MonotonicOptimizationinCommunicationandNetworkingSystems (2)
MonotonicOptimizationinCommunicationandNetworkingSystems (2)
in
Networking
Vol. 7, No. 1 (2012) 1–75
c 2013 Y. J. (Angela) Zhang, L. Qian and J. Huang
DOI: 10.1561/1300000038
Monotonic Optimization in
Communication and Networking Systems
By Ying Jun (Angela) Zhang,
Liping Qian and Jianwei Huang
Contents
1 Introduction 2
I Theory 6
2 Problem Formulation 7
2.1 Preliminary 7
2.2 Canonical Monotonic Optimization Formulation 10
2.3 Problems with Hidden Monotonicity 11
2.4 Monotonic Minimization Problem 15
3 Algorithms 16
7 Optimal Random
Medium Access Control (MAC) 65
8 Concluding Remarks 70
References 72
Foundations and Trends R
in
Networking
Vol. 7, No. 1 (2012) 1–75
c 2013 Y. J. (Angela) Zhang, L. Qian and J. Huang
DOI: 10.1561/1300000038
Monotonic Optimization in
Communication and Networking Systems
Abstract
Optimization has been widely used in recent design of communication
and networking systems. One major hurdle in this endeavor lies in the
nonconvexity of many optimization problems that arise from practical
systems. To address this issue, we observe that most nonconvex prob-
lems encountered in communication and networking systems exhibit
monotonicity or hidden monotonicity structures. A systematic use of the
monotonicity properties would substantially alleviate the difficulty in
obtaining the global optimal solutions of the problems. This monograph
provides a succinct and accessible introduction to monotonic optimiza-
tion, including the formulation skills and solution algorithms. Through
several application examples, we will illustrate modeling techniques and
algorithm details of monotonic optimization in various scenarios. With
this promising technique, many previously difficult problems can now be
solved with great efficiency. With this monograph, we wish to spur new
research activities in broadening the scope of application of monotonic
optimization in communication and networking systems.
1
Introduction
2
1.1 Monotonic Optimization Theory and Applications 3
any existing means.1 One such example is power control for throughput
maximization in wireless networks. Another example is general utility
maximization in random access networks.
An encouraging observation, however, is that a majority of noncon-
vex problems encountered in communication and networking systems
exhibit monotonicity or hidden monotonicity structures. For example,
the capacity and reliability of a wireless link monotonically increase
with the bandwidth and SINR (signal to interference and noise ratio)
of the link, and the quality of service provided to a user is a nondecreas-
ing function of the amount of radio resources dedicated to the user. A
systematic use of monotonicity properties may substantially alleviate
the difficulty in obtaining the global optimal solution(s) of the prob-
lems, and this is indeed the key idea behind the monotonic optimization
theory.
The theory of monotonic optimization has been established rela-
tively recently by a series of papers by Tuy [22, 31, 32, 33, 34, 35, 37]
and others [17, 27]. To intuitively understand the potential advan-
tages offered by a monotonicity structure, recall that the search for
a global optimal solution of a nonconvex optimization problem can
involve examining every feasible point in the entire feasible region. If
the objective function f (z) : Rn → R to be maximized is increasing,
however, then once a feasible point z is known, one can ignore the
whole cone z − Rn+ ,2 because no better feasible solution can be found
in this cone. On the other hand, if the function g(z) : Rn → R in a con-
straint like g(z) ≤ 0 is increasing, then once a point z is known to be
infeasible, the whole cone z + Rn+ can be ignored, because no feasible
solution can be found in this cone. As such, the monotonic nature of the
objective function and constraints allows us to limit the global search
to a much smaller region of the feasible set, thus drastically simplifying
the problem.
Only very recently was monotonic optimization introduced to the
communication and networking research community. The first attempt
1 Note that there are also problems that are seemingly nonconvex, but can be equivalently
transformed to convex problems by existing known methods, for example, change of vari-
ables. Such problems are NOT considered as nonconvex in our context.
2 z − Rn and z + Rn correspond to the sets {z |z ≤ z} and {z |z ≥ z}, respectively.
