Sei sulla pagina 1di 10

Robust methods for LTE and WiMAX dimensioning

Laurent Decreusefond, Eduardo Ferraz, Philippe Martins, Thanh-Tung Vu

To cite this version:


Laurent Decreusefond, Eduardo Ferraz, Philippe Martins, Thanh-Tung Vu. Robust methods
for LTE and WiMAX dimensioning. Valuetools 2012, Oct 2012, Cargese, France. pp.7482,
2012. <hal-00685272>

HAL Id: hal-00685272


https://hal.archives-ouvertes.fr/hal-00685272
Submitted on 4 Apr 2012

HAL is a multi-disciplinary open access Larchive ouverte pluridisciplinaire HAL, est


archive for the deposit and dissemination of sci- destinee au depot et `a la diffusion de documents
entific research documents, whether they are pub- scientifiques de niveau recherche, publies ou non,
lished or not. The documents may come from emanant des etablissements denseignement et de
teaching and research institutions in France or recherche francais ou etrangers, des laboratoires
abroad, or from public or private research centers. publics ou prives.
Robust methods for LTE and WiMAX dimensioning

L. Decreusefond E. Ferraz
Institut Telecom Institut Telecom
Telecom ParisTech Telecom ParisTech
Paris, France Paris, France
P. Martins T.T. Vu
Institut Telecom Institut Telecom
Telecom ParisTech Telecom ParisTech
Paris, France Paris, France

ABSTRACT OFDM (Orthogonal Frequency Division Multiplex) is a multi


This paper proposes an analytic model for dimensioning carrier technique especially designed for high data rate ser-
OFDMA based networks like WiMAX and LTE systems. vices. It divides the spectrum in a large number of frequency
In such a system, users require a number of subchannels bands called (orthogonal) subcarriers that overlap partially
which depends on their SNR, hence of their position and in order to reduce spectrum occupation. Each subcarrier has
the shadowing they experience. The system is overloaded a small bandwidth compared to the coherence bandwidth of
when the number of required subchannels is greater than the the channel in order to mitigate frequency selective fading.
number of available subchannels. We give an exact though User data is then transmitted in parallel on each sub car-
not closed expression of the loss probability and then give rier. In OFDM systems, all available subcarriers are aected
an algorithmic method to derive the number of subchan- to one user at a given time for transmission. OFDMA ex-
nels which guarantees a loss probability less than a given tends OFDM by making it possible to share dynamically
threshold. We show that Gaussian approximation lead to the available subcarriers between dierent users. In that
optimistic values and are thus unusable. We then introduce sense, it can then be seen as multiple access technique that
Edgeworth expansions with error bounds and show that by both combines FDMA and TDMA features. OFDMA can
choosing the right order of the expansion, one can have an also be possibly combined with multiple antenna (MIMO)
approximate dimensioning value easy to compute but with technology to improve either quality or capacity of systems.
guaranteed performance. As the values obtained are highly
dependent from the parameters of the system, which turned
to be rather undetermined, we provide a procedure based
on concentration inequality for Poisson functionals, which
yields to conservative dimensioning. This paper relies on re-
cent results on concentration inequalities and establish new
results on Edgeworth expansions.

Keywords
Concentration inequality, Edgeworth expansion, LTE, OFDMA

1. INTRODUCTION
Future wireless systems will widely rely on OFDMA (Or-
thogonal Frequency Division Multiple Access) multiple ac-
cess technique. OFDMA can satisfy end users demands in Figure 1: OFDMA principle : subcarriers are allo-
terms of throughput. It also fullls operators requirements cated according to the required transmission rate
in terms of capacity for high data rate services. Systems
such as 802.16e and 3G-LTE (Third Generation Long Term
In practical systems, such as WiMAX or 3G-LTE, subcarri-
Evolution) already use OFDMA on the downlink. Dimen-
ers are not allocated individually for implementation reasons
sioning of OFDMA systems is then of the utmost importance
mainly inherent to the scheduler design and physical layer
for wireless telecommunications industry.
signaling. Several subcarriers are then grouped in subchan-
nels according to dierent strategies specic to each system.
In OFDMA systems, the unit of resource allocation is mainly
the subchannels. The number of subchannels required by a
user depends on his channels quality and the required bit
rate. If the number of demanded subchannels by all users
in the cell is greater than the available number of subchan-
nel, the system is overloaded and suer packet losses. The
questions addressed here can then be stated as follows: how
many subchannels must be assigned to a BS to ensure a
small overloading probability ? Given the number of avail- ensure a given loss probability. In Section 4, we apply these
able subchannels, what is the maximum load, in terms of formulas to the particular situation of OFDMA systems. A
mean number of customers per unit of surface, that can be new bound for the Edgeworth expansion is in Section B and
tolerated ? Both questions rely on accurate estimations of Section C contains a new proof of the concentration inequal-
the loss probability. ity established for instance in [16].

