progression from the constant SIR algorithm to more recent research in backlog-

    driven DPC by reviewing four papers ranging in publication date from 1997 to 2007. The first two of

    these papers [2,3] clearly show the beginnings of the movement toward backlog-aware DPC, while the

    later two [4,5] represent more sophisticated attempts to design backlog-driven algorithms.

    2.2.1 Mobile power management for wireless communication networksIn [2], Rulnick and Bambos address the problem of conserving energy in wireless communication

    networks. The stated objective of this work is to guarantee an average transmission rate (used here as

    the primary quality of service metric) while keeping power consumption as low as possible. They set up

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    8/19

    8

    the problem as an optimization problem, seeking a rule which minimizes energy consumption while

    maintaining a fixed transmission rate. The problem formulation assumes a single link in stationary,

    unresponsive interference. This assumption plays a significant role in determining their solution, but it

    is clearly undesirable for wireless ad hoc networks, in which it is highly likely that the interference will be

    responsive to the actions of each link (for example, this is the case in the Foschini-Miljanic formulation).

    While the authors recognize this, they proceed to use the solution that they obtain for this special case

    to suggest a distributed power control algorithm called DPMA (dynamic power management algorithm),

    and they test the results of this algorithm in a responsive interference environment. The key aspect of

    the DPMA is that the links behave aggressively (i.e., transmit at higher power) during low interference

    but back off during high interference. Although DPMA is not backlog-aware, we mention it because this

    type of behavior is a general characteristic of the backlog-driven DPC algorithms that we will consider,

    and it shows a marked difference in approach from the constant SIR algorithm we discussed above.

    Perhaps most significantly, this paper relaxes the requirement for a constant minimum SIR and allows

    the SIRs to fluctuate this flexibility is a core element of the later backlog-driven DPC algorithms. It

    should be noted that there are hard-delay-constrained applications, such as voice, for which it is

    important to maintain a constant minimum SIR, and accordingly approaches which allow the SIR to

    fluctuate are perhaps less useful in these cases. However, for many modern and emerging wireless

    networks, data traffic is extremely important, and data-driven applications are not as constrained as

    voice in terms of delay therefore, the backlog-driven algorithms we examine have a high level of

    applicability for real systems.

    2.2.2 Power-induced time division on asynchronous channelsTwo years after [2] was published, Rulnick and Bambos authored a paper entitled Power-induced time

    division on asynchronous channels [3], which builds on the work in [2] and explicitly introduces the idea

    of backlog-sensitive power management. In this work, the authors explore how distributed power

    control methods can induce TDMA-like behavior in a wireless network a feature that is prominently

    displayed in the algorithms we consider later in this report. This paper captures the essence of the

    backlog-driven DPC problem, which can be summed up as: is it possible to induce the links in a wireless

    network to cooperate with each other instead of compete against each other through a fully distributed

    algorithm, so as to achieve better overall network performance? The authors proceed to design a

    backlog-sensitive DPC algorithm, which they call modified DPMA, and although the algorithm does not

    perform particularly well, they show that it has promise as a method to induce TDMA-like effects in a

    wireless network [3].

    2.2.3 Power-Controlled Multiple Access Schemes for Next-Generation Wireless PacketNetworks

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    9/19

    9

    The next paper we consider is [4], which provides the basis for the simulations conducted in this project.

    The DPC algorithms presented in this work are the first that we have looked at that can truly be

    described as backlog-driven. The authors use a dynamic programming approach to look at thepower

    vs. delay dilemma [4], which they describe in the following manner. In a wireless packet communication

    network, when a transmitter observes high interference in the channel, it realizes that it will require

    high power in order to overcome the interference and successfully transmit a packet to its receiver.

    Accordingly, it might consider backing off and waiting to transmit until the interference is lower, while

    buffering its incoming traffic basically trading off increased delay for reduced power. However, when

    it has backed off, its buffer begins to fill up, putting pressure on the transmitter to be aggressive in order

    to rapidly reduce its backlog trading off increased power for reduced delay [4].

