On Adaptive Transmission
On Adaptive Transmission
Abstract—This paper investigates the problem of energy-effi- [15], [20]), and approximated by practical adaptive coding/mod-
cient transmission of data packets in a wireless network by jointly ulation schemes ([12], [14]). These schemes, however, assume a
adapting to backlog and channel condition. Specifically, we con- continuous stream of data. If the average data generation rate is
sider minimum-energy scheduling problems over multiple-access
channels, broadcast channels, and channels with fading, when known, these schemes would keep transmission rate close to the
packets of all users need to be transmitted before a deadline . data arrival rate and be energy efficient. However, in many wire-
Earlier work has considered a similar setup and demonstrated less data applications, the rate at which data is generated and
significant transmission energy saving by adapting to backlog needs to be transmitted is unknown and varies with time (e.g.,
for channels that are time invariant and when transmission is wireless web sessions or a sensor network where data gets gen-
restricted to time-division. For concreteness, throughout the
paper, rates and powers corresponding to optimal coding over erated at random times at each node). Ignoring this variability
discrete-time additive white Gaussian noise (AWGN) channels are and adapting solely to the channel can be inefficient in terms of
assumed. The results, however, hold for more general channels transmit power and bandwidth.
and coding schemes where the total transmitted power is convex in
To understand how inefficiency may arise, consider the fol-
the transmission rates. The offline scheduling problems for all the
channels considered are shown to reduce to convex optimization lowing generic data communication situation: the transmitter
problems with linear constraints. An iterative algorithm, referred and receiver engage in a session which may be a video confer-
to as FlowRight, that finds optimal offline schedules is presented. ence or a web session, or may alternate between the two. Dif-
A heuristic online algorithm that we call look-ahead water-filling, ferent types of applications generate data at different rates, and
which jointly adapts to both channel fading state and backlog is
the data packets are collected in the transmitter’s buffer to be
described. By the use of a small buffer which introduces an almost
fixed delay, this algorithm achieves a considerable reduction in sent to the receiver. Let the rate at which packets arrive into the
energy relative to water filling solely on channel states. transmitter’s buffer at time be packets per second. These
Index Terms—Adaptive transmission, broadcast, energy-effi- packets are transmitted to the receiver at a rate packets per
cient transmission, iterative algorithm, multiple-access, power second. Now, assume we set , a constant that is large
control, scheduling, time-division, wireless networks. enough, say, for a high-rate streaming video session. When the
required rate drops, for example because the user switches to
a lower rate web session where , the transmitter will
I. INTRODUCTION
idle a significant fraction of time and unnecessarily transmit at
Since this paper extends the work in [22] and [8], in the fol- transmission durations is quite intuitive. Consider the following
lowing section we first briefly review the key results in these example. Suppose all packets were available at time . In
papers. this case, it would be optimal to set for (as
a consequence of the monotonicity and convexity of the energy
II. PREVIOUS WORK function .) Now, suppose the th packet arrives at time
, where , while all previous packets arrive at
The work in [22] and [8] is based on the observation that with
. Setting would violate causality (the th
many channel coding schemes, the energy required to transmit a
packet would be starting transmission before it arrived.) Clearly,
packet over units of time, , is monotonically decreasing
the solution is to set , while
and strictly convex in . The minimum-energy packet sched-
uling problem for a single transmitter–receiver pair in a wireless
network is formulated in [19]. The setup is as follows. Suppose
that packets arrive at the transmitter’s buffer in the interval
at times . The node is required to As in this simple example, the optimal algorithm tries to equate
transmit all packets within the interval . 2 The question arrival times and make them as large as possible, within the con-
is, how should the packet transmissions be scheduled to mini- straints of causality. This solution was further explored in [22],
mize the total energy required to transmit the packets. If we let [18] and the formulation was combined with other constraints.
be the transmission time for packet , , the offline In [8], the minimum energy scheduling problem for a mul-
version of the problem can be stated as follows. tiple-user channel, e.g., uplink and downlink, involving several
transmitters and receivers where time-division is used is investi-
Problem 1: Single-Transmitter Single-Receiver Offline gated. The goal is to minimize the total energy for all users, and
Scheduling [19]: Given a vector of packet arrival times this results in the setup being identical to that of the previous
, where , , and , problem except that packets can have different energy functions.
and an energy function that is strictly monotonically de- Again, energy functions are convex and decreasing in the trans-
creasing and convex, find a schedule so as to minimize mission duration, and this is essentially all that is assumed about
the total transmission energy: subject to causality3 the channel, transmitters, and receivers. The offline time-divi-
and deadline constraints. sion scheduling problem is formulated as follows.
