DOI QR코드

DOI QR Code

Resource Allocation and EE-SE Tradeoff for H-CRAN with NOMA-Based D2D Communications

  • Wang, Jingpu (College of Computer Science and Engineering, Northeastern University) ;
  • Song, Xin (College of Computer Science and Engineering, Northeastern University) ;
  • Dong, Li (College of Computer Science and Engineering, Northeastern University)
  • Received : 2019.11.15
  • Accepted : 2020.02.04
  • Published : 2020.04.30

Abstract

We propose a general framework for studying resource allocation problem and the tradeoff between spectral efficiency (SE) and energy efficiency (EE) for downlink traffic in power domain-non-orthogonal multiple access (PD-NOMA) and device to device (D2D) based heterogeneous cloud radio access networks (H-CRANs) under imperfect channel state information (CSI). The aim is jointly optimize radio remote head (RRH) selection, spectrum allocation and power control, which is formulated as a multi-objective optimization (MOO) problem that can be solved with weighted Tchebycheff method. We propose a low-complexity algorithm to solve user association, spectrum allocation and power coordination separately. We first compute the CSI for RRHs. Then we study allocating the cell users (CUs) and D2D groups to different subchannels by constructing a bipartite graph and Hungrarian algorithm. To solve the power control and EE-SE tradeoff problems, we decompose the target function into two subproblems. Then, we utilize successive convex program approach to lower the computational complexity. Moreover, we use Lagrangian method and KKT conditions to find the global optimum with low complexity, and get a fast convergence by subgradient method. Numerical simulation results demonstrate that by using PD-NOMA technique and H-CRAN with D2D communications, the system gets good EE-SE tradeoff performance.

Keywords

1. Introduction

Power domain—non-orthogonal multiple access (PD-NOMA) has become a key issue of the novel energy and spectrum efficient technologies due to a higher network capacity compared with orthogonal multiple access (OMA) in the fifth generation (5G) environment [1]. The energy efficiency (EE) is studied in a NOMA enabled heterogeneous cloud radio access network (H-CRAN) in [2]. Apart from NOMA, the device-to-device (D2D) communication has been an essential way to alleviate the upcoming traffic pressure. Unlike the traditional concept of “D2D pair”, the concept of “D2D group” in which several D2D receivers are capable of receiving information from one D2D transmitter is presented in [3]. .

In this work, we introduce multi-tier heterogeneous networks to construct a novel heterogeneous cloud radio network (H-CRAN) with PD-NOMA and D2D groups. The main parts of the H-CRAN architecture are the remote radio heads (RRHs), fiber links and baseband unit (BBU). The RRHs include a high power node (HPN) which transmits high power to the users and several lower power nodes (LPNs) which accommodate fewer users than HPN. A centralized signal processing is used in BBU pool which reduces the manufacturing and operating cost [4], [5]. However, enormous data can be transmitted over backhaul links. Hence, we investigate the backhaul bottleneck of H-CRAN.

In practice, the BS always has imperfect CSI. To deal with it, we assume that a channel estimation error model where the BS only knows the estimated channel gain and a prior knowledge of the variance of the estimation error [6]. In this paper, we consider D2D group aided PD-NOMA based C-RAN with imperfect CSI, in which D2D groups can reuse the same subchannel occupied by cellular users to improve the spectrum utilization. To the best of our knowledge, the existing works cannot use joint user association and power allocation algorithms with EE-SE tradeoff in NOMA and D2D enhanced C-RAN with channel estimation. The proposed algorithm first transforms the probabilistic multi-objective optimization (MOO) problem into a non-probabilistic single-objective (SOO) optimization problem by weighted Tchebycheff method. With successive convex programming (SCP), the non-convex optimization problem can be transformed into a convex optimization problem. Then it iteratively computes the sub-optimal power allocation coefficients for the optimization problem by Lagrangian dual multiplier method and KKT conditions. The main contributions of this work can be summarized as follows:

1) To the best of our knowledge, the proposed algorithm is firstly used in H-CRAN for the D2D underlaying cellular network combining with the NOMA technology, which is a candidate technology for future networks. By successive interference cancellation (SIC), users can achieve higher data rates in PD-NOMA than in OMA communication systems.

2) Considering imperfect CSI, we firstly transform the probabilistic problem to a non-probabilistic problem. By using statistical methods to more precisely estimate parameters in the objective function, the outage probability constrains in the optimization problem can be solved. Considering the backhaul capacity of H-CRAN, we propose a delay constraint by computing user average service time through queue theory. Then, we transform the MOO non-convex problem into a SOO convex problem by using weighted Tchebycheff method and SCP. At last, by the Lagrangian dual multiplier method with KKT conditions and the gradient descent method, the power allocation coefficients can be obtained iteratively.

3) The proposed algorithm is evaluated by numerous times of Monte Carlo simulations, which has a fast converge speed. And the power allocation scheme used in an NOMA and D2D aided cooperative relay system with imperfect CSI can achieve a higher sum data rate compared with that used in networks without D2D or that in OMA systems. Also, the proposed algorithm gives the maximum EE and SE points in different circumstances.

The rest of the paper is organized as follows. The channel model and problem formulation are introduced in Section II. The proposed resource allocation algorithm is elaborated in Section III. In Section IV, the simulation results are presented, while Section V finally draws conclusions of the paper.

2. System Model

2.1 Downlink Network Model

We consider a downlink H-CRAN scenario involving one high-power node (HPN) and six low-power nodes (LPNs) as RRHs, i.e., m m ∈M,M = {0, . . . , m, . . . , 6} , where the first RRH represents the HPN. Each RRH has L OFDM subchannels (SCs) for cell users (CUs). Each D2D group (DG) uses the same SC as a CU in NOMA. For simplicity, we suppose that there are at most two D2D users (DUs) in one DG. We also suppose that there are N CUs, i.e.,n ∈ N, N = { 0, . . . ,n , . . . ,N } , and K DUs in the network, where K ≤ 2N . The parameters and symbols used in the work are summarized in Table 1.

Table 1. Table of symbols.

In Fig. 1, we place the LPNs at the edge of the cell, and they can be reused by adjacent H-CRANs. In the cell, each LPN occupies L / 2 SCs; thus, signals from adjacent LPNs do not have mutual interference. In addition, all the users in small cells receive interference from the HPN, and if a CU is sufficiently close to a DU that is in the same SC, it also receives interference from the DU.

Fig. 1. System model

We assume that the m-th RRH, the n-th CU, and the k-th DU are multiplexed on the l-th SC. The signal of CUs transmitted by the RRHs through SC l can be expressed as \(X_{n}=A_{m, n} x_{m, n}^{(l)} \sqrt{P_{m, n}} s_{m, n}\). The signal of DUs transmitted by the RRHs through SC l can be expressed as \(Y_{k}=y_{n, k}^{(l)} \sqrt{P_{n, k}} S_{n, k}\), where sm, n and sn, k are the modulated symbols transmitted from RRH m to CU n and from CU n to DU k, respectively. Further, Pm,n and Pn,k represent the power transmitted from RRH m to CU n and from CU n to DU k, respectively. In addition, \(x_{m, n}^{(l)}\)  is a binary variable of CU n on SC l, where \(x_{m, n}^{(l)}=1\) if CU n is allocated to SC l, while \(y_{n, k}^{(l)}\) is a binary variable of DU k on SC l, where \(y_{n, k}^{(l)}=1\) if DU k is allocated to SC l. Am, n is a binary variable of the RRH selection indicator, where , \(A_{m, n}=1\) implies that CU n is selected by RRH m.

For the general case, the signal-to-interference-plus-noise ratio (SINR) of the n-th CU can be written as \(\phi_{m, n, l}=P_{m, n, l} h_{m, n, l}^{2} /\left(\sigma_{m, n, l}^{2}+I_{m, n, l}\right)\), where \(h_{m, n, l}^{2}\) is the desired CU signal channel gain on SC l. We assume that \(h_{m, n, l}=\Gamma_{m, n, l} g_{m, n, l}\), where \(\Gamma_{m, n, l}\) is the distance between transmitter m and receiver n on SC l and \(g_{m, n, l}: \mathcal{N}_{C}\left(0, \sigma_{m, n, l}^{2}\right)\) represents the Rayleigh fading channel gain between transmitter m and receiver n. Further, \(\sigma_{m, n, l}^{2}\) is the noise power while \(I_{m, n, l}\) denotes the total interference received by CU n, including the inter-cell and intra-cell interference from the CUs and DUs. Thus, \(I_{m, n, l}=I_{\text {out }}^{C}+I_{\text {in }}^{D}+I_{\text {out }}^{D}\), where \(I_{\text {out }}^{C}\) represents the interference from the HPN (j=0) and  \(I_{\text {out }}^{C}=\sum_{j \in \mathrm{M}, j \neq m} A_{j, i} x_{j, i}^{(l)} P_{j, i} h_{j, n}^{2}\). Further, \(I_{i n}^{D}\) denotes the intra-cell interference from DG k to CU n. \(I_{i n}^{D}=y_{n, k}^{(l)} P_{n, k} h_{k, n}^{2}.\). In addition, \(I_{\text {out }}^{D}\) denotes the intra-cell interference from DG k to CU n. \(I_{i n}^{D}=y_{n, k}^{(I)} P_{n, k} h_{k, n}^{2}.\). In addition, \(I_{i n}^{D}\) denotes the inter-cell interference from DG k’ to CU n. \(I_{\text {out }}^{D}=\sum_{k^{\prime} \in \mathrm{K}, k^{\prime} \neq k} y_{i \in \mathrm{N}, i \neq n}^{(l)} P_{i, k} h_{k, n}^{2}\).

