You are on page 1of 262

Linkoping

Studies in Science and Technology. Dissertations


No. 623

Power Control in
Cellular Radio Systems:
Analysis, Design and Estimation
Fredrik Gunnarsson

Department of Electrical Engineering

Linkopings
universitet, SE581 83 Linkoping,
Sweden

Linkoping
2000

Power Control in Cellular Radio Systems:


Analysis, Design and Estimation
c 2000 Fredrik Gunnarsson

fred@isy.liu.se
http://www.control.isy.liu.se
Division of Automatic Control
Department of Electrical Engineering,
Link
opings universitet,
SE581 83 Link
oping,
Sweden

ISBN 91-7219-689-0

ISSN 0345-7524

Printed by Linus & Linnea AB, Link


oping, Sweden 2000

To Sofia

Abstract
The primary goal of cellular radio systems is to provide communications services
to a large number of mobile users. Due to the dramatic increase in number of
users and their demand for more advanced services, the available resources have
to be utilized efficiently. Closed-loop power control is considered as an important
component in this resource management.
For practical reasons, the powers have to be computed locally for each connection, though performance and stability depend on how the different connections
interact. We consider the power control problem as a decentralized control system,
consisting of interconnected local control loops. Methods from control theory are
used to analyze existing algorithms locally and to design controllers with improved
performance. Thereby, performance degradation due to time delays and nonlinearities, can be handled by careful controller design. On a global level, we provide
results on stability and convergence of the designed controllers. The results are illustrated by simulations using both small and large-scale simulation environments.

ii

Acknowledgments
I am very grateful to all the people (yes, there are many) who have inspired and
supported me during the work on the thesis.
First of all I would like to thank my supervisor, Professor Fredrik Gustafsson, for
guidance through the evolution of the thesis, but even more so for all rewarding and
inspiring discussions. I especially appreciate his positive attitude and willingness
to share thoughts and ideas. Thanks goes also to Dr. Jonas Blom for times of
confusion and of clarification. During the time we shared room and project, we had
many fruitful discussions related to communications and control and to abridging
the two.
I would like to thank Professor Lennart Ljung for giving me the opportunity to
join the Automatic Control group, and for creating a stimulating and professional
atmosphere. I also value the freedom I have had in choosing research topic.
During my graduate studies I have had the opportunity to share ideas and discussions with people at Ericsson Radio Systems. I am especially grateful to Magnus
Almgren for all energetic discussions related to practical and theoretical aspects
of power control and mobile communications. Thank you for sharing simulation
knowledge, but also for making me realize that simulations should be approached
with care. I also value discussions with Dr. Magnus Frodigh, Bengt Bergkvist and
Dr. Niclas Wiberg. In different phases of my project, I have had many questions
answered by Dr. Gunnar Bark, Tomas Rimhagen, Dr. Ke Wang Helmersson, H
akan
Olofsson, Magnus Persson and Maria Gustafsson, and several others.
The people in the Automatic Control group all have contributed to a great
atmosphere at work. Besides research activities and coursework, I appreciate the
social activities and spontaneous coffee room discussions about the most shifting
things. Thanks also goes to our secretary Ulla for all administrative help and
cheerful attitude, and to Mattias Olofsson for maintaining the computers.
Fredrik Gustafsson and Jonas Blom proof-read the entire manuscript and provided me with many valuable comments and suggestions on improvements. Dr.
Niclas Bergman read parts and patiently answered many questions regarding LATEX.

M
ans Ostring
gave me insightful comments on the design. All of the above added
significant improvements to the thesis.
This work was supported by the graduate school ECSEL and the Swedish National Board for Industrial and Technical Development (NUTEK), and they are
gratefully acknowledged.
To my parents and brothers: thanks for always being there and for being you.
Finally, I would like to thank Sofia for abundant love and support. Your encouragement and enormous patience, especially during the completion of this thesis,
made hard-working days lighter and brighter. I love you.

Link
oping, March 2000
Fredrik Gunnarsson

iii

iv

Contents

1 Introduction
1.1 Thesis Outline . .
1.2 Reading Directions
1.3 Contributions . . .
1.4 Publications . . . .

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

1
1
3
3
4

2 Extended Summary
2.1 Introduction . . . . . . . . . . . . . .
2.2 Power Control Algorithms . . . . . .
2.3 Local Analysis . . . . . . . . . . . .
2.4 Local Design . . . . . . . . . . . . .
2.5 Global Analysis . . . . . . . . . . . .
2.6 Estimation and Outer Loop Control
2.7 Simulations . . . . . . . . . . . . . .

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

.
.
.
.
.
.
.

7
7
10
11
12
14
17
18

3 Cellular Radio Systems


3.1 Overview . . . . . . . . . . . . . . . . . . . . . . .
3.2 Radio Communication . . . . . . . . . . . . . . . .
3.3 Radio Wave Propagation . . . . . . . . . . . . . . .
3.3.1 Path Loss . . . . . . . . . . . . . . . . . . .
3.3.2 Shadow Fading . . . . . . . . . . . . . . . .
3.3.3 Multipath Fading . . . . . . . . . . . . . . .
3.3.4 Example: Spatially Correlated Propagation
3.4 Multi-User Communications . . . . . . . . . . . . .
3.4.1 Orthogonal Signals . . . . . . . . . . . . . .
3.4.2 Non-Orthogonal Signals . . . . . . . . . . .
3.5 Cellular Radio Systems . . . . . . . . . . . . . . .
3.6 Diversity . . . . . . . . . . . . . . . . . . . . . . . .

.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.

21
21
23
25
26
26
27
27
27
28
29
30
34

4 Radio Resource Management


4.1 Performance of Cellular Radio Systems . . . . . .
4.2 Resource Allocation Algorithms . . . . . . . . . .
4.3 Means to Control the Resources . . . . . . . . . .
4.4 Aspects of Power Control . . . . . . . . . . . . .
4.5 Survey over Proposed Power Control Algorithms

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

.
.
.
.
.

37
38
39
40
44
47

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.

.
.
.
.
.

vi

Contents

5 Local Analysis
5.1 Motivating Example . . . . . . . . . . . . . . . . . . . . . .
5.2 Dynamical Models . . . . . . . . . . . . . . . . . . . . . . .
5.2.1 Power Control Algorithms . . . . . . . . . . . . . . .
5.2.2 Time Delays . . . . . . . . . . . . . . . . . . . . . .
5.2.3 Nonlinearities . . . . . . . . . . . . . . . . . . . . . .
5.2.4 Filters . . . . . . . . . . . . . . . . . . . . . . . . . .
5.3 Log-Linear Algorithms . . . . . . . . . . . . . . . . . . . . .
5.3.1 Stability of Linear Systems . . . . . . . . . . . . . .
5.3.2 Local Analysis of Power Control Algorithms . . . . .
5.3.3 Summary, Local Analysis of Log-Linear Algorithms .
5.4 Describing Functions . . . . . . . . . . . . . . . . . . . . . .
5.4.1 Describing Functions with Zero Phase Assumption .
5.4.2 Discrete-Time Describing Functions . . . . . . . . .
5.4.3 Simplified Nonzero Input Case . . . . . . . . . . . .
5.4.4 Describing Function of a Relay . . . . . . . . . . . .
5.5 Log-Linear Algorithms with a Static Nonlinearity . . . . . .
5.5.1 Summary, Describing Functions Analysis . . . . . .
5.6 Effect of Auto-Interference . . . . . . . . . . . . . . . . . . .
5.7 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . .

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

55
57
59
59
61
63
63
65
67
68
71
71
72
74
76
76
77
79
79
82

5.A Local Loop Analysis of the AAW Algorithm . . . . . . . . . . . . . . 83


6 Local Design
6.1 Fading Characteristics . . . . . . . . . . . . . . . . . . .
6.1.1 Shadow Fading . . . . . . . . . . . . . . . . . . .
6.1.2 Multipath Fading . . . . . . . . . . . . . . . . . .
6.1.3 Fading in the Spatial Frequency Domain . . . . .
6.1.4 Measurement Procedures . . . . . . . . . . . . .
6.2 Time Delay Compensation . . . . . . . . . . . . . . . . .
6.2.1 Fixed Step Power Control Algorithm . . . . . . .
6.2.2 Log-Linear Power Control Algorithms with TDC
6.3 Pole Placement Design of Log-Linear Algorithms . . . .
6.3.1 Controller Structures . . . . . . . . . . . . . . . .
6.3.2 Properties of Linear Systems . . . . . . . . . . .
6.3.3 Pole Placement Design . . . . . . . . . . . . . . .
6.4 Practical Design Aspects . . . . . . . . . . . . . . . . . .
6.4.1 Log-Linear Power Control Algorithms . . . . . .
6.4.2 Decision Feedback Algorithm . . . . . . . . . . .
6.4.3 Summary, Design Aspects . . . . . . . . . . . . .
6.5 Predictive Power Control . . . . . . . . . . . . . . . . .
6.5.1 Disturbance Prediction . . . . . . . . . . . . . .
6.5.2 Minimum-Variance Control . . . . . . . . . . . .
6.6 Nonlinear Components . . . . . . . . . . . . . . . . . . .
6.6.1 Anti-Reset Windup . . . . . . . . . . . . . . . . .

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

85
86
87
88
91
91
92
94
96
98
98
99
100
104
104
109
110
110
111
112
113
114

Contents

vii

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

115
115
116
116
119
119

7 Global Analysis
7.1 Optimal Global Power Assignments . . . . . . . . . . . . . . . . .
7.1.1 Optimal Balancing Assignments . . . . . . . . . . . . . .
7.1.2 Optimal Assignments Relative a Target SIR . . . . . . . .
7.2 Convergence in Linear Scale . . . . . . . . . . . . . . . . . . . . .
7.2.1 Standard Interference Functions . . . . . . . . . . . . . .
7.2.2 Convergence of Some Log-Linear Algorithms . . . . . . .
7.2.3 Convergence of Some Decision Feedback Algorithms . . .
7.3 Log-Linear Algorithms . . . . . . . . . . . . . . . . . . . . . . . .
7.3.1 The Global System as Interconnected Local Loops . . . .
7.3.2 Interference Linearization . . . . . . . . . . . . . . . . . .
7.3.3 Robust Stability of Log-Linear Power Control Algorithms
7.3.4 Two Mobile Case . . . . . . . . . . . . . . . . . . . . . . .
7.3.5 The Conservativeness of Theorem 7.20 . . . . . . . . . . .
7.4 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.

123
124
124
127
130
131
132
134
135
136
140
142
145
150
153

6.7

6.8

7.A
7.B
7.C
7.D

6.6.2 Selector or Switch . . . . . . . . . .


6.6.3 Relay . . . . . . . . . . . . . . . . .
Simulations . . . . . . . . . . . . . . . . . .
6.7.1 Simulation of an Isolated Local Loop
6.7.2 Monte-Carlo Simulations . . . . . .
Summary . . . . . . . . . . . . . . . . . . .

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

Proof of Theorem 7.5 . . . . . . . . . . . . . . . .


Proof of Lemma 7.10 . . . . . . . . . . . . . . . .
Proof of Theorem 7.14 . . . . . . . . . . . . . . .
Robust Stability of Power Control Algorithms . .
7.D.1 Robust Stability . . . . . . . . . . . . . .
7.D.2 Proof of Power Control Related Theorems

8 Nonlinear Estimation
8.1 Modeling . . . . . . . . . . . . .
8.1.1 Parameters . . . . . . . .
8.1.2 Measurements . . . . . .
8.2 Maximum Likelihood Estimation
8.2.1 A Simple Example . . . .
8.2.2 Adaptive Estimation . . .
8.3 Semi-Linear Estimation . . . . .
8.4 Simulations . . . . . . . . . . . .
8.4.1 Abrupt Interference Step
8.4.2 Run-time Estimation . . .
8.5 Summary . . . . . . . . . . . . .

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

.
.
.
.
.
.

154
155
156
158
158
161

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.

165
166
166
167
169
169
171
173
174
174
175
177

8.A The Measurement Reports in GSM . . . . . . . . . . . . . . . . . . . 179

viii

Contents

9 Outer Loop Control


9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . .
9.2 Quality Measures in Cellular Radio Systems . . . . . . .
9.2.1 Speech Quality Measures . . . . . . . . . . . . .
9.2.2 Practical Quality Measures . . . . . . . . . . . .
9.2.3 Example: GSM . . . . . . . . . . . . . . . . . . .
9.3 Quality Mapping . . . . . . . . . . . . . . . . . . . . . .
9.3.1 Modeling . . . . . . . . . . . . . . . . . . . . . .
9.3.2 Parameter Ranges in Point-Mass Approximations
9.3.3 Implementation . . . . . . . . . . . . . . . . . . .
9.4 Stating Priorities in the Outer Loop . . . . . . . . . . .
9.4.1 Fading Margins . . . . . . . . . . . . . . . . . . .
9.4.2 Rate Adaption . . . . . . . . . . . . . . . . . . .
9.4.3 Soft Dropping Power Control . . . . . . . . . . .
9.4.4 Mode Switching Controllers . . . . . . . . . . . .
9.4.5 Low Interference Problem . . . . . . . . . . . . .
9.5 Simulations . . . . . . . . . . . . . . . . . . . . . . . . .
9.6 Summary . . . . . . . . . . . . . . . . . . . . . . . . . .

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

181
181
182
182
183
185
190
190
191
192
193
194
194
195
196
196
196
197

10 Network Simulations
10.1 Simulation Studies in General . . . . . . . . . . . . . . . .
10.2 Simple Network Simulation Environment . . . . . . . . . .
10.2.1 MOSE . . . . . . . . . . . . . . . . . . . . . . . . .
10.2.2 Stabilizing Controllers in the Motivating Example
10.2.3 Conservativeness of Global Stability Requirements
10.2.4 Abrupt Change of Target SIR . . . . . . . . . . . .
10.3 FH-GSM Simulation Environment . . . . . . . . . . . . .
10.3.1 System Level Effects of Controlling the Power . . .
10.3.2 Quality Measures . . . . . . . . . . . . . . . . . . .
10.3.3 Anti-Reset Windup . . . . . . . . . . . . . . . . . .
10.3.4 System Level Effects of Unstable Controllers . . .
10.3.5 Influence of Estimation . . . . . . . . . . . . . . .
10.3.6 Quality Mapping . . . . . . . . . . . . . . . . . . .
10.4 WCDMA Simulation Environment . . . . . . . . . . . . .
10.4.1 Effect of Command Bit Errors on TDC . . . . . .
10.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . .

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.

199
199
200
200
201
202
203
204
206
209
209
210
210
210
211
212
213

10.A MOSE . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214


10.B Plots Associated with Simulations in Sections 10.3 and 10.4. . . . . . 216
11 Conclusions

225

Bibliography

229

Index

243

Notation
Symbols
Both values in linear and logarithmic scale (for more on units, see below) are used
in the thesis. Therefore, the convention of indicating linear scaled values by a bar,
. Hence, p is a value in linear scale, and p denote the corresponding value in
logarithmic scale. Moreover, the index i denote a specific terminal
pi , pi

p, p

p , p
t
pi , pti
t
pt , p
pi
p
gij , gij

G, G
Ci , Ci
Cit , Cit
C
Ii , Ii
Iit , Iit
Ii
Ii ()
I()
mI
I
i , i

,
,
it , it
t

transmitter power
vectors with components as above
optimal power vector (corresponds to i = , i)
powers at steady state (corresponds to i = it , i)
vectors with components as above
internally monitored power used in TDC
equilibrium deviation pi pti
power gain between terminals i and j
gain matrix (or G-matrix) with entries as above
desired signal power1
target value when using C-based power control
filtered desired signal power, Ci (t) = Fg (q)Ci (t)
interference power
interference powers at steady state (when i = it , i)
filtered interference power, Ii (t) = FI (q)CI (t)
interference function with respect to terminal i
interference function (vector with cpomponents as above)
mean interference at a specific receiver
interference standard deviation at a specific receiver
signal-to-interference ratio (SIR)
vectors with components as above
optimal balanced SIR
individual target SIR:s
diagonal matrix with diagonal elements it
filtered SIR, i (t) = F (q)i (t)

ix

i
i , i

cc
cc

i
m

r
L
q
R(q)
F (q), Fg (q), FI (q)

Notation

adjusted SIR using TDC


receiver efficiency
diagonal matrix with diagonal elements i .
cross-coupling matrix
degree of cross-coupling, cc = kcc k
cross-coupling parameters
feasibility margin
relative load
time-shift operator (cf. z in the z-transform)
log-linear controller
log-linear filters

Units
W, mW
dB
dBW
dBm

power units in linear scale.


a ratio of
pref is given in dB by
 powers
 in linear scale p/

= 10 log10 (
p) 10 log10 (
pref ) = p pref .
10 log10 pref
a power level compared to 1 W.
a power level compared to 1 mW. Note that
p dBW = (p + 30) dBm.

Abbreviations
The list below only include abbreviations most frequently used in the thesis.
AAW
BER
DPC
FER
FSPC
SIR
TDC

algorithm proposed by (Almgren, Andersson, and Wallstedt,


1994).
Bit Error Rate.
Distributed Power Control algorithm.
Frame Erasure Rate.
Fixed Step Power Control algorithm.
Signal-to-Interference Ratio.
Time Delay Compensation

1
Introduction

The global communications system today (the telephone system yesterday) is considered as the largest man-made system all categories. While the demand for access
to services in such systems is exponentially growing, an increased interest in utilizing the available resources efficiently can be observed. In this thesis, the subset
of wireless cellular communications systems will be in focus.
A consequence of the limited availability of radio resources is that the users
have to share these resources. Power control is seen as an important means to
reduce mutual interference between the users, while compensating for time-varying
propagation conditions. The powers are controlled using feedback, and feedback
result in a dynamical behavior that critically affect the performance. In this work
we use methods from control theory to analyze the dynamical effects and to design
appropriate control strategies.

1.1

Thesis Outline

The subtitle Analysis, Design and Estimation describes the core of the thesis, but
not in a consecutive order.
Chapter 2 illustrates the main ideas in the thesis by considering a simple case:
a small wireless network with two users. Yet simple, the case provides valuable
insight into some of the rather theoretical issues brought up in the thesis. Primarily,
this concerns emphasizing the relevance and importance of considering dynamical

Introduction

effects in power controlled cellular radio systems. For example, time delays are
identified as critical for the performance if not handled appropriately.
Some background material on cellular radio systems are provided in Chapter 3.
The objective is to provide a reader without prior knowledge with an understanding
of the problems and challenges in these systems as well as a familiarity with the
terminology used. After this foundational chapter, power control is put into the
context of radio resource management algorithms in Chapter 4. The focus of the
thesis is further clarified, and various aspects of power control are characterized.
Typically, power control algorithms are either based on information feedback, where
essentially real valued measurements are available, or based on decision feedback,
where only decisions 1 are available. The chapter is concluded with survey over
previous contributions in the literature.
For practical reasons, it is necessary to control the powers in a distributed fashion. These distributed algorithms can be seen as interconnected local control loops.
In Chapter 5 we consider these local loops separately with respect to dynamical
behavior. Previous proposals are seen to fall into any of two categories: Algorithms
based on information feedback are associated with a linear local loop, which can
be analyzed with methods from linear systems theory. Conversely, decision feedback algorithms are not solely linear, but rather linear with a static nonlinear
component. Such a control loop is approximatively analyzed using discrete-time
describing functions.
Since the local loops are all or partly linear, we apply methods from control
theory in Chapter 6 to improve the performance of previous proposals and to
relate the performance to disturbance properties and physical parameters. When
relevant disturbance models are at hand, these are used for disturbance prediction
and controller design.
Chapter 7 addresses different global issues, such as capacity, load and whether
it is possible to meet the requirements from all users. Furthermore, it provides
results on stability and convergence of some central algorithms. Global stability
requirements are also posed as requirements on the local control loops.
In GSM, the measurements are subject to coarse quantization and made available to the algorithm in measurement reports. The core problem in Chapter 8
is to locally extract as much relevant information from these reports. We discuss
the applicability of maximum likelihood estimation to the problem. Yet another
practical issue is to design algorithms to operate in an outer loop, providing the
inner loop with relevant set points. This is the main issue in Chapter 9.
The ambition with Chapter 10 is to illustrate different issues from the preceeding
chapters using network simulations. Both small and large-scale simulations are
used, all with different purposes.
Finally, Chapter 11 provides some conclusive remarks, and point out possible
directions for future research.

1.2 Reading Directions

1.2

Reading Directions

The main ambition with the many introductory parts in the thesis is that everybody should skip something. Readers with a strong background in mobile communications can skip Chapter 3 and the introductory sections in Chapter 4. When
necessary, references backwards help the reader to back track to cover up notational discrepancies. Similarly, a reader with a background in automatic control or
systems engineering may skip sections on properties of linear systems. Hopefully,
every reader finds it useful to read the extended summary in Chapter 2. This
chapter also serves as a road map to the rest of the thesis. Chapter 8 on nonlinear
estimation can be read relatively independently from the other chapters. Chapter 9
is to some extent based on material in the preceeding chapter.

1.3

Contributions

The main contributions in this thesis can be summarized as:


The unifying approach to power control algorithms in Chapter 5, where they
are considered as distributed control loops. Furthermore the applicability
of linear systems theory methods to assess local stability, or rather local
instability, with respect to controller parameters and time delays. These
methods are also used to conclude that auto-interference, which is due to
non-ideal receivers, does not violate local loop stability.
Discrete-time describing functions analysis of decision feedback power control
algorithms in Chapter 5.
Time delay compensation for general power control algorithms, as described
in Section 6.2.
Local loop design of power control algorithms in Chapter 6. This involves
linear design using pole placement and minimum-variance control, the applicability of nonlinear components and the practical aspects discussed in
the same chapter. Moreover, the related issues on outer loop control in Section 9.4.
The results on capacity and relative load in Section 7.1, and generalization
of some results to include auto-interference.
Stability and convergence of some central power control algorithms with time
delay compensation, when subject to delays in Section 7.2.
Results on global stability with respect to the approximate global system
in Section 7.3. Furthermore, the interpretation of the results as local loop
design requirements.
The concept of quality-based control with respect to GSM in Chapters 8
and 9.

Introduction

1.4

Publications

Some of the material in this thesis has been, or will be, published elsewhere. Technical reports and non-reviewed material are not included. The licentiate thesis
relates to several parts of this thesis:
J. Blom and F. Gunnarsson. Power Control in Cellular Radio Systems. Licentiate Thesis, Linkopings universitet, Sweden, June 1998.
The original formulation of power control algorithms as linear distributed control
appear in
J. Blom, F. Gunnarsson, and F. Gustafsson. Constrained power control subject
to time delays. In Proc. International Conference on Telecommunications,
Chalkidiki, Greece, June 1998.
The applicability of discrete-time describing functions to relay control in Chapter 5
is addressed in
F. Gunnarsson, F. Gustafsson, and J. Blom. Dynamical effects of time delays
and time delay compensation in power controlled WCDMA. Submitted to
IEEE Journal on Selected Areas in Communications, WCDMA Special Issue.,
2000.
Preliminary results of the above and analysis of log-linear distributed control loops
in Chapter 5 are covered by
F. Gunnarsson, J. Blom, and F. Gustafsson. Power control in cellular systems
subject to constraints and time delays. In Proc. IEEE Global Telecommunications Conference, Sydney, Australia, November 1998d.
F. Gunnarsson, J. Blom, and F. Gustafsson. Power control algorithms and
stability analysis for radio network control. In Proc. IEEE Conference on
Decision and Control, Tampa, FL, USA, December 1998c.
Some of the design strategies in Chapter 6 are also found in
F. Gunnarsson, F. Gustafsson, and N. Wiberg. Transmit power control time
delay compensation in a wireless communications system. US Patent Application No. 09/346316, 1999e.
F. Gunnarsson and F. Gustafsson. Time delay compensation in power controlled
cellular radio systems. Submitted to IEEE Communications Letters, 1999.
F. Gunnarsson, F. Gustafsson, and J. Blom. Pole placement design of power
control algorithms. In Proc. IEEE Vehicular Technology Conference, Houston,
TX, USA, May 1999d.
F. Gunnarsson, F. Gustafsson, and J. Blom. Improved performance using nonlinear components in power control algorithms. In Proc. IEEE Vehicular
Technology Conference, Houston, TX, USA, May 1999c.

1.4 Publications

The nonlinear estimation techniques applied to the GSM measurement reports in


Chapter 8 also appeared in
J. Blom, F. Gunnarsson, and F. Gustafsson. Estimation in cellular radio systems.
In Proc. IEEE International Conference on Acoustics, Speech, and Signal
Processing., Phoenix, AZ, USA., March 1999.
F. Gunnarsson, J. Blom, and F. Gustafsson. Estimation of the carrier-tointerference ratio in cellular radio systems. In Proc. IEEE Vehicular Technology Conference, Houston, TX, USA, May 1999b.
Some of the outer loop strategies in Chapter 9 are covered by
J. Blom, F. Gunnarsson, and F. Gustafsson. A new concept of power control
in cellular systems reflecting challenges of todays systems. In Proc. IEEE
Global Telecommunications Conference, Sydney, Australia, November 1998b.
F. Gunnarsson, J. Blom, and F. Gustafsson. A concept of power control in
cellular radio systems. In Proc. IFAC World Congress, Beijing, P. R. China,
July 1999a.
F. Gunnarsson, J. Blom, and F. Gustafsson. Method and system for qualitybased power control in cellular communications systems. US Patent Application No. 09/031,635, 1998a.
Results on convergence and stability from Chapter 7 have been submitted to IEEE
Vehicular Technology Conference, Fall 2000.

Introduction

2
Extended Summary

The objective of the thesis is to cover control theory related issues of power control
in cellular radio systems. This chapter is introduced to bridge the gap between the
short abstract and the whole thesis. The main ambition is to exemplify the main
results by considering simplistic situations. Primarily, this concerns emphasizing
the relevance and importance of considering dynamical effects in power controlled
cellular radio systems. Most of the material is more rigorously treated in the
following chapters. For clarity, the organization of this chapter is similar to the
entire thesis.
In order to tickle the intuition, the considered examples sometimes might seem
naive to a well-educated reader. However, recall the ambition to provide insight
into power control problems, which might not track the theoretically optimal path.

2.1

Introduction

The primary goal of cellular radio systems is to provide reliable communication


to users irrespective of location and situation. This involves a great number of
users, and complex time-varying phenomenons. For clarity, we first consider a
foundational situation: digital communication between two points. The available
bandwidth between the transmitter and the receiver occupies W Hz. Assume that
the received signal consists of the transmitted signal and additive white Gaussian
noise with power 0 . Furthermore, the power used by the transmitter is denoted

Extended Summary

by p0 . Such a communication link has limited capacity. A fundamental result


(Shannon, 1956) states that the maximum data rate in bits per second is given by


p0
maximum number of bits/s = W log2 1 +
.
(2.1)
W 0
If the bandwidth is fixed, the capacity thus depends on the signal-to-noise ratio
(SNR) p0 /
0 of the connection.
The channel is generally more complex. Typically, the received signal power
level depends on the distance between the receiver and transmitter and effects
from the environment. The latter comes about due to wave propagation effects,
such as diffraction and reflection phenomenons. Hence, a more relevant model is
to associate the channel with a time-varying multiplicative power gain1 g(t). The
signal-to-noise ratio can thus be expressed as
= p0 g(t)
SNR
0
Signal power gains and power levels can be expressed using different scales. Logarithmic (e.g., dB or dBW) or linear are often used. To avoid confusion we will
adopt the convention of indicating linearly scaled values with a bar. Thus g is a
value in linear scale and g the corresponding value in dB. Recall that the conversion
from linear scale to dB is g(t) = 10 log10 (
g (t)). Using values in dB, SNR is given
by
SNR = p0 + g(t) 0 ,

[dB].

A time varying power gain g(t) is illustrated in Figure 2.1a. Gain variations as
depicted in the figure degrade the performance and reduce the worst-case capacity
of the connection. An intuitive approach is to compensate for the variations by
using a time-varying power p(t). If the channel variations are known to the transmitter, we could literally invert the channel to obtain a constant SNR. Ideally, we
would like to use the power p(t) = p0 g(t), which is exemplified by the solid line
in Figure 2.1b. A different approach is to use excessive power to overcome even
the worst-case situation, see the dashed line in Figure 2.1b. At some level, we
could guarantee a minimum signal-to-noise ratio, and thereby provide a required
data rate. Seemingly, the only drawback with using excessive power is high battery
consumption. However, when other connections are using the same channel, other
aspects apply. This is further discussed below.
Consider a simple multiuser scenario with two connections using the same channel. The two mobile stations MS1 and MS2 are connected to the base stations BS1
and BS2 respectively, see Figure 2.2. The transmitted signal from BS1 to MS1 also
reaches MS2 and vice versa. These unwanted signals are normally weaker than the
desired signals, but still create a mutual interference. In Figure 2.2, desired signals
are indicated by solid arrows, and undesired interfering signals by dashed arrows.
1 Sometimes,

the term attenuation is used to emphasize that g(t) < 1.

2.1 Introduction

Channel gain [dB]


a)

b)

Transmission power [dBW]

Time [s]
Figure 2.1 An intuitive approach to compensate for a time-varying channel as in a) is to invert the channel. This corresponds to using
the power as described by the solid line in b). An alternative
is to use excess power as given by the dashed line in b).

We will focus on the downlink (from BS to MS), to keep the notation clear. Each
communication link from base station BSj to mobile station MSi is characterized
by the signal power gain gij (t). Thus, all possible power gains in this small network
are described by the gain matrix (or G-matrix )


g11 g12

.
G=
g21 g22
Denote the transmitted power from base station BSj at time instant t by pj (t). Mobile station 1 will thus receive the desired signal power p1 (t)
g11 (t) and interference
power I1 (t), given by
I1 (t) = p2 (t)
g12 (t) + 1 ,
where 1 represents noise power as in the single-user case discussed earlier in the
chapter. The signal-to-noise ratio is now of less importance. Instead, the signal-tointerference ratio (SIR) plays a similar role. For example, the SIR at mobile MS1 ,
is given by
4

1 (t) =

p1 (t)
p1 (t)
g11 (t)
g11 (t)
=
.
p2 (t)
g12 + 1
I1 (t)

10

Extended Summary

BS2

BS1

g22 (t)
g11 (t)
g21 (t)

g12 (t)
MS2

MS1
Figure 2.2 In the considered communication situation, two connections are
using the same channel and create mutual interference (dashed
arrows). The desired signal paths are indicated by solid arrows.

The corresponding SIR in dB is


1 (t) = p1 (t) + g11 (t) I1 (t).
As indicated by the capacity expression in Equation (2.1), the required data rate
is related to SIR. We therefore assume that the requirements of the two users
are provided as target SIR:s, it . Essentially, power control is about assigning
appropriate pi (t):s to meet these requirements. The time instants t will from now
on be considered as time instants when the power is updated in the base stations.

2.2

Power Control Algorithms

If all four power gains gij (t) and both the noise powers i were known at every
time instant t, it would be possible to compute the optimal powers to use at each
base station. This is not realistic in a practical situation. The simple reason is
that it requires a centralized solution, which would involve extensive signaling of
information. Instead, we require that each base station updates its own power
based only on SIR measurements from the connected mobile (distributed control ).
Different protocols may be used to feed back these measurements. We will consider
two important feedback situations:
Information feedback. The mobile feeds back the exact SIR measurements
or the error
ei (t) = it i (t).

(2.2)

The important characterization is essentially that real numbers are fed back.
Decision feedback. In a power control setting, we typically associate this
with feedback of the sign of the error in (2.2)
si (t) = sign(it i (t)) = sign(ei (t))

(2.3)

2.3 Local Analysis

11

Thus, only one bit is needed for command signaling, which makes the scheme
bandwidth efficient.
In this introductory chapter, we will consider a simple integrator as control algorithm. Depending on feedback assumptions, the powers will thus be controlled
as
Information feedback:

pi (t + 1) = pi (t) + ei (t)

(2.4a)

Decision feedback:

pi (t + 1) = pi (t) + si (t)

(2.4b)

Yet simple, these two algorithms include most of the proposed algorithms to
date. For a more detailed discussion, see Section 5.2. The actual time between
consecutive power updates, the sample interval Ts , varies from systems to system.
For example Ts = 0.48 s in GSM and Ts = 1/1500 s in WCDMA.
As seen above, the controller itself contains a delay of one sample interval.
However, both measuring and control signaling take time, resulting in additional
time delays in the system. A relevant model is that the measured SIR available
to the algorithm at time instant t, depends on the power level at t 1. This is
typically the situation in GSM and WCDMA. The SIR at mobile MSi is thus given
by
i (t) = pi (t 1) + gii (t) Ii (t).

2.3

(2.5)

Local Analysis

The global system can be seen as two local distributed control loops interconnected
via the mutual interference. Valuable insight can be obtained by studying these
local loops separately. In fact, as will be motivated in Chapter 5, local loop stability
is a necessary, but not sufficient condition for global system stability.
The terms instability and stability of a local loop has to be well defined in
order to avoid confusion. Rather simplified, instability comes about when relying
too much on outdated information such as in Equation (2.5). This results in overcompensation, which may be aggravated over time. A thorough study of local loops
with respect to various algorithms is provided in Chapter 5.
Considering information feedback and the situation at mobile MS1 , the local
loop dynamics is described by Equations (2.2), (2.4a) and (2.5), which combine to
p1 (t + 1) p1 (t) + p1 (t 1) = (1t g11 (t) + I1 (t)).

(2.6)

The power pi (t) thus satisfies a linear difference equation. Its solution can therefore
be associated with the characteristic equation
z 2 z + = 0.
Considering results from linear systems theory (see Section 5.3) we conclude that
the solution to the difference equation is stable if and only if the roots (possibly

12

Extended Summary

complex) to the characteristic equation are located within the unit circle. The
product of the roots is equal to . Therefore, the local control loop is stable if
0 < < 1. For example the choice = 0.9 provides a locally stable controller.
General power control algorithms in the information feedback case are analyzed
with respect to local stability, using similar root locus analysis in Chapter 5.
The sign function, which is a vital component in decision feedback, has both a
stabilizing and a destabilizing effect. It is stabilizing in the sense that we cannot
over-compensate an outdated measurement by more than as seen in (2.4b). On
the other hand it is destabilizing, since the error is never compensated for by less
than either.
The corresponding local loop using decision feedback can be seen as a linear
system with a static nonlinearity (the sign function). Figure 2.3 illustrates the
local dynamics of the algorithm by a block diagram. Simulations of this local
b.

a.

ei (t)

f (e)

si (t)

30

i (t)
pi (t)

it

29

31
32
33

34
0

10

20

30

40

50

Time instants t
Figure 2.3 When using decision feedback, the local loop can be seen as a
linear system G in series with a static nonlinearity f (e) (the
sign function). These components combine to the local loop
depicted in a. Simulations of this local loop indicate oscillating
power levels, as seen in b.

loop indicate an oscillative behavior, as seen in Figure 2.3b. Chapter 5 introduces


the discrete-time describing function of the sign function to describe its dynamical
effects together with time delays and the integrating controller in (2.4b). The analysis predicts an oscillation in the power levels characterized by a triangular wave
with a period of N = 6 samples and an amplitude 1.5. This is in accordance with
the observed behavior in Figure 2.3b. Discrete-time describing function analysis
is presented more rigorously in Chapter 5. The analysis predicts several modes of
oscillation, and external disturbances may stimulate switching between the modes.

2.4

Local Design

As disclosed in Section 2.3, instability of local loops is essentially a result of too


much trust in outdated information. The behavior can be improved by either
relying less on the measurements or by predicting future measurements.

2.4 Local Design

13

Relying less on the measurements corresponds to a smaller controller parameter


. This will ensure local stability in case of information feedback. Stability is of
course necessary, but different stabilizing controllers provide very different behavior. Therefore, some design methods from control theory are applied to obtain good
performance in Chapter 6. Using pole placement techniques, the local loop performance is optimized with respect to a criterion, resulting in the optimal parameter
value = 0.34. In case of decision feedback, the amplitude of the oscillations in
the local loop is directly proportional to . Hence, the amplitude can be reduced
by choosing a smaller .
The core problem with outdated information is that the most recently computed output powers are not reflected in the SIR measurements in (2.5). However,
these power levels can be monitored in the mobile station, and used to adjust the
measurements. The strategy for a general control algorithm is referred to as time
delay compensation (TDC) in Section 6.2. It is essentially a simple prediction of
future SIR measurements.
If we utilize information feedback, the powers can be monitored by an internal
copy of the power control algorithm in (2.4a). Then, the SIR in (2.5) is naturally
adjusted. The adjustments in the mobile thus consists of the following steps:
1. Adjust the SIR measurement using internally monitored powers:
i (t) = i (t) + pi (t) pi (t 1).
2. Feed back the control error based on the adjusted measurement:
ei (t) = it i (t).
3. Monitor power to be used by the base station:
pi (t + 1) = pi (t) + ei (t).
This scheme can be simplified when using decision feedback, since the difference
between two consecutive powers is always . Therefore, TDC reduces to a single
equation:
1. Feed back the decision:
si (t) = sign(it i (t) + si (t 1)).
The simple prediction in the compensation above only involve the transmitted
powers. If dynamical models of the power gains are at hand, they can be utilized for
prediction of future power gains or to design appropriate power control algorithms.
Good methods for estimating such models online are available. When using this
information, the local control performance can be improved significantly.
Chapter 6 contains more details on design of local control algorithms. Furthermore, it addresses some practical design aspects, such as various controllers ability
to mitigate time-varying power gains. These properties are related to the update
rate of the controller.

14

2.5

Extended Summary

Global Analysis

Hitherto, the interconnections between the two loops have been neglected. If there
were no such interconnections, it would always be possible to meet the target SIR
requirement in each loop (at least if sufficient power is available). Otherwise, this
ability is strongly dependent on the global system. Here, global issues like capacity,
load and stability are in focus.
It is natural to discuss the power control problem at two levels. The local
control loops were discussed in the preceding two sections. Capacity and load are
typically discussed at a global level. We assume that the local loops successfully
compensates for the fast variations, so that the power gains can be considered as
constant. Moreover, stability and convergence are also discussed at a global level.
Again, the power gains are assumed constant, but the motivation is that we are
considering the short term behavior of the global system, and the power gains are
assumed to fluctuate more slowly. To exemplify the somewhat theoretical results
in this section, we consider the particular case:


1
0.08
= [
G
gij ] =
(2.7)
0.01 0.8
The load and capacity of a system relate to whether specific user requirements
can be supported or not. Therefore, they are naturally discussed in terms of the
target SIR:s it . Conceptually, the capacity of a system describes the optimal
utilization of the resources. An intuitive optimization strategy is to maximize the
smallest SIR of the two users. This leads to the balanced situation, where both
mobiles experience the same SIR (Zander, 1992b). In the current situation with
two connections the expression for optimal balanced SIR simplifies to
r
1
g11 g22

=
.
(2.8)

g
12  =
g12 g21
0
g
11
max eig g21
0
g
22
The example gains in (2.7) yield the optimal balanced SIR = 31.6 ( = 15 dB).
Unfortunately, it is not possible to achieve the optimal balanced SIR in practice,
since it requires infinite powers. Instead it serves as an upper bound on the achievable capacity.
If the two mobiles are requesting different services, they will probably require
different target SIR:s. Consequently it is interesting to study the load of the system
r
given target SIR requirements. For that matter we introduce the relative load L
in Chapter 7. In the case of two connections, it is given by
r

q
q
g
12 t 
1
0
1
g12 g21
4
g
11

=
1t 2t = 1t 2t
Lr = max eig g21 t
2
0
g11 g22

g
22
An important result in Chapter 7 is that it is possible to meet the target SIR
r < 1. Then, the power control problem is said to be
requirements if and only if L

2.5 Global Analysis

15

feasible. In the two-connection case, the feasibility requirement reduces to


r < 1
L

q
1
1t 2t < (1t + 2t ) < .
2

(2.9)

Consider the particular case in (2.7). Both the requirements (1t , 2t ) = (10, 10) dB
and (1t , 2t ) = (10, 16) dB correspond to feasible power control problems, while
(1t , 2t ) = (18, 16) dB does not.
Other important global issues include stability and convergence. Assume that
the considered power control problem is feasible. Previous results on convergence
have almost exclusively omitted time delays. For example, the specific case of
information feedback and = 1 provides appealing convergence properties when
omitting time delays. This does not hold true when subject to time delays. As
seen in Section 2.3, the algorithm corresponds to an unstable system. However,
when using the time delay compensation in Section 2.4, the combination results
in a controller that is stable and converges for all possible time delays. This is
formally proven in Chapter 7.
The benefits of the time delay compensation are also evident when considering
decision feedback. This algorithm is stable and converges (Herdtner and Chong,
2000) to the bounded region
|it i (t)| (2n + 2)
When using TDC we show in Chapter 7, that the resulting controller is stable and
converges to the region
|it i (t)| (n + 2)
Hence, the longer the time delay, the more emphasized improvements using TDC.
Note, however, that only the fact that the bound is tighter does not imply that the
error variance is smaller.
When considering other algorithms and filters, the foundation on which these
proofs rely, is insufficient. Instead we will discuss stability in terms of an approximative analysis, based on linearization around a specific equilibrium point. A general
stability result is provided in Chapter 7. To illustrate the main ideas, we will focus
on the particular example of information feedback power control in (2.4a). Even
though the local loops are linear, the interconnections are not. The interference at
mobile MS1 in dB is given by
p2 (t)
g12 + 1 ),
I1 (t) = 10 log10 (

(2.10)

which clearly is nonlinear. One way of circumvent this is to linearize the interference
at a particular point to obtain a linear model valid in a neighborhood of that point.
Assume that the power control problem is feasible. Hence, there exist power
assignments pt1 , pt2 corresponding to the target SIR:s 1t , 2t . The interference
at mobile MS1 when using these powers is denoted by I1t . If we linearize the

16

Extended Summary

interference around the equilibrium power level of the other base station pt2 , we get
#
"

I1 (t)
t
(p2 (t) pt2 ).
I1 (t) I1 +
p2 p2 (t)=pt
2

Using Equation (2.10) yields


I1 (t) I1t +

g12 pt2
(p2 (t) pt2 ) =
1 (p2 (t) pt2 ),
I1t

(2.11)

where
1 describes the influence from the other mobile and can be rewritten as

1 =

g12 pt2
I1t 1
=
.
I1t
I1t

Since all quantities are positive, we conclude that 0


1 < 1. It is instructive to
r and the
establish the relation between the relative load L
i :s. It is easy to show
that the following holds

r =
1
2 .
L
Hence, there is a clear connection between the load of the system and the extent
to which the loops affect each other.
If we insert the linearized interference in (2.11) into Equations (2.2) and (2.4a),
we obtain

1 (p2 (t 1) pt2 ) . (2.12)
p1 (t + 1) = p1 (t) + 1t p1 (t 1) g11 + I1t +
Note that the power from the other base station p2 (t 1) also is delayed by one
sample. Since the linearization is valid in a neighborhood of pt1 , we are interested
in the dynamics in terms of the deviation from that point. Therefore, we introduce
p1 (t) = p1 (t) pt1 .
The same analysis applies to the situation of the other mobile MS2 . If we use
pi (t) above to rewrite Equation (2.12), we obtain the two equations (one for each
connection) describing the global system dynamics as
1 p2 (t 1)
p1 (t + 1) = p1 (t) p1 (t 1) +
2 p1 (t 1).
p2 (t + 1) = p2 (t) p2 (t 1) +
This approximation is linear and can be analyzed using linear methods. Stability
results regarding the two-mobile case and the general case can be found in Chapter 7. In the two-connection case, these requirements allow a compact formulation.
We conclude that the global system is stable in a neighborhood of target SIR if the
following inequality holds
<

1+

1
1

=
r .

1
2
1+L

(2.13)

2.6 Estimation and Outer Loop Control

17

Hence, the higher relative load, the tighter requirements on and vice versa. The
conclusion is that system with high loads is harder than average to control and
requires more careful local design. Moreover, 0.5 always provide globally
stable two-connection systems. For example, the choice = 0.34 in Section 2.4
corresponds to a stable global system independent of the load. Conversely, we
cannot guarantee stability of the choice = 0.9 in Section 2.3. When applying
TDC to the control algorithm, the stability requirements are different. As shown
in Chapter 7, TDC results in a stable global system for 0 < 2.

2.6

Estimation and Outer Loop Control

In some practical cases, the power update computations take place in the base
stations, both for the up- and downlink connections. The mobile acts as a slave and
reports requested (highly quantized) measurements. The base station then needs
to recover as much relevant information from these reports as possible. Another
practical issue is related to issuing appropriate target SIR:s. As was seen in the
previous section, not all target SIR requirements can be met. Both these issues are
dealt with in Chapters 8 and 9 respectively.
In GSM, the measurement reports comprise RXQUAL, which is related to the
perceived quality and RXLEV, which describes the total received signal power.
Since the focus is on one of the connections, we drop the index i for clarity. Assume
that we want to recover the desired signal power C(t) = p(t)+g(t) and the SIR (t)
from the measurements. The corresponding relations are nonlinear, which make
estimation a bit challenging. Chapter 8 proposes a maximum likelihood estimator
to address the problem. In essence, it is based on a probabilistic description of
the problem. The core operation is to consider the likeliness that the observed
measurements were generated from a model with parameters C and . Estimates
are obtained as the parameters that maximizes this likeliness, or likelihood function.
Figure 2.4 exemplifies the likelihood at a specific time instant, and indicates how
to obtain the estimates.
This far we have assumed that the user requirements can be posed as target
SIR:s, which is said to correspond to a specific data rate. Unfortunately, the
relationship between a data rate and SIR is not perfectly known. In fact, it might
be time varying. Thus, there is a need to adapt the target SIR:s as well. This
is typically taken care of in an outer control loop, which operates at an order of
magnitude slower update rate. Chapter 9 proposes a method where statistics about
the relation between quality of service and target SIR is utilized.
r cannot be monitored online, since the measure is based
The relative load L
on the knowledge of power gains gij . Therefore, there is a risk that the requested
target SIR:s correspond to an infeasible power control problem. If using the simple
integrating algorithms in (2.4) when the power control problem is infeasible, the
two connections will start competing about the target SIR:s. This race will not
end until one or both connections are using maximal powers. Such cases can be
handled by forcing connections that require high powers to aim a lower target

18

Extended Summary

0
0.5
1
1.5
2
2.5
3
3.5
4
30
25

90

20
95

15
100

10
105

110

Figure 2.4 In ML estimation, the estimates are obtained as the parameters


that maximizes the likelihood function as seen above.

SIR:s (Almgren et al., 1994). A related issue is schemes that force users with less
favorable propagation conditions to use a lower data rate and vice versa. These
and similar priorities could also be handled in the outer loop, see Chapter 9.

2.7

Simulations

To illustrate the effect of different parameter settings, we reconsider the specific gain
situation in (2.7). Assume that the two mobiles initially require target SIR:s 1t =
2t = 10 dB, and that the control algorithms are perfectly initialized, i.e., pi (0) = pti .
At time instant t = 10, the second mobile upgrades his target SIR to 2t = 16 dB,
while the first remains at 2t = 10 dB. Both situations correspond to feasible power
control problems as concluded in Section 2.5. The two mobiles remain at the same
locations, implying constant power gains gij throughout the simulation. Figure 2.5
illuminate the recovering ability of different controller configurations. Subfigures
a-d consider information feedback, while e-f address decision feedback. From the
simulation, we note the following for the feasible power control problem
a. Information feedback with = 1 does not correspond to a stable local loop
Therefore it is intuitive that the global system is unstable.
b. A smaller yields stable local loops, but the global system is still unstable.
This illustrates the fact that local stability is necessary but not sufficient for
global stability.
c. An even smaller = 0.34 will always result in a stable global system.
d. When using TDC, the controller with = 1 corresponds to a stable system.

2.7 Simulations

a.

19

b.

40

40

20

i (t)

i (t)

20

20

40

20

10

15

40

20

Sample instants

c.

d.

20

10

15

20

20

15

i (t)

i (t)

15

10

10

10

20

30

40

Sample instants

e.

Sample instants

10

20

30

40

Sample instants

f.

20

20

i (t)

15

i (t)

15

10

10

10

20

30

Sample instants

40

10

20

30

40

Sample instants

Figure 2.5 The recovering ability of various controllers when one of the
mobiles upgrades his target SIR from 10 to 16 dB. Information
feedback: a. = 1, b. = 0.9, c. = 0.34, d. = 1 and
TDC. Decision feedback, e. = 1, f. = 1 and TDC.

e. Decision feedback always result in an oscillative behavior, even when perfectly


initialized.
f. The oscillations in the decision feedback case can be reduced by employing
TDC.
Simulations using other controllers and strategies are presented in Chapter 10.
Different phenomenons studied in the thesis are illuminated using both small and
large-scale simulation environments.

20

Extended Summary

3
Cellular Radio Systems

In this chapter, the focus is on mobile communications systems. The objective is


to cover the main issues so that a reader without prior knowledge will understand
the problems and challenges in such systems. Subjects related to the scope of this
thesis are, however, presented in more detail. In the presentation we also introduce
the terminology used in the field.

3.1

Overview

There are several books covering the development of mobile communications systems, see e.g., Ahlin and Zander (1998); Garrard (1998); Jakes (1974); Lee (1982);
Rappaport (1995); Steele (1992) and Stuber (1996).
History
The development of wireless communications stems from work during the second
half of the nineteenth century. In 1864, Maxwell predicted the existence of electromagnetic radiation and formulated the basic theory that is still in use today, over a
century later. Maxwells theory was verified experimentally by Hertz in 1887, and
therefore the electromagnetic waves are sometimes referred to as Hertzian waves.
The origin of mobile radio is considered to be 1897, when Marconi was credited
with a patent for wireless telegraph, the first radio related patent ever. On De-

21

22

Cellular Radio Systems

cember 12, 1901, Marconi received a radio signal in Newfoundland, which was
transmitted from Cornwall, England. Thereby he showed that radio communication was possible despite the curvature of the earth.
During the twentieth century, the radio technique was further improved, not the
least due to important inventions such as the vacuum tubes, amplitude modulation
(AM), frequency modulation (FM), transistors, integrated circuits etc. The first
true mobile radio system used in practice was a police car radio system, introduced
at Detroit Police Department 1921, but the systems still had a long way to go
before they would reach the general public.
First Generation Cellular Systems
The concept of cellular systems originates from Bell Labs 1947. Instead of transmitting the signal as far as possible, the range would be deliberately limited, allowing
frequencies to be used again at a much shorter distance. However, the idea had to
wait for decades before it could be implemented. The technology needed was simply not available. With the introduction of the Nordic Mobile Telephone (NMT)
system 1981 and the Advanced Mobile Phone Service (AMPS) system 1983, cellular phones were not solely for the rich and famous anymore. The NMT standard
was defined in a collaboration between the Nordic countries, and an important
feature was international roaming. In the beginning it used radio frequencies in
the 450 MHz band, but in order to meet the needs, operation in the 900 MHz band
was introduced later. AMPS, which is operating in the 800 MHz band, became
widely spread over the world, and has the largest penetration among the analog
systems. Modified versions of AMPS include the British Total Access Communications System (TACS) and the Japanese JTACS.
Second Generation Cellular Systems
The Global System for Mobile Communications (GSM)1 was deployed in 1992
as the worlds first digital cellular standard. Originally it operated only in the
900 MHz band, but nowadays it is adapted for 1800 MHz (DCS 1800) and 1900 MHz
(PCS 1900).
The incentive to consider digital systems was mainly different in the USA, since
AMPS had capacity problems. The problem was that, unlike in Europe, additional
spectrum for digital cellular systems at frequencies nearby the AMPS-frequencies
were not available. AMPS was also the dominating analog technology, and therefore
a new digital system had to be reverse compatible, preferably using most of the
infrastructure in AMPS. Two systems were proposed and brought into operation,
IS-95 and D-AMPS (Digital AMPS a.k.a. IS-54, evolved into IS-136). They were
both reverse compatible, but very different.
The first digital cellular system in Japan, Personal Digital Cellular (PDC),
was introduced in 1994 and is very similar to IS-54. It operates in the 800 MHz
1 The

original meaning of the acronym was Groupe Special Mobile, which was a group established
in 1982 with the mission and mandate to define future European cellular radio standards.

3.2 Radio Communication

23

and 1500 MHz bands and is the most spectrum-efficient among the systems of the
second generation.
The systems described above have an extensive coverage, but they will never
reach complete coverage. In order to fill in the gaps, there is a need for Mobile
Satellite Communications Systems, and at the present there are five major systems
under development: Globalstar, ICO (formerly Inmarsat), Iridium, Odyssey, and
Teledesic (Keller et al., 1997).
Third Generation Cellular Systems
The needs for voice communication are more or less met by the narrowband systems
of the second generation. However, there are a number of other applications that
require more data to be transmitted. These include conferencing, video, database
access, Internet access etc. The concept name for this type of system is International Mobile Telecommunications (IMT-2000, see e.g., Chaudhury et al., 1999).
In traditional telephony systems, the calls have been circuit-switched, meaning
that the call occupies one channel throughout the call. Due to the bursty nature of
data communication this is inefficient, and instead packet switching can be used,
where the data is divided into packets and transmitted independently. Therefore,
the second generation systems have evolved to include methods for data services.
The ambition is to gradually provide higher data rates, first by circuit-switched
technologies, but eventually based on packet switching. For example, we mention
Cellular Digital Packet Data (CDPD, see e.g., Puk, 1996) in IS-136 networks, High
Speed Circuit Switched Data service (HSCSD, see e.g., Scholefield, 1997) and General Packet Radio Services (GPRS, see e.g., Brasche and Walke, 1997; Cai and
Goodman, 1997) in GSM networks and High Speed Data (HSD, see e.g., Knisely
et al., 1998) in IS-95 networks.
For higher data rates and a more flexible resource allocation, the technology has
to be adopted accordingly. After several twists and turns, the different standardization bodies agreed to try to define a global standard. From a technology perspective, these systems are commonly referred to as either wideband CDMA (WCDMA,
see e.g., Dahlman et al., 1998) or cdma2000 (Knisely et al., 1998), from the two
dominating air interface proposals.