Note that this is a convex optimization problem with linear Problem 2: Multiple-User Offline Time-Division Scheduling
constraints. The following explicit solution was found in [19]. [8]: Given a vector of packet arrival times ,
Let ’s be the packet inter-arrival times. Define , and where , , and , and energy functions
that are strictly monotonically decreasing and convex,
find a schedule that minimizes the total transmission energy:
subject to causality and deadline constraints.
This is also a convex optimization problem but does not in
general admit a simple closed-form solution. By exploiting
Note that is the index at which the running average of the ’s the special features of the problem, an algorithm, MoveRight,
is maximized for the first time. We set to which finds the global optimal schedule efficiently, is devel-
oped. MoveRight iteratively moves the start times of packet
this average value . Next, we set transmissions one at a time, so that each move locally optimizes
the energy function. The algorithm was shown to solve other
scheduling problems, such as when packets have individual
(1) deadlines, and when the transmit buffer is finite. MoveRight
also leads to an online algorithm that uses a simple look-ahead
buffer. The transmitter buffers the packets for a specified
In general, is set to
length of time (the look-ahead window). At the end of the
look-ahead window, the packets in the buffer are scheduled
using a faster version of the MoveRight algorithm for trans-
(2)
mission from to . Meanwhile, the arrivals from to
are buffered, to be transmitted in the following time window.
where is the largest integer such that . This Hence, at the expense of incurring a delay of , packets are
is the optimal schedule. Note that the schedule contains bands scheduled optimally. The average energy per packet given by
of equal transmission times between breakpoints at positions . the look-ahead algorithm was shown through simulations to be
The fact that the optimal solution is in the form of bands of equal quite close to that of the offline optimal schedule, using only a
small look-ahead buffer.
2The imposition of a strict deadline T , by which all transmissions had to
Throughout the paper, the well-known terms ”time-division”
terminate, was intended to capture several realistic wireless scenarios (see [22]
for further details).
and ”multiple-access” will be used to make the following
3In our setting, causality corresponds to the obvious constraint that no distinction: In time-division, packets do not overlap in time,
packet’s transmission can start before its arrival time. whereas in multiple-access scheduling, users’ packets interfere
Authorized licensed use limited to: Muranga University College. Downloaded on February 15,2025 at 13:27:25 UTC from IEEE Xplore. Restrictions apply.
3084 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
with each other but can, with appropriate multiuser coding and
decoding, still be resolved at the receiver.
In the rest of this section, for ease of notation we assume that time-division is optimal and thus the problem can be optimally
, . solved using MoveRight. For convenience, define
Lemma 2: In an optimal multiple-access offline schedule, the
rate of a user need not change during an epoch. and note that is convex in and .
Proof: By definition, new data can only arrive at the start
of a data epoch. So, at the beginning of an epoch, the two users Theorem 1: In the symmetric case, there exists a schedule
together have a certain number of bits to be transmitted, and no that achieves minimum energy by time-division between the
new bits are added to this during the epoch. Now, let us focus on packets of users. In the asymmetric case, time-division is strictly
a generic data epoch in the optimal schedule. Assume without suboptimal.
loss of generality that the epoch starts at and ends at Proof: Consider the symmetric case first. We show that
. Assume that in this schedule the epoch is divided into any schedule can be converted into a time-division schedule
intervals, , where the with equal or lower energy. First, note that from Lemma 2, it
rates of both users are constant during an interval. Denote the suffices to consider the schedule as a sequence of rate pairs
first user’s rate in interval by , and the second’s by , one pair for each epoch. Also note that we can limit at-
. At optimal power settings (see Lemma 1) the total trans- tention to the case where the received powers are the
mitted energy for the data epoch is given by optimal corner point of the feasible region for rates (if
not, the energy can be reduced without changing the schedule).
