1 s2.0 S1874490721002019 Main PDF
1 s2.0 S1874490721002019 Main PDF
1 s2.0 S1874490721002019 Main PDF
Physical Communication
journal homepage: www.elsevier.com/locate/phycom
article info a b s t r a c t
Article history: The demand for high capacity network services with stringent quality of service requirements is at a
Received 25 February 2021 rapidly accelerating rate due to the exponential rise in the numbers of mobile-connected devices. This
Received in revised form 1 August 2021 demand has motivated the use of the heterogeneous network (HetNet) architectures. However, even
Accepted 11 September 2021
though small-cell base-stations have relatively low power consumption, the overall aggregate power
Available online 24 September 2021
consumption of a dense HetNet is significant. Due to high inter-cell-interference and imbalanced loads
Keywords: in dense HetNets with conventional user association techniques, cell-edge users perceive dramatically
Heterogeneous networks (HetNets) less quality of service than their cell-center counterparts. The use of a Coordinated Multipoint (CoMP)
Green energy association can augment the service perceived by cell-edge users by allowing a single user to be jointly
Coordinated multipoint (CoMP) served by two base-stations. In this work, we propose a load balancing scheme for CoMP-enabled
transmission HetNets with hybrid energy supplies that jointly optimizes user latency and green energy utilization.
Broyden–Fletcher–Goldfarb–Shanno (BFGS) The proposed scheme employs a fractional solution to the user association problem to decide CoMP
Load balancing
transmission for cell-edge users, ultimately improving their data rates. Performance evaluations of the
User association
proposed scheme show a reduction in latency of 79% and on-grid power consumption by 99% compared
to conventional user association schemes that associate users based on the maximum received signal
strength. Furthermore, an improvement in the network sum-rate for cell-edge users by 24% has been
achieved compared to the traditional association scheme and as much as 40% over other existing
schemes.
© 2021 Elsevier B.V. All rights reserved.
https://doi.org/10.1016/j.phycom.2021.101464
1874-4907/© 2021 Elsevier B.V. All rights reserved.
M.K. Awad, A.A.M.R. Behiry and M.W. Baidas Physical Communication 49 (2021) 101464
An alternative approach to ON/OFF switching is redistributing BSs. Therefore, the control plane is decoupled from the user plane,
traffic to active BSs in order to maintain a specific performance allowing for an intuitive transition to programmable networks
measure while optimizing resource allocation. In [24], a joint and innovative development of novel services [33]. The RANC
BS activation and user association scheme is proposed to load- receives periodic updates from the physical BSs on the interfer-
balance backhaul in dense HetNets. The authors of [25] pro- ence map, traffic flows data, and user’s channel state information,
posed a distributed load-balancing scheme for renewable energy- based on which control decisions are made. These decisions are
powered HetNets, which redistributes traffic loads to optimize reported back to physical BSs as commands and configurations
users’ throughput. In [26], traffic loads were redistributed to for implementation.
achieve proportional-fairness of energy and load-based logarith- Several recent efforts have been devoted to the realization of
mic utility functions. The authors of [16] formulated the users the SoftRAN architecture in evolving wireless networks. For ex-
association problem as a control problem, where the controller ample, in [33], a flexible and programmable platform for SoftRAN
aims to guarantee the required QoS given the available renewable consisting of custom-tailored southbound application-
energy. programming-interfaces (APIs) was developed. Similarly, the au-
The aforementioned works have mainly focused on conserving thors in [34] developed a flexible and programmable platform
the on-grid consumed energy while maintaining proportional specifically for heterogeneous 5G RANs. Furthermore, recently
fairness of traffic loads on BSs, or optimizing user rates. However, the authors in [12] presented a benchmarking tool for the Sof-
the impact of high traffic loads on traffic delivery latency is not tRAN architecture and its controllers. In addition, in recent 3rd
captured by users’ achievable throughput. In [17], latency-aware Generation Partnership Project (3GPP) standards on 5G and next-
load balancing is considered. A distributed latency and energy- generation RAN (NG-RAN) architectures [35], the separation be-
aware user association scheme for 3-tier HetNets is proposed tween the control plane and user plane is strongly adopted.
in [27], while a software-defined centralized latency and energy- In this paper, we adopt a SoftRAN architecture under which
aware load balancing scheme is devised for HetNets in [28]. the physical MBSs and SBSs provide the RANC with a full view of
Despite the significant energy savings and overall network QoS the network status; e.g. estimates of harvested green energy and
enhancements achieved by the aforementioned schemes, they average traffic loads. Based on this status, the proposed scheme
provide no guarantees on the QoS performance of cell-edge users. associates users with BSs to balance the traffic-load, such that
In HetNets, CoMP transmissions can be used to improve the a well-balanced trade-off between traffic latency and on-grid
QoS perceived by cell-edge users. The authors of [18] proposed power consumption is maintained. Then, the RANC reports the
a greedy algorithm combined with a neural network-based al- user association decisions to the physical BSs, which routes flows
gorithm to balance network throughput and traffic loads for and transmits signals accordingly.
