Target-Driven and Incentive-Aligned Power Control for Wireless Networks Benjamin Yolken and Nicholas Bambos Department of Management Science and Engineering Stanford University {yolken,bambos}@stanford.edu

Abstract—In this paper, we examine the wireless network power control problem. We first consider two approaches that have evolved in parallel, catering to distinct concerns: (a) a distributed approach with convergence to ‘hard’ SIR targets, introduced by Foschini and Miljanic [1] and (b) an incentivebased, game theoretic approach, investigated by Saraydar, Mandayam, and Goodman [2] among others. We then seek to reconcile these two approaches and explore the rich space in between by formulating a utility-based model in which users have ‘soft’ SIR targets. We prove that, under certain cost conditions, a Nash Equilibrium of the resulting game is identical to the convergence point of the Foschini-Miljanic (FM) algorithm. Thus, one can use the latter in an incentive-compatible way. If these conditions are not met, however, then the system necessarily will operate at a non-FM point, i.e. one in which some SIR targets are not attained. We propose an algorithm for this case and show by simulation that the resulting Nash points may have desirable power efficiency properties. Thus, under our model, the network can be either aligned or not aligned with the FM scheme, each of which potentially has its advantages.

I. I NTRODUCTION Transmitter power control plays a significant role in wireless networking, affecting the users’ quality-of-service (QoS) as well as network capacity and efficiency. It can be accomplished by setting a target signal-to-interference ratio (SIR) for each user and applying one of a number of algorithms to push the system into an operating point at which all SIR targets are met with minimum total power expenditure. This approach, first proposed by Foschini and Miljanic [1], has since been improved with the addition of active link protection, admission control, faster convergence, and other features [3]–[5]. While this approach has a number of highly desirable properties (simple, distributed, provably convergent algorithms etc.) it does not explicitly consider the tradeoff between SIR and power expenditure. The SIR targets are ‘hard’ – each user either achieves its target or (if this is not possible) is rejected from the system. Even if the former does occur, it could require an arbitrarily high power from the user. Depending on the user’s preferences, this outcome could be less favorable than simply getting a lower SIR with less power. In addition, there are no guarantees that the Foschini-Miljanic derived outcome is efficient with respect to capacity, fairness, or other metrics which may be important to the network participants. In response to these concerns, recent work has explored the power control problem from an economic, rather than purely engineering, perspective. As opposed to setting targets,

each user has a utility function that quantifies its ‘happiness’ under each possible network state. These utilities are usually taken to be a function of the SIR minus some ‘cost’ which increases in the expended power, thus reflecting the SIRpower tradeoff discussed above. The power control problem can then be formulated as an economic game in which each user selfishly chooses its power to maximize its own utility, given the choices of the other users. At the core of this approach is the concept of a Nash Equilibrium, a stable operating point at which each user is ‘best-responding’ to the actions of the other users. Given certain utility function forms, one can prove the existence, and often uniqueness, of Nash Equilibria in such power games [2], [6]–[8]. In addition, by adjusting the ‘cost’ term in the utility functions, one can optimize the Pareto efficiency or total throughput of the Nash-predicted outcome [9], [10]. The two approaches above have largely evolved independently or in parallel. Given an application (voice, data, etc.) either one or the other is considered the appropriate model to use. We believe, however, that in several instances elements from both are appropriate. For example, in the case of wireless video transfer, there may be an ideal quality level that can be achieved (corresponding to a SIR target), but lower qualities may be acceptable depending on the SIR-power tradeoffs involved (corresponding to a utility model). In this paper, therefore, we seek to reconcile the two approaches and explore the rich space between these two extreme points. We propose a utility model in which users do set SIR targets, but where these are soft in the sense that an attained below-target SIR can still result in positive utility. We then derive a set of necessary and sufficient conditions for the Foschini-Miljanic (FM) operating point [1] to be a Nash Equilibrium for the given system. Thus, by adjusting the system parameters, it becomes possible to get the desirable properties of the first approach while, at the same time, reaching a stable operating point that is conceivably incentivecompatible. If these conditions are not met, then other nonFM points are possible. Our preliminary research reveals that convergence to these points is possible and that the resulting outcomes might also have desirable properties. Thus, there may be reasons for not operating at the FM point in certain cases. The remainder of this paper is organized as follows. In section II, we describe the wireless network model used as