Consider epoch . From Lemma 1, in the symmetric case, there
is a point on the time-division curve that achieves the average
rates with minimum total energy. We can move to this
By convexity of , it is easy to see that the total energy can be time-division point by letting the first user transmit alone in a
decreased by using the average rates fraction of the total interval, i.e., for a duration , using a
rate , and the second user transmit in the remaining with rate
, where . Proceeding like this with other
epochs, the schedule we were provided with has been converted
and to a time-division schedule of equal or lower energy. Now, con-
sider a packet from user 1 that is being transmitted across the
epochs , as chunks, with instantaneous rates
are injected into epoch 1 on one or both streams, that is, set From Lemma 4, part 1,
, and , and .
Also, some bits are ejected from the second epoch, i.e., set
, and , , and . and
For the change to be nontrivial, we require that at least one of
is nonzero. Notice that the constraint
space of the problem has changed. In this case we have the Now, as the th pass progresses, update performs
following. a local optimization on , and this, by hy-
1) If and , then after the pothesis, results in a right push (i.e., a push from
injection/ejection of the new bits, when is run onto ), which changes to
again, there will be a right push, i.e., a nonnegative amount , where for
of information will move from epoch 1 to epoch 2 on both . Continuing to the present time, on the th pass there
streams. is a right push (again, by the induction hypothesis), from
to resulting in , where
2) If , the first stream was limited by
for . By part 2 of Lemma 4, there can only be a
causality before the injection/ejection, hence it is limited
right push (if any) from to on the th iteration.
by causality again (because no information has crossed
from epoch 1 into epoch 2). If , 2) Consider , i.e., the total number of
there will be a push on stream 1. Otherwise, due to bits of stream 1 on epoch 1 after the th iteration. Since
causality, reoptimization will not result in any move all pushes are to the right, is monotonically nonin-
on that stream (i.e., no push or pull). Similarly, if creasing. Also, it is obviously bounded from below by
, on the second stream there may only be zero. Therefore, , and therefore . Simi-
a push or no movement at all. larly, (the total number of bits in epochs 1 and
2 on stream 1) is monotonic nonincreasing and bounded
Now, let and be the pair of optimal rate se- below by zero. Hence, this sum tends to a limit;
quences. We shall sometimes use the shorthand to refer to
this pair. Such a unique solution exists because of the convexity
of the problem and the compactness of the search space. In the
following, it is proved that the algorithm FlowRight results in Therefore, , and . Similarly, since
and . In order to show this, we first argue that the converges and converges, so
algorithm stops at the pair of sequences and . We does . Proceeding like this, we will see that ,
then show that this is identical to . The following results are , for all . Hence, the sequences of rates converge.
proved similarly to Theorem 1 in [8]. 3) First, observe that and
for all . To see why this is true, suppose it is not. That
Theorem 2: The following statements hold.
is, let for some . Then, if we run
1) As the algorithm FlowRight runs, information always FlowRight on this sequence, there will be a right push.
flows right. This contradicts the fact that is a fixed point.
2) FlowRight stops, and returns two sequences and Hence, we have and
. for all , and using that we will show that sat-
3) and . isfies the Karush–Kuhn–Tucker (KKT) conditions [4].
Recall that our problem is a convex problem with linear
Proof:
inequality constraints, so the KKT conditions are suffi-
1) The claim is that throughout the running of FlowRight, all cient for optimality in this case. The first of those con-
pushes are to the right. We now prove this by induction. ditions is feasibility, of course, but we already know that
In the first pass, the claim is trivially true, since all left is a feasible solution (FlowRight always re-
pushes are impossible due to causality. Now, suppose that spects feasibility). Then we need only check if for our so-
we are on the th pass of the algorithm, and so far update lution there is a set of Lagrange multipliers with the prop-
has operated on all epoch pairs up to and including the erties specified by the KKT conditions. Differentiating the
pair , and all pushes so far have been to the right. Lagrangian for the problem provides us with equa-
We will show that the next push will be to the right. On the tions
th run, performed a local optimization on
epochs . Let us call the two pairs of rates resulting
from this optimization , and .
The number of bits transmitted in the th epoch on streams and
1 and 2 are and . Similarly, de-
fine and to be the bits transmitted the next
epoch, and define
where , are the Lagrange multipliers.
and Now we need to inquire about the values of these La-
Authorized licensed use limited to: Muranga University College. Downloaded on February 15,2025 at 13:27:25 UTC from IEEE Xplore. Restrictions apply.