As for the DUs and DGs, the SINR of the k-th DU can be written as \(\phi_{n, k, l}=P_{n, k, l} h_{n, k, l}^{2} /\left(\sigma_{n, k, l}^{2}+I_{n, k, l}^{D}\right)\), where \(h_{n, k, l}^{2}\) is the desired DU signal channel gain on SC l and \(I_{n, k, l}^{D}\) denotes the total interference received by DU k, including the inter-cell interference from the CUs and DUs. Further, \(I_{n, k, l}^{D}=I_{\text {out }}^{C}+I_{\text {out }}^{D}\), where \(I_{\text {out }}^{C}\) represents the interference from the HPN (j=0) to the k-th DU. \(I_{o u t}^{C}=\sum_{j \in N, j \neq n} A_{j, k} x_{j, k}^{(l)} P_{j, k} h_{j, k}^{2}\). In addition, \(I_{\text {out }}^{D}\) denotes the inter-cell interference from D2D user k’ to DU k. \(I_{o u t}^{D}=\sum_{k \in K, k^{\prime} \neq k} y_{k^{\prime}, k}^{(l)} P_{k^{\prime}, k} h_{k^{\prime}, k}^{2}\). Moreover, if the D2D users form a group as DG k, the SINR of the k-th DG can be \(\phi_{n, k, l}=P_{n, k, l} h_{n, k, l}^{2} /\left(\sigma_{n, k, l}^{2}+I_{n, k, l}\right)\), where \(h_{n, k, l}^{2}\) is the desired DG signal channel gain on SC l and \(I_{n, k, l}\) denotes the total interference received by DG k. Each DG has two DUs ( k1 and k2 ), by the PD–NOMA and SIC techniques, if the SINR of one of the two users (( Φk2 (k2) ) is not better than that of the other, i.e., Φn,k1,l (k2) ≥ Φn,k2,l (k2), then the transmission powers of the two users are expressed as Pk2 ≥ Pk1. The SINR of user k1 of the k-th DG can be written as \(\phi_{n, k 1, l}=P_{n, k 1, l} h_{n, k 1, l}^{2} /\left(\sigma_{n, k 1, l}^{2}+I_{n, k 1, l}\right)\), where \(h_{n, k 1, l}^{2}\) is the desired channel gain of user k1 of the k-th DG signal on SC l while \(I_{n, k 1, l}\) denotes the total interference received by user k1 of the k-th DG. \(I_{n, k 1, l}=I_{o u t}^{D}+I_{o u t}^{C}\), where \(I_{\text {out }}^{C}=\sum_{j \in \mathrm{N}, j \neq n} A_{j, k 1} x_{j, k 1}^{(l)} P_{j, k 1} h_{j, k 1}^{2}\) represents the interference from the HPN (j=0) to DU k1. \(I_{\text {out }}^{D}=\sum_{k^{\prime} \in \mathrm{K}, k^{\prime} \neq k 1} y_{k^{\prime}, k 1}^{(l)} P_{k^{\prime}, k 1} h_{k^{\prime}, k 1}^{2}\) denotes the inter-cell interference from D2D user k’ to DU k1 on the same SC. The interference received by user k1 is exactly the same as that received by a DU that does not form any DG. Hence, in the remainder of this article, we assume that every DU belongs to a DG and one DG can involve one or two DUs, i.e., k ∈ K,K = {0, . . . ,k, . . . ,K} , K ≤ N . The SINR of user k2 of the k-th DG can be written as \(\phi_{n, k 2, l}=P_{n, k 2, l} h_{n, k 2, l}^{2} /\left(\sigma_{n, k 2, l}^{2}+I_{n, k 2, l}\right)\), where \(h_{n, k 2, l}^{2}\) is the desired channel gain of user k2 of the k-th DG signal on SC l while \(I_{n, k 2, l}\) denotes the total interference received by user k2 of the k-th DG. Thus, \(I_{n, k 2, l}=I_{o u t}^{D}+I_{o u t}^{C}+I_{i n}^{C}\), where \(I_{\text {out }}^{C}\) represents the interference from the HPN (j=0) to DU k2. \(I_{o u t}^{C}=\sum_{j \in N, j \neq n} A_{j, k 2} x_{j, k 2}^{(l)} P_{j, k 2} h_{j, k 2}^{2}\). Further, \(I_{\text {out }}^{D}\) denotes the inter-cell interference from D2D user k’ to DU k2 on the same SC. \(I_{\text {out }}^{D}=\sum_{k^{\prime} \in \mathrm{K}, k^{\prime} \neq k 2} y_{k, k 2}^{(l)} P_{k^{\prime}, k 2} h_{k^{\prime}, k 2}^{2}\). In addition, \(I_{i n}^{D}\) denotes the intra-cell interference from DU k1 to DU k2 of the k-th DG on the same SC. \(I_{i n}^{D}=\sum_{k 1 \in \mathrm{K}, k 1 \neq k 2} y_{k 1, k 2}^{(l)} P_{k 1, k 2} h_{k 1, k 2}^{2}\).

2.2 Channel Model

In practice, it is challenging to acquire the perfect CSI of each user. Using the minimum mean square error for the channel estimation error model [7], we can establish the model of the Rayleigh fading coefficient between RRH m and CU n as \(g_{m, n, l}=\hat{g}_{m, n, l}+e_{m, n, l}\), where \(\hat{g}_{m, n, l}: \mathcal{N}_{C}\left(0,1-\sigma_{e}^{2}\right)\) is the estimated channel gain and \(e_{m, n, l}\) is the estimated error, which follows a complex Gaussian distribution with mean zero and variance \(\sigma_{e}^{2}\). We also assume that \(\hat{g}_{m, n, l}\) and \(e_{m, n, l}\) are uncorrelated. Similarly, we can establish model of the Rayleigh fading coefficient between CU n and DG k as \(g_{n, k, l}=\hat{g}_{n, k, l}+e_{n, k, l}\), where \(\hat{g}_{n, k, l}: \mathcal{N}_{C}\left(0,1-\sigma_{e}^{2}\right)\) is the estimated channel gain and \(e_{n, k, l}\) is the estimated error, which follows a complex Gaussian distribution with mean zero and the variance \(\sigma_{e}^{2}\). We also assume that \(\hat{g}_{n, k, l}\) and \(e_{n, k, l}\) are uncorrelated.

With perfect CSI, according to Shannon’s formula, the maximum achievable channel capacity of CU n allocated to RRH m on SC l can be written as \(C_{m, n, l}=B_{s c} \log _{2}\left(1+\phi_{m, n, l}\right)\), where Bsc is the bandwidth of SC l. However, if \(\hat{h}_{m, n, l}=\Gamma_{m, n, l} \hat{g}_{m, n, l}\), where \(\Gamma_{m, n, l}\) is the distance between RRH m and CU n, and the scheduled data rate of CU n selected by RRH m on SC l can be rewritten as \(r_{m, n, l}=B_{s c} \log _{2}\left(1+\hat{\phi}_{m, n, l}\right)\), where Bsc = 1 is assumed in this study and \(\hat{\phi}_{m, n, l}=P_{m, n, l} \hat{h}_{m, n, l}^{2} /\left(\sigma_{m, n, l}^{2}+I_{m, n, l}\right)\). Thus, the network’s outage sum rate of CUs can be \(R^{C}(A, x, P)=\sum_{m \in \mathrm{M}} \sum_{n \in \mathrm{N}} A_{m, n} x_{m, n}^{(l)} r_{m, n} \operatorname{Pr}\left[r_{m, n} \leq C_{m, n} \mid \hat{g}_{m, n}\right]\), where \(\operatorname{Pr}\left[r_{m, n} \leq C_{m, n} \mid \hat{g}_{m, n}\right]\) is the probability of \(r_{m, n} \leq C_{m, n}\) and \(C_{m, n}\) represents the upper bound of \(r_{m, n}\). Similarly, the maximum achievable channel capacity of DG k allocated to the n-th CU on SC l can be \(C_{n, k, l}=B_{s c} \log _{2}\left(1+\phi_{n, k, l}\right)\), where Bsc is the bandwidth of SC l. If \(\hat{h}_{n, k, l}=\Gamma_{n, k, l} \hat{g}_{n, k, l}\), the scheduled data rate of DG k selected by the n-th CU on SC l can be as \(r_{n, k, l}=B_{s c} \log _{2}\left(1+\hat{\phi}_{n, k, l}\right)\), where \(\hat{\phi}_{n, k, l}=P_{n, k, l} \hat{h}_{n, k, l}^{2} /\left(\sigma_{n, k, l}^{2}+I_{n, k, l}\right)\). Thus, the outage sum rate of DGs can be \(R^{D}(y, P)=\sum_{n \in \mathrm{N}} y_{n, k}^{(l)} r_{n, k} \operatorname{Pr}\left[r_{n, k} \leq C_{n, k} \mid \hat{g}_{n, k}\right]\), where \(\operatorname{Pr}\left[r_{n, k} \leq C_{n, k} \mid \hat{g}_{n, k}\right]\) is the probability of \(r_{n, k} \leq C_{n, k} \cdot C_{n, k}\) represents the upper bound of \(\boldsymbol{r}_{n, k}\).

