Professional Documents
Culture Documents
Power Control in
Cellular Radio Systems:
Analysis, Design and Estimation
Fredrik Gunnarsson
Linkopings
universitet, SE581 83 Linkoping,
Sweden
Linkoping
2000
ISBN 91-7219-689-0
ISSN 0345-7524
To Sofia
Abstract
The primary goal of cellular radio systems is to provide communications services
to a large number of mobile users. Due to the dramatic increase in number of
users and their demand for more advanced services, the available resources have
to be utilized efficiently. Closed-loop power control is considered as an important
component in this resource management.
For practical reasons, the powers have to be computed locally for each connection, though performance and stability depend on how the different connections
interact. We consider the power control problem as a decentralized control system,
consisting of interconnected local control loops. Methods from control theory are
used to analyze existing algorithms locally and to design controllers with improved
performance. Thereby, performance degradation due to time delays and nonlinearities, can be handled by careful controller design. On a global level, we provide
results on stability and convergence of the designed controllers. The results are illustrated by simulations using both small and large-scale simulation environments.
ii
Acknowledgments
I am very grateful to all the people (yes, there are many) who have inspired and
supported me during the work on the thesis.
First of all I would like to thank my supervisor, Professor Fredrik Gustafsson, for
guidance through the evolution of the thesis, but even more so for all rewarding and
inspiring discussions. I especially appreciate his positive attitude and willingness
to share thoughts and ideas. Thanks goes also to Dr. Jonas Blom for times of
confusion and of clarification. During the time we shared room and project, we had
many fruitful discussions related to communications and control and to abridging
the two.
I would like to thank Professor Lennart Ljung for giving me the opportunity to
join the Automatic Control group, and for creating a stimulating and professional
atmosphere. I also value the freedom I have had in choosing research topic.
During my graduate studies I have had the opportunity to share ideas and discussions with people at Ericsson Radio Systems. I am especially grateful to Magnus
Almgren for all energetic discussions related to practical and theoretical aspects
of power control and mobile communications. Thank you for sharing simulation
knowledge, but also for making me realize that simulations should be approached
with care. I also value discussions with Dr. Magnus Frodigh, Bengt Bergkvist and
Dr. Niclas Wiberg. In different phases of my project, I have had many questions
answered by Dr. Gunnar Bark, Tomas Rimhagen, Dr. Ke Wang Helmersson, H
akan
Olofsson, Magnus Persson and Maria Gustafsson, and several others.
The people in the Automatic Control group all have contributed to a great
atmosphere at work. Besides research activities and coursework, I appreciate the
social activities and spontaneous coffee room discussions about the most shifting
things. Thanks also goes to our secretary Ulla for all administrative help and
cheerful attitude, and to Mattias Olofsson for maintaining the computers.
Fredrik Gustafsson and Jonas Blom proof-read the entire manuscript and provided me with many valuable comments and suggestions on improvements. Dr.
Niclas Bergman read parts and patiently answered many questions regarding LATEX.
M
ans Ostring
gave me insightful comments on the design. All of the above added
significant improvements to the thesis.
This work was supported by the graduate school ECSEL and the Swedish National Board for Industrial and Technical Development (NUTEK), and they are
gratefully acknowledged.
To my parents and brothers: thanks for always being there and for being you.
Finally, I would like to thank Sofia for abundant love and support. Your encouragement and enormous patience, especially during the completion of this thesis,
made hard-working days lighter and brighter. I love you.
Link
oping, March 2000
Fredrik Gunnarsson
iii
iv
Contents
1 Introduction
1.1 Thesis Outline . .
1.2 Reading Directions
1.3 Contributions . . .
1.4 Publications . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
1
1
3
3
4
2 Extended Summary
2.1 Introduction . . . . . . . . . . . . . .
2.2 Power Control Algorithms . . . . . .
2.3 Local Analysis . . . . . . . . . . . .
2.4 Local Design . . . . . . . . . . . . .
2.5 Global Analysis . . . . . . . . . . . .
2.6 Estimation and Outer Loop Control
2.7 Simulations . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
7
7
10
11
12
14
17
18
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
21
21
23
25
26
26
27
27
27
28
29
30
34
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
37
38
39
40
44
47
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
vi
Contents
5 Local Analysis
5.1 Motivating Example . . . . . . . . . . . . . . . . . . . . . .
5.2 Dynamical Models . . . . . . . . . . . . . . . . . . . . . . .
5.2.1 Power Control Algorithms . . . . . . . . . . . . . . .
5.2.2 Time Delays . . . . . . . . . . . . . . . . . . . . . .
5.2.3 Nonlinearities . . . . . . . . . . . . . . . . . . . . . .
5.2.4 Filters . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3 Log-Linear Algorithms . . . . . . . . . . . . . . . . . . . . .
5.3.1 Stability of Linear Systems . . . . . . . . . . . . . .
5.3.2 Local Analysis of Power Control Algorithms . . . . .
5.3.3 Summary, Local Analysis of Log-Linear Algorithms .
5.4 Describing Functions . . . . . . . . . . . . . . . . . . . . . .
5.4.1 Describing Functions with Zero Phase Assumption .
5.4.2 Discrete-Time Describing Functions . . . . . . . . .
5.4.3 Simplified Nonzero Input Case . . . . . . . . . . . .
5.4.4 Describing Function of a Relay . . . . . . . . . . . .
5.5 Log-Linear Algorithms with a Static Nonlinearity . . . . . .
5.5.1 Summary, Describing Functions Analysis . . . . . .
5.6 Effect of Auto-Interference . . . . . . . . . . . . . . . . . . .
5.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
55
57
59
59
61
63
63
65
67
68
71
71
72
74
76
76
77
79
79
82
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
85
86
87
88
91
91
92
94
96
98
98
99
100
104
104
109
110
110
111
112
113
114
Contents
vii
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
115
115
116
116
119
119
7 Global Analysis
7.1 Optimal Global Power Assignments . . . . . . . . . . . . . . . . .
7.1.1 Optimal Balancing Assignments . . . . . . . . . . . . . .
7.1.2 Optimal Assignments Relative a Target SIR . . . . . . . .
7.2 Convergence in Linear Scale . . . . . . . . . . . . . . . . . . . . .
7.2.1 Standard Interference Functions . . . . . . . . . . . . . .
7.2.2 Convergence of Some Log-Linear Algorithms . . . . . . .
7.2.3 Convergence of Some Decision Feedback Algorithms . . .
7.3 Log-Linear Algorithms . . . . . . . . . . . . . . . . . . . . . . . .
7.3.1 The Global System as Interconnected Local Loops . . . .
7.3.2 Interference Linearization . . . . . . . . . . . . . . . . . .
7.3.3 Robust Stability of Log-Linear Power Control Algorithms
7.3.4 Two Mobile Case . . . . . . . . . . . . . . . . . . . . . . .
7.3.5 The Conservativeness of Theorem 7.20 . . . . . . . . . . .
7.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
123
124
124
127
130
131
132
134
135
136
140
142
145
150
153
6.7
6.8
7.A
7.B
7.C
7.D
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
8 Nonlinear Estimation
8.1 Modeling . . . . . . . . . . . . .
8.1.1 Parameters . . . . . . . .
8.1.2 Measurements . . . . . .
8.2 Maximum Likelihood Estimation
8.2.1 A Simple Example . . . .
8.2.2 Adaptive Estimation . . .
8.3 Semi-Linear Estimation . . . . .
8.4 Simulations . . . . . . . . . . . .
8.4.1 Abrupt Interference Step
8.4.2 Run-time Estimation . . .
8.5 Summary . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
154
155
156
158
158
161
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
165
166
166
167
169
169
171
173
174
174
175
177
viii
Contents
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
181
181
182
182
183
185
190
190
191
192
193
194
194
195
196
196
196
197
10 Network Simulations
10.1 Simulation Studies in General . . . . . . . . . . . . . . . .
10.2 Simple Network Simulation Environment . . . . . . . . . .
10.2.1 MOSE . . . . . . . . . . . . . . . . . . . . . . . . .
10.2.2 Stabilizing Controllers in the Motivating Example
10.2.3 Conservativeness of Global Stability Requirements
10.2.4 Abrupt Change of Target SIR . . . . . . . . . . . .
10.3 FH-GSM Simulation Environment . . . . . . . . . . . . .
10.3.1 System Level Effects of Controlling the Power . . .
10.3.2 Quality Measures . . . . . . . . . . . . . . . . . . .
10.3.3 Anti-Reset Windup . . . . . . . . . . . . . . . . . .
10.3.4 System Level Effects of Unstable Controllers . . .
10.3.5 Influence of Estimation . . . . . . . . . . . . . . .
10.3.6 Quality Mapping . . . . . . . . . . . . . . . . . . .
10.4 WCDMA Simulation Environment . . . . . . . . . . . . .
10.4.1 Effect of Command Bit Errors on TDC . . . . . .
10.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
199
199
200
200
201
202
203
204
206
209
209
210
210
210
211
212
213
225
Bibliography
229
Index
243
Notation
Symbols
Both values in linear and logarithmic scale (for more on units, see below) are used
in the thesis. Therefore, the convention of indicating linear scaled values by a bar,
. Hence, p is a value in linear scale, and p denote the corresponding value in
logarithmic scale. Moreover, the index i denote a specific terminal
pi , pi
p, p
p , p
t
pi , pti
t
pt , p
pi
p
gij , gij
G, G
Ci , Ci
Cit , Cit
C
Ii , Ii
Iit , Iit
Ii
Ii ()
I()
mI
I
i , i
,
,
it , it
t
transmitter power
vectors with components as above
optimal power vector (corresponds to i = , i)
powers at steady state (corresponds to i = it , i)
vectors with components as above
internally monitored power used in TDC
equilibrium deviation pi pti
power gain between terminals i and j
gain matrix (or G-matrix) with entries as above
desired signal power1
target value when using C-based power control
filtered desired signal power, Ci (t) = Fg (q)Ci (t)
interference power
interference powers at steady state (when i = it , i)
filtered interference power, Ii (t) = FI (q)CI (t)
interference function with respect to terminal i
interference function (vector with cpomponents as above)
mean interference at a specific receiver
interference standard deviation at a specific receiver
signal-to-interference ratio (SIR)
vectors with components as above
optimal balanced SIR
individual target SIR:s
diagonal matrix with diagonal elements it
filtered SIR, i (t) = F (q)i (t)
ix
i
i , i
cc
cc
i
m
r
L
q
R(q)
F (q), Fg (q), FI (q)
Notation
Units
W, mW
dB
dBW
dBm
= 10 log10 (
p) 10 log10 (
pref ) = p pref .
10 log10 pref
a power level compared to 1 W.
a power level compared to 1 mW. Note that
p dBW = (p + 30) dBm.
Abbreviations
The list below only include abbreviations most frequently used in the thesis.
AAW
BER
DPC
FER
FSPC
SIR
TDC
1
Introduction
The global communications system today (the telephone system yesterday) is considered as the largest man-made system all categories. While the demand for access
to services in such systems is exponentially growing, an increased interest in utilizing the available resources efficiently can be observed. In this thesis, the subset
of wireless cellular communications systems will be in focus.
A consequence of the limited availability of radio resources is that the users
have to share these resources. Power control is seen as an important means to
reduce mutual interference between the users, while compensating for time-varying
propagation conditions. The powers are controlled using feedback, and feedback
result in a dynamical behavior that critically affect the performance. In this work
we use methods from control theory to analyze the dynamical effects and to design
appropriate control strategies.
1.1
Thesis Outline
The subtitle Analysis, Design and Estimation describes the core of the thesis, but
not in a consecutive order.
Chapter 2 illustrates the main ideas in the thesis by considering a simple case:
a small wireless network with two users. Yet simple, the case provides valuable
insight into some of the rather theoretical issues brought up in the thesis. Primarily,
this concerns emphasizing the relevance and importance of considering dynamical
Introduction
effects in power controlled cellular radio systems. For example, time delays are
identified as critical for the performance if not handled appropriately.
Some background material on cellular radio systems are provided in Chapter 3.
The objective is to provide a reader without prior knowledge with an understanding
of the problems and challenges in these systems as well as a familiarity with the
terminology used. After this foundational chapter, power control is put into the
context of radio resource management algorithms in Chapter 4. The focus of the
thesis is further clarified, and various aspects of power control are characterized.
Typically, power control algorithms are either based on information feedback, where
essentially real valued measurements are available, or based on decision feedback,
where only decisions 1 are available. The chapter is concluded with survey over
previous contributions in the literature.
For practical reasons, it is necessary to control the powers in a distributed fashion. These distributed algorithms can be seen as interconnected local control loops.
In Chapter 5 we consider these local loops separately with respect to dynamical
behavior. Previous proposals are seen to fall into any of two categories: Algorithms
based on information feedback are associated with a linear local loop, which can
be analyzed with methods from linear systems theory. Conversely, decision feedback algorithms are not solely linear, but rather linear with a static nonlinear
component. Such a control loop is approximatively analyzed using discrete-time
describing functions.
Since the local loops are all or partly linear, we apply methods from control
theory in Chapter 6 to improve the performance of previous proposals and to
relate the performance to disturbance properties and physical parameters. When
relevant disturbance models are at hand, these are used for disturbance prediction
and controller design.
Chapter 7 addresses different global issues, such as capacity, load and whether
it is possible to meet the requirements from all users. Furthermore, it provides
results on stability and convergence of some central algorithms. Global stability
requirements are also posed as requirements on the local control loops.
In GSM, the measurements are subject to coarse quantization and made available to the algorithm in measurement reports. The core problem in Chapter 8
is to locally extract as much relevant information from these reports. We discuss
the applicability of maximum likelihood estimation to the problem. Yet another
practical issue is to design algorithms to operate in an outer loop, providing the
inner loop with relevant set points. This is the main issue in Chapter 9.
The ambition with Chapter 10 is to illustrate different issues from the preceeding
chapters using network simulations. Both small and large-scale simulations are
used, all with different purposes.
Finally, Chapter 11 provides some conclusive remarks, and point out possible
directions for future research.
1.2
Reading Directions
The main ambition with the many introductory parts in the thesis is that everybody should skip something. Readers with a strong background in mobile communications can skip Chapter 3 and the introductory sections in Chapter 4. When
necessary, references backwards help the reader to back track to cover up notational discrepancies. Similarly, a reader with a background in automatic control or
systems engineering may skip sections on properties of linear systems. Hopefully,
every reader finds it useful to read the extended summary in Chapter 2. This
chapter also serves as a road map to the rest of the thesis. Chapter 8 on nonlinear
estimation can be read relatively independently from the other chapters. Chapter 9
is to some extent based on material in the preceeding chapter.
1.3
Contributions
Introduction
1.4
Publications
Some of the material in this thesis has been, or will be, published elsewhere. Technical reports and non-reviewed material are not included. The licentiate thesis
relates to several parts of this thesis:
J. Blom and F. Gunnarsson. Power Control in Cellular Radio Systems. Licentiate Thesis, Linkopings universitet, Sweden, June 1998.
The original formulation of power control algorithms as linear distributed control
appear in
J. Blom, F. Gunnarsson, and F. Gustafsson. Constrained power control subject
to time delays. In Proc. International Conference on Telecommunications,
Chalkidiki, Greece, June 1998.
The applicability of discrete-time describing functions to relay control in Chapter 5
is addressed in
F. Gunnarsson, F. Gustafsson, and J. Blom. Dynamical effects of time delays
and time delay compensation in power controlled WCDMA. Submitted to
IEEE Journal on Selected Areas in Communications, WCDMA Special Issue.,
2000.
Preliminary results of the above and analysis of log-linear distributed control loops
in Chapter 5 are covered by
F. Gunnarsson, J. Blom, and F. Gustafsson. Power control in cellular systems
subject to constraints and time delays. In Proc. IEEE Global Telecommunications Conference, Sydney, Australia, November 1998d.
F. Gunnarsson, J. Blom, and F. Gustafsson. Power control algorithms and
stability analysis for radio network control. In Proc. IEEE Conference on
Decision and Control, Tampa, FL, USA, December 1998c.
Some of the design strategies in Chapter 6 are also found in
F. Gunnarsson, F. Gustafsson, and N. Wiberg. Transmit power control time
delay compensation in a wireless communications system. US Patent Application No. 09/346316, 1999e.
F. Gunnarsson and F. Gustafsson. Time delay compensation in power controlled
cellular radio systems. Submitted to IEEE Communications Letters, 1999.
F. Gunnarsson, F. Gustafsson, and J. Blom. Pole placement design of power
control algorithms. In Proc. IEEE Vehicular Technology Conference, Houston,
TX, USA, May 1999d.
F. Gunnarsson, F. Gustafsson, and J. Blom. Improved performance using nonlinear components in power control algorithms. In Proc. IEEE Vehicular
Technology Conference, Houston, TX, USA, May 1999c.
1.4 Publications
Introduction
2
Extended Summary
The objective of the thesis is to cover control theory related issues of power control
in cellular radio systems. This chapter is introduced to bridge the gap between the
short abstract and the whole thesis. The main ambition is to exemplify the main
results by considering simplistic situations. Primarily, this concerns emphasizing
the relevance and importance of considering dynamical effects in power controlled
cellular radio systems. Most of the material is more rigorously treated in the
following chapters. For clarity, the organization of this chapter is similar to the
entire thesis.
In order to tickle the intuition, the considered examples sometimes might seem
naive to a well-educated reader. However, recall the ambition to provide insight
into power control problems, which might not track the theoretically optimal path.
2.1
Introduction
Extended Summary
[dB].
A time varying power gain g(t) is illustrated in Figure 2.1a. Gain variations as
depicted in the figure degrade the performance and reduce the worst-case capacity
of the connection. An intuitive approach is to compensate for the variations by
using a time-varying power p(t). If the channel variations are known to the transmitter, we could literally invert the channel to obtain a constant SNR. Ideally, we
would like to use the power p(t) = p0 g(t), which is exemplified by the solid line
in Figure 2.1b. A different approach is to use excessive power to overcome even
the worst-case situation, see the dashed line in Figure 2.1b. At some level, we
could guarantee a minimum signal-to-noise ratio, and thereby provide a required
data rate. Seemingly, the only drawback with using excessive power is high battery
consumption. However, when other connections are using the same channel, other
aspects apply. This is further discussed below.
Consider a simple multiuser scenario with two connections using the same channel. The two mobile stations MS1 and MS2 are connected to the base stations BS1
and BS2 respectively, see Figure 2.2. The transmitted signal from BS1 to MS1 also
reaches MS2 and vice versa. These unwanted signals are normally weaker than the
desired signals, but still create a mutual interference. In Figure 2.2, desired signals
are indicated by solid arrows, and undesired interfering signals by dashed arrows.
1 Sometimes,
2.1 Introduction
b)
Time [s]
Figure 2.1 An intuitive approach to compensate for a time-varying channel as in a) is to invert the channel. This corresponds to using
the power as described by the solid line in b). An alternative
is to use excess power as given by the dashed line in b).
We will focus on the downlink (from BS to MS), to keep the notation clear. Each
communication link from base station BSj to mobile station MSi is characterized
by the signal power gain gij (t). Thus, all possible power gains in this small network
are described by the gain matrix (or G-matrix )
g11 g12
.
G=
g21 g22
Denote the transmitted power from base station BSj at time instant t by pj (t). Mobile station 1 will thus receive the desired signal power p1 (t)
g11 (t) and interference
power I1 (t), given by
I1 (t) = p2 (t)
g12 (t) + 1 ,
where 1 represents noise power as in the single-user case discussed earlier in the
chapter. The signal-to-noise ratio is now of less importance. Instead, the signal-tointerference ratio (SIR) plays a similar role. For example, the SIR at mobile MS1 ,
is given by
4
1 (t) =
p1 (t)
p1 (t)
g11 (t)
g11 (t)
=
.
p2 (t)
g12 + 1
I1 (t)
10
Extended Summary
BS2
BS1
g22 (t)
g11 (t)
g21 (t)
g12 (t)
MS2
MS1
Figure 2.2 In the considered communication situation, two connections are
using the same channel and create mutual interference (dashed
arrows). The desired signal paths are indicated by solid arrows.
2.2
If all four power gains gij (t) and both the noise powers i were known at every
time instant t, it would be possible to compute the optimal powers to use at each
base station. This is not realistic in a practical situation. The simple reason is
that it requires a centralized solution, which would involve extensive signaling of
information. Instead, we require that each base station updates its own power
based only on SIR measurements from the connected mobile (distributed control ).
Different protocols may be used to feed back these measurements. We will consider
two important feedback situations:
Information feedback. The mobile feeds back the exact SIR measurements
or the error
ei (t) = it i (t).
(2.2)
The important characterization is essentially that real numbers are fed back.
Decision feedback. In a power control setting, we typically associate this
with feedback of the sign of the error in (2.2)
si (t) = sign(it i (t)) = sign(ei (t))
(2.3)
11
Thus, only one bit is needed for command signaling, which makes the scheme
bandwidth efficient.
In this introductory chapter, we will consider a simple integrator as control algorithm. Depending on feedback assumptions, the powers will thus be controlled
as
Information feedback:
pi (t + 1) = pi (t) + ei (t)
(2.4a)
Decision feedback:
pi (t + 1) = pi (t) + si (t)
(2.4b)
Yet simple, these two algorithms include most of the proposed algorithms to
date. For a more detailed discussion, see Section 5.2. The actual time between
consecutive power updates, the sample interval Ts , varies from systems to system.
For example Ts = 0.48 s in GSM and Ts = 1/1500 s in WCDMA.
As seen above, the controller itself contains a delay of one sample interval.
However, both measuring and control signaling take time, resulting in additional
time delays in the system. A relevant model is that the measured SIR available
to the algorithm at time instant t, depends on the power level at t 1. This is
typically the situation in GSM and WCDMA. The SIR at mobile MSi is thus given
by
i (t) = pi (t 1) + gii (t) Ii (t).
2.3
(2.5)
Local Analysis
The global system can be seen as two local distributed control loops interconnected
via the mutual interference. Valuable insight can be obtained by studying these
local loops separately. In fact, as will be motivated in Chapter 5, local loop stability
is a necessary, but not sufficient condition for global system stability.
The terms instability and stability of a local loop has to be well defined in
order to avoid confusion. Rather simplified, instability comes about when relying
too much on outdated information such as in Equation (2.5). This results in overcompensation, which may be aggravated over time. A thorough study of local loops
with respect to various algorithms is provided in Chapter 5.
Considering information feedback and the situation at mobile MS1 , the local
loop dynamics is described by Equations (2.2), (2.4a) and (2.5), which combine to
p1 (t + 1) p1 (t) + p1 (t 1) = (1t g11 (t) + I1 (t)).
(2.6)
The power pi (t) thus satisfies a linear difference equation. Its solution can therefore
be associated with the characteristic equation
z 2 z + = 0.
Considering results from linear systems theory (see Section 5.3) we conclude that
the solution to the difference equation is stable if and only if the roots (possibly
12
Extended Summary
complex) to the characteristic equation are located within the unit circle. The
product of the roots is equal to . Therefore, the local control loop is stable if
0 < < 1. For example the choice = 0.9 provides a locally stable controller.
General power control algorithms in the information feedback case are analyzed
with respect to local stability, using similar root locus analysis in Chapter 5.
The sign function, which is a vital component in decision feedback, has both a
stabilizing and a destabilizing effect. It is stabilizing in the sense that we cannot
over-compensate an outdated measurement by more than as seen in (2.4b). On
the other hand it is destabilizing, since the error is never compensated for by less
than either.
The corresponding local loop using decision feedback can be seen as a linear
system with a static nonlinearity (the sign function). Figure 2.3 illustrates the
local dynamics of the algorithm by a block diagram. Simulations of this local
b.
a.
ei (t)
f (e)
si (t)
30
i (t)
pi (t)
it
29
31
32
33
34
0
10
20
30
40
50
Time instants t
Figure 2.3 When using decision feedback, the local loop can be seen as a
linear system G in series with a static nonlinearity f (e) (the
sign function). These components combine to the local loop
depicted in a. Simulations of this local loop indicate oscillating
power levels, as seen in b.
2.4
Local Design
13
14
2.5
Extended Summary
Global Analysis
Hitherto, the interconnections between the two loops have been neglected. If there
were no such interconnections, it would always be possible to meet the target SIR
requirement in each loop (at least if sufficient power is available). Otherwise, this
ability is strongly dependent on the global system. Here, global issues like capacity,
load and stability are in focus.
It is natural to discuss the power control problem at two levels. The local
control loops were discussed in the preceding two sections. Capacity and load are
typically discussed at a global level. We assume that the local loops successfully
compensates for the fast variations, so that the power gains can be considered as
constant. Moreover, stability and convergence are also discussed at a global level.
Again, the power gains are assumed constant, but the motivation is that we are
considering the short term behavior of the global system, and the power gains are
assumed to fluctuate more slowly. To exemplify the somewhat theoretical results
in this section, we consider the particular case:
1
0.08
= [
G
gij ] =
(2.7)
0.01 0.8
The load and capacity of a system relate to whether specific user requirements
can be supported or not. Therefore, they are naturally discussed in terms of the
target SIR:s it . Conceptually, the capacity of a system describes the optimal
utilization of the resources. An intuitive optimization strategy is to maximize the
smallest SIR of the two users. This leads to the balanced situation, where both
mobiles experience the same SIR (Zander, 1992b). In the current situation with
two connections the expression for optimal balanced SIR simplifies to
r
1
g11 g22
=
.
(2.8)
g
12 =
g12 g21
0
g
11
max eig g21
0
g
22
The example gains in (2.7) yield the optimal balanced SIR = 31.6 ( = 15 dB).
Unfortunately, it is not possible to achieve the optimal balanced SIR in practice,
since it requires infinite powers. Instead it serves as an upper bound on the achievable capacity.
If the two mobiles are requesting different services, they will probably require
different target SIR:s. Consequently it is interesting to study the load of the system
r
given target SIR requirements. For that matter we introduce the relative load L
in Chapter 7. In the case of two connections, it is given by
r
q
q
g
12 t
1
0
1
g12 g21
4
g
11
=
1t 2t = 1t 2t
Lr = max eig g21 t
2
0
g11 g22
g
22
An important result in Chapter 7 is that it is possible to meet the target SIR
r < 1. Then, the power control problem is said to be
requirements if and only if L
15
q
1
1t 2t < (1t + 2t ) < .
2
(2.9)
Consider the particular case in (2.7). Both the requirements (1t , 2t ) = (10, 10) dB
and (1t , 2t ) = (10, 16) dB correspond to feasible power control problems, while
(1t , 2t ) = (18, 16) dB does not.
Other important global issues include stability and convergence. Assume that
the considered power control problem is feasible. Previous results on convergence
have almost exclusively omitted time delays. For example, the specific case of
information feedback and = 1 provides appealing convergence properties when
omitting time delays. This does not hold true when subject to time delays. As
seen in Section 2.3, the algorithm corresponds to an unstable system. However,
when using the time delay compensation in Section 2.4, the combination results
in a controller that is stable and converges for all possible time delays. This is
formally proven in Chapter 7.
The benefits of the time delay compensation are also evident when considering
decision feedback. This algorithm is stable and converges (Herdtner and Chong,
2000) to the bounded region
|it i (t)| (2n + 2)
When using TDC we show in Chapter 7, that the resulting controller is stable and
converges to the region
|it i (t)| (n + 2)
Hence, the longer the time delay, the more emphasized improvements using TDC.
Note, however, that only the fact that the bound is tighter does not imply that the
error variance is smaller.
When considering other algorithms and filters, the foundation on which these
proofs rely, is insufficient. Instead we will discuss stability in terms of an approximative analysis, based on linearization around a specific equilibrium point. A general
stability result is provided in Chapter 7. To illustrate the main ideas, we will focus
on the particular example of information feedback power control in (2.4a). Even
though the local loops are linear, the interconnections are not. The interference at
mobile MS1 in dB is given by
p2 (t)
g12 + 1 ),
I1 (t) = 10 log10 (
(2.10)
which clearly is nonlinear. One way of circumvent this is to linearize the interference
at a particular point to obtain a linear model valid in a neighborhood of that point.
Assume that the power control problem is feasible. Hence, there exist power
assignments pt1 , pt2 corresponding to the target SIR:s 1t , 2t . The interference
at mobile MS1 when using these powers is denoted by I1t . If we linearize the
16
Extended Summary
interference around the equilibrium power level of the other base station pt2 , we get
#
"
I1 (t)
t
(p2 (t) pt2 ).
I1 (t) I1 +
p2 p2 (t)=pt
2
g12 pt2
(p2 (t) pt2 ) =
1 (p2 (t) pt2 ),
I1t
(2.11)
where
1 describes the influence from the other mobile and can be rewritten as
1 =
g12 pt2
I1t 1
=
.
I1t
I1t
r =
1
2 .
L
Hence, there is a clear connection between the load of the system and the extent
to which the loops affect each other.
If we insert the linearized interference in (2.11) into Equations (2.2) and (2.4a),
we obtain
1 (p2 (t 1) pt2 ) . (2.12)
p1 (t + 1) = p1 (t) + 1t p1 (t 1) g11 + I1t +
Note that the power from the other base station p2 (t 1) also is delayed by one
sample. Since the linearization is valid in a neighborhood of pt1 , we are interested
in the dynamics in terms of the deviation from that point. Therefore, we introduce
p1 (t) = p1 (t) pt1 .
The same analysis applies to the situation of the other mobile MS2 . If we use
pi (t) above to rewrite Equation (2.12), we obtain the two equations (one for each
connection) describing the global system dynamics as
1 p2 (t 1)
p1 (t + 1) = p1 (t) p1 (t 1) +
2 p1 (t 1).
p2 (t + 1) = p2 (t) p2 (t 1) +
This approximation is linear and can be analyzed using linear methods. Stability
results regarding the two-mobile case and the general case can be found in Chapter 7. In the two-connection case, these requirements allow a compact formulation.
We conclude that the global system is stable in a neighborhood of target SIR if the
following inequality holds
<
1+
1
1
=
r .
1
2
1+L
(2.13)
17
Hence, the higher relative load, the tighter requirements on and vice versa. The
conclusion is that system with high loads is harder than average to control and
requires more careful local design. Moreover, 0.5 always provide globally
stable two-connection systems. For example, the choice = 0.34 in Section 2.4
corresponds to a stable global system independent of the load. Conversely, we
cannot guarantee stability of the choice = 0.9 in Section 2.3. When applying
TDC to the control algorithm, the stability requirements are different. As shown
in Chapter 7, TDC results in a stable global system for 0 < 2.
2.6
In some practical cases, the power update computations take place in the base
stations, both for the up- and downlink connections. The mobile acts as a slave and
reports requested (highly quantized) measurements. The base station then needs
to recover as much relevant information from these reports as possible. Another
practical issue is related to issuing appropriate target SIR:s. As was seen in the
previous section, not all target SIR requirements can be met. Both these issues are
dealt with in Chapters 8 and 9 respectively.
In GSM, the measurement reports comprise RXQUAL, which is related to the
perceived quality and RXLEV, which describes the total received signal power.
Since the focus is on one of the connections, we drop the index i for clarity. Assume
that we want to recover the desired signal power C(t) = p(t)+g(t) and the SIR (t)
from the measurements. The corresponding relations are nonlinear, which make
estimation a bit challenging. Chapter 8 proposes a maximum likelihood estimator
to address the problem. In essence, it is based on a probabilistic description of
the problem. The core operation is to consider the likeliness that the observed
measurements were generated from a model with parameters C and . Estimates
are obtained as the parameters that maximizes this likeliness, or likelihood function.
Figure 2.4 exemplifies the likelihood at a specific time instant, and indicates how
to obtain the estimates.
This far we have assumed that the user requirements can be posed as target
SIR:s, which is said to correspond to a specific data rate. Unfortunately, the
relationship between a data rate and SIR is not perfectly known. In fact, it might
be time varying. Thus, there is a need to adapt the target SIR:s as well. This
is typically taken care of in an outer control loop, which operates at an order of
magnitude slower update rate. Chapter 9 proposes a method where statistics about
the relation between quality of service and target SIR is utilized.
r cannot be monitored online, since the measure is based
The relative load L
on the knowledge of power gains gij . Therefore, there is a risk that the requested
target SIR:s correspond to an infeasible power control problem. If using the simple
integrating algorithms in (2.4) when the power control problem is infeasible, the
two connections will start competing about the target SIR:s. This race will not
end until one or both connections are using maximal powers. Such cases can be
handled by forcing connections that require high powers to aim a lower target
18
Extended Summary
0
0.5
1
1.5
2
2.5
3
3.5
4
30
25
90
20
95
15
100
10
105
110
SIR:s (Almgren et al., 1994). A related issue is schemes that force users with less
favorable propagation conditions to use a lower data rate and vice versa. These
and similar priorities could also be handled in the outer loop, see Chapter 9.
2.7
Simulations
To illustrate the effect of different parameter settings, we reconsider the specific gain
situation in (2.7). Assume that the two mobiles initially require target SIR:s 1t =
2t = 10 dB, and that the control algorithms are perfectly initialized, i.e., pi (0) = pti .
At time instant t = 10, the second mobile upgrades his target SIR to 2t = 16 dB,
while the first remains at 2t = 10 dB. Both situations correspond to feasible power
control problems as concluded in Section 2.5. The two mobiles remain at the same
locations, implying constant power gains gij throughout the simulation. Figure 2.5
illuminate the recovering ability of different controller configurations. Subfigures
a-d consider information feedback, while e-f address decision feedback. From the
simulation, we note the following for the feasible power control problem
a. Information feedback with = 1 does not correspond to a stable local loop
Therefore it is intuitive that the global system is unstable.
b. A smaller yields stable local loops, but the global system is still unstable.
This illustrates the fact that local stability is necessary but not sufficient for
global stability.
c. An even smaller = 0.34 will always result in a stable global system.
d. When using TDC, the controller with = 1 corresponds to a stable system.
2.7 Simulations
a.
19
b.
40
40
20
i (t)
i (t)
20
20
40
20
10
15
40
20
Sample instants
c.
d.
20
10
15
20
20
15
i (t)
i (t)
15
10
10
10
20
30
40
Sample instants
e.
Sample instants
10
20
30
40
Sample instants
f.
20
20
i (t)
15
i (t)
15
10
10
10
20
30
Sample instants
40
10
20
30
40
Sample instants
Figure 2.5 The recovering ability of various controllers when one of the
mobiles upgrades his target SIR from 10 to 16 dB. Information
feedback: a. = 1, b. = 0.9, c. = 0.34, d. = 1 and
TDC. Decision feedback, e. = 1, f. = 1 and TDC.
20
Extended Summary
3
Cellular Radio Systems
3.1
Overview
There are several books covering the development of mobile communications systems, see e.g., Ahlin and Zander (1998); Garrard (1998); Jakes (1974); Lee (1982);
Rappaport (1995); Steele (1992) and Stuber (1996).
History
The development of wireless communications stems from work during the second
half of the nineteenth century. In 1864, Maxwell predicted the existence of electromagnetic radiation and formulated the basic theory that is still in use today, over a
century later. Maxwells theory was verified experimentally by Hertz in 1887, and
therefore the electromagnetic waves are sometimes referred to as Hertzian waves.
The origin of mobile radio is considered to be 1897, when Marconi was credited
with a patent for wireless telegraph, the first radio related patent ever. On De-
21
22
cember 12, 1901, Marconi received a radio signal in Newfoundland, which was
transmitted from Cornwall, England. Thereby he showed that radio communication was possible despite the curvature of the earth.
During the twentieth century, the radio technique was further improved, not the
least due to important inventions such as the vacuum tubes, amplitude modulation
(AM), frequency modulation (FM), transistors, integrated circuits etc. The first
true mobile radio system used in practice was a police car radio system, introduced
at Detroit Police Department 1921, but the systems still had a long way to go
before they would reach the general public.
First Generation Cellular Systems
The concept of cellular systems originates from Bell Labs 1947. Instead of transmitting the signal as far as possible, the range would be deliberately limited, allowing
frequencies to be used again at a much shorter distance. However, the idea had to
wait for decades before it could be implemented. The technology needed was simply not available. With the introduction of the Nordic Mobile Telephone (NMT)
system 1981 and the Advanced Mobile Phone Service (AMPS) system 1983, cellular phones were not solely for the rich and famous anymore. The NMT standard
was defined in a collaboration between the Nordic countries, and an important
feature was international roaming. In the beginning it used radio frequencies in
the 450 MHz band, but in order to meet the needs, operation in the 900 MHz band
was introduced later. AMPS, which is operating in the 800 MHz band, became
widely spread over the world, and has the largest penetration among the analog
systems. Modified versions of AMPS include the British Total Access Communications System (TACS) and the Japanese JTACS.
Second Generation Cellular Systems
The Global System for Mobile Communications (GSM)1 was deployed in 1992
as the worlds first digital cellular standard. Originally it operated only in the
900 MHz band, but nowadays it is adapted for 1800 MHz (DCS 1800) and 1900 MHz
(PCS 1900).
The incentive to consider digital systems was mainly different in the USA, since
AMPS had capacity problems. The problem was that, unlike in Europe, additional
spectrum for digital cellular systems at frequencies nearby the AMPS-frequencies
were not available. AMPS was also the dominating analog technology, and therefore
a new digital system had to be reverse compatible, preferably using most of the
infrastructure in AMPS. Two systems were proposed and brought into operation,
IS-95 and D-AMPS (Digital AMPS a.k.a. IS-54, evolved into IS-136). They were
both reverse compatible, but very different.
The first digital cellular system in Japan, Personal Digital Cellular (PDC),
was introduced in 1994 and is very similar to IS-54. It operates in the 800 MHz
1 The
original meaning of the acronym was Groupe Special Mobile, which was a group established
in 1982 with the mission and mandate to define future European cellular radio standards.
23
and 1500 MHz bands and is the most spectrum-efficient among the systems of the
second generation.