3088 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
(4) Note that this is the same as Problem 3 in Section III, except
that the objective function is different. But the objective function
where is the transmitted signal with average power con- is still convex, monotonically increasing, and differentiable in
straint , is the channel gain, and the ’s are i.i.d. both and . Hence we get the following.
Authorized licensed use limited to: Muranga University College. Downloaded on February 15,2025 at 13:27:25 UTC from IEEE Xplore. Restrictions apply.
UYSAL-BIYIKOGLU AND EL GAMAL: ON ADAPTIVE TRANSMISSION FOR ENERGY EFFICIENCY IN WIRELESS DATA NETWORKS 3089
D. Online Scheduling
The optimal offline algorithm provides a lower bound on en-
ergy for all possible online algorithms, as it finds the minimum
possible energy per packet under complete knowledge of the fu-
ture. Fortunately, the optimal offline algorithm naturally lends
itself to online use by means of a simple look-ahead buffer [8].
We buffer all packets which arrive in the interval and op-
timally schedule them for departure in the interval . Note
that FlowRight does not need to perform any iterations—the rate
of each user is set to the number of bits it has in the buffer di-
vided by and transmission powers are chosen optimally ac-
cording to the feasible power region for the given rates. Con-
tinuing with the schedule, the packets that arrive in are
Fig. 5. Comparison of the online algorithms look-ahead time-division and
buffered to be transmitted in , and so on. look-ahead multiple-access for a two-user multiple-access channel. The users’
In Fig. 5, we compare the online algorithm obtained in this packets arrive according to two independent Poisson processes with identical
way, with the online algorithm obtained by using the look-ahead rates. The window size is 25 time units. The energy values correspond to 10 -
bit packets. The signaling rate is 10 transmissions/s, and the nominal rate is
buffer with MoveRight. The experiment setup is similar to the 6 bits/transmission achieved when a packet takes 1 time unit, i.e., seconds,
one in Section III-C. The only difference is that now we have to transmit.
a look-ahead buffer. In the experiment whose results are shown
in the figure, the look-ahead window size was held at 25
Proof: Noting that the channel state and the number of
time units.6 Hence, as our online algorithm “adapts” to the ar-
available bits are constant during an epoch by definition, the
rival rate, the average delay remains around 25 time units. The
proof follows very similarly to the proof of Lemma 2. Suppose
resulting average energy per packet is reasonably close to the
the rate is in the first time units of an epoch of length ,
optimal, which is also plotted in Fig. 5, and which, of course,
and during the remaining . The transmit energy in this
has much lower delay. Therefore, we see that by incurring some
epoch is then , where is the fading
fixed delay, it is possible to perform very energy efficiently.
state during the epoch. The same number of bits can also be
transmitted using the uniform rate for the
IV. SCHEDULING OVER SLOW-FADING CHANNELS whole time . This new rate results in a total energy
Consider the AWGN channel as specified by (3). We make the , which, by convexity of , is strictly lower than
block-fading assumption where the power gain changes previous, unless .
every channel uses (a“coherence window”). Further assume
From Lemma 5, ( is the number of epochs) is suf-
that fading is slow with respect to codeword lengths. Initially,
ficient to characterize the optimal schedule.
consider the single-user case, i.e., . We assume that both
the transmitter and the receiver have perfect channel state infor- Problem 5: Offline Scheduling for the Slow-Fading
mation at the beginning of each coherence window. Channel:
As before, consider packets coming at arbitrary instants in
, all of which need to be transmitted within this same time
Minimize
period. The optimal offline schedule is the one that minimizes
the total packet transmission energy given perfect knowledge of
the packet arrival instants and channel state values for the entire subject to
duration , at time .
Define an “epoch” to be a time interval that begins with either
a packet arrival or a change in the channel state, and continues
until the next arrival or state change. The first epoch starts at
, and continues until or , whichever is smaller, at
which point the second epoch starts, and so forth. Let denote
the number of bits that have arrived at the beginning of epoch , This convex optimization problem can be solved by the
so if the th epoch starts with a packet arrival, and FlowRight algorithm. Initially, the rates are set to ,
otherwise. Let the duration of epoch be . . The first two epochs are then considered.
