Mobile Netw Appl (2011) 16:640–660
DOI 10.1007/s11036-011-0300-z
Decoupled Power Allocation Through Pricing on a CDMA
Reverse Link Shared by Energy-Constrained
and Energy-Sufficient Data Terminals
Virgilio Rodriguez · Friedrich Jondral ·
Rudolf Mathar
Published online: 30 March 2011
© Springer Science+Business Media, LLC 2011
Abstract We perform market-oriented management of
the reverse link of a CDMA cell populated by data
terminals, each with its own data rate, channel gain,
willingness to pay (wtp), and link-layer configuration,
and with energy supplies that are limited for some,
and inexhaustible for others. For both types of energy
budgets, appropriate performance indices are specified.
Notably, our solution is “decoupled” in that a terminal
can choose optimally, irrespective from choices made
by the others, because it pays in proportion to its fraction of the total power at the receiver, which directly
determines its signal-to-interference ratio (SIR), and
hence its performance. By contrast, in other similarlysounding schemes terminals’ optimal choices are interdependent, which leads to “games of strategy”, and
their practical and theoretical complications. We study
two situations: pricing for maximal (i) network revenue, and (ii) social benefit. The socially-optimal price
is common to all terminals of a given energy class,
and an energy-constrained terminal pays in proportion
to the square of its power fraction. By contrast, the
revenue-maximising network sets for each terminal an
V. Rodriguez (B)
Institute for Communication Networks (ComNets),
RWTH, Aachen, Germany
e-mail: rodriguez@comnets.rwth-aachen.de
F. Jondral
Institut für Nachrichtentechnik, Karlsruher Institut für
Technologie, Karlsruhe, Germany
e-mail: friedrich.jondral@kit.edu
R. Mathar
Institute for Theoretical Information Technology,
RWTH, Aachen, Germany
e-mail: mathar@ti.rwth-aachen.de
individual price that drives the terminal to the “revenue
per Watt” maximiser. The network price is higher, and
drives each terminal to consume less. Distinguishing
features of our model are: (i) the simultaneous consideration of both limited and unlimited energy supplies, (ii) the performance metrics utilised (one for
each type of energy supply), (iii) the generality of our
physical model, which can lead to an optimal linklayer configuration, and (iv) our pricing of the received
power fraction which yields a “decoupled” solution.
Keywords power control · pricing · game theory ·
microeconomics · CDMA · revenue maximisation
1 Introduction
In telecommunication networks, pricing is a critical
tool to both generate revenues, and induce efficient resource use. Herein, we propose and analyse a technicaleconomic scheme for the management of the reverse
link of a CDMA cell populated by data terminals (each
with its own data rate, channel gain, willingness to pay
(wtp), and possibly individual link-layer configuration).
Some terminals are battery-powered while others have
boundless energy, and we specify pertinent utility functions for each type. The present paper builds upon [19],
where the network sets prices that maximise its revenues, and [18], where a “social planner” uses pricing
to drive the terminals to a socially-optimal allocation.
For reverse link CDMA power allocation, many useful price-based algorithms have been reported [1, 6, 10,
22, 23, 25]. Previous schemes rely on per-Watt pricing.
However, a terminal’s performance does not solely depend on the amount of power it buys. It also depends on
Mobile Netw Appl (2011) 16:640–660
the power choices made by the others. Thus, terminals
choices are interdependent, which leads to a “game
of strategy”, a model in which several “selfish” agents
make interdependent choices [7, 12].
Games engender both theoretical and practical problems. The typical solution concept is the Nash equilibrium (NE), which (i) may not exist, (ii) if existing,
may not be unique, and (iii) is in general inefficient
[5]. And even if a unique NE can be proved to exist,
it may be unclear: (a) how will the players reach the
NE, and (b) after how many “iterations”. The facts
that terminals frequently enter and exit the network at
arbitrary times, and that they are “anonymous” to each
other, further complicate matters. Additionally, if perWatt pricing is implemented as a “true” billing scheme
in a commercial network, it may face substantial consumer resistance, because in the common economic
scenario with which the customer is familiar, his/her
utility depends solely on how s/he spends her/his own
income among a number of “goods”, irrespectively of
how others spend theirs.
Below we provide a “decoupled” solution. A terminal pays according to its fraction of the total power
at the receiver. Because this fraction directly determines a terminal’s signal-to-interference ratio (SIR),
and hence its performance, for a given price, a terminal
can make an optimal choice without worrying about
the choices made by others. A decoupled solution is
superior for both technological and marketing reasons:
it shifts complexity from the terminal to the base station, it avoids Nash-equilibrium existence/convergence
issues, and places the user in the familiar territory
in which s/he “controls her/his own destiny”. As a
base line for performance evaluation, we do analyse a
“game” in which each terminal chooses its power without economic incentives or a central controller. By also
analysing the conditions yielding a “socially optimal”
allocation, we conclude that our pricing scheme can,
with relatively minor modifications, maximise “socially
benefit”, instead of network profit.
Additional distinguishing features of our model are:
(i) the simultaneous consideration of both limited and
unlimited energy budgets as in real networks, where
battery-powered terminals coexist with those powered
from a vehicle or the power-grid (including fixed wireless local loop), (ii) the performance metrics utilised
(one for each type of energy budget), and (iii) the
generality of our physical model (each terminal may
have its own data rate, channel gain, willingness to pay
(wtp), and even link-layer configuration).
Below, we first discuss the physical model, and the
terminals’ technical-economic rationale. Then, we address feasibility issues, and identify a terminal’s power
641
fraction as key. We then analyse how each terminal
reacts under power-fraction pricing. Subsequently, we
describe how the network can set prices to maximise
its revenue. At that point, we shift to the zero-price
game. Then, we describe the “socially optimal” allocation. Several numerical examples and figures are
given throughout. In a final section, we summarise and
discuss key contributions.
2 Generalities
2.1 Physical model
N terminals upload data to a CDMA base station (BS).
The sub-index i identifies a terminal. z or x may be used
√
as generic function arguments (e.g., x is a concave
graph).
–
–
–
–
–
–
–
p0 is the average Gaussian noise power
Ei is the energy budget
P̂i is the power constraint
hi is the channel gain
pi = hi Pi is the received power
For convenience, we let
p̄ :=
N
Yi =
(1)
pi
i=1
j=i
p j + p0 is i’s interference
An S−curve and its 1st and 2nd derivatives
1
0
0
a
c
Fig. 1 An S-curve and scaled versions of the graphs of its
1st (dash-dot) and 2nd (dash) derivatives. The inflexion occurs
at x = a
642
Mobile Netw Appl (2011) 16:640–660
Table 1 Notation summary
Power
Ratios
p0 : noise
P̂i : constraint
pi := hi Pi : received
Yi := p0 + j=i p j
N
p̄ := i=1 pi
Ŵi := W/Ri : Spreading gain
κi := pi /Yi (carrier-to-interference)
σi := Ŵi κi : (signal-to-interference)
πi := κi /(1 + κi ) (power fraction)
π̄ := N
j=1 π j
–
–
–
–
–
–
–
–
–
κi = pi /Yi is the carrier-to-interference ratio (CIR)
W is the available bandwidth, assumed equal to the
common chip rate
Ri is the data rate.
Ŵi = W/Ri is the spreading gain
σi = Ŵi κi is the signal-to-interference-plus-noise ratio (SIR)
Mi -bit packets carrying Li < Mi information bits
are used.
Fi is the packet-success rate function (PSRF) giving
the probability of correct reception of a data packet
as a function of the SIR.
For some technical reasons, fi (x) := Fi (x) − Fi (0)
replaces Fi . Its graph is assumed to have the Sshape shown in Fig. 1. Our analysis does not rely
on any specific PSRF.
Furthermore, as described in the Appendix, fi satisfies the technical Assumptions 1–2 that guarantee
that each of certain graphs retains a desired shape
(“S” or “bell”) (Table 1).
2.2 Terminals’ general objective
Two categories of data terminals are of interest:
(i) energy-constrained (battery powered), and timedriven, referred as e-terminals and t-terminals, below.
An e-terminal focuses on the total number of information bits transferred with its total energy budget. The
t-terminal focuses on the number of information bits
transferred over a reference time period (such as the
time unit). The model below works for both categories.
The utility function has the “quasi-linear” form [24,
Ch. 10]: vi Bi + yi where:
–
–
–
(i) vi is the “willingness to pay” (wtp) (the monetary
value to the terminal of one information bit successfully transferred),
(ii) Bi is the (average) number of information bits
the terminal has successfully transferred within a
reference length of time, say τ , and
(iii) yi is the amount of money the terminal has left
after any charges and rewards are computed.
–
Bi generally depends on a vector of “resources” z.
When the terminal must pay ci (z), it chooses z to
maximise vi Bi (z) + [Di − ci (z)]. Di is the terminal’s
monetary budget, which limits its total expenditure
and, if “large”, need not be considered, in which
case the terminal maximises benefit minus cost:
(2)
vi Bi (z) − ci (z)
3 Feasibility of power ratios
3.1 SIR/CIR feasibility
Definition 3.1 Let πi be defined by
πi =
σi
κi
≡
1 + κi
Ŵi + σi
(3)
Proposition 3.1 πi equals i’s fraction of the total power
at the receiver (including noise), that is,
pi
κi
= N
1 + κi
j=1 p j + p0
(4)
Proof With Yi := Nj=1 p j − pi + p0 (the interference
experienced by terminal i), and κi = pi /Yi (the CIR),
Eq. 3 can be written as:
pi
pi
pi /Yi
≡
≡ N
pi /Yi + 1
pi + Yi
j=1 p j + p0
(5)
⊔
⊓
Proposition 3.2 There is a one-to-one correspondence
between κi and πi given by κi = κ(πi ), where
κ(z) :=
z
for z ∈ [0, 1)
1−z
(6)
κ is strictly increasing and convex.
Proof
πi =
1
1
κi
=⇒
= +1
1 + κi
πi
κi
=⇒ κi =
πi
1
≡
1/πi − 1
1 − πi
κ(z) = z/(1 − z) =⇒ ∀ z ∈ [0, 1) κ ′ (z) = (1 − z)−2 >
⊔
⊓
0 and κ ′′ (z) = 2(1 − z)−3 > 0 (see Fig. 2).