The systems described above have an extensive coverage, but they will never
reach complete coverage. In order to fill in the gaps, there is a need for Mobile
Satellite Communications Systems, and at the present there are five major systems
under development: Globalstar, ICO (formerly Inmarsat), Iridium, Odyssey, and
Teledesic (Keller et al., 1997).
Third Generation Cellular Systems
The needs for voice communication are more or less met by the narrowband systems
of the second generation. However, there are a number of other applications that
require more data to be transmitted. These include conferencing, video, database
access, Internet access etc. The concept name for this type of system is International Mobile Telecommunications (IMT-2000, see e.g., Chaudhury et al., 1999).
In traditional telephony systems, the calls have been circuit-switched, meaning
that the call occupies one channel throughout the call. Due to the bursty nature of
data communication this is inefficient, and instead packet switching can be used,
where the data is divided into packets and transmitted independently. Therefore,
the second generation systems have evolved to include methods for data services.
The ambition is to gradually provide higher data rates, first by circuit-switched
technologies, but eventually based on packet switching. For example, we mention
Cellular Digital Packet Data (CDPD, see e.g., Puk, 1996) in IS-136 networks, High
Speed Circuit Switched Data service (HSCSD, see e.g., Scholefield, 1997) and General Packet Radio Services (GPRS, see e.g., Brasche and Walke, 1997; Cai and
Goodman, 1997) in GSM networks and High Speed Data (HSD, see e.g., Knisely
et al., 1998) in IS-95 networks.
For higher data rates and a more flexible resource allocation, the technology has
to be adopted accordingly. After several twists and turns, the different standardization bodies agreed to try to define a global standard. From a technology perspective, these systems are commonly referred to as either wideband CDMA (WCDMA,
see e.g., Dahlman et al., 1998) or cdma2000 (Knisely et al., 1998), from the two
dominating air interface proposals.
3.2
Radio Communication
24
the carrier signal. It is then transmitted over the radio channel and demodulated
in the receiver. The cellular systems of the first generation are analog and use
Frequency Modulation (FM).
The basic elements of a digital communication system are illustrated in Figure 3.1. It still consists of a transmitter and a receiver communicating over a radio
channel, but the internal components are a bit more sophisticated. Initially the
Transmitter
Message
Source
Encoder
Channel
Encoder
Modulation
Channel
Receiver
s
Estimated
Message
Source
Decoder
sq
Channel
Decoder
fer
Demodulation
ber
sir
3.3
25
the term attenuation is used to stress the fact that the gain is less than one.
26
3.3.1
Path Loss
On a long time average, the observed power at the receiver depends mainly on the
distance to the transmitter. One of the simplest models is based on the assumption
of propagation in free space, but except for satellite communication applications,
this is too coarse. When we consider propagation over plane earth an approximation
of the path loss is derived in (Jakes, 1974), and given by
gp =
Cp
,
r
(3.1)
where r is the distance between the transmitter and the receiver, the path loss
exponent is a constant equal to 4, and Cp is a constant which depends on antenna
specific parameters and the transmitted wavelength.
Empirical studies by Okumura et al. (1968) and Hata (1980) resulted in path
loss models for urban, suburban and rural areas. Equation (3.1) still holds for the
long time average gain if we note that the constants Cp and depend on the type of
terrain. Typical values of are about 2 5, where the lowest value corresponds to
free space propagation, and the higher to urban environments with high buildings.
Note that the plane earth approximation is covered by this range in .
3.3.2
Shadow Fading
As mentioned above, the long time average is given by the path loss. Terrain variations will however result in diffraction and shielding phenomenons, which manifest
themselves as a slow variation in this average gain over a distance corresponding to
several tens of wavelengths. This effect is referred to as shadow fading. Okumura
et al. (1968) and Hata (1980) were pioneers in studying these variations. They used
values in dB and argued that the shadow fading can be modeled using a zero-mean
Gaussian random variable, i.e.
gs N (0, s ).
(3.2)
3.3.3
27
Multipath Fading
In the presence of several large objects, there will be a great number of reflected
signals that reach the receiver. Depending on their phase they interfere either
constructively or destructively resulting in multipath fading. For digital systems it
is important to determine if this fading can be assumed to be constant for each
received symbol. If that is the case, the fading is referred to as flat, but if not,
we are experiencing intersymbol interference due to this frequency selective fading.
For low to moderate data rates the intersymbol interference can be counteracted
using channel equalization (St
uber, 1996) and therefore we will model the multipath
fading as flat.
A simplified worst case scenario arises when the Line-of-Sight (LoS) ray is assumed completely shielded, but the reflected rays reach the receiver and enable
transmission of information. If the arriving rays are modeled as isotropic, the
amplitude gain due to multipath is described by a Rayleigh distribution (Clarke,
1968). Therefore, multipath fading is commonly referred to as Rayleigh fading.
Just as in the case of shadow fading, the multipath fading has a spatial correlation as exemplified in Figure 3.2. Thus the fading is depending on the velocity of
the mobile station. One may also draw the erroneous conclusion, that the fading
is constant if the location of the mobile station is fixed. The truth is that the
environment is also moving, and it is the movement relative to the environment
that matters. Since the origin of the multipath fading is different path lengths of
the reflected waves, it is also depending on the wavelength of the signal. Therefore
we will also observe a correlation in the frequency domain, see Figure 3.2.
3.3.4
In Figure 3.3 we see a sample of how the power gain may vary when a mobile station
is moving in the terrain. It is assumed that the distance to the transmitter is almost
constant and that no Line-of-Sight component reaches the receiver. Therefore the
variations are due to shadow and Rayleigh fading with spatial correlation.
3.4
Multi-User Communications
Consider a case of one base station (BS) serving a certain service area. The BS
transmits and receives data to and from the M mobile stations (MS) in the service
area. The communication goes in two directions, and one distinguishes between
the downlink (forward) channels from BS to MS, and the uplink (reverse) channels
from MS to BS. For simplicity we focus on the downlink from BS to MS number
1. Assume that the BS is transmitting the signals s1 (t), s2 (t), . . . , sM (t) to the
mobiles. Figure 3.4 provides a simple model of the situation at the receiver of MS
number 1. The receiver observes the desired signal and several interfering signals
plus thermal noise.
One important choice when designing a multi-user communication system is the
choice of carrier signals, and we will divide them into two categories: orthogonal and
28
10
gm [dB]
5
0
5
10
15
20
25
30
35
Frequency
Spatial deflection
non-orthogonal signals. The reason is that there are some characteristic differences,
which will be pointed out in the following two sections.
3.4.1
Orthogonal Signals
When the signals are orthogonal, they can be seen as orthogonal base vectors
spanning the signal space. Therefore the receiver only has to extract the energy
along the s1 dimension in the signal space in order to recover the information.
(In real systems, the channel affects the orthogonality at the receiver. Therefore,
signals are separated by a guard band to improve the orthogonality.) We will not
analyze the receiver structure in more detail, and instead focus on the commonly
used orthogonal signals.
The first approach is to separate the users in the frequency domain. This is
referred to as Frequency Division Multiple Access, FDMA (Figure 3.5a), and it has
been very popular, mainly because it is well suited for analog technology. The main
challenge is the frequency synchronization, which is needed to extract the band of
interest. FDMA is the technology used in systems of first generation. The channel
bandwidth used in these systems are 25-30 kHz.
Similarly, we can separate the users in the time domain using Time Division
Multiple Access, TDMA (Figure 3.5b). Then each user is allowed to use the entire
frequency band, but only at assigned time slots in a round robin fashion. TDMA
has the advantage over FDMA that the receiver of the mobile station is only used
29
gs
gp
gm
Traveled Distance
Figure 3.3 The model for radio wave propagation comprises path loss (gp ),
shadow fading (gs ) and multipath fading (gm ).
1/Nt of the time. During the rest of the time it can be used for scanning other
channels. Since the message is sent discontinuously, TDMA is better suited for
digital technology than for analog and the challenge is time synchronization.
Pure TDMA solutions are rare and instead hybrid FDMA/TDMA (Figure 3.5c)
is used, where the spectrum is divided up in frequency bands, which each are
divided into time slots. One example is D-AMPS, where each 30 kHz sub-band in
AMPS is divided into three time slots, resulting in a threefold capacity increase.
In GSM, the sub-bands of 200 kHz are divided up into eight time slots. Compared
to the 25 kHz channels in NMT there is no capacity increase at all. Instead this is
used to enable more reliable communication.
In GSM there is an optional frequency-hopping pattern (see Section 3.6) meaning that the mobile is using a different sub-band each time slot. This hopping
sequence is determined by a code, and therefore this technique is referred to as
Frequency Hopping Code Division Multiple Access, FH-CDMA. Altogether, the
scheme can be seen as the hybrid FDMA/TDMA/CDMA (Figure 3.5d).
3.4.2
Non-Orthogonal Signals
To avoid the problems of frequency and time synchronization, we can use signals
that are almost orthogonal. Each user is assigned a code and is then transmitting
using the entire frequency band. The receiver extracts the desired signal by corre-
30
g1 (t)
s1 (t)
Transmitter
s2 (t)
Transmitter
g2 (t)
.
.
.
sM (t)
Transmitter
Receiver
gM (t)
1 (t)
Figure 3.4 Simple model of a multi-user system. The focus is on the situation at a specific mobile station. Note that the radio channels are characterized by their power gains gi described in section 3.3. The signal 1 (t) represents the thermal noise.
lating the received signal and the code. This spread-spectrum technique is referred
to as Direct Sequence Code Division Multiple Access, DS-CDMA. By spreading and
despreading the signal, the link becomes more robust against fading and interference. The performance gain obtained by spreading is related to the processing gain
(PG). In a system with the data rate R and the channel bandwidth, W , PG is
given by the ratio W/R (Viterbi, 1995).
Consider the uplink, and assume that there are two mobile stations in the
service area, where one is close to the base station and one is far away. If both
mobile stations are transmitting using the same power level, the received powers
at the base station might differ by several orders of magnitude, due to different
power gains of the signals (recall Section 3.3). The signal extraction at the receiver
based on correlation works fine when the powers of received signals are roughly the
same. This is not the case in the above situation, where the signal from the distant
mobile station is drowned by the signal from the close one. Therefore we have
to use appropriate power levels in order to tamper this near-far effect (Gilhousen
et al., 1991). In the downlink, this is not a problem, since all the signals originate
from the same transmitter.
This technique is used today in the narrowband system IS-95, where all terminals communicate on a frequency band of 1.25 MHz. In the systems of third
generation, similar technology will be used, but with a frequency band of 5 MHz.
That will enable higher data rates and mitigate fading better.
3.5
When the service area is large, one base station will not suffice. Instead the service
area is divided into a large number of cells, which has given rise to the name cellular
31
a.
b.
1
2
3
t
c.
d.
1
3
1
3
1
3
1
1
t
1
t
radio systems. Each cell is served by a base station (BS) and within the cell the
situation is similar to what is described in Section 3.4.
The size of different cells varies very much between rural and urban areas and
this is due to the limited number of users one cell can serve. In rural areas few and
large cells are sufficient to meet the needs, and the radius may be several tenths
of kilometers. In denser populated areas where cellular phones are common, there
is a need for smaller and more numerous cells, serving an area of radius down to
about 100 meters. To meet the needs in the central parts of cities, it is getting
more common to use cells consisting of a short part of a street (micro cells) or a
room or a floor of a building (pico cells).
Usually the cells are depicted as hexagonal, but in reality their size and form are
irregular and depending on the terrain and the propagation conditions. Designing
a cellular system involves extensive cell planning. Among other things this involves
determining clever cell sites to get appealing propagation conditions and cell sizes
to meet the needs for communication at the present and in a near future. In order
to use the hardware efficiently it is more and more common to co-locate three base
station antennas and use sectorized antennas covering a sector of 120 each. When
the antenna is radiating in all directions the term omnidirectional antenna is used.
The operator of the cellular system is assigned a frequency band to use in
32
Figure 3.6 The same channel group is reused in different cells in the network. This example shows the cells, to which one channel group
is assigned, when we are applying a reuse K = 9.
In order to keep the presentation clear we will consider the case of orthogonal
signals. Furthermore, let us focus on a specific downlink channel and on the mobile
stations and base stations using that channel. The terminals are numbered, so
that mobile station i is connected to base station i. (Since we focus on one single
channel, only one MS is connected to each BS on this channel.) Furthermore, the
power gain from base station j to mobile station i is denoted gij . The information
about all downlink power gains on the channel at a time instant t can be condensed
c (t). Assume that there are m connections
into the G matrix of the channel, G
established on the channel. Then this G-matrix is given by
..
..
..
c (t) =
(3.3)
G
.
.
.
.
gm1 (t)
gmm (t)
Thus the first column contains the gains from base station 1 to the different mobile
33
stations. This matrix is time variant, since each of the power gains is time variant
and since the dimension of the matrix varies with time when mobiles place new
calls or hang up. There are actually two G-matrices: one for the uplink and one
for the downlink. This is due to the use of different frequency bands, as well as
different propagation conditions and antennas for the base stations and the mobile
stations.
Assume that base station i is transmitting using the power pi (t). The corresponding connected mobile station will experience a desired signal power Ci (t) =
gii (t)
pi (t), and an interference Ii (t), which is the sum of the powers from all other
base stations and thermal noise i (t). See Figure 3.7 for a situation of three interferers. Since this interference is emanating from users on the same channel, it is
referred to as co-channel interference. Sometimes, the term multiple access interference (MAI) is used instead. When we are employing a large frequency reuse or
there are few users in the system, the interference is neglectable compared to the
noise, and the system is noise-limited. In the opposite situation when we employ a
small reuse and several mobile stations are active, the system is interference-limited
due to the dominating interference.
In a DS-CDMA system, all the users are using the same frequency channel.
Hence the frequency planning process of assigning channels to the base stations is
avoided. It can be seen as employing a reuse of K = 1. Therefore everybody is
interfering with each other in the network and contributes to the interference at
each receiver. A DS-CDMA system is typically interference-limited.
34
(t)
p
i (t)
Ii (t)
j (t) +
j6=i ij
(3.4)
One other common term for roughly the same quantity is carrier-to-interference
ratio (C/I or CIR). These quantities are both used interchangeably, but more precisely, SIR refers to the ratio at the base band, while CIR refers to the corresponding
ratio at the carrier frequency. Moreover, one differs between SIR before and after
despreading, and the difference is equal to the processing gain. The main focus in
this thesis is the dynamical behavior of algorithms. Since the differences are just a
matter of scale, they are neglectable.
Depending on the receiver design, propagation conditions and the distance to
the transmitter, the receiver is differently successful in utilizing the available desired
signal power pi gii . Assume that receiver i can utilize
the fraction i (t) of the desired
signal power. Then the remainder 1 i (t) pi gii acts as interference, denoted
auto-interference (Godlewski and Nuaymi, 1999). Hence, the SIR expression in
Equation (3.4) transforms to
i (t)
gii (t)
pi (t)
.
(t)
p
(t)
+
1
(t)
pi (t)
gii (t) + i (t)
j
i
j6=i ij
i (t) = P
(3.5)
From now on, this quantity will be referred to as SIR. For efficient receivers,
i (t) = 1, and the expressions (3.4) and (3.5) are equal.
3.6
Diversity
The radio channel will result in a varying transmission quality due to fading and
thermal noise. In order to counteract these, one or several diversity methods can
be used. The concept of diversity is based on the natural idea that one should
let a single information bit be exposed to different channel qualities. Consider for
example the effects of multipath fading, which is varying with both time, frequency
and space (the position of the receiver), see Figure 3.2. With this in mind, it
is natural to categorize diversity into time-, frequency-, and space diversity. In
addition, polarization diversity is obtained by using clever antenna configurations.
Since diversity methods require the reception of several signals, which have been
transmitted over different channels, it is important to have a good algorithm for
how to combine them. This is a major research area, which will not be covered
here. Instead we refer the reader to (Ahlin and Zander, 1998), which also contains
more material on diversity methods.
Next, we describe the different diversity methods, with an emphasis on frequency diversity, since this will be a main issue in the sequel.
3.6 Diversity
35
Time Diversity
Transmission errors over the radio channel are more likely to occur in groups,
rather than regularly distributed over time. Recall for instance Figure 3.3, where
the signal strength at some times fall far below the average value. During this time
interval we will experience an extra high bit error probability. This bursty nature
of bit errors is troublesome and time diversity can be used to mitigate its effects.
Time diversity can be achieved by using interleaving, which means that the
bits are rearranged before they are sent over the channel, and restored in the
original order at the receiver. Thus, the effect is that the bit errors are likely
to become evenly distributed after this rearrangement, and the error correcting
codes can probably correct the errors, since they usually have been constructed for
independent errors. A consequence of the interleaving is that there will be a time
delay due to the fact that the receiver has to wait until all bits have arrived before
rearranging them.
Frequency Diversity
Frequency diversity can be achieved by transmitting the signals over two or more
frequency carriers. Since the fading is frequency dependent (see Figure 3.2) the
received signals will be more or less correlated depending on how well separated
the carrier frequencies are. Furthermore, one can also say that wideband carriers
yield frequency diversity, since they cover a wide frequency range.
Space Diversity
Space diversity methods utilize the fact that the fading becomes less correlated
at two points the further apart they are. It is not hard to imagine that by using
several antennas, it is unlikely that all of them receive dips in the fading pattern
simultaneously. An extreme case is when the antennas are connected to different
base stations, which is called macro diversity. More often an antenna array is used
at each base station (micro diversity).
Polarization Diversity
Polarization diversity is achieved when the antennas are aligned in different directions, usually horizontally and vertically. This utilizes the fact that the electromagnetic waves have different reflection properties depending on their orientation,
and thus signals from different paths become more and more uncorrelated for each
reflection.
Frequency Hopping
One of the frequency diversity methods is frequency hopping, which is used in
some of the hybrid FDMA/TDMA systems. The distinguishing feature is that
instead of using the same frequency channel all the time, it is changed at each time
36
slot, according to a hop sequence, see Figure 3.5d. Usually frequency hopping is
combined with interleaving, and it is then also a time diversity method.
Frequency hopping falls into two categories, slow frequency hopping and fast
frequency hopping. The former means that there is more than one bit per hop,
i.e. the time it take to transmit one bit is shorter than the time during which the
receiver remains on the same frequency channel. Fast frequency hopping means
the opposite. This is used in some military systems for security reasons, since they
become hard to interfere. The slow frequency hopping on the other hand is used
for its diversity properties, for instance in GSM where it is part of the standard.
The effects of the slow frequency hopping is twofold. Firstly, we get the frequency diversity discussed above, and secondly we get interferer diversity. This
is the gain from having different co-channel interferers on each time slot, which
implies that the interference is shared between the users, an effect called interference averaging. Furthermore, since information sent during sequential hops is
received with different interference, interleaving and coding will improve the transmission link quality, if it covers several hops. The interference diversity gain in
GSM is discussed in (Olofsson et al., 1995) .
One distinguishes between cyclic frequency hopping and random frequency hopping. The difference is that in the former, all transmitters hop by using the same
sequence of frequencies, and thus there will be no interferer diversity, since the
receiver will experience interference from the same sources all the time.
Direct-Sequence CDMA
The effect of Direct-Sequence CDMA (DS-CDMA) is similar to when using frequency hopping, but more emphasized. In such a system, the narrowbanded user
signal is spread onto the entire system bandwidth, using individual spreading codes.
The same code is used at the receiver to despread the received signal down to the
original narrowbanded signal. Spreading is implemented as a multiplication by a
code sequence, with a chip rate which is much higher than the symbol rate of the
system. The signals are essentially spread over a bandwidth approximately equal
to the chip rate. Thus frequency diversity is provided. Since all interferers in the
system are spread analogously, interference diversity is obtained. The despreading
also reduce the effect of possible narrowbanded signals transmitted in the same
frequency band. Introducing interleaving and appropriate antenna constellations
we can also obtain time, space and polarization diversity.
4
Radio Resource Management
During the last years, the market of mobile communications has been subject to a
rapid expansion, and as the demand for multimedia service increases, the available
bandwidth resources have to be utilized efficiently. Therefore, appropriate Radio
Resource Management (RRM) is of great importance.
When managing the radio resources it is necessary to define relevant performance measures and some brief definitions are given in Section 4.1. The available
resource is primarily bandwidth, and algorithms for allocating this resource are
surveyed in Section 4.2. The means to control the resource have to be more formally defined. From a discussion in Section 4.3 regarding a simple but yet relevant
quality measure they are defined rather naturally. Among those are the transmission powers, and some aspects of power control is discussed in Section 4.4. Finally
the focus of this thesis is clarified in the last section.
Throughout the thesis we will express power levels and gains using different
scales. Logarithmic (e.g. dB, dBW, dBm) and linear values are used concurrently.
In order to avoid confusion, we will adopt the convention of indicating linearly
scaled values with a bar. Thus pi (t) is a value in linear scale, while pi (t) is the
corresponding value in logarithmic scale.
37
38
4.1
Performance is hard to define in a precise way, but loosely speaking one could say
that it refers to the quality as experienced by the users. With this description in
mind, it is obvious that we need to clarify not only what is meant by quality, but
also who the users are.
One obvious category of users are the subscribers, and their definition of quality
can be summarized as follows:
1. Primarily, the subscriber wants to be admitted to the network. Related to this
is the Grade of Service (GoS), which is defined when planning the network.
It defines the probability of the system being congested, and is typically set
to 2 5%.
2. When admitted, the subscriber requires an acceptable transmission quality. This is naturally related to the nature of the service. Acampora and
Naghshineh (1994) categorize services in three classes. The first class is
highly delay-sensitive real-time traffic, which when admitted can be seen as
a circuit-switched connection. This include speech and video. By relaxing
the real-time requirement, the second class is still delay-sensitive, but not as
much as for real-time traffic. Such services include file transfer and clientserver applications. Paging and voice mail are examples of the last and the
most delay-insensitive class. Yet another example is download of old Seinfeld
episodes for viewing at later occasions. Resource allocation for multimedia
services is further studied by Anderlind (1997). In this thesis, the primary
examples are services of the first class. However, the methods apply to the
other services as well while in transmission, but higher level reasoning may
be different.
3. Finally it is important that the subscriber remains connected for as long as
he requires. The process of disconnecting or removing is more infringing to
the user than not being admitted at all.
The second category of users are the operators, who have built their businesses
around the network, and thus it is of primary importance for them that the network
performs well. For an operator quality could mean the following:
1. If the subscribers are content, the operator will presumably get more subscribers.
2. Given the network, the operator is interested in serving as many subscribers
as possible.
In reality, a fundamental tradeoff is between these two objectives. The goal is to
maximize the capacity, while offering a sufficient quality to the subscribers.
4.2
39
In this section we briefly survey the area of Resource Allocation Algorithms (RAA).
For a more extensive overview of RAA we refer to (Zander, 1997).
Consider a mobile communication system covering a certain service area as
described in Section 3.5. In this network the M active mobile stations (MS) are
served by B base stations (BS), numbered from the sets
M
{1, 2, . . . , M }.
{1, 2, . . . , B}.
The frequency spectrum assigned to the network operator for radio links is divided
into C channel pairs (waveforms), numbered from the set
C = {1, 2, . . . , C}.
The process of dividing up the spectrum into channels is based on the multiple
access method chosen, see Section 3.4. We need a pair of channels for each communication link, since it consists of an uplink and a downlink. Furthermore, the
channel has to be able to meet the service requirements in terms of data rate and
availability. When a mobile station is admitted to the network a radio link has to
be established. The following has to be assigned to the MS:
A base station from the set B.
A channel pair from the set C.
Transmitter powers for the BS and the MS.
The objective of a resource allocation algorithm (RAA) is to update these assignments during the call in order to maintain an acceptable quality while serving as
many users as possible.
The choice of base station mainly depends on the power gain from the different
BS:s to the MS. For systems based on orthogonal signals, the MS is often connected
to the BS with the most favorable propagation conditions, usually the one serving
the cell where the MS is located. When the MS is moving, it may cross a cell
border and enter a different cell. This triggers a handover or handoff algorithm,
and the call is handed over to the BS serving the cell where entered. The situation
is somewhat different when considering a system based on non-orthogonal signals.
Then the MS can be connected to several BS:s. When the MS is crossing a cell
border, it is connected to both BS:s while being located near the border. This is
referred to as soft handover. When using sectorized cells, a related scheme is softer
handover, where the MS is connected to several sector antennas at the same BS.
Handover algorithms are surveyed by e.g., St
uber (1996).
In the systems of the first generation, the calls were assigned a fixed channel
pair during the call. These fixed channel allocation (FCA) schemes are also used
to some extent in the systems of the second generation. The problem is that these
40
channels are usually narrowbanded in frequency, and as pointed out in Section 3.3,
the power gain is frequency dependent. In order to avoid the case when a slowly
moving MS might experience a deep fade in the power gain for a long time (see Figure 3.2), random channel allocation (RCA) schemes are proposed, and the typical
example is the slow frequency hopping in GSM described in Section 3.6. The third
alternative is to use real-time measurements of propagation and/or traffic conditions to reallocate the spectrum resources dynamically. A comprehensive survey of
these dynamic channel allocation (DCA) schemes as well as the others is provided
by Katzela and Naghshineh (1996).
Finally, the transmitter power levels have to be determined, and this is the
issue in a main part of the thesis. Proposed algorithms to date are surveyed
in Section 4.5. We will separate the power control problem from the other two
assignments, and consider them as given or managed by appropriate algorithms.
However, in previous work, joint approaches are proposed. For instance, Hanly
(1995); Yates and Huang (1995) discuss algorithms that combine power control
and base station selection, and Foschini and Miljanic (1995) provide preliminary
results regarding a combination of power control and DCA.
In a network operating close to its capacity limit, an arriving MS may have
a fatal effect on the established connections. Therefore, the RRM system has
to decide if this terminal should be allowed into the system. Apart from these
admission control algorithms, there is also a need for removal control algorithms,
to determine which MS that has to be disconnected. Generally, the removal process
is considered more infringing to the user, but it may be unavoidable when the
quality of the connection is too low, and efforts to change this situation have
failed. Algorithms for admission and removal control have been studied by Andersin
(1996); Andersin et al. (1996b, 1997) and Bambos et al. (1995).
4.3
In order to define the controllable resources more formally and to see how they
affect the transmission quality, it is instructive to start from a simple but relevant
quality measure. The signal-to-interference ratio SIR (see Section 3.5) is commonly
used as such a quality measure. Based on its definition, we will try to find a general
framework which can be used both for orthogonal and non-orthogonal signals. The
framework is to some extent based on (Zander, 1996).
Consider the case of orthogonal signals. Focus on a specific downlink channel
and on the mobile stations and base stations using that channel. The m active
transmitters are using the powers pi (t), i = 1, . . . , m. Let i identify each link, so
that e.g., transmitter i is located in the base station to which mobile station i is
connected. Recall from Section 3.5 that the signal from transmitter j to mobile
station i is attenuated by the power gain gij (t). Hence, the SIR at mobile station i
41
ij (t)
pj (t) + 1 i (t) pi (t)
gii (t) + i (t)
j6=i g
i (t) = P
(4.1)
where i (t) corresponds to the receivers ability to utilize the received desired signal
power. An efficient receiver utilizes all desired signal power and corresponds to
i (t) = 1. A simplifying assumption is that perceived quality is dependent on
SIR and hence that the quality is acceptable when this ratio is above a certain
threshold, i.e.,
i (t) 0 , i.
When extending the definition in (4.1) to include all the channels in the system
and to cover both orthogonal and non-orthogonal signals, we obtain an intuitive
definition of the control signals. These relate to the assignments of base stations,
channel pairs and transmission powers, which were listed in Section 4.2.
In addition, we will disclose that with some obvious redefinitions, the SIR expression in (4.1) holds for both orthogonal and non-orthogonal signals when soft
handover is not considered. In this thesis we assume that the mobile stations are
connected to one base station only if nothing else is stated. Without loss of generality we can therefore adopt the notation of a downlink situation on a specific
channel in the orthogonal case, when analyzing several aspects of these systems.
Systems Based on Orthogonal Signals
Consider the entire network, and assume that there are B transmitters in base
stations covering the service area, serving the M active mobile stations. Denote
the power gain from transmitter j to mobile station i at time instant t by gij (t).
..
..
..
G(t) =
(4.2)
.
.
.
gM1 (t)
gMB (t)
Note that apart from the G-matrix of a single channel (see Section 3.5), this matrix
is most likely not square, since several transmitters (channels/waveforms) at the
base stations are probably not allocated all the time. Let mobile station i be
connected to transmitter bi . Thereby, the mobile station index i identifies an
established connection, because of the one-to-one correspondence. Furthermore,
define ij as
0 otherwise
42
This means that ibi = 0, since the transmitter bi is connected to, not interfering
with, the mobile station i. Hence we get the following alternate expression for the
SIR at mobile station i
i (t) gibi (t) pbi (t)
.
ibk (t) pbk (t) ibk + 1 i (t) pi gibi + i (t)
k=1 g
i (t) = PM
(4.3)
bi (t) = PM
(4.4)
Note that we have used gibk to denote the power gain between mobile station i and
receiver/transmitter bk both in the uplink and the downlink. In general these are
different, and thus the network is not reciprocal.
Adjacent Channel Interference
Even if the signals are orthogonal when transmitted, the radio channel may affect
this orthogonality. Time delays and lack of synchronization in the entire network,
as well as fading and other effects violate the orthogonality. Hence there is an
imminent risk of experiencing interference from adjacent channels at the receiver
as well.
The G-matrix of the network is still defined as in (4.2). However, the matrix ij
is defined slightly different. In the previous section, the element corresponding to
base station j and mobile station i was equal to zeros when using different channels.
In this case it will be defined as a small value less than one describing this leakage
between channels. Therefore the SIR expressions in Equations (4.3) and (4.4) still
holds.
Systems Based on Non-Orthogonal Signals
The G-matrix of the network can be defined as in (4.2). In a typical DS-CDMA
setting, each base station (and maybe even the system) utilizes one frequency band,
used by all connected mobile stations. Thus, transmitter bk is analogous to base
station bk . Furthermore, if we define ibk by
0
,i = k
43
the alternate expressions for the signal-to-interference ratio in (4.3) and (4.4) still
holds. If perfect correlation is represented by unity, ibk takes values between zero
and one. As a simple model, we can assume that
1/Nc , i 6= k
ibk =
0
,i = k
where Nc is related to the processing gain (PG), which is the ratio between the total
bandwidth and the data rate (Viterbi, 1995). This yields the following expression
for the SIR at base station bi
bi (t) gibi (t) pi (t)
.
(4.5)
bi (t) = 1 P
gkb (t) pk (t) + 1 b (t) pi gib + b (t)
Nc
k6=i
One important difference between the uplink and the downlink is that the orthogonality is differently affected by the channel. In the downlink, the part of the
interference at the mobile station that originates from the connected base station is
more or less orthogonal, since the waveforms are transmitted over the same channel. In the uplink, this is not the case. The interfering waveforms from mobile
stations in the same cell are transmitted over different channel. Therefore, the
uplink situation is more critical. This is, however, reflected in the s, but they are
different in the uplink and the downlink.
Theoretical Interpretation of the Control Signals
In Equation (4.3) we disclosed the following general formulation of the SIR for the
downlink
i (t) gibi (t) pbi (t)
i (t) = PM
,
(4.6)
ibk (t) pbk (t) ibk + 1 i (t) pi gibi + i (t)
k=1 g
and from Equation (4.4), we see that the formulation for the uplink is essentially
analogous. It is instructive to relate this expression to the assignments performed
by a radio resource algorithm (see Section 4.2). Clearly the base station assignment
corresponds to a choice of bi :s and the power control amounts to the choice of pi
and pbi . Finally, the channel allocation or the choice of waveforms or codes is
reflected by ij .
Furthermore assume that the base stations and channels are assigned. Then we
can redefine gij by
gij := gibj ibj .
The motivation for redefining gij instead of using a new notation is to correlate
with the common notation used in the field. Based on this definition, the SIR
is given by a similar expression as in the orthogonal and single channel case in
Equation (4.1). Therefore, when studying power control effects to the entire cellular
radio system, we can without loss of generality assume that the system is based
on orthogonal signals, and consider only the connected transmitters/receivers on a
certain channel.
44
4.4
Let us assume that the appropriate base stations are assigned and channels allocated. Then the remaining problem is to update the output powers of the transmitters. This power control problem can be concerned with the following standard
block diagram if the signals are interpreted as below (with respect to mobile i).
w
z
Plant
y
u
Power
Control
45
controls all the power levels in the network. A decentralized controller is only
controlling the power of one single transmitter, and the algorithm is only
relying on local information. The latter case is the only practical one, since a
centralized controller requires extensive control signaling in the network, and
will suffer from additional time delays.
Note that the distinction is primarily between the type of information used
when computing the output powers. Even if an algorithm is considered to
be decentralized, it is not necessarily physically located in the mobile station. Instead, the power levels may be computed in the base stations, and
distributed to the corresponding transmitters. This master-slave relationship
facilitates software updates and support.
Global Stability and Performance. Interconnecting several distributed
power control algorithms affect properties of the overall global system, such
as stability and performance. The relations between local and global performance has thus to be established.
Quality Measure. Speech quality is a very subjective quantity, and relevant quality measures are different from measures applicable to data traffic.
Therefore, the appropriate quality measure is service dependent.
Feedback Bandwidth. The feedback can be categorized by the necessary
bandwidth to transmit the information to the control algorithm. Typically
one differs between on the one end information feedback, where basically real
values are assumed available and on the other end decision feedback, where
only whether a value is above or below a threshold is assumed available.
These are the extreme situations and feedback schemes in between are also
implemented. In TDMA systems of the second generation, the feedback is
provided in measurement reports comprising a Quality Indicator (QI), reflecting the quality and a Received Signal Strength Indicator (RSSI), reflecting the received signal strength at the receiver. These values are coarsely
quantized in order to use few bits. Thus an important question is to determine which quantities that can and should be estimated given the available
measurements.
Constraints. The output power levels are limited to a given set of values
due to hardware constraints. This includes quantizing and the fact that the
output power has an upper and a lower limit. Additionally, the various standards include different constraints. For instance in GSM, there are channels
in the network, requiring the use of maximum power, and in D-AMPS all
three time slots on the same carrier have to use the same power level.
Time Delays. Measuring and control signaling takes time, which results
in time delays in the network. These are primarily of two kinds. Firstly it
takes some time to measure and report the measurements to the algorithm,
resulting in a time delay of nm samples. Secondly we have a time delay of
46
np samples due to the time it takes before the computed power is actually
used in the transmitter. These time delays should be considered as additional
time delays, since the discrete-time controller is assumed to always provide a
delay of one sample. As an example consider WCDMA (UMTS 30.06, 1997),
where each slot contains a power control command. The duration of a slot
is 1/1500 s, and consider the power update instants t as time reference. The
power computed at time instant t 1 is actually reflected in measurements
not earlier than at time instant t. This measurement is used to update the
power at time instant t + 1. In this typical case np = 1 and nm = 0.
Controller Bandwidth. Clearly, not all possible time-varying disturbances
can be compensated for using power control. The controller bandwidth
describes which variations that can be mitigated and which that can not.
Clearly, this is related to channel characteristics, modulation scheme, link
orientation (up- or downlink), mobile velocities and the update rate of the
power control algorithms.
The power control strategy is naturally implemented by the cascade control
structure depicted in Figure 4.2. Relevant information is extracted from the (possibly delayed) measurement y by the estimating device F . An outer control loop
computes a target SIR which on the medium time scale corresponds to the data
rate of the users service. The inner loop assigns transmission powers to track the
provided target SIR while compensating for disturbances w. Typically, the update
rate of the inner loop is an order of magnitude faster than the outer loop.
w
t
Outer
Loop
Inner
Loop
Environment
Figure 4.2 Cascade structure of the controller, where a fast inner loop
issues transmission powers to track a target value provided
by a slower outer loop, and to compensate for disturbances.
Relevant information is extracted from the measurements by
the device F .
Algorithmic properties are naturally studied at two levels. Capacity, load and
whether it is possible to accommodate all users with their data rate requirements
(reflected by the SIR targets) are typically discussed at a global level. We assume
that the inner control loops successfully compensates for the fast variations, so that
47
the power gains can be considered as constant. Moreover, stability and convergence
are also discussed at a global level. Again, the power gains are assumed constant,
but the motivation is that we are considering the short term behavior of the global
system, and the power gains are assumed to fluctuate more slowly. Conversely on
a local level, target SIR:s are assumed constant and that it is possible to accommodate all users. Then the tracking capabilities are in focus in terms of inner control
loop bandwidth and stability.
4.5
The ambition is not to provide a complete coverage of the area, but rather to
outline some important and central contributions. As in the previous discussion,
index i refers to a specific connection, and that the same algorithm is employed for
every connection. Some algorithms include design parameters, and these will be
denoted by Greek letters , etc.
Power Control to Improve Link Performance
In early wireless point-to-point links, fading was primarily seen as a time varying
power gain g(t) (see Figure 4.3a). Power control was essentially used to compensate for the varying channel and the thermal noise power v(t). In other terms,
the control objective was to issue transmission powers p(t) to ensure a sufficient
signal-to-noise ratio (SNR) at the receiver (Ekberg and Laurent, 1964). The ideal
transmission power would be to invert the channel and to use a bias to fulfill the
SNR requirement as given by the solid line in Figure 4.3b. This strategy is troublesome to implement in practice, primarily due to varying channels and to inaccurate
and/or infrequent channel estimates. A possible solution would be to use excess
power as given by the dashed line in Figure 4.3b. The draw-backs include increased
energy consumption and disturbance to others if present.
Fundamental limits for digital communication systems were established by
Shannon (1948a,b, 1956). He formulated the basic problem of reliable transmission
of information in statistical terms, and demonstrated how constraints and noise
can be associated with a channel capacity. If the information rate from the source
is less than the channel capacity, then it is theoretically possible to achieve reliable
(error-free) transmission through the channel by appropriate coding.
