16
0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEE Transactions on Communications 1 Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networks Inosha Sugathapala, Student Member, IEEE, Muhammad Fainan Hanif, Beatriz Lorenzo, Member, IEEE, Savo Glisic, Senior Member, IEEE, Markku Juntti, Senior Member, IEEE and Le-Nam Tran, Member, IEEE Abstract—Dynamic network architectures (DNAs) have been developed under the assumption that some terminals can be converted into temporary access points (APs) anytime when connected to the Internet. In this paper, we consider the problem of assigning a group of users to a set of potential APs with the aim to maximize the downlink system throughput of DNA networks, subject to total transmit power and users’ quality of service (QoS) constraints. In our first method, we relax the integer optimization variables to be continuous. The resulting non-convex continuous optimization problem is solved using successive convex approxi- mation framework to arrive at a sequence of second-order cone programs (SOCPs). In the next method, the selection process is viewed as finding a sparsity constrained solution to our problem of sum rate maximization. It is demonstrated in numerical results that while the first approach has better data rates for dense networks, the sparsity oriented method has a superior speed of convergence. Moreover, for the scenarios considered, in addition to comprehensively outperforming some well-known approaches, our algorithms yield data rates close to those obtained by branch and bound method. Index Terms—DNA networks, user association, SOCP, throughput maximization, beamforming, convex optimization, branch and bound algorithm, exhaustive search. I. I NTRODUCTION Successful development of wireless communication net- works greatly depends on efficient utilization of the available resources. In dynamic network architectures (DNAs) some users share their connectivity and act as access points (APs) to serve other users in their vicinity without additional network infrastructure cost [2], [3]. The introduction of high-processing capacity wireless devices such as smart phones offers such This work was presented in part at the workshop on MIMO and cognitive radio technologies in multihop network (MIMOCR), IEEE ICC 2015, June 2015 [1]. I. Sugathapala, S. Glisic, and M. Juntti are with the Centre for Wireless Communications, Faculty of Information Technology and Electrical Engi- neering, University of Oulu, Finland, Emails:{inosha.sugathapala, savo.glisic, markku.juntti}@oulu.fi. B. Lorenzo was with the Centre for wireless Communications, Fac- ulty of Information Technology and Electrical Engineering, University of Oulu, Finland. She is now with the University of Vigo, Spain, Email: [email protected]. M. F. Hanif was with the Centre for wireless Communication, Faculty of Information Technology and Electrical Engineering, University of Oulu, Finland. He has also been with the School of Computing and Communications, Lancaster University, United Kingdom. He is currently associated with the University of Lahore, Lahore, Pakistan, Email: [email protected]. L.-N. Tran is with the School of Electrical and Electronic Engineering, University College Dublin, Ireland. Email: [email protected]. The paper was supported by the Finnish Academy/NSF US colaborative program/WiFiUS 2018. The work of B. Lorenzo was partially supported by the grant EUIN2017- 88225, MINECO, Spain. an opportunity. This is entirely possible by plug and play reference architectures that are based on some well-known protocols such as universal plug and play (UPnP) and devices profile for web services (DPWS) [4]. These protocols can control and exchange information within the network through a central server. The large numbers of users and their dy- namic availability make the DNA highly adaptive to traffic variations in the network. Thus, the DNA can supports the variations of the network topology (who transmits to whom) to meet the traffic demands, the feature referred to as topology adaptiveness [2]. Besides, it is suitable for low cost ubiquitous Internet connectivity. Conventional small/pico cells have their own infrastructure with fixed dedicated access points. Their deployment normally ignores the dynamic traffic fluctuations that render a significant part of this infrastructure unutilized in space and time increasing the energy and infrastructure cost. Therefore, optimizing the number of active APs in DNA is highly important to maintain the system performance and the quality of service (QoS). Wireless beamforming techniques have gradually matured to a level that they can be integrated into many wireless systems. When equipped with multiple antennas, the APs provide more degrees of freedom, which can be exploited to improve the spectral efficiency of the system through spatial reuse of the channels. To this end, we need to optimize the beamforming weights in accordance with a given design criterion. A joint design of user-AP connection and beamformers results in the best solution. A. Related works Practical system design requires careful consideration of numerous performance metrics. Tan et al. [5] highlight three interconnected important metrics in multiple input multiple output (MIMO) networks. Therein, throughput is one of the key performance measures and will be studied in this paper as well. Prior works in [6]–[12] present different methods to maximize throughput in various network models. Shi et al. [6] propose an iterative algorithm to maximize the total sum rate of MIMO networks by means of weighted mean square error. Kaleva et al. in [7] and Choi et al. in [8] propose algorithms based on successive convex approximation (SCA) method and zero gradient method, respectively. Further, Wang et al. [9] apply zero forcing technique for throughput maximization in MISO networks while Li et al. [10] propose a dual link algorithm for MIMO networks. In particular, Zheng et al. in [11] and Lai et al. in [12] establish a duality through a virtual dual single-input multiple-output (SIMO)

Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

  • Upload
    others

  • View
    4

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

1

Topology Adaptive Sum Rate Maximization in theDownlink of Dynamic Wireless Networks

Inosha Sugathapala, Student Member, IEEE, Muhammad Fainan Hanif, Beatriz Lorenzo, Member, IEEE, SavoGlisic, Senior Member, IEEE, Markku Juntti, Senior Member, IEEE and Le-Nam Tran, Member, IEEE

Abstract—Dynamic network architectures (DNAs) have beendeveloped under the assumption that some terminals can beconverted into temporary access points (APs) anytime whenconnected to the Internet. In this paper, we consider the problemof assigning a group of users to a set of potential APs with the aimto maximize the downlink system throughput of DNA networks,subject to total transmit power and users’ quality of service (QoS)constraints. In our first method, we relax the integer optimizationvariables to be continuous. The resulting non-convex continuousoptimization problem is solved using successive convex approxi-mation framework to arrive at a sequence of second-order coneprograms (SOCPs). In the next method, the selection process isviewed as finding a sparsity constrained solution to our problemof sum rate maximization. It is demonstrated in numerical resultsthat while the first approach has better data rates for densenetworks, the sparsity oriented method has a superior speed ofconvergence. Moreover, for the scenarios considered, in additionto comprehensively outperforming some well-known approaches,our algorithms yield data rates close to those obtained by branchand bound method.

Index Terms—DNA networks, user association, SOCP,throughput maximization, beamforming, convex optimization,branch and bound algorithm, exhaustive search.

I. INTRODUCTION

Successful development of wireless communication net-works greatly depends on efficient utilization of the availableresources. In dynamic network architectures (DNAs) someusers share their connectivity and act as access points (APs) toserve other users in their vicinity without additional networkinfrastructure cost [2], [3]. The introduction of high-processingcapacity wireless devices such as smart phones offers such

This work was presented in part at the workshop on MIMO and cognitiveradio technologies in multihop network (MIMOCR), IEEE ICC 2015, June2015 [1].

I. Sugathapala, S. Glisic, and M. Juntti are with the Centre for WirelessCommunications, Faculty of Information Technology and Electrical Engi-neering, University of Oulu, Finland, Emails:{inosha.sugathapala, savo.glisic,markku.juntti}@oulu.fi.

B. Lorenzo was with the Centre for wireless Communications, Fac-ulty of Information Technology and Electrical Engineering, University ofOulu, Finland. She is now with the University of Vigo, Spain, Email:[email protected].

M. F. Hanif was with the Centre for wireless Communication, Facultyof Information Technology and Electrical Engineering, University of Oulu,Finland. He has also been with the School of Computing and Communications,Lancaster University, United Kingdom. He is currently associated with theUniversity of Lahore, Lahore, Pakistan, Email: [email protected].

L.-N. Tran is with the School of Electrical and Electronic Engineering,University College Dublin, Ireland. Email: [email protected].

The paper was supported by the Finnish Academy/NSF US colaborativeprogram/WiFiUS 2018.

The work of B. Lorenzo was partially supported by the grant EUIN2017-88225, MINECO, Spain.

an opportunity. This is entirely possible by plug and playreference architectures that are based on some well-knownprotocols such as universal plug and play (UPnP) and devicesprofile for web services (DPWS) [4]. These protocols cancontrol and exchange information within the network througha central server. The large numbers of users and their dy-namic availability make the DNA highly adaptive to trafficvariations in the network. Thus, the DNA can supports thevariations of the network topology (who transmits to whom)to meet the traffic demands, the feature referred to as topologyadaptiveness [2]. Besides, it is suitable for low cost ubiquitousInternet connectivity. Conventional small/pico cells have theirown infrastructure with fixed dedicated access points. Theirdeployment normally ignores the dynamic traffic fluctuationsthat render a significant part of this infrastructure unutilized inspace and time increasing the energy and infrastructure cost.Therefore, optimizing the number of active APs in DNA is

highly important to maintain the system performance and thequality of service (QoS). Wireless beamforming techniqueshave gradually matured to a level that they can be integratedinto many wireless systems. When equipped with multipleantennas, the APs provide more degrees of freedom, which canbe exploited to improve the spectral efficiency of the systemthrough spatial reuse of the channels. To this end, we needto optimize the beamforming weights in accordance with agiven design criterion. A joint design of user-AP connectionand beamformers results in the best solution.

A. Related works

Practical system design requires careful consideration ofnumerous performance metrics. Tan et al. [5] highlight threeinterconnected important metrics in multiple input multipleoutput (MIMO) networks. Therein, throughput is one of thekey performance measures and will be studied in this paperas well. Prior works in [6]–[12] present different methodsto maximize throughput in various network models. Shi etal. [6] propose an iterative algorithm to maximize the totalsum rate of MIMO networks by means of weighted meansquare error. Kaleva et al. in [7] and Choi et al. in [8]propose algorithms based on successive convex approximation(SCA) method and zero gradient method, respectively. Further,Wang et al. [9] apply zero forcing technique for throughputmaximization in MISO networks while Li et al. [10] proposea dual link algorithm for MIMO networks. In particular,Zheng et al. in [11] and Lai et al. in [12] establish a dualitythrough a virtual dual single-input multiple-output (SIMO)

Page 2: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

2

network which is then used to develop algorithms to maximizethe sum rates in cognitive networks. These algorithms arenumerically shown to achieve throughput close to that attainedby a globally optimal solution. We remark, however, that allthese algorithms are dedicated to a fixed user-AP association.Funabiki et al. [13] suggest that maximizing the number of

active APs in the network may not always result in higherQoS or network throughput unless proper user-AP selectionis performed. Thus, for our DNA scenario where the numbersof users and available APs can change in time and space, theneed of an user-AP selection mechanism in order to ensurethe users’ QoS requirements is more relevant. The authors in[14]–[16] claim that received signal strength indicator (RSSI)is unable to provide higher performance in IEEE 802.11networks due to several reasons, even though it is the mostcommon criterion to select the best AP. Perkins and Velaga[14] propose a method to address the drawbacks of thisscheme. It is based on frame error rate and airtime cost forvarious packet size categories and the new potential availablebandwidth after client association is completed, which relieson the predicted traffic load. Further, Athanasiou et al. [16]present channel-quality-based association mechanism to attainhigher system throughput with smaller transmission delay. Apreliminary investigation of the basics of access point problemfrom different perspectives (game theoretic, etc.) relying onour initial work [1] is given in [17, Ch. 12]. In [18], amethod is given to maximize throughput through a joint user-AP association algorithm, which achieves higher data ratesthan the existing works. For a similar system model, a simplemethod based on path loss was proposed in [19]. In [20],a throughput model based on the network condition sensedby the AP is proposed. In addition to the system-wide datarates considered in the present paper, other metrics for user-AP selection have also been studied in the literature, such asthe potential bandwidth a user can obtain [21], or the packeterror rate with respect to the number of associated users [22].