Consider a system of N equations of the form
pi
N
j=1
j=i
p j + p0
= κi
(7)
Mobile Netw Appl (2011) 16:640–660
643
15
Proof Perform direct substitution into Eq. 7 with p0 =
0 and pi = kπi where k > 0:
pi
N
10
j=1
z/(1−z)
j=i
kπi
= N
p j k j=1 π j − kπi
=
πi
1 − πi
By Proposition 3.2, the last expression equals κi .
5
⊔
⊓
3.2 Power limits and the “ruling terminal”
0
0
0.2
0.4
0.6
0.8
1
z
Fig. 2 Graph of κ(z) = z/(1 − z), the CIR as a function of the
terminal’s fraction of the total receiver power
Theorem 3.1 If
π̄ :=
N
(8)
πj < 1
j=1
pi
πi
=
p0
1 − π̄
(9)
Proof Condition (8) implies that Eq. 9 is positive. Replacing Eq. 9 into Eq. 7 yields:
pi
j=1
j=i
=
=
p j + p0
p0
Lemma 3.1 Let k be a ruling terminal. If
πk
π̄ ≤ 1 −
hk ( P̂k / p0 )
(11)
(12)
then the power levels given by Eq. 9 obey the applicable
power constraints (the system is feasible).
Proof By definition of k, Eq. 12 implies that
then the system def ined by Eq. 7 has a positive solution
given by
N
Definition 3.2 Terminal k is a ruling terminal if
πk
πi
≥
∀i ∈ {1, . . . , N}
hk P̂k
hi P̂i
N
j=1
p0 πi /(1 − π̄)
π j/(1 − π̄ ) − p0 πi /(1 − π̄ ) + p0
πi
πi
=
π̄ − πi + 1 − π̄
1 − πi
By Proposition 3.2, the last expression equals κi .
⊔
⊓
π̄ ≤ 1 −
πi
hi ( P̂i / p0 )
(13)
∀i
Since Eq. 12 =⇒ Eq. 8, Eq. 9 has a positive solution:
pi∗ = p0 πi /(1 − π̄ ).
From Eq. 13,
πi
πi
p0 ≤ hi P̂i
1 − π̄
(14)
Thus, Eq. 12 implies that pi∗ ≤ hi P̂i ∀i.
⊔
⊓
hi ( P̂i / p0 )
≤ 1 − π̄ =⇒
Remark 3.1 πi represents terminal i’s desired quality
of service (QoS), and hi P̂i the highest power level
that i can get to the receiver; thus the ratio πi /(hi P̂i )
yields i’s desired QoS per unit of power available to i.
The terminal with the highest such ratio wants, loosely
speaking, “the most for the least”, and hence is in the
worst situation to achieve its QoS. If the ruling terminal
can achieve its desired QoS, all others can as well.
Corollary 3.1 If p0 ≈ 0 (cell is “interference limited”),
and
N
j=1
4 Terminal’s choice under pricing
πj = 1
(10)
then any power vector proportional to the vector
(π1 , · · · , π N ) is a solution to the system def ined by
Eq. 7.
4.1 Pie division through pricing
πi is terminal i’s fraction of the total power at the
receiver. Thus, the network can view power allocation as a “pie division” problem: how big the “slice”
644
Mobile Netw Appl (2011) 16:640–660
to be allocated to a given terminal. The case of the
interference-limited cell is the easiest to visualise: the
“pie size” is necessarily 1 (Eq. 10), and the “slices”
immediately indicate the received power levels. For a
given value of πi , the terminal can obtain directly the
corresponding CIR (Eq. 6), and hence its performance.
Thus, if the resource manager sets a price ci at which
terminal i can “buy” a “slice” πi , for the given ci , i can
choose optimally πi , irrespective of the choices made
by others. In principle, the terminal’s individual choices
may exceed “capacity”, but this may be avoided if the
price is “right”, or the network may select an “optimal”
subset of terminals to be served.
In the general case, a terminal needs to know the
total received power p̄ + p0 in order to calculate its
emission power, for its chosen power fraction. However, the analysis below shows that, for a given price,
the total received power will not affect the terminal’s
optimal fraction.
4.2 General technical results
We first provide some technical results that are relevant
to various parts of this work. Others more specific
results will be inserted below where appropriate.
Lemma 4.1 Let h : [d, e] → ℜ+ be a continuous strictly
quasi-concave function h with maximal value Y at
X where d < X < e, that is, d ≤ x1 < x2 ≤ X =⇒
h(x2 ) > h(x1 ) and X ≤ x1 < x2 ≤ e =⇒ h(x1 ) > h(x2 )
(Fig. 3). Suppose h(d) ≥ h(e). Let S := {x : h(x) = c}
(the set of solutions to h(x) = c).
⎧
⎪
∅
if c > Y or c < h(e)
⎪
⎪
⎪
⎨{X}
if c = Y
S=
⎪
{a, b } with a < X < b if h(d) < c < Y
⎪
⎪
⎪
⎩{b } with X < b
h(e) < c < h(d)
Furthermore, a < x < b =⇒ h(x) > c.
Proof The first two cases are immediate, by definition.
The next two cases follow from the fact that h is strictly
increasing in (d, X) and strictly decreasing in (X, e).
⊔
⊓
Lemma 4.2 Suppose S : ℜ+ → [0, d] is an S-curve
(Def inition A.1) with inf lexion at z f . Let B(z) :=
S(z)/z with B(0) := limz↓0 B(z) ≡ S′ (0). Then, (i) there
is a unique tangent line from the origin to S(z), denoted
as c∗ z and called the tangenu, with tangency point,
genu, (z∗ , S(z∗ )), where z∗ > z f . (ii) B is strictly quasiconcave, and its unique maximiser in the interval [0, Z ]
is min(z∗ , Z ).
Proof See [16].
⊔
⊓
Remark 4.1 Figures 4 and 5 show the tangenu (tangent from (0,0)) and genu (tangency point) for some
S-curves. Figure 6 shows the shape of the graph
S(z)/z.
0.97
4
16
0.86
32
64
Packet success rate
Y
c
0
0
0.15
0.26
0.43
0.78
1
Power Fraction at receiver
d
a
X
b
e
Fig. 3 Graph of a single-peaked function h with maximal value
Y at X. a and b are the two solutions to h(x) = c, where h(d) <
c<Y
Fig. 4 The composite function f (Ŵκ(z)) = f (x), with f the
PSRF, Ŵ the spreading gain, and κ(z) = z/(1 − z), plays a key
role, especially its tangenu (tangent to (0,0)) and genu (tangency
80
point). f (x) = 1 − exp (−x/2) /2 − 2−80 is displayed. The
value of Ŵ ∈ {4, 16, 32, 64} is indicated near the genu
Mobile Netw Appl (2011) 16:640–660
645
Then, the terminal should choose the value of πi that
maximises benefit minus cost, that is:
vi
Li
Ri fi (Ŵi κ(πi )) − ci πi
Mi
(16)
fi is the (slightly modified) packet-success-rate function, whose graph as a function of its argument, the
SIR, is an S-curve. fi (Ŵi κ(z)) is a composite function
of fi and κ, with independent variable z and parameter
Ŵi . The graph of fi (Ŵi κ(z)) inherits the S-shape of
fi (see Fig. 4 and the Appendix). Thus, the terminal
maximises an expression of the form S(z) − cz, where
S is some S-curve, a problem whose solution is given by
Theorem 4.1:
Fig. 5 Maximising S(z) − cz subject to z ≤ Z , where S(z) is an
“S-curve”. If c > c∗ or c = c′ and Z < a then z = 0 is optimal.
Otherwise min(Z , z′ ) is the maximiser. At z′ , the curve’s tangent
(short blue line) is parallel to the cost line c′ z
4.3 Choice by a time-driven terminal
4.3.1 Analysis in term of the power fraction
As discussed in Section 2.2, a t-terminal wishes to maximise its performance over some pre-specified length of
time, say the time unit, considering both its benefit and
its cost.
For a given πi , the terminal’s cost is ci πi , and (with
κ(z) given by Eq. 6) the average number of information
bits transferred over a time unit is Bi :
Li
Ri fi (Ŵi κ(πi ))
Mi
(15)
c2
c*
Money
c1
0
a
z*
b
Resource
Fig. 6 For c ≤ c∗ the e-terminal chooses z∗ ; else z = 0 is optimal
Theorem 4.1 Consider the problem of maximising
S(z) − cz subject to 0 ≤ z ≤ Z where c is a positive
number and S is an S-curve (Def inition A.1) with
inf lexion at z f , and satisfying c∗ z∗ = S(z∗ ). (i) If c > c∗
then z = 0 is the maximiser. (ii) For c < c∗ , the equation
S′ (z) = c has exactly one solution, zc , that is greater than
z f . (iii) If zc ≤ Z then zc is the maximiser. If zc > Z
then the maximiser is either Z , if S(Z ) ≥ cZ , or zero,
otherwise.
Proof
(i) If c > c∗ then ∀z > 0, cz > S(z) =⇒ S(z) −
cz < 0. Thus, z = 0 is the maximiser.
(ii) If c < c∗ then a maximiser of S(z) − cz that is
inside (0,Z) must satisfy the first-order necessary optimising condition: S′ (z) = c. Because S
is an S-curve, its derivative is strictly increasing
between zero and z f and strictly decreasing for
z > z f (as shown in Fig. 1). If S′ (0) ≤ c < c∗ , then
by Lemma 4.1, S′ (z) = c has 2 solutions zo , zc
such that z0 < z f < zc . If c < S′ (0) (as is c′′ in
Fig. 5) then, also by Lemma 4.1, zc > z f is the
only solution to S′ (z) = c.
(iii) At zc , S′ is decreasing (S′′ is negative) which
implies that zc is, if feasible, a maximiser. By contrast, at z0 , S′ is increasing, therefore z0 is a minimiser. If zc < Z , zc is the only feasible point that
satisfies the necessary and sufficient conditions
for a maximiser, and therefore it is the global
maximiser. If zc > Z , then one of the extreme
points is the maximiser: 0 or Z . If S(Z ) − cZ > 0
(e. g. Z > a in Fig. 5) then Z is the maximiser.
Otherwise zero maximises S(z) − cz.