The objectives of this paper are twofold: First, construct


and analyze a general performance model for an isolated 2. SYSTEM MODEL
cell equipped with an OFDMA system as described above. In practical systems, such as WiMAX or 3G-LTE, resource
We allows several classes of customers distinguished by their allocation algorithms work at subchannel level. The subcar-
transmission rate and we take into account path-loss with riers are grouped into subchannels that the system allocates
shadowing. We then show that for a Poissonian congura- to dierent users according to their throughput demand and
tion of users in the cell, the required number subchannels mobility pattern. For example, in WiMAX, there are three
follows a compound Poisson distribution. The second ob- modes available for building subchannels: FUSC (Fully Par-
jective is to compare dierent numerical methods to solve tial Usage of Subchannels), PUSC (Partial Usage of Sub-
the dimensioning problem. In fact, there exists an algorith- Channels) and AMC (Adaptive modulation and coding). In
mic approach which gives the exact result potentially with FUSC, subchannels are made of subcarriers spread over all
huge memory consumption. On the other hand, we use and the frequency band. This mode is generally more adapted
even extend some recent results on functional inequalities to mobile users. In AMC, the subcarriers of a subchannel
for Poisson processes to derive some approximations formu- are adjacent instead of being uniformly distributed over the
las which turn to be rather eective at a very low cost. spectrum. AMC is more adapted to nomadic or stationary
When it comes to evaluate the performance of a network, users and generally provides higher capacity.
the quality of such a work may be judged according to sev-
eral criteria. First and foremost, the exactness is the most The grouping of subcarriers into subchannels raises the prob-
used criterion: it means that given the exact values of the lem of the estimation of the quality of a subchannel. The-
parameters, the real system, the performances of which may oretically channel quality should be evaluated on each sub-
be estimated by simulation, behaves as close as possible to carrier of the corresponding subchannel to compute the as-
the computed behavior. The sources of errors are of three sociated capacity. This work assumes that it is possible to
kinds: The mathematical model may be too rough to take consider a single channel gain for all the subcarriers making
into account important phenomena which alter the perfor- part of a subchannel (for example via channel gains evalu-
mances of the system, this is known as the epistemic risk. ated on pilot subcarriers).
Another source may be in the mathematical resolution of
the model where we may be forced to use approximate al- We consider a circular cell C of radius R with a base sta-
gorithms to nd some numerical values. The third source tion (BS for short) at its center. The transmission power
lies in the lack of precision in the determination of the pa- dedicated to each subchannel by the base station is denoted
rameters characterizing the system: They may be hard, if by P . Each subchannel has a total bandwidth W (in kHz).
not impossible, to measure with the desired accuracy. It is The received signal power for a mobile station at distance d
thus our point of view that exactness of performance analy- from the BS can be expressed as
sis is not all the matter of the problem, we must also be able P K
to provide condence intervals and robust analysis. That is P (d) = GF := P Gd , (1)
d
why, we insist on error bounds in our approximations.
where K is a constant equal to the attenuation at a refer-
Resources allocation on OFDMA systems have been exten- ence distance, denoted by dref , that separates far eld from
sively studied over the last decade, often with joint power near eld propagation. Namely,
and subcarriers allocation, see for instance [1, 8, 14, 15].  2
The problem of OFDMA planning and dimensioning have c
K = dref ,
been more recently under investigation. In [7], the authors 4f dref
propose a dimensioning of OFDMA systems focusing on
where f is the radio-wave frequency. The variable is the
link outage but not on the other parameters of the sys-
path-loss exponent which indicates the power at which the
tems. In [11], the authors give a general methodology for
path loss increases with distance. Its depends on the spe-
the dimensioning of OFDMA systems, which mixes a simu-
cic propagation environment, in urban area, it is in the
lation based determination of the distribution of the signal-
range from 3 to 5. It must be noted that this propagation
to-interference-plus-noise ratio (SINR) and a Markov chain
model is an approximate model, dicult to calibrate for real
analysis of the trac. In [3, 9], the authors propose a di-
life situations. In particular, it might be reasonable to en-
mensioning method for OFDMA systems using Erlangs loss
vision models where depends on the distance so that the
model and Kaufman-Roberts recursion algorithm. In [4],
attenuation would be proportional to d(d) . Because of the
the authors study the eect of Rayleigh fading on the per-
complexity of such a model, is often considered as constant
formance of OFDMA networks.
but the path-loss is multiplied by two random variables G
and F which represent respectively the shadowing, i.e. the
The article is organized as follows. In Section 2, we describe
attenuation due to obstacles, and the Rayleigh fading, i.e.
the system model and set up the problem. In Section 3,
the attenuation due to local movements of the mobile. Usu-
we examine four methods to derive an exact, approximate
ally, G is taken as a log-normal distribution: G = 10S/10 ,
or robust value of the number of subchannels necessary to
where S N (, v 2 ). As to F , it is customary to choose an
exponential distribution with parameter 1. Both, the shad- set
owing and the fading experienced by each user are supposed
to be independent from other users shadowing and fading. f (x, k, g) = min (Nmax ,
For the sake of simplicity, we will here treat the situation
 