CoMP-enabled HetNets. Results demonstrate significant improve-
ments in the QoS perceived by cell-edge users. A load-aware 3.2. Network traffic model
CoMP-enabled HetNet with an arbitrary number of BS tiers is
considered in [3]. The approach aims to decrease the probability Let the set of BSs serving a geographical area A be denoted
of void BSs, while improving downlink data rates and coverage by B. Furthermore, let x ∈ A refer to a specific location on a two-
area of the network. The authors of [29] proposed a resource dimensional grid in the same geographical area2 Therefore, a user
allocation algorithm to maximize energy efficiency for both dense is uniquely identifiable by x and individual users can be referred
green HetNets and network backhaul. Cell range expansion (CRE) to by x. Then, the average signal-to-interference-plus-noise ratio
is a popular technique to load-balance users in HetNets. However, (SINR) measured at location x from BS j can be expressed as
biasing different BSs to achieve specific performance measures
can be a challenging problem. The authors of [30] propose a Q- P g (x)
SINRj (x) = ∑j j , (1)
learning based selection strategy (QSS) to bias user rates and σ +
2
k∈Ij (x) Ik (x)
achieve load-balancing. In [31], particle swarm optimization is
used to optimize the biases for the CRE approach and achieve where Pj denotes the transmission power of BS j to all users.
load-balancing. In [32], the authors evaluate the effectiveness Since the focus of this work is on user association rather than
of load-balancing using CRE in CoMP-enabled HetNets under power allocation and resource allocation, it is common to assume
different biases. a fixed equal transmission power to all users, as in [17,28,36,37].
Then, users channel gains are mainly differentiated by the large-
3. Network model and problem formulation scale fading and shadowing they experience. In addition, user
association is performed at a large time-scale, whereas power
A downlink HetNet consisting of two types of BSs, MBSs and allocation is performed at a smaller time-scale; therefore, by
SBSs, is considered. Both types of BSs are connected to local optimizing one, the other can be considered constant. Moreover,
renewable energy sources as well as the power grid. Particularly, gj (x) is the average channel gain at location x measured from BS
the grid complements the network energy needs when renewable j, which captures the quasi-static effects of path-loss and log-
energy is insufficient. In the following subsections we present our normal shadowing. The channel gain is assumed to be measured
adopted network architectural model, traffic model, and energy at a large time scale [28]. The variable σ 2 models the power
model, followed by problem. level of the noise. The set Ij (x) denotes the subset of BSs that
introduce interference to user’s reception at location x from BS j;
3.1. Network architectural model whereas, Ik (x) is the average interference power introduced by
BS k ∈ Ij . Due to the fractional frequency reuse plan of the
Enabling CoMP transmissions in HetNets requires a high level network, the interference is modeled as static noise [17]. It is
of coordination among MBSs and SBSs, which the SoftRAN ar- important to mention that our proposed scheme is applicable
chitecture can naturally facilitate [33]. SoftRAN first appeared in CoMP-enabled HetNets adopting either fractional frequency
in the pioneering work of Gudipati et al. [14]; when they pro- reuse or interference randomization, in which interference can
posed softwarization of the RAN via abstraction of the BSs as
a single programmable virtual-BS consisting of a radio access 2 The traffic modeling in this section follows the model used in similar works
network controller (RANC) and RRHs representing the physical in the literature, such as in [17,28].
3
M.K. Awad, A.A.M.R. Behiry and M.W. Baidas Physical Communication 49 (2021) 101464
be considered as static noise [17]. A user’s downlink rate rj (x) at that can be served only by utilizing the available green energy,
x is given by as [28]
The Eq. (18) defines the traffic load of a BS in terms users traffic Negative logarithmic functions are used for inequalities, as they
arrivals, traffic size, data rates and binary association variable. heavily penalize approaching the constraint from feasibility,
The association problem is a mixed-integer nonlinear pro- reaching up to infinity at the constraint. Similarly, the cost of
gramming (MINLP) problem, which is known to be NP-hard [40]. deviating from the equality Constraint (22) is represented by a
Classical MINLP solving techniques, such as branch-and-bound, quadratic penalty function given by [39]
branch-and-cut or even heuristic solutions are too computation- [∑ ]2
ally expensive to the point where their solution would be redun- Q (x) = η̂j (x) − 1 . (26)
dant in the scale of a single user association period. Therefore, ∀j