⊔
⊓
Remark 4.2 The case c = c∗ , Z ≥ z∗ is, in principle,
indeterminate, because for z = z∗ , c∗ z∗ = S(z∗ ) which
implies that the objective function evaluates to zero,
646
Mobile Netw Appl (2011) 16:640–660
just as it does for z = 0. Thus, in this case, either 0 or
z∗ are optimal. However, we shall assume that in any
such situation the decision-maker prefers the positive
value (i.e., to use the system) over zero (i.e., to remain
inactive).
If the x2 is feasible, Eq. 18 is satisfied, and revenue
reduces to:
x
+ 1 S′ (x)
(19)
x
Ŵ
Under suitable assumptions, the graph of Eq. 19 has
the bell shape shown in Fig. 6.
4.3.2 Analysis in terms of the SIR
4.4 Choice by an energy-limited terminal
One can perform an analysis similar to that of Section
4.3.1 in terms of the SIR, x. In this case, the benefit
depends directly on xi , and no composite function is
needed. However, the cost is now a nonlinear function
of xi , namely ci xi /(xi + Ŵi ) where Ŵi is the spreading gain.
Considering Eqs. 15 and 16, the terminal chooses xi
to maximise
xi
Li
Ri fi (xi ) − ci
vi
Mi
xi + Ŵi
(17)
Thus, the terminal maximises an expression of the
form S(x) − c(x) subject to 0 ≤ x ≤ X, where S is some
S-curve and c(x) := cx/(x + Ŵ) with c and Ŵ positive
real numbers. Below we sketch a solution for this problem that follows closely the proof of Theorem 4.1. Some
technical details are ignored.
An interior maximiser must satisfy S′ (x) = c′ (x) =
cŴ/(x + Ŵ)2 , or
Ŵ
x
+1
Ŵ
2
S′ (x) = c
(18)
By solving Eq. 18 together with the intersection
condition cx/(x + Ŵ) = S(x) one obtains c∗ such that
c∗ x/(x + Ŵ) is tangent to S(x) at x∗ .
It is clear that c > c∗ implies ∀x > 0, S(x) − c(x) < 0.
Thus, x = 0 is the maximiser.
For c < c∗ , it is also clear that if X is less than the
abscissa of the point where the cost curve first intersects
S(x) (e.g., X < a2 for c = c2 in Fig. 6), ∀x ∈ [0, X],
S(x) − c(x) < 0. Then, x = 0 is again the maximiser.
For c < c∗ and X > a2 , let h(x) := Ŵ(x/ Ŵ + 1)2 S′ (x)
(left side of Eq. 18). By Assumption 2 in the Appendix,
h retains the single-peaked shape of S′ (see Fig. 1).
Let h(x̂) be h’s maximal value. By Lemma 4.1, as
long as c < h(x̂), Eq. 18 has two solutions, x1 and x2
such that x1 < x̂ < x2 , and h(x) > c ∀x ∈ (x1 , x2 ). Thus
over (x1 , x2 ) the derivative of the objective function
S′ (x) − cŴ/(x + Ŵ)2 is positive, which implies that the
largest feasible value in (x1 , x2 ) is best. Hence, the
maximiser is min(x2 , X).
The resulting payment by the terminal (network’s
revenue) at the chosen operating point is cx/(x + Ŵ).
We first establish some additional technical results
about general maximisation problems involving an Scurve. Subsequently we explain how these results relate
to the e-terminal problem.
4.4.1 Relevant technical results
Theorem 4.2 Suppose S is an S-curve (Def inition A.1)
with inf lexion at z f , such that c∗ z∗ = S(z∗ ). Let B(z) :=
S(z)/z with B(0) := limz↓0 B(z) ≡ S′ (0). Consider the
problem of maximising B(z) − c subject to 0 ≤ z ≤ Z
where c > 0 (see Fig. 7). If (ia) c > c∗ or (ib) c ≤ c∗ ,
z∗ > Z and B(Z ) < c, then the maximiser is zero. (ii)
If c ≤ c∗ and z∗ ≤ Z then z∗ is optimal. (iii) If c ≤ c∗ ,
z∗ > Z and B(Z ) ≥ c, then z = Z is optimal.
Proof Since c is a constant independent of z, the z >
0 that maximises B(z) − c is the same that maximises
B(z).
By Lemma 4.2 min(z∗ , Z ) maximises B(z).
Fig. 7 Terminal chooses SIR x that maximises benefit minus
cost: S(x) − cx/(x + Ŵ); e.g., for c = c2 it chooses x2 where the
derivative of the S-curve equals that of the cost-curve. The largest
c for which the terminal will operate is c∗ . The bell-shaped curve
corresponds to the terminal’s payment (network’s revenue) as a
function of its choice, over an appropriate range
Mobile Netw Appl (2011) 16:640–660
647
By definition of z∗ , S(z∗ )/z∗ − c ≡ c∗ − c.
Therefore, c > c∗ implies that z = 0 maximises
B(z) − c, while c ≤ c∗ and z∗ ≤ Z implies that z∗ is
optimal.
If c ≤ c∗ but z∗ > Z then the highest feasible value
for the objective function is S(Z )/Z − c.
Therefore, if c ≤ c∗ , z∗ > Z and S(Z )/Z ≥ c, then
z = Z is optimal; while c ≤ c∗ , z∗ > Z and S(Z )/Z <
c, implies that z = 0 is optimal.
⊔
⊓
Theorem 4.3 Suppose S is an S-curve (Def inition A.1)
with inf lexion at z f , such that c∗ z∗ = S(z∗ ). Let B(z) :=
S(z)/z with B(0) := limz↓0 B(z) ≡ S′ (0). By Lemma 4.2
B is strictly quasi-concave with a global maximum at
z∗ (i.e., it is single-peaked). Further assume that, as
shown in Fig. 8, B(z) starts out convex and has a single
inf lexion point between 0 and z∗ , at zl . (i) Then, there
is a unique line from the origin, denoted as cx z, that is
tangent to the graph of B (Fig. 8) at zx < z∗ . Consider the
problem of maximising B(z) − cz subject to 0 ≤ z ≤ Z
with c > 0. (ii) If c > cx , then z = 0 is the maximiser.
(ii) For c < c∗ , the equation B ′ (z) = c has exactly one
solution, z M , that is greater than zl . (iii) If z M ≤ Z then
z M is the maximiser. If z M > Z then the maximiser is
either Z , if B(Z ) ≥ cZ , or zero, otherwise.
(a)
Proof
(i) By hypothesis, between 0 and z∗ , B(z) has the Sshape, and the development in [16] implies the
existence and uniqueness of the tangent cx z. The
reminder of the proof is very similar to that of
Theorem 4.1.
(ii) If c > cx , the line cz lies entirely over the curve
except at the origin, thus, B(z) − cz < 0 for any
z > 0, and z = 0 is the maximiser.
(iii) For 0 < c < cx , a maximiser in (0, Z ) must satisfy
B ′ (z) = c. Any solution of B ′ (z) = c must be less
than z∗ because by strict quasi-concavity, B ′ (z) ≤
0 for z ≥ z∗ . Also, since B(z) has, by hypothesis,
an S-shape over (0, z∗ ), B ′ is itself single-peaked
over (0, z∗ ), therefore by Lemma 4.1, B ′ (z) = c
has at least one solution, z M , to the right of zl
(where its peak is), and B ′′ (z M ) < 0.
If z M ≤ Z , then z M is optimal, since it is feasible, and
it is the only interior point that satisfies the necessary
and sufficient condition for a maximiser.
If z M > Z , then one of the extreme points is the
maximiser. If B(Z ) > cZ > 0 (e.g., Z > a in Fig. 8a),
then Z is the maximiser. Otherwise zero maximises
B(z) − cz.
⊔
⊓
(b)
Fig. 8 Maximising B(z) − cz subject to 0 ≤ z ≤ Z
Remark 4.3 The case c = cx is indeterminate, but we
assume that zx is chosen (see Remark 4.2). Figure 8
illustrates the solution (z M is denoted as M). If c > cx ,
the cost line cz lies entirely over the curve except at the
origin, and z = 0 is optimal. At the other extreme, if
648
Mobile Netw Appl (2011) 16:640–660
c ≈ 0, the maximiser is ≈ z∗ . If c < cx , at the maximiser
z M a tangent to the curve is parallel to the cost line.
4.4.2 E-Terminal’s choice with linear pricing
For an energy-limited terminal, the natural period of
interest is battery life. For any given p̄ the transmission
power corresponding to πi is:
Pi = pi / hi ≡ πi ( p̄ + p0 )/ hi
(20)
Ei hi
ci πi
p̄ + p0
(21)
Now, πi does not drop out (compare to Eq. 22).
The terminal chooses πi to maximise total benefit
minus total cost:
With energy Ei , battery life is
Ti = Ei /Pi ≡
Ei hi
πi ( p̄ + p0 )
By Eq. 21, the terminal’s total cost over the period of
interest is given by
ci πi Ti ≡ ci
Ei hi
p̄ + p0
(22)
Notice that πi drops out of the total cost expression.
The terminal’s benefit is vi Bi , with Bi the total (average) number of (energy-earned) information bits over
the period Ti :
Li
Ri fi (Ŵi κ(πi ))Ti
Bi (πi ) =
Mi
(23)
The terminal chooses πi to maximise utility (total
benefit minus total cost):
Ei hi
p̄ + p0
Li
fi (Ŵi κ(πi ))
vi Ri
− ci
Mi
πi
operating point. This is intuitively unappealing, and in
fact undesirable, for reasons given below. In this section
we consider a cost function of the form cz2 (quadratic
pricing).
With energy Ei , battery life Ti is Ei hi /(πi ( p̄ + p0 ))
(Eq. 21). Total cost is now ci πi2 Ti , or
(24)
ci is a known constant. The composite function
fi (Ŵi κ(z)) retains the S-shape of fi (see Fig. 4 and
the Appendix). Thus, the terminal must maximise an
expression of the form S(z)/z − c, a problem whose
solution is given by Theorem 4.2.
Remark 4.4 Equation 24 indicates that the the total
received power, p̄ + p0 does affect the terminal’s utility
(benefit minus cost). But it appears as a factor of both
the benefit and the cost; in the end it does not affect the
terminal’s optimal choice. Whatever the total received
power turns out to be, the terminal still wants the
quantity in brackets to be as large as possible. Thus, it
chooses the πi that maximises the bracketed expression
in Eq. 24.