Lemma 5: In an optimal schedule, rate is constant during an The total number of bits transmitted in these two data epochs
epoch. is . Keeping the total number of bits fixed, is
updated to , the value that minimizes the total energy of the
6In [8], a window of 20–30 time units was shown to be a good choice for L, first pair of data epochs. Note that , since from their
in the sense that most of the achievable decrease in energy is obtained. initial condition information can only be moved to the right
Authorized licensed use limited to: Muranga University College. Downloaded on February 15,2025 at 13:27:25 UTC from IEEE Xplore. Restrictions apply.
3090 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
(otherwise, causality would be violated.) Therefore, is reset where is the average transmit power, and is the noise
to a new value that is larger than (or equal to) its initial value. variance. Furthermore, capacity is achieved by a “water-filling”
Moving to the second pair of epochs, this time is optimally power allocation to states. This means that transmit power is
decreased to , and the value of is reset. Proceeding in this set to if is larger than the cutoff value , and if
way we obtain for . This completes the first not, there is no transmission until changes. Hence the instan-
pass of the algorithm. The algorithm then repeats the same taneous transmit power is
procedure and terminates after passes, where
if
(5)
where otherwise.
for small enough . To use water-filling adaptation in our setting, we set the av-
erage rate equal to (packets/time unit) (bits/packet)
Theorem 4: The following statements hold.
(time units/symbol) to ensure stability. We then calculate
1) As the algorithm FlowRight runs on , information (hence, determine the average power) such that the capacity
always flows to the right. is equal to this target average rate. Before each packet transmis-
2) FlowRight stops, and returns a sequence . sion, the instantaneous power and rate are set according to the
3) . channel gain , which is assumed constant during packet trans-
mission.
The only difference between this theorem and Theorem 2 is 2) Look-Ahead Water-Filling Algorithm: The water-filling
that the energy function, due to scaling with channel gain, does scheduling algorithm presented above optimally adapts to the
not have the same form for each epoch pair channel state, and is energy optimal if the average rate of packet
arrivals is close to . But this algorithm can be wasteful
when the instantaneous packet arrival rate is much lower than
Note, however, that this does not affect any of the steps of the . Now we describe an online algorithm, which we refer to
proof of Theorem 2, and therefore the proof of this theorem as look-ahead water-filling algorithm, that adapts jointly to the
follows from the proof of Theorem 2. channel and backlog.
The algorithm is as follows: suppose just before time , a
A. Online Scheduling packet transmission ended. Let the backlog at time be .
We assume that the packet input process into the transmitter If , then we begin transmitting the packet at the head of
buffer is stationary and ergodic. The time average arrival rate the queue at time (otherwise, wait until there is a packet in the
queue). We set the target transmission rate to
packets/time unit
is bounded such that with probability . We are in- for some constant . Given , we determine the instanta-
terested in schedules that are stable, i.e., scheduling algorithms neous transmission rate according to water-filling. That is, the
that ensure that the number of packets in the buffer is finite with optimal cutoff value is computed as in Section IV-B1, which
probability . corresponds to an average power for which the capacity is
Future arrivals, channel states, or are not known. The (Using the concavity of the logarithm, the value of is cal-
channel has slow ergodic fading with known statistics where culated iteratively.) The current power and rate are then deter-
the power gains of different coherence windows are i.i.d. The mined from (5). We transmit the packet at the head of the queue
transmitter knows the present value of the channel gain just with this rate. The following pseudocode summarizes the algo-
before transmitting a packet. The bound on packet arrival rate rithm.
is also known. We first describe an online scheduling al-
gorithm based on water-filling in time that is known to achieve calculate rate estimate
the capacity of the channel. Next, we describe look-ahead ;
water-filling, an algorithm that simultaneously adapts to both find for which
the channel and the data arrival rate. if ( )
1) Water-Filling in Time: It is well known (see [11]) that the {
capacity of the AWGN channel with ergodic fading and with the ;
channel gain known at both the transmitter and receiver is given }
by else
{
bits/transmission
}
;
where is the probability density function of the channel
if
gain , and is the solution to the equation
{
;
;
Authorized licensed use limited to: Muranga University College. Downloaded on February 15,2025 at 13:27:25 UTC from IEEE Xplore. Restrictions apply.