solving this problem efficiently necessitates relaxation of the
A quadratic function is used to penalize any deviation (positive or
binary association variable ηj (x) into a new association variable
negative) from the equality line, while having a penalty of zero
η̂j (x), where 0 ≤ η̂j (x) ≤ 1. Furthermore, in order to guarantee
when the equality constraint is met. Given these functions, the
that all users are served and associated with at least one BS, we
unconstrained UA problem can be written as
replace Constraint (16) with
∑ ∑ ω∑
B1 (ρj ) −µ2 B2 η̂j (x) + Q (x),
∑ ( )
η̂j (x) = 1, ∀x ∈ A. minimize fuc = f −µ1
η̂j (x)∀j∈B,∀x∈A 2
∀j ∀j ∀j,x ∀x
The proposed scheme iteratively solves an approximated ver- In Line 15, a line search is performed to determine the step
sion of the original constrained problem as outlined in Algorithm length to move the association variables η̂ along the previously
1. The scheme approximates the Hessian inverse of the objective calculated search direction d. Firstly, we note that the association
function in (27) by storing 2 × m vectors. The size of each vector values η̂ and the search direction d do not change during the
is n, where n is the number of optimization variables and m ≪ n. line search phase of the algorithm. Therefore, for convenience, we
Practically speaking, m is in the order of tens, whereas n is in define
the problem is in the order of thousands. This actively alleviates ψ (α ) = fuc (η̂ + α d). (29)
the need for computing and storing n2 operations every time the
Hessian is computed [42]. Furthermore, the directional derivative of fuc in d (i.e. the deriva-
tive of (29)) is given by
Algorithm 1 L-BFGS User Association ∇ψ (α ) = ∇ fuc (η̂ + αd)d′ , (30)
Input: Initial values of η̂j (x) and trade-off coefficients kj . where ∇ is the gradient operator. In order to ensure the change
Output: User association η̂j∗ (x)∀j ∈ B, ∀x ∈ A to the association variables achieves a significant improvement
1: Set initial µ1 , µ2 , ω and t. in minimization of the objective function, the step length is
2: while termination condition of barrier method not satisfied required – by the line search – to meet a pair of inequalities,
do known as the strong Wolfe conditions [19,42]. The first condition
3: while termination condition of L-BFGS method not satis- is
fied do
4: q := ∇ fuc ▷ Find a search direction d ψ (α ) ≤ ψ (0) + β1 α∇ψ (0), (31)
5: for i = 0 to m − 1 do ▷ L-BFGS two-loop recursion which is referred to as ‘‘the sufficient decrease condition’’. The
6: ai := y′1s si ′ q
i i second condition is
7: q := q − ai yi
8: end for′ |∇ψ (α )| ≤ β2 |∇ψ (0)|, (32)
y s
9: r := y 0′ y0 q which is known as ‘‘the curvature condition’’ [42]. Both conditions
0 0
10: for i = m − 1 to 0 do guarantee that the step length taken achieves sufficient progress
11: b = y′1s y′i r in minimizing the objective function in (27). This is necessary
i i
12: r := r + si (ai − b) because it avoids making unnecessary steps of small length with
13: end for negligible impact on the minimization of the objective function.
14: Compute search direction d := −H∇ fuc = −r Once a step length that satisfies the strong Wolfe conditions is
15: α := Line Search(η̂,d) ▷ Find a step length α that found, the association variables η̂ are updated, as per Line 16.
satisfies the strong Wolfe conditions The vectors si and yi are stored in a queue structure of fixed
+
16: η̂ = η̂ + α d ▷ Update association variables η̂ length. The updates of s0 and y0 are made in each iteration using
17: Discard sm−1 and ym−1 ▷ Update vector lists with new local information, and the queue is pushed forward with the least
local information recent two vectors being discarded, as can be seen in Lines 17 to
18: si+1 := si , ∀i ∈ [1, m − 2] 22.
19: yi+1 := yi , ∀i ∈ [1, m − 2] After the L-BFGS method converges to a solution of the ap-
20:
+
s0 := η̂ − η̂ proximate unconstrained problem, the multipliers ω, µ1 and µ2
21: Generate the updated gradient vector ∇ f+ uc
are adjusted to better model the original constrained problem, as
22: y0 := ∇ f+ uc − ∇ fuc
in Lines 24 to 26. Adjusting the multipliers produces a new un-
23: end while constrained problem and the process is repeated until a solution
24: ω := t ω, µ1 := µ1 /t, µ2 := µ2 /t ▷ Update multipliers of for the original constrained problem is found.
penalty functions The fractional association values η̂j (x) ∀x ∈ A ∀j, ∈ B obtained
25: end while from the barrier method in Lines 2 to 25 represent the probability
26: for all fractional association variables η̂j (x), ∀x, ∀j do ▷ of a user located at x receiving traffic from the jth BS. In order
Associate users with BSs having fractional association higher to obtain a CoMP-enabled association, the algorithm associates
than threshold ϵη users with BSs having a fractional association value larger than a
27: if η̂j (x) ≤ ϵη then threshold ϵη , as seen in Lines 27 to 32.