    The authors method for designing backlog-driven DPC algorithms begins by using dynamic

    programming to find an algorithm which minimizes the average overall incurred cost when a single

    communication link operates in a channel with extraneously driven random interference (the same basic

    idea used in [2], as we described above). The overall cost which they attempt to minimize is composed

    of a power cost and a backlog cost, which are increasing functions of the link power and backlog,

    respectively. They proceed to solve for the optimal power which minimizes this overall cost for different

    functional forms of the probability of a successful transmission within a time slot. Then, they leverage

    the observed structural properties of these solutions to design backlog-driven DPC algorithms. Their key

    observations are that under low interference, it is effective to transmit and thereby reduce the

    backlog/delay cost by incurring a moderate power cost. However, as the interference goes up, the

    probability of a successful transmission decreases, and it becomes preferable to incur some delay cost to

    avoid an excessive power cost. Interestingly, they observe that this tradeoff process is ubiquitous across

    different functional forms of the probability of a successful transmission, s(p,i), which is only constrained

    to be increasing in p (power) and decreasing in i (interference). Furthermore, as the backlog increases,

    the optimal behavior across different functional forms of s(p,i) is for the link to transmit more

    aggressively (higher power) [4].

    Although these are similar to the observations as the ones made in [2], they come from a fundamentally

    different mathematical approach (dynamic programming) to setting up and solving the problem. The

    authors use the observations they derive from the process of obtaining a solution to the extraneous

    interference case to propose two different classes of backlog-driven DPC algorithms, which we describe

    here.

    Consider a responsive interference environment with multiple links, where, for example, if a link

    increases its transmit power, the interference observed by all the other links increases. Suppose also

    that we operate in slotted time, indexed by k, and that each link can observe only its own packet queue

    (current backlog), its last transmitted power level, and the collective interference level that the entire

    network induced on it in the last time slot. A packet arrives into each links transmitter queue in each

    time slot with probability (for the simulations below, we assume is drawn from a uniform [0,1]

    distribution), and packet arrivals are statistically independent of each other. In the kth time slot and for a

    particular link, let bk be the transmitter queue backlog, ik be the interference observed at the link

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    10/19

    10

    receiver, and pk be the link transmit power. Finally, let G be the power gain from the links transmitter

    to receiver [4]. Then the family of algorithms entitled PCMA-1 algorithms has each link in the network

    update its power autonomously according to the following scheme:

    = ( ) , 0. By modifying

    X(b), , and , an entire family of algorithms can be generated [4].

    The second family of algorithms presented in this work, entitled PCMA-2 algorithms, is characterized

    by the equation:

    = log () , < ( )0, ( )

    (7)

    where > 0. This family of algorithms is parameterized by X(b) and . A simulation of PCMA-2 for two

    interfering links with X(b) = b+4 and = 1 is shown in Figure 1 below. It is clear that the two links are

    taking turns using the channel, alternating between periods of high and low transmit power. This can

    be thought of as a soft TDMA type of behavior, where the links independently configure themselves to

    behave like a TDMA channel.

    Figure 1: Example Power Evolution of PCMA-2 with Two Links Showing Soft-TDMA Effect

    The authors then proceed to evaluate the performance of these two algorithms in comparison with a

    modified version of the constant SIR algorithm, which is, for each link i:

    = , > 00, = 0 (8)

    3000 3500 4000 4500 5000 5500 6000 6500 7000 750010

    20

    30

    40

    50

    60

    70

    Time

    Power

    PCMA-2 Model with Two Links

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    11/19

    11

    where we recall from above that is the minimum threshold SIR for link i and Rk is the SIR of link i attime k. We note that this algorithm does in fact depend on the backlog, but only in a trivial sense

    1.

    While the authors put much of their effort into setting up the problem and designing PCMA-1 and 2, the

    simulation that they conduct to obtain their performance evaluation is rather simplistic and leaves some

    room for doubt about the benefits of PCMA-1 and 2 in comparison to the constant SIR algorithm it isthis fact that was the major motivating factor for the simulations conducted in this project. They use a 4

    x 4 square lattice of 16 square cells with the edges wrapped around to create a torus (to avoid boundary

    effects), and each square has a single link located at its center. A packet arrives at the transmitter

    queue of each link with probability , and a packet is successfully transmitted for link n in each time slot

    with probability

    ( , ) = = (9)where again Rn is the SIR of link n at time k. For this simulation, they use ===1. Note that for the

    constant SIR algorithm (when it converges), the success probability of each link will be constant and a

    function of the minimum threshold SIR. The constant SIR algorithm target for all links is set to 1.5. The

    authors use a simple path loss model for the gains Gij, where

    = (10)and rij is the distance from the transmitter of link j to the

    receiver of link i (note that for their simulation, the

    transmitter and receiver of link i are assumed to be in the

    same location, and the gain G ii is taken to be 1) [4]. Finally,

    the function X(b) in PCMA-1 and 2 is taken to equal b+4.