3.2

Radio Communication

The purpose of a radio communication system is to transmit a message from a


source to a user. These systems can be classified in a number of ways, but here
it is natural to treat analog and digital systems separately. However, all radio
communication systems are using the same medium the radio channel. The
transmitted signal is affected by radio propagation effects, thermal noise, interfering
signals and other types of disturbances. For further details on radio communication,
we refer to Ahlin and Zander (1998); Kucar (1991); Proakis (1995); St
uber (1996).
An analog communication system consists of a transmitter, a radio channel and
a receiver. In the transmitter, the message signal is filtered and modulated onto

24

Cellular Radio Systems

the carrier signal. It is then transmitted over the radio channel and demodulated
in the receiver. The cellular systems of the first generation are analog and use
Frequency Modulation (FM).
The basic elements of a digital communication system are illustrated in Figure 3.1. It still consists of a transmitter and a receiver communicating over a radio
channel, but the internal components are a bit more sophisticated. Initially the
Transmitter
Message

Source
Encoder

Channel
Encoder

Modulation

Channel
Receiver
s

Estimated
Message

Source
Decoder

sq

Channel
Decoder

fer

Demodulation

ber

sir

Figure 3.1 Block diagram of a digital communication system.


message is converted into a sequence of bits by the source encoder. In order to
enable a more reliable transmission, redundancy is added in a controlled manner
by the channel encoder. This redundancy in the bit sequence aids the receiver in
decoding the desired sequence. It can be used both for error detection and error
correction and is important to obtain good performance in a digital system, due to
the disturbances introduced by the channel.
The radio channel is in practice a channel for continuous signals, and therefore
the bit sequence has to be modulated onto an analog carrier signal. The primary
objective is to utilize the available bandwidth efficiently, while achieving a prescribed performance, given by the number of erroneous bits received divided by
the number of bits transmitted. This is referred to as the Bit Error Rate (BER).
Note that the BER is primarily affected by the radio channel and the modulation
scheme used. Among the systems of the second generation, GSM and PDC are
using Gaussian Minimum Shift Keying (GMSK) and D-AMPS and IS-95 are using
/4-shift Quaternary Phase Shift Keying (/4-QPSK).
At the receiver, the signal is processed in the reversed order compared to the
transmitter, with the objective to reconstruct the original message. The demodulator will convert the corrupted waveform to an estimate of the transmitted bit
sequence, from which the channel decoder reconstructs the data stream by using
the redundancy in the transmitted bit sequence. Finally the source decoder tries
to reconstruct the original message signal.

3.3 Radio Wave Propagation

3.3

25

Radio Wave Propagation

The Maxwell equations provide, at least in principle, solutions to all problems


regarding electromagnetic fields. If all facts were known, we could in theory determine the effects on a radio wave when it propagates through a medium. However,
these solutions tend to be far too complex to provide understanding of problems in
practical situations. Instead, simple models may be used to capture the physical
phenomenons coarsely, in order to provide an intuitive understanding of real-life
cases.
It is very hard to come up with simple models that are valid for all frequencies,
but since the issue here is mobile communications systems, we can focus on a
limited frequency band. The presented mobile communications systems are using
the UHF band (300 - 3000 MHz), which has well suited properties for wireless
communication. In this band it is possible to use signals with relatively large
bandwidth, which gives higher data transmission capacity. The effects of rain and
moisture are slight, but the radio waves are shielded and reflected by mountains
and buildings.
The meaning of a communications channel is often used in an imprecise way.
Steele (1992) views a particular channel as the link between two points along a
path of communications. The following channel types are emphasized
The propagation channel is the physical medium that supports wave
propagation between the antennas.
The radio channel is the propagation channel and the transmitter and
receiver antennas viewed collectively.
The digital channel also incorporates the modulation and demodulation
stages.
The focus here will be on the radio channel. We are interested in the power gain2 g
of the received signals, that is if a transmitter emits a signal using the power p the
receiver will observe a signal power of gp. In order to model this gain we separate
the propagation effects in three groups and use the model
g = gp gs gm .
The distance dependent attenuation and the antenna attenuation are modeled by
the path loss (
gp ). Terrain variations are resulting in shielding and diffraction
and is modeled by the shadow fading (
gs ), while the effects of the reflections are
captured by the multipath fading (
gm ). These models are further explored below.
For more extensive material regarding radio wave propagation, see (St
uber, 1996).
It will be important to note the difference between g, which represents the
power gain in linear scale, and g which is the power gain in dB.
2 Often

the term attenuation is used to stress the fact that the gain is less than one.

26

3.3.1

Cellular Radio Systems

Path Loss

On a long time average, the observed power at the receiver depends mainly on the
distance to the transmitter. One of the simplest models is based on the assumption
of propagation in free space, but except for satellite communication applications,
this is too coarse. When we consider propagation over plane earth an approximation
of the path loss is derived in (Jakes, 1974), and given by
gp =

Cp
,
r

(3.1)

where r is the distance between the transmitter and the receiver, the path loss
exponent is a constant equal to 4, and Cp is a constant which depends on antenna
specific parameters and the transmitted wavelength.
Empirical studies by Okumura et al. (1968) and Hata (1980) resulted in path
loss models for urban, suburban and rural areas. Equation (3.1) still holds for the
long time average gain if we note that the constants Cp and depend on the type of
terrain. Typical values of are about 2 5, where the lowest value corresponds to
free space propagation, and the higher to urban environments with high buildings.
Note that the plane earth approximation is covered by this range in .

3.3.2

Shadow Fading

As mentioned above, the long time average is given by the path loss. Terrain variations will however result in diffraction and shielding phenomenons, which manifest
themselves as a slow variation in this average gain over a distance corresponding to
several tens of wavelengths. This effect is referred to as shadow fading. Okumura
et al. (1968) and Hata (1980) were pioneers in studying these variations. They used
values in dB and argued that the shadow fading can be modeled using a zero-mean
Gaussian random variable, i.e.
gs N (0, s ).

(3.2)

Hence the linear shadow fading gain (


gs ) can be modeled using a log-normal
distribution, i.e. the corresponding value in dB is normal distributed with zeromean and variance s2 . This model is reasonably accurate when discussing separate
samples of the gain, but it is not sufficient if we consider a receiver that is moving
around in the terrain. The effects from the terrain are correlated and if the receiver
is shielded at one instant, it will most likely be shielded for some time thereafter.
To include this spatial correlation, Gudmundson (1991) proposed an autocorrelation function that incorporates the velocity of the mobile v and relates it to
a correlation distance d. The basic idea is that two samples separated by a distance
of at least d are more or less uncorrelated. Spatially, the model can be described
as a zero-mean Gaussian random variable filtered through a first order filter. This
model was refined by Srensen (1998).

3.4 Multi-User Communications

3.3.3

27

Multipath Fading

In the presence of several large objects, there will be a great number of reflected
signals that reach the receiver. Depending on their phase they interfere either
constructively or destructively resulting in multipath fading. For digital systems it
is important to determine if this fading can be assumed to be constant for each
received symbol. If that is the case, the fading is referred to as flat, but if not,
we are experiencing intersymbol interference due to this frequency selective fading.
For low to moderate data rates the intersymbol interference can be counteracted
using channel equalization (St
uber, 1996) and therefore we will model the multipath
fading as flat.
A simplified worst case scenario arises when the Line-of-Sight (LoS) ray is assumed completely shielded, but the reflected rays reach the receiver and enable
transmission of information. If the arriving rays are modeled as isotropic, the
amplitude gain due to multipath is described by a Rayleigh distribution (Clarke,
1968). Therefore, multipath fading is commonly referred to as Rayleigh fading.
Just as in the case of shadow fading, the multipath fading has a spatial correlation as exemplified in Figure 3.2. Thus the fading is depending on the velocity of
the mobile station. One may also draw the erroneous conclusion, that the fading
is constant if the location of the mobile station is fixed. The truth is that the
environment is also moving, and it is the movement relative to the environment
that matters. Since the origin of the multipath fading is different path lengths of
the reflected waves, it is also depending on the wavelength of the signal. Therefore
we will also observe a correlation in the frequency domain, see Figure 3.2.

3.3.4

Example: Spatially Correlated Propagation

In Figure 3.3 we see a sample of how the power gain may vary when a mobile station
is moving in the terrain. It is assumed that the distance to the transmitter is almost
constant and that no Line-of-Sight component reaches the receiver. Therefore the
variations are due to shadow and Rayleigh fading with spatial correlation.

3.4

Multi-User Communications

Consider a case of one base station (BS) serving a certain service area. The BS
transmits and receives data to and from the M mobile stations (MS) in the service
area. The communication goes in two directions, and one distinguishes between
the downlink (forward) channels from BS to MS, and the uplink (reverse) channels
from MS to BS. For simplicity we focus on the downlink from BS to MS number
1. Assume that the BS is transmitting the signals s1 (t), s2 (t), . . . , sM (t) to the
mobiles. Figure 3.4 provides a simple model of the situation at the receiver of MS
number 1. The receiver observes the desired signal and several interfering signals
plus thermal noise.
One important choice when designing a multi-user communication system is the
choice of carrier signals, and we will divide them into two categories: orthogonal and

28

Cellular Radio Systems

10

gm [dB]

5
0
5
10
15
20
25
30
35

Frequency

Spatial deflection

Figure 3.2 A realization of the multipath fading as a function of spatial


deflection and frequency.

non-orthogonal signals. The reason is that there are some characteristic differences,
which will be pointed out in the following two sections.

3.4.1

Orthogonal Signals

When the signals are orthogonal, they can be seen as orthogonal base vectors
spanning the signal space. Therefore the receiver only has to extract the energy
along the s1 dimension in the signal space in order to recover the information.
(In real systems, the channel affects the orthogonality at the receiver. Therefore,
signals are separated by a guard band to improve the orthogonality.) We will not
analyze the receiver structure in more detail, and instead focus on the commonly
used orthogonal signals.
The first approach is to separate the users in the frequency domain. This is
referred to as Frequency Division Multiple Access, FDMA (Figure 3.5a), and it has
been very popular, mainly because it is well suited for analog technology. The main
challenge is the frequency synchronization, which is needed to extract the band of
interest. FDMA is the technology used in systems of first generation. The channel
bandwidth used in these systems are 25-30 kHz.
Similarly, we can separate the users in the time domain using Time Division
Multiple Access, TDMA (Figure 3.5b). Then each user is allowed to use the entire
frequency band, but only at assigned time slots in a round robin fashion. TDMA
has the advantage over FDMA that the receiver of the mobile station is only used

3.4 Multi-User Communications

29

Power Gain [dB]

gs

gp

gm

Traveled Distance
Figure 3.3 The model for radio wave propagation comprises path loss (gp ),
shadow fading (gs ) and multipath fading (gm ).

1/Nt of the time. During the rest of the time it can be used for scanning other
channels. Since the message is sent discontinuously, TDMA is better suited for
digital technology than for analog and the challenge is time synchronization.
Pure TDMA solutions are rare and instead hybrid FDMA/TDMA (Figure 3.5c)
is used, where the spectrum is divided up in frequency bands, which each are
divided into time slots. One example is D-AMPS, where each 30 kHz sub-band in
AMPS is divided into three time slots, resulting in a threefold capacity increase.
In GSM, the sub-bands of 200 kHz are divided up into eight time slots. Compared
to the 25 kHz channels in NMT there is no capacity increase at all. Instead this is
used to enable more reliable communication.
In GSM there is an optional frequency-hopping pattern (see Section 3.6) meaning that the mobile is using a different sub-band each time slot. This hopping
sequence is determined by a code, and therefore this technique is referred to as
Frequency Hopping Code Division Multiple Access, FH-CDMA. Altogether, the
scheme can be seen as the hybrid FDMA/TDMA/CDMA (Figure 3.5d).

3.4.2

Non-Orthogonal Signals

To avoid the problems of frequency and time synchronization, we can use signals
that are almost orthogonal. Each user is assigned a code and is then transmitting
using the entire frequency band. The receiver extracts the desired signal by corre-

30

Cellular Radio Systems

g1 (t)
s1 (t)

Transmitter

s2 (t)

Transmitter

g2 (t)

.
.
.

sM (t)

Transmitter

Receiver

gM (t)

1 (t)

Figure 3.4 Simple model of a multi-user system. The focus is on the situation at a specific mobile station. Note that the radio channels are characterized by their power gains gi described in section 3.3. The signal 1 (t) represents the thermal noise.

lating the received signal and the code. This spread-spectrum technique is referred
to as Direct Sequence Code Division Multiple Access, DS-CDMA. By spreading and
despreading the signal, the link becomes more robust against fading and interference. The performance gain obtained by spreading is related to the processing gain
(PG). In a system with the data rate R and the channel bandwidth, W , PG is
given by the ratio W/R (Viterbi, 1995).
Consider the uplink, and assume that there are two mobile stations in the
service area, where one is close to the base station and one is far away. If both
mobile stations are transmitting using the same power level, the received powers
at the base station might differ by several orders of magnitude, due to different
power gains of the signals (recall Section 3.3). The signal extraction at the receiver
based on correlation works fine when the powers of received signals are roughly the
same. This is not the case in the above situation, where the signal from the distant
mobile station is drowned by the signal from the close one. Therefore we have
to use appropriate power levels in order to tamper this near-far effect (Gilhousen
et al., 1991). In the downlink, this is not a problem, since all the signals originate
from the same transmitter.
This technique is used today in the narrowband system IS-95, where all terminals communicate on a frequency band of 1.25 MHz. In the systems of third
generation, similar technology will be used, but with a frequency band of 5 MHz.
That will enable higher data rates and mitigate fading better.

3.5

Cellular Radio Systems

When the service area is large, one base station will not suffice. Instead the service
area is divided into a large number of cells, which has given rise to the name cellular

3.5 Cellular Radio Systems

31

a.

b.

1
2

3
t

c.

d.

1
3
1

3
1

3
1

1
t

1
t

Figure 3.5 Different multiple access techniques using orthogonal signals.


The users 1, 2, 3 may be separated either in frequency or in
time or both. a. FDMA, b. TDMA, c. FDMA/TDMA, d.
Frequency hopping FDMA/TDMA.

radio systems. Each cell is served by a base station (BS) and within the cell the
situation is similar to what is described in Section 3.4.
The size of different cells varies very much between rural and urban areas and
this is due to the limited number of users one cell can serve. In rural areas few and
large cells are sufficient to meet the needs, and the radius may be several tenths
of kilometers. In denser populated areas where cellular phones are common, there
is a need for smaller and more numerous cells, serving an area of radius down to
about 100 meters. To meet the needs in the central parts of cities, it is getting
more common to use cells consisting of a short part of a street (micro cells) or a
room or a floor of a building (pico cells).
Usually the cells are depicted as hexagonal, but in reality their size and form are
irregular and depending on the terrain and the propagation conditions. Designing
a cellular system involves extensive cell planning. Among other things this involves
determining clever cell sites to get appealing propagation conditions and cell sizes
to meet the needs for communication at the present and in a near future. In order
to use the hardware efficiently it is more and more common to co-locate three base
station antennas and use sectorized antennas covering a sector of 120 each. When
the antenna is radiating in all directions the term omnidirectional antenna is used.
The operator of the cellular system is assigned a frequency band to use in

32

Cellular Radio Systems

the service area. This spectrum is split up in a number of channels (waveforms)


based on the multiple access scheme chosen for the operation of the system. When
assigning these channels to the base stations, the path loss is actually favorable.
Within the cell, the transmitted signal from the BS can be received by the MS at a
reasonable signal strength, but at some distant point outside the cell, the power of
the signal is negligible compared to the noise. Therefore the channels can be reused
in the service area. The available channels are divided into K channel groups and
each group is assigned to some base stations as exemplified in Figure 3.6. If we
assume a hexagonal cell pattern, the possible reuses K are given by K = a2 +ab+b2,
where a and b are natural numbers. This yields K = 1, 3, 4, 7, 9, 12, 13, . . . . Note
that K = 1 corresponds to the trivial case where all channels are used in every cell.

Figure 3.6 The same channel group is reused in different cells in the network. This example shows the cells, to which one channel group
is assigned, when we are applying a reuse K = 9.

In order to keep the presentation clear we will consider the case of orthogonal
signals. Furthermore, let us focus on a specific downlink channel and on the mobile
stations and base stations using that channel. The terminals are numbered, so
that mobile station i is connected to base station i. (Since we focus on one single
channel, only one MS is connected to each BS on this channel.) Furthermore, the
power gain from base station j to mobile station i is denoted gij . The information
about all downlink power gains on the channel at a time instant t can be condensed
c (t). Assume that there are m connections
into the G matrix of the channel, G
established on the channel. Then this G-matrix is given by

g11 (t) g1m (t)

..
..
..
c (t) =
(3.3)
G

.
.
.
.
gm1 (t)

gmm (t)

Thus the first column contains the gains from base station 1 to the different mobile

3.5 Cellular Radio Systems

33

stations. This matrix is time variant, since each of the power gains is time variant
and since the dimension of the matrix varies with time when mobiles place new
calls or hang up. There are actually two G-matrices: one for the uplink and one
for the downlink. This is due to the use of different frequency bands, as well as
different propagation conditions and antennas for the base stations and the mobile
stations.
Assume that base station i is transmitting using the power pi (t). The corresponding connected mobile station will experience a desired signal power Ci (t) =
gii (t)
pi (t), and an interference Ii (t), which is the sum of the powers from all other
base stations and thermal noise i (t). See Figure 3.7 for a situation of three interferers. Since this interference is emanating from users on the same channel, it is
referred to as co-channel interference. Sometimes, the term multiple access interference (MAI) is used instead. When we are employing a large frequency reuse or
there are few users in the system, the interference is neglectable compared to the
noise, and the system is noise-limited. In the opposite situation when we employ a
small reuse and several mobile stations are active, the system is interference-limited
due to the dominating interference.
In a DS-CDMA system, all the users are using the same frequency channel.
Hence the frequency planning process of assigning channels to the base stations is
avoided. It can be seen as employing a reuse of K = 1. Therefore everybody is
interfering with each other in the network and contributes to the interference at
each receiver. A DS-CDMA system is typically interference-limited.

Figure 3.7 Co-channel interference in a network employing frequency


reuse. The received signal at the mobile station consists of
the desired signal (solid), interfering signals from other base
stations (dashed) and thermal noise. The reuse pattern is the
same as in Figure 3.6 where the reuse K = 9.

34

Cellular Radio Systems

A quantity naturally related to the perceived quality is the signal-to-interference


ratio (SIR) denoted . The SIR at mobile station i is defined by
gii (t)
pi (t)
Ci (t)
.
= P
i (t) =
g

(t)
p
i (t)
Ii (t)
j (t) +
j6=i ij

(3.4)

One other common term for roughly the same quantity is carrier-to-interference
ratio (C/I or CIR). These quantities are both used interchangeably, but more precisely, SIR refers to the ratio at the base band, while CIR refers to the corresponding
ratio at the carrier frequency. Moreover, one differs between SIR before and after
despreading, and the difference is equal to the processing gain. The main focus in
this thesis is the dynamical behavior of algorithms. Since the differences are just a
matter of scale, they are neglectable.
Depending on the receiver design, propagation conditions and the distance to
the transmitter, the receiver is differently successful in utilizing the available desired
signal power pi gii . Assume that receiver i can utilize
the fraction i (t) of the desired


signal power. Then the remainder 1 i (t) pi gii acts as interference, denoted
auto-interference (Godlewski and Nuaymi, 1999). Hence, the SIR expression in
Equation (3.4) transforms to
i (t)
gii (t)
pi (t)

.

(t)
p
(t)
+
1

(t)
pi (t)
gii (t) + i (t)
j
i
j6=i ij

i (t) = P

(3.5)

From now on, this quantity will be referred to as SIR. For efficient receivers,
i (t) = 1, and the expressions (3.4) and (3.5) are equal.

3.6

Diversity

The radio channel will result in a varying transmission quality due to fading and
thermal noise. In order to counteract these, one or several diversity methods can
be used. The concept of diversity is based on the natural idea that one should
let a single information bit be exposed to different channel qualities. Consider for
example the effects of multipath fading, which is varying with both time, frequency
and space (the position of the receiver), see Figure 3.2. With this in mind, it
is natural to categorize diversity into time-, frequency-, and space diversity. In
addition, polarization diversity is obtained by using clever antenna configurations.
Since diversity methods require the reception of several signals, which have been
transmitted over different channels, it is important to have a good algorithm for
how to combine them. This is a major research area, which will not be covered
here. Instead we refer the reader to (Ahlin and Zander, 1998), which also contains
more material on diversity methods.
Next, we describe the different diversity methods, with an emphasis on frequency diversity, since this will be a main issue in the sequel.

3.6 Diversity

35

Time Diversity
Transmission errors over the radio channel are more likely to occur in groups,
rather than regularly distributed over time. Recall for instance Figure 3.3, where
the signal strength at some times fall far below the average value. During this time
interval we will experience an extra high bit error probability. This bursty nature
of bit errors is troublesome and time diversity can be used to mitigate its effects.
Time diversity can be achieved by using interleaving, which means that the
bits are rearranged before they are sent over the channel, and restored in the
original order at the receiver. Thus, the effect is that the bit errors are likely
to become evenly distributed after this rearrangement, and the error correcting
codes can probably correct the errors, since they usually have been constructed for
independent errors. A consequence of the interleaving is that there will be a time
delay due to the fact that the receiver has to wait until all bits have arrived before
rearranging them.
Frequency Diversity
Frequency diversity can be achieved by transmitting the signals over two or more
frequency carriers. Since the fading is frequency dependent (see Figure 3.2) the
received signals will be more or less correlated depending on how well separated
the carrier frequencies are. Furthermore, one can also say that wideband carriers
yield frequency diversity, since they cover a wide frequency range.
Space Diversity
Space diversity methods utilize the fact that the fading becomes less correlated
at two points the further apart they are. It is not hard to imagine that by using
several antennas, it is unlikely that all of them receive dips in the fading pattern
simultaneously. An extreme case is when the antennas are connected to different
base stations, which is called macro diversity. More often an antenna array is used
at each base station (micro diversity).
Polarization Diversity
Polarization diversity is achieved when the antennas are aligned in different directions, usually horizontally and vertically. This utilizes the fact that the electromagnetic waves have different reflection properties depending on their orientation,
and thus signals from different paths become more and more uncorrelated for each
reflection.
Frequency Hopping
One of the frequency diversity methods is frequency hopping, which is used in
some of the hybrid FDMA/TDMA systems. The distinguishing feature is that
instead of using the same frequency channel all the time, it is changed at each time

36

Cellular Radio Systems

slot, according to a hop sequence, see Figure 3.5d. Usually frequency hopping is
combined with interleaving, and it is then also a time diversity method.
Frequency hopping falls into two categories, slow frequency hopping and fast
frequency hopping. The former means that there is more than one bit per hop,
i.e. the time it take to transmit one bit is shorter than the time during which the
receiver remains on the same frequency channel. Fast frequency hopping means
the opposite. This is used in some military systems for security reasons, since they
become hard to interfere. The slow frequency hopping on the other hand is used
for its diversity properties, for instance in GSM where it is part of the standard.
The effects of the slow frequency hopping is twofold. Firstly, we get the frequency diversity discussed above, and secondly we get interferer diversity. This
is the gain from having different co-channel interferers on each time slot, which
implies that the interference is shared between the users, an effect called interference averaging. Furthermore, since information sent during sequential hops is
received with different interference, interleaving and coding will improve the transmission link quality, if it covers several hops. The interference diversity gain in
GSM is discussed in (Olofsson et al., 1995) .
One distinguishes between cyclic frequency hopping and random frequency hopping. The difference is that in the former, all transmitters hop by using the same
sequence of frequencies, and thus there will be no interferer diversity, since the
receiver will experience interference from the same sources all the time.
Direct-Sequence CDMA
The effect of Direct-Sequence CDMA (DS-CDMA) is similar to when using frequency hopping, but more emphasized. In such a system, the narrowbanded user
signal is spread onto the entire system bandwidth, using individual spreading codes.
The same code is used at the receiver to despread the received signal down to the
original narrowbanded signal. Spreading is implemented as a multiplication by a
code sequence, with a chip rate which is much higher than the symbol rate of the
system. The signals are essentially spread over a bandwidth approximately equal
to the chip rate. Thus frequency diversity is provided. Since all interferers in the
system are spread analogously, interference diversity is obtained. The despreading
also reduce the effect of possible narrowbanded signals transmitted in the same
frequency band. Introducing interleaving and appropriate antenna constellations
we can also obtain time, space and polarization diversity.

4
Radio Resource Management

During the last years, the market of mobile communications has been subject to a
rapid expansion, and as the demand for multimedia service increases, the available
bandwidth resources have to be utilized efficiently. Therefore, appropriate Radio
Resource Management (RRM) is of great importance.
When managing the radio resources it is necessary to define relevant performance measures and some brief definitions are given in Section 4.1. The available
resource is primarily bandwidth, and algorithms for allocating this resource are
surveyed in Section 4.2. The means to control the resource have to be more formally defined. From a discussion in Section 4.3 regarding a simple but yet relevant
quality measure they are defined rather naturally. Among those are the transmission powers, and some aspects of power control is discussed in Section 4.4. Finally
the focus of this thesis is clarified in the last section.
Throughout the thesis we will express power levels and gains using different
scales. Logarithmic (e.g. dB, dBW, dBm) and linear values are used concurrently.
In order to avoid confusion, we will adopt the convention of indicating linearly
scaled values with a bar. Thus pi (t) is a value in linear scale, while pi (t) is the
corresponding value in logarithmic scale.

37

38

Radio Resource Management

4.1

Performance of Cellular Radio Systems

Performance is hard to define in a precise way, but loosely speaking one could say
that it refers to the quality as experienced by the users. With this description in
mind, it is obvious that we need to clarify not only what is meant by quality, but
also who the users are.
One obvious category of users are the subscribers, and their definition of quality
can be summarized as follows:
1. Primarily, the subscriber wants to be admitted to the network. Related to this
is the Grade of Service (GoS), which is defined when planning the network.
It defines the probability of the system being congested, and is typically set
to 2 5%.
2. When admitted, the subscriber requires an acceptable transmission quality. This is naturally related to the nature of the service. Acampora and
Naghshineh (1994) categorize services in three classes. The first class is
highly delay-sensitive real-time traffic, which when admitted can be seen as
a circuit-switched connection. This include speech and video. By relaxing
the real-time requirement, the second class is still delay-sensitive, but not as
much as for real-time traffic. Such services include file transfer and clientserver applications. Paging and voice mail are examples of the last and the
most delay-insensitive class. Yet another example is download of old Seinfeld
episodes for viewing at later occasions. Resource allocation for multimedia
services is further studied by Anderlind (1997). In this thesis, the primary
examples are services of the first class. However, the methods apply to the
other services as well while in transmission, but higher level reasoning may
be different.
3. Finally it is important that the subscriber remains connected for as long as
he requires. The process of disconnecting or removing is more infringing to
the user than not being admitted at all.
The second category of users are the operators, who have built their businesses
around the network, and thus it is of primary importance for them that the network
performs well. For an operator quality could mean the following:
1. If the subscribers are content, the operator will presumably get more subscribers.
2. Given the network, the operator is interested in serving as many subscribers
as possible.
In reality, a fundamental tradeoff is between these two objectives. The goal is to
maximize the capacity, while offering a sufficient quality to the subscribers.

4.2 Resource Allocation Algorithms

4.2

39

Resource Allocation Algorithms

In this section we briefly survey the area of Resource Allocation Algorithms (RAA).
For a more extensive overview of RAA we refer to (Zander, 1997).
Consider a mobile communication system covering a certain service area as
described in Section 3.5. In this network the M active mobile stations (MS) are
served by B base stations (BS), numbered from the sets
M

{1, 2, . . . , M }.

{1, 2, . . . , B}.

The frequency spectrum assigned to the network operator for radio links is divided
into C channel pairs (waveforms), numbered from the set
C = {1, 2, . . . , C}.
The process of dividing up the spectrum into channels is based on the multiple
access method chosen, see Section 3.4. We need a pair of channels for each communication link, since it consists of an uplink and a downlink. Furthermore, the
channel has to be able to meet the service requirements in terms of data rate and
availability. When a mobile station is admitted to the network a radio link has to
be established. The following has to be assigned to the MS:
A base station from the set B.
A channel pair from the set C.
Transmitter powers for the BS and the MS.
The objective of a resource allocation algorithm (RAA) is to update these assignments during the call in order to maintain an acceptable quality while serving as
many users as possible.
The choice of base station mainly depends on the power gain from the different
BS:s to the MS. For systems based on orthogonal signals, the MS is often connected
to the BS with the most favorable propagation conditions, usually the one serving
the cell where the MS is located. When the MS is moving, it may cross a cell
border and enter a different cell. This triggers a handover or handoff algorithm,
and the call is handed over to the BS serving the cell where entered. The situation
is somewhat different when considering a system based on non-orthogonal signals.
Then the MS can be connected to several BS:s. When the MS is crossing a cell
border, it is connected to both BS:s while being located near the border. This is
referred to as soft handover. When using sectorized cells, a related scheme is softer
handover, where the MS is connected to several sector antennas at the same BS.
Handover algorithms are surveyed by e.g., St
uber (1996).
In the systems of the first generation, the calls were assigned a fixed channel
pair during the call. These fixed channel allocation (FCA) schemes are also used
to some extent in the systems of the second generation. The problem is that these

40

Radio Resource Management

channels are usually narrowbanded in frequency, and as pointed out in Section 3.3,
the power gain is frequency dependent. In order to avoid the case when a slowly
moving MS might experience a deep fade in the power gain for a long time (see Figure 3.2), random channel allocation (RCA) schemes are proposed, and the typical
example is the slow frequency hopping in GSM described in Section 3.6. The third
alternative is to use real-time measurements of propagation and/or traffic conditions to reallocate the spectrum resources dynamically. A comprehensive survey of
these dynamic channel allocation (DCA) schemes as well as the others is provided
by Katzela and Naghshineh (1996).
Finally, the transmitter power levels have to be determined, and this is the
issue in a main part of the thesis. Proposed algorithms to date are surveyed
in Section 4.5. We will separate the power control problem from the other two
assignments, and consider them as given or managed by appropriate algorithms.
However, in previous work, joint approaches are proposed. For instance, Hanly
(1995); Yates and Huang (1995) discuss algorithms that combine power control
and base station selection, and Foschini and Miljanic (1995) provide preliminary
results regarding a combination of power control and DCA.
In a network operating close to its capacity limit, an arriving MS may have
a fatal effect on the established connections. Therefore, the RRM system has
to decide if this terminal should be allowed into the system. Apart from these
admission control algorithms, there is also a need for removal control algorithms,
to determine which MS that has to be disconnected. Generally, the removal process
is considered more infringing to the user, but it may be unavoidable when the
quality of the connection is too low, and efforts to change this situation have
failed. Algorithms for admission and removal control have been studied by Andersin
(1996); Andersin et al. (1996b, 1997) and Bambos et al. (1995).

4.3

Means to Control the Resources

In order to define the controllable resources more formally and to see how they
affect the transmission quality, it is instructive to start from a simple but relevant
quality measure. The signal-to-interference ratio SIR (see Section 3.5) is commonly
used as such a quality measure. Based on its definition, we will try to find a general
framework which can be used both for orthogonal and non-orthogonal signals. The
framework is to some extent based on (Zander, 1996).
Consider the case of orthogonal signals. Focus on a specific downlink channel
and on the mobile stations and base stations using that channel. The m active
transmitters are using the powers pi (t), i = 1, . . . , m. Let i identify each link, so
that e.g., transmitter i is located in the base station to which mobile station i is
connected. Recall from Section 3.5 that the signal from transmitter j to mobile
station i is attenuated by the power gain gij (t). Hence, the SIR at mobile station i

4.3 Means to Control the Resources

41

is given by Equation (3.5)


i (t)
gii (t)
pi (t)

,

ij (t)
pj (t) + 1 i (t) pi (t)
gii (t) + i (t)
j6=i g

i (t) = P

(4.1)

where i (t) corresponds to the receivers ability to utilize the received desired signal
power. An efficient receiver utilizes all desired signal power and corresponds to
i (t) = 1. A simplifying assumption is that perceived quality is dependent on
SIR and hence that the quality is acceptable when this ratio is above a certain
threshold, i.e.,
i (t) 0 , i.
When extending the definition in (4.1) to include all the channels in the system
and to cover both orthogonal and non-orthogonal signals, we obtain an intuitive
definition of the control signals. These relate to the assignments of base stations,
channel pairs and transmission powers, which were listed in Section 4.2.
In addition, we will disclose that with some obvious redefinitions, the SIR expression in (4.1) holds for both orthogonal and non-orthogonal signals when soft
handover is not considered. In this thesis we assume that the mobile stations are
connected to one base station only if nothing else is stated. Without loss of generality we can therefore adopt the notation of a downlink situation on a specific
channel in the orthogonal case, when analyzing several aspects of these systems.
Systems Based on Orthogonal Signals
Consider the entire network, and assume that there are B transmitters in base
stations covering the service area, serving the M active mobile stations. Denote
the power gain from transmitter j to mobile station i at time instant t by gij (t).

We gather this information in the G-matrix of the network, G(t),


defined by

g11 (t) g1B (t)

..
..
..

G(t) =
(4.2)

.
.
.
gM1 (t)

gMB (t)

Note that apart from the G-matrix of a single channel (see Section 3.5), this matrix
is most likely not square, since several transmitters (channels/waveforms) at the
base stations are probably not allocated all the time. Let mobile station i be
connected to transmitter bi . Thereby, the mobile station index i identifies an
established connection, because of the one-to-one correspondence. Furthermore,
define ij as

1 if transmitter j is interfering on the channel


where mobile station i is receiving.
ij =

0 otherwise

42

Radio Resource Management

This means that ibi = 0, since the transmitter bi is connected to, not interfering
with, the mobile station i. Hence we get the following alternate expression for the
SIR at mobile station i
i (t) gibi (t) pbi (t)
.

ibk (t) pbk (t) ibk + 1 i (t) pi gibi + i (t)
k=1 g

i (t) = PM

(4.3)

Hence an established connection, identified by the connected mobile k, contributes


to the interference at mobile station i with a signal sent from transmitter bk , if ibk
is nonzero. The interference at mobile station i can thus be written as a sum over
the M active mobiles.
As mentioned earlier, the uplink is more or less analogous. One notational
difference is that we have to discuss the SIR at a receiver with respect to a connected
mobile station i. Thus the SIR at receiver bi is given by
bi (t) gibi (t) pi (t)
.

kbi (t) pk (t) kbi + 1 bi (t) pi gibi + bi (t)
k=1 g

bi (t) = PM

(4.4)

Note that we have used gibk to denote the power gain between mobile station i and
receiver/transmitter bk both in the uplink and the downlink. In general these are
different, and thus the network is not reciprocal.
Adjacent Channel Interference
Even if the signals are orthogonal when transmitted, the radio channel may affect
this orthogonality. Time delays and lack of synchronization in the entire network,
as well as fading and other effects violate the orthogonality. Hence there is an
imminent risk of experiencing interference from adjacent channels at the receiver
as well.
The G-matrix of the network is still defined as in (4.2). However, the matrix ij
is defined slightly different. In the previous section, the element corresponding to
base station j and mobile station i was equal to zeros when using different channels.
In this case it will be defined as a small value less than one describing this leakage
between channels. Therefore the SIR expressions in Equations (4.3) and (4.4) still
holds.
Systems Based on Non-Orthogonal Signals
The G-matrix of the network can be defined as in (4.2). In a typical DS-CDMA
setting, each base station (and maybe even the system) utilizes one frequency band,
used by all connected mobile stations. Thus, transmitter bk is analogous to base
station bk . Furthermore, if we define ibk by

cross-correlation between the codes


used by mobile stations i and k
, i 6= k ,
ibk =

0
,i = k

4.3 Means to Control the Resources

43

the alternate expressions for the signal-to-interference ratio in (4.3) and (4.4) still
holds. If perfect correlation is represented by unity, ibk takes values between zero
and one. As a simple model, we can assume that

1/Nc , i 6= k
ibk =
0
,i = k
where Nc is related to the processing gain (PG), which is the ratio between the total
bandwidth and the data rate (Viterbi, 1995). This yields the following expression
for the SIR at base station bi
bi (t) gibi (t) pi (t)

.
(4.5)
bi (t) = 1 P
gkb (t) pk (t) + 1 b (t) pi gib + b (t)
Nc

k6=i

One important difference between the uplink and the downlink is that the orthogonality is differently affected by the channel. In the downlink, the part of the
interference at the mobile station that originates from the connected base station is
more or less orthogonal, since the waveforms are transmitted over the same channel. In the uplink, this is not the case. The interfering waveforms from mobile
stations in the same cell are transmitted over different channel. Therefore, the
uplink situation is more critical. This is, however, reflected in the s, but they are
different in the uplink and the downlink.
Theoretical Interpretation of the Control Signals
In Equation (4.3) we disclosed the following general formulation of the SIR for the
downlink
i (t) gibi (t) pbi (t)
i (t) = PM
,
(4.6)

ibk (t) pbk (t) ibk + 1 i (t) pi gibi + i (t)
k=1 g
and from Equation (4.4), we see that the formulation for the uplink is essentially
analogous. It is instructive to relate this expression to the assignments performed
by a radio resource algorithm (see Section 4.2). Clearly the base station assignment
corresponds to a choice of bi :s and the power control amounts to the choice of pi
and pbi . Finally, the channel allocation or the choice of waveforms or codes is
reflected by ij .
Furthermore assume that the base stations and channels are assigned. Then we
can redefine gij by
gij := gibj ibj .
The motivation for redefining gij instead of using a new notation is to correlate
with the common notation used in the field. Based on this definition, the SIR
is given by a similar expression as in the orthogonal and single channel case in
Equation (4.1). Therefore, when studying power control effects to the entire cellular
radio system, we can without loss of generality assume that the system is based
on orthogonal signals, and consider only the connected transmitters/receivers on a
certain channel.

44

Radio Resource Management

4.4

Aspects of Power Control

Let us assume that the appropriate base stations are assigned and channels allocated. Then the remaining problem is to update the output powers of the transmitters. This power control problem can be concerned with the following standard
block diagram if the signals are interpreted as below (with respect to mobile i).
w

z
Plant
y

u
Power
Control

Figure 4.1 The power control problem formulation.


The external disturbances w comprise the power gain gii and the interference
Ii (including the thermal noise i ).
The control signal u is the power level pi .
The measurements available to the controller are represented by y. Normally
they consist of a quality related and/or a received signal strength related
measure.
Finally z represents an adequate quality measure. Reliable measurements are
most likely not available on a short time frame.
The objective is to assign power levels so that z meets the quality specifications
z = z t (or z z t ), with respect to the adequate quality measure. Additionally, it
is desirable to provide sufficient quality to as many users as possible, in order to
maximize the capacity of the network.
When characterizing the necessary power control algorithms, we find the following aspects interesting:
Capacity and System Load. Only a limited number of mobile stations can
be accommodated in a cellular radio system. It is thus relevant to describe
the system load in a particular situation and also to relate it to the maximal
capacity of the network. Moreover, the cost to accommodate a particular
mobile varies from mobile to mobile.
Centralized/Decentralized Controller. A centralized controller has all
information about the established connections and power gains at hand, and

4.4 Aspects of Power Control

45

controls all the power levels in the network. A decentralized controller is only
controlling the power of one single transmitter, and the algorithm is only
relying on local information. The latter case is the only practical one, since a
centralized controller requires extensive control signaling in the network, and
will suffer from additional time delays.
Note that the distinction is primarily between the type of information used
when computing the output powers. Even if an algorithm is considered to
be decentralized, it is not necessarily physically located in the mobile station. Instead, the power levels may be computed in the base stations, and
distributed to the corresponding transmitters. This master-slave relationship
facilitates software updates and support.
Global Stability and Performance. Interconnecting several distributed
power control algorithms affect properties of the overall global system, such
as stability and performance. The relations between local and global performance has thus to be established.
Quality Measure. Speech quality is a very subjective quantity, and relevant quality measures are different from measures applicable to data traffic.
Therefore, the appropriate quality measure is service dependent.
Feedback Bandwidth. The feedback can be categorized by the necessary
bandwidth to transmit the information to the control algorithm. Typically
one differs between on the one end information feedback, where basically real
values are assumed available and on the other end decision feedback, where
only whether a value is above or below a threshold is assumed available.
These are the extreme situations and feedback schemes in between are also
implemented. In TDMA systems of the second generation, the feedback is
provided in measurement reports comprising a Quality Indicator (QI), reflecting the quality and a Received Signal Strength Indicator (RSSI), reflecting the received signal strength at the receiver. These values are coarsely
quantized in order to use few bits. Thus an important question is to determine which quantities that can and should be estimated given the available
measurements.
Constraints. The output power levels are limited to a given set of values
due to hardware constraints. This includes quantizing and the fact that the
output power has an upper and a lower limit. Additionally, the various standards include different constraints. For instance in GSM, there are channels
in the network, requiring the use of maximum power, and in D-AMPS all
three time slots on the same carrier have to use the same power level.
Time Delays. Measuring and control signaling takes time, which results
in time delays in the network. These are primarily of two kinds. Firstly it
takes some time to measure and report the measurements to the algorithm,
resulting in a time delay of nm samples. Secondly we have a time delay of

46

Radio Resource Management

np samples due to the time it takes before the computed power is actually
used in the transmitter. These time delays should be considered as additional
time delays, since the discrete-time controller is assumed to always provide a
delay of one sample. As an example consider WCDMA (UMTS 30.06, 1997),
where each slot contains a power control command. The duration of a slot
is 1/1500 s, and consider the power update instants t as time reference. The
power computed at time instant t 1 is actually reflected in measurements
not earlier than at time instant t. This measurement is used to update the
power at time instant t + 1. In this typical case np = 1 and nm = 0.
Controller Bandwidth. Clearly, not all possible time-varying disturbances
can be compensated for using power control. The controller bandwidth
describes which variations that can be mitigated and which that can not.
Clearly, this is related to channel characteristics, modulation scheme, link
orientation (up- or downlink), mobile velocities and the update rate of the
power control algorithms.
The power control strategy is naturally implemented by the cascade control
structure depicted in Figure 4.2. Relevant information is extracted from the (possibly delayed) measurement y by the estimating device F . An outer control loop
computes a target SIR which on the medium time scale corresponds to the data
rate of the users service. The inner loop assigns transmission powers to track the
provided target SIR while compensating for disturbances w. Typically, the update
rate of the inner loop is an order of magnitude faster than the outer loop.
w
t

Outer
Loop

Inner
Loop

Environment

Figure 4.2 Cascade structure of the controller, where a fast inner loop
issues transmission powers to track a target value provided
by a slower outer loop, and to compensate for disturbances.
Relevant information is extracted from the measurements by
the device F .
Algorithmic properties are naturally studied at two levels. Capacity, load and
whether it is possible to accommodate all users with their data rate requirements
(reflected by the SIR targets) are typically discussed at a global level. We assume
that the inner control loops successfully compensates for the fast variations, so that

4.5 Survey over Proposed Power Control Algorithms

47

the power gains can be considered as constant. Moreover, stability and convergence
are also discussed at a global level. Again, the power gains are assumed constant,
but the motivation is that we are considering the short term behavior of the global
system, and the power gains are assumed to fluctuate more slowly. Conversely on
a local level, target SIR:s are assumed constant and that it is possible to accommodate all users. Then the tracking capabilities are in focus in terms of inner control
loop bandwidth and stability.

4.5

Survey over Proposed Power Control


Algorithms

The ambition is not to provide a complete coverage of the area, but rather to
outline some important and central contributions. As in the previous discussion,
index i refers to a specific connection, and that the same algorithm is employed for
every connection. Some algorithms include design parameters, and these will be
denoted by Greek letters , etc.
Power Control to Improve Link Performance
In early wireless point-to-point links, fading was primarily seen as a time varying
power gain g(t) (see Figure 4.3a). Power control was essentially used to compensate for the varying channel and the thermal noise power v(t). In other terms,
the control objective was to issue transmission powers p(t) to ensure a sufficient
signal-to-noise ratio (SNR) at the receiver (Ekberg and Laurent, 1964). The ideal
transmission power would be to invert the channel and to use a bias to fulfill the
SNR requirement as given by the solid line in Figure 4.3b. This strategy is troublesome to implement in practice, primarily due to varying channels and to inaccurate
and/or infrequent channel estimates. A possible solution would be to use excess
power as given by the dashed line in Figure 4.3b. The draw-backs include increased
energy consumption and disturbance to others if present.
Fundamental limits for digital communication systems were established by
Shannon (1948a,b, 1956). He formulated the basic problem of reliable transmission
of information in statistical terms, and demonstrated how constraints and noise
can be associated with a channel capacity. If the information rate from the source
is less than the channel capacity, then it is theoretically possible to achieve reliable
(error-free) transmission through the channel by appropriate coding.
It is a well-known fact that feedback can be used to improve stability and
performance. Normally the feedback is categorized by its information content.
Schalkwijk (1969) showed that the achieved performance using information feedback
is better than when using decision feedback, which in turn yields better performance
than when not using feedback at all. The cost is increased feedback bandwidth.
As an alternative to power control, Cavers (1972) discusses variable data rate
in the transmission. With constant average power, the proposed scheme adjusts

48

Radio Resource Management

a.

Channel gain [dB]

Transmission power [dBW]


b.

Time [s]
Figure 4.3 A natural approach to compensate for a time-varying channel
as in a) is to invert the channel. This corresponds to using the
power as described by the solid line in b). An alternative is to
use excess power as given by the dashed line in b).

the data rate to minimize the average error probability. Moreover, Cavers discusses
the effect of feedback delay, which is seen to affect the performance significantly.
Srinivasan (1981) relaxed the assumption of a known channel, and included a
pilot symbol of constant power to the transmitted data symbol. The pilot symbol
was then used to estimated the channel. A generalization to a frame of data
symbols including one pilot symbol is provided by Saarinen and M
ammela (1999).
In addition, the effect of channel coding is studied. Essentially, the purpose of
these minimum mean-square error (MMSE) receivers, is to find the optimal linear
receiver that maximizes SNR.
Goldsmith (1997) proposed an optimal adaptive transmission scheme, which
achieves the Shannon capacity of a fading channel. This scheme is based on known
channel parameters, and utilizes both variable power and rate. The power adaption
uses more power when the channel is favorable, and conversely less power when
the channel is not as good. If the quality of a particular channel is below some
threshold, no power is allocated to that channel. It was also noted that the capacity
difference between using variable power and constant power was neglectable for
most types of fading, when rate adaption is applied.

4.5 Survey over Proposed Power Control Algorithms

49

Power Control in Cellular Systems Based on Received Signal Power


The effect of controlling the power is more emphasized, however, when considering multiple-access systems. Then, the capacity of the overall network is in focus.
Some proposals concentrate on controlling the powers based on the received signal
strength. These include (Fujii and Sakamote, 1988; Nagatsu et al., 1983; Tchirks,
1989). Whitehead (1993) proposed a static control law to minimize the received
signal power variance under certain conditions. The scheme was refined by Carneheim et al. (1994) and a static quality adaption was added .
Channel inversion was discussed above, and one algorithm with this objective
is the Constant Received Power (CRP) algorithm (Anderlind, 1997)
C t
pi (t + 1) = pi (t)
,
Ci (t)

(4.7)

where C t is the target signal power which the desired signal power Ci = pi gii
strives towards. Anderlind (1997) also provided a natural extension to handle
output power constraints. The index i relates to the transmitter-receiver pair i,
and this will be the convention throughout the rest of the section.
As pointed out in Section 3.5, tampering the near-far effect in DS-CDMA systems is crucial for good performance. One possible solution is to control the powers
of the mobile stations so that the powers received at the connected base station
are all the same. The algorithm implemented in the IS-95A standard (Adachi,
1997; Ariyavisitakul and Chang, 1993; Chang, 1996; Chang and Wang, 1996) can
be described by

Ci (t) Cit
i pi (t),
, i 1
(4.8)
pi (t + 1) =
1

Ci (t) > Cit


i pi (t),
Since only one information bit is needed for signaling, the scheme is bandwidth
efficient, which enables the use of a high update frequency (800 Hz in IS-95A).
As discussed above, the SNR is related to perceived transmission quality. In
cellular systems, not only thermal noise but also interfering signal power from other
users limit the performance and the capacity. A related problem is therefore to
assign appropriate target values Cit for these algorithms to control the interference
between cells (Salmasi and Gilhousen, 1991; Viterbi, 1995).
Centralized Power Control in Cellular Systems Based on SIR
As concluded by Ariyavisitakul (1994), a more efficient way to conduct power control in cellular radio systems is to utilize the signal-to-interference ratio at the
receivers. Thereby, both the near-far problems and control of multiple access interference are addressed.
If all the signal power gains in the G-matrix (see Section 4.3) were known,
the transmission powers of every transmitter could be computed in a centralized
fashion. Aein (1973) focused on satellite communications systems, and introduced

50

Radio Resource Management

the term SIR balancing, for a strategy of power control aiming for all users to have
the same SIR. The proposed algorithm was based on solving an eigenvalue problem.
Alavi and Nettleton (1982); Nettleton (1980); Nettleton and Alavi (1983) extended these results and applied them to spread spectrum cellular radio systems.
This approach was further refined by Grandhi, Vijayan, Goodman, and Zander
(1993).
Zander (1992b) interpreted these algorithms as optimal solutions in the sense
that there exist no other power vector yielding a higher SIR for all receivers
(i.e., no higher balanced SIR). Since the result is based on an eigenvalue problem,
is an optimal power vector, so is k
p .
the optimal power vector is relative, so if p
Thermal noise was not included in the analysis. However, in the noisy case, we
note that the influence of the noise can be made arbitrarily small by choosing k
sufficiently large. A consequence is that the optimal balanced SIR in the noiseless
case serve as a bound for balanced SIR:s even in this case.
These results hold under the assumption that the receiver can utilize all the desired received signal power Ci (t). If the receiver only can utilize the fraction i (t) of
that power, the remainder acts as interference, auto-interference (see Section 3.5).
Godlewski and Nuaymi (1999) proved that the auto-interference will result in a
lower optimal balanced SIR.
In a practical case, a specific balanced target SIR, t at each receiver may be
desirable. This may be relevant if the objective for example is to provide speech
services of the same quality to all users. Zander (1993) proposed a centralized
algorithm to determine the corresponding balancing power vector. Moreover, this
is proven feasible if and only if t < .
In the analyses above, it has been assumed that the transmitters can use any
power. In practice there are constraints on the power levels. A centralized scheme
for power control with upper bounds on the maximum transmitter power was discussed by Grandhi et al. (1995).
Decentralized Power Control in Cellular Systems Based on SIR
The foundations for the distributed algorithms to be described were laid by Meyerhoff (1974). The motivation in this article was not to obtain a distributed algorithm, but rather to make Aeins centralized algorithm more computationally
efficient. The proposed algorithms were based on results for iterative computations of eigenvectors (Fadeev and Fadeeva, 1963; Pipes and Hovanessian, 1969).
Similar ideas appeared in an article by Zander (1992a), but this time applied
to cellular radio systems. Here the Distributed Balancing (DB) algorithm was
suggested:


1

.
(4.9)
pi (t + 1) = pi (t) 1 +
i (t)
This result was also inspired by numerical methods. The DB algorithm is essentially the power method for finding the dominant eigenvalue and its corresponding

4.5 Survey over Proposed Power Control Algorithms

51

eigenvector (Carnahan et al., 1969), which directly relates it to the centralized algorithms discussed above. If the thermal noise is neglected, it can be shown (see
Zander, 1992a) that the DB algorithm converges to the balancing power vector,
which corresponds to .
At first sight the DB algorithm appears to be distributed, since it is based only
on i (t), which is a measurements of the SIR at the receiver. However, it turns
drift towards zero or
out that the choice of is problematic, since it may make p
infinity, if not appropriately chosen. This choice of can be seen as a normalization
procedure, and it must be based on global information. Thus this is not a fully
decentralized algorithm.
The Distributed Power Control (DPC) algorithm, which is a slight modification
of the DB algorithm, was suggested by Grandhi, Vijayan, and Goodman (1994)
pi (t)
pi (t + 1) =
.
i (t)

(4.10)

When neglecting the thermal noise, the DPC algorithm was also shown to converge
, and simulations indicated that the convergence was faster than when using
to p
the DB algorithm. This is also shown analytically in (Zander, 1993). Furthermore,
simulation results presented in (Lee et al., 1995) show that the DPC algorithm
results in better performance than the DB algorithm. Nevertheless, the problems
of normalizing the powers by cleverly adapting still remained. Yet another algorithm, similar to those described above was proposed by Lee and Lin (1996); Lin
(1995)

pi (t + 1) = pi (t)

1
i (t)


.

(4.11)

This algorithm was referred to as the CDPC-II algorithm and it also suffers from

the problem about how to choose .


The drawback with these distributed algorithms is that they are not fully decentralized. The normalization procedure requires signaling between the algorithms,
which is undesirable in practice. A turning point was when Foschini and Miljanic
(1993) proved convergence of the DPC algorithm in (4.10) in the noisy case. They
pointed out that the normalization procedure was unnecessary, when taking noise
into consideration. Instead the could be seen as the target SIR, which the algorithm strives towards, if this is feasible (i.e., < ). Hence it is instructive to
rewrite the algorithm as
pi (t + 1) = pi (t)

t
.
i (t)

(4.12)

This will be denoted the DPC algorithm in the sequel.


In (Foschini and Miljanic, 1993), it was assumed that all transmitter powers are
updated synchronously in the network. This is not very realistic, and Mitra (1994)
showed that the result still holds if the powers are asynchronously updated.

52

Radio Resource Management

With the DPC algorithm as the base, extensions have been proposed when
considering systems with output power constraints. Grandhi, Zander, and Yates
(1995) proposed the Distributed Constrained Power Control (DCPC) algorithm,
and proved its convergence. The algorithm is given by


t
pi (t + 1) = min pmax , pi (t)
.
(4.13)
i (t)
It addresses systems where the output power is bounded from above by pmax . If
the powers are bounded from below by pmin (0), the scheme should be updated
accordingly. Additional complexity arises when considering systems where the output powers are quantized. Andersin, Rosberg, and Zander (1996a, 1998b) propose
the Distributed Discrete Power Control (DDPC) algorithm as a possible solution.
Their results intimate that there is an imminent risk of an oscillative behavior in
the system. The proposed solution incorporates some signaling between the distributed algorithms, and is therefore not fully decentralized. An algorithm aimed
at the same problem is proposed in (Wu and Bertsekas, 1999), but with the restricting assumption that global information is available at each transmitter to update
the powers distributedly.
This far primarily values in linear scale are utilized. Yates used values in logarithmic scale in the following algorithm (Yates, 1995)
xi (t) = t + pi (t) i (t)
pi (t + 1) = pi (t) + (1 )xi (t) , 0 1.