For cellular wireless networks, the problem of joint op-timization of power and AP selection has been investigatedin several pioneering works. For example, the Hanly [23] aswell as Yates and Huang [24] consider the problem of jointuser-base station association and power optimization for uplinktransmission. Hanley [23] assumes static users that select thebest AP to optimize their powers. A hybrid non-cooperativegame model for CDMA systems to optimize the power andconnection such that the required signal to interference plusnoise ratio (SINR) is guaranteed is studied in [24]. In [25],the problem of joint AP selection and power allocation for amulti-carrier wireless network with multiple APs and mobileusers is investigated. Further, Nguyen et al. [26] proposenon-convex quadratically constrained quadratic programmingbased algorithm to optimize power and the user associationfor coordinated multi-point transmission or reception system.Shen and Yu [27] present pricing based user associationalgorithm for SISO by considering dual domain optimization.Li et al. [28] propose a queue aware algorithm for cloud radioaccess networks. Particularly, Hong et al. [25] also highlightsome problems regarding the use of non-cooperative gametheoretical approaches to solve resource allocation problems

in wireless networks. Different from these earlier studies,we propose algorithms to address the joint AP selection andbeamformer design problem using convex approximations.

B. ContributionsWe consider the downlink transmission in DNA networks

where multiple potential APs (e.g., laptops, tablets), eachequipped with multiple antennas send data to a set of single-antenna users. Furthermore, we also assume that a user canreceive data from only one AP. The problem of interest isto maximize the system throughput by jointly designing thebeamformers and choosing properly an AP for each user. Weassume that the AP is connected to the backbone such that thedata for the single-antenna user is available via a backhaul link.In the sequel, this problem is referred to as joint throughputmaximization and user association problem (JTMUA). In abroader context, our contributions include, but are not limitedto, the following.• We first formulate the JTMUA problem by introduc-

ing binary selection variables. Even for a fixed user-AP connection setup, the resulting problem becomes athroughput maximization which is known to be NP-hard[29]. To approximately solve this problem, a standardcontinuous relaxation method is used where the selectionvariables are relaxed to be continuous. Even with thisrelaxation, the resulting problem is still non-convex.Thus, we resort to the concave-convex procedure (CCP)to tackle this non-convex relaxed problem. To make thispossible, we express the involving non-convex constraintsas a difference of two convex functions. In fact, the CCPcan be seen as a special case of the SCA framework[30] (also known as majorization-minimization (MM)),where a locally tight approximation of the non-convexoptimization problem is solved at each iteration [31]. Ourcontribution in this regard is to develop a second-ordercone program (SOCP) in each iteration of the proposediterative procedure. In our numerical experiments, therelaxed selection variables are found to converge to nearlybinary values.

• By viewing the selection problem as searching for sparsematrices corresponding to individual users, we study theJTMUA problem from another perspective. Instead ofintroducing binary selection variables, sparsity constraintsare imposed in the beamformer design problem. Thismethod is motivated by the increasing interest in com-pressed sensing applications in wireless communications.For example, the idea was considered in [32]–[34] asan antenna subset selection problem. In our sparsitybased approach, the connection between users and APsis selected based on the non-zero beamforming vectorsgenerated by our algorithm.

• The SCA framework used in both approaches is criticallydependent on the initialization of iterative algorithms de-veloped using this strategy. We have proposed an efficientinitialization technique that formalizes this procedure andis independent of heuristic approaches.

• Our mathematical framework is flexible enough to incor-porate the admission control (AC) problem. A sparsity

Page 3: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

3

constrained version of the AC problem is formulatedand it is shown that the proposed SCA approach can beutilized to solve the AC problem as well.

• In addition, complexity estimates of our algorithms arepresented, including conditions for convergence. Last butnot least, the proposed procedures are numerically testedfrom several different aspects in the numerical results. Forinstance, the impact of the channel estimation errors isquantified, comparison with exhaustive search or branchand bound algorithms is performed, etc.

The rest of the paper is organized as follows. The networkmodel and the problem formulation are illustrated in SectionII. Section III discusses the proposed approaches and thecomplexity and convergence properties of the algorithms. Thenumerical results are shown in Section IV. Finally, Section Vconcludes the paper.

Notations: Boldface lower and upper case letters are usedto denote vectors and matrices, respectively. Re(x) and Im(x)represent the real and imaginary parts of a complex vectorx, respectively. Rm×n and Cm×n represent the space ofreal and complex matrices of dimension given in superscript,respectively; XT and XH are the transpose and Hermitiantranspose of X, respectively;1m×n denotes the m× n matrixof all 1s. The absolute value of a scalar y is defined by |y|,and ‖y‖2 represents the Euclidean norm of a vector y. Fortwo vectors x and y of the same size, their inner product isdenoted by 〈x,y〉, i.e., 〈x,y〉 = xTy; [x]i denotes the ithelement of a vector x and (X)i represents the ith row of amatrix X. For sets A and B, the relative complement of A inB is denoted B \ A.

II. NETWORK MODEL AND PROBLEM FORMULATION

A. Network Model

At a given time instant we consider a network consistingof K potential access points, each equipped with T transmitantennas, and N single-antenna users. It is assumed that eachuser is served by one AP and data is not shared among APs,as in coordinated beamforming mode in LTE networks. TheAPs are equipped with linear precoding capability and thetransmission is using beamforming. The APs communicatewith the users in a single hop mode, as illustrated in Fig. 1 fora simple network model. To minimize inter-user interferenceand maximize its own data rates, a user has to select the mostappropriate AP among all possible connections.

B. Problem Formulation

Let K = {1, 2, . . . ,K} and N = {1, 2, . . . , N} denotethe sets of APs and users, respectively. The channel betweenAP i ∈ K and user j ∈ N is denoted by a (row) complexvector hij ∈ C1×T . The transmitted data symbol for user jis linearly weighted by a column vector wij ∈ CT×1 beforebeing transmitted from AP i. For ease of description we definew , [wT

11, . . . , wTNK ]T ∈ C(NKT )×1 which is the vector

including all the beamformers. To simplify the consideredproblem we assume that the received signal at an arbitrary userundergoes frequency-flat fading and log normal shadowing. It

is worth mentioning that although we focus on the downlinkscenario, the proposed methods also apply to the uplink case.At a given time instance, each transceiver acts either as a useror as an AP, and, thus, there is no self-interference induced inthe considered network. In our model, if selected, all K APsare ready for transmission. The complexity of the system underconsideration increases with K and N . Therefore, in order tomake the optimization process feasible in the network withhigh traffic dynamics, network clustering may be introduced toreduce the size of the network under consideration [35]–[37].Cluster is different from a small cell. Specifically, a clusterconsists of multiple potential access points that may enteror leave the systems in a dynamic way. Small clusters willhave relatively moderate values of parameters K and N , asshown in Fig. 2. A central server controls the communicationwithin each cluster. The proposed algorithms in this paperare centralized and thus require full channel state information(CSI) of the network. Basically for a full duplex, CSI isestimated at the receiver and then fed back to an AP by adedicated control channel. In time division half duplex system,the AP can estimate the CSI from uplink pilots using the so-called channel reciprocity. All the APs then can transmit CSIto the server where central processing is carried out using littleoverheads defines in UPnP or DPWS protocols. Further, usersin adjacent clusters will transmit on a different frequencies,so there will be no interference between their transmissions.Therefore, we will focus on a single-cluster scenario and theoverall system performance can be estimated by aggregatingthe performance of each cluster.

Let sij be a binary selection variable that represents theconnection status between AP i and user j. That is

sij =

{1 if user j is served by AP i,

0 otherwise.(1)

Since each user must be served only by one AP, we have thefollowing constraint∑

∀i∈K sij = 1, ∀j ∈ N . (2)

For notational simplicity, we define sj =[s1j , s2j , . . . , sKj ]

T ∈ {0, 1}K to be the vector consistingof K binary selection variables associated with user j, ands = [sT1 , s

T2 , . . . , s

TN ]T to be the vector comprising all KN

binary selection variables introduced in (1). With the abovenotations, the data rate of the user j can be written as

Rj = log(1 + γj(w, s)) (3)

where

γj(w, s) =

∑i∈K sij |hijwij |2

σ2j +

∑k∈K

∑t∈N\{j} skt|hkjwkt|2

(4)

and σ2j is the variance of the additive white Gaussian back-

ground noise (AWGN). In order to better understand theexpression in (4), we show that it indeed reduces to theactual expression of data rate of user j for a given set ofbinary variables sij satisfying (1) and (2). Suppose AP mis selected for user j, i.e., smj = 1 and sij = 0 fori 6= m. Then the summation in the numerator of (4) is reduced

Page 4: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

4

Cell Phone

LaptopAP

Smart Phone

Fig. 1. An example scenario of our system model. The red dotted lines indicatepotential connections between a user and APs and black solid lines refer to theselected connection between a user and an AP.

K = 2; N = 5

APs Users

Fig. 2. Illustration of a highly dense network (left) possibly partitioned intodifferent clusters of smaller sizes and distinct frequencies (right) for whichthe proposed algorithms can handle real-time traffic. The figure demonstrates afrequency reuse factor of three for network partitioning but a higher frequencyreuse factor can be applied if the interference situation is severe.

to |hmjwmj |2, which is the desired signal part. Next, letJk = {t|skt = 1 & t ∈ N}, i.e., Jk refers to the set ofusers served by AP k. Then (3) reduces to

Rj = log

(1 +

|hmjwmj |2σ2j+

∑l∈Jm\j

|hmjwml|2+∑

k∈K\{m}

∑l∈Jk\j

|hkjwkl|2

).

(5)We can see that the denominator encompasses all interferencecaused by other users to user j. In the context of cellularnetworks, the first and second summations in the denominatorare called intra- and inter-cell interference, respectively. Notethat (5) is in fact the actual rate of user j for a given set ofselection variables sij .

The power budget of each AP is subject to the followingconstraint ∑

j∈N sij‖wij‖22 ≤ pmaxi , ∀i ∈ K (6)

where pmaxi is the maximum power of AP i. Moreover, we

have assumed that the transmitted symbols are temporallywhite, and hence, the power constraint is reflected via thebeamforming vectors. We can now state the JTMUA problemas

(P) ,

max.s,w

∑j∈N log (1 + γj(w, s))

s.t. γminj ≤ γj(w, s), ∀j ∈ N∑j∈N sij‖wij‖22 ≤ pmax

i , ∀i ∈ K11×Ksj = 1, ∀j ∈ Ns ∈ {0, 1}KN .

(7a)

(7b)

(7c)

(7d)(7e)

In (7b), we impose the constraint SINR that is larger thanor equal to a threshold γmin

j in order to maintain some degreeof fairness among users. The problem (P) is an instance ofmixed-integer nonlinear program. Generally, this problem isdifficult to solve even for a small network. More explicitly,problem (P) is computationally intractable, even for fixedselection variables, the problem is known to be NP-hard[38]. However, under some special conditions such as quasi-invertibility, the above paper proved that the throughput max-imization problem can be convexified and thus, polynomialtime optimal algorithm is possible [12]. Before proceedingfurther we provide a simple result that is used to establish the

convergence of the iterative algorithms proposed in the nextsection.

Proposition 1: The optimal objective of (P) isbounded from above by

∑j∈N log (1 + γj), where

γj =∑i∈K ||hij ||22pmax

i /σ2j .

Proof: The proof is simple. By ignoring the interferenceterm in (4) we have γj(w, s) ≤

∑i∈K sij |hijwij |2 /σ2

j . Next,we can write sij |hijwij |2 =

∣∣hij(√sijwij

)∣∣2 and apply theCauchy-Schwarz inequality to obtain

∑i∈K sij |hijwij |2 ≤∑

i∈K ||hTij ||22sij ||wij ||22. The proof immediately follows bynoting that sij ||wij ||22 ≤ pmax

i for all i ∈ K due to (7c).

III. PROPOSED SOLUTIONS TO (P)

A. Globally Optimal Solution by Exhaustive Search

Despite its computational challenge, (P) can be solved toglobal optimality thanks to its specific structure. Specifically,all possibilities of selection variables sij’s (which are KN innumber) that satisfy (7d) and (7e) are considered. For eachcase, the resulting problem becomes the sum rate maximiza-tion for which global optimization methods presented in [39],[40] can be used to find an optimal solution. Then the users-APs assignment combination, which produces the best sumrate, is retained as the global solution. Thus, P is solvedglobally. We remark that these global optimization methodsare based on the branch and bound technique, and have non-polynomial time complexity. Obviously, this exhaustive searchmethod requires prohibitively high computational complexityand it is only used for benchmarking purpose in this paper.For more practically appealing applications such as those thatoccur in dynamic network architectures, we propose two low-complexity solutions in the following.