+ +
4 Introduction
was made by Qian et al. [24], where the global optimal power con-
trol solution of ad hoc networks was found by exploiting the hidden
monotonicity of the nonconvex power control problem. This work was
subsequently followed by a number of researchers [5, 9, 12, 13, 15, 16,
19, 23, 25, 38, 39, 41, 43], where monotonicity or hidden monotonic-
ity structures were exploited to solve a variety of nonconvex problems
arising from areas including capacity maximization, scheduling, MIMO
precoding and detection, distributed antenna coordination, and optimal
relaying, etc. By and large, the application of monotonic optimization
in communication and networking systems is still at its infancy stage,
mainly because the technique is relatively new and unfamiliar to the
communication and networking community. This is contrasted by the
fact that most nonconvex problems considered in the communication
and networking community are indeed monotonic.
The purpose of this monograph is to provide a succinct and accessi-
ble introduction to the theory and algorithms of monotonic optimiza-
tion. Through several application examples, we will illustrate modeling
techniques and algorithm details of monotonic optimization in various
engineering scenarios. This is a humble attempt to spur new research
activities in substantially broadening the scope of application of this
promising technique in communication and networking systems.
1.2 Outline
There are two main parts in this monograph. Part I focuses on the
theory and Part II on the application.
Part I consists of Sections 2 and 3, and is mainly based on the work
of Tuy et al. [15, 22, 31, 32, 33, 34, 35, 37]. In particular, Section 2
discusses the formulation techniques, including the canonical formu-
lation of monotonic optimization problems and problems that can be
transformed into the canonical form. Section 3 introduces the polyblock
outer approximation algorithm and its various enhancements that expe-
dite the algorithm. The discussion is then extended to problems with
discrete variables.
Part II consists of Sections 4–7. In particular, Section 4 discusses
nonconvex power control in wireless interference channels, where the
1.3 Notations 5
1.3 Notations
Throughout this monograph, vectors are denoted by boldface lower case
letters and matrices are denoted by boldface upper case letters. The ith
entry of a vector x is denoted by xi . We use R, R+ , and R++ to denote
the set of real numbers, nonnegative real numbers, and positive real
numbers, respectively. The set of n-dimensional real, nonnegative real,
and positive real vectors are denoted by Rn , Rn+ , Rn++ , respectively.
ei ∈ Rn denotes the ith unit vector of Rn , i.e., the vector such that
eii = 1 and eij = 0 for all j = i. e ∈ Rn is an all-one vector.
For any two vectors x, y ∈ R, we say x ≤ y (or x < y) if xi ≤ yi
(or xi < yi ) for all i = 1, · · · , n. When x ≤ y, we also say y domi-
nates x or x is dominated by y. Moreover, x − Rn+ and x + Rn+ cor-
respond to the cones {x |x ≤ x} and {x |x ≥ x}, respectively. ∪, ∩,
and\ represent set union, set intersection, and set difference operators,
respectively.
Part I
Theory
2
Problem Formulation
2.1 Preliminary
Let us first introduce some definitions that will be useful later.
7
8 Problem Formulation
Fig. 2.1 Illustration of boxes, normal/conormal sets, normal hull, upper boundary, and
separation property.
In this case, we can assume that the conormal set H in Equation (2.1)
is box [0, b] itself. In the remaining of this monograph, we assume that
the problem considered is feasible, i.e., G ∩ H = ∅.
In real applications, sets G and H often result from constraints
involving increasing functions gi (x) : Rn+ → R and hi (x) : Rn+ → R
gi (x) ≤ 0, i = 1, . . . , m1 ,
hi (x) ≥ 0, i = m1 + 1, . . . , m.
Setting g(x) = max{g1 (x), . . . , gm1 (x)} and h(x) = min{hm1 +1 (x), . . .,
hm (x)}, the above inequalities are equivalent to
g(x) ≤ 0, h(x) ≥ 0.
Proposition 2.1. For any increasing function g(x) on Rn+ , the set
G = {x ∈ Rn+ |g(x) ≤ 0} is normal and it is closed if g(x) is lower semi-
continuous. Similarly, for any increasing function h(x) on Rn+ , the set
H = {x ∈ Rn+ |h(x) ≥ 0} is conormal and it is closed if h(x) is upper
semicontinuous.
2.3 Problems with Hidden Monotonicity 11
+ |u(x) ≤ y, x ∈ D}.
H = {y ∈ Rm
where
sup{f (x)|u(x) ≤ y, x ∈ D}, if y ∈ H,
θ(y) = (2.8)
−M, otherwise.
Here, M > 0 is an arbitrary number such that −M < min{f (x)|x ∈ D}.