28: ηj (x) := 0 The line search algorithm in Algorithm 2 iteratively finds a
29: else step length αi that meets the strong Wolfe conditions (Line 12)
30: ηj (x) := 1 or a range of values, i.e., bracket, that contains such a step length
31: end if (Lines 6, 9 and 15). If neither is found during an iteration of the
32: end for line search algorithm, a new trial step length αi+1 is interpolated,
as in Lines 18 and 22. Here, interpolation refers to modeling
The solution to the approximated unconstrained problem is
the objective function as a cubic function that is a function of
obtained using the L-BFGS method. Firstly, in lines 4 to 14, the the step length α and solving for that model’s minimum. The
two-loop recursion method uses two types of vectors in order to function references ‘‘SECTION(·, ·)’’ in Lines 6, 9, and 15 call a
implicitly approximate −H∇ fuc . These vectors are denoted by si sectioning method implemented in Algorithm 3 to find a viable
and yi , where i ∈ [0, m). The vectors si measure local changes α within the provided bracket. The pseudo-code of Algorithm 3
in the optimization variables, while the vectors yi measure local is presented in Appendix A. The interpolation steps mentioned in
changes in the gradients of the objective function in (27). Because Algorithms 2 and 3 (given in Lines 22 and 5, respectively) are
of the implicit use of the approximation, the need to store or used to minimize ψ (α ) within the determined bracket, where
arithmetically use the n2 sized matrix H is eliminated. Instead, a cubic interpolation method is used [19]. Therefore, the step
the two-loop recursion method requires 4 × m × n iterations in length α found by Algorithms 2 and 3 fulfills the strong Wolfe
order to calculate the search direction d [42]. conditions in (31) and (32).
6
M.K. Awad, A.A.M.R. Behiry and M.W. Baidas Physical Communication 49 (2021) 101464
Fig. 3. Performance comparison of the considered schemes in minimizing: (a) latency and (b) power consumption.
Table 2
Distribution of user-to-BS association observed in the compared schemes with
various storage of Green Energy (G.E.).
BS G.E. (W) MAXSINR α -optimal vGALA Proposed
MBS 1 150 41% 35.4% 32.5% 33%
MBS 2 200 23% 22.5% 21% 23%
MBS 3 335 21.7% 21.1% 21% 25%
SBS 1 5 1.4% 2.5% 2.5% 2.5%
SBS 2 5 1.4% 3.7% 3.7% 4%
SBS 3 4 1.7% 4% 4% 4%
SBS 4 3 4.5% 8% 8% 8%
SBS 5 4 4.8% 7.4% 7.4% 8%
Fig. 6. Sum-rate performance of: (a) cell-center and (b) cell-edge users.
Fig. 7. Comparison between different schemes with increased density of cell-edge users in terms of: (a) average latency Indicator, and (b) on-grid power consumption.
Fig. 8. Effect of increased total arrival rates on the performance of considered scheme in the uniform user distribution scenario.
supplies. The user association problem is modeled as MINLP, algorithm that does not require explicit storage, and formation
which is known to be NP hard. Therefore, a sub-optimal scheme and computation of the Hessian. The proposed scheme jointly
is developed to optimize the trade-off between the on-grid power reduces the average latency and on-grid power consumption
consumption and traffic delivery latency, while ensuring BS using a per-BS trade-off coefficient to emphasize importance of
queue stability and users connectivity. The scheme has been the two objectives conflict. Furthermore, the proposed scheme
designed to be scalable to dense networks by using the L-BFGS enabled CoMP transmissions by using fractional user association
method, a limited memory version of the well-studied BFGS to select users eligible to be jointly serviced by multiple BSs to
10
M.K. Awad, A.A.M.R. Behiry and M.W. Baidas Physical Communication 49 (2021) 101464
Acknowledgments
The authors would like to thank Dr. Tao Han at the University
Fig. 9. Trade-off between on-grid power consumption and latency for the
proposed schemes, by varying total arrival rate from 700 to 1100. of North Carolina, Charlotte, USA for the insight given on the
methods in [28]. This work was supported and funded by Kuwait
University Research Grant No. EO-08/18. This work was also par-
tially supported by the Kuwait Foundation for the Advancement
of Sciences (KFAS), under project code PN17-15EE-02.
Appendix A
improve cell-edge users’ data rates. Simulations showed that the Appendix B
proposed scheme achieves significant improvements in reducing
The total number of iterations performed by Algorithm 1 in
latency, power consumption and improving cell-edge user rates the outermost loop is κ , where κ is a constant, determined by the
over existing schemes. update factor t. Let the total number of all decision variables η̂j (x)
11
M.K. Awad, A.A.M.R. Behiry and M.W. Baidas Physical Communication 49 (2021) 101464
in the system be n. Also, the maximum number of saved vector Let z = Ḡ1/2 s, then
pairs used to approximate the Hessian is m, where m is usually
y′ y s′ Ḡ2 s z ′ Ḡz
between 10 and 15 [42]. The value of m is comparatively small = = ≤ M. (42)
to the problem size n, and is not scenario specific. The two-loop y′ s s′ Ḡs z′z
recursion method used to approximate the Hessian has a worst- The subsequent proof relies on the following theorem, called
case complexity of O(mn) [42]. Experimentally, the line search Zoutendijk’s theorem [42].
algorithm does not contribute significantly to the computational
load in comparison to the two-loop recursion. Therefore, for Theorem C.1. Consider an algorithm driven by the iterative update
brevity, we assume that line search has worst-case complexity in (36), where d is a descent direction and α satisfies the Wolfe
O(ln). Therefore, the worst-case complexity of the algorithm is conditions in (31) and (32). Furthermore, the function fuc is bounded
O(κ mn + κ ln). It can be shown that the convergence rate of the below and is continuously differentiable on an open set N containing
algorithm is linear and locally superlinear near the solution of the level set L := {η̂ : fuc (η̂) ≤ fuc (ηˆ0 )}. Also, the gradient ∇ fuc is
each sub-problem, when meeting the strong Wolfe conditions.
