15
1 Power-Efficient Resource Allocation in C-RANs with SINR Constraints and Deadlines Salvatore D’Oro, Marcelo Antonio Marotta , Cristiano Bonato Both , Luiz DaSilva, Sergio Palazzo Abstract—In this paper, we address the problem of power- efficient resource management in Cloud Radio Access Networks (C-RANs). Specifically, we consider the case where Remote Radio Heads (RRHs) perform data transmission, and signal processing is executed in a virtually centralized Base-Band Units (BBUs) pool. Users request to transmit at different time instants; they demand minimum signal-to-noise-plus-interference ratio (SINR) guarantees, and their requests must be accommodated within a given deadline. These constraints pose significant challenges to the management of C-RANs and, as we will show, considerably impact the allocation of processing and radio resources in the network. Accordingly, we analyze the power consumption of the C-RAN system, and we formulate the power consumption minimization problem as a weighted joint scheduling of processing and power allocation problem for C-RANs with minimum SINR and finite horizon constraints. The problem is a Mixed Integer Non-Linear Program (MINLP), and we propose an optimal offline solution based on Dynamic Programming (DP). We show that the optimal solution is of exponential complexity, thus we propose a sub- optimal greedy online algorithm of polynomial complexity. We assess the performance of the two proposed solutions through extensive numerical results. Our solution aims to reach an ap- propriate trade-off between minimizing the power consumption and maximizing the percentage of satisfied users. We show that it results in power consumption that is only marginally higher than the optimum, at significantly lower complexity. Index Terms—Cloud Radio Access Networks, resource alloca- tion, energy efficiency. I. I NTRODUCTION Cloud Radio Access Networks (C-RANs) are expected to provide unprecedented scalable, flexible, and efficient infras- tructure provisioning and management in future 5G networks and beyond [1–3]. In C-RANs, a set of Remote Radio Heads (RRHs) perform radio transmissions, while signal processing, e.g., base band processing, is executed in a pool of one or more Base Band Units (BBUs) as a cloud system [4–6]. RRHs and BBUs are interconnected through high-speed optical fiber Copyright (c) 2015 IEEE. Personal use of this material is permitted. How- ever, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to [email protected]. S. D’Oro is with the Institute for the Wireless Internet of Things, Northeast- ern University, Boston, USA, email: [email protected]; S. Palazzo is with the Dipartimento di Ingegneria Elettrica, Elettronica e Informatica, CNIT Research Unit, University of Catania, Italy, email: ser- [email protected]; M. A. Marotta is with the University of Brasilia, Brazil, email: [email protected]; Cristiano B. Both is with the Applied Computing Graduate Program at University of Vale do Rio dos Sinos (UNISINOS), Brazil, email: cb- [email protected]; L. DaSilva is with the CONNECT Research Centre at Trinity College Dublin, Ireland, email: [email protected]. This work was partially supported by the Science Foundation Ireland under grant number 13/RC/2077, SFI Research Centre CONNECT. links, which makes it possible to meet the high-performance requirements of 5G networks, thus guaranteeing low latency and high-rate data transmission [7]. C-RANs can achieve a considerable reduction of both CAPEX and OPEX while providing efficient and smart man- agement of network resources. Since the signal processing is performed in the BBU pool, the RRHs are characterized by a simple transceiver design. In addition, by exploiting the cen- tralized architecture of the BBU pool, it is possible to perform advanced and efficient signal processing techniques that require coordination. For example, Coordinated Multipoint (CoMP) and Joint Transmission (JT) can be implemented to reduce in- terference and improve the spectral efficiency of the system. To process a given user transmission in C-RAN environments, the system: i) allocates the user to the available downlink channels; ii) selects the subset of active RRHs which will transmit to the corresponding user, and determines the transmission power level of those RRHs; and iii) runs a Virtual Function (VF) [8], or creates a Virtual Machine (VM) [9] instance in the BBU pool, to which a given amount of computational resources is assigned. In the remainder of this paper, we do not distinguish between virtual functions and virtual machines, and we refer to both of them as VMs. To take full advantage of C-RANs, green and lightweight management of network resources has to be considered [10]. However, C-RANs comprise heterogeneous network elements, which makes the design of energy-efficient algorithms a chal- lenging task. As an example, to minimize the power consump- tion of the whole C-RAN system, both radio and computational resources must be managed jointly. That is, the activation and management of RRHs have to be addressed together with the efficient allocation of the computational resources in the BBU pool. This problem is not trivial, and it is further exacerbated when minimum Quality of Service (QoS) requirements, such as temporal deadlines and Signal-to-interference-plus-noise ratio (SINR), are considered [11]. Due to its complexity and im- portance, many solutions to the green management of C-RANs have been proposed in the literature [9, 12–20]. However, those solutions have not been designed to deal with the relevant case of finite-horizon scheduling problems. Thus, they are expected to be sub-optimal when user transmission requests dynamically arrive at different time instants and have to be accommodated within a given deadline. In this paper, we design an optimal green mechanism for such a dynamic scenario. Specifically, we analyze the case where subscribers dynamically submit transmission requests, coupled with the corresponding requirements regarding mini- mum average SINR and a delivery deadline. We formulate the arXiv:1904.10813v1 [cs.NI] 24 Apr 2019

Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

1

Power-Efficient Resource Allocation in C-RANs withSINR Constraints and Deadlines

Salvatore D’Oro, Marcelo Antonio Marotta , Cristiano Bonato Both , Luiz DaSilva, Sergio Palazzo

Abstract—In this paper, we address the problem of power-efficient resource management in Cloud Radio Access Networks(C-RANs). Specifically, we consider the case where Remote RadioHeads (RRHs) perform data transmission, and signal processingis executed in a virtually centralized Base-Band Units (BBUs)pool. Users request to transmit at different time instants; theydemand minimum signal-to-noise-plus-interference ratio (SINR)guarantees, and their requests must be accommodated within agiven deadline. These constraints pose significant challenges to themanagement of C-RANs and, as we will show, considerably impactthe allocation of processing and radio resources in the network.Accordingly, we analyze the power consumption of the C-RANsystem, and we formulate the power consumption minimizationproblem as a weighted joint scheduling of processing and powerallocation problem for C-RANs with minimum SINR and finitehorizon constraints. The problem is a Mixed Integer Non-LinearProgram (MINLP), and we propose an optimal offline solutionbased on Dynamic Programming (DP). We show that the optimalsolution is of exponential complexity, thus we propose a sub-optimal greedy online algorithm of polynomial complexity. Weassess the performance of the two proposed solutions throughextensive numerical results. Our solution aims to reach an ap-propriate trade-off between minimizing the power consumptionand maximizing the percentage of satisfied users. We show that itresults in power consumption that is only marginally higher thanthe optimum, at significantly lower complexity.

Index Terms—Cloud Radio Access Networks, resource alloca-tion, energy efficiency.

I. INTRODUCTION

Cloud Radio Access Networks (C-RANs) are expected toprovide unprecedented scalable, flexible, and efficient infras-tructure provisioning and management in future 5G networksand beyond [1–3]. In C-RANs, a set of Remote Radio Heads(RRHs) perform radio transmissions, while signal processing,e.g., base band processing, is executed in a pool of one ormore Base Band Units (BBUs) as a cloud system [4–6]. RRHsand BBUs are interconnected through high-speed optical fiber

Copyright (c) 2015 IEEE. Personal use of this material is permitted. How-ever, permission to use this material for any other purposes must be obtainedfrom the IEEE by sending a request to [email protected].

S. D’Oro is with the Institute for the Wireless Internet of Things, Northeast-ern University, Boston, USA, email: [email protected];

S. Palazzo is with the Dipartimento di Ingegneria Elettrica, Elettronica eInformatica, CNIT Research Unit, University of Catania, Italy, email: [email protected];

M. A. Marotta is with the University of Brasilia, Brazil, email:[email protected];

Cristiano B. Both is with the Applied Computing Graduate Programat University of Vale do Rio dos Sinos (UNISINOS), Brazil, email: [email protected];

L. DaSilva is with the CONNECT Research Centre at Trinity College Dublin,Ireland, email: [email protected].

This work was partially supported by the Science Foundation Ireland undergrant number 13/RC/2077, SFI Research Centre CONNECT.

links, which makes it possible to meet the high-performancerequirements of 5G networks, thus guaranteeing low latencyand high-rate data transmission [7].

C-RANs can achieve a considerable reduction of bothCAPEX and OPEX while providing efficient and smart man-agement of network resources. Since the signal processing isperformed in the BBU pool, the RRHs are characterized by asimple transceiver design. In addition, by exploiting the cen-tralized architecture of the BBU pool, it is possible to performadvanced and efficient signal processing techniques that requirecoordination. For example, Coordinated Multipoint (CoMP)and Joint Transmission (JT) can be implemented to reduce in-terference and improve the spectral efficiency of the system. Toprocess a given user transmission in C-RAN environments, thesystem: i) allocates the user to the available downlink channels;ii) selects the subset of active RRHs which will transmit tothe corresponding user, and determines the transmission powerlevel of those RRHs; and iii) runs a Virtual Function (VF) [8], orcreates a Virtual Machine (VM) [9] instance in the BBU pool, towhich a given amount of computational resources is assigned.In the remainder of this paper, we do not distinguish betweenvirtual functions and virtual machines, and we refer to both ofthem as VMs.

To take full advantage of C-RANs, green and lightweightmanagement of network resources has to be considered [10].However, C-RANs comprise heterogeneous network elements,which makes the design of energy-efficient algorithms a chal-lenging task. As an example, to minimize the power consump-tion of the whole C-RAN system, both radio and computationalresources must be managed jointly. That is, the activation andmanagement of RRHs have to be addressed together with theefficient allocation of the computational resources in the BBUpool. This problem is not trivial, and it is further exacerbatedwhen minimum Quality of Service (QoS) requirements, such astemporal deadlines and Signal-to-interference-plus-noise ratio(SINR), are considered [11]. Due to its complexity and im-portance, many solutions to the green management of C-RANshave been proposed in the literature [9, 12–20]. However, thosesolutions have not been designed to deal with the relevant caseof finite-horizon scheduling problems. Thus, they are expectedto be sub-optimal when user transmission requests dynamicallyarrive at different time instants and have to be accommodatedwithin a given deadline.

In this paper, we design an optimal green mechanism forsuch a dynamic scenario. Specifically, we analyze the casewhere subscribers dynamically submit transmission requests,coupled with the corresponding requirements regarding mini-mum average SINR and a delivery deadline. We formulate the

arX

iv:1

904.

