Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

- Consider a cellular network in Figure 3. - A base-station is located at the center of each cell. - Distance between base-stations is D.

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

image text in transcribed

- Consider a cellular network in Figure 3. - A base-station is located at the center of each cell. - Distance between base-stations is D. - We will be interested in the center-cell and take the power from other cells as interference. - The system is time-slotted. - Each base-station transmits at the power level PT. Figure 3: Cellular network model. - Focus on a downlink in the center cell of the network. - There are N users (from user 1 to user N ) in the cell. - The base-station has infinite work load for each user. - Path gain from base-station i to user j in time-slot n is modeled by Gi,jn=(di,jn)Si,jn, where Si,jn : slow shadowing that is log-normally distributed with zero mean and a variance 2, di,jn : distance between base-station i and user j, and : distance loss exponent. - For the sake of simplicity of the project, let us assume that Si,jn in (2) is independent and identically distributed in each time-slot n. Note that this assumption is good only when users move quickly in a circle centered at the base-station. A higher-fidelity model for path gain will involve more general mobility patterns and time-selective multipath fading. - The SINR of user j in time-slot n that communicates with the base-station k,jn, is defined by jn=i=kGi,jnPT+NjnGk,jnPT, where Njn is a background noise level at user j. For simplicity, you can assume that Njn=0. - The base-station has perfect knowledge about each user's channel condition (SINR). - In time-slot n, the base-station selects only one user jn and transmits a packet to it at a rate Rjnn, which is defined by Shannon's formula as Rjnn=Wlog2(1+jnn), where W is the bandwidth of the system. - Parameters for the system are summarized in Table 1. Here, we omit the unit for each parameter. Table 1: Parameters for the Svstem Opportunistic scheduling with temporal fairness In each time-slot n, the base-station picks a user jn for transmission such that the expected total system throughput is maximized subject to the constraint that a minimum fraction of time-slots, ri, must be assigned to user i. See Refs. [1-2] for details. Formulate the problem for an opportunistic scheduling policy with the above temporal fairness constraint. What is the form of the optimal policy? Devise a scheduling scheme to implement the optimal policy. Simulate this scheme with ri=1/4,i for both symmetric and asymmetric cases. Measure the fraction of time-slots that each user is scheduled, the throughput of each user, and the total system throughput. Compare the results with those of round-robin and greedy schemes, and discuss them. Simulate this scheme with ri=1/8,i for both symmetric and asymmetric cases. Measure the average number of slots that each user is scheduled, the throughput of each user, and the total system throughput. Compare the results of symmetric and asymmetric cases, and discuss them. Compare the results of the cases with ri=1/4 and ri=1/8, and discuss them

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The Database Management Systems

Authors: Patricia Ward, George A Dafoulas

1st Edition

1844804526, 978-1844804528

More Books

Students also viewed these Databases questions

Question

Illustrate the value of different types of employment tests.

Answered: 1 week ago