the basis for our analysis and briefly review the properties of the FM power control algorithm. In section III, we extend this model to include target-based utility functions. In section IV, we examine the properties of Nash Equilibria in this system and give conditions for these to be identical to the FM outcomes. We then propose a power update algorithm in section V and evaluate its performance. Finally, in section VI, we conclude and discuss directions of ongoing research.

6 Feasible region

p2

½ Fij ui

= =

0 γ ¯i Gij Gii

if i = j if i = 6 j

γ ¯i ηi Gii

∀ i, j (3)

Using Perron-Frobenius theory, we can see that the existence of such a power vector is equivalent to the existence and componentwise positivity of (I − F)−1 (which is exactly the case when the spectral radius ρF of F is less than 1). Actually, the region of feasible powers is a cone in RN + (for example, see Fig. 1) whose ‘tip’ is given by p∗ = (I − F)−1 u > 0,

(4)

Indeed, any other feasible power vector satisfies



Illustration of p∗ geometry for N = 2 case.

Moreover, provided that such a p∗ < ∞ exists (that is, when ρF < 1), the system is guaranteed to converge to p∗ if each user autonomously applies the Foschini-Miljanic (FM) power update algorithm [1]: pi (t + 1) = pi (t)

∀i

p ≥ p∗

Fig. 1.

(1)

where Gii is the power-attenuation of user i’s signal from its transmitter to its receiver. Similarly, Gij is the powerattenuation of user j’s signal from the transmitter of link j to the receiver of link i; this signal is seen as interference by the receiver of link i. Finally, ηi is the thermal noise power at the receiver of link/user i. All of the former constants are assumed to be strictly positive. Their specific values depend on the network topology of the links and scatterers, as well as the transmission technology used. Moreover, suppose that each user has a ‘hard’ target SIR, γ¯i > 0, it aims to attain. We seek a power vector p > 0 at which γi (p) ≥ γ¯i for all i. With standard manipulations [3], this can be expressed as seeking power vectors p > 0 satisfying (I − F)p ≥ u, (2) where

-

p1

Consider a wireless network consisting of N interfering radio links in a given channel. Links in other orthogonal channels are not considered, as they do not interfere with those under consideration. Each link/user in this channel chooses a transmission power pi and experiences SIR γi . Let p = (p1 , . . . , pN ) be the vector of transmission powers. Each user’s SIR can be expressed as Gii pi i6=j Gij pj + ηi

γ2 (p)=¯ γ2 p∗

II. N ETWORK M ODEL W ITH ‘H ARD ’ SIR TARGETS

γi (p) = P

ª

γ1 (p)=¯ γ1

(5)

Therefore, p is Pareto optimal in the sense that it satisfies all the SIR requirements with the minimum possible power expenditure.

γ¯i γi (t)

(6)

We thus have a simple, distributed procedure for converging to the ‘lowest power’ point at which all SIR requirements are satisfied. Additional refinements (not discussed here for lack of space) allow for active link protection, admission control, and other desirable features [3]. If such a solution p∗ < ∞ does not exist (when ρF ≥ 1), then there is no power vector at which all SIR targets will be met. Thus, we have to exclude one or more users/links from participating in the network (or, equivalently, we say that not all users are admissible). For lack of space, we do not discuss the admission control problem in this paper, assuming that such a p∗ < ∞ always exists for the given set of SIR targets considered. III. U TILITY N ETWORK M ODEL As discussed in the introduction, the previous model allows for only a limited set of outcomes and may not be compatible with user incentives. To address these concerns, we introduce a utility function for each user that quantifies its preferences for certain outcomes over others. The exact form of such a utility function must ultimately be empirically derived. In many cases, however, one can exploit the model structure to postulate a form that captures the tradeoffs involved in satisfying users/links. In the case of our wireless channel model, we hypothesize the following general utility structure: Ui (p) = Vi (γi (p)) − Ci (pi )