    The results of this simulation are conveyed through a plot

    which shows average backlog vs. average load and is

    reproduced to the right as Figure 2. The curve that turns

    vertical the furthest to the left is for the constant SIR

    algorithm, while the other two curves are for PCMA-1 and 2.

    Although this graph is used to claim that there is a 20 percent

    improvement in throughput by using PCMA-1 and 2 (since

    they can support an average load of .5 before blowing up, as

    opposed to the average load of .4 that can be supported by

    the constant SIR algorithm), these results actually do not

    conclusively show the benefits of their proposed backlog-

    driven algorithms, for several reasons. One of the key issues

    1Note that this modification is quite practical in the case of data-driven networks, since it is unnecessary to waste

    transmit power if there is no data to be sent.

    Figure 2: Taken from [4]

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    12/19

    12

    with their claim is that the target SIR for the constant SIR algorithm appears to be strictly a function of

    the chosen link spatial distribution2, and their simulation assumes a direct relationship between the

    probability of a successful transmission and the link SIR. Therefore, changing the SIR target to a larger

    value will directly result in a shift of the constant-SIR curve to the right, potentially erasing any of their

    performance gains. Secondly, the transmitter and receiver spatial distribution is highly unrealistic, and it

    throws into doubt the broader applicability of the observed performance gains. Furthermore, the

    relative power consumption of the algorithms is completely neglected, and this parameter is obviously

    one of importance for the evaluation of backlog-driven DPC. Therefore, it was clear after an

    examination of their results that there remained significant work to be done to obtain meaningful

    comparisons of these algorithms, which led to the simulations created for this project.

    2.2.4 Distributed Backlog-Driven Power Control in Wireless NetworkingThe last paper we will briefly consider is [5], published in 2007 by Dua and Bambos. We would mainly

    like to highlight the approach taken in this paper, which is very interesting and perhaps indicative of thedirection that future work in this field will take. Once again, dynamic programming is the main

    mathematical tool used in their design of a backlog-driven DPC algorithm, but this time, the authors

    begin by considering a situation in which there are two interfering links and solving for the optimal

    power control solution a marked difference in approach from the previous works, which solved for

    optimal solutions in the extraneous interference case. Although the solution obtained is only for two

    links because of the complexity involved in using a higher number, this is still a step in the right direction

    as far as obtaining a truly optimal backlog-driven DPC algorithm.

    Another intriguing aspect of this approach is the attempt to design an Oracle what the authors

    conceive of as the optimal solution which would be obtained if there were a centralized controller and

    the use of this solution as a benchmark with which to compare the performance of their DPC algorithm,

    which they call BDD (backlog-driven distributed power control). They show that the Oracle naturally

    induces a load balancing effect, in which a transmitter with a large backlog is assigned a transmit power

    to reduce its backlog rapidly, and one with low backlog is assigned a lower transmit power [5].

    The third feature of this paper that we would like to call attention to is that their method of deriving

    BDD incorporates a quasi-game-theoretic approach, because the transmitter behavior of link 1 is

    determined for each of three possible strategies chosen by link 2, roughly categorized as aggressive,

    backoff, and static. There is much potential in this line of research, and it will certainly be

    interesting to see how it will evolve in the coming years.

    2It appears that the authors set the constant SIR target to be near the maximum for which the constant SIR

    algorithm will converge, given their chosen spatial distribution of links. However, this still means that this target

    SIR, and therefore the average load that can be supported by their simulation of the constant SIR algorithm, is a

    function of this particular spatial distribution.

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    13/19

    13

    3 Simulation of Distributed Power Control AlgorithmsIn this section, we discuss the simulation that was conducted for this project. The motivation for this

    work has already been alluded to above we are seeking a more comprehensive, accurate, and useful

    evaluation of the properties of backlog-driven DPC algorithms. In particular, we are looking to improveupon the simulation done in [4]. With this in mind, a large-scale, robust, and easily configurable

    simulation was designed, and the results provide some interesting insights into the advantages of

    PCMA-1 and PCMA-2 [4] over the constant SIR algorithm.