1081

3v1

[cs

.NI]

24

Apr

201

9

Page 2: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

2

power consumption minimization problem for C-RANs as aweighted joint power allocation and user scheduling problem.By considering that the BBU pool has limited computationalresources, we account for both temporal and SINR constraints,and we show that the problem can be formalized as a MixedInteger Non-Linear Problem (MINLP). For such a problem,we provide an optimal offline solution based on DynamicProgramming (DP) techniques. We show that its computationalcomplexity is exponential, which makes it unfeasible to obtainan optimal solution in large-scale and dense networks within areasonable amount of time. Accordingly, we design a greedyonline algorithm of polynomial computational complexity. Weassess and compare the performance of the two proposed solu-tions through extensive numerical results. Our solution aims toreach an appropriate trade-off between minimizing the powerconsumption and maximizing the percentage of satisfied users.Our proposed algorithm results in power consumption that isonly marginally higher than the optimum, at significantly lowercomplexity.

The remainder of this paper is organized as follows. Relatedwork is presented in Section II. Section III illustrates the consid-ered C-RAN, and the corresponding power consumption analy-sis. The weighted joint power allocation and user scheduling areformulated in Section IV. Section V provides the optimal offlinesolution to the problem. A sub-optimal online solution withpolynomial complexity is proposed in Section VI. Numericalresults are presented in Section VII. Finally, in Section VIII weoutline our main conclusions.

II. RELATED WORK

The problem of providing power-efficient 5G systems un-der QoS constraints through joint user transmission schedul-ing and power allocation has been extensively addressed inthe literature. As an example, the downlink joint power andwireless resource allocation problem in C-RANs under min-imum SINR constraints has been considered in [12–16]. In[9], a cross-layer approach for the power-efficient allocationof network resources is considered where both the RRHs andthe BBU pool are assumed to have limited computational andhardware resources. The same problem is also addressed andsolved in [17] where, instead, a requirement on the desiredtask completion time is considered. A different approach iscontemplated in [18], where power control and caching at theRRHs are exploited to provide mobile users with minimum QoSguarantees. In contrast, a fractional programming approach isproposed in [19] to maximize the energy efficiency of thenetwork. Those works focus on minimizing the actual overallpower consumption of the network. However, it is worth notingthat the consumed power of each network element can besignificantly different. As an example, the power needed toactivate the optical fibers between the BBU pool and the RRHscan be significantly lower than the power needed to activatethe RRHs [20]. Accordingly, a more general approach consistsin the minimization of a weighted version of the actual powerconsumption. Such an approach is considered in [21], where theweighted power consumption of the network is minimized byjointly addressing the power and resource allocation problemsfor both downlink and uplink communications.

Fig. 1. The considered C-RAN scenario.

Though optimal, most of the above solutions do not considerlimited computational resources at the BBU pool. Furthermore,they have not been designed to deal with finite-horizon schedul-ing problems, where user transmission requests dynamically ar-rive and have to be scheduled within a deadline. The schedulingproblem for C-RANs over a finite horizon has been consideredin [22, 23]. However, the solution in [22] only focuses on theBBU pool and does not consider the power consumption of theRRHs, while [23] does not account for CoMP transmissions,and the power consumption is restricted to the transmissionpower only.

The above literature review reveals that the problem ofminimizing the power consumption of C-RANs over a finite-horizon through joint RRH and BBU management is worth in-vestigating. It also shows that further efforts are needed, as noneof the above solutions can be readily applied to optimally solvethe finite-horizon power minimization problem we consider inthis paper.

III. SYSTEM MODEL

We study a C-RAN scenario where mobile users access thenetwork using several RRHs which are connected to a BBUpool through high-speed optical links, as shown in Fig. 1.We consider a a time slotted multi-carrier (or multi-frequency)system where a set S of subcarriers are available for datatransmission. In this work, we focus on the downlink com-munications between RRHs and mobile users. We assumethat the allocation of downlink resources has to be performedover a finite horizon. The finite-horizon concept captures timerequirements in those scenarios where channel gain coefficientsor user positions change every T slots (e.g., slow-fading orblock-fading scenarios). Let T = {1, 2, . . . , T} denote the setof time slots within the horizon.

A. Modeling Mobile Users

LetN be the set of mobile users in the network. One or moreRRHs can serve each user n ∈ N . In the following, we assumethat mobile users are equipped with single-antenna transceivers,which at any given time instant can only receive signals on asingle subcarrier.

Each user transceiver generates one (or more) request-to-transmit to the Telecommunications Operator (TO). Specifi-cally, each request contains the following parameters:

Page 3: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

3

• Requesting User: it is the mobile user n who sends therequest r ∈ Rn.

• Deadline: mobile users’ requests have to be accommo-dated by 1) instantiating a VM in the BBU pool to processuser signals; and 2) scheduling downlink transmissionsthrough one (or more) RRHs for the whole duration of atime slot [9] within a given temporal window. For eachrequest, the temporal window is defined by the 2-tuple(t0r, δr), where t0r represents the arrival time slot of therequest, and δr is the duration of the temporal windowwithin which the request must be accommodated.

• SINR Constraint: it represents the minimum average SINRlevel γr that has to be guaranteed to request r.

• Computational Resources: they represent the amount mr

of computational resources to run a VM in the BBUpool for request r. In general, the higher the value ofγr, the higher the value of mr, i.e., mr = f(γr) with∂f(γr)/∂γr ≥ 0. Such an assumption stems from the ev-idence that large values of γr require the BBU pool to runmore complex signal processing operations. Accordingly,mr can be modeled as follows [24, 25]:

mr = mVM + θ log2(1 + γr) (1)

where mVM is a constant term that represents the amountof resources needed to activate a VM and perform sig-nal processing (e.g., modulation, encoding, Fast FourierTransform, etc..), and θ > 0 is a weighting parameter tovary the slope of the function mr [25]. It is worth notingthat (1) quantifies the amount of computational resourcesin the BBU pool to be allocated to a given request thatdemands a minimum SINR level γr. How to satisfy theaforementioned SINR requirement will be the main topicof Sections V and VI, where joint power and channelallocation is effectively used to satisfy users’ requestswhile minimizing the power consumption of the system.

• Channel State Information (CSI): at each time slot t, thechannel is modeled through its channel coefficient hrjs(t),which represents the channel between the mobile user whohas made the request r and the RRH j on subcarrier sat time slot t. For clarity of notation, we introduce thechannel gain coefficient grjs = |hrjs|2. Accordingly, theCSI is represented by the channel gain coefficient matrixGr(t) = (grjs(t))j∈H,s∈S,t∈T . We assume block-fading,i.e., channel gain coefficients remain constant within eachtime slot t.

Without loss of generality, in the following we omit the timeslot indicator t and we focus on the case where channel gaincoefficients do not vary within the horizon, i.e., grjs(t) =grjs(t

′) = grjs for all t, t′ ∈ T . However, the solutionsproposed in this paper also apply to the more general casewhere channel gain coefficients vary at each time slot. Accord-ingly, each request r ∈ Rn is defined by the 6-tuple r =(n, t0r, δr, γr,mr,Gr

). Also, we assume that CSI information

is always available to the system through pilot-based [26, 27] orstatistical [28, 29] approaches. However, we do not make anyassumption on the accuracy of the CSI estimation procedure.

B. Modeling RRHs

RRHs are equipped with multiple antennas and are capableof performing simultaneous transmissions on multiple subcarri-ers. However, due to hardware limitations, RRHs are required tosatisfy a power constraint. Specifically, at each time slot t, thetotal transmission power for each RRH j has to be lower thanor equal to an RRH-specific maximum transmission power levelPj . RRHs are connected to the BBU pool through high-speedoptical fiber links.

C. Modeling the BBU pool

The BBU pool is the centralized entity where signal pro-cessing is performed. Through centralized processing, it ispossible to exploit advanced signal processing techniques suchas CoMP and JT. Hence, to improve the SINR and reducethe interference with other mobile users connected to adjacentRRHs, in this work we exploit both techniques to provideJT-CoMP transmissions where several RRHs simultaneouslytransmit the same signal to a given user. When a given request isscheduled, a VM instance on the BBU pool is instantiated, and agiven amount of computational resources in the pool is assignedto it. Specifically, for each request the system: 1) allocates adownlink time slot on a given subcarrier to the correspondingmobile user; 2) selects the subset of active RRHs which willtransmit to the corresponding mobile user, and determinestheir optimal transmission power levels; and 3) creates a VMinstance in the BBU pool. Also, we assume that the BBU poolhas a limited amount M of computational resources.

D. Variables Definition

We hereby introduce the relevant variables in our model ofthe C-RAN scenario, which for the sake of clarity are alsosummarized in Table I. Let R =

⋃n∈N Rn be the set of all

the requests sent by mobile users. To model the allocation ofmobile users in the time and frequency domains, we definethe allocation variable ars(t) ∈ {0, 1}, where ars(t) = 1if request r ∈ R is allocated to sub-carrier s ∈ S at timeslot t. Otherwise, ars(t) = 0. Let a = (a(t))t∈T , wherea(t) = (ars(t))r∈R,s∈S . Furthermore, the transmission powerof RRH j on subcarrier s at time slot t is defined as thecontinuous variable prjs(t) ∈ [0, Pj ]. Let p = (p(t))t∈T ,where p(t) = (prjs(t))r∈R,j∈H,s∈S .

To model the selection (i.e., activation) of an RRH, wedefine the following activation indicator yj(t) ∈ {0, 1}, whereyj(t) = 1 if RRH j is transmitting at time slot t. Otherwise,yj(t) = 0. Let y = (y(t))t∈T , where y(t) = (yj(t))j∈H.

Accordingly, for each r ∈ R and s ∈ S , the average SINRcan be written as follows:

SINRrs(t) =

∑j∈H prjs(t)grjs

σ2 +∑j∈H

∑r′∈R,r′ 6=r pr′js(t)grjs

(2)

where σ2 is the noise power on the considered subcarrier, andgrjs is the expected channel gain coefficient w.r.t. the mobileuser which requested r and the RRH j on subcarrier s.