Ck
where only shadowing is taken into account, the computa- 1{P gkxk Imin } .
W log 2 (1 + P gkxk /I)
tions would be pretty much like the forthcoming ones and
the results rather similar should we consider Rayleigh fad- With the notations of Section B,
ing. Z
Ntot = f (x, k, g) d(x, k, g).
cell
All active users in the cell compete to have access to some of
the Navail available subchannels. There are K classes of users We are interested in the loss probability which is given by
distinguished by the transmission rate they require: Ck is P(Ntot Navail ).
the rate of class k customers and k denotes the probability
that a customer belongs to class k. A user, at distance d We rst need to compute the dierent moment of f with
from the BS, is able to receive the signal only if the signal- respect to in order to apply Theorem 2 and Theorem 3.
to-interference-plus-noise ratio SNR = P (d) I
is above some For, we set
constant min where I is the noise plus interference power 
Ck

and P (d) is the received signal power at distance d, see (1). If lk = Nmax ,
W log2 (1 + min )
the SNR is below the critical threshold, then the user is said
to be in outage and cannot proceed with his communication. where a b = min(a, b). Furthermore, we introduce k, 0 =
,
To avoid excess demands, the operator may impose a max- I  Ck /W l 
imum number Nmax of allocated subchannels to each user k, l = 2 1 , 1 k K, 1 l lk 1,
P
at each time slot. According to the Shannon formula, for a
user demanding a service of bit rate Ck , located at distance and k, lk = Imin /P.
d from the BS and experiencing a shadowing g, the number
of requires subchannels is thus the minimum of Nmax and of By the very denition of the ceiling function, we have
  Z
Ck
if P gd /I min , f p d
Nuser = W log2 (1 + P gd /I) E
0 otherwise,

K lk Z Z
X X
= k lp 1[k, l ; k, l1 ) (gkxk ) d(g) dx.
where x means the minimum integer number not smaller cell R
k=1 l=1
than x.
According to the change of variable formula, we have
We make the simplifying assumption that the allocation is Z
made at every time slot and that there is no buering neither 1[k, l ; k, l1 ) (gkxk ) dx
in the access point nor in each mobile station. All the users cell
2/ 2/
have independently from others a probability p to have a = (k, l R2 k, l1 R2 )g 2/ .
packet to transmit at each slot. This means, that each user
has a trac pattern which follows a geometric process of Thus, we have
intensity p. We also assume that users are dispatched in the Z Z
cell according to a Poisson process of intensity 0 . According 1[k, l ; k, l1 ) (gkxk ) d(g) dx
to the thinning theorem for Poisson processes, this induces cell R
h i
2/ 2/
that active users form a Poisson process of intensity = = (k, l R2 k, l1 R2 )E 10S/5
0 p. This intensity is kept xed over the time. That may
2/ 2/ v2 ln 10)/5
result from two hypothesis: Either we consider that for a = (k, l R2 k, l1 R2 ) 10(+ 10 := k, l .
small time scale, users do not move signicantly and thus
the conguration does not evolve. Alternatively, we may We thus have proved the following theorem.
consider that statistically, the whole conguration of active
users has reached its equilibrium so that the distribution of Theorem 1. For any p 0, with the same notations as
active users does not vary through time though each user above, we have:
may move.
Z K lk
X X
From the previous considerations, a user is characterized by f p d = k lp k, l . (2)
three independent parameters: his position, his class and k=1 l=1