It is a well-known fact that feedback can be used to improve stability and
performance. Normally the feedback is categorized by its information content.
Schalkwijk (1969) showed that the achieved performance using information feedback
is better than when using decision feedback, which in turn yields better performance
than when not using feedback at all. The cost is increased feedback bandwidth.
As an alternative to power control, Cavers (1972) discusses variable data rate
in the transmission. With constant average power, the proposed scheme adjusts
48
a.
Time [s]
Figure 4.3 A natural approach to compensate for a time-varying channel
as in a) is to invert the channel. This corresponds to using the
power as described by the solid line in b). An alternative is to
use excess power as given by the dashed line in b).
the data rate to minimize the average error probability. Moreover, Cavers discusses
the effect of feedback delay, which is seen to affect the performance significantly.
Srinivasan (1981) relaxed the assumption of a known channel, and included a
pilot symbol of constant power to the transmitted data symbol. The pilot symbol
was then used to estimated the channel. A generalization to a frame of data
symbols including one pilot symbol is provided by Saarinen and M
ammela (1999).
In addition, the effect of channel coding is studied. Essentially, the purpose of
these minimum mean-square error (MMSE) receivers, is to find the optimal linear
receiver that maximizes SNR.
Goldsmith (1997) proposed an optimal adaptive transmission scheme, which
achieves the Shannon capacity of a fading channel. This scheme is based on known
channel parameters, and utilizes both variable power and rate. The power adaption
uses more power when the channel is favorable, and conversely less power when
the channel is not as good. If the quality of a particular channel is below some
threshold, no power is allocated to that channel. It was also noted that the capacity
difference between using variable power and constant power was neglectable for
most types of fading, when rate adaption is applied.
49
(4.7)
where C t is the target signal power which the desired signal power Ci = pi gii
strives towards. Anderlind (1997) also provided a natural extension to handle
output power constraints. The index i relates to the transmitter-receiver pair i,
and this will be the convention throughout the rest of the section.
As pointed out in Section 3.5, tampering the near-far effect in DS-CDMA systems is crucial for good performance. One possible solution is to control the powers
of the mobile stations so that the powers received at the connected base station
are all the same. The algorithm implemented in the IS-95A standard (Adachi,
1997; Ariyavisitakul and Chang, 1993; Chang, 1996; Chang and Wang, 1996) can
be described by
Ci (t) Cit
i pi (t),
, i 1
(4.8)
pi (t + 1) =
1
50
the term SIR balancing, for a strategy of power control aiming for all users to have
the same SIR. The proposed algorithm was based on solving an eigenvalue problem.
Alavi and Nettleton (1982); Nettleton (1980); Nettleton and Alavi (1983) extended these results and applied them to spread spectrum cellular radio systems.
This approach was further refined by Grandhi, Vijayan, Goodman, and Zander
(1993).
Zander (1992b) interpreted these algorithms as optimal solutions in the sense
that there exist no other power vector yielding a higher SIR for all receivers
(i.e., no higher balanced SIR). Since the result is based on an eigenvalue problem,
is an optimal power vector, so is k
p .
the optimal power vector is relative, so if p
Thermal noise was not included in the analysis. However, in the noisy case, we
note that the influence of the noise can be made arbitrarily small by choosing k
sufficiently large. A consequence is that the optimal balanced SIR in the noiseless
case serve as a bound for balanced SIR:s even in this case.
These results hold under the assumption that the receiver can utilize all the desired received signal power Ci (t). If the receiver only can utilize the fraction i (t) of
that power, the remainder acts as interference, auto-interference (see Section 3.5).
Godlewski and Nuaymi (1999) proved that the auto-interference will result in a
lower optimal balanced SIR.
In a practical case, a specific balanced target SIR, t at each receiver may be
desirable. This may be relevant if the objective for example is to provide speech
services of the same quality to all users. Zander (1993) proposed a centralized
algorithm to determine the corresponding balancing power vector. Moreover, this
is proven feasible if and only if t < .
In the analyses above, it has been assumed that the transmitters can use any
power. In practice there are constraints on the power levels. A centralized scheme
for power control with upper bounds on the maximum transmitter power was discussed by Grandhi et al. (1995).
Decentralized Power Control in Cellular Systems Based on SIR
The foundations for the distributed algorithms to be described were laid by Meyerhoff (1974). The motivation in this article was not to obtain a distributed algorithm, but rather to make Aeins centralized algorithm more computationally
efficient. The proposed algorithms were based on results for iterative computations of eigenvectors (Fadeev and Fadeeva, 1963; Pipes and Hovanessian, 1969).
Similar ideas appeared in an article by Zander (1992a), but this time applied
to cellular radio systems. Here the Distributed Balancing (DB) algorithm was
suggested:
1
.
(4.9)
pi (t + 1) = pi (t) 1 +
i (t)
This result was also inspired by numerical methods. The DB algorithm is essentially the power method for finding the dominant eigenvalue and its corresponding
51
eigenvector (Carnahan et al., 1969), which directly relates it to the centralized algorithms discussed above. If the thermal noise is neglected, it can be shown (see
Zander, 1992a) that the DB algorithm converges to the balancing power vector,
which corresponds to .
At first sight the DB algorithm appears to be distributed, since it is based only
on i (t), which is a measurements of the SIR at the receiver. However, it turns
drift towards zero or
out that the choice of is problematic, since it may make p
infinity, if not appropriately chosen. This choice of can be seen as a normalization
procedure, and it must be based on global information. Thus this is not a fully
decentralized algorithm.
The Distributed Power Control (DPC) algorithm, which is a slight modification
of the DB algorithm, was suggested by Grandhi, Vijayan, and Goodman (1994)
pi (t)
pi (t + 1) =
.
i (t)
(4.10)
When neglecting the thermal noise, the DPC algorithm was also shown to converge
, and simulations indicated that the convergence was faster than when using
to p
the DB algorithm. This is also shown analytically in (Zander, 1993). Furthermore,
simulation results presented in (Lee et al., 1995) show that the DPC algorithm
results in better performance than the DB algorithm. Nevertheless, the problems
of normalizing the powers by cleverly adapting still remained. Yet another algorithm, similar to those described above was proposed by Lee and Lin (1996); Lin
(1995)
pi (t + 1) = pi (t)
1
i (t)
.
(4.11)
This algorithm was referred to as the CDPC-II algorithm and it also suffers from
t
.
i (t)
(4.12)
52
With the DPC algorithm as the base, extensions have been proposed when
considering systems with output power constraints. Grandhi, Zander, and Yates
(1995) proposed the Distributed Constrained Power Control (DCPC) algorithm,
and proved its convergence. The algorithm is given by
t
pi (t + 1) = min pmax , pi (t)
.
(4.13)
i (t)
It addresses systems where the output power is bounded from above by pmax . If
the powers are bounded from below by pmin (0), the scheme should be updated
accordingly. Additional complexity arises when considering systems where the output powers are quantized. Andersin, Rosberg, and Zander (1996a, 1998b) propose
the Distributed Discrete Power Control (DDPC) algorithm as a possible solution.
Their results intimate that there is an imminent risk of an oscillative behavior in
the system. The proposed solution incorporates some signaling between the distributed algorithms, and is therefore not fully decentralized. An algorithm aimed
at the same problem is proposed in (Wu and Bertsekas, 1999), but with the restricting assumption that global information is available at each transmitter to update
the powers distributedly.
This far primarily values in linear scale are utilized. Yates used values in logarithmic scale in the following algorithm (Yates, 1995)
xi (t) = t + pi (t) i (t)
pi (t + 1) = pi (t) + (1 )xi (t) , 0 1.
(4.14)
Yates proved its convergence to t if feasible ( t < ) and introduced the term
logarithmic interference averaging to describe the effect of the . Basically, it
enables a more conservative behavior, and = 1 corresponds to no power control,
while = 0 yields the DPC algorithm described in Equation (4.12).
A corresponding algorithm using decision feedback (see also (4.8)) is discussed
by Salmasi and Gilhousen (1991)
i (t) it
i pi (t),
pi (t + 1) =
(4.15)
1
i (t) > it
i pi (t),
Again, the benefits include the low signaling bandwidth, which enables a high update frequency. This algorithm will be used in the emerging WCDMA standard,
with an update frequency of 1500 Hz (Dahlman et al., 1998; UMTS 30.06, 1997).
This algorithm will be referred to as the Fixed-step power control (FSPC) algorithm. The step size i can be adapted as well, normally at a much lower updating
frequency than the power control loop. Such algorithms will be denoted Adaptivestep power control (ASPC) algorithms. When in soft handover the mobile station
receives two possibly different control commands to update its uplink power. Then
the mobile adjusts the power with the largest commanded downward step (different
step sizes from the different base stations are possible).
The convergence analyses so far are based on an assumption of a constant
G-matrix or at least subject to only neglectable variations with respect to the
53
time constants of the inner control loops. The case of a shadow fading G-matrix
is studied by Andersin and Rosberg (1996), and the recommendation is that the
quality requirements should be multiplied by const a constant greater than one.
If the minimum required SIR at the receiver is given by 0 , the target SIR should
be chosen as
t = 0 const .
(4.16)
(4.17)
54
5
Local Analysis
55
56
Local Analysis
Transmitter
Receiver
xi (t)
it (t)
i (t)
Ri
Fi
ui (t)
np T
nm T
Di
pi (t)
Figure 5.1 Block diagram of the receiver-transmitter pair i when employing a general SIR-based power control algorithm. In operation,
the controller results in a closed local loop. Time delays are
expressed in number of samples with respect to the sampling
interval T .
Di to the updated output transmission power pi (t). Note that in the typical information feedback case, Di is essentially a represented by a time delay. Therefore,
the quantization noise xi can without loss of generality be included in the additive
disturbance gii (t) Ii (t). The relation between the transmitted power and SIR
(neglecting auto-interference) in Equation (3.5) is given in logarithmic scale by
i (t) = pi (t) + gii (t) Ii (t).
(5.1)
The physical location of devices Ri , Di and Fi and their interpretation are irrelevant from a dynamical point of view. To emphasize the locality of the analysis, a
control algorithm in operation as in Figure 5.1 will be referred to as a local control loop or just local loop. The local loops are interconnected via the interference
Ii (t). In local loop analysis, we make the simplifying assumption that Ii (t) is a
disturbance independent of pi ( ), t. In the case of power controlled cellular
networks, the interference at one receiver is a strictly increasing function of the
powers used by others. Therefore a competition between the users can be observed, and we can argue that local instabilities are not compensated for by the
interconnections. Hence, local stability is a necessary, but not sufficient condition
for global stability. The dynamical effects of the interconnections are studied more
thoroughly in Chapter 7. An important conclusion is that local stability and some
additional requirements yield global stability.
To further motivate the local analysis, some introductory examples are provided
in Section 5.1. Section 5.2 focus on the components of the local loops. These are
identified as power control algorithms, time delays, static nonlinearities and filters.
Several interesting power control algorithms are naturally categorized as either
57
linear or linear with static nonlinear components. For example some algorithms
using decision feedback belong to this category. Linear algorithms are analyzed
with respect to stability using root locus analysis in Section 5.3. As seen in the
following section, linear systems with static nonlinear components, often result in
an oscillatory behavior. For that purpose, describing functions are introduced in
Section 5.4 and applied in Section 5.5. As pointed out above, auto-interference
is neglected throughout almost the entire chapter. The main motivation is that
its effect on stability can be treated together with the interconnections, as will
be further discussed in Chapter 7. However, some brief results are provided in
Section 5.6, where we conclude that auto-interference does not violate stability of
linear algorithms nor aggravate oscillations of the FSPC algorithm.
5.1
Motivating Example
To further motivate local loop analysis, it is interesting to study the effect of a delay
of a single sample. The following example illustrates the behavior when employing
the DPC algorithm in (4.12) and the FSPC algorithm in (4.15)
Example 5.1 (Single Delay in the Closed Local Loop)
Consider the situation in Figure 5.2, where four mobile stations are connected
Figure 5.2 Configuration in Example 5.1, where four mobile stations initially are allocated to the same channel. At time instant t = 0
a fifth mobile station (indicated by the arrow) is allocated to
the channel.
58
Local Analysis
i (t) [dB]
a.
16
14
12
10
8
10
i (t) [dB]
b.
10
15
20
25
30
35
40
10
15
20
25
30
35
40
16
14
12
10
8
10
time instants
Figure 5.3 The recovering ability of a. DPC and b. FSPC algorithms
when subject to the situation in Figure 5.2 and a time delay of
one sample.
using the same channel. The simulation is initiated at time instant t = 10,
and the four mobile stations are initially using the optimal transmission powers
corresponding to a target SIR of 12 dB. The signal power gains gij are constant
throughout the simulation. At time instant t = 0, the same channel is allocated
to a fifth mobile station, initially using a transmission power of 1 dBW. The
target SIR is still feasible in the five mobile station case. Power control is
employed as either DPC described by (4.12) or FSPC (step size =1 dB) given
by (4.15). It is illustrative to see how these algorithms recover in the changing
environment when subject to delayed power control commands. In this case,
the power control command (FSPC) or the transmission power itself (DPC) are
delayed by one sample interval.
The performance using the two algorithms is depicted in Figure 5.3. We note
that DPC is unstable in the sense that the oscillations in SIR are aggravated
over time. Up to t = 0, the powers are not updated since the target SIR and
the measured SIR are identical. The system is thus at rest in an equilibrium
point. Then, the admitted mobile increases the interference at each receiver.
This disturbance reveal the instability of the equilibrium point, and the SIR
fluctuations get worse over time.
Despite being perfectly initialized, FSPC results in oscillations in the case of
four mobiles. That is due to the decision feedback, where the powers are either
increased or decreased each time instant. The oscillations are not that much
affected by the entering mobile station. However, one might expect that this
up-down device would result in small oscillations (approximately 1 dB peakto-peak) around the target value. As seen in the plot, the amplitude is larger
(3 dB peak-to-peak) than expected.
59
5.2
Dynamical Models
The local loops mainly comprise four components: power control algorithms, time
delays, static nonlinearities and filters. These are modeled in the following subsections. The models relate primarily to two important feedback situations
Information feedback. The mobile feeds back the exact SIR measurements
or the error
ei (t) = it i (t).
(5.2)
The important characterization is essentially that real numbers are fed back.
Decision feedback. In a power control setting, we typically associate this
with feedback of the sign of the error in (5.2)
si (t) = sign(it i (t)) = sign(ei (t))
(5.3)
Thus, only one bit is needed for command signaling, which makes the scheme
bandwidth efficient.
In practice, the assumption of real valued measurements of information feedback
is unrealistic. Instead, quantized measurements can be made available. This is
further discussed in Chapter 8. However, the two cases describes two important
extremes, and constitute the situations considered in this and subsequent chapters.
5.2.1
Numerous algorithms have been proposed, and as the number of proposed algorithms increases, the picture tends to get more and more blur. We will focus on
some important fully distributed algorithms from Section 4.5, and see how the
algorithms relate to the following algorithm, based on information feedback
pi (t + 1) = pi (t)
it (t)
i (t)
.
(5.4)
60
Local Analysis
Note that individually time varying target SIR:s it (t) are enabled. If the update
frequency of it (t) is much slower than the time constants of the control algorithm,
it can be considered as constant in the analysis. It is instructive to express this
control law in logarithmic scale.
pi (t + 1) = pi (t) + it (t) i (t)
(5.5)
This controller is identified as an integrating (I) controller.
The CDPC-II algorithm proposed by Lee and Lin (1996); Lin (1995) and given
by (4.11) can be rewritten as
pi (t + 1) = pi (t)
1/
i (t)
.
t
i (t)
Thus it can be seen as the algorithm in (5.5) with a power level dependent target
SIR. This algorithm is further discussed in Section 9.4.3. The local dynamics are
more emphasized in the following form
pi (t + 1) = pi (t) + it i (t) ,
(5.7)
where it = / is a design parameter, possibly provided by an outer control loop.
Using decision feedback, the control error ei (t) = it (t) i (t) is not available,
but rather the sign of the same. The decision feedback algorithm FSPC in (4.15)
can be rewritten in logarithmic scale as
(5.8)
pi (t + 1) = pi (t) + i sign it (t) i (t) ,
which illuminates the similarity to (5.5) where information feedback is available.
61
5.2.2
Time Delays
Both measuring and signaling in cellular systems take time, which results in delayed
signals. As pointed out in Section 4.4, there are three main reasons for time delays.
Firstly, the power control algorithm Ri is assumed to result in a time delay of one
sample, since measurements at time t (e.g., i (t)) are used to update the power level
at time t + 1 (i.e., pi (t + 1)). Secondly it takes some time before a computed power
level actually will be used and thereby observed by others. Additional delays are
caused by the fact that power update commands are only allowed to be transmitted
at certain time instants. Together they result in a total delay of np samples.
Finally, the measuring procedure takes time, and again these measurements are
only reported to the power control algorithm at certain time instants, resulting in
a delay of nm samples. In total there is an additional delay of n = np + nm samples
in the local loops. A typical delay situation is described in the following example.
Example 5.2 (Typical Delay Situations in WCDMA)
Since the command signaling is standardized, the delays are known exactly in
number of samples (or slots). Typical situations in WCDMA are depicted in
Figure 5.4. In a) the receiver estimates the SIR i (t) (possibly only the desired
signal power, which is combined with a separate interference measurement to
compile SIR) over some pilot bits and maybe data symbols, on a slot sent using
the power pi (t 1). The power control command (TPC) is included in a slot
in the opposite direction at time instant t. The transmitter finally updates the
power pi (t + 1). By shifting the slot synchronization as in b), the transmitter
power can be controlled without excessive loop delay. The drawback is that
62
Local Analysis
fewer bits for the SIR estimation is used, resulting in a larger variance of the
estimation error (see also Section 6.1.4). This is only possible for mobile stations
relatively close to the base station, and np = 1, nm = 0 will be considered as a
typical WCDMA situation.
a)
t1
t+1
Transmitter
Update
Receiver
Est.
b)
t1
TPC
t+1
Transmitter
Update
Receiver
Est.
TPC
The same delay situation as in the example also applies to GSM. Systems subject
to longer delays include IS-95A with np = 2, nm = 0 (TIA/EIA/IS-95, 1995),
and different satellite communication systems, which may inherit even longer time
delays (Mehta et al., 1998).
The time interval over which measurements are collected is normally a fraction
of the power control update interval, as illustrated by the example above. It might
even be time-variant. Therefore, it is natural to define time instants t equal to the
update instants of the transmission power, which are fixed and can be associated
with the power control update interval Ts .
Time delays are conveniently represented using the time-shift operator q defined
by
q n p(t) = p(t n), q n p(t) = p(t + n)
63
To stress the direction of the time shift, the terms forward-shift operator and
backward-shift operator (or delay operator ) are used for q and q 1 respectively.
Arithmetic operations of polynomials in q will be used frequently in this and subsequent chapters. For a more rigid discussion on a q-operator algebra, the reader is
referred to (
Astr
om and Wittenmark, 1997). The intuitive relations to the complex
variable z of the z-transform are also addressed.
5.2.3
Nonlinearities
System nonlinearities are often classified as either inherent or intentional nonlinearities. The first category consists of components that we cannot affect in the design
at the moment, such as output power constraints. On the other hand intentional
nonlinearities are those which are deliberately introduced in the system.
Due to physical limitations in the hardware, the output power levels are bounded
from above by pmax and from below by pmin . In addition, the power levels are quantized, and normally, a uniform quantization in logarithmic scale is used. Usually,
these nonlinearities are referred to as constraints in the literature. There are also
nonlinearities introduced by the software. In some standards, there are channels
requiring the use of maximal powers. When using different channels during a call,
this is definitely a nonlinearity.
The nonlinearities described above are all inherent and affect the output powers.
Such nonlinearities are further discussed in Section 6.6.1. It is also possible to
incorporate a nonlinearity in the power control algorithm. One example is the sign
function in the decision feedback algorithms. The name relay is sometimes used
instead of sign function, and that name convention will primarily be adopted here.
5.2.4
Filters
i (t) + . . . + i (t L + 1)
L
1 + . . . + q L+1
i (t).
L
(5.9)
64
Local Analysis
(1 )q
i (t).
q
(5.10)
The number of values that essentially contribute to the filter output is depending on the forgetting factor . As a rule of thumb (
Astr
om and Wittenmark, 1995), it is argued that the number of contributing terms, LEF , can
be approximated by
LEF
2
.
1
(5.11)
The stationary gain, or DC gain, is F (1). Note that both filters have the desired
property F (1) = 1.
In practice, the signal and the interfering powers might be estimated separately.
Consequently, it is beneficial to employ separate filters as in Figure 5.5. The filter
of the interfering power is typically much slower (a much closer to unity) than
the signal power filter (which commonly is not employed at all to reduce delays as
much as possible). Since the focus in this chapter is on stability of the local loops,
only filters applied on SIR will be considered. This is the same as focusing on the
signal power filter, Fg (q).
Receiver
Ci (t)
i (t)
pi (t)
Fg (q)
FI (q)
gii (t)
Ii (t)
Figure 5.5 When the signal and the interfering powers both are available,
separate filtering could be employed.
5.3
65
Log-Linear Algorithms
In several cases, the nonlinearities in the local loops can be neglected, and thus
the remaining system to be analyzed is linear. This is illustrated by Example 5.3.
Local loop stability can therefore be addressed using linear systems theory methods.
In this section we apply root locus analysis, which was applied to power control
problems in (Blom et al., 1998a; Gunnarsson et al., 1998c,d).
Example 5.3 (Local Loop of DPC and Delayed Output Powers)
Consider the DPC algorithm
pi (t + 1) = pi (t) + it i (t).
Using the time-shift operator, this corresponds to
pi (t) =
1
( t i (t))
q1 i
The computed output powers are delayed by one sample before they are actually
used by the corresponding transmitter. The SIR is thus given by
i (t) = pi (t 1) + gii (t) Ii (t).
The algorithm in closed-loop can thus be depicted as in Figure 5.6.
gii (t) Ii (t)
it (t)
1
q1
pi (t) +
i (t)
Figure 5.6 The local loop using DPC, when the computed output power
is delayed by one sample.
.
q1
(5.12)
66
Local Analysis
(5.13)
The output from the controller pi (t) cannot depend on the input instantaneously.
Therefore, R(q) has to contain at least one delay. This is analogous to state that
R(q) has to be strictly proper, i.e., the degree of the denominator polynomial in q
has to be greater than the degree of the numerator polynomial. The filter, however,
is by definition proper, i.e., the denominator and numerator degrees may be equal.
Such a general power control algorithm with a filter and subject to time delays is
depicted in Figure 5.7. Note that time delays only affect the dynamics in terms of
gii (t) Ii (t)
it (t)
pi (t) +
R(q)
q np
F (q)
q nm
i (t)
Figure 5.7 The local loop when employing the general linear control algorithm R(q) and the filter F (q).
the total round trip time delay n = np + nm , since gii (t) and Ii (t) are considered
as independent disturbances.
The terms instability and stability of a local loop have to be well defined in
order to avoid confusion. Rather simplified, instability comes about when relying
too much on outdated information. This result in over-compensation, which is aggravated over time. Eventually, the transmission power oscillates between its upper
and lower output constraints. A system may also be marginally stable, where a
stable oscillation in the output power is observed. In a stable local loop, the effects
of stepwise disturbances and target SIR changes decay to zero over time. We will
discuss stability in terms of the property uniform asymptotic stability. Basically
it implies that transients decay to zero asymptotically. One can compare to the
solution of a linear ordinary differential equation. It consists of a solution to the
homogenous equation obtained by assuming zero input and a particular solution
obtained when considering an input. If the system described by this differential
equation is asymptotically stable, then the homogenous, system-dependent, solution will go to zero in steady-state. More specifically, it is interesting to see how
the choice of controller parameter values affects the stability.
5.3.1
67
Consider a discrete-time linear system with one input u(t) and one output y(t).
Using the time-shift operator q, such a system can be described using the transfer
function G(q) as
y(t) = G(q)u(t) =
b1 q 1 + b2 q 2 + . . . + bnb q nb
B(q)
u(t) =
u(t)
A(q)
1 + a1 q 1 + . . . + ana q na
(5.14)
The poles of this transfer function are defined as the roots of the A(q) polynomial.
When using feedback, the closed-loop system can be depicted as in Figure 5.8,
where G(q) denotes the system to be controlled, R(q) denotes the controller, and
S(q) denotes for instance the sensor dynamics or a filter.
d(t)
r(t)
u(t)
e(t)
R(q)
y(t)
G(q)
v(t)
n(t)
S(q)
BG (q)
BR (q)
BS (q)
, R(q) =
, S(q) =
,
AG (q)
AR (q)
AS (q)
1
(BG AR AS d(t) + BG BR AS r(t) BG BR BS n(t))
BG BR BS + AG AR AS
The characteristic polynomial P (q) of the feedback system is then formed by taking
the product of the three numerators plus the product of the three denominators.
Hence
P (q) = BG (q)BR (q)BS (q) + AG (q)AR (q)AS (q)
(5.15)
The closed-loop poles are defined as the roots of the characteristic polynomial. A
different, but analogous representation of the linear system in Figure 5.8 is the
following state space representation
x(t + 1) = Ax(t) + B (r(t), d(t), n(t))
68
Local Analysis
where A, B, C and D are matrices and x(t) is the state vector. Let E denote the
identity matrix of the same size as A. The characteristic polynomial is then given
by
P (q) = det(qE A)
Uniformly asymptotic stability of the local loop is disclosed in the following fundamental theorem. For a general treatment, we refer to e.g., Doyle, Francis, and
Tannenbaum (1992); Franklin, Powell, and Workman (1997); Phillips and Nagle
(1990); Rugh (1996) or
Astr
om and Wittenmark (1997).
Theorem 5.1 (Asymptotic Stability of Discrete-time Linear Systems)
The feedback system in Figure 5.8 is uniformly asymptotically stable, if and only
if the closed-loop poles are strictly within the unit disc. Otherwise the system is
unstable.
If the controller is parameterized using a parameter , it is interesting to see
how stability is affected by different parameter values. The natural thing to do is
to plot the locations of the poles for the different :s, and see whether they are
located within the unit disc or not. This technique is also known as root locus
analysis.
It is also interesting to study the margin to unstability. There are different
ways to express the stability margin, and here the focus is on the gain margin Km ,
which is defined by
Definition 5.2 (Gain Margin)
The gain margin of a closed-loop system with controller R(q) as in Figure 5.8, is the
smallest multiplicative constant Km such that the system with controller Km R(q),
is unstable. More formally,
Km = sup{K : KR(q) yields a stable closed loop system}
5.3.2
The closed-loop system in Figure 5.7 is all linear, and thus root locus analysis is
applicable.
Consider the closed-loop system in Figure 5.7, which includes time delays and
the use of a filter and the general linear power control algorithm R(q). The analysis
applies to a general R(q), but the focus will be on the integrating controller in (5.12)
R(q) =
.
q1
Based on Figure 5.7 and Equation (5.15), we can form the characteristic polynomial
of the closed-loop system as
P (q) = BF (q) + q n (q 1)AF (q)
(5.16)
69
The filter F (q) is discussed in Section 5.2.4, and when using a local average, it is
given by
F (q) =
q L1 + . . . + 1
BF (q)
=
L1
Lq
AF (q)
With this choice of filter, the locations of the closed-loop poles as functions of
for some different time delays n and window lengths L are plotted in Figure 5.9.
Note that L = 1 corresponds to no filter, i.e., F (q) = 1. The particular case of
b. n = 0, L = 3
a. n = 1, L = 1
1.5
0.5
0.5
Imag Axis
Imag Axis
1.5
0
0.5
0
0.5
1.5
1.5
1
0
Real Axis
d. n = 0, L = 10
c. n = 1, L = 3
1.5
1.5
0.5
0.5
Imag Axis
Imag Axis
0
Real Axis
0
0.5
0
0.5
1.5
1.5
1
0
Real Axis
0
Real Axis
Figure 5.9 Root locus plots for some different window lengths L and time
delays n when using a local average filter. The x:s mark the
roots corresponding to = 0, while o corresponds to the roots
when .
DPC, subject to a single delay and no filter applied, is addressed in the following
example.
Example 5.4 (Local Loop Poles of DPC, Subject to a Single Delay)
Consider the situation in Example 5.3, where the local loop when using DPC
is in focus. The computed output powers are delayed by one sample. The
corresponding characteristic polynomial P (q) is obtained from Equation 5.16
as
P (q) = q 2 q + 1.
70
Local Analysis
The roots of P (q) are (1 3)/2, which are located on the unit circle. That
explains why DPC results in an unstable behavior in Example 5.1: the corresponding local loops are not asymptotically stable.
More specifically, we are interested in the :s yielding uniform asymptotical
stability. To see the effects of time delays and various window lengths, the local
stability constraints on are listed in Table 5.1. Note that the table gives instability
limits for and thus larger -values will result in an unstable system. From the
table, it is evident that the delays of the local average filter affect the stability.
n=0
n=1
n=2
L=1
>1
1.000
0.618
L=3
>1
0.708
0.476
L=5
0.955
0.550
0.394
L = 10
0.489
0.353
0.278
Table 5.1 Local loop stability region given by strict upper bounds on ,
when using the integrating power control algorithm in (5.12)
and a local average filter.
0.5
0.5
Imag Axis
Imag Axis
a. n = 0, = 0.60
1.5
0.5
0.5
1.5
1.5
1
0
Real Axis
0
Real Axis
Figure 5.10 Root locus plots for two different time delays n, when using
an exponential forgetting filter. The choice of forgetting factor = 0.60 corresponds approximately to five contributing
terms, according to Equation (5.11).
est. These are summarized in Table 5.2, where the stability constraints are given
for some different time delays and forgetting factors. The chosen forgetting factors
relate to the sliding window lengths in Table 5.1 via the rule of thumb in Equation (5.11). Note that = 0 corresponds to no filtering, and is thus identical to the
71
first column in Table 5.1 A direct comparison of Table 5.1 and Table 5.2 yields that
n=0
n=1
n=2
=0
>1
1.000
0.618
= 0.33
>1
1.000
0.581
= 0.60
>1
1.000
0.550
= 0.80
>1
1.000
0.523
Table 5.2 Local loop stability region given by strict upper bounds on ,
when using the integrating power control algorithm in (5.12)
and an exponential forgetting filter.
the exponential forgetting filter has more appealing stability properties compared
to the local average.
The analysis provide stability requirements on the controller parameter . Conversely, it is interesting to quantify the distance (in the parameter space) to instability, given a specified controller parameter = 0 . Assume that the stability
limit for the particular delay and filter situation is given by lim (e.g., obtained
from Table 5.1 or Table 5.2). From Definition 5.2, we conclude that the gain margin
is given by
Km =
0
,
lim
5.3.3
5.4
Describing Functions
When the nonlinearities in the local loop cannot be neglected, the methods in the
previous section do not apply. As an alternative, we utilize describing functions,
72
Local Analysis
5.4.1
Basically, we are focusing on loops that consist of a linear part with transfer function G(q) and a static nonlinearity described by the function f () resulting in a loop
as in Figure 5.11. Note that we have assumed a zero input to the loop. Nonzero
inputs are studied in Section 5.4.3.
0
e(t)
f (e)
w(t)
G(q)
y(t)
1
Figure 5.11 Block diagram of a nonlinear system, separated into one linear
and one nonlinear component.
Nonlinearities in the loop normally result in an oscillatory behavior. This will
be studied by assuming that there is an oscillation in the error signal e(t), and then
try to verify this assumption. We proceed by making the N -periodic hypothesis
2
t ,
e(t) = E sin(e t) = E sin
N
where E is the amplitude of the oscillation and e is the normalized angular frequency. The hypothesis is based on a zero phase assumption, with the meaning
that the sample at t = 0 is zero (slightly more general, we assume that the sampled
73
sinus is zero for some t in every period). In order to simplify the calculations we
assume for a moment that f () is odd. The computations using a general static
nonlinearity are analogous, but a little bit more complicated, and we will return
to a general f () further on. Since the nonlinearity is static, w(t) is N -periodic as
well. Using discrete time Fourier series expansion, the signal w(t) is decomposed
into its Fourier components as
w(t) =f (E sin(e t)) = A1 (E, N ) sin(e t + 1 (E, N )) +
+ A2 (E, N ) sin(2e t + 2 (E, N )) + . . .
sin(X t) fed through a linear system H(q) results in the
Recall that a sinusoid X
output
H(eiX ) sin(X t + arg(H(eiX ))),
X
after the transients have decayed. Now let us make the assumption that the linear system G(q) will attenuate the harmonics much more than the fundamental
frequency. This is the only approximation we will make, and it yields
(5.17)
y(t) A1 (E, N ) G(eie ) sin(e t + 1 (E, N ) + arg(G(eie ))).
Figure 5.11 yields
y(t) = e(t) = E sin(e t) = E sin(e t + ).
(5.18)
2
N .
1 (E, N ) + arg(G(ei N )) = + 2, Z.
(5.19b)
N
1
X
Ck (E, N )eje kt
(5.20a)
N 1
1 X
w(t)eje kt
N t=0
(5.20b)
k=0
Ck (E, N ) =
Yf (E, N )G(ei N ) = 1.
(5.21)
(5.22)
Equation (5.22) or the equations in 5.19 provide two equations and two unknowns.
If a solution exists, it describes an approximation of the oscillation in the loop.
Conversely, the lack of a solution motivates the absence of oscillative modes.
74
Local Analysis
5.4.2
The derivation in the previous section is based on a zero phase assumption. This
is not so important when the static nonlinearity is continuous, since phase shifts in
e(t) result in corresponding phase shifts in w(t) = f (e(t)). The situation is different
when considering discontinuous static nonlinearities. For example, consider a relay
and a phase shift of half a sample. The output is given by
2
w(t) = sign E sin( (t + 0.5)) .
N
Such a small phase shift does not affect the sign of the samples, and thus the output
will be the same as with zero phase shift, i.e.,
2
2
w(t) = sign E sin( (t + 0.5)) = sign E sin( (t)) .
N
N
If N is even, this relation hold for phase shifts e [0, 1[. Note that a phase shift
of an entire sample is the same as a time delay and should therefore be a part of
of the linear transfer function G(q). The unknown phase shift is thus among the
parameters characterizing an oscillation. Its effect depends the nonlinearity and
the period N . The discussion motivates the following definition of the discrete-time
describing function
Definition 5.3 (Discrete-Time Describing Functions)
The discrete-time describing function of the static nonlinearity f () is defined
(cf. (5.21)) by
Yf (E, N, e ) =
2i
C1 (E, N, e ),
E
N 1
2i X
f (E sin(e (t + e ))) ei(e (t+e )) .
N E t=0
75
(5.23)
This is essentially two equations and a constraint, which is more clear by separating
the magnitude and the phase of each side.
2
i 2
N
) = + 2, Z, e [0, 1[
(5.24a)
(5.24b)
We thus have two equations and four unknowns (E, N , e and ), which enables
several possible solutions.
This far we have assumed that Assumption 5.4 holds. If this is not the case, the
analysis may still not be in vain. In such a case, the higher frequencies contribute
to the waveform of the error signal e(t). Describing functions focus on the fundamental frequency of the oscillations. Therefore, the estimated fundamental period
N obtained from describing functions analysis is still informative. Instead, different
waveforms of the error signal may be assumed, depending on the application, the
nonlinearity and the system.
The discrete-time describing functions analysis is summarized in the following
algorithm
Algorithm 5.1 (Discrete-Time Describing Functions Analysis)
Consider the situation in Figure 5.11, where the loop is separated in a linear
(G(q)) and a nonlinear (f ()) part. Then the oscillation in the error signal e(t)
is approximated by the procedure
1. Determine the discrete-time describing function of the nonlinearity as
Yf (E, N, e ) =
N 1
2i X
f (E sin(e (t + e ))) ei(e (t+e )) ,
N E t=0
where e = 2
N and e [0, 1[.
2. Compute G(q)|q=e2i/N .
3. Solve the following equation for E, N and e .
2
Yf (E, N, e )G ei N = 1
(5.25)
76
5.4.3
Local Analysis
When considering nonzero inputs in general, the analysis becomes more complex.
In some cases, however, such as the power control case, some approximative simplifications are readily available. Consider the FSPC algorithm in (5.8) and include
the delays as in Figure 5.1. This yields
pi (t + 1) = pi (t) + i sign it (t) pi (t np nm ) gij (t nm ) + Ii (t nm ) .
Introduce pi (t) = pi (t) it (t) + gij (t + np ) Ii (t + np ), and assume that the
power gain, the interference and the target SIR are constant over the delay horizon
(np + nm samples). Hence
pi (t np nm )),
pi (t + 1) = pi (t) + i sign(
which is the zero input case. This will only be an approximation. A speculative
proposition is that small deviations essentially effect the unknown phase e . Therefore, the resulting oscillative behavior possibly comprises several modes, and the
mode switching is stimulated by these deviations.
5.4.4
(5.26)
N 1
1 X
f (E sin(e (t + e ))) ei(e (t+e )) =
N t=0
N/21
N 1
1 X i(e (t+e ))
1 X i(e (t+e ))
e
e
=
N t=0
N
X ie t
1 ie e
e
1 ei
e
=
N
t=0
2
N sin
t=N/2
N/21
ei( N 2 e N )
4
N E sin
ei( N e N )
(5.27)
5.5
77
The analysis in this section is focused on the dynamical behavior of the FSPC
algorithm in (5.8)
pi (t + 1) = pi (t) + i sign it (t) i (t) ,
(5.28)
In operation, the corresponding local loop can be associated with the block diagram
in Figure 5.12. With the relay as the static nonlinearity, and the remaining parts
all linear, this is in full analogy with the block diagram in Figure 5.11. Hence,
describing functions analysis is applicable.
gii (t) Ii (t)
it (t) +
e(t)
i
q1
pi (t)
q
q nm
F (q)
+
np
i (t)
Figure 5.12 The decision feedback of the FSPC algorithm in (5.28) is visualized as a relay block, which is a static nonlinearity.