    3.1 Simulation DesignWe begin by explaining the structure of the simulation that was performed. One of the major design

    considerations was that we wanted to be able to simulate a very large and randomly dispersed number

    of links (i.e., transmitter/receiver pairs) which can be chosen by the user. Then, transmitters are

    distributed uniformly over a two-dimensional playing field, and the receiver associated with each

    transmitter is placed at (r,) with

    respect to its transmitter, where r

    is the distance from the transmitter

    chosen randomly from a Gaussian

    distribution, and is the angle

    chosen from a uniform distribution

    on [0,2). We should note that in

    order to avoid boundary effects in

    our performance calculations, we

    actually place many more links in

    the playing field than the number

    of links we intend to use, and then

    choose the user-defined number of

    links for performance calculations

    from the middle of the playing

    field3. A sample of this spatial

    distribution is included in Figure 3.

    Other important parameters that

    can be set by the user include the

    average arrival rate of new packets

    to be transmitted (arrival

    3This is in contrast to [4], in which boundary effects are avoided by turning the playing field into a conceptual

    torus. We felt that this method is unnecessarily unrealistic, and it introduces numerous problems, such as

    potentially double-counting the interference from a neighboring link.

    Figure 3: Transmitters and Receivers in the Two-Dimensional Playing Field.Transmitters are represented by blue circles, and receivers are represented as

    orange squares.

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    14/19

    14

    probabilities are drawn from a Bernoulli distribution, as in [4]), the various configurable parameters in

    the PCMA-1 and 2 schemes such as X(b), and the constant SIR algorithm target SIR. A version of the

    simulation code is available at www.stanford.edu/~jmounzer/359.

    3.2 ResultsA number of simulations were run to test PCMA-1 (Equation 6), PCMA-2 (Equation 7), and the modified

    constant SIR algorithm (Equation 8) in order to show a variety of different relationships, as will be

    described below. Key simulation settings are listed in Table 1. Wherever possible, they were chosen for

    consistency with the simulation in [4].

    Simulation Parameter Parameter Value or Function

    Length of simulation 25,000 time steps, unless otherwise noted

    Probability of successful transmission

    ( , ) =

    =

    (Equation 9)

    Gains Gij = (Equation 10)Interference on link i + Thermal noise .1

    X(b) b+4

    Number of links considered in performance calculations 75

    Total number of links in playing field 200

    , , 1

    Table 1: Simulation settings

    Based on these simulations, we can make several observations regarding the relative performance of

    PCMA-1 and PCMA-2. Perhaps the most dramatic and notable performance improvements of PCMA-1

    and PCMA-2 over the constant SIR algorithm are observed when the network is under duress. This is

    very significant, since real networks are likely to have traffic fluctuations that result in temporary or

    long-term congestion. For example, one can easily envision a network experiencing a period of

    extremely heavy traffic, during which the average load nears unity. In this type of situation, the

    Foschini-Miljanic algorithm has disastrous results either the transmitter powers will all explode if the

    target SIR is adapted to attempt to keep up with the load (these simulations showed that it takes

    relatively few time steps for this to occur in the tens of time steps) or the backlog will rapidly increase

    if the target SIR is not adapted, at a far faster rate than the backlog of PCMA-1 or PCMA-2. In contrast,PCMA-1 and PCMA-2 both exhibit much more robust performance in such stressful situations. By

    cooperating with each other, the links are able to keep their powers from exploding while managing

    their backlogs more effectively. These effects are clearly shown in the set of figures below. In Figures 4

    and 5, we show the analogous plots to those in [4], where we set the constant SIR algorithm to achieve a

    steady-state success probability of .7. As expected, we see that in Figure 4, the average backlog in the

    constant SIR algorithm when the load is less than .7 is driven to zero, while the average backlog when

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    15/19

    15

    the load is greater than .7 grows rapidly (and goes to infinity as the simulation length goes to infinity).

    However, the PCMA-1 and 2 curves both perform better in terms of average backlog than the constant

    SIR algorithm as the load becomes very large. We also observe that while the PCMA-2 curve performs

    rather poorly in terms of backlog compared to the constant SIR algorithm for average loads between .3

    and .8, it uses less power over the same range. As we look at the average power for PCMA-1, we see

    that for average loads less than .7, it remains very close to the average power of the constant SIR

    algorithm4, but when the load becomes large, the power consumption goes up. However, we see that

    the PCMA-1 algorithm is trading off increased power for reduced backlog in this situation; over the same

    region, the constant SIR algorithm has allowed the backlog to explode.