∀i

(7)

That is, each user’s utility is given by the value Vi (γi (p)) the user gets at link quality γi (p) (reflecting throughput, etc.) minus the power-related cost Ci (pi ) it has to endure to attain that link quality. For simplicity, we will refer to these as the ‘value’ and ‘cost’ functions, respectively. The former is a function of the user’s perceived SIR since this is a good proxy for channel quality. The latter, on the other hand, is some

concave on [0, γ¯i ], with continuity at γ¯i . This simplifies our analysis and, as discussed above, is the plausible form under certain circumstances. The results we derive, however, can be extended to other classes of functions (e.g., convex). This is a topic of future research.

6 concave Vi (γi ) linear

B. Cost Functions

convex discontinuous γ ¯i

-

γi

Fig. 2. Some possible Vi (·) function forms for environments with ‘soft’ target SIRs.

function of the power expended. This cost could be ‘internal’ (for example, the user is operating from a battery and hence power is a valuable resource) and/or imposed by the system operator for profit or efficiency enhancement. This general model is plausible and is, indeed, a form used commonly in the literature, e.g. in [6]–[8]. A. Value Functions for ‘Soft’ SIR Targets We now introduce special value functions, reflecting ‘soft’ SIR targets, which support the model we develop. Suppose that each user has a target SIR γ¯i similar to that in the previous section. Assume, though, that this target is now soft – that is, attained SIRs above the target result in no additional value, but lower SIRs may still be acceptable if the target cannot be attained. This is reflected by imposing the following mathematical structure on the Vi utility components: 1) Vi (·) is weakly increasing on [0, γ¯i ) and constant on [¯ γi , ∞). 2) Vi (·) is continuous at all points in its domain except, possibly, at γ¯i . 3) Vi (·) achieves its maximum at γ¯i . Property 1 follows directly from our assumptions on the utility of SIRs beyond the target. Property 2 assures continuity except at, possibly, γ¯i . The latter is allowed to accommodate binary SIR valuations, among other forms. Finally, the third property is a technical assumption to ensure that, in the event of a discontinuity at γ¯i , the function stays below Vi (¯ γi ) to the left of this point. Some possible Vi (·) forms are illustrated in Fig. 2 above. The exact structure of the Vi (·) functions on [0, γ¯i ] is open to interpretation and most likely depends on the application being modeled. Communication theory, for instance, suggests that the capacity of a wireless link is concave (specifically, logarithmic) in SIR under certain assumptions [6]. At the same time, however, certain applications (esp. voice) may require an SIR very close to the target to be useful, with marginal value increasing in powers below the target. Thus, even if the capacity is theoretically concave in SIR, the perceptual/actual value that a user gets could still be convex in this quantity. Because of space constraints, we henceforth restrict our attention to Vi (·) functions which are strictly increasing and

On the other hand, the cost functions should satisfy the following: 1) Ci (·) is strictly increasing and positive on (0, ∞). 2) Ci (·) is continuous at all points except, possibly, 0. 3) Ci (0) = 0 Thus, we have a standard continuous, increasing function with a possible jump at 0 (corresponding to some fixed ‘participation’ cost). For simplicity, however, we will restrict ourselves to linear cost functions in the remainder of this paper. That is, we take Ci (pi ) = ci pi

∀i

(8)

for some strictly positive constants (c1 , c2 , . . . , cN ). This is the common assumption in the literature [2], [6], [7] and is sufficient for a ‘first run’ analysis. IV. T HE P OWER C ONTROL G AME We now consider the single-stage game in which N users with given target SIRs simultaneously choose transmission powers pi ∈ [0, ∞) ∀ i. Each user’s utility is given by a function of the form discussed previously, that is, Ui (p) = Vi (γi (p)) − ci pi