the intensity of the shadowing he is experiencing. We model


this as a Poisson process on E = B(0, R){1, , K}R+ 3. LOSS PROBABILITY
of intensity measure 3.1 Exact method
Since f is deterministic, Ntot follows a compound Poisson
d(x) := ( dx d (k) d(g))
distribution: it is distributed as
where B(0, R) = {x R2 , kxk R}, is the probability lk
K X
distribution of classes given by ({k}) = k and is the
X
l Nk, l
distribution of the random variable G dened above. We k=1 l=1
where (Nk, l , 1 k K, 1 l lk ) are independent Pois- Hence,
son random variables, the parameter of Nk, l is k k, l . Us- r
ing the properties of Poisson random variables, we can re- 1 2 m(3, 1)
duce the complexity of this expression. Let L = max(lk , 1 1 Q(N + 1)
2
k K) and for l {1, , L}, let Kl = {k, lk l}. Then, Z
Ntot is distributed as P( f d Navail )
E
L r
1 2 m(3, 1)
X
l Ml 1 Q(N 1) + , (3)
l=1 2
where (Ml , 1 l lk ) are independent Poisson
P random where Q is the cumulative distribution function of a stan-
variables, the parameter of Ml being ml := kKl k k, l . dard Gaussian random variable.
For each l, it is easy to construct an array which represents
the distribution of lMl by the following rule: According to Theorem 3, one can proceed with a more accu-
( rate approximation. Via polynomial interpolation, it is easy
0 if w mod l 6= 0, to construct a C 3 function N
l
such that
pl (w) =
exp(ml )mql /q! if w = ql. l (3) l
k(N ) k 1 and 1[N +3.5, +) N
1[N , +)
By discrete convolution, the distribution of Ntot and then its r
and a function N such that
cumulative distribution function, are easily calculable. The
r (3) r
value of Navail which ensures a loss probability below the k(N ) k 1 and 1[N , +) N
1[N 3.5, +)
desired threshold is found by inspection. The only diculty
with this approach is to determine where to truncate the From (10), it follows that
Poisson distribution functions for machine representation.
According to large deviation theory [6], m(3, 1) (3)
1 Q(N + 3.5) Q (N + 3.5) E
6
P(Poisson() a) exp((a ln a + 1 a)).
Z
P( f d Navail )
E
When is known, it is straightforward to choose a() so
that the right-hand-side of the previous equation is smaller m(3, 1) (3)
1 Q(N 3.5) + Q (N 3.5) + E (4)
than the desired threshold. The total memory size is thus 6
proportional to max(ml a(ml )l, 1 l lk ). This may be
memory (and time) consuming if the parameters of some where E is the right-hand-side of (13) with kF (3) k = 1.
Poisson random variables or the threshold are small. This
method is well suited to estimate loss probability since it Going again one step further, following the same lines, ac-
gives exact results within a reasonable amount of time but cording to (15), one can show that
it is less useful for dimensioning purpose. Given Navail , if we Z
seek for the value of which guarantees a loss probability P( f d Navail ) 1 Q(N 6.5)
less than the desired threshold, there is no better way than E

trial and error. At least, the subsequent methods even im- m(3, 1) (3) m(3, 1)2 (5)
+ Q (N 6.5) + Q (N 6.5)
precise may help to evaluate the order of magnitude of for 6 72
the rst trial. m(4, 1) (3)
+ Q (N 6.5) + F (5)
24
3.2 Approximations where F is bounded above in (16).
We begin by the classical Gaussian approximation. It is
clear that For all the approximations given above, for a xed value of
Z Z Navail , an approximate valueof can be obtained by solving
numerically an equation in .
P( f d Navail ) = P( f ( d d) N )
E E
 Z 
= E 1[N , +) ( f ( d d)) 3.3 Robust upper-bound
E If we seek for robustness and not precision, it may be inter-
R esting to consider the so-called concentration inequality. We
where N = (Navail f d)/. Since the indicator func- remark that in the present context, f is non-negative and
tion 1[N , +) is not Lipschitz, we can not apply the bound bounded by L = maxk lk so that we are in position to apply
given by Theorem 2. However, we can upper-bound the in- Theorem 4. We obtain that
dicator by a continuous function whose Lipschitz norm is Z Z
not greater than 1. For instance, taking
P( f d f d + a)
E E
(x) = min(x+ , 1) and N (x) = (x N ), R 2 !
f d aL
exp E 2 g( R 2 ) , (6)
we have L E
f d

1[N +1, +) N +1 1[N , +) N 1 1[N 1, +) . where g is dened in Section C.