B. Continuous Relaxation

To tackle the discrete part of the JTMUA problem we firstconsider a continuous relaxation of the AP selection variables.Relaxing the discrete constraints to lie in continuous sets is astandard simplification in combinatorial optimization theory.For our case, it can be considered as a first step towards

Page 5: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

5

approximating the NP-hard optimization problem. To this end,we consider the following continuous relaxation of (P)

(P) ,

max.s,w,v

∑Nj=1 log vj

s.t. vj ≤ 1 + γj(w, s), ∀j ∈ Nγminj ≤ γj(w, s), ∀j ∈ N∑j∈N sij‖wij‖22 ≤ pmax

i , ∀i ∈ K11×Ksj = 1, ∀j ∈ N0 ≤ s ≤ 1

(8a)

(8b)(8c)

(8d)

(8e)(8f)

where v ∈ RN×1 is a newly introduced optimization variable.To arrive at (P) two steps have been carried out. First, v ∈RN×1 is introduced in (8a) and (8b), which does not affectthe optimality. The reason is that, (8b) holds with equalityfor optimal solutions; otherwise we can always increase vjwithout violating the constraint and obtain a strictly higherobjective. A similar manipulation was also done in [41], [42].Second, simply relaxing s to be continuous as in (8f) resultsin (P).

It is obvious that the difficulty in solving (P) is due to thenonconvex constraints in (8b), (8c) and (8d). In light of theSCA method, convex approximations of these constraints arerequired. Towards this end, recall that every twice differen-tiable function can be written as a difference of (two) convexfunctions on any compact convex set [43, Proposition 3.2].Proceeding further, note that (8b) and (8c) can be replaced bythe system of the following three constraints without loss ofoptimality

zj ≥ σ2j +

∑k∈K

∑t∈N\{j} skt|hkjwkt|2, ∀j ∈ N (9a)

(vi − 1)zj ≤∑i∈K sij |hijwij |2, ∀j ∈ N (9b)

γminj zj ≤

∑i∈K sij |hijwij |2, ∀j ∈ N (9c)

where z ∈ RN×1 is a newly introduced variable. The equiva-lence can be easily proven from the definition of γj(w, s) in(4). Specifically, if the above constraints are met, then so are(8b) and (8c). Conversely, if (8b) and (8c) hold then we cansimply set zj = σ2

j +∑k∈K

∑t∈N\{j} skt|hkjwkt|2, and the

constraints in (9) are immediately satisfied. This justifies theequivalence of the constraints in (8b) and (8c), and the systemin (9).

Let us deal with (9a) first. To do this, an auxiliary vectorβjt ∈ RK×1 is introduced for each pair of users j 6= t, andequivalently (9a) expands to the following system

zj ≥ σ2j +

∑t∈N\{j} sTt βjt, ∀j ∈ N (10a)

[βjt]k ≥ |hkjwkt|2, ∀t ∈ N \ {j},∀k ∈ K. (10b)

The above maneuver is similar to the move executed totransform (8b) and (8c) to (9). In the same way, (9b) and (9c)can be equivalently rewritten as the set of two inequalitiesgiven below

(vj − 1)zj ≤ sTj tj , ∀j ∈ N (11a)

[tj ]i ≤ |hijwij |2, ∀j ∈ N ,∀i ∈ K (11b)

γminj zj ≤ sTj tj , ∀j ∈ N (11c)

where tj ∈ RK×1, j ∈ N , is an auxiliary variable. Therefore,(8b) and (8c) are equivalently represented with (10) and (11).Similarly, we can equivalently rewrite (8d) as

‖wij‖22 ≤ uij , ∀j ∈ N ,∀i ∈ K (12a)sTi ui ≤ pmax

i , ∀i ∈ K (12b)

where ui ∈ RN×1, i ∈ K and u , [u1,u2, ...,uK ] ∈ RKN×1are new optimization variables and si , [si1, si2, . . . , siN ]T .Note that si in (12b) is not a newly introduced variable, itdenotes the vector of selection variables associated with AP i.

Before proceeding further, we remark that (10), (11) and(12) are the equivalent reformulation of non-convex constraints(8b)-(8d) in (P). Note that (10b) and (12a) are convex andSOC representable. Clearly, the non-convexity in the remain-ing constraints from (10) to (12) is due to the inner productof the two involved variables. To apply the CCP, we use thewell-known equality 4〈x,y〉 = ||x + y||22−||x−y||22 to writethe inner product as difference of two quadratic functions. Inthis regard we can equivalently rearrange all the non-convexconstraints (10a), (11) and (12b) as∑t∈N\{j}

||st + βjt||22 −∑

t∈N\{j}||st − βjt||22 ≤ 4(zj − σ2

j ), (13a)

(zj+vj−1)2−(zj−vj+1)2−||sj+tj ||22+||sj−tj ||22 ≤ 0, (13b)

[tj ]i − Re(hijwij)2 − Im(hijwij)

2 ≤ 0, (13c)

4γminj zj − ||sj + tj ||22 + ||sj − tj ||22 ≤ 0, (13d)

||si + ui||22 − ||si − ui||22 ≤ 4pmaxi , (13e)

respectively. Now after these manipulations, the problem in (8)can be equivalently written as (14), where the optimizationvariables s,w,v, β, t and u have already been defined inthe mathematical developments presented above. It shouldbe stressed at this point that (14) is still equivalent to (8),and hence, still non-convex. A systematic scheme of convexapproximation of this problem follows below.

Obviously, the constraints in (13) are non-convex due tothe concave term −|| · ||22. In the light of the CCP, thisconcave part is linearized to obtain a convex approximation[31]. For the description purpose, let us denote by x(n) thevalue of an optimization variable x after n iterations of theproposed iterative algorithm described below in Algorithm 1.In iteration n+1, by the first order Taylor series expansion, allthe constraints in (13) are approximated respectively as (15).

The non-convex constraints (8b)-(8d) have been approx-imated by (10b), (12a) and (15). In summary, the convexproblem in the (n + 1)th iteration of the first proposedalgorithm is given by

(Pn+1) ,

max.

s,w,u,t,z,v,β

(∏Nj=1 vj

) 1N

s.t. (10b), (12a), (15),11×Ksj = 1, ∀j ∈ N ,0 ≤ s ≤ 1.

(16a)

(16b)(16c)(16d)

Note that to arrive at (Pn+1), we have used the factthat maximizing

∑j∈N log vj is equivalent to maximizing

Page 6: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

6

(P) ,

max.s,w,v,β,t,u

∑Nj=1 log vj

s.t.∑t∈N\{j} ||st + βjt||22 −

∑t∈N\{j} ||st − βjt||22 ≤ 4(zj − σ2

j ), ∀j ∈ N[βjt]k ≥ |hkjwkt|2, ∀t ∈ N \ {j},∀k ∈ K(zj + vj − 1)2 − (zj − vj + 1)2 − ||sj + tj ||22 + ||sj − tj ||22 ≤ 0, ∀j ∈ N[tj ]i − Re(hijwij)

2 − Im(hijwij)2 ≤ 0, ∀j ∈ N ,∀i ∈ K

4γminj zj − ||sj + tj ||22 + ||sj − tj ||22 ≤ 0, ∀j ∈ N‖wij‖22 ≤ uij , ∀j ∈ N ,∀i ∈ K||si + ui||22 − ||si − ui||22 ≤ 4pmax

i , ∀i ∈ K11×Ksj = 1, ∀j ∈ N0 ≤ s ≤ 1.

(14a)

(14b)

(14c)

(14d)

(14e)

(14f)

(14g)

(14h)(14i)(14j)

∑t∈N\{j} ||st + βjt||22 ≤

∑t∈N\{j} ||s

(n)t − β

(n)jt ||22 + 2〈s(n)t − β

(n)jt , st − s

(n)t − βjt + β

(n)jt 〉+ 4(zj − σ2

j ), (15a)

(vj − 1 + zj)2 + ||sj − tj ||22 ≤(v

(n)j − 1− z(n)j )2 + 2〈v(n)j − 1− z(n)j , vj − v(n)j − zj + z

(n)j 〉+ ||s(n)j + t

(n)j ||22+

2〈s(n)j + t(n)j , sj − s

(n)j + tj − t

(n)j 〉, (15b)

[tj ]i ≤|hijw(n)ij |

2 + 2Re(w

(n)Hij hHijhij(wij −w

(n)ij )), (15c)

4γminj zj + ||(sj − tj)||22 ≤||s

(n)j + t

(n)j ||

22 + 2〈s(n)j + t

(n)j , sj − s

(n)j + tj − t

(n)j 〉, (15d)

||si + ui||22 ≤||s(n)i − u

(n)i ||22 + 2〈s(n)i − u

(n)i , si − s

(n)i − ui + u

(n)i 〉+ 4pmax

i . (15e)

(∏Nj=1 vj

) 1N , which is concave in v, and the concavity of

the objective function follows due to the monotonicity of thelog(·) function. Moreover, the geometric mean of v in (16a)admits an SOC presentation [44, Sect. 2.3.5] and thus (Pn+1)can be cast as an SOCP. To conclude this section, the proposedalgorithm for solving (P) is outlined in Algorithm 1, whichis also referred to as the CR-based algorithm in the sequel ofthe paper. After solving the Algorithm 1, a post-processingprocedure is normally required since the relaxed variables canbe non-binary. Interestingly, we find numerically that the CR-based algorithm produces nearly binary values at convergence.More precisely, there exists a group of relaxed variables withvalues very close to zero which makes the post-processingtrivial. More numerical details are provided in Sect. IV. Notethat to find the actual beamforming vectors we need to re-runAlgorithm 1 for the fixed selection vector s obtained from therounding process.

Remarks: We note that the CCP has a long historyand has been successfully applied in a variety of scenarios(see [31], [45] and references therein). By linearizing theconcave part, it is shown that the optimal solution at thecurrent iteration is also feasible to the problem encounteredin the next iteration. Thus, the objective is always improveduntil convergence. A more detailed convergence analysis ispresented in Sect. III-E.

C. Group Sparsity (GS)-based Design

In the first method we introduced binary variables to repre-sent the connection status of APs and users. In the secondmethod we will solve the JTMUA problem by viewing it

as sparsity constrained optimization problem. This method isinspired from the theory of sparse representation of signals,which has received growing interest recently. To proceed, letus for the moment fix the selection variables vector s = 1K×J ,and thus the rate expression in (3) reduces to

Rj = log(1 + γj(w)), (18)

whereγj(w) =

∑i∈K |hijwij |2

σ2j+

∑k∈K

∑t∈N\{j}|hkjwkt|2

. (19)

To make Rj a valid expression for the data rate of user j as in(5), in the numerator of the fraction in (19), all beamformerswij’s related to user j must be made zero except the oneassociated with the selected AP. To clarify our point, let usdefine a matrix Ψj for user j as

Ψj =

[w1j ]1 · · · [w1j ]T...

...[wmj ]1 · · · [wmj ]T

......

[wij ]1 · · · [wij ]T...

...[wKj ]1 · · · [wKj ]T

∈ CK×T (20)

where the ith row of Ψj corresponds to the set of beamformersassociated with the ith AP.

Now, in order to select an appropriate AP to communicatewith user j, all rows of Ψj should be nulled out except, say, themth one (shown in gray color). In mathematical programming,it is equivalent to imposing some degree of sparsity on Ψj .More precisely, we need to impose group sparsity on Ψj , so

Page 7: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

7

Algorithm 1 Continuous relaxation (CR) approach for solving(P)Initialization:

1: Set n = 0 and generate s(0) ∈ {0, 1} such that theconstraints in (2) are satisfied. To increase the chance ofobtaining a feasible solution, a reasonable way is to assignusers to the APs with higher channel gains.