∀i

(9)

with Vi (·) strictly increasing and concave on [0, γ¯i ] and ci > 0. Furthermore, we assume that all users are admissible from a ‘hard’ target standpoint; they can attain their SIR targets with finite powers. The latter implies the existence of a unique FM operating point, p∗ , as discussed in section II. The objects of study in such games are usually Nash Equilibria (NE), that is, points at which each user is ‘bestresponding’ to the actions of the other users. More formally, let p−i represent the vector of powers of all users other than i. Then, p ˆ is a Nash Equilibrium1 in the above power control game if, for each user i U (ˆ pi , p ˆ −i ) ≥ U (p0i , p ˆ −i )

∀p0i ∈ [0, ∞)

(10)

If the system is not at a Nash Equilibrium, then at least one user will have an incentive to unilaterally deviate and change its power. Thus, Nash Equilibria can be considered stable operating points of a system in which noncooperating users act selfishly to maximize their utilities. In the remainder of this section, we explore the properties of Nash Equilibria (NE) in the power control game with the above utility functions. In particular, we first derive some strategy and outcome restrictions. We then give a set of conditions under which the FM and NE operating points coincide. 1 In

this paper, we restrict our attention to Nash Equilibria in pure strategies.

6

B. Concave Case γ1 (p)=¯ γ1

p∗

p2

¾ p

p1

γ2 (p)=¯ γ2

p ¯

-

Fig. 3. Illustration of region containing possible NE (dark shaded box). At any p ¯ outside this region, at least one user can lower its power and be strictly better off.

A. Strategy and Outcome Space Restriction The power control game formulated above allows for infinite powers and thus has an unbounded strategy space. However, we can argue that, independent of the exact form of Vi (·), each user can be restricted without loss of generality to a bounded strategy space; all powers above Vic(¯iγi ) are strictly dominated by pi = 0. In other words, a user would never conceivably choose a power above the former since, independent of the choices of the other users, it could do strictly better by setting its power to 0. Moreover, as addressed by the following theorem, we can restrict the set of possible Nash Equilibrium outcomes: Theorem 1: If a Nash Equilibrium p ˆ exists for the given power control game, then necessarily 0 ≤ pˆi ≤ p∗i for all i. Proof: Consider the polytope P defined by the inequality system (I − F)p ≤ u (11) p ≥ 0 where F and u are as defined previously in section II. Multiplying both sides of the first inequality by (I − F)−1 and using the fact that the latter matrix is componentwise positive, we get that any point in P must also satisfy p ≤ p∗

i6=j

(12)

Now, suppose by contradiction that p ¯ is a Nash Equilibrium for the power control game but the condition given in the theorem does not hold. This implies that p ¯ ∈ / P and hence, for some user i, we have ((I − F)¯ p)i > ui

We begin with the following existence theorem: Theorem 2: If the Vi (·) functions are concave on the interval [0, γ¯i ] and continuous at γ¯i , then the power control game admits at least one Nash Equilibrium. Proof: By the discussion in the previous subsection, each user’s strategy space can be restricted without loss of generality to the interval [0, Vic(¯iγi ) ], a compact, convex, Euclidean set. Moreover, by the assumptions on Ui (·) and Vi (·), each user’s utility is continuous in p and concave in pi . Thus, by Rosen’s Theorem [11], a (pure strategy) Nash Equilibrium must exist for the given game. In general, the set of Nash Equilibria predicted by the above result will not necessarily include the p∗ resulting from the FM scheme. We can, however, impose additional conditions which allow for the latter to hold: Theorem 3: p∗ is a Nash Equilibrium for the concave V 0 (¯ γ )¯ γ power control game if and only if i p∗i i ≥ ci holds for i all users i = 1 . . . N .2 Proof: Follows directly from the first order conditions of user i’s ‘best-response’ to the powers of the other users. Note that the previous theorem does not guarantee p∗ is a unique Nash Equilibrium in the general case. Thus, even if the system reaches p∗ , it could drift to another operating point due to unilateral deviations or system noise. If we assume logarithmic Vi (·) functions, however, then we do get the desired uniqueness: Theorem 4: Suppose that, for each user i, Vi (γ) = ui ln(γ + 1) ∀γ ∈ [0, γ¯i ] for some positive constant ui . Then, under the conditions of the previous theorem, p∗ is a unique Nash Equilibrium. Proof: Suppose by contradiction that the cost inequalities hold but there is another Nash Equilibrium point, p ˆ , with p ˆ 6= p∗ . By theorem 1 above, we have that p ˆ ≤ p∗ . Let the total interference experienced by user i be given by the function X Ii (p−i ) = Gij pj ; (14)