UYSAL-BIYIKOGLU AND EL GAMAL: ON ADAPTIVE TRANSMISSION FOR ENERGY EFFICIENCY IN WIRELESS DATA NETWORKS 3091
}
else
{
;
}
repeat
(6)
(7)
Our hypothesis that the queue is not stable implies that the un-
derlying Markov chain is transient, hence, eventually any fi-
nite set of states has probability zero. Consequently, the event
will eventually have zero probability. But,
referring to the algorithm, in the event , the
expected transmission rate (where the expectation is over the
fading process) is , and herefore in the limit (referring to the al-
gorithm) departures will happen at rate packets/time unit.
Dividing by and taking the limit in (7), we obtain Fig. 7. Average energy per packet as arrival rate changes for = 2 in Rayleigh
fading; L = 25.
(8) other two algorithms, thus quickly finishes its backlog and idles
a significant amount of the time. Look-ahead water-filling,
This implies , which is a contradiction. on the other hand, spreads its rate more uniformly over time,
almost as uniformly as OPT which has the lowest rate trans-
To compare the look-ahead water-filling algorithm to water-
mission.
filling, we perform the following experiment: Let 1-kbit packets
Figs. 6 and 7 explore the energy and delay performance
arrive at the buffer at a rate 1 arrivals/ time unit. A time
of these algorithms. Note that the water-filling schedule has
unit is 1/6 ms, which corresponds to the transmission duration
constant energy for all arrival rates, since the rate it assigns to
of a packet if it is transmitted at 6 bits/symbol (symbol
packets is independent of . This energy is much higher than
rate is constant at symbols/s). The packet arrival process
the average energy values achieved by look-ahead water-filling
is a Markov-modulated Poisson process for which
when is small; both for bursty and nonbursty arrival processes.
with probability , and otherwise. The
Of course, the energy efficiency is achieved at the expense of
parameter is chosen such that the process is ergodic with
an increase in delay. The delay of look-ahead water-filling
expected rate . Note that when , the arrival process is
is essentially lower-bounded by , as it allows this time to
bursty, and for it reduces to a Poisson process at rate .
monitor the arrival process. However, as can be observed from
Fig. 1 shows an example run of bursty packet arrivals at
Fig. 6, the variation of its delay is much smaller than that of
, scheduled by the three algorithms WF (water-filling),
water-filling. In the figure, the delay of water-filling varies by
LW(look-ahead water-filling), and OPT (optimal offline). No-
about 7000% as is varied from to , while the delay
tice that water-filling transmits with much higher rate than the
of look-ahead water-filling varies only about 60%. The fact that
7Sometimes referred to as a semi-Markov process [10]. the delay jitter is so much smaller makes the backlog-adaptive
Authorized licensed use limited to: Muranga University College. Downloaded on February 15,2025 at 13:27:25 UTC from IEEE Xplore. Restrictions apply.
3092 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
algorithm attractive for data applications, especially streaming alizations. In this setting, it is natural to assume that the trans-
media. mitter does not have CSI; by the time feedback from the receiver
about channel state reaches the receiver, the channel has already
B. Extension to Multiple-Access and Broadcast Channels With changed. It is well known (see, e.g.,[5]) that the ergodic capacity
Fading of this (single-user) Gaussian fading channel is given by
In this subsection, we extend the slow-fading single-user of-
fline and online scheduling results to multiple-access and broad- (9)
cast channels. To formulate the offline scheduling problem we
first merge all users’ packet arrival sequences and the times at where denotes expectation over the channel state , and is
which channel states change to obtain epochs and note as the average transmit power.
before that in an optimal schedule rates do not need to change Notice that is a monotonically increasing and concave
during an epoch. function in . Hence, it is invertible, with inverse
monotonically increasing and convex in . Reliable commu-
Problem 6: Offline Scheduling for the Slow Fading Multiple- nication at rate is possible if received power is in the set:
Access Channel: .
Therefore, the power needed to communicate at rate is
Min. . This problem can be written in the style of Problem
5, by defining epochs as packet inter-arrival times, of durations
, .
s.t.