2: With the given s(0), consider the following feasibilityproblem

find w (17a)s.t. γmin

j ≤ γj(w, s0), ∀j ∈ N (17b)∑j∈N s

(0)ij ‖wij‖22 ≤ pmax

i , ∀i ∈ K. (17c)

Note that for a given s(0), the constraints in the abovefeasibility problem are SOC representable.

3: If (17) is feasible, then use the obtained w, along withs(0), to calculate β(0), t(0),v(0), z(0) and u(0) by settingthe inequalities in the constraints in which they appearto be equalities. If (17) is infeasible, regenerate s(0) andrepeat step 2 until a feasible point is achieved. More onthe initialization aspect appears in Section III-D.

Main loop:4: repeat5: Solve (Pn+1) to find an optimal solution and denote the

optimal solution as (w∗,β∗, t∗,v∗, z∗,u∗, s∗).6: Update (w(n+1),β(n+1), t(n+1),v(n+1), z(n+1),

u(n+1), s(n+1)) = (w∗,β∗, t∗,v∗, z∗,u∗, s∗)7: n→ n+ 18: until convergence

that all rows of Ψj except one are encouraged to be zero asdiscussed in [46], [47]. This can be done by introducing amixed l1/lq norm for matrix Ψj for q > 1 . Specifically, themixed l1/lq norm acts as the lq norm for the rows of Ψj andthe l1 norm for the columns of Ψj . We note that if q = 1 thenthe mixed l1/lq norm is actually the sum of the absolute valuesof all entries of Ψj and, thus, no group sparsity is achieved.The values, q = 2 and q =∞ are the most commonly used forgroup sparsity inducing norm. However, as discussed in [47],q =∞ could lead to undesired solutions, such as componentsin a row having equal magnitude. Therefore, we consider q =2 in this paper and, the mixed l1/l2 norm metric for Ψj isdefined as

‖Ψj‖1,2 =∑i ‖(Ψj)i‖2 =

∑i(∑t |[wij ]t|2)1/2. (21)

In the second proposed approach, instead of (P), we considerthe continuous optimization problem given by

(P) ,

max.w

∑j∈N

log(1 + γj(w))− ρ ‖Ψj‖1,2

s.t. γminj ≤ γj(w), ∀j ∈ N∑j∈N ‖wij‖22 ≤ pmax

i , ∀i ∈ K

(22a)

(22b)

(22c)

where ρ is a positive constant controlling the degree of sparsityof the solution. Problem (P) is still non-convex, but we canfollow similar steps as those used in developing CR-based

algorithm to solve it. In what follows, the notations definedin the CR-based algorithm will be reused, unless otherwisementioned. First, rewrite (22) as

max.w,v

∑j∈N log vj − ρ ‖Ψj‖1,2 (23a)

s.t. vj ≤ 1 + γj(w), ∀j ∈ N (23b)(22b), (22c) (23c)

where v ∈ RN×1. Note that (22c) is a convex constraint and(22b) and (23b) are similar to (8c) and (8b). Thus, (22b) and(23b) can be rewritten as in (9), but without including s, i.e.,

zj ≥ σ2j +

∑t∈N\{j} |hjwt|2, ∀j ∈ N (24a)

(vi − 1)zj ≤ |hjwj |2, ∀j ∈ N (24b)γminj zj ≤ |hjwj |2, ∀j ∈ N (24c)

where we have defined hj , [hTj,1,hTj,2, . . .h

Tj,K ] ∈ C1×(KT )

as the aggregated channel including the channels from all APsto user j, and wj = [wT

j,1,wTj,2, ...w

Tj,K ]T ∈ CKT×1 to be

the vector staking all the beamformers associated with userj. Observe that (24a) is convex and according to the SCAprinciple followed in (9), we can replace (24b) and (24c) as

(vj−1+zj)2 ≤ 2(vj−v(n)j −zj+z

(n)j )(v

(n)j −1−z(n)j )+|hjw(n)

j |2

+ (v(n)j − 1− z(n)j )2 + 2Re

(w

(n)Hij hHj hj(wj −w

(n)j ))

(25)

and

γminj zj ≤ |hjw(n)

j |2 + 2Re(w(n)Hj hHj hj(wj −w

(n)j )), (26)

respectively. Using the same arguments as in [32], we canshow that there exists ρ′ such that max

w,v,z{∑j∈N log vj −

ρ||Ψj ||1,2 |(22c), (24a), (25), (26)} is equivalent tomaxw,v,z

{(∏j∈N vj)

1/N − ρ′||Ψj ||1,2 |(22c), (24a), (25), (26)}. In

summary, the convex problem in iteration n+ 1 of the secondproposed iterative method is given by

(Pn+1) ,

max.w,v,z

(∏j∈N vj)

1N−

∑Nj=1 ρ

′ ‖Ψj‖1,2s.t. (22c), (24a), (25), (26).

(27a)

(27b)

The formulation in (27) is an SOCP. The group sparsity-basedmethod is outlined in Algorithm 2, which is also referred toas the GS-based algorithm in the rest of the paper. In orderto find an appropriate AP for a particular user j, a post-processing procedure, outlined in Algorithm 2 above, is alsorequired after the iterative process has converged. The problemof optimizing the number of active APs is not considered inthis paper. Such a selection process will involve iterativelyoptimizing the set of active APs and their beamformers, whichwill be elaborated in future works. Before proceeding furtherwe remark that if a user is allowed to associate with severalAPs, then a sparsity-based approach is more preferable. Thereason is that a few rows of matrix Ψ can be nonzero andpost-processing is trivial.

Page 8: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

8

Algorithm 2 Group sparsity based approach for the JTMUAproblemInitialization:

1: Set n = 0 and find a feasible solution (w(0),v(0), z(0))to (P) using the steps described in the initialization stageof Algorithm 1. Alternatively, the method presented inSection III-D can be used for this purpose.

Main loop:2: repeat3: Solve (Pn+1) and denote an optimal solution as

(w∗,v∗, z∗).4: Update (w(n+1),v(n+1), z(n+1)) = (w∗,v∗, z∗) and

n→ n+ 1.5: until convergence

Post-processing:6: For each user j ∈ N calculate the l2 norm of each

row in Ψ∞j , where Ψ∞j denotes the value of Ψj at theconvergence of the iterative process. Then the selected APfor user j is the one associated with the row having thelargest l2 norm. For numerical experiments considered inSection IV, it is seen that the l2 norm of the selected rowis higher than 0.01, while that of the others is nearly zero.

D. Feasible Initialization of Algorithms 1 and 2In general, one of the challenges in applying SCA frame-

work to solve a non-convex problem is to find a feasible pointto start the iterative procedure. In some problems such asthe one in [42], this can be done easily by scaling/rescalingoperation. Unfortunately, such simple manipulations do notapply to the considered problem, and thus finding an initialpoint to start Algorithms 1 and 2 is nontrivial. For thisreason, a heuristic way to find a feasible point for the CR-based algorithm is presented here. Specifically, we first setthe elements of s(0) to be 0 or 1 based on a given user-APassociation which is determined by path loss, i.e. users areassigned to the AP that has the smallest path loss. For thisset of s(0), the problem of finding a set of beamformers thatsatisfy (7b) and (7c) becomes a second order cone feasibilityproblem which can be solved easily by conic solvers. If a set ofbeamformers feasible to (7b) and (7c) are found, then we canstart the CR-based algorithm, otherwise we need to regenerates(0) and repeat the process until a feasible point is found.Similar arguments also apply to the GS-based algorithm. Inthis subsection a more efficient method to find an initial pointfor the two proposed algorithms is described. Towards thisend, let us write a generic convex formulation of the problemin iteration k + 1 of the proposed methods (i.e., (16) forAlgorithm 1 and (22) for Algorithm 2) in a compact formas

max.x

f(x) (28a)

s.t. gi(x) ≤ 0, i = 1, 2, . . . ,m (28b)gp(x; x(k)) ≤ 0, p = 1, 2, . . . , n (28c)

where f(x) is concave, gi(x) is convex and, gp(x; x(k)) isa convex approximation of a non-convex constraint aroundpoint x(k). Note that x(k) denotes the value of the optimization

variable in the SCA’s iteration k. In general, it is difficult togenerate x(0) such that problem (28) is feasible. To overcomethis issue, we use the method introduced in [48] and considera regularized version of (28) given by

max.x,α≥0

f(x)− γ∑m+nj=1 αj (29a)

s.t. gi(x) ≤ αi, i = 1, 2, . . . ,m (29b)gp(x; x(k)) ≤ αm+p, p = 1, 2, . . . , n (29c)

where γ > 0 is a constant and α ≥ 0 is a vector of m+n newlyintroduced variables. The idea is to introduce an optimizationvariable for each constraint in problem (28) so that (29) isalways feasible for any x(0). This is true since we can findsufficiently large α ≥ 0 for a given x(0). That is to say, aniterative algorithm based on SCA method applied to (29) canstart from any x(0). By the maximization of the objective in(29a), α will eventually decreases to zero after some iterations.Thus, (29) and (28) are then equivalent and the obtained valueof x is also feasible to (28), which can be used to initializeAlgorithms 1 and 2.

We note that the parameter γ controls the rate at whichthe auxiliary variables αs converge to zero. If γ is chosentoo large, the maximization enforces α to decrease quicklyas feasibility is emphasized. In contrast, if γ is small, themaximization focuses on optimizing the original objective and,thus, α decreases slowly. Balancing between the optimalityand the infeasibility plays an important role.

E. Complexity and Convergence Analysis

Complexity Analysis: As mentioned earlier, our originalproblem (7) is a NP-hard problem even with fixed APs. That is,the JTMUA problem has exponential complexity in the worst-case. In this section the complexity of the proposed SCA basedalgorithms is discussed. For complexity comparison purpose,the linear constraints in both algorithms are ignored, since,compared to the SOC constraints, they have minor contributionto the overall computational cost. It is difficult, if not impossi-ble, to provide an analytical bound on the number of iterationsfor Algorithms 1 and 2 to converge. Therefore, we present thecomplexity for solving (Pn) and (Pn) instead. To this end,we recall a result presented in [44, Sect. 4.6.2], which statesthat the worst-case arithmetic complexity of solving an SOCPproblem is O((m+ 1)1/2n(n2 +m+

∑mi=1 k

2i )), where n is

the number of variables, m is the number of SOC constraints,and ki is the dimension of the ith SOC constraint.1 For (Pn)and (Pn), it can be seen that n � ki,∀i, and thus we cansimplify the complexity estimate to O((m+1)1/2n(n2 +m)).Applying this result to (Pn) and (Pn), the complexity of theSOCP in Algorithms 1 and 2 in each iteration is given byO((KN+K+N+1)1/2(KN+KNT+N)((KN+KNT+N)2 + KN + N + K)) and O((K + N + 1)1/2(KNT +N)((KNT + N)2 + K + N)), respectively. Obviously, thecomplexity of the GS-based algorithm is lower than that ofCR-based algorithm, since the GS-based algorithm has lessvariables and constraints compared to CR-based algorithm.

1Here we skip the term O(log(1/ε)) which depends on solution accuracyε > 0.

Page 9: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

9

It is again emphasized that the overall complexity of eachalgorithm depends on the number of iterations SCA takes toconverge, which is hard to predict analytically. In Sect. IV, itis numerically observed that the number of iterations that theCR-based algorithm takes to converge is larger than that ofthe GS-based algorithm.

Convergence Analysis: The convergence analysis of the twoproposed algorithms is similar. Thus, a unified representationwill be followed for this purpose in the sequel. Let us generallyexpress the non-convex design problem seen in Algorithm 1and 2 as

max.x≥0

f(x) (30a)

s.t. gi(x) ≤ 0, i = 1, 2, . . . ,m (30b)hp(x) ≤ 0, p = 1, 2, . . . , n. (30c)

where gi(x) is convex and hp(x) in non-convex. Further thenon-convex function hp(x) is expressed as a difference oftwo convex functions: hp(x) = h1p(x) − h2p(x). The convexapproximation gp(x; x(k)) is found as

gp(x;x(k)) = h1

p(x)− h2p(x

(k))−∇h2p(x

(k))(x− x(k)) (31)

where ∇(·) denotes the gradient operator. Note that due to thelinearization, we have hp(x) ≤ gp(x; x(k)) for all x.