In this case with a relay and an integrator, is is easy to realize that primarily
modes with even periods N are dominating the oscillations. This is formulated in
the following proposition.
Proposition 5.5 (Even-period Oscillations of FSPC)
An ideal relay together with an integrator as in the FSPC case, cannot have oscillations of odd periods. While in operation, single cycles of odd periods might be
present, but they will be regarded as transitions between even-period cycles.
Consider the process outlined in Algorithm 5.1. The describing function of the
ideal relay is provided in (5.27)
Yf (E, N, e ) =
4
N E sin
ei( N e N ) , e [0, 1[
i BF (q)
q np +nm (q 1)AF (q)
(5.29)
78
Local Analysis
For simplicity, consider unfiltered measurements. In that case, G(q) on the unit
circle is equal to
G(q)|q=e2i/N =
2
i
ei( 2 + N + N (np +nm ))
2 sin(/N )
(5.30)
As in the root locus analysis, only the total additional round-trip delay n = np +nm
matters. Equations (5.25), (5.27) and (5.30) yield
2i
N E sin2
(5.31)
Separating the phase and magnitude equalities, results in the two equations
E=
2i
N sin2
2
+
(e + n) = + 2, Z, e [0, 1[
2
N
(5.32a)
(5.32b)
Thus, it is the phase equality (5.32b) that allow different solutions. It can be
rewritten as
N=
4(e + n)
, , ; Z, e [0, 1[.
1 + 4
(5.33)
Since N is positive, 0. The denominator describes an integer, thus also the numerator has to be an integer. Therefore, only e -values in the set {0, 0.25, 0.5, 0.75}
are plausible. Moreover, N is even according to Proposition 5.5, which excludes
the second and forth possible e -values. Hence, the possible periods are obtained
from
N=
4(e + n)
1
, = 0, 1, 2, . . . , e {0, }.
1 + 4
2
(5.34)
N i
.
4
(5.35)
79
where the expression in (5.30) is used in the second last equality. This is
equal to 0.71 and 0.58 for N0 = 4 and N0 = 6 respectively. It is therefore more
relevant to use the expression in (5.35) than in (5.32a) to compute the amplitude
of the modes. Table 5.3 provides the corresponding amplitudes using both
expressions. Compare the result to the introductory simulation in Example 5.1.
Oscillation mode
N0 = 4
N0 = 6
E0
i
1.33i
E00
i
1.5i
The estimated second mode with period N0 = 6 and amplitude E00 = 1.5 dB
describes the oscillations well.
Corresponding oscillation analyses with respect to other delay situations are
summarized in Table 5.4.
5.5.1
In summary, we conclude that static nonlinearities, such as a relay or a sign function, results in an oscillatory behavior of the system. These oscillations may comprise several modes. Switching between the modes may be stimulated by external
disturbances. For analysis purposes, describing functions are introduced and applied to local loops consisting of one static nonlinearity and a linear part. Thereby,
prevalent oscillations can be predicted. A natural power control related example is
the FSPC algorithm. Using the discrete-time describing functions, the oscillations
observed in simulations, can be predicted.
5.6
Effect of Auto-Interference
The effect of the auto-interference on local loop stability has been neglected this
far. Naturally, the efficiency of the receiver has an impact, but the motivation in
80
Local Analysis
n
0
1
2
Oscillation modes
N0 = 2
N0 = 4
N0 = 6
N0 = 2
N0 = 8
N0 = 10
N0 = 12
N0 = 14
E0
i
i
1.33i
i
1.7i
2.1i
2.5i
2.9i
E00
i
i
1.5i
i
2i
2.5i
3i
3.5i
e
0
0
0.5
0.5
0
0.5
0
0.5
v
0
0
0
1
0
0
0
0
rG
0.71
0.58
0.54
0.53
0.52
0.51
Table 5.4 Predicted oscillation modes for various delays. The introduced
quantity rG represents the ratio in Assumptions 5.4 for k = 2.
Since rG is not small enough in most cases, E00 is probably a
better amplitude approximation than E0 .
the introduction of this chapter was that it can be described together with the
effect of the interconnections. Nevertheless, a brief analysis is included here. In
essence, the effect of the auto-interference is brought into our linear systems theory
framework, by linearizing the interference. Then issues like stability are naturally
addressed.
Assume that the signal power gains gij are slowly varying, and can be regarded
as constant. If all inner loops provide perfect control, and the power control problem is feasible, all target SIR:s it are met. Let pti denote the corresponding power
assignments, and Iit the resulting interference at each receiver. As stressed by
Equation (3.5), the interference at receiver i is given by (in linear scale)
X
Ii (t) =
gij (t)
pj (t) + 1 i (t) pi (t)
gii (t) + i (t).
j6=i
Delayed output powers pi (t) have to be considered. Moreover, an important assumption in this chapter is that the local loop dynamics is independent of other
loops. Therefore, we rewrite the interference expression as
Ii (t) = Iiol (t) + 1 i (t) pi (t np )
gii (t),
where Iiol (t) represents independent disturbances. The corresponding interference
in logarithmic scale (dB) is
Ii (t) = 10 log10 Iiol (t) + 1 i (t) gii (t)10pi (t)/10 ,
with respect to the power pi (t) in logarithmic scale. Assume that the receiver
efficiency and the disturbances from others are constant on a short time scale.
A linearization (see e.g., Franklin et al., 1997) of the interference with respect to
81
the equilibrium (pti , Iit and it ), provides an approximate relation that holds in a
neighborhood of the equilibrium. Further details are provided in Section 7.3, and
the linearization is given by
Ii (t) = Iit + ri (pi (t np ) pti ), 0 ri < 1.
(5.36)
(5.37)
(5.38)
Equations (5.36), (5.37) and (5.38) approximate the closed-loop behavior of the
local loop to
pi (t) =R(q) it i pi (t np nm ) gii + Ii (t nm )
R(q) pti pi (t np nm ) + ri (pi (t np ) pti ) =
=R(q)(1 ri ) pti pi (t np nm ) .
A similar result is obtained when considering filters F (q) with the property F (1) = 1
(see Section 5.2.4).
pi (t) R(q)(1 ri ) pti F (q)pi (t np nm )
Based on Definition 5.2, we conclude that the gain margin Km has increased by a
factor 1r1i (t) > 1. Hence local loop stability is not violated. On the contrary, the
gain margin has improved.
A similar reasoning can be applied when employing the FSPC algorithm in (5.8)
pi (t + 1) = pi (t) + i sign it i (t nm ) .
(5.39)
The closed-loop system is described by
pi (t + 1) =pi (t) + i sign it i (t) pi (t np nm ) gii + Ii (t)
pi (t) + i (1 ri ) sign pti pi (t np nm ) .
As previously, including a filter F (q), F (1) = 1, we get
pi (t + 1) pi (t) + i (1 ri ) sign pti F (q)pi (t np nm ) .
The effect of the auto-interference is thus a smaller step size in reality. According to
the describing function analysis in Section 5.3.2, the amplitude of the oscillations is
smaller. Hence, the auto-interference does not violate stability of linear algorithms
nor aggravate oscillations of the FSPC algorithm.
82
5.7
Local Analysis
Summary
The global system can be seen as a number of local control loops, interconnected
via the interfering powers between the users. We motivate why local loop stability
is necessary for global stability. Therefore, local loop analysis provides valuable
insight in the dynamical behavior of power control algorithms. Primarily two
classes of algorithms are considered. The first class include most of the interesting
proposed algorithms utilizing information feedback. They can be seen as linear
controllers in logarithmic scale, and thus properties of linear systems are relevant.
In order to avoid confusion, stability is carefully defined. Using root locus analysis
from control theory, stability is addressed with respect to the controller parameters.
Controllers, such as the FSPC algorithms, that utilize decision feedback, behave
slightly different. The decision component can be seen as a sign function or a relay
and has both stabilizing and unstabilizing effects. This static nonlinearity result
in an oscillatory behavior, which neither vanishes nor aggravates over time. For
that matter, discrete-time describing functions are introduced and applied to the
local loop when using FSPC. The conclusion is that several oscillation modes are
possible, and mode switching is stimulated by external disturbances.
Finally, the dynamical effects of imperfect receivers are studied. The conclusion
is that this auto-interference does not violate stability of linear algorithms nor
aggravate oscillations of the FSPC algorithm.
Appendix
5.A
The AAW algorithm, which was proposed by Almgren et al. (1994) and reviewed
in Section 5.2.1, is given by
pi (t + 1) = pi (t) + (it i (t)),
where it = /. With the time-shift operator, this is rewritten as
pi (t) =
(5.A.1)
Using the same approach as in Example 5.3 and Figure 5.7 we can draw the
block diagram describing the local loop of the power control algorithm as in Figure 5.1. As in Section 5.3, the use of a filter F (q) is optional. The local loop
gii (t) Ii (t)
it (t)
F (q)
q nm
np
pi (t) +
i (t)
Figure 5.1 The local loop when employing the AAW algorithm and a filter
F (q).
when neglecting constraints is linear, and therefore root locus techniques as in Section 5.3.2 are applicable. Instability limits for are summarized in the case of a
local average filter in Table 5.1 and in the case of an exponential forgetting filter
in Table 5.2.
83
84
Local Analysis
n=0
n=1
n=2
L=1
>1
1.000
0.707
L=3
>1
0.812
0.671
L=5
0.981
0.770
0.673
L = 10
0.842
0.759
0.700
Table 5.1 Local loop stability region given by strict upper bounds on ,
when using the AAW algorithm and a local average filter.
n=0
n=1
n=2
=0
>1
1.000
0.707
= 0.33
>1
1.000
0.731
= 0.60
>1
1.000
0.782
= 0.80
>1
1.000
0.858
Table 5.2 Local loop stability region given by strict upper bounds on ,
when using the AAW algorithm and an exponential forgetting
filter.
The conclusion in Section 5.3.2 that the exponential forgetting filter has the
more appealing stability properties still holds. The tabled upper stability bounds
are somewhat surprising. For instance, using window length L = 3 when subject
to a time delay of n = 1 actually puts stronger stability restrictions on than both
using no filter and when using window lengths L = 5 or L = 10. The reason is that
the controller gain of RAAW (q) in (5.A.1) does not linearly depend on .
6
Local Design
In the previous chapter, methods from control theory were applied to address
stability of distributed local control loops. Stability is of course necessary, but
different stabilizing controllers provide very different behavior. Therefore, some
design methods from control theory are applied to obtain good performance. The
considered controller structures form a local loop as depicted in Figure 6.1. As
in the previous chapter, the focus is on SIR-based power control algorithms, with
controller Ri , controller command decoder Di and filtering operation Fi . Again, the
system is subject to time delays, and possibly also transmission power constraints.
Disturbance models and statistics provide valuable information to the design
process. Such models are discussed in Section 6.1, and will be used throughout
the chapter. As disclosed in Chapter 5, instability of local loops is essentially a
result of too much trust in outdated information. The behavior can be improved
by either rely less or more careful on the measurements or by predicting future
measurements. The core problem with outdated information is that the most
recently computed output powers are not reflected in the measurements. However,
these power levels are known to the algorithm and can be used to adjust the
measurements accordingly. The strategy is referred to as time delay compensation
in Section 6.2.
Log-linear algorithms are stable if the resulting closed-loop poles are within the
unit circle (see Section 5.3.1). This naturally motivates a design strategy, where
85
86
Local Design
Transmitter
Receiver
xi (t)
it (t)
i (t)
Ri
Fi
ui (t)
q np
Di
pi (t)
q nm
Figure 6.1 Block diagram of the receiver-transmitter pair i when employing a general SIR-based power control algorithm. In operation,
the controller result in a closed local loop.
the controller parameter values are chosen to place the poles at relevant locations.
Pole placement design is in focus in Section 6.3. The resulting SIR depend on the
disturbances, the target SIR and the power controller. These relations are naturally
discussed in the frequency domain and are further explored in Section 6.4.
The disturbance models in Section 6.1 are not only useful to evaluate performance. Given a disturbance model, possibly recursively estimated, future disturbances can be predicted. Such predictions are utilized by controllers and in
controller design in Section 6.5.
The discussion above mainly focus on linear controllers, possibly based on estimated parameters. Nonlinear controllers stand out as natural extensions, but
are more difficult to design. In some situations, however, nonlinear components
in otherwise linear controllers provide control actions, that cannot be obtained by
only linear control. Nonlinear components with application to the power control
problem are discussed in Section 6.6.
A number of different design and control strategies are covered in this chapter.
The use of some central algorithms is exemplified in simulations in Section 6.7.
6.1
Fading Characteristics
87
[ m1 ]. Note that the spatial frequency domain is related to the more traditional
temporal frequency domain f [ s1 ] by the velocity v [ m/s] of the mobile station
such that f = v.
The path loss will be considered constant in the sequel, and thus time-variations
are captured by shadow and multipath fading. As in Section 3.3, the focus is on
the propagation channel. It is important to note that the generalization of power
gain to also include code correlation etc. (see Section 4.3) only affects the long time
mean and thus have no effect on the frequency domain representation except from
a bias.
6.1.1
Shadow Fading
The long term statistics of the shadow fading in logarithmic scale is well captured
by a Gaussian distribution. However, such a model is not describing the slow
correlation of the fading. The effects from the terrain are correlated and if the
receiver is shielded at one instant, it will most likely be shielded for some time
thereafter.
a.
10
10
0
b.
10
20
30
40
50
60
70
80
90
100
10
10
0
10
20
30
0
x [m]
88
Local Design
data from a 900 MHz small urban macro cell. The multipath contribution to the
measurement is assumed additive and white. It is deemphasized using spectral estimation techniques. The focus in this chapter will be on the latter model. Therefore
this model receives extra attention below. Srensen used data sampled by a spatial
sample interval xs = 0.1 m. Contributions from the multipath fading is assumed
to affect the measurements as a constant noise level. An ARMA(2,1)-model is seen
to satisfactory represent the fading correlation in the observations.
gs (k) = a1 gs (k 1) a2 gs (k 2) + es (k) + b1 es (k 1), Var{e2s (k)} = e2 ,
[a1 , a2 , b1 ]T = [1.8384, 0.8395, 0.9634]T , e2 = 2.01.
(6.1)
where the sample instants k are with respect to the spatial sample interval xs and
es (k) is zero mean stationary white Gaussian noise. The normalized autocorrelation
function of this model can be written as
rgs (0) = 1, rgs (1) = 0.930,
rgs (k) = 0.542ek/142 + 0.458ek/6
Two decorrelation distances are thus naturally identified: 6 and 142 samples, i.e.,
x1 = 14.2 m and x2 = 0.6 m. The overall decorrelation distance (when the normalized autocorrelation is less than e1 ) is 5.5 m. A corresponding analysis of
the model provided by Gudmundson result in the decorrelation distance 8 m. The
decorrelation distances can be considered as a rough measure of the spatial frequency content. The low frequency content has components approximately up
to 1/x1 = 0.07 [ m1 ] and the remainder up to 1/x2 = 1.7 [ m1 ]. Figure 6.2a
illustrates a simulated instance of the model in (6.1.1) and indicates the spatial
correlation.
6.1.2
Multipath Fading
2x x2p
e
, x 0,
p
where p = E[
a2 ] is the average power gain. We are interested in the distribution
of the power gain gm = a
2 , which is obtained using the following transformation of
probability density functions
1
(6.2)
pgm (x) = pa ( x).
2 x
89
The power gain thus has an exponential distribution with the pdf
pgm (x) =
1 xp
e
, x 0.
p
2
2mm x2m1 mx
e p , x 0,
m
(m)p
90
Local Design
but is only able to resolve the four strongest. Figure 6.3a describes the specified
impulse response and indicate which rays the receiver is able to resolve. The
resolving ability of the receiver clearly is critical. Advanced receiver structures
constitute an active research area, but is beyond the scope here. An interested
reader is referred to (Johansson, 1998; Tidestav, 1999) . If we assume that the
receiver can utilize all power in the four strongest rays, the multipath effect on the
power gain is just the sum of th respective powers. Figure 6.3b illustrates this power
gain for a simulated instance of the specified impulse response. The corresponding
periodogram is found Figure 6.3c. Note that the graphs are provided in the time
and temporal frequency domain respectively, since the velocity is specified.
a.
0
10
20
30
0.5
1.5
2.5
t [s]
b.
10
5
0
5
10
15
0
10
t [s]
c.
10
10
10
10
10
10
10
10
f [Hz]
Figure 6.3 The channel model Vehicular A is described by the impulse
response in a. It is assumed that the receiver is able to resolve
the four strongest paths, marked by o. A realization of the
power gain with corresponding periodogram are found in b.
and c. respectively.
6.1.3
91
10
10
10
10
10
10
10
10
10
10
10
10
[m1 ]
10
10
10
Figure 6.4 Fading (in dB) at 900 MHz. Multipath fading is superimposed
on shadow fading, modeled as in (6.1.1). The thicker lines
represent the Fourier transform of the shadow fading model
with (solid) and without (dashed) a noise floor. The shadow
fading is dominant up to about 0.5-1 m1 , and the multipath
fading has a characteristic resonance frequency at 1/ = 3 m1
(the Doppler frequency).
Fourier transform of the model in (6.1.1) is included in the figure (solid). The
relevance of the model is further emphasized by adding (in linear scale) the noise
level, which was considered to represent multipath fading. In addition, we observe
a resonance at the Doppler frequency (1/) which is in accordance with theoretical
properties (Jakes, 1974).
As disclosed above, the relations to temporal frequency are described by f = v.
Note that v reflects velocity relative to the terrain and environment. In the never
stationary world of today, v is always greater than zero.
6.1.4
Measurement Procedures
92
Local Design
in most power control cases. However, some related issues are brought up here.
The actual interface in a GSM system provides measurements via reports, which
are available to the power control algorithm every 0.48 s. These reports are based
on a local average (see Section 5.2.4) of measurements from 104 bursts (see also
Chapter 8). The averaging is essentially a low pass filter.
In a WCDMA case, the situation is slightly different. Measurements are obtained from the fraction s of the slot (see Section 5.2.2), which in turn corresponds
to Ts = 1/1500 s. Typical values (Adachi et al., 1998) of s include s = 0.1 (considering only the four pilot symbols out of 40 symbols) and s = 0.25 (considering
the ten first symbols). These values depend on the data rate assigned to the user.
A comparison of the filtering effects when considering a full slot average compared
to a fractional slot average is found in Figure 6.5. Aliasing is avoided if the frequency components over the Nyquist frequency are filtered out. This is almost the
case when using the local average of the full slot (or measurement period) as in
GSM. Conversely, aliasing effects are most likely when adopting local average over
fractional slots.
1
0.8
0.6
0.4
0.2
0 1
10
fN
10
10
f Ts
6.2
Time delays affect the stability and performance of any controlled system. Essentially, the core problem is that the measurements do not reflect the most recent
power updates. However, these are known to the algorithm, and can be compensated for. In this section we discuss such a compensation strategy with respect to
the general power control algorithm in Figure 6.1. The resulting scheme is applied
to the important special cases of the FSPC algorithm and log-linear algorithms in
93
94
Local Design
Receiver
xi (t)
it (t)
i (t)
Ri
ui (t)
q np
Di
+
Hi
i (t)
Fi
q nm
6.2.1
pi (t + 1) = max pmin, min(pmax , pi (t) + i sign it (t) i (t) ) .
(6.3)
95
Corresponding components in Figure 6.1 are easily identified. Time delay compensation as in Algorithm 6.1 can thus be added as
Algorithm 6.2 (FSPC with TDC I)
i) Adjust measurements: i (t) = i (t) + pi (t) pi (t np nm ).
ii) Issue power control command: si (t) = sign (it (t), i (t)).
iii) Monitor output powers to be used:
pi (t + 1) = max (pmin , min(pmax , pi (t) + i si (t))).
In this particular case, the algorithm can be simplified. Consider the monitoring
of power levels (neglecting the limited dynamic range for the time being). It can
be written as
pi (t + 1) = pi (t) + i si (t) pi (t) =
i
si (t)
q1
np +nm
= i
1 q (np nm )
si (t) =
1 q 1
np +nm
si (t) = i
j=1
si (t j).
(6.4)
j=1
Note that if the step size i is adapted and thus time-varying, it cannot be brought
outside the sum. Algorithm 6.2 is thus simplified, since the monitoring of the powers is not necessary. Therefore, we do not need to consider the limited dynamic
range, since only differential commands are used, and not the absolute power levels.
Algorithm 6.3 (FSPC with TDC II)
Pnp +nm
si (t j).
j=1
t
sign (i (t), i (t)).
To further illuminate the effect of TDC, some block diagram algebra exercise
is instructive. The block diagram of the FSPC algorithm with TDC operating
in closed-loop is found in Figure 6.7. Power control command errors are more
naturally described by a multiplicative disturbance than an additive. Then xi (t) =
1 corresponds to correct reception of the command bit, while xi (t) = 1 indicates
96
Local Design
Receiver
H(q)
it (t) +
pi (t)
i
q1
ei (t)
q np
i
q1
pi (t)
i (t)
q nm
a command bit error. Most of the blocks in Figure 6.7 commute. Hence, the
block diagram is easily rewritten as in Figure 6.8. The merits of TDC are evident,
since the internal round-trip delays are cancelled in the loop. However, external
signals and disturbances are still delayed, and for example it takes some time before
changes in it (t) is reflected in the measurement i (t).
The applicability of TDC to a controller described by the block diagram in
Figure 6.6 is intuitive. However, in some situations, that local loop description is
invalid. A typical example is the uplink when in soft handover. While in operation,
a base station is unaware of whether an issued power control command is applied
or not, since the command from another base station may have been prioritized
(see Section 4.5). Therefore, TDC should be disabled in the uplink while in soft
handover. The applicability in the downlink when in soft or softer handover is
depending on the combining strategy in the receiver.
A similar situation is prevalent when the power command bit error is high. The
measurements are adjusted to reflect power levels to be used, but this is incorrect
when subject to bit errors. A simulation study of these effects is provided in
Section 10.4.1
6.2.2
The class of log-linear power control algorithms utilizing information feedback include several of the proposed algorithms to date (see Section 5.3). They can be
represented by
pi (t) = R(q)(it (t) F (q)i (t)).
97
gii (t) Ii (t)
q nm
it (t)
ei (t)
q np
i
q1
pi (t)
q nm
i (t)
1 q np +nm H(q)
i (t)
}|
{
z
1 + q np +nm (1 q (np +nm ) ) = q np +nm
Figure 6.8 By rewriting the diagram in Figure 6.7, it is evident how TDC
cancels the round-trip delays in the control loop. External signals and disturbances are still delayed before they are reflected
in (t).
The device Di may represent quantization of limited dynamic range. Thus Algorithm 6.1 is naturally implemented as follows
Algorithm 6.4 (Log-linear Algorithms with TDC)
Adjust measurement by
i (t) = i (t) + F (q)Di {pi (t)} F (q)Di {pi (t np nm )}.
TDC for this class of algorithms can thus be seen as an internal feedback H(q) from
the computed power to the control error. If separate filters are used it is given by
H(q) = Fg (q)(1 q np nm )
(6.5)
98
Local Design
i
q 2 (1 i )q i
it (t)
(gii (t) Ii (t)) ,
q(q 1 + i )
q(q 1 + i )
which clearly is stable for 0 < i < 2. In particular, DPC with TDC yield a
dead-beat controller (all poles at the origin)
i (t) =
1 t
q2 1
i (t)
(gii (t) Ii (t))
2
q
q2
Whether this is a good design or not is further discussed in the sequel. For
comparison, the control action when applying an integrating controller without
TDC is described by
i (t) =
q2 q
t
i
q2 q +
q2 q +
6.3
Stability of log-linear power control algorithms with respect to controller parameters was in focus in Chapter 5. Essentially, a log-linear closed local loop is stable
if and only if all closed local loop poles are within the unit circle. The set of stable
controllers, however, provides rather different performance in terms of fading tracking. Since the performance is related to the pole locations, it is relevant to choose
the controller parameters to carefully place the closed local loop poles. Pole placement techniques was applied to design of power control algorithms in (Gunnarsson
et al., 1999d).
Section 6.3.1 describes the considered parameterized controller structures. Properties of linear systems is the main topic in the following section and pole placement
design is applied to power control algorithms in Section 6.3.3.
6.3.1
Controller Structures
The closed local loop with a general log-linear power control algorithm R(q) in
operation is described by the block diagram in Figure 6.9. As in Chapter 5, we
consider an integrating controller
R(q) =
.
q1
(6.6)
99
np
R(q)
F (q)
q nm
pi (t) +
i (t)
Figure 6.9 The local loop when employing the general linear control algorithm R(q) and the filter F (q).
.
q
(6.7)
(6.8)
( + )q
q(q 1)
(6.9)
As required in Section 5.3, all controller transfer functions are strictly proper. In
addition, filtering may be included in the loop. Based on the stability properties
discussed in Chapter 5, we only consider the exponential forgetting filter
Fg (q) =
BF (q)
(1 )q
=
.
(q )
AF (q)
(6.10)
We use the notation Fg (q) to further stress that if separate filters are implemented
(see Section 5.2.4), the filter that affects the local control loop is Fg (q).
6.3.2
The presentation here will be rather compact. For further details, see e.g., (
Astr
om
and Wittenmark, 1997; Franklin et al., 1997). Consider a continuous-time system
y(t) = Gc (p)u(t) =
Bc (p)
u(t),
Ac (p)
100
Local Design
K
,
0
(6.11)
In addition, the poles will result in a number of zeros, i.e. roots to the numerator
polynomial. However, a good approximation for systems of low order is that the
characteristics are determined by the poles to Gd (q) and specifications can be stated
in the continuous-time domain using (6.11). Mapping the area in Figure 6.10a
using (6.11) yields the area in Figure 6.10b. Discrete-time poles can thus be related
to corresponding continuous-time poles in the continuous-time domain, where they
have an intuitive interpretation.
6.3.3
The relations between closed-loop poles and performance were discussed above. An
appropriate design procedure is thus to choose the controller parameters to obtain
optimal pole locations. By analyzing the block diagram in Figure 6.9, the resulting
SIR can be written as
i (t) =
1
1+
q n R(q)F (q)
q np R(q)it (t) + gii (t) Ii (t) ,
(6.12)
where n = np + nm is the total additional round-trip delay (in addition to the delay
in R(q)). In steady state (q 1) the stable system converges to
i (t) =
R(1)
1
t (t) +
(gii (t) Ii (t)),
1 + R(1) i
1 + R(1)
101
since F (1) = 1 when using the filters in Section 5.2.4. Clearly, there will be no
steady state control errors if and only if R(1) = , i.e., if the controller contains
an integrator (the factor (q 1) in the denominator).
A natural optimization criterion is to find the controller parameters corresponding to fastest response (shortest rise time) to changes in target SIR. This is essentially an optimal strategy when the power gains are slowly varying. In other words
we maximize the distance from origin to the dominating poles, while remaining
within the shaded area in Figure 6.10b. If we denote the denominator and numerator of the general control algorithm R(q) by AR (q) and BR (q) respectively, the
characteristic polynomial (cf. Section 5.3.2) is given by
P (q) = q n AR (q)AF (q) + BR (q)BF (q)
Discrete time, Ts = 1 s
Continuous time
a.
b.
2
0.5
0.5
1
2
0.5
0.5
I controller
The SIR expression in (6.12) using the I-controller in (6.6) reduces to
i (t) =
(q )
q nm 1 it (t) + q n1 (q 1)(gii (t) Ii (t)) .
q n1 (q 1)(q ) + (1 )
102
Local Design
(6.13)
(6.14)
By equating the coefficients of Equations (6.13) and (6.14), the following requirements are obtained
= e2rTs cos
1 + = 2e
rTs cos
(6.15a)
cos(rTs sin )
(6.15b)
The right hand side of (6.15b) is monotonically decreasing with increasing r. Thus,
any filtering decreases the maximal pole distance to the origin. If rise time is the
major concern, filtering should be excluded. However, if the filter represents a
model of an estimating procedure, is known. Thus, the optimal controller parameter is obtained by solving (6.15b) for rTs , which in turn is inserted in (6.15).
Note that the optimal controller parameter is independent of Ts , which is natural.
If we omit filtering and assign the poles on the border of the area, i.e., = 0.25,
then the optimal controller parameter is
I = 0.340.
For comparison we consider filtering (exponential forgetting, = 0.5). Analogous
optimization yields
I,F = 0.202.
The corresponding poles are plotted in Figure 6.10b. In particular, we note that
filtering result in a significant degradation in terms of rise time. It is even slower
than the heuristically chosen lower rise time limit.
103
PI controller
The optimization when using a PI-controller is more or less analogous. Equations (6.12) and (6.9) yield that SIR is given by
q nm 1 (( + )q )(q )
t (t)+
i (t) = n
q (q 1)(q ) + (1 )(( + )q ) i
q n (q 1)(q )
(gii (t) Ii (t))
+ n
q (q 1)(q ) + (1 )(( + )q )
In the typical case np = 1 and nm = 0, the characteristic polynomial is given by
PPI (q) = q 3 (1 + )q 2 + ( + (1 )( + ))q (1 ).
(6.16)
=q 3 q 2 erTs + 2erTs cos cos(rTs sin ) +
+ q 2erTs (1+cos ) cos(rTs sin )e2rTs cos
erTs (1+2 cos )
(6.17)
Equating the coefficients of Equations (6.16) and (6.17) result in a set of requirements. Just as in the previous case, filtering only decreases the pole distance to
the origin. Omit filtering and use = 0.25 yield the optimal parameters
PI = 0.0720, PI = 0.365
with corresponding poles in Figure 6.10b. These poles are located further out from
the origin compared to when using an I-controller. At a cost of an extra parameter,
we have obtained a faster closed local loop. In this typical case, the system is
essentially the time delay. For longer time delays and maybe with a more complex
model of the estimating device, the ideas in (Kristiansson and Lennartsson, 1999)
may apply for PI design.
AAW algorithm
This case is rather similar to when designing the I-controller. The resulting SIR
using the AAW transfer function in (6.7) is given by
i (t) =
q nm 1 (q )
it (t) + q np (q )(gii (t) Ii (t)) .
q n1 (q )(q ) + (1 )
104
Local Design
In the specific case of a single additional delay, the computations are analogous to
the I-controller and the optimal parameter is
AAW = 0.0591.
This choice of parameter value yields the pole locations as in Figure 6.10b. The
poles are located even further out from the origin compared to when using the
previous controllers, proving a shorter rise time.
Comments
A procedure for optimizing the parameters in three different controller structures
has been outlined. It was noted that with careful design, AAW provides faster
responses than PI, which in turn is faster than I. If fast responses would be the
only concern, AAW seems to be the most appealing structure. However, since the
AAW algorithm is operating without integral action, it is not as suitable as an inner
loop. As pointed out in Section 5.2.1, the desired power level adaption of the target
SIR can be considered in an outer loop. This is further discussed Section 9.4.3.
A more complex controller structure provides more degrees of freedom and
moreover the ability to assign any closed-loop poles. However, such a scheme would
introduce several zeros (roots of the numerator polynomial), which also affect the
performance.
6.4
An underlying assumption in the previous section is that the power gains are varying slowly. However, this might be too simplifying when considering a real system.
Typically, such disturbances are roughly known in the frequency domain as briefly
described in Section 6.1. Therefore, disturbance rejection properties are naturally
studied in the frequency domain. Furthermore, as will be shown in Chapter 7,
there are relations between global stability and local properties, which should be
addressed in the design. The focus is on inner loops tracking target SIR:s provided
by an outer loop. Thus, the AAW algorithm is not considered.
6.4.1
As disclosed in the previous section, the resulting SIR in Figure 6.9, can be written
as
1
q np R(q)
t
g
(t)
+
(t)
I
(t)
,
(6.18)
i (t) =
ii
i
1 + q n R(q)F (q) i
1 + q n R(q)F (q)
Time delay compensation, described in Section 6.2, can be applied to cancel roundtrip delays in the local loops. Then, the SIR expression reduces to
np
1 + R(q)F (q)(1 q n )
R(q)
q
t
(t) +
(gii (t) Ii (t)) . (6.19)
i (t) =
1 + R(q)F (q) i
1 + R(q)F (q)
105
The relations between SIR on the one hand and target SIR and external disturbances on the other can thus be associated with two central transfer functions
i (t) = Gll (q)it (t) + S(q)(gii (t) Ii (t)),
(6.20)
where Gll (q) ans S(q) will be referred to as the closed loop system and the sensitivity function respectively. We only consider controllers with integral action, i.e.,
with the factor (q 1) in the denominator. As is evident from Equations (6.18)
and (6.19), a factor (q 1) in the denominator of R(q) result in the factor (q 1)
in the numerator of S(q) This can be seen as a differentiation, whose effects will be
discussed further on. We consider the typical case np = 1, nm = 0 when nothing
else is stated. The controllers in focus are
1. The DPC algorithm in a delayless case, which yields
1
q1
(gii (t) Ii (t)).
i (t) = it (t) +
q
q
2. The optimized I-controller in the previous section
i (t) =
I
q 1 it (t) + (q 2 q)(gii (t) Ii (t)) ,
PI (q)
106
Local Design
Controller
1
Closed-loop system
Gll (q) = 1q
Gll (q) =
Gll (q) =
Gll (q) =
Gll (q) =
Sensitivity function
S(q) = q1
q
I
q2 q+I
(PI +PI )qPI
PPI (q)
0.5
q(q0.5)
1
q2
S(q) =
S(q) =
S(q) =
S(q) =
q2 q
q2 q+I
q3 q2
PPI (q)
(q1)(q+0.5)
q(q0.5)
(q1)(q+1)
q2
Table 6.1 Closed-loop systems Gll (q) and sensitivity functions S(q) of controllers studied in this section. The parameters from the pole
placement in Section 6.3.3 are I = 0.340, PI = 0.0720 and
PI = 0.365, and the polynomial PPI (q) is obtained from (6.16).
Disturbance Rejection
The disturbances are considered rejected at frequencies where the sensitivity function is small in Figure 6.11b. DPC (with TDC if needed) is thus preferable if the
disturbances primarily are of low frequency. On the other hand, the unbalanced
differentiation of DPC amplify high-frequency components of the disturbances.
Such high frequency components arise naturally, when considering quantized powers, since the additive quantization noise can be treated together with the additive
disturbance (cf. the introduction to Chapter 5).
The fourth studied controller (I-controller with TDC and = 0.5) is motivated
by similar disturbance rejection as the optimized PI-controller. Higher -value yield
better low frequency disturbance rejection, but worse performance at intermediate
frequencies and vice versa. If we focus on frequencies attenuated by at least 0.5,
we see that normalized frequencies up to 0.03 (controllers 2, 3 and 4) and 0.04
(controller 5) are rejected.
Of course, it would be desirable to design the controller to obtain a small
sensitivity function at all frequencies. This is impossible, however. According
to Sung and Hara (1988), the sensitivity function in this case2 has to meet the
following requirement
Z
ln S(eiw dw = 0.
Hence any frequency region where the sensitivity function is small (negative in
logarithmic scale) has to be compensated by a region where it is large (positive in
logarithmic scale).
2 When
the open loop system have unstable poles, the requirement is slightly different.
b.
107
1
0.8
0.6
0.4
0.2
0
0
a.
0.05
0.1
0.15
0.2
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
0.25
0.3
0.35
0.4
0.45
0.5
2
1.5
1
0.5
0
0
f Ts
Figure 6.11 The magnitude of the closed loop system Gll (q) (a) and sensitivity function S(q) (b) of the considered controllers, with
respect to normalized frequency. The curves correspond to
controller 1 (solid), 2 (dashed), 3 (dashed +), 4 (dash-dotted)
and 5 (dotted).
Controller Bandwidth
The closed loop system Gll (q) captures how fast the inner loop adapts to changes
in target SIR. Essentially, fastest possible reactions are provided by dead-beat controllers 1 and 4. Normally, the controller bandwidth is defined as the normalized
frequency where the gain is half the DC gain (at q = 1). As seen in Figure 6.11,
the bandwidth of controller 2 is with this definition approximately 0.17 and of controllers 3 and 4 is approximately 0.22. Controllers 1 and 5 are dead-beat controllers
and have in this case unit gain.
The target SIR is normally updated at a slower rate than the inner loop. It is
therefore subject to abrupt steps, which implies high frequency components in the
input signal. Despite a low gain of the closed loop system at high frequencies, the
inner loop may overreact to these sudden changes. An alternative is to prefilter
the target SIR using a simple low pass filter, e.g., an exponential forgetting filter.
Global Stability
The global system consists of local loops interconnected by the interference powers.
This will be studied thoroughly in Chapter 7, but it is instructive to consider one
important result from Theorem 7.20. The global system is stable if the closed loop
108
Local Design
(q ) t
(q 1)(q )
(1 )
(t) +
(gii (t) Ii (t))
em (t) =
qPI,F (q) i
PI,F (q)
PI,F (q)
109
1
0.8
0.6
0.4
0.2
0
0
b.
0.05
0.1
0.15
0.2
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
0.25
0.3
0.35
0.4
0.45
0.5
1
0.8
0.6
0.4
0.2
0
0
f Ts
Figure 6.12 The magnitude of the closed loop system Gll (q) (a) and complimentary sensitivity function S(q) (b) of the I-controllers,
with (dashed) and without (solid) a loop filter ( = 0.5).
6.4.2
110
Local Design
6.4.3
6.5
Currently, we have almost exclusively used only the measurements as they are
for power control. An exception is TDC, which was introduced in Section 6.2.
However, improved performance can be gained by considering models of the disturbances to either predict the disturbances, as in Section 6.5.1, or to design the
appropriate controller as in Section 6.5.2.