If f (x) is concave, ui (x)’s are convex, and D is convex, then θ(y) is the
optimal value of a convex program.
where f (x) and g(x) are increasing functions on Rn+ . G and H are
defined as in Equation (2.1). Note that Equation (2.9) captures a large
class of problems. For example, any polynomial p(x) on Rn+ can be
expressed as a difference of two increasing functions. This can be done
by grouping separately the terms with positive coefficients and those
with negative coefficients, and rewrite p(x) as p(x) = p1 (x) − p2 (x),
where p1 (x) and p2 (x) are polynomials with positive coefficients, and
hence are increasing functions.
14 Problem Formulation
To write Equation (2.9) in the canonical form, notice that for every
x ∈ [0, b] we have g(x) ≤ g(b). In other words, there exists a t ≥ 0 such
that g(x) + t = g(b). Hence, the problem can be rewritten as
which is equivalent to
+ , D is a
It is easy to see that F (x, t) is an increasing function on Rn+1
closed normal set contained in box [0, b] × [0, g(b) − g(0)], and E is a
closed conormal set in this box. Hence, Problem (2.10) reduces to
where t ≥ 0. Define
Here, G is a normal set contained in box [0, b] × [0, g(b) − g(0)] and H
is a conormal set. Thus, the problem is monotonic optimization in the
canonical form.
where f˜(y) = −f (b − y), g̃(y) = −g(b − y), and h̃(y) = −(b − y) are
increasing functions on [0, b].
With the above discussions, we will focus in this monograph
monotonic maximization problems only.
3
Algorithms
16
3.1 An Intuitive Description 17
(a) (b)
Fig. 3.1 (a) A polyhedron enclosing a convex set. (b) A polyblock enclosing a normal set.
P1 ⊃ P2 ⊃ · · · ⊃ Pk ⊃ · · · ⊃ G ∩ H
where gi (·)’s are the increasing functions defining the normal set G, as
discussed at the beginning of Section 2. The computational complexity
required in solving the problem depends heavily on the forms of gi (·).
The computation becomes even trickier when hidden monotonicity is
involved. Take the case in Section 2.3.1 for example. Finding πG (zk )
reduces to solving a max–min problem as follows.
ui (x)
max{α|αzk ≤ u(x), x ∈ D} = max{α|α ≤ min , x ∈ D}
i=1,...,m zki
ui (x)
= max min . (3.2)
x∈D i=1,...,m zki
CBVk = f (x̄k ) denote the current best value. At the k + 1th iteration,
let x̄k+1 = πG (zk+1 ) and CBVk+1 = f (πG (zk+1 )) if πG (zk+1 ) ∈ G ∩ H
and f (πG (zk+1 )) ≥ CBVk . Otherwise, let x̄k+1 = x̄k and CBVk+1 =
CBVk . The algorithm terminates when |f (zk ) − CBVk | ≤ , where
≥ 0 is a given tolerance. We can show that an -optimal solution1
can be obtained following this procedure.
Alternatively, we can terminate the algorithm when zk is sufficiently
close to the feasible set, i.e., |zk − x̄k | ≤ δ, where δ is a small positive
number. The resultant solution is called a δ-approximate optimal solu-
tion. As we will discuss later, this additional termination criterion is
needed to guarantee the execution time of the algorithm to be finite.
With the above building blocks, we now summarize the polyblock
approximation algorithm in Algorithm 2. In particular, Line 4 finds
the vertex that maximizes the objective function value among all ver-
tices of Pk . Line 5 computes the projection πG (zk ). Lines 6 and 7 indi-
cate that the optimal solution is obtained if the optimal vertex zk
is already in the feasible set. Otherwise, Lines 10 and 11 generate a
smaller polyblock Pk+1 from Pk by excluding the cone Kπ+G (zk ) and
removing improper vertices and vertices that are not in H. The result-
ing Pk+1 still encloses G ∩ H. Finally, the algorithm terminates when
f (zk ) − CBVk is sufficiently small.
Interested readers are referred to [31, 33] for the proof of the propo-
sition.
We would like to comment that even if f (x) is not Lipschitz continu-
ous, Algorithm 2 can still terminate in a finite number of iterations if an
additional termination condition |zk − x̄k | ≤ δ is added to Line 9 of the
3.2 Basic Polyblock Outer Approximation Algorithm 25
0 < a ≤ x, ∀x ∈ H.
When this condition does not hold, e.g., when H includes vectors with
some entries being 0 (i.e., the case in Figure 3.3(a)), the convergence
of Algorithm 2 cannot be guaranteed.