Problem 7: Offline Scheduling for the Fast-Fading Channel:
Minimize
where
and subject to
of multiple-access and broadcast channels with and without Define for . Due to strict con-
fading can be reduced to convex optimization problems with vexity (hence, the monotonicity of the derivative) it can be easily
linear constraints and devised an algorithm, FlowRight, that shown that
finds the optimal offline schedule. Using FlowRight, we were
able to find the minimum energy per packet achievable by any
algorithm in the uplink scenario. Through simulations, it was
observed that the significance of multiple-access coding over and that the inequality is strict unless , ,
using time-division increases as the system gets more loaded. , and . But . Hence, energy is
We devised a heuristic online algorithm, look-ahead water- uniquely minimized by a point that satisfies
filling, which adapts to both the channel variation and backlog. and . This solution results from
It was demonstrated through simulations that significant energy pushing a nonzero amount of information right, from data epoch
saving can be achieved by such joint adaptation. 1 to data epoch 2. In case b)
In this paper, we addressed the point-to-point, multiple-ac-
cess and broadcast settings. An interesting direction for future or
work would be to investigate energy-efficient scheduling for
multihop networks. This is of particular interest due to the So when the injection and subtraction is done, these derivatives
increasing practical importance of ad hoc sensor and mobile can remain negative or become positive. In the case that they
networks, where energy conservation is a key design criterion. become positive, there will be a right push. If either of these, say
Finding optimal energy-efficient scheduling algorithms for , remains negative, then a right push (i.e., decreasing ) on
multihop settings, however, is nontrivial. The optimal trans- that stream can only increase the total energy. That stream was
mission rates, which we used in deriving the optimal offline shown in part 1 to be limited by causality, and it still is, because
schedules, are not known even for the simplest such setting injection brought only bits from the left. So we cannot pull any
with a single sender–receiver pair and a single-relay node. bits from epoch 2 to epoch 1 on this stream (i.e., increase ).
Another direction for future work is formulating and solving So, there will be no move on this stream.
the question of optimal online scheduling. Recently, [1] has
considered the single transmitter–receiver case where the trans- ACKNOWLEDGMENT
mitter has a finite buffer, and solved the problem of dynam- The authors would like to thank Balaji Prabhakar, Sina Za-
ically assigning rates/powers to packets in order to minimize hedi, and Mayank Sharma for their useful comments, and the
the long-term average transmission energy subject to an upper anonymous reviewers for their careful reading.
bound on the buffer overflow probability. It would be interesting
to pursue the generalization of such a dynamic control formula-
REFERENCES
tion to multiuser settings.
[1] B. Ata, “Dynamic power control in a wireless static channel subject to
a quality of service constraint,” Oper. Res., to be published.
APPENDIX [2] R. Berry, “Power and delay trade-offs in fading channels,” Ph.D. disser-
PROOFS OF LEMMAS 3 AND 4 tation, MIT, Cambridge, MA, 2000.
[3] R. Berry and R. Gallager, “Buffer control for communication over fading
A. Proof of Lemma 3 channels,” in Proc. Int. Symp. Information Theory, Sorrento, Italy, June
2000, p. 409.
For simplicity, we shall drop the superscript and refer to [4] D. P. Bertsekas, Nonlinear Programming. Belmont, MA: Athena Sci-
as . This function is strictly convex entific, 1995.
[5] E. Biglieri, J. Proakis, and S. Shamai (Shitz), “Fading channels: In-
in both variables, and is the result of minimizing formation-theoretic and communications aspects,” IEEE Trans. Inform.
it over a bounded region. Hence, the solution is unique. The Theory, vol. 44, pp. 2619–2692, Oct. 1998.
solution, , is either at the boundaries of the region [6] B. Collins and R. Cruz, “Transmission policies for time varying channels
with average delay constraints,” in Proc. 1999 Allerton Conf. Commu-
defined by , , or inside. If it nication, Control and Computing, Monticello, IL, 1999.
is inside, it must satisfy and . [7] T. M. Cover and J. A. Thomas, Elements of Information Theory. New
Due to convexity, partial derivatives of are monotonic York: Wiley, 1991, Wiley Series in Telecommunications.