2.3 Tradeoff between EE and SE

The multi-objective optimization (MOO) problem can be formulated as a joint optimization problem of user association and power allocation, which can be written as

\(\begin{array}{l} \min _{A, x, y, p}-\eta_{S E}(A, x, y, p), \\ \min _{A, x, y, p} P_{\text {tot }}(A, x, y, p), \\ \text { s.t. } C 1: A_{m, n} \in\{0,1\}, \forall m, n, \\ \quad C 2: \sum_{m} A_{m, n} \leq 1, \forall n, \\ \quad C 3: x_{m, n} \in\{0,1\}, \forall m, n, \\ \quad C 4: \sum_{n} x_{m, n} \leq L, m=0, \\ \quad C 5: \sum_{n} x_{m, n} \leq L / 2, \forall m, m \neq 0, \\ \quad C 6: y_{n, k} \in\{0,1\}, \forall n, k, \\ \quad C 7: \sum_{n} y_{n, k} \leq 1, \forall k, \\ \quad C 8: \sum_{k} y_{n, k} \leq 2, \forall n, \\ \quad C 9: \phi_{n}^{C} \geq \phi_{t h r}^{C}, \phi_{k}^{D} \geq \phi_{t h r}^{D}, \forall n, k, \\ \quad C 10: \sum_{n \in \mathrm{N}} A_{m, n} x_{m, n}^{(l)} P_{m, n} \leq P_{m}^{\max }, \forall m, \\ \quad C 11: \phi_{n, k 1} \geq \phi_{n, k 1}^{t h r}, \phi_{n, k 2} \geq \phi_{n, k 2}^{t h r}, \forall n, k 1, k 2, \\ \quad C 12: s_{k 1} \geq 0, \mathrm{~s}_{k 2} \geq 0, \forall k 1, k 2, \\ \quad C 13: 2^{s_{k 1}}+2^{s_{k 2}} \leq 1, \forall k 1, k 2, \\ \quad C 14: \operatorname{Pr}\left[C_{m, n}<r_{m, n} \mid \hat{g}_{m, n}\right] \leq \varepsilon_{o u t}^{C}, \forall m, n, \\ \quad C 15: \operatorname{Pr}\left[C_{n, k}<r_{n, k} \mid \hat{g}_{n, k}\right] \leq \varepsilon_{o u t}^{D}, \forall n, k, . \end{array}\)       (1)

where the network SE (bits/s/Hz) is calculated by the system sum data rate per unit bandwidth from the channel model, which can be represented by ηSE = RC+ RD. The system total power consumption is \(P_{t o t}=P_{t o t}^{C}+P_{t o t}^{D}\), where \(P_{t o t}^{C}=P_{f}^{H}+6 P_{f}^{L}+\beta_{m} \sum_{m \in \mathrm{M}} \sum_{n \in \mathrm{N}} A_{m, n} x_{m, n}^{(l)} P_{m, n}+P_{c i r}^{H}+6 P_{c i r}^{L}\), where \(P_{f}^{H}\) is the fiber-based backhaul power of the HPN, \(P_{f}^{L}\) is the fiber-based backhaul power of the LPN, βm is the power amplifier efficiency of the m-th RRH to each user in the network, \(P_{c i r}^{H}\) is the circuit power of the HPN, and \(P_{c i r}^{L}\) is the circuit power of the LPN. Further, \(P_{t o t}^{D}=\sum_{n \in \mathrm{N} \\ k \in \mathrm {K}} y_{n, k}^{(l)} P_{n, k}\).

For green communication, we study the EE of the network, which can be expressed as \(\eta_{E E}=\eta_{S E} / P_{\text {tot }}\). The SE and EE are conflicting parameters in terms of optimizing the performance of a wireless network with limited radio resources [8], [9]. Hence, it is necessary to achieve a tradeoff between the EE and the SE of the PD–NOMA and D2D-communication-enhanced H-CRAN. According to the ηEE formula, we must simultaneously maximize ηSE and minimize the total power consumption Ptot to get the maximumηEE

In (1), C1 andC2 specify that each CU can be allocated to only one RRH in every time phase. Further, C3 –C5 imply that each CU can select only one SC. In addition, the LPNs have L / 2 SCs while the HPN has L SCs. This can guarantee that adjacent LPNs occupy different SCs to avoid interference at the same frequency. Moreover, C6 –C8 indicate that each DU can select only one CU, while one CU can be associated with a DG. The constraintC9 guarantees the QoS by limiting the network service delay. Note that \(\phi_{t h r}^{C}\) and \(\phi_{t h r}^{C}\) are the SINR thresholds for the CUs and DUs, respectively. The constraintC10 ensures that the transmission power for RRH m in the downlink network is not higher than its maximum transmitted power, which is defined by \(P_{m}^{\max }\). The constraintC11gives the minimum SINR for each DU, where \(\phi_{n, k 1}^{t h r}=\phi_{n, k 2}^{t h r}=\phi_{t h r}^{D}\), while the constrain C12 implies that the power allocation coefficient sk1 and sk2 are non-negative. C13limits the upper bound of the transmission power for the DGs. \(\varepsilon_{\text {out }}^{C}\) and \(\varepsilon_{\text {out }}^{C}\) are the channel outage probability requirements for the CUs and DUs as indicated by C14 and C15 .

As \(\phi_{t h r}^{C}\) and \(\phi_{t h r}^{D}\) are related to the network data transmission delay in the fiber links. By the scheduled streaming data of CU n and its traffic characteristic( Tn,  Gn ), the delay constraint is \(r_{n} \geq 2 G_{n} \bar{z} /\left(\left(2+2 G_{n} T_{n}-\sqrt{\left(2+2 G_{n} T\right)^{2}-8 G_{n} T_{n}}\right) B_{s c}\right)\)(bits/s/Hz) in here \(\bar{z}\) is a random variable of the packet size in bits, while Tn and Gn are the desired maximum delay requirement and the Poisson-distribution arrival rate of CU n [4]. \(\phi_{t h r}^{C}\) and \(\phi_{t h r}^{D}\) are from Shannon’s capacity formula.

For consistent comparison, we normalize the two target functions in Eq. (1) as follows:

\(\begin{array}{l} \min _{A, x, y, p} F_{1}(A, x, y, p)=\frac{\eta_{S E}^{\max }-\eta_{S E}(A, x, y, p)}{\eta_{S E}^{\max }-\eta_{S E}^{\min }} \\ \min _{A, x, y, p} F_{2}(A, x, y, p)=\frac{P_{t o t}}{P_{\max }} \end{array}\)       (2)

where Pmax represents the maximum total power consumption while \(\eta_{S E}^{\max }\) and \(\eta_{S E}^{\max }\) are the maximum and minimum SE (system sum data rate), respectively.