To restore this condition, one can shift the origin to the negative
orthant, say to −βe, where β > 0 is chosen to be not too small (see
Figure 3.3(b)). Then, with respect to the new origin, we have Ĥ =
H + βe being the shifted conormal set and Ĝ = Rn+ ∩ (G + βe − Rn+ )
being the normal hull of G. Let
ˆ f (x − βe), if x ≥ βe
f (x) = ,
−M, otherwise
max{fˆ(x)|x ∈ Ĝ ∩ Ĥ},
(a) (b)
3.3 Enhancements
In this section, we discuss two enhancements that expedite the poly-
block outer approximation algorithm. Subsection 3.3.1 is about reduc-
ing the vertex set Tk at each iteration by removing unnecessary vertices,
and Subsection 3.3.2 is about expediting the shrinking of the enclosing
polyblock.
11: Remove from Tk+1 the improper vertices and all vertices such
that {v ∈ Tk+1 |v ∈
/ H or f (v) ≤ CBVk + }.
13: until Tk+1 = ∅.
That is, P is smaller than P and yet contains all points in G ∩ H that
were contained by P.
As a simple example, let us first consider box [0, b] that contains
G ∩ H or a part of it. We wish to find the smallest b such that [0, b ]
still contains G ∩ H ∩ [0, b].
Likewise, given box [0, b], the smallest b such that [0, b ] contains
G ∩ H ∩ [0, b] is given by the following:
G ∩ H ∩ P ⊂ P ⊂ P.
(a) (b)
(a) (b)
(c)
(a) (b)
(c)
11: Remove from Tk+1 the improper vertices and all vertices such
that {v ∈ Tk+1 |v ∈
/ H or f (v) ≤ CBVk + }. If Tk+1 = ∅, apply the
tightening procedure in Proposition 3.11.
13: until Tk+1 = ∅.
P1 ⊃ P2 ⊃ · · · ⊃ Pk ⊃ · · · ⊃ G ∩ H ∩ S(k) ,
where S(k) = {x ∈ S|f (x) > CBVk−1 }, where CBVk−1 is the current
best value known from the last round.
The algorithm for discrete monotonic optimization differs from the
one for continuous monotonic optimization mainly in the following two
building blocks.
(1) Computing the upper boundary point from z ∈ Rn+ \ G
The procedures in Subsection 3.2.1 for continuous monotonic opti-
mization step can be slightly adjusted for discrete problems as follows
by the property of lower S-adjustment in Proposition 3.12.
3.4 Discrete Monotonic Optimization 33
Input: zk , G, S(k)
Output: π̃G (zk ) such that π̃G (zk ) ∈ G ∩ S(k) and Kπ̃+G (zk ) ∩ (G ∩ H ∩
S(k) ) = ∅.
1: Calculate πG (zk ) according to Algorithm 1.
2: If πG (zk ) ∈ S(k) , then let π̃G (zk ) = πG (zk ).
3: Otherwise, if πG (zk ) ∈ ∗ , then let π̃ (z ) = π (z )
/ S(k) G k G k S(k) .
Applications
36
1 Forexample, this could represent a network snapshot under a particular schedule of trans-
missions determined by an underlying routing and MAC protocol.
37
38 Power Control in Wireless Networks
and the data rate calculated based on the Shannon capacity formula is
log2 (1 + γi (p)).2 To simplify notations, we use p = (pi , ∀i ∈ L), Pmax =
(Pimax , ∀i ∈ L), and γ(p) = (γi (p), ∀i ∈ L) to represent the transmission
power vector, the maximum transmission power vector, and achieved
SINR vector of all links, respectively.
We want to find the optimal power allocation p∗ that maximizes a
system utility subject to individual data rate constraints. Mathemati-
cally, we aim to solve the following optimization problem:
2 Tobetter model the achievable rates in a practical system, we can re-normalize γi by βγi ,
where β ∈ [0, 1] represents the system’s “gap” from capacity. Such modification, however,
does not change the analysis in this section.
4.2 Algorithm 39
4.2 Algorithm
Formulated in the canonical form, Problem (4.3) can be solved with
Algorithm 3, as long as γ min is feasible. In the following, we first discuss
how to efficiently check the feasibility of γ min . Then, we will elaborate
the execution of two key steps, i.e., initialization (Line 1 of Algorithm 3)
and projection (Line 5 of Algorithm 3), for the particular problem of
power control.
p = (I − B)−1 u, (4.5)
If the power vector calculated in Equation (4.5) also satisfies the max-
imum transmit power constraint p ≤ Pmax , then γ min is achievable by
a power vector p ∈ [0, Pmax ].
achievable by a power vector p that lies in [0, Pmax ]. Luckily, the com-
plexity of feasibility check for the power control problem is quite low,
as discussed in the last subsection. We can easily check the feasibility
of γ = ᾱzk using Algorithm 5 in each iteration of Algorithm 1.