(13)

implying that user i is strictly above its target SIR, γ¯i . By the assumed saturation properties of our utility functions, i can lower its power and be strictly better off. Thus, we have a contradiction and p ¯ cannot be a Nash Equilibrium, as claimed. In other words, any Nash Equilibrium power vector, p ˆ , must lie in the compact ‘hyper-rectangle’ with corners at 0 and p∗ . We can thus restrict our attention to powers in the latter set when considering Nash outcomes.

From the discussion above, Ii (ˆ p−i ) ≤ Ii (p∗−i ) for all i. We can now write user i’s utility as · µ Ui (pi , Ii (p−i )) = ui ln min

Gii pi , γ¯i Ii (p−i ) + ηi



¸ + 1 − ci pi (15)

implying that ∂ 2 Ui ∂pi ∂Ii

= <

−Gii ui (Gii pi +Ii +ηi )2

0

(16)

for all pi at which γ(pi , p−i ) < γ¯i . Thus, the derivative with respect to power of each user’s best response curve increases as the interference decreases. 2 All V (·) and U (·) derivatives are taken from the left unless otherwise i i specified.

Let p˜i represent the power at which user i exactly attains its target SIR, γ¯i , under p ˆ −i . It then follows that ∂Ui ∗ ∗ ∂Ui (p , p ) ≥ 0 =⇒ (˜ pi , p ˆ −i ) ≥ 0 ∂pi i −i ∂pi

1000

800

Hence, each user’s best response under p ˆ involves setting its power so that γi (pi , p ˆ −i ) = γ¯i . We therefore have that all targets are met with p ˆ ≤ p∗ . But ∗ since p is the lowest power point at which this can occur, we must have p ˆ = p∗ . This gives a contradiction, and hence ∗ p is a unique Nash Equilibrium, as claimed.

600 y

(17)

400

200

0

With the previous form, the Vi (·) functions are proportional to the theoretical Shannon capacities available to each link under Gaussian noise assumptions. We should note that the above theorem can be adapted for other concave Vi (·) forms √ (e.g., Vi (γi ) = ui γi ), but this is not done here for lack of space. Let c∗ represent the vector of ‘cost thresholds’ implied by the previous theorems. Note that in the logarithmic case above, these reduce to c∗i =

γ¯i (¯ γi + 1)p∗i

∀i

(18)

Thus, each user’s threshold depends on both its SIR target and its FM power. As the former increases or the latter decreases, this cost limit becomes higher. C. Discussion We thus have that the FM and Nash outcomes align if the user ‘power costs’ are sufficiently low. It then follows that, under the specified conditions, one can begin applying the desirable features of the FM scheme (e.g., convergence with simple, distributed power updates) to a utility-based system. If the conditions in the previous sections are not met, implying that one or more of the user costs are too high, then p∗ will necessarily not be a Nash Equilibrium. At this point, one or more of the users will be ‘unhappy’ and most likely try to deviate by adjusting their powers. In the latter case, however, the system may reach a Nash Equilibrium which is more desirable than the original, target p∗ . For instance, as shown by the example in the next section, the total sum of the user utilities or the total capacity / power expended might be higher. Thus, there may be reasons for setting the costs so that the system converges away from the FM point. In these cases, however, uniqueness and convergence conditions become much harder to prove. This is a topic for future research. V. D ISTRIBUTED P OWER U PDATES AND S IMULATED P ERFORMANCE The results from the previous section motivate a study of Nash Equilibria in the power control game. In particular, we wish to examine how the properties of these points change as the ‘power prices’ charged to the users increase or decrease.