111
+
Fp (q)
np
+ i (t)
pi (t) +
F (q)
nm
im (t)
em (t)
Figure 6.13 The local loop dynamics when employing the general linear
control algorithm R, the loop filter F (q) and the prefilter
Fp (q). The measurements are subject to additive errors em (t).
In case of information feedback, the controller is a linear transfer function R = R(q). The only difference when using decision feedback is that controller block contains a sign function
at the input R = R(q)sign (e(t)). This local loop description
is slightly different from Figure 6.1.
6.5.1
Disturbance Prediction
Assume that the additive disturbance (power gain) can be modeled by filtered
white noise.
gs (t) =
Bg (q)
es (t), Var{e2s (t)} = e2 ,
Ag (q)
(6.21)
where es (t) is zero-mean and white. If an appropriate sampling interval is used, the
shadow fading model in Section 6.1.1 is an applicable model. However, for other
sample interval-velocity relations, and when the averaging in the measurement
procedure in Section 6.1.4 is considered, other models are relevant. Due to the
uncorrelated samples from the noise sequence, we can without loss of generality
assume that Ag and Bg are of the same degree.
The parameterized model is fitted to identification data either offline or recursively online (Ljung, 1999). Popular and implementationally simple recursive
algorithms include LMS and RLS (Gustafsson, 2000; Ljung, 1999). In these approaches, simple models of parameter variations are considered. The tracking performance can be improved, by considering more relevant models. This is disclosed
in Ahlen et al. (2000); Lindbom (1993), where WLMS algorithms are introduced
and evaluated.
Linear algorithms are applied to mobile communications channels to improve
power control by e.g., Ericsson and Millnert (1996); Leung (1999); Mehta et al.
(1996); Moh et al. (1999). However, some of them fails to fully utilize the capabilities of model-based predictions. Various nonlinear algorithms are considered in
(Ekman and Kubin, 1999; Tanskanen et al., 1998; Zhang and Li, 1997).
112
Local Design
Assume that the model in (6.21) is provided by some algorithm. For clarity, we
consider the standard notation
gs (t) =
C(q)
es (t)
A(q)
qG(q)
.
C(q)
(6.22)
The polynomial G(q) is obtained as the solution to the following Diophantine equation
q m1 C(q) = A(q)F (q) + G(q),
(6.23)
6.5.2
Minimum-Variance Control
When a disturbance model is known, this information can be utilized in the power
control design to obtain a controller that adapts to the disturbance. One strategy is
to control the power to obtain minimum-variance of the control error it (t) i (t).
The outline here will be rather brief. Further details can be found in (
Astr
om and
Wittenmark, 1997).
Consider systems of the form
y(t) =
C(q)
B(q)
u(t) +
e(t),
A(q)
A(q)
(6.24)
and assume that C(q) is a stable polynomial (the controller in the general case is
described by
Astr
om and Wittenmark). Let d denote the pole excess, i.e., d =
deg{A} deg{B}. Furthermore, assume that the reference signal is zero. Then
the minimum variance controller is obtained as
u(t) =
G(q)
,
B(q)F (q)
(6.25)
where F (q) and G(q) are obtained from the Diophantine equation (6.23) with
m = d.
113
Consider a power control problem where the received power is only affected by
an additive power gain, modeled as in (6.21). The output powers are subject to a
delay of only one additional sample. The system to be controlled can thus be seen
as
Br (q)
Bg (q)
Bg (q)Ar (q)
Br (q)Ag (q)
i (t) =
pi (t) +
es (t) =
pi (t) +
es (t)
Ar (q)
Ag (q)
Ar (q)Ag (q)
Ar (q)Ag (q)
C(q)
B(q)
=
pi (t) +
es (t),
A(q)
A(q)
which is of the same form as Equation (6.24). The minimum-variance controller
is not strictly proper, which is required. Therefore, we consider two delays in the
system model, i.e., Ar (q) = q 2 and Br (q) = 1, and then associate one of the delays
with the controller.
Furthermore, we require integral action in the local loop. As pointed out by
Astr
om and Wittenmark, it can be incorporated by modifying the system polynomials as
A(q) = (q 1)A(q)
= (q 1)Ag (q)Ar (q) = q 2 (q 1)Ag (q)
B(q) = (q 1)B(q)
= (q 1)Br (q)Ag (q) = (q 1)Ag (q)
G(q)
G(q)
=
,
qB(q)F (q)
q(q 1)Ag (q)F (q)
(6.26)
where F (g) and G(q) are solutions to the following Diophantine equation.
qC(q) = A(q)F (q) + G(q) q 4 Bg (q) = q 2 (q 1)Ag (q)F (q) + G(q),
where deg{F } = 1 and deg{G} = deg{Ag } + 2. This minimum-variance predictor
show promising results in simulations in Section 6.7.
As in the previous section, it is important that reliable disturbance model parameter estimates are available. In this case, it is even more crucial, since the
parameters are used in controller (re)design. If the estimated parameters are far
from the true ones, such a strategy may even result in an unstable controller.
6.6
Nonlinear Components
System nonlinearities are often classified as either inherent or intentional nonlinearities. The first category consists of components that we cannot affect in the
design at the moment, such as output power constraints. On the other hand intentional nonlinearities are those which are deliberately introduced in the system.
In this section the focus is on the latter, possibly introduced to reduce the effects
of the former.
114
6.6.1
Local Design
Anti-Reset Windup
(6.28)
where A (n n), B (n m), C (m n), are matrices of given orders, y i (t) is the
measurement vector, and n is the dimension of the state vector. Note that the
algorithm is strictly proper. The order of the input vector m is in a typical power
T
control case equal to one (e.g., yi (t) = ei (t)) or two (e.g., y i (t) = it (t) i (t) ).
An observer-based anti-windup scheme (see Kothare et al. (1994) for details) can
be implemented as
xi (t + 1) =Ai xi (t) + By i (t) + L f (pi (t)) Cxi (t)
(6.29)
pi (t) =Cxi (t),
where the (n m)-matrix L is a design parameter.
The static function f () should not only incorporate the inherent nonlinearities,
but also all the intentional nonlinearities, such as those discussed in the rest of the
section.
6.6.2
115
Selector or Switch
Astr
om and Wittenmark (1997).
6.6.3
Relay
116
Local Design
command signaling rate without using too much of the total bandwidth. Note that
the motivation focuses on signaling over distances. Using relays in algorithms with
information exchange within the device only, cannot be motivated. Instead, the
relays unnecessarily introduce oscillations in the control loop. The dynamical effect
of relays in control loops is studied more thoroughly in Section 5.5.
6.7
Simulations
A number of design methods and guidelines have been outlined in the previous
sections. To illuminate the differences, this section provide simulations in isolated
local loops. These control loops are subject to disturbances as described in Section 6.1, and time delays. The focus is on the typical situation np = 1 and nm = 0
The controllers designed in this chapter are rather different. Some utilize information feedback, others decision feedback. Predictions of power gains may be
employed, as well as time delay compensation, which can be seen as a prediction.
Comparative simulations are provided in this section.
Consider an isolated local loop subject to time delays and shadow fading as
in Section 6.1.1 with mobile velocity 1 m/s. First, the operation with respect
to a specific realization of the shadow fading is considered. Then, the average
performance is in focus via Monte-Carlo simulations.
The problematic effects due to time delays in the local loop is illustrated in
Example 5.1. Question raised in that example serve as a motivation for the analysis
in Chapter 5, which in turn motivates the design in this chapter. Therefore, this
example is reconsidered in network simulations in Section 10.2.2 using controllers
designed in this chapter.
6.7.1
Figures 6.14 and 6.15 illustrate the performance using various control strategies.
The following subsections will bring up different aspects of the control behavior.
The measurements used for control are obtained as the average over one sample
interval to reduce aliasing as discussed in Section 6.1.4.
Prefiltering
The controller bandwidth relates to the ability to track target SIR:s provided by
the outer loop. Since this normally is updated more seldom, control reactions
to an abrupt step are representative. As pointed out in Section 6.4, such a step
contains high frequency components, which may deteriorate the performance. This
can to some extent be avoided by prefiltering target SIR. Consider the optimized
PI-controller from pole placement design in Section 6.3.3 and the sample interval
Ts = 0.015 as concluded in Section 6.4. The prefilter is an exponential forgetting
filter with = 0.9. Figure 6.14a illustrates the performance with and without
prefilter. The overshoot at the abrupt step is significantly decreased. Therefore,
prefilters will be used in the sequel.
6.7 Simulations
i (t) [dB]
a.
i (t) [dB]
b.
14
14
13
13
12
12
11
11
10
10
c.
117
20
40
60
80
100
d.
14
13
12
12
11
11
10
10
9
20
40
60
t [s]
80
100
40
20
40
60
80
100
60
80
100
14
13
20
t [s]
Figure 6.14 Performance of different power control algorithms when subject to shadow fading and the typical delay situation np = 1,
nm = 0. a. The PI-controller from pole placements design
with (solid) and without (dashed) prefilter. b. The same controller at Ts = 0.015 (solid) and Ts = 0.05 (dashed). c. An
optimized PI-controller (solid) and an I-controller with TDC
(dashed). d. The FSPC algorithm (step-size 1 dB) with (dark
gray) and without (light gray) TDC.
Sample Interval
The sample interval affects both the controller bandwidth and the disturbance rejection, as discussed in Section 6.4. The recommendation is that Ts = 0.015 s is
needed to track the shadow fading. For comparison, the optimized PI-controller
from pole placement design in operation with Ts = 0.015 s and Ts = 0.05 s is
considered. As seen in Figure 6.14b, this clearly has an affect on the disturbance
rejection. The recommendation Ts = 0.015 is considered in the rest of the simulations.
Time Delay Compensation
As seen in Section 6.2, time delay compensation helps to stabilize controllers. However, when information feedback is used, the same performance can be obtained by
118
Local Design
careful design. This is illustrated in Figure 6.14c, where the optimized PI-controller
and an I-controller with TDC yield almost identical performance.
The situation is different when considering controllers utilizing decision feedback, such as the FSPC algorithm. Then, there are not that many other options
available. The dynamical effect of TDC is reduced oscillative behavior, which is
discussed using describing functions in Section 5.5. Figure 6.14d further illustrates
these oscillations and the benefits of TDC.
Predictive Power Control
If a model of the disturbance (power gain) is at hand, it can be used to predict
the gain at future time instants. Section 6.5.1 provides a discussion on methods
to acquire such models. Here, the model is obtained off-line, but from a different
shadow fading realization (identification data). Note that the model not necessarily is identical to the shadow fading model, since the model has to describe the
disturbance with respect to the sample interval Ts .
i (t) [dB]
a.
14
13
12
11
10
9
8
10
i (t) [dB]
b.
20
30
40
50
60
70
80
90
100
20
30
40
50
60
70
80
90
100
14
13
12
11
10
9
8
10
t [s]
Figure 6.15 Predictive control improve the performance by predicting the
disturbances. a. PI-controller with disturbance prediction
(solid) and a minimum-variance controller (dashed). b. The
FSPC algorithm with TDC and disturbance prediction.
These predictions are used together with the PI-controller discussed above, and
the FSPC algorithm. Figure 6.15 indicates significant improvements using both
algorithms. The optimal predictor given a model is utilized in Section 6.5.2 to
design a minimum-variance controller.
As seen in Figure 6.15a, the minimum-variance controller outperforms the other
studied controllers. Note, however, that the estimation procedure needed to acquire
the model is not considered. In a realistic case, the channel is not stationary, and
6.8 Summary
119
has the be recursively estimated. Yet another problem of the designed minimumvariance controller arises when considering global performance. Figure 6.16 depicts
the magnitude of the corresponding closed-loop transfer function Gll (q). Hence,
the global stability requirement Gll (q) 1 in Section 6.4 is not met. However, as
will be disclosed in Chapter 7, the controller can still be applied to slightly loaded
systems, where the requirements on Gll (q) are relaxed.
25
20
15
10
5
0
0
0.05
0.1
0.15
0.2
0.25
0.3
0.35
0.4
0.45
0.5
f Ts
Figure 6.16 The magnitude with respect to normalized frequency of the
closed loop system Gll (q) when using a minimum-variance
controller.
6.7.2
Monte-Carlo Simulations
The same simulations as above are rerun 50 times using different shadow fading
realizations. As performance measure, we use the root mean squared error (RMSE)
v
u
50
N 1
u1 X
1 X t
t
( (t) i (t)).
50 i=1 N t=0 i
The results are summarized in Table 6.2. In essence, the comparative conclusions
from the single realizations above hold.
The effect of the prefilter is marginal on average, but as seen in Figure 6.14a,
it makes a clear difference. It is further emphasized that TDC is not as important when information feedback is available, since the corresponding effect can be
obtained by linear design. Considering FSPC, however, the benefits are significant.
Further improvements are observed when considering disturbance prediction
and minimum-variance control. However, the effect of model estimation is not
included.
6.8
Summary
120
Local Design
Controller
PI-controller, no prefilter
PI-controller
PI-controller, Ts = 0.05 s
I-controller with TDC
FSPC algorithm
FSPC algorithm with TDC
PI with dist. pred.
FSPC with TDC and dist. pred.
Minimum-variance controller
RMSE
0.27
0.26
0.89
0.33
0.62
0.38
0.19
0.30
0.081
6.8 Summary
121
The different design and control strategies in this chapter provide very different
performance. Some illustrative simulations conclude the chapter, to emphasize
similarities and differences. Monte-Carlo simulations over a large number of cases
stress the benefits of prediction and the use of disturbance models in the controller
design.
General guidelines are hard to disclose. When using information feedback,
time delays can be compensated for by either pole placement design or time delay compensation. On the contrary, there is no natural alternative to time delay
compensation in case of decision feedback. If it is possible to adapt models to disturbances with good precision, this information should be utilized for disturbance
prediction independent of feedback strategy. In addition, disturbance models are
useful in slightly loaded systems, to significantly improve the performance using
minimum-variance control.
122
Local Design
7
Global Analysis
For practical reasons, power control algorithms in cellular radio systems are implemented in a distributed fashion. The analysis of these local control loops in
Chapter 5 provide valuable insight in stability and performance issues. However,
the local loops are interconnected via the interference between the loops, which
affect the global dynamics. Therefore, as disclosed in Chapter 5, the local analysis only provide necessary, but not sufficient, conditions on stability. To capture
the dynamical effects of the interconnections, the overall global system has to be
addressed in the analysis.
An important global discussion is whether it is possible to assign output powers
to meet each users requirement. This is the main issue in Section 7.1, where
we also introduce metrics to describe available capacity and current load in the
network. Proposed approaches for convergence analysis of power control algorithms
primarily consider the algorithms in linear scale. Section 7.2 provide some results
on algorithms in linear scale. Additional time delays have generally been omitted
in convergence analysis. However, here time delays are considered for two classes
of algorithms. In Section 7.3 we employ a robust control framework to analyze the
global system in logarithmic scale. Thereby, sufficient conditions on global stability
are derived, with respect to an approximative global system. These results apply to
general log-linear local control loops, including the effect of time delays and general
log-linear power control algorithms and filters. These conditions can be formulated
as requirements on the local loops. The interesting conclusion is thus that global
123
124
Global Analysis
stability can be granted by proper design of the local loops (cf. Chapter 6).
7.1
Optimal power assignments were briefly discussed in Section 4.5 as means to centrally control the transmission powers. Mainly, the interest is motivated by the
relations between these algorithms and capacity and performance bounds of distributed algorithms. Here, we generalize the results to include auto-interference
and individual target SIR:s. Essentially, at this global level, we assume that the
inner loops perfectly tracks the fast variations in the signal power gains, so that the
power gains can be considered constant. Then, the capacity and load discussion
mainly relates outer loops and whether it is possible to accommodate all users with
their service requirements (in terms of target SIR). Two metrics are introduced to
describe the available capacity and current load in the network. In the following
discussion only values at the same time instant t are considered, and therefore this
time index will be suppressed for clarity. Also adopt the convention that vector
inequalities, such as x y, hold if they hold element-wise.
7.1.1
As disclosed in Section 4.3, the SIR at each receiver is a simplified measure of the
perceived quality. Assume that the quality is acceptable when this ratio is above
a certain threshold, i.e.,
i = P
i gii pi
0 , i.
ij pj + 1 i pi gii + i
j6=i g
(7.1)
= [
= [
, p
.
pi ] ,
i ] =
Z = [
zij ] =
gii
gii
is a nonnegative matrix (i.e., all entries are nonnegative).
Note that the matrix Z
has a unit diagonal, and if the links have been established between
Furthermore, Z
the transmitters and receivers with the best power gain, the off-diagonal elements
are less than one. Using the introduced quantities, Equation (7.1) can be rewritten
as
pi
P
0 , i.
(7.2)
z
pi + i
ij
j
j
X
1 + 0
pi
zij pj i
(7.3)
0
j
125
The corresponding equations for all users can be represented in vector notation.
1 + 0
p
Z
+
.
p
0
(7.4)
It is thus interesting to study solutions to (7.4) and their existence, with respect
can be regarded as stochastic variables, Z will have full rank with probability one.
1 , . . . ,
m . The following results from the work
by
Denote the eigenvalues of Z
of Perron, Frobenius and Wielandt on positive matrices (Gantmacher, 1974):
has a positive real eigenvalue
= max{|
i |}m and the corresponding
Z
i=1
eigenvector is positive.
such that the inequality
The minimum real
p
p
Z
=
.
0 is
has a solution for p
derived from row sums of Z
imply that
Bounds on the eigenvalues of Z
> 1.
Zander (1992b) applied these results to Equation (7.4) to prove the following theorem,
Theorem 7.1 (Zander, 1992b)
With probability one, there exists a unique maximum achievable SIR in the noiseless case
0 : i 0 , i}.
= max{
0 | p
Furthermore, the maximum is given by
1
,
=
1
is the greatest real eigenvalue of Z
> 1 implies that
. Note that
where
(i.e., k
is the eigenvector of
p
> 0. Moreover, the optimal power vector p
+
for any k R constitute an optimal power vector.).
An interpretation of this result is that it is possible to compute the maximum
achievable balanced SIR given a G-matrix. This is an optimal solution in the sense
that there exists no other power vector yielding a higher SIR for all receivers. If
the network is reciprocal, the same G-matrix is valid for both the uplink and the
by Z
T . However, since Z
downlink. To analyze the uplink situation, replace Z
T
and Z have the same eigenvalues, Theorem 7.1 will result in the same optimal
SIR in both the uplink and the downlink. (The optimal power vectors are probably
different.)
126
Global Analysis
G=
0.01 0.8
= 1.032. Hence,
is
The greatest eigenvalue of the corresponding matrix Z
the optimal SIR in this case (in both up- and downlink) is
1
= 31.6 ( = 15 dB),
=
1
achieved by the optimal power assignment
= k(0.93, 0.37), k R+ .
p
As pointed out in Section 4.5, the optimal power assignment is relative. The
influence of the noise in Equation (7.4) can thus be made arbitrarily small by
choosing k sufficiently large. A consequence is that we for practical purposes may
achieve the same SIR as in the noiseless case, but only if sufficient transmitter
power is available.
Godlewski and Nuaymi (1999) studied the effect of the auto-interference to these
optimality results. It is found that when auto-interference cannot be neglected, the
optimal SIR will be smaller. The detailed results are omitted here, but a simple
example provide some intuition. we will adopt a notation that relates to the results
by Zander (1992b). Introduce the diagonal matrix of receiver efficiencies
4
=
diag 1 , . . . , m
.
+
p
0
(7.5)
127
35
30
25
20
15
10
5
0
0.7
0.75
0.8
0.85
0.9
0.95
7.1.2
In a practical situation, the optimized balanced SIR only serves as a performance bound. Consider a situation where every user in the network are requesting
the same service (e.g., speech), or at least services which are requiring the same
data rate. Then it may be interesting to find a power assignment resulting in a
balanced target SIR t at each receiver. By formulating a related linear programming problem, the following theorem (omitting the auto-interference) is shown in
(Zander, 1993).
Theorem 7.2 (Zander, 1993)
t of least total power achieving
In a tractable situation (
t < ), the power vector p
t
the balanced target SIR will be the solution to the following system of linear
equations:
1 + t
t =
,
EZ p
t
(7.6)
where E denotes the identity matrix. Furthermore, the leftmost matrix is nonsingular with probability one.
In a realistic situation, power control is typically implemented as cascade control (see Section 4.4), where the target SIR:s are provided by an outer control
loop. Below, we generalize the theory to include individual target SIR:s it and
auto-interference. Thus, the objective is to assign transmitter powers to meet the
requirement
i gii pi
= it , i
ij pj + 1 i pi gii + i
j6=i g
(7.7)
128
Global Analysis
(7.8)
R : x
The concept has been adopted from Herdtner and Chong (1999, 2000), where
similar proofs of similar and additional theorems covering related situations also
are provided. Herdtner and Chong used the term feasibility index RI and omitted
auto-interference. The motivation for introducing the name feasibility margin is to
stress the similarity to the gain margin discussed for local loops in Section 5.3.1.
As disclosed in that section, the gain margin is a relevant measure of the stability
margin of the local control loop. The feasibility margin can in a sense be seen
as a stability margin of the overall system, if we employ integrating inner control
loops. In such a case, feasibility is a necessary condition for global stability. In the
following theorem we capture the essentials regarding feasibility margins.
Theorem 7.5
t ), the feasibility margin (of both up , ,
Given a power control problem (Z,
and downlink) is obtained as
m = 1/
129
where
is
n
o
t (
1 Z
E) .
= max eig
m > 1. If the power control
The power control problem is feasible if and only if
problem is feasible, there exists an optimal downlink power assignment, given by
1
1 Z
t (
E)
t
1
.
= E
p
by Z
T.
The corresponding uplink power assignment is obtained by replacing Z
2
The feasibility of the power control problem is not surprising, since the target
SIR:s are all less than the optimal SIR computed in Example 7.2. Instead,
consider the target SIR:s 1t = 10 and 2t = 40, with the feasibility margin
m = 1.10.
This case thus also corresponds to a feasible problem, despite that not all target
SIR:s are below the optimal SIR.
The feasibility margin can also be related to the load of the system. When the
feasibility margin is one, the system clearly is fully loaded (only possible when unlimited transmission powers are available). Conversely, when the feasibility margin
is large, the load is low compared to a fully loaded system. Thus the following load
definition is logical.
Definition 7.6 (Relative Load)
r of a system is defined by
The relative load L
r = 1 (=
L
in Theorem 7.5).
m
Feasibility of the power control problem is thus equivalent to a relative load less
than unity. This load definition is illustrated by Example 7.4.
130
Global Analysis
Assume that mobile A increases his data rate (aiming at a higher target SIR).
The relative load will increase accordingly. This is illustrated by the solid line in
Figure 7.3. We note that it is quite costly for the system to provide a high data
rate to the distant mobile. The load is for instance doubled if mobile A is using
the same data rate as the other mobiles (12 [dB]). For comparison, consider
the situation when mobile B, close to the base station, increases his data rate
(dashed line in Figure 7.3). Clearly, this is not as costly for the system.
7.2
Most convergence results presented to date utilize values in linear scale. Several
important algorithms can be written as matrix recursions, which facilitates the
analysis. A common approach is to rewrite the problem as a standard iterative
algorithm, see Section 7.2.1, and then relate to established results on convergence.
This approach is used in Section 7.2.2 to prove convergence of a general integrating
controller in a delayless situation. Section 5.3 disclosed that the DPC algorithm
is unstable, when subject to time delays. Here, we show that DPC with TDC
converges for any time delay.
These information feedback algorithms converges to an equilibrium. The situation is different when considering decision feedback algorithms. Their behavior
131
1
0.8
r
L
0.6
0.4
0.2
0
10
10
t [dB]
15
20
25
30
Figure 7.3 The relative load with respect to different target SIR:s of mobile A (solid) and B (dashed).
can be characterized by persistent oscillations. It has been show that the power
control error using FSPC algorithm, converges to a bounded region. As will be
shown in Section7.2.3, the power control error, using the FSPC algorithm with
TDC, converges to a more smaller bounded region.
7.2.1
(7.9)
I(p)
> I(p)
for all > 1.
(7.10)
132
Global Analysis
When I(p)
is a standard interference function, the iteration (7.10) is denoted a
standard iterative algorithm. The corresponding equilibrium is thus
(t + 1) = I(p(t))
(t).
p
=p
The uniqueness of this equilibrium, is disclosed in the following theorem
Theorem 7.8 (Yates, 1995)
Let I(p)
be standard and feasible. If the corresponding standard iterative algorithm (7.10) has an equilibrium, then it is unique.
Proof See Yates (1995) and Blom and Gunnarsson (1998).
7.2.2
it
i (t)
,
(7.11)
(7.12)
The relations between (7.11) ans (7.12) and standard iterative algorithms are provided in the lemma below.
Lemma 7.10
Assume that it are feasible target SIR:s according to Definition 7.3 and that
0 < 1. Then the distributed power control algorithm in (7.11) with requirements as in (7.12) corresponds to a standard iterative algorithm.
Proof See Appendix 7.B.
133
The theorem does not hold when subject to time delays. Consider time delay
compensation as described in Section 6.2, where the measurements are adjusted as
i (t) = ( t nm ) + pi (t) pi (t np nm ).
(7.13)
This scheme compensates for the effect of outdated powers reflected by the measurements. By employing TDC to the DPC algorithm (i = 1), stability and
convergence are easily proven. Stability and convergence in more general cases are
established in Section 7.3
Theorem 7.12 (Convergence of the DPC algorithm with TDC)
The DPC algorithm (7.10) and i = 1 employing TDC converges to a unique
that meets the requirements in (7.12) with equality for any initial
equilibrium p
0 . The convergence rate is n + 1 times slower compared to the DPC
power vector p
algorithm applied to a delayless power control problem.
Proof The time delay compensation (7.13) in linear scale is
i (t) = i (t nm )
pi (t)
.
pi (t nm np )
it
i (t)
= pi (t nm np )
it
i (t nm )
=
p(t nm np ))
it Ii (
.
gii
(7.14)
Convergence of the AAW algorithm (see Section 5.2.1) with respect to its parameters is disclosed in (Yates et al., 1997). Time delays and auto-interference are
omitted in the analysis, but the latter can be readily included.
134
7.2.3
Global Analysis
The FSPC algorithm results in an oscillative local loop, as discussed in Section 5.5.
Therefore, it will never converge to an equilibrium. The local loop oscillations is
reduced when employing TDC (see Section 6.2.1). Moreover, as will be shown
in this section, FSPC with TDC converges to a smaller region than without. A
slightly more general version of the FSPC algorithm is given by
i (t) it
i pi (t),
pi (t + 1) =
(7.15)
i pi (t),
i (t) > it
where > 1 and
< 1. Note that the difference to (4.15) is that the algorithm
takes different steps upward and downward. Hence the FSPC algorithm is obtained
Time delay compensation is implemented as in Section 6.2.1.
if
= 1/.
i (t nm ) = i (t nm ) + pi (t) pi (t n),
(7.16)
n <
a tF SP C 0 such that
n+1
n+1
it
,
i (t)
t tF SP C .
n <
tT DC 0 such that
n+1
it
n+1 ,
i (t)
t tT DC .
135
2
|it i (t)| (n + 2)
Hence, the longer the time delay, the more emphasized improvements using TDC.
Note, however, that the fact that the bounds are tighter does not imply that the
error variance is smaller.
7.3
Log-Linear Algorithms
The techniques in the previous section apply primarily to structurally simple algorithms. When considering delays, filters and general log-linear controllers, it
is desirable to relate to the local loop analysis and design in Chapters 5 and 6.
The challenge is the the nonlinear interconnections between the log-linear control
loops. In this section we apply a robust stability approach, based on a linearized
interference. Essentially, we aim at rewriting the global system, so that it can
be associated with the multi-variable system in Figure 7.4. This is the standard
setting to which the Small Gain Theorem (Zhou et al., 1995, and Appendix 7.D)
applies. Therefore, we proceed in three steps:
(q)
w1
w2
G(q)
136
Global Analysis
3. Address stability using Small Gain Theorem. These results are found in
Section 7.3.3.
The established stability results put restrictions on the local loop design, and
thus stability can be (approximately) granted by appropriate local loop design. To
exemplify the results, the specific case of two mobiles receives extra attention in
Section 7.3.4. A well-known drawback with Small Gain Theorem is that it is rather
conservative in some cases. Therefore, the two mobile case is used as a benchmark
example in Section 7.3.5.
7.3.1
The global system consists of interconnected local loops. Starting from the loglinear models of local loops derived in Chapter 5, the aim here is to obtain a model
of the global system. This model will contain nonlinearities from the nonlinear
interconnections via the interference, but the remainder will be linear. The focus
is on algorithms with the objective to meet individual target SIR:s provided by an
outer loop. Therefore, algorithms like AAW, which essentially adopts the provided
target, are not addressed. However, by rephrasing the algorithm as discussed in
Sections 5.2.1 and 9.4.3, this adaption is placed in the outer loop. Initially, time
delay compensation (TDC) described in Section 6.2 is omitted, but is included
further on. This section includes rather tedious formula manipulations. For convenience, the resulting diagonal transfer functions are provided in a subsection in
the end of this section.
Operation without TDC
Recall that the local distributed control loops (considering auto-interference) can
be depicted as in Figure 7.5 (cf. Section 5.3). The interconnections between the
i (t) + gii (t) Ii (t)
it (t)
R(q)
q np
F (q)
q nm
pi (t) +
i (t)
Figure 7.5 The local loop when employing the general linear control algorithm R(q) and the filter F (q).
loops are described by the interference Ii (t). More specifically, this is a function
of the powers from all interferers. In an ideal situation, the interference may be
regarded as an independent disturbance to the local loop, which was the underlying
137
(7.18)
In order to capture the global system behavior, the system model needs to be
vectorized. Therefore, introduce the following vectors
4
t T
= [1t , . . . , m
]
4
(t) = [
1 (t), . . . , m (t)]T .
(7.19)
(7.20)
(7.21)
(7.22)
Note the correspondence between these vector quantities and the quantities in the
local loop in Figure 7.5. For a more compact notation we introduce
(t) = p(t np ).
p
The dynamical effects of introduced filters also need to be described. Adopt the
general approach of applying separate filters FI (q) and Fg (q) to the interference
and signal power respectively (see Section 5.2.4). In the specific case, when only
SIR is measured and filtered, FI (q) = Fg (q) = F (q). To describe the filtering
effects in vector representation, introduce the m m matrices
4
(7.23)
(7.24)
Then the overall system (global system) can schematically be depicted as in Figure 7.6. Since the target SIR is considered constant, and F g (q) and q nm commute,
it is possible to rearrange the block containing the measurement delay q nm as seen
p, t),
in the figure. Moreover, denote the output of the interference filter FI (q) by I(
and the diagonal transfer matrix of control algorithms and delays by
Rd (q) = q np R(q)q nm E.
Using the introduced notation, Figure 7.6 yield
p, t) + t Fg (q)(g(t) + p
(t)) .
(t) = Rd (q) I(
p
138
Global Analysis
FI (q)
I(, t)
g(t)
(t)
t
q nm R(q)q np
0
..
(t)
p
q nm R(q)q np
Fg (q)
Figure 7.6 The global system consists of interconnected local loops. The
interconnections consist of a diagonal filter F I (q) = FI (q)E
and a nonlinear, non-diagonal cross-coupling I(, t).
p, t)) results in
(t) (except for the p
(t) in I(
Solve for p
p, t) + t Fg (q)g(t) .
(t) = (E + Rd (q)Fg (q))1 Rd (q) I(
p
Hence, it is natural to define the diagonal linear feedback system G(q) as
4
R(q)
E.
+ Fg (q)R(q)
q +np +nm
(7.25)
Note that Gll (q) is the closed-loop system of the local loops studied in Chapter 5.
The corresponding local poles are thus the roots of the denominator (the characteristic polynomial, cf. Section 5.16). Figure 7.7 provides a relevant block diagram
of the global system dynamics. It is intuitive that local loop analysis is sufficient
if the interconnections via the interference are neglectable. Conversely, if the interference cannot be neglected, it does affect the global system performance and
stability.
Operation with TDC
Time delay compensation is implemented by the linear transfer function H(q) from
the computed transmission powers pi (t) as described in Section 6.2. This can be
(t) (see
described as the internal diagonal feedback H(q) = q np +nm H(q)E from p
Section 6.2). Apart from the internal feedback, the resulting global system in
Figure 7.8, is analogous to the system in Figure 7.6. The global system behavior
139
FI (q)
I(, t)
+
t
(t)
t
(t)
p
G(q)
g(t)
Fg (q)
Figure 7.7 The global system can be seen as a diagonal system of closed
local loops G(q) and interconnections via the interference.
is thus captured by
p, t) + t H(q)
(t)) .
(t) = Rd (q) I(
p(t) Fg (q)(g(t) + p
p
(t), which yields
As in the case without TDC, solve for p
p, t) + t Fg (q)g(t) .
(t) = (E + Rd (q)Fg (q) Rd (q)H(q))1 Rd (q) I(
p
As in the case of operating without TDC, we define a diagonal linear feedback
system G(q) by
4
R(q)
q +np +nm (1
q np nm Fg (q)R(q)
R(q)H(q))
E.
(7.26)
The TDC implementation in Algorithm 6.4 reduces to the expression in Equation (6.5), which is given by
H(q) = Fg (q)(1 q np nm )
This choice of H(q) and Equation (7.26) results in the closed local loop
Gll (q) =
R(q)
.
q +np +nm (1 + Fg (q)R(q))
(7.27)
Clearly, this is the closed local loop system as obtained in Section 6.2. Thus
operation with TDC results in different local loops Gll (q) than operating without.
However, the global system interconnections are described by Figure 7.7 in both
cases. Since there is an imminent risk that the global and the local view get mixed
up in the sequel, we define
140
Global Analysis
FI (q)
I(, t)
H(q)
t
(t)
t
g(t)
(t)
p
Rd (q)
Fg (q)
Figure 7.8 Time delay compensation can be seen as internal diagonal feedback H(q) = q np +nm H(q)E from the computed power p(t).
Otherwise, the global system is identical to the case without
TDC in Figure 7.6.
7.3.2
R(q)
q n + Fg (q)R(q)
R(q)
Gll (q) = n
q (1 + Fg (q)R(q))
Gll (q) =
(7.28)
(7.29)
Interference Linearization
The global system in Figure 7.7 is nonlinear due to the nonlinear cross-coupling
I(
p(t), t) between the local loops. One way of addressing stability issues, is to
consider a linearized interference. The resulting dynamics will be linear, and can
thus be analyzed using methods for linear systems. This linearization is relevant
in a neighborhood of an equilibrium point, where the iterative algorithms have
141
p(t) p
(t)=pt
t
(t) pt ,
=I + cc p
(7.30)
where the Jacobian cc will be referred to as the cross-coupling matrix. A closedform expression for this matrix is derived in the following lemma.
Lemma 7.18 (Cross-coupling Matrix of the Power Control Problem)
Consider the interference function at receiver i as defined in (7.18). Then, based
on Lemma 7.17, the cross-coupling matrix in Equation 7.30 is given by
( (1 )g pt
i
ii i
i=j
Ii
[cc ]ij =
(7.31)
t
g
ij pj
i 6= j
Ii
Proof In logarithmic scale (dB), the interference function is given by
X
Ii (p) =10 log10
gik pk + (1 i )
pi gii + vi =
k6=i
X
ln 10 p
ln 10 p
10
=
ln
gik e 10 k + (1 i )
gii e 10 i + vi
ln 10
k6=i
(7.32)
(7.33)
(7.34)
The proof is completed by inserting the equilibrium point from Lemma 7.17.
142
Global Analysis
The global system in Figure (7.7) can now be approximated by a linear system
using the interference linearization in Equation (7.30). Hence
p, t) + t F g (q)g(t)
(t) =G(q) I(
p
=G(q) FI (q)I t + FI (q)cc (
p(t) pt ) + t F g (q)g(t)
It is assumed that g(t) is fixed. A simple relaxation is to state that it is fixed
except for a small zero-mean deflection
g(t). The filters are assumed to have unit
DC gain (see Section 5.2.4), which also hold true for the closed local loops Gll (q).
By combining constant values and introducing the equilibrium power deflection
(t) = p
(t) pt
p
(7.35)
(7.36)
Figure 7.9 illustrates the corresponding block diagram of the global system. This
is of the same form as the system in Figure 7.4. Small Gain Theorem is applied to
the power control problem in the following section.
FI (q)
cc
(t)
p
(t)
g
Fg (q)
G(q)
Figure 7.9 Block diagram of the global system, when approximating the
interference by the corresponding linearization with respect to
(t).
the equilibrium deflection p
7.3.3
Basically, the global system in Figure 7.9 can be seen as a diagonal system of local
loops with a parallel structured uncertainty. One way of addressing stability of
G(q) is to investigate robust stability (see e.g., Zhou et al., 1995) of G(q) with
respect to the uncertainty. Essentially, stability is granted if the round-trip loop
gain of Figure 7.9 is less than one. Since the transfer function G(q) is frequency
dependent, an appropriate metric has to consider the worst case in the frequency
143
domain. Relevant metrics or norms are discussed together with some robust stability results in Appendix 7.D.1. A matrix norm has the natural interpretation
of input/output amplification gain. The corresponding gain of the cross-coupling
matrix is addressed in the following lemma.
Lemma 7.19
The following relations hold for the matrix -norm of the cross coupling matrix
cc in Lemma 7.18
vi
kcc k = max 1 t = cc < 1
1im
Ii
The value of the norm cc will be referred to as the degree of cross-coupling.
2
Provided that the local loop is stable, stability of the global system is granted if
this maximal gain meets a given restriction, related to the degree of cross-coupling.
Hence, it is possible to establish global system stability by careful local loop design.
This is formally proven in Theorem 7.20.