4.4.3 E-terminal’s choice with quadratic pricing
As discussed in Section 4.4.2, with a linear price the
independent variable drops out of the e-terminal’s total
cost expression. Thus, the price determines whether or
not this terminal operates, but it does not affect its
Ei hi
p̄ + p0
fi (Ŵi κ(πi ))
Li
vi Ri
− ci πi
Mi
πi
(25)
(26)
As before, fi (Ŵi κ(z))/z is the familiar ratio of an Scurve to its argument. The solution to the e-terminal’s
maximisation problem with quadratic pricing follows
Theorem 4.3 (Section 4.4.1). See also Remark 4.4.
5 Revenue-maximising prices
5.1 Optimal single-terminal pricing
5.1.1 Pricing for a time-driven terminal
The analysis of Section 4.3 shows that as the price
grows, the terminal consumes less; i.e., chooses smaller
values of the resource. Since the network is interested
in revenue (the product of the quantity purchased by
the price), it is unclear what is the network’s “best”
price. To determine this, the network must observe how
its revenue varies as a function of the price.
First, suppose that the resource constraint is “large”,
Z ≫ z∗ . By Theorem 4.1 and as illustrated by Fig. 9a,
for a given ck < c∗ , the terminal chooses a value zk that
satisfies S′ (zk ) = ck . Then, the resulting network’s revenue is ck zk ≡ zk S′ (zk ). Thus, the network’s revenue
follows the curve zS′ (z).
The curve zS′ (z) has a single peak, say at z R
(Assumption 2 in the Appendix). In principle, the network would like to set a price such that the terminal
chooses z R . But it is shown below that c R > c∗ which
implies that c R z R > S(z R ). Thus, c R would be “too
high” for the terminal, which would choose zero instead, yielding no revenue for the network.
Lemma 5.1 The maximiser z R of zS′ (z) satisf ies z f <
z R ≤ z∗ where z f and z∗ denote respectively the
inf lexion point and the genu of the Benef it S-curve.
Mobile Netw Appl (2011) 16:640–660
649
maximises the network’s revenue when the resource constraint is Z is (i) c∗ if Z ≥ z∗ or (ii) S(Z )/Z if z∗ > Z .
Proof
(i) By Lemma 5.1, with Z > z∗ , it is the decreasing
side of the revenue curve zS′ (z) that intersects
S(z) at z∗ . Thus, z > z∗ =⇒ zS′ (z) < z∗ S′ (z∗ ).
Therefore, the network sets the price equal to c∗
and the terminal chooses z∗ . Then, the network’s
revenue equals c∗ z∗ ≡ z∗ S′ (z∗ ) = S(z∗ ) =
L
v R f (Ŵκ(z∗ ))
M
(a)
(27)
(ii) By Theorem 4.1, if c > S(Z )/Z then cz > S(z)
for z ∈ (0, Z ), and the terminal chooses z = 0
which produces no revenue for the network. Thus
S(Z )/Z is the largest price for which the terminal will operate. If the network choose a lower
price, the terminal cannot choose z > Z , yielding
a lower revenue for the network. Therefore the
network sets the price equal to S(Z )/Z , the terminal chooses z = Z , and the network receives a
revenue equal to S(Z ).
⊔
⊓
5.1.2 Pricing for an energy-constrained terminal
(b)
Fig. 9 Pricing involves both a terminal’s side and a network’s
side. Once the network understands how the terminal reacts to a
price level (a), it can set the price that maximises its revenue (b)
Proof At z R the derivative of zS′ (z) vanishes; that
is, S′ (z R ) + zS′′ (z R ) = 0. S′ (z R ) is necessarily positive,
thus S′′ (z R ) < 0 which implies z R > z f .
If the increasing (rising) side of zS′ (z) intersected
S(z), its falling side would intersect S(z) again. But
by Lemma 4.2, the equation zS′ (z) = S(z) has only
one positive solution, z∗ . Thus, it is the falling side
of the graph zS′ (z) that intersects S(z). Therefore,
z R ≤ z∗ .
⊔
⊓
Theorem 5.1 Suppose that a t-terminal’s benef it from
utilising a power fraction z is given by the S-curve
S(z), which satisf ies c∗ z∗ = S(z∗ ). Then, the price that
Linear pricing By Theorem 4.2 and the discussion
in Section 4.4, under linear pricing, the e-terminal
will either decline to operate, or operate at the point
that maximises “benefit per Watt” (the maximiser of
fi (Ŵi κ(z))/z).
The specific value of ci plays a role indirectly, because it can make the cost exceed the benefit. It makes
sense for the network to set the highest value of ci that
is acceptable to the terminal (see Eq. 24). That is:
ci∗ =
Li
fi (Ŵi κ(z∗ ))
vi Ri
Mi
z∗
(28)
At such level, the terminal’s benefit equals its cost.
The total revenue provided by this terminal during
the life of its battery equals (see Eq. 22):
Ei hi ∗
c
p̄ + p0 i
(29)
What the network receives from this terminal per time
unit equals:
ci∗ z∗ =
Li
vi Ri fi (Ŵi κ(z∗ ))
Mi
(30)
Quadratic pricing The development here follows
closely that of Section 5.1.1. From Section 4.4.3, and
Theorem 4.3, if the available resource Z > z∗ , and with
B(z) = S(z)/z the terminal’s choice satisfies B ′ (z) = c,
650
Mobile Netw Appl (2011) 16:640–660
and the network revenue is cz = zB ′ (z). By part (iv)
of Assumption 2 from the Appendix, zB ′ (z) retains
the single-peaked shape (see Fig. 10). Proceeding along
those lines, one can prove the following theorem:
Theorem 5.2 Suppose that an e-terminal’s benef it from
utilising a power fraction z is given by B(z), as def ined
in Theorem 4.3. Then, the price that maximises the
network’s revenue when the resource constraint is Z is
(i) cx if Z ≥ zx or (ii) B(Z )/Z if zx > Z .
Remark 5.1 The argument to prove Theorem 5.2 is
virtually identical to the proof of Theorem 5.1. The
key observation is that, as pointed out in the proof of
Theorem 4.3, only those values of z satisfying 0 < z ≤
z∗ play any role, and over this range B(z) (its “rising
side”) has—by assumption—the S-shape (see Fig. 8).
5.2 Serving many terminals
We assume that the network can set an individual price
per terminal, and in principle treat each terminal independently, following Section 5.1. However, the sum of
the individually chosen πi∗ may violate Eq. 12. From all
the sets of terminals that satisfy Eq. 12, the network
must choose the “best” set. This problem follows the
pattern of the well-known “knapsack problem”.
5.2.1 Which terminals to serve?
The (fractional) knapsack problem There is a finite
set of items, each characterised by a “weight” and
a “value”. One seeks the combination of items that
maximises the sum of the values, without exceeding a
total weight constraint. The problem is in general NPhard [13]. However, if one can include in the knapsack
any desired fraction of any item, the problem admits
a very simple and intuitive solution. Items are sorted
by their “value to weight” ratio, and whole items are
inserted in order. When no space is left for another
whole item, the pertinent fraction of the next item
is added to completely fill the knapsack [4]. In our
problem, serving “a fraction” of a terminal is to admit it
with a lowered πi than it wants. However, the analogy
is imperfect, because the “value” of the terminal is not
linear with its “slice”, πi . Thus, the fractional knapsack
solution yields a suboptimal choice in our case (which
we neglect below).
“Benef it per Watt” priority A terminal’s “weight”
should be (a function of) its service “slice”, πi , which is
itself proportional to the terminal’s received “Wattage”
(Eq. 9). The obvious “value” measure (from the network’s viewpoint) is revenue contribution, but over
which period (time unit or battery life)?. The time unit
is a natural choice for t-terminals. It turns out that it
makes sense for the network to consider, for value-toweight purposes, an e-terminal’s revenue per second
contribution. By doing so, the network measures both
categories of terminal with the same yard stick. Furthermore, an e-terminal whose battery charge runs out
is likely replaced by a new terminal which (statistically)
has similar properties to the departing one. Thus, the
network may as well focus on revenue per second.
Equations 27 and 30 are equivalent. Thus, the
value/weight ratio for terminal i, while operating with
a power fraction of πi > 0 and paying the network
an amount that equals the terminal’s benefit, can be
expressed as vi R̂i /πi , with
R̂i :=
Li
fi (Ŵi κ(πi ))Ri
Mi
(31)
Given the preceding pricing analysis, at the operating point, πi should either be (i) z∗ , the value at the
genu of fi (Ŵi κ(z)), or, if such value is “too high” for
some reason, (ii) the highest reachable z, provided that
at such z the terminal’s cost does not exceed its benefit.
Optimal physical layer conf iguration Notice that
(Li /Mi )(W/ Ŵi ) fi (Ŵi κ(z∗ ))/z∗ is determined by the
physical-layer configuration (modulation, coding, data
rate). If several such configurations are available, the
network should impose the one that offers the largest:
Fig. 10 With B(z) := S(z)/z,
peakedness property
zB ′ (z)
retains
the single-
Li fi (Ŵi κ(z∗ ))
Mi
Ŵi z∗
(32)
Mobile Netw Appl (2011) 16:640–660
651
because it leads to greater “benefit per Watt” when the
terminal operates optimally. Thus, two terminals that
have a common spreading gain (or data rate), should
have a common PSRF, fi . This line of reasoning is
explored further in a more general context in [20].
5.2.2 Power limited cell
The key is Section 3.2. If A are the indices of a certain
set of terminals, they can occupy the cell each with a
power fraction πi , if the total fractional “slice” allocated
to them satisfies a condition similar to Eq. 12: with k ∈
A, and πk / p̄k ≥ πi / p̂i ∀i ∈ A,
πk
(33)
πi ≤ 1 −
p̂k / p0
i∈A
Terminal k is the “ruling terminal” of the set A. Notice
that πk appears on the left side of constraint 33. Thus,
with terminal k active, the total fractional “slice” left
for possible companions is
1 − πk −
πk
p̂k / p0
(34)
The largest achievable value for πk occurs when terminal k is alone in the cell, and equals p̂k /( p̂k + p0 ).