The MOO problem (1) is a mixed-integer problem because of the integer variables xm, n and yn, k . Owing to the existing inter-cell and intra-cell interference described in Section 2.1, the problem is a non-concave problem, which is generally NP-hard. Hence, we first transform Eq. (1) into a single-objective optimization (SOO) problem with lower computational complexity by using the weighted Tchebycheff method as follows:

\(\begin{array}{l} \min _{A, x, y, p} \max \left\{\omega F_{1}(A, x, y, p),(1-\omega) F_{2}(A, x, y, p)\right\} \\ \text { s.t. } C 1-C 15 \end{array}\)       (3)

where the weighting parameter ω ∈[0,1] represents the relative importance of the two objectives. The method has been shown to be sufficient and necessary for achieving Pareto optimality and obtaining the unique optimal solution (A* ,x* ,y* ,p*) [10]. After introducing an additional adaptive variable ϕ , and the transformed problem is written as

\(\begin{array}{l} \min _{A, x, y, p, \varphi} \varphi, \\ \text { s.t. } C 1-C 15, \\ \qquad C 16: \omega\left(\frac{\eta_{S E}^{\max }-\eta_{S E}(A, x, y, p)}{\eta_{S E}^{\max }-\eta_{S E}^{\min }}\right) \leq \varphi \\ \qquad C 17:(1-\omega)\left(\frac{P_{t o t}}{P_{\max }}\right) \leq \varphi \end{array}\)       (4)

2.4 Optimization Problem Transformation

The optimization problem given by Eq. (4) is a non-convex problem with probabilistic constraintsC1 and C2 . In practice, it is rather difficult to obtain the global optimal power allocation with affordable, systematic, and computationally efficient methods, and the optimal problem cannot be solved with acceptable complexity in polynomial time. To decrease the complexity, we transform the probabilistic mixed-integer problem into a non-probabilistic problem, and we then use a series of algorithms to efficiently solve the joint resource allocation optimization problem.

According to [7], we first rewrite the data rate in section 2.2 as

\(r_{m, n}=\log _{2}\left(1+\hat{\phi}_{m, n}\right)=\log _{2}\left(1+\frac{\alpha_{m, n}}{\beta_{m, n}}\right), \forall m, n,\)       (5)

where \(\hat{\phi}_{m, n}=\alpha_{m, n} / \beta_{m, n}=2^{r_{m, n}}-1 \text { and } \alpha_{m, n}=\beta_{m, n}\left(2^{r_{m, n}}-1\right)\).

The channel capacity for CU n is given by \(C_{m, n}=\log _{2}\left(1+\phi_{m, n}\right)=\log _{2}\left(1+\mu_{m, n} / v_{m, n}\right)\)\(\forall m, n\). And  \(\phi_{m, n}=\mu_{m, n} / v_{m, n}=2^{C_{m, n}}-1, \mu_{m, n}=v_{m, n}\left(2^{C_{m, n}}-1\right)\). The bound of the outage probability is

\(\operatorname{Pr}\left[C_{m, n}<r_{m, n} \mid \hat{g}_{m, n}\right] \leq \varepsilon_{o u t}^{C}=\operatorname{Pr}\left[\phi_{m, n}<\hat{\phi}_{m, n} \mid \hat{g}_{m, n}\right] \leq \varepsilon_{\text {out }}^{C}.\)       (6)

According to the total probability theorem, the outage probability can be given by

\(\begin{aligned} \operatorname{Pr}\left[\phi_{m, n}<\hat{\phi}_{m, n} \mid \hat{g}_{m, n}\right] \leq \varepsilon_{\text {out }}^{C}=& \operatorname{Pr}\left[\frac{\mu_{m, n}}{v_{m, n}}<2^{r_{m, n}}-1 \mid \hat{g}_{m, n}\right] \\ =& \operatorname{Pr}[E 1] \cdot \operatorname{Pr}\left[\mu_{m, n} \leq \alpha_{m, n} \mid \hat{g}_{m, n}\right] \\ &+\operatorname{Pr}[E 2] \cdot \operatorname{Pr}\left[\mu_{m, n}>\alpha_{m, n} \mid \hat{g}_{m, n}\right] \end{aligned}\)       (7)

where

\(\operatorname{Pr}[E 1]=\operatorname{Pr}\left[\frac{\mu_{m, n}}{v_{m, n}}<2^{r_{m . m}}-1 \mid \mu_{m, n} \leq \alpha_{m, n}, \hat{g}_{m, n}\right]\),       (8)

\(\operatorname{Pr}[E 2]=\operatorname{Pr}\left[\frac{\mu_{m, n}}{v_{m, n}}<2^{r_{m, n}}-1 \mid \mu_{m, n}>\alpha_{m, n}, \hat{g}_{m, n}\right]\).       (9)

According to [11], we can transform the outage probability constraint C14 into the following formulas: \(\operatorname{Pr}\left[\mu_{m, n} \leq \alpha_{m, n} \mid \hat{g}_{m, n}\right]=\varepsilon_{\text {out }}^{C} / 2\) and \(\operatorname{Pr}\left[v_{m, n} \geq \beta_{m, n} \mid \hat{g}_{m, n}\right] \leq \varepsilon_{\text {out }}^{C} / 2\).

By substituting the probabilistic constraints above into Eq. (4), we can transform the target problem into a revised optimization problem as follows. For CU n, with the Markov inequality, we can get

\(\begin{aligned} \operatorname{Pr}\left[v_{m, n} \geq \beta_{m, n} \mid \hat{g}_{m, n}\right] &=\operatorname{Pr}\left[\Gamma_{m, n}^{2}\left|g_{m, n}\right|^{2} P_{m, n} \geq \beta_{m, n}-\sigma^{2} \mid \hat{g}_{m, n}\right] \\ & \leq \frac{E\left[\Gamma_{m, n}^{2}\left|g_{m, n}\right|^{2} P_{m, n}\right]}{\beta_{m, n}-\sigma^{2}} \\ &=\frac{\Gamma_{m, n}^{2}\left|g_{m, n}\right|^{2} P_{m, n}}{\beta_{m, n}-\sigma^{2}} \end{aligned}\)       (10)

According to Eq. (9), let the right-hand side of Eq. (10) be equal to εout / 2 ; then, we can get \(\Gamma_{m, n}^{2}\left|g_{m, n}\right|^{2} P_{m, n} /\left(\beta_{m, n}-\sigma^{2}\right)=\varepsilon_{\text {out }}^{C} / 2\). Because \(\left|g_{m, n}\right|^{2}: \mathcal{N}_{C}\left(\hat{g}_{m, n}, \sigma_{e}^{2}\right)\) is a non-central chi-squared distributed random variable with two degrees of freedom, the left-hand side of \(\operatorname{Pr}\left[\mu_{m, n} \leq \alpha_{m, n} \mid \hat{g}_{m, n}\right]=\varepsilon_{\text {out }}^{C} / 2\) is

\(\begin{aligned} \operatorname{Pr}\left[\mu_{m, n} \leq \alpha_{m, n} \mid \hat{g}_{m, n}\right] &=\operatorname{Pr}\left[\Gamma_{m, n}^{2}\left|g_{m, n}\right|^{2} P_{m, n} \leq \alpha_{m, n} \mid \hat{g}_{m, n}\right] \\ &=\operatorname{Pr}\left[\left|g_{m, n}\right|^{2} \leq \frac{\alpha_{m, n}}{\Gamma_{m, n}^{2} P_{m, n}}\right] \\ &=F_{\left|g_{m, n}\right|^{2}}\left(\frac{\alpha_{m, n}}{\Gamma_{m, n}^{2} P_{m, n}}\right) \\ &=1-Q_{m, n}\left(\sqrt{\frac{2\left|\hat{g}_{m, n}\right|^{2}}{\sigma_{e}^{2}}}, \sqrt{\frac{2}{\sigma_{e}^{2}} \frac{\alpha_{m, n}}{\Gamma_{m, n}^{2} P_{m, n}}}\right) \end{aligned}\)       (11)

where \(Q_{1}(a, b)=\exp \left(-\left(a^{2}+b^{2}\right) / 2\right) \sum_{k=0}^{\infty}(a / b)^{k} I_{k}(a b)\) is the first-order Marcum Q-function and Ik (ab) is the k-th order modified Bessel function of the first type. Let Eq. (11) be equal to εout / 2 ; then, we can get

\(\alpha_{m, n}=F_{\left|g_{m, n}\right|^{2}}^{-1}\left(\frac{\varepsilon_{\text {out }}^{C}}{2}\right) \cdot \Gamma_{m, n}^{2} P_{m, n}\),       (12)

From \(\left|g_{m, n}\right|^{2}=\left|\hat{g}_{m, n}\right|^{2}+\sigma_{e}^{2}\)\(\beta_{m, n}=\alpha_{m, n} /\left(2^{r_{m, n}}-1\right)\), we can get

\(\frac{\Gamma_{m, n}^{2}\left|g_{m, n}\right|^{2} P_{m, n}}{\alpha_{m, n} /\left(2^{r_{m}, n}-1\right)-\sigma^{2}}=\frac{\Gamma_{m, n}^{2}\left(\left|\hat{g}_{m, n}\right|^{2}+\sigma_{e}^{2}\right) P_{m, n}}{\frac{F_{\left|g_{m, n}\right|^{2}}^{-1}\left(\varepsilon_{\text {out }}^{C} / 2\right) \cdot \Gamma_{m, n}^{2} P_{m, n}}{2^{r_{m, n}}-1}-\sigma^{2}}=\frac{\varepsilon_{o u t}^{C}}{2} .\)       (13)

By following the same process, we can obtain the data rate of the devices in the network as follows:  \(\mathcal{r}_{\text {m,n,l}}^{\%}=\log _{2}\left(1+\mathcal{\phi}_{\text {m,n,l}}^{\%}\right)\) where \(\mathcal{r}_{\text {m,n,l}}^{\%}\)is similar to \(r_{m, n, l}\) and \(\mathcal{\phi}_{\text {m,n,l}}^{\%}\) denotes the received SINR from the HPN to CU n.