(4.14)

Yates proved its convergence to t if feasible ( t < ) and introduced the term
logarithmic interference averaging to describe the effect of the . Basically, it
enables a more conservative behavior, and = 1 corresponds to no power control,
while = 0 yields the DPC algorithm described in Equation (4.12).
A corresponding algorithm using decision feedback (see also (4.8)) is discussed
by Salmasi and Gilhousen (1991)

i (t) it
i pi (t),
pi (t + 1) =
(4.15)
1
i (t) > it
i pi (t),
Again, the benefits include the low signaling bandwidth, which enables a high update frequency. This algorithm will be used in the emerging WCDMA standard,
with an update frequency of 1500 Hz (Dahlman et al., 1998; UMTS 30.06, 1997).
This algorithm will be referred to as the Fixed-step power control (FSPC) algorithm. The step size i can be adapted as well, normally at a much lower updating
frequency than the power control loop. Such algorithms will be denoted Adaptivestep power control (ASPC) algorithms. When in soft handover the mobile station
receives two possibly different control commands to update its uplink power. Then
the mobile adjusts the power with the largest commanded downward step (different
step sizes from the different base stations are possible).
The convergence analyses so far are based on an assumption of a constant
G-matrix or at least subject to only neglectable variations with respect to the

4.5 Survey over Proposed Power Control Algorithms

53

time constants of the inner control loops. The case of a shadow fading G-matrix
is studied by Andersin and Rosberg (1996), and the recommendation is that the
quality requirements should be multiplied by const a constant greater than one.
If the minimum required SIR at the receiver is given by 0 , the target SIR should
be chosen as
t = 0 const .

(4.16)

Guidelines for an appropriate choice of the constant are also provided.


As with the algorithms based on received signal power, a related problem is to
provide a relevant target SIR. This is addressed in (Kawai et al., 1999; Sampath
et al., 1997; Won et al., 1998). An intuitive crucial problem is to issue target
SIR that corresponds to a feasible power control problem. If the value is set too
high, it is not possible to support all the mobiles. Instead the algorithms will
start competing to obtain the target SIR. This completion will last until several
transmitters are using maximal powers, still without achieving the target SIR at
the corresponding receiver. A proposal to counteract this party-effect and to
employ graceful degradation in the systems is described by Almgren et al. (1994).
The main idea is that a user with favorable propagation conditions may use a
higher power, and vice versa. Using logarithmic values, the algorithm is given by
pi (t + 1) = (i (t) pi (t)).

(4.17)

A convergence proof of the algorithm in (4.17) is disclosed in Yates et al. (1997).


The result also holds when considering bounded output powers. For clarity, the
algorithm will be referred to as the AAW algorithm.
In real systems, SIR is not readily available. Ulukus and Yates (1998) based
the transmission power on the matched filter outputs. A probabilistic framework
as used to address convergence in probability. Other approaches including (Mandayam, 1999; Manzanedo et al., 1996) are using the signals as standardized by the
link protocol.
As briefly discussed in Section 4.2, some proposals aim at jointly control the
power and allocate the other resources. Similarly, some proposals aim at joint
power control and beamforming of antenna arrays (Rashid-Farrokhi et al., 1998;
Yener et al., 1999). The latter proposal also incorporate multiuser detection.

54

Radio Resource Management

5
Local Analysis

As disclosed in Section 4.4, it is desirable to employ distributed algorithms in the


network, due to the extensive control signaling involved with centralized schemes.
The only way to fully analyze the behavior of these algorithms, is to study the global
system and consider all the interconnections between the distributed algorithms.
However, valuable information can be obtained by studying these distributed algorithms separately and locally.
In this chapter, values in logarithmic scale will be used almost exclusively. This
leads to a log-linear model of the most interesting power control algorithms. A
general distributed control algorithm for mobile station i can be described by the
block diagram in Figure 5.1. It describes a general SIR-based power control algorithm, but as discussed in Section 5.2, the dynamics when using algorithms based
on received signal power are covered as well. The available measurements (possibly delayed) i (t nm ) are processed by the filtering device Fi , which also can be
seen as a model of an estimator. Based on a target value it (t) and a processed
measurement i (t), the control algorithm Ri issues control commands ui (t). These
commands may be a single bit (decision feedback) or an analog value (information feedback) or anything in between. The channel may delay the commands or
corrupt them by a disturbance xi (t), modeled as additive. In the decision feedback case, it manifests itself as command bit errors and in a practical case close
to information feedback, it may represent quantization noise. On the transmitter
side, the (possibly delayed) control command xi (t np ) is decoded by the device

55

56

Local Analysis

Transmitter

Receiver

gii (t) Ii (t)

xi (t)
it (t)

i (t)

Ri

Fi

ui (t)
np T

nm T

Di

pi (t)

Figure 5.1 Block diagram of the receiver-transmitter pair i when employing a general SIR-based power control algorithm. In operation,
the controller results in a closed local loop. Time delays are
expressed in number of samples with respect to the sampling
interval T .

Di to the updated output transmission power pi (t). Note that in the typical information feedback case, Di is essentially a represented by a time delay. Therefore,
the quantization noise xi can without loss of generality be included in the additive
disturbance gii (t) Ii (t). The relation between the transmitted power and SIR
(neglecting auto-interference) in Equation (3.5) is given in logarithmic scale by
i (t) = pi (t) + gii (t) Ii (t).

(5.1)

The physical location of devices Ri , Di and Fi and their interpretation are irrelevant from a dynamical point of view. To emphasize the locality of the analysis, a
control algorithm in operation as in Figure 5.1 will be referred to as a local control loop or just local loop. The local loops are interconnected via the interference
Ii (t). In local loop analysis, we make the simplifying assumption that Ii (t) is a
disturbance independent of pi ( ), t. In the case of power controlled cellular
networks, the interference at one receiver is a strictly increasing function of the
powers used by others. Therefore a competition between the users can be observed, and we can argue that local instabilities are not compensated for by the
interconnections. Hence, local stability is a necessary, but not sufficient condition
for global stability. The dynamical effects of the interconnections are studied more
thoroughly in Chapter 7. An important conclusion is that local stability and some
additional requirements yield global stability.
To further motivate the local analysis, some introductory examples are provided
in Section 5.1. Section 5.2 focus on the components of the local loops. These are
identified as power control algorithms, time delays, static nonlinearities and filters.
Several interesting power control algorithms are naturally categorized as either

5.1 Motivating Example

57

linear or linear with static nonlinear components. For example some algorithms
using decision feedback belong to this category. Linear algorithms are analyzed
with respect to stability using root locus analysis in Section 5.3. As seen in the
following section, linear systems with static nonlinear components, often result in
an oscillatory behavior. For that purpose, describing functions are introduced in
Section 5.4 and applied in Section 5.5. As pointed out above, auto-interference
is neglected throughout almost the entire chapter. The main motivation is that
its effect on stability can be treated together with the interconnections, as will
be further discussed in Chapter 7. However, some brief results are provided in
Section 5.6, where we conclude that auto-interference does not violate stability of
linear algorithms nor aggravate oscillations of the FSPC algorithm.

5.1

Motivating Example

To further motivate local loop analysis, it is interesting to study the effect of a delay
of a single sample. The following example illustrates the behavior when employing
the DPC algorithm in (4.12) and the FSPC algorithm in (4.15)
Example 5.1 (Single Delay in the Closed Local Loop)
Consider the situation in Figure 5.2, where four mobile stations are connected

Figure 5.2 Configuration in Example 5.1, where four mobile stations initially are allocated to the same channel. At time instant t = 0
a fifth mobile station (indicated by the arrow) is allocated to
the channel.

58

Local Analysis

i (t) [dB]

a.

16
14
12
10
8
10

i (t) [dB]

b.

10

15

20

25

30

35

40

10

15

20

25

30

35

40

16
14
12
10
8
10

time instants
Figure 5.3 The recovering ability of a. DPC and b. FSPC algorithms
when subject to the situation in Figure 5.2 and a time delay of
one sample.

using the same channel. The simulation is initiated at time instant t = 10,
and the four mobile stations are initially using the optimal transmission powers
corresponding to a target SIR of 12 dB. The signal power gains gij are constant
throughout the simulation. At time instant t = 0, the same channel is allocated
to a fifth mobile station, initially using a transmission power of 1 dBW. The
target SIR is still feasible in the five mobile station case. Power control is
employed as either DPC described by (4.12) or FSPC (step size =1 dB) given
by (4.15). It is illustrative to see how these algorithms recover in the changing
environment when subject to delayed power control commands. In this case,
the power control command (FSPC) or the transmission power itself (DPC) are
delayed by one sample interval.
The performance using the two algorithms is depicted in Figure 5.3. We note
that DPC is unstable in the sense that the oscillations in SIR are aggravated
over time. Up to t = 0, the powers are not updated since the target SIR and
the measured SIR are identical. The system is thus at rest in an equilibrium
point. Then, the admitted mobile increases the interference at each receiver.
This disturbance reveal the instability of the equilibrium point, and the SIR
fluctuations get worse over time.
Despite being perfectly initialized, FSPC results in oscillations in the case of
four mobiles. That is due to the decision feedback, where the powers are either
increased or decreased each time instant. The oscillations are not that much
affected by the entering mobile station. However, one might expect that this
up-down device would result in small oscillations (approximately 1 dB peakto-peak) around the target value. As seen in the plot, the amplitude is larger
(3 dB peak-to-peak) than expected.

5.2 Dynamical Models

59

Some central questions are risen by the example.


Why is DPC unstable, when subject to time delays?
In what way does the time delays affect stability?
Why are the oscillations using FSPC worse than expected, when subject to
time delays?
One of the objectives with this chapter is to address these questions, using methods from control theory. This example is reconsidered in Section 10.2.2, using
controllers designed in Chapter 6.

5.2

Dynamical Models

The local loops mainly comprise four components: power control algorithms, time
delays, static nonlinearities and filters. These are modeled in the following subsections. The models relate primarily to two important feedback situations
Information feedback. The mobile feeds back the exact SIR measurements
or the error
ei (t) = it i (t).

(5.2)

The important characterization is essentially that real numbers are fed back.
Decision feedback. In a power control setting, we typically associate this
with feedback of the sign of the error in (5.2)
si (t) = sign(it i (t)) = sign(ei (t))

(5.3)

Thus, only one bit is needed for command signaling, which makes the scheme
bandwidth efficient.
In practice, the assumption of real valued measurements of information feedback
is unrealistic. Instead, quantized measurements can be made available. This is
further discussed in Chapter 8. However, the two cases describes two important
extremes, and constitute the situations considered in this and subsequent chapters.

5.2.1

Power Control Algorithms

Numerous algorithms have been proposed, and as the number of proposed algorithms increases, the picture tends to get more and more blur. We will focus on
some important fully distributed algorithms from Section 4.5, and see how the
algorithms relate to the following algorithm, based on information feedback

pi (t + 1) = pi (t)

it (t)
i (t)


.

(5.4)

60

Local Analysis

Note that individually time varying target SIR:s it (t) are enabled. If the update
frequency of it (t) is much slower than the time constants of the control algorithm,
it can be considered as constant in the analysis. It is instructive to express this
control law in logarithmic scale.

pi (t + 1) = pi (t) + it (t) i (t)
(5.5)
This controller is identified as an integrating (I) controller.
The CDPC-II algorithm proposed by Lee and Lin (1996); Lin (1995) and given
by (4.11) can be rewritten as

pi (t + 1) = pi (t)

1/
i (t)


.

After some redefinitions of controller parameters, the similarity to (5.4) using a


constant t is obvious. Similarly, the DPC algorithm (Foschini and Miljanic, 1993)
in (4.12)
pi (t + 1) = pi (t)

t
i (t)

is obtained as the special case = 1 and constant t .


The two equations in (4.14) adopted from Yates (1995) compile to
pi (t + 1) = pi (t) + (1 )( t i (t)),
which is the same as in (5.5) if the controller parameter is redefined and a constant
target value is utilized.
The AAW algorithm proposed by Almgren, Andersson, and Wallstedt (1994)
is also related. From (4.17), we get


1
pi (t) i (t)
pi (t + 1) = (i (t) pi (t)) = pi (t) + /
(5.6)

Thus it can be seen as the algorithm in (5.5) with a power level dependent target
SIR. This algorithm is further discussed in Section 9.4.3. The local dynamics are
more emphasized in the following form

pi (t + 1) = pi (t) + it i (t) ,
(5.7)
where it = / is a design parameter, possibly provided by an outer control loop.
Using decision feedback, the control error ei (t) = it (t) i (t) is not available,
but rather the sign of the same. The decision feedback algorithm FSPC in (4.15)
can be rewritten in logarithmic scale as

(5.8)
pi (t + 1) = pi (t) + i sign it (t) i (t) ,
which illuminates the similarity to (5.5) where information feedback is available.

5.2 Dynamical Models

61

The focus in this chapter is on SIR-based power control algorithms. However,


most interesting algorithms based on desired signal power Ci (t) are covered as well.
This hold true since the feedback signal in that case can be written as
Ci (t) = i (t) + Ii (t) i (t).
The interference Ii (t) is considered as an independent disturbance to the local loop.
Therefore, the closed-loop dynamics of the local loops are identical for SIR based
and C based algorithms. Hence, the local loop dynamics using CRP in (4.7) and
DPC are identical. Same thing holds for the local loop dynamics using the decision
feedback algorithm in (4.8) and the FSPC in (5.8). Thus the algorithms in (5.5),
(5.7) and (5.8) represent the mainstream of algorithms and will receive specific
attention.
The I-controller and FSPC with integral action are only plausible when the
power control problem is feasible, i.e., when it is possible to find transmission
powers to meet the desired target values. Therefore, these algorithms need this
underlying assumption. The feasibility assumption can be relaxed in case of the
AAW algorithm, since it is more or less designed to handle infeasible cases. The
assumptions do not affect the local loop analysis, but relates to global stability.

5.2.2

Time Delays

Both measuring and signaling in cellular systems take time, which results in delayed
signals. As pointed out in Section 4.4, there are three main reasons for time delays.
Firstly, the power control algorithm Ri is assumed to result in a time delay of one
sample, since measurements at time t (e.g., i (t)) are used to update the power level
at time t + 1 (i.e., pi (t + 1)). Secondly it takes some time before a computed power
level actually will be used and thereby observed by others. Additional delays are
caused by the fact that power update commands are only allowed to be transmitted
at certain time instants. Together they result in a total delay of np samples.
Finally, the measuring procedure takes time, and again these measurements are
only reported to the power control algorithm at certain time instants, resulting in
a delay of nm samples. In total there is an additional delay of n = np + nm samples
in the local loops. A typical delay situation is described in the following example.
Example 5.2 (Typical Delay Situations in WCDMA)
Since the command signaling is standardized, the delays are known exactly in
number of samples (or slots). Typical situations in WCDMA are depicted in
Figure 5.4. In a) the receiver estimates the SIR i (t) (possibly only the desired
signal power, which is combined with a separate interference measurement to
compile SIR) over some pilot bits and maybe data symbols, on a slot sent using
the power pi (t 1). The power control command (TPC) is included in a slot
in the opposite direction at time instant t. The transmitter finally updates the
power pi (t + 1). By shifting the slot synchronization as in b), the transmitter
power can be controlled without excessive loop delay. The drawback is that

62

Local Analysis

fewer bits for the SIR estimation is used, resulting in a larger variance of the
estimation error (see also Section 6.1.4). This is only possible for mobile stations
relatively close to the base station, and np = 1, nm = 0 will be considered as a
typical WCDMA situation.
a)

t1

t+1

Transmitter
Update
Receiver
Est.

b)

t1

TPC

t+1

Transmitter
Update
Receiver
Est.

TPC

Figure 5.4 Typical time delay situation in WCDMA. The transmission


powers are updated at time instants t (once per slot). Estimation is performed over the first symbols of the slot (pilot
symbols and possibly some data symbols) Adachi et al. (1998).
Command signaling and power updates take place as indicated.
a) np = 1, nm = 0, b) By shifting the slot configurations, np
can be brought down to zero when the mobile station is close
to the base station.

The same delay situation as in the example also applies to GSM. Systems subject
to longer delays include IS-95A with np = 2, nm = 0 (TIA/EIA/IS-95, 1995),
and different satellite communication systems, which may inherit even longer time
delays (Mehta et al., 1998).
The time interval over which measurements are collected is normally a fraction
of the power control update interval, as illustrated by the example above. It might
even be time-variant. Therefore, it is natural to define time instants t equal to the
update instants of the transmission power, which are fixed and can be associated
with the power control update interval Ts .
Time delays are conveniently represented using the time-shift operator q defined
by
q n p(t) = p(t n), q n p(t) = p(t + n)

5.2 Dynamical Models

63

To stress the direction of the time shift, the terms forward-shift operator and
backward-shift operator (or delay operator ) are used for q and q 1 respectively.
Arithmetic operations of polynomials in q will be used frequently in this and subsequent chapters. For a more rigid discussion on a q-operator algebra, the reader is
referred to (
Astr
om and Wittenmark, 1997). The intuitive relations to the complex
variable z of the z-transform are also addressed.

5.2.3

Nonlinearities

System nonlinearities are often classified as either inherent or intentional nonlinearities. The first category consists of components that we cannot affect in the design
at the moment, such as output power constraints. On the other hand intentional
nonlinearities are those which are deliberately introduced in the system.
Due to physical limitations in the hardware, the output power levels are bounded
from above by pmax and from below by pmin . In addition, the power levels are quantized, and normally, a uniform quantization in logarithmic scale is used. Usually,
these nonlinearities are referred to as constraints in the literature. There are also
nonlinearities introduced by the software. In some standards, there are channels
requiring the use of maximal powers. When using different channels during a call,
this is definitely a nonlinearity.
The nonlinearities described above are all inherent and affect the output powers.
Such nonlinearities are further discussed in Section 6.6.1. It is also possible to
incorporate a nonlinearity in the power control algorithm. One example is the sign
function in the decision feedback algorithms. The name relay is sometimes used
instead of sign function, and that name convention will primarily be adopted here.

5.2.4

Filters

The measurements or estimates may be corrupted by noise and therefore a filter


F (q) can be applied, in order to even out rapid fluctuations due to noise. A different interpretation is that F (q) represents a model of an implemented estimation
procedure, whose dynamical effect on the local loop is of interest. The filter F (q)
is completely arbitrary, but common choices are described below
Local Average. The output of the filter is the mean value of the last L
input values
i (t) =

i (t) + . . . + i (t L + 1)
L

Using the time-shift operator q, the filter is described by


i (t) = FLA (q)i (t) =

1 + . . . + q L+1
i (t).
L

The parameter L is commonly referred to as the sliding window length.

(5.9)

64

Local Analysis

Exponential Forgetting. In the previous approach, the values are weighted


together using an equal weight. A batch containing the last L values is also
needed. Another approach is to weight the input values i (t) differently,
using larger weights on the more recent values. This can be achieved by the
following recursion, where the inputs are given by i (t) and the filter output
by i (t).
i (t) =
i (t 1) + (1 )i (t) , 0 < 1
The filter FEF (q) can thus be written as
i (t) = FEF (q)i (t) =

(1 )q
i (t).
q

(5.10)

The number of values that essentially contribute to the filter output is depending on the forgetting factor . As a rule of thumb (
Astr
om and Wittenmark, 1995), it is argued that the number of contributing terms, LEF , can
be approximated by
LEF

2
.
1

(5.11)

The stationary gain, or DC gain, is F (1). Note that both filters have the desired
property F (1) = 1.
In practice, the signal and the interfering powers might be estimated separately.
Consequently, it is beneficial to employ separate filters as in Figure 5.5. The filter
of the interfering power is typically much slower (a much closer to unity) than
the signal power filter (which commonly is not employed at all to reduce delays as
much as possible). Since the focus in this chapter is on stability of the local loops,
only filters applied on SIR will be considered. This is the same as focusing on the
signal power filter, Fg (q).
Receiver

Ci (t)

i (t)

pi (t)

Fg (q)

FI (q)

gii (t)

Ii (t)

Figure 5.5 When the signal and the interfering powers both are available,
separate filtering could be employed.

5.3 Log-Linear Algorithms

5.3

65

Log-Linear Algorithms

In several cases, the nonlinearities in the local loops can be neglected, and thus
the remaining system to be analyzed is linear. This is illustrated by Example 5.3.
Local loop stability can therefore be addressed using linear systems theory methods.
In this section we apply root locus analysis, which was applied to power control
problems in (Blom et al., 1998a; Gunnarsson et al., 1998c,d).
Example 5.3 (Local Loop of DPC and Delayed Output Powers)
Consider the DPC algorithm
pi (t + 1) = pi (t) + it i (t).
Using the time-shift operator, this corresponds to
pi (t) =

1
( t i (t))
q1 i

The computed output powers are delayed by one sample before they are actually
used by the corresponding transmitter. The SIR is thus given by
i (t) = pi (t 1) + gii (t) Ii (t).
The algorithm in closed-loop can thus be depicted as in Figure 5.6.
gii (t) Ii (t)
it (t)

1
q1

pi (t) +

i (t)
Figure 5.6 The local loop using DPC, when the computed output power
is delayed by one sample.

The power control algorithm in Example 5.3 generalizes to


pi (t) = R(q)(it (t) i (t)),
where R(q) in the case of the I-controller in (5.5) is given by
R(q) =

.
q1

(5.12)

66

Local Analysis

Analogously, the AWW-algorithm is described by


R(q) =

(5.13)

The output from the controller pi (t) cannot depend on the input instantaneously.
Therefore, R(q) has to contain at least one delay. This is analogous to state that
R(q) has to be strictly proper, i.e., the degree of the denominator polynomial in q
has to be greater than the degree of the numerator polynomial. The filter, however,
is by definition proper, i.e., the denominator and numerator degrees may be equal.
Such a general power control algorithm with a filter and subject to time delays is
depicted in Figure 5.7. Note that time delays only affect the dynamics in terms of
gii (t) Ii (t)
it (t)

pi (t) +

R(q)

q np

F (q)

q nm

i (t)

Figure 5.7 The local loop when employing the general linear control algorithm R(q) and the filter F (q).

the total round trip time delay n = np + nm , since gii (t) and Ii (t) are considered
as independent disturbances.
The terms instability and stability of a local loop have to be well defined in
order to avoid confusion. Rather simplified, instability comes about when relying
too much on outdated information. This result in over-compensation, which is aggravated over time. Eventually, the transmission power oscillates between its upper
and lower output constraints. A system may also be marginally stable, where a
stable oscillation in the output power is observed. In a stable local loop, the effects
of stepwise disturbances and target SIR changes decay to zero over time. We will
discuss stability in terms of the property uniform asymptotic stability. Basically
it implies that transients decay to zero asymptotically. One can compare to the
solution of a linear ordinary differential equation. It consists of a solution to the
homogenous equation obtained by assuming zero input and a particular solution
obtained when considering an input. If the system described by this differential
equation is asymptotically stable, then the homogenous, system-dependent, solution will go to zero in steady-state. More specifically, it is interesting to see how
the choice of controller parameter values affects the stability.

5.3 Log-Linear Algorithms

5.3.1

67

Stability of Linear Systems

Consider a discrete-time linear system with one input u(t) and one output y(t).
Using the time-shift operator q, such a system can be described using the transfer
function G(q) as
y(t) = G(q)u(t) =

b1 q 1 + b2 q 2 + . . . + bnb q nb
B(q)
u(t) =
u(t)
A(q)
1 + a1 q 1 + . . . + ana q na

(5.14)

The poles of this transfer function are defined as the roots of the A(q) polynomial.
When using feedback, the closed-loop system can be depicted as in Figure 5.8,
where G(q) denotes the system to be controlled, R(q) denotes the controller, and
S(q) denotes for instance the sensor dynamics or a filter.
d(t)
r(t)

u(t)

e(t)
R(q)

y(t)

G(q)

v(t)

n(t)

S(q)

Figure 5.8 The basic feedback loop.


Write G(q), R(q), and S(q) as ratios of coprime polynomials (i.e. polynomials
with no common factors):
G(q) =

BG (q)
BR (q)
BS (q)
, R(q) =
, S(q) =
,
AG (q)
AR (q)
AS (q)

Using these, we can describe the output y(t) as


y(t) =

1
(BG AR AS d(t) + BG BR AS r(t) BG BR BS n(t))
BG BR BS + AG AR AS

The characteristic polynomial P (q) of the feedback system is then formed by taking
the product of the three numerators plus the product of the three denominators.
Hence
P (q) = BG (q)BR (q)BS (q) + AG (q)AR (q)AS (q)

(5.15)

The closed-loop poles are defined as the roots of the characteristic polynomial. A
different, but analogous representation of the linear system in Figure 5.8 is the
following state space representation
x(t + 1) = Ax(t) + B (r(t), d(t), n(t))

y(t) = Cx(t) + D (r(t), d(t), n(t))T

68

Local Analysis

where A, B, C and D are matrices and x(t) is the state vector. Let E denote the
identity matrix of the same size as A. The characteristic polynomial is then given
by
P (q) = det(qE A)
Uniformly asymptotic stability of the local loop is disclosed in the following fundamental theorem. For a general treatment, we refer to e.g., Doyle, Francis, and
Tannenbaum (1992); Franklin, Powell, and Workman (1997); Phillips and Nagle
(1990); Rugh (1996) or
Astr
om and Wittenmark (1997).
Theorem 5.1 (Asymptotic Stability of Discrete-time Linear Systems)
The feedback system in Figure 5.8 is uniformly asymptotically stable, if and only
if the closed-loop poles are strictly within the unit disc. Otherwise the system is
unstable.
If the controller is parameterized using a parameter , it is interesting to see
how stability is affected by different parameter values. The natural thing to do is
to plot the locations of the poles for the different :s, and see whether they are
located within the unit disc or not. This technique is also known as root locus
analysis.
It is also interesting to study the margin to unstability. There are different
ways to express the stability margin, and here the focus is on the gain margin Km ,
which is defined by
Definition 5.2 (Gain Margin)
The gain margin of a closed-loop system with controller R(q) as in Figure 5.8, is the
smallest multiplicative constant Km such that the system with controller Km R(q),
is unstable. More formally,
Km = sup{K : KR(q) yields a stable closed loop system}

5.3.2

Local Analysis of Power Control Algorithms

The closed-loop system in Figure 5.7 is all linear, and thus root locus analysis is
applicable.
Consider the closed-loop system in Figure 5.7, which includes time delays and
the use of a filter and the general linear power control algorithm R(q). The analysis
applies to a general R(q), but the focus will be on the integrating controller in (5.12)
R(q) =

.
q1

Based on Figure 5.7 and Equation (5.15), we can form the characteristic polynomial
of the closed-loop system as
P (q) = BF (q) + q n (q 1)AF (q)

(5.16)

5.3 Log-Linear Algorithms

69

The filter F (q) is discussed in Section 5.2.4, and when using a local average, it is
given by
F (q) =

q L1 + . . . + 1
BF (q)
=
L1
Lq
AF (q)

With this choice of filter, the locations of the closed-loop poles as functions of
for some different time delays n and window lengths L are plotted in Figure 5.9.
Note that L = 1 corresponds to no filter, i.e., F (q) = 1. The particular case of
b. n = 0, L = 3

a. n = 1, L = 1
1.5

0.5

0.5

Imag Axis

Imag Axis

1.5

0
0.5

0
0.5

1.5

1.5
1

0
Real Axis

d. n = 0, L = 10

c. n = 1, L = 3
1.5

1.5

0.5

0.5

Imag Axis

Imag Axis

0
Real Axis

0
0.5

0
0.5

1.5

1.5
1

0
Real Axis

0
Real Axis

Figure 5.9 Root locus plots for some different window lengths L and time
delays n when using a local average filter. The x:s mark the
roots corresponding to = 0, while o corresponds to the roots
when .
DPC, subject to a single delay and no filter applied, is addressed in the following
example.
Example 5.4 (Local Loop Poles of DPC, Subject to a Single Delay)
Consider the situation in Example 5.3, where the local loop when using DPC
is in focus. The computed output powers are delayed by one sample. The
corresponding characteristic polynomial P (q) is obtained from Equation 5.16
as
P (q) = q 2 q + 1.

70

Local Analysis

The roots of P (q) are (1 3)/2, which are located on the unit circle. That
explains why DPC results in an unstable behavior in Example 5.1: the corresponding local loops are not asymptotically stable.
More specifically, we are interested in the :s yielding uniform asymptotical
stability. To see the effects of time delays and various window lengths, the local
stability constraints on are listed in Table 5.1. Note that the table gives instability
limits for and thus larger -values will result in an unstable system. From the
table, it is evident that the delays of the local average filter affect the stability.

n=0
n=1
n=2

L=1
>1
1.000
0.618

L=3
>1
0.708
0.476

L=5
0.955
0.550
0.394

L = 10
0.489
0.353
0.278

Table 5.1 Local loop stability region given by strict upper bounds on ,
when using the integrating power control algorithm in (5.12)
and a local average filter.

A corresponding analysis for other choices of filters is analogous. Root locus


plots when using an exponential forgetting filter in two specific cases are provided
in Figure 5.10. Again, the :s yielding uniform asymptotical stability are of interb. n = 2, = 0.60
1.5

0.5

0.5

Imag Axis

Imag Axis

a. n = 0, = 0.60
1.5

0.5

0.5

1.5

1.5
1

0
Real Axis

0
Real Axis

Figure 5.10 Root locus plots for two different time delays n, when using
an exponential forgetting filter. The choice of forgetting factor = 0.60 corresponds approximately to five contributing
terms, according to Equation (5.11).
est. These are summarized in Table 5.2, where the stability constraints are given
for some different time delays and forgetting factors. The chosen forgetting factors
relate to the sliding window lengths in Table 5.1 via the rule of thumb in Equation (5.11). Note that = 0 corresponds to no filtering, and is thus identical to the

5.4 Describing Functions

71

first column in Table 5.1 A direct comparison of Table 5.1 and Table 5.2 yields that

n=0
n=1
n=2

=0
>1
1.000
0.618

= 0.33
>1
1.000
0.581

= 0.60
>1
1.000
0.550

= 0.80
>1
1.000
0.523

Table 5.2 Local loop stability region given by strict upper bounds on ,
when using the integrating power control algorithm in (5.12)
and an exponential forgetting filter.

the exponential forgetting filter has more appealing stability properties compared
to the local average.
The analysis provide stability requirements on the controller parameter . Conversely, it is interesting to quantify the distance (in the parameter space) to instability, given a specified controller parameter = 0 . Assume that the stability
limit for the particular delay and filter situation is given by lim (e.g., obtained
from Table 5.1 or Table 5.2). From Definition 5.2, we conclude that the gain margin
is given by
Km =

0
,
lim

since the controller Km R(q) is just about unstable.


In this section, the focus has been on the stability properties of the integrating
controller. Analyzing other log-linear algorithms is analogous, and the corresponding results for the AAW algorithm are summarized in Appendix 5.A.

5.3.3

Summary, Local Analysis of Log-Linear Algorithms

Several interesting algorithms utilizing information feedback can be described by


linear local control loops in logarithmic scale. Root locus analysis is thus applicable to include the dynamical effects of time delays and to address local stability.
Thereby, we relate local stability to the choice of controller parameter values. Simulations indicate that the DPC algorithm is globally unstable when subject to time
delays. This is natural, since the corresponding local loops are not asymptotically
stable. Furthermore, the effects of filtering are studied. The conclusion is that an
exponential forgetting filter has more appealing properties with respect to stability
than the local average filter.

5.4

Describing Functions

When the nonlinearities in the local loop cannot be neglected, the methods in the
previous section do not apply. As an alternative, we utilize describing functions,

72

Local Analysis

based on assumptions of oscillations or limit cycles in the loop. The relevance of


this assumption was illustrated in Example 5.1, where the use of decision feedback
in FSPC resulted in an oscillatory behavior. In this section we develop the underlying theory, first in a simple case to stress the main ideas, and then with focus to
power control local loops with decision feedback. Therefore, the analysis primarily
aim at studying the effects of relays in discrete-time linear control loops. However,
decision feedback is common in many other applications related to communications
and signal processing. For example, we mention decision feedback equalization and
sigma-delta modulators. Moreover, it is also common in software sometimes for
no reason.
The theory of describing functions in continuous time is thoroughly discussed by
Atherton (1982); Glad (1994); Phillips and Nagle (1990). De la Sen (1993) provide
modifications for discrete-time describing functions of some specific nonlinearities.
The applicability to power control in cellular radio systems have been addressed in
(Blom and Gunnarsson, 1998; Blom et al., 1998a; Gunnarsson et al., 1998d, 1999c)

5.4.1

Describing Functions with Zero Phase Assumption

Basically, we are focusing on loops that consist of a linear part with transfer function G(q) and a static nonlinearity described by the function f () resulting in a loop
as in Figure 5.11. Note that we have assumed a zero input to the loop. Nonzero
inputs are studied in Section 5.4.3.
0

e(t)

f (e)

w(t)

G(q)

y(t)

1
Figure 5.11 Block diagram of a nonlinear system, separated into one linear
and one nonlinear component.
Nonlinearities in the loop normally result in an oscillatory behavior. This will
be studied by assuming that there is an oscillation in the error signal e(t), and then
try to verify this assumption. We proceed by making the N -periodic hypothesis


2
t ,
e(t) = E sin(e t) = E sin
N
where E is the amplitude of the oscillation and e is the normalized angular frequency. The hypothesis is based on a zero phase assumption, with the meaning
that the sample at t = 0 is zero (slightly more general, we assume that the sampled

5.4 Describing Functions

73

sinus is zero for some t in every period). In order to simplify the calculations we
assume for a moment that f () is odd. The computations using a general static
nonlinearity are analogous, but a little bit more complicated, and we will return
to a general f () further on. Since the nonlinearity is static, w(t) is N -periodic as
well. Using discrete time Fourier series expansion, the signal w(t) is decomposed
into its Fourier components as
w(t) =f (E sin(e t)) = A1 (E, N ) sin(e t + 1 (E, N )) +
+ A2 (E, N ) sin(2e t + 2 (E, N )) + . . .
sin(X t) fed through a linear system H(q) results in the
Recall that a sinusoid X
output


H(eiX ) sin(X t + arg(H(eiX ))),
X
after the transients have decayed. Now let us make the assumption that the linear system G(q) will attenuate the harmonics much more than the fundamental
frequency. This is the only approximation we will make, and it yields


(5.17)
y(t) A1 (E, N ) G(eie ) sin(e t + 1 (E, N ) + arg(G(eie ))).
Figure 5.11 yields
y(t) = e(t) = E sin(e t) = E sin(e t + ).

(5.18)

2
N .

The loop is closed by combining Equations (5.17) and (5.18).


Recall that e =
Thus an oscillative behavior is predicted if there exists a solution to the following
equations


2

A1 (E, N ) G(ei N ) = E
(5.19a)
2

1 (E, N ) + arg(G(ei N )) = + 2, Z.

(5.19b)

The complex Fourier series (Cadzow, 1973) is defined by


w(t) =

N
1
X

Ck (E, N )eje kt

(5.20a)

N 1
1 X
w(t)eje kt
N t=0

(5.20b)

k=0

Ck (E, N ) =

Moreover, define the complex number


2i
A1 (E, N )ei1 (E,N )
= C1 (E, N ).
E
E
Then (5.19) can be expressed more compactly as
Yf (E, N ) =

Yf (E, N )G(ei N ) = 1.

(5.21)

(5.22)

Equation (5.22) or the equations in 5.19 provide two equations and two unknowns.
If a solution exists, it describes an approximation of the oscillation in the loop.
Conversely, the lack of a solution motivates the absence of oscillative modes.

74

Local Analysis

5.4.2

Discrete-Time Describing Functions

The derivation in the previous section is based on a zero phase assumption. This
is not so important when the static nonlinearity is continuous, since phase shifts in
e(t) result in corresponding phase shifts in w(t) = f (e(t)). The situation is different
when considering discontinuous static nonlinearities. For example, consider a relay
and a phase shift of half a sample. The output is given by


2
w(t) = sign E sin( (t + 0.5)) .
N
Such a small phase shift does not affect the sign of the samples, and thus the output
will be the same as with zero phase shift, i.e.,




2
2
w(t) = sign E sin( (t + 0.5)) = sign E sin( (t)) .
N
N
If N is even, this relation hold for phase shifts e [0, 1[. Note that a phase shift
of an entire sample is the same as a time delay and should therefore be a part of
of the linear transfer function G(q). The unknown phase shift is thus among the
parameters characterizing an oscillation. Its effect depends the nonlinearity and
the period N . The discussion motivates the following definition of the discrete-time
describing function
Definition 5.3 (Discrete-Time Describing Functions)
The discrete-time describing function of the static nonlinearity f () is defined
(cf. (5.21)) by
Yf (E, N, e ) =

2i
C1 (E, N, e ),
E

where the complex Fourier coefficient C1 (E, N, e ) is given by



N 1 
2
1 X
2
f E sin( (t + e )) ei( N (t+e )) , e [0, 1[.
C1 (E, N, e ) =
N t=0
N
The definition can be written more compactly, as
Yf (E, N, e ) =

N 1
2i X
f (E sin(e (t + e ))) ei(e (t+e )) .
N E t=0

Recall the following central assumption from the previous section


Assumption 5.4
The linear part G(q) in Figure 5.11 attenuates the harmonics much more than the
fundamental frequency e . More formally, we assume that

N0
|G(eike )|
<< 1, k = 2, . . . ,
|G(eie )| e = 2
2
N0

5.4 Describing Functions

75

With a analogous reasoning as in the previous section, we are interested in the


solution to
2

Yf (E, N, e )G(ei N ) = 1, e [0, 1[.

(5.23)

This is essentially two equations and a constraint, which is more clear by separating
the magnitude and the phase of each side.
2

|Yf (E, N, e )||G(ei N )| = 1


arg Yf (E, N, e ) + arg G(e

i 2
N

) = + 2, Z, e [0, 1[

(5.24a)
(5.24b)

We thus have two equations and four unknowns (E, N , e and ), which enables
several possible solutions.
This far we have assumed that Assumption 5.4 holds. If this is not the case, the
analysis may still not be in vain. In such a case, the higher frequencies contribute
to the waveform of the error signal e(t). Describing functions focus on the fundamental frequency of the oscillations. Therefore, the estimated fundamental period
N obtained from describing functions analysis is still informative. Instead, different
waveforms of the error signal may be assumed, depending on the application, the
nonlinearity and the system.
The discrete-time describing functions analysis is summarized in the following
algorithm
Algorithm 5.1 (Discrete-Time Describing Functions Analysis)
Consider the situation in Figure 5.11, where the loop is separated in a linear
(G(q)) and a nonlinear (f ()) part. Then the oscillation in the error signal e(t)
is approximated by the procedure
1. Determine the discrete-time describing function of the nonlinearity as
Yf (E, N, e ) =

N 1
2i X
f (E sin(e (t + e ))) ei(e (t+e )) ,
N E t=0

where e = 2
N and e [0, 1[.
2. Compute G(q)|q=e2i/N .
3. Solve the following equation for E, N and e .
 2 
Yf (E, N, e )G ei N = 1

(5.25)

If one solution (E, N , e ) exists, then the oscillation is approximated by




2
(t + e ) .
e(t) = E sin
N
If several solutions exist, then several modes of oscillation are possible.
4. Investigate the correctness of Assumption 5.4. If it does not hold, the
estimated periods are still informative, but alternative waveforms may be
discussed.

76

5.4.3

Local Analysis

Simplified Nonzero Input Case

When considering nonzero inputs in general, the analysis becomes more complex.
In some cases, however, such as the power control case, some approximative simplifications are readily available. Consider the FSPC algorithm in (5.8) and include
the delays as in Figure 5.1. This yields

pi (t + 1) = pi (t) + i sign it (t) pi (t np nm ) gij (t nm ) + Ii (t nm ) .
Introduce pi (t) = pi (t) it (t) + gij (t + np ) Ii (t + np ), and assume that the
power gain, the interference and the target SIR are constant over the delay horizon
(np + nm samples). Hence
pi (t np nm )),
pi (t + 1) = pi (t) + i sign(
which is the zero input case. This will only be an approximation. A speculative
proposition is that small deviations essentially effect the unknown phase e . Therefore, the resulting oscillative behavior possibly comprises several modes, and the
mode switching is stimulated by these deviations.

5.4.4

Describing Function of a Relay

An ideal relay or sign function (see Section 5.2.3) is defined by



1,
e0
f (e) =
1,
e<0

(5.26)

The corresponding describing function is obtained by applying Definition 5.3. In


the relay case, the complex Fourier coefficient C1 (E, N, e ) can be computed as
C1 (E, N, e ) =

N 1
1 X
f (E sin(e (t + e ))) ei(e (t+e )) =
N t=0

N/21
N 1
1 X i(e (t+e ))
1 X i(e (t+e ))
e

e
=
N t=0
N

 X ie t
1 ie e 
e
1 ei
e
=
N
t=0

2
N sin

t=N/2

N/21

 ei( N 2 e N )

The discrete-time describing function is thus


Yf (E, N, e ) =

4
N E sin

 ei( N e N )

(5.27)

5.5 Log-Linear Algorithms with a Static Nonlinearity

5.5

77

Log-Linear Algorithms with a Static


Nonlinearity

The analysis in this section is focused on the dynamical behavior of the FSPC
algorithm in (5.8)

pi (t + 1) = pi (t) + i sign it (t) i (t) ,
(5.28)
In operation, the corresponding local loop can be associated with the block diagram
in Figure 5.12. With the relay as the static nonlinearity, and the remaining parts
all linear, this is in full analogy with the block diagram in Figure 5.11. Hence,
describing functions analysis is applicable.
gii (t) Ii (t)
it (t) +

e(t)

i
q1

pi (t)
q

q nm

F (q)

+
np

i (t)

Figure 5.12 The decision feedback of the FSPC algorithm in (5.28) is visualized as a relay block, which is a static nonlinearity.

In this case with a relay and an integrator, is is easy to realize that primarily
modes with even periods N are dominating the oscillations. This is formulated in
the following proposition.
Proposition 5.5 (Even-period Oscillations of FSPC)
An ideal relay together with an integrator as in the FSPC case, cannot have oscillations of odd periods. While in operation, single cycles of odd periods might be
present, but they will be regarded as transitions between even-period cycles.
Consider the process outlined in Algorithm 5.1. The describing function of the
ideal relay is provided in (5.27)
Yf (E, N, e ) =

4
N E sin

 ei( N e N ) , e [0, 1[

The linear part of the block diagram in Figure 5.12 is


G(q) =

i BF (q)
q np +nm (q 1)AF (q)

(5.29)

78

Local Analysis

For simplicity, consider unfiltered measurements. In that case, G(q) on the unit
circle is equal to
G(q)|q=e2i/N =

2
i
ei( 2 + N + N (np +nm ))
2 sin(/N )

(5.30)

As in the root locus analysis, only the total additional round-trip delay n = np +nm
matters. Equations (5.25), (5.27) and (5.30) yield
2i
N E sin2

ei( 2 + N (e +n)) = 1 = ei(+2) , e [0, 1[.

(5.31)

Separating the phase and magnitude equalities, results in the two equations
E=

2i
N sin2

2
+
(e + n) = + 2, Z, e [0, 1[
2
N

(5.32a)
(5.32b)

Thus, it is the phase equality (5.32b) that allow different solutions. It can be
rewritten as
N=

4(e + n)
, , ; Z, e [0, 1[.
1 + 4

(5.33)

Since N is positive, 0. The denominator describes an integer, thus also the numerator has to be an integer. Therefore, only e -values in the set {0, 0.25, 0.5, 0.75}
are plausible. Moreover, N is even according to Proposition 5.5, which excludes
the second and forth possible e -values. Hence, the possible periods are obtained
from
N=

4(e + n)
1
, = 0, 1, 2, . . . , e {0, }.
1 + 4
2

(5.34)

For each N , the corresponding amplitude is computed using (5.32a).


Finally, we have to verify the correctness of Assumption 5.4. If it does not hold,
the estimated periods are still informative, as pointed out in Section 5.4.2. With
the step-wise updates of the relay, an intuitive alternate waveform is a triangular
wave. Such a waveform of period N has the amplitude
E0 =

N i
.
4

(5.35)

We exemplify the analysis by a concrete example


Example 5.5 (Analysis of FSPC in a Typical WCDMA Setting)
Consider the typical delay situation in a WCDMA system (see Example 5.2)

5.6 Effect of Auto-Interference

79

np = 1, nm = 0. The possible oscillation modes (identified by the period N )


are obtained from (5.34). Only v = 0 provides integer periods. Thus
1
N = 4e + 4, e {0, },
2
which yield the solutions N0 = 4 and N0 = 6. To verify Assumption 5.4,
compute the ratio

1
sin(/N )
|G(ei2e )|
=
,
=

i
e
|G(e )| e = 2
sin(2/N )
2 cos(/N )
N0

where the expression in (5.30) is used in the second last equality. This is
equal to 0.71 and 0.58 for N0 = 4 and N0 = 6 respectively. It is therefore more
relevant to use the expression in (5.35) than in (5.32a) to compute the amplitude
of the modes. Table 5.3 provides the corresponding amplitudes using both
expressions. Compare the result to the introductory simulation in Example 5.1.
Oscillation mode
N0 = 4
N0 = 6

E0
i
1.33i

E00
i
1.5i

Table 5.3 Predicted oscillation modes in the typical WCDMA situation.

The estimated second mode with period N0 = 6 and amplitude E00 = 1.5 dB
describes the oscillations well.
Corresponding oscillation analyses with respect to other delay situations are
summarized in Table 5.4.

5.5.1

Summary, Describing Functions Analysis

In summary, we conclude that static nonlinearities, such as a relay or a sign function, results in an oscillatory behavior of the system. These oscillations may comprise several modes. Switching between the modes may be stimulated by external
disturbances. For analysis purposes, describing functions are introduced and applied to local loops consisting of one static nonlinearity and a linear part. Thereby,
prevalent oscillations can be predicted. A natural power control related example is
the FSPC algorithm. Using the discrete-time describing functions, the oscillations
observed in simulations, can be predicted.

5.6

Effect of Auto-Interference

The effect of the auto-interference on local loop stability has been neglected this
far. Naturally, the efficiency of the receiver has an impact, but the motivation in

80

Local Analysis

n
0
1
2

Oscillation modes
N0 = 2
N0 = 4
N0 = 6
N0 = 2
N0 = 8
N0 = 10
N0 = 12
N0 = 14

E0
i
i
1.33i
i
1.7i
2.1i
2.5i
2.9i

E00
i
i
1.5i
i
2i
2.5i
3i
3.5i

e
0
0
0.5
0.5
0
0.5
0
0.5

v
0
0
0
1
0
0
0
0

rG
0.71
0.58
0.54
0.53
0.52
0.51

Table 5.4 Predicted oscillation modes for various delays. The introduced
quantity rG represents the ratio in Assumptions 5.4 for k = 2.
Since rG is not small enough in most cases, E00 is probably a
better amplitude approximation than E0 .

the introduction of this chapter was that it can be described together with the
effect of the interconnections. Nevertheless, a brief analysis is included here. In
essence, the effect of the auto-interference is brought into our linear systems theory
framework, by linearizing the interference. Then issues like stability are naturally
addressed.
Assume that the signal power gains gij are slowly varying, and can be regarded
as constant. If all inner loops provide perfect control, and the power control problem is feasible, all target SIR:s it are met. Let pti denote the corresponding power
assignments, and Iit the resulting interference at each receiver. As stressed by
Equation (3.5), the interference at receiver i is given by (in linear scale)
X

Ii (t) =
gij (t)
pj (t) + 1 i (t) pi (t)
gii (t) + i (t).
j6=i

Delayed output powers pi (t) have to be considered. Moreover, an important assumption in this chapter is that the local loop dynamics is independent of other
loops. Therefore, we rewrite the interference expression as

Ii (t) = Iiol (t) + 1 i (t) pi (t np )
gii (t),
where Iiol (t) represents independent disturbances. The corresponding interference
in logarithmic scale (dB) is



Ii (t) = 10 log10 Iiol (t) + 1 i (t) gii (t)10pi (t)/10 ,
with respect to the power pi (t) in logarithmic scale. Assume that the receiver
efficiency and the disturbances from others are constant on a short time scale.
A linearization (see e.g., Franklin et al., 1997) of the interference with respect to

5.6 Effect of Auto-Interference

81

the equilibrium (pti , Iit and it ), provides an approximate relation that holds in a
neighborhood of the equilibrium. Further details are provided in Section 7.3, and
the linearization is given by
Ii (t) = Iit + ri (pi (t np ) pti ), 0 ri < 1.

(5.36)

where ri is depending on i and other quantities.


Consider the use of a general log-linear power control algorithm R(q)
pi (t) = R(q)(it i (t nm )).

(5.37)

i (t) = i + pi (t np ) + gii Ii (t).

(5.38)

Moreover, SIR is given by

Equations (5.36), (5.37) and (5.38) approximate the closed-loop behavior of the
local loop to

pi (t) =R(q) it i pi (t np nm ) gii + Ii (t nm )

R(q) pti pi (t np nm ) + ri (pi (t np ) pti ) =

=R(q)(1 ri ) pti pi (t np nm ) .
A similar result is obtained when considering filters F (q) with the property F (1) = 1
(see Section 5.2.4).

pi (t) R(q)(1 ri ) pti F (q)pi (t np nm )
Based on Definition 5.2, we conclude that the gain margin Km has increased by a
factor 1r1i (t) > 1. Hence local loop stability is not violated. On the contrary, the
gain margin has improved.
A similar reasoning can be applied when employing the FSPC algorithm in (5.8)

pi (t + 1) = pi (t) + i sign it i (t nm ) .
(5.39)
The closed-loop system is described by

pi (t + 1) =pi (t) + i sign it i (t) pi (t np nm ) gii + Ii (t)

pi (t) + i (1 ri ) sign pti pi (t np nm ) .
As previously, including a filter F (q), F (1) = 1, we get

pi (t + 1) pi (t) + i (1 ri ) sign pti F (q)pi (t np nm ) .
The effect of the auto-interference is thus a smaller step size in reality. According to
the describing function analysis in Section 5.3.2, the amplitude of the oscillations is
smaller. Hence, the auto-interference does not violate stability of linear algorithms
nor aggravate oscillations of the FSPC algorithm.

82

5.7

Local Analysis

Summary

The global system can be seen as a number of local control loops, interconnected
via the interfering powers between the users. We motivate why local loop stability
is necessary for global stability. Therefore, local loop analysis provides valuable
insight in the dynamical behavior of power control algorithms. Primarily two
classes of algorithms are considered. The first class include most of the interesting
proposed algorithms utilizing information feedback. They can be seen as linear
controllers in logarithmic scale, and thus properties of linear systems are relevant.
In order to avoid confusion, stability is carefully defined. Using root locus analysis
from control theory, stability is addressed with respect to the controller parameters.
Controllers, such as the FSPC algorithms, that utilize decision feedback, behave
slightly different. The decision component can be seen as a sign function or a relay
and has both stabilizing and unstabilizing effects. This static nonlinearity result
in an oscillatory behavior, which neither vanishes nor aggravates over time. For
that matter, discrete-time describing functions are introduced and applied to the
local loop when using FSPC. The conclusion is that several oscillation modes are
possible, and mode switching is stimulated by external disturbances.
Finally, the dynamical effects of imperfect receivers are studied. The conclusion
is that this auto-interference does not violate stability of linear algorithms nor
aggravate oscillations of the FSPC algorithm.

Appendix
5.A

Local Loop Analysis of the AAW Algorithm

The AAW algorithm, which was proposed by Almgren et al. (1994) and reviewed
in Section 5.2.1, is given by
pi (t + 1) = pi (t) + (it i (t)),
where it = /. With the time-shift operator, this is rewritten as
pi (t) =

( t i (t)) = RAAW (q)(it i (t)).


q i

(5.A.1)

Using the same approach as in Example 5.3 and Figure 5.7 we can draw the
block diagram describing the local loop of the power control algorithm as in Figure 5.1. As in Section 5.3, the use of a filter F (q) is optional. The local loop
gii (t) Ii (t)
it (t)

F (q)

q nm

np

pi (t) +

i (t)

Figure 5.1 The local loop when employing the AAW algorithm and a filter
F (q).

when neglecting constraints is linear, and therefore root locus techniques as in Section 5.3.2 are applicable. Instability limits for are summarized in the case of a
local average filter in Table 5.1 and in the case of an exponential forgetting filter
in Table 5.2.

83

84

Local Analysis

n=0
n=1
n=2

L=1
>1
1.000
0.707

L=3
>1
0.812
0.671

L=5
0.981
0.770
0.673

L = 10
0.842
0.759
0.700

Table 5.1 Local loop stability region given by strict upper bounds on ,
when using the AAW algorithm and a local average filter.

n=0
n=1
n=2

=0
>1
1.000
0.707

= 0.33
>1
1.000
0.731

= 0.60
>1
1.000
0.782

= 0.80
>1
1.000
0.858

Table 5.2 Local loop stability region given by strict upper bounds on ,
when using the AAW algorithm and an exponential forgetting
filter.

The conclusion in Section 5.3.2 that the exponential forgetting filter has the
more appealing stability properties still holds. The tabled upper stability bounds
are somewhat surprising. For instance, using window length L = 3 when subject
to a time delay of n = 1 actually puts stronger stability restrictions on than both
using no filter and when using window lengths L = 5 or L = 10. The reason is that
the controller gain of RAAW (q) in (5.A.1) does not linearly depend on .

6
Local Design

In the previous chapter, methods from control theory were applied to address
stability of distributed local control loops. Stability is of course necessary, but
different stabilizing controllers provide very different behavior. Therefore, some
design methods from control theory are applied to obtain good performance. The
considered controller structures form a local loop as depicted in Figure 6.1. As
in the previous chapter, the focus is on SIR-based power control algorithms, with
controller Ri , controller command decoder Di and filtering operation Fi . Again, the
system is subject to time delays, and possibly also transmission power constraints.
Disturbance models and statistics provide valuable information to the design
process. Such models are discussed in Section 6.1, and will be used throughout
the chapter. As disclosed in Chapter 5, instability of local loops is essentially a
result of too much trust in outdated information. The behavior can be improved
by either rely less or more careful on the measurements or by predicting future
measurements. The core problem with outdated information is that the most
recently computed output powers are not reflected in the measurements. However,
these power levels are known to the algorithm and can be used to adjust the
measurements accordingly. The strategy is referred to as time delay compensation
in Section 6.2.
Log-linear algorithms are stable if the resulting closed-loop poles are within the
unit circle (see Section 5.3.1). This naturally motivates a design strategy, where

85

86

Local Design

Transmitter

Receiver

gii (t) Ii (t)

xi (t)
it (t)

i (t)

Ri

Fi

ui (t)

q np

Di

pi (t)

q nm

Figure 6.1 Block diagram of the receiver-transmitter pair i when employing a general SIR-based power control algorithm. In operation,
the controller result in a closed local loop.

the controller parameter values are chosen to place the poles at relevant locations.
Pole placement design is in focus in Section 6.3. The resulting SIR depend on the
disturbances, the target SIR and the power controller. These relations are naturally
discussed in the frequency domain and are further explored in Section 6.4.
The disturbance models in Section 6.1 are not only useful to evaluate performance. Given a disturbance model, possibly recursively estimated, future disturbances can be predicted. Such predictions are utilized by controllers and in
controller design in Section 6.5.
The discussion above mainly focus on linear controllers, possibly based on estimated parameters. Nonlinear controllers stand out as natural extensions, but
are more difficult to design. In some situations, however, nonlinear components
in otherwise linear controllers provide control actions, that cannot be obtained by
only linear control. Nonlinear components with application to the power control
problem are discussed in Section 6.6.
A number of different design and control strategies are covered in this chapter.
The use of some central algorithms is exemplified in simulations in Section 6.7.