Page 4: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

4

TABLE ISUMMARY OF NOTATION

Variable DescriptionN ,H, S,R Sets of users, RRHs, subcarriers and requestsPj Maximum transmission power level of an RRH

t0r, δr Arrival time of a request and its deadlinemr Amount of computational resources to process a requestGr Channel gain matrix

σ2 Noise power on each subcarrierT Horizon durationγr Minimum average SINR requirementars(t) Allocation variableyj(t) Activation indicatorprjs(t) Transmission power levelM Computational resources of the BBU pool

P(F)j , P

(ON)j , P

(sleep)j Fibers, activation and sleep power costs

P (BBU)(m) Consumed power by the BBU pool whenm resourcesare allocated

CT X , CA, CH Transmission, activation and total power costs

CB Total processing power cost in the BBU poolC Overall weighted power consumption of the networkωR, ωB Weighting parameters

E. Constraints Definition

Under the above assumptions, we define the following con-straints:

1) RRH power constraint: for each activated j ∈ H, theoverall transmission power has to be lower than Pj . Thus,∑r∈R

∑s∈S

prjs(t) ≤ yj(t)Pj , ∀j ∈ H,∀t ∈ T (3)

2) Scheduling constraints: each mobile user has a singleantenna, thus it can be scheduled to a single subcarrier.Also, its request has to be accommodated only once.Furthermore, a given request cannot be scheduled if itscorresponding temporal requirement is not satisfied. Thatis,

T∑t=1

∑s∈S

ars(t) = 1, ∀r ∈ R (4)

Furthermore, ars(t) = 0 and prjs(t) = 0 if t /∈ [t0r, t0r +

δr].3) SINR Constraint: the average SINR for each scheduled

mobile user defined in (2) has to be higher than theminimum QoS requirement γr

SINRrs(t) ≥ γrars(t), ∀s ∈ S,∀r ∈ R,∀t ∈ T (5)

4) BBU bounded computation constraint: the amount ofcomputational resources in the BBU pool is, in general,bounded. Let M be the maximum amount of computa-tional resources which are available in the BBU pool.Accordingly, at each time slot t we have that the amountof resources allocated to requests in R is bounded byM . From constraint (4), this constraint can be defined asfollows: ∑

r∈R

∑s∈S

mrars(t) ≤M, ∀t ∈ T (6)

F. Power Consumption

In the considered scenario, the main sources of power con-sumption can be summarized as follows:• RRH Transmission and Activation: at the RRH side, there

are three main power-consuming processes. First, eachRRH that has been selected for data transmission has to beturned on. Accordingly, there is an activation power costequal to P

(ON)j . Second, when an RRH is turned on, it

is also connected to the BBU pool through optical fibers,which generates a fiber power cost equal to P

(F)j . Note

that P (F)j depends on j as RRHs are located at different

distances from the BBU pool. RRHs which are far awayfrom the BBU require optical amplifiers, additional con-nectors and fibers. Therefore, their P (F)

j will be larger,while nearer RRHs will have a small P (F)

j . The thirdprocess is represented by the transmission power levelsprjs(t).It is worth mentioning that the switch between on/off stateswould be too costly at small time-scales (e.g., data framescale). In fact, RRHs can not be instantaneously turnedon due to hardware constants, which eventually resultsin processing and transmission latency that might not beacceptable for small-scale and fast-varying networks [30].For this reason, and for the sake of generality, we adopta general model where RRHs can be either completelyturned off or put in a sleep state [30]. Accordingly, thepower consumption at time slot t for RRH j ∈ H can beexpressed as follows:

CHj (p(t),y(t)) = CT Xj (p(t)) + ωRCAj (y(t)) (7)

where ωR is a non-negative parameter to weigh the twocontributions in (7), and

CT Xj (p(t)) = yj(t)∑r∈R

∑s∈S

prjs(t) (8)

CAj (y(t)) = yj(t)(P

(ON)j + P

(F)j

)+ (1− yj(t))P (sleep)

j

(9)

where P(sleep)j is the power consumption of the RRH

j when it is put in a sleep state [31, 32]. It is worthmentioning that such an approach is general and alsoallows us to account for a broader range of applications[30]. From (7), the total power consumption for all RRHsat time slot t can be written as

CH(p(t),y(t)) =∑j∈HCHj (p(t),y(t)). (10)

• BBU Allocation: for each scheduled mobile user, a VM hasto be instantiated in the BBU pool. Also, to provide thedesired SINR level to each request r, mr computationalresources must be assigned to a VM. Accordingly, thepower consumption to process request r at the BBU poolcan be expressed as follows:

CBr (a(t)) = P (BBU)∑s∈S

ars(t)mr (11)

Page 5: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

5

where P (BBU) is the per resource power consumption.Thus, the overall power consumption at the BBU pool sideat time slot t is CB(a(t)) =

∑r∈R CBr (a(t)).

Accordingly, we have that the total weighted power con-sumption C(a(t),p(t),y(t)) in the network at time slot t isdefined as follows:

C(a(t),p(t),y(t))

= CT X (p(t)) + ωRCA(y(t)) + ωBCB(a(t)) (12)

where ωB is a non-negative parameter used to weigh the powerconsumption at both the RRH and BBU sides. Accordingly, thetotal weighted power consumption of the C-RAN system withinthe considered time window T is

C(a,p,y) =∑t∈TC(a(t),p(t),y(t)). (13)

Remark 1. The above analysis clearly shows that the powerconsumptions at both RRH and BBU sides are tightly coupled.In fact, wireless transmissions in C-RAN systems not onlyrequire the allocation of a given amount of transmission poweron each RRH, but they also rely on the instantiation of VMsand the allocation of computational resources in the BBUpool. It follows that efficient power management in C-RANsystems requires jointly reducing the power consumption of allnetwork elements in the cloud and the Radio Access Network(RAN). We would also like to point out that the complexity andimportance of such a power minimization problem is furtherexacerbated in the considered finite-horizon scenario, whereoptimal request scheduling is essential to guarantee low powerconsumption in the network. This motivates our work, whoseobjective is to design optimal resource allocation mechanismsthat effectively minimize the power consumption of a C-RANsystem over a finite-horizon while satisfying both SINR andscheduling constraints.

IV. PROBLEM FORMULATION

The problem of finding an optimal allocation of networkresources at both the RRH and BBU sides that minimizesthe weighted power consumption C(a,p,y) while satisfyinguser requirements and system constraints, can be formulated asProblem (A).

(A) : mina,p,y

C(a,p,y)

s.t. Constraints in (3), (4), (5), (6)

ars(t) ∈ {0, 1}, ∀r ∈ R,∀s ∈ S, t ∈ [t0r, t0r + δr] (14)

yj(t) ∈ {0, 1}, ∀j ∈ H,∀t ∈ T (15)∑t/∈[t0r,t0r+δr]

∑s∈S

ars(t) = 0, ∀r ∈ R (16)

∑t/∈[t0r,t0r+δr]

∑s∈S

∑j∈H

prjs(t) = 0, ∀r ∈ R (17)

where a=(a(1),a(2), . . . ,a(T )); y=(y(1),y(2), . . . ,y(T ));and p=(p(1),p(2), . . . ,p(T )).

The power constraint is enforced by Constraint (3). Con-straint (4) ensures that each request is accommodated exactlyonce, and each user is scheduled to only one of the available

subcarriers. The SINR constraint is defined by the non-linearConstraint (5), and Constraint (6) prevents the system fromallocating more computational resources than those availablein the BBU pool. Finally, Constraints (14), (15), (16) and (17)guarantee the feasibility of the solution.

V. OPTIMAL OFFLINE SOLUTION

Problem (A) aims at reducing the weighted power consump-tion of the system while jointly: i) allocating requests to theavailable sub-carriers, ii) activating VMs in the BBU pooland assigning computational resources according to (1), iii)selecting the subset of active RRHs, and iv) controlling theirtransmission power to satisfy QoS requirements. In more detail,Problem (A) is formulated as an MINLP which is well-knownto be NP-hard.

Specifically, Problem (A) is combinatorial, and an exhaus-tive search approach would result in exponential time solu-tions whose application to realistic scenarios is unfeasible. Toovercome the above issues, and to reduce the complexity ofthe optimal solution, we propose the exploitation of DynamicProgramming (DP) techniques. In the remainder of this paper,we assume that a feasible solution to Problem (A) exists. How-ever, the existence of a solution can be verified by executing afeasibility test.

In the language of DP, we define:

• System state: at each time slot t, the state of the system isdefined as the setR(t) of active requests that have not yetbeen accommodated. Specifically, we have that R(t) ={r ∈ R : t ∈ [t0r, t

0r + δr],

∑t−1τ=1

∑s∈S ars(τ) = 0};

• Action: at each time slot t, we need to find the optimalscheduling policy a(t), the subset y(t) of active RRHs toserve those requests, and the transmission power profilep(t). Accordingly, the actions to be taken can be definedas the 3-tuple (a(t),y(t),p(t));

• Single Slot Reward: the single slot reward con-sists in the single slot weighted power consumptionC(a(t),p(t),y(t)) in (12).

Accordingly, to solve the problem through DP, for each timeslot t ∈ T , we write the Bellman’s equation [33] as

J(R(t), t) = mina(t),y(t)

Ψ(a(t),y(t)) + ωRCA(y(t))

+ ωBCB(a(t)) + J(R(t+ 1), t+ 1) (18)

s.t.T∑τ=t

∑s∈S

ars(τ) = 1, ∀r ∈ R(t)∑r∈R(t)

∑s∈S

mrars(t) ≤M

ars(t) ∈ {0, 1}, ∀r ∈ R(t),∀s ∈ Syj(t) ∈ {0, 1}, ∀j ∈ H∑s∈S

ars(t) = 0, ∀r /∈ R(t)

Page 6: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

6

where J(R(T + 1), T + 1) = 0 for allR(T + 1), and

Ψ(a(t),y(t))

= minp(t)

∑r∈R∗(a(t))

∑s∈S∗r (a(t))

∑j∈H∗(y(t))

prjs(t) (19)

s.t.∑

r∈R∗(a(t))

∑s∈S∗r (a(t))

prjs(t) ≤ Pj , ∀j ∈ H∗(y(t))

SINRrs(t) ≥ γr, ∀s ∈ S∗r (a(t)),∀r ∈ R∗(a(t))

prjs(t) = 0, ∀r /∈ R∗(a(t))

prjs(t) = 0, ∀j /∈ H∗(y(t))

prjs(t) = 0, ∀r ∈ R∗(a(t)), s /∈ S∗r (a(t))

where, for any given tuple (a(t),y(t)), R∗(a(t)) = {r ∈R(t) :

∑s∈S ars = 1}, S∗r (a(t)) = {s ∈ S : ars = 1, r ∈

R∗(a(t))}, andH∗(y(t)) = {j ∈ H : yj(t) = 1}.From (2), we have that the SINR constraint in problem

Ψ(a(t),y(t)) is non-linear. However, the same constraint canbe expressed through the equivalent linear inequality∑

j∈H∗(y(t))

prjs(t)grjs

−γrars(t)

σ2+∑

j∈H∗(y(t))

∑r′∈R∗(a(t))

r′ 6=r

pr′js(t)grjs

≥ 0 (20)

Since the problem Ψ(a(t),y(t)) is a minimization one,it is straightforward to show that the SINR constraint is anactive constraint, i.e., the optimal solution of the problemΨ(a(t),y(t)) implies that the SINR constraint in (20) must bemet with equality. Accordingly, the problem Ψ(a(t),y(t)) canbe restated as a Linear Programming (LP) one. Specifically,it can be easily shown that the objective function and allconstraints in Ψ(a(t),y(t)) are convex functions. Therefore,the LP problem is also convex, and any feasible local minimumsolution is also a global solution to the problem. For anygiven tuple (a(t),y(t)) and time slot t, we solve the single-stage power control problem Ψ(a(t),y(t)) by using standardinterior-point or simplex methods.