\(\mathcal{\phi}_{\text {m,n,l}}^{\%}=\frac{P_{0, n, l} \Gamma_{0, n}^{2} \varepsilon_{\text {out }}^{C} F_{0, n, l}^{-1}\left(\frac{\varepsilon_{\text {out }}^{C}}{2}\right)}{\left(\varepsilon_{\text {out }}^{C}\right)^{2} \sigma_{z}^{2}+\sum_{k \in \mathbb{N}, k \neq k \atop i \in N, i \neq n} 2\left(\left|\hat{g}_{i, n}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{i, n}^{2} P_{i, k, l}},\)       (14)

where \(\sigma_{z}^{2}\) is the variance of a random zero-mean complex additive white Gaussian noise (AWGN) variable and \(\mathcal{\phi}_{\text {m,n,l}}^{\%}\) is the received SINR from LPN m to CU n

\(\mathcal{\phi}_{\text {m,n,l}}^{\%}=\frac{P_{m, n, l} \Gamma_{m, n}^{2} \varepsilon_{o u t}^{C} F_{m, n, l}^{-1}\left(\frac{\varepsilon_{\text {out }}^{C}}{2}\right)}{\left(\varepsilon_{\text {out }}^{C}\right)^{2} \sigma_{z}^{2}+\sum_{k^{\prime} \in K, k^{\prime} \neq k \atop i \in N, i \neq n} 2\left[\left(\left|\hat{g}_{0, n, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{0, n, l}^{2} P_{0, i, l}+\left(\left|\hat{g}_{i, n, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{i, n, l}^{2} P_{i, k^{\prime}, l}\right]}\).       (15)

\(\mathcal{\phi}_{\text {m,n,l}}^{\%}\) is the received SINR of the DUs:

\(\begin{aligned} \mathcal{\phi}_{\text {n,k,l}}^{\%}=& P_{n, k, l} \Gamma_{n, k} \varepsilon_{\text {out }}^{C} F_{n, k, l}^{-1}\left(\frac{\varepsilon_{\text {out }}^{C}}{2}\right) /\left\{\left(\varepsilon_{\text {out }}^{C}\right)^{2} \sigma_{z}^{2}\right.\\ &+\sum_{i^{\prime} \in \mathrm{K}, k \neq k \atop i \in \mathrm{N}, i \neq n} 2\left[\left(\left|\hat{g}_{m, k, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{m, k, l}^{2} P_{m, n, l}\right.\\ &+\left(\left|\hat{g}_{0, k, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{0, k, l}^{2} P_{0, i, l} \\ &\left.\left.+\left(\left|\hat{g}_{i, k, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{i, k, l}^{2} P_{i, k^{\prime}, l}\right]\right\}. \end{aligned}\)       (16)

The transformed average sum rate of the network can be written as

\(\eta_{S E}(A, x, y, p)=\sum_{n=1}^{N}\left(1-\varepsilon_{\text {out }}^{C}\right) r_{k}^{\%}+\sum_{k=1}^{K}\left(1-\varepsilon_{\text {out }}^{D}\right) r_{k}^{\%}\)       (17)

For simplicity, we define \(\mathcal{E}_{\text {out }}=\mathcal{E}_{\text {out }}^{C}=\mathcal{E}_{\text {out }}^{D}\).

The optimization problem can be reformulated as

\(\begin{array}{l} \min _{A, x, y, p, \varphi} \varphi, \\ \text { s.t. } C 1-C 13, \\ \quad C 14: \omega\left(\frac{\eta_{S E}^{\max }-\eta_{S E}(A, x, y, p)}{\eta_{S E}^{\max }-\eta_{S E}^{\min }}\right) \leq \varphi, \\ \quad C 15:(1-\omega)\left(\frac{P_{t o t}}{P_{\max }}\right) \leq \varphi \end{array}\)       (18)

As the non-probabilistic optimization problem involves co-channel interference, the transformed problem is still non-convex. In the next section, we propose several resource allocation algorithms for deriving optimal solutions to the problem given by Eq. (18).

3. Proposed Algorithms for Resource Management

In this section, we divide the optimal problem into two parts. In the first part, we focus on the user scheduling and spectrum allocation subproblem. In the second part, we solve the power control subproblem for the CUs and DGs, respectively. Finally, we summarize the joint EE-SE tradeoff algorithm and present its complexity analysis.

3.1 User Association and Spectrum Allocation Algorithms

The RRH selection is based on the locations of the CUs as shown in Fig. 1, where the users selecting LPNs and the users selecting the HPN are divided by dashed lines.

After providing network access to the CUs, we consider matching the DUs and CUs. As we assume that the number of DUs is larger than the number of CUs in the system, some of the DUs may form DGs. In this section, we also assume that the power allocated to each user is a fixed value, which leads to a fixed F2. Thus, we aim to optimize F1 and maximize ηSE in this algorithm as follows:

\(\begin{array}{l} \max _{y} \eta_{S E}\left(A^{*}, x^{*}, y, p^{*}\right) \\ \text { s.t. } C 6-C 8 . \end{array}\)       (19)

In contrast to [12], which assumes a one-to-one D2D link, in this network, the number of DUs, K, is larger than the number of CUs, N. Thus, there are K DGs in it. Let W be the weight matrix of the transmission rates when the DUs reuse the SCs of different CUs. When N ≥ K ,

\(\boldsymbol{W}_{1}=\left(\begin{array}{ccc} \Omega_{1,1} & \ldots & \Omega_{1, N} \\ \ldots & \ldots & \ldots \\ \Omega_{N, 1} & \ldots & \Omega_{N, N} \\ \Omega_{N+1,1} & \ldots & \Omega_{N+1, N} \\ \ldots & \ldots & \ldots \\ \Omega_{N+K, 1} & \ldots & \Omega_{N+K, N} \end{array}\right),\)       (20)

where \(\Omega_{n, k}=r_{m, n}^{\%}+r_{n, k}^{\%}\). We employ W1 to get N one-to-one D2D pairs using the well-known Hungarian algorithm [13]. Then, we reuse the Hungarian algorithm to allocate spectrum resources to K DUs that do not match any CU, to get K DGs. As N ≥ K ,

\(\boldsymbol{W}_{2}=\left(\begin{array}{ccc} \Omega_{1,1} & \ldots & \Omega_{1, K} \\ \ldots & \ldots & \ldots \\ \Omega_{N, 1} & \ldots & \Omega_{N, K} \end{array}\right).\)       (21)

3.2 Power Allocation Algorithm

Having already addressed the user association and spectrum allocation problem, we now need to determine the unknown variable p. As the optimization problem is still a non-concave problem, it is challenging to find the global optimum; hence, we first need to further decompose it to reduce its computational complexity and then use the corresponding Lagrange function to solve it. Eq. (18) can be rewritten as

\(L\left(p, \varphi, \mu_{1}, \mu_{2}\right)=\varphi+\mu_{1}\left(\omega F_{1}(p)-\varphi\right)+\mu_{2}\left((1-\omega) F_{2}(p)-\varphi\right) .\)       (22)

where µ1 and µ2 are the Lagrangian multipliers. By rearranging (22) to get

\(\begin{array}{r} L\left(p, \varphi, \mu_{1}, \mu_{2}\right)=-\frac{\mu_{1} \omega \eta_{S E}(p)}{\eta_{S E}^{\max }-\eta_{S E}^{\min }}+\frac{\mu_{2}(1-\omega) P_{t o t}(p)}{P_{\max }} \\ +\left(1-\mu_{1}-\mu_{2}\right) \varphi+\frac{\mu_{1} \omega U_{\max }}{U_{\max }-U_{\min }}, \end{array}\)       (23)

Eq. (18) can be decomposed into two suboptimal problems, i.e., a power allocation subproblem for the CUs and a power allocation subproblem for the DGs:

\(\begin{array}{l} \min _{p} L_{1}\left(p, \mu_{1}, \mu_{2}\right) \\ \text { s.t. } C 9-C 13 \end{array}\)       (24)

where

\(L_{1}\left(p, \mu_{1}, \mu_{2}\right)=-\frac{\mu_{1} \omega \eta_{S E}(p)}{\eta_{S E}^{\max }-\eta_{S E}^{\min }}+\frac{\mu_{2}(1-\omega) P_{t o t}(p)}{P_{\max }}.\)       (25)

along with an adaptive φ selection subproblem

\(\min _{\varphi} L_{2}\left(\varphi, \mu_{1}, \mu_{2}\right)\)       (26)

where \(L_{2}\left(\varphi, \mu_{1}, \mu_{2}\right)=\left(1-\mu_{1}-\mu_{2}\right) \varphi\) . Further, Eq. (24) can be rewritten as