    The next pair of plots in Figures 6 and 7 provides a slight but illuminative twist on the graph in [4]. This

    time, we allow the constant SIR algorithm to adapt its constant SIR target to keep up with the average

    load, i.e., we set the target SIR so that a success probability higher than the average load is maintained,

    if possible. Here, we clearly see that there is a hard limit with regard to the feasibility of the constant

    SIR algorithm. For some average load (in this case, approximately .7), the target SIR will become

    unattainable for the links in the network, and as Foschini and Miljanic showed, this results in the link

    powers rapidly exploding to infinity. This will be the case as the average load increases regardless of the

    network spatial distribution at some point, the network under the constant SIR algorithm will not be

    able to support the requested target SIR. We see that PCMA-1 and 2 vastly outperform the constant SIR

    algorithm when the load becomes high for this situation. The backlog and power for the constant SIR

    algorithm immediately explode once the target cannot be reached, whereas PCMA-1 and 2 exhibit a

    smooth, gradual decay in performance.

    4The linear growth in average power for the constant SIR algorithm in Figure 5 for average loads less than .7 is

    simply a result of the modification made to the Foschini-Miljanic algorithm for these simulations namely, that

    there is no power spent when there are no packets waiting to be transmitted. After the average load becomes

    higher than the success probability at .7, we see the constant SIR algorithm result in a constant average power, as

    we expect, since the links never clear their queues.

    0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

    500

    1000

    1500

    2000

    2500

    3000

    3500

    4000

    Average Load

    AverageBack

    log

    Average Backlog vs Average Load with Constant SIR Algorithm target SIR of 2.33

    PCMA-1

    PCMA-2

    Constant SIR

    0 0.2 0.4 0.6 0.8 10

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    Average Load

    AveragePo

    wer

    Avg Power vs. Avg Load with Constant SIR algorithm target of 2.33

    PCMA-1

    PCMA-2

    Constant SIR

    Figure 4 Figure 5

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    16/19

    16

    The last plot we consider is Figure 8, which clearly shows how PCMA-1 and 2 can outperform the

    constant SIR algorithm when the spacing between links decreases (and consequently, when the

    interference between links goes up). We see

    that at a certain link density, the constant SIR

    algorithm can no longer converge, and all the

    transmit powers explode to infinity. However,

    the PCMA-1 and 2 algorithms are able to

    prevent their powers from exploding over

    much higher densities through their use of

    cooperation5. This robustness can be very

    valuable in cases of high spatial congestion.

    Finally, we observe that the simulations

    conducted represent a preliminary attempt at

    validating and extending the results in [4]. It

    proves to be surprisingly difficult to compare

    the algorithms along any particular dimension, such as average power consumption, because of their

    different structures. For example, a cursory glance at Figure 5 shows that the functional forms of

    average power with respect to average load are all quite different, which makes their comparison highly

    nontrivial. Future efforts in this line of research will include finding methods to make these types of

    comparisons, and we hope that the process of doing so will lead to new insights regarding the

    algorithms behaviors.

    5The fluctuations in the PCMA-1 and 2 curves in Figure 9 are due to the fact that the simulation was reset for each

    density and the links were randomly redistributed. Future work will include taking averages over many simulations

    so that the curves are smoother, but the current plot is enough to illustrate our main point.

    0 0.2 0.4 0.6 0.8 10

    1

    2

    3

    4

    5

    6

    7

    8

    9

    10

    Average Load

    AveragePower

    Average Power vs. Average Load with Adaptive Constant SIR Target

    PCMA-1

    PCMA-2

    Constant SIR

    0 0.2 0.4 0.6 0.8 10

    2000

    4000

    6000

    8000

    10000

    12000

    Average Load

    AverageBacklog

    Avg Backlog vs. Avg Load with varying Constant SIR Target for each Average Load

    PCMA-1

    PCMA-2

    Constant SIR

    Figure 6 Figure 7

    10-3

    10-2

    10-1

    0

    50

    100

    150

    200

    250

    300

    Transmitter Density

    AverageTransm

    itterPowerafter12000timesteps

    Average Power vs. Transmitter Spatial Density for Arrival Rate of .7

    PCMA-1

    PCMA-2

    Constant SIR

    Figure 8

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    17/19

    17

    4 Future WorkThere is much work yet to be done in this line of research, and we roughly characterize these future

    directions into three groups: extending the simulations described above to learn more about the

    performance of backlog-driven DPC, proving mathematically the structural properties of backlog-drivenDPC that are observed (such as finding the mathematical reasons for the robust behavior when the

    network is under duress), and using the intuition we have gained to design improved DPC algorithms in

    the future.