By exploiting DP, it is possible to obtain the optimal solutionto the weighted power consumption minimization problem.Specifically, at each stage, we consider all possible combina-tions of the outstanding request set R(t). Then, we considerall possible combinations of (a(t),y(t)). For any given com-bination (a(t),y(t)), we solve the power allocation problemΨ(a(t),y(t)) which is LP and can be solved with polynomialcomplexity. Instead, the single slot optimization problem in(18) is an Integer Linear Programming (ILP) problem whichcan be solved through the branch and bound approaches whoseworst-case computational complexity equals that of exhaustivesearch algorithms. Finally, we exploit backward induction [33]to solve the Bellman’s equation and find the optimal solution ofthe problem.

LetR be the maximum number of requests in the system. Thenumber of combinations of the outstanding request set is 2R.The number of combinations of y(t) and a(t) are 2H and (S +1)R, respectively. Thus, the single slot optimization problem

in the Bellman’s equation has complexity O(2R+H(S + 1)R).Let OP be the complexity of the power control problem. Theoverall complexity of the finite-horizon power consumptionminimization problem over T slots isO(TOP (S+ 1)R2R+H).That is, finding the optimal solution of the considered problemresults in exponential computational complexity.

VI. ONLINE GREEDY ALGORITHM

The offline solution in Section V is designed to obtain anoptimal solution of Problem (A). However, it does not scalewell with the number of variables in the problem and requires apriori knowledge of all the requests submitted by all networkusers. Accordingly, to obtain an optimal solution in large-scale and dense networks within a reasonable amount of timeis unrealistic. Also, requests submitted by network users areexpected to arrive in real-time and are not available in advance.Therefore, alternative online approaches must be considered.

At any given time instant t, R(t) is the set of outstandingrequests. For the sake of readability, in the following, we omitthe time slot index t. It is worth noting that network nodesdynamically submit a request and no information concerningtheir arrival time and minimum SINR requirements is available.In such an uncertain scenario, optimality should be relaxed, anda sub-optimal solution needs to be considered. For these rea-sons, in this section, we propose a sub-optimal online algorithmwhich can be implemented with polynomial time complexity.

As shown in Fig. 2, the proposed greedy algorithm com-prises two phases. Phase I is devoted to the computation of agreedy orthogonal scheduling policy that accounts for deadlineconstraints and limits to zero (or to a small constant factor)interference among users. Phase II is devoted to the exploitationof JT and spectrum sharing to schedule additional requestswhile satisfying users’ requirements. The technical details ofPhase I and Phase II are described in Subsections VI-A andVI-B, respectively.

A. Phase I: Greedy Orthogonal Scheduling

Let H(I) = ∅, and H⊥ε = H, where ε is a parameterwhose importance w.r.t. the proposed greedy algorithm will bedescribed in Step I.4 in this subsection. For each r ∈ R, j ∈ Hand s ∈ S, we define the following parameters

qr = max{0, t− t0r} (21)

ξrjs =γrσ

2

grjs. (22)

At each time slot t, qr is the waiting time (or queueing time)of request r ∈ R. That is, qr indicates the number of time slotsthat request r spent inside the BBU pool queue without beingscheduled. ξrjs represents the minimum amount of power tofulfill the minimum average SINR level requirement of requestr on channel s when served by RRH j without any otherinterfering transmission. Intuitively, smaller values of γr, i.e.,loose SINR requirements, and high channel gain coefficientsgrjs, i.e., better channel conditions, lead to lower transmissionpower requirements ξrjs. Conversely, poor channel quality andhigh SINR requirements lead to larger values of ξrjs.

Page 7: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

7

The algorithmic procedure of Phase I is summarized inAlgorithm 1 and it is described in the following.

• Step I.1: For each j ∈ H, we define ξj = {ξrjs : ξrjs ≤Pj , r ∈ R, s ∈ S}. We also generate νj = (νrjs)r∈R,s∈Swith

νrjs =qr + 1

ξrjs(23)

Intuitively, (23) has high values when the request r: i)requires a small amount of transmission power to meet theSINR constraint; and ii) already spent several time slotsin the system without being scheduled. In this step, wesort νj in ascending order. The obtained ordering is thenused to sort ξj

1. This approach generates an ordering ofξj where requests that are approaching their deadline areprioritized. Conversely, the scheduling of requests that arestill far away from their deadline is delayed in time. Thisstrategy is known in the literature as Earliest Deadline First(EDF) [34], and it has been successfully utilized manytimes to design efficient greedy algorithms [35, 36]. Therationale behind (23) is twofold, as priority is given tothose requests that i) are approaching their deadline and ii)require the least amount of power to satisfy their minimumSINR requirement. Recall that any unscheduled requestmakes the Constraint (4) unsatisfied, and thus generatesan unfeasible solution to Problem (A). Also, requestsassociated to low values of ξrjs are the ones that requirelower transmission power to satisfy their minimum SINRrequirement. Accordingly, the ordering generated through(23) jointly aims at minimizing the objective function ofProblem (A) and enforcing Constraint (4).

• Step I.2: For each j ∈ H, we build a greedy schedulingpolicy ξSj ⊆ ξj as follows. We consider only thoserequests which require the lowest transmission power tobe satisfied, while guaranteeing that Pj bounds the overalltransmission power. That is, we schedule those requests inR with the smallest ξrjs in ξj , such that

∑ξ∈ξSj

ξ ≤ Pj .We assume that each RRH can assign a channel to no morethan one request at a time. Furthermore, from (4), we havethat each request can be scheduled on no more than onechannel. Therefore, from the orthogonality assumption,in ξSj there could not be two requests sharing the samechannel, and each request can appear only once.

• Step I.3: We pick the RRH which schedules the high-est number of requests with the lowest power consump-tion. That is, we select j∗ ∈ H such that j∗ =arg maxj∈H⊥ε {|ξ

Sj |}. Ties are broken by selecting the

RRH such that the overall power consumption is mini-mum, i.e., j∗ = arg minj∈H⊥ε {

∑ξ∈ξSj

ξ+P(ON)j +P

(F)j }.

We add j∗ toH(I), i.e.,H(I) = H(I) ∪ {j∗}.• Step I.4: Let j∗ be the RRH selected at Step I.3. We build

a candidate greedy scheduling policy φj∗ such that φj∗ ={(r, s) ∈ R× S : ξrj∗s ∈ ξSj∗}. Then, we consider

H⊥ε (φj∗)={j∈H \H(I):grjs ≤ ε,∀(r, s)∈φj∗} (24)

1Note that this step is not the same as simply ordering ξj in ascending orderas the two resulting orderings are generally different.

which we define as the ε-orthogonal set of RRHs whoseinterference to the scheduling in φj∗ is upper-bounded2 bya small multiple factor of ε. Intuitively, if ε = 0, it meansthat transmissions performed by RRHs inH⊥0 (φj∗) do notinterfere with the scheduling φj∗ . Instead, small positive εresults in small tolerable interference values.

• Step I.5: Requests already in φj∗ are removed fromR, i.e.,R = R \ {r ∈ R : ∃ ξrj∗s ∈ ξSj∗}. Also, the set H⊥ε oforthogonal RRHs is updated such that H⊥ε = H⊥ε (φj∗) ∩H⊥ε . Then, Step I.2 is iteratively re-executed among the re-maining RRHs inH⊥ε , and the best RRH inH⊥ε is selectedagain until H⊥ε = ∅ or no more requests can be scheduledas there are no more computational resources in the BBUpool. That is,

∑j∈H(I)

∑z∈φj mz + minr∈Rmr > M .

Algorithm 1 Phase I: Greedy Orthogonal Scheduling1: H(I) ← ∅;2: H⊥ε ← H;3: while (H⊥ε 6= ∅) ∨ (R 6= ∅) ∨ (

∑j∈H(I)

∑z∈φj mz +

minr∈Rmr > M) do4: for each j ∈ H do5: ξj ← {ξrjs : ξrjs ≤ Pj , r ∈ R, s ∈ S};6: Sort νj in ascending order;7: Sort ξj with respect to νj ;8: Compute ξSj ⊆ ξj as in Step I.2;9: end for

10: j∗ ← argmaxj∈H⊥ε {|ξSj |}

11: H(I) ← H(I) ∪ {j∗}12: φj∗ ← {(r, s) ∈ R× S : ξrj∗s ∈ ξSj∗};13: H⊥ε (φj∗)←{j∈H \H(I):grjs ≤ ε,∀(r, s)∈φj∗};14: R← R \ {r ∈ R : ∃ ξrj∗s ∈ ξSj∗};15: H⊥ε ← H⊥ε (φj∗) ∩H⊥ε ;16: φ(I)(j∗)← φj∗ ;17: end while18: returnH(I),φ(I) = (φ(I)(j))j∈H(I) ;

B. Phase II: JT and Channel Sharing Scheduling

For each RRH j ∈ H(I), let φ(I)(j) be the scheduling policyat the end of Phase I. Accordingly, for each RRH j ∈ H(I) wecalculate its residual power p̃j under policy φ(I)(j) as follows:

p̃j = Pj −∑s∈S

∑r∈φ(I)(j)

ξrjs (25)

and we defineH(II) as

H(II) = {j ∈ H(I) : p̃j > 0} (26)

Intuitively, H(II) is the subset of activated RRHs whoseresidual power is positive at the beginning of Phase II. Suchresidual power can be used to schedule multiple user transmis-sions on the same channel on the same RRH, or to performJT operations through multiple RRHs that transmit to the sameuser. To this end, in the following we first derive a schedulingpolicy φ(II)(j). At the beginning of Phase II, φ(II)(j) is

2Recall that when r is served by RRH j on channel s, the interference at ris irks = grksp, where p represents the transmission power of an interferingRRH k ∈ H \ {j} on channel s. In this case, grks = irks/p. Thus, we caneffectively limit the experienced interference at r by a factor proportional toε ≥ 0 by allowing transmissions from any RRH k such that grks ≤ ε.

Page 8: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

8

empty, of course. Then, we use φ(II)(j) to derive a joint userscheduling and power allocation strategy (a(t),p(t),y(t)).