Lipschitz continuous on N . Then
This is similar to the convergence behavior achieved when using ∑[
cos2 (θk ) ∥∇ fuc ∥2 < ∞
]
Newton’s direction [42]. (43)
∀k
Appendix C
where θk is the angle between the search direction d and the steepest
The proof in this section follows the approach and employs descent search direction −∇ fuc .
properties from [42]. Throughout this section, we refer to the
exact Hessian of the unconstrained objective function ∇ 2 fuc as G. Theorem C.2. Let B0 be any symmetric positive definite initial Hes-
The L-BFGS approach used closely approximates the BFGS update. sian approximation. Then the sequence generated by (36) converges
to η̂ of the objective function fuc .
∗
In this section, we prove the global convergence of our uncon-
strained optimization subproblem using a BFGS update. The un-
constrained optimization subproblem depends on the following Proof. We define the following
iterative step
y′ s y′ y
η̂+ = η̂ + α d, (35)
mk = , Mk = . (44)
s′ s y′ s
where the step size α is determined by a line search that satisfies Note that from (41) and (42) that
the Wolfe conditions in (31) and (32), and the search direction is
determined by mk ≥ m, Mk ≤ M . (45)
d = −B−1 ∇ fuc , (36) It can be shown that the trace of the BFGS update in (37) is
where B is the BFGS approximation to the Hessian updated iter- ∥Bk s∥2 ∥y∥2
trace(Bk+1 ) = trace(Bk ) − + . (46)
atively such that s′ Bs y′ s
Bss′ B yy′ It can also be shown that the determinant of the BFGS update is
B+ = B − + . (37)
s′ Bs y′ s y′ s
det(Bk+1 ) = det(Bk ) . (47)
Proving that the algorithm converges to the optimal value ηˆ∗ s′ Bs
is equivalent to proving that We can now define the angle θk as
lim inf ∥∇ fuc ∥ = 0. (38) s′ Bs
k→∞ θk = , (48)
∥s∥ ∥Bs∥
The following proof relies on properties of the objective func-
tion, which are as follows: and
s′ Bs
(i) The objective function fuc is twice differentiable. q= . (49)
(ii) The objective function fuc is continuous on the open set N s′ s
containing the level set L := {η̂ : fuc (η̂) ≤ fuc (ηˆ0 )}. We can then rewrite
(iii) The gradient ∇ fuc is Lipschitz continuous on N . ∥Bs∥2 ∥Bs∥2 s′ Bs q
(iv) The level set L is convex and there exists positive constants = = , (50)
s′ Bs ′ 2
(s Bs) ∥s∥ 2
cos (θk )
2
such that
as well as rewrite
m ∥z ∥2 ≤ z ′ Gz ≤ M ∥z ∥2 (39)
y′ s s′ s mk
for all z ∈ Rn . This assumption is preserved by the L- det(Bk+1 ) = det(Bk ) = det(Bk ) . (51)
s′ s s′ Bs q
BFGS two-loop method from [42]. The set convexity, along
with the lower bound on the objective function implies Let us now define the following function of the approximate
the existence of a unique minimizer η̂∗ to the objective Hessian
function. ψ (B) = trace(B) − log(det(B)), (52)
We define the average Hessian Ḡ as where ψ (B) is always positive. We can now write
∫ 1
Ḡ = ∇ 2 fuc (η̂ + τ α d)dτ (40) q
ψ (Bk+1 ) = trace(Bk ) + Mk − − log(det(Bk )) − log(mk ) + log(qk ),
0 cos2 (θk )
and the property following from the Taylor series representation (53)
of the BFGS update y = Ḡα d = Ḡs. Using this property and (40),
we arrive at which in turn can be rewritten as
[
′
ys ′
s Ḡs q
= ≥ m. (41) ψ (Bk+1 ) = ψ (Bk ) + uk + 1 −
s′ s s′ s cos2 ( θk )
12
M.K. Awad, A.A.M.R. Behiry and M.W. Baidas Physical Communication 49 (2021) 101464
( )]
q [13] A. Papa, R. Durner, L. Goratti, T. Rasheed, W. Kellerer, Controlling next-
+ log + log(cos2 (θk )), (54)
cos2 ( θk ) generation software-defined RANs, IEEE Commun. Mag. 58 (7) (2020)
58–64.
where uk = Mk − log(mk ) − 1. The term inside the square bracket [14] A. Gudipati, D. Perry, L.E. Li, S. Katti, SoftRAN: Software defined radio access
is non-positive, and therefore from (45) and (54), we can state network, in: Proc. of the Second ACM SIGCOMM Workshop on Hot Topics
the following on the initial Hessian approximation, in Networking, HotSDN, 2013, pp. 25–30.
[15] J.G. Andrews, S. Singh, Q. Ye, X. Lin, H.S. Dhillon, An overview of load
k balancing in hetnets: old myths and open problems, IEEE Wirel. Commun.