0

200

400

600

800

1000

x

Fig. 4. Randomly located links used in simulation. Arrows point from transmitters to receivers.

Solving for and/or converging to a Nash Equilibrium is often a computationally complex process. In our power control game, we have proven that the FM point is a unique equilibrium under certain conditions. However, if these conditions are not met, then characterizing and converging to the resulting equilibria are much harder problems. In many games, however, a simple, ‘best-response dynamics’ (BRD) algorithm will converge to a Nash Equilibrium under mild conditions. Starting from an arbitrary initial state, the users iteratively update their powers to ‘best-respond’ to the currently observed interference. Depending on the model, these updates can be either synchronous or asynchronous. In the case of our power control game, assume that all users simultaneously update their powers at fixed time increments. Let pn represent the system powers observed at the start of nth time slot of the BRD process, with p0 being the initial state discussed above. In each time slot, the powers are updated according to £ ¤ pn+1 = argmax Vi (γi (pi , pn−i )) − ci pi i

∀i

(19)

pi ≥0

The BRD process stops when convergence to a single p is observed. A. Simulation To test the previous algorithm and study the properties of the resulting Nash Equilibria, we simulated a simple, 10user network. 10 transmitters were randomly placed into a 1000 × 1000 unit grid. For each one, a corresponding receiver was randomly placed within a 250 unit radius. The interference and gain parameters of the resulting network topology were computed assuming a proportionality to d14 . The latter is appropriate assuming a highly urban network environment. The thermal noise terms were taken as ηi = 10−8 for all links. The users were then given randomly chosen SIR targets and assumed to have logarithmic utility functions of the discussed form:

−4

4

1

2

0.5

0

0

1

2

3

4 α

5

6

7

8

user’s utility gets shifted towards the latter. As a result, users reduce their power but get comparatively more throughput per unit of power. This suggests that setting costs beyond c∗ may increase the ‘power efficiency’ of the resulting Nash Equilibria. On the other hand, the total power costs are maximized at c∗ . This suggests that, if these are paid to a central network authority, this body can maximize its revenue by setting ‘power prices’ close to c∗ . As discussed previously, this point also has the advantage of being aligned with the FM scheme. The above results are preliminary. Future work is needed to verify that our observations above provably hold in a wide variety of wireless network environments.

Total Capacity / Total Power

x 10 1.5

Total Capacity

6

0

VI. C ONCLUSION Fig. 5. Total capacity (solid line) and total capacity / total power (dotted line) as a function of α. For α ≤ 1, the system converges to p∗ and hence both quantities are constant. As α increases beyond 1, users reduce their powers resulting in lower capacity but higher capacity / power.

5

Total Utility

Total Revenue

5

0

0

1

2

3

4 α

5

6

7

8

R EFERENCES

0

Fig. 6. Total user utility (solid line) and total power ‘revenue’ (dotted line) as a function of α. The latter quantity is maximized at α = 1, corresponding to power costs equal to c∗ .

Ui (p) = ln(min(γi (p), γ¯i ) + 1) − ci pi

∀i

In this paper, we have thus created a model for user incentives in target-based wireless networks. Under given cost conditions, we have shown that the outcome predicted by a simple, commonly used distributed power control algorithm exactly coincides with a Nash Equilibrium. Therefore, one can transfer the desirable properties of the former into an incentive-based system. If our cost conditions are not met, then other kinds of Nash Equilibria are possible. Our initial research suggests that these might have desirable properties. However, this is a topic that requires more study.