Algorithm 2 Computation of φ(II)

1: for each j ∈ H(I) do2: p̃j ← Pj −

∑s∈S

∑r∈φ(I)(j) ξrjs;

3: end for4: H(II) ← {j ∈ H(I) : p̃j > 0}5: while (H(II) 6= ∅) ∨ (R 6= ∅) ∨ (

∑l∈H(I)

∑z∈φ(I)(l)mz +∑

l∈H(II)

∑z∈φ(II)(l)mz +minr∈Rmr > M) do

6: Compute (r∗, j∗, s∗) as in Step II.1;7: φ(II)(j∗)← φ(II)(j∗) ∪ {(r∗, s∗)};8: R← R \ {r∗};9: p̃j∗ ← p̃j∗ − ξr∗j∗s∗ ;

10: if p̃j∗ ≤ 0 then11: H(II) ← H(II) \ {j∗};12: end if13: end while14: return φ(II);

The computation of φ(II) is described in the following. Forthe sake of clarity, the same procedures are also illustrated inAlgorithm 2.• Step II.1: We select the request r∗ ∈ R which corresponds

to the minimum required transmission power and can bescheduled by exploiting the residual power of the RRHs inH(II). Specifically, we select (r∗, j∗, s∗) such that

ξr∗j∗s∗ = min{ξr,j,s : ξr,j,s < p̃j ,∑l∈H(I)

∑z∈φ(I)(l)

mz +∑

l∈H(II)

∑z∈φ(II)(l)

mz +mr ≤M,

r ∈ R, j ∈ H(II), s ∈ S}. (27)

• Step II.2: We update the Phase II scheduling policyφ(II)(j∗) = φ(II)(j∗) ∪ {(r∗, s∗)}.

• Step II.3: We remove r∗ from the outstanding requests set,i.e.,R = R \ {r∗}.

• Step II.4: We update the residual power of j∗ as follows:p̃j∗ = p̃j∗−ξr∗j∗s∗ . If p̃j∗ ≤ 0, we remove j∗ fromH(II).

• Step II.5: Step II.1 is iteratively re-executed as soon asone of the following conditions is satisfied: i) all theresidual power has been exhausted, i.e., H(II) = ∅; ii)the set of outstanding requests is empty, i.e., R = ∅;iii) no more requests can be processed in the BBU pool,i.e.,

∑l∈H(I)

∑z∈φ(I)(l)mz+

∑l∈H(II)

∑z∈φ(II)(l)mz+

minr∈Rmr > M for all r ∈ R.Let φ = (φ(I),φ(II)) be the scheduling policy obtained at

the end of Phase I and Phase II, where φ(I) = (φ(I)(j))j∈H(I) ,and φ(II) = (φ(II)(j))j∈H(I) .

We set ars = 1 for all the scheduled requests such that(r, s) ∈ φ, and we set yj = 1 for those activated RRHsj ∈ H(I). Thus, at each time slot t, we obtain the RRH activa-tion vector a(t) and the request scheduling matrix y(t). Thosetwo variables are used to compute Ψ(a(t),y(t)) and to solvethe power minimization problem in (19). If a solution is found,the resulting scheduling and transmission policy is enforced.Otherwise, if no solution exists, two alternative approachescan be followed. Specifically, we can either i) unschedule theextra requests, or ii) activate an additional RRH to search for a

Fig. 2. Block diagram of the proposed greedy algorithm when ε = 0.

feasible power control solution. Those two approaches can besummarized in the two following policies:

1) Policy 1: We solve the power control problem (19) byiteratively removing the requests in φ(II) whose requiredminimum transmission power ξrjs is maximum until asolution is computed. If the requests in φ(II) are allremoved, then the original orthogonal scheduling φ(I) isfound. Accordingly, if ε = 0, a solution to the problem(19) must exist by the construction of the greedy orthog-onal scheduling policy φ(I). Otherwise, if ε > 0 and asolution to (19) does not exist, then we set ε = 0 and were-execute Phase I, which surely admits a solution.

2) Policy 2: We iteratively launch the power control algo-rithm by iteratively activating the least power consumingRRH in H \ H(I) until we find a feasible solution.If all RRHs have been activated and no solutions arefound, then we launch Policy 1 until a feasible solutionis obtained.

For illustrative purposes, in Fig. 2 we present the blockdiagram corresponding to the proposed greedy algorithm whenε = 0. It is worth noting that if a solution is found, the algorithmenforces the obtained scheduling policy and moves to the nexttime slot. The block diagram for the case where ε > 0 is similarto that shown in Fig. 2. The only difference is that if no solutionsare found at the end of Policy 2 and Policy 1, then the algorithmis re-executed by setting ε = 0, which, at least, ensures thatPhase I generates an orthogonal greedy scheduling policy.

The complexity of the ordering in Step I.1 isO(RS logRS).The operation is performed H times. Therefore, Step I.1 hascomplexity O(HRS logRS). Steps I.2 – I.5 have complex-

Page 9: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

9

Fig. 3. The simulated C-RAN network.

ity O(HR). However, they are iterated over all the availableRRHS until a greedy orthogonal scheduling policy is obtained.Accordingly, they have complexity O(H2R), and Phase I hasoverall complexity O(HRS logRS + H2R). Similarly, it canbe shown that Phase II has complexity O(H2R). Policy 1 hascomplexity O(R), while Policy 2 has complexity O(H + 2R).Therefore, the overall complexity of the proposed greedy algo-rithm is O(HRS logRS +H2R).

VII. NUMERICAL ANALYSIS

In this section, we assess the achievable performance of theabove proposed solutions through extensive numerical simu-lations. Specifically, in Section VII-A we analyze the perfor-mance of the optimal solution. The achievable performanceof the proposed greedy scheduling algorithm is discussed inSection VII-B.

Our study not only focuses on the power consumption of theC-RAN system under the algorithms proposed in the previousSections, but it also investigates two relevant metrics, namelysatisfied user ratio and RRH activation probability. The formerindicates the percentage of users whose requests are satisfiedby the network. The latter gives us important information onthe number of RRHs that must be effectively turned on tosupport user data transmissions and guarantee minimum SINRrequirements.

To assess the performance of the proposed solutions, weconsider a circular network scenario. Despite its simplicity, thismodel has been identified as a good candidate for performanceevaluation in C-RAN systems, and has been effectively usedmany times in the literature [9, 37–41] as a benchmark forpower allocation, user scheduling, and resource allocation al-gorithms. In our simulations, we assume that H = 5 RRHsand a BBU pool are deployed in a circular area as shown inFig. 3. The corresponding fiber power costsP (F)

j , which dependon the distance between the BBU pool and the RRHs, areP(F ) = {2, 1, 1, 2, 1} W. Let us point out that our solutionis general and can be utilized independently of the actualdistribution of users in the network. However, for simulationpurposes only, we model the position of network users as arandom variable with circular uniform distribution [24, 42, 43].

Specifically, at each simulation run, the position of networkusers is randomly generated within a circle whose radius isset to L = 500m. Channel gain coefficients are generatedaccording to the path-loss model in [44] for Rayleigh fadingchannels. The activation and sleep power costs are assumed tobe equal for all the RRHs. Specifically, we set P (ON)

j = 130 W[31, 45] and P (sleep)

j = 75 W [31]. The maximum transmissionpower level for each RRH is set to Pj = 48 dBm [45]. Weconsider the case where the amount of computational resourcesto process each request increases linearly with the achievableShannon capacity, i.e., the slope in (1) is set to θ = 1. Also,we assume that the amount of computational resources mVM

to process data requests in the BBU pool is mMV = 5.Accordingly, we have mr = m for all r ∈ R, which yieldsP (BBU)(mr) = P (BBU)(mz) for all r, z ∈ R. We assume thatsuch a cost is P (BBU)(mr) = 1 W. The weight parameters areset to ωR = 0.01 and ωB = 0.1. Finally, we assume that userssubmit their requests according to a binomial distribution [46]with success probability p = 0.5, and the number of trials equalto n = Rmax, where Rmax represents the maximum number ofusers in the network. The results shown in this subsection areaveraged over 5000 simulation runs.

A. Optimal Offline Solution

In this subsection, we assess the performance of the optimaloffline solution proposed in Section V, and we compare it withother scheduling policies. As already discussed in Section V,to find an optimal solution to the joint scheduling and powerallocation problem is a NP-hard problem, i.e., it has expo-nential complexity in the number of variables of the problem,which makes it infeasible to compute an optimal solution evenfor small network instances. Thus, in this section only, werestrict our performance evaluation to the case where onlyRRH1 and RRH5 can be activated, while the remaining RRHsare switched off3. Furthermore, we consider a system whereS = 2 subcarriers are available for data transmission. Theoptimization horizon is set to T = 3, and we assume thatall requests have to be accommodated before the horizon isreached. Finally, we assume that number of users in the networkis Rmax = 7.

In Fig. 4, we show the weighted power consumption C in (13)as a function of the minimum average SINR requirement leveland the parameter ε in (24). Specifically, we compare the opti-mal offline solution (solid lines) with two other algorithms: thegreedy online algorithm proposed in Section VI (dashed lines),and the heuristic approach considered in [47] and [48] whereall RRHs are turned on simultaneously when there is at leastone request to be served (dotted lines). In general, the powerconsumption always increases as the minimum average SINRrequirement level increases. Also, the power consumption un-der the optimal policy is generally lower than that achieved byall the other considered algorithms. It is worth noting that Fig. 4shows some cases where the power consumption of the networkunder the greedy algorithm is lower than that achieved when theoptimal solution is considered. This result is explained in Fig. 5,

3The case where all RRHs can be selected will be extensively investigated inSection VII-B.

Page 10: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

10

where we show that the above phenomenon arises in those caseswhere the greedy algorithm does not produce a feasible solutionthat satisfies the minimum SINR constraints, i.e., when somerequests cannot be satisfied. By reducing the number of servedusers, the corresponding power consumption is also reduced,thus explaining why the greedy algorithm shows lower powerconsumption in some cases. As expected, when all requests aresatisfied, i.e., the satisfied users ration is equal to 1, the optimalalgorithm always provides the best performance. It is also worthnoting that Policy 1 achieves near-optimal performance if com-pared to the optimal solution, and the additional cost introducedby the greedy algorithm is small, and anyway lower than thatintroduced by the heuristic approach. Although Policy 1 slightlyunder-performs Policy 2 in terms of satisfied users ratio, itboth achieves very high satisfaction percentage, (i.e., 96% ofthe total number of users) and also consumes less power thanPolicy 2. For network operators, the combination of the greedyalgorithm and Policy 1 presents an opportunity to save energyin those scenarios where the minimum SINR requirement islow. Instead, when high SINR levels are required, the greedyalgorithm with Policy 2 should be preferred.