Knowing how to carry out these two steps, the execution of other
steps of Algorithm 3 is straightforward.
max U (y − 1) (4.8)
y
subject to: y ∈ G ∩ H,
3 In fact, if there are only two active links, they must both transmit at the maximum power.
4.3 Numerical Results 43
Fig. 4.2 The relationship between optimal transmission power and distance d.
45
46 Power Controlled Scheduling in Wireless Networks
Fig. 5.1 A two-link network with G11 = 0.1, G22 = 0.2, G12 = G21 = 0.05, where Gij
denotes the channel gain from node Ti and node Rj .
(a) (b)
Fig. 5.2 The data rate regions obtained by (a) pure power control strategy and (b) power
controlled scheduling strategy, respectively.
The instantaneous data rate set R(t) is the set of all data rates achiev-
able by power allocation at time instant t. On the other hand, the
48 Power Controlled Scheduling in Wireless Networks
average data rate set R̄ is the set of all achievable average data rates
during a scheduling period T through time-varying power allocation.
Lemma 5.1. The achievable average data rate set R̄ is the convex hull
of the instantaneous data rate set R(t), i.e., R̄ = Convex Hull{R(t)}.
k=1
(5.8)
with
Pβ = (β, p)|β k ≥ 0 and 0 ≤ pki ≤ Pimax , ∀i ∈ L, ∀k ∈ K . (5.9)
0 ≤ pk ≤ Pmax , ∀k ∈ K, (5.10c)
which has an equivalent canonical form of
n n+1
max Φ((β̃, y)) = Ûi (β̃ k − 1) log2 (yik )
(β̃,y) i=1 k=1
(5.11)
subject to (β̃, y) ∈ G ∩ H,
where the feasible set
n+1
G = (β̃, y)| (β̃ k − 1) ≤ 1, 0 ≤ yik ≤ γ̃i (pk ), ∀i ∈ L, ∀k ∈ K, p ∈ P ,
k=1
(5.12)
5.2 An Accelerated Algorithm 51
H = (β̃, y)|β̃ ≥ 1, y ≥ 1 , (5.13)
with
P = p|0 ≤ pki ≤ Pimax , ∀i ∈ L, ∀k ∈ K . (5.14)
Suppose that
T1 R1
2m
T2 R2 d R4 T4
8m d d 4m
d
R3 T3
6m
is d−4
ij , where dij denotes the distance between the two nodes. Assume
that P max = (1.0 1.0 1.0 1.0) mW, and ni = 0.1 µW for all links. There
are no minimum data rate constraints in this example. In Figure 5.4 and
Figure 5.6, we investigate the system utility obtained by A-S-MAPEL
under different error tolerances and tol, with different utility functions
1
Ui (ri ) = log ri and Ui (ri ) = 1+exp(−r i +2)
, respectively. As a benchmark,
the optimal system utilities are also plotted. Correspondingly, the num-
bers of iterations for convergence are plotted in Figures 5.5 and 5.7,
respectively.
From Figures 5.4 and 5.6, we can see that the A-S-MAPEL
algorithm achieves a result very close to the global optimal solution.
For example, when tol = 0.0005, A-S-MAPEL obtains a system utility
that is only 0.33% away from the optimum for proportional fair util-
ity, and 0.17% away from the optimum for sigmoidal utility. On the
other hand, it is not surprising to see that the algorithm performance
improves with a smaller value of either or tol. In general, the algo-
rithm performance is not sensitive to the value of when tol is small
enough. For example, when tol = 0.0005, the obtained system utility
is roughly constant for any ∈ [0, 0.5] for both proportional fair util-
ity and sigmoidal utility. However, Figures 5.5 and 5.7 show that the
convergence time of A-S-MAPEL can be quite different for different
objective functions. Moreover, the total number of iterations increases
when either or tol decreases, and the increase is drastic when tol is
close to 0. Obviously, parameters and tol provide a tuning knob for
54 Power Controlled Scheduling in Wireless Networks
3.2
2.9
2.8
Total Proportional Fairness at tol=0.01
2.7 Total Proportional Fairness at tol=0.001
Total Proportional Fairness at tol=0.0005
2.6 Optimal Total Proportional Fairness
2.5
0.5 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.05 0
Error Tolerance
x 104
1.5
1.35
1.2
1.05
Iterations
0.9
0.75
0.6 Number of Iterations at tol=0.01
0.45 Number of Iterations at tol=0.001
0.3 Number of Iterations at tol=0.0005
0.15
0
0.5 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.05 0
Error Tolerance
Fig. 5.5 The number of iterations needed for different error tolerance when obtaining total
proportional fairness.