4. APPLICATIONS TO OFDMA AND LTE longer. We remark here that the critical value of is almost
In such systems, there is a huge number of physical param- the same for all congurations of classes. Indeed, the criti-
eters with a wide range of variations, it is thus rather hard cal value c of can be found by a simple reasoning: When
to explore the while variety of sensible scenarios. For illus- < c , a class k customer uses less than the allowed lk sub-
tration purposes, we chose a circular cell of radius R = 300 channels because the radio conditions are good enough for
1/
meters equipped with an isotropic antenna such that the k, j R for some j < lk so that the load increases with .
transmitted power is 1 W and the reference distance is 10 1/
For > c , all the k, l are lower than R and the larger ,
meters. The mean number of active customers per unit of the wider the gap. Hence the number of customers in outage
surface, denoted by , was chosen to vary between 0, 001 increases as increases and the load decreases. Thus,
and 0.000 1, this corresponds to an average number of ac-
tive customers varying from 3 to 30, a realistic value for 1/
c inf{, s, ls 1 R} for s = arg maxk lk .
the systems under consideration. The minimum SINR is
0.3 dB and the random variable S dened above is a cen- If we proceed this way for the data of Figure 2, we retrieve
tered Gaussian with variance equal to 10. There are two c = 3.95. This means that for a conservative dimensioning,
classes of customers, C1 = 1, 000 kb/s and C2 = 400 kb/s. in the absence of estimate of , computations may be done
It must be noted that our set of parameters is not universal with this value of .
but for the dierent scenarios we tested, the numerical facts
we want to point out were always apparent. Since the time For a threshold given by = 104 , we want to nd Navail
scale is of the order of a packet transmission time, the traf- such that P(Ntot Navail ) . As said earlier, the exact
c is dened as the mean number of required subchannels method gives the result at the price of a sometimes lengthy
at each slot provided that the time unit is the slot
R duration, process. In view of 3, one could also search for such that
that is to say that the load is dened as = cell f d.
r
1 2
1 Q() + m(3, ) = (7)
2
R
and then consider 1 + E f d + as an approximate
value of Navail . Unfortunately and as was expected since the
Gaussian approximation is likely to be valid for large values
of , the corrective term in (7) is far too large (between 30
and 500 depending on ) for (7) to have a meaning. Hence,
we must proceed as usual and nd such that 1 Q() = ,
i.e. R 3.71. The approximate value of Navail is thus given
by E f d + 3.71. The consequence is that we do not
have any longer any guarantee on the quality of this ap-
proximation, how close it is to the true value and even more
basic, whether it is greater or lower than the correct value.
In fact, it is absolutely impossible to choose a dimension-
ing value lower than the true value since there is no longer
a guarantee that the loss probability is lower than . As
shows Figure 3, it turns out that the values returned by the
Gaussian method are always under the true value. Thus this
Figure 2: Impact of and on the loss probability annihilates any possibility to use the Gaussian approxima-
(Navail = 92, = 0.0001) tion for dimensioning purposes.

Figure 2 shows, the loss probability may vary up to two Going one step further, according to (4), one may nd
orders of magnitude when the rate and the such that
P probability of
each class change even if the mean rate k k Ck remains m(3, ) (3)
constant. Thus mean rate is not a sucient parameter to 1 Q() Q () + E =
6
predict the performances of such a system. The load is
neither a pertinent indicator as the computations show that and then use
the loads of the various scenarios diers from less than 3%. Z
3.5 + f d +
Comparatively, Figure 2 shows that variations of have E

tremendous eects on the loss probability: a change of a as an approximate guaranteed value of Navail . By guaran-
few percents of the value of induces a variation of several teed, we mean that according to (4), it holds for sure that
order of magnitude for the loss probability. It is not sur- the loss probability with this value of Navail is smaller than
prising that the loss probability increases as a function of : even if there is an approximation process during its compu-
as increases, the radio propagation conditions worsen and tation. Since the error in the Edgeworth
approximation is of
for a given transmission rate, the number of necessary sub- the order of 1/, instead of 1/ for the Gaussian approxi-
channels increases, generating overloading. Beyond a certain mation, one may hope that this method will be ecient for
value of (apparently around 3.95 on Figure 2), the radio smaller values of . It turns out that for the data sets we
conditions are so harsh that a major part of the customers examined, E is of the order of 107 /, thus this method
are in outage since they do not satisfy the SNR criterion any can be used as long as 107 / . Otherwise, as for the
Gaussian case, we are reduced to nd such that = 4.2, the value of Navail given by (8) is 40 whereas the
exact value is 32 hence an oversizing of 25%. However, for
m(3, ) (3)
1 Q() Q () = = 4.12, which is 2% away from 4.2, the required number of
6 subchannels is also 40. The oversizing is thus not as bad as
R
and consider 3.5 + E f d + but we no longer have it may seem since it may be viewed as a protection against
any guarantee on the validity of the value. As Figure 3 trac increase, epistemic risk (model error) and estimate
shows, for the considered data set, Edgeworth methods leads error.
to an optimistic value which is once again absolutely not
acceptable. One can pursue the development as in (15) and
use (5), thus we have to solve