(20)

Admissibility was verified, and the corresponding p∗ and c∗ values were computed. The BRD algorithm was then applied from a random starting place while adjusting the power cost terms experienced by the users. In particular, these costs were taken as αc∗ for α values on the interval [0, 8]. For each α, the BRD algorithm successfully converged to a Nash Equilibrium in a reasonably small number of time slots (< 120 for each α). The total capacity, total capacity / power, total user utility, and total power cost ‘revenue’ are plotted in Fig. 5 and Fig. 6 above as a function of α. Note that the capacities and powers are constant for α ≤ 1 since, in these cases, the system converges to p∗ . As the cost of power increases beyond this point, the balance between the capacity (i.e., ln) and power cost terms in each

[1] G. Foschini and Z. Miljanic, “A simple distributed autonomous power control algorithm and its convergence,” IEEE Transactions on Vehicular Technology, vol. 42, no. 4, pp. 641-646, Nov. 1993. [2] C. Saraydar, M. Mandayam, and D. Goodman, “Pricing and power control in a multicell wireless data network,” IEEE Journal on Selected Areas in Communications, vol. 19, no. 10, pp. 1883-1892, Oct. 2001. [3] N. Bambos, S. Chen, and C. Pottie,“Channel access algorithms with active link protection for wireless communication networks with power control,” IEEE/ACM Transactions on Networking, vol. 8, no. 5, pp. 583-597, Oct. 2000. [4] Z. Gajic, D. Skataric, and S. Koskie, “Optimal, SIR-based power updates in wireless CDMA communication systems,” IEEE Conference on Decision and Control, pp. 5146-5151, Atlantis, Bahamas, Dec. 2004. [5] L. Lv, S. Zhu, and S. Dong, “Fast convergence distributed power control algorithm for WCDMA systems.” IEE Proceedings on Communications, vol. 150, no. 2, pp. 134-140, Apr. 2003. [6] T. Alpcan, T. Basar, R. Srikant, and E. Altman, “CDMA uplink power control as a noncooperative game,” IEEE Conference on Decision and Control, pp. 197-202, Orlando, FL, Dec. 2001. [7] S. Gunturi and F. Paganini, “Game theoretic approach to power control in cellular CDMA.” IEEE Vehicular Technology Conference, pp. 23622366, Orlando, FL, Oct. 2003. [8] S. Koskie and Z. Gajic, “A nash game algorithm for SIR-based power control in 3G wireless CDMA networks.” IEEE/ACM Transactions on Networking, vol. 13, no. 5, pp. 1017-1026, Oct. 2005. [9] C. Saraydar, M. Mandayam, and D. Goodman, “Efficient power control via pricing in wireless data networks,” IEEE Transactions on Communications, vol. 50, no. 2, pp. 291-303, Feb. 2002. [10] C. Sung and W. Wong, “A noncooperative power control game for multirate CDMA data networks,” IEEE Transactions on Wireless Communications, vol. 2, no. 1, pp. 186-194, Jan.2003. [11] J. Rosen, “Existence and uniqueness of equilibrium points for concave N-person games,” Econometrica, vol. 33, no. 3, pp. 520-534, July 1965.

Target-Driven and Incentive-Aligned Power Control for Wireless ...

Transmitter power control plays a significant role in wireless .... the transmission technology used. Moreover, suppose ..... control in 3G wireless CDMA networks.

128KB Sizes 2 Downloads 172 Views

Recommend Documents

Joint Scheduling and Power Control for Wireless Ad Hoc Networks
Abstract—In this paper, we introduce a cross-layer design framework to the multiple access problem in contention-based wireless ad hoc networks.

Joint Scheduling and Power Control for Wireless ... - Semantic Scholar
This is further aggravated in ad-hoc networks since all nodes are mobile ..... Go to next slot i = i + 1 .... We compare the structure of the power control problem.

Latency-Sensitive Power Control for Wireless Ad-hoc ...
must support applications such as multimedia streaming, video- conferencing, and surveillance, with strict latency constraints. In this paper, we ... Note also that our proposed protocol can be implemented on top of contention- based or ...

The Power Control Strategy for Mine Locomotive Wireless Network ...
In a mine locomotive wireless network, multiple locomotives move along a ... of optimal solutions that satisfy certain features on SIC decoding or- der and SINR ...