2.35
2.3
4
x 10
2
1.8 Number of Iterations at tol=0.01
Number of Iterations at tol=0.001
1.6
Number of Iterations at tol=0.0005
1.4
1.2
Iterations
1
0.8
0.6
0.4
0.2
0
0.5 0.45 0.4 0.35 0.3 0.25 0.2 0.15 0.1 0.05 0
Error Tolerance
Fig. 5.7 The number of iterations needed for different error tolerance when obtaining
summation of sigmoidal functions.
we set Ui (ri ) = log ri , and let the minimum data rate constraints be
1.0 bps/Hz for all links. Other settings are the same as the previous
example. In Figure 5.8, we let d = 5, 10, 15 m, and set the scheduling
period to be 10 seconds for each d.
Figure 5.8 shows that the optimal power and scheduling solution
heavily depend on the node density. Specifically, when the four links
are close to each other (e.g., d = 5 m, from 0 to 10 seconds), the
56 Power Controlled Scheduling in Wireless Networks
P.A. (mW)
1
Link 1
0.5 d=5m
d=10m d=15m
0
0 5 10 15 20 25 30
Time (Second)
P.A. (mW)
1
0.5 Link 2 d=5m d=10m d=15m
0
0 5 10 15 20 25 30
Time (Second)
P.A. (mW)
1
0.5
d=5m d=10m
0 Link 3 d=15m
0 5 10 15 20 25 30
Time (Second)
P.A. (mW)
1
0.5
Link 4 d=5m d=10m d=15m
0
0 5 10 15 20 25 30
Time (Second)
Fig. 5.8 The optimal allocation versus node density (P.A.: Power Allocation).
to obtain the optimal power control solution. With the on–off power
control, each transmitter either transmits at the maximum power level
Pimax or remains silent. Meanwhile, the on–off scheduling is the same as
power controlled scheduling except that transmitters either transmit at
the maximum power Pimax or remains silent. It can be seen that The-
orem 5.2 also applies to this case, and hence no more than n + 1 slots
are needed to achieve the optimal performance of on–off scheduling.
We consider n-link networks. Links are randomly placed in a 15 m-
by-15 m area. The length of each link is uniformly distributed within
[1 m, 2 m]. Meanwhile, set Pimax =1 mW and ni = 0.1 µW. In Table 5.1,
the performance of optimal joint power control and scheduling, pure
power control, on–off power control, and on–off scheduling are given
for different utility functions when n = 3 and n = 4. Each value in the
table is an average over 50 different topologies.
We can see that both power control schemes without scheduling
are outperformed by the ones with scheduling. This is because in a
dense network, power control alone is not sufficient to eliminate strong
levels of interference between close-by links. One interesting observa-
tion is that without scheduling, on–off power control may lead to a
Table 5.1. Comparison of pure power control, on–off scheduling versus power controlled
scheduling.
Average performance
1 1
Strategies Ui (ri ) = log(ri ) Ui (ri ) = 1+exp(−ri +2)
Ui (ri ) = 1+exp(−ri +4)
much lower system utility compared with the optimal power control
solution. In contrast, the performance gap between on–off scheduling
and optimal power controlled scheduling is negligible. This is due to
the fact that the links that are scheduled to transmit in the same
time slot are typically far from each other and do not impose excessive
interference on one another. As a result, it is likely to be optimal or
very close to optimal for the links to transmit at the maximum power
level. In practice, most off-the-shelf wireless devices are only allowed
to either transmit at the maximum power (i.e., be on) or remain silent
(i.e., be off). Therefore, scheduling is an indispensable component for
system utility maximization if “off-the-shelf” wireless devices are to be
used.