    4.1 Simulation ExtensionsThere are a number of ways that the simulations used in this project can be extended to provide a more

    complete characterization of the behavior of backlog-driven DPC. For example, it would be very

    interesting to employ more realistic transmitter and receiver spatial distributions and configurations tobetter simulate a real wireless environment, as well as to vary the packet arrival process. Furthermore,

    employing a stochastic wireless channel model (perhaps including shadowing and multipath fading)

    could lead to new insights. Another important area for research would be to make the network itself

    more dynamic by letting links enter and leave and by allowing transmitters and receivers to move

    around. This would enable us to more accurately characterize properties such as convergence of the

    algorithms and the maximum allowable steady-state number of nodes under different algorithms.

    Additionally, the PCMA-1 and 2 algorithms are parameterized by a number of different values, which

    can be changed to induce dramatically different link behavior. There has been little done as far as

    exploring the optimal values and functional forms for these parameters to achieve a desiredperformance gain, and further simulations could look into deepening our knowledge on this front.

    Another important direction for extending the simulations is to find better ways to compare the

    algorithms with each other. As described in Section 3.2, the different natures of the algorithms make it

    highly nontrivial to compare them along any particular dimension (such as power consumption, average

    backlog, etc.). There remains a significant amount of work to be done in this regard.

    4.2 Proving the Structural Properties of Backlog-Driven DPCThe structural properties of backlog-driven DPC are not yet very well understood, and we hope that by

    leveraging the insights gained through extensive simulations, we can begin to characterize these

    properties mathematically. For example, it would be interesting to prove that the mathematical

    properties of PCMA-1 and 2 naturally result in their gradual performance decay under large average

    loads, as we observed in our simulations.

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    18/19

    18

    4.3 Design of Stronger DPC AlgorithmsThe ultimate goal of this entire line of research is to develop optimal DPC algorithms suitable for a wide

    range of wireless network environments. As we have seen in our literature review, this is a difficult

    problem to solve, and the current state of the art involves developing well-informed heuristics based on

    analyzing simplified models of the wireless environment, such as the case of unresponsive, extraneous

    interference. However, we have also seen that the techniques employed have become more and more

    sophisticated over time, and with a better understanding of the properties of backlog-driven DPC

    obtained through simulation and mathematical analysis, we hope to push the state of the art in this field

    further.

    5 ConclusionIn this report, we have examined the evolution of backlog-driven DPC algorithms over the past 15 years,

    beginning with the benchmark, backlog-agnostic Foschini-Miljanic approach and ending with recent

    work in the dynamic-programming-based backlog-driven approach. Through our analysis and

    simulations, we have shown that there are significant performance gains for wireless networks in which

    the links can be induced to cooperate with each other through backlog-driven DPC. Although the full

    extent these performance gains is not trivial to characterize because of the different natures of the DPC

    algorithms, we have clearly highlighted the fact that when the network is under duress, backlog-driven

    DPC can provide enormous gains over the standard constant-SIR benchmark in terms of power

    consumption, backlog, and overall reliability. There remains much work to be done to find appropriate

    ways to compare DPC algorithms, prove the structural properties of backlog-driven DPC, and create new

    DPC algorithms which build on our previous insights to achieve even larger performance improvements.

  • 7/28/2019 Power Control Algorithms in Wireless Communication

    19/19

    19

    6 References[1] G.J. Foschini and Z. Miljanic, "A Simple Distributed Autonomous Power Control Algorithm and Its

    Convergence," IEEE Trans. Vehicular Technology, vol. 42, no. 4, pp. 641-646, 1993.

    [2] J. Rulnick and N. Bambos, "Mobile power management for wireless communication networks," Proc.IEEE INFOCOM , vol. 3, pp. 3-14, 1997.

    [3] J. Rulnick and N. Bambos, "Power-induced time division on asynchronous channels," Wireless

    Networks, vol. 5, pp. 71-80, 1999.

    [4] N. Bambos and S. Kandukuri, "Power-Controlled Multiple Access Schemes for Next-Generation

    Wireless Packet Networks," IEEE Wireless Communications , pp. 58-64, June 2002. s

    [5] A. Dua and N. Bambos, "Distributed Backlog-Driven Power Control in Wireless Networking," Proc.

    IEEE Workshop on Local & Metropolitan Area Networks, pp. 13-18, June 2007.

    [6] N. Bambos, Toward Power-Sensitive Network Architectures in Wireless Communications: Concepts,

    Issues, and Design Aspects, IEEE Personal Communications, pp. 50-59, June 1998.

    [7] A. Goldsmith, Wireless Communications, Cambridge University Press, New York, 2005.