Transmission Power Control in Wireless Ad Hoc Networks
Transmission Power Control in Wireless Ad Hoc. Networks: ..... performance (compared to TDMA and FDMA), CDMA has been chosen as the access technology of choice in cellular systems, including the recently adopted 3G systems.

Cheap Wifi Plug Power Socket Wireless App Remote Control Timer ...
Cheap Wifi Plug Power Socket Wireless App Remote Co ... Us Style White Free Shipping & Wholesale Price.pdf. Cheap Wifi Plug Power Socket Wireless App ...

Cheap Wireless Remote Control Home House Power Outlet Light ...
Cheap Wireless Remote Control Home House Power Ou ... 9938-1 Dc 12V Free Shipping & Wholesale Price.pdf. Cheap Wireless Remote Control Home House ...

Cheap Eu Standard 3 Pack Wireless Remote Control Power Outlet ...
... Wholesale Price.pdf. Open. Extract. Open with. Sign In. Main menu. Displaying Cheap Eu Standard 3 Pack Wireless Remote Control Power Outlet Light Switch ...

Demo: Ball and Plate Wireless Control - EWSN
now targeting control applications in many domains such as industries ... monitoring systems. Despite ... antee, at the application level, the state of the system.

Wireless snow plow control system
Oct 20, 1997 - vehicle. The ploWing system comprises a snoW ploW blade, mounting mechanism connected to the vehicle for mounting the snoW ploW blade ...

Wireless snow plow control system
Oct 20, 1997 - ecution application ?led under 37 CFR ..... vehicle 70 and an output Wiring harness [36] 36a for ... The output 36 activates one of the control.

Target-Driven and Incentive-Aligned Power Control for ...
Target-Driven and Incentive-Aligned Power Control for Wireless Networks. Benjamin Yolken and Nicholas Bambos. Department of Management Science and .... 2) Vi(·) is continuous at all points in its domain except, possibly, at ¯γi. 3) Vi(·) achieves

modeling, estimation and control for power ...
capping, efficiency, and application performance. The ef- ... the input is the error between the power budget of the server and the ..... optimization toolbox of Matlab [12]; in both tools the al- ...... “Monitoring system activity for os-directed

Wideband RF ICs for Power Detection and Control - Linear Technology
Control Application. Figure 1 is a simplified block diagram illustrating transmit power control for a dual band mobile phone (the receiver is not shown here).

Modified Bloom Filter for Efficient Congestion Control in Wireless ...
in access points of a Wireless Network based on DiffServ ... Bloom filters find application ..... between a customer and a service provider that specifies the.

Game-Based Admission Control for Wireless Systems
Our preliminary results show that these schemes have the potential ... mobile devices, by design, have only limited battery capac- ity. ... the signal-to-inference ratio (SIR) in the associated wireless channel. .... Thus, the latter point is the “

lgbtq-power-and-control-wheel.pdf
206 West Forth Street. Duluth, MN 55806. Adopted by: Page 1 of 1. lgbtq-power-and-control-wheel.pdf. lgbtq-power-and-control-wheel.pdf. Open. Extract.

Electric power system protection and control system
Dec 19, 2002 - Bolam et al., “Experience in the Application of Substation ... correlation circuit to poWer system monitoring and control host through ...

lgbtq-power-and-control-wheel.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item.

Distributed medium access control for wireless mesh ...
Department of Electrical and Computer Engineering, Centre for Wireless Communications, University of. Waterloo, Waterloo ... Contract/grant sponsor: Natural Science and Engineering Research Council (NSERC) of Canada. radio spectrum, many .... data ch

On Routing and Rate Control Strategies in Wireless ...
that advanced physical layer technologies enabling higher transmission data rates be ..... For illustration purposes, we use the information theoretic. (Shannon's) ...

ORACLE: Mobility control in wireless sensor and actor ...
where xn is the sensory data of nth visited sensor within the time window. ... collects temperature of surroundings and the probability of devel- oping fire is high in an ... probability of the event by computer simulations and/or real experiments.