6
Optimal Transmit Beamforming in MISO
Interference Channels
59
60 Optimal Transmit Beamforming in MISO Interference Channels
link i is
|hHii wi |
2
γi (w1 , . . . , wn ) = . (6.1)
j=i |hji wj | + ηi
H 2
Like before, we use U (·) to denote the system utility function, which
monotonically increases with γ = (γi , ∀i ∈ L). We aim to solve the
following utility maximization problem:
max U (y)
y
(6.3)
subject to y ∈ G ∩ H,
6.2 Algorithm
As we have discussed before, a key step of the polyblock outer approx-
imation algorithm is to find the projection point πG (zk ) on the upper
boundary of the feasible set. In Section 4, πG (zk ) can be efficiently
obtained by the bisection search algorithm, as checking the feasibil-
ity of an SINR vector ᾱzk for SISO interference channels is as simple
as solving an eigenvalue decomposition problem. In MISO channels,
however, checking the feasibility of an SINR vector is not as simple.
6.2 Algorithm 61
max 0 (6.4a)
w1 ,...,wn
|hHii wi |
2
subject to ≥ ᾱzki , ∀i = 1, . . . , n, (6.4b)
j=i |hji wj | + ηi
H 2
The problem returns a value 0 if the constraints are feasible (i.e., ᾱzk
is achievable) and −∞ otherwise. At the first glance, Problem (6.4) is
nonconvex due to the nonconvexity of the SINR constraints. Nonethe-
less, a close observation reveals that one can adjust the phase of wi to
make hH ii wi real and nonnegative without affecting the value of |hii wi |.
H
H
Thus, without loss of generality, we can assume that hii wi is real and
nonnegative for all i, Problem (6.4) becomes
max 0 (6.5a)
w1 ,...,wn
H
h1i w1
√ ..
.
subject to ᾱzki ≤ hH
ii wi , ∀i = 1, . . . , n (6.5b)
hH w n
√ni
ηi
2
which is an SOCP. With this, πG (zk ) can be found using the bisection
method in Algorithm 1, where each iteration solves Problem (6.5) with
a given ᾱ.
Now that πG (zk ) can be obtained efficiently, we can solve the mono-
tonic optimization problem in Equation (6.3) following Algorithm 2
(with possible enhancements discussed in Section 3.3). Once an opti-
mal y∗ is obtained, the optimal wi∗ can be recovered by solving a series
of equations
|hHii wi |
2
= yi∗ , ∀i = 1, . . . , n. (6.6)
j=i |hji wj | + ηi
H 2
6.3 Extensions
6.3.1 MISO Multicasting
Problem (6.4) can be transformed to an SOCP problem, only because
the numerator of the quadratic fractional function (Problem (6.4b))
can be converted to a real number by rotating the phase of wi . This is
not always possible for GQFP problems in general. As an example, con-
sider a slightly different system, where each multi-antenna transmitter
multicasts to a number of single-antenna receivers. Denote the set of
transmitters as T = {1, . . . , n}, and the multicast group of transmitter
i as M(i). Then, the SINR received by a receiver k ∈ M(i) is
|hHik wi |
2
γk (w1 , . . . , wn ) = ,
j∈T ,j=i |hjk wj | + ηk
H 2
max 0 (6.8a)
w1 ,...,wn
|hHik wi |
2
subject to ≥ ᾱzk , (6.8b)
j∈T ,j=i |hjk wj | + ηk
H 2
∀k ∈ M(1) ∪ · · · ∪ M(n),
0 ≤ ||wi ||22 ≤ Pimax , ∀i = 1, . . . , n. (6.8c)
pi |qH
i hii |
2
γi (q1 , . . . , qn , p1 , . . . , pn ) = . (6.9)
qH H
i ( j=i pj hji hji + ηi I)qi
max 0 (6.10a)
q1 ,...,qn ,p1 ,...,pn
pi |qH
i hii |
2
subject to ≥ ᾱzki , ∀i, (6.10b)
qH H
i ( j=i pj hji hji + ηi I)qi
pi |qHi hii |
2
max min (6.11a)
q1 ,...,qn ,p i ᾱzki qH
i (
H
j=i pj hji hji + ηi I)qi
subject to 0 ≤ pi ≤ Pimax ∀i, (6.11b)
pl = Plmax .
qi = pj hji hH
ji + ηi I
hii . (6.12)
j=i
Moreover, for given qi ’s, the optimal pext := [p, 1]T is obtained as the
dominant eigenvector of matrix
B u
Ai = 1 T 1 T , (6.13)
P max el B P max el u
l l
where
0, i=j
Bij = |qH
i hji |
2 , (6.14)
ᾱzkiH 2 i = j
|qi hii |
and el is the lth standard unit vector. Authors in [16] showed that the
optimal solution to the problem can be obtained by optimizing qi ’s
and p alternatively. Readers are referred to [16] for details.