∑
0 < ψ (Bk+1 ) ≤ ψ (B0 ) + u(k + 1) + log(cos2 (θi )), (55) 21 (2) (2014) 18–25.
[16] L.A. Fletscher, J. Barreiro-Gomez, C. Ocampo-Martinez, C.V. Peroni, J.M.
i=0
Maestre, Atomicity and non-anonymity in population-like games for the
where 0 < u = M − log(m) − 1. From (43), we know that the energy efficiency of hybrid-power HetNets, IEEE Trans. Netw. Serv. Manag.
gradient does not converge to zero if and only if cos θi goes to 15 (4) (2018) 1600–1614.
[17] H. Kim, G. de Veciana, X. Yang, M. Venkatachalam, Distributed α -optimal
zero. Let us assume that cos θi does go to zero. Therefore, there
user association and cell load balancing in wireless networks, IEEE/ACM
will exist an iteration k1 such that for all i > k, we have Trans. Netw. 20 (1) (2012) 177–190.
[18] J. Yu, Y. Wang, Q. Zhang, Q. Jiang, S. Yue, A greedy algorithm-based
log(cos2 (θi )) < −2c . (56) BP neural network for user association in HetNets, in: Proc. of 2nd
IEEE Advanced Information Management, Communicates, Electronic and
Then we can rewrite (55) as
Automation Control Conference, IMCEC, 2018, pp. 340–345.
k1
∑ k
∑ [19] R. Fletcher, Practical Methods of Optimization, second ed., Wiley-
0 < ψ (B0 ) + u(k + 1) + log(cos2 (θi )) + (−2c), (57) Interscience, New York, NY, USA, 1987.
[20] H. Ghazzai, M.J. Farooq, A. Alsharoa, E. Yaacoub, A. Kadri, M. Alouini, Green
i=0 i=k1 +1 networking in cellular HetNets: A unified radio resource management
framework with base station ON/OFF switching, IEEE Trans. Veh. Technol.
or equivalently,
66 (7) (2017) 5879–5893.
k1 [21] L. Tang, W. Wang, Y. Wang, Q. Chen, An energy-saving algorithm with joint
∑
0 < ψ (B0 ) + u(k + 1) + log(cos2 (θi )) + 2ck1 + c − ck, (58) user association, clustering and On/Off strategies in dense heterogeneous
networks, IEEE Access 5 (2017) 12988–13000.
i=0
[22] Y. Li, M. Sheng, Y. Sun, Y. Shi, Joint optimization of BS operation, user as-
The right hand side of the previous equation is negative for large sociation, subcarrier assignment and power allocation for energy-efficient
k, therefore cos(θi ) does not go to zero, and therefore due to HetNets, IEEE J. Sel. Areas Commun. 34 (12) (2016) 3339–3353.
[23] S. Zhang, N. Zhang, S. Zhou, J. Gong, Z. Niu, X. Shen, Energy-aware traffic
Zoutendijk’s theorem, ∥∇ fuc ∥ → 0 and the problem converges. offloading for green heterogeneous networks, IEEE J. Sel. Areas Commun.
Due to the convexity of the problem, the converged solution is 34 (5) (2016) 1116–1129.
also the optimal solution η̂∗ . □ [24] Y.L. Lee, W.L. Tan, S.B.Y. Lau, T.C. Chuah, A.A. El-Saleh, D. Qin, Joint
cell activation and user association for backhaul load balancing in green
HetNets, IEEE Wirel. Commun. Lett. 9 (9) (2020) 1486–1490.
References
[25] Q. Han, B. Yang, C. Chen, X. Guan, Energy-aware and QoS-aware load
balancing for HetNets powered by renewable energy, Comput. Netw. 94
[1] European Comission, 5G Vision: The 5G Infrastructure Public Private
(2016) 250–262.
Partnership: The Next Generation of Communication Networks and
[26] T. Zhang, H. Xu, Y. Chen, User association for energy balancing in HetNets
Services, Tech. Rep, European Comission, European Union, 2015,
with hybrid energy sources, in: Proc. of IEEE 85th Vehicular Technology
Feb., (Online), Available: https://espas.secure.europarl.europa.eu/orbis/
Conference, VTC Spring, IEEE Vehicular Technology Conference, 2017, pp.
document/5g-vision-5g-infrastructure-public-private-partnership-next-
1–5.
generation-communication.
[27] D. Liu, Y. Chen, K.K. Chai, T. Zhang, Distributed delay-energy aware user
[2] P. Agyapong, M. Iwamura, D. Staehle, W. Kiess, A. Benjebbour, Design
association in 3-tier HetNets with hybrid energy sources, in: 2014 IEEE
considerations for a 5G network architecture, IEEE Commun. Mag. 52 (11)
Globecom Workshops, GC Wkshps, 2014, pp. 1109–1114.
(2014) 65–75.