[8] A. El Gamal, C. Nair, B. Prabhakar, E. Uysal-Biyikoglu, and S. Zahedi,
increasing. At the point , and are “Energy-efficient scheduling of packet transmissions over wireless net-
both negative (this can be seen by substituting the values). If works,” in Proc. IEEE INFOCOM, vol. 3, New York, June 2002, pp.
is not achieved in the region, then due to monotonicity, 1773–1782.
[9] A. Fu, E. Modiano, and J. Tsitsiklis, “Optimal energy allocation and
for all permissible values of . In this admission control for communications satellites,” in Proc. IEEE IN-
case, increasing the rate further than the boundary would FOCOM, vol. 2, New York, June 2002, pp. 648–650.
decrease total energy, but this cannot be done due to causality [10] R. G. Gallager, Discrete Stochastic Processes. Boston, MA: Kluwer
Academic, 1995.
constraints, so . Similarly, if is not [11] A. Goldsmith, “The capacity of downlink fading channels with variable
achieved inside the region, then . rate and power,” IEEE Trans. Veh. Technol., vol. 46, pp. 569–580, Aug.
1997.
[12] A. Goldsmith and S.-G. Chua, “Variable-rate variable-power MQAM for
B. Proof of Lemma 4 fading channels,” IEEE Trans. Commun., vol. 45, pp. 1218–1230, Oct.
1997.
First consider case a), i.e., [13] S. Hanly and D. N. C. Tse, “Multi-access fading channels: Part II: Delay-
limited capacities,” IEEE Trans. Inform. Theory, vol. 44, pp. 2816–2831,
and Nov. 1998.
Authorized licensed use limited to: Muranga University College. Downloaded on February 15,2025 at 13:27:25 UTC from IEEE Xplore. Restrictions apply.
3094 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 12, DECEMBER 2004
[14] K. J. Hole, H. Holm, and G. E. Øien, “Adaptive multidimensional coded [19] B. Prabhakar, E. Uysal-Biyikoglu, and A. El Gamal, “Energy-efficient
modulation over flat fading channels,” IEEE J. Select. Areas Commun., transmission over a wireless link via lazy packet scheduling,” in Proc.
vol. 18, pp. 1153–1158, July 2000. IEEE INFOCOM, vol. 1, Anchorage, AK, Apr. 2002, pp. 386–394.
[15] R. Knopp and P. A. Humblet, “Information capacity and power control [20] D. N. C. Tse and S. Hanly, “Multi-access fading channels: Part I: Poly-
in single-cell multiuser communications,” in Proc. Int. Conf. Communi- matroid structure, optimal resource allocation and throughput capaci-
cations, vol. 1, Seattle, WA, June 1995, pp. 331–335. ties,” IEEE Trans. Inform. Theory, vol. 44, pp. 2796–2815, Nov. 1998.
[16] M. Médard, S. P. Meyn, J. Huang, and A. J. Goldsmith, “Capacity of [21] E. Uysal-Biyikoglu and A. El Gamal, “Energy-efficient packet transmis-
time-slotted ALOHA packetized multiple-access systems,” in Proc. sion over a multiaccess channel,” in Proc. Int. Symp. Information Theory,
IEEE Int. Symp. Information Theory, Sorrento, Italy, June 2001, p. 407. Lausanne, Switzerland, June/July 2002, p. 153.
[17] M. Neely, E. Modiano, and C. Rohrs, “Power and server allocation in [22] E. Uysal-Biyikoglu, B. Prabhakar, and A. El Gamal, “Energy-effi-
a multi-beam satellite with time varying channels,” in Proc. IEEE IN- cient packet transmission over a wireless link,” IEEE/ACM Trans.
FOCOM, vol. 3, New York, June 2002, pp. 1451–1460. Networking, to be published.
[18] P. Nuggehalli, V. Srinivashan, and R. R. Rao, “Delay constrained energy [23] W. S. Yoon and T. E. Klein, “Delay-optimal power control for wireless
efficient transmission strategies for wireless devices,” in Proc. IEEE IN- data users with average power constraints,” in Proc. 2002 Int. Symp.
FOCOM, vol. 3, New York, June 2002, pp. 1765–1772. Information Theory, Lausanne, Switzerland, June/July 2002, p. 53.
Authorized licensed use limited to: Muranga University College. Downloaded on February 15,2025 at 13:27:25 UTC from IEEE Xplore. Restrictions apply.