m(3, ) (3)
1 Q() Q ()
6
2
m(3, 1) (5) m(4, 1) (3)
Q () + Q () F = .
72 24
For the analog of 4 to hold, we have to nd a Cb5 func-
tion greater than 1[x, ) but smaller than 1[xlag, ) with
a fth derivative smaller than 1. Looking for in the set
of polynomial functions, we can nd such a function only if
lag is greater than 6.5 (for smaller value of the lag, the fth
derivative is not bounded by 1) thus the dimensioning value
has to be chosen as:
Z
6.5 + f d + .
E

For the values we have, it turns out that F is of the order


of 109 3/2 which is negligible compared to = 104 , so Figure 3: Estimates of Navail as a function of by
that we can eectively use this method for 104 . As it the different methods
is shown in Figure 3, the values obtained with this develop-
ment are very close to the true values but always greater as
it is necessary for the guarantee. The procedure should thus
5. REFERENCES
[1] R. Agarwal, V. R. Majjigi, Z. Han, R. Vannithamby,
be the following: compute the error bounds given by (3),
and J. M. Cio. Low complexity resource allocation
(13) and (5) and nd the one which gives a value negligible
with opportunistic feedback over downlink OFDMA
with respect to the threshold , then use the corresponding
networks. IEEE Journal on Selected Areas in
dimensioning formula. If none is suitable, use a ner Edge-
Communications, 26(8):14621472, 2008.
worth expansion or resort to the concentration inequality
[2] F. Baccelli and B. Blaszczyszyn. Stochastic Geometry
approach.
and Wireless Networks, Volume I Theory, volume
3, No 34 of Foundations and Trends in Networking.
Note that the Edgeworth method requires the computations
NoW Publishers, 2009.
of the rst three (or ve) moments, whose lengthiest part is
to compute the k, l which is also a step required by the exact [3] B. Blaszczyszyn and M.K. Karray. Dimensioning of
method. Thus Edgeworth methods are dramatically simpler the downlink in OFDMA cellular networks via an
than the exact method and may be as precise. However, Erlangs loss model. In Proc. of European Wireless
both the exact and Edgeworth methods suer from the same Conference, Aalborg, 2009.
aw: There are precise as long as the parameters, mainly [4] B. Blaszczyszyn and M.K. Karray. Fading eect on the
and , are perfectly well estimated. The value of is often dynamic performance evaluation of OFDMA cellular
set empirically (to say the least) so that it seems important networks. In Proc. of the 1st International Conference
to have dimensioning values robust to some estimate errors. on Communications and Networking (ComNet), 2009.
This is the goal of the last method we propose. [5] L. Decreusefond and P. Moyal. Stochastic modeling
and analysis of telecom networks. Wiley, 2012.
According to (6), if we nd such that [6] A. Dembo and O. Zeitouni. Large deviations
techniques and applications, volume 38 of Stochastic
L log()L2 Modelling and Applied Probability. Springer-Verlag,
g( R ) = R
E
f 2 d E
f 2 d Berlin, 2010.
and [7] R. Giuliano and F. Mazzenga. Dimensioning of
Z Z OFDM/OFDMA-based cellular networks using