[28] T. Han, N. Ansari, A traffic load balancing framework for software-defined
[3] C. Liu, P. Chen, Load-aware coordinated multipoint joint transmission in
radio access networks powered by hybrid energy sources, IEEE/ACM Trans.
dense heterogeneous networks: Downlink coverage and throughput limits,
Netw. 24 (2) (2016) 1038–1051.
in: Proc. of IEEE International Conference on Communications, ICC, IEEE
International Conference on Communications, 2017, pp. 1–7. [29] K.M.S. Huq, S. Mumtaz, J. Bachmatiuk, J. Rodriguez, X. Wang, R.L. Aguiar,
[4] I. Siomina, D. Yuan, Load balancing in heterogeneous LTE: Range opti- Green HetNet CoMP: Energy efficiency analysis and optimization, IEEE
mization via cell offset and load-coupling characterization, in: Proc. of Trans. Veh. Technol. 64 (10) (2015) 4670–4683.
IEEE International Conference on Communications, ICC, IEEE International [30] C. Jialing, Y. Mingxi, D. Xiaohui, J. Bingli, Q -learning based selection
Conference on Communications, 2012, pp. 1357–1361. strategies for load balance and energy balance in heterogeneous networks,
[5] L. You, L. Lei, D. Yuan, Load balancing via joint transmission in het- in: 2020 5th International Conference on Computer and Communication
erogeneous LTE: Modeling and computation, in: Proc. of IEEE 26th Systems, ICCCS, 2020, pp. 728–732.
Annual International Symposium on Personal, Indoor, and Mobile Radio [31] H.P. Kuribayashi, M.A. De Souza, D. De Azevedo Gomes, K. Da Costa Silva,
Communications, PIMRC, Aug., 2015, pp. 1173–1177. M.S. Da Silva, J.C. Weyl Albuquerque Costa, C.R. Lisbôa Francês, Particle
[6] A.H. Sakr, E. Hossain, Location-aware cross-tier coordinated multipoint swarm-based cell range expansion for heterogeneous mobile networks,
transmission in two-tier cellular networks, IEEE Trans. Wireless Commun. IEEE Access 8 (2020) 37021–37034.
13 (11) (2014) 6311–6325. [32] Y. Cao, H. Xia, C. Feng, Evaluation of diverse cell range expansion
[7] G.T. V11.0.0, coordinated multi-point operation for LTE, 2011, 3GPP TSG strategies applying CoMP in heterogeneous network, in:Proc of. IEEE 24th
RAN WG1, Sept.. Annual International Symposium on Personal, Indoor and Mobile Radio
[8] L. Liu, Y. Zhou, V. Garcia, L. Tian, J. Shi, Load aware joint CoMP clustering Communications, PIMRC, 2013, pp. 1962–1966.
and inter-cell resource scheduling in heterogeneous ultra dense cellular [33] X. Foukas, N. Nikaein, M.M. Kassem, M.K. Marina, K. Kontovasilis, FlexRAN:
networks, IEEE Trans. Veh. Technol. 67 (3) (2018) 2741–2755. A flexible and programmable platform for software-defined radio access
[9] G. Cili, H. Yanikomeroglu, F.R. Yu, Cell switch off technique combined networks, in: Proceedings of the 12th International on Conference on
with coordinated multi-point (CoMP) transmission for energy efficiency in Emerging Networking EXperiments and Technologies, 2016, pp. 427–441.
beyond-LTE cellular networks, in: Proc of. IEEE International Conference [34] E. Coronado, S.N. Khan, R. Riggio, 5G-EmPOWER: A software-defined
on Communications, ICC, 2012, pp. 5931–5935. networking platform for 5G radio access networks, IEEE Trans. Netw. Serv.
[10] N. Saxena, A. Roy, H. Kim, Traffic-aware cloud RAN: A key for green 5G Manag. 16 (2) (2019) 715–728.
networks, IEEE J. Sel. Areas Commun. 34 (4) (2016) 1010–1021. [35] 3GPP, TS 138 401 V15.9.0 (2020-11) 5G and NG-RAN Architecture De-
[11] Vodafone, Sustainable Business Report 2018, Tech. Rep., Vodafone Group scription (3GPP TS 38.401 Version 15.9.0 Release 15), ETSI, 2020, Standard,
Plc., 2018. 11.
[12] A. Papa, R. Durner, E. Goshi, L. Gorattiy, T. Rasheedy, A. Blenk, W. Kellerer, [36] T. Han, N. Ansari, Green-energy aware and latency aware user associations
MARC: On modeling and analysis of software-defined radio access network in heterogeneous cellular networks, in:2013 IEEE Global Communications
controllers, IEEE Trans. Netw. Serv. Manag. (2021) 1–1. Conference, GLOBECOM, 2013, pp. 4946–4951.
13
M.K. Awad, A.A.M.R. Behiry and M.W. Baidas Physical Communication 49 (2021) 101464
[37] D. Liu, Y. Chen, K.K. Chai, T. Zhang, M. Elkashlan, Two-dimensional opti- He received the Ontario Research & Development Challenge Fund Bell
mization on user association and green energy allocation for HetNets with Scholarship in 2008 and 2009, the University of Waterloo Graduate Scholarship
hybrid energy sources, IEEE Trans. Commun. 63 (11) (2015) 4111–4124. in 2009, and a fellowship award from the Dartmouth College, Hanover, NH in
[38] X. Liu, T. Han, N. Ansari, Intelligent battery management for cellu- 2011. In 2015 and 2017, he received the Kuwait University Teaching Excellence
lar networks with hybrid energy supplies, in: Proc. of IEEE Wireless Award and Best Young Researcher Award, respectively.