6.1

Fading Characteristics

The radio propagation channel can, as discussed in Section 3.3, be modeled as


comprising three main components: path loss, shadow fading and multipath fading. As in Figure 6.1 it can be considered as an additive disturbance. The ability
to compensate for the time-variant propagation channel is therefore related to its
correlation properties. Since the time-variations are due to terrain and environment variations, this is most naturally addressed in the spatial frequency domain

6.1 Fading Characteristics

87

[ m1 ]. Note that the spatial frequency domain is related to the more traditional
temporal frequency domain f [ s1 ] by the velocity v [ m/s] of the mobile station
such that f = v.
The path loss will be considered constant in the sequel, and thus time-variations
are captured by shadow and multipath fading. As in Section 3.3, the focus is on
the propagation channel. It is important to note that the generalization of power
gain to also include code correlation etc. (see Section 4.3) only affects the long time
mean and thus have no effect on the frequency domain representation except from
a bias.

6.1.1

Shadow Fading

The long term statistics of the shadow fading in logarithmic scale is well captured
by a Gaussian distribution. However, such a model is not describing the slow
correlation of the fading. The effects from the terrain are correlated and if the
receiver is shielded at one instant, it will most likely be shielded for some time
thereafter.
a.
10

10
0

b.

10

20

30

40

50

60

70

80

90

100

10

10
0
10
20
30
0

x [m]

Figure 6.2 Realizations of a. shadow fading gain and b. multipath fading


gain in dB based on the models discussed in the text. Note the
different spatial scales.

Gudmundson (1991) included spatial correlation by fitting a first order filter


to measured data at the 900 MHz band. Srensen (1998) refined the model using

88

Local Design

data from a 900 MHz small urban macro cell. The multipath contribution to the
measurement is assumed additive and white. It is deemphasized using spectral estimation techniques. The focus in this chapter will be on the latter model. Therefore
this model receives extra attention below. Srensen used data sampled by a spatial
sample interval xs = 0.1 m. Contributions from the multipath fading is assumed
to affect the measurements as a constant noise level. An ARMA(2,1)-model is seen
to satisfactory represent the fading correlation in the observations.
gs (k) = a1 gs (k 1) a2 gs (k 2) + es (k) + b1 es (k 1), Var{e2s (k)} = e2 ,
[a1 , a2 , b1 ]T = [1.8384, 0.8395, 0.9634]T , e2 = 2.01.

(6.1)

where the sample instants k are with respect to the spatial sample interval xs and
es (k) is zero mean stationary white Gaussian noise. The normalized autocorrelation
function of this model can be written as
rgs (0) = 1, rgs (1) = 0.930,
rgs (k) = 0.542ek/142 + 0.458ek/6
Two decorrelation distances are thus naturally identified: 6 and 142 samples, i.e.,
x1 = 14.2 m and x2 = 0.6 m. The overall decorrelation distance (when the normalized autocorrelation is less than e1 ) is 5.5 m. A corresponding analysis of
the model provided by Gudmundson result in the decorrelation distance 8 m. The
decorrelation distances can be considered as a rough measure of the spatial frequency content. The low frequency content has components approximately up
to 1/x1 = 0.07 [ m1 ] and the remainder up to 1/x2 = 1.7 [ m1 ]. Figure 6.2a
illustrates a simulated instance of the model in (6.1.1) and indicates the spatial
correlation.

6.1.2

Multipath Fading

In an urban environment, the transmitted signal is reflected by large objects along


the path. Therefore, several rays reach the receiver. Depending on their phase,
they interfere either constructively or destructively resulting in multipath fading.
A simplified worst case scenario arises when the Line-of-Sight (LoS) ray is assumed completely shielded, but the reflected rays reach the receiver and enable
transmission of information. If the arriving rays are modeled as isotropic, the amplitude gain a
due to multipath is described by a Rayleigh distribution (Clarke,
1968)
pa (x) =

2x x2p
e
, x 0,
p

where p = E[
a2 ] is the average power gain. We are interested in the distribution
of the power gain gm = a
2 , which is obtained using the following transformation of
probability density functions

1
(6.2)
pgm (x) = pa ( x).
2 x

6.1 Fading Characteristics

89

The power gain thus has an exponential distribution with the pdf
pgm (x) =

1 xp
e
, x 0.
p

When the LoS component cannot be neglected, the computations become a


little more complex, and the amplitude gain can be shown to have a Ricean distribution (Rice, 1948) with the pdf
s
!
2
2x(K + 1) K (K+1)x
K(K + 1)
p
pa (x) =
, x 0,
e
I0 2x
p
p
where I0 is the zero-order modified Bessel function, and K is the ratio of the LoS
component power to the power of the other components.
The third alternative is to model the multipath fading using a Nakagami distribution (Nakagami, 1960). It was selected to fit empirical data, and in essence it
describes the amplitude gain by a 2 -distribution with m degrees of freedom, i.e.
pa (x) =

2
2mm x2m1 mx
e p , x 0,
m
(m)p

where (m) is the Gamma function. The Nakagami distribution is related to


the other two models. Using m = 1 we get the Rayleigh distribution, and using
m = (K + 1)2 /(2K + 1) we obtain a good approximation of the Ricean distribution.
The latter is particularly valuable when performing analytical computations, since
the Bessel function in the Ricean distribution is troublesome in those cases.
The power gain distributions for the last two models are left out, but they
are easily obtained using the transformation in (6.2). Further details on fading
channels can be found in a survey by Sklar (1997) or in (Larsson, 1997).
Just as with the log-normal distribution of the shadow fading, these distributions only describe the long-term statistics. To include spatial correlation, Clarke
(1968) proposed a multipath fading model based on random scatterers in near-field
of the mobile station. The incident rays at the receiver combine to an envelope
mainly dependent on the scatterer locations and the wavelength. A simulated
corresponding power gain at 900 MHz is provided in Figure 6.2b, using a spatial
sampling interval xm = 0.01 m. This model is refined by Aulin (1979) to include
three-dimensional effects.
Apart from scattering in the near-field, the transmitted signal may be reflected
by objects further away. In such a case, several main rays enter the near-field and
are affected by near-field scattering. Typically, this intermediate-filed scattering is
modeled by an impulse response, which describes the relative strength and delays
of the incident rays to the near-field. Specific propagation scenarios are specified by
the different standardization organizations. For example, consider the Vehicular A
channel model in a WCDMA system (UMTS 30.06, 1997). It describes a situation,
where a vehicle is moving at 120 km/h in a classic macro cell environment with siteto-site distance of 6 km. The receiver observes ten incident rays to the near-filed,

90

Local Design

but is only able to resolve the four strongest. Figure 6.3a describes the specified
impulse response and indicate which rays the receiver is able to resolve. The
resolving ability of the receiver clearly is critical. Advanced receiver structures
constitute an active research area, but is beyond the scope here. An interested
reader is referred to (Johansson, 1998; Tidestav, 1999) . If we assume that the
receiver can utilize all power in the four strongest rays, the multipath effect on the
power gain is just the sum of th respective powers. Figure 6.3b illustrates this power
gain for a simulated instance of the specified impulse response. The corresponding
periodogram is found Figure 6.3c. Note that the graphs are provided in the time
and temporal frequency domain respectively, since the velocity is specified.
a.
0

10

20

30

0.5

1.5

2.5

t [s]
b.

10
5
0
5
10
15
0

10

t [s]
c.

10

10

10

10

10

10

10

10

f [Hz]
Figure 6.3 The channel model Vehicular A is described by the impulse
response in a. It is assumed that the receiver is able to resolve
the four strongest paths, marked by o. A realization of the
power gain with corresponding periodogram are found in b.
and c. respectively.

6.1 Fading Characteristics

6.1.3

91

Fading in the Spatial Frequency Domain

The multipath fading is superimposed on the shadow fading. Using smoothed


periodograms (Ljung, 1999) of a realization at 900 MHz, an estimate of its spatial
frequency contents can be obtained. Figure 6.4 depicts this periodogram estimate
with respect to the spatial frequency [ m1 ]. For comparison, the discrete-time
3

10

10

10

10

10

10

10

10

10

10

10

10

[m1 ]

10

10

10

Figure 6.4 Fading (in dB) at 900 MHz. Multipath fading is superimposed
on shadow fading, modeled as in (6.1.1). The thicker lines
represent the Fourier transform of the shadow fading model
with (solid) and without (dashed) a noise floor. The shadow
fading is dominant up to about 0.5-1 m1 , and the multipath
fading has a characteristic resonance frequency at 1/ = 3 m1
(the Doppler frequency).

Fourier transform of the model in (6.1.1) is included in the figure (solid). The
relevance of the model is further emphasized by adding (in linear scale) the noise
level, which was considered to represent multipath fading. In addition, we observe
a resonance at the Doppler frequency (1/) which is in accordance with theoretical
properties (Jakes, 1974).
As disclosed above, the relations to temporal frequency are described by f = v.
Note that v reflects velocity relative to the terrain and environment. In the never
stationary world of today, v is always greater than zero.

6.1.4

Measurement Procedures

Measuring is not an instantaneous procedure, even though the measurements often


are considered as samples of a continuous process. This is a relevant approximation

92

Local Design

in most power control cases. However, some related issues are brought up here.
The actual interface in a GSM system provides measurements via reports, which
are available to the power control algorithm every 0.48 s. These reports are based
on a local average (see Section 5.2.4) of measurements from 104 bursts (see also
Chapter 8). The averaging is essentially a low pass filter.
In a WCDMA case, the situation is slightly different. Measurements are obtained from the fraction s of the slot (see Section 5.2.2), which in turn corresponds
to Ts = 1/1500 s. Typical values (Adachi et al., 1998) of s include s = 0.1 (considering only the four pilot symbols out of 40 symbols) and s = 0.25 (considering
the ten first symbols). These values depend on the data rate assigned to the user.
A comparison of the filtering effects when considering a full slot average compared
to a fractional slot average is found in Figure 6.5. Aliasing is avoided if the frequency components over the Nyquist frequency are filtered out. This is almost the
case when using the local average of the full slot (or measurement period) as in
GSM. Conversely, aliasing effects are most likely when adopting local average over
fractional slots.
1
0.8
0.6
0.4
0.2
0 1
10

fN

10

10

f Ts

Figure 6.5 Filtering effect with respect to normalized frequency of a local


average filter applied to the full slot (solid) and fractional slots
s = 0.25 (dashed) and s = 0.1 (dash-dotted). The normalization is with respect to the frequency after down-sampling,
which in this case is 40 times smaller.

6.2

Time Delay Compensation

Time delays affect the stability and performance of any controlled system. Essentially, the core problem is that the measurements do not reflect the most recent
power updates. However, these are known to the algorithm, and can be compensated for. In this section we discuss such a compensation strategy with respect to
the general power control algorithm in Figure 6.1. The resulting scheme is applied
to the important special cases of the FSPC algorithm and log-linear algorithms in

6.2 Time Delay Compensation

93

the preceeding subsections.


Primarily, time delays result in imperfect power control in two different ways:
Delayed reactions to changes in external disturbances.
Internal dynamics of the power control loop.
The former typically manifests itself as a phase lag between the input and the output, and is not addressed here. Instead the focus is on the latter. The core problem
is that the measurements do not reflect the most recent power updates. These are
known to the algorithm, however, and can be used to adjust the measurement.
This is illustrated by the following example.
Example 6.1 (Measurement Adjustments to Compensate for Time Delays)
Consider the typical case np = 1 and nm = 0 and the FSPC algorithm in (5.8).
Using the notation from Section 5.2, this decision feedback algorithm can be
rewritten as
si (t) = sign(it (t) i (t nm ))
pi (t + 1) = pi (t) + i si (t).
In a delayless situation, the SIR is given by
i (t) = pi (t) + gii (t) Ii (t).
When subject to time delays as in this case, we instead get
i (t) = pi (t 1) + gii (t) Ii (t).
Since the output powers are known, the following compensation is straightforward
i (t) = i (t) + pi (t) pi (t 1) = i (t) + i si (t 1).

To generalize to the general algorithm in Figure 6.1, we have to consider the


filter Fi and the power control mechanisms Ri and Di . Assume that the filtering
operation is additive and time-invariant1 , i.e.,
F{x(t) + y(t)} = F{x(t)} + F{y(t)}, F{q n x(t)} = q n F{x(t)}.
Thereby, the measurements can be adjusted by generalizing the Smith predictor
(
Astr
om and Wittenmark, 1997). This is formulized as the following algorithm.
1A

homogeneousness requirement could also be added to only consider linear time-invariant


(LTI) filters, but this is not needed. However, note that the important class of LTI-filters
meet the requirements.

94

Local Design

Algorithm 6.1 (Time Delay Compensation (TDC))


Consider the power control algorithm in Figure 6.1. Time delay compensation is
implemented by the following steps, with respect to the notation in Figure 6.1.
pi (t)} Fi {
pi (t np nm )}.
i) Adjust measurements: i (t) = i (t) + Fi {
t
ii) Issue power control command: si (t) = Ri {i (t), i (t)}.
iii) Monitor output powers to be used: pi (t + 1) = Di {si (t)}.
Remark 6.1
If separate filters are applied to the interference power and the desired received
signal power (see Section 5.2.4), the filter operation to be considered in the above
algorithm is Fg .
TDC is implemented in the receiver and can be seen as internal feedback as illustrated by Figure 6.6.
Transmitter

Receiver
xi (t)
it (t)

i (t)

Ri

ui (t)

q np

Di

gii (t) Ii (t)


pi (t)

+
Hi

i (t)

Fi

q nm

Figure 6.6 Block diagram of a receiver-transmitter pair when employing a


general power control algorithm with time delay compensation.
TDC is implemented according to Algorithm 6.1 in the device
Hi and can be seen as internal feedback in the receiver.
The use and applicability of TDC is illustrated by considering the important
situations of the FSPC algorithm and a general log-linear control algorithm utilizing
information feedback (see Sections 4.5 and 5.3 respectively). For clarity, we will
exclude filtering, but it is straightforwardly included.

6.2.1

Fixed Step Power Control Algorithm

Consider the FSPC algorithm with limited dynamic range


pi (t + 1) = max pmin, min(pmax , pi (t) + i sign it (t) i (t) ) .

(6.3)

6.2 Time Delay Compensation

95

Corresponding components in Figure 6.1 are easily identified. Time delay compensation as in Algorithm 6.1 can thus be added as
Algorithm 6.2 (FSPC with TDC I)
i) Adjust measurements: i (t) = i (t) + pi (t) pi (t np nm ).
ii) Issue power control command: si (t) = sign (it (t), i (t)).
iii) Monitor output powers to be used:
pi (t + 1) = max (pmin , min(pmax , pi (t) + i si (t))).
In this particular case, the algorithm can be simplified. Consider the monitoring
of power levels (neglecting the limited dynamic range for the time being). It can
be written as
pi (t + 1) = pi (t) + i si (t) pi (t) =

i
si (t)
q1

The measurements are adjusted according to Algorithm 6.1


i (t) = i (t) + pi (t) pi (t np nm ).
The last two terms can be rewritten as
pi (t) = i q 1
pi (t) pi (t np nm ) = (1 q (np +nm ) )
X

np +nm

= i

1 q (np nm )
si (t) =
1 q 1

np +nm

si (t) = i

j=1

si (t j).

(6.4)

j=1

Note that if the step size i is adapted and thus time-varying, it cannot be brought
outside the sum. Algorithm 6.2 is thus simplified, since the monitoring of the powers is not necessary. Therefore, we do not need to consider the limited dynamic
range, since only differential commands are used, and not the absolute power levels.
Algorithm 6.3 (FSPC with TDC II)

ii) Issue power control command: si (t) =

Pnp +nm

si (t j).
j=1
t
sign (i (t), i (t)).

i) Adjust measurements: i (t) = i (t) + i

To further illuminate the effect of TDC, some block diagram algebra exercise
is instructive. The block diagram of the FSPC algorithm with TDC operating
in closed-loop is found in Figure 6.7. Power control command errors are more
naturally described by a multiplicative disturbance than an additive. Then xi (t) =
1 corresponds to correct reception of the command bit, while xi (t) = 1 indicates

96

Local Design

Receiver

H(q)

it (t) +

pi (t)

i
q1

gii (t) Ii (t)


Transmitter

ei (t)
q np

i
q1

pi (t)

i (t)

q nm

Figure 6.7 Time delay compensation (TDC) can be implemented as an


internal feedback by monitoring the powers to be used by the
transmitter, pi (t). The transfer function H(q) = 1 q (np +nm )
is obtained from (6.4)

a command bit error. Most of the blocks in Figure 6.7 commute. Hence, the
block diagram is easily rewritten as in Figure 6.8. The merits of TDC are evident,
since the internal round-trip delays are cancelled in the loop. However, external
signals and disturbances are still delayed, and for example it takes some time before
changes in it (t) is reflected in the measurement i (t).
The applicability of TDC to a controller described by the block diagram in
Figure 6.6 is intuitive. However, in some situations, that local loop description is
invalid. A typical example is the uplink when in soft handover. While in operation,
a base station is unaware of whether an issued power control command is applied
or not, since the command from another base station may have been prioritized
(see Section 4.5). Therefore, TDC should be disabled in the uplink while in soft
handover. The applicability in the downlink when in soft or softer handover is
depending on the combining strategy in the receiver.
A similar situation is prevalent when the power command bit error is high. The
measurements are adjusted to reflect power levels to be used, but this is incorrect
when subject to bit errors. A simulation study of these effects is provided in
Section 10.4.1

6.2.2

Log-Linear Power Control Algorithms with TDC

The class of log-linear power control algorithms utilizing information feedback include several of the proposed algorithms to date (see Section 5.3). They can be
represented by
pi (t) = R(q)(it (t) F (q)i (t)).

6.2 Time Delay Compensation

97
gii (t) Ii (t)
q nm

it (t)

ei (t)
q np

i
q1

pi (t)

q nm

i (t)

1 q np +nm H(q)

i (t)

}|
{
z
1 + q np +nm (1 q (np +nm ) ) = q np +nm

Figure 6.8 By rewriting the diagram in Figure 6.7, it is evident how TDC
cancels the round-trip delays in the control loop. External signals and disturbances are still delayed before they are reflected
in (t).

The device Di may represent quantization of limited dynamic range. Thus Algorithm 6.1 is naturally implemented as follows
Algorithm 6.4 (Log-linear Algorithms with TDC)
Adjust measurement by
i (t) = i (t) + F (q)Di {pi (t)} F (q)Di {pi (t np nm )}.
TDC for this class of algorithms can thus be seen as an internal feedback H(q) from
the computed power to the control error. If separate filters are used it is given by
H(q) = Fg (q)(1 q np nm )

(6.5)

The stabilizing effect of TDC is illustrated by an example.


Example 6.2 (DPC with TDC)
Reconsider Examples 5.1, 5.3 and 5.4, where DPC subject to a delay of one
sample is in focus. With TDC and the more general I controller, the update
algorithm becomes
pi (t + 1) = pi (t) + i (it (t) i (t)), 0 < i 1.
Considering delayed powers yields

pi (t + 1) =pi (t) + it (t) ((pi (t 1) + gii (t) Ii (t)) + pi (t) pi (t 1)) =
=it (t) i (gii (t) Ii (t)) + (1 i )pi (t)

98

Local Design

The resulting SIR is thus


i (t) =

i
q 2 (1 i )q i
it (t)
(gii (t) Ii (t)) ,
q(q 1 + i )
q(q 1 + i )

which clearly is stable for 0 < i < 2. In particular, DPC with TDC yield a
dead-beat controller (all poles at the origin)
i (t) =

1 t
q2 1
i (t)
(gii (t) Ii (t))
2
q
q2

Whether this is a good design or not is further discussed in the sequel. For
comparison, the control action when applying an integrating controller without
TDC is described by
i (t) =

q2 q
t

(gii (t) Ii (t)) ,


(t)

i
q2 q +
q2 q +

which is unstable for = 1 (cf. Example 5.4).

6.3

Pole Placement Design of Log-Linear


Algorithms

Stability of log-linear power control algorithms with respect to controller parameters was in focus in Chapter 5. Essentially, a log-linear closed local loop is stable
if and only if all closed local loop poles are within the unit circle. The set of stable
controllers, however, provides rather different performance in terms of fading tracking. Since the performance is related to the pole locations, it is relevant to choose
the controller parameters to carefully place the closed local loop poles. Pole placement techniques was applied to design of power control algorithms in (Gunnarsson
et al., 1999d).
Section 6.3.1 describes the considered parameterized controller structures. Properties of linear systems is the main topic in the following section and pole placement
design is applied to power control algorithms in Section 6.3.3.

6.3.1

Controller Structures

The closed local loop with a general log-linear power control algorithm R(q) in
operation is described by the block diagram in Figure 6.9. As in Chapter 5, we
consider an integrating controller
R(q) =

.
q1

(6.6)

6.3 Pole Placement Design of Log-Linear Algorithms

99

gii (t) Ii (t)


it (t)

np

R(q)

F (q)

q nm

pi (t) +

i (t)

Figure 6.9 The local loop when employing the general linear control algorithm R(q) and the filter F (q).

and the AWW-algorithm


R(q) =

.
q

(6.7)

A natural extension of the I-controller is the PI-controller (


Astr
om and H
agglund,
1995)
ei (t) =it (t) i (t)
xi (t + 1) =xi (t) + ei (t)
pi (t + 1) =xi (t + 1) + ei (t).

(6.8)

Using the time-shift operator, the following transfer function is obtained.


R(q) =

( + )q
q(q 1)

(6.9)

As required in Section 5.3, all controller transfer functions are strictly proper. In
addition, filtering may be included in the loop. Based on the stability properties
discussed in Chapter 5, we only consider the exponential forgetting filter
Fg (q) =

BF (q)
(1 )q
=
.
(q )
AF (q)

(6.10)

We use the notation Fg (q) to further stress that if separate filters are implemented
(see Section 5.2.4), the filter that affects the local control loop is Fg (q).

6.3.2

Properties of Linear Systems

The presentation here will be rather compact. For further details, see e.g., (
Astr
om
and Wittenmark, 1997; Franklin et al., 1997). Consider a continuous-time system
y(t) = Gc (p)u(t) =

Bc (p)
u(t),
Ac (p)

100

Local Design

where p is the differentiation operator pu(t) = u(t).

The response to changes in


u(t) are described by the locations of the poles sj of Gc (p), i.e. the roots of the
polynomial Ac (p). As a rule of thumb, the response of the system is considered good
if the poles are located within the shaded area of Figure 6.10a (see e.g., Franklin
et al., 1997, Ch. 2). Valuable information about a specific systems behavior can
be obtained by studying the response to a abrupt step change of the input The
speed of reaction is determined by the pole distance to the origin. Commonly, this
is described in terms of the rise time tr , which we will define as the time it takes
the system to reach the vicinity of of its new set point after the step is applied.
The slightly (or worse) oscillatory behavior during settling, by the angle to the
negative real axis. The poles closest to the origin will dominate the behavior and
are therefore referred to as dominating poles. Let 0 denote the dominating pole
distance to the origin. Given a specific system, the rise time is given by
tr =

K
,
0

for some constant K.


When discretizing the continuous system, the corresponding discrete-time sysAstr
om
tem Gd (q) with sample interval (or update rate) Ts will have poles at (see
and Wittenmark, 1997)
zj = esj Ts .

(6.11)

In addition, the poles will result in a number of zeros, i.e. roots to the numerator
polynomial. However, a good approximation for systems of low order is that the
characteristics are determined by the poles to Gd (q) and specifications can be stated
in the continuous-time domain using (6.11). Mapping the area in Figure 6.10a
using (6.11) yields the area in Figure 6.10b. Discrete-time poles can thus be related
to corresponding continuous-time poles in the continuous-time domain, where they
have an intuitive interpretation.

6.3.3

Pole Placement Design

The relations between closed-loop poles and performance were discussed above. An
appropriate design procedure is thus to choose the controller parameters to obtain
optimal pole locations. By analyzing the block diagram in Figure 6.9, the resulting
SIR can be written as
i (t) =

1
1+

q n R(q)F (q)


q np R(q)it (t) + gii (t) Ii (t) ,

(6.12)

where n = np + nm is the total additional round-trip delay (in addition to the delay
in R(q)). In steady state (q 1) the stable system converges to
i (t) =

R(1)
1
t (t) +
(gii (t) Ii (t)),
1 + R(1) i
1 + R(1)

6.3 Pole Placement Design of Log-Linear Algorithms

101

since F (1) = 1 when using the filters in Section 5.2.4. Clearly, there will be no
steady state control errors if and only if R(1) = , i.e., if the controller contains
an integrator (the factor (q 1) in the denominator).
A natural optimization criterion is to find the controller parameters corresponding to fastest response (shortest rise time) to changes in target SIR. This is essentially an optimal strategy when the power gains are slowly varying. In other words
we maximize the distance from origin to the dominating poles, while remaining
within the shaded area in Figure 6.10b. If we denote the denominator and numerator of the general control algorithm R(q) by AR (q) and BR (q) respectively, the
characteristic polynomial (cf. Section 5.3.2) is given by
P (q) = q n AR (q)AF (q) + BR (q)BF (q)

Discrete time, Ts = 1 s

Continuous time

a.

b.
2

0.5

0.5

1
2

0.5

0.5

Figure 6.10 Poles located in the shaded area correspond to acceptable


behavior of the system in continuous time (a) and discrete
time (b). The +:s, *:s and o:s correspond to optimized Icontroller, PI-controller and AAW algorithm respectively. In
these cases no filter is considered ( = 0). Furthermore, the
:s describe the poles when using the I-controller and a filter
( = 0.5). The angle to the negative real axis is = 0.25
in all cases.

I controller
The SIR expression in (6.12) using the I-controller in (6.6) reduces to
i (t) =


(q )
q nm 1 it (t) + q n1 (q 1)(gii (t) Ii (t)) .
q n1 (q 1)(q ) + (1 )

102

Local Design

Consider the typical case np = 1 and nm = 0. The characteristic polynomial is


then given by
PI (q) = q 2 (1 + )q + (1 ).

(6.13)

It is desirable to place the corresponding continuous-time poles within the shaded


area in Figure 6.10a, i.e.,
{s1 , s2 } = {rei , rei }, 0 0.25, r r0 .
where r0 constitute a lower limit on the rise time. In this case we have heuristically
chosen r0 = 0.5. The desirable discrete-time characteristic polynomial is thus given
by
Pd (q) =(q es1 Ts )(q es2 Ts ) =
=q 2 q2erTs cos cos(rTs sin ) + e2rTs cos

(6.14)

By equating the coefficients of Equations (6.13) and (6.14), the following requirements are obtained
= e2rTs cos
1 + = 2e

rTs cos

(6.15a)
cos(rTs sin )

(6.15b)

The right hand side of (6.15b) is monotonically decreasing with increasing r. Thus,
any filtering decreases the maximal pole distance to the origin. If rise time is the
major concern, filtering should be excluded. However, if the filter represents a
model of an estimating procedure, is known. Thus, the optimal controller parameter is obtained by solving (6.15b) for rTs , which in turn is inserted in (6.15).
Note that the optimal controller parameter is independent of Ts , which is natural.
If we omit filtering and assign the poles on the border of the area, i.e., = 0.25,
then the optimal controller parameter is
I = 0.340.
For comparison we consider filtering (exponential forgetting, = 0.5). Analogous
optimization yields
I,F = 0.202.
The corresponding poles are plotted in Figure 6.10b. In particular, we note that
filtering result in a significant degradation in terms of rise time. It is even slower
than the heuristically chosen lower rise time limit.

6.3 Pole Placement Design of Log-Linear Algorithms

103

PI controller
The optimization when using a PI-controller is more or less analogous. Equations (6.12) and (6.9) yield that SIR is given by

q nm 1 (( + )q )(q )
t (t)+
i (t) = n
q (q 1)(q ) + (1 )(( + )q ) i

q n (q 1)(q )
(gii (t) Ii (t))
+ n
q (q 1)(q ) + (1 )(( + )q )
In the typical case np = 1 and nm = 0, the characteristic polynomial is given by
PPI (q) = q 3 (1 + )q 2 + ( + (1 )( + ))q (1 ).

(6.16)

Again, it is desirable to place the corresponding continuous-time poles within the


shaded area in Figure 6.10a. A relevant strategy is to place the poles at locations
with equal distance to the origin, and maximize this distance. Instead if one pole is
moved further out, the others move inwards, reducing the dominating pole distance.
Therefore, we assign poles at
{s1 , s2 , s3 } = {rei , r, rei }, 0 0.25, r r0 .
The desirable discrete-time characteristic polynomial is
Pd (q) =(q es1 Ts )(q es2 Ts )(q es3 Ts ) =


=q 3 q 2 erTs + 2erTs cos cos(rTs sin ) +


+ q 2erTs (1+cos ) cos(rTs sin )e2rTs cos
erTs (1+2 cos )

(6.17)

Equating the coefficients of Equations (6.16) and (6.17) result in a set of requirements. Just as in the previous case, filtering only decreases the pole distance to
the origin. Omit filtering and use = 0.25 yield the optimal parameters
PI = 0.0720, PI = 0.365
with corresponding poles in Figure 6.10b. These poles are located further out from
the origin compared to when using an I-controller. At a cost of an extra parameter,
we have obtained a faster closed local loop. In this typical case, the system is
essentially the time delay. For longer time delays and maybe with a more complex
model of the estimating device, the ideas in (Kristiansson and Lennartsson, 1999)
may apply for PI design.
AAW algorithm
This case is rather similar to when designing the I-controller. The resulting SIR
using the AAW transfer function in (6.7) is given by
i (t) =


q nm 1 (q )
it (t) + q np (q )(gii (t) Ii (t)) .
q n1 (q )(q ) + (1 )

104

Local Design

In the specific case of a single additional delay, the computations are analogous to
the I-controller and the optimal parameter is
AAW = 0.0591.
This choice of parameter value yields the pole locations as in Figure 6.10b. The
poles are located even further out from the origin compared to when using the
previous controllers, proving a shorter rise time.
Comments
A procedure for optimizing the parameters in three different controller structures
has been outlined. It was noted that with careful design, AAW provides faster
responses than PI, which in turn is faster than I. If fast responses would be the
only concern, AAW seems to be the most appealing structure. However, since the
AAW algorithm is operating without integral action, it is not as suitable as an inner
loop. As pointed out in Section 5.2.1, the desired power level adaption of the target
SIR can be considered in an outer loop. This is further discussed Section 9.4.3.
A more complex controller structure provides more degrees of freedom and
moreover the ability to assign any closed-loop poles. However, such a scheme would
introduce several zeros (roots of the numerator polynomial), which also affect the
performance.

6.4

Practical Design Aspects

An underlying assumption in the previous section is that the power gains are varying slowly. However, this might be too simplifying when considering a real system.
Typically, such disturbances are roughly known in the frequency domain as briefly
described in Section 6.1. Therefore, disturbance rejection properties are naturally
studied in the frequency domain. Furthermore, as will be shown in Chapter 7,
there are relations between global stability and local properties, which should be
addressed in the design. The focus is on inner loops tracking target SIR:s provided
by an outer loop. Thus, the AAW algorithm is not considered.

6.4.1

Log-Linear Power Control Algorithms

As disclosed in the previous section, the resulting SIR in Figure 6.9, can be written
as


1
q np R(q)
t

g
(t)
+
(t)

I
(t)
,
(6.18)
i (t) =
ii
i
1 + q n R(q)F (q) i
1 + q n R(q)F (q)
Time delay compensation, described in Section 6.2, can be applied to cancel roundtrip delays in the local loops. Then, the SIR expression reduces to
 np

1 + R(q)F (q)(1 q n )
R(q)
q
t
(t) +
(gii (t) Ii (t)) . (6.19)
i (t) =
1 + R(q)F (q) i
1 + R(q)F (q)

6.4 Practical Design Aspects

105

The relations between SIR on the one hand and target SIR and external disturbances on the other can thus be associated with two central transfer functions
i (t) = Gll (q)it (t) + S(q)(gii (t) Ii (t)),

(6.20)

where Gll (q) ans S(q) will be referred to as the closed loop system and the sensitivity function respectively. We only consider controllers with integral action, i.e.,
with the factor (q 1) in the denominator. As is evident from Equations (6.18)
and (6.19), a factor (q 1) in the denominator of R(q) result in the factor (q 1)
in the numerator of S(q) This can be seen as a differentiation, whose effects will be
discussed further on. We consider the typical case np = 1, nm = 0 when nothing
else is stated. The controllers in focus are
1. The DPC algorithm in a delayless case, which yields
1
q1
(gii (t) Ii (t)).
i (t) = it (t) +
q
q
2. The optimized I-controller in the previous section
i (t) =


I
q 1 it (t) + (q 2 q)(gii (t) Ii (t)) ,
PI (q)

where PI (q) is given by (6.13).


3. The optimized PI-controller in the previous section

1
((PI + PI )q PI )it (t) + (q 3 q 2 )(gii (t) Ii (t)) ,
i (t) =
PPI (q)
where PPI (q) is given by (6.16).
4. The integrating controller with = 0.5 and TDC. The SIR expression is
provided in Example 6.2.
5. As above, but with = 1 (i.e., DPC) to obtain a dead-beat controller.
We summarize the closed-loop systems and sensitivity functions of the considered
controllers in Table 6.1. The differentiation in the sensitivity function yields that
the controlled system is insensitive to the long term mean of the fading and interference. However, the differentiation amplifies high frequency components and
should therefore be balanced by at least one well-damped pole if high frequency
components are likely. The transfer functions Gll (q) and S(q) are plotted in the
frequency domain in Figure 6.11. The discrete-time and continuous-time poles are
related via Equation (6.11).
zj = esj Ts .
Note that discrete-time poles at the origin, lack counterparts in the continuoustime domain (such poles would have been located at the infinity). If all closed-loop
poles are placed at the origin, the controller is referred to as a deadbeat controller.
The reason is that the system is at rest when the desired output is reached. A
possible drawback is that unnecessarily large may be used. From these plots, a
number of interesting conclusions can be drawn.

106

Local Design

Controller
1

Closed-loop system
Gll (q) = 1q

Gll (q) =

Gll (q) =

Gll (q) =

Gll (q) =

Sensitivity function
S(q) = q1
q

I
q2 q+I
(PI +PI )qPI
PPI (q)
0.5
q(q0.5)
1
q2

S(q) =
S(q) =
S(q) =
S(q) =

q2 q
q2 q+I
q3 q2
PPI (q)
(q1)(q+0.5)
q(q0.5)
(q1)(q+1)
q2

Table 6.1 Closed-loop systems Gll (q) and sensitivity functions S(q) of controllers studied in this section. The parameters from the pole
placement in Section 6.3.3 are I = 0.340, PI = 0.0720 and
PI = 0.365, and the polynomial PPI (q) is obtained from (6.16).

Disturbance Rejection
The disturbances are considered rejected at frequencies where the sensitivity function is small in Figure 6.11b. DPC (with TDC if needed) is thus preferable if the
disturbances primarily are of low frequency. On the other hand, the unbalanced
differentiation of DPC amplify high-frequency components of the disturbances.
Such high frequency components arise naturally, when considering quantized powers, since the additive quantization noise can be treated together with the additive
disturbance (cf. the introduction to Chapter 5).
The fourth studied controller (I-controller with TDC and = 0.5) is motivated
by similar disturbance rejection as the optimized PI-controller. Higher -value yield
better low frequency disturbance rejection, but worse performance at intermediate
frequencies and vice versa. If we focus on frequencies attenuated by at least 0.5,
we see that normalized frequencies up to 0.03 (controllers 2, 3 and 4) and 0.04
(controller 5) are rejected.
Of course, it would be desirable to design the controller to obtain a small
sensitivity function at all frequencies. This is impossible, however. According
to Sung and Hara (1988), the sensitivity function in this case2 has to meet the
following requirement
Z



ln S(eiw dw = 0.

Hence any frequency region where the sensitivity function is small (negative in
logarithmic scale) has to be compensated by a region where it is large (positive in
logarithmic scale).
2 When

the open loop system have unstable poles, the requirement is slightly different.

6.4 Practical Design Aspects

b.

107

1
0.8
0.6
0.4
0.2
0
0

a.

0.05

0.1

0.15

0.2

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

0.25

0.3

0.35

0.4

0.45

0.5

2
1.5
1
0.5
0
0

f Ts
Figure 6.11 The magnitude of the closed loop system Gll (q) (a) and sensitivity function S(q) (b) of the considered controllers, with
respect to normalized frequency. The curves correspond to
controller 1 (solid), 2 (dashed), 3 (dashed +), 4 (dash-dotted)
and 5 (dotted).

Controller Bandwidth
The closed loop system Gll (q) captures how fast the inner loop adapts to changes
in target SIR. Essentially, fastest possible reactions are provided by dead-beat controllers 1 and 4. Normally, the controller bandwidth is defined as the normalized
frequency where the gain is half the DC gain (at q = 1). As seen in Figure 6.11,
the bandwidth of controller 2 is with this definition approximately 0.17 and of controllers 3 and 4 is approximately 0.22. Controllers 1 and 5 are dead-beat controllers
and have in this case unit gain.
The target SIR is normally updated at a slower rate than the inner loop. It is
therefore subject to abrupt steps, which implies high frequency components in the
input signal. Despite a low gain of the closed loop system at high frequencies, the
inner loop may overreact to these sudden changes. An alternative is to prefilter
the target SIR using a simple low pass filter, e.g., an exponential forgetting filter.

Global Stability
The global system consists of local loops interconnected by the interference powers.
This will be studied thoroughly in Chapter 7, but it is instructive to consider one
important result from Theorem 7.20. The global system is stable if the closed loop

108

Local Design

system Gll (q) of all local loops fulfills


sup |Gll (q)|q=eiw 1.
w

Thus all five controllers meet the global stability requirement.


Sample Interval
The sample interval, together with the mobile velocity, primarily relate the disturbance rejection properties to the fading characteristics in Section 6.1. The shorter
sample interval, the better rejection, but also the more feedback bandwidth required. Consider the shadow fading model, with low frequency content up to
1/x1 = 0.07 [ m1] and the remainder up to 1/x2 = 1.7 [ m1 ]. For a low velocity
(1 m/s) and using controller 3 above (rejects disturbances up to 0.03/Ts Hz), we
need at least Ts = 0.5 s to track the slowest shadow fading, and Ts = 0.015 s to
track the faster one. At other velocities, the required sample intervals are divided
by the mobile velocity v. These figures should be related to the current sample
interval in GSM, Ts = 0.5 s (Steele, 1992). In such a system, power control can
essentially be used to track path loss and possibly the slowest shadow fading. The
reminder has to be mitigated by fading margins and appropriate coding (see Chapter 9). The situation is better when considering the WCDMA proposal (Chaudhury
et al., 1999; Swarts et al., 1999; UMTS 30.06, 1997), where a sample interval of
Ts = 1/1500 s is suggested. Assume that information feedback and an I controller
with TDC is used. That corresponds to disturbance rejection up to 0.04 1500 Hz
= 60 Hz, which is by far sufficient to track the fast multipath fading in the Vehicular A model (see Section 6.1.2). Moreover, if a measurement procedure as discussed
in Section 6.1.4 is employed, aliasing has to be considered in this analysis as well.
In such a case, excess bandwidth provided by a high sample interval is valuable.
Measurement Errors
Filtering is generally excluded in the thesis examples. As disclosed in Section 6.3.3,
filtering the measurements result in slower rise times. If that is a major concern,
the filter should be excluded if possible. However, the filter can for example be
motivated in a situation where we cannot neglect measurement errors. We model
the available measurements as subject to additive measurement errors em (t).
m (t) = (t) + em (t),
where m (t) denote the available measurements. Consider an I-controller with an
exponential forgetting filter, in the typical case np = 1, nm = 0. Straightforward
computations (cf. Equation (6.18) and Figure 6.9) yield that the resulting SIR is
described by
i (t) =

(q ) t
(q 1)(q )
(1 )
(t) +
(gii (t) Ii (t))
em (t) =
qPI,F (q) i
PI,F (q)
PI,F (q)

= Gll (q)it (t) + S(q)(gii (t) Ii (t)) + T (q)em (t),

6.4 Practical Design Aspects

109

where the PI,F (q) is given by


PI,F (q) = (q 1)(q ) + (1 ).
The transfer function is referred to as the complimentary sensitivity function T (q)
and describes the measurement noise contribution to the resulting SIR. Since measurement errors typically include high-frequency components, it is desirable that
T (q) is small for those frequencies.
In this comparative study, we will use the two I-controllers that were designed
with and without a filter in Section 6.3.3. Figure 6.12a illustrates the corresponding
magnitudes of the closed-loop system. function. As expected, the controller bandwidth is better without a loop filter. However, the benefits of filtering are evident
in Figure 6.12b, where the complimentary sensitivity function is much smaller at
high frequencies when using a filter. Hence, filtering should be considered, when
measurement errors is a major concern. A similar result is provided in (Su and
Geraniotis, 1998), where the effects from quantized measurements are in focus. The
authors minimized the power control error in simulations by a linear search over
the filter parameters, and concluded that filtering improved the performance.
a.

1
0.8
0.6
0.4
0.2
0
0

b.

0.05

0.1

0.15

0.2

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

0.25

0.3

0.35

0.4

0.45

0.5

1
0.8
0.6
0.4
0.2
0
0

f Ts
Figure 6.12 The magnitude of the closed loop system Gll (q) (a) and complimentary sensitivity function S(q) (b) of the I-controllers,
with (dashed) and without (solid) a loop filter ( = 0.5).

6.4.2

Decision Feedback Algorithm

Decision feedback algorithms are characterized by a relay. This static nonlinearity


makes a bandwidth discussion more awkward. One approach could be to state that
it result in similar behavior as the corresponding information feedback algorithm.

110

Local Design

Clearly, the discrepancies would be considerable in some cases. For example, = 1


result in an unstable information feedback algorithm. The problem of analyzing the
performance is considered by Song et al. (2000), and we only include a brief review.
In essence, they replace the relay by a constant Kr and an additive disturbance wr
that minimize


E (f (e) Kr e)2 ,
given that
Var{f (e)} = Var{Kr e + wr }.
Using a correlated shadow fading by Gudmundson (1991), the authors thereby
relate the performance to the speed of the mobile and the sample interval. The
conclusion in case of IS-95, with Ts = 1/800 s, is that FSPC satisfacory compensates for the shadow fading, but fails to track the fast fading except for very low
velocities.

6.4.3

Summary, Design Aspects

Generally, we have more design options when information feedback is possible. In


both cases, the ability to mitigate time-varying disturbances naturally depend on
the sample interval. If the spatial correlation of the disturbances can be modeled,
the expected mobile velocities also come into play to describe the corresponding
temporal correlation.
In case of information feedback it is natural to address disturbance rejection
and controller bandwidth in the frequency domain and with respect to the closedloop system and the sensitivity function respectively. The sensitivity function also
captures the effects of quantization noise. If fastest possible response to updated
target SIR:s is the major concern, then loop filtering should be excluded. Conversely, if the measurement are subject to considerable errors, filtering should be
considered to better suppress associated high-frequency components.
The step-wise updates of target SIR contains high-frequency components. To
prevent over-compensation, the target SIR:s should be lowpass filtered by employing a prefilter. When taking all these components into consideration, the local loop
can be described by the block diagram in Figure 6.13.

6.5

Predictive Power Control

Currently, we have almost exclusively used only the measurements as they are
for power control. An exception is TDC, which was introduced in Section 6.2.
However, improved performance can be gained by considering models of the disturbances to either predict the disturbances, as in Section 6.5.1, or to design the
appropriate controller as in Section 6.5.2.

6.5 Predictive Power Control

111

gii (t) Ii (t)


it (t)

+
Fp (q)

np

+ i (t)

pi (t) +

F (q)

nm

im (t)

em (t)

Figure 6.13 The local loop dynamics when employing the general linear
control algorithm R, the loop filter F (q) and the prefilter
Fp (q). The measurements are subject to additive errors em (t).
In case of information feedback, the controller is a linear transfer function R = R(q). The only difference when using decision feedback is that controller block contains a sign function
at the input R = R(q)sign (e(t)). This local loop description
is slightly different from Figure 6.1.

6.5.1

Disturbance Prediction

Assume that the additive disturbance (power gain) can be modeled by filtered
white noise.
gs (t) =

Bg (q)
es (t), Var{e2s (t)} = e2 ,
Ag (q)

(6.21)

where es (t) is zero-mean and white. If an appropriate sampling interval is used, the
shadow fading model in Section 6.1.1 is an applicable model. However, for other
sample interval-velocity relations, and when the averaging in the measurement
procedure in Section 6.1.4 is considered, other models are relevant. Due to the
uncorrelated samples from the noise sequence, we can without loss of generality
assume that Ag and Bg are of the same degree.
The parameterized model is fitted to identification data either offline or recursively online (Ljung, 1999). Popular and implementationally simple recursive
algorithms include LMS and RLS (Gustafsson, 2000; Ljung, 1999). In these approaches, simple models of parameter variations are considered. The tracking performance can be improved, by considering more relevant models. This is disclosed
in Ahlen et al. (2000); Lindbom (1993), where WLMS algorithms are introduced
and evaluated.
Linear algorithms are applied to mobile communications channels to improve
power control by e.g., Ericsson and Millnert (1996); Leung (1999); Mehta et al.
(1996); Moh et al. (1999). However, some of them fails to fully utilize the capabilities of model-based predictions. Various nonlinear algorithms are considered in
(Ekman and Kubin, 1999; Tanskanen et al., 1998; Zhang and Li, 1997).

112

Local Design

Assume that the model in (6.21) is provided by some algorithm. For clarity, we
consider the standard notation
gs (t) =

C(q)
es (t)
A(q)

In the typical case np = 1 and nm = 0 and we are interested in predicting the


disturbances two samples ahead. If the polynomial C(q) is stable, the minimumvariance predictor over m steps is obtained from e.g.,
Astr
om and Wittenmark
(1997, Thm. 12.1) as
gs (t + m|t) =

qG(q)
.
C(q)

(6.22)

The polynomial G(q) is obtained as the solution to the following Diophantine equation
q m1 C(q) = A(q)F (q) + G(q),

(6.23)

where deg{F } = m 1 and deg{G} = deg{A} 1.


The predicted disturbance may be used by the controller. However, it is important that the recursive estimation procedure has converged or at least is known to
provide reasonably accurate parameter estimates. The benefits of using disturbance
prediction in power control is illustrated by simulations in Section 6.7.

6.5.2

Minimum-Variance Control

When a disturbance model is known, this information can be utilized in the power
control design to obtain a controller that adapts to the disturbance. One strategy is
to control the power to obtain minimum-variance of the control error it (t) i (t).
The outline here will be rather brief. Further details can be found in (
Astr
om and
Wittenmark, 1997).
Consider systems of the form
y(t) =

C(q)
B(q)
u(t) +
e(t),
A(q)
A(q)

(6.24)

and assume that C(q) is a stable polynomial (the controller in the general case is
described by
Astr
om and Wittenmark). Let d denote the pole excess, i.e., d =
deg{A} deg{B}. Furthermore, assume that the reference signal is zero. Then
the minimum variance controller is obtained as
u(t) =

G(q)
,
B(q)F (q)

(6.25)

where F (q) and G(q) are obtained from the Diophantine equation (6.23) with
m = d.

6.6 Nonlinear Components

113

Consider a power control problem where the received power is only affected by
an additive power gain, modeled as in (6.21). The output powers are subject to a
delay of only one additional sample. The system to be controlled can thus be seen
as


Br (q)
Bg (q)
Bg (q)Ar (q)
Br (q)Ag (q)
i (t) =
pi (t) +
es (t) =
pi (t) +
es (t)
Ar (q)
Ag (q)
Ar (q)Ag (q)
Ar (q)Ag (q)

C(q)
B(q)
=
pi (t) +
es (t),

A(q)
A(q)
which is of the same form as Equation (6.24). The minimum-variance controller
is not strictly proper, which is required. Therefore, we consider two delays in the
system model, i.e., Ar (q) = q 2 and Br (q) = 1, and then associate one of the delays
with the controller.
Furthermore, we require integral action in the local loop. As pointed out by

Astr
om and Wittenmark, it can be incorporated by modifying the system polynomials as

A(q) = (q 1)A(q)
= (q 1)Ag (q)Ar (q) = q 2 (q 1)Ag (q)

B(q) = (q 1)B(q)
= (q 1)Br (q)Ag (q) = (q 1)Ag (q)

C(q) = q C(q) = qBg (q)Ar (q) = q 3 Bg (q)


The pole excess d between A(q) and B(q) is equal to 2. The minimum-variance
controller is thus obtained from (6.25) as (including the extra delay to ensure a
strictly proper controller)
R(q) =

G(q)
G(q)
=
,
qB(q)F (q)
q(q 1)Ag (q)F (q)

(6.26)

where F (g) and G(q) are solutions to the following Diophantine equation.
qC(q) = A(q)F (q) + G(q) q 4 Bg (q) = q 2 (q 1)Ag (q)F (q) + G(q),
where deg{F } = 1 and deg{G} = deg{Ag } + 2. This minimum-variance predictor
show promising results in simulations in Section 6.7.
As in the previous section, it is important that reliable disturbance model parameter estimates are available. In this case, it is even more crucial, since the
parameters are used in controller (re)design. If the estimated parameters are far
from the true ones, such a strategy may even result in an unstable controller.

6.6

Nonlinear Components

System nonlinearities are often classified as either inherent or intentional nonlinearities. The first category consists of components that we cannot affect in the
design at the moment, such as output power constraints. On the other hand intentional nonlinearities are those which are deliberately introduced in the system.
In this section the focus is on the latter, possibly introduced to reduce the effects
of the former.

114

6.6.1

Local Design

Anti-Reset Windup

To exemplify anti-reset windup, consider the PI-controller in (6.8)


ei (t) =it (t) i (t)
xi (t + 1) =xi (t) + ei (t)
pi (t + 1) =xi (t + 1) + ei (t).
Situations might occur, where the SIR is well above it (t) despite the fact that we
are transmitting using minimal power. Since the error e(t) is negative, the internal
state xi (t) will continue to decrease. When the SIR degrades and there is a need
to increase the power, the low value (maybe negative) of the state reduces the
controllers ability to increase the power fast.
In general, the problem is that the internal state of the dynamical controller
is unaware of that the computed power is different from the true output power.
This results in inner states winding up (or down). The problem is discussed for
PID-controllers by
Astr
om and H
agglund (1995), and the proposed solutions are
referred to as anti-reset windup. Assume that the constraints can be described as
a static nonlinear function f () (not necessarily analytical). An intuitive solution
is to update the state again after computing the power level:

Ts
f (p(t + 1)) p(t + 1) ,
(6.27)
xi (t + 1) := x(t + 1) +
Tt
where Tt is the tracking parameter. If Tt = Ts , the state will exactly correspond to
the actual output. Note that when Kp = 0, Ki = 1, Tt = Ts and f () is a saturation,
we obtain the Distributed Constrained Power Control (DCPC) algorithm (Grandhi
et al., 1995) as a special case.
A more complicated power control algorithm of higher order (see e.g., (Gunnarsson et al., 1999d) or Section 6.5.2) needs special treatment. A general linear
algorithm can be described in state space form as
xi (t + 1) = Axi (t) + By i (t)
pi (t) = Cxi (t),

(6.28)

where A (n n), B (n m), C (m n), are matrices of given orders, y i (t) is the
measurement vector, and n is the dimension of the state vector. Note that the
algorithm is strictly proper. The order of the input vector m is in a typical power
T

control case equal to one (e.g., yi (t) = ei (t)) or two (e.g., y i (t) = it (t) i (t) ).
An observer-based anti-windup scheme (see Kothare et al. (1994) for details) can
be implemented as

xi (t + 1) =Ai xi (t) + By i (t) + L f (pi (t)) Cxi (t)
(6.29)
pi (t) =Cxi (t),
where the (n m)-matrix L is a design parameter.
The static function f () should not only incorporate the inherent nonlinearities,
but also all the intentional nonlinearities, such as those discussed in the rest of the
section.

6.6 Nonlinear Components

6.6.2

115

Selector or Switch

Sometimes it is desirable to employ several algorithms in parallel, and then use a


device to state priorities, i.e., to switch between the algorithms. Such a nonlinearity is commonly referred to as a selector or a switch, depending on scientific
background.
As an example, consider the problem of an integrating power control algorithm
at low interference levels. A SIR balancing algorithm would compute a very low
power to use when the interference is low. The system requirement that a user
should use a low power in order not to disturb others does not hold, and instead the
user requirement of using a high power to obtain good quality should be prioritized.
An implementation is proposed in (Blom and Gunnarsson, 1998; Gunnarsson et al.,
1999b), where the estimated mean interference is used to adapt the minimum
allowable power level. When few users are in the network resulting in a low mean
interference, the minimum allowable power level is increased and vice versa. This
is implemented by using a maximum selector as
pi (t + 1) = max (pR,i , h(mI (t))) ,
where pR,i (t + 1) is computed by a nominal power control algorithm and h() is a
function that maps the measured or estimated mean interference onto a minimum
power level.
To rectify the purpose of the inner loop, we pose that the focus is to assign power
levels to track target SIR:s, provided by the outer loop. Therefore, adaptions and
priorities as above, should be placed in the outer loop.
However, there are situations when switches in the inner loop can be motivated. For example, consider the control strategies in Section 6.5, which are based
on disturbance prediction. When the estimation algorithm is not tracking the disturbance model parameters satisfactory, such schemes may result in poor control.
A relevant strategy could be to only adopt the prediction based methods when the
estimated parameter variance is less than a threshold. Hence, a mode switching is
beneficial, where we switch between utilizing estimated parameters (e.g., for disturbance prediction or minimum-variance control) and a controller as in Sections 6.2
and 6.3.
When employing switching between different algorithms, the idle algorithms
have to be updated on the current situation. Essentially, the situation is the same
as above, where output constraints affected the output. Analogously, anti-reset
windup techniques can be used to update the internal states when the actual output
is computed by a different control algorithm. This is referred to as bumpless transfer

Astr
om and Wittenmark (1997).