Theorem 7.20 (Global Stability of Power Control Algorithms)
Let Gll (q) be the stable closed-loop transfer function of the local loop in Figure 7.5.
Then the global system in Figure 7.9 is stable if and only if any of the following
properties is satisfied
(i) supw |Gll (eiw )| 1/FI .
(ii) supw |Gll (eiw )| < 1/(ccFI ),
144
Global Analysis
where
FI = sup |FI (eiw )|
w
vi
cc = max 1 t
1im
Ii
2
Normally, the interference filter FI (q) is chosen as one of the two described in
Section 5.2.4. Then, the following hold
Corollary 7.21
Assume that the interference filter FI (q) is either a local average filter or an exponential forgetting filter. Then the global system in Figure 7.9 is stable if and only
if any of the following properties is satisfied
(i) supw |Gll (eiw )| 1.
(ii) supw |Gll (eiw )| < 1/cc,
2
.
q2 q +
Hence
|Gll (eiw )| =
.
| cos 2w cos w + + i(sin 2w sin w)|
1
q
3 < 1
2 1 1
iw
(1)
(
)
4
sup |Gll (e )| =
w
1
0 < < 13
145
cc
0.8
0.6
0.4
0.2
0
0
0.2
0.4
0.6
0.8
Figure 7.10 Requirements on global system decoupling when using an integrating controller, subject to a time delay of one sample.
the global system in Figure 7.9 is always stable, independent of the interference
and load situation.
7.3.4
Valuable insight can be achieved by studying the case of only two mobiles in the
system. This case was briefly studied in the introductory examples in Chapter 2.
It will be analyzed in a number of configurations. Auto-interference is omitted for
simplicity, and the focus is on the use of the I-controller (see Section 5.2.1).
pi (t + 1) = pi (t) + (it (t) i (t)), 0 < 1
(7.37)
146
Global Analysis
2 T
g
11
,
= g11 g22 , t =
Z = g21
,
0
1
g
22
0
2t
(7.38)
(7.39)
The linearization described in Section 7.3.2 is naturally simplified. Thus the interference at receiver i is approximated by
#
"
(
p
(t))
I
i
(
p(t) pt ) =
p) Iit +
Ii (
pj p
(t)=pt
Ii (
p(t))
(
pj ptj ) =
Iit +
pj pj (t)=pt
j
gij ptj
Iit + t (
pj ptj ) = Iit +
i (
pj ptj ),
I
(7.40)
2 , which
where i, j {1, 2}, i 6= j. The cross-coupling is characterized by
1 and
can be rewritten as
i =
gij ptj
g pt
Iit i
t ij j
=
=
i
gii pti
Iit
Iit
(7.41)
It is instructive to establish the relations between the relative load and the
i :s.
Equations (7.39) and (7.41) yield
r =
1
2 .
(7.42)
L
No Delays in the System
This case has been analyzed in linear scale in Section 7.2.1 and in (Blom and
Gunnarsson, 1998; Yates, 1995). Equations (7.37), (7.40) and (7.41) yield
pi (t + 1) = pi (t) + (it i (t)) = pi (t) + (it pi (t) gii + Ii (t))
i (pj (t) ptj ) =
pi (t) + (it pi (t) gii + Iit +
= pi (t) + (pti pi (t)) +
i (pj (t) ptj )
(7.43)
(7.44)
147
2 1
(7.45)
The global system poles are given by the roots to the following equation (cf. Section 5.3.1)
det(qE A1 ) = 0
(7.46)
Hence
r )(q 1 + L
r ),
1
2 = (q 1 + + L
0 = (q 1 + )2 2
where Equation 7.42 is used in the last equality. The global system poles are thus
given by
r ).
q = 1 (1 L
r < 1, the global system poles are always within the unit
Since 0 < 1 and 0 L
circle, and the global system is thus always stable. This is the same conclusions as
in Section 7.2.1 and in (Blom and Gunnarsson, 1998; Yates, 1995).
Delay of One Sample
Since the gains gij are assumed constant, there is no dynamical difference between
a measurement delay nm and an output power delay np . Both will delay the output
power contribution pi of the measurement i . This is more formally seen below
i (t nm ) = pi (t nm np ) + gii (t nm ) Ii (pj (t nm np ), t).
Therefore, we notation-wise study np = 1, nm = 0. Analogous to (7.43), we get
pi (t + 1) = pi (t) + (it i (t)) =
= pi (t) + (it pi (t 1) gii + Ii (pj (t 1), t))
i (pj (t 1) ptj ) =
pi (t) + (it pi (t 1) gii + Iit +
= pi (t) + (pti pi (t 1)) +
i (pj (t 1) ptj ).
Thus
i pj (t 1).
pi (t + 1) = pi (t) pi (t 1) +
(7.47)
Introduce the following state variables: w1 (t) = p1 (t), w2 (t) = p2 (t), w3 (t) =
p1 (t 1) and w4 (t) = p2 (t 1). Note that
w3 (t + 1) = w1 (t)
w4 (t + 1) = w2 (t)
148
Global Analysis
These combine to the state space representation of the global system dynamics
1 0
1
0 1
2
w(t) = A2 w(t).
(7.48)
w(t + 1) =
1 0
0
0
0 1
0
0
By solving
det(qE A2 ) = 0
we get the global system poles as below
p
r
1/2 + 1/2 1 4 + 4 L
r
1/2 1/2 1 4 + 4 L
q=
p
1/2 + 1/2 1 4 4 L
r
1/2 1/2 1 4 4 L
(7.49)
r , 0 Lr < 1
1+L
(7.50)
This stability region with respect to the parameter ranges is illustrated in Figure 7.11. The conclusion is that a < 0.5 is needed in order to preserve stability
for all feasible cross-coupling and relative load situations. This should be compared
r = 0.
to the result from the local-loop analysis, which is identical to the situation L
As in Example 5.4, local-loop stability is achieved for < 1.
Delay of One Sample with Time Delay Compensation
As in the previous section, consider the case np = 1, nm = 0. TDC is implemented
as described in Section 6.2.
i (t) = i (t) + pi (t) pi (t 1)
This will affect the update equations in the following way
pi (t + 1) = pi (t) + (it i (t)) = pi (t) + (it pi (t) + gii Ii (pj (t 1), t))
i (pj (t 1) ptj ) =
pi (t) + (it pi (t) gii + Iit +
= pi (t) + (pti pi (t)) +
i (pj (t 1) ptj ).
Thus
pi (t) +
i pj (t 1).
pi (t + 1) = (1 )
(7.51)
149
0.8
0.6
0.4
0.2
0.2
0.4
r
L
0.6
0.8
Introduce state variables as in the previous section, to obtain the state space representation
1
0
0
1
0
1
2
0
w(t) = A3 w(t).
(7.52)
w(t + 1) =
1
0
0
0
0
1
0
0
As in the previous, we solve
det(qE A3 ) = 0
to get the global system poles:
p
r
r
1/2 1/2 1/2 1 2 + 2 + 4 L
q=
p
r
1/2 1/2 1/2 1 2 + 2 4 L
(7.53)
150
Global Analysis
(7.54)
1 0
0
1
0 1
2
0
w(t) = A4 w(t).
w(t + 1) =
(7.55)
1 0
0
0
0 1
0
0
Solve
det(qE A4 ) = 0
to get the global system poles:
p
r
1/2 + 1/2 1 + 4 L
r
1/2 1/2 1 + 4 L
q=
p
1/2 + 1/2 1 4 L
r
1/2 1/2 1 4 L
(7.56)
It is easy to see that since the first pole is always greater than or equal to one,
the global system is always unstable. This is not surprising, since that compensation cancels the feedback. The result is thus an integrator in open loop, which is
unstable.
7.3.5
As discussed in Section 7.3.3, Theorem 7.20 might yield rather conservative stability
requirements in some cases. Therefore, it is instructive to compare the stability
regions obtained directly in the two mobile case in Section 7.3.4 to the region
obtained via Theorem 7.20.
As in Section 7.3.4, the focus is on the use of the I-controller, when the output
powers are delayed by one sample. Operation both with and without time delay
compensation will be studied.
151
1
1
=
cc
max1i2
i
(7.57)
The result in Example 7.5 simplifies the left hand side of (7.57) to
q
( 1)2 (1
1
4 )
<
1
1
, <1
max1i2
i 3
(7.58)
This criterion is compared to the result from the root locus analysis in Section 7.3.4
(cf. Figure 7.11). Both criteria are illustrated in Figure 7.12. As we can see, the
1
0.9
0.8
0.7
0.6
0.5
0.4
0.3
0.2
0.1
0
0
0.2
r
L
0.4
0.6
0.8
1
0.1
0.2
0.3
0.4
0.5
0.6
0.7
0.8
0.9
152
Global Analysis
the other, but not vice versa. This is evident at e.g., large
1 and
2 = 0. However,
when the degree of cross-coupling is large (
1 ,
2 close to one), the difference is
essentially smaller.
r corresponds to a worst
If one assumes that the balanced situation
1 =
2 = L
case (which it clearly is when considering the root locus criterion in Figure 7.12),
it is relevant to compare the related stability regions. This is obtained as the
intersection between the surfaces in Figure 7.12 and the plane
1 =
2 , which is
r implies cc = L
r , which relate
depicted in Figure 7.13. Note that
1 =
2 = L
Example 7.13 and Figure 7.10.
0.8
0.6
0.4
0.2
0.2
0.4
r
L
0.6
0.8
From the example above, we see that the symmetric cases constitute worstcases when consider the more relevant root locus criterion. Therefore, the following
relaxation of the criterion in Corollary 7.21 is plausible.
1
m.
|Gll (eiw )| < =
Lr
(7.59)
Note that this only should be considered as a rule of thumb. However, it further
motivates the name feasibility margin (cf. Section 7.1.2).
7.4 Summary
153
.
q(q 1 + )
Since
sup |Gll (eiw )| 1
w
Theorem 7.20 yields that stability is always granted. This is the same conclusion
as in Section 7.3.4.
7.4
Summary
Capacity, load and whether it is possible to accommodate all users with their
data rate requirements (reflected by the SIR targets) are typically discussed at a
global level. We assume that the inner control loops successfully compensates for
the fast variations, so that the power gains can be considered as constant. With
the ambition to generalize previous results to include auto-interference, we define
feasibility, to include these effects. Furthermore, capacity and load are related to
the introduced metrics feasibility margin and relative load.
Moreover, stability and convergence are also discussed at a global level. Again,
the power gains are assumed constant, but the motivation is that we are considering the short term behavior of the global system, and the power gains are assumed
to fluctuate more slowly. Convergence results of some structurally simple algorithms are proven using values in linear scale. The DPC algorithm with TDC (see
Section 6.2) is proven stable for any time delays. This emphasizes the benefits
using TDC, since DPC is unstable when subject to any additional time delays.
The FSPC, which is based on decision feedback, show a persistent oscillative behavior. The resulting power control errors is bounded as proven in the literature.
Employing TDC with the FSPC algorithm, we prove that the power control error
converges to a bounded region with smaller bounds than above.
When considering general log-linear control algorithms, time delays and filters,
it is hard to rewrite the algorithm to fit a linear framework as used above. Instead
it is desirable to relate stability and performance to the local loop analysis and
design in Chapters 5 and 6. Using, a linearized interference, we apply a robust
stability framework, to disclose results on stability. The conclusion is that global
stability can be provided by careful design of the local control loops.
Appendix
7.A
Study the feasibility of the same power control problem, but with the SIR target
t . It is trivial that x
x
p+
It can be rewritten as
1
t (
1 Z
E) p
t
1
.
=
E
x
If the matrix on the left hand side is singular, solvability depends on whether the
vector on the right hand side is in the linear hull spanned by the basis of the left
hand side singular matrix. Since these vectors and matrices are stochastic, this
will be the case with probability zero. Thus solvability can be considered equal to
whether the left hand side matrix is singular or not. Hence, for insolvability, we
require
1
1
(7.A.1)
E t ( Z E) .
0 = det
{z
}
|
B
is positive with eigenvalues
The matrix B
1 , . . . ,
nb , and Perron-Froebenius
theory (Gantmacher, 1974) yields that the matrix has a positive real eigenvalue
b
= max{|
i |}ni=1
. Hence
=0
= max
: det{E
B}
Definition 7.4 and Equation (7.A.1) yield the feasibility margin
m = 1/
154
155
which concludes the implication if. The implication only if when auto-interference is omitted is provided in (Herdtner and Chong, 2000). The proof generalizes
to include auto-interference with minor modifications.
7.B
For simplicity, we will drop the time index t. Note that the power gains gij , the
noise power i , the powers pi and the receiver efficiency i all are positive and
assumed constant. Furthermore, (1 i ) 0, i. Consider the downlink (the
p)
p0 ) , (
pp
1
(
p) >
p) , ( > 1).
(
(7.B.3a)
(7.B.3b)
= pi
p) = pi
I(
p) = Ii (
pi i (
p)
i (
p)
p). From Equations (7.B.3a) and (7.B.3b) and Defi I(
which clearly satisfies p
nition 7.7 it is easy to disclose that this indeed is a standard interference function.
Furthermore Theorem 7.5 yield that this interference function is feasible.
156
7.C
Global Analysis
Everything in the proof relate to values in linear scale. Therefore, we will leave
the bar notation in this section. Additionally, some of the notation used here, is
invalid outside this section. The proof is similar to the proof of Theorem 7.13 by
Herdtner and Chong (2000), and it is founded on similar lemmas and definitions.
First, we define an interference function, and prove some related properties.
Then, we define a set of power vectors, which is invariant under power control
updates. This leads to a stability proof, on which the convergence proof relies.
Define the interference function.
Ii (p(t))it
I(p(t)) =
gii i
It is easy to verify that this is a standard interference function (see Definition 7.7).
This is important, since we need the scalability and monotonicity properties in the
sequel. The following lemma is a direct consequence from the feasibility margin
definition and Theorem 7.5 in Section 7.1.2. A more rigorous proof is found in
(Herdtner and Chong, 2000).
Lemma 7.C.1
m [, then there exist an unique componentwise minimal power vector
If x [0,
that satisfies p xI(p). This vector is given by p = xI(p).
m [. Note that each
(x), which only is defined for x [0,
Denote this vector by p
component is a strictly increasing function of x.
To describe the update steps of the power control algorithm, we introduce
pi (t) i (t n)
pi (t)
=
Ii (p(t n))
pi (t 1)
it
i (t n)
pi (t n)
=
yi (t n) =
Ii (p(t n))
it
zi (t) =
(7.C.5)
(7.C.6)
The updates using original algorithm without TDC is affected by the total delay
of n samples, and can thus be written as
yi (t n) 1
pi (t),
pi (t + 1) =
(7.C.7)
pi (t),
yi (t n) > 1
Using TDC, the delayed powers related to the same user is compensated for. The
updates are therefore given by
zi (t) 1
pi (t),
(7.C.8)
pi (t + 1) =
zi (t) > 1
pi (t),
Define the following set of powers
4
}.
C(
p) = {p RN : p p
This set of powers is invariant under power updates using (7.C.8), as is shown in
the following lemma.
157
Lemma 7.C.2
m and x [ n ,
m [. Then C(
p(x)) is invariant under power
Assume that n <
(i)
(iii)
(iv)
Ii (
p(x)) = n pi (x) pi (x).
n
x
Remarks: (i) follows directly from (7.C.5), (ii) the ratio is less than or equal to
the case when all other users have decreased their powers n times, (iii) scalability
(t) as stated, and yield
extracts the factor, the remaining power vector is less than p
the inequality together with monotonicity, (iv) follows from Lemma 7.C.1.
2
(7.C.9)
The stability using the power update in (7.C.8) is formally proven below.
Theorem 7.C.3
m then the algorithm in (7.C.8) is stable.
If /n <
Proof Denote the initial power level by p(0) > 0. Moreover, let `0 = `(p(0)), x =
=p
(x). Suppose that t 0, such thatp(t) C(
p). Since n x <
max{ n , `0 }, p
m , Lemma 7.C.1 yields that p(t + 1) C(
p). From corresponding definitions, we get
(x) = p
.
(`0 ) p
p(0) p
The proof is completed by induction.
Finally, all results are at hand, and Theorem 7.14 can be proven.
Proof (Theorem 7.14)
We will only prove the lower bound, since the proof of
the upper bound is analogous. Recall the definitions of zi (t) and yi (t n) in (7.C.5)
and (7.C.6) respectively. The power updates can be written in terms of zi (t) as seen
in (7.C.8). Assume that yi (t) / n . Then it is desirable to prove that the same
inequality holds for yi (t + 1).
158
Global Analysis
zi (t) < 1:
yi (t + 1) =
pi (t)
pi (t)
pi (t)
>
= yi (t),
Ii (p(t + 1))
Ii (p(t))
Ii (p(t))
> n+1
=
Ii (p(t + 1))
Ii ( n+1 p(t n))
Ii (p(t n))
yi (t + 1) =
Hence if there exist a ti , such that yi (ti ) / n , then this hold true for t ti . We prove
this last step by contradiction. Assume that yi (t) < / n , t. Hence, the following hold
zi (t) =
n pi (t n)
pi (t)
= n yi (t n) <
< 1.
Ii (p(t n))
Ii (p(t n))
Then, for t n, we compute the output power pi (t) = tn pi (0) , t . Since this
contradicts the stability in Theorem 7.C.3, we conclude that there exist a ti 0 for each
user such that yi (ti ) / n holds. Finally, choosing tT DC = max{t1 , . . . , tN } completes
the proof.
2
7.D
As pointed out in Section 7.3.3, the global system in Figure 7.9 can be seen as a
diagonal system of local loops with a parallel structured uncertainty. One way of
addressing stability of G(q) is to investigate robust stability (see e.g., Zhou et al.,
1995) of G(q) with respect to the uncertainty. The concept of robust stability is
discussed briefly in Section 7.D.1, and applied to the power control problem in
Section 7.D.2
7.D.1
Robust Stability
In this section, we introduce vector and matrix norms. Furthermore, some central
theorems are discussed and in some cases proved.
Let X be a vector space. A real-valued function k k defined on X is said to be
a norm on X if it satisfies the following properties:
(i) kxk 0;
(ii) kxk = 0 if and only if x = 0;
(iii) kkxk = |k|kxk for any scalar k;
(iv) kx + yk kxk + kyk.
159
There are numerous definitions of norms that satisfies these properties. For our
purpose, the focus will be on -norms, which satisfies the properties above and
are defined as below.
Definition 7.D.4 (Vector -norm)
Let x Cn with components xj , 1 j n. The vector -norm of x is defined by
4
In a sense, the vector norm can be thought of as an extension of our usual concept
of length. Similarly, we can introduce some kind of measure of a matrix.
Definition 7.D.5 (Matrix -norm)
Let A = [aij ] Cmn . The matrix norm induced by a vector -norm is defined
by
4
kAxk
x6=0 kxk
kAk = sup
Given a matrix, it is not easy to compute the norm from the definition. However,
it is easy to verify that the following lemma holds.
Lemma 7.D.6
The matrix norm in Definition 7.D.5 can be computed by
kAk = max
1im
n
X
j=1
From a system perspective, the induced matrix norms have the natural interpretation of input/output amplification gains. This far only constant matrices have
been considered. With the system interpretation of input/output gains in mind, it
is interesting to extend the definition to transfer matrices G(q).
Definition 7.D.7 (Zhou et al., 1995, p. 114)
Let G(q) be a transfer matrix. Then the induced matrix -norm is defined by
G(ejw )
kG(q)k = sup
w
Remark 7.D.8
In a single input, single output (SISO) case, an interpretation is that the -norm
of a stable transfer function is equal to the maximum magnitude of the steadystate response to all possible unit amplitude sinusoidal input signals. This is easily
concluded from the fact that
GSISO (ejw ) = sup |GSISO (ejw )|.
kGSISO (q)k = sup
w
160
Global Analysis
Gll (q) 0 . . .
0
..
..
0
.
.
(7.D.10)
G(q) = .
.
..
..
0
0
...
0 Gll (q)
For this conceptually interesting situation, the following lemma can be formulated:
Lemma 7.D.9
Let G(q) be a diagonal transfer matrix as in (7.D.10). Then, the induced matrix
-norm is given by
kG(q)k = kGll (q)k = sup |Gll (eiw )|
w
G(ejw0 )
= max eig {G(ejw0 ) G(ejw0 ) =
n
o
= max eig {Gll (ejw0 ) Gll (ejw0 ) =
o2
n
,
=
Gll (ejw0 )
where the second last equality follows from (7.D.10). Hence
n
o
n
o
sup
G(ejw ) = sup
Gll (ejw ) .
w
Since Gll (q) is a SISO system, the proof is concluded by considering Remark 7.D.8.
(q)
w1
w2
G(q)
161
7.D.2
This section essentially provide proofs of theorems in Section 7.3.3. For clarity, the
numbering of theorems is therefore the same as in that particular section. Consider
the situation in Figure 7.9, and recall that the transfer matrix G(q) = Gll (q), where
Gll (q) represents the transfer function of the local loops. Moreover, the influence
of the interference is described by cc .
Lemma 7.14
The following relations holds for the matrix -norm of the cross coupling matrix
cc in Lemma 7.18
vi
kcc k = max 1 t = cc < 1
1im
Ii
The value of the norm cc will be referred to as the degree of cross-coupling.
Proof According to Lemma 7.D.6 and Lemma 7.17, the matrix norm can be computed
as
m
X
Ii (p)
kcc k = max
.
1im
pj p=pt
j=1
Lemma 7.18 yields
kcc k = max
1im
X
j6=i
it
gij ptj
,
gii pti
since the gains and the powers all are positive. Furthermore,
It vi
vi
kcc k = max it i t = max 1 t = cc < 1.
1im
1im
gii pi
Ii
2
162
Global Analysis
(7.12)
(7.13)
Moreover, we note that the situation is analogous to the one in Corollary 7.D.11 with
F I (q)cc as the uncertainty matrix. The corollary together with Equation (7.11) leads
directly to the properties and concludes the proof.
2
Corollary 7.16
Assume that the interference filter FI (q) is either a local average filter or an exponential forgetting filter. Then the global system in Figure 7.9 is stable if and only
if any of the following properties is satisfied
(i) supw |Gll (eiw )| 1.
(ii) supw |Gll (eiw )| < 1/cc,
Proof Consider the local average filter FLA (q).
FLA (q) =
L1
X
q k .
k=0
Note that
L1
L1
1 X
1 X iwk
iwk
|FLA (e )| =
e
e
= 1,
L
L j=0
iw
k=0
163
with equality for w = 0. The exponential forgetting filter FEF (q) is given by
FEF (q) =
(1 )q
.
q
1
1
1,
=
| cos w + i sin w|
1 + 2 2 cos w
with equality for w = 0. Hence supw |FI (eiw )| = 1 for both choices of filter.
164
Global Analysis
8
Nonlinear Estimation
Hitherto, the focus has been on algorithms that either utilize analog measurements
(information feedback) or has to rely on whether a measurement is either above or
below a threshold (decision feedback). In practice, the situation might be somewhere in between. Consider e.g., GSM, where the measurements are subject to
coarse quantization, and made available in measurement reports. One core problem is then to locally extract as much relevant information as possible from these
reports.
Proposed methods for SIR estimation include schemes that utilize analog signal strength measurements (Andersin et al., 1998a; Ramakrishna et al., 1997;
T
urkboylari and St
uber, 1998). These algorithms are rather similar, and show
good performance. Such schemes are useful when the SIR:s are used in the receiver,
e.g., by employing decision feedback as in the FSPC algorithm (see Section 5.2.1).
However, in systems like GSM and D-AMPS, the measurements are used for power
control by the connected base station. The receiver measurements in a downlink
situation, thus have to be transmitted over the radio interface facing a low signaling bandwidth requirement. These measurement reports commonly comprise
quantities reflecting the perceived quality and signal strength. Hence, information
is lost due to quantization and sampling at a rate that might be as low as 2 Hz
(GSM case). The same signaling interface is used in an uplink situation between
the receiver and the unit computing output powers in the base station.
In this chapter, we discuss the applicability of Maximum Likelihood Estimation
165
166
Nonlinear Estimation
8.1
Modeling
The perceived quality and related quantities at a receiver can be seen as stochastic variables, parameterized by some parameters. In order to employ maximum
likelihood estimation, we need the parameterized probability functions of the measurements. First, the choice of parameters is motivated. In general, it is hard
to derive the measurements parameterized probability functions analytically. Instead, we utilize point-mass approximations of the same, over a grid covering the
interesting parameter space.
The estimation approach outlined in this chapter is focused on the specific case
of GSM, and some generalizations are outlined where appropriate. Furthermore,
the approach is local and considers each user individually. Therefore, the mobile
station index i will be dropped for clarity. Simulations are central in this chapter.
Further details on the simulation environment are found in Section 10.3.
8.1.1
Parameters
Essentially, we are interested in the distribution of the interference power I and the
desired signal power C. The latter is subject to variations of the same order as the
sample interval, and it will therefore be considered as a deterministic parameter.
Another motivation is that the RXLEV measurement describes C well, so the
estimator could be able to track relatively fast variations in C. The interference I
is considered as a stochastic variable with distribution
I F (mI , I , x),
where mI is the mean, I the standard deviation, and x represents additional
parameters. The characteristics of the interference distribution are approximated
by using a simulation model. The gains of the transmitted powers in a random
frequency hopping network were modeled by the path loss, shadow fading and
multipath fading. Thermal noise was also included in the model. The results
are found in Figure 8.1, from which we conclude that it is reasonable to model
the interference as Gaussian. This result proved to be relatively independent not
only of network specific parameters such as cell radius and reuse, but also of the
distribution of the transmitted powers. Most probably, there are more accurate
8.1 Modeling
167
models, but the issue is essentially to find a model that is good enough to serve
the purpose of modeling the interference for estimation. The conclusion is that the
300
250
200
150
100
50
0
120
115
110
105
100
Interference (dB)
95
90
85
8.1.2
Measurements
168
Nonlinear Estimation
In general it is not possible to get simple analytical expressions for these functions.
However, point-mass approximations can be obtained from simulations for each
point in a grid covering the interesting parameter space. Consider GSM and define
this grid as in Figure 8.2, where the grid resolution is a trade-off between computer
capacity and accuracy. The range of the grid has to cover all possible values in
all directions. The estimator is assumed to operate in a system employing power
control. Therefore it is more efficient to parameterize the grid in C mI instead
of mI , since the power control will result in less variations in the former. The
grid utilized in this chapter is characterized by the parameters in Table 8.1 More
Range, C-direction
Range, C mI -direction
Range, I -direction
Resolution
68 dB
30 dB
10 dB
0.5 dB
C mI
169
Given a point (i.e., a set of parameter values), C- and I-sequences can be generated, from which the measurement report can be formed using models of the
modulation and coding. Monte-Carlo simulations yield point-mass approximations
of the probability functions as described more detailed in the algorithm below
for the case of RXQUAL. The resulting probability function is depicted in Figure 8.3. The corresponding procedure can be applied when forming the probability
function of RXLEV. Note that these tedious computations are made once and for
all.
Algorithm 8.1 (Point-mass Approximation of the RXQUAL Probability Function)
1. Define a grid covering the interesting parameter space as in Figure 8.2.
2. For each point k in the grid corresponding to [C (k) , mI (k) , I (k) ], generate
an I-sequence I (k) N(mI (k) , I (k) ) over 104 bursts (GSM, 1994).
3. Compile a SIR-sequence (k) = C (k) I (k) .
4. Use link models (Olofsson, 1997) of the modulation and coding to compute
the Bit Error Probability (BEP) for each burst.
5. Generate Bit Errors Bin(x, BEP), where x represents the number of considered bits per burst, i.e., the 26 bits in the training sequence. Moreover,
compute the Bit Error Rate (BER).
6. Compute RXQUAL using the GSM specification (GSM, 1994).
7. Repeat the process N times (Monte-Carlo) for each point k.
8. Return to 2. and repeat the process for the next point k + 1.
8.2
The estimator can be constructed in numerous ways, but we have chosen a Maximum Likelihood (ML) estimator (Lehmann, 1991; Ljung, 1999), since it successfully enables data fusion and is an implementationally simple algorithm. However,
it involves some demanding computations, which might be an important issue.
The method of ML estimation is based on a simple idea. Different probability
density functions generate different data samples and any given data sample is
more likely to have come from a particular distribution than from others. The
basic ideas will be illustrated by the following example.
8.2.1
A Simple Example
1 x/
e
30
20
10
P (RXQUAL = 4)
C mI
1.0
0.5
0.0
0
30
10
10
C mI
1.0
0.5
0.0
0
30
10
10
C mI
1.0
0.5
0.0
0
10
10
C mI
10
10
C mI
1.0
0.5
0.0
0
30
20
10
10
C mI
1.0
0.5
0.0
0
30
20
10
30
20
30
20
20
1.0
0.5
0.0
0
20
P (RXQUAL = 6)
10
P (RXQUAL = 3)
P (RXQUAL = 2)
P (RXQUAL = 5)
P (RXQUAL = 7)
1.0
0.5
0.0
0
P (RXQUAL = 1)
Nonlinear Estimation
P (RXQUAL = 0)
170
10
C mI
1.0
0.5
0.0
0
30
20
10
10
C mI
Figure 8.3 The probabilities that different RXQUAL values are measured,
for different values of C, mI and I .
Let the true value be = 5. Assume that a measurement x1 = 4.3 has been
observed. In order to estimate , we form the likelihood function
l1 () = fX (x1 ; ) =
1 x1 /
e
computed for a number of grid points covering the interesting values of , see
Figure 8.4a. The natural -estimate is the value maximizing this function. When
observing a second measurement (x2 = 12.1), the procedure could be repeated
analogously as in Figure 8.4b. Even better is to utilize both measurements using
the joint likelihood function, defined as the product of the two likelihood functions.
The improvements of the estimate are illustrated in Figures 8.4c-d. Numerically,
it may be more appealing to use logarithmic values. Then the joint likelihood can
171
b. f (x2 ; )
a. f (x1 ; )
10
c. f (x1 ; )f (x2 ; )
d. f (x1 ; ) . . . f (x5 ; )
10
10
10
Figure 8.4 The different likelihood functions in the simple example in section 8.2.1.
be defined as
log lt () =
t
X
log fX (xi ; )
i=1
8.2.2
Adaptive Estimation
This far a fixed parameter has been assumed. In a real situation, however, the
parameter may be time-varying, and therefore adaptivity is important. This is
introduced by employing exponential forgetting of the joint likelihood function,
which can be implemented by the following recursion
log lt () = (1 ) log fX (xt ; ) + log lt1 ().
The estimate is then obtained as
ML (t) = arg max lt () = arg max log lt ().
172
Nonlinear Estimation
M
Y
(i)
fXi (xt ; ).
i=1
If the probability function is (close to) zero at some grid points for a certain
measurement, the value of the likelihood function will remain (for a while close to)
zero at those points. Consequently, the likelihood function is blocked from growing
at those points, inhibiting the adaptivity to varying parameters. A solution is to
use a threshold value, fmin , and when updating the likelihood use the probability
function
gX (xt ; ) = max{fX (xt ; ), fmin }.
Finally, the parameters may be changing differently fast. The carrier and the
mean interference are typically fast-varying, while, the standard deviation of the
interference is varying more slowly. This is solved by post-filtering the estimates
using exponential filtering (Blom and Gunnarsson, 1998; Gunnarsson et al., 1998d).
with different forgetting factors j
j (t + 1) = (1 j )jML (t + 1) + j j (t).
This procedure is shown to be asymptotically efficient (Gustafsson, 2000; Kushner
and Yang, 1995; Polyak and Juditsky, 1992)
Thus, we propose the following estimation algorithm:
Algorithm 8.2 (Maximum Likelihood Estimation)
Let the measurements at time t, be given by the vector xt , with the corresponding probability function
fX (xt ; ) =
M
Y
(i)
fXi (xt ; ).
i=1
Define gX (xt ; ) by
gX (xt ; ) = max{fX (xt ; ), fmin }.
Update the likelihood function according to
log lt () = (1 ) log gX (xt ; ) + log lt1 (),
with the initial likelihood l0 equal to a Gaussian probability density function.
ML (t) is given by
The estimate
ML (t) = arg max lt ().
8.3
173
Semi-Linear Estimation
This far, complexity has not been an issue, and computations are not seen as costs.
For comparison, it is therefore interesting to design a simple estimation procedure,
where simplicity and computational complexity are main issues. In this section,
we discuss simple algorithms that can be posed as linear regressions. As in the
previous, the focus is on GSM with frequency hopping.
The probability functions of the measurements are modeled in Section 8.1. A
measurement report could be seen as outputs from two functions returning realizations of stochastic variables.
RXLEV : x(1) = h1 (C, mI , I )
RXQUAL : x(2) = h2 (C, mI , I ) .
Furthermore, a natural assumption is that RXQUAL is primarily related to SIR
and that RXLEV is related the total received power. Hence (with some abuse of
notation)
I )) = h1 (C + 10 log(1 + m
I /C))
(8.1a)
RXLEV : x(1) = h1 (10 log(C + m
RXQUAL : x(2) = h2 (C mI ) = h2 ().
(8.1b)
The relation between RXQUAL and SIR is static However, the SIR values are
correlated via the power gain correlations. It is thus natural to model this relation
using an AR-model
A(q)(t) = RXQU AL(t) + (t)
A(q) = 1 + a1 q 1 + . . . + ana q na
Even simpler is to approximate this model with an FIR-model, given by the following linear recursion
(t) =b0 + b1 RXQUAL(t) + . . . + bnb RXQUAL(t nb ) + (t) =
=[1, RXQUAL(t), RXQUAL(t nb )] [b0 , b1 , . . . , bnb ]T + (t) =
=T (t)b + (t).
(8.2)
The model error is thus represented by (t). RXQUAL and SIR data (identification data) is obtained from a simulation model (where the true SIR is known).
These N data points are used to find the parameter vector b that minimizes the
quadratic criterion
N 1
2
1 X
(t) T (t)b .
VN ( b ) =
2N t=0
(8.3)
Thus, the optimal vector is given by the least-squares estimate (Ljung, 1999), which
is the solution to the linear equation
#
" N 1
N 1
1 X
1 X
T
(t) (t) =
(t)(t).
N t=0
N t=0
174
Nonlinear Estimation
The remaining design parameter is the model order nb . Consider a new data
set (validation data), also obtained from simulations. Then the model order is
chosen as the parameter value that minimizes the criterion in (8.3) considering the
validation data. The results from the validation are summarized in Table 8.2.
According to the GSM standard (see Appendix 8.A), RXLEV is a linear function
of the receiver signal power level (RSL)
RSL = 133.5 + RXLEV [dB].
Using (8.1a) and given a SIR estimate, (linear scale), a reasonable C-estimate is
given by
C = RSL 10 log(1 + 1/
) = 133.5 + RXLEV 10 log(1 + 1/ ) [dB].
(8.4)
The corresponding fit with respect to the validation data is found in Table 8.2. As
a first comparison, the fit when using the nonlinear estimation procedure, is also
included. A more thorough comparison is provided in Section 8.4. From the table
we conclude that model order nb = 4 results in the best fit.
Std{ }
Std{C C}
nb = 1
2.99
0.825
Linear Recursion
nb = 2 nb = 3 nb = 4
2.31
2.18
2.12
0.810
0.809
0.808
nb = 5
2.24
0.810
Nonlinear
1.73
0.304
Table 8.2 The root mean squared error when employing the linear recursion of different model order to the validation data. For comparison, the nonlinear estimation procedure is also included.
8.4
Simulations
8.4.1
Step responses of linear systems provide valuable insight in how fast the system
adapts to abruptly changing inputs. Similarly, it is interesting to study the adaptivity of the proposed estimation procedure, when subject to an abrupt change of
8.4 Simulations
175
0
0.5
1
1.5
2
2.5
3
3.5
4
30
25
90
20
95
15
100
10
105
C mI
110
the mean interference. Such a situation may arise, when new users are admitted to
the network, or when a user is allowed to use a higher data rate (i.e., a higher target
SIR and a higher transmission power). As concluded in Section 8.1, we consider
the following measurements and parameters
x =
(RXLEV, RXQUAL)T
(C, mI , I )T .
All parameters are fixed except mI which changes abruptly. In this case, the
simulator is only used to generate a sequence of measurement reports, which are
fed to the estimator. The estimation procedure is illustrated by the snapshot of
the likelihood at time t in Figure 8.5. As seen in the figure, the estimates are
given by the values corresponding the the peak value of the likelihood. When
subject to the abrupt interference step, the estimator adapts to the new situation.
Figure 8.6 illustrates the adaption of the likelihood function at time instants before
and after the step. Resulting parameter tracking is visualized in Figure 8.7. Note
the relations between the performance and the slope of the likelihood. The steeper
the slope, the better the accuracy.
8.4.2
Run-time Estimation
The normal situation is that the desired signal power C and mean interference
mI are subject to fast variations due to shadow and multipath fading, see St
uber
(1996). The measurement reports in Figure 8.8a,b are obtained from network simulations. These are fed to the estimator and the estimated parameters are compared
to the true values, see Figure 8.8c,d. When evaluating the overall performance, sev-
176
Nonlinear Estimation
C mI
C mI
C mI
C mI
Figure 8.6 The shape and summit position of the likelihood function
change, when the value of mI change abruptly. The maximum
of this function is seen to move in the (C mI )-direction. The
I direction has been eliminated by selecting the true value.
eral connections have to be considered. In the sample case above there are in total
190 calls of different durations (from 15 to 170 seconds) established during the
simulation. Then it is natural to use the root mean squared (RMS) error over all
times and calls for performance evaluation of the estimator. To allow for a burn-in
phase of the estimator, the first 5 seconds (Nb = 10 samples) of each call were not
considered in the RMS errors. Furthermore, only calls longer than 20 seconds were
considered, leaving M =188 calls for RMS error computations. The RMS error of
where Ni is the duration of the call i. The absolute value of the RMS errors are
not informative unless related to parameter variations. This is addressed by the
RMS deflection of the parameters from their average value. Desired signal power
RMS deflection is obtained as
v
u
i 1
u 1 1 NX
2
C(t) Ci (t) ,
RMSCC = t
M Ni t=0
where Ci (t) is the average desired signal power during call i. For good performance
it is desirable to obtain small RMS errors compared to the expected variations, described by the RMS deflection from the average value. The results are summarized
in Table 8.3. We note that the estimation of the desired signal power C is very
accurate, which is in accordance with the slope discussion related to Figure 8.5.