\(\begin{array}{l} \max _{p}-L_{1}\left(p, \mu_{1}, \mu_{2}\right) \\ \text { s.t. } C 9-C 13 \end{array}\)       (27)

where

\(-L_{1}\left(p, \mu_{1}, \mu_{2}\right)=\frac{\mu_{1} \omega \eta_{S E}(p)}{\eta_{S E}^{\max }-\eta_{S E}^{\min }}-\frac{\mu_{2}(1-\omega) P_{t o t}(p)}{P_{\max }}\)       (28)

To find the optimal power allocation solution of Eq. (27), we first jointly solve it for the CUs and DGs. Then, we allocate power to each DG by PD–NOMA if it has two receivers, i.e.,

\(\begin{array}{l} \max _{p} f_{1}\left(p, \mu_{1}, \mu_{2}\right)=\frac{\mu_{1} \omega \eta_{S E}(p)}{\eta_{S E}^{\max }-\eta_{S E}^{\min }}-\frac{\mu_{2}(1-\omega) P_{t o t}(p)}{P_{\max }}, \\ \text { s.t. } C 9, C 10 . \end{array}\)       (29)

As the total power allocated to the DGs is obtained, we only need to solve the power allocation optimization problem for maximizing the sum data rate of each DG, which is given by

\(\begin{array}{l} \max _{p} f_{2}\left(p, \mu_{1}, \mu_{2}\right)=\max _{p} R_{^{D}}^{D}, \\ \text { s.t. } C 11-C 13 . \end{array}\)       (30)

First, we focus on Eq. (29). It is difficult to obtain the global optimal solution of a non-convex problem. Hence, we use sequential convex programming (SCP) to derive local optimal solutions by solving a sequence of problems to reduce the computational complexity. The lower bound of the logarithmic function is given by [14], \(\log _{2}\left(1+\mathcal{\phi}^{\%} \geq a \log _{2}(\mathcal{\phi}^{\%})+b\right.\). where \(a=\phi^{\prime} /\left(1+\phi^{\prime}\right)\) and \(\log _{2}\left(1+\phi^{\prime}\right)-a \log _{2}\left(\phi^{\prime}\right)\). when , \(\mathcal{\phi}^{\%} = \phi^{\prime}\) the equality holds. Thus, the lower bound of \(f_{1}\left(p, \mu_{1}, \mu_{2}\right)\) is \(\left.f_{1}^{\%}( p, \mu_{1}, \mu_{2}\right)\) By the SINR of each user we get:

\(\mathcal{\phi}_{\text {0,n,l}}^{\%}=\frac{\Gamma_{0, n}^{2} \varepsilon_{o u t} F_{0, n, l}^{-1}\left(\frac{\varepsilon_{\text {out }}}{2}\right)}{\varepsilon_{\text {out }}^{2} \sigma_{z}^{2}+\sum_{k^{\prime} \in \mathrm{K}, k \neq k \atop i \in \mathrm{N}, i \neq n} 2\left(\left|\hat{g}_{i, n, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{i, n}^{2} P_{i, k, l}},\)       (31)

\(\mathcal{\phi}_{\text {0,n,l}}^{\%}=\frac{\Gamma_{m, n}^{2} \varepsilon_{\text {out }} F_{m, n, l}^{-1}\left(\frac{\varepsilon_{\text {out }}}{2}\right)}{\varepsilon_{\text {out }}^{2} \sigma_{z}^{2}+\sum_{k^{\prime} \in \mathrm{K}, k^{\prime} \neq k} 2\left[\left(\left|\hat{g}_{0, n, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{0, n, l}^{2} P_{0, i, l}+\left(\left|\hat{g}_{i, n, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{i, n, l}^{2} P_{i, k, l}\right]},\)       (32)

\(\mathcal{\phi}_{\text {n,k,l}}^{\%}=\frac{\Gamma_{n, k} \varepsilon_{o u t} F_{n, k, l}^{-1}\left(\frac{\varepsilon_{o u t}}{2}\right)}{\varepsilon_{\text {out }}^{2} \sigma_{z}^{2}+\sum_{k \in K, k \neq k \atop i \in N, i \neq n} 2\left[\left(\left|\hat{g}_{m, k, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{m, k, l}^{2} P_{m, n, l}+\left(\left|\hat{g}_{0, k, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{0, k, l}^{2} P_{0, i, l}+\left(\left|\hat{g}_{i, k, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{i, k, l}^{2} P_{i, k^{\prime}, I}\right]} .\)       (33)

Considering the constrains as KKT conditions, we can obtain the Lagrangian function as

\(\begin{aligned} L_{n}^{C}=& \frac{\sum_{n}\left(1-\varepsilon_{\text {out }}\right) a_{n}^{C} \mu_{1} \omega \log _{2} \mathcal{\phi}_{\text {n}}^{\%}+\left(1-\varepsilon_{\text {out }}\right) \mu_{1} \omega b_{n}^{C}}{\eta_{S E}^{\max }-\eta_{S E}^{\min }}-\frac{\mu_{2}(1-\omega) P_{\text {tot }}}{P_{\max }} \\ &+\lambda_{1, n}\left(\mathcal{\phi}_{\text {n}}^{\%}-\phi_{\text {thr }}^{C}\right)+\lambda_{2, n}\left(P_{\max }^{C}-\sum_{n} P_{n}\right) \end{aligned}\)       (34)

for CU n and

\(\begin{aligned} L_{k}^{D}=& \frac{\sum_{k}\left(1-\varepsilon_{\text {out }}\right) a_{k}^{D} \mu_{1} \omega \log _{2} \mathcal{\phi}_{\text {k}}^{\%}+\left(1-\varepsilon_{\text {out }}\right) \mu_{1} \omega b_{k}^{D}}{\eta_{S E}^{\max }-\eta_{S E}^{\min }}-\frac{\mu_{2}(1-\omega) P_{\text {tot }}}{P_{\max }} \\ &+\lambda_{1, k}\left(\mathcal{\phi}_{\text {k}}^{\%}-\phi_{\text {thr }}^{D}\right)+\lambda_{2, k}\left(P_{\max }^{D}-\sum_{k} P_{k}\right) \end{aligned}\)       (35)

for DG k, where \(a_{n}^{C}\)\(b_{n}^{C}\)\(a_{k}^{D}\), and \(b_{k}^{D}\) are the indexes for the CUs and DGs from SCP. Further, \(P_{\max }^{C}\) and \(P_{\max }^{D}\) are the predefined maximum power that a user can receive for every CU and DG, respectively, while λ1 and λ2 are the Lagrangian multipliers.

To solve Eqs. (34) and (35), we decompose the problem into an inner layer and an outer layer. In the inner layer of the power allocation algorithm, we first fix the Lagrange multipliers, and the problem is transformed into a standard convex optimization problem with KKT conditions. By deduction and simplification, the optimal power allocation policy of CU n and DG k in theθ -th iteration can be derived as

\(P_{n}(\theta+1)=\frac{\left(1-\varepsilon_{\text {out }}\right) a_{n}^{C}(\theta) \mu_{1}(\theta) \omega}{\ln 2\left(\eta_{S E}^{\max }-\eta_{S E}^{\min }\right)\left[\lambda_{2, n}(\theta)+\frac{\lambda_{2, n}(\theta)(1-\omega)}{P_{\max }^{C}}-\lambda_{1, n}(\theta) \mathcal{\phi}_{\text {n}}^{\%}(\theta)\right]}\),       (36)

\(P_{k}(\theta+1)=\frac{\left(1-\varepsilon_{\text {out }}\right) a_{k}^{D}(\theta) \mu_{1}(\theta) \omega}{\ln 2\left(\eta_{S E}^{\max }-\eta_{S E}^{\min }\right)\left[\lambda_{2, k}(\theta)+\frac{\lambda_{2, k}(\theta)(1-\omega)}{P_{\max }^{D}}-\lambda_{1, k}(\theta) {\phi}_{\text {k}}^{\%}(\theta)\right]}\),       (37)

As for the outer layer, using the power allocation scheme, we can obtain the variables on the basis of gradient descent, and the Lagrange multipliers can be updated by

\(\lambda_{1, n}(\theta+1)=\left[\lambda_{1, n}(\theta)+v(\theta)\left(\phi_{n}^{\%}-\phi_{t h r}^{C}\right)\right]^{+}\),       (38)