6.6.3

Relay

Controllers utilizing decision feedback can be seen as incorporating a relay or a


sign function in the local control loop. The main motivation is to use few bits
for feedback signaling. Such a bandwidth efficient signaling scheme enables a high

116

Local Design

command signaling rate without using too much of the total bandwidth. Note that
the motivation focuses on signaling over distances. Using relays in algorithms with
information exchange within the device only, cannot be motivated. Instead, the
relays unnecessarily introduce oscillations in the control loop. The dynamical effect
of relays in control loops is studied more thoroughly in Section 5.5.

6.7

Simulations

A number of design methods and guidelines have been outlined in the previous
sections. To illuminate the differences, this section provide simulations in isolated
local loops. These control loops are subject to disturbances as described in Section 6.1, and time delays. The focus is on the typical situation np = 1 and nm = 0
The controllers designed in this chapter are rather different. Some utilize information feedback, others decision feedback. Predictions of power gains may be
employed, as well as time delay compensation, which can be seen as a prediction.
Comparative simulations are provided in this section.
Consider an isolated local loop subject to time delays and shadow fading as
in Section 6.1.1 with mobile velocity 1 m/s. First, the operation with respect
to a specific realization of the shadow fading is considered. Then, the average
performance is in focus via Monte-Carlo simulations.
The problematic effects due to time delays in the local loop is illustrated in
Example 5.1. Question raised in that example serve as a motivation for the analysis
in Chapter 5, which in turn motivates the design in this chapter. Therefore, this
example is reconsidered in network simulations in Section 10.2.2 using controllers
designed in this chapter.

6.7.1

Simulation of an Isolated Local Loop

Figures 6.14 and 6.15 illustrate the performance using various control strategies.
The following subsections will bring up different aspects of the control behavior.
The measurements used for control are obtained as the average over one sample
interval to reduce aliasing as discussed in Section 6.1.4.
Prefiltering
The controller bandwidth relates to the ability to track target SIR:s provided by
the outer loop. Since this normally is updated more seldom, control reactions
to an abrupt step are representative. As pointed out in Section 6.4, such a step
contains high frequency components, which may deteriorate the performance. This
can to some extent be avoided by prefiltering target SIR. Consider the optimized
PI-controller from pole placement design in Section 6.3.3 and the sample interval
Ts = 0.015 as concluded in Section 6.4. The prefilter is an exponential forgetting
filter with = 0.9. Figure 6.14a illustrates the performance with and without
prefilter. The overshoot at the abrupt step is significantly decreased. Therefore,
prefilters will be used in the sequel.

6.7 Simulations

i (t) [dB]

a.

i (t) [dB]

b.

14

14

13

13

12

12

11

11

10

10

c.

117

20

40

60

80

100

d.

14

13

12

12

11

11

10

10

9
20

40

60

t [s]

80

100

40

20

40

60

80

100

60

80

100

14

13

20

t [s]

Figure 6.14 Performance of different power control algorithms when subject to shadow fading and the typical delay situation np = 1,
nm = 0. a. The PI-controller from pole placements design
with (solid) and without (dashed) prefilter. b. The same controller at Ts = 0.015 (solid) and Ts = 0.05 (dashed). c. An
optimized PI-controller (solid) and an I-controller with TDC
(dashed). d. The FSPC algorithm (step-size 1 dB) with (dark
gray) and without (light gray) TDC.

Sample Interval
The sample interval affects both the controller bandwidth and the disturbance rejection, as discussed in Section 6.4. The recommendation is that Ts = 0.015 s is
needed to track the shadow fading. For comparison, the optimized PI-controller
from pole placement design in operation with Ts = 0.015 s and Ts = 0.05 s is
considered. As seen in Figure 6.14b, this clearly has an affect on the disturbance
rejection. The recommendation Ts = 0.015 is considered in the rest of the simulations.
Time Delay Compensation
As seen in Section 6.2, time delay compensation helps to stabilize controllers. However, when information feedback is used, the same performance can be obtained by

118

Local Design

careful design. This is illustrated in Figure 6.14c, where the optimized PI-controller
and an I-controller with TDC yield almost identical performance.
The situation is different when considering controllers utilizing decision feedback, such as the FSPC algorithm. Then, there are not that many other options
available. The dynamical effect of TDC is reduced oscillative behavior, which is
discussed using describing functions in Section 5.5. Figure 6.14d further illustrates
these oscillations and the benefits of TDC.
Predictive Power Control
If a model of the disturbance (power gain) is at hand, it can be used to predict
the gain at future time instants. Section 6.5.1 provides a discussion on methods
to acquire such models. Here, the model is obtained off-line, but from a different
shadow fading realization (identification data). Note that the model not necessarily is identical to the shadow fading model, since the model has to describe the
disturbance with respect to the sample interval Ts .

i (t) [dB]

a.

14
13
12
11
10
9
8
10

i (t) [dB]

b.

20

30

40

50

60

70

80

90

100

20

30

40

50

60

70

80

90

100

14
13
12
11
10
9
8
10

t [s]
Figure 6.15 Predictive control improve the performance by predicting the
disturbances. a. PI-controller with disturbance prediction
(solid) and a minimum-variance controller (dashed). b. The
FSPC algorithm with TDC and disturbance prediction.

These predictions are used together with the PI-controller discussed above, and
the FSPC algorithm. Figure 6.15 indicates significant improvements using both
algorithms. The optimal predictor given a model is utilized in Section 6.5.2 to
design a minimum-variance controller.
As seen in Figure 6.15a, the minimum-variance controller outperforms the other
studied controllers. Note, however, that the estimation procedure needed to acquire
the model is not considered. In a realistic case, the channel is not stationary, and

6.8 Summary

119

has the be recursively estimated. Yet another problem of the designed minimumvariance controller arises when considering global performance. Figure 6.16 depicts
the magnitude of the corresponding closed-loop transfer function Gll (q). Hence,
the global stability requirement Gll (q) 1 in Section 6.4 is not met. However, as
will be disclosed in Chapter 7, the controller can still be applied to slightly loaded
systems, where the requirements on Gll (q) are relaxed.
25
20
15
10
5
0
0

0.05

0.1

0.15

0.2

0.25

0.3

0.35

0.4

0.45

0.5

f Ts
Figure 6.16 The magnitude with respect to normalized frequency of the
closed loop system Gll (q) when using a minimum-variance
controller.

6.7.2

Monte-Carlo Simulations

The same simulations as above are rerun 50 times using different shadow fading
realizations. As performance measure, we use the root mean squared error (RMSE)
v
u
50
N 1
u1 X
1 X t
t
( (t) i (t)).
50 i=1 N t=0 i
The results are summarized in Table 6.2. In essence, the comparative conclusions
from the single realizations above hold.
The effect of the prefilter is marginal on average, but as seen in Figure 6.14a,
it makes a clear difference. It is further emphasized that TDC is not as important when information feedback is available, since the corresponding effect can be
obtained by linear design. Considering FSPC, however, the benefits are significant.
Further improvements are observed when considering disturbance prediction
and minimum-variance control. However, the effect of model estimation is not
included.

6.8

Summary

Stability is a necessary property of closed-loop systems, but different stabilizing


controllers provide very different behavior. Therefore, methods from control theory

120

Local Design

Controller
PI-controller, no prefilter
PI-controller
PI-controller, Ts = 0.05 s
I-controller with TDC
FSPC algorithm
FSPC algorithm with TDC
PI with dist. pred.
FSPC with TDC and dist. pred.
Minimum-variance controller

RMSE
0.27
0.26
0.89
0.33
0.62
0.38
0.19
0.30
0.081

Table 6.2 RMSE when using different control strategies. A prefilter is


employed and the sample interval Ts = 0.015 s is used if nothing
else is stated.

are applied to discuss controller design with respect to performance. Performance


in a completely general case is hard to determine. Valuable information is provided
by disturbance statistics and models, which facilitates the performance discussion.
Such models need to capture the spatial correlation of the disturbances, i.e., the
influence of the environment on the received signal powers.
Outdated information was seen as a limiting factor in Chapter 5. The core
problem is that the measurements do not reflect the most recent power updates.
Since the computed powers are known in the receiver, these can be used to adjust
the measurements in order to compensate for time delays. The proposed scheme is
discussed both with respect to a general control algorithm and applied to existing
ones.
The relations between stability and pole locations of the system are discussed
in Chapter 5. Therefore, an alternative design strategy is to chose controller parameters to place the poles. Performance is naturally discussed with respect to
controller bandwidth and disturbance rejection. The former relates to how fast
the controller responds to modified target SIR:s, while the latter focuses on the
controllers ability to mitigate disturbances. Disturbance rejection can thereby be
parameterized by the sample interval and the velocity of the mobile station. The
performance evaluation also relates to the global stability requirements in Chapter 7, where global stability is related to local loop requirements.
Not all situations are readily handled by linear controllers. In some situations,
nonlinear components may improve the performance or attain a desirable behavior.
For example, output power constraints may result in internal discrepancies between
the output and the internal state of the controller. Such situations can be handled
by anti-reset windup techniques, which are discussed. In other situations, different
linear controllers are relevant in different cases, which can be seen as a nonlinear
switch between the algorithms.

6.8 Summary

121

The different design and control strategies in this chapter provide very different
performance. Some illustrative simulations conclude the chapter, to emphasize
similarities and differences. Monte-Carlo simulations over a large number of cases
stress the benefits of prediction and the use of disturbance models in the controller
design.
General guidelines are hard to disclose. When using information feedback,
time delays can be compensated for by either pole placement design or time delay compensation. On the contrary, there is no natural alternative to time delay
compensation in case of decision feedback. If it is possible to adapt models to disturbances with good precision, this information should be utilized for disturbance
prediction independent of feedback strategy. In addition, disturbance models are
useful in slightly loaded systems, to significantly improve the performance using
minimum-variance control.

122

Local Design

7
Global Analysis

For practical reasons, power control algorithms in cellular radio systems are implemented in a distributed fashion. The analysis of these local control loops in
Chapter 5 provide valuable insight in stability and performance issues. However,
the local loops are interconnected via the interference between the loops, which
affect the global dynamics. Therefore, as disclosed in Chapter 5, the local analysis only provide necessary, but not sufficient, conditions on stability. To capture
the dynamical effects of the interconnections, the overall global system has to be
addressed in the analysis.
An important global discussion is whether it is possible to assign output powers
to meet each users requirement. This is the main issue in Section 7.1, where
we also introduce metrics to describe available capacity and current load in the
network. Proposed approaches for convergence analysis of power control algorithms
primarily consider the algorithms in linear scale. Section 7.2 provide some results
on algorithms in linear scale. Additional time delays have generally been omitted
in convergence analysis. However, here time delays are considered for two classes
of algorithms. In Section 7.3 we employ a robust control framework to analyze the
global system in logarithmic scale. Thereby, sufficient conditions on global stability
are derived, with respect to an approximative global system. These results apply to
general log-linear local control loops, including the effect of time delays and general
log-linear power control algorithms and filters. These conditions can be formulated
as requirements on the local loops. The interesting conclusion is thus that global

123

124

Global Analysis

stability can be granted by proper design of the local loops (cf. Chapter 6).

7.1

Optimal Global Power Assignments

Optimal power assignments were briefly discussed in Section 4.5 as means to centrally control the transmission powers. Mainly, the interest is motivated by the
relations between these algorithms and capacity and performance bounds of distributed algorithms. Here, we generalize the results to include auto-interference
and individual target SIR:s. Essentially, at this global level, we assume that the
inner loops perfectly tracks the fast variations in the signal power gains, so that the
power gains can be considered constant. Then, the capacity and load discussion
mainly relates outer loops and whether it is possible to accommodate all users with
their service requirements (in terms of target SIR). Two metrics are introduced to
describe the available capacity and current load in the network. In the following
discussion only values at the same time instant t are considered, and therefore this
time index will be suppressed for clarity. Also adopt the convention that vector
inequalities, such as x y, hold if they hold element-wise.

7.1.1

Optimal Balancing Assignments

As disclosed in Section 4.3, the SIR at each receiver is a simplified measure of the
perceived quality. Assume that the quality is acceptable when this ratio is above
a certain threshold, i.e.,
i = P

i gii pi

0 , i.
ij pj + 1 i pi gii + i
j6=i g

(7.1)

An intuitive optimization strategy given a fixed set of users, is to maximize the


smallest SIR in the network. This question is raised in (Grandhi et al., 1993;
Zander, 1992b) and some central results are covered here. The auto-interference in
Equation (7.1) was omitted (i.e., i = 1, i) in the analysis. Introduce the matrix
and the vectors p
and
as below
Z
 
 
ij
i
4 g
4
4

= [
= [
, p
.
pi ] ,
i ] =
Z = [
zij ] =
gii
gii
is a nonnegative matrix (i.e., all entries are nonnegative).
Note that the matrix Z
has a unit diagonal, and if the links have been established between
Furthermore, Z
the transmitters and receivers with the best power gain, the off-diagonal elements
are less than one. Using the introduced quantities, Equation (7.1) can be rewritten
as
pi
P
0 , i.
(7.2)
z

pi + i
ij
j
j
X
1 + 0
pi
zij pj i
(7.3)
0
j

7.1 Optimal Global Power Assignments

125

The corresponding equations for all users can be represented in vector notation.
1 + 0
p
Z
+
.
p
0

(7.4)

It is thus interesting to study solutions to (7.4) and their existence, with respect

to 0 . First, focus on the noiseless case, i.e., i = 0, i. Since the elements of Z

can be regarded as stochastic variables, Z will have full rank with probability one.
1 , . . . ,
m . The following results from the work
by
Denote the eigenvalues of Z
of Perron, Frobenius and Wielandt on positive matrices (Gantmacher, 1974):
has a positive real eigenvalue
= max{|
i |}m and the corresponding
Z
i=1
eigenvector is positive.
such that the inequality
The minimum real
p
p

Z
=
.
0 is
has a solution for p
derived from row sums of Z
imply that
Bounds on the eigenvalues of Z
> 1.

Zander (1992b) applied these results to Equation (7.4) to prove the following theorem,
Theorem 7.1 (Zander, 1992b)
With probability one, there exists a unique maximum achievable SIR in the noiseless case
0 : i 0 , i}.
= max{
0 | p
Furthermore, the maximum is given by
1
,
=
1
is the greatest real eigenvalue of Z
> 1 implies that
. Note that
where

(i.e., k
is the eigenvector of
p
> 0. Moreover, the optimal power vector p
+
for any k R constitute an optimal power vector.).
An interpretation of this result is that it is possible to compute the maximum
achievable balanced SIR given a G-matrix. This is an optimal solution in the sense
that there exists no other power vector yielding a higher SIR for all receivers. If
the network is reciprocal, the same G-matrix is valid for both the uplink and the

by Z
T . However, since Z
downlink. To analyze the uplink situation, replace Z
T

and Z have the same eigenvalues, Theorem 7.1 will result in the same optimal
SIR in both the uplink and the downlink. (The optimal power vectors are probably
different.)

126

Global Analysis

Example 7.1 (Optimal Balanced SIR)


Consider a situation where only two mobile stations are established on the same
channel:


1
0.08

G=
0.01 0.8
= 1.032. Hence,
is
The greatest eigenvalue of the corresponding matrix Z
the optimal SIR in this case (in both up- and downlink) is
1
= 31.6 ( = 15 dB),
=
1
achieved by the optimal power assignment
= k(0.93, 0.37), k R+ .
p

As pointed out in Section 4.5, the optimal power assignment is relative. The
influence of the noise in Equation (7.4) can thus be made arbitrarily small by
choosing k sufficiently large. A consequence is that we for practical purposes may
achieve the same SIR as in the noiseless case, but only if sufficient transmitter
power is available.
Godlewski and Nuaymi (1999) studied the effect of the auto-interference to these
optimality results. It is found that when auto-interference cannot be neglected, the
optimal SIR will be smaller. The detailed results are omitted here, but a simple
example provide some intuition. we will adopt a notation that relates to the results
by Zander (1992b). Introduce the diagonal matrix of receiver efficiencies
4
=

diag 1 , . . . , m

Then, Equation (7.4) can be rewritten to include the auto-interference as


1 + 0
1 Z
p
1

.
+
p
0

(7.5)

The degradation in optimal SIR due to inefficient receivers can be considerable,


which is illustrated by the following example.
Example 7.2 (Optimal Balanced SIR Considering Auto-interference)
Consider the case in Example 7.1, but include auto-interference, which is assumed to be equal at each receiver, i = 0 , i. For example a receiver efficiency
0 = 0.99 corresponds to the optimal SIR = 24.8. The optimal SIR degradation in terms of 0 is illustrated by Figure 7.1.

7.1 Optimal Global Power Assignments

127

35
30

25
20
15
10
5
0
0.7

0.75

0.8

0.85

0.9

0.95

Figure 7.1 Optimal SIR relative to the receiver efficiency.

7.1.2

Optimal Assignments Relative a Target SIR

In a practical situation, the optimized balanced SIR only serves as a performance bound. Consider a situation where every user in the network are requesting
the same service (e.g., speech), or at least services which are requiring the same
data rate. Then it may be interesting to find a power assignment resulting in a
balanced target SIR t at each receiver. By formulating a related linear programming problem, the following theorem (omitting the auto-interference) is shown in
(Zander, 1993).
Theorem 7.2 (Zander, 1993)
t of least total power achieving
In a tractable situation (
t < ), the power vector p
t
the balanced target SIR will be the solution to the following system of linear
equations:



1 + t

t =
,
EZ p
t

(7.6)

where E denotes the identity matrix. Furthermore, the leftmost matrix is nonsingular with probability one.
In a realistic situation, power control is typically implemented as cascade control (see Section 4.4), where the target SIR:s are provided by an outer control
loop. Below, we generalize the theory to include individual target SIR:s it and
auto-interference. Thus, the objective is to assign transmitter powers to meet the
requirement
i gii pi

= it , i
ij pj + 1 i pi gii + i
j6=i g

Introduce the diagonal matrix


4
t
t =
diag(
1t , . . . , m
).

(7.7)

128

Global Analysis

The requirements in Equation (7.7) can thus be vectorized to




t (
1 Z
E)
1
=
.
p
p+

(7.8)

Solvability of the equation above is related to feasibility of the related power


control problem, defined as
Definition 7.3 (Feasibility of Power Control Problems)
t is said to be feasible with respect to a network described
A set of target SIR:s

if it is possible to assign transmitter


, and the receiver efficiency ,
by Z and
so that the requirements in Equation (7.8) are met. Analogously, the
powers p


t is said to be feasible under the same condition.
, ,
power control problem Z,
Otherwise, the target SIR:s and the power control problem are said to be infeasible
In the balanced situation, it is natural to define the degree of feasibility of a par t (or difference t in logarithmic scale).
ticular target SIR t by the ratio /
However, in a situation with different individual target SIR:s as in Equation (7.7),
it is not as natural. One approach is to state that feasibility requires
it < , i.
This is a sufficient but not necessary condition, and thus too conservative. Instead,
the feasibility margin as defined below, can be used to discuss this matter.
Definition 7.4
m R+ is


t ), the feasibility margin
, ,
Given a power control problem (Z,
defined by


t is feasible
m = sup x

R : x

The concept has been adopted from Herdtner and Chong (1999, 2000), where
similar proofs of similar and additional theorems covering related situations also
are provided. Herdtner and Chong used the term feasibility index RI and omitted
auto-interference. The motivation for introducing the name feasibility margin is to
stress the similarity to the gain margin discussed for local loops in Section 5.3.1.
As disclosed in that section, the gain margin is a relevant measure of the stability
margin of the local control loop. The feasibility margin can in a sense be seen
as a stability margin of the overall system, if we employ integrating inner control
loops. In such a case, feasibility is a necessary condition for global stability. In the
following theorem we capture the essentials regarding feasibility margins.
Theorem 7.5


t ), the feasibility margin (of both up , ,
Given a power control problem (Z,
and downlink) is obtained as
m = 1/

7.1 Optimal Global Power Assignments

129

where
is
n
o
t (
1 Z
E) .

= max eig
m > 1. If the power control
The power control problem is feasible if and only if
problem is feasible, there exists an optimal downlink power assignment, given by

1
1 Z
t (
E)
t
1
.
= E
p

by Z
T.
The corresponding uplink power assignment is obtained by replacing Z
2

Proof See Appendix 7.A

The feasibility margin is exemplified in the example below


Example 7.3 (Feasibility of Power Control Problems)
Consider the two-mobile downlink case in Examples 7.1 and 7.2. Assume that
the receiver efficiency at each receiver is i = 0.99, i = 1, 2, and that the target
SIR:s it = 10, i = 1, 2 are desirable. The corresponding feasibility margin is
obtained by applying Theorem 7.5
m = 2.38.

The feasibility of the power control problem is not surprising, since the target
SIR:s are all less than the optimal SIR computed in Example 7.2. Instead,
consider the target SIR:s 1t = 10 and 2t = 40, with the feasibility margin
m = 1.10.

This case thus also corresponds to a feasible problem, despite that not all target
SIR:s are below the optimal SIR.
The feasibility margin can also be related to the load of the system. When the
feasibility margin is one, the system clearly is fully loaded (only possible when unlimited transmission powers are available). Conversely, when the feasibility margin
is large, the load is low compared to a fully loaded system. Thus the following load
definition is logical.
Definition 7.6 (Relative Load)
r of a system is defined by
The relative load L
r = 1 (=
L
in Theorem 7.5).
m

Feasibility of the power control problem is thus equivalent to a relative load less
than unity. This load definition is illustrated by Example 7.4.

130

Global Analysis

Figure 7.2 Locations of mobile stations in Example 7.4.

Example 7.4 (Relation Between Target SIR and Relative Load)


Consider a typical CDMA situation in Figure 7.2 where in this case three
mobile stations are located close to the base station. Their corresponding target
SIR:s=12 dB reflect the data rate that they are currently using. A fourth mobile
(A), located far from the base station, is requiring a low data rate corresponding
to target SIR -10 dB. For simplicity, auto-interference is not considered. The
power control problem is feasible, with feasibility margin and relative load
m = 6.06, L
r = 0.165.

Assume that mobile A increases his data rate (aiming at a higher target SIR).
The relative load will increase accordingly. This is illustrated by the solid line in
Figure 7.3. We note that it is quite costly for the system to provide a high data
rate to the distant mobile. The load is for instance doubled if mobile A is using
the same data rate as the other mobiles (12 [dB]). For comparison, consider
the situation when mobile B, close to the base station, increases his data rate
(dashed line in Figure 7.3). Clearly, this is not as costly for the system.

7.2

Convergence in Linear Scale

Most convergence results presented to date utilize values in linear scale. Several
important algorithms can be written as matrix recursions, which facilitates the
analysis. A common approach is to rewrite the problem as a standard iterative
algorithm, see Section 7.2.1, and then relate to established results on convergence.
This approach is used in Section 7.2.2 to prove convergence of a general integrating
controller in a delayless situation. Section 5.3 disclosed that the DPC algorithm
is unstable, when subject to time delays. Here, we show that DPC with TDC
converges for any time delay.
These information feedback algorithms converges to an equilibrium. The situation is different when considering decision feedback algorithms. Their behavior

7.2 Convergence in Linear Scale

131

1
0.8

r
L

0.6
0.4
0.2
0
10

10

t [dB]

15

20

25

30

Figure 7.3 The relative load with respect to different target SIR:s of mobile A (solid) and B (dashed).

can be characterized by persistent oscillations. It has been show that the power
control error using FSPC algorithm, converges to a bounded region. As will be
shown in Section7.2.3, the power control error, using the FSPC algorithm with
TDC, converges to a more smaller bounded region.

7.2.1

Standard Interference Functions

The framework for addressing point-wise convergence of algorithms is based on the


work of Bertsekas and Tsitsiklis (1989), which has been refined and put into the
context of power control algorithms by Yates (1995). An underlying assumption is
denote the controllable resources (in a power
that the G-matrix is constant. Let p
control case, it is the power vector). Assume that the requirements to be met can
be described by the inequality
p),
I(
p

(7.9)

p) is referred to as the interference function. A vector p


0 is a feasible
where I(
p) is feasible
solution if it satisfies (7.9). Moreover, an interference function I(
if (7.9) has a feasible solution. For an arbitrary interference function, the following
definition applies:
Definition 7.7 (Standard Interference Function)
The interference function is standard if the following properties are satisfied for all
0.
p
p) 0.
Positivity: I(
p
0 then I(p)
Monotonicity: if p
I(p0 ).
Scalability:

I(p)
> I(p)
for all > 1.

Given the requirements in (7.9), we want to study the convergence properties of


the class of iterative algorithms described by
(t + 1) = I(p(t)).
p

(7.10)

132

Global Analysis

When I(p)
is a standard interference function, the iteration (7.10) is denoted a
standard iterative algorithm. The corresponding equilibrium is thus
(t + 1) = I(p(t))
(t).
p

=p
The uniqueness of this equilibrium, is disclosed in the following theorem
Theorem 7.8 (Yates, 1995)
Let I(p)
be standard and feasible. If the corresponding standard iterative algorithm (7.10) has an equilibrium, then it is unique.
Proof See Yates (1995) and Blom and Gunnarsson (1998).

Furthermore, the convergence of standard iterative algorithms is provided in


Theorem 7.9
Theorem 7.9 (Yates, 1995)
If I(p)
is standard and feasible, then the iterative algorithm (7.10) converges to a
0 .
for any initial vector p
unique equilibrium p
Proof See Yates (1995) and Blom and Gunnarsson (1998).

7.2.2

Convergence of Some Log-Linear Algorithms

Consider the integrating controller (5.4) in linear scale



pi (t + 1) = pi (t)

it
i (t)


,

(7.11)

subject to the requirements


i (t) it , i.

(7.12)

The relations between (7.11) ans (7.12) and standard iterative algorithms are provided in the lemma below.
Lemma 7.10
Assume that it are feasible target SIR:s according to Definition 7.3 and that
0 < 1. Then the distributed power control algorithm in (7.11) with requirements as in (7.12) corresponds to a standard iterative algorithm.
Proof See Appendix 7.B.

The convergence of the integrating controller can thus be established.

7.2 Convergence in Linear Scale

133

Theorem 7.11 (Convergence of the I-controller in a Delayless Case)


The integrating controller (7.10) with requirements (7.12) converges to a unique
that meets the requirements with equality for any initial power
equilibrium p
0 > 0.
vector p
Proof A direct consequence from Theorem 7.9 and Lemma 7.10.

The theorem does not hold when subject to time delays. Consider time delay
compensation as described in Section 6.2, where the measurements are adjusted as
i (t) = ( t nm ) + pi (t) pi (t np nm ).

(7.13)

This scheme compensates for the effect of outdated powers reflected by the measurements. By employing TDC to the DPC algorithm (i = 1), stability and
convergence are easily proven. Stability and convergence in more general cases are
established in Section 7.3
Theorem 7.12 (Convergence of the DPC algorithm with TDC)
The DPC algorithm (7.10) and i = 1 employing TDC converges to a unique
that meets the requirements in (7.12) with equality for any initial
equilibrium p
0 . The convergence rate is n + 1 times slower compared to the DPC
power vector p
algorithm applied to a delayless power control problem.
Proof The time delay compensation (7.13) in linear scale is

i (t) = i (t nm )

pi (t)
.
pi (t nm np )

The updating procedure of the DPC algorithm in (7.11) and i = 1 is thus



pi (t + 1) = pi (t)

it

i (t)


= pi (t nm np )

it
i (t nm )


=

p(t nm np ))
it Ii (
.
gii
(7.14)

Introduce n = np + nm . Clearly, the update at time instant t + 1 only depend on the


powers at time instant t n. This is essentially the same as having n + 1 algorithms
operating independently in parallel. Thus if the sample interval is Ts , each of these
algorithms update every n + 1 sample interval. In essence, the situation is the same as
in Theorem 7.11, but the sample interval is longer, resulting in a factor n + 1 slower
convergence.
2

Convergence of the AAW algorithm (see Section 5.2.1) with respect to its parameters is disclosed in (Yates et al., 1997). Time delays and auto-interference are
omitted in the analysis, but the latter can be readily included.

134

7.2.3

Global Analysis

Convergence of Some Decision Feedback Algorithms

The FSPC algorithm results in an oscillative local loop, as discussed in Section 5.5.
Therefore, it will never converge to an equilibrium. The local loop oscillations is
reduced when employing TDC (see Section 6.2.1). Moreover, as will be shown
in this section, FSPC with TDC converges to a smaller region than without. A
slightly more general version of the FSPC algorithm is given by

i (t) it
i pi (t),
pi (t + 1) =
(7.15)

i pi (t),
i (t) > it
where > 1 and
< 1. Note that the difference to (4.15) is that the algorithm
takes different steps upward and downward. Hence the FSPC algorithm is obtained
Time delay compensation is implemented as in Section 6.2.1.
if
= 1/.
i (t nm ) = i (t nm ) + pi (t) pi (t n),

(7.16)

where n denotes the total additional round-trip time delay.


As indicated by Example 5.1, the FSPC algorithm converges to a region and
remains there while oscillating. Formally, the FSPC convergence is proven by
Herdtner and Chong (2000) in the following theorem, which applies to the more
general algorithm in (7.15).
Theorem 7.13 (Herdtner and Chong, 2000)
Assume that the power control problem is feasible and that the feasibility margin
m satisfies n+1 /
m . Then, when using the algorithm in (7.15), there exist

n <
a tF SP C 0 such that
 n+1
 n+1
it

,
i (t)

t tF SP C .

m essentially restricts the proof to cases which are


n <
The requirement n+1 /
slightly below maximal relative load. This is essentially no loss of generality, since
the behavior close to the maximal load is unpredictable when the oscillations are
affected by the feasibility constraint. The authors omitted the auto-interference,
but the proof holds after minor adjustments. Using TDC as described in (7.16)
together with the algorithm in (7.15) we form an algorithm that converges to a
region that is smaller than the region in Theorem 7.13.
Theorem 7.14 (Convergence of FSPC with TDC)
Assume that the power control problem is feasible and that the feasibility margin

m satisfies /
m . Then, when using the algorithm in (7.16), there exist a

n <
tT DC 0 such that

n+1

it
n+1 ,
i (t)

t tT DC .

7.3 Log-Linear Algorithms

135
2

Proof See Appendix 7.C.

A comparative comment is provided in the following remark.


Remark 7.15
The
Consider the case of equally sized steps upward and downward (
= 1/).
bounds (in dB) in Theorems 7.13 and 7.14 are given by
FSPC, no TDC:

|it i (t)| (2n + 2)

FSPC, with TDC:

|it i (t)| (n + 2)

Hence, the longer the time delay, the more emphasized improvements using TDC.
Note, however, that the fact that the bounds are tighter does not imply that the
error variance is smaller.

7.3

Log-Linear Algorithms

The techniques in the previous section apply primarily to structurally simple algorithms. When considering delays, filters and general log-linear controllers, it
is desirable to relate to the local loop analysis and design in Chapters 5 and 6.
The challenge is the the nonlinear interconnections between the log-linear control
loops. In this section we apply a robust stability approach, based on a linearized
interference. Essentially, we aim at rewriting the global system, so that it can
be associated with the multi-variable system in Figure 7.4. This is the standard
setting to which the Small Gain Theorem (Zhou et al., 1995, and Appendix 7.D)
applies. Therefore, we proceed in three steps:

(q)

w1

w2

G(q)

Figure 7.4 Setting to which the Small Gain Theorem applies.


1. Rewrite the local loops as a diagonal multi-input, multi-output linear feedback system G(q). This is the main issue in Section 7.3.1.
2. Represent the interconnections by a structured uncertainty (q). Since the
interference is nonlinear, this involves approximations. Section 7.3.2 addresses the problem by linearizing the interference.

136

Global Analysis

3. Address stability using Small Gain Theorem. These results are found in
Section 7.3.3.
The established stability results put restrictions on the local loop design, and
thus stability can be (approximately) granted by appropriate local loop design. To
exemplify the results, the specific case of two mobiles receives extra attention in
Section 7.3.4. A well-known drawback with Small Gain Theorem is that it is rather
conservative in some cases. Therefore, the two mobile case is used as a benchmark
example in Section 7.3.5.

7.3.1

The Global System as Interconnected Local Loops

The global system consists of interconnected local loops. Starting from the loglinear models of local loops derived in Chapter 5, the aim here is to obtain a model
of the global system. This model will contain nonlinearities from the nonlinear
interconnections via the interference, but the remainder will be linear. The focus
is on algorithms with the objective to meet individual target SIR:s provided by an
outer loop. Therefore, algorithms like AAW, which essentially adopts the provided
target, are not addressed. However, by rephrasing the algorithm as discussed in
Sections 5.2.1 and 9.4.3, this adaption is placed in the outer loop. Initially, time
delay compensation (TDC) described in Section 6.2 is omitted, but is included
further on. This section includes rather tedious formula manipulations. For convenience, the resulting diagonal transfer functions are provided in a subsection in
the end of this section.
Operation without TDC
Recall that the local distributed control loops (considering auto-interference) can
be depicted as in Figure 7.5 (cf. Section 5.3). The interconnections between the
i (t) + gii (t) Ii (t)
it (t)

R(q)

q np

F (q)

q nm

pi (t) +

i (t)

Figure 7.5 The local loop when employing the general linear control algorithm R(q) and the filter F (q).
loops are described by the interference Ii (t). More specifically, this is a function
of the powers from all interferers. In an ideal situation, the interference may be
regarded as an independent disturbance to the local loop, which was the underlying

7.3 Log-Linear Algorithms

137

assumption in Chapter 5. However, in order to model the dynamical effects of


the interconnection, we adopt the more realistic model of the interference (see
Section 3.5) as
X
Ii (t) =
pj (t)
gij (t) + (1 i (t))
pi (t)gii (t) + i (t)
(7.17)
j6=i

Denote the corresponding interference expression in logarithmic scale by


4
I(p, t) = [I1 (p, t), . . . , Im (p, t)]T = 10 log10 [I1 (t), . . . , Im (t)]T .

(7.18)

In order to capture the global system behavior, the system model needs to be
vectorized. Therefore, introduce the following vectors
4

g(t) = [1 (t) + g11 (t), . . . , m (t) + gmm (t)]T


4

p(t) = [p1 (t), . . . , pm (t)]T


t 4

t T
= [1t , . . . , m
]
4

(t) = [

1 (t), . . . , m (t)]T .

(7.19)
(7.20)
(7.21)
(7.22)

Note the correspondence between these vector quantities and the quantities in the
local loop in Figure 7.5. For a more compact notation we introduce
(t) = p(t np ).
p
The dynamical effects of introduced filters also need to be described. Adopt the
general approach of applying separate filters FI (q) and Fg (q) to the interference
and signal power respectively (see Section 5.2.4). In the specific case, when only
SIR is measured and filtered, FI (q) = Fg (q) = F (q). To describe the filtering
effects in vector representation, introduce the m m matrices
4

FI (q) = diag(FI (q), . . . , FI (q)) = FI (q)E


4

Fg (q) = diag(Fg (q), . . . , Fg (q)) = Fg (q)E

(7.23)
(7.24)

Then the overall system (global system) can schematically be depicted as in Figure 7.6. Since the target SIR is considered constant, and F g (q) and q nm commute,
it is possible to rearrange the block containing the measurement delay q nm as seen
p, t),
in the figure. Moreover, denote the output of the interference filter FI (q) by I(
and the diagonal transfer matrix of control algorithms and delays by
Rd (q) = q np R(q)q nm E.
Using the introduced notation, Figure 7.6 yield


p, t) + t Fg (q)(g(t) + p
(t)) .
(t) = Rd (q) I(
p

138

Global Analysis

FI (q)

I(, t)
g(t)

(t)
t

q nm R(q)q np

0
..

(t)
p

q nm R(q)q np

Fg (q)
Figure 7.6 The global system consists of interconnected local loops. The
interconnections consist of a diagonal filter F I (q) = FI (q)E
and a nonlinear, non-diagonal cross-coupling I(, t).

p, t)) results in
(t) (except for the p
(t) in I(
Solve for p


p, t) + t Fg (q)g(t) .
(t) = (E + Rd (q)Fg (q))1 Rd (q) I(
p
Hence, it is natural to define the diagonal linear feedback system G(q) as
4

G(q) =Gll (q)E = (E + Rd (q)Fg (q))1 Rd (q) =


=

R(q)
E.
+ Fg (q)R(q)

q +np +nm

(7.25)

Note that Gll (q) is the closed-loop system of the local loops studied in Chapter 5.
The corresponding local poles are thus the roots of the denominator (the characteristic polynomial, cf. Section 5.16). Figure 7.7 provides a relevant block diagram
of the global system dynamics. It is intuitive that local loop analysis is sufficient
if the interconnections via the interference are neglectable. Conversely, if the interference cannot be neglected, it does affect the global system performance and
stability.
Operation with TDC
Time delay compensation is implemented by the linear transfer function H(q) from
the computed transmission powers pi (t) as described in Section 6.2. This can be
(t) (see
described as the internal diagonal feedback H(q) = q np +nm H(q)E from p
Section 6.2). Apart from the internal feedback, the resulting global system in
Figure 7.8, is analogous to the system in Figure 7.6. The global system behavior

7.3 Log-Linear Algorithms

139

FI (q)

I(, t)

+
t

(t)
t

(t)
p
G(q)

g(t)
Fg (q)
Figure 7.7 The global system can be seen as a diagonal system of closed
local loops G(q) and interconnections via the interference.

is thus captured by


p, t) + t H(q)
(t)) .
(t) = Rd (q) I(
p(t) Fg (q)(g(t) + p
p
(t), which yields
As in the case without TDC, solve for p


p, t) + t Fg (q)g(t) .
(t) = (E + Rd (q)Fg (q) Rd (q)H(q))1 Rd (q) I(
p
As in the case of operating without TDC, we define a diagonal linear feedback
system G(q) by
4

G(q) =Gll (q)E = (E + Rd (q)Fg (q) Rd (q)H(q))1 Rd (q) =


=

R(q)
q +np +nm (1

q np nm Fg (q)R(q)

R(q)H(q))

E.

(7.26)

The TDC implementation in Algorithm 6.4 reduces to the expression in Equation (6.5), which is given by
H(q) = Fg (q)(1 q np nm )
This choice of H(q) and Equation (7.26) results in the closed local loop
Gll (q) =

R(q)
.
q +np +nm (1 + Fg (q)R(q))

(7.27)

Clearly, this is the closed local loop system as obtained in Section 6.2. Thus
operation with TDC results in different local loops Gll (q) than operating without.
However, the global system interconnections are described by Figure 7.7 in both
cases. Since there is an imminent risk that the global and the local view get mixed
up in the sequel, we define

140

Global Analysis

FI (q)

I(, t)

H(q)
t

(t)
t

g(t)
(t)
p

Rd (q)

Fg (q)

Figure 7.8 Time delay compensation can be seen as internal diagonal feedback H(q) = q np +nm H(q)E from the computed power p(t).
Otherwise, the global system is identical to the case without
TDC in Figure 7.6.

Definition 7.16 (Local Loop and Global System Poles)


The term local loop poles refer to the closed-loop poles of the local loop, while the
global system poles refer to the closed-loop poles of the overall system.
Summary, Interconnected Local Loops
In summary, the interconnected local loops can be associated with a diagonal linear
feedback system G(q) = G(q)ll E, where Gll (q) is the closed-loop system of the local
control loops (cf.. Section 6.4.1). Assume that the power is controlled by R(q),
and the measurements are filtered by Fg (q) (to emphasize which filter to consider
when using separate filtering, see Section 5.2.4). Then Gll (q) is given by
No TDC:
TDC:

7.3.2

R(q)
q n + Fg (q)R(q)
R(q)
Gll (q) = n
q (1 + Fg (q)R(q))

Gll (q) =

(7.28)
(7.29)

Interference Linearization

The global system in Figure 7.7 is nonlinear due to the nonlinear cross-coupling
I(
p(t), t) between the local loops. One way of addressing stability issues, is to
consider a linearized interference. The resulting dynamics will be linear, and can
thus be analyzed using methods for linear systems. This linearization is relevant
in a neighborhood of an equilibrium point, where the iterative algorithms have

7.3 Log-Linear Algorithms

141

settled.The existence of such a equilibrium point is provided in the following lemma,


based on the assumption that the power gains gij and the receiver efficiencies i (t)
are constant over the time frame of the analysis.
Lemma 7.17 (Momentary Equilibrium Point)
For all feasible power control problems, there exists a momentary equilibrium point
t
pt ) (and corresponding values in logarithmic scale).
t and I = I(
t,
described by p
This is a valid equilibrium point over the time frame where gij and i can be
considered constant.
Proof Follows directly from Theorem 7.5.

The interference function was defined in (7.18). A linearization of the same


about the equilibrium yields
#
"


I(
p(t))
t
(t) pt
I(
p(t)) I +
p

p(t) p
(t)=pt

t
(t) pt ,
=I + cc p
(7.30)
where the Jacobian cc will be referred to as the cross-coupling matrix. A closedform expression for this matrix is derived in the following lemma.
Lemma 7.18 (Cross-coupling Matrix of the Power Control Problem)
Consider the interference function at receiver i as defined in (7.18). Then, based
on Lemma 7.17, the cross-coupling matrix in Equation 7.30 is given by
( (1 )g pt
i
ii i
i=j
Ii
[cc ]ij =
(7.31)
t
g
ij pj
i 6= j
Ii
Proof In logarithmic scale (dB), the interference function is given by

X
Ii (p) =10 log10
gik pk + (1 i )
pi gii + vi =
k6=i

X
ln 10 p
ln 10 p
10
=
ln
gik e 10 k + (1 i )
gii e 10 i + vi
ln 10
k6=i

(7.32)

The partial derivative of (7.32) with respect to pi is


(1 i )
Ii (p)
gii pi
ln 10
1
10
P
=
=
(1 i )
gii pi
pi
ln 10 k6=i gik pk + (1 i )
10
Ii
pi gii + vi

(7.33)

Taking the partial derivative with respect to pj , where j 6= i, yields


10
ln 10
1
gij pj
Ii (p)
P
=
gij pj
=
pj
ln 10 k6=i gik pk + (1 i )
10
Ii
pi gii + vi

(7.34)

The proof is completed by inserting the equilibrium point from Lemma 7.17.

142

Global Analysis

The global system in Figure (7.7) can now be approximated by a linear system
using the interference linearization in Equation (7.30). Hence


p, t) + t F g (q)g(t)
(t) =G(q) I(
p

=G(q) FI (q)I t + FI (q)cc (
p(t) pt ) + t F g (q)g(t)
It is assumed that g(t) is fixed. A simple relaxation is to state that it is fixed
except for a small zero-mean deflection
g(t). The filters are assumed to have unit
DC gain (see Section 5.2.4), which also hold true for the closed local loops Gll (q).
By combining constant values and introducing the equilibrium power deflection
(t) = p
(t) pt
p

(7.35)

the global system can be rewritten as


(t) = G(q)FI (q)cc p
(t) + G(q)F g (q)
p
g (t).

(7.36)

Figure 7.9 illustrates the corresponding block diagram of the global system. This
is of the same form as the system in Figure 7.4. Small Gain Theorem is applied to
the power control problem in the following section.

FI (q)

cc
(t)
p

(t)
g
Fg (q)

G(q)

Figure 7.9 Block diagram of the global system, when approximating the
interference by the corresponding linearization with respect to
(t).
the equilibrium deflection p

7.3.3

Robust Stability of Log-Linear Power Control


Algorithms

Basically, the global system in Figure 7.9 can be seen as a diagonal system of local
loops with a parallel structured uncertainty. One way of addressing stability of
G(q) is to investigate robust stability (see e.g., Zhou et al., 1995) of G(q) with
respect to the uncertainty. Essentially, stability is granted if the round-trip loop
gain of Figure 7.9 is less than one. Since the transfer function G(q) is frequency
dependent, an appropriate metric has to consider the worst case in the frequency

7.3 Log-Linear Algorithms

143

domain. Relevant metrics or norms are discussed together with some robust stability results in Appendix 7.D.1. A matrix norm has the natural interpretation
of input/output amplification gain. The corresponding gain of the cross-coupling
matrix is addressed in the following lemma.
Lemma 7.19
The following relations hold for the matrix -norm of the cross coupling matrix
cc in Lemma 7.18


vi
kcc k = max 1 t = cc < 1
1im
Ii
The value of the norm cc will be referred to as the degree of cross-coupling.
2

Proof See Appendix 7.D.2

The degree of cross-coupling cc allows a natural interpretation. Essentially, it


reflects the influence of the interference to the global system stability. Two cases
are easily distinguished
cc = 0. Corresponds to the case when the interference at every receiver
is only noise, i.e., the local loops are operating independently. In such a
situation, the local loop analysis in Chapter 5 is sufficient.
cc = 1. Impossible in practice, since it corresponds to the case when the
thermal noise is zero, or the interference at one receiver is infinite. However,
in highly loaded interference limited systems, cc is close to 1.
The maximal gain of the local loop Gll (q), which is described in Equations (7.25)
or (7.27), is
sup |Gll (q)|q=eiw
w

Provided that the local loop is stable, stability of the global system is granted if
this maximal gain meets a given restriction, related to the degree of cross-coupling.
Hence, it is possible to establish global system stability by careful local loop design.
This is formally proven in Theorem 7.20.
Theorem 7.20 (Global Stability of Power Control Algorithms)
Let Gll (q) be the stable closed-loop transfer function of the local loop in Figure 7.5.
Then the global system in Figure 7.9 is stable if and only if any of the following
properties is satisfied
(i) supw |Gll (eiw )| 1/FI .
(ii) supw |Gll (eiw )| < 1/(ccFI ),

144

Global Analysis

where
FI = sup |FI (eiw )|
w


vi
cc = max 1 t
1im
Ii
2

Proof See Appendix 7.D.2.

Normally, the interference filter FI (q) is chosen as one of the two described in
Section 5.2.4. Then, the following hold
Corollary 7.21
Assume that the interference filter FI (q) is either a local average filter or an exponential forgetting filter. Then the global system in Figure 7.9 is stable if and only
if any of the following properties is satisfied
(i) supw |Gll (eiw )| 1.
(ii) supw |Gll (eiw )| < 1/cc,
2

Proof See Appendix 7.D.2.

The important conclusion is that it is possible to guarantee stability by proper


local loop design. For example, consider the I-controller (see Section 5.2.1).
pi (t + 1) = pi (t) + (it (t) i (t)), 0 < 1
The applicability of Theorem 7.20 is addressed in Example 7.5.
Example 7.5 (Global Stability Requirement of the I-controller)
When subject to a delay of a single sample as in Examples 5.1, 5.3 and 5.4 the
local loop is given by
Gll (q) =

.
q2 q +

Hence
|Gll (eiw )| =

.
| cos 2w cos w + + i(sin 2w sin w)|

Tedious computations (excluding = 1, which corresponds to an unstable


system) yield that
(

1
q
3 < 1
2 1 1
iw
(1)
(
)
4
sup |Gll (e )| =
w
1
0 < < 13

7.3 Log-Linear Algorithms

145

cc

0.8
0.6
0.4
0.2
0
0

0.2

0.4

0.6

0.8

Figure 7.10 Requirements on global system decoupling when using an integrating controller, subject to a time delay of one sample.

Given a value of the controller parameter , Theorem 7.20 yields requirements


on the degree of cross-coupling cc of the global system. As seen in Figure 7.10, a
large puts high requirements on system decoupling (i.e., weak cross-correlation
via the interference is required). Conversely, a less than 1/3 always results in
a stable global system.
The Small Gain Theorem is essentially focused on a worst case scenario. Therefore, it is known to be rather conservative in some cases. For instance consider an
extreme situation, where all but one mobile are totally undisturbed by (decoupled from) the other mobiles. That case corresponds to a cross-coupling matrix
of only zeros except for the row corresponding to the disturbed mobile station.
Theorem 7.20 states that this case is just as hard to control as the case when
every connection are disturbing each other just as much. Clearly, this is not the
case. However, when the actual interference and load situation is unknown, the
controllers need to be robust to such variations. Hence, by designing to meet the
first property of Theorem 7.20,
sup |Gll (eiw )| 1
w

the global system in Figure 7.9 is always stable, independent of the interference
and load situation.

7.3.4

Two Mobile Case

Valuable insight can be achieved by studying the case of only two mobiles in the
system. This case was briefly studied in the introductory examples in Chapter 2.
It will be analyzed in a number of configurations. Auto-interference is omitted for
simplicity, and the focus is on the use of the I-controller (see Section 5.2.1).
pi (t + 1) = pi (t) + (it (t) i (t)), 0 < 1

(7.37)

146

Global Analysis

The power control problem in this case is given by




 t
g
12 
1
1

2 T
g
11

,
= g11 g22 , t =
Z = g21
,
0
1
g
22

0
2t



From Definition 7.6, we obtain the relative load.


r
q


r = max eig
t (Z
E) = g12 g21 t t .
L
1 2
g11 g22

(7.38)

(7.39)

The linearization described in Section 7.3.2 is naturally simplified. Thus the interference at receiver i is approximated by
#
"


(
p
(t))
I
i

(
p(t) pt ) =
p) Iit +
Ii (
pj p
(t)=pt

Ii (
p(t))
(
pj ptj ) =
Iit +
pj pj (t)=pt
j

gij ptj
Iit + t (
pj ptj ) = Iit +
i (
pj ptj ),
I

(7.40)

2 , which
where i, j {1, 2}, i 6= j. The cross-coupling is characterized by
1 and
can be rewritten as

i =

gij ptj
g pt
Iit i
t ij j
=
=

i
gii pti
Iit
Iit

(7.41)

It is instructive to establish the relations between the relative load and the
i :s.
Equations (7.39) and (7.41) yield

r =
1
2 .
(7.42)
L
No Delays in the System
This case has been analyzed in linear scale in Section 7.2.1 and in (Blom and
Gunnarsson, 1998; Yates, 1995). Equations (7.37), (7.40) and (7.41) yield
pi (t + 1) = pi (t) + (it i (t)) = pi (t) + (it pi (t) gii + Ii (t))
i (pj (t) ptj ) =
pi (t) + (it pi (t) gii + Iit +
= pi (t) + (pti pi (t)) +
i (pj (t) ptj )

(7.43)

Recall Equation (7.35), where


pi (t) = pi (t) pti .
This yields in (7.43)
i pj (t).
pi (t + 1) = pi (t) pi (t) +

(7.44)

7.3 Log-Linear Algorithms

147

For the overall system of both mobile stations, we get




1
1
(t).
(t + 1) =
(t) = A1 p
p
p

2 1

(7.45)

The global system poles are given by the roots to the following equation (cf. Section 5.3.1)
det(qE A1 ) = 0

(7.46)

Hence
r )(q 1 + L
r ),
1
2 = (q 1 + + L
0 = (q 1 + )2 2
where Equation 7.42 is used in the last equality. The global system poles are thus
given by
r ).
q = 1 (1 L
r < 1, the global system poles are always within the unit
Since 0 < 1 and 0 L
circle, and the global system is thus always stable. This is the same conclusions as
in Section 7.2.1 and in (Blom and Gunnarsson, 1998; Yates, 1995).
Delay of One Sample
Since the gains gij are assumed constant, there is no dynamical difference between
a measurement delay nm and an output power delay np . Both will delay the output
power contribution pi of the measurement i . This is more formally seen below
i (t nm ) = pi (t nm np ) + gii (t nm ) Ii (pj (t nm np ), t).
Therefore, we notation-wise study np = 1, nm = 0. Analogous to (7.43), we get
pi (t + 1) = pi (t) + (it i (t)) =
= pi (t) + (it pi (t 1) gii + Ii (pj (t 1), t))
i (pj (t 1) ptj ) =
pi (t) + (it pi (t 1) gii + Iit +
= pi (t) + (pti pi (t 1)) +
i (pj (t 1) ptj ).
Thus
i pj (t 1).
pi (t + 1) = pi (t) pi (t 1) +

(7.47)

Introduce the following state variables: w1 (t) = p1 (t), w2 (t) = p2 (t), w3 (t) =
p1 (t 1) and w4 (t) = p2 (t 1). Note that
w3 (t + 1) = w1 (t)
w4 (t + 1) = w2 (t)

148

Global Analysis

These combine to the state space representation of the global system dynamics

1 0
1
0 1
2
w(t) = A2 w(t).
(7.48)
w(t + 1) =
1 0
0
0
0 1
0
0
By solving
det(qE A2 ) = 0
we get the global system poles as below

p
r

1/2 + 1/2 1 4 + 4 L

r
1/2 1/2 1 4 + 4 L
q=
p

1/2 + 1/2 1 4 4 L

r
1/2 1/2 1 4 4 L

(7.49)

r and will result in a stable global system. The global


Not all combinations of L
system poles are within the unit circle if and only if the following condition is
satisfied
<

r , 0 Lr < 1
1+L

(7.50)

This stability region with respect to the parameter ranges is illustrated in Figure 7.11. The conclusion is that a < 0.5 is needed in order to preserve stability
for all feasible cross-coupling and relative load situations. This should be compared
r = 0.
to the result from the local-loop analysis, which is identical to the situation L
As in Example 5.4, local-loop stability is achieved for < 1.
Delay of One Sample with Time Delay Compensation
As in the previous section, consider the case np = 1, nm = 0. TDC is implemented
as described in Section 6.2.
i (t) = i (t) + pi (t) pi (t 1)
This will affect the update equations in the following way
pi (t + 1) = pi (t) + (it i (t)) = pi (t) + (it pi (t) + gii Ii (pj (t 1), t))
i (pj (t 1) ptj ) =
pi (t) + (it pi (t) gii + Iit +
= pi (t) + (pti pi (t)) +
i (pj (t 1) ptj ).
Thus
pi (t) +
i pj (t 1).
pi (t + 1) = (1 )

(7.51)

7.3 Log-Linear Algorithms

149

0.8

0.6

0.4

0.2

0.2

0.4

r
L

0.6

0.8

Figure 7.11 Stability region with respect to the controller parameters


r . The dashed line indicates that the
and the relative load L
border is included in the stability region.