To better understand the motivation behind the above find-ings, in Fig. 6 we show the average activation percentage ofthe two RRHs for the three algorithms as a function of theminimum average SINR requirement level. It is shown thatthe optimal solution (solid lines) activates the lowest numberof RRHs, thus resulting in low power consumption levels.On the contrary, both the proposed (dashed lines) and theheuristic (dotted lines) approaches activate a higher number ofRRHs. Specifically, since the heuristic approach activates allthe RRHs when at least one request has to be scheduled, itresults in the highest power consumption. Instead, the activationpercentage under the proposed greedy algorithm under Policy1 is slightly higher than that achieved under the optimal policy.For C-RANs composed of RRHs with high energy activationcost, Policy 1 brings even further energy consumption bene-fits considering the aforementioned trade-off regarding users’satisfaction. Whereas, when Policy 2 is used, the system willbenefit from near optimal user satisfaction with better energyconsumption than previously proposed solutions, such as theheuristic in [47, 48].

It is worth noting that the average RRH activation proba-bility for the heuristic approach (dotted lines) is not alwaysequal to 1. Such a result is due to the fact that the heuristicapproach activates all the RRHs if and only if there is atleast one request to be scheduled. Otherwise, the RRHs remaininactive. Furthermore, the power consumption generated by theproposed greedy algorithm under both Policy 1 and Policy 2increases as the minimum SINR level increases as well. Asshown in Fig. 6, such a result is directly tied to the higherRRH activation percentage of the greedy approach when theminimum required SINR level increases. As a result, to supporthigh-quality communications, the greedy algorithm proposed inSection VI activates additional RRHs, thus generating a highercost if compared to the optimal solution.

Finally, in Fig. 7 and Table II we investigate the impact ofthe weight parameters on the overall power consumption andRRH activation probability, respectively. Specifically, in our

TABLE IIAVERAGE RRH ACTIVATION PROBABILITY FOR DIFFERENT MINIMUM

SINR REQUIREMENT

CaseName

Miniminum SINRRequirement 0 dB 5 dB 10 dB 15 dB 20 dB

Case A 0.402 0.421 0.553 0.562 0.611Case B 0.324 0.375 0.449 0.511 0.525

simulations we consider the following two cases:• Case A: all the power cost terms in (10) have similar

amplitudes (i.e., wR = 0.01 and wB = 0.1). This isthe case where the network operator equally weighs thepower consumption of each element of the C-RAN system.Such a policy stems from the evidence that the powerneeded to turn on one RRH (in the order of hundreds ofWatts) is considerably higher if compared to the powerconsumption due to RF transmissions (in the order of fewWatts). Accordingly, this policy tries to equally reduce thepower consumption at each element of the network.

• Case B: the weights are set to wR = wB = 1. Thiscase represents the one where the network operator aims atminimizing the actual power consumption of the network.In this case, more attention is given in reducing the activa-tion of RRHs rather than reducing the transmission powerof each RRH.

Intuitively, Case A generates resource allocation policiesthat are power conservative for each element of the network.On the contrary, Case B aims at reducing the major sourceof power consumption of the system while disregarding thoseelements whose power consumption is small. The obtainedresults show that the values of the weight parameters not onlyimpact the value of the objective function at the end of theoptimization process, but they also impact the activation ofRRHs. Specifically, in Case B the value of the cost term in (9)is considerably higher than the other two terms in the objectivefunction (12). Accordingly, Table II shows that this results in alower probability of activating all RRHs if compared to Case A,where the activation cost is weighted by wR = 0.01.

B. Greedy Online Solution

As already shown in Section VI, the proposed greedy on-line solution has polynomial complexity. Accordingly, in thissection we assume that all of the five RRHs in Fig. 3 can beactivated. Furthermore, we assume that S = 8 subcarriers areavailable for data transmission, and the optimization horizon isset to T = 10. In Fig. 8 we show the weighted power consump-tion C as a function of the minimum average SINR requirementlevel for different values of the orthogonality parameter ε andRmax. Let us recall that, to accommodate users’ requests, Pol-icy 2 iteratively searches a solution by activating more RRHs.Instead, Policy 1 keeps the already activated RRHs and removesthose requests which cannot be scheduled due to the limitationsof the spectrum and transmission resources. Therefore, Fig. 8shows that the power consumption when Policy 2 is enforced(dashed lines) is higher than that obtained when Policy 1 is

Page 11: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

11

0 10 20

Minimum SINR, [dB]

6

7

8

9

10

11

12

13

14W

eig

hte

d P

ow

er

Co

ns

um

pti

on

, [W

att

]Policy 1

Optimal

Greedy, =5*10-13

Greedy, =0

Heuristic [47][48]

0 10 20

Minimum SINR, [dB]

6

7

8

9

10

11

12

13

14

We

igh

ted

Po

we

r C

on

su

mp

tio

n,

[Wa

tt]

Policy 2

Optimal

Greedy, =5*10-13

Greedy, =0

Heuristic [47][48]

Fig. 4. Weighted power consumption C as a function of the minimum averageSINR requirement level for different scheduling algorithms.

0 10 20

Minimum SINR, [dB]

0.92

0.93

0.94

0.95

0.96

0.97

0.98

0.99

1

Sati

sfi

ed

Users

Rati

o

Policy 1

Optimal

Greedy, =5*10-13

Greedy, =0

Heuristic [47][48]

0 10 20

Minimum SINR, [dB]

0.92

0.93

0.94

0.95

0.96

0.97

0.98

0.99

1

Sati

sfi

ed

Users

Rati

o

Policy 2

Optimal

Greedy, =5*10-13

Greedy, =0

Heuristic [47][48]

Fig. 5. Average satisfied user ratio as a function of the minimum SINRrequirement level for different scheduling algorithms.

employed (solid lines), and increases as the minimum SINRlevel increases. Also, as expected, as the maximum numberRmax of requests at each time slot increases, more RRHs haveto be turned on and the power consumption increases as well.Because higher transmission power levels have to be consideredand more RRHs have to be activated, introducing interference, aslightly higher power consumption is experienced when ε > 0.

Fig. 9 shows the average proportion of satisfied users inthe network as a function of the minimum average SINRrequirement level for different values of ε and Rmax. WhilePolicy 1 (solid lines) is oriented towards power savings, Policy2 (dashed lines) is user-oriented and is well-suited to satisfy ahigher number of users. Specifically, Fig. 9 shows that Policy 2performs better than Policy 1 regarding the average proportionof satisfied users. However, such a high proportion of satisfiedusers requires higher power consumption, as shown in Fig. 8.Also, it is shown that this proportion decreases as the minimumaverage SINR requirement increases. In fact, higher SINRrequirements imply lower interference, which leads to a lowernumber of scheduled and thus satisfied users. Furthermore, byconsidering a positive value of ε, it is possible to satisfy ahigher number of users when the required minimum SINR level

0 10 20

Minimum SINR, [dB]

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Av

era

ge

RR

H A

cti

va

tio

n P

rob

ab

ilit

y

Policy 1

Optimal

Greedy, =5*10-13

Greedy, =0

Heuristic [47][48]

0 10 20

Minimum SINR, [dB]

0

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Av

era

ge

RR

H A

cti

va

tio

n P

rob

ab

ilit

y

Policy 2

Optimal

Greedy, =5*10-13

Greedy, =0

Heuristic [47][48]

Fig. 6. Average RRH activation percentage as a function of the minimumaverage SINR requirement level for different scheduling algorithms.

0 10 20

Minimum SINR, [dB]

10 1

10 2

10 3

We

igh

ted

Po

we

r C

on

su

mp

tio

n,

[Wa

tt]

Policy 1

Optimal

Greedy, =5*10-13

Greedy, =0

0 10 20

Minimum SINR, [dB]

10 1

10 2

10 3

We

igh

ted

Po

we

r C

on

su

mp

tio

n,

[Wa

tt]

Policy 2

Optimal

Greedy, =5*10-13

Greedy, =0

Fig. 7. Weighted power consumption C as a function of the minimum averageSINR requirement level for different weight parameter configurations (Case A:solid lines; Case B: dashed lines).

is low. However, as already shown in the above Fig. 8, thisimprovement comes at a cost in terms of consumed power. Itis worth noting that when the number Rmax of users in the net-work is small, approximately the 100% of users’ requests canbe satisfied. On the contrary, larger values of Rmax generallyresult in a lower percentage of satisfied users. As an example, aminimum average SINR level of 10dB would make it possibleto satisfy only 65% of users.

In Fig. 10, we show the average RRH activation percentageas a function of the minimum SINR requirement level for differ-ent values of ε andRmax. It is shown that the average number ofactivated RRHs is higher under Policy 2 (dashed lines). Instead,the average number of activated RRHs under Policy 1 (solidlines) is almost constant with respect to the minimum averageSINR requirement level. Furthermore, when small values of theminimum average SINR level are considered, positive valuesof the parameter ε generate more interference in the ongoingtransmissions, which pushes the network towards the activationof additional RRHs to support JT and CoMP communications.Also, while Policy 2 tries to find a feasible solution to the powerallocation problem by activating additional RRHs, Policy 1 re-

Page 12: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

12

0 2 4 6 8 10 12 14 16 18

Minimum SINR, [dB]

80

100

120

140

160

180

200W

eig

hte

d P

ow

er

Co

ns

um

pti

on

, [W

att

]R

max=15, =5e-10

Rmax

=15, =0

Rmax

=30, =5e-10

Rmax

=30, =0

Fig. 8. Weighted power consumption C as a function of the minimum averageSINR requirement level for different values of ε and Rmax (Policy 1: solidlines; Policy 2: dashed lines).

0 2 4 6 8 10 12 14 16 18

Minimum SINR, [dB]

0.4

0.5

0.6

0.7

0.8

0.9

1

Sa

tis

fie

d U

se

rs R

ati

o

Rmax

=15, =5e-10

Rmax

=15, =0

Rmax

=30, =5e-10

Rmax

=30, =0

Fig. 9. Average satisfied user ratio as a function of the minimum SINRrequirement level for different values of ε and Rmax (Policy 1: solid lines;Policy 2: dashed lines).

moves users’ requests from the scheduling policy. Thus, Policy2 provides a higher percentage of satisfied users as compared toPolicy 1.

In Fig. 11 and Fig. 12, we show how the RRHs are activatedaccording to the selected scheduling policy for two differentvalues of Rmax when ε = 5 × 10−10. Specifically, in Fig. 11we assume Rmax = 15, and in Fig. 12 we consider the casewhere Rmax = 30. For each minimum SINR requirement, weshow five bars. Each bar corresponds to a given RRH in Fig. 3.Specifically, the i-th bar corresponds to RRHi.

It is shown that, in general, Policy 2 activates more RRHs.Also, since RRH3 is located at the center of the consideredsimulated area, it is the one which has the highest activationpercentage in all the studied cases. Intuitively, being in thecenter of the scenario considered allows RRH3 to serve moreusers than the other RRHs, which are located at the border.Also, due to its nearness to the BBU pool, RRH3 requires lesspower to activate the optical fibers, e.g., P (F)

3 = 1. On the

0 2 4 6 8 10 12 14 16 18

Minimum SINR, [dB]

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Av

era

ge

RR

H A

cti

va

tio

n P

rob

ab

ilit

y

Rmax

=15, =5e-10

Rmax

=15, =0

Rmax

=30, =5e-10

Rmax

=30, =0

Fig. 10. Average RRH activation percentage as a function of the minimumSINR requirement level for different values of ε and Rmax (Policy 1: solidlines; Policy 2: dashed lines).