8.5 Summary
177
a.
b.
7
6
5
4
3
2
1
0
35
34
33
32
0
c.
36
10
20
30
d.
98
99
10
20
30
10
20
30
10
20
30
105
110
100
115
101
102
e.
10
20
120
30
f.
20
10
15
5
10
5
10
20
30
Moreover, we get acceptable accuracy for the SIR and interference mean estimations. Unfortunately, the I estimates are not as good.
8.5
Summary
In this chapter the focus is on estimation in cellular radio systems based only
on the signals that are readily available. Previous work has demonstrated very
good performance relying on analog measurement. In a real system most of the
information is lost due to quantization and sampling at a rate that might be as
low as 2 Hz (GSM case). Therefore a different approach is required and for that
matter a Maximum Likelihood Estimator has been designed and exemplified in the
case of GSM. In addition, a (mainly) linear estimator is designed for comparison.
The ML estimator need probability functions of the measurements, which cannot be described analytically. Instead point-mass approximations can be obtained
from Monte-Carlo simulations for each point in a grid covering the interesting
parameter space. The adaption rate of the estimator is parameterized by a forgetting factor, and represents the trade-off between adaptivity and noise reduction.
Similarly, parameters varying at different rates can be tracked individually using
post-filtering with individual forgetting factors.
Simulations illustrate that it is possible to extract the parameters despite coar-
178
a.
Nonlinear Estimation
c.
30
6
20
5
4
10
3
2
0
1
0
0
b.
10
15
20
25
30
35
40
45
10
50
d.
22
20
10
15
20
10
15
20
25
30
35
40
45
50
25
30
35
40
45
50
115
120
18
125
16
130
14
135
12
0
10
15
20
25
30
35
40
45
50
140
t [s]
t [s]
Parameter
Average RMS error
Average RMS error (LR)
Average RMS deflection
C
0.30 [dB]
1.0 [dB]
5.1 [dB]
m
I
1.7 [dB]
2.0 [dB]
3.9 [dB]
= C m
I
1.7 [dB]
2.1 [dB]
5.0 [dB]
I
2.0 [dB]
1.5 [dB]
Table 8.3 Performance evaluation of the estimator. The first and second
rows describes the average estimation errors when using the proposed estimator and linear estimator respectively. For comparison, the corresponding average deflections from mean values are
included.
sely quantized measurements. The performance is good compared to typical parameter variations, both when the parameters are varying slowly, and when subject
to fast variations as in realistic cases.
The algorithm is ready for implementation in a second generation wireless system. The only component that needs to be updated is the software in the base
stations, where the output powers are computed. However, this estimation method
is general, and could be applied in a third generation wireless system as well.
Appendix
8.A
In this appendix, we provide some facts about the measurements in GSM which
are relevant for this chapter. For further information, see (Steele, 1992, chap. 8)
and (GSM, 1994).
Every 480 ms, a measurement report is sent from the receiver to the control
mechanism in the connected base station. This report comprises:
Received signal strength, RXLEV.
Perceived transmission quality, RXQUAL.
Other information is also included, but of no value for estimation. We consider the
other information to be important only for the purpose of handover.
RXQUAL
The received signal quality, RXQUAL, is formed by estimating the bit error rate
before channel decoding, using metrics from the channel equalizer and/or the decoder. Eight values of RXQUAL span the range according to Table 8.4.
BER interval
< 0.2%
0.2% to 0.4%
0.4% to 0.8%
0.8% to 1.6%
1.6% to 3.2%
3.2% to 6.4%
6.4% to 12.8%
> 12.8%
RXQUAL
0
1
2
3
4
5
6
7
Table 8.4 The relation between bit error rates and RXQUAL.
179
180
Nonlinear Estimation
RXLEV
RXLEV is a measure of the Received Signal Level (RSL). It takes values in the
range 0 to 63, where RXLEV = 0 if the received signal level is less than -103 dBm,
RXLEV = 1 if -103 dBm RSL < -102 dBm,..., RXLEV = 63 if RSL > -41 dBm.
9
Outer Loop Control
In the preceeding chapters, power control has been considered as a means to meet
provided target values. A popular strategy is to issue transmission powers to meet a
target signal-to-interference ratio (SIR) at each receiver. The problem is, however,
to assign a relevant target SIR. In systems based on CDMA, it is well established
that the power control implementation is based on a cascade structure, where an
inner loop adjust the power in order to track a target value provided regularly by an
outer loop (see e.g., Viterbi, 1995, and Chapter 4). This organization is beneficial
in systems based on TDMA/FDMA/CDMA and combinations as well.
9.1
Introduction
The motivation for the outer loop is that SIR is not necessarily well correlated to
quality. Instead the percentage of lost bits and frames is more relevant, since the
effect of modulation, coding and interleaving is included. Therefore, the outer loop
provides a SIR target so that Bit Error Rate (BER) and/or Frame Erasure Rate
(FER) (these concepts are defined in Section 9.2.2) remain below some threshold.
The work on outer loops to date are mainly focused towards CDMA systems. In
(Sampath et al., 1997) the SIR target is decreased step-wise while no frames are
corrupted, and increased by a larger step when a corrupted frame is received. According to Won et al. (1998), this type of scheme results in capacity improvements
of up to 25% compared to using a fixed SIR target that meets the worst case. One
181
182
problem is that since a low FER is desirable, the time constants of the controller
should be large in order to get reasonable statistics. Kawai et al. (1999) propose a
technique, where the relations between FER and BER after decoding are utilized in
order to speed up the control. Another way of speeding up the control is to model
the frame erasure distribution with respect to relevant parameters, and instead use
the estimated parameters for control. This is the approach used in this work. The
subjective matter of perceived quality in cellular radio systems is the subject of
Section 9.2. The discussion ranges from theoretical models to practical measures.
In GSM, the Frame Erasure Ratio is one of the more relevant quality measures,
and it is utilized in the quality mapping-technique introduced in Section 9.3. This
work is reported in more detail in (Blom and Gunnarsson, 1998).
For completeness, the approach in (Almgren et al., 1994; Yates et al., 1997)
should also be discussed. The authors propose a different inner loop, where users
that can do with a low power are allowed to aim at a higher SIR target and vice
versa. Here, the inner loop is assumed to adjust transmission powers to track a
provided target SIR. However, the same effect can instead be obtained by adapting
the target SIR in the outer control loop as described in Section 9.4. Furthermore,
there might be situations that need specific actions. Together with a target value
tracking inner loop, this type of reasoning is naturally incorporated in the outer
loop.
The impact of using an outer loop to adapt target values is briefly studied in a
specific simulation situation in Section 9.5. Related network simulations are found
in Chapter 10. Throughout the chapter, the focus is on a specific user. Therefore,
the index i is dropped for clarity.
9.2
The concept of Quality of Service naturally depend on the type of service and
its corresponding quality requirements. Some services are reliable in the sense
that they never loose data, while others in the sense that they provide very low
transmission delay. Often one differs between connection-oriented services and
connection-less services (Tanenbaum, 1996). In the former, a low delay is the first
priority, and that category include speech and video services. The latter use data
acknowledgment so that the sender is aware of successful transmission. After a
specific time without acknowledgment, the data is resent.
The focus in this and the next section are on speech services. There is a wide
range of quality measures in cellular radio systems, ranging from speech quality
measures, which try to describe how a listener experience the quality, to more easily
measured quantities, which are defined in terms of bit errors, etc.
9.2.1
183
9.2.2
Speech quality measures are the most sophisticated quality measures for voice
communication, since they describe the properties of the actual speech waveform
reaching the listener. However, in practice it is unusual that these are used as
quality measures from a power control point of view, and therefore we will discuss
other more common measures.
The simplest and most usual quality measure is the signal-to-interference ratio,
SIR. This is defined in terms of the properties of the radio wave, before entering
the receiver, see Figure 9.1. The main reason for using SIR as quality measure is
that it is directly related to the carrier power, which we can control. The result is a
184
framework for power control where theoretical calculations can be done. Usually a
SIR which is above 10 dB is considered to correspond to good quality, and a smaller
SIR to poor quality. Due to the modulation and coding techniques, it is argued
that this is a threshold in the sense that the quality quickly becomes poor when
below this value, and increasing it above this level will not improve the quality
significantly.
Transmitter
Message
Source
Encoder
Channel
Encoder
Modulation
Receiver
Estimated
Message
Channel
Decoder
Source
Decoder
Speech Quality
FER
Demodulation
BER
Figure 9.1 Different quality measures, and where they can be measured in
a digital communication system.
The next quality measure we address is the Bit Error Rate (BER). It can be
measured after the demodulator, and is defined as the average number of bits which
are erroneous as compared with the original bits entering the modulator. The actual
measurement is possible since some of transmitted bits are fixed beforehand (a.k.a.
training sequence), and therefore already known at the receiver. If the carrier and
interference signal powers are constant, the BEP will be a function of the SIR, and
in this case they contain the equivalent information about the quality. However,
in reality the SIR is time variant, and thus the average SIR will not correspond to
the average BER, and in this sense BER is a better quality measure.
The purpose of the channel coding is to try to remove some (or all) of the bit
errors which have occured during the transmission. Depending on the design of the
channel encoder, the speech quality degradation will be more or less severe. After
the channel decoder, the next quality measure is defined. Here we could define a
quality measure similar to the bit error rate, by considering individual bits after the
decoding. However, we define a frame as the bits over which the coding is applied,
and assume that a frame will either be fully restored or completely useless. Then
the Frame Erasure Rate (FER) can be defined as the average number of frames
which are useless. As discussed before, the speech quality is the most appropriate
quality measure of a speech service, and this is obtained by comparing the original
speech waveform with the final. It can be noted that the source coder will try to
represent the speech with as few bits as possible without loosing too much quality.
185
Therefore the estimated message will not be the same as the original even if no
interference would be present over the channel. Furthermore, if some of the bits in
the output from the source encoder are erroneous when entering the source decoder,
the speech quality degradation is strongly depending on how the encoder/decoder
has been designed. In order to use speech quality for control, we must have a model
describing how the source encoder/decoder is working.
To summarize, we have discussed different quality measures in a digital communication system, and how they are related to the functionality of the transmitter and receiver. By building models of the source encoder/decoder, channel
encoder/decoder and the modulation/demodulation procedures, more and more
adequate measures are produced, see Figure 9.2. The price for this is that we have
to put in more knowledge about the system, and the complexity of the algorithms
will increase.
SIR
Model 1
BER
Model 2
FER
Model 3
Speech Quality
9.2.3
Example: GSM
For the mobile station user, the speech quality will in general get worse the more
data bits that are lost during the transmission. The speech quality is affected not
only by the fraction of bits that are erroneous, but also by the distribution of lost
bits over time.
We need to understand how the bits are arranged when transmitted over the
physical channel, see Figure 9.3. After the speech coding has been performed, the
resulting bits are divided into frames, with each frame corresponding to 20 ms of
speech. In the first step coding is performed, resulting in 456 bits for each frame.
Furthermore, the bits are permuted, which is referred to as first order interleaving.
Next, the second order interleaving splits the coded frame into 8 sets, each
containing 57 bits. Each of these sets is then mapped onto a burst, which is the
data from a certain user sent during one time slot. Thus the data from one speech
frame is separated on the channel. This implies that the information from one bit
in the original frame has been spread over different time instants on the channel.
Note that information from two different frames are mapped onto the same burst,
and therefore each burst contains 114 information bits. In practice the number of
bits in a burst is 156.25, since extra bits have been added to provide for proper
equalization and synchronization.
186
Frame A
Frame B
Frame C
Frame D
57
57
57
57
57
57
57
Mapping on bursts
A
TDMA frames
Figure 9.3 The mapping of speech frames onto the physical channel.
It is also interesting to reflect over the different time scales. A typical distance
between multipath fades is about 0.15 m (half a wavelength) in GSM (Mehrotra,
1994). This can be compared to the distance a vehicle can travel during a burst.
Each burst is transmitted during 0.577 ms. Assuming that the vehicle travels
with 30 m/s, this would correspond to a distance of 0.577 103 30 0.017 m.
Thus, as a good approximation, the carrier can be regarded as constant during
the burst. During the 20 ms, which the speech frame is sent over, there will be a
considerable variation, since the same vehicle will travel 0.60 m during this time,
which corresponds to several fades. Since the information from one frame is spread
over this time interval on the channel, time diversity will be obtained. If frequency
hopping is used interferer diversity will also be obtained.
From SIR to Bit Error Probability
It is the SIR value during the burst, which gives a certain bit error probability
(BEP). It is important to notice the difference between BEP and BER. The former means the probability to get a bit error for a certain bit, while the latter is a
stochastic variable. In a received sequence of N bits with corresponding bit error
probability, BEP, the number of erroneous bits is a realization of the stochastic
variable X Bi(N, BEP). Furthermore, BER is equivalent to the stochastic variable N1 X. As argued in the previous section the SIR during a burst can be regarded
as constant. As a consequence, the probability for bit error during a burst, Pb , is
187
a function of the SIR during that burst. For a typical result see (Olofsson, 1997)
and Figure 9.4
0
10
Pb
10
10
10
10
SIR [dB]
10
Figure 9.4 Uncoded performance for a GSM channel. A certain SIR for a
burst results in a certain bit error probability for that burst.
This plot has been generated by simulations for the case of two interferers. If
the number of interferers was not equal to two, we would obtain a different function, since the demodulation performance is not only depending on the interference
power, but also on the interference characteristics. However, more interferers would
not significally change the bit error probability function. A more accurate BEP
vs. SIR function could be produced based on a similar simulation by modeling the
number of interferers as a stochastic variable. Usually the number of interferers
responsible for the main contribution of the interference is quite small. Therefore,
the two-interferer situation constitute a relevant good approximation. This is the
starting point for the rest of the discussion.
In GSM, RXQUAL is the quality related measure that is readily available. It
is based on estimated BER as discussed in Section 7A.
From Bit Error Probability to Bit Error Parameters
The frames are considered to either be fully restored or completely useless after
applying the error correcting codes. The probability that the frame is useless is
called the frame erasure probability (FEP). Note that we distinguish between FER
and FEP, just as we did for BER and BEP.
188
This section follows Olofsson (1997); Olofsson et al. (1997) closely. Denote the
bit error probability at burst i by Pbi , i = 1, . . . n, where n is the number of bursts
the frame is spread over, i.e. n = 8 in GSM. The number of bits in a burst is
denoted by k, which is 114 in GSM. Since the number of bit errors during a burst
is binomially distributed, the stochastic variable Xi denoting the BER for burst i
will fulfill
kXi
E[Xi ] =
Bin(k, Pbi )
Pbi
1
Pbi (1 Pbi )
k
V [Xi ] =
Next, define
M
1X
Xi
n i=1
S2
1 X
(Xi M )2
n 1 i=1
and BER and sBER as the corresponding expectation values, which can be shown
(Olofsson, 1997) to be related to Pbi as
BER = E(M ) =
1X
Pbi
n i=1
(9.1a)
s2BER = E(S 2 ) =
n
n
1 X
1 X
Pbi (1 Pbi ) +
(Pbi BER )2
nk i=1
n 1 i=1
(9.1b)
These parameters will now be used for estimating the frame erasure probability.
From Bit Error Parameters to Frame Erasure Rate
For GSM, FEP will in general be a function of Pbi , i = 1, . . . , 8. However, we will
make the simplifying assumption (Olofsson, 1997) that FEP is only a function of
BER and sBER .
F EP = f (Pb1 , Pb2 , . . . , Pb8 ) g(BER , sBER )
By using a model of the channel encoding/decoding process in Figure 9.1, it is
possible to estimate the frame erasure probability from these parameters, i.e. the
function g, discussed above. In Figure 9.5 the probability for a frame erasure is
shown as a function of BER and sBER . Note that this plot contains some points
which can never occur in practice, for instance when BER = 0, s2BER must also
be zero. These have been replaced by a zero value. The plot describes the ability
of the interleaving and error correcting codes to restore the frame in the presence
of bit errors.
189
FEP
0.8
0.6
0.4
0.2
0
0.3
0.25
0.4
0.2
0.3
0.15
0.2
0.1
0.1
0.05
sBER
BER
Figure 9.5 FER performance for the GSM full rate speech channel as a
function of bit error characteristics.
190
9.3
Quality Mapping
The need for a model in control highly depends on the time constants of the system
to be controlled. If the effect of the control signal is rapidly reflected in the system
output, the output itself may be informative enough to control the system. The
perceived quality in cellular systems is indeed slowly varying, and therefore the
quality models derived in Section 9.3.1 are adequate. The parameter ranges in the
point-mass approximations are discussed in 9.3.2, and the use of the models for
outer-loop control of target SIR is outlined in 9.3.3.
9.3.1
Modeling
Similar to the discussion in Section 8.1, the quality function is modeled as a probability function, H, depending on the desired signal power and the interference
characteristics. In the GSM example, it is relevant to parameterize this function
using = C mI and I .
H = H(, I )
The procedure described in Section 8.1.2 together with the procedure in Section 9.2.3 can be used to form a point-mass approximation relating FER to the
estimated parameters. The result is provided in Figure 9.6, from which we conclude
that the mean SIR does not fully describe FER. It is dependent of the interference standard deviation as well. Moreover, it is depending on the coding scheme
and modulation employed. Thus when different coding modes are applied during the lifetime of the connection (rate adaption, see Section 9.4.2), corresponding
point-mass approximations can be formed for each mode.
FER
0.8
0.6
0.4
0.2
10
0
10
8
5
6
0
5
10
15
20
[dB]
I [dB]
Figure 9.6 The relations of FER and the estimated parameters = CmI
and I .
9.3.2
191
The objectives of the outer loop is to issue target values for the inner loop to track,
in order to meet a specified quality level, z t with respect to the quality measure z.
In GSM, it is relevant to use FER as the quality measure z. The requirement is
met if
H(, I ) z t .
(9.2)
The probability function H(, ) was defined and modeled in Section 9.3.1. It has
been assumed (without loss of generality) that a lower value of z corresponds to
better quality.
In the grid of the corresponding point-mass approximation, SIR is restricted to
values in the specified set 1 , . . . , r , which are assumed sorted in ascending order.
The grid is similar in the I -direction. The quality function computed in Section 9.3.1 can be used to determine if the chosen grid provides sufficiently coverage
of the parameter space in the -direction. The maximum considered SIR (r ) has
to correspond to a quality level that is less than the specified quality, otherwise we
can not expect to find an appropriate SIR target, meeting this specification. More
formally. let = r be fixed and search over the rest of the grid for the maximum,
z0 , of the quality function
z0 = max {H(r , I )}
This process is illustrated for GSM in Figure 9.7. If the specified quality, z t , is less
F ER
0.8
0.6
z0
0.4
0.2
10
0
5
8
6
0
4
5
10
C mI
15
Figure 9.7 The FER plot can be used to find the least quality value that
can be specified, z0 , by a search along the maximum considered
SIR ( = r ) in the grid.
than z0 the grid has to be expanded to include higher values of .
192
9.3.3
Implementation
(k)
is thus given by
t = H 1 (I , z t ).
(k)
(9.3)
i
(k)
(I )
= jk
(9.4b)
For clarity, consider the following example. Assume that some H is approximated
in a specific grid point (k) by the values in Figure 9.8. Then the corresponding
target SIR for this grid point is given by the encircled value. By repeating the
procedure for each grid point, the look-up table is formed.
(k)
H(i , I
zt
10
12
14
16
18
Figure 9.8 The quality function might vary around the specified value in
the general case. Therefore we have to make sure to pick the
first value after the last intersection as indicated in the figure.
The result of this procedure is a look-up table, that relates the measured or
estimated interference standard deviation I to a t . Interpolation may be used
193
when the parameters do not fit the grid perfectly, which most likely will be the
case.
In the frequency hopping GSM example, it is reasonable to specify (McGregor ,
editor)
z t = FERt = 0.02.
As seen in Figure 9.6, the quality function H is monotonically decreasing in the
SIR direction. Thus, the procedure in (9.3) is applicable. (The procedure in (9.4)
would yield the same result.) The corresponding look-up table is thus given by
t = H 1 (
I , 0.02).
This is essentially the level curve of the plot in Figure 9.6 for z t = FERt = 0.02.
Target SIR as a function of the estimated interference standard deviation is illustrated in Figure 9.9.
15
14
13
12
11
10
10
9.4
Some situations may require special control actions. In order to use a target tracking device in the inner loop, these actions may be realized by modifying the target
194
SIR:s provided to the inner loop. In this section, we describe different algorithms
realized in the outer loop. The common framework is that the actual target SIR
provided by the outer loop is a function of a nominal target SIR, t , and other
relevant parameters. The nominal target SIR is possibly constant and predefined
or adapted by a separate mechanism, such as the Quality Mapper described in the
previous section. The actual target SIR is thus given by
t = f (
t , ),
where f is a procedure as described in the sections below.
9.4.1
Fading Margins
When the bandwidth of the power control algorithm (see Section 6.4) is insufficient
to track the varying environment, the perceived quality is hampered. Typically,
the algorithm can mitigate shadowing effects, but not fast fading or multipath. To
improve the performance, a fading margin bias may be employed (Andersin and
Rosberg, 1996; Blom and Gunnarsson, 1998, and Section 6.4) as
t = t + bias .
(9.5)
The design of the fading margin is essentially a trade-off between performance and
capacity. A high fading margin improves the performance, but increase the overall
interference in the system. Thereby, the capacity is reduced, and vice versa.
9.4.2
Rate Adaption
9.4.3
195
A related approach is discussed in (Almgren et al., 1994; Yates et al., 1997), where
the quality requirements are adapted based on the current power level. Thereby,
a user with bad quality is prevented from disturbing others, since lower quality
requirements are enforced instead of enabling increased transmission power. Equation (5.6) yield the following formulation of the algorithm
pi (t + 1) = pi (t) + ((c
1
pi (t)) i (t)).
(9.6)
where and c are design parameters. Below, we discuss three different design
approaches:
1. A natural choice of c emanates from the statement (Almgren, 2000) that a
connection is allowed to use maximal power pmax , if perfectly matching the
quality requirement SIR=0 . Consider a connection using maximal power
while exactly achieving the quality requirement. Equation (9.6)
pmax = pmax + (c 0 )
1
1
pmax + 0
c =
196
1
pi (nk),
where is the step size of the inner control loop. The design parameter 0
may be chosen as in the two previous approaches. Furthermore, we possibly
use information from the base station, which can regularly be transmitted
using available outer loop protocols.
One important conclusion is that with this slower AAW-adaption, the stability
results in Chapter 7 apply.
9.4.4
In some systems it may not be plausible to design one inner loop that is relevant in
all situations. For instance, it may be desirable to utilize more aggressive control
actions when the system load is low (see Section 6.7), and soft dropping power
control when the load is high. Depending on the situation, the outer loop switches
between the different controllers. Then it is important to update the internal
states of the idle controllers, to obtain bumpless transfer when switching between
controllers. See also Section 6.6. Some of these switching philosophies may be
implemented in the outer loop, as illustrated in the following section.
9.4.5
When the system load is low, the interference experienced by each user consists
basically of thermal noise. The target tracking of the inner loop will result in very
low powers, which might seem naive, since few others are disturbed by a higher
power (Almgren, 2000). However, when new users are admitted, the interference is
increased abruptly, resulting in bad quality until the controllers have adapted. In
this situation when literally now users are disturbed by others, it may be justified
to aim at a higher target SIR and better quality.
Using the estimated mean interference, different target SIR:s can be assigned,
for instance by adapting the fading margin in Equation (9.5). A possible implementation is illustrated by the look-up table in Figure 9.10
9.5
Simulations
Outer loop control is most naturally studied in network simulations in Chapter 10.
Further simulations are also provided in (Blom and Gunnarsson, 1998). Therefore,
we only consider a single example of stating priorities in the outer loop. Further
details on the simulation environment is provided in Section 10.3.
In a specific situation, the load of the system is only 10 %. Then, the system
is essentially disturbance limited and the interference consists basically of thermal
9.6 Summary
197
Bias, bias
l
Il
Iu
Average Interference, mI
Figure 9.10 A possible implementation of fading margin adaption to improve the quality under favorable conditions.
noise. Low powers are sufficient to provide acceptable connections, and low powers
are used if employing an integrating inner loop with fixed target SIR. After about
14 s new users are admitted, resulting in increased interference. By using the mean
interference to adapt the fading margin as in Figure 9.10, the users are better
prepared to meet the increase in interference. The situation of a specific user is
illustrated in Figure 9.11. The main incentive for using a lower power is to decrease
system interference (and less important to reduce battery consumption). In this
case, interference to others is slight, and therefore, the benefits of using a higher
power are more emphasized than the drawbacks.
9.6
Summary
The motivation for the outer loop in power control implementations is that SIR
is not necessarily well correlated to quality. The ratio of erasured frames is better correlated to quality, but hard to measure or estimate. Instead, the relation
between the estimated parameters and FER are described using point-mass approximations. This model is used to relate a FER specification and parameter
estimates to a target SIR to the inner control loop. Moreover, it is emphasized
that the inner loop should focus on issuing power commands or power levels to
track a target value provided by the outer loop. Priorities and specific behavior in
certain situations should be reflected in the provided SIR target. This also include
appropriate actions when rate adaption is employed.
198
a.
30
25
20
p
15
10
5
0
10
12
14
16
18
20
12
14
16
18
20
t [s]
b.
10
10
10
10
10
10
10
t [s]
Figure 9.11 The perceived quality over time at a specific receiver given by
a. SIR and b. FER. The horizontal dashed lines corresponds
to = 10 dB and FER = 0.02. After about 14 s, new users
are admitted resulting in increased interference. The dashed
curves corresponds to using the fixed target, and the solid to
prioritizing higher targets when the interference is low.
10
Network Simulations
10.1
Simulations may provide valuable insight into problems and behavior of proposed
solutions and algorithms. However, it is important not to jump the conclusions
from such simulation studies. As most scientists are aware of, simulations only
provide limited and uncertain information and knowledge. Conclusions never go
beyond underlying models. Verification by simulation is always hard to justify. Sir
Karl Popper is not yet outdated in his conclusion: all we know is but a woven web
1 Valuable
simulation technology has been provided by different groups at Ericsson, which therefore are acknowledged. Extensions, simulations and interpretations thereof are solely the
responsibility of the author.
199
200
Network Simulations
of guesses, that while empirical generalizations may not be verifiable, they are, at
least, falsifiable (Magee, 1973).
A typical simulation study includes problem description, modeling, algorithm
development and derivation, implementation and simulation. Of course, there are
numerous tractable paths to employ a study. Therefore, it is hard to compare and
evaluate results from different studies. Rosberg and Zander (1998) addressed the
problematic situation and emphasized the need for reference systems and benchmark examples.
Absolute results depend on models of components in the simulator. It is always
important to separate the modeling of such components from implementation and
simulation. Even if the models are the same, the absolute results depend on implementation, parameter settings etc. Therefore, comparative studies of different
algorithms, which provide relative results, are more valuable.
The early phase of this work, reported in (Blom and Gunnarsson, 1998), was
to some extent a victim of the curse of simulationality2. The objective with the
simulations was essentially to verify or justify ideas and propositions. In this thesis
work, the ideas are well founded in the preceeding chapters, and the objective with
simulations is to illustrate dynamical effects.
10.2
10.2.1
MOSE
reader who fails to see the parallel to the curse of dimensionality has probably underestimated
the dimension of the simulation parameter space.
Frequency reuse
Antennas
Cell radius
Cell layout
Path-loss exponent
Shadow fading std.dev.
Shadow fading corr. dist.
Rayl. fading, avg. gain
Time delays:
Power output delay
Measurement delay
201
K=1
Omnidirectional
1000 m
8 8 cells,
employing wrap around
= 3.5
s = 6 dB
d = 100 m
0 dB
np = 1
nm = 0
10.2.2
Example 5.1 illustrates the problematic effects of time delays in dynamical systems.
It rose a number of questions and thereby served as a motivation for the local loop
analysis in Chapter 5. Chapter 6 provides local design methods to deal with the
local dynamics. It is interesting to see how these algorithms improve the behavior
reported in Example 5.1
As in the example, we consider a situation where four mobiles are connected to
base stations using the same channel (or frequency spectrum). Initially (at time
instant t = 10), the mobiles are assigned optimal transmission powers corresponding to a target SIR of 12 dB. At time instant t = 0, the same channel is allocated to
a fifth mobile station. The power control problem is feasible both before and after
the fifth mobile entered the frequency spectrum. Furthermore, auto-interference is
omitted, the mobiles are at fixed locations, the G-matrix is fixed and the system
is subject to an additional time delay of one sample (np = 1, nm = 0).
First, we focus on the same algorithms as in Example 5.1, with the difference
that time delay compensation (TDC, see Section 6.2) is employed. The stabilizing
property of TDC is indicated by Figure 10.1a,b. The DPC algorithm now recovers
after the disturbance. It adapts quickly, which is in accordance with its dead-beat
behavior (see Section 6.4). As in the example, the oscillative behavior of FSPC
is only slightly affected by the entering mobile. It is also noteworthy, that the
amplitude of oscillations is significantly less than when not using TDC. This is in
accordance with the describing functions analysis in Section 5.5. For comparison,
the performance, when using the pole-placed PI-controller from Section 10.1, is
depicted in Figure 10.1c.
The simulations also exemplify the stability and convergence results in Chapter 7. Convergence of the DPC algorithm with TDC and the PI controller is proven
202
Network Simulations
a.
16
14
12
10
8
10
b.
10
15
20
25
30
35
40
10
15
20
25
30
35
40
10
15
20
25
30
35
40
16
14
12
10
8
10
c.
16
14
12
10
8
10
t [s]
Figure 10.1 The recovering ability of some central controllers when a new
mobile is allocated to the same channel. This is the same
situation as in Example 5.1. Considered controllers: a. DPC
with TDC, b. FSPC with TDC, c. PI.
in Theorems 7.12 and 7.20 respectively. Furthermore, FSPC with TDC converges
to |it i (t)| (n + 2) = 3, as stated by Theorem 7.14.
10.2.3
203
cc = max
Example 7.5 relates the degree of cross-coupling and to global stability, and the
stability requirements can be expressed as in Figure 7.10. From the example, we
conclude that = 0.46 provide a globally stable controller in this case. In addition,
we consider the rule of thumb provided in Section 7.3.5.
m.
|Gll (eiw )| <
which yield = 0.66. For comparison, we also consider = 0.9, which is locally
stable according to Section 5.3.2. As in the previous section, the entering mobile
starts by using 1 dBW. The recovering ability of each of the three controllers is
depicted in Figure 10.2. First, we again note that local stability does not imply
global stability since the controller with = 0.9 results in an unstable global
system. The controller designed to be globally stable indeed is stable with appealing
performance. However, even though global stability cannot be granted for = 0.66,
it does provide a stable global system in this case. On the other hand, this might
not be the case for every possible situation with the same degree of cross-coupling.
10.2.4
Abrupt changes appear naturally in the cellular radio systems. For example, the
entering mobile in the previous section, is observed as an abrupt increase of the
interference. A similar situation arises when a mobile station starts using a higher
data rate (i.e., aiming at a higher target SIR). Consider the situation in Example 7.4, where a more distant mobile is allocated a significantly lower data rate due
to his less favorable propagation conditions. It is interesting to study the effect on
the system, when the user is upgraded from it = 10 dB to it = 12 dB, which is
the same as the others.
Mobility is modeled as a constant velocity (5 m/s) Manhattan random walk,
i.e., the direction of movement at each sample instant is any of the cardinal points
equally probable. Shadow fading is modeled as in Section 6.1.1, and the sample
interval is Ts = 0.1 s. This is chosen to average out the effect of the fastest
shadow fading frequency components, to emphasize the effect of the upgraded SIR
target. All four mobiles are connected to the same base station in a cell of radius
1000 m, and the processing gain is PG=128. Power control commands are subject
to the additional delay np = 1, nm = 0. Initially, the situation is analogous to
Example 7.4. Then the mobiles start to move, and the fifth mobile is upgraded
after 10 s. Four algorithms are considered:
PI from Section 6.3
204
Network Simulations
a.
i (t) [dB]
40
20
0
20
5
b.
10
15
20
25
30
10
15
20
25
30
10
15
20
25
30
i (t) [dB]
30
20
10
5
c.
i (t) [dB]
30
20
10
5
t [s]
Figure 10.2 The recovering ability, when a new mobile enters the system.
The plots correspond to the use of integrating controllers with
a. = 0.9, b. = 0.66 and c. = 0.46.
10.3
In systems, such as GSM and D-AMPS, there are numerous channels available in
the system. Therefore, dynamic channel allocation plays a more important role.
However, when adding frequency hopping, the critical effect of being allocated a
a.
205
b.
30
20
i (t) [dB]
i (t) [dB]
20
10
0
10
20
30
0
30
10
0
10
20
10
15
30
0
20
t [s]
c.
d.
30
15
20
15
20
30
20
i (t) [dB]
i (t) [dB]
20
10
0
10
20
30
0
10
t [s]
10
0
10
20
10
t [s]
15
20
30
0
10
t [s]
Figure 10.3 The behavior of the system in Example 7.4, when the distant
mobile is upgraded from it = 10 dB to it = 12 dB. In
addition, the terminals are moving, resulting in slow shadow
fading signal powers. Controllers: a. PI, b. DPC with TDC,
c. FSPC, d. FSPC with TDC.
bad channel is averaged out, due to the hopping over several frequencies. In such
a system, coding and frequency hopping aim at mitigating the multipath fading,
while power control aims at compensating for the shadow fading to maintain a
satisfactory SIR level on a slower time scale.
The simulation environment considered here is FH-GSM specific, but generalize to describe the situation of a narrowbanded TDMA system. The simulation
environment is described in more detail in (Olofsson et al., 1997). Essentially, the
objective is to illuminate some characteristic effects in such a system. In FH-GSM,
the measurements are available as measurement reports, and the output powers
are quantized and constrained from above and below. This is relaxed in some of
the simulations, where instead information feedback is assumed, with analog SIR
measurements and any power outputs.
Signal gains are modeled as discussed in Sections 3.3 and 6.1. Shadow fading is
described using the Gudmundson model, and the Clarkes model is used to represent the fast fading correlation in both carrier frequency and spatial deflection (cf.
Figure 3.2). Some of the more important simulation parameters are summarized
in Table 10.2. This yields a cell layout as in Figure 10.7.
The objective with these simulations is primarily to illustrate dynamical ef-
206
Network Simulations
a.
r
L
0.8
0.6
0.4
0.2
0
0
10
12
14
16
18
20
12
14
16
18
20
t [s]
b.
r
L
0.8
0.6
0.4
0.2
0
0
10
Figure 10.4 True (solid) and target (dashed) relative load over time, when
using a. DPC with TDC and b. FSPC with TDC, corresponding to the SIR plots in Figure 10.3b,d.
10.3.1
To study the system level effects of different power control algorithms, it is very instructive to study scatter plots of the desired signal power (C) and the interference
(I) concurrently. Basically, we plot every C-I pair (in dBm) for every user at every
sample instant. For comparison purposes, we consider four central control strategies, described in more detail below. The resulting plots are found in Figures 10.8
Frequency band
No. of carrier freq.
Frequency reuse
Antennas
Cell radius
Cell layout
Adj. channel atten.
Frequency hopping
Path-loss exponent
Shadow fading std.dev.
Shadow fading corr. dist.
Rayl. fading, avg. gain
Control sample interval
Burst time
Mean MS speed
Downlink power
Uplink MS:
Uplink maximum power
Uplink minimum power
Uplink quantization
Time delays:
Power output delay
Measurement delay
207
900 MHz
27
K = 3 or K = 9
Sectorized
1000 m
5 5 clusters of 9 cells,
employing wrap around
-20 dB
Pseudo-random
= 3.5
s = 6 dB
d = 100 m
0 dB
Ts = 0.48 s
0.577 ms
50 km/h
13 dBW (constant)
GSM class 4:
pmax = 3 dBW
pmin = 17 dBW
2 dB
np = 1
nm = 0
and 10.9.
1. Constant powers. When not controlling the powers at all, the two-dimensional C-I-distribution in Figure 10.8a, is approximately normal distributed.
This is natural, the desired signal is essentially described by the shadow fading
power gain, with normal distributed long term statistics (see Section 3.3.2).
Moreover, the normal distribution of the interference is further motivated in
Section 8.1.
2. C-based integrating controller. Controllers aiming at a specific desired
signal power level are exemplified in Section 4.5. One natural example is
the CRP algorithm, which can be seen as an integrator in logarithmic scale.
Figure 10.8b illustrates how the controller compresses the distribution in the
C-direction.
3. SIR-based integrating controller. A SIR-based integrating controller has
a similar effect on the systems, but it compresses the distribution in the C Idirection, see Figure 10.9a. By balancing the SIR:s, less power is needed to
208
Network Simulations
meet the requirements. This is also seen in the figure, since the thermal noise
(at -148 dBW) clearly is a major contribution of the interference. In this
case, all connections strive towards the same t .