Introduce state variables as in the previous section, to obtain the state space representation

1
0
0

1
0
1
2
0
w(t) = A3 w(t).
(7.52)
w(t + 1) =
1
0
0
0
0
1
0
0
As in the previous, we solve
det(qE A3 ) = 0
to get the global system poles:

p
r

1/2 1/2 + 1/2 1 2 + 2 + 4 L

r
1/2 1/2 1/2 1 2 + 2 + 4 L
q=
p

1/2 1/2 + 1/2 1 2 + 2 4 L

r
1/2 1/2 1/2 1 2 + 2 4 L

(7.53)

r and result in global system


Some computations yield that all combinations of L
poles within the unit circle and thus stable global systems.

150

Global Analysis

The Effect of Cancelling the Power in the Measurement


An intuitive approach to delay compensation might be to cancel all influence of
the power in the measurements. This corresponds to the following compensation
i (t) = i (t) pi (t 1)
The update equations will change accordingly
pi (t + 1) = pi (t) + (it i (t)) = pi (t) + (it gii + Ii (pj (t 1), t))
i (pj (t 1) ptj ) =
pi (t) + (it gii + Iit +
= pi (t) + pti +
i (pj (t 1) ptj ).
Thus
i pj (t) + pti .
pi (t + 1) = pi (t) +

(7.54)

Introduce state variables as previously, to form the state space representation

1 0
0

1
0 1
2
0
w(t) = A4 w(t).
w(t + 1) =
(7.55)
1 0
0
0
0 1
0
0
Solve
det(qE A4 ) = 0
to get the global system poles:

p
r

1/2 + 1/2 1 + 4 L

r
1/2 1/2 1 + 4 L
q=
p

1/2 + 1/2 1 4 L

r
1/2 1/2 1 4 L

(7.56)

It is easy to see that since the first pole is always greater than or equal to one,
the global system is always unstable. This is not surprising, since that compensation cancels the feedback. The result is thus an integrator in open loop, which is
unstable.

7.3.5

The Conservativeness of Theorem 7.20

As discussed in Section 7.3.3, Theorem 7.20 might yield rather conservative stability
requirements in some cases. Therefore, it is instructive to compare the stability
regions obtained directly in the two mobile case in Section 7.3.4 to the region
obtained via Theorem 7.20.
As in Section 7.3.4, the focus is on the use of the I-controller, when the output
powers are delayed by one sample. Operation both with and without time delay
compensation will be studied.

7.3 Log-Linear Algorithms

151

I-controller without TDC


The corresponding closed-loop system is discussed in Example 7.5, where the degree
of cross-coupling cc is related to the choice of controller parameter value . Conversely, it is interesting to relate a given cross-coupling situation to corresponding
requirements on to ensure global stability. Theorem 7.20 yields the requirement
sup |Gll (eiw )| <
w

1
1
=
cc
max1i2
i

(7.57)

The result in Example 7.5 simplifies the left hand side of (7.57) to

q
( 1)2 (1

1
4 )

<

1
1
, <1
max1i2
i 3

(7.58)

This criterion is compared to the result from the root locus analysis in Section 7.3.4
(cf. Figure 7.11). Both criteria are illustrated in Figure 7.12. As we can see, the
1
0.9
0.8
0.7
0.6

0.5
0.4
0.3
0.2
0.1
0
0
0.2

r
L

0.4
0.6
0.8
1

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

Figure 7.12 Stability limit of the controller parameter with respect to


2 }. The upper surface
the cross-coupling parameters {
1,
corresponds to the root locus criterion in Figure 7.11, and the
lower to Theorem 7.20. It is evident that the requirements by
the theorem are more conservative, especially in the asymmetric cases when one terminal is disturbing the other, but
2 = 0).
not vice versa (see e.g.,
1 = 1,
criterion in (7.58) guarantees stability, but it is somewhat conservative. The conservativeness is worst in the asymmetrical situations, where one mobile is disturbing

152

Global Analysis

the other, but not vice versa. This is evident at e.g., large
1 and
2 = 0. However,
when the degree of cross-coupling is large (
1 ,
2 close to one), the difference is
essentially smaller.
r corresponds to a worst
If one assumes that the balanced situation
1 =
2 = L
case (which it clearly is when considering the root locus criterion in Figure 7.12),
it is relevant to compare the related stability regions. This is obtained as the
intersection between the surfaces in Figure 7.12 and the plane
1 =
2 , which is
r implies cc = L
r , which relate
depicted in Figure 7.13. Note that
1 =
2 = L
Example 7.13 and Figure 7.10.

0.8

0.6

0.4

0.2

0.2

0.4

r
L

0.6

0.8

Figure 7.13 Stability region with respect to the controller parameter


r , which in this case is equal to the
and the relative load L
degree of cross-coupling cc . The dashed line indicates that
the border is included in the stability region. The grey line
corresponds to the stability criterion in Theorem 7.20.

From the example above, we see that the symmetric cases constitute worstcases when consider the more relevant root locus criterion. Therefore, the following
relaxation of the criterion in Corollary 7.21 is plausible.
1
m.
|Gll (eiw )| < =
Lr

(7.59)

Note that this only should be considered as a rule of thumb. However, it further
motivates the name feasibility margin (cf. Section 7.1.2).

7.4 Summary

153

I-controller with TDC


Example 6.2 exemplified the effect of TDC in this particular case, and the closedloop system is given by
Gll (q) =

.
q(q 1 + )

Since
sup |Gll (eiw )| 1
w

Theorem 7.20 yields that stability is always granted. This is the same conclusion
as in Section 7.3.4.

7.4

Summary

Capacity, load and whether it is possible to accommodate all users with their
data rate requirements (reflected by the SIR targets) are typically discussed at a
global level. We assume that the inner control loops successfully compensates for
the fast variations, so that the power gains can be considered as constant. With
the ambition to generalize previous results to include auto-interference, we define
feasibility, to include these effects. Furthermore, capacity and load are related to
the introduced metrics feasibility margin and relative load.
Moreover, stability and convergence are also discussed at a global level. Again,
the power gains are assumed constant, but the motivation is that we are considering the short term behavior of the global system, and the power gains are assumed
to fluctuate more slowly. Convergence results of some structurally simple algorithms are proven using values in linear scale. The DPC algorithm with TDC (see
Section 6.2) is proven stable for any time delays. This emphasizes the benefits
using TDC, since DPC is unstable when subject to any additional time delays.
The FSPC, which is based on decision feedback, show a persistent oscillative behavior. The resulting power control errors is bounded as proven in the literature.
Employing TDC with the FSPC algorithm, we prove that the power control error
converges to a bounded region with smaller bounds than above.
When considering general log-linear control algorithms, time delays and filters,
it is hard to rewrite the algorithm to fit a linear framework as used above. Instead
it is desirable to relate stability and performance to the local loop analysis and
design in Chapters 5 and 6. Using, a linearized interference, we apply a robust
stability framework, to disclose results on stability. The conclusion is that global
stability can be provided by careful design of the local control loops.

Appendix
7.A

Proof of Theorem 7.5

Study the feasibility of the same power control problem, but with the SIR target
t . It is trivial that x
x

0 is corresponding to an infeasible power control problem.


Moreover, feasibility is analogous to solvability of Equation (7.8)


t (
1 Z
E)
1
=x
.
p

p+
It can be rewritten as



1
t (
1 Z
E) p
t
1
.
=
E
x

If the matrix on the left hand side is singular, solvability depends on whether the
vector on the right hand side is in the linear hull spanned by the basis of the left
hand side singular matrix. Since these vectors and matrices are stochastic, this
will be the case with probability zero. Thus solvability can be considered equal to
whether the left hand side matrix is singular or not. Hence, for insolvability, we
require

1
1

(7.A.1)
E t ( Z E) .
0 = det

{z
}
|

B
is positive with eigenvalues
The matrix B
1 , . . . ,
nb , and Perron-Froebenius
theory (Gantmacher, 1974) yields that the matrix has a positive real eigenvalue
b

= max{|
i |}ni=1
. Hence


=0

= max
: det{E
B}
Definition 7.4 and Equation (7.A.1) yield the feasibility margin
m = 1/

154

7.B Proof of Lemma 7.10

155

m > 1 corresponds to a feasible target SIR and power control problem.


Naturally,
is non-singular, the optimal power assignment is given by
Since (E B)

1
1
t (
1 Z
t
1
E)
t
1
= (E B)
= E
,
p

which concludes the implication if. The implication only if when auto-interference is omitted is provided in (Herdtner and Chong, 2000). The proof generalizes
to include auto-interference with minor modifications.

7.B

Proof of Lemma 7.10

For simplicity, we will drop the time index t. Note that the power gains gij , the
noise power i , the powers pi and the receiver efficiency i all are positive and
assumed constant. Furthermore, (1 i ) 0, i. Consider the downlink (the

uplink is analogous). Define the vector


#
"
i gii
4
p) = [
,
(7.B.2)
(
i (
p)] = P
ij pj + (1 i )
pi gii + i
j6=i g
which is element-wise positive and satisfies
(
(
0)

p)
p0 ) , (
pp
1
(
p) >
p) , ( > 1).
(

(7.B.3a)
(7.B.3b)

Using the expression in (7.B.2), the SIR at mobile station i is


i = pi
i (
p).
Since i and it are positive and using a > 0, the quality requirements in (7.12)
can be rewritten as

 t  
i
it
1
=
.
(7.B.4)
i
pi i (
p)
p) is
Multiply both sides of (7.B.4) by pi . An appropriate interference function I(
thus defined by
" 
 # "
 t  #
4

it
i
1

= pi
p) = pi
I(
p) = Ii (
pi i (
p)
i (
p)
p). From Equations (7.B.3a) and (7.B.3b) and Defi I(
which clearly satisfies p
nition 7.7 it is easy to disclose that this indeed is a standard interference function.
Furthermore Theorem 7.5 yield that this interference function is feasible.

156

7.C

Global Analysis

Proof of Theorem 7.14

Everything in the proof relate to values in linear scale. Therefore, we will leave
the bar notation in this section. Additionally, some of the notation used here, is
invalid outside this section. The proof is similar to the proof of Theorem 7.13 by
Herdtner and Chong (2000), and it is founded on similar lemmas and definitions.
First, we define an interference function, and prove some related properties.
Then, we define a set of power vectors, which is invariant under power control
updates. This leads to a stability proof, on which the convergence proof relies.
Define the interference function.
Ii (p(t))it
I(p(t)) =
gii i
It is easy to verify that this is a standard interference function (see Definition 7.7).
This is important, since we need the scalability and monotonicity properties in the
sequel. The following lemma is a direct consequence from the feasibility margin
definition and Theorem 7.5 in Section 7.1.2. A more rigorous proof is found in
(Herdtner and Chong, 2000).
Lemma 7.C.1
m [, then there exist an unique componentwise minimal power vector
If x [0,
that satisfies p xI(p). This vector is given by p = xI(p).
m [. Note that each
(x), which only is defined for x [0,
Denote this vector by p
component is a strictly increasing function of x.
To describe the update steps of the power control algorithm, we introduce
pi (t) i (t n)
pi (t)
=
Ii (p(t n))
pi (t 1)
it
i (t n)
pi (t n)
=
yi (t n) =
Ii (p(t n))
it
zi (t) =

(7.C.5)
(7.C.6)

The updates using original algorithm without TDC is affected by the total delay
of n samples, and can thus be written as

yi (t n) 1
pi (t),
pi (t + 1) =
(7.C.7)
pi (t),
yi (t n) > 1
Using TDC, the delayed powers related to the same user is compensated for. The
updates are therefore given by

zi (t) 1
pi (t),
(7.C.8)
pi (t + 1) =
zi (t) > 1
pi (t),
Define the following set of powers
4

}.
C(
p) = {p RN : p p
This set of powers is invariant under power updates using (7.C.8), as is shown in
the following lemma.

7.C Proof of Theorem 7.14

157

Lemma 7.C.2
m and x [ n ,
m [. Then C(
p(x)) is invariant under power
Assume that n <

updates using (7.C.8).


(x) implies p(t + 1) p
(x). Focus on
Proof We will componentwise show that p(t) p
mobile i.
If zi (t) > 1 then pi (t + 1) = pi (t)
pi (x) < pi (x).
If zi (t) 1 then
(ii)

(i)

(iii)

pi (t + 1) =pi (t) = Ii (p(t n))zi (t) Ii (p(t n)) Ii (p(t)/n ) <

(iv)

Ii (
p(x)) = n pi (x) pi (x).
n
x

Remarks: (i) follows directly from (7.C.5), (ii) the ratio is less than or equal to
the case when all other users have decreased their powers n times, (iii) scalability
(t) as stated, and yield
extracts the factor, the remaining power vector is less than p
the inequality together with monotonicity, (iv) follows from Lemma 7.C.1.
2

This concludes the proof.

In order to formulate the stability theorem compactly, we define


4
m : p
p}
`(p) = min{0 x <

(7.C.9)

The stability using the power update in (7.C.8) is formally proven below.
Theorem 7.C.3
m then the algorithm in (7.C.8) is stable.
If /n <
Proof Denote the initial power level by p(0) > 0. Moreover, let `0 = `(p(0)), x =
=p
(x). Suppose that t 0, such thatp(t) C(
p). Since n x <
max{ n , `0 }, p
m , Lemma 7.C.1 yields that p(t + 1) C(
p). From corresponding definitions, we get

(x) = p
.
(`0 ) p
p(0) p
The proof is completed by induction.

Finally, all results are at hand, and Theorem 7.14 can be proven.
Proof (Theorem 7.14)
We will only prove the lower bound, since the proof of
the upper bound is analogous. Recall the definitions of zi (t) and yi (t n) in (7.C.5)
and (7.C.6) respectively. The power updates can be written in terms of zi (t) as seen
in (7.C.8). Assume that yi (t) / n . Then it is desirable to prove that the same
inequality holds for yi (t + 1).

158

Global Analysis
zi (t) < 1:
yi (t + 1) =

pi (t)
pi (t)
pi (t)

>
= yi (t),
Ii (p(t + 1))
Ii (p(t))
Ii (p(t))

where scalability is used in the last inequality.


zi (t) < 1:
pi (t)
pi (t)
pi (t)

> n+1
=
Ii (p(t + 1))
Ii ( n+1 p(t n))

Ii (p(t n))

= n+1 zi (t) n+1 .

yi (t + 1) =

Hence if there exist a ti , such that yi (ti ) / n , then this hold true for t ti . We prove
this last step by contradiction. Assume that yi (t) < / n , t. Hence, the following hold
zi (t) =

n pi (t n)
pi (t)

= n yi (t n) <
< 1.
Ii (p(t n))
Ii (p(t n))

Then, for t n, we compute the output power pi (t) = tn pi (0) , t . Since this
contradicts the stability in Theorem 7.C.3, we conclude that there exist a ti 0 for each
user such that yi (ti ) / n holds. Finally, choosing tT DC = max{t1 , . . . , tN } completes
the proof.
2

7.D

Robust Stability of Power Control Algorithms

As pointed out in Section 7.3.3, the global system in Figure 7.9 can be seen as a
diagonal system of local loops with a parallel structured uncertainty. One way of
addressing stability of G(q) is to investigate robust stability (see e.g., Zhou et al.,
1995) of G(q) with respect to the uncertainty. The concept of robust stability is
discussed briefly in Section 7.D.1, and applied to the power control problem in
Section 7.D.2

7.D.1

Robust Stability

In this section, we introduce vector and matrix norms. Furthermore, some central
theorems are discussed and in some cases proved.
Let X be a vector space. A real-valued function k k defined on X is said to be
a norm on X if it satisfies the following properties:
(i) kxk 0;
(ii) kxk = 0 if and only if x = 0;
(iii) kkxk = |k|kxk for any scalar k;
(iv) kx + yk kxk + kyk.

7.D Robust Stability of Power Control Algorithms

159

There are numerous definitions of norms that satisfies these properties. For our
purpose, the focus will be on -norms, which satisfies the properties above and
are defined as below.
Definition 7.D.4 (Vector -norm)
Let x Cn with components xj , 1 j n. The vector -norm of x is defined by
4

kxk = max |xj |


1jn

In a sense, the vector norm can be thought of as an extension of our usual concept
of length. Similarly, we can introduce some kind of measure of a matrix.
Definition 7.D.5 (Matrix -norm)
Let A = [aij ] Cmn . The matrix norm induced by a vector -norm is defined
by
4

kAxk
x6=0 kxk

kAk = sup

Given a matrix, it is not easy to compute the norm from the definition. However,
it is easy to verify that the following lemma holds.
Lemma 7.D.6
The matrix norm in Definition 7.D.5 can be computed by
kAk = max

1im

n
X

|aij | (row sum)

j=1

From a system perspective, the induced matrix norms have the natural interpretation of input/output amplification gains. This far only constant matrices have
been considered. With the system interpretation of input/output gains in mind, it
is interesting to extend the definition to transfer matrices G(q).
Definition 7.D.7 (Zhou et al., 1995, p. 114)
Let G(q) be a transfer matrix. Then the induced matrix -norm is defined by


G(ejw )
kG(q)k = sup
w

Remark 7.D.8
In a single input, single output (SISO) case, an interpretation is that the -norm
of a stable transfer function is equal to the maximum magnitude of the steadystate response to all possible unit amplitude sinusoidal input signals. This is easily
concluded from the fact that


GSISO (ejw ) = sup |GSISO (ejw )|.
kGSISO (q)k = sup
w

160

Global Analysis

In a perfectly decoupled situation of identical SISO control loops operating in


parallel, the overall transfer matrix is given by

Gll (q) 0 . . .
0

..
..
0
.
.

(7.D.10)
G(q) = .

.
..
..
0
0
...
0 Gll (q)
For this conceptually interesting situation, the following lemma can be formulated:
Lemma 7.D.9
Let G(q) be a diagonal transfer matrix as in (7.D.10). Then, the induced matrix
-norm is given by
kG(q)k = kGll (q)k = sup |Gll (eiw )|
w

Proof For every w0 , the following holds


 n
o2
n
o

G(ejw0 )
= max eig {G(ejw0 ) G(ejw0 ) =
n
o
= max eig {Gll (ejw0 ) Gll (ejw0 ) =
o2
 n
,
=
Gll (ejw0 )
where the second last equality follows from (7.D.10). Hence
n
o
n
o
sup
G(ejw ) = sup
Gll (ejw ) .
w

Since Gll (q) is a SISO system, the proof is concluded by considering Remark 7.D.8.

(q)

w1

w2

G(q)

Figure 7.14 Setting to which the Small Gain Theorem applies.


Theorem 7.D.10 (Small Gain Theorem, Zhou et al.,1995, p. 217)
Let G(q) be a stable real rational transfer matrix. Then the interconnected system
shown in Figure 7.14 is internally stable for all stable real rational (q) with

7.D Robust Stability of Power Control Algorithms

161

(i) k(q)k < if and only if kG(q)k 1/.


(ii) k(q)k if and only if kG(q)k < 1/.
A more restricted situation is considered in the following corollary.
Corollary 7.D.11
Let G(q) be a diagonal transfer matrix with identical stable real rational SISO
blocks Gll (q) as in (7.D.10). Then the interconnected system shown in Figure 7.14
is internally stable for all constant matrices (q) with
(i) k(q)k < if and only if supw |Gll (eiw )| 1/.
(ii) k(q)k if and only if supw |Gll (eiw )| < 1/.
Proof Follows directly from Theorem 7.D.10 and Lemma 7.D.9.

7.D.2

Proof of Power Control Related Theorems

This section essentially provide proofs of theorems in Section 7.3.3. For clarity, the
numbering of theorems is therefore the same as in that particular section. Consider
the situation in Figure 7.9, and recall that the transfer matrix G(q) = Gll (q), where
Gll (q) represents the transfer function of the local loops. Moreover, the influence
of the interference is described by cc .
Lemma 7.14
The following relations holds for the matrix -norm of the cross coupling matrix
cc in Lemma 7.18


vi
kcc k = max 1 t = cc < 1
1im
Ii
The value of the norm cc will be referred to as the degree of cross-coupling.
Proof According to Lemma 7.D.6 and Lemma 7.17, the matrix norm can be computed
as



m

X
Ii (p)

kcc k = max

.

1im
pj p=pt
j=1
Lemma 7.18 yields
kcc k = max

1im

X
j6=i

it

gij ptj
,
gii pti

since the gains and the powers all are positive. Furthermore,


It vi
vi
kcc k = max it i t = max 1 t = cc < 1.
1im
1im
gii pi
Ii
2

162

Global Analysis

Theorem 7.15 (Global Stability of Power Control Algorithms)


Let Gll (q) be the stable closed-loop transfer function of the local loop in Figure 7.5.
Then the global system in Figure 7.9 is stable if and only if any of the following
properties is satisfied
(i) supw |Gll (eiw )| 1/FI .
(ii) supw |Gll (eiw )| < 1/(ccFI ),
where
FI = sup |FI (eiw )|
w


vi
cc = max 1 t
1im
Ii
Proof The matrix -norm of the cross-coupling matrix kcc k is obtained from
Lemma 7.19.


vi
kcc k = max 1 t = cc < 1
(7.11)
1im
Ii
Transfer matrices like F I (q) are addressed in Lemma 7.D.9. Hence
kF I (q)k = sup |FI (q)(eiw )| = FI .

(7.12)

Cauchy-Schwarz inequality (Zhou et al., 1995) yield


kF I (q)cc k kF I (q)k kcc k = cc FI

(7.13)

Moreover, we note that the situation is analogous to the one in Corollary 7.D.11 with
F I (q)cc as the uncertainty matrix. The corollary together with Equation (7.11) leads
directly to the properties and concludes the proof.
2

Corollary 7.16
Assume that the interference filter FI (q) is either a local average filter or an exponential forgetting filter. Then the global system in Figure 7.9 is stable if and only
if any of the following properties is satisfied
(i) supw |Gll (eiw )| 1.
(ii) supw |Gll (eiw )| < 1/cc,
Proof Consider the local average filter FLA (q).
FLA (q) =

L1
X

q k .

k=0

Note that


L1
L1

1 X
1 X iwk

iwk
|FLA (e )| =
e

e
= 1,

L
L j=0
iw

k=0

7.D Robust Stability of Power Control Algorithms

163

with equality for w = 0. The exponential forgetting filter FEF (q) is given by
FEF (q) =

(1 )q
.
q

The following hold


|FEF (eiw )| =

1
1
1,
=
| cos w + i sin w|
1 + 2 2 cos w

with equality for w = 0. Hence supw |FI (eiw )| = 1 for both choices of filter.

164

Global Analysis

8
Nonlinear Estimation

Hitherto, the focus has been on algorithms that either utilize analog measurements
(information feedback) or has to rely on whether a measurement is either above or
below a threshold (decision feedback). In practice, the situation might be somewhere in between. Consider e.g., GSM, where the measurements are subject to
coarse quantization, and made available in measurement reports. One core problem is then to locally extract as much relevant information as possible from these
reports.
Proposed methods for SIR estimation include schemes that utilize analog signal strength measurements (Andersin et al., 1998a; Ramakrishna et al., 1997;
T
urkboylari and St
uber, 1998). These algorithms are rather similar, and show
good performance. Such schemes are useful when the SIR:s are used in the receiver,
e.g., by employing decision feedback as in the FSPC algorithm (see Section 5.2.1).
However, in systems like GSM and D-AMPS, the measurements are used for power
control by the connected base station. The receiver measurements in a downlink
situation, thus have to be transmitted over the radio interface facing a low signaling bandwidth requirement. These measurement reports commonly comprise
quantities reflecting the perceived quality and signal strength. Hence, information
is lost due to quantization and sampling at a rate that might be as low as 2 Hz
(GSM case). The same signaling interface is used in an uplink situation between
the receiver and the unit computing output powers in the base station.
In this chapter, we discuss the applicability of Maximum Likelihood Estimation

165

166

Nonlinear Estimation

to the specific GSM example, and comment on readily generalizations. In essence,


it is based on a probabilistic description of the problem. The needed probability
functions of the measurements cannot be described analytically in general. Instead
point-mass approximations can be obtained from Monte-Carlo simulations for each
point in a grid covering the interesting parameter space. This modeling is covered in Section 8.1. Maximum Likelihood Estimation is reviewed and applied in
Section 8.2, and the chapter is concluded by some illuminating simulations. The
proposed estimation implementation is applied and further evaluated in network
simulations in Chapter 10 and in (Blom and Gunnarsson, 1998; Blom, 1999).

8.1

Modeling

The perceived quality and related quantities at a receiver can be seen as stochastic variables, parameterized by some parameters. In order to employ maximum
likelihood estimation, we need the parameterized probability functions of the measurements. First, the choice of parameters is motivated. In general, it is hard
to derive the measurements parameterized probability functions analytically. Instead, we utilize point-mass approximations of the same, over a grid covering the
interesting parameter space.
The estimation approach outlined in this chapter is focused on the specific case
of GSM, and some generalizations are outlined where appropriate. Furthermore,
the approach is local and considers each user individually. Therefore, the mobile
station index i will be dropped for clarity. Simulations are central in this chapter.
Further details on the simulation environment are found in Section 10.3.

8.1.1

Parameters

Essentially, we are interested in the distribution of the interference power I and the
desired signal power C. The latter is subject to variations of the same order as the
sample interval, and it will therefore be considered as a deterministic parameter.
Another motivation is that the RXLEV measurement describes C well, so the
estimator could be able to track relatively fast variations in C. The interference I
is considered as a stochastic variable with distribution
I F (mI , I , x),
where mI is the mean, I the standard deviation, and x represents additional
parameters. The characteristics of the interference distribution are approximated
by using a simulation model. The gains of the transmitted powers in a random
frequency hopping network were modeled by the path loss, shadow fading and
multipath fading. Thermal noise was also included in the model. The results
are found in Figure 8.1, from which we conclude that it is reasonable to model
the interference as Gaussian. This result proved to be relatively independent not
only of network specific parameters such as cell radius and reuse, but also of the
distribution of the transmitted powers. Most probably, there are more accurate

8.1 Modeling

167

models, but the issue is essentially to find a model that is good enough to serve
the purpose of modeling the interference for estimation. The conclusion is that the

No. of samples in interval

300
250
200
150
100
50
0
120

115

110

105
100
Interference (dB)

95

90

85

Figure 8.1 Interference distribution in a random frequency hopping network.


interference distribution can approximately be characterized by its mean value mI
and its standard deviation I (different for each user). This is a result in the same
direction as in (Schwartz and Yeh, 1982). Thus the parameters to be estimated in
the GSM case are
= [C, mI , I ]T .

8.1.2

Measurements

As argued in the previous section, the interference is characterized by its mean,


mI , and standard deviation, I . These will affect the outcome of the measurements
together with the desired signal power, C = p + g. The measurements can be
modeled as realizations of stochastic variables with probability functions depending
on these parameters.
hk = hk (C, mI , I ), k = 1, 2.
In GSM the measurement reports consist of RXLEV and RXQUAL (see Appendix 8.A). RXLEV is a signal strength measure, which has been quantized in
64 levels, and RXQUAL is a logarithmic measure of the Bit Error Rate (BER),
quantized in 8 levels. The available measurements at the receiver in focus x =
[x(1) , x(2) ]T can thus be expressed by
RXLEV : x(1) = h1 (C, mI , I )
RXQUAL : x(2) = h2 (C, mI , I ) ,
where the functions hk () return realizations of stochastic variables.
Furthermore, a natural assumption is that RXQUAL is primarily related to SIR
and its distribution. By considering the fast variations in the desired signal power
C as noise, it is relevant to model the RXQUAL probability function as
RXQUAL : x(2) = h2 (C mI , I )

168

Nonlinear Estimation

In general it is not possible to get simple analytical expressions for these functions.
However, point-mass approximations can be obtained from simulations for each
point in a grid covering the interesting parameter space. Consider GSM and define
this grid as in Figure 8.2, where the grid resolution is a trade-off between computer
capacity and accuracy. The range of the grid has to cover all possible values in
all directions. The estimator is assumed to operate in a system employing power
control. Therefore it is more efficient to parameterize the grid in C mI instead
of mI , since the power control will result in less variations in the former. The
grid utilized in this chapter is characterized by the parameters in Table 8.1 More
Range, C-direction
Range, C mI -direction
Range, I -direction
Resolution

68 dB
30 dB
10 dB
0.5 dB

Table 8.1 Grid parameters used in the implementation in this chapter.

on point-mass approximations of probability functions can be found in (Bergman,


1999) and the references therein.

C mI

Figure 8.2 Using point-mass approximations, the probability functions are


approximated over a grid covering the interesting parameter
space. The grid is parameterized in C mI instead of mI , since
the power control will result in less variations in the former.

8.2 Maximum Likelihood Estimation

169

Given a point (i.e., a set of parameter values), C- and I-sequences can be generated, from which the measurement report can be formed using models of the
modulation and coding. Monte-Carlo simulations yield point-mass approximations
of the probability functions as described more detailed in the algorithm below
for the case of RXQUAL. The resulting probability function is depicted in Figure 8.3. The corresponding procedure can be applied when forming the probability
function of RXLEV. Note that these tedious computations are made once and for
all.
Algorithm 8.1 (Point-mass Approximation of the RXQUAL Probability Function)
1. Define a grid covering the interesting parameter space as in Figure 8.2.
2. For each point k in the grid corresponding to [C (k) , mI (k) , I (k) ], generate
an I-sequence I (k) N(mI (k) , I (k) ) over 104 bursts (GSM, 1994).
3. Compile a SIR-sequence (k) = C (k) I (k) .
4. Use link models (Olofsson, 1997) of the modulation and coding to compute
the Bit Error Probability (BEP) for each burst.
5. Generate Bit Errors Bin(x, BEP), where x represents the number of considered bits per burst, i.e., the 26 bits in the training sequence. Moreover,
compute the Bit Error Rate (BER).
6. Compute RXQUAL using the GSM specification (GSM, 1994).
7. Repeat the process N times (Monte-Carlo) for each point k.
8. Return to 2. and repeat the process for the next point k + 1.

8.2

Maximum Likelihood Estimation

The estimator can be constructed in numerous ways, but we have chosen a Maximum Likelihood (ML) estimator (Lehmann, 1991; Ljung, 1999), since it successfully enables data fusion and is an implementationally simple algorithm. However,
it involves some demanding computations, which might be an important issue.
The method of ML estimation is based on a simple idea. Different probability
density functions generate different data samples and any given data sample is
more likely to have come from a particular distribution than from others. The
basic ideas will be illustrated by the following example.

8.2.1

A Simple Example

Consider an exponentially distributed stochastic variable X, parameterized by


X Exp() , fX (x; ) =

1 x/
e

30
20
10

P (RXQUAL = 4)

C mI

1.0
0.5
0.0
0

30
10

10

C mI

1.0
0.5
0.0
0

30
10

10

C mI

1.0
0.5
0.0
0
10

10

C mI

10
10

C mI

1.0
0.5
0.0
0

30
20

10
10

C mI

1.0
0.5
0.0
0

30
20

10

30
20

30
20

20

1.0
0.5
0.0
0

20

P (RXQUAL = 6)

10

P (RXQUAL = 3)

P (RXQUAL = 2)

P (RXQUAL = 5)

P (RXQUAL = 7)

1.0
0.5
0.0
0

P (RXQUAL = 1)

Nonlinear Estimation

P (RXQUAL = 0)

170

10

C mI

1.0
0.5
0.0
0

30
20

10

10

C mI

Figure 8.3 The probabilities that different RXQUAL values are measured,
for different values of C, mI and I .

Let the true value be = 5. Assume that a measurement x1 = 4.3 has been
observed. In order to estimate , we form the likelihood function
l1 () = fX (x1 ; ) =

1 x1 /
e

computed for a number of grid points covering the interesting values of , see
Figure 8.4a. The natural -estimate is the value maximizing this function. When
observing a second measurement (x2 = 12.1), the procedure could be repeated
analogously as in Figure 8.4b. Even better is to utilize both measurements using
the joint likelihood function, defined as the product of the two likelihood functions.
The improvements of the estimate are illustrated in Figures 8.4c-d. Numerically,
it may be more appealing to use logarithmic values. Then the joint likelihood can

8.2 Maximum Likelihood Estimation

171
b. f (x2 ; )

a. f (x1 ; )

10

c. f (x1 ; )f (x2 ; )

d. f (x1 ; ) . . . f (x5 ; )

10

10

10

Figure 8.4 The different likelihood functions in the simple example in section 8.2.1.

be defined as
log lt () =

t
X

log fX (xi ; )

i=1

8.2.2

Adaptive Estimation

This far a fixed parameter has been assumed. In a real situation, however, the
parameter may be time-varying, and therefore adaptivity is important. This is
introduced by employing exponential forgetting of the joint likelihood function,
which can be implemented by the following recursion
log lt () = (1 ) log fX (xt ; ) + log lt1 ().
The estimate is then obtained as
ML (t) = arg max lt () = arg max log lt ().

When there are several parameters to be estimated and several measurements


available, all of the above apply. The measurement at time t, xt , and the parameter
are now vectors. A fundamental result from statistics states that when the
measurements are independent, the joint probability function is obtained as the

172

Nonlinear Estimation

product of the probability functions of each of the M measurements.


fX (xt ; ) =

M
Y

(i)

fXi (xt ; ).

i=1

If the probability function is (close to) zero at some grid points for a certain
measurement, the value of the likelihood function will remain (for a while close to)
zero at those points. Consequently, the likelihood function is blocked from growing
at those points, inhibiting the adaptivity to varying parameters. A solution is to
use a threshold value, fmin , and when updating the likelihood use the probability
function
gX (xt ; ) = max{fX (xt ; ), fmin }.
Finally, the parameters may be changing differently fast. The carrier and the
mean interference are typically fast-varying, while, the standard deviation of the
interference is varying more slowly. This is solved by post-filtering the estimates
using exponential filtering (Blom and Gunnarsson, 1998; Gunnarsson et al., 1998d).
with different forgetting factors j
j (t + 1) = (1 j )jML (t + 1) + j j (t).
This procedure is shown to be asymptotically efficient (Gustafsson, 2000; Kushner
and Yang, 1995; Polyak and Juditsky, 1992)
Thus, we propose the following estimation algorithm:
Algorithm 8.2 (Maximum Likelihood Estimation)
Let the measurements at time t, be given by the vector xt , with the corresponding probability function
fX (xt ; ) =

M
Y

(i)

fXi (xt ; ).

i=1

Define gX (xt ; ) by
gX (xt ; ) = max{fX (xt ; ), fmin }.
Update the likelihood function according to
log lt () = (1 ) log gX (xt ; ) + log lt1 (),
with the initial likelihood l0 equal to a Gaussian probability density function.
ML (t) is given by
The estimate
ML (t) = arg max lt ().

Post-filter the estimates separately as


j (t + 1) = (1 j )jML (t + 1) + j j (t)

8.3 Semi-Linear Estimation

8.3

173

Semi-Linear Estimation

This far, complexity has not been an issue, and computations are not seen as costs.
For comparison, it is therefore interesting to design a simple estimation procedure,
where simplicity and computational complexity are main issues. In this section,
we discuss simple algorithms that can be posed as linear regressions. As in the
previous, the focus is on GSM with frequency hopping.
The probability functions of the measurements are modeled in Section 8.1. A
measurement report could be seen as outputs from two functions returning realizations of stochastic variables.
RXLEV : x(1) = h1 (C, mI , I )
RXQUAL : x(2) = h2 (C, mI , I ) .
Furthermore, a natural assumption is that RXQUAL is primarily related to SIR
and that RXLEV is related the total received power. Hence (with some abuse of
notation)

I )) = h1 (C + 10 log(1 + m
I /C))
(8.1a)
RXLEV : x(1) = h1 (10 log(C + m
RXQUAL : x(2) = h2 (C mI ) = h2 ().

(8.1b)

The relation between RXQUAL and SIR is static However, the SIR values are
correlated via the power gain correlations. It is thus natural to model this relation
using an AR-model
A(q)(t) = RXQU AL(t) +  (t)
A(q) = 1 + a1 q 1 + . . . + ana q na
Even simpler is to approximate this model with an FIR-model, given by the following linear recursion
(t) =b0 + b1 RXQUAL(t) + . . . + bnb RXQUAL(t nb ) +  (t) =
=[1, RXQUAL(t), RXQUAL(t nb )] [b0 , b1 , . . . , bnb ]T +  (t) =
=T (t)b +  (t).

(8.2)

The model error is thus represented by  (t). RXQUAL and SIR data (identification data) is obtained from a simulation model (where the true SIR is known).
These N data points are used to find the parameter vector b that minimizes the
quadratic criterion
N 1
2
1 X
(t) T (t)b .
VN ( b ) =
2N t=0

(8.3)

Thus, the optimal vector is given by the least-squares estimate (Ljung, 1999), which
is the solution to the linear equation
#
" N 1
N 1
1 X
1 X
T
(t) (t) =
(t)(t).
N t=0
N t=0

174

Nonlinear Estimation

The remaining design parameter is the model order nb . Consider a new data
set (validation data), also obtained from simulations. Then the model order is
chosen as the parameter value that minimizes the criterion in (8.3) considering the
validation data. The results from the validation are summarized in Table 8.2.
According to the GSM standard (see Appendix 8.A), RXLEV is a linear function
of the receiver signal power level (RSL)
RSL = 133.5 + RXLEV [dB].
Using (8.1a) and given a SIR estimate, (linear scale), a reasonable C-estimate is
given by
C = RSL 10 log(1 + 1/
) = 133.5 + RXLEV 10 log(1 + 1/ ) [dB].

(8.4)

The corresponding fit with respect to the validation data is found in Table 8.2. As
a first comparison, the fit when using the nonlinear estimation procedure, is also
included. A more thorough comparison is provided in Section 8.4. From the table
we conclude that model order nb = 4 results in the best fit.

Std{ }

Std{C C}

nb = 1
2.99
0.825

Linear Recursion
nb = 2 nb = 3 nb = 4
2.31
2.18
2.12
0.810
0.809
0.808

nb = 5
2.24
0.810

Nonlinear
1.73
0.304

Table 8.2 The root mean squared error when employing the linear recursion of different model order to the validation data. For comparison, the nonlinear estimation procedure is also included.

8.4

Simulations

Performance evaluation is naturally carried out via simulations. The simulation


environment is GSM specific and the measurements are available as measurement
reports as in the real system. For comparison, the true analog values can be
extracted as well. Further details on the simulation environment is provided in
Section 10.3.
To illustrate the operation of the proposed estimation procedure, an artifical
situation of an abrupt interference step is studied in Section 8.4.1. A more realistic
situation is considered in Section 8.4.2, with data from network simulations.

8.4.1

Abrupt Interference Step

Step responses of linear systems provide valuable insight in how fast the system
adapts to abruptly changing inputs. Similarly, it is interesting to study the adaptivity of the proposed estimation procedure, when subject to an abrupt change of

8.4 Simulations

175

0
0.5
1
1.5
2
2.5
3
3.5
4
30
25

90

20
95

15
100

10
105

C mI

110

Figure 8.5 In ML estimation, the estimates are obtained as the values


corresponding to the likelihood summit. For clarity, the I
direction has been eliminated by selecting the true value.

the mean interference. Such a situation may arise, when new users are admitted to
the network, or when a user is allowed to use a higher data rate (i.e., a higher target
SIR and a higher transmission power). As concluded in Section 8.1, we consider
the following measurements and parameters
x =

(RXLEV, RXQUAL)T

(C, mI , I )T .

All parameters are fixed except mI which changes abruptly. In this case, the
simulator is only used to generate a sequence of measurement reports, which are
fed to the estimator. The estimation procedure is illustrated by the snapshot of
the likelihood at time t in Figure 8.5. As seen in the figure, the estimates are
given by the values corresponding the the peak value of the likelihood. When
subject to the abrupt interference step, the estimator adapts to the new situation.
Figure 8.6 illustrates the adaption of the likelihood function at time instants before
and after the step. Resulting parameter tracking is visualized in Figure 8.7. Note
the relations between the performance and the slope of the likelihood. The steeper
the slope, the better the accuracy.

8.4.2

Run-time Estimation

The normal situation is that the desired signal power C and mean interference
mI are subject to fast variations due to shadow and multipath fading, see St
uber
(1996). The measurement reports in Figure 8.8a,b are obtained from network simulations. These are fed to the estimator and the estimated parameters are compared
to the true values, see Figure 8.8c,d. When evaluating the overall performance, sev-

176

Nonlinear Estimation

C mI

C mI

C mI

C mI

Figure 8.6 The shape and summit position of the likelihood function
change, when the value of mI change abruptly. The maximum
of this function is seen to move in the (C mI )-direction. The
I direction has been eliminated by selecting the true value.

eral connections have to be considered. In the sample case above there are in total
190 calls of different durations (from 15 to 170 seconds) established during the
simulation. Then it is natural to use the root mean squared (RMS) error over all
times and calls for performance evaluation of the estimator. To allow for a burn-in
phase of the estimator, the first 5 seconds (Nb = 10 samples) of each call were not
considered in the RMS errors. Furthermore, only calls longer than 20 seconds were
considered, leaving M =188 calls for RMS error computations. The RMS error of

the desired signal power estimate C(t)


is
v
u
N
i 1 
2
X
u 1
1
Ci (t) Ci (t) ,
RMSCC = t
M Ni Nb
t=Nb

where Ni is the duration of the call i. The absolute value of the RMS errors are
not informative unless related to parameter variations. This is addressed by the
RMS deflection of the parameters from their average value. Desired signal power
RMS deflection is obtained as
v
u
i 1
u 1 1 NX
2
C(t) Ci (t) ,
RMSCC = t
M Ni t=0
where Ci (t) is the average desired signal power during call i. For good performance
it is desirable to obtain small RMS errors compared to the expected variations, described by the RMS deflection from the average value. The results are summarized
in Table 8.3. We note that the estimation of the desired signal power C is very
accurate, which is in accordance with the slope discussion related to Figure 8.5.

8.5 Summary

177

a.

b.

7
6
5
4
3
2
1
0

35
34
33
32
0

c.

36

10

20

30

d.

98
99

10

20

30

10

20

30

10

20

30

105
110

100
115

101
102

e.

10

20

120

30

f.

20

10

15
5
10
5

10

20

30

Figure 8.7 Estimation when there is an abrupt change in the true mI .


The plots above represents estimated values based on a single realization (dashed) and Monte-Carlo over five realizations
(solid). The true values are dotted. Measurement reports: a)
RXQUAL and b) RXLEV. Estimated parameters: c) Carrier,
C, d) Mean interference, mI , e) SIR, (C mI ), f) Interference
standard deviation, I .

Moreover, we get acceptable accuracy for the SIR and interference mean estimations. Unfortunately, the I estimates are not as good.

8.5

Summary

In this chapter the focus is on estimation in cellular radio systems based only
on the signals that are readily available. Previous work has demonstrated very
good performance relying on analog measurement. In a real system most of the
information is lost due to quantization and sampling at a rate that might be as
low as 2 Hz (GSM case). Therefore a different approach is required and for that
matter a Maximum Likelihood Estimator has been designed and exemplified in the
case of GSM. In addition, a (mainly) linear estimator is designed for comparison.
The ML estimator need probability functions of the measurements, which cannot be described analytically. Instead point-mass approximations can be obtained
from Monte-Carlo simulations for each point in a grid covering the interesting
parameter space. The adaption rate of the estimator is parameterized by a forgetting factor, and represents the trade-off between adaptivity and noise reduction.
Similarly, parameters varying at different rates can be tracked individually using
post-filtering with individual forgetting factors.
Simulations illustrate that it is possible to extract the parameters despite coar-

178
a.

Nonlinear Estimation
c.

30

6
20
5
4
10

3
2

0
1
0
0

b.

10

15

20

25

30

35

40

45

10

50

d.

22
20

10

15

20

10

15

20

25

30

35

40

45

50

25

30

35

40

45

50

115
120

18

125

16

130

14
135
12
0

10

15

20

25

30

35

40

45

50

140

t [s]

t [s]

Figure 8.8 Measurement reports, consisting of a) RXQUAL and


b) RXLEV, are describing the perceived quality and signal
strength respectively. These values are used as input to the
proposed algorithm, which extracts e.g. c) SIR and d) mean
interference, mI . The estimated values (solid) are compared to
the true ones (dashed).

Parameter
Average RMS error
Average RMS error (LR)
Average RMS deflection

C
0.30 [dB]
1.0 [dB]
5.1 [dB]

m
I
1.7 [dB]
2.0 [dB]
3.9 [dB]

= C m
I
1.7 [dB]
2.1 [dB]
5.0 [dB]

I
2.0 [dB]

1.5 [dB]

Table 8.3 Performance evaluation of the estimator. The first and second
rows describes the average estimation errors when using the proposed estimator and linear estimator respectively. For comparison, the corresponding average deflections from mean values are
included.

sely quantized measurements. The performance is good compared to typical parameter variations, both when the parameters are varying slowly, and when subject
to fast variations as in realistic cases.
The algorithm is ready for implementation in a second generation wireless system. The only component that needs to be updated is the software in the base
stations, where the output powers are computed. However, this estimation method
is general, and could be applied in a third generation wireless system as well.

Appendix
8.A

The Measurement Reports in GSM

In this appendix, we provide some facts about the measurements in GSM which
are relevant for this chapter. For further information, see (Steele, 1992, chap. 8)
and (GSM, 1994).
Every 480 ms, a measurement report is sent from the receiver to the control
mechanism in the connected base station. This report comprises:
Received signal strength, RXLEV.
Perceived transmission quality, RXQUAL.
Other information is also included, but of no value for estimation. We consider the
other information to be important only for the purpose of handover.
RXQUAL
The received signal quality, RXQUAL, is formed by estimating the bit error rate
before channel decoding, using metrics from the channel equalizer and/or the decoder. Eight values of RXQUAL span the range according to Table 8.4.
BER interval
< 0.2%
0.2% to 0.4%
0.4% to 0.8%
0.8% to 1.6%
1.6% to 3.2%
3.2% to 6.4%
6.4% to 12.8%
> 12.8%

RXQUAL
0
1
2
3
4
5
6
7

Table 8.4 The relation between bit error rates and RXQUAL.

179

180

Nonlinear Estimation

RXLEV
RXLEV is a measure of the Received Signal Level (RSL). It takes values in the
range 0 to 63, where RXLEV = 0 if the received signal level is less than -103 dBm,
RXLEV = 1 if -103 dBm RSL < -102 dBm,..., RXLEV = 63 if RSL > -41 dBm.

9
Outer Loop Control

In the preceeding chapters, power control has been considered as a means to meet
provided target values. A popular strategy is to issue transmission powers to meet a
target signal-to-interference ratio (SIR) at each receiver. The problem is, however,
to assign a relevant target SIR. In systems based on CDMA, it is well established
that the power control implementation is based on a cascade structure, where an
inner loop adjust the power in order to track a target value provided regularly by an
outer loop (see e.g., Viterbi, 1995, and Chapter 4). This organization is beneficial
in systems based on TDMA/FDMA/CDMA and combinations as well.

9.1

Introduction

The motivation for the outer loop is that SIR is not necessarily well correlated to
quality. Instead the percentage of lost bits and frames is more relevant, since the
effect of modulation, coding and interleaving is included. Therefore, the outer loop
provides a SIR target so that Bit Error Rate (BER) and/or Frame Erasure Rate
(FER) (these concepts are defined in Section 9.2.2) remain below some threshold.
The work on outer loops to date are mainly focused towards CDMA systems. In
(Sampath et al., 1997) the SIR target is decreased step-wise while no frames are
corrupted, and increased by a larger step when a corrupted frame is received. According to Won et al. (1998), this type of scheme results in capacity improvements
of up to 25% compared to using a fixed SIR target that meets the worst case. One

181

182

Outer Loop Control

problem is that since a low FER is desirable, the time constants of the controller
should be large in order to get reasonable statistics. Kawai et al. (1999) propose a
technique, where the relations between FER and BER after decoding are utilized in
order to speed up the control. Another way of speeding up the control is to model
the frame erasure distribution with respect to relevant parameters, and instead use
the estimated parameters for control. This is the approach used in this work. The
subjective matter of perceived quality in cellular radio systems is the subject of
Section 9.2. The discussion ranges from theoretical models to practical measures.
In GSM, the Frame Erasure Ratio is one of the more relevant quality measures,
and it is utilized in the quality mapping-technique introduced in Section 9.3. This
work is reported in more detail in (Blom and Gunnarsson, 1998).
For completeness, the approach in (Almgren et al., 1994; Yates et al., 1997)
should also be discussed. The authors propose a different inner loop, where users
that can do with a low power are allowed to aim at a higher SIR target and vice
versa. Here, the inner loop is assumed to adjust transmission powers to track a
provided target SIR. However, the same effect can instead be obtained by adapting
the target SIR in the outer control loop as described in Section 9.4. Furthermore,
there might be situations that need specific actions. Together with a target value
tracking inner loop, this type of reasoning is naturally incorporated in the outer
loop.
The impact of using an outer loop to adapt target values is briefly studied in a
specific simulation situation in Section 9.5. Related network simulations are found
in Chapter 10. Throughout the chapter, the focus is on a specific user. Therefore,
the index i is dropped for clarity.

9.2

Quality Measures in Cellular Radio Systems

The concept of Quality of Service naturally depend on the type of service and
its corresponding quality requirements. Some services are reliable in the sense
that they never loose data, while others in the sense that they provide very low
transmission delay. Often one differs between connection-oriented services and
connection-less services (Tanenbaum, 1996). In the former, a low delay is the first
priority, and that category include speech and video services. The latter use data
acknowledgment so that the sender is aware of successful transmission. After a
specific time without acknowledgment, the data is resent.
The focus in this and the next section are on speech services. There is a wide
range of quality measures in cellular radio systems, ranging from speech quality
measures, which try to describe how a listener experience the quality, to more easily
measured quantities, which are defined in terms of bit errors, etc.

9.2.1

Speech Quality Measures

The performance of speech transmission could of course be investigated by extensive


subjective listener test, but when implementing algorithms based on the speech

9.2 Quality Measures in Cellular Radio Systems

183

quality it is necessary to have an automatic procedure for this evaluation. Thus,


one distinguishes between subjective and objective speech quality measures, with
the former being based on the opinions of the listeners, while the latter tries to
construct an adequate quality measure from signal measurements.
Since the concept of speech quality is of subjective nature, the objective speech
quality measures should be designed to be good estimates of a subjective measure.
Most of the proposed speech quality measures can be divided into four categories
(see Quackenbush et al., 1988).
Signal-to-Noise (SNR) Ratio Based Measures. This measure is obtained by computing the mean square error between the original and the
distorted speech waveform. This is usually a poor estimator and therefore
various improvements exist. Since the human perception of sound is frequency
variant, some of these improvements are based on perceptually weighted mean
square errors.
Linear Predictive Coding (LPC) Based Measures. These measures
are based on a parameterization of the linear prediction vocal tract model
of the original and the distorted speech. The measure is computed from the
change of these parameters between the original and the distorted speech.
Spectral Distance Based Measures. These measures are based on comparisons of smoothed spectra from the original and distorted speech signals.
There are several variants since they can be weighted with respect to energy, frequency etc., and also since they sometimes are based on logarithmic
spectra.
Psychoacoustically Based Measures. These are measures based on a
model of the human auditory system, see (see e.g., Beerends and Stemerdink,
1994).
Lam et al. (1996) show that SNR-based and LPC-based measures are not very
successful in estimating subjective measures well. Some of the spectral distance
based measures perform well, but it is the psychoacoustically motivated measures
that show the best performance.

9.2.2

Practical Quality Measures

Speech quality measures are the most sophisticated quality measures for voice
communication, since they describe the properties of the actual speech waveform
reaching the listener. However, in practice it is unusual that these are used as
quality measures from a power control point of view, and therefore we will discuss
other more common measures.
The simplest and most usual quality measure is the signal-to-interference ratio,
SIR. This is defined in terms of the properties of the radio wave, before entering
the receiver, see Figure 9.1. The main reason for using SIR as quality measure is
that it is directly related to the carrier power, which we can control. The result is a

184

Outer Loop Control

framework for power control where theoretical calculations can be done. Usually a
SIR which is above 10 dB is considered to correspond to good quality, and a smaller
SIR to poor quality. Due to the modulation and coding techniques, it is argued
that this is a threshold in the sense that the quality quickly becomes poor when
below this value, and increasing it above this level will not improve the quality
significantly.
Transmitter
Message

Source
Encoder

Channel
Encoder

Modulation

Receiver
Estimated
Message

Channel
Decoder

Source
Decoder

Speech Quality

FER

Demodulation

BER

Figure 9.1 Different quality measures, and where they can be measured in
a digital communication system.

The next quality measure we address is the Bit Error Rate (BER). It can be
measured after the demodulator, and is defined as the average number of bits which
are erroneous as compared with the original bits entering the modulator. The actual
measurement is possible since some of transmitted bits are fixed beforehand (a.k.a.
training sequence), and therefore already known at the receiver. If the carrier and
interference signal powers are constant, the BEP will be a function of the SIR, and
in this case they contain the equivalent information about the quality. However,
in reality the SIR is time variant, and thus the average SIR will not correspond to
the average BER, and in this sense BER is a better quality measure.
The purpose of the channel coding is to try to remove some (or all) of the bit
errors which have occured during the transmission. Depending on the design of the
channel encoder, the speech quality degradation will be more or less severe. After
the channel decoder, the next quality measure is defined. Here we could define a
quality measure similar to the bit error rate, by considering individual bits after the
decoding. However, we define a frame as the bits over which the coding is applied,
and assume that a frame will either be fully restored or completely useless. Then
the Frame Erasure Rate (FER) can be defined as the average number of frames
which are useless. As discussed before, the speech quality is the most appropriate
quality measure of a speech service, and this is obtained by comparing the original
speech waveform with the final. It can be noted that the source coder will try to
represent the speech with as few bits as possible without loosing too much quality.

9.2 Quality Measures in Cellular Radio Systems

185

Therefore the estimated message will not be the same as the original even if no
interference would be present over the channel. Furthermore, if some of the bits in
the output from the source encoder are erroneous when entering the source decoder,
the speech quality degradation is strongly depending on how the encoder/decoder
has been designed. In order to use speech quality for control, we must have a model
describing how the source encoder/decoder is working.
To summarize, we have discussed different quality measures in a digital communication system, and how they are related to the functionality of the transmitter and receiver. By building models of the source encoder/decoder, channel
encoder/decoder and the modulation/demodulation procedures, more and more
adequate measures are produced, see Figure 9.2. The price for this is that we have
to put in more knowledge about the system, and the complexity of the algorithms
will increase.
SIR

Model 1

BER

Model 2

FER

Model 3

Speech Quality

Figure 9.2 The modeling necessary to obtain different quality measures.


Model 1 refers to the source encoder/decoder, model 2 to
the channel encoder/decoder and model 3 to the speech encoder/decoder.