\(\lambda_{2, n}(\theta+1)=\left[\lambda_{2, n}(\theta)+v(\theta)\left(P_{\max }^{C}-\sum_{k} P_{n,}\right)\right]^{+}\),       (39)

\(\lambda_{1, k}(\theta+1)=\left[\lambda_{1}(\theta)+v(\theta)\left({\phi}_{k}^{\%}-\phi_{t h r}^{D}\right)\right]^{+}\),       (40)

\(\lambda_{2, k}(\theta+1)=\left[\lambda_{2, k}(\theta)+v(\theta)\left(P_{\max }^{D}-\sum_{k} P_{k,}\right)\right]^{+}\),       (41)

along with

\(\mu_{1}(\theta+1)=\left[\mu_{1}(\theta)+v(\theta)\left(\omega \frac{\eta_{S E}^{\max }-\eta_{S E}(\theta+1)}{\eta_{S E}^{\max }-\eta_{S E}^{\min }}-\varphi(\theta+1)\right)\right]^{+}\),       (42)

and

\(\mu_{2}(\theta+1)=\left[\mu_{2}(\theta)+v(\theta)\left((1-\omega) \frac{P_{\text {tot }}(\theta+1)}{P_{\max }}-\varphi(\theta+1)\right)\right]^{+}\),       (43)

where \(v(\theta)=0.1 / \sqrt{\theta}\). The optimal solution of Eq. (63) can be obtained by

\(\varphi(\theta+1)=\max \left\{\omega F_{1}(p(\theta+1)),(1-\omega) F_{2}(p(\theta+1))\right\} .\)       (44)

The proposed iterative power allocation algorithm based on SCP is outlined in Algorithm 1.

Algorithm.1.JPG 이미지

Similarly, we use SCP to solve the power allocation problem for K DGs in the network, which is also a non-convex problem.

The objective function in Eq. (30) can be rewritten as

\(\max _{, s_{k 2}} \beta_{sum}^{\%}=\left(1-\varepsilon_{\text {out }}\right) \sum_{k=1}^{K} \log _{2}\left(1+ \phi_{k}^{\%}\right),\)       (45)

where sk1 and sk2 are the power allocation coefficients for the two receivers in DG k.

As proved in [14], we have

\(\log _{2}\left(1+\phi_{k}^{\%}\right) \geq c_{k} \log _{2} \phi_{k}^{\%}+d_{k}\),       (46)

where ck is defined as

\(c_{k}=\frac{\phi_{k}^{\prime}}{1+\phi_{k}^{\prime}}\),       (47)

and dkis defined as

\(d_{k}=\log _{2}\left(1+\phi_{k}^{\prime}\right)-\frac{\phi_{k}^{\prime}}{1+\phi_{k}^{\prime}} \log _{2} \phi_{k}^{\prime} \).       (48)

The equality is satisfied when \(\phi_{k}^{\%}=\phi_{k}^{\prime}\).

From Eqs. (46), the lower bound of the target function in Eq. (45) can be expressed as

\(R_{\text {sum }}^{\%} \geq\left(1-\varepsilon_{\text {out }}\right) \sum_{k=1}^{K} \Theta_{k}\)       (49)

where Θk can be defined as \(\Theta_{k}=c_{k} \log _{2} \phi_{k}^{\%}+d_{k}\)\(\forall k\).

We can obtain a new optimization problem from Eqs. (30) and (46) as follows:

\(\begin{array}{l} \max _{p} f_{2}\left(p, \mu_{1}, \mu_{2}\right)=\max _{p} R^{D}=\max _{s_{k}, s_{k 2}} \sum_{k=1}^{K} \Theta_{k}, \\ \text { s.t. } C 11-C 13 . \end{array}\)      (50)

It can be proved that the newly formulated problem is a concave problem [3]. For each Θk , we can get \(\phi_{n,k,l}^{\%}\), which denotes the SINR of DU k1 in DG k according to Eq. (22).

\(\begin{aligned} \phi_{n, k 1, l}^{\%}=& P_{n, k 1, l} \Gamma_{n, k 1} \varepsilon_{\text {out }} F_{n, k, l}^{-1}\left(\frac{\varepsilon_{\text {out }}}{2}\right) /\left\{\varepsilon_{\text {out }}^{2} \sigma_{z}^{2}\right.\\ &+\sum_{k^{\prime} \in \mathbb{K}, k \neq k \atop i \in N, i \neq n} 2\left[\left(\left|\hat{g}_{m, k, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{m, k 1, l}^{2} P_{m, n, l}\right.\\ &+\left(\left|\hat{g}_{0, k 1, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{0, k 1, l}^{2} P_{0, i, l} \\ &\left.\left.+\left(\left|\hat{g}_{i, k l, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{i, k 1, l}^{2} P_{i, k^{\prime}, l}\right]\right\} \end{aligned}\)       (51)

Similarly, we can get \(\phi_{n, k 2, l}^{\%}\) , which denotes the SINR of DU k2 in DG k.

\(\begin{array}{l} \mathscr{\phi}_{n, k 2, l}^{\%}=P_{n, k 2, l} \Gamma_{n, k 2} \varepsilon_{\mathrm{out}} F_{n, k 2, l}^{-1}\left(\frac{\varepsilon_{\mathrm{out}}}{2}\right) /\left\{\varepsilon_{\mathrm{out}}^{2} \sigma_{z}^{2}\right. \\ +\sum_{k \in \mathrm{K}, k \neq k \atop i \in \mathrm{N}, i \neq n} 2\left[\left(\left|\hat{g}_{m, k 2, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{m, k 2, l}^{2} P_{m, n, l}+\left(\left|\hat{g}_{0, k 2, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{0, k 2, l}^{2} P_{0, i, l}\right. \\ \left.\left.+\left(\left|\hat{g}_{i, k 2, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{i, k 2, l}^{2} P_{i, k^{\prime}, l}+\left(\left|\hat{g}_{k 1}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{k 1, k 2}^{2} P_{k 1}\right]\right\}. \end{array}\)       (52)

Then, we derive the SINR of each DG and get the following results:

\(\phi_{n, k 1, l}^{\%}=\frac{\Gamma_{n, k 1} \varepsilon_{\text {out }} F_{n, k 1, l}^{-1}\left(\frac{\varepsilon_{\text {out }}}{2}\right)}{\varepsilon_{\text {out }}^{2} \sigma_{z}^{2}+\sum_{k^{\prime} \in K, k \neq k \atop i \in N, i \neq n} 2\left[\left(\left|\hat{g}_{m, k 1, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{m, k 1, l}^{2} P_{m, n, l}+\left(\left|\hat{g}_{0, k 1, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{0, k 1, l}^{2} P_{0, i, l}+\left(\left|\hat{g}_{i, k, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{i, k, l}^{2} P_{i, k^{\prime}, l}\right]}.\)       (53)

\(\begin{array}{l} \phi_{n, k 2, l}^{\%}=\Gamma_{n, k 2} \varepsilon_{\text {out }} F_{n, k, l}^{-1}\left(\frac{\varepsilon_{\text {out }}}{2}\right) /\left\{\varepsilon_{\text {out }}^{2} \sigma_{z}^{2}\right. \\ +\sum_{k^{\prime} \in K, k \neq k \\ i \in N, i \neq n} 2\left[\left(\left|\hat{g}_{m, k, k}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{m, k, l}^{2} P_{m, n, l}+\left(\left.\hat{g}_{0, k 2, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{0, k 2, l}^{2} P_{0, i, l}\right. \\ \left.\left.+\left(\left|\hat{g}_{i, k, 2, l}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{i, k, l}^{2} P_{i, k, l}+\left(\left|\hat{g}_{k 1}\right|^{2}+\sigma_{e}^{2}\right) \Gamma_{k 1, k 2}^{2} P_{k 1}\right]\right\} . \end{array}\)       (54)

Considering the constrains as KKT conditions, we obtain the Lagrangian function as

\(L_{k}^{D}=\sum_{k}\left(1-\varepsilon_{\text {out }}\right) a_{k}^{D} \log _{2} \phi_{k}^{\%}+\left(1-\varepsilon_{\text {out }}\right) b_{k}^{D}+\lambda_{1}\left(\phi_{k}^{\%}-\phi_{\text {thr }}^{D}\right)+\lambda_{2}\left(P_{\max }^{D}-\sum_{k} P_{k}\right)\)       (55)

The power of the two users in DG k in the θ -th iteration can be derived as

\(P_{k 1}(\theta+1)=\left(1-\varepsilon_{\text {out }}\right) a_{k 1}^{D}(\theta) /\left(\ln 2\left(\lambda_{2}(\theta)+\frac{\lambda_{2}(\theta)(1-\omega)}{P_{\max }^{D}}-\lambda_{1, k 1}(\theta) \phi_{k 1}^{\%}(\theta)\right)\right),\)       (56)