Policy 1

0 3 6 9 12 15 180

0.5

1

Av

era

ge

A

cti

va

tio

n R

ati

o

Policy 2

0 3 6 9 12 15 18

Minimum SINR, [dB]

0

0.2

0.4

Av

era

ge

A

cti

va

tio

n R

ati

o

RRH 1 RRH 2 RRH 3 RRH 4 RRH 5

Fig. 11. Average activation ratio of each RRH as a function of the minimumaverage SINR requirement level for different policies when Rmax = 15.

contrary, RRH1 and RRH4, which are far away from the BBUpool and are located at the edge of the network, have a fiberpower cost of P (F)

1 = P(F)4 = 2, and are the ones which show

the lowest activation percentage.It is worth noting that, due to the power constraint, each

RRH can serve a limited number of requests. Thus, when themaximum number of users Rmax in the network is large, itis expected that all the available RRHs have to be turned on.This intuition is validated by Fig. 12, which shows that, whenRmax = 30 and Policy 2 is enforced, all the RRHs are activatedwith probability higher than 95%.

In Fig. 13, we analyze the power consumption of eachelement of the C-RAN system as a function of the minimumaverage SINR requirement level for different values of ε andRmax. With respect to the RAN portion of the system, it isshown that the power consumption due to RF transmissionsincreases as the minimum average SINR requirement level andnumber of users increase. This results stems from the fact thatto achieve higher SINR values, RRHs are required to transmit at

Page 13: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

13

Policy 1

0 3 6 9 12 15 180

0.5

1A

ve

rag

e

Ac

tiv

ati

on

Ra

tio

Policy 2

0 3 6 9 12 15 18

Minimum SINR, [dB]

0

0.2

0.4

Av

era

ge

A

cti

va

tio

n R

ati

o

RRH 1 RRH 2 RRH 3 RRH 4 RRH 5

Fig. 12. Average activation ratio of each RRH as a function of the minimumaverage SINR requirement level for different policies when Rmax = 30.

0 5 10 15

Minimum SINR, [dB]

0

0.05

0.1

0.15

Po

wer,

[W

att

]

RAN - RF Transmission

Rmax

=15, =5e-10

Rmax

=15, =0

Rmax

=30, =5e-10

Rmax

=30, =0

0 5 10 15

Minimum SINR, [dB]

4000

5000

6000

7000

Po

wer,

[W

att

]

RAN - RRH Activation

0 5 10 15

Minimum SINR, [dB]

300

400

500

600

700

Po

wer,

[W

att

]

Cloud - User Processing

0 5 10 15

Minimum SINR, [dB]

100

200

300

400

500

Po

wer,

[W

att

]

Cloud - RRH Processing

Fig. 13. Average power consumption for each element of the C-RAN system asa function of the minimum average SINR requirement level for different valuesof ε and Rmax (Policy 1: solid lines; Policy 2: dashed lines).

high power. Fig. 13 also shows that the power consumption dueto the activation of RRHs has similar behavior in both the cloudand RAN portions of the system. Specifically, it is interestingto note that the power consumption due to RRH activation andprocessing mimics the RRH activation probability illustrated inFig. 10. Finally, in Fig. 13 we investigate the impact of userscheduling on the power consumption of the cloud portion ofthe C-RAN system. Results show that the higher the minimumaverage SINR required level, the higher the power consumptiondue to processing of users’ data in the BBU pool. Intuitively,from (1), high QoS requirements require a large amount ofcomputational resources in the BBU pool, which eventuallyresults in more consumed power. Moreover, it is shown thatthe choice of policy does not considerably impact the powerconsumption due to data processing in the cloud. Instead, thepower consumption significantly increases when Rmax is high.Specifically, the power consumption for data processing in theBBU pool whenRmax = 30 is approximately 1.25 times higher

than that achieved when Rmax = 15. Although it is out of ourscope, it is also worth mentioning that the decision of whichpolicy to be used in a centralized pool may differ completely ofthe one taken when considering a distributed pool within a C-RAN. When distributed BBU pools are considered, RRHs aredynamically assigned to each pool, and the activation cost de-pends on the distance between each RRH and the correspondingassociated BBU pool in a given assignment slot. In this case, thebenefits and gains explained here might not hold anymore.

VIII. CONCLUSIONS

In this paper, we have addressed the power consumptionminimization problem to schedule user requests within a finitehorizon for a C-RAN. We have formulated the power consump-tion minimization problem as a weighted joint power allocationand user scheduling problem accounting for both temporal andminimum SINR constraints. Also, we have formalized the prob-lem as an MINLP, which enabled us to find an optimal offlinesolution based on DP techniques. Due to the computationalcomplexity to compute the optimal solution being exponen-tial, we have designed a heuristic greedy online algorithm ofpolynomial computational complexity to solve the problem ina more realistic time for C-RANs. We have then comparedthe outcomes of the optimal and the greedy algorithms. Ourresults clearly indicate that the greedy algorithm, while notoptimal, achieves a good trade-off between the minimization ofthe power consumption and the maximization of the percentageof satisfied users. Our proposed algorithm results in powerconsumption that is only marginally higher than the optimum,at significantly lower complexity. We have also assessed theaverage activation probability, which shows a slightly increasewhen comparing the greedy algorithm against the optimal one.

REFERENCES

[1] M. Artuso, C. Caba, H. L. Christiansen, and J. Soler, “Towards flex-bile SDN-based management for cloud-based mobile networks,” inIEEE/IFIP Network Operations and Management Symposium (NOMS),April 2016, pp. 474–480.

[2] D. Pompili, A. Hajisami, and T. X. Tran, “Elastic resource utilizationframework for high capacity and energy efficiency in Cloud RAN,” IEEECommunications Magazine, vol. 54, no. 1, pp. 26–32, January 2016.

[3] M. Peng, Y. Li, J. Jiang, J. Li, and C. Wang, “Heterogeneous cloud radioaccess networks: A new perspective for enhancing spectral and energyefficiencies,” IEEE Wireless Communications, vol. 21, no. 6, pp. 126–135, December 2014.

[4] J. Wu, Z. Zhang, Y. Hong, and Y. Wen, “Cloud radio access network (C-RAN): a primer,” IEEE Network, vol. 29, no. 1, pp. 35–41, January 2015.

[5] A. Checko, H. L. Christiansen, Y. Yan, L. Scolari, G. Kardaras, M. S.Berger, and L. Dittmann, “Cloud RAN for mobile networks—A technol-ogy overview,” IEEE Communications Surveys & Tutorials, vol. 17, no. 1,pp. 405–426, First Quarter 2015.

[6] M. Peng, Y. Sun, X. Li, Z. Mao, and C. Wang, “Recent advances incloud radio access networks: System architectures, key techniques, andopen issues,” IEEE Communications Surveys Tutorials, vol. 18, no. 3, pp.2282–2308, Third Quarter 2016.

[7] Nokia, “5G use cases and requirements,” White Paper, July 2016.

[8] I. F. Akyildiz, S.-C. Lin, and P. Wang, “Wireless software-defined net-works (W-SDNs) and network function virtualization (NFV) for 5Gcellular systems: An overview and qualitative evaluation,” ComputerNetworks, vol. 93, no. Part 1, pp. 66 – 79, December 2015.

[9] J. Tang, W. P. Tay, and T. Q. S. Quek, “Cross-layer resource alloca-tion with elastic service scaling in cloud radio access network,” IEEE

Page 14: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

14

Transactions on Wireless Communications, vol. 14, no. 9, pp. 5068–5081,September 2015.

[10] I. Chih-Lin, C. Rowell, S. Han, Z. Xu, G. Li, and Z. Pan, “Toward greenand soft: a 5G perspective,” IEEE Communications Magazine, vol. 52,no. 2, pp. 66–73, February 2014.

[11] G. Wu, C. Yang, S. Li, and G. Y. Li, “Recent advances in energy-efficient networks and their application in 5G systems,” IEEE WirelessCommunications, vol. 22, no. 2, pp. 145–151, April 2015.

[12] A. Abdelnasser and E. Hossain, “On resource allocation for downlinkpower minimization in OFDMA small cells in a Cloud-RAN,” in IEEEGlobal Communications Conference (Globecom), December 2015, pp. 1–6.

[13] P. Cao, W. Liu, J. S. Thompson, C. Yang, and E. A. Jorswieck, “Semidy-namic green resource management in downlink heterogeneous networksby group sparse power control,” IEEE Journal on Selected Areas inCommunications, vol. 34, no. 5, pp. 1250–1266, May 2016.

[14] Y. Shi, J. Zhang, and K. B. Letaief, “Group sparse beamforming for greencloud-ran,” IEEE Transactions on Wireless Communications, vol. 13,no. 5, pp. 2809–2823, May 2014.

[15] Y. Cheng, M. Pesavento, and A. Philipp, “Joint network optimizationand downlink beamforming for CoMP transmissions using mixed integerconic programming,” IEEE Transactions on Signal Processing, vol. 61,no. 16, pp. 3972–3987, August 2013.

[16] B. Dai and W. Yu, “Energy efficiency of downlink transmission strategiesfor cloud radio access networks,” IEEE Journal on Selected Areas inCommunications, vol. 34, no. 4, pp. 1037–1050, April 2016.

[17] K. Wang, K. Yang, and C. Magurawalage, “Joint energy minimization andresource allocation in C-RAN with mobile cloud,” IEEE Transactions onCloud Computing, vol. 6, no. 3, pp. 760–770, July 2018.

[18] S. H. Park, O. Simeone, and S. Shamai, “Joint optimization of cloud andedge processing for fog radio access networks,” in IEEE InternationalSymposium on Information Theory (ISIT), July 2016, pp. 315–319.

[19] M. Peng, K. Zhang, J. Jiang, J. Wang, and W. Wang, “Energy-efficientresource assignment and power allocation in heterogeneous cloud radioaccess networks,” IEEE Transactions on Vehicular Technology, vol. 64,no. 11, pp. 5275–5287, November 2015.

[20] X. Wang, S. Thota, M. Tornatore, H. S. Chung, H. H. Lee, S. Park,and B. Mukherjee, “Energy-Efficient Virtual Base Station Formation inOptical-Access-Enabled Cloud-RAN,” IEEE Journal on Selected Areasin Communications, vol. 34, no. 5, pp. 1130–1139, May 2016.