7
Optimal Random
Medium Access Control (MAC)
There are two major types of wireless medium access control (MAC)
protocols: scheduling-based (e.g., in cellular systems) and contention-
based (e.g., in wireless local area networks) [20]. The sample applica-
tions in the last three sections mainly arise from scheduling-based MAC
protocols. Therein, the objective and constraint functions are increasing
functions of fractional functions. In this section, we are going to focus
on contention-based random access networks, where the objective and
constraint functions are increasing functions of polynomial functions.
65
66 Optimal Random Medium Access Control (MAC)
7.2 Algorithm
7.2.1 Transformation to a Canonical Monotonic
Optimization Problem
Define θ̂i = 1 − θi . Substituting it into Equation (7.2), we have
max U ((θ, θ̂)) = U c1 θ1 θ̂j , . . . , cn θn θ̂j (7.3a)
θ,θ̂ j=1 j=n
subject to ci θi θ̂j ≥ ri,min ∀i = 1, . . . , n (7.3b)
j=i
θi + θ̂i ≤ 1, ∀i = 1, . . . , n, (7.3c)
θi ≥ 0, ∀i = 1, . . . , n, (7.3d)
θ̂i ≥ 0, ∀i = 1, . . . , n. (7.3e)
7.2 Algorithm 67
where
increase drastically as the problem size becomes large. Thus, one should
cautiously reduce the size of the problem as much as possible. In view
of this, we propose to transform Problem (7.4) into the following mono-
tonic optimization problem, where the number of variables is reduced
back to n.
max U (y) = U (c1 y1 , . . . , cn yn ) (7.6a)
y
subject to y ∈ G ∩ H, (7.6b)
where
G = {y|0 ≤ yi ≤ θi θ̂j , θi + θ̂i ≤ 1, θi ≥ 0, θ̂i ≥ 0, ∀i},
j=i
H = {y|ci yi ≥ ri,min , ∀i}.
Like before, the problem can be efficiently solved using the poly-
block outer approximation algorithm in Algorithm 2, as long as the
upper boundary projection point can be calculated with reasonable
computational complexity. Indeed, the following discussion indicates
that the projection point can be obtained by solving a convex opti-
mization problem with reasonable computational complexity.
Suppose that zk is the polyblock vertex that maximizes the objec-
tive function value in the kth iteration, then the projection point αzk
can be obtained by solving the following problem.
max α (7.7a)
α,θ
subject to αzki ≤ ci θi θ̂j ∀i (7.7b)
j=i
θi + θ̂i ≤ 1 ∀i (7.7c)
θi ≥ 0, θ̂i ≥ 0 ∀i. (7.7d)
This problem can be equivalently rewritten as a standard Geometric
Programming problem:
min α−1 (7.8a)
α,θ
subject to c−1 −1
i αzki θi θ̂j−1 ≤ 1 ∀i (7.8b)
j=i
7.3 Discussions 69
θi + θ̂i ≤ 1 ∀i (7.8c)
θi ≥ 0, θ̂i ≥ 0 ∀i, (7.8d)
7.3 Discussions
So far, we have assumed that the n links fully interfere with each
other, i.e., no two links can be simultaneously active. The problem
can be easily extended to cases when a link only interferes with, and is
interfered by, nearby links. In this case, the throughput calculation in
Equation (7.1) is modified as
ri = ci θi (1 − θj ), (7.9)
j∈I(i)
where I(i) denotes the set of links that interfere with link i. All other
formulations remain the same.
There have been numerous work on the throughput performance
of random-access networks, e.g., carrier-sensing multi-access (CSMA)
networks. While most of the early work focuses on fully interfered net-
works [1, 26, 42], the analysis on non-fully interfered networks is much
more complicated (and interesting) [6, 7, 14, 21]. A common challenge
here is to understand the ultimate throughput that is achievable by
random access, and to understand how to tune the parameters of the
CSMA protocol to achieve the maximum throughput. The monotonic
optimization method in this section serves as a useful tool to address
this challenge, as we can now easily calculate the maximum system
utility, including throughput, of random-access networks.
Noticeably, the monotonic optimization method only quantifies the
ultimate performance that is achievable, but does not indicate how to
achieve such performance. This may spur interesting future research
interests in reverse engineering the CSMA protocol to find the optimal
parameters that maximize a system utility.
8
Concluding Remarks
70
71
72
References 73