Navail = f d + f 2 d, (8) exponential eective SINR. IEEE Trans. Wireless
E L2 E Commun., 58(9):4204 4213, October 2009.
we are sure that the loss probability will fall under . How- [8] Jianwei Huang, V.G. Subramanian, R. Agrawal, and
ever, we do not know a priori how larger this value of Navail R.A. Berry. Downlink scheduling and resource
than the true value. It turns out that the relative oversizing allocation for OFDM systems. Wireless
increases with from a few percents to 40% for the large Communications, IEEE Transactions on, 8(1):288
value of and hence small values of Navail . For instance, for 296, 2009.
[9] M. K. Karray. Analytical evaluation of QoS in the For details on Poisson processes, we refer to [2, 5]. For E a
downlink of OFDMA wireless cellular networks Polish space equipped with a Radon measure , E denotes
serving streaming and elastic trac. IEEE Trans. the set of locally nite discrete measures on E. The generic
Wireless Commun., 2010. element of E may be identied with a set = {xn , n
[10] H.H. Kuo. Gaussian measures in Banach spaces. 1} such that K has R nite cardinalPfor any K compact
Lecture Notes in Mathematics, Vol. 463. in E. We denote by E f d the sum x f (x) provided
Springer-Verlag, Berlin, 1975. that it exists as an element of R {+}. A Poisson process
[11] M. Maqbool, M. Coupechoux, S. Doirieux, and B. of intensity is a probability P on E , such that for any
Baynat. Dimensioning methodology for OFDMA f CK (E, R),
networks. In Proc. of the Wireless World Research  Z  Z
Forum (WWRF22), 2009. E exp( f d) = exp( 1 ef (x) d(x)).
E E
[12] G. Peccati, J.L. Sole, M.S. Taqqu, and F. Utzet.
1
Steins method and normal approximation of Poisson For f L (), the Campbell formula states that
functionals. Annals of Probability, 38(2):443478, 2010. Z  Z
[13] N. Privault. Stochastic analysis in discrete and E f d = f d.
continuous settings with normal martingales, volume
1982 of Lecture Notes in Mathematics. We introduce the discrete gradient D dened by
Springer-Verlag, Berlin, 2009.
Dx F () = F ( {x}) F (), for all x E.
[14] K. Seong, M. Mohseni, and J.M. Cio. Optimal
resource allocation for OFDMA downlink systems. In In particular, for f L1 (), we have
Information Theory, 2006 IEEE International Z
Symposium on, pages 1394 1398, 2006. Dx f d = f (x).
[15] Z. Shen, J. G. Andrews, and B. L. Evans. Adaptive E

resource allocation in multiuser OFDM systems with The domain of D, denoted by Dom D is the set of function-
proportional rate constraints. Wireless als F : E R such that
Communications, IEEE Transactions on, Z 
4(6):27262737, 2005. E |Dx F ()|2 d(x) < .
[16] L. Wu. A new modied logarithmic Sobolev inequality E

for Poisson point processes and several applications. The integration by parts then says that, for any F Dom D,
Probability Theory and Related Fields, 118(3):427438, any u L2 (),
2000.  Z 
E F u(x)( d(x) d(x))
APPENDIX E
Z 
A. HERMITE POLYNOMIALS = E Dx F u(x) d(x) . (11)
E
Let be the
Gaussian probability density function: (x) =

exp(x2 /2)/ 2 and the Gaussian measure on R. Her- We denote by = kf kL2 () and f = f /. Note that
mite polynomials (Hk , k 0) are dened by the recursion kf kL2 () = 1/ and that
formula: Z
dk m(p, ) := |f (x)|p d(x) = kf kp
L2 ()
kf kpLp () 1p/2 .
Hk (x)(x) = (x). E
dxk
The proof of the following theorem may be found in [5, 12,
For the sake of completness, we recall that
13].
H0 (x) = 1, H1 (x) = x, H2 (x) = x2 1, H3 (x) = x3 3x
H4 (x) = x4 6x2 + 3, H5 (x) = x5 10x3 + 15x. Theorem 2. Let f L2 (). For > 0, let
Z
Thus, for F Cbk , using integration by parts, we have N = f (x)( d(x) d(x)).
Z Z E

F (k) (x) d(x) = F (x)Hk (x) d(x). (9) Then, for any Lipschitz function F from R to R, we have
R R r
i Z
1 m(3, ) kF kLip .
h
E F (N )
Rx
F d
R
Let Q(x) = (u) du = R 1(; x] (u)(u) du. Then, 2 2
R
Q = and
Z
To prove the Edgeworth expansion and its error bound,
1(; x] (u)Hk (u) d(u)
R
we introduce some notions of Gaussian calculus. For F
Cb2 (R; R), we consider
dk+1
Z
= 1(; x] (u) Q(u) du
R dxk+1 AF (x) = xF (x) F (x), for any x R.
= Q(k) (x) = Hk1 (x)(x). (10) The Ornstein-Uhlenbeck semi-group is dened by
Z p
B. EDGEWORTH EXPANSION Pt F (x) = F (et x + 1 e2t y) d(y) for any t 0.
R
The innitesimal generator A and Pt are linked by the fol- Moreover, according to Theorem 2,
lowing identity
h i Z
E (Pt F )(3) (N ) (3)
Z
(P F ) (x) d(x)
Z
t

F (x) F (y) d(y) = APt F (x) dt. (12)
R

R 0 r
1
m(3, )k(Pt F )(4) k
2 2
Theorem 3. For F Cb3 (R, R),
r
1
= m(3, )e3t k(Pt F (3) ) k
h i Z 2 2
E F (N )