A terminal’s “best subjects” Let J(1), J(2), . . ., J(N)
be indices such that
π J(1)
π J(2)
π J(N)
≥
≥ ··· ≥
p̂ J(1)
p̂ J(2)
p̂ J(N)
Thus, when all terminals are active, terminal J(1) is the
ruling terminal. When J(1) is not active, terminal J(2)
becomes ruling, and so on. Evidently, terminal J(N)
“rules”, only when no one else is active.
The network is interested in identifying the “best
subjects” of terminal J(m) (m < N), defined as the set
of terminals that produces the most revenue (while
satisfying the pertinent feasibility condition) when
J(m) is the ruling terminal, that is, with terminals
J(1), . . . , J(m − 1) not active. One can identify this
set, by applying the knapsack solution described in
Section 5.2.1, with “knapsack capacity” given by Eq. 34,
that is, 1 − π J(m) (1 + p0 / p̂ J(m) ).
Let A J(m) be the set that contains (the indices of)
terminal J(m) and its “best subjects” (with A J(N) :=
{J(N)}). The idea is to find A J(1) and compute and
store the combined revenue that J(1) together with its
“best subjects” produce. Subsequently, find A J(2) , and
compute and store the combined revenue produced
by the terminals in A J(2) . Then, proceed analogously
with respect to J(3), J(4), and so on. Finally, from the
previously obtained sets, choose the one that produces
the most revenue, overall.
Table 2 Key parameters for each terminal
i
vi
Ŵi
πi∗
g(πi∗ )
R̂i
ri
p̂i
1
2
3
4
5
6
7
3.5
4.0
3.1
3.5
3.7
3.5
3.0
32
64
32
64
128
128
64
0.26
0.15
0.26
0.15
0.08
0.08
0.15
0.88
0.86
0.88
0.86
0.85
0.85
0.86
3.52
1.72
3.52
1.72
0.85
0.85
1.72
46.6
46.3
41.3
40.5
39.7
37.6
34.7
1
5
4
3
1
4
4
Numerical illustrations Table 2 provides the key parameters for 7 terminals. Power limits are given as
multiples of p0 . The common PSRF is that of Fig. 4, and
units are such that (Li /Mi )Ri = 128/ Ŵi . ri stands for
“value to weight” ratio. The service SIR’s (Ŵi κ(πi∗ )) are
11.5, 11.1 and 10.9 for spreading gains 32, 64, and 128
respectively, and g(πi ) := f (Ŵi κ(πi∗ ), the packet success
rate.
Table 3 applies the solution procedure of Section
5.2.2 to these terminals. The first column has the indices of the terminals sorted in order of descending
value/weight ratio (ri in Table 2). The top row has
the “slice” that can be allocated to all terminals when
the terminal whose index is directly below “rules”
(d j := π ∗j / p̂ j). The second row has the terminals’ indices sorted in descending order, from left to right,
by ε j (terminals 7, 2, and 6 are not shown for reasons
Table 3 A set of the terminals is chosen for service.
0.74
0.92
0.93
0.95
1 − dj
πi
v̂i
[0]
0.26
12.3
1
1
0.15
6.9
1
[1]
[0]
0.26
10.6
0,40
1
1
[1]
0.15
6.0
5
0
[1]
[0]
[0]
0.08
3.1
6
0
1
1
1
0.08
2.9
7
0
1
1
1
0.15
5.1
0.74
0.87
0.79
0.52
∑ πi
30.1
35.0
31.9
21.0
∑ v̂i
i
1
5
3
4
1
[1]
[0]
[0]
2
1
1
3
1
4
652
explained below). Thus, terminal 1 has the greatest
“value to weight” ratio, but coincidentally, it also has
the highest π ∗j / p̂ j ratio (it is in the “worst situation”),
which implies that terminal 1 “rules” when all are
active. With terminal 1 absent, terminal 5 “rules”; and
with 1 & 5 off, terminal 3 “rules”, and so on. The last
two columns have respectively πi and v̂i := vi R̂i (the
individual revenue contribution).
A “1” (resp. “0”) in the position (i, j), (row, column), means that when terminal j “rules”, terminal
i is (resp. is not) among the “best subjects” of j. A
number between 0 and 1 at such position indicates
that when j “rules”, terminal i is “fractionally served”.
The brackets denote mandatory (from the algorithm
viewpoint) inclusions or exclusions.
Thus, when terminal 1 “rules”, terminal 2 and 3 are
“fully” served, and terminal 4 is also served but with
less than half of its desired “slice”. In this case, the sum
of the slices is 0.74 and the total revenue brought by
these terminals is 30.1. When terminal 5 “rules” (next
column), terminal 1 is turned off by construction, and
each of the other terminals can be “fully” served. The
sum of the slices is 0.87 and the total revenue is 35.0.
At this point the algorithm can be stopped. The group
“ruled” by terminal 5 is chosen, because it produces
more revenue than terminal 1 and its best subjects.
Thus, even though terminal 1 itself produces more
revenue (in absolute and relative terms) than any other
terminal acting alone, it is the only terminal left out
because of its “bad situation”. The final two columns
(3 and 4 rules, respectively) are provided as illustration,
but not needed.
5.2.3 Analysis of the algorithm
The core algorithm that finds A J(m) and computes revenue utilises the simple knapsack solution of Section
5.2.1, and is applied at most N − 1 times (A J(N) =
{J(N)} by definition). Additionally, it becomes progressively simpler, because as m grows to N, fewer terminals need to be considered. E.g., J(N) and J(N − 1) are
the only potential members of A J(N−2) .
Furthermore, it may be unnecessary to run the core
procedure N − 1 times. The process can be stopped
with terminal J(m), if each one of terminals J(m + 1)
to J(N) can join J(m), each operating at its optimal
power fraction and satisfying constraint 33 with k =
J(m). Then, from the sets A J(1) , . . . , A J(m) , the one that
produces the most revenue is chosen. For instance, if
J(1) can be joined by all other terminals (each operating at πi∗ and satisfying Eq. 12) then, evidently, that
is the best the network can do, and the process can be
stopped right there.
Mobile Netw Appl (2011) 16:640–660
Finally, this procedure is performed at the energy
and processing-power rich base station. Thus, computational complexity does not seem to be a problem.
6 Game without direct cost
For performance comparison purposes, we discuss below a situation in which each terminal can choose its
power without a direct cost. The network may still
charge the terminal some conventional subscription
fee. But if there is no connection between what the terminal pays and its resource usage, it will use resources
as if they were “free”.
This scenario is best modelled as a “game of strategy”. Because there is neither pricing nor a central
controller, this situation can be thought of a “worst
case scenario”, which provides a “base line” for performance evaluation.
6.1 Game of strategy
In a game of strategy, each of several “selfish” agents
chooses a “strategy” in order to maximise its own
“payoff”, which depends on the strategies chosen by
all players. Herein, the strategy is a transmission power
level, which increases the payoff of the transmitting terminal, but degrades the performance of all others (for
introductory treatments, see [7, 12]). The key solution
concept is the Nash Equilibrium (NE); i.e., a strategy
per player (power level) such that no player would be
better off by unilaterally changing strategy. The key
to identifying the NE(s) is to first characterise each
player’s “best response”.
6.2 A terminal’s best response
In our game, the “best response” of terminal i is the
power level terminal i chooses given a vector representing one power level for each of the other terminals. In
fact, terminal i only needs the sum of the components
of such vector, which determines its level of interference, Yi .
6.2.1 T-terminal best response
Since the benefit of a time-driven terminal is strictly
increasing in its SIR, it is self-evident that, without cost
considerations, its (selfish) best response to any level of
interference or noise is to transmit at maximal power.
The resulting received power can be added into the
noise term.
Mobile Netw Appl (2011) 16:640–660
653
6.2.2 “Statutory battery” discipline
A situation in which each t-terminal operates continuously at its maximal power is intuitively undesirable. Since power-pricing is now unavailable (by
construction), a reasonable policy is to endow each
terminal with a (virtual) “statutory battery”, i.e., a limit
on the total amount of energy that it can emit over a
specified time period (comparable to a typical battery
life). The base station can tell the power level received
from a given terminal, its channel gain, the times it
is active, and, hence, its total energy emitted. Under
this policy, the t-terminal maximises its total benefit
by the time its energy emission allowance is exhausted
(see Section 2.2); that is, the t-terminal behaves as an
e-terminal.
6.2.3 E-terminal best response
In any case, we can think that all players are eterminals, experiencing a fixed level of “noise” p0
(which may include power received from t-terminals
that are not “virtual battery” powered, if any).
From Section 4.4, for a given Yi and with σi :=
Ŵi hi Pi /Yi (the SIR), a terminal with energy budget
Ei chooses its transmission power, Pi , to maximise
Ei vi Ri fi (Ŵ i hi Pi /Yi )/Pi , or
hi
Li
fi (Ŵi hi Pi /Yi )
fi (x)
Ei vi
W
∝
Yi
Mi
Ŵi hi Pi /Yi
x
(35)
Thus, the terminal’s best response is to set the power
level so that its SIR maximises fi (x)/x. By Lemma 4.2,
this ratio is single-peaked, and its unique maximiser,
x∗ , can be easily identified at the genu of the graph of
the PSRF. If x∗ cannot be reached because of power
limitations, the terminal operates at its power limit.
All terminals with a common PSRF will aim at the
same SIR (even if each has its own willingness to pay,
data rate, channel state, packet size, and energy budget). If several link-layer configurations are available,
the configuration whose PSRF has the highest ratio
f (x∗ )/x∗ should be chosen (see [20]). We assume below
a common PSRF, thus, all terminals aim at the same
SIR, x∗ .
6.3 Equilibrium of the game
6.3.1 Symmetric equilibrium
From Section 3.2, it is feasible for each of N terminals
to experience SIR x∗ if and only if condition 12 is
satisfied; that is,
πi ≤ 1 − πk /( p̂k / p0 ), where πi =
x∗ /(x∗ + Ŵi ) ≡ (1 + Ŵi /x∗ )−1 , and k such that πk / p̂k ≥
πi / p̂i ∀i ∈ {1, . . . , N} (k is the “ruling terminal”).