Let Xk, {x(k)}, and {f(x(k))} represent the convex feasibleset, the optimal solution, and the optimal objective value atiteration k of Algorithm 1 or 2, respectively. Further, let Xbe the non-convex feasible set for the corresponding originalproblem. Then the following properties hold [49]• Xk ⊆ X . This is easily seen because hp(x) ≤gp(x; x(k−1)) ≤ 0, which implies that if x is feasibleto (Pk), it is also feasible to the orignal problem, i.e.,x ∈ X .

• x(k) ∈ Xk∩Xk+1. That x(k) ∈ Xk is obvious. At iterationk+ 1, the constraint becomes gp(x; x(k)) ≤ 0. It is clearfrom (31) that when x = x(k), then gp(x

(k); x(k)) =hp(x

(k)) ≤ 0. This simply implies that x(k) is feasibleto (Pk+1), i.e., x(k) ∈ Xk+1.

• f(x(k+1)) ≥ f(x(k)). This is in fact a direct consequenceof the two above properties. Since x(k) is a feasiblesolution of (Pk+1), its objective function value f(x(k))is no larger than the optimal value f(x(k+1)).

In summary, Algorithm 1 or 2 generate a non-decreasingsequence objective f(x(k)). Further, the feasible set of theoriginal problem is bounded and thus f(x(k)) is guaranteedto converge.

We remark that strict increase in {f(x(k))} cannot beachieved in Algorithm 1 or 2. The reason is that {f(x)}is not strictly convex with respect to x. Consequently, theconvergence of iterates {x(k)} is not generally guaranteed.To achieve a stronger convergence result, consider a modifiedformulation of (Pn) or (Pn), in which the objective f(x) isreplaced by f(x) − 1

2c ||x − x(k−1)||22, where c is a positivescalar parameter. The idea of adding a quadratic term is basedon the proximal minimization algorithm [50, Sect 3.4.3]. Withthis modified formulation, a stronger result as stated in thefollowing lemma, can be established.

Lemma 1: The sequence {x(k)} generated by the modifiedversion of Algorithm 1 and 2 converges to a stationarysolution of (P) or (P), respectively.

Proof: Let us show the convergence to the stationarity of(P). Since x(k) is the optimal solution to Pk and due to theproximal operation, it holds that

f(x(k))− 12c||x(k)−x(k−1)||22 ≥ f(x)− 1

2c||x−x(k−1)||22,∀x ∈ Xk.

(32)We have shown that x(n−1) is feasible to Xn, and by settingx = x(k−1) in the above inequality we obtain

f(x(k))− f(x(k−1)) ≥ 12c ||x

(k) − x(k−1)||22. (33)

The inequality in (33) implies that the objective sequence{f(x(k))} strictly increases. Since {f(x(k))} is bounded fromabove as proved earlier, (33) also implies that

limk→∞12c ||x

(k) − x(k−1)||22 → 0. (34)

Now the rest of the proof follows the same arguments as thosein [49, Proposition 3.2], and thus is omitted here for brevity.

We note that the parameter c should not be too small, becauseotherwise the algorithm converges slowly. From (34), it iseasily seen that Lemma 1 still holds if the value of c isadaptively changed with the iterative process, but is notallowed to become vanishingly small. In practice, we onlyneed to consider adding the quadratic term if a strict increasein the objective value in the current iteration is not achieved.

F. Extension to the Admission Control Problem

In DNA networks, dynamic APs can come and leaveunpredictably. With the reduction of degrees of freedom dueto these leaving APs, serving all users in the system withtheir QoS demands is not always possible. In such cases someusers have to be dropped which gives rise to the admissioncontrol problem. Nevertheless, it should be ensured that thesum rate with remaining users is not negatively affected.From a feasibility viewpoint, we can simply drop the userwith the highest QoS requirement, and then the one with thesecond highest QoS requirement, and keep on doing so untilthe resulting problem (P) is feasible. However, this trivialway is a channel-unaware scheme and thus, the sum rate ofthe remaining users may be very small. In this subsection aprocedure to modify the above proposed algorithms to obtaina better sub-optimal solution is presented. First we introducea binary optimization variable aj ∈ {0, 1} corresponding touser j to denote if the user should be dropped or not. For theAC problem, we change connectivity constraint for user j in(7d) to the following

11×Ksj = aj . (35)

Page 10: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

10

That is, if aj = 1, user j should be served by at least one AP,and if aj = 0, user j is simply dropped. Now consider thefollowing problem

(PAC) ,

max.s,w,a

( N∏j=1

(1 + γj(w, s)))1/N−ζ∑N

j=1 aj

s.t. ajγminj ≤ γj(w, s), ∀j ∈ N

0 ≤ a ≤ 1

(7c), (7e), (35)

(36a)

(36b)(36c)(36d)

where a ∈ RN×1 are called the soft QoS requirements ofthe users, and ζ is a positive constant to strike a balancebetween sum rate maximization and problem feasibility. In(36c), a has been relaxed to take values on the interval[0, 1] so that continuous optimization methods used in thepreviously proposed algorithms can be applied. Note that theterm

∑j∈N aj in the objective (36a) is in fact the l1 norm of

a, and by minimizing∑j aj , sparsity in a is promoted. We

also remark that (PAC) is always feasible which can be easilyseen by simply setting a = 0. To solve (PAC) we can usethe approximations presented in the previous subsections. Inrelation to CR-based algorithm, the only change that needs tobe made is for (15d). Specifically, for (PAC), (15d) becomes

γminj (aj + zj)

2 + ||(sj − tj)||22 ≤ ||s(n)j + t

(n)j ||

22+

2〈s(n)j + t(n)j , sj − s

(n)j + tj − t

(n)j 〉+ γmin

j (a(n)j − z(n)j )2+

2γminj (a

(n)j − z(n)j )(aj − a(n)j − zj + z

(n)j ). (37)

As a result, (PAC) is optimized by solving the followingconvex problem in iteration n+ 1

(PACn+1) ,

max.

s,w,u,t,z,v,β,a

(∏Nj=1 vj

) 1N − ζ

∑Nj=1 aj

s.t. (10b), (15a), (15b), (37), (12a),(15e), (16d), (35), (36c).

(38a)

(38b)

After the iterative process converges, the terms {ajγminj } in

the soft QoS constraints are examined. The user with thesmallest value is dropped first, and Algorithms 1 and 2 areexecuted to solve (P). If solved, then we can stop and reportthe beamformers and the achieved sum rate. If not, we dropthe user with the largest soft QoS requirement among theremaining ones and repeat these steps until (P) becomesfeasible.

GS-based algorithm can also be modified in quite a similarmanner. Recall that Ψj defined in (20) is the matrix includingall beamformers associated with user j. To remove someusers we force Ψj to be zero for some j’s. Let us definea matrix Φ = [vec(Ψ1), vec(Ψ2), . . . , vec(ΨN )]T , wherevec(·) denotes the vectorization operation. That is, the mthrow of Φ contains all the beamformers associated with user m.Now the admission control problem can be viewed as forcingsome rows of Φ to zero. For this purpose, we can again applythe mixed l1/l2 norm to Φ as

‖Φ‖1,2 =∑m‖(Φ)m‖2 =

∑m∈N

(∑k∈K ||wkm||2

)1/2. (39)

Due to the introduction of a, the approximation in (26) needsto be changed accordingly. In fact, (26) becomes

γminj (zj+aj)

2 ≤ |hjw(n)j |2+2Re(w

(n)Hj hHj hj(wj−w

(n)j ))+

γminj (z

(n)j −a

(n)j )2 +2γmin

j (z(n)j −a

(n)j )(zj−z(n)j −aj +a

(n)j ).

(40)

In summary, the convex subproblem in iteration n+ 1 for thesparsity-inducing norm based iterative algorithm is given by

(PACn+1) ,

max.w,v,z,a

(N∏j=1

vj)1N−

N∑j=1

ρ′ ‖Ψj‖1,2−ρ′′ ‖Φ‖1,2

s.t. (22c), (24a), (25), (36c), (40)

(41a)

(41b)

where ρ′′ > 0 is a small positive parameter that controls thedegree of sparsity of Φ.

IV. NUMERICAL RESULTS

In this section, we numerically evaluate the performance ofthe proposed algorithms. In our simulation model, we considerone cluster with different numbers of users and APs 2. We setSINR threshold of all users to γmin = 0 dB and the varianceof AWGN, σ2 = 1. In our simulations, the channel vectorfrom AP i to user j is generated as hij =

√ηγhij , where

η represents log-normal shadowing with a standard deviationof 8 dB, γ denotes the path loss, and hij is distributed asCN (0, I). The path loss is modeled as γ = 10−κ/10, whereκ is given in dB by 30.5 + 35 log(d) and d is the distance inmeters [51]. The maximum transmission power pmax is fixedto 42 dBm for all APs. For GS-based algorithm, the parameterρ′ in (41a) is set to 2, unless otherwise stated. The proposedalgorithms are implemented in MATLAB environment usingthe conic solver SeDuMi [52] through the parser CVX [53].The stopping criterion for Algorithms 1 and 2 is whenthe increase in the objective values between two successiveiterations is less than ε = 10−4.

In the first set of numerical experiments, we study theconvergence rate of the two proposed algorithms. Specifically,Fig. 3 illustrates the convergence of the CR-based algorithmfor a system with K = N = T = 2 and two differentchannel realizations, which are randomly generated withoutconsidering the path loss and shadowing, i.e., η = γ = 1. Foreach channel realization, the CR-based algorithm is startedwith three different initial points. The first two are generatedaccording to steps 1-3 in Algorithm 1 (shown by the blueand black curves). For the two channel realizations considered,Algorithm 1 is first initialized by setting s(0)11 = s

(0)22 = 1 and

s(0)12 = s

(0)21 = 1, respectively. The second initial point is gen-

erated by setting s(0)21 = s(0)22 = 1 for both channel realizations

(marked by the blue curves in Fig. 3). The red color curvesfor both channel instances represent the initialization methodgiven in Sec. III-D. It can be observed that the convergencerate depends on the initial points but the same sum rate isachieved on convergence. The CR-based algorithm seems tobe stabilized after first 5–15 steps (cf. the black dashed curve)

2For large-scale networks we can use the concept of partitioning as shownin Fig. 2 and the performance of the whole network is expected to be theaggregated performance of each cluster.

Page 11: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

11

but at this stage, the relaxed variables sij ≈ 0.5. If the CR-based algorithm runs further, it finally produces nearly a binarysolution. Interestingly, it is numerically seen that Algorithm 1yields s close to binary in all cases, meaning that the rounding-off procedure (due to the continuous relaxation in (8f)) istrivial. It is difficult, if not impossible, to provide an analyticalexplanation to this numerical observation, but our intuitionis as follows. Compared to the standard formulation of anassignment problem, we have additional inequality constraints,for instance, (8c). Hence, our problem can be regarded asa generalized version of the assignment problem that alsoinvolves inequality constraints. When being relaxed to becontinuous, sm,j’s act as an AP-sharing factor among users.Now in order to maximize the system throughput, user-APassociation should be in such a way that signal part is maxi-mized and inter-user interference is minimized. This physicalmechanism perhaps encourages association variables to takeon binary values. In addition to this argument, we note thatrelaxing the discrete selection variables to lie in a continuousinterval has an upper bounding effect when a maximizationproblem is solved. At the same time the SCA solves a non-convex problem by solving a series of convex problems, thefeasibility sets of which are subsets of the original problem’sfeasibility set. Hence, by solving the given problem using SCAwith continuous selection variables, we end up being quiteclose to the optimal, and hence quite close to obtaining binarya solution. To analyze this point further, we consider the sameformulation (i.e., (7)) that used to develop Algorithm 1, butoptimize beamformers and selection variables in an alternatingmanner. Particular, for given selection variables {sij}, we usethe SCA principle to find the optimal beamformers {wij}for the resulting user-AP associations. Then, for the obtainedbeamformers, we again apply the SCA to find the best user-AP association. The convex approximate constraints in eachstep are exactly the same as Sect. III-A, except either {sij}or {wij} is treated as constant, accordingly. Our observationis that the value of sij is proportional to the norm of thecorresponding beamformer. Specifically, if ||wij ||2 is large,then so is sij . However, {sij} do not converge to binary valuesat convergence. Hence, it is the formulation of the problemcoupled with the SCA method which promotes the binarynature of selection variables.