4. AAW algorithm. The main idea is to favor good connections that need
relatively small powers to maintain an acceptable SIR level. As disclosed
above, the SIR-based controller strives towards the line C = I + t . AAW,
on the other hand strives towards the line C = I + A, which is indicated
by Figure 10.9b for = 0.7. This is easily seen by considering the converged
situation of the AAW algorithm (cf. Section 5.2.1)
p = p + (c )
Using C = p + g and = C I and simple manipulations yield
(C g)(1 ) = (c (C I))
C = I + g(1 ) + c
|
{z
}
A
All the four strategies probably provide reasonable quality of service to the
users. When power economy is of no concern and the the network is sparsely
planned, using maximal powers is a plausible solution. The SIR-based I-controller
reduces the power consumption, while maintaining an acceptable quality. However,
it is evident that this could be a low interference situation (see Section 9.4.5) to
some users. When the interference level is low, is could be desirable to use a higher
power. Conversely, the algorithm forces connections subject to high interference to
use high power to aim at higher carrier. This behavior is costly for the system.
The C-based I-controller is essentially neglecting high power requirements from
high-interference users, which is desirable from a systems perspective. The obvious
drawback is the algorithm essentially needs interference information, in order to
aim at relevant desired signal power levels.
AAW combine the nice features of C-based and SIR-based integration. Thereby,
users with less favorable propagation conditions receive less priority than others.
This self-regulatory effect of target SIR adaption is rather unpredictable, which is
a drawback. The users that are the most costly to support are found in the upper
right area of the figures. They are subject to considerable interference and thus
requires a high desired signal power. Thus, from a system perspective it is desirable
to force the costly users to aim at lower target SIR:s, and shape the distribution
somewhat like a banana (Almgren, 2000).
In summary, we advocate a SIR-based I-controller with the approach in Section 9.4.3, where the target SIR adaption is considered in an outer loop. As such,
the rate adaption approaches (see Section 9.4.2) incorporate nice features. Since
the rate is adapted to the individual propagation and interference situations, it
may enable all satisfied users with respect to the assigned data rate.
a.
209
30
20
10
10
b.
10
12
14
16
18
20
10
12
14
16
18
20
10
10
10
10
10
10
t [s]
Figure 10.5 Two different quality measures. a) SIR is considered acceptable when above 10 dB. b) FER is acceptable when below
0.02.
10.3.2
Quality Measures
As pointed out in Section 9.2.1, speech quality is very subjective, and it is hard to
find relevant objective measures. One common assumption is that the perceived
quality is dependant only on the SIR, and that is it acceptable if above a certain
threshold. Olofsson (1997) argues that this will not describe the quality satisfactory, and that FER is a more adequate measure.
These measures are depicted for a sample case in Figure 10.5, where the SIR
is considered acceptable when above 10 dB, and FER when below 0.02. The question is whether the user in Figure 10.5 is satisfied or not. A simple measure of
user dissatisfaction is the outage probability P (i ) (Ahlin and Zander, 1998).
Consequently, 1 P (i 0 ) relates to user satisfaction. A similar outage measure
can be defined in terms of FER. Therefore, cumulative distributions of SIR and
FER for all users collectively provide a relevant measure of the user satisfaction in
simulations. These will be used throughout the preceeding sections.
10.3.3
Anti-Reset Windup
In practical systems, the output power is constrained from above and below, which
affects the controller behavior. As pointed out in Section 6.6.1, the internal state of
the controller no longer matches the output. When a constraint becomes active, the
internal state winds up (
Astr
om and Wittenmark, 1997). Section 6.6.1 discusses
appropriate precautions, which are referred to as anti-reset windup. The main
idea is to update the internal state to match the output, which is possible if the
constraints are known.
Figure 10.10 illustrates the difference in performance when using the PI-cont-
210
Network Simulations
roller from Section 6.3.3 with and without anti-reset windup. The problems seem
to be that the controllers assign too low powers, resulting in lower SIR:s. Typically,
windup results in the powers to remain longer than necessary at the lower bound.
10.3.4
Instabilities in linear systems come about as output signals or internal states that
diverge without bounds. In practice, however, signals are always bounded. Instead, instabilities result in fluctuating signals, bounded by the output constraints.
This will be illustrated by the use of the DPC algorithm, subject to time delays.
Anti-reset windup is employed. As disclosed in Section 6.6.1, this is controller is
analogous to the DCPC algorithm (see Section 4.5) when updating the internal
state as fast as possible. Such a configuration is unstable, according to the analysis
in Chapter 5.
Two different dynamic ranges are considered, [3dBW, -17dBW] and [3dBW,
-27dBW] respectively. Figure 10.11 depicts the oscillative output powers of a particular user in the latter dynamic range situation. Such an oscillative behavior
naturally affects the performance. As a stable reference controller, we employ the
PI-controller with anti-reset windup from the previous section.
Corresponding performance is summarized in Figure 10.12. Clearly, the system
level performance is degraded, when using the locally unstable controller. The
reason why the more limited dynamic range provides better performance is that the
oscillations are more restricted in amplitude. The limited dynamic range has little
influence on the performance when using the PI-controller, since the constraints
are mostly not active.
10.3.5
Influence of Estimation
This far, exact measurements provided by the simulator have been used for power
control. With focus on a real system and the actual interfaces, only measurement
reports are available. These reports comprise RXQUAL and RXLEV (see Section 8.1.2). Moreover, the output powers are constrained as in the previous section
and in addition quantized.
A maximum likelihood estimator is designed in Chapter 8 to extract relevant
information from these measurement reports. Section 8.4 addresses the simulator
performance in more detail. The accuracy is relatively good compared to typical
variations in the parameters. It is interesting to see by how much the performance
is degraded when estimated values are used instead of the true ones. As indicated
by Figure 10.13 this degradation is slight Further comparative studies are provided
in (Blom and Gunnarsson, 1998).
10.3.6
Quality Mapping
The main idea with quality mapping (see Section 9.3) is to adapt the target SIR
to correspond statistically to good quality in terms of FER. The objective is to
211
10.4
The main merit of the Fixed Step Power Control (FSPC) algorithm is that only
one bit is needed for control signaling. Thus, it is possible to allow a high power
control update rate, without using a too large a bandwidth. Therefore it is considered as the inner control loop in several DS-CDMA implementations (Chaudhury
et al., 1999; Dahlman et al., 1998; UMTS 30.06, 1997; Viterbi, 1995), where fast
power control is a critical component. In the WCDMA proposal for the third generation systems, FSPC is considered at an update rate on 1500 Hz (power control
commands are sent once per slot). The objective in this section is to illustrate the
dynamical behavior of this inner loop and relate to previous chapters.
The simulator is built around the same core as the environment in the previous
section. In addition, CDMA specific models are added. The simulation environment is further described in (Engstrom and Ericsson, 1999). It will mainly be used
to study the effects of power control command bit errors when using FSPC together with TDC. Related plots are found in Appendix 10.B. Central parameters
are summarized in Table 10.3.
212
Network Simulations
Frequency band
Antennas
Cell radius
Cell layout
Path-loss exponent
Shadow fading std.dev.
Shadow fading corr. dist.
Control sample interval
Mean MS speed
Time delays:
Power output delay
Measurement delay
2 GHz
Sectorized
2000 m
4 sites, each with 3 sectors
= 3.8
s = 8 dB
d = 110 m
Ts = 1/1500 s
5 m/s
np = 1
nm = 0
10.4.1
As discussed in Section 6.2.1, the benefits of TDC will be degraded when subject to
power command bit errors. The closed loop suffers not only from erroneous bits but
also from erroneous adjustments np + nm samples thereafter. Consider an example
where the algorithm is subject to a delay of one sample (cf. Example 5.1 and
Section 10.2.2), and with a command bit error rate of pBER = 0.05. Engstr
om and
Ericsson (1999) concluded that the inner loop successfully tracks the multipath and
the shadow fading for low mobile velocities, but is only capable to track the shadow
fading when the velocity is above 15 m/s. In order to focus on the dynamical effects,
we consider mobile velocities of 5 m/s. The control errors ei (t) = it (t) i (t) with
and without TDC of a specific user are plotted in Figure 10.15 together with the
multiplicative disturbance xi (t). As expected, command bit errors result in bursty
control errors when using TDC, but the algorithm recovers fast.
The improved fading tracking is significant when employing TDC, and the oscillations are more or less mitigated. Less fading margin will be needed to reside
permanently above some critical level, which in turn increases the capacity. Possible capacity enhancements need to be evaluated more thoroughly. With robust
coding, the more emphasized oscillations when not using TDC may not cause problems anyway. Engstr
om and Ericsson (1999) studied the effect of different power
control delays, and concluded that a target SIR increase of about 0.25 dB is needed
to compensate for time delays up to three samples. This in turn corresponds to the
expected performance improvement when using TDC. However, the more stable
operation provided by TDC is beneficial in itself. Less variance in the inner loops
results in a more stable overall system and relative load.
Increased command bit error rates degrade the performance gradually. Despite
the triangular behavior of the control error, its standard deviation represents a
quantity that relates to this degradation. It is plotted with respect to some different
command bit error rates in Figure 10.16. Clearly, the more oscillative behavior of
10.5 Summary
213
FSPC compared to FSPC with TDC indicates that less fading margin is needed
when employing TDC. If we assume that perceived quality is acceptable if residing
above a specific SIR level, then the target SIR could be decreased by approximately
1 dB (cf. Figure 10.15). As stated before, SIR is not a complete quality measure. A
better measure of quality is raw bit error rate, i.e., the bit error rate before channel
decoding. Figure 10.15 provides a comparative study of the resulting raw BER
when using FSPC with and without TDC. In addition, the results using FSPC
with TDC and aiming at a target SIR which is 0.25 dB is also included. This
simple study, indicates that the benefits using TDC is approximately a decreased
fading margin by 0.25 dB. If the decreased fading margin is fully utilized by the
system, it would result in an increased capacity of 6%.
10.5
Summary
The ambition with the simulations is primarily to illustrate the dynamical effects
discussed in the preceeding chapters. The first part include simulations that are
directly related to examples in the thesis. Mainly, the examples aim at illuminating
the benefits of using the controllers designed in Chapter 6.
System level effects are addressed using two GSM and WCDMA specific simulation environments. It is instructive to collectively consider all users at all times,
since it reveals important global aspects. The simulations indicate that a strategy
where all users are aiming at the same target SIR is suboptimal. The cost of supporting users with less favorable propagation conditions cannot be justified on the
system level. Thus outer loop strategies which differentiate the user requirements
depending on propagation situation should improve the capacity of the system.
The effects of neglecting output constraints and using unstable controllers are
also illustrated. As expected, both these deficiencies have a negative impact on the
system performance.
Chapters 8 and 9 address the actual interfaces of a GSM system. The main
conclusions from related simulations is firstly that the degradation when using
estimated parameters instead of true ones is almost neglectable. This is partly
due to the limited set of control signals available in a GSM setting. Secondly, the
capacity is improved by 30% in a specific case when using the quality mapping
ideas (see Section 9.3).
Time delay compensation is seen to provide significant improvement to most
controllers. A drawback in case of the FSPC algorithm, is that it might be sensitive
to command bit errors. However, simulations indicate that TDC is still beneficial
when subject to command bit error rate up to 10%. Moreover, the fading margin
can be decreased by 0.25 dB when using TDC. This is supported in simulations by
comparing resulting quality in terms of raw bit error rates.
Appendix
10.A
MOSE
214
10.A MOSE
215
Figure 10.6 The cells in MOSE are modeled as hexagonal in the simulation
environment, and the omnidirectional antennas are located in
the center of the cells. In this case the service area is covered
by 8 8 cells.
216
Network Simulations
10.B
The numerous plots from simulations would have made the text less continuous.
Therefore, the plots are collected here. Most plots relate to simulations using
the FH-GSM simulation environment, while thE last two are obtained using the
WCDMA simulation environment.
10000
29
30
8000
13
45
14
46
25
6000
31
26
9
15
47
27
10
41
42
32
16
48
28
11
43
12
44
4000
21
22
23
2000
37
17
6
38
39
18
1
33
24
7
19
2
40
20
34
35
4
36
2000
0
5000
10000
15000
105
110
110
115
115
120
120
Interference I
105
125
125
130
130
135
135
140
140
145
1000
500
217
145
180
160
140
120
100
Carrier C
80
60
40
160
140
120
80
60
40
1000
500
0
180
100
110
115
115
120
120
125
125
Interference I
110
130
130
135
135
140
140
145
145
150
1000
500
150
180
160
140
160
140
120
Carrier C
100
80
60
100
80
60
3000
2000
1000
0
180
120
Figure 10.8 Scatter plots of the desired power (C) and interference power
(I) plotted concurrently when applying a. constant powers
and b. a C-based I-controller. The lines indicate SIR values
equal to 10 dB, and desired signal power values equal to 140 dBW. Roughly, the quality is acceptable, when situated
to the right of these lines. In addition, the distribution of the
values in the two directions are provided.
218
Network Simulations
110
115
115
120
120
125
125
Interference I
110
130
130
135
135
140
140
145
145
150
2000
1000
150
180
160
140
160
140
120
Carrier C
100
80
60
100
80
60
2000
1000
0
180
120
(a) I-controller.
110
115
115
120
120
125
125
Interference I
110
130
130
135
135
140
140
145
145
150
1000
500
150
180
160
140
120
100
Carrier C
80
60
40
160
140
120
80
60
40
2000
1000
0
180
100
219
100
CDF [%]
30
10
10
15
20
25
30
35
40
45
50
SIR
Figure 10.10 When the controlled power is affected by output constraints,
the internal state of the controller no longer matches the
output. The figure illustrates the loss of performance when
not acting accordingly. PI-control with (solid) and without
(dashed) anti-reset windup
pi (t) [dBW]
20
10
0
10
20
30
0
10
20
30
40
50
60
70
80
90
100
t [s]
Figure 10.11 Output powers of a specific user, when the power is controlled by the unstable controller. The output powers are
limited to [3dBW, -27dBW].
220
Network Simulations
a.
CDF [%]
100
30
10
3
1
10
20
30
40
50
60
SIR
b.
CDF
0.8
0.6
0.4
0.2
0
0.01
0.02
0.03
0.04
0.05
0.06
0.07
0.08
0.09
0.1
FER
Figure 10.12 System level effects of a locally unstable controller. PI
(solid), DPC with 20 dB (dashed) and 30 dB (dash-dotted)
dynamic range.
CDF [%]
100
30
10
3
1
10
15
20
25
30
35
40
45
SIR [dB]
CDF [%]
1
0.8
0.6
0.4
0.2
0
0.005
0.01
0.015
0.02
0.025
0.03
0.035
0.04
0.045
0.05
FER
Figure 10.13 Comparison when utilizing ideal measurements (solid) and
estimates from the proposed estimator (dashed).
221
CDF [%]
100
30
10
3
1
20
10
10
20
30
40
50
SIR [dB]
CDF [%]
1
0.8
0.6
0.4
0.2
0
0.005
0.01
0.015
0.02
0.025
0.03
0.035
0.04
0.045
0.05
FER
Figure 10.14 Performance comparison of two different situations. The
dashed curve corresponds to using fixed target SIR 12 dB
to all inner loops when 27% of the channels are occupied on
the average. Conversely, the solid curve described the performance when using a quality mapper in the outer loop and
35% of the channels are occupied. Clearly, the performance
is similar, which indicates a capacity increase of about 30%.
222
Network Simulations
a)
xi (t)
ei (t) [dB]
b)
ei (t) [dB]
10
20
30
40
50
60
70
80
90
100
10
20
30
40
50
60
70
80
90
100
10
20
30
40
50
60
70
80
90
100
c)
Slot No
Figure 10.15 The FSPC algorithm with TDC in operation when subject
to command bit errors (pCBER = 0.05). a) Multiplicative
disturbance xi (t), b) control error without TDC c) control
error with TDC. The samples of the control errors are held
piece-wise constant to emphasize the underlying periods of
oscillation. Note in c) that two different modes can be identified. This is in accordance with the predicted oscillations
in Table 5.4.
223
1.3
No TDC
TDC
1.2
1.1
Std{ei (t)}
0.9
0.8
0.7
0.6
0.5
0.01
0.02
0.03
0.04
0.05
pCBER
0.06
0.07
0.08
0.09
0.1
0.0225
0.022
Raw BER
0.0215
0.021
0.0205
0.02
0.0195
0.01
0.02
0.03
0.04
0.05
pCBER
0.06
0.07
0.08
0.09
0.1
Figure 10.17 The raw BER for different command bit error rates pCBER
and controllers: FSPC (solid), FSPC + TDC (dash-dotted)
and FSPC+TDC aiming at a target 0.3 dB lower than the
two previous.
224
Network Simulations
11
Conclusions
During the last decade, the market of cellular radio systems has exploded. The
driving incentive is to enable and facilitate communications services irrespective of
time and location. As the number of users and the demand for multimedia services
increase, so does the need for efficient use of the available radio resources. Appropriate radio resource management is therefore of utmost importance. Regularly,
we have to reconsider the assignments of base station, radio channel (or waveform
or code) and transmission powers for each connection.
The main issue in the thesis is methods to update transmission powers. By
considering the overall system as comprising a large number of interconnected distributed control loops, methods from control theory can be used to assess stability
and dynamical behavior. Typically, these individual control loops are implemented
as cascade control, with an inner control loop that assigns transmission powers to
meet the quality set point provided by the outer loop. To further study the operation of the system, it is natural to separate the time scales and study power control
at two levels. On a global level, the focus is on capacity, load, stability, convergence
and whether it is possible to meet the service requirements from the users. Local
aspects include dynamical effects of time delays and nonlinear components, and
the ability to mitigate time-varying disturbances.
An important categorization of the inner loops is whether it utilizes information
feedback, where real-valued measurements are assumed available, or decision feedback, which relies on decisions; typically the sign of the control error. The most
225
226
Conclusions
central information feedback algorithms can be associated with linear local control
loops, and thus methods from linear systems theory apply. Based on a motivation
that local stability is a necessary but not sufficient condition for global stability,
some instability results are provided. For example, the celebrated DPC algorithm
is proven unstable, when subject to time delays. Decision feedback controllers
behave differently. The decision component can be seen as a sign function with
inherent stabilizing and destabilizing properties. In a closed local loop, it results
in a persistent oscillative behavior. This behavior is predicted using discrete-time
describing functions. The predicted oscillations describe well the behavior observed
in simulations. The conclusion is that several oscillation modes are possible and
that mode switching may be stimulated by external disturbances.
Instabilities are essentially due to outdated information. In this work, several
methods are considered to improve control performance. Time delay compensation
(TDC) constitutes a general method to improve the behavior of general controllers.
Essentially, it cancels internal time delays. When using information feedback, pole
placement design is an alternative which is providing comparative performance. If
disturbance models are available, disturbance predictions are seen to improve the
control performance considerably. When the system is slightly loaded, the performance can be significantly improved by utilizing a minimum-variance controller.
Results on capacity of the global system are reviewed and extended to include
the effects of auto-interference. Moreover, the introduced relative load provides a
metric to address the actual load of a system. Stability and convergence of structurally simple algorithms can be addressed by rewriting the problem as iterative
matrix algorithms. We prove that DPC is stabilized using TDC for any time delays. Furthermore, TDC together with a decision feedback algorithm is seen to
decrease the power control error, both formally and in simulations. General stability conditions are hard to derive. Instead, we address stability with respect to an
approximate system. Thereby, the global stability requirements are formulated as
a local loop requirement, which can be considered in the design. Hence, local loop
stability together with a fulfillment of the aformentioned local loop requirement
constitute necessary and sufficient condisions for stability of the (approximate)
global system.
Information feedback is not available when considering GSM. Instead, the information is available as coarsely quantized measurement reports. One core problem is
therefore to locally extract relevant information from these reports. For that matter a maximum likelihood estimator is designed and applied. Simulations indicate
relevant performance with respect to the variations in the estimated parameters.
Using the same probabilistic framework, a statistical relation between inner loop
set points and more relevant quality measures can be established. In case of GSM,
the frame erasure rate (FER) is considered as a relevant quality measure. Thus,
the outer loop assigns inner loop set points to meet a quality specification in terms
of FER.
Most of the results in the thesis are supported by simulations, using both small
and large-scale simulation environments. Primarily the simulations illustrate the
importance of appropriate design of the control algorithms.
227
Future Work
The discrete-time describing functions analysis provide accurate predictions of oscillations in case of decision feedback power control. Therefore, it would be interesting to investigate its applicability to other feedback loops in communications,
where a relay is a critical component. Such examples include decision feedback
equalizers, -modulators and simple control algorithms where a low signaling
bandwidth is of importance.
Some proposals have focused on power control based on information from disturbance models. However, there are still extensions to be made. For example,
channel estimates from equalizers could be utilized. Furthermore, a more emphasized model-based approach is likely to be beneficial.
To describe the current load of a system, the relative load was introduced. It
can easily be computed in simulators to describe the load of the system. However,
it could also provide valuable information in an online situation. Given the information available at one, or several, base stations, an interesting area of research is
methods to estimate the relative load. A related problem is to adaptively estimate
the entire gain matrix or parts of the same.
There can always be yet another comparative simulation study of related topics
in this thesis and other work.
This thesis focuses on power control for circuit-switched services, or at least
situations where the length of a packet is considerably longer than the settling time
of the controllers. When the traffic is even more bursty, several other considerations
apply.
228
Conclusions
Bibliography
A. Acampora and M. Naghshineh. Control and quality-of-service provisioning in
high-speed microcellular networks. IEEE Personal Communications, 1(2), 1994.
F. Adachi. Transmit power efficiency of fast power controlled DS-CDMA reverse
link. IEICE Transactions on Fundamentals, E80-A(12), 1997.
F. Adachi, M. Sawahashi, and H. Suda. Wideband DS-CDMA for next-generation
mobile communications systems. IEEE Communications Magazine, 36(9), 1998.
J.M. Aein. Power balancing in systems employing frequency reuse. COMSAT
Technical Review, 3(2), 1973.
A. Ahlen, L. Lindbom, and M. Sternad. Channel tracking with WLMS algorithms: High performance at LMS computational load. In Proc. IEEE Vehicular
Technology Conference, Tokyo, Japan, May 2000.
L. Ahlin and J. Zander. Principles of Wireless Communications. Studentlitteratur, Lund, Sweden, second edition, 1998.
H. Alavi and R.W. Nettleton. Downstream power control for a spread spectrum
cellular mobile radio system. In Proc. IEEE Global Telecommunications Conference, Miami, FL, USA, November 1982.
M. Almgren, 2000. Private communication since 1997.
M. Almgren, H. Andersson, and K. Wallstedt. Power control in a cellular system.
In Proc. IEEE Vehicular Technology Conference, Stockholm, Sweden, June 1994.
E. Anderlind. Resource Allocation in Multi-Service Wireless Access Networks.
PhD thesis, Radio Comm. Systems Lab., Royal Inst. Technology, Stockholm, Sweden, October 1997.
M. Andersin. Power Control and Admission Control in Cellular Radio Systems.
PhD thesis, Radio Comm. Systems Lab., Royal Inst. Technology, Stockholm, Sweden, June 1996.
M. Andersin, N.B. Mandayam, and D.Y. Yates. Subspace based estimation of the
signal to interference ratio for TDMA cellular systems. Wireless Networks, 4(3),
1998a.
229
230
Bibliography
Bibliography
231
232
Bibliography
J.K. Cavers. Variable-rate transmission for rayleigh fading channels. IEEE Transactions on Communications, 24(1), 1972.
P. Chang. Adaptive fuzzy power control for CDMA mobile radio systems. IEEE
Transactions on Vehicular Technology, 45(2), May 1996.
P. Chang and B. Wang. Adaptive fuzzy proportional integral power control for
a cellular CDMA system with time delay. IEEE Journal on Selected Areas in
Communications, 14(9), December 1996.
P. Chaudhury, W. Mohr, and Onoe S. The 3GPP proposal for IMT-2000. IEEE
Communications Magazine, 37(12), 1999.
R.H. Clarke. A statistical theory of mobile-radio reception. The Bell System
Technical Journal, 47(6), July-August 1968.
E. Dahlman, P. Beming, J. Knutsson, F. Ovesj
o, M. Persson, and C. Roobol.
WCDMA the radio interface for future mobile multimedia communications.
IEEE Transactions on Vehicular Technology, 47(4), November 1998.
M. de la Sen, A. Pe
na, and J. Esnaola. Detection of limit cycles in discrete
systems with backlash and resolution by using a discretization-oriented describing
function. In Proc. IEEE Conference on Decision and Control, San Antonio, TX,
USA, December 1993.
J. C. Doyle, B. A. Francis, and A. R. Tannenbaum. Feedback Control Theory.
Macmillan Publishing Company, New York, NY, USA, 1992.
S. Ekberg and T. Laurent. Telegraf- och telefonteknikens fundamentala principer.
Almqvist&Wiksell, Uppsala, Sweden, second edition, 1964.
T. Ekman and G. Kubin. Nonlinear prediction of mobile radio channels: measurements and MARS model designs. In Proc. IEEE International Conference on
Acoustics, Speech, and Signal Processing, Phoenix, AZ, USA, March 1999.
B. Engstr
om and M. Ericsson. WCDMA system level performance with fast fading
and non-ideal power control. In Proc. IEEE Vehicular Technology Conference,
September 1999.
A. Ericsson and M. Millnert. Fast power control to counteract rayleigh fading in
cellular radio systems. In Proc. RVK, Lule
a, Sweden, 1996.
S. Eriksson, A. Furusk
ar, M. H
ook, S. J
averbring, H. Olofsson, and J. Sk
old.
Comparison of link quality control strategies for packet data services in EDGE.
In Proc. IEEE Vehicular Technology Conference, Houston, TX, USA, May 1999.
D.K. Fadeev and V.N. Fadeeva. Computational Methods of Linear Algebra. W.H.
Freeman, San Fransisco, CA ,USA, 1963.
Bibliography
233
234
Bibliography
Bibliography
235
236
Bibliography
Statistical/Probability series.
Bibliography
237
238
Bibliography
Bibliography
239
240
Bibliography
Bibliography
241
A.J. Viterbi. CDMA: Principles of Spread Spectrum Communication. AddisonWesley, Reading, MA , USA, 1995.
J.F. Whitehead. Signal-level-based dynamic power control for co-channel interference management. In Proc. IEEE Vehicular Technology Conference, Secaucus,
NJ, USA, May 1993.
S.H. Won, W.W. Kim, D.H. An, and I.M. Jeong. Capacity enhancement by using
optimum step sizes of controlling target SIR in a CDMA system. In Proc. IEEE
Vehicular Technology Conference, Houston, TX, USA, May 1998.
C.C. Wu and D.P. Bertsekas. Distributed power control algorithms for wireless
networks. In Proc. IEEE Conference on Decision and Control, Phoentix, AZ,
USA, Dec 1999.
R. Yates and C.Y. Huang. Integrated power control and base station assignement.
IEEE Transactions on Vehicular Technology, 44(3), August 1995.
R.D. Yates. A framework for uplink power control in cellular radio systems. IEEE
Journal on Selected Areas in Communications, 13(7), September 1995.
R.D. Yates, S. Gupta, C. Rose, and S. Sohn. Soft dropping power control. In
Proc. IEEE Vehicular Technology Conference, Phoenix, AZ, USA, May 1997.
A. Yener, R. Yates, and S. Ulukus. Joint power control, multiuser detection and
beamforming for CDMA systems. In Proc. IEEE Vehicular Technology Conference, Houston, TX, USA, May 1999.
J. Zander. Distributed cochannel interference control in cellular radio systems.
IEEE Transactions on Vehicular Technology, 41(3), August 1992a.
J. Zander. Performance of optimum transmitter power control in cellular radio
systems. IEEE Transactions on Vehicular Technology, 41(1), February 1992b.
J. Zander. Transmitter power control for co-channel interference management in
cellular radio systems. In Proc. WINLAB Workshop, New Brunswick, NF, USA,
October 1993.
J. Zander. Radio resource management - an overview. In Proc. IEEE Vehicular
Technology Conference, Atlanta, GA, USA, April 1996.
J. Zander. Radio resource management in future wireless networks - requirements
and limitations. IEEE Communications Magazine, 5(8), August 1997.
Y. Zhang and D. Li. Power control based on adaptive prediction in the
CDMA/TDD system. In Proc. IEEE International Conference on Universal Personal Communications, San Diego, CA, USA, October 1997.
K. Zhou, J.C. Doyle, and Glover K. Robust and Optimal Control. Prentice-Hall,
Upper Saddle River, NJ, USA, 1995.
242
Bibliography
Index
AAW algorithm . . 53, 60, 83, 99, 103,
208
adaptive multi-rate see rate adaption
admission control . . . . . . . . . . . . . . . . .40
aliasing. . . . . . . . . . . . . . . . . . . . . . . . . . .92
AMPS . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
antennas. . . . . . . . . . . . . . . . . . . . . .31, 35
anti-reset windup . . . . . . . . . . . 113, 209
attenuation . . . . . . . . . . see power gain
auto-interference . . . . . . . . . 34, 79, 126
exponential forgetting . . . . . . . . . . . . 64
fading . . . . . . . . . . . . . . . . . . . . .26, 27, 34
multipath . . . . . . . . . . . . . . . . 27, 88
shadow. . . . . . . . . . . . . . . . . . .26, 87
fading margin . . . . . . . . . . . . . . . . . . . 194
FDMA . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
feasibility . . . . . . . . . . . . . . . . 15, 50, 128
feasibility margin . . . . . . . . . . . 128, 152
feedback bandwidth . . . . . . . . . . . . . . 45
filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
separate . . . . . . . . . . . . . . . . . . . . . 64
forgetting factor . . . . . . . . . . . . . . . . . . 64
243
244
forward channel . . . . . . . . . . . . . . . . . . 27
forward-shift operator . see time-shift
operator
frame . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
frame erasure rate (FER) . . . . . . . 184
frequency hopping . . . . . . . 29, 35, 204
frequency modulation (FM) . . . . . . 24
FSPC algorithm . 52, 58, 60, 77, 109,
134, 211
G-matrix . . . . . . . . . . . . . . . 9, 32, 41, 42
gain margin . . . . . . . . . . . . . . . . . . 68, 71
global system. . . . . . . . . . . . . . . . . . . . .11
global system poles . . . . . . . . . . . . . .139
GPRS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Grade of Service (GoS) . . . . . . . . . . . 38
GSM . . . . . . . . . . . . . . . . . . . . . . . 185, 204
data services . . . . . . . . . . . . . . . . . 23
frequency hopping . . . . . . . .29, 35
measurements . . . . . . . . . . . . . . 179
multiple access . . . . . . . . . . . . . . .29
quality measure. . . . . . . . . . . . .189
handoff . . . . . . . . . . . . . . . . see handover
handover . . . . . . . . . . . . . . . . . . . . . . . . . 39
soft . . . . . . . . . . . . . . . . . . . . . . . . . . 39
softer . . . . . . . . . . . . . . . . . . . . . . . . 39
HSCSD . . . . . . . . . . . . . . . . . . . . . . . . . . 23
HSD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
I-controller .60, 68, 98, 101, 105, 132,
144, 145, 207
information feedback . . 10, 45, 47, 59
inner loop . . . . . . . . . . . . . . . . . . . . . . . . 46
instability. . . . . . . . . . . . . . . .11, 66, 210
interference . . . . . . . . . . . . . . . . . . . . 9, 33
linearization . . . . . . . . . . . . 15, 140
interference function . . . . . . . . . . . . 131
interference-limited system . . . . . . . 33
interleaving . . . . . . . . . . . . . . . . . . 35, 185
IS-136 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
IS-54 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
IS-95 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
limit cycles . . . . . . . . . . . . . . . . . . . . . . . 72
Line-of-Sight (LoS) . . . . . . . . . . . 27, 88
Index
linear scale . . . . . . . . . . . . . . . . . . . . . . . . 8
linearization . . . . . . . . . . . . . . . . . 15, 140
local average . . . . . . . . . . . . . . . . . . . . . 63
local loop . . . . . . . . . . . . . . . . . . . . . . . . 56
local loop poles . . . . . . . . . . . . . . . . . 139
local loops . . . . . . . . . . . . . . . . . . . . . . . 11
logarithmic scale . . . . . . . . . . . . . . . . . . 8
measurement errors . . . . . . . . . . . . . 108
measurement report . . . . . . . . . 45, 179
minimum-variance control . . . . . . . 112
ML estimation . . . . . . . . . . . . . . . . . . 169
mobile station (MS) . . . . . . . . . . . . . . 27
MOSE . . . . . . . . . . . . . . . . . . . . . 200, 214
multipath fading . . . . . . . . . . . . . . . . . see
fading,multipath
multiple access interference . . . . . . see
interference
near-far effect . . . . . . . . . . . . . . . . . . . . 30
NMT. . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
noise-limited system . . . . . . . . . . . . . . 33
non-orthogonal signals . . . . . . . . 29, 42
nonlinear . . . . . . . . . . . . . . . . . . . . . . . . 113
nonlinearities . . . . . . . . . . . . . . . . . . . . . 63
optimal balanced SIR . . . . . . . . 14, 125
orthogonal signals . . . . . . . . . . . . 28, 41
oscillations . . . . . . . . . . . . . . . . . . . . . . . 72
outer loop . . . . . . . . . . . . . . . . . . . . . . . . 46
packet switching . . . . . . . . . . . . . . . . . .23
path loss . . . . . . . . . . . . . . . . . . . . . . . . . 26
PI-controller . . 99, 102, 105, 209, 210
point-mass approximation . . . . . . . 166
pole placement . . . . . . . . . . . . . . . . . . . 98
poles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
power control algorithm . . . 40, 47, 59
aspects of . . . . . . . . . . . . . . . . . . . . 43
asynchronous . . . . . . . . . . . . . . . . 51
centralized . . . . . . . . . . . . . . . . . . . 44
decentralized . . . . . . . . . . . . . . . . 44
log-linear . . . . . . . . . . . . 64, 98, 104
stability . . . . . . . . . . . . . . . . . . . . . 68
power control problem . . . . . . . . . . 128
power gain. . . . . . . . . . . . . . . . . . . .25, 32
Index
multipath fading . . . . . . . . . . . . . 27
path loss. . . . . . . . . . . . . . . . . . . . .26
shadow fading . . . . . . . . . . . . . . . 26
prefilter . . . . . . . . . . . . . . . . . . . . . . . . . 116
processing gain (PG) . . . . . . . . . 30, 43
proper . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
q. . . . . . . . . . . . .see time-shift operator
QI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
quality
measure . . . . . . . . . . . . 45, 183, 189
of service. . . . . . . . . . . . . . . . .38, 41
radio channel . . . . . . . . . . . . . . . . . . . . . 23
radio communication . . . . . . . . . . . . . 23
radio resource management . . . . . . . 37
radio wave propagation . . . . . . . . . . . 25
rate adaption . . . . . . . . . . . . . . . . . . . 194
Rayleigh fading see fading,multipath
receiver . . . . . . . . . . . . . . . . . . . . . . . . . . 23
relative load . . . . . . . . . . . . . . . . . 14, 129
relay . . . . . . . . . . . . . . . . . . . . . 63, 76, 115
removal control . . . . . . . . . . . . . . . . . . . 40
resource allocation algorithm . . . . . 39
reuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
reverse channel . . . . . . . . . . . . . . . . . . . 27
rise time . . . . . . . . . . . . . . . . . . . . . . . . 100
robust stability . . . . . . . . . . . . . . . . . . 142
root locus analysis . . . . . . . . . . . . 12, 68
RSSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
RXLEV . . . . . . . . . . . . . . . . . . . . 167, 179
RXQUAL . . . . . . . . . . . . . . . . . . 167, 179
sample interval . . . . . . . . . . . . . . 11, 108
Seinfeld . . . . . . . . . . . . . . . . . . . . . . . . . . 38
selector . . . . . . . . . . . . . . . . . . . . . . . . . 114
shadow fading . . . . see fading,shadow
sign function . . . . . . . . . . . . . . . see relay
signal-to-interference ratio. . .see SIR
signal-to-noise ratio (SNR) . . . . . 8, 47
SIR . . . . . . . . . . . . . . . . . . . . 9, 34, 40, 43
SIR target. . . . . . . . . . . .see target SIR
soft handover . . . . . . see handover,soft
softer handover . . see handover,softer
spatial frequency . . . . . . . . . . . . . . . . . 87
245
J. Sj
oberg: Non-linear system identification with neural networks. Thesis no. 381, 1995.
ISBN 91-7871-534-2.
R. Germundsson: Symbolic systems theory, computation and applications. Thesis
no. 389, 1995. ISBN 91-7871-578-4.
P. Pucar: Modeling and segmentation using multiple models. Thesis no. 405, 1995.
ISBN 91-7871-627-6.
H. Fortell: Algebraic approaches to normal forms and zero dynamics. Thesis no. 407,
1995. ISBN 91-7871-629-2.
A. Helmersson: Methods for robust gain scheduling. Thesis no. 406, 1995. ISBN
91-7871-628-4.
P. Lindskog: Methods, algorithms and tools for system identification based on prior
knowledge. Thesis no. 436, 1996. ISBN 91-7871-424-8.
J. Gunnarsson: Symbolic methods and tools for discrete event dynamic systems. Thesis
no. 477, 1997. ISBN 91-7871-917-8.
M. Jirstrand: Constructive methods for inequality constraints in control. Thesis no.
527, 1998. ISBN 91-7219-187-2.
U. Forssell: Closed-loop identification: methods, theory, and applications. Thesis no.
566, 1999. ISBN 91-7219-432-4.
A. Stenman: Models on demand: algorithms, analysis and applications. Thesis no. 571,
1999. ISBN 91-7219-450-2.
N. Bergman: Recursive Bayesian estimation: navigation and tracking applications.
Thesis no. 579, 1999. ISBN 91-7219-473-1.
K. Edstr
om: Switched bond graphs: simulation and analysis. Thesis no. 586, 1999.
ISBN 91-7219-493-6.
M. Larsson: Behavioral and Structural Model Based Approaches to Discrete Diagnosis.
Thesis no. 608, 1999. ISBN 91-7219-616-5.