Thus, if condition 12 holds, each terminal can reach x∗
with the feasible power level given Eq. 9: h j P j =
1−
π j p0
N
n=1
πn
≡
p0 (1 + Ŵ̄ j)−1
N
1 − n=1
(1 + Ŵ̄n )−1
(36)
Since each terminal operates at its best-response
SIR (for any level of interference), Eq. 36 describes
a Nash equilibrium in closed form (with Ŵ̄ j := Ŵ j/x∗ ,
each quantity in Eq. 36 is presumed known). Of course,
condition 12 may not be satisfied.
6.3.2 Nash equilibrium in the general case
The general procedure to find the Nash equilibrium of
this game is reminiscent of Section 5.2.2. Each terminal
must obey inequality 14, which can be written (with π̄ =
πi , and p̂i := hi P̂i ) as πi / p̂i ≤ (1 − π̄ )/ p0 . The right
side is the same for all terminals, thus the terminal with
the greatest ratio πi / p̂i has the most difficulty to meet
this common constraint, therefore it is in the “worst
situation” (or it is the “weakest”). If this terminal “gives
up” on obtaining the optimal SIR, and simply operates
at its maximal power, then constraint 14 no longer
counts for this terminal, since it no longer aims for the
optimal SIR (or any specific one). Then, the terminal
with the second highest πi / p̂i can be thought of being
in the worst situation (among those still aiming for the
optimal SIR). Notice that when the data rate is common, Ŵi = Ŵ and hence πi = π , then, the terminal with
the smallest p̂i is in the worst situation. But a terminal
with a large spreading gain, Ŵi , could have the smallest
p̂i and not be in the worst situation because it may
achieve the desired SIR with a very small percentage
of the receiver power (πi = 1/(1 + Ŵi /x∗ )).
Then, to find the Nash equilibrium in the general
case, first sort the terminals by their πi / p̂i ratios, and
re-label the terminals such that π1 / p̂1 ≤ · · · ≤ π N / p̂ N .
First check whether the symmetric NE (Section 6.3.1)
exists, and if yes, stop. Otherwise, (i) find the terminal
in the worst situation and assume it operates at its
maximal power level, (ii) add its received power to the
noise term, and then (iii) check whether the remaining
N − 1 terminals can achieve the desired SIR under this
new scenario. If the answer is yes, stop. Otherwise,
proceed recursively with two terminals maxed out.
In the second iteration (if necessary), to check
whether terminals 1, . . . , N − 1 can reach the desired SIR with terminal N maxed out, the condi N−1
tion is i=1
πi ≤ 1 − π N−1 /( p̂ N−1 / p0(1) ) where p0(1) :=
654
Mobile Netw Appl (2011) 16:640–660
p0 + p̂ N . At the (m + 1)th iteration, to check whether
terminals 1, . . . , N − m can reach the desired SIR,
while each of terminals N − m + 1, . . . , N operates
at its maximal transmission power, the condition
becomes
operating with SIR xi◦ , the terminal successfully uploads
(Li /Mi )Ri fi (xi◦ ) information bits per second, yielding a
benefit of
N−m
6.3.4 Numerical illustration
i=1
πi ≤ 1 −
π N−m
p̂ N−m / p0(m)
(37)
with p0(m) := p0 + Nj=N−m+1 p̂ j. If constraint 37 is satisfied, the procedure stops after m + 1 iterations. Otherwise, it continues recursively.
In general, the game ends with N∗ terminals achieving x∗ (N∗ = 0 is possible, of course), and each of
the remaining N − N∗ operating at its maximal power
level, and experiencing the resulting SIR. It is clear that
an x∗ -achieving terminal has no incentive to unilaterally
change its power level. It is also clear that each of the
remaining terminals would gain by unilaterally raising
its power level, but cannot do so, because it is maxed
out already. Thus, the procedure indeed stops at a Nash
equilibrium.
6.3.3 Benef it at equilibrium
Once the equilibrium is found, one can apply Eq. 35
to calculate a terminal’s total benefit while operating at
equilibrium. With xi◦ and pi◦ denoting respectively the
◦
equilibrium SIR and received power, p̄ = p0 +
pi ,
and assuming a common energy budget, E, Eq. 35
yields:
f (x◦ ) vi hi
f (x◦ )
vi hi
L
EW ◦i
:= K ◦i
M
xi Yi
xi p̄ + p0 − pi◦
(38)
The constant K (measured in Joules) just gathers
a product of parameters, and could be set to 1 by
choosing convenient units of measurement. For an x∗ achieving terminal, xi◦ = x∗ and pi◦ is given by Eq. 9.
If these terminal’s data rates are of the same order of
magnitude, so will be the equilibrium power levels, and
thus the denominator of Eq. 38 will be approximately
constant for all these terminals. Then, the benefit of
an x∗ -achieving terminals will be, with convenient units,
≈ vi hi . For terminals not achieving x∗ , pi◦ = p̂i and xi◦ =
Ŵi p̂i /( p̄ + p0 − p̂i ).
Equation 38 yields a terminal’s benefit over its “battery life”. This is of interest to the network, because
what the terminal is willing to pay under any “conventional” fee structure is, ultimately, limited by what
the terminal’s “gets out of” the system. However, for
reasons discussed in Section 5.2.1, the network may
be more interested in benefit per time unit. While
vi (Li /Mi )Ri f (xi◦ )
(39)
In Table 4, we apply the procedure of Section 6.3.2,
for the terminals of Table 2, assuming they are all
energy-constrained. The common PSRF is that of
Fig. 4. The maximiser of f (x)/x is 10.75, hence, πi =
10.75/(10.75 + Ŵi ). With the original indices, the πi / p̂i
ratios are, respectively, 0.25, 0.03, 0.06, 0.05, 0.08, 0.02
and 0.04. This yields the sorting [ 6 2 7 4 3 5 1 ].
The first column of Table 4 has the terminals
sorted by their “situations”, from “worst” to “best”.
Each has been re-labelled (original indices shown in
parenthesis). We use the notation of condition 37
to explain the next columns.
The 2nd column corre
sponds to p0(m) = p0 + Nj=N−m+1 p̂ j, the third column
has the ratio p̂ N−m / p0(m) , and the fourth column has
π N−m p0(m) / p̂ N−m . The fifth and sixth columns have,
respectively, the left and right side of condition 37.
The first time the left side is less than or equal to the
right side, a NE has been found. Thus, this example
ends at the 2nd iteration, with only the terminal 7(1)
operating at maximal power, and all others enjoying
their chosen SIR σ ∗ . The row corresponding to 5(3) is
given as illustration, but not needed.
The equilibrium power levels can be obtained explicitly through Eq. 9 (with p0 replaced by p0(1) = p0 +
p̂7 = 2). 1 − π̄ = 0.16, thus hi Pi = 2(πi /0.16). E.g.,
hi Pi = 7/4, for terminals 4, 3(7), and 2. Then, the equilibrium benefits can be calculated through Eq. 38.
Table 4 Finding a Nash equilibrium
i
p+0
p̂w
p+
0
πw
p̂w
∑z
1− d
πi
p̂i
7(1)
1
0.25
0.25
1.09
0.75
0.25
1
6(5)
2
0.50
0.15
0.84
0.85
0.08
1
5(3)
3
1.33
0.19
0.76
0,.81
0.25
4
4(4)
7
-
-
-
0.14
3
3(7)
-
-
-
-
0,.14
4
2(2)
-
-
-
-
0.14
5
1(6)
-
-
-
-
0.08
4
Mobile Netw Appl (2011) 16:640–660
7 Performance experiments
Below we use the no-direct-cost game as a base line
for performance. The key performance index is the
total benefit derived by the terminals (which equals the
network’s revenue under the direct pricing scheme).
Benefit is normalised by dividing it by “representative
benefit”, which is obtained assuming that (i) the number of terminals is the largest that can be served at the
optimal SIR, (ii) when all have the average spreading
gain, (iii) are uniformly distributed along the cell radius
(1 Km), and (iv) have the average willingness to pay.
Figure 11 shows how performance changes with
some measures of “congestion”. The pricing scheme
(a)
655
performs only marginally better than the game when
the number of terminals is “small” (meaning that all
can reach the optimal SIR in the game). However, as
the number of terminals grow, the performance gap
increases. This is reasonable because under pricing,
the network always chooses to serve the “best” (revenue/Watt) users. Thus, having many users to choose
from is actually good for the network.
The game, however, always “serves” everybody (at
equilibrium all terminals transmit). With many terminals operating at full power, most get very poor performance. However the game performance does not
“collapse” quickly, because each of many terminals
does transmit and “gets something”, and there are
always a few of them that are very close to the base
station, and get reasonable performance, which helps
the game total. Thus, the specific “gain” of the pricing
scheme depends on how “busy” the cell is. For instance,
Fig. 11a indicates that with the “correct” arrival rate
(that equal to the number of terminals that can be
served at the optimal operating point), pricing outperforms the game significantly, but modestly (8 to 7). If
the arrival rate drops to 60% of this level, the performance gap is only a few percentage points. Pricing
outperforms the game about 4 to 3 (33%) when the
arrival rate is 40% above the “right level”.
Figure 12 describes how the “spread” of the
willingness-to-pay values (“social classes”) affects performance. The equally-likely wtp are the components
of 4v/s, where v = [1 a a2 a3 ] and s is the sum of v’s
components (e.g., with a=1/2, v = [1 1/2 1/4 1/8] and
s = 15/8, but with a = 1 vi = 1 ∀i). With this choice,
the expected value of the wtp vector (4v/s) is 1, for
(b)
Fig. 11 Performance versus “congestion” under power-share
pricing (solid) and at the equilibrium of a no-direct-cost game
Fig. 12 The greater the inequality (lower a), the better the
performance of the pricing scheme. But the game performance
is unaffected
656
Mobile Netw Appl (2011) 16:640–660
all a. With the arrival rate fixed at the “right level”,
the pricing scheme advantage grows with “inequality”
(doubles with a = 1/2), which is reasonable because the
network considers a users’ wtp to decide whom to serve,
but the game is blind to monetary considerations.