In Fig. 4, the convergence results of Algorithm 2 areprovided for K = 4, T = 3 with different values of N and ρ′.The objective value returned at each iteration of Algorithm2 with different starting points and η = γ = 1 is shown.The legends ‘IM1’ and ‘IM2’ (also differentiated by solidand dashed curves) in Fig. 4 represent initialization methodsproposed in Sec III-D and step 1 of the GS-based algorithm,respectively. Regardless of the initialization, the GS-basedalgorithm converges to the same objective value with similarconvergence speed. We note that red and blue curves in Fig. 4represent results for the same channel realization but differentpenalty values ρ′. Fig. 4 shows that the convergence rate ofAlgorithm 2 is nearly independent of the choice of penaltyvalues ρ′. After the GS-based algorithm converges, the beam-formers obtained are used to calculate the actual sum rate (andof course ρ′ is ignored in the objective). Further, convergence

10 20 30 40 50 60 70

0.5

1

1.5

2

2.5

3

Iteration Index

Sum

rate

(b/s

/Hz)

s(0)11 = s

(0)22 = 1

s(0)21

= s(0)22

= 1

Method given in Sec. III. D

s(0)12 = s

(0)21 = 1

Channel realization 1

Channel realization 2

Fig. 3. Convergence of Algorithm 1 with different initialization points fortwo random channel realizations. The blue and black curves refer to the casewhen the initial points are generated using steps 1-3 of Algorithm 1. The redcurves represent the flexible method of Sec. III-D.

1 2 3 4 5

−12

−10

−8

−6

−4

−2

0

Iteration Index

Obj

ectiv

eva

lue

in(2

2a)

IM1 with N = 2, ρ′ = 2IM2 with N = 2, ρ′ = 2IM1 with N = 3, ρ′ = 2IM2 with N = 3, ρ′ = 2IM1 with N = 3, ρ′ = 3IM2 with N = 3, ρ′ = 3

Fig. 4. Convergence behavior of Algorithm 2 with different N and penaltyvalues. Continuous solid and dashed curves correspond to the initializationmethods proposed in section III-D and step 1 of Algorithm 2, respectively.

TABLE IRUN TIME (SEC.) COMPARISON FOR DIFFERENT CONFIGURATIONS.

N = 4 K = 3K = 5 K = 4 K = 3 N = 3 N = 2

Algorithm 1 380 310 220 180 72.5Algorithm 2 48.8 35.6 25.6 16.3 7.8

rate of the GS-based algorithm is relatively independent ofthe number of users, N in the system. Fig. 4 also shows that,compared to the CR-based algorithm, the GS-based algorithmconverges much faster. This may be attributed to the absenceof binary variables sij in Algorithm 2 that may take moreiterations to stabilize.

Table I shows the average run time required to execute thealgorithms with T = 3. We created the simulation code onMATLAB using CVX as a parser to solve the SOCP at eachiteration of Algorithms 1 and 2. The codes are run on aworkstation installed with Intel R© Core i5-4300U @ 1.9 GHzProcessor and 8GB RAM. It is seen that the complexity ofAlgorithms 1 and 2 increases with the problem size and, asexpected, the GS-based algorithm is much faster than the CR-based algorithm.

Page 12: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

12

We consider three different network settings to compare ourproposed algorithms with an optimal solution obtained by abrute force algorithm. For all cases, the number of users Nin the system is set to be N = 2, and the number of APs istaken as K = 2, 4 and K = 10, respectively. We note thatin the first setup, the numbers of APs and users are equal.Thus, the degree of AP selection is quite limited. Such ascenario actually resembles a dense network. On the otherhand, there are more APs than users in the second and thirdsetup. Thus, a user will have more degrees of freedom to selectan appropriate AP. We refer to a network similar to abovesetting as a sparse one. Due to the excessive computationtime of the optimal solution, the average sum rates in Fig. 5are calculated over only 100 channel realizations. We can seethat both algorithms deviate only 3%–7% from the optimalperformance for all three scenarios we consider, meaningperformances are very good even for relatively large networksbut with much less complexity compared to the brute forcealgorithm. In particular, the CR-based algorithm tends tooutperform the GS-based algorithm for a dense network wherethe degree of selection is limited, i.e., where the number ofAPs is small. On the other hand, when the number of APsis comparable to or larger than that of users, there will bea link of the most favorable channel conditions among allAPs. Thus, the network tends to contain a sparse solutionfor such cases. As a result, the GS-based algorithm becomesmore efficient as it aims at finding a high-performance sparsesolution. This observation will be further elaborated in thefollowing experiments.

The average sum rate of Algorithms 1 and 2 as a functionof the number of users N for different choices of K and Tis illustrated in Fig. 6. Here, blue solid and red dashed curvesrepresent Algorithms 1 and 2, respectively. The sum rate isaveraged over 5000 channel realizations and small-scale fadingis considered for the sake of simplicity. First, for small N ,(i.e., fewer users than APs), we observe that the sum rateincreases with N . The reason is that a user has sufficientdegrees of freedom to select the best APs, without causingmuch interference to the others. As a result, multiuser diversitycan be exploited to improve the achievable sum rate. However,when N > K, i.e., (more users than APs), the system has alimited degree of freedom in terms of AP selection, whichresults in a severe interference situation. Therefore, servingmore users will make worse the interference situation worse.This decreases the sum rate as can be seen in Fig. 6. We alsoobserve that, a higher sum rate can be achieved by a largernumber of transmission antennas and APs, which is easilyunderstood. Again, in Fig. 6, the CR-based algorithm performspoorly compared to the GS-based algorithm when the numberof users is small, and vice versa when the number of users islarge. Specifically, the central server can select the CR-basedalgorithm over the GS-based algorithm if K ≤ N .

Next, we study the sensitivity of Algorithm 1 towards chan-nel estimation errors. For this purpose, cumulative distributionfunctions (CDFs) of the sum rate in the presence of channelestimation errors are shown in Fig. 7. First, a set of channelrealizations for a system with K = 5, N = 5, T = 3 isgenerated, which is referred to as the perfect CSI. The CR-

2 3 4

6

8

10

12

14

16

sparse network

dense network

Number of transmission antennas, T

Sum

rate

(b/s

/Hz)

Optimal Solution (K = 2)Algorithm 1 (K = 2)Algorithm 2 (K = 2)Optimal Solution (K = 4)Algorithm 1 (K = 4)Algorithm 2 (K = 4)Optimal Solution (K = 10)Algorithm 1 (K = 10)Algorithm 2 (K = 10)

Fig. 5. Sum rate comparison of Algorithms 1 and 2 with the optimal solutionfor different network settings.

1 2 3 4 5 6

4

5

6

7

8

9

Number of users, N

Ave

rage

sum

rate

(b/s

/Hz)

K = 4, T = 4 (Alg. 1)K = 4, T = 4 (Alg. 2)K = 5, T = 3 (Alg. 1)K = 5, T = 3 (Alg. 2)K = 5, T = 4 (Alg. 1)K = 5, T = 4 (Alg. 2)

Fig. 6. Comparison of the achievable average sum rates of the two algorithmsfor different system parameters.

10 12 14 16 18 200

0.2

0.4

0.6

0.8

1

15.75 b/s/Hz

Sum rate (b/s/Hz)

CD

F

σ2 = 0.1σ2 = 0.01

Fig. 7. CDF of the sum rate with Gaussian channel estimation errors havingzero mean and different variances. System has been analyzed for 10000channel estimation errors.

based algorithm is applied to this perfect channel estimate,which results in a sum rate of 15.75 bps/Hz (shown by thedotted line in Fig. 7). To compute an empirical CDF, wemodel the actual channel vectors as the sum of the perfectCSI and channel estimation errors which are assumed to followGaussian distribution with zero mean and variance of σ2. The

Page 13: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

13

obtained beamformers are then used to calculate the sum ratefor each erroneous CSI and each curve in Fig. 7 is obtained byconsidering 10000 sets of channel errors. It is seen that due tothe presence of CSI errors, the rates tend to fluctuate aroundthe perfect CSI rate of 15.75 bps/Hz. When σ2 increases, CDFis more spread which means the sum rate deviates further fromthe expected rate.

For the next set of simulations, we consider a cluster withtwo static APs (named as S1, S2), three dynamic APs (namedas D3-D5), and five users (named as U1-U5), in a hexagonalarea of radius 75 m as shown in Fig. 8. Log-normal shadowingand path loss are considered with the parameters described atthe beginning of the Sec. IV. The dynamic state of the networkis analyzed by varying the number of available dynamic APswith time. At a given time instant t, it is assumed that therewill be m active dynamic APs, where m ∈ {0, .., 3}.

Fig. 9 shows the convergence of the CR-based algorithmwith dynamic behavior of the system taken into account. Ineach system configuration, we use 40 iterations for illustration.After 40 iterations, the system reconsiders the configurationto identify the changes in the network. If there is any change(different N or K), Algorithm 1 is re-executed so that the sys-tem can be optimized for the new configuration. This explainsthe sharp fall seen in Fig. 9 after 40 and 80 iterations. Asshown in the figure, we first fix the number of users and thenactivate the dynamic APs D3, D4 and D5 in order. In everyconfiguration, depending on the status of the user association,the elements of the selection vector are sij ∈ [0.01, 0.03] or[0.97, 0.99] after convergence of the algorithm. That is to say,the relaxed variables are nearly binary after convergence. Thesystem starts converging within a few iterations, indicating theefficiency of the joint optimization process.

In Fig. 10, we plot the sum rate versus the number ofactive dynamic APs for different algorithms. Note that, for agiven number of APs m, there are

(3m

)= 3!

m!(3−m)! differentways to choose m APs. For a particular scheme, two typesof sum rate performances are reported in Fig. 10. The firstone is the average sum rate of all possible cases, and thesecond one is the maximum sum rate among these. The twoperformances are differentiated by the suffix (avg) and (max)in the legends shown in Fig. 10. In particular we comparethe proposed algorithms with the simple method describedin [19], which is referred to as the PL-based method. ThePL-based model consists of a system where the user-APassociation is simply determined by the path loss, i.e., users areassociated with their nearest AP. Note that for a given user-APassociation, there are several methods to find the beamformers.For a fair comparison, we apply a branch and bound methodto compute optimal beamformers, and employ the PL-basedmethod for user-AP association. In other words, we benchmarkAlgorithms 1 and 2 with the best achievable performance ofthe PL-based method. It can be seen that Algorithms 1 and 2yield a gain of 11%–26% and 17%–39%, respectively, in termsof the average sum rates over the PL-based method. Similarly,the corresponding gains offered by Algorithms 1 and 2 formaximum sum-rates over the PL-based method are 5%–26%and 10%–39%, respectively. For Algorithms 1 and 2, thereis a slight difference between the maximum and average sum

−50 0 50

−50

0

50

Distance (m)

Dis

tanc

e(m

)

Dynamic APs

Static APs

Users

D3U3

S1 U1 S2

U5

U4

D5D4U2

Fig. 8. A more realistic system model with static and dynamic APs used inFigs. 9,10, and 5. The axes display the distance between users and APs inmeters.

0 20 40 60 80 100 120

10

20

30

40

Iteration index

Sum

rate

(b/s

/Hz)

N = 5N = 4 K = 5

K = 4

K = 3

Fig. 9. The achieved sum rate of Algorithm 1 with iterations when the systemparameters K and N dynamically change.