[21] S. Luo, R. Zhang, and T. J. Lim, “Downlink and uplink energy mini-mization through user association and beamforming in C-RAN,” IEEETransactions on Wireless Communications, vol. 14, no. 1, pp. 494–508,January 2015.

[22] J. Dong, Q. Yang, B. Li, and K. S. Kwak, “Efficient virtual machinescheduling for downlink joint transmission of CoMP in C-RAN,” in Inter-national Conference on Wireless Communications & Signal Processing(WCSP), October 2015, pp. 1–5.

[23] M. Y. Lyazidi, N. Aitsaadi, and R. Langar, “Dynamic resource allocationfor Cloud-RAN in LTE with real-time BBU/RRH assignment,” in IEEEInternational Conference on Communications (ICC), May 2016, pp. 1–6.

[24] T. X. Tran and D. Pompili, “Dynamic radio cooperation for user-centriccloud-RAN with computing resource sharing,” IEEE Transactions onWireless Communications, vol. 16, no. 4, pp. 2379–2393, April 2017.

[25] Y. Liao and L. Song, “Computing resource constraint in wireless m2mcommunications,” in 17th International Workshop on Signal ProcessingAdvances in Wireless Communications (SPAWC), July 2016, pp. 1–6.

[26] S. Coleri, M. Ergen, A. Puri, and A. Bahai, “Channel estimation tech-niques based on pilot arrangement in OFDM systems,” IEEE Transactionson Broadcasting, vol. 48, no. 3, pp. 223–229, September 2002.

[27] A. Dowler, A. Doufexi, and A. Nix, “Performance evaluation of channelestimation techniques for a mobile fourth generation wide area OFDMsystem,” in 56th Vehicular Technology Conference (VTC), September2002, pp. 2036–2040.

[28] D. Hammarwall, M. Bengtsson, and B. Ottersten, “Acquiring partialCSI for spatially selective transmission by instantaneous channel normfeedback,” IEEE Transactions on Signal Processing, vol. 56, no. 3, pp.1188–1204, March 2008.

[29] N. Shariati, E. Björnson, M. Bengtsson, and M. Debbah, “Low-complexity polynomial channel estimation in large-scale MIMO with

arbitrary statistics,” IEEE Journal of Selected Topics in Signal Processing,vol. 8, no. 5, pp. 815–830, October 2014.

[30] M. Feng, S. Mao, and T. Jiang, “Base station ON-OFF switching in 5Gwireless networks: Approaches and challenges,” IEEE Wireless Commu-nications, vol. 24, no. 4, pp. 46–54, August 2017.

[31] X. Guo, Z. Niu, S. Zhou, and P. Kumar, “Delay-constrained energy-optimal base station sleeping control,” IEEE Journal on Selected Areasin Communications, vol. 34, no. 5, pp. 1073–1085, May 2016.

[32] C. Liu, B. Natarajan, and H. Xia, “Small cell base station sleep strategiesfor energy efficiency,” IEEE Trans. Vehicular Technology, vol. 65, no. 3,pp. 1652–1661, March 2016.

[33] D. P. Bertsekas, Dynamic programming and optimal control, 4th ed.Athena Scientific, 2017.

[34] J. H. Anderson and A. Srinivasan, “Early-release fair scheduling,” in 12thEuromicro Conference on Real-Time Systems. Euromicro (RTS), June2000, pp. 35–43.

[35] H. Chetto and M. Chetto, “Some results of the earliest deadline schedul-ing algorithm,” IEEE Transactions on software engineering, vol. 15,no. 10, pp. 1261–1269, October 1989.

[36] M. L. Dertouzos and A. K. Mok, “Multiprocessor online schedulingof hard-real-time tasks,” IEEE Transactions on software engineering,vol. 15, no. 12, pp. 1497–1506, December 1989.

[37] Q.-D. Vu, K.-G. Nguyen, and M. Juntti, “Weighted max–min fairness forC-RAN multicasting under limited fronthaul constraints,” IEEE Transac-tions on Communications, vol. 66, no. 4, pp. 1534–1548, April 2018.

[38] K. Guo, M. Sheng, J. Tang, T. Q. Quek, and Z. Qiu, “Exploiting hybridclustering and computation provisioning for green C-RAN,” IEEE Jour-nal on Selected Areas in Communications, vol. 34, no. 12, pp. 4063–4076,December 2016.

[39] J. Tang, W. P. Tay, T. Q. Quek, and B. Liang, “System cost minimizationin cloud RAN with limited fronthaul capacity,” IEEE Transactions onWireless Communications, vol. 16, no. 5, pp. 3371–3384, May 2017.

[40] M. Peng, H. Xiang, Y. Cheng, S. Yan, and H. V. Poor, “Inter-tier interfer-ence suppression in heterogeneous cloud radio access networks,” IEEEAccess, vol. 3, no. 11, pp. 2441–2455, November 2015.

[41] Y. Wang, L. Ma, and Y. Xu, “Energy efficiency optimization for downlinkcloud RAN with limited fronthaul capacity,” Sensors, vol. 17, no. 7, p.1498, June 2017.

[42] P. Gupta and P. R. Kumar, “The capacity of wireless networks,” IEEETransactions on Information Theory, vol. 46, no. 2, pp. 388–404, March2000.

[43] M. Grossglauser and D. N. Tse, “Mobility increases the capacity of adhoc wireless networks,” IEEE/ACM transactions on networking, vol. 10,no. 4, pp. 477–486, August 2002.

[44] G. Calcev, D. Chizhik, B. Goransson, S. Howard, H. Huang, A. Kogiantis,A. F. Molisch, A. L. Moustakas, D. Reed, and H. Xu, “A widebandspatial channel model for system-wide simulations,” IEEE Transactionson Vehicular Technology, vol. 56, no. 2, pp. 389–403, March 2007.

[45] G. Auer, V. Giannini, C. Desset, I. Godor, P. Skillermark, M. Olsson,M. A. Imran, D. Sabella, M. J. Gonzalez, O. Blume, and A. Fehske,“How much energy is needed to run a wireless network?” IEEE WirelessCommunications, vol. 18, no. 5, pp. 40–49, October 2011.

[46] M. Tavana, V. Shah-Mansouri, and V. W. S. Wong, “Congestion controlfor bursty M2M traffic in LTE networks,” in IEEE International Confer-ence on Communications (ICC), June 2015, pp. 5815–5820.

[47] W.-C. Liao, M. Hong, Y.-F. Liu, and Z.-Q. Luo, “Base station activationand linear transceiver design for optimal resource management in het-erogeneous networks,” IEEE Transactions on Signal Processing, vol. 62,no. 15, pp. 3939–3952, August 2014.

[48] Y. Shi, J. Zhang, K. B. Letaief, B. Bai, and W. Chen, “Large-scale convexoptimization for ultra-dense Cloud-RAN,” IEEE Wireless Communica-tions, vol. 22, no. 3, pp. 84–91, June 2015.

Page 15: Power-Efficient Resource Allocation in C-RANs with SINR ...time slot [9] within a given temporal window. For each request, the temporal window is defined by the 2-tuple (t0 r; ),

15

Salvatore D’Oro is a research associate scientistat the Institute for the Wireless Internet of Things,Northeastern University (Boston, USA). He receivedthe PhD degree from the University of Catania in2015, where he also received the B.S. degree in Com-puter Engineering and the M.S. degree in Telecom-munications Engineering degree in 2011 and 2012,respectively. In 2013 and 2015, he was a VisitingResearcher at the Université Paris-Sud 11, Paris,France and at the Ohio State University, Ohio, USA.In 2015, 2016, and 2017 he organized the Workshops

on COmpetitive and COoperative Approaches for 5G networks (COCOA).His research interests include game-theory, optimization, learning and theirapplications to telecommunication networks.

Marcelo Antonio Marotta is an assistant professorat University of Brasilia, Brasilia, DF, Brazil. Hereceived his Ph.D. degree in Computer Science in2019 from the Institute of Informatics (INF) of theFederal University of Rio Grande do Sul (UFRGS),Brazil. He received his M.Sc. degree in ComputerScience in 2013 from INF of UFRGS, Brazil. Inaddition, he holds a B.Sc. in Computer Science fromthe Federal University of Itajubá (2010), Brazil. Hisresearch involves Heterogeneous Cloud Radio Ac-cess Networks, Internet of Things, Software Defined

Radio, and Cognitive Radio Networks.

Cristiano B. Both Cristiano is an associate professorof the Applied Computing Graduate Program at theUniversity of Vale do Rio dos Sinos (UNISINOS),Brazil. He coordinators research projects fundedby H2020 EU-Brazil, CNPq, FAPERGS, and RNP.His research focuses on wireless networks, next-generation networks, softwarization and virtualiza-tion technologies for telecommunication network,and SDN-like solutions for the Internet of Things.He is participating in several Technical Programmeand Organizing Committees for different worldwide

conferences and congresses.

Luiz DaSilva holds the chair of Telecommunicationsat Trinity College Dublin, where he is the Directorof CONNECT, the Science Foundation Ireland Re-search Centre for Future Networks and Communica-tions. Prior to joining Trinity College, Prof DaSilvawas a tenured professor in the Bradley Departmentof Electrical and Computer Engineering at VirginiaTech. His research focuses on distributed and adap-tive resource management in wireless networks, andin particular radio resource sharing and the appli-cation of game theory to wireless networks. Prof.

DaSilva is a principal investigator on research projects funded by the ScienceFoundation Ireland and the European Commission. Prof DaSilva is a Fellow ofTrinity College Dublin, and a Fellow of the IEEE, for contributions to cognitivenetworks and to resource management in wireless networks.

Sergio Palazzo received the degree in electrical engi-neering from the University of Catania, Catania, Italy,in 1977. Since 1987, he has been with the Universityof Catania, where is now a Professor of Telecom-munications Networks. In 1994, he spent the sum-mer at the International Computer Science Institute(ICSI), Berkeley, as a Senior Visitor. In 2003, he wasat the University of Canterbury, Christchurch, NewZealand, as a recipient of the Visiting Erskine Fellow-ship. His current research interests are in modelling,optimization, and control of wireless networks, with

applications to cognitive and cooperative networking, SDN, and sensor net-works.Prof. Palazzo has been serving on the Technical Program Committeeof INFOCOM, the IEEE Conference on Computer Communications, since1992. He has been the General Chair of some ACM conferences (MobiHoc2006, MobiOpp 2010), and currently is a member of the MobiHoc SteeringCommittee. He has also been the TPC Co-Chair of some other conferences,including IFIP Networking 2011, IWCMC 2013, and European Wireless 2014.He also served on the Editorial Board of several journals, including IEEE/ACMTransactions on Networking, IEEE Transactions on Mobile Computing, IEEEWireless Communications Magazine, Computer Networks, Ad Hoc Networks,and Wireless Communications and Mobile Computing.