9.2.3

Example: GSM

For the mobile station user, the speech quality will in general get worse the more
data bits that are lost during the transmission. The speech quality is affected not
only by the fraction of bits that are erroneous, but also by the distribution of lost
bits over time.
We need to understand how the bits are arranged when transmitted over the
physical channel, see Figure 9.3. After the speech coding has been performed, the
resulting bits are divided into frames, with each frame corresponding to 20 ms of
speech. In the first step coding is performed, resulting in 456 bits for each frame.
Furthermore, the bits are permuted, which is referred to as first order interleaving.
Next, the second order interleaving splits the coded frame into 8 sets, each
containing 57 bits. Each of these sets is then mapped onto a burst, which is the
data from a certain user sent during one time slot. Thus the data from one speech
frame is separated on the channel. This implies that the information from one bit
in the original frame has been spread over different time instants on the channel.
Note that information from two different frames are mapped onto the same burst,
and therefore each burst contains 114 information bits. In practice the number of
bits in a burst is 156.25, since extra bits have been added to provide for proper
equalization and synchronization.

186

Outer Loop Control

Frame A

Frame B

Frame C

Frame D

Coding and 1st order interleaving


8 57 = 456 bits
2nd order interleaving
57

57

57

57

57

57

57

57

Mapping on bursts
A

TDMA frames
Figure 9.3 The mapping of speech frames onto the physical channel.

It is also interesting to reflect over the different time scales. A typical distance
between multipath fades is about 0.15 m (half a wavelength) in GSM (Mehrotra,
1994). This can be compared to the distance a vehicle can travel during a burst.
Each burst is transmitted during 0.577 ms. Assuming that the vehicle travels
with 30 m/s, this would correspond to a distance of 0.577 103 30 0.017 m.
Thus, as a good approximation, the carrier can be regarded as constant during
the burst. During the 20 ms, which the speech frame is sent over, there will be a
considerable variation, since the same vehicle will travel 0.60 m during this time,
which corresponds to several fades. Since the information from one frame is spread
over this time interval on the channel, time diversity will be obtained. If frequency
hopping is used interferer diversity will also be obtained.
From SIR to Bit Error Probability
It is the SIR value during the burst, which gives a certain bit error probability
(BEP). It is important to notice the difference between BEP and BER. The former means the probability to get a bit error for a certain bit, while the latter is a
stochastic variable. In a received sequence of N bits with corresponding bit error
probability, BEP, the number of erroneous bits is a realization of the stochastic
variable X Bi(N, BEP). Furthermore, BER is equivalent to the stochastic variable N1 X. As argued in the previous section the SIR during a burst can be regarded
as constant. As a consequence, the probability for bit error during a burst, Pb , is

9.2 Quality Measures in Cellular Radio Systems

187

a function of the SIR during that burst. For a typical result see (Olofsson, 1997)
and Figure 9.4
0

10

Pb

10

10

10
10

SIR [dB]

10

Figure 9.4 Uncoded performance for a GSM channel. A certain SIR for a
burst results in a certain bit error probability for that burst.
This plot has been generated by simulations for the case of two interferers. If
the number of interferers was not equal to two, we would obtain a different function, since the demodulation performance is not only depending on the interference
power, but also on the interference characteristics. However, more interferers would
not significally change the bit error probability function. A more accurate BEP
vs. SIR function could be produced based on a similar simulation by modeling the
number of interferers as a stochastic variable. Usually the number of interferers
responsible for the main contribution of the interference is quite small. Therefore,
the two-interferer situation constitute a relevant good approximation. This is the
starting point for the rest of the discussion.
In GSM, RXQUAL is the quality related measure that is readily available. It
is based on estimated BER as discussed in Section 7A.
From Bit Error Probability to Bit Error Parameters
The frames are considered to either be fully restored or completely useless after
applying the error correcting codes. The probability that the frame is useless is
called the frame erasure probability (FEP). Note that we distinguish between FER
and FEP, just as we did for BER and BEP.

188

Outer Loop Control

This section follows Olofsson (1997); Olofsson et al. (1997) closely. Denote the
bit error probability at burst i by Pbi , i = 1, . . . n, where n is the number of bursts
the frame is spread over, i.e. n = 8 in GSM. The number of bits in a burst is
denoted by k, which is 114 in GSM. Since the number of bit errors during a burst
is binomially distributed, the stochastic variable Xi denoting the BER for burst i
will fulfill
kXi
E[Xi ] =

Bin(k, Pbi )
Pbi
1
Pbi (1 Pbi )
k

V [Xi ] =
Next, define
M

1X
Xi
n i=1

S2

1 X
(Xi M )2
n 1 i=1

and BER and sBER as the corresponding expectation values, which can be shown
(Olofsson, 1997) to be related to Pbi as
BER = E(M ) =

1X
Pbi
n i=1

(9.1a)

s2BER = E(S 2 ) =

n
n
1 X
1 X
Pbi (1 Pbi ) +
(Pbi BER )2
nk i=1
n 1 i=1

(9.1b)

These parameters will now be used for estimating the frame erasure probability.
From Bit Error Parameters to Frame Erasure Rate
For GSM, FEP will in general be a function of Pbi , i = 1, . . . , 8. However, we will
make the simplifying assumption (Olofsson, 1997) that FEP is only a function of
BER and sBER .
F EP = f (Pb1 , Pb2 , . . . , Pb8 ) g(BER , sBER )
By using a model of the channel encoding/decoding process in Figure 9.1, it is
possible to estimate the frame erasure probability from these parameters, i.e. the
function g, discussed above. In Figure 9.5 the probability for a frame erasure is
shown as a function of BER and sBER . Note that this plot contains some points
which can never occur in practice, for instance when BER = 0, s2BER must also
be zero. These have been replaced by a zero value. The plot describes the ability
of the interleaving and error correcting codes to restore the frame in the presence
of bit errors.

9.2 Quality Measures in Cellular Radio Systems

189

FEP

0.8

0.6

0.4

0.2

0
0.3
0.25

0.4

0.2
0.3

0.15
0.2

0.1
0.1

0.05

sBER

BER

Figure 9.5 FER performance for the GSM full rate speech channel as a
function of bit error characteristics.

From Frame Erasure Rate to Speech Quality


In this example we never reached the final step, a quality measure. Instead the
frame erasure rate is used as a quality measure since it can be shown to describe
speech quality quite well and is well defined. Moreover, it is easily calculated from
the carrier and the interference characteristics according to the method described
above. The drawback with this approach is that the time distribution of frame
erasures is not taken into account.
Summary of the Example
The method for achieving the FEP can be summarized as follows:
1. A speech frame spreads its bits over eight bursts. Thus, given a sequence of
eight burst SIR values, Pbi , i = 1, . . . , 8 are determined from Figure 9.4.
2. BER and sBER are determined from the Pbi s using Equations (9.1a,b).
3. Map each parameter pair BER , sBER on a frame erasure probability using
the results in Figure 9.5.
This method for constructing the FEP from the SIR:s during subsequent bursts
will be important in the sequel, when we use the FEP as quality measure to be
used in the outer loop control.

190

9.3

Outer Loop Control

Quality Mapping

The need for a model in control highly depends on the time constants of the system
to be controlled. If the effect of the control signal is rapidly reflected in the system
output, the output itself may be informative enough to control the system. The
perceived quality in cellular systems is indeed slowly varying, and therefore the
quality models derived in Section 9.3.1 are adequate. The parameter ranges in the
point-mass approximations are discussed in 9.3.2, and the use of the models for
outer-loop control of target SIR is outlined in 9.3.3.

9.3.1

Modeling

Similar to the discussion in Section 8.1, the quality function is modeled as a probability function, H, depending on the desired signal power and the interference
characteristics. In the GSM example, it is relevant to parameterize this function
using = C mI and I .
H = H(, I )
The procedure described in Section 8.1.2 together with the procedure in Section 9.2.3 can be used to form a point-mass approximation relating FER to the
estimated parameters. The result is provided in Figure 9.6, from which we conclude
that the mean SIR does not fully describe FER. It is dependent of the interference standard deviation as well. Moreover, it is depending on the coding scheme
and modulation employed. Thus when different coding modes are applied during the lifetime of the connection (rate adaption, see Section 9.4.2), corresponding
point-mass approximations can be formed for each mode.

FER

0.8

0.6

0.4

0.2
10
0
10

8
5

6
0

5
10

15
20

[dB]

I [dB]

Figure 9.6 The relations of FER and the estimated parameters = CmI
and I .

9.3 Quality Mapping

9.3.2

191

Parameter Ranges in Point-Mass Approximations

The objectives of the outer loop is to issue target values for the inner loop to track,
in order to meet a specified quality level, z t with respect to the quality measure z.
In GSM, it is relevant to use FER as the quality measure z. The requirement is
met if
H(, I ) z t .

(9.2)

The probability function H(, ) was defined and modeled in Section 9.3.1. It has
been assumed (without loss of generality) that a lower value of z corresponds to
better quality.
In the grid of the corresponding point-mass approximation, SIR is restricted to
values in the specified set 1 , . . . , r , which are assumed sorted in ascending order.
The grid is similar in the I -direction. The quality function computed in Section 9.3.1 can be used to determine if the chosen grid provides sufficiently coverage
of the parameter space in the -direction. The maximum considered SIR (r ) has
to correspond to a quality level that is less than the specified quality, otherwise we
can not expect to find an appropriate SIR target, meeting this specification. More
formally. let = r be fixed and search over the rest of the grid for the maximum,
z0 , of the quality function
z0 = max {H(r , I )}

This process is illustrated for GSM in Figure 9.7. If the specified quality, z t , is less

F ER

0.8

0.6

z0

0.4

0.2
10
0
5

8
6

0
4

5
10

C mI

15

Figure 9.7 The FER plot can be used to find the least quality value that
can be specified, z0 , by a search along the maximum considered
SIR ( = r ) in the grid.
than z0 the grid has to be expanded to include higher values of .

192

9.3.3

Outer Loop Control

Implementation

Given measurements or estimates of the interference standard deviation


I and a
quality specification z t , the aim is to find the corresponding target SIR, t . If the
function H is invertible and monotonically decreasing in , the implementation is
(k)
straightforward. The required target SIR given the general grid point I is then
obtained by inverting Equation (9.2)
t H 1 (I , z t ).
(k)

(k)

The look-up table which spans over all grid points I

is thus given by

t = H 1 (I , z t ).
(k)

(9.3)

If H is not strictly decreasing in the -direction, an alternate procedure is


needed when computing the look-up table. In such a situation, the table entry for
(k)
each point I in the grid is then computed as
n
o
(k)
(k)
(k)
jk = min i|H(i , I , H(i+1 , I , . . . , H(r , I ) z t
(9.4a)

i
(k)
(I )

= jk

(9.4b)

For clarity, consider the following example. Assume that some H is approximated
in a specific grid point (k) by the values in Figure 9.8. Then the corresponding
target SIR for this grid point is given by the encircled value. By repeating the
procedure for each grid point, the look-up table is formed.
(k)

H(i , I

zt

10

12

14

16

18

Figure 9.8 The quality function might vary around the specified value in
the general case. Therefore we have to make sure to pick the
first value after the last intersection as indicated in the figure.
The result of this procedure is a look-up table, that relates the measured or
estimated interference standard deviation I to a t . Interpolation may be used

9.4 Stating Priorities in the Outer Loop

193

when the parameters do not fit the grid perfectly, which most likely will be the
case.
In the frequency hopping GSM example, it is reasonable to specify (McGregor ,
editor)
z t = FERt = 0.02.
As seen in Figure 9.6, the quality function H is monotonically decreasing in the
SIR direction. Thus, the procedure in (9.3) is applicable. (The procedure in (9.4)
would yield the same result.) The corresponding look-up table is thus given by
t = H 1 (
I , 0.02).
This is essentially the level curve of the plot in Figure 9.6 for z t = FERt = 0.02.
Target SIR as a function of the estimated interference standard deviation is illustrated in Figure 9.9.
15

14

13

12

11

10

10

Figure 9.9 Quality mapping is implemented in the outer loop as a look-up


table, which relates estimated interference standard deviation
to appropriate target SIR:s. This look-up table is generated to
meet the quality specification FER 0.02.
Once again most of the computations can be completed before the run-time
operation of the system. The time constant of the adaption can be adjusted by
lowpass filtering the standard deviation of the interference. The resulting look-up
table requires more or less no computer capacity except memory.
If different coding modes are enabled, one look-up table per mode has to be
computed. In run-time, the computations using the look-up tables are again essentially of no concern.

9.4

Stating Priorities in the Outer Loop

Some situations may require special control actions. In order to use a target tracking device in the inner loop, these actions may be realized by modifying the target

194

Outer Loop Control

SIR:s provided to the inner loop. In this section, we describe different algorithms
realized in the outer loop. The common framework is that the actual target SIR
provided by the outer loop is a function of a nominal target SIR, t , and other
relevant parameters. The nominal target SIR is possibly constant and predefined
or adapted by a separate mechanism, such as the Quality Mapper described in the
previous section. The actual target SIR is thus given by
t = f (
t , ),
where f is a procedure as described in the sections below.

9.4.1

Fading Margins

When the bandwidth of the power control algorithm (see Section 6.4) is insufficient
to track the varying environment, the perceived quality is hampered. Typically,
the algorithm can mitigate shadowing effects, but not fast fading or multipath. To
improve the performance, a fading margin bias may be employed (Andersin and
Rosberg, 1996; Blom and Gunnarsson, 1998, and Section 6.4) as
t = t + bias .

(9.5)

The design of the fading margin is essentially a trade-off between performance and
capacity. A high fading margin improves the performance, but increase the overall
interference in the system. Thereby, the capacity is reduced, and vice versa.

9.4.2

Rate Adaption

When a user is subject to less favorable propagation conditions, a number of actions


are possible. The transmission power could be increased to improve SIR. This, however, increases the interference experienced by others and also significantly increase
the load of the system (see Section 7.1 and Example 7.3 in particular). A different
approach is to lower the data rate. That might enable reliable communication due
to increased code protection, while not increasing the interference to other terminals. Further details on rate adaption are found in (Balachandran et al., 1999;
Bruhn et al., 1999; Eriksson et al., 1999; Furusk
ar et al., 1999a,b; Lau and Maric,
1999; Uvliden and Bruhn, 1998) and the references therein. Typically, each base
station is adapting the rate of its connected mobiles. Such a distributed approach
might result in stability problems. Rezaiifar and Holtzman (1999) provides a proof
of convergence of one such strategy.
The achievable data rate is related to target SIR, and rate adaption can thus be
seen as target SIR adaption. A possible implementation is to compute a look-up
table for each of the coding modes as described in Section 9.3. Then, each rate is
associated with a look-up table in the outer loop control. In such a scheme, power
control is used in the inner loop to compensate for fast variations due to fading,
while rate adaption is used to map target SIR:s via look-up tables in the outer
loop.

9.4 Stating Priorities in the Outer Loop

9.4.3

195

Soft Dropping Power Control

A related approach is discussed in (Almgren et al., 1994; Yates et al., 1997), where
the quality requirements are adapted based on the current power level. Thereby,
a user with bad quality is prevented from disturbing others, since lower quality
requirements are enforced instead of enabling increased transmission power. Equation (5.6) yield the following formulation of the algorithm
pi (t + 1) = pi (t) + ((c

1
pi (t)) i (t)).

(9.6)

where and c are design parameters. Below, we discuss three different design
approaches:
1. A natural choice of c emanates from the statement (Almgren, 2000) that a
connection is allowed to use maximal power pmax , if perfectly matching the
quality requirement SIR=0 . Consider a connection using maximal power
while exactly achieving the quality requirement. Equation (9.6)
pmax = pmax + (c 0 )
1
1
pmax + 0
c =

2. A different approach is to adapt c using the quality-mapping techniques in


Section 9.3, possibly via a direct adaption of 0 .
3. A third approach is essentially to implement the strategy in the outer loop.
To exemplify the ideas, we discuss the approach with respect to a specific
configuration. Consider a downlink situation, and assume that the FSPC
algorithm is used. Mobile station i observes the SIR i (t). In a traditional
setting (cf. Section 5.2.1), the observed SIR is compared to a threshold it (t)
to compute the power command bit si (t). As advocated in Chapter 6, TDC
is beneficial to utilize. One implementation is described in Algorithm 6.2,
which involves monitoring the powers to be used by the transmitter.
pi (t + 1) = max (pmin , min(pmax , pi (t) + i si (t)))
Store the lowpass-filtered power pi (t) as
pi (t),
pi (t) = F (q)
where F (q) might be one of the filters discussed in Section 5.2.4. This filtered
power can be used to realize Equation (9.6) as an integrating inner control
loop together with an outer loop with almost the same effect as the AAW
algorithm. Assume that the outer loop operates at a rate k times slower than
the inner loop, which in turn is updating the power every Ts seconds. Hence,

196

Outer Loop Control

at times t = nkTs , n Z+ , we update the target SIR it used in the mobile,


according to
it (nk) = c

1
pi (nk),

where is the step size of the inner control loop. The design parameter 0
may be chosen as in the two previous approaches. Furthermore, we possibly
use information from the base station, which can regularly be transmitted
using available outer loop protocols.
One important conclusion is that with this slower AAW-adaption, the stability
results in Chapter 7 apply.

9.4.4

Mode Switching Controllers

In some systems it may not be plausible to design one inner loop that is relevant in
all situations. For instance, it may be desirable to utilize more aggressive control
actions when the system load is low (see Section 6.7), and soft dropping power
control when the load is high. Depending on the situation, the outer loop switches
between the different controllers. Then it is important to update the internal
states of the idle controllers, to obtain bumpless transfer when switching between
controllers. See also Section 6.6. Some of these switching philosophies may be
implemented in the outer loop, as illustrated in the following section.

9.4.5

Low Interference Problem

When the system load is low, the interference experienced by each user consists
basically of thermal noise. The target tracking of the inner loop will result in very
low powers, which might seem naive, since few others are disturbed by a higher
power (Almgren, 2000). However, when new users are admitted, the interference is
increased abruptly, resulting in bad quality until the controllers have adapted. In
this situation when literally now users are disturbed by others, it may be justified
to aim at a higher target SIR and better quality.
Using the estimated mean interference, different target SIR:s can be assigned,
for instance by adapting the fading margin in Equation (9.5). A possible implementation is illustrated by the look-up table in Figure 9.10

9.5

Simulations

Outer loop control is most naturally studied in network simulations in Chapter 10.
Further simulations are also provided in (Blom and Gunnarsson, 1998). Therefore,
we only consider a single example of stating priorities in the outer loop. Further
details on the simulation environment is provided in Section 10.3.
In a specific situation, the load of the system is only 10 %. Then, the system
is essentially disturbance limited and the interference consists basically of thermal

9.6 Summary

197

Bias, bias

l
Il

Iu

Average Interference, mI

Figure 9.10 A possible implementation of fading margin adaption to improve the quality under favorable conditions.

noise. Low powers are sufficient to provide acceptable connections, and low powers
are used if employing an integrating inner loop with fixed target SIR. After about
14 s new users are admitted, resulting in increased interference. By using the mean
interference to adapt the fading margin as in Figure 9.10, the users are better
prepared to meet the increase in interference. The situation of a specific user is
illustrated in Figure 9.11. The main incentive for using a lower power is to decrease
system interference (and less important to reduce battery consumption). In this
case, interference to others is slight, and therefore, the benefits of using a higher
power are more emphasized than the drawbacks.

9.6

Summary

The motivation for the outer loop in power control implementations is that SIR
is not necessarily well correlated to quality. The ratio of erasured frames is better correlated to quality, but hard to measure or estimate. Instead, the relation
between the estimated parameters and FER are described using point-mass approximations. This model is used to relate a FER specification and parameter
estimates to a target SIR to the inner control loop. Moreover, it is emphasized
that the inner loop should focus on issuing power commands or power levels to
track a target value provided by the outer loop. Priorities and specific behavior in
certain situations should be reflected in the provided SIR target. This also include
appropriate actions when rate adaption is employed.

198

Outer Loop Control

a.

30
25
20
p

15
10
5
0

10

12

14

16

18

20

12

14

16

18

20

t [s]

b.

10

10

10

10

10

10

10

t [s]

Figure 9.11 The perceived quality over time at a specific receiver given by
a. SIR and b. FER. The horizontal dashed lines corresponds
to = 10 dB and FER = 0.02. After about 14 s, new users
are admitted resulting in increased interference. The dashed
curves corresponds to using the fixed target, and the solid to
prioritizing higher targets when the interference is low.

10
Network Simulations

The true impact of radio resource management algorithms is hard to describe


analytically. Instead, simulations provide valuable intuition into their behavior.
Numerous simulation studies have thoroughly considered the effects using such algorithms. The ambition here is not to thoroughly evaluate the performance and
capacity effects, but rather to illustrate the dynamical behavior of power control
algorithms. This is done in a small scale simulation environment, where most
other resource allocation algorithms are marginalized, as well as in more extensive
environments1 where they are coexistent. Further details on the simulation environments are brought up in an appendix together with most plots from simulations.

10.1

Simulation Studies in General

Simulations may provide valuable insight into problems and behavior of proposed
solutions and algorithms. However, it is important not to jump the conclusions
from such simulation studies. As most scientists are aware of, simulations only
provide limited and uncertain information and knowledge. Conclusions never go
beyond underlying models. Verification by simulation is always hard to justify. Sir
Karl Popper is not yet outdated in his conclusion: all we know is but a woven web
1 Valuable

simulation technology has been provided by different groups at Ericsson, which therefore are acknowledged. Extensions, simulations and interpretations thereof are solely the
responsibility of the author.

199

200

Network Simulations

of guesses, that while empirical generalizations may not be verifiable, they are, at
least, falsifiable (Magee, 1973).
A typical simulation study includes problem description, modeling, algorithm
development and derivation, implementation and simulation. Of course, there are
numerous tractable paths to employ a study. Therefore, it is hard to compare and
evaluate results from different studies. Rosberg and Zander (1998) addressed the
problematic situation and emphasized the need for reference systems and benchmark examples.
Absolute results depend on models of components in the simulator. It is always
important to separate the modeling of such components from implementation and
simulation. Even if the models are the same, the absolute results depend on implementation, parameter settings etc. Therefore, comparative studies of different
algorithms, which provide relative results, are more valuable.
The early phase of this work, reported in (Blom and Gunnarsson, 1998), was
to some extent a victim of the curse of simulationality2. The objective with the
simulations was essentially to verify or justify ideas and propositions. In this thesis
work, the ideas are well founded in the preceeding chapters, and the objective with
simulations is to illustrate dynamical effects.

10.2

Simple Network Simulation Environment

Several questions av been risen in several examples in the thesis, demonstrating


problems with and different aspect on power control. The objective here is to
illustrate the benefits of careful power control design and to focus on different
properties of various controllers. The simulated cases are chosen with care, to
relate to examples and discussions from previous chapters.

10.2.1

MOSE

General purpose or technology specific simulation environments comprise numerous


control algorithms and degrees of freedom. It is therefore interesting to marginalize
the effects of related algorithms. The ambition with the MObile communications
Simulation Environment (MOSE) is to emphasize the dynamical effects of power
control algorithms. All mobiles are using the same frequency spectrum for communication, a situation that might represent a specific channel in a system utilizing
orthogonal channels, or a simplified DS-CDMA system. Channel allocation is not
considered, and base stations are allocated depending on either minimal distance
or maximal gain. The environment includes mobility models, path loss, shadow
fading and is described in more detail in Appendix 10.A and in (Gunnarsson et al.,
1997, 1998b). Since no models of modulation or coding are included, the natural
quality measure is SIR. Some central simulation parameters are summarized in
Table 10.1, and these are used if nothing else is stated.
2A

reader who fails to see the parallel to the curse of dimensionality has probably underestimated
the dimension of the simulation parameter space.

10.2 Simple Network Simulation Environment

Frequency reuse
Antennas
Cell radius
Cell layout
Path-loss exponent
Shadow fading std.dev.
Shadow fading corr. dist.
Rayl. fading, avg. gain
Time delays:
Power output delay
Measurement delay

201

K=1
Omnidirectional
1000 m
8 8 cells,
employing wrap around
= 3.5
s = 6 dB
d = 100 m
0 dB
np = 1
nm = 0

Table 10.1 Central simulation parameters in the simple simulation environment.

10.2.2

Stabilizing Controllers in the Motivating Example

Example 5.1 illustrates the problematic effects of time delays in dynamical systems.
It rose a number of questions and thereby served as a motivation for the local loop
analysis in Chapter 5. Chapter 6 provides local design methods to deal with the
local dynamics. It is interesting to see how these algorithms improve the behavior
reported in Example 5.1
As in the example, we consider a situation where four mobiles are connected to
base stations using the same channel (or frequency spectrum). Initially (at time
instant t = 10), the mobiles are assigned optimal transmission powers corresponding to a target SIR of 12 dB. At time instant t = 0, the same channel is allocated to
a fifth mobile station. The power control problem is feasible both before and after
the fifth mobile entered the frequency spectrum. Furthermore, auto-interference is
omitted, the mobiles are at fixed locations, the G-matrix is fixed and the system
is subject to an additional time delay of one sample (np = 1, nm = 0).
First, we focus on the same algorithms as in Example 5.1, with the difference
that time delay compensation (TDC, see Section 6.2) is employed. The stabilizing
property of TDC is indicated by Figure 10.1a,b. The DPC algorithm now recovers
after the disturbance. It adapts quickly, which is in accordance with its dead-beat
behavior (see Section 6.4). As in the example, the oscillative behavior of FSPC
is only slightly affected by the entering mobile. It is also noteworthy, that the
amplitude of oscillations is significantly less than when not using TDC. This is in
accordance with the describing functions analysis in Section 5.5. For comparison,
the performance, when using the pole-placed PI-controller from Section 10.1, is
depicted in Figure 10.1c.
The simulations also exemplify the stability and convergence results in Chapter 7. Convergence of the DPC algorithm with TDC and the PI controller is proven

202

Network Simulations

a.

16

14
12
10
8
10

b.

10

15

20

25

30

35

40

10

15

20

25

30

35

40

10

15

20

25

30

35

40

16

14
12
10
8
10

c.

16

14
12
10
8
10

t [s]
Figure 10.1 The recovering ability of some central controllers when a new
mobile is allocated to the same channel. This is the same
situation as in Example 5.1. Considered controllers: a. DPC
with TDC, b. FSPC with TDC, c. PI.

in Theorems 7.12 and 7.20 respectively. Furthermore, FSPC with TDC converges
to |it i (t)| (n + 2) = 3, as stated by Theorem 7.14.

10.2.3

Conservativeness of Global Stability Requirements

To investigate Theorem 7.20 more carefully, we consider the integrating controller


of which the DPC is a special case (see Section 5.2.1).
pi (t + 1) = pi (t) + i (it (t) i (t)).
Chapter 5 discussed local stability requirements of this controller. When subject
to an additional time delay of one sample, it is considered locally stable if < 1.
Chapter 7 addressed global stability aspects, and the central stability result is
found in Theorem 7.20. Here we will compare three different parameter settings:
two corresponding to locally stable controllers and one based on a global stability
criterion. The objective is to illuminate the conservativeness of Theorem 7.20 (cf.
Section 7.3.5).
Reconsider the simulation configuration above, and make the power control
problem more challenging by aiming at SIR target 20 dB. This is a feasible target
m = 2.53 > 1. The global
SIR, since the corresponding feasibility margin is

10.2 Simple Network Simulation Environment

203

stability result in Theorem 7.20 relates stability to the degree of cross-coupling cc .


In this case it is given by
Iit vi
= 0.775.
1im
Iit

cc = max

Example 7.5 relates the degree of cross-coupling and to global stability, and the
stability requirements can be expressed as in Figure 7.10. From the example, we
conclude that = 0.46 provide a globally stable controller in this case. In addition,
we consider the rule of thumb provided in Section 7.3.5.
m.
|Gll (eiw )| <
which yield = 0.66. For comparison, we also consider = 0.9, which is locally
stable according to Section 5.3.2. As in the previous section, the entering mobile
starts by using 1 dBW. The recovering ability of each of the three controllers is
depicted in Figure 10.2. First, we again note that local stability does not imply
global stability since the controller with = 0.9 results in an unstable global
system. The controller designed to be globally stable indeed is stable with appealing
performance. However, even though global stability cannot be granted for = 0.66,
it does provide a stable global system in this case. On the other hand, this might
not be the case for every possible situation with the same degree of cross-coupling.

10.2.4

Abrupt Change of Target SIR

Abrupt changes appear naturally in the cellular radio systems. For example, the
entering mobile in the previous section, is observed as an abrupt increase of the
interference. A similar situation arises when a mobile station starts using a higher
data rate (i.e., aiming at a higher target SIR). Consider the situation in Example 7.4, where a more distant mobile is allocated a significantly lower data rate due
to his less favorable propagation conditions. It is interesting to study the effect on
the system, when the user is upgraded from it = 10 dB to it = 12 dB, which is
the same as the others.
Mobility is modeled as a constant velocity (5 m/s) Manhattan random walk,
i.e., the direction of movement at each sample instant is any of the cardinal points
equally probable. Shadow fading is modeled as in Section 6.1.1, and the sample
interval is Ts = 0.1 s. This is chosen to average out the effect of the fastest
shadow fading frequency components, to emphasize the effect of the upgraded SIR
target. All four mobiles are connected to the same base station in a cell of radius
1000 m, and the processing gain is PG=128. Power control commands are subject
to the additional delay np = 1, nm = 0. Initially, the situation is analogous to
Example 7.4. Then the mobiles start to move, and the fifth mobile is upgraded
after 10 s. Four algorithms are considered:
PI from Section 6.3

204

Network Simulations

a.
i (t) [dB]

40
20
0
20
5

b.

10

15

20

25

30

10

15

20

25

30

10

15

20

25

30

i (t) [dB]

30
20
10
5

c.
i (t) [dB]

30
20
10
5

t [s]
Figure 10.2 The recovering ability, when a new mobile enters the system.
The plots correspond to the use of integrating controllers with
a. = 0.9, b. = 0.66 and c. = 0.46.

DPC with TDC


FSPC with step-size 1 dB
FSPC with step-size 1 dB and TDC
The resulting SIR:s are plotted in Figure 10.3. We note that DPC with TDC and
the PI-controller adapt almost equally well. The FSPC algorithm adapts slower,
which is due to the rate limiting effect of the relay. This is also evident when
r (see Definition 7.6) changes. As disclosed in
studying how the relative load L
Example 7.4, it is relatively costly to upgrade the distant mobile. Figure 10.4
illustrates the relative load over time, when using DPC and FSPC with TDC.
The solid line describes the true relative load (based on the actual i :s), while the
dashed describes the target relative load (based on the it :s). Again, the limiting
effect of decision feedback on adaption rate is evident.

10.3

FH-GSM Simulation Environment

In systems, such as GSM and D-AMPS, there are numerous channels available in
the system. Therefore, dynamic channel allocation plays a more important role.
However, when adding frequency hopping, the critical effect of being allocated a

10.3 FH-GSM Simulation Environment

a.

205

b.

30

20

i (t) [dB]

i (t) [dB]

20
10
0
10
20
30
0

30

10
0
10
20

10

15

30
0

20

t [s]
c.

d.

30

15

20

15

20

30
20

i (t) [dB]

i (t) [dB]

20
10
0
10
20
30
0

10

t [s]

10
0
10
20

10

t [s]

15

20

30
0

10

t [s]

Figure 10.3 The behavior of the system in Example 7.4, when the distant
mobile is upgraded from it = 10 dB to it = 12 dB. In
addition, the terminals are moving, resulting in slow shadow
fading signal powers. Controllers: a. PI, b. DPC with TDC,
c. FSPC, d. FSPC with TDC.

bad channel is averaged out, due to the hopping over several frequencies. In such
a system, coding and frequency hopping aim at mitigating the multipath fading,
while power control aims at compensating for the shadow fading to maintain a
satisfactory SIR level on a slower time scale.
The simulation environment considered here is FH-GSM specific, but generalize to describe the situation of a narrowbanded TDMA system. The simulation
environment is described in more detail in (Olofsson et al., 1997). Essentially, the
objective is to illuminate some characteristic effects in such a system. In FH-GSM,
the measurements are available as measurement reports, and the output powers
are quantized and constrained from above and below. This is relaxed in some of
the simulations, where instead information feedback is assumed, with analog SIR
measurements and any power outputs.
Signal gains are modeled as discussed in Sections 3.3 and 6.1. Shadow fading is
described using the Gudmundson model, and the Clarkes model is used to represent the fast fading correlation in both carrier frequency and spatial deflection (cf.
Figure 3.2). Some of the more important simulation parameters are summarized
in Table 10.2. This yields a cell layout as in Figure 10.7.
The objective with these simulations is primarily to illustrate dynamical ef-

206

Network Simulations

a.

r
L

0.8
0.6
0.4
0.2
0
0

10

12

14

16

18

20

12

14

16

18

20

t [s]
b.

r
L

0.8
0.6
0.4
0.2
0
0

10

Figure 10.4 True (solid) and target (dashed) relative load over time, when
using a. DPC with TDC and b. FSPC with TDC, corresponding to the SIR plots in Figure 10.3b,d.

fects on a system level, rather than evaluating absolute performance or capacity


with respect to realistic scenarios. A system level perspective of the effects using
various controllers is provided by Section 10.3.1. Performance measures play an
important role when evaluating simulations. We will discuss it in terms of SIR and
FER as outlined in Section 10.3.2. The following section discusses the negative
effects of not handling output power constraints properly. Such constraints are always present in real systems. Therefore, unstable control algorithms will not result
in powers increasing without bounds. Section 10.3.4 illustrates the performance
degradation when using a locally unstable controller such as DPC subject to time
delays. Finally, the behavior of the ML estimator from Chapter 8 and the quality
mapper from Section 9.3 are illustrated in the remaining sections. Models of different phenomenons are described in more detail in Appendix 10.B. All simulations
are based on the frequency reuse K = 3, except the comparative simulation of
using estimated or true values, in which the reuse K = 9 is employed. Numerous
plots are associated with the discussion in this section. In order to maintain the
continuity in the text, all plots are presented in Appendix 10.B.

10.3.1

System Level Effects of Controlling the Power

To study the system level effects of different power control algorithms, it is very instructive to study scatter plots of the desired signal power (C) and the interference
(I) concurrently. Basically, we plot every C-I pair (in dBm) for every user at every
sample instant. For comparison purposes, we consider four central control strategies, described in more detail below. The resulting plots are found in Figures 10.8

10.3 FH-GSM Simulation Environment

Frequency band
No. of carrier freq.
Frequency reuse
Antennas
Cell radius
Cell layout
Adj. channel atten.
Frequency hopping
Path-loss exponent
Shadow fading std.dev.
Shadow fading corr. dist.
Rayl. fading, avg. gain
Control sample interval
Burst time
Mean MS speed
Downlink power
Uplink MS:
Uplink maximum power
Uplink minimum power
Uplink quantization
Time delays:
Power output delay
Measurement delay

207

900 MHz
27
K = 3 or K = 9
Sectorized
1000 m
5 5 clusters of 9 cells,
employing wrap around
-20 dB
Pseudo-random
= 3.5
s = 6 dB
d = 100 m
0 dB
Ts = 0.48 s
0.577 ms
50 km/h
13 dBW (constant)
GSM class 4:
pmax = 3 dBW
pmin = 17 dBW
2 dB
np = 1
nm = 0

Table 10.2 FH-GSM simulation parameters.

and 10.9.
1. Constant powers. When not controlling the powers at all, the two-dimensional C-I-distribution in Figure 10.8a, is approximately normal distributed.
This is natural, the desired signal is essentially described by the shadow fading
power gain, with normal distributed long term statistics (see Section 3.3.2).
Moreover, the normal distribution of the interference is further motivated in
Section 8.1.
2. C-based integrating controller. Controllers aiming at a specific desired
signal power level are exemplified in Section 4.5. One natural example is
the CRP algorithm, which can be seen as an integrator in logarithmic scale.
Figure 10.8b illustrates how the controller compresses the distribution in the
C-direction.
3. SIR-based integrating controller. A SIR-based integrating controller has
a similar effect on the systems, but it compresses the distribution in the C Idirection, see Figure 10.9a. By balancing the SIR:s, less power is needed to

208

Network Simulations

meet the requirements. This is also seen in the figure, since the thermal noise
(at -148 dBW) clearly is a major contribution of the interference. In this
case, all connections strive towards the same t .
4. AAW algorithm. The main idea is to favor good connections that need
relatively small powers to maintain an acceptable SIR level. As disclosed
above, the SIR-based controller strives towards the line C = I + t . AAW,
on the other hand strives towards the line C = I + A, which is indicated
by Figure 10.9b for = 0.7. This is easily seen by considering the converged
situation of the AAW algorithm (cf. Section 5.2.1)
p = p + (c )
Using C = p + g and = C I and simple manipulations yield
(C g)(1 ) = (c (C I))
C = I + g(1 ) + c
|
{z
}
A

All the four strategies probably provide reasonable quality of service to the
users. When power economy is of no concern and the the network is sparsely
planned, using maximal powers is a plausible solution. The SIR-based I-controller
reduces the power consumption, while maintaining an acceptable quality. However,
it is evident that this could be a low interference situation (see Section 9.4.5) to
some users. When the interference level is low, is could be desirable to use a higher
power. Conversely, the algorithm forces connections subject to high interference to
use high power to aim at higher carrier. This behavior is costly for the system.
The C-based I-controller is essentially neglecting high power requirements from
high-interference users, which is desirable from a systems perspective. The obvious
drawback is the algorithm essentially needs interference information, in order to
aim at relevant desired signal power levels.
AAW combine the nice features of C-based and SIR-based integration. Thereby,
users with less favorable propagation conditions receive less priority than others.
This self-regulatory effect of target SIR adaption is rather unpredictable, which is
a drawback. The users that are the most costly to support are found in the upper
right area of the figures. They are subject to considerable interference and thus
requires a high desired signal power. Thus, from a system perspective it is desirable
to force the costly users to aim at lower target SIR:s, and shape the distribution
somewhat like a banana (Almgren, 2000).
In summary, we advocate a SIR-based I-controller with the approach in Section 9.4.3, where the target SIR adaption is considered in an outer loop. As such,
the rate adaption approaches (see Section 9.4.2) incorporate nice features. Since
the rate is adapted to the individual propagation and interference situations, it
may enable all satisfied users with respect to the assigned data rate.

10.3 FH-GSM Simulation Environment

a.

209

30

20

10

10

b.

10

12

14

16

18

20

10

12

14

16

18

20

10

10

10

10

10

10

t [s]

Figure 10.5 Two different quality measures. a) SIR is considered acceptable when above 10 dB. b) FER is acceptable when below
0.02.

10.3.2

Quality Measures

As pointed out in Section 9.2.1, speech quality is very subjective, and it is hard to
find relevant objective measures. One common assumption is that the perceived
quality is dependant only on the SIR, and that is it acceptable if above a certain
threshold. Olofsson (1997) argues that this will not describe the quality satisfactory, and that FER is a more adequate measure.
These measures are depicted for a sample case in Figure 10.5, where the SIR
is considered acceptable when above 10 dB, and FER when below 0.02. The question is whether the user in Figure 10.5 is satisfied or not. A simple measure of
user dissatisfaction is the outage probability P (i ) (Ahlin and Zander, 1998).
Consequently, 1 P (i 0 ) relates to user satisfaction. A similar outage measure
can be defined in terms of FER. Therefore, cumulative distributions of SIR and
FER for all users collectively provide a relevant measure of the user satisfaction in
simulations. These will be used throughout the preceeding sections.

10.3.3

Anti-Reset Windup

In practical systems, the output power is constrained from above and below, which
affects the controller behavior. As pointed out in Section 6.6.1, the internal state of
the controller no longer matches the output. When a constraint becomes active, the
internal state winds up (
Astr
om and Wittenmark, 1997). Section 6.6.1 discusses
appropriate precautions, which are referred to as anti-reset windup. The main
idea is to update the internal state to match the output, which is possible if the
constraints are known.
Figure 10.10 illustrates the difference in performance when using the PI-cont-

210

Network Simulations

roller from Section 6.3.3 with and without anti-reset windup. The problems seem
to be that the controllers assign too low powers, resulting in lower SIR:s. Typically,
windup results in the powers to remain longer than necessary at the lower bound.

10.3.4

System Level Effects of Unstable Controllers

Instabilities in linear systems come about as output signals or internal states that
diverge without bounds. In practice, however, signals are always bounded. Instead, instabilities result in fluctuating signals, bounded by the output constraints.
This will be illustrated by the use of the DPC algorithm, subject to time delays.
Anti-reset windup is employed. As disclosed in Section 6.6.1, this is controller is
analogous to the DCPC algorithm (see Section 4.5) when updating the internal
state as fast as possible. Such a configuration is unstable, according to the analysis
in Chapter 5.
Two different dynamic ranges are considered, [3dBW, -17dBW] and [3dBW,
-27dBW] respectively. Figure 10.11 depicts the oscillative output powers of a particular user in the latter dynamic range situation. Such an oscillative behavior
naturally affects the performance. As a stable reference controller, we employ the
PI-controller with anti-reset windup from the previous section.
Corresponding performance is summarized in Figure 10.12. Clearly, the system
level performance is degraded, when using the locally unstable controller. The
reason why the more limited dynamic range provides better performance is that the
oscillations are more restricted in amplitude. The limited dynamic range has little
influence on the performance when using the PI-controller, since the constraints
are mostly not active.

10.3.5

Influence of Estimation

This far, exact measurements provided by the simulator have been used for power
control. With focus on a real system and the actual interfaces, only measurement
reports are available. These reports comprise RXQUAL and RXLEV (see Section 8.1.2). Moreover, the output powers are constrained as in the previous section
and in addition quantized.
A maximum likelihood estimator is designed in Chapter 8 to extract relevant
information from these measurement reports. Section 8.4 addresses the simulator
performance in more detail. The accuracy is relatively good compared to typical
variations in the parameters. It is interesting to see by how much the performance
is degraded when estimated values are used instead of the true ones. As indicated
by Figure 10.13 this degradation is slight Further comparative studies are provided
in (Blom and Gunnarsson, 1998).

10.3.6

Quality Mapping

The main idea with quality mapping (see Section 9.3) is to adapt the target SIR
to correspond statistically to good quality in terms of FER. The objective is to

10.4 WCDMA Simulation Environment

211

improve quality, but also to improve capacity. A natural measure of capacity, is


the load when 95% of the users are satisfied. A user is in turn considered satisfied
when his average FER is below 0.02. The capacity will be stated as the percentage
of allocated frequencies.
In order to evaluate the performance of the quality mapper only, good estimates
of the interference standard deviation is needed. An accurate estimation procedure
is employed using the analog values available in the simulator. Basically, the interference standard deviation is computed for each measurement period (data from
104 bursts). These estimates are then lowpass filtered using an exponential forgetting filter (see Section 5.2.4).
We operate the system with either the fixed target SIR:s t = 12 dB (including
a bias of 2 dB) or a value provided by the quality mapper. The capacity is estimated by varying the load of the system and compute the user satisfaction. This
procedure results in the capacity 27 % in the former case and 35 % in the latter - an
improvement by approximately 30%. Corresponding performance at the different
load situations are illustrated in Figure 10.14. The performance in terms of FER
is equal in both cases despite different load situations. This is accomplished in the
quality mapper by reducing the targets in some cases and increasing it in others.
Clearly, the SIR:s are significantly lower when using the quality mapping, which
make room for better quality in terms of FER.
The simulation indicates significant improvements when using quality mapping.
However, one should note that the quality mapper is based on FER, C and I
statistics. The FER statistics is obtained using a model of frame errors, which is
the same model used, when generating frame error in the simulator. Therefore, the
robustness against model errors of this outer loop strategy has to be evaluated.

10.4

WCDMA Simulation Environment

The main merit of the Fixed Step Power Control (FSPC) algorithm is that only
one bit is needed for control signaling. Thus, it is possible to allow a high power
control update rate, without using a too large a bandwidth. Therefore it is considered as the inner control loop in several DS-CDMA implementations (Chaudhury
et al., 1999; Dahlman et al., 1998; UMTS 30.06, 1997; Viterbi, 1995), where fast
power control is a critical component. In the WCDMA proposal for the third generation systems, FSPC is considered at an update rate on 1500 Hz (power control
commands are sent once per slot). The objective in this section is to illustrate the
dynamical behavior of this inner loop and relate to previous chapters.
The simulator is built around the same core as the environment in the previous
section. In addition, CDMA specific models are added. The simulation environment is further described in (Engstrom and Ericsson, 1999). It will mainly be used
to study the effects of power control command bit errors when using FSPC together with TDC. Related plots are found in Appendix 10.B. Central parameters
are summarized in Table 10.3.

212

Network Simulations

Frequency band
Antennas
Cell radius
Cell layout
Path-loss exponent
Shadow fading std.dev.
Shadow fading corr. dist.
Control sample interval
Mean MS speed
Time delays:
Power output delay
Measurement delay

2 GHz
Sectorized
2000 m
4 sites, each with 3 sectors
= 3.8
s = 8 dB
d = 110 m
Ts = 1/1500 s
5 m/s
np = 1
nm = 0

Table 10.3 WCDMA simulation parameters.

10.4.1

Effect of Command Bit Errors on TDC

As discussed in Section 6.2.1, the benefits of TDC will be degraded when subject to
power command bit errors. The closed loop suffers not only from erroneous bits but
also from erroneous adjustments np + nm samples thereafter. Consider an example
where the algorithm is subject to a delay of one sample (cf. Example 5.1 and
Section 10.2.2), and with a command bit error rate of pBER = 0.05. Engstr
om and
Ericsson (1999) concluded that the inner loop successfully tracks the multipath and
the shadow fading for low mobile velocities, but is only capable to track the shadow
fading when the velocity is above 15 m/s. In order to focus on the dynamical effects,
we consider mobile velocities of 5 m/s. The control errors ei (t) = it (t) i (t) with
and without TDC of a specific user are plotted in Figure 10.15 together with the
multiplicative disturbance xi (t). As expected, command bit errors result in bursty
control errors when using TDC, but the algorithm recovers fast.
The improved fading tracking is significant when employing TDC, and the oscillations are more or less mitigated. Less fading margin will be needed to reside
permanently above some critical level, which in turn increases the capacity. Possible capacity enhancements need to be evaluated more thoroughly. With robust
coding, the more emphasized oscillations when not using TDC may not cause problems anyway. Engstr
om and Ericsson (1999) studied the effect of different power
control delays, and concluded that a target SIR increase of about 0.25 dB is needed
to compensate for time delays up to three samples. This in turn corresponds to the
expected performance improvement when using TDC. However, the more stable
operation provided by TDC is beneficial in itself. Less variance in the inner loops
results in a more stable overall system and relative load.
Increased command bit error rates degrade the performance gradually. Despite
the triangular behavior of the control error, its standard deviation represents a
quantity that relates to this degradation. It is plotted with respect to some different
command bit error rates in Figure 10.16. Clearly, the more oscillative behavior of

10.5 Summary

213

FSPC compared to FSPC with TDC indicates that less fading margin is needed
when employing TDC. If we assume that perceived quality is acceptable if residing
above a specific SIR level, then the target SIR could be decreased by approximately
1 dB (cf. Figure 10.15). As stated before, SIR is not a complete quality measure. A
better measure of quality is raw bit error rate, i.e., the bit error rate before channel
decoding. Figure 10.15 provides a comparative study of the resulting raw BER
when using FSPC with and without TDC. In addition, the results using FSPC
with TDC and aiming at a target SIR which is 0.25 dB is also included. This
simple study, indicates that the benefits using TDC is approximately a decreased
fading margin by 0.25 dB. If the decreased fading margin is fully utilized by the
system, it would result in an increased capacity of 6%.

10.5

Summary

The ambition with the simulations is primarily to illustrate the dynamical effects
discussed in the preceeding chapters. The first part include simulations that are
directly related to examples in the thesis. Mainly, the examples aim at illuminating
the benefits of using the controllers designed in Chapter 6.
System level effects are addressed using two GSM and WCDMA specific simulation environments. It is instructive to collectively consider all users at all times,
since it reveals important global aspects. The simulations indicate that a strategy
where all users are aiming at the same target SIR is suboptimal. The cost of supporting users with less favorable propagation conditions cannot be justified on the
system level. Thus outer loop strategies which differentiate the user requirements
depending on propagation situation should improve the capacity of the system.
The effects of neglecting output constraints and using unstable controllers are
also illustrated. As expected, both these deficiencies have a negative impact on the
system performance.
Chapters 8 and 9 address the actual interfaces of a GSM system. The main
conclusions from related simulations is firstly that the degradation when using
estimated parameters instead of true ones is almost neglectable. This is partly
due to the limited set of control signals available in a GSM setting. Secondly, the
capacity is improved by 30% in a specific case when using the quality mapping
ideas (see Section 9.3).
Time delay compensation is seen to provide significant improvement to most
controllers. A drawback in case of the FSPC algorithm, is that it might be sensitive
to command bit errors. However, simulations indicate that TDC is still beneficial
when subject to command bit error rate up to 10%. Moreover, the fading margin
can be decreased by 0.25 dB when using TDC. This is supported in simulations by
comparing resulting quality in terms of raw bit error rates.

Appendix
10.A

MOSE

The MObile communications Simulation Environment (MOSE) focuses on power


control and load aspects in simplistic situations As noted in Section 4.3, we can
without loss of generality focus on a system with a single frequency/waveform, when
solely studying the dynamical behavior of power control. Such a situation might
represent a specific channel in a system with orthogonal channels or a simplified
DS-CDMA system. The cellular layout is described by a grid of hexagonal cells
with equal radius. The base station antennas are omni-directional and located in
the center of the cells as seen in Figure 10.6. A wrap-around philosophy is employed
to avoid boundary effects. This means that the left and right sides are treated as
connected together, so that mobile stations far to the right are actually close to
and interfered by base stations on the left side. The upper and lower ends are
connected analogously.
Signal powers are affected by path loss as in Section 3.3.1 and shadow fading as
in Section 6.1.1. The mobiles are connected to the base station that is associated
with the minimal distance or the maximal gain. More sophisticated channel allocation or base station assignment techniques are not considered. Mobility is modeled
using several models, and different mobiles may be assigned different models. Most
power control algorithms covered in this thesis are implemented. In addition, a free
format allows the use of user defined algorithms.
The focus is on inner control loops with filters, time delays, and output power
constraints. However, some simple outer loop strategies may be applied as well.
Some test cases are available for evaluation and comparison purposes. SIR is the
natural quality measure, since no coding nor modulation are included. Moreover,
global properties can be related to the relative load (see Definition 7.6). More
details regarding MOSE are found in (Gunnarsson et al., 1997, 1998b).

214

10.A MOSE

215

Figure 10.6 The cells in MOSE are modeled as hexagonal in the simulation
environment, and the omnidirectional antennas are located in
the center of the cells. In this case the service area is covered
by 8 8 cells.

216

Network Simulations

10.B

Plots Associated with Simulations in


Sections 10.3 and 10.4.

The numerous plots from simulations would have made the text less continuous.
Therefore, the plots are collected here. Most plots relate to simulations using
the FH-GSM simulation environment, while thE last two are obtained using the
WCDMA simulation environment.
10000

29

30

8000

13
45

14
46

25

6000

31

26
9

15
47

27
10

41

42

32
16
48
28

11
43

12
44

4000
21

22

23

2000

37
17

6
38

39

18

1
33

24
7

19
2

40
20

34

35

4
36

2000
0

5000

10000

15000

Figure 10.7 Snapshot of the cell configuration in the FH-GSM simulations


environment.

10.B Plots Associated with Simulations in Sections 10.3 and 10.4.

105

110

110

115

115

120

120

Interference I

105

125

125

130

130

135

135

140

140

145
1000

500

217

145
180

160

140

120
100
Carrier C

80

60

40

160

140

120

80

60

40

1000
500
0
180

100

(a) Constant power.

110

115

115

120

120

125

125

Interference I

110

130

130

135

135

140

140

145

145

150
1000

500

150
180

160

140

160

140

120
Carrier C

100

80

60

100

80

60

3000
2000
1000
0
180

120

(b) C-based I-controller.

Figure 10.8 Scatter plots of the desired power (C) and interference power
(I) plotted concurrently when applying a. constant powers
and b. a C-based I-controller. The lines indicate SIR values
equal to 10 dB, and desired signal power values equal to 140 dBW. Roughly, the quality is acceptable, when situated
to the right of these lines. In addition, the distribution of the
values in the two directions are provided.

218

Network Simulations

110

115

115

120

120

125

125

Interference I

110

130

130

135

135

140

140

145

145

150
2000

1000

150
180

160

140

160

140

120
Carrier C

100

80

60

100

80

60

2000
1000
0
180

120

(a) I-controller.

110

115

115

120

120

125

125

Interference I

110

130

130

135

135

140

140

145

145

150
1000

500

150
180

160

140

120
100
Carrier C

80

60

40

160

140

120

80

60

40

2000
1000
0
180

100

(b) AAW algorithm.

Figure 10.9 Scatter plots when applying a. a SIR-based I-controller and


b. the AAW algorithm.

10.B Plots Associated with Simulations in Sections 10.3 and 10.4.

219

100

CDF [%]

30

10

10

15

20

25

30

35

40

45

50

SIR
Figure 10.10 When the controlled power is affected by output constraints,
the internal state of the controller no longer matches the
output. The figure illustrates the loss of performance when
not acting accordingly. PI-control with (solid) and without
(dashed) anti-reset windup

pi (t) [dBW]

20
10
0
10
20
30
0

10

20

30

40

50

60

70

80

90

100

t [s]
Figure 10.11 Output powers of a specific user, when the power is controlled by the unstable controller. The output powers are
limited to [3dBW, -27dBW].

220

Network Simulations

a.
CDF [%]

100
30
10
3
1

10

20

30

40

50

60

SIR
b.

CDF

0.8
0.6
0.4
0.2
0

0.01

0.02

0.03

0.04

0.05

0.06

0.07

0.08

0.09

0.1

FER
Figure 10.12 System level effects of a locally unstable controller. PI
(solid), DPC with 20 dB (dashed) and 30 dB (dash-dotted)
dynamic range.

CDF [%]

100
30
10
3
1

10

15

20

25

30

35

40

45

SIR [dB]
CDF [%]

1
0.8
0.6
0.4
0.2
0

0.005

0.01

0.015

0.02

0.025

0.03

0.035

0.04

0.045

0.05

FER
Figure 10.13 Comparison when utilizing ideal measurements (solid) and
estimates from the proposed estimator (dashed).

10.B Plots Associated with Simulations in Sections 10.3 and 10.4.