0 1 2 3

15

20

25

30

Number of dynamic APs

Sum

rate

(b/s

/Hz)

Algorithm 2 (max)Algorithm 2 (avg)Algorithm 1 (max)Algorithm 1 (avg)PL-based method (max)PL-based method (avg)

Fig. 10. Sum rate comparison of different algorithms with the number ofdynamic APs. The positions of users, static and dynamic APs are shown inFig. 8.

rate, while the difference is sharper for the PL-based method.This basically implies that, by jointly optimizing user-APconnection and beamformers, the effects of the locations ofthe APs are minimized. We also see that as more dynamicAPs enter the system, the GS-based algorithm turns superior tothe CR-based algorithm since the resulting network becomes

Page 14: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

14

more sparse. This observation is in fact consistent with theones reported in the previous experiments.

In the last experiment, we investigate the dynamic behaviorof the network and the performance of the proposed admissioncontrol algorithms, as shown in Fig. 11. In particular, weconsider the same network setup as the one described in Fig.8, but SINR thresholds {γmin

k } are modified. Specifically,γmin1 , γmin

2 , γmin4 are set to 5.22 dB, while γmin

3 and γmin5

are set to 7 dB and 3 dB, respectively. Performance isanalyzed for two cases, first with (S1, S2, D4) and secondwith (S1, S2, D3). For the two scenarios, the problem (P)is feasible when all APs are active, and the resulting sumrate is labeled by ‘All APs active’ in Fig. 11. To study theproposed AC algorithms, D4 is switched off in the first setupand S1 in the second one. Since the remaining two APscannot provide sufficient diversity gains to serve all five users,the resulting problem (P) becomes infeasible, and admissioncontrol mechanism is thus required. Numerically it is observedthat the two proposed AC algorithms using formulations in(38) and (41) drop U5 in the first scenario and U3 in thesecond one to make the corresponding system feasible again.We then execute Algorithms 1 and 2 on the remaining fourusers to find the beamformers and the resulting sum rates,which are indicated by ‘Proposed AC Alg.’ in Fig. 11. Wecompare it to the simple method of dropping the users withthe highest QoS demand, referred to as ‘QoS-based Alg.’ inFig. 11. We remark that the proposed AC algorithms are notguaranteed to drop the least number of users, since the optimalsolution for this problem is not known. It is also seen that thesystem performance is not only dependent on the number ofactive APs but also on the location and connection of the activeAPs.

V. CONCLUSION

Two iterative algorithms have been proposed to optimizethe user-AP assignment and the beamformers in the downlinkof DNA networks. In the first method, the binary optimizationvariables are simply relaxed to be continuous and an iterativeprocedure based on the SCA framework to arrive at a sequenceof SOCPs is found. In the second method, the selectionprocess is formulated as finding a solution to a sparsityconstrained optimization problem. Our extensive numericalresults suggest that the first approach is more effective in termsof the achievable data rate for dense networks, although itsconvergence rate is relatively sensitive to the initial point. Onthe other hand, the second approach is shown to achieve fasterconvergence, and a higher sum rate performance for sparsenetworks, wherein the degree of selection is high. In particular,the CR-based algorithm and the GS-based algorithm performcomparatively well against the optimal solution that has aprohibitively high complexity. Moreover, the two proposedalgorithms have been demonstrated to outperform the existingmethod which is simply based on the path loss between APsand users for a quite realistic scenario. The effects of mobilityon the efficiency of these algorithms and finding an optimalsolution for the AC problem will be studied in future work.Also the impact of backhaul capacity constraints in supportingthe data sharing to the APs will be addressed.

All APsactive

ProposedAC Alg.

QoS-basedAlg.

All APsactive

ProposedAC Alg.

QoS-basedAlg.

0

5

10

15

20

Sum

rate

(b/s

/Hz)

Algorithm 1 Algorithm 2

1st setup: (S1, S2, D1) 2nd setup: (S1, S2, D3)

Fig. 11. Performance evaluation of the proposed admission control algorithmsfor different network setups.

REFERENCES

[1] I. Sugathapala, L.-N. Tran, M. F. Hanif, B. Lorenzo, S. Glisic, andM. Juntti, “SOCP based joint throughput maximization and user associ-ation in dynamic networks,” in Proc. IEEE ICC Workshop on MIMO andcognitive radio technologies in multihop network (MIMOCR), London,UK, June 2016, pp. 573–578.

[2] A. S. Shafigh, B. Lorenzo, S. Glisic, J. Perez-Romero, L. DaSilva,A. Mackenzie, and J. Roning, “A framework for dynamic network ar-chitecture and topology optimization,” IEEE/ACM Trans. Netw., vol. 24,no. 2, pp. 717–730, 2016.

[3] B. Lorenzo, F. J. Gonzalez-Castano, and Y. Fang, “A novel collaborativecognitive dynamic network architecture,” IEEE Wireless Commun.,vol. 21, no. 1, pp. 74 – 81, 2017.

[4] A. Bobek, E. Zeeb, H. Bohn, F. Golatowski, and D. Timmermann,“Device and service templates for the devices profile for web services,”2008, pp. 797–801.

[5] C. W. Tan, M. Chiang, and R. Srikant, “Maximizing sum rate andminimizing MSE on multiuser downlink: Optimality, fast algorithms andequivalence via max-min SIR,” in Proc. IEEE International Symposiumon Information Theory, Seoul, South Korea, June 2009, pp. 2669–2673.

[6] Q. Shi, M. Razaviyayn, Z.-Q. Luo, and C. He, “An iteratively weightedMMSE approach to distributed sum-utility maximization for a MIMOinterfering broadcast channel,” IEEE Trans. Signal Process., vol. 59,no. 9, pp. 4331 – 4340, 2011.

[7] J. Kaleva, A. Tolli, and M. Juntti, “Decentralized sum rate maximizationwith QoS constraints for interfering broadcast channel via successiveconvex approximation,” IEEE Trans. Signal Process., vol. 64, no. 11,pp. 2788–2802, 2016.

[8] H.-J. Choi, S.-H. Park, S.-R. Lee, and I. Lee, “Distributed beamformingtechniques for weighted sum-rate maximization in MISO interferingbroadcast channels,” IEEE Trans. Wireless Commun., vol. 11, no. 4,pp. 1314–1320, 2012.

[9] Y.-S. Wang, Y.-W. P. Hong, and W.-T. Chen, “Sum-rate maximizationand energy-cost minimization for renewable energy empowered base-stations using zero-forcing beamforming,” in Proc. Signal and Informa-tion Processing Association Annual Summit and Conference, Kaohsiung,Taiwan, Oct. 2013, pp. 1–9.

[10] X. Li, S. You, L. Chen, A. Liu, and Y. E. Liu, “A new algorithm forthe weighted sum rate maximization in MIMO interference networks,”in Proc. IEEE Wireless Communications and Networking Conference,New Orleans, LA, USA, Mar. 2015, pp. 147–152.

[11] L. Zheng and C. W. Tan, “Maximizing sum rates in cognitive radionetworks: Convex relaxation and global optimization algorithms,” IEEEJ. Sel. Areas Commun., vol. 32, no. 3, pp. 667–680, 2013.

[12] I.-W. Lai, L. Zheng, C.-H. Lee, and C. W. Tan, “Beamforming dualityand algorithms for weighted sum rate maximization in cognitive radionetworks,” IEEE J. Sel. Areas Commun., vol. 33, no. 5, pp. 832–847,2015.

[13] N. Funabiki, J. Shimizu, T. Nakanishi, and K. Watanabe, “A proposal ofan active access-point selection algorithm in wireless mesh networks,” inProc. International Conference on Network-Based Information Systems(NBiS), Tirana, Albania, Sep. 2011, pp. 112–117.

[14] Y. He, D. Perkins, and S. Velaga, “Design and implementation ofCLASS: A cross-layer ASSociation scheme for wireless mesh net-works,” in Proc. IEEE Conference on Computer Communications Work-shops (INFOCOM), San Diego, CA, USA, Mar. 2010, pp. 1–6.

Page 15: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

15

[15] D. Gong and Y. Yang, “AP association in 802.11n WLANs withheterogeneous clients,” in Proc. IEEE INFOCOM, Orlando, FL, USA,Mar. 2012, pp. 1440–1448.

[16] G. Athanasiou, T. Korakis, O. Ercetin, and L. Tassiulas, “A cross-layerframework for association control in wireless mesh networks,” IEEETrans. Mobile Comput., vol. 8, no. 1, pp. 65–80, 2009.

[17] S. Glisic, Advanced Wireless Networks: Technology and Business Mod-els, 3rd ed. A John Wiley and Sons. Ltd., 2016.

[18] C.-Y. Huang and P. Ramanathan, “Joint association and power adaptionin WiFi community networks,” in Proc. Annual Conference on Infor-mation Sciences and Systems (CISS), Baltimore, MD, USA, Mar. 2011,pp. 1–6.

[19] J. G. Andrews, S. Singh, Q. Ye, X. Lin, and H. Dhillon, “An overviewof load balancing in HetNets: Old myths and open problems,” IEEEWireless Commun. Mag., vol. 21, no. 2, pp. 18–25, 2014.

[20] B. Kauffmann, F. Baccelli, A. Chaintreau, V. Mhatre, K. Papagiannaki,and C. Diot, “Measurement-based self organization of interfering 802.11wireless access networks,” in Proc. IEEE International Conference onComputer Communications (INFOCOM), Barcelona, Spain, May 2007,pp. 1451–1459.

[21] S. Vasudevan, K. Papagiannaki, C. Diot, J. Kurose, and D. Towsley, “Fa-cilitating access point selection in IEEE 802.11 wireless networks,” inProc. ACM SIGCOMM Conference on Internet Measurement, Berkeley,CA, Oct. 2005, pp. 293–298.

[22] Y. Fukuda, T. Abe, and Y. Oie, “Decentralized access point selectionarchitecture for wireless LANs,” in Proc. Wireless TelecommunicationSymposium, Pomona, CA, USA, May 2004, pp. 137–145.

[23] S. Hanly, “An algorithm for combined cell-site selection and powercontrol to maximize cellular spread spectrum capacity,” IEEE J. Sel.Areas Commun., vol. 13, no. 7, pp. 1332–1340, 1995.

[24] R. D. Yates and C.-Y. Huang, “Integrated power control and base stationassignment,” IEEE Trans. Veh. Technol., vol. 44, no. 3, pp. 638–644,1995.

[25] M. Hong, A. Garcia, J. Barrera, and S. G. Wilson, “Joint access pointselection and power allocation for uplink wireless networks,” IEEETrans. Signal Process., vol. 61, no. 13, pp. 3334–3347, 2013.

[26] D. H. N. Nguyen, L. B. Le, and T. Le-Ngoc, “Optimal dynamic pointselection for power minimization in multiuser downlink CoMP,” IEEETrans. Wireless Commun., vol. 16, no. 1, pp. 619 – 633, 2017.

[27] K. Shen and W. Yu, “Distributed pricing-based user association fordownlink heterogeneous cellular networks,” IEEE J. Sel. Areas Com-mun., vol. 32, no. 6, pp. 1100 – 1113, 2014.

[28] J. Li, J. Wu, M. Peng, and P. Zhang, “Queue-aware energy-efficient jointremote radio head activation and beamforming in cloud radio accessnetworks,” IEEE Trans. Wireless Commun., vol. 15, no. 6, pp. 3880 –3894, 2016.

[29] A. Gershman, N. Sidiropoulos, S. Shahbazpanahi, M. Bengtsson, andB. Ottersten, “Convex optimization-based beamforming,” IEEE SignalProcess. Mag., vol. 27, no. 3, pp. 62–75, 2010.

[30] T. Wang and L. Vandendorpe, “Successive convex approximation basedmethods for dynamic spectrum management,” in Proc. InternationalConference on Communications (ICC), Ottawa, ON, Canada, June 2012,pp. 4061–4065.