8 Socially optimal allocation
8.1 Power limits of data terminals
8.4 Numerical illustration
8.4.1 Finding the socially optimal price
One can solve the system of (nonlinear) Eq. 43 by algebraic or numerical means. But Fig. 13 provides greater
insight (recall Figs 9b and 8). The planner sweeps a
price line, from vertical to horizontal, until it finds the
optimal slope. Any price greater than c∗1 (a line to the
left of c∗1 z (red, dash)) is “too high”. When the price
To simplify the exposition, we assume that there is a
power-constrained media terminal with a service level
agreement that specifies its spreading gain Ŵ M and
SIR, σ M , and denote the total “slice” available for data
terminals as 1 − d.
In principle, any combination of
πi satisfying π̄ = πi ≤ 1 − d can be assigned to the
data terminals. The largest possible value of pi occurs
when πi = π̄ = 1 − d (i is the only active data terminal), which yields pi = p0 (1 − d)/d (Eq. 9). We assume
below that for all i, p̂i / p0 ≥ (1 − d)/d. Therefore, each
data terminal can reach its resulting power level.
8.2 Objective function
With Vi (πi ) denoting the appropriate benefit function
(depends on the terminal’s energy class), a reasonable
criterion for a social planner is to solve
maximise:
subject to,
N
Vi (πi )
(40)
πi ≤ 1 − d
(41)
πi ≥ 0
(42)
i=1
N
i=1
(a)
The necessary optimising conditions are [9, 11]:
Vi′ (πi ) − μ0 ≤ 0 with equality for πi > 0
(43)
8.3 Social optimum through pricing
From Eq. 43, any terminal receiving a positive share of
the power must satisfy Vi′ (πi ) = μ0 . From Section 4.3,
and Fig. 9b, a t-terminal can satisfy Eq. 43, and hence
reach a “socially optimal” allocation, provided that a
common price is set, which coincides with μ0 .
Per Section 4.4.2 and Fig. 7, in order for the eterminal’s behaviour to lead to Eq. 43, quadratic pricing must be used. The corresponding analysis is in
Section 4.4.3.
(b)
Fig. 13 Bell and S curves are benefit graphs. A terminal’s optimal allocation is identified by a short tangent, parallel to the
solid blue line representing the socially optimal price, for the
given resource constraint. All can be served when total resource
is 0.84 (a), but terminal 5 is left out when the resource drops to
0.54
Mobile Netw Appl (2011) 16:640–660
falls to c∗1 , terminal 1 chooses to operate, and as the
price continues to drop, more terminals become active
and/or those already active increase their purchase. The
planner stops when the sum of “slices” equals 1 − d.
8.4.2 Operating point: planner’s versus network’s
As shown by Fig. 13, the first terminals to become
active are precisely those with the “steepest” tangenu,
that is, those with the highest “value to weight” ratio,
which is precisely the criterion used by the (monopolistic) network. However, the network chooses an individual price per terminal such that each operates at
the genu (“knee”), where each maximises “benefit per
Watt”. The planner chooses a common price, and each
active terminal ends up paying less that it would under
the network’s price. But at the lower planner’s price,
each active terminal consumes more, which may reduce
the total number of terminals that can receive service.
9 Discussion
In the reverse link of a CDMA network with N terminals, each can receive service quality (SIR) σi only if
πi ≤ 1 − d where πi = σi /(σi + Ŵi ) (Ŵi is the spreading gain and 0 < d < 1). πi also equals i’s share of the
total power at the receiver. Thus, the uplink management can be approached as a “pie division” problem,
where the total receiver power is the pie and πi is
the fractional “slice” assigned to i. We have proposed,
analysed, and evaluated a technical-economic scheme
based on the key variable chosen by nature: πi . Each
data terminal has its own data rate, channel gain,
willingness to pay (wtp), and link-layer configuration.
Some have limited energy (e-terminals), but others not
(t-terminals) and we have specified appropriate performance metrics for both types. The receiver power
fraction, πi , immediately determines the carrier-tointerference ratio, κi = πi /(1 − πi ), which directly leads
to the SIR, σi = Ŵi κi . Thus, given a price on πi , the
terminal can individually make an optimal choice irrespective of choices made by others. This is a major
advantage of our proposal.
The network ultimately chooses for each terminal an
individual price that forces it to operate where “revenue per Watt” is highest. Of course, the sum of the
“slices” ordered by the terminals may exceed resource
availability. Then, the network follows a “knapsack”
approach [13] to find, among all sets of terminals that
satisfy the constraint, the revenue maximiser. Thus,
our proposal simplifies the terminal’s choice at the
657
expense of (reasonably) complicating the network’s (a
favourable trade-off, given the energy and/or computational limitations of a terminal).
As a base-line for performance evaluation, a “game”
in which each terminal chooses its power to maximise
its own performance without a direct cost is solved
“from first principles”. A “player” with unlimited energy will evidently always set its power to the maximal level, raising the “noise floor” of all. However,
energy-conservation can be induced through a limit
on total energy spent over an appropriate period of
time (“statutory battery”). The existence of a Nash
equilibrium is proved “constructively”, by showing it
in closed form. The pricing scheme always outperforms
the game, and the performance gap grows with the
number of terminals in the system, and also tends to
increase with “social inequality”. Moreover, a limited
study of “social benefit” maximisation indicates that
our proposal can achieve the social optimum, with a
price common to all terminals, and with each energyconstrained terminal paying in proportion to the square
of its power fraction. Thus, our analysis can equally
lead to a “true” economic pricing scheme for network
profit, or may be employed as a benefit-maximising
algorithmic metaphor along the lines of [3].
We have captured the critical packet-success-rate
function (PSRF) through an S-curve of unspecified
algebraic form, and approach from [16, 17], which have
been found useful in numerous scientific contributions,
such as [14, 15]. This makes our analysis relevant to a
wide variety of physical layer configurations, and in fact
allows us to optimally (re)configure the link layer, as
discussed in greater detail in [20].
For each of the three environments considered (network pricing, game, and “social” pricing) complete
numerical examples have been given in tabular and/or
graphical form. However, this work has an analytical
core of three “general” maximisation problems: (1)
B(x), (2) S(x) − cx and (3) B(x) − cx (S(x) is an Scurve and B(x) = S(x)/x, a single-peaked curve). The
1st is key when an e-terminal faces linear or zero price
(Fig. 7), and the 2nd is fundamental for the t-terminal’s
analysis (Fig. 9). The third arises when an e-terminal
faces quadratic pricing, a requirement of the “social
optimum” (Fig. 8). We have characterised the solutions
through the geometrical properties of the graphs, under
the presumption that “all we know” is that S is an Scurve, and that it satisfies some additional technical
conditions—discussed in the Appendix—which guarantee that the shapes of certain graphs are as assumed
(S(x)/x has been proved to be “single-peaked” in
[16, 17]).
658
The present work has no doubt limitations. As in
[22] and many related works, we have only considered
one cell (inter-cell interference can be added to noise).
Furthermore, as commonly done in the power control
literature, channel gains have been assumed fixed. This
does not mean that our analysis only applies when
users are immobile and channel are stable, but rather
that there is a separation of timescale between power
updates and changes in propagation conditions [8, Section 2.6.2]. In a practical system, channel state information is updated periodically. After each update, our
analysis may lead to a revised resource allocation. We
believe the single-terminal pricing analysis to be rigorous. However, the extension to a multi-terminal scenario through the knapsack approach should be viewed
as an analytically-supported heuristic. Likewise, our
solution to the interesting and challenging social planner problem is partial. And we have neglected internetwork price competition. These limitations suggest
avenues for future work. Along these lines, in [21] we
have applied a similar approach to fourth-generation
cellular networks, by proposing an auction procedure
to allocate frequency sub-channels combined with pricing for power allocation. We remain optimistic that,
despite these limitations, (i) the advantages offered
by our proposal, (ii) the generality of our model, and
(iii) the innovative methodology we have utilised combine to produce a useful addition to existing scientific
literature.
Acknowledgements Most of the basic research reported herein
was performed at the Universität Karlsruhe (now Karlsruher Institut für Technologie) with the financial support of the European
Commission through the PULSERS II project. Important additional work was done at RWTH Aachen with the support of the
Deutsche Forschungsgemeinschaft (DFG), through the UMIC
project. The preparation of the final revised manuscript was
supported by the Communication Networks (ComNets) Chair at
RWTH Aachen.
Appendix: Mathematical issues
In the analysis we assume that certain functions involving an S-curve or the derivative of an S-curve retain the
S-shape, or the “single-peakedness” of the derivative
(see Fig. 1).
Definition 9.1 S : ℜ+ → [0, Y], is an S-curve with
unique inflexion at x f if (i) S(0) = 0, S is (ii) continuously differentiable, (iii) strictly increasing, (iv) convex over [0, x f ) and concave over (x f , ∞), and (v)
surjective.
Mobile Netw Appl (2011) 16:640–660
Remark A.1 In Definition A.1, S is strictly increasing
and also surjective (for each y ∈ [0, Y] there is an x ∈
ℜ+ such that f (x) = y). Therefore, S must approach
Y asymptotically as x goes to infinity (i. e. , this follows
from the definition).
Definition 9.2 A function h : ℜ+ → [0, Y] is singlepeaked over ℜ+ if h is continuous, surjective and has a
global maximum at X ∈ (0, ∞) (that is, h(X) = Y, 0 ≤
x1 < x2 ≤ X =⇒ h(x2 ) > h(x1 ) and X ≤ x1 < x2 =⇒
h(x2 ) < h(x1 )).
Remark A.2 In Definition A.2, h is strictly increasing
up to x = X and strictly decreasing thereafter. Since h
is also surjective, it must approach 0 asymptotically as x
goes to infinity.
Remark A.3 Definition A.2 is closely related to strict
quasi-concavity. However, a strictly monotonic function satisfies strict quasi-concavity, but does not satisfy
Definition A.2. For example, a function whose graph
exhibits over the interval of interest the familiar “bell
shape” of the Gaussian curve (as shown in Figs. 1
and 10, for example) is both strictly quasi-concave and
single-peaked. On the other hand, the S-curve itself is
strictly quasi-concave (since it is strictly increasing) but
does not satisfy Definition A.2 (its “peak” occurs at
infinity).
The specific assumptions are:
Assumption 1 If S satisf ies Def inition A.1, then the
composite function s(z) := S(g(z)) with g(z) = Ŵz/(1 −
z), Ŵ ≥ 1 and z ∈ [0, 1) also satisf ies Def inition A.1.