221

CDF [%]

100
30
10
3
1
20

10

10

20

30

40

50

SIR [dB]
CDF [%]

1
0.8
0.6
0.4
0.2
0

0.005

0.01

0.015

0.02

0.025

0.03

0.035

0.04

0.045

0.05

FER
Figure 10.14 Performance comparison of two different situations. The
dashed curve corresponds to using fixed target SIR 12 dB
to all inner loops when 27% of the channels are occupied on
the average. Conversely, the solid curve described the performance when using a quality mapper in the outer loop and
35% of the channels are occupied. Clearly, the performance
is similar, which indicates a capacity increase of about 30%.

222

Network Simulations

a)

xi (t)

ei (t) [dB]

b)

ei (t) [dB]

10

20

30

40

50

60

70

80

90

100

10

20

30

40

50

60

70

80

90

100

10

20

30

40

50

60

70

80

90

100

c)

Slot No

Figure 10.15 The FSPC algorithm with TDC in operation when subject
to command bit errors (pCBER = 0.05). a) Multiplicative
disturbance xi (t), b) control error without TDC c) control
error with TDC. The samples of the control errors are held
piece-wise constant to emphasize the underlying periods of
oscillation. Note in c) that two different modes can be identified. This is in accordance with the predicted oscillations
in Table 5.4.

10.B Plots Associated with Simulations in Sections 10.3 and 10.4.

223

1.3

No TDC
TDC

1.2

1.1

Std{ei (t)}

0.9

0.8

0.7

0.6

0.5

0.01

0.02

0.03

0.04

0.05

pCBER

0.06

0.07

0.08

0.09

0.1

Figure 10.16 Standard deviation of the received SIR error in a typical


WCDMA situation, where the power control commands are
delayed by one slot and subject to command bit errors of
different rates pCBER . As indicated, TDC is beneficial for
the considered bit error rates pCBER 0.1.

0.0225

0.022

Raw BER

0.0215

0.021

0.0205

0.02

0.0195

0.01

0.02

0.03

0.04

0.05

pCBER

0.06

0.07

0.08

0.09

0.1

Figure 10.17 The raw BER for different command bit error rates pCBER
and controllers: FSPC (solid), FSPC + TDC (dash-dotted)
and FSPC+TDC aiming at a target 0.3 dB lower than the
two previous.

224

Network Simulations

11
Conclusions

During the last decade, the market of cellular radio systems has exploded. The
driving incentive is to enable and facilitate communications services irrespective of
time and location. As the number of users and the demand for multimedia services
increase, so does the need for efficient use of the available radio resources. Appropriate radio resource management is therefore of utmost importance. Regularly,
we have to reconsider the assignments of base station, radio channel (or waveform
or code) and transmission powers for each connection.
The main issue in the thesis is methods to update transmission powers. By
considering the overall system as comprising a large number of interconnected distributed control loops, methods from control theory can be used to assess stability
and dynamical behavior. Typically, these individual control loops are implemented
as cascade control, with an inner control loop that assigns transmission powers to
meet the quality set point provided by the outer loop. To further study the operation of the system, it is natural to separate the time scales and study power control
at two levels. On a global level, the focus is on capacity, load, stability, convergence
and whether it is possible to meet the service requirements from the users. Local
aspects include dynamical effects of time delays and nonlinear components, and
the ability to mitigate time-varying disturbances.
An important categorization of the inner loops is whether it utilizes information
feedback, where real-valued measurements are assumed available, or decision feedback, which relies on decisions; typically the sign of the control error. The most

225

226

Conclusions

central information feedback algorithms can be associated with linear local control
loops, and thus methods from linear systems theory apply. Based on a motivation
that local stability is a necessary but not sufficient condition for global stability,
some instability results are provided. For example, the celebrated DPC algorithm
is proven unstable, when subject to time delays. Decision feedback controllers
behave differently. The decision component can be seen as a sign function with
inherent stabilizing and destabilizing properties. In a closed local loop, it results
in a persistent oscillative behavior. This behavior is predicted using discrete-time
describing functions. The predicted oscillations describe well the behavior observed
in simulations. The conclusion is that several oscillation modes are possible and
that mode switching may be stimulated by external disturbances.
Instabilities are essentially due to outdated information. In this work, several
methods are considered to improve control performance. Time delay compensation
(TDC) constitutes a general method to improve the behavior of general controllers.
Essentially, it cancels internal time delays. When using information feedback, pole
placement design is an alternative which is providing comparative performance. If
disturbance models are available, disturbance predictions are seen to improve the
control performance considerably. When the system is slightly loaded, the performance can be significantly improved by utilizing a minimum-variance controller.
Results on capacity of the global system are reviewed and extended to include
the effects of auto-interference. Moreover, the introduced relative load provides a
metric to address the actual load of a system. Stability and convergence of structurally simple algorithms can be addressed by rewriting the problem as iterative
matrix algorithms. We prove that DPC is stabilized using TDC for any time delays. Furthermore, TDC together with a decision feedback algorithm is seen to
decrease the power control error, both formally and in simulations. General stability conditions are hard to derive. Instead, we address stability with respect to an
approximate system. Thereby, the global stability requirements are formulated as
a local loop requirement, which can be considered in the design. Hence, local loop
stability together with a fulfillment of the aformentioned local loop requirement
constitute necessary and sufficient condisions for stability of the (approximate)
global system.
Information feedback is not available when considering GSM. Instead, the information is available as coarsely quantized measurement reports. One core problem is
therefore to locally extract relevant information from these reports. For that matter a maximum likelihood estimator is designed and applied. Simulations indicate
relevant performance with respect to the variations in the estimated parameters.
Using the same probabilistic framework, a statistical relation between inner loop
set points and more relevant quality measures can be established. In case of GSM,
the frame erasure rate (FER) is considered as a relevant quality measure. Thus,
the outer loop assigns inner loop set points to meet a quality specification in terms
of FER.
Most of the results in the thesis are supported by simulations, using both small
and large-scale simulation environments. Primarily the simulations illustrate the
importance of appropriate design of the control algorithms.

227

Future Work
The discrete-time describing functions analysis provide accurate predictions of oscillations in case of decision feedback power control. Therefore, it would be interesting to investigate its applicability to other feedback loops in communications,
where a relay is a critical component. Such examples include decision feedback
equalizers, -modulators and simple control algorithms where a low signaling
bandwidth is of importance.
Some proposals have focused on power control based on information from disturbance models. However, there are still extensions to be made. For example,
channel estimates from equalizers could be utilized. Furthermore, a more emphasized model-based approach is likely to be beneficial.
To describe the current load of a system, the relative load was introduced. It
can easily be computed in simulators to describe the load of the system. However,
it could also provide valuable information in an online situation. Given the information available at one, or several, base stations, an interesting area of research is
methods to estimate the relative load. A related problem is to adaptively estimate
the entire gain matrix or parts of the same.
There can always be yet another comparative simulation study of related topics
in this thesis and other work.
This thesis focuses on power control for circuit-switched services, or at least
situations where the length of a packet is considerably longer than the settling time
of the controllers. When the traffic is even more bursty, several other considerations
apply.

228

Conclusions

Bibliography
A. Acampora and M. Naghshineh. Control and quality-of-service provisioning in
high-speed microcellular networks. IEEE Personal Communications, 1(2), 1994.
F. Adachi. Transmit power efficiency of fast power controlled DS-CDMA reverse
link. IEICE Transactions on Fundamentals, E80-A(12), 1997.
F. Adachi, M. Sawahashi, and H. Suda. Wideband DS-CDMA for next-generation
mobile communications systems. IEEE Communications Magazine, 36(9), 1998.
J.M. Aein. Power balancing in systems employing frequency reuse. COMSAT
Technical Review, 3(2), 1973.
A. Ahlen, L. Lindbom, and M. Sternad. Channel tracking with WLMS algorithms: High performance at LMS computational load. In Proc. IEEE Vehicular
Technology Conference, Tokyo, Japan, May 2000.
L. Ahlin and J. Zander. Principles of Wireless Communications. Studentlitteratur, Lund, Sweden, second edition, 1998.
H. Alavi and R.W. Nettleton. Downstream power control for a spread spectrum
cellular mobile radio system. In Proc. IEEE Global Telecommunications Conference, Miami, FL, USA, November 1982.
M. Almgren, 2000. Private communication since 1997.
M. Almgren, H. Andersson, and K. Wallstedt. Power control in a cellular system.
In Proc. IEEE Vehicular Technology Conference, Stockholm, Sweden, June 1994.
E. Anderlind. Resource Allocation in Multi-Service Wireless Access Networks.
PhD thesis, Radio Comm. Systems Lab., Royal Inst. Technology, Stockholm, Sweden, October 1997.
M. Andersin. Power Control and Admission Control in Cellular Radio Systems.
PhD thesis, Radio Comm. Systems Lab., Royal Inst. Technology, Stockholm, Sweden, June 1996.
M. Andersin, N.B. Mandayam, and D.Y. Yates. Subspace based estimation of the
signal to interference ratio for TDMA cellular systems. Wireless Networks, 4(3),
1998a.

229

230

Bibliography

M. Andersin and Z. Rosberg. Time variant power control in cellular networks. In


Proc. IEEE Personal, Indoor and Mobile Radio Communications, Taipei, Taiwan,
October 1996.
M. Andersin, Z. Rosberg, and J. Zander. Distributed discrete power control in
cellular PCS. In B. Jabbari, P. Godlewski, and X. Lagrange, editors, Multiaccess, Mobility and Teletraffic for Personal Communications, pages 114. Kluwer
Academic Publishers, Boston, MA, USA, 1996a.
M. Andersin, Z. Rosberg, and J. Zander. Gradual removals in cellular PCS with
constrained power control and noise. Wireless Networks, 2(1), 1996b.
M. Andersin, Z. Rosberg, and J. Zander. Soft and safe admission control in cellular
networks. IEEE/ACM Transactions on Networking, 5(2), 1997.
M. Andersin, Z. Rosberg, and J. Zander. Distributed discrete power control in
cellular PCS. Wireless Personal Communications, 6(3), 1998b.
S. Ariyavisitakul. Signal and interference statistics of a CDMA system with feedback power control - part II. IEEE Transactions on Communications, 42(2/3/4),
1994.
S. Ariyavisitakul and L.F. Chang. Signal and interference statistics of a CDMA
system with feedback power control. IEEE Transactions on Communications, 41
(11), 1993.
K.
Astr
om and T. H
agglund. PID Controllers: Theory, Design, and Tuning.
Instrument Society of America, Research Triangle Park, NC, USA, second edition,
1995.
K.
Astr
om and B. Wittenmark. Adaptive Control. Addison-Wesley, second edition,
1995.
K.
Astr
om and B. Wittenmark. Computer Controlled Systems Theory and
Design. Prentice-Hall, Englewood Cliffs, NJ, USA, third edition, 1997.
D. P. Atherton. Nonlinear Control Engineering. Van Nostrand, second edition,
1982.
T. Aulin. A modified model for the fading signal at a mobile radio channel. IEEE
Transactions on Vehicular Technology, 28(3), August 1979.
K. Balachandran, S.R. Kadaba, and S. Nanda. Channel quality estimation and
rate adaption for cellular mobile radio. IEEE Journal on Selected Areas in Communications, 17(7), 1999.
N. Bambos, C. Chen, and D. Mitra. Channel probing for distributed access in
wireless communication networks. In Proc. IEEE Global Telecommunications Conference, Singapore, November 1995.

Bibliography

231

J.G. Beerends and J.A. Stemerdink. A perceptual speech-quality measure based on


a psychacoustic sound representation. Journal of The Audio Engineering Society,
42(3), March 1994.
N. Bergman. Recursive Bayesian Estimation: Navigation and Tracking Applications. PhD thesis, Link
opings universitet, May 1999.
D. P. Bertsekas and J. N. Tsitsiklis. Parallel and Distributed Computation. Prentice Hall, Englewood Cliffs, NJ, USA, 1989.
J. Blom and F. Gunnarsson. Power Control in Cellular Radio Systems. Licentiate Thesis, Link
opings universitet, Sweden, June 1998. Available at
http://www.control.isy.liu.se.
J. Blom, F. Gunnarsson, and F. Gustafsson. Constrained power control subject to time delays. In Proc. International Conference on Telecommunications,
Chalkidiki, Greece, June 1998a.
J. Blom, F. Gunnarsson, and F. Gustafsson. A new concept of power control in
cellular systems reflecting challenges of todays systems. In Proc. IEEE Global
Telecommunications Conference, Sydney, Australia, November 1998b.
J. Blom, F. Gunnarsson, and F. Gustafsson. Estimation in cellular radio systems. In Proc. IEEE International Conference on Acoustics, Speech, and Signal
Processing., Phoenix, AZ, USA., March 1999.
Jonas Blom. Topics in dynamical systems: Integrability and Power Control. PhD
thesis, Royal Institute of Technology, Stockholm, Sweden, September 1999.
G. Brasche and B. Walke. Concepts, services, and protocols of the new GSM
phase 2+ general packet radio service. IEEE Communications Magazine, 35(8),
1997.
P. Bruhn, S.and Blocher, K. Hellwig, and J. Sj
oberg. Concepts and solutions for
link adaption and inband signaling for the GSM AMR speech coding standard.
In Proc. IEEE Vehicular Technology Conference, Houston, TX, USA, May 1999.
J. A. Cadzow. Discrete time systems. Prentice Hall, Englewood Cliffs, NJ, USA,
1973.
J. Cai and D.J. Goodman. General packet radio service in GSM. IEEE Communications Magazine, 35(10), 1997.
B. Carnahan, H.A. Luther, and J.O. Wilkes. Applied Numerical Analysis. Wiley,
New York, NY, USA, 1969.
C. Carneheim, S. Jonsson, M. Ljungberg, M. Madfors, and J. N
aslund. FHGSM frequency hopping GSM. In Proc. IEEE Vehicular Technology Conference,
Stockholm, Sweden, June 1994.

232

Bibliography

J.K. Cavers. Variable-rate transmission for rayleigh fading channels. IEEE Transactions on Communications, 24(1), 1972.
P. Chang. Adaptive fuzzy power control for CDMA mobile radio systems. IEEE
Transactions on Vehicular Technology, 45(2), May 1996.
P. Chang and B. Wang. Adaptive fuzzy proportional integral power control for
a cellular CDMA system with time delay. IEEE Journal on Selected Areas in
Communications, 14(9), December 1996.
P. Chaudhury, W. Mohr, and Onoe S. The 3GPP proposal for IMT-2000. IEEE
Communications Magazine, 37(12), 1999.
R.H. Clarke. A statistical theory of mobile-radio reception. The Bell System
Technical Journal, 47(6), July-August 1968.
E. Dahlman, P. Beming, J. Knutsson, F. Ovesj
o, M. Persson, and C. Roobol.
WCDMA the radio interface for future mobile multimedia communications.
IEEE Transactions on Vehicular Technology, 47(4), November 1998.
M. de la Sen, A. Pe
na, and J. Esnaola. Detection of limit cycles in discrete
systems with backlash and resolution by using a discretization-oriented describing
function. In Proc. IEEE Conference on Decision and Control, San Antonio, TX,
USA, December 1993.
J. C. Doyle, B. A. Francis, and A. R. Tannenbaum. Feedback Control Theory.
Macmillan Publishing Company, New York, NY, USA, 1992.
S. Ekberg and T. Laurent. Telegraf- och telefonteknikens fundamentala principer.
Almqvist&Wiksell, Uppsala, Sweden, second edition, 1964.
T. Ekman and G. Kubin. Nonlinear prediction of mobile radio channels: measurements and MARS model designs. In Proc. IEEE International Conference on
Acoustics, Speech, and Signal Processing, Phoenix, AZ, USA, March 1999.
B. Engstr
om and M. Ericsson. WCDMA system level performance with fast fading
and non-ideal power control. In Proc. IEEE Vehicular Technology Conference,
September 1999.
A. Ericsson and M. Millnert. Fast power control to counteract rayleigh fading in
cellular radio systems. In Proc. RVK, Lule
a, Sweden, 1996.
S. Eriksson, A. Furusk
ar, M. H
ook, S. J
averbring, H. Olofsson, and J. Sk
old.
Comparison of link quality control strategies for packet data services in EDGE.
In Proc. IEEE Vehicular Technology Conference, Houston, TX, USA, May 1999.
D.K. Fadeev and V.N. Fadeeva. Computational Methods of Linear Algebra. W.H.
Freeman, San Fransisco, CA ,USA, 1963.

Bibliography

233

G.J. Foschini and Z. Miljanic. A simple distributed autonomus power control


algorithm and its convergence. IEEE Transactions on Vehicular Technology, 42
(4), 1993.
G.J. Foschini and Z. Miljanic. Distributed autonomous wireless channel assignment with power control. IEEE Transactions on Vehicular Technology, 44(4),
November 1995.
G.F. Franklin, J.D. Powell, and D. Workman. Digital Control of Dynamic Systems. Addison-Weslay, Menlo Park, CA, USA, 1997.
T. Fujii and M. Sakamote. Reduction of cochannel interference in cellular systems
by intra-zone channel reassignment and adaptive power control. In Proc. IEEE
Vehicular Technology Conference, Philadelphia, PA, USA, June 1988.
A. Furusk
ar, D. Bladsjo, S. Eriksson, M. Frodigh, S. J
averbring, and H. Olofsson.
System performance of the EDGE concept for enhanced data rates in GSM and
TDMA/136. In Proc. IEEE Wireless Communications and Networking Conference, New Orleans, LA, USA, September 1999a.
A. Furusk
ar, M. H
o
ok, S. J
averbring, H. Olofsson, and J. Sk
old. Capacity evaluation of the EDGE concept for enhanced data rates in GSM and TDMA/136. In
Proc. IEEE Vehicular Technology Conference, Houston, TX, USA, May 1999b.
F. R. Gantmacher. The Theory of Matrices, volume 2. Chelsea Publishing Company, New York, NY, USA, 1974.
G. A. Garrard. Cellular Communications: Worldwide Market Development.
Artech House, Boston, MA, USA, 1998.
K.S. Gilhousen, I.M. Jacobs, R. Padovani, A.J. Viterbi, L.A. Weaver Jr., and C.E.
Wheatly. On the capacity of a cellular CDMA system. IEEE Transactions on
Vehicular Technology, 40(2), 1991.
T. Glad. Nonlinear control theory. Report LiTH-ISY-R-1686, Department of
Electrical Engineering, Link
oping University, Sweden, 1994.
P. Godlewski and L. Nuaymi. Auto-interference analysis in cellular systems. In
Proc. IEEE Vehicular Technology Conference, Houston, TX, USA, May 1999.
A.J. Goldsmith. The capacity of downlink fading channels with variable rate and
power. IEEE Transactions on Vehicular Technology, 46(3), 1997.
S.A. Grandhi, R. Vijayan, and D.J. Goodman. Distributed power control in
cellular radio systems. IEEE Transactions on Communications, 42(2), 1994.
S.A. Grandhi, R. Vijayan, D.J. Goodman, and J. Zander. Centralized power
control in cellular radio systems. IEEE Transactions on Vehicular Technology, 42
(4), 1993.

234

Bibliography

S.A. Grandhi, J. Zander, and R. Yates. Constrained power control. Wireless


Personal Communications, 2(1), 1995.
GSM Recommendations 05.08. Radio Subsystem Link Control, ETSI, 1994.
M. Gudmundson. Correlation model for shadow fading in mobile radio systems.
IEE Electronics Letters, 27(23), 1991.
F. Gunnarsson, J. Blom, and F. Gustafsson. Mobile communication systems an object-oriented simulation environment. In Proc. Nordic Matlab Conference,
Stockholm, Sweden, October 1997.
F. Gunnarsson, J. Blom, and F. Gustafsson. Method and system for qualitybased power control in cellular communications systems. US Patent Application
No. 09/031,635, 1998a.
F. Gunnarsson, J. Blom, and F. Gustafsson. MOSE - a simulation environment
for mobile communication systems. Report LiTH-ISY-R-2033, Department of
Electrical Engineering, Link
opings universitet, Sweden, 1998b.
F. Gunnarsson, J. Blom, and F. Gustafsson. Power control algorithms and stability analysis for radio network control. In Proc. IEEE Conference on Decision
and Control, Tampa, FL, USA, December 1998c.
F. Gunnarsson, J. Blom, and F. Gustafsson. Power control in cellular systems
subject to constraints and time delays. In Proc. IEEE Global Telecommunications
Conference, Sydney, Australia, November 1998d.
F. Gunnarsson, J. Blom, and F. Gustafsson. A concept of power control in cellular
radio systems. In Proc. IFAC World Congress, Beijing, P. R. China, July 1999a.
F. Gunnarsson, J. Blom, and F. Gustafsson. Estimation of the carrier-tointerference ratio in cellular radio systems. In Proc. IEEE Vehicular Technology
Conference, Houston, TX, USA, May 1999b.
F. Gunnarsson and F. Gustafsson. Time delay compensation in power controlled
cellular radio systems. Submitted to IEEE Communications Letters, 1999.
F. Gunnarsson, F. Gustafsson, and J. Blom. Improved performance using nonlinear components in power control algorithms. In Proc. IEEE Vehicular Technology
Conference, Houston, TX, USA, May 1999c.
F. Gunnarsson, F. Gustafsson, and J. Blom. Pole placement design of power
control algorithms. In Proc. IEEE Vehicular Technology Conference, Houston,
TX, USA, May 1999d.
F. Gunnarsson, F. Gustafsson, and J. Blom. Dynamical effects of time delays
and time delay compensation in power controlled WCDMA. Submitted to IEEE
Journal on Selected Areas in Communications, WCDMA Special Issue., 2000.

Bibliography

235

F. Gunnarsson, F. Gustafsson, and N. Wiberg. Transmit power control time delay


compensation in a wireless communications system. US Patent Application No.
09/346316, 1999e.
F. Gustafsson. Adaptive filtering and change detection. John Wiley & Sons, Ltd,
2000.
S.V. Hanly. An algorithm for combined cell-site selection and power control to
maximize cellular spread spectrum capacity. IEEE Journal on Selected Areas in
Communications, 13(7), 1995.
M. Hata. Empirical formula for propagation loss in land mobile radio services.
IEEE Transactions on Vehicular Technology, 29(3), 1980.
J.D. Herdtner and E.K.P. Chong. A class of distributed asynchronous power control algorithms for cellular wireless systems. In Proc. Annual Allerton Conference
on Communication, Control, and Computing, Monticello, IL, USA, September
1999.
J.D. Herdtner and E.K.P. Chong. Analysis of a class of distributed asynchronous
power control algorithms for cellular wireless systems. To appear in IEEE Journal
on Selected Areas in Communications, 2000.
W. C. Jakes. Microwave mobile communications. John Wiley & Sons, New York,
NY, USA, 1974.
A.-L. Johansson. Sucessive Interference Cancellation in DS-CDMA Systems. PhD
thesis, Chalmers University of Technology, G
oteborg, Sweden, October 1998.
I. Katzela and M. Naghshineh. Channel allocation schemes for cellular mobile
telecommunication systems: A comprehensive survey. IEEE Personal Communications, 3(3), 1996.
H. Kawai, H. Suda, and F. Adachi. Outer-loop control of target SIR for fast
transmit power control in turbo-coded W-CDMA mobile radio. IEE Electronics
Letters, 35(9), 1999.
H. Keller, H. Salzwedel, G. Schorcht, and V. Zerbe. Comparison of the probability
of visibility of the most important currently projected mobile satellite systems. In
Proc. IEEE Vehicular Technology Conference, Phoenix, AZ, USA, May 1997.
D.N. Knisely, S. Kumar, S. Laha, and S. Nanda. Evolution of wireless data
services: IS-95 to cdma2000. IEEE Communications Magazine, 36(10), 1998.
M.V. Kothare, P.J. Campo, M. Morari, and C.N. Nett. A unified framework for
the study of anti-windup designs. Automatica, 30(12), 1994.
B. Kristiansson and B. Lennartsson. Optimal PID controllers including roll off
and Schmidt predictor structure. In Proc. IFAC World Congress, Beijing, P. R.
China, July 1999.

236

Bibliography

A.D. Kucar. Mobile radio: An overview. IEEE Communications Magazine, 29


(11), 1991.
H.J. Kushner and J. Yang. Analysis of adaptive step-size sa algorithms for parameter tracking. IEEE Transactions on Automatic Control, 40, 1995.
K.H. Lam, O.C. Au, C.C. Chan, K.F. Hui, and S.F. Lau. Objective speech quality
measure for cellular phone. In Proc. IEEE International Conference on Acoustics,
Speech, and Signal Processing, Atlanta, GA, USA, May 1996.
A. Larsson. Power Control in Mobile Communications A Statistical Analysis
of the Radio Channel Variability. Licenciate Thesis, Lund University, Sweden,
October 1997.
V.K.N. Lau and S.V. Maric. Variable rate adaptive modulation for DS-CDMA.
IEEE Transactions on Communications, 47(4), 1999.
T.H. Lee and J.C. Lin. A study on the distributed power control for cellular
mobile systems. In Proc. IEEE Vehicular Technology Conference, Atlanta, GA,
USA, April 1996.
T.H. Lee, J.C. Lin, and Y.T. Su. Downlink power control algorithms for cellular
radio systems. IEEE Transactions on Vehicular Technology, 44(1), 1995.
W. C. Y. Lee. Mobile Communications Engineering. McGraw-Hill, 1982.
E.L. Lehmann. Theory of Point Estimation.
Wadsworth & Brooks/Cole, 1991.

Statistical/Probability series.

K.K. Leung. A Kalman-filter method for power control in breadband wireless


networks. In Proc. IEEE InfoCom, New York, NY, USA, March 1999.
J.C. Lin. Power Control Algorithms for Cellular Mobile Systems. PhD thesis, Institute of Electronics National Chiao Tung University, Hsinchu, Taiwan, Republic
of China, June 1995.
L. Lindbom. Simplified Kalman estimation of fading mobile radio channels: High
performance at lms computational loads. In Proc. IEEE International Conference
on Acoustics, Speech, and Signal Processing, Minneapolis, MN, USA, April 1993.
L. Ljung. System Identification Theory for the User. Prentice Hall, Englewood
Cliffs, NJ, USA., second edition, 1999.
B. Magee. Popper. Fontana/Collins, London, United Kingdom, 1973.
G.D. Mandayam. Power control based on radio link protocol in cdma2000. In
Proc. IEEE Wireless Communications and Networking Conference, New Orleans,
LA, USA, September 1999.

Bibliography

237

B.S. Manzanedo, P. Cosimini, J. Irvine, and J. Dunlop. Implementation and


assessment of adaptive power control in a 3rd generation cellular system. In Proc.
IEEE Vehicular Technology Conference, Atlanta, GA, USA, April 1996.
A. McGregor (editor). TAG#5 Response to JTC(AIR)/94.09.23-244R6, 1994. In
JTAC(AIR)/94.10.31-715.
A. Mehrotra. Cellular Radio Performance Engineering. Artech House Publishers,
1994.
M. Mehta, S. Braithwaite, and D. Nunn. Autonomous power control algorithms
for non-geostationary mobile satellite systems. In Proc. IEEE Global Telecommunications Conference, Sydney, Australia, November 1998.
M. Mehta, D. Nunn, and S. Braithwaite. Predictive action power control scheme
for a mobile satellite system. In Proc. IEEE International Conference on Universal
Personal Communications, Cambridge, MA, USA, September 1996.
H.J. Meyerhoff. Method for computing the optimum power balance in multibeam
satellites. COMSAT Technical Review, 4(1), 1974.
D. Mitra. An asynchronus distributed algorithm for power control in cellular
radio systems. In J. M. Holtzman, editor, Wireless and Mobile Communications.
Kluwer Academic Publisher, Boston, MA, USA, 1994.
L.S. Moh, E. Gunawan, B. Soong, and C. Soh. Performance study o close-loop
power control algorithms for a cellular CDMA system. IEEE Transactions on
Vehicular Technology, 48(3), May 1999.
T. Nagatsu, T. Tsuruhara, and M. Sakamoto. Transmitter power control for
cellular land mobile radio. In Proc. IEEE Global Telecommunications Conference,
San Diego, CA, USA, November 1983.
M. Nakagami. The m-distribution, a general formula of intensity of rapid fading.
In W. G. Hoffman, editor, Statistical Methods in Radio Wave Propagation, pages
336. Permagon Press, 1960.
R.W. Nettleton. Traffic theory and interference mangement for a spread-spectrum
cellular radio system. In Proc. ICC80, Seattle, WA, USA, June 1980.
R.W. Nettleton and H. Alavi. Power control for a spread spectrum cellular mobile
radio system. In Proc. IEEE Vehicular Technology Conference, Toronto, Canada,
May 1983.
Y. Okumura, E. Ohmori, T. Kawano, and K. Fukuda. Field strength and its
variability in VHF and UHF land-mobile radio service. Review of the Electrical
Communication Laboratory, 16(9-10), 1968.

238

Bibliography

H. Olofsson. Improved quality estimation for use in simulation of wireless TDMA


systems. In Proc. IEEE International Conference on Universal Personal Communications, San Diego, CA, USA, October 1997.
H. Olofsson, M. Almgren, C. Johansson, M. H
ook, and F. Kronestedt. Improved
interface between link level and system level simulations applied to GSM. In
Proc. IEEE International Conference on Universal Personal Communications,
San Diego, CA, USA, October 1997.
H. Olofsson, J. N
aslund, and J. Sk
old. Interference diversity gain in frequency
hopping GSM. In Proc. IEEE Vehicular Technology Conference, Chicago, IL,
USA, July 1995.
C. L. Phillips and H. T. Nagle. Digital Control System Analysis and Design.
Prentice-Hall, Englewood Cliffs, NJ, USA, second edition, 1990.
L.A. Pipes and S.A. Hovanessian. Matrix computer methods in engineering. J.
Wiley and sons, New York, NY , USA, 1969.
B.T. Polyak and A.B. Juditsky. Acceleration of stochastic approximation by
averaging. SIAM Journal of Control and Optimization, 30, 1992.
J.G. Proakis. Digital Communications. McGraw-Hill, third edition, 1995.
K. Puk. Cellular digital packet data (CDPD) an overview. In T. S. Rappaport,
editor, Cellular Radio & Personal Communications, volume 2, pages 4594. IEEE
Press, Piscataway, NJ, USA, 1996.
S.R. Quackenbush, T.P. Barnwell, and M.A. Clements. Objective Measures of
Speech Quality. Prentice Hall, Englewood Cliffs, NJ, USA, 1988.
D. Ramakrishna, N.B. Mandayam, and R.D. Yates. Subspace based estimation
of the signal to interference ratio for CDMA cellular systems. In Proc. IEEE
Vehicular Technology Conference, Phoenix, AZ, USA, May 1997.
T. S. Rappaport, editor. Cellular Radio & Personal Communications, volume 1.
IEEE Press, Piscataway, NJ, USA, 1995.
F. Rashid-Farrokhi, L. Tassiulas, and K.J.R. Liu. Joint optimal power control
and beamforming in wireless networks using antenna arrays. IEEE Transactions
on Communications, 46(10), 1998.
R. Rezaiifar and J. Holtzman. Proof of convergence for the distributed optimal rate assignment algorithm. In Proc. IEEE Vehicular Technology Conference,
Houston, TX, USA, May 1999.
S. Rice. Statistical properties of a sine wave plus noise. The Bell System Technical
Journal, 27, January 1948.

Bibliography

239

Z. Rosberg and J. Zander. Toward a framework for power control in cellular


systems. Wireless Networks, 4(3), 1998.
W. J. Rugh. Linear System Theory. Prentice Hall, Englewood Cliffs, NJ, USA,
second edition, 1996.
I. Saarinen and A. M
ammela. Channel coding and power control in feedback
communications over a fading channel. In Proc. IEEE Vehicular Technology Conference, Houston, TX, USA, May 1999.
A. Salmasi and S. Gilhousen. On the system design aspects of code division
multiple access (CDMA) applied to digital cellular and personal communications
networks. In Proc. IEEE Vehicular Technology Conference, New York, NY, USA,
May 1991.
A. Sampath, P.S. Kumar, and Holtzman J.M. On setting reverse link target SIR
in a CDMA system. In Proc. IEEE Vehicular Technology Conference, Phoenix,
AZ, USA, May 1997.
J.P.M. Schalkwijk. Recent development in feedback communication. Proceedings
of the IEEE, 57(7), 1969.
C. Scholefield. Evolving GSM data services. In Proc. IEEE International Conference on Universal Personal Communications, San Diego, CA, USA, October
1997.
S.C. Schwartz and Y.S. Yeh. On the distribution function and moments of power
sums with log-normal components. The Bell System Technical Journal, 61(7),
1982.
C.E. Shannon. A mathematical theory of communication. The Bell System Technical Journal, 27, July 1948a.
C.E. Shannon. A mathematical theory of communication. The Bell System Technical Journal, 27, October 1948b.
C.E. Shannon. The zero error capacity of a noisy channel. IRE Transactions On
Information Theory, 2, 1956.
B. Sklar. Rayleigh fading channels in mobile digital communication systems. IEEE
Communications Magazine, 35(7), 1997.
L. Song, N.B. Mandayam, and Z. Gajic. Analysis of an up/down power control
algorithm for the CDMA reverse link under fading. Submitted to IEEE Journal
on Selected Areas in Communications, Wireless Communications Series, 2000.
T.B. Srensen. Correlation model for slow fading in a small urban macro cell. In
Proc. IEEE Personal, Indoor and Mobile Radio Communications, Boston, MA,
USA, September 1998.

240

Bibliography

R. Srinivasan. Feedback communications over fading channels. IEEE Transactions


on Communications, 29(1), 1981.
R. Steele. Mobile Radio Communications. Pentech Press, London, England, 1992.
G. L. St
uber. Principles of Mobile Communication. Kluwer Academic Publisher,
Boston, MA, USA, 1996.
H. Su and E. Geraniotis. Correlation model for slow fading in a small urban macro
cell. In Proc. IEEE Personal, Indoor and Mobile Radio Communications, Boston,
MA, USA, September 1998.
H. Sung and S. Hara. Properties of sensitivity and complimentary sensitivity functions in single-input single-output digital control systems. International Journal
of Control, 48(6), 1988.
F. Swarts, P. van Rooyen, I. Oppermann, and M.P. L
otter, editors. CDMA techniques for third generation mobile systems. Kluwer, Norwell, MA, USA, 1999.
A.S. Tanenbaum. Computer Networks. Prentice Hall, Upper Saddle River, NJ,
USA, 1996.
J. Tanskanen, J. Mattila, M. Hall, T. Korhonen, and S. Ovaska. Predictive estimators in CDMA closed loop power control. In Proc. IEEE Vehicular Technology
Conference, Ottawa, Canada, May 1998.
W. Tchirks. Effects of transmission power control on the cochannel interference
in cellular radio networks. Electrotechnik und Informationstechnik, 106(5), 1989.
TIA/EIA/IS-95. Mobile station - base station compability standard for dual-mode
wideband spread spectrum cellular systems). Technical report, Telecommunications Industry Association, July 1995.
C. Tidestav. The multivariable decision feedback equalizer: Multiuser detection
and interference rejection. PhD thesis, Uppsala University, Sweden, Dcember
1999.
M. T
urkboylari and G.L. St
uber. An efficient algorithm for estimating the signalto-interference ratio in TDMA cellular systems. IEEE Transactions on Communications, 46(6), 1998.
S. Ulukus and R. Yates. Stochastic power control for cellular radio systems. IEEE
Transactions on Communications, 46(6), 1998.
UMTS 30.06. Wideband direct-sequence CDMA (WCDMA). Report TR 101 146
V3.0.0 (1997-12), Concept Group Alpha, ETSI SMG, 1997.
A. Uvliden and R. Bruhn, S.and Hagen. Adaptive multi-rate. A speech service
adapted to cellular radio network quality. In Proc. Asilomar Conference on Signals, Systems & Computers, Pacific Grove, CA, USA, November 1998.

Bibliography

241

A.J. Viterbi. CDMA: Principles of Spread Spectrum Communication. AddisonWesley, Reading, MA , USA, 1995.
J.F. Whitehead. Signal-level-based dynamic power control for co-channel interference management. In Proc. IEEE Vehicular Technology Conference, Secaucus,
NJ, USA, May 1993.
S.H. Won, W.W. Kim, D.H. An, and I.M. Jeong. Capacity enhancement by using
optimum step sizes of controlling target SIR in a CDMA system. In Proc. IEEE
Vehicular Technology Conference, Houston, TX, USA, May 1998.
C.C. Wu and D.P. Bertsekas. Distributed power control algorithms for wireless
networks. In Proc. IEEE Conference on Decision and Control, Phoentix, AZ,
USA, Dec 1999.
R. Yates and C.Y. Huang. Integrated power control and base station assignement.
IEEE Transactions on Vehicular Technology, 44(3), August 1995.
R.D. Yates. A framework for uplink power control in cellular radio systems. IEEE
Journal on Selected Areas in Communications, 13(7), September 1995.
R.D. Yates, S. Gupta, C. Rose, and S. Sohn. Soft dropping power control. In
Proc. IEEE Vehicular Technology Conference, Phoenix, AZ, USA, May 1997.
A. Yener, R. Yates, and S. Ulukus. Joint power control, multiuser detection and
beamforming for CDMA systems. In Proc. IEEE Vehicular Technology Conference, Houston, TX, USA, May 1999.
J. Zander. Distributed cochannel interference control in cellular radio systems.
IEEE Transactions on Vehicular Technology, 41(3), August 1992a.
J. Zander. Performance of optimum transmitter power control in cellular radio
systems. IEEE Transactions on Vehicular Technology, 41(1), February 1992b.
J. Zander. Transmitter power control for co-channel interference management in
cellular radio systems. In Proc. WINLAB Workshop, New Brunswick, NF, USA,
October 1993.
J. Zander. Radio resource management - an overview. In Proc. IEEE Vehicular
Technology Conference, Atlanta, GA, USA, April 1996.
J. Zander. Radio resource management in future wireless networks - requirements
and limitations. IEEE Communications Magazine, 5(8), August 1997.
Y. Zhang and D. Li. Power control based on adaptive prediction in the
CDMA/TDD system. In Proc. IEEE International Conference on Universal Personal Communications, San Diego, CA, USA, October 1997.
K. Zhou, J.C. Doyle, and Glover K. Robust and Optimal Control. Prentice-Hall,
Upper Saddle River, NJ, USA, 1995.

242

Bibliography

Index
AAW algorithm . . 53, 60, 83, 99, 103,
208
adaptive multi-rate see rate adaption
admission control . . . . . . . . . . . . . . . . .40
aliasing. . . . . . . . . . . . . . . . . . . . . . . . . . .92
AMPS . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
antennas. . . . . . . . . . . . . . . . . . . . . .31, 35
anti-reset windup . . . . . . . . . . . 113, 209
attenuation . . . . . . . . . . see power gain
auto-interference . . . . . . . . . 34, 79, 126

controller bandwidth . . . . . . . . 46, 106


convergence. . . . . . . . . . . . .15, 132, 133
D-AMPS . . . . . . . . . . . . . . . . . . . . . 22, 29
DB algorithm . . . . . . . . . . . . . . . . . . . . 50
DCPC algorithm . . . . . . . . . . . . . . . . . 52
deadbeat controller . . . . . . . . . . . . . . 105
decision feedback . . . . . . 10, 45, 47, 59
delay operatorsee time-shift operator
describing function . . . . . . . . . . . . . . . 71
desired signal power . . . . . . . . . . . 9, 33
discrete-time describing function . 12,
74
distributed control . . . . . . . . . . . . . . . 10
disturbance prediction . . . . . . . . . . .110
disturbance rejection . . . . . . . . . . . . 105
diversity. . . . . . . . . . . . . . . . . . . . . . . . . .34
interferer . . . . . . . . . . . . . . . . . . . 186
time . . . . . . . . . . . . . . . . . . . . . . . . 186
dominating poles . . . . . . . . . . . . . . . . 100
downlink channel . . . . . . . . . . . . . . . . . 27
DPC algorithm . . 51, 58, 60, 65, 105,
133, 210
DS-CDMA . . . . . . . . . . . . . . . . 30, 36, 49

backward-shift operator . . . . . . . . . .see


time-shift operator
balanced SIR . . . . . . . . . . . . 14, 50, 128
banana . . . . . . . . . . . . . . . . . . . . . . . . . . 208
base station (BS) . . . . . . . . . 27, 31, 39
bit error probability (BEP) . . . . . . 186
bit error rate (BER) . . . . 24, 179, 184
burst . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
C/I . . . . . . . . . . . . . . . . . . . . . . . . . see SIR
carrier-to-interference ratio . . see SIR
cascade control . . . . . . . . . . . . . . . . . . . 46
CDMA . . . . . . . . . . . . . . . . . . . . . . . 30, 49
CDPD . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
cell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
channel . . . . . . . . . . . . . . . 23, 27, 32, 39
channel allocation
dynamic . . . . . . . . . . . . . . . . . . . . . 40
fixed . . . . . . . . . . . . . . . . . . . . . . . . . 39
random . . . . . . . . . . . . . . . . . . . . . . 40
characteristic polynomial . . . . . . . . . 67
circuit switching . . . . . . . . . . . . . . . . . . 23
closed-loop poles . . . . . . . . . . . . . . . . . 67
closed-loop system. . . . . . . . . . . . . . . .67
co-channel interference . . . . . . . . . . . see
interference
constraints . . . . . . . . . . . . . . . . 45, 52, 63

exponential forgetting . . . . . . . . . . . . 64
fading . . . . . . . . . . . . . . . . . . . . .26, 27, 34
multipath . . . . . . . . . . . . . . . . 27, 88
shadow. . . . . . . . . . . . . . . . . . .26, 87
fading margin . . . . . . . . . . . . . . . . . . . 194
FDMA . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
feasibility . . . . . . . . . . . . . . . . 15, 50, 128
feasibility margin . . . . . . . . . . . 128, 152
feedback bandwidth . . . . . . . . . . . . . . 45
filter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
separate . . . . . . . . . . . . . . . . . . . . . 64
forgetting factor . . . . . . . . . . . . . . . . . . 64

243

244

forward channel . . . . . . . . . . . . . . . . . . 27
forward-shift operator . see time-shift
operator
frame . . . . . . . . . . . . . . . . . . . . . . . . . . . 184
frame erasure rate (FER) . . . . . . . 184
frequency hopping . . . . . . . 29, 35, 204
frequency modulation (FM) . . . . . . 24
FSPC algorithm . 52, 58, 60, 77, 109,
134, 211
G-matrix . . . . . . . . . . . . . . . 9, 32, 41, 42
gain margin . . . . . . . . . . . . . . . . . . 68, 71
global system. . . . . . . . . . . . . . . . . . . . .11
global system poles . . . . . . . . . . . . . .139
GPRS . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Grade of Service (GoS) . . . . . . . . . . . 38
GSM . . . . . . . . . . . . . . . . . . . . . . . 185, 204
data services . . . . . . . . . . . . . . . . . 23
frequency hopping . . . . . . . .29, 35
measurements . . . . . . . . . . . . . . 179
multiple access . . . . . . . . . . . . . . .29
quality measure. . . . . . . . . . . . .189
handoff . . . . . . . . . . . . . . . . see handover
handover . . . . . . . . . . . . . . . . . . . . . . . . . 39
soft . . . . . . . . . . . . . . . . . . . . . . . . . . 39
softer . . . . . . . . . . . . . . . . . . . . . . . . 39
HSCSD . . . . . . . . . . . . . . . . . . . . . . . . . . 23
HSD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
I-controller .60, 68, 98, 101, 105, 132,
144, 145, 207
information feedback . . 10, 45, 47, 59
inner loop . . . . . . . . . . . . . . . . . . . . . . . . 46
instability. . . . . . . . . . . . . . . .11, 66, 210
interference . . . . . . . . . . . . . . . . . . . . 9, 33
linearization . . . . . . . . . . . . 15, 140
interference function . . . . . . . . . . . . 131
interference-limited system . . . . . . . 33
interleaving . . . . . . . . . . . . . . . . . . 35, 185
IS-136 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
IS-54 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
IS-95 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
limit cycles . . . . . . . . . . . . . . . . . . . . . . . 72
Line-of-Sight (LoS) . . . . . . . . . . . 27, 88

Index

linear scale . . . . . . . . . . . . . . . . . . . . . . . . 8
linearization . . . . . . . . . . . . . . . . . 15, 140
local average . . . . . . . . . . . . . . . . . . . . . 63
local loop . . . . . . . . . . . . . . . . . . . . . . . . 56
local loop poles . . . . . . . . . . . . . . . . . 139
local loops . . . . . . . . . . . . . . . . . . . . . . . 11
logarithmic scale . . . . . . . . . . . . . . . . . . 8
measurement errors . . . . . . . . . . . . . 108
measurement report . . . . . . . . . 45, 179
minimum-variance control . . . . . . . 112
ML estimation . . . . . . . . . . . . . . . . . . 169
mobile station (MS) . . . . . . . . . . . . . . 27
MOSE . . . . . . . . . . . . . . . . . . . . . 200, 214
multipath fading . . . . . . . . . . . . . . . . . see
fading,multipath
multiple access interference . . . . . . see
interference
near-far effect . . . . . . . . . . . . . . . . . . . . 30
NMT. . . . . . . . . . . . . . . . . . . . . . . . . . . . .22
noise-limited system . . . . . . . . . . . . . . 33
non-orthogonal signals . . . . . . . . 29, 42
nonlinear . . . . . . . . . . . . . . . . . . . . . . . . 113
nonlinearities . . . . . . . . . . . . . . . . . . . . . 63
optimal balanced SIR . . . . . . . . 14, 125
orthogonal signals . . . . . . . . . . . . 28, 41
oscillations . . . . . . . . . . . . . . . . . . . . . . . 72
outer loop . . . . . . . . . . . . . . . . . . . . . . . . 46
packet switching . . . . . . . . . . . . . . . . . .23
path loss . . . . . . . . . . . . . . . . . . . . . . . . . 26
PI-controller . . 99, 102, 105, 209, 210
point-mass approximation . . . . . . . 166
pole placement . . . . . . . . . . . . . . . . . . . 98
poles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67
power control algorithm . . . 40, 47, 59
aspects of . . . . . . . . . . . . . . . . . . . . 43
asynchronous . . . . . . . . . . . . . . . . 51
centralized . . . . . . . . . . . . . . . . . . . 44
decentralized . . . . . . . . . . . . . . . . 44
log-linear . . . . . . . . . . . . 64, 98, 104
stability . . . . . . . . . . . . . . . . . . . . . 68
power control problem . . . . . . . . . . 128
power gain. . . . . . . . . . . . . . . . . . . .25, 32

Index

multipath fading . . . . . . . . . . . . . 27
path loss. . . . . . . . . . . . . . . . . . . . .26
shadow fading . . . . . . . . . . . . . . . 26
prefilter . . . . . . . . . . . . . . . . . . . . . . . . . 116
processing gain (PG) . . . . . . . . . 30, 43
proper . . . . . . . . . . . . . . . . . . . . . . . . . . . 66
q. . . . . . . . . . . . .see time-shift operator
QI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
quality
measure . . . . . . . . . . . . 45, 183, 189
of service. . . . . . . . . . . . . . . . .38, 41
radio channel . . . . . . . . . . . . . . . . . . . . . 23
radio communication . . . . . . . . . . . . . 23
radio resource management . . . . . . . 37
radio wave propagation . . . . . . . . . . . 25
rate adaption . . . . . . . . . . . . . . . . . . . 194
Rayleigh fading see fading,multipath
receiver . . . . . . . . . . . . . . . . . . . . . . . . . . 23
relative load . . . . . . . . . . . . . . . . . 14, 129
relay . . . . . . . . . . . . . . . . . . . . . 63, 76, 115
removal control . . . . . . . . . . . . . . . . . . . 40
resource allocation algorithm . . . . . 39
reuse . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
reverse channel . . . . . . . . . . . . . . . . . . . 27
rise time . . . . . . . . . . . . . . . . . . . . . . . . 100
robust stability . . . . . . . . . . . . . . . . . . 142
root locus analysis . . . . . . . . . . . . 12, 68
RSSI . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
RXLEV . . . . . . . . . . . . . . . . . . . . 167, 179
RXQUAL . . . . . . . . . . . . . . . . . . 167, 179
sample interval . . . . . . . . . . . . . . 11, 108
Seinfeld . . . . . . . . . . . . . . . . . . . . . . . . . . 38
selector . . . . . . . . . . . . . . . . . . . . . . . . . 114
shadow fading . . . . see fading,shadow
sign function . . . . . . . . . . . . . . . see relay
signal-to-interference ratio. . .see SIR
signal-to-noise ratio (SNR) . . . . . 8, 47
SIR . . . . . . . . . . . . . . . . . . . . 9, 34, 40, 43
SIR target. . . . . . . . . . . .see target SIR
soft handover . . . . . . see handover,soft
softer handover . . see handover,softer
spatial frequency . . . . . . . . . . . . . . . . . 87

245

speech quality measures . . . . 182, 189


stability. . . . . . . . . . . . . . . . . . .11, 15, 66
stability margin . . . . . . . . . . . . . . . . . . 68
strictly proper . . . . . . . . . . . . . . . . . . . . 66
switch . . . . . . . . . . . . . . . . . . . . . . . . . . .114
target SIR . 10, 14, 50, 126, 190, 193,
203
TDC . . . . . . 13, 92, 105, 133, 134, 211
TDMA . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
temporal frequency . . . . . . . . . . . . . . . 87
time delay compensation . . . see TDC
time delays . . . . . . . . . . . . 11, 45, 58, 61
time slot . . . . . . . . . . . . . . . . . . . . . . . . . 28
time-shift operator . . . . . . . . . . . . . . . 62
transfer function . . . . . . . . . . . . . . . . . 67
transmitter . . . . . . . . . . . . . . . . . . . . . . . 23
uplink channel . . . . . . . . . . . . . . . . . . . 27
WCDMA . . . . . . . . . . . . . . . . . . . . 23, 211
z . . . . . . . . . . . . . see time-shift operator

PhD Dissertations, Division of Automatic Control, Link


oping University
M. Millnert: Identification and control of systems subject to abrupt changes. Thesis
no. 82, 1982. ISBN 91-7372-542-0.
A.J.M. van Overbeek: On-line structure selection for the identification of multivariable
systems. Thesis no. 86, 1982. ISBN 91-7372-586-2.
B. Bengtsson: On some control problems for queues. Thesis no. 87, 1982. ISBN
91-7372-593-5.
S. Ljung: Fast algorithms for integral equations and least squares identification problems.
Thesis no. 93, 1983. ISBN 91-7372-641-9.
H. Jonson: A Newton method for solving non-linear optimal control problems with
general constraints. Thesis no. 104, 1983. ISBN 91-7372-718-0.
E. Trulsson: Adaptive control based on explicit criterion minimization. Thesis no. 106,
1983. ISBN 91-7372-728-8.
K. Nordstr
om: Uncertainty, robustness and sensitivity reduction in the design of single
input control systems. Thesis no. 162, 1987. ISBN 91-7870-170-8.
B. Wahlberg: On the identification and approximation of linear systems. Thesis no.
163, 1987. ISBN 91-7870-175-9.
S. Gunnarsson: Frequency domain aspects of modeling and control in adaptive systems.
Thesis no. 194, 1988. ISBN 91-7870-380-8.
A. Isaksson: On system identification in one and two dimensions with signal processing
applications. Thesis no. 196, 1988. ISBN 91-7870-383-2.
M. Viberg: Subspace fitting concepts in sensor array processing. Thesis no. 217, 1989.
ISBN 91-7870-529-0.
K. Forsman: Constructive commutative algebra in nonlinear control theory. Thesis no.
261, 1991. ISBN 91-7870-827-3.
F. Gustafsson: Estimation of discrete parameters in linear systems. Thesis no. 271,
1992. ISBN 91-7870-876-1.
P. Nagy: Tools for knowledge-based signal processing with applications to system identification. Thesis no. 280, 1992. ISBN 91-7870-962-8.
T. Svensson: Mathematical tools and software for analysis and design of nonlinear
control systems. Thesis no. 285, 1992. ISBN 91-7870-989-X.
S. Andersson: On dimension reduction in sensor array signal processing. Thesis no.
290, 1992. ISBN 91-7871-015-4.
H. Hjalmarsson: Aspects on incomplete modeling in system identification. Thesis no.
298, 1993. ISBN 91-7871-070-7.
I. Klein: Automatic synthesis of sequential control schemes. Thesis no. 305, 1993. ISBN
91-7871-090-1.
J.-E. Str
omberg: A mode switching modelling philosophy. Thesis no. 353, 1994. ISBN
91-7871-430-3.
K. Wang Chen: Transformation and symbolic calculations in filtering and control.
Thesis no. 361, 1994. ISBN 91-7871-467-2.
T. McKelvey: Identification of state-space models from time and frequency data. Thesis
no. 380, 1995. ISBN 91-7871-531-8.

J. Sj
oberg: Non-linear system identification with neural networks. Thesis no. 381, 1995.
ISBN 91-7871-534-2.
R. Germundsson: Symbolic systems theory, computation and applications. Thesis
no. 389, 1995. ISBN 91-7871-578-4.
P. Pucar: Modeling and segmentation using multiple models. Thesis no. 405, 1995.
ISBN 91-7871-627-6.
H. Fortell: Algebraic approaches to normal forms and zero dynamics. Thesis no. 407,
1995. ISBN 91-7871-629-2.
A. Helmersson: Methods for robust gain scheduling. Thesis no. 406, 1995. ISBN
91-7871-628-4.
P. Lindskog: Methods, algorithms and tools for system identification based on prior
knowledge. Thesis no. 436, 1996. ISBN 91-7871-424-8.
J. Gunnarsson: Symbolic methods and tools for discrete event dynamic systems. Thesis
no. 477, 1997. ISBN 91-7871-917-8.
M. Jirstrand: Constructive methods for inequality constraints in control. Thesis no.
527, 1998. ISBN 91-7219-187-2.
U. Forssell: Closed-loop identification: methods, theory, and applications. Thesis no.
566, 1999. ISBN 91-7219-432-4.
A. Stenman: Models on demand: algorithms, analysis and applications. Thesis no. 571,
1999. ISBN 91-7219-450-2.
N. Bergman: Recursive Bayesian estimation: navigation and tracking applications.
Thesis no. 579, 1999. ISBN 91-7219-473-1.
K. Edstr
om: Switched bond graphs: simulation and analysis. Thesis no. 586, 1999.
ISBN 91-7219-493-6.
M. Larsson: Behavioral and Structural Model Based Approaches to Discrete Diagnosis.
Thesis no. 608, 1999. ISBN 91-7219-616-5.

You might also like