[31] S. You, L. Chen, and Y. E. Liu, “Convex-concave procedure for weightedsum-rate maximization in a MIMO interference network,” in Proc. IEEEGlobal Communications Conference, 2014, pp. 4060 – 4065.

[32] O. Mehanna, N. Sidiropoulos, and G. Giannakis, “Joint multicast beam-forming and antenna selection,” IEEE Trans. Signal Process., vol. 61,no. 10, pp. 2660–2674, 2013.

[33] S. Y. Park and D. J. Love, “Capacity limits of multiple antenna mul-ticasting using antenna subset selection,” IEEE Trans. Signal Process.,vol. 56, no. 6, pp. 2524–2534, 2008.

[34] S. E. Nai, W. Ser, Z. L. Yu, and H. Chen, “Beampattern synthesis forlinear and planar arrays with antenna selection by convex optimization,”IEEE Trans. Antennas Propag., vol. 58, no. 12, pp. 286–291, 2010.

[35] E. Karami and S. Glisic, “Self-management of mobile clouds in ad-vanced wireless networks,” in Proc. IEEE Network Operations andManagement Symposium (NOMS), Maui, HI, USA, Apr. 2012, pp. 1054–1060.

[36] ——, “Stochastic Models of Coalition Games for Spectrum Sharing inLarge Scale Interference Channels,” in Proc. International Conferenceon Communications (ICC), Kyoto, Japan, June 2011, pp. 1–6.

[37] Z. Khan, S. Glisic, L. DaSilva, and J. Lehtomaki, “Modeling thedynamics of coalition formation games for cooperative spectrum sharingin an interference channel,” IEEE Trans. on Computational Intelligenceand AI in Games, vol. 3, no. 1, pp. 17–30, 2010.

[38] Z.-Q. Luo and S. Zhang, “Dynamic spectrum management: Complexityand duality,” IEEE J. Sel. Topics Signal Process., vol. 2, no. 1, pp. 57–73, 2008.

[39] S. Joshi, P. Weeraddana, M. Codreanu, and M. Latva-aho, “Weightedsum-rate maximization for MISO downlink cellular networks via branchand bound,” IEEE Trans. Signal Process., vol. 60, no. 4, pp. 2090–2095,apr 2012.

[40] E. Bjornson, G. Zheng, M. Bengtsson, and B. Ottersten, “Robustmonotonic optimization framework for multicell MISO systems,” IEEETrans. Signal Process., vol. 60, no. 5, pp. 2508–2523, may 2012.

[41] M. F. Hanif, L.-N. Tran, A. Tolli, M. Juntti, and S. Glisic, “Efficientsolutions for weighted sum rate maximization in multicellular networkswith channel uncertainties,” IEEE Trans. Signal Process., vol. 61, no. 22,pp. 5659–5674, 2013.

[42] L.-N. Tran, M. F. Hanif, A. Tolli, and M. Juntti, “Fast convergingalgorithm for weighted sum rate maximization in multicell MISOdownlink,” IEEE Signal Process. Lett., vol. 19, no. 12, pp. 872–875,2012.

[43] H. Tuy, Convex Analysis and Global Optimization. Springer Interna-tional Publishing, 1998, vol. 22.

[44] A. Ben-Tal and A. Nemirovski, Lectures on Modern Convex Optimiza-tion: Analysis, Algorithms, and Engineering Applications. SIAM, 2001.

[45] T. Lipp and S. Boyd, “Variations and extension of the convex - concaveprocedure,” Optimization and Engineering, vol. 17, no. 2, pp. 263 – 287,2016.

[46] Q.-D. Vu, L.-N. Tran, M. Juntti, and E.-K. Hong, “Energy-efficientbandwidth and power allocation for multi-homing networks,” IEEETrans. Signal Process., vol. 63, no. 7, pp. 1684–1699, 2015.

[47] F. Bach, R. Jenatton, J. Mairal, and G. Obozinski, “Optimizationwith sparsity-inducing penalties,” Foundations and Trends in MachineLearning, vol. 4, no. 1, pp. 1–106, 2012.

[48] T. D. Quoc and M. Diehl, “Sequential convex programming methods forsolving nonlinear optimization problems with dc constraints,” Internalreport, pp. 426–430, 2011.

[49] A. Beck, A. Ben-Tal, and L. Tetruashvili, “A sequential parametricconvex approximation method with applications to nonconvex trusstopology design problems,” Journ. of Global Optimization, vol. 47, no. 1,pp. 29–51, 2010.

[50] D. P. Bertsekas and J. N. Tsitsiklis, Parallel and Distributed Computa-tion: Numerical Methods. Upper Saddle River, NJ, USA: Prentice-Hall,Inc., 1989.

[51] S. He, Y. Huang, S. Jin, F. Yu, and L. Yang, “Max-min energy efficientbeamforming for multicell multiuser joint transmission systems,” IEEECommun. Lett., vol. 17, no. 10, pp. 1956–1959, 2013.

[52] J. F. Sturm, “Using sedumi 1.02, a matlab toolbox for optimization oversymmetric cones,” 1998.

[53] M. Grant and S. Boyd, “CVX: Matlab software for disciplined convexprogramming, version 2.1,” http://cvxr.com/cvx, 2014.

Inosha Sugathapala (S’13) received her B. Sc.degree in Electrical and Electronic Engineering fromthe University of Peradeniya, Sri Lanka in 2007and the M. Eng. degree from the Asian Instituteof Technology, Thailand in 2011. She is currentlyworking on her Dr. Tech. degree in CommunicationsEngineering in University of Oulu, Finland. Inosha isalso a member of the research staff of the Centre forWireless Communications (CWC), Oulu, Finland.Her main research interests are in resource optimiza-tion, network sharing and multi-antenna networks.

Page 16: Topology Adaptive Sum Rate Maximization in the Downlink of Dynamic Wireless Networksjultika.oulu.fi/files/nbnfi-fe2018112749293.pdf · 2018-11-27 · to maximize the downlink system

0090-6778 (c) 2018 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.

This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation information: DOI 10.1109/TCOMM.2018.2816071, IEEETransactions on Communications

16

Muhammad Fainan Hanif received the Ph.D. de-gree in electrical and electronic engineering fromthe University of Canterbury, Christchurch, NewZealand, in 2011. In 2012 and 2013, he was as apostdoctoral researcher at the Centre for WirelessCommunications, the University of Oulu, Finland.Then in 2015 he worked as a Research Associatewithin the Computing and Communications Depart-ment of Lancaster University, United Kingdom. Atpresent, he is an Associate Professor at the Depart-ment of Electrical Engineering, the University of

Lahore, Lahore, Pakistan. His research interests include convex optimizationapplications in signal processing and modern communication systems.

Beatriz Lorenzo received her M.Sc. degree intelecommunication engineering from the Universityof Vigo, Spain, in 2008, and her Ph.D. degreefrom the University of Oulu, Finland, in 2012.Since 2014, she has worked as a senior researcherat Atlantic Research Center for Information andCommunication Technologies, University of Vigo.She was awarded a Fulbright Visiting Scholar Fel-lowship at the University of Florida (2016-2017).Her research interests include wireless networks,network architectures and protocol design, mobile

computing, optimization, and network economics.

Savo Glisic is a Professor of Telecommunicationsat University of Oulu, Finland, head of the net-working research group, and Director of Institutefor Networking Sciences. He was Visiting Scientistat Cranfield Institute of Technology, Cranfield, U.K.(1976-1977) and University of California, San Diego(1986-1987). He has been active in the field of wire-less communications for 30 years and has publisheda number of papers and books. The latest book”Advanced wireless Networks: 5G/6G joint designof technology and business models” John Wiley &

Sons, 2015, covers the enabling technologies for the definition of incoming5G systems.

He is running an extensive doctoral program in the field of wirelessnetworking (www.telecomlab.oulu.fi/kurssit/networks/). His research interestis in the area of network optimization theory, network topology control andgraph theory, cognitive networks and game theory, radio resource manage-ment, QoS and queuing theory, networks information theory, protocol design,advanced routing and network coding, relaying, cellular, WLAN, ad hoc,sensor, active and bio inspired networks with emphasis on genetic algorithmsand stochastic geometry. The latest interest is in the area of spectra sharing,robust heterogeneous network design, Artificial Intelligence (AI), Inter SystemNetworking (ISN), block chains and complex networks theory. He is doingresearch within the WiFiUS collaborative program between the NSF in USand Finnish Academy as well as on a number of research projects sponsoredby EU FP7 program. He is active within 5G ppp association preparing theprojects for Horizon 2020 calls. Dr. Glisic has served as the Technical ProgramChairman of the third IEEE ISSSTA’94, the eighth IEEE PIMRC’97, and IEEEICC’01. He was Director of IEEE ComSoc MD programs.

Markku Juntti (S’93-M’98-SM’04) received hisM.Sc. (EE) and Dr.Sc. (EE) degrees from Universityof Oulu, Oulu, Finland in 1993 and 1997, respec-tively.

Dr. Juntti was with University of Oulu in 1992–98.In academic year 1994–95, he was a Visiting Scholarat Rice University, Houston, Texas. In 1999–2000,he was a Senior Specialist with Nokia Networks.Dr. Juntti has been a professor of communicationsengineering since 2000 at University of Oulu, Centrefor Wireless Communications (CWC), where he

leads the Communications Signal Processing (CSP) Research Group. He alsoserves as Head of CWC – Radio Technologies (RT) Research Unit. Hisresearch interests include signal processing for wireless networks as wellas communication and information theory. He is an author or co-author insome 450 papers published in international journals and conference recordsas well as in books WCDMA for UMTS, Signal Processing Handbook and 5GWireless Technologies. Dr. Juntti is also an Adjunct Professor at Departmentof Electrical and Computer Engineering, Rice University, Houston, Texas,USA.

Dr. Juntti is an Editor of IEEE TRANSACTIONS ON COMMUNICATIONSand was an Associate Editor for IEEE TRANSACTIONS ON VEHICULARTECHNOLOGY in 2002–2008. He was Secretary of IEEE CommunicationSociety Finland Chapter in 1996–97 and the Chairman for years 2000–01. Hehas been Secretary of the Technical Program Committee (TPC) of the 2001IEEE International Conference on Communications (ICC 2001), and the Co-Chair of the Technical Program Committee of 2004 Nordic Radio Symposiumand 2006 IEEE International Symposium on Personal, Indoor and MobileRadio Communications (PIMRC 2006), and the General Chair of 2011 IEEECommunication Theory Workshop (CTW 2011). He has served as Co-Chairof the Signal Processing for Communications Symposium of Globecom 2014Signal Processing for Communications Symposium and IEEE GlobalSIP 2016Symposium on Transceivers and Signal Processing for 5G Wireless and mm-Wave Systems.

Le-Nam Tran (M’10–SM’17) received the B.S.degree in electrical engineering from Ho Chi MinhCity University of Technology, Ho Chi Minh City,Vietnam, in 2003 and the M.S. and Ph.D. degreesin radio engineering from Kyung Hee University,Seoul, Korea, in 2006 and 2009, respectively. Heis currently a Lecturer/Assistant Professor at theSchool of Electrical and Electronic Engineering,University College Dublin, Ireland. Prior to this, hewas a Lecturer at the Department of Electronic Engi-neering, Maynooth University, Co. Kildare, Ireland.

From 2010 to 2014, he had held postdoc positions at the Signal ProcessingLaboratory, ACCESS Linnaeus Centre, KTH Royal Institute of Technology,Stockholm, Sweden (2010-2011), and at Centre for Wireless Communicationsand the Department of Communications Engineering, University of Oulu,Finland (2011-2014). His research interests are mainly on applications ofoptimization techniques on wireless communications design. Some recenttopics include energy-efficient communications, cloud radio access networks,massive MIMO, and full-duplex transmission. He has authored or co-authoredin some 80 papers published in international journals and conference proceed-ings.

Dr. Tran is an Associate Editor of EURASIP Journal on Wireless Com-munications and Networking. He was Symposium Co-Chair of CognitiveComputing and Networking Symposium of International Conference onComputing, Networking and Communication (ICNC 2016).