Assumption 2 If S satisf ies Def inition A.1, then each
of the following functions satisf ies Def inition A.2:
(i)xS′ (x), and for Ŵ ≥ 1(ii) (x/ Ŵ + 1)2 S′ (x), (iii)
x(x/ Ŵ + 1)S′ (x) and (iv) xB ′ (x) where B(x) := S(x)/x
with B(0) := limx↓0 B(x) ≡ S′ (0).
Remark A.4 By Lemma 4.2, if S satisfies Definition
A.1 then B(x) satisfies Definition A.2 (i. e. , this is a
proved statement, not an assumption).
Below we formally describe some more primitive
technical properties for the concerned S-curve that lead
to the assumptions above. These properties have the
“single crossing” form; i.e., the value of certain function
crosses the origin exactly once, a notion that has proved
quite useful in certain contexts, such as economics and
Mobile Netw Appl (2011) 16:640–660
game theory [2]. In the present work, a strong version
of this notion is formalised as follows:
Definition 9.3 A function f : D → ℜ with D ⊂ ℜ satisfies the unique-crossing from above condition (UCC)
over D′ ⊂ D if ∃t0 ∈ D′ such that f (t0 ) = 0 and ∀t ∈
D′ t < t0 =⇒ f (t) > 0 and t > t0 =⇒ f (t) < 0.
Lemma A.1 Consider the composite function S(g(z)),
where S : ℜ+ → [0, d], is an S-curve with inf lexion at
x f , and g : [a, b ] → ℜ+ , with 0 ≤ a < b , is a strictly
increasing convex function such that limz→b g(z) = ∞.
(i) If the function [g′ (z)]2 S′′ (g(z)) + g′′ (z)S′ (g(z)) satisf ies the UCC over [a, b ], then: (ia) the composite function s(z) := S(g(z)) satisf ies Def inition A.1, and (ib) its
inf lexion abscissa z f is such that g(z f ) > x f .
(ii) With g(z) = Ŵz/(1 − z), Ŵ ≥ 1 and I = [0, 1),
conclusions (ia) and (ib) follow if the function (x +
Ŵ)S′′ (x) + 2S′ (x) satisf ies the UCC over the domain ℜ+ .
Proof
(ia) We only show below that the composite function
has, under the hypothesis, the curvature properties required by Definition A.1; that it also has
the other properties can also be shown.
The second derivative of
S(g(z)) is
[g′ (z)]2 S′′ (g(z)) + g′′ (z)S′ (g(z)).
g′′ (z)S′ (g(z)) is always positive because by hypothesis g′′ is positive (convexity).
[g′ (z)]2 S′′ (g(z)) has the sign of S′′ ; i.e. it is positive in [0, x f ) and negative in (x f , ∞).
Thus, the composite function starts out convex
(its second derivative starts out positive).
If [g′ (z)]2 S′′ (g(z)) + g′′ (z)S′ (g(z)) satisfies the
UCC, then the composite function has exactly
one inflexion point zcf .
The fact that s asymptotically goes to d as z goes
to b is immediate.
(ib) zcf must satisfy g(zcf ) > x f so that S′′ (g(z f )) be
negative.
(ii) If g(z) = Ŵz/(1 − z) then g′ (z) = Ŵ/(1 − z)2 and
g′′ (z) = 2Ŵ/(1 − z)3 . Considering these expressions, the second derivative of the composite
function becomes:
2Ŵ
Ŵ2
S′′ (g(z)) +
S′ (g(z))
(1 − z)4
(1 − z)3
which has the same sign as ŴS′′ (g(z)) + 2(1 −
z)S′ (g(z)).
With x := Ŵz/(1 − z), z = x/(x + Ŵ) and 1 − z =
Ŵ/(x + Ŵ).
659
Therefore, the second derivative has the sign of
(x + Ŵ)S′′ (x) + 2S′ (x). The thesis follows from
part (i) of this proof.
⊔
⊓
The next result involves the bell shape exhibited by
the graph of S′ .
Lemma A.2 Consider the function h(t) = g(t)S′ (t)
where S : ℜ+ → [0, d] is an S-curve with inf lexion at t f ,
and g : ℜ+ → ℜ+ is a strictly increasing continuously
dif ferentiable function. Furthermore, limt→∞ h(t) = 0.
If g′ (t)S′ (t) + g(t)S′′ (t) satisf ies the UCC at t0 ∈ (0, ∞)
then h satisf ies Def inition A.2, and has its maximal
value at t0 > t f .
Proof The derivative h′ (t) = g′ (t)S′ (t) + g(t)S′′ (t). The
first term is always positive, and the second term has
the sign of S′′ which is positive for t < t f . Therefore, h
starts out increasing.
If h′ satisfies the UCC at t0 then h reaches a global
maximum at t0 .
t0 > t f because h′ (t0 ) = 0 implies that g(t0 )S′′ (t0 ) < 0.
⊔
⊓
Remark A.5 If in Lemma A.2 g(t) = t, then the function that must satisfy the UCC reduces to S′ (t) + tS′′ (t),
or, equivalently, 1 + tS′′ (t)/S′ (t); that is, tS′′ (t)/S′ (t)
must uniquely cross from above the horizontal line
at ordinate negative 1. Division by S′ (t) is possible
because S′ (t) > 0 ∀t ∈ (0, ∞).
References
1. Alpcan T, Basar T, Srikant R, Altman E (2002) CDMA uplink power control as a noncooperative game. Wirel Netw
8(6):659–670. doi:10.1023/A:1020375225649
2. Athey S (2001) Single crossing properties and the existence of
pure strategy equilibria in games of incomplete information.
Econometrica 69(4):861–889. doi:10.1111/1468-0262.00223
3. Clearwater SH (ed) (1996) Market-based control: a paradigm for distributed resource allocation. World Scientific,
Singapore
4. Dantzig GB (1957) Discrete-variable extremum problems.
Oper Res 5(2):266–288. doi:10.1287/opre.5.2.266
5. Dubey P (1986) Inefficiency of Nash equilibria. Math Oper
Res 11(1):1–8. doi:10.1287/moor.11.1.1
6. Feng N, Mau SC, Mandayam N (2004) Pricing and power
control for joint network-centric and user-centric radio resource management. IEEE Trans Commun 52(9):1547–1557.
doi:10.1109/TCOMM.2004.833191
7. Goodman DJ, Mandayam N (2000) Power control for
wireless data. IEEE Pers Commun 7(2):48–54. doi:10.1109/
98.839331
660
8. Hanly SV, Tse DN (1999) Power control and capacity of
spread spectrum wireless networks. Automatica 35(12):1987–
2012. doi:10.1016/S0005-1098(99)00133-8
9. Karush W (1939) Minima of functions of several variables
with inequalities as side constraints. Master’s thesis, University of Chicago
10. Koskie S, Gajic Z (2005) A Nash game algorithm for
SIR-based power control in 3G wireless CDMA networks.
IEEE/ACM Trans Netw 13(5):1017–1026. doi:10.1109/
TNET.2005.857068
11. Kuhn HW, Tucker HW (1951) Nonlinear programming. In:
Proc. second berkeley symp. on math. statist. and prob.,
pp 481–492
12. MacKenzie A, Wicker S (2001) Game theory and the design
of self-configuring, adaptive wireless networks. IEEE Commun Mag 39(11):126 –131. doi:10.1109/35.965370
13. Martello S, Toth P (1990) Knapsack problems: algorithms and computer implementations. John Wiley & Sons,
New York, NY, USA
14. Meshkati F, Goldsmith AJ, Poor HV, Schwartz SC (2007)
A game-theoretic approach to energy-efficient modulation
in CDMA networks with delay QoS constraints. IEEE J
Sel Areas Commun 25(6):1069–1078. doi:10.1109/JSAC.2007.
070802
15. Meshkati F, Poor H, Schwartz S, Mandayam N (2005) An
energy-efficient approach to power control and receiver
design in wireless data networks. IEEE Trans Commun
53(11):1885–1894. doi:10.1109/TCOMM.2005.858695
16. Rodriguez V (2003) An analytical foundation for resource
management in wireless communication. In: Global telecommunications conf., vol 2. IEEE, pp 898–902. doi:10.1109/
GLOCOM.2003.1258369
17. Rodriguez V (2004) A robust and tractable analytical foundation for radio resource management: centralized and
Mobile Netw Appl (2011) 16:640–660
18.
19.
20.
21.
22.
23.
24.
25.
decentralized optimizations involving data and media
communication. Ph.D. thesis, Polytechnic University, Brooklyn,
New York
Rodriguez V, Jondral F, Mathar R (2009) Power allocation for social benefit on a CDMA reverse link shared by
energy-constrained and energy-sufficient data terminals. In:
6th IEEE international symp. on wireless communication
systems, pp. 56–60. doi:10.1109/ISWCS.2009.5285243
Rodriguez V, Jondral F, Mathar R (2009) Power allocation
through revenue-maximising pricing on a CDMA reverse link
shared by energy-constrained and energy-sufficient heterogeneous data terminals. In: IEEE 69th vehicular technology
conf., pp 1–6. doi:10.1109/VETECS.2009.5073811
Rodriguez V, Mathar R (2010) Generalised link-layer adaptation with higher-layer criteria for energy-constrained and
energy-sufficient data terminals. In: 7th IEEE international
symp. on wireless communication systems, pp 927–931.
doi:10.1109/ISWCS.2010.5624336
Rodriguez V, Mathar R (2010) Simple decentralised marketoriented allocation of sub-channels and power for accesspoint to terminal multi-carrier communication. In: Conference on information sciences and systems (CISS). Princeton, NJ.
doi:10.1109/CISS.2010.5464778
Saraydar CU, Mandayam NB, Goodman DJ (2002) Efficient
power control via pricing in wireless data networks. IEEE
Trans Commun 50(2):291–303. doi:10.1109/26.983324
Sung CW, Wong WS (2003) A noncooperative power control
game for multirate CDMA data networks. IEEE Trans Wirel
Commun 2(1):186–194. doi:10.1109/TWC.2002.806394
Varian HR (1992) Microeconomic analysis, 3rd edn. W.W.
Norton & Co., New York
Xiao M, Shroff NB, Chong EK (2003) A utility-based powercontrol scheme in wireless cellular systems. IEEE/ACM
Trans Netw 11(2):210–221. doi:10.1109/TNET.2003.810314