Communications and Networking Conference, 2016, pp. 1–6.
[39] E. Chong, S. Zak, An Introduction To Optimization, in: Wiley Series in
Discrete Mathematics and Optimization, Wiley, 2013. Ali A. M. R. Behiry (S’18) earned his B.Eng. in computer
[40] P. Belotti, C. Kirches, S. Leyffer, J. Linderoth, J. Luedtke, A. Mahajan, engineering from the American University of Kuwait,
Mixed-integer nonlinear optimization, Acta Numer. 22 (2013). Kuwait, in 2015 and the M.Sc. in computer engineering
[41] S. Boyd, L. Vandenberghe, Convex Optimization, Cambridge University from Kuwait University, Kuwait, in 2019.
Press, New York, NY, USA, 2004. He has served as a part-time lab assistant and tutor
[42] J. Nocedal, S.J. Wright, Numerical Optimization, second ed., Springer, New during his undergraduate years from 2012 to 2015 at
York, NY, USA, 2006. the American University of Kuwait, as well as a lab
[43] IEEE, IEEE 802.16m Evaluation Methodology Document (EMD), Tech. Rep., coordinator and instructor at Kuwait University from
IEEE, 2009. 2016 to 2019, during his graduate studies. Currently,
[44] IEEE, IEEE Recommended Practice for Testing the Performance of Ali is an undergraduate lab instructor in the Depart-
Stand-Alone Photovoltaic Systems, 2004, pp. 1–18, IEEE STD 1526-2003. ment of Engineering at the American University of
[45] S.H. Karaki, R.B. Chedid, R. Ramadan, Probabilistic performance assessment Kuwait.
of autonomous solar-wind energy conversion systems, IEEE Trans. Energy His recent research interests include wireless mobile networks, wireless
Convers. 14 (3) (1999) 766–772. sensor networks, optimization and machine learning. Ali received the highest
[46] Y.M. Atwa, E.F. El-Saadany, M.M.A. Salama, R. Seethapathy, Optimal renew- academic merit scholarship from the American University of Kuwait in 2011, as
able resources mix for distribution system energy loss minimization, IEEE well as the full Excellence Scholarship from Kuwait University in 2016.
Trans. Power Syst. 25 (1) (2010) 360–370.
[47] G. Auer, V. Giannini, C. Desset, I. Godor, P. Skillermark, M. Olsson, M.A.
Mohammed W. Baidas received the B.Eng. (Hons.)
Imran, D. Sabella, M.J. Gonzalez, O. Blume, A. Fehske, How much energy
degree in communication systems engineering from the
is needed to run a wireless network? IEEE Wirel. Commun. 18 (5) (2011)
University of Manchester, Manchester, U.K., in 2005,
40–49.
the M.Sc. degree (with distinction) in wireless com-
munications engineering from the University of Leeds,
Leeds, U.K., in 2006, the M.S. degree in electrical engi-
Mohamad Khattar Awad (S’02, M’09, SM’17), earned neering from the University of Maryland, College Park,
the B.A.Sc. in electrical and computer engineering MD, USA, in 2009, and the Ph.D. degree in electrical
(communications option) from the University of Wind- engineering from Virginia Tech, Blacksburg, VA, USA, in
sor, Ontario, Canada, in 2004 and the M.A.Sc. and Ph.D. 2012. He was a Visiting Researcher with the University
in electrical and computer engineering from the Uni- of Manchester in the Academic Years of 2015/2016
versity of Waterloo, Ontario, Canada, in 2006 and 2009, and 2018/2019. He is currently an Associate Professor with the Department
respectively. From 2004 to 2009 he was a research of Electrical Engineering, Kuwait University, Kuwait, where he has been on
assistant in the Broadband Communications Research the faculty since May 2012. He is also a frequent reviewer for several IEEE
Group (BBCR), University of Waterloo. From 2009 to journals and international journals and conferences, with over 80 publications.
2012, he was an Assistant Professor of Electrical and His research interests include resource allocation and management in cognitive
Computer Engineering at the American University of radio systems, game theory, cooperative communications and networking, and
Kuwait. Since 2012, he has been with Kuwait University, where currently he is green and energy-harvesting networks. He also serves as a technical program
an Associate Professor of Computer Engineering. committee member for various IEEE and international conferences. He was
Dr. Awad’s research interest includes wireless and wired communications, a recipient of the Outstanding Teaching Award of Kuwait University for the
software-defined networks resource allocation, wireless networks resource allo- academic year of 2017/2018.
cation, and acoustic vector-sensor signal processing. He is a frequent reviewer for
several journals and conferences. Dr. Awad served on the editorial board of the
IEEE Transactions on Green Communications and Networking (TGCN) between
October 2016 and May 2021.
14