F (y) d(y) 1 e4t

R m(3, ) kF (3) k .
Z 2 1 e2t
1
m(3, ) F (y)H3 (y) d(y) Then, we have,
6 R
2
r !
m(3, 1) m(4, 1) 2 kF (3) k
Z
1
+ (13) |A2 m(3, ) (Pt F )(3) (x) d(x)|
6 9 2 R
1 e4t
m(3, )2 kF (3) k .
Proof. According to the Taylor formula, 4 1 e2t
Hence,
Dx G(N ) = G(N + f (x)) G(N )
1
h i
= G (N )f (x) + f2 (x) G (N ) E N (Pt F ) (N ) (Pt F ) (N )
2 Z
1
Z 1 1
+ f (x) 3
r G (rN + (1 r)f (x)) dr.
2 (3)
(14) = m(3, ) (Pt F )(3) (x) d(x) + R(t),
2 2 R
0

Hence, according to (11) and (14), where


r !
m(3, )2 m(4, ) 2 e4t
kF (3) k
h i
E N (Pt F ) (N ) R(t) +
4 6 1 e2t
Z 
= E f (x)Dx (Pt F ) (N ) d(x) Now then,
E
h i Z
= E (Pt F ) (N ) (Pt F )(3) (x) d(x)
Z R
1 h i
f3 (x) d(x)E (Pt F )(3) (N )
Z Z
+
p
2 E = e3t F (3) (et x + 1 e2t y) d(y)
1
Z ZR R
+ f4 (x) d(x) =e 3t
F (3) (y) d(y)
2 E
Z 1  R
Z
E (Pt F )(4) (rN + (1 r)f (x))r 2 dr = e3t F (y)H3 (y) d(y),
0 R
= A1 + A2 + A3 .
since the Gaussian measure on R2 is rotation invariant and
k
It is well known that for F C , (x 7 Pt F (x)) is k + 1- according to (9). Remarking that
times dierentiable and that we have two expressions of the Z
derivatives (see [10]): e4t (1 e2t )1/2 dt = 2/3
0
(k+1)
(Pt F ) (x) and applying (12) to x = N , the result follows.
(k+1)t Z
e p
= F (k) (et x + 1 e2t y)y d(y).
1 e2t R
This development is not new in itself but to the best of our
and (Pt F )(k+1) (x) = e(k+1)t Pt F (k) (x). The former equa- knowledge, it is the rst time that there is an estimate of the
tion induces that error bound. Following the same lines, we can pursue the
expansion up to any order provided that F be suciently
e(k+1)t dierentiable. Namely, for F Cb5 , we have
Z
k(Pt F )(k+1) k kF (k) k |y| d(y)
1 e2t R h i Z
E F (N ) =
r
e(k+1)t 2 F (y) d(y)
= kF (k) k . R
1 e2t
m(3, 1)2
Z Z
m(3, 1) (3)
Hence, + F (y) d(y) + F (5) (y) d(y)
6 R 72 R
Z
e4t
r m(4, 1)
|A3 |
2
m(4, ) kF (3) k . + F (y) d(y) + F kF (5) k . (15)
(4)

24
6 1 e2t R
where

m(3, 1) 2
F m(3, 1)2
3/2 45
r !
4 2 2
+( + ) m(4, 1) . (16)
135 128

C. CONCENTRATION INEQUALITY
We are now interested in an upper bound, which is called
concentration inequality.

Theorem 4. Let M, a > 0. Assume that |f (z)| M


a.s and f L2 (E, ), then
M2
  
a.M
P(F > E [F ] + a) exp g (17)
V [F ] V [F ]
where g(u) = (1 + u) ln(1 + u) u.

The above theorem can be directly derived from [16]. How-


ever let us take this opportunity to prove this theorem in a
very nice, simple and elementary fashion, exactly the same
way as Bennett built his concentration inequality for the
sum of n i.i.d random variables.

Proof. Using Chernos bound we have:


h i
P(F > E [F ] + a) E eF /e(E[F ]+a)
R f (z)
=e E e ( 1f (z) ) d(z)a

Now assume that |f (z)| M a.s . Observe that the


function (ex 1 x)/x2 is increasing on R (the value at 0
is 1/2), we have that
eM 1 M 2
ef (z) f (z) 1 f (z) a.s.
M2
Thus,

P(F > E [F ] + a)
Z  M  
e M 1 2
exp f (z) d(z) a
E M2
 M 
e 1 M
= exp V [F ] a
M2
We nd that = ln (1 + aM /V [F ]) /M minimizes the right-
hand-side and thus we obtain (17).

Potrebbero piacerti anche