\(P_{k 2}(\theta+1)=\left(1-\varepsilon_{\text {out }}\right) a_{k 2}^{D}(\theta) /\left(\ln 2\left(\lambda_{2}(\theta)+\frac{\lambda_{2}(\theta)(1-\omega)}{P_{\max }^{D}}-\lambda_{1, k 2}(\theta) \phi_{k 2}^{\%}(\theta)\right)\right),\)       (57)

As for the outer layer, using the power allocation scheme, we can obtain the variables on the basis of gradient descent, and the Lagrange multipliers can be updated by

\(\lambda_{1, k 1}(\theta+1)=\left[\lambda_{1, k 1}(\theta)+v(\theta)\left(\phi_{k 1}^{\%}(\theta+1)-\phi_{t h r}^{D}\right)\right]^{+},\)       (58)

\(\lambda_{1, k 2}(\theta+1)=\left[\lambda_{1, k 2}(\theta)+v(\theta)\left(\phi_{k 2}^{\%}(\theta+1)-\phi_{t h r}^{D}\right)\right]^{+},\)       (59)

and

\(\lambda_{2}(\theta+1)=\left[\lambda_{2}(\theta)+v(\theta)\left(P_{\max }^{D}-\sum_{k} P_{k}\right)\right]^{+}.\)       (60)

The proposed iterative power allocation algorithm for DGs, which is based on SCP, is outlined in Algorithm 2.

Algorithm.2.JPG 이미지

3.3 Complexity Analysis

Through the spectrum allocation problem , we compute the weights in each bipartite graph NK times. Suppose that we have I1 and I2 iterations for Algorithm 1 and Algorithm 2, respectively. In each iteration, the algorithms perform 4(N + K + + 1) and 10K + 1computations for updating each variable, respectively. Let the maximum time for computing any variable be tmax . Therefore, in summary, the overall computational complexity of the proposed algorithm is o(tmax)(NK + 4(N+K+1)+10K+1).

4. Simulation Results

In this section, we evaluate the performance of the proposed algorithm for the H-CRAN system with imperfect CSI. The specific parameter settings are summarized in Table 2 [15].

Table 2. Simulation parameters

4.1 Convergence Performance

The power allocation coefficient of each user is plotted against the number of iterations of Algorithm 1 in Fig. 2. The results in Fig. 2 are averaged over 1000 independent adaptation processes with different distributions of users in one cell. It can be observed that with ∆ = 0.01 , the proposed algorithm achieves fast converge within 10 iterations, on average.

Fig. 2. EE vs. number of iterations of Algorithm 1

Fig. 3 shows the cumulative distribution function (CDF) of the number of iterations of Algorithm 2 for power allocation of the DGs with imperfect CSI. As can be seen, the network EE becomes stable within around 10 iterations and the changing speed gradually decreases after 5 iterations, on average. Thus, from Fig. 2 and Fig. 3, we can observe the convergence of the power allocation algorithms with different parameters.

Fig. 3. CDF of the number of iterations of Algorithm 2

4.2 Performance Comparison of EE-SE Tradeoff in Different Communication Networks

Fig. 4 shows the performance comparison of the EE-SE tradeoff in different communication networks, where the weighting parameter ω is adjusted from 0.1 to 1. The EEs of the proposed algorithms are plotted against the system SE in four scenarios: NOMA-enhanced H-CRAN, C-RAN without D2D communications in NOMA, H-CRAN in OMA without DGs, and C-RAN in OMA without D2D. From Fig. 9, the EE of the network first increases with the system SE and then decreases after reaching its highest value, which lies between 1000 bit/s/Hz and 1050 bit/s/Hz. Because of the optimal network structure, the interference between different RRHs can be managed effectively, which causes the EE of the entire system to increase. In addition, PD–NOMA based on the D2D scheme achieves a higher data rate than the conventional OMA and the scheme without D2D at the same EE.

Fig. 4. EE-SE tradeoff in different types of communication networks​​​​​​​

4.3 Performance Comparison of EE-SE Tradeoff with Different RRH Distributions

Fig. 5 shows the EE-SE tradeoff performance, where the weighting parameterω is adjusted from 0.1 to 1 when the LPNs have different locations as shown in Fig. 10 with 40 users in the network. Because of the optimal network structure in the proposed H-CRAN model, the interference between different RRHs is weakened, which causes the EE to increase compared to other distributions. In addition, it can be seen that among the four scenarios, PD–NOMA with perfect CSI achieves a remarkable performance gain compared to that with imperfect CSI. When the transmitted SE is 1050 bit/s/Hz, the proposed algorithm with perfect CSI achieves 33.1% and 23.5% EE gain over the algorithm with imperfect CSI under two different RRH distributions, respectively.

Fig. 5. EE-SE tradeoff with different LPN distributions

4.4 Performance Comparison of EE-SE Tradeoff with Different Numbers of Users

Fig. 6 plots the EE of the proposed algorithm against the SE for different numbers of users (40 to 70 devices). From Fig. 8, the EE decreases as the number of users in the same H-CRAN increases. Because of the increasing number of users, the probability of the DGs receiving greater interference from the CUs and other DGs increases, which leads to a monotonous decrease in the data rates with increasing N and K . Further, according to Eqs. (59), (60), and (61), there is greater interference in the SINR of each user.

Fig. 6. EE-SE tradeoff with different numbers of users

4.5 Performance Comparison of EE-SE Tradeoff with Different Energy Consumptions

Fig. 7 shows the performance comparison of the EE-SE tradeoff with different transmission powers from the RRHs. After achieving the maximum EE of the proposed algorithm with different transmission powers of H-CRAN, the system suffers a sudden decrease in EE as the SE increases, because the system resources for optimizing the network structure and interference management have been consumed. If the users aim to further improve the network SE, the energy consumption and circuit loss will become extremely high, which will result in the scenario described above. Thus, the system soon achieves its maximum SE.

Fig. 7. EE-SE tradeoff with different energy consumptions

4.6 Performance Comparison of EE-SE Tradeoff with Different Noise Power

Fig. 8 plots the EE of the proposed algorithm against \(\sigma_{e}^{2}\) with three different \(\sigma_{z}^{2}\) values. It can be seen that the EE of the network gradually decreases as \(\sigma_{e}^{2}\) increases. Further, the speed changes from high to low because of the increasing \(\sigma_{e}^{2}\) and \(\sigma_{z}^{2}\) , which indicates that the probability of the users receiving additional interference from the network increases. Consequently, the EE of the entire system decreases.

Fig. 8. EE versus \(\sigma_{e}^{2}\)

5. Conclusion

This paper proposed a general framework for studying the resource allocation problem and the EE-SE tradeoff for downlink traffic in PD-NOMA and D2D-based H-CRANs under imperfect CSI. The problem was formulated as an MOO problem that can be solved using the weighted Tchebycheff method. As the problem is a mixed-integer non-convex problem with outage probability constraints, we transformed it into a non-probability problem and separately solved the problems of user association and power coordination. First, we proposed fully optimized user association and spectrum allocation algorithms based on the Hungarian algorithm. Then, two power allocation algorithms with SCP were proposed to reduce the computational complexity. In addition, we used the Lagrangian method with KKT conditions to find the global optimum with fast convergence based on the subgradient method. Finally, the results of numerical simulations in different scenarios demonstrated that the PD-NOMA technique and H-CRAN with D2D communications enable the system to achieve a good EE-SE tradeoff.

References

  1. H. Haci, H. Zhu and J. Wang, "Performance of Non-orthogonal Multiple Access With a Novel Asynchronous Interference Cancellation Technique," IEEE Transactions on Communications, vol. 65, no. 3, pp. 1319-1335, March 2017. https://doi.org/10.1109/TCOMM.2016.2640307
  2. F. Zhou, Y. Wu, R. Q. Hu, Y. Wang and K. K. Wong, "Energy-Efficient NOMA Enabled Heterogeneous Cloud Radio Access Networks," IEEE Network, vol. 32, no. 2, pp. 152-160, March-April 2018. https://doi.org/10.1109/mnet.2017.1700208
  3. J. Zhao, Y. Liu, K. K. Chai, Y. Chen and M. Elkashlan, "Joint Subchannel and Power Allocation for NOMA Enhanced D2D Communications," IEEE Transactions on Communications, vol. 65, no. 11, pp. 5081-5094, Nov 2017. https://doi.org/10.1109/TCOMM.2017.2741941
  4. A. Mokdad, P. Azmi, N. Mokari, M. Moltafet and M. Ghaffari-Miab, "Cross-Layer Energy Efficient Resource Allocation in PD-NOMA Based H-CRANs: Implementation via GPU," IEEE Transactions on Mobile Computing, vol. 18, no. 6, pp. 1246-1259, 1 June 2019. https://doi.org/10.1109/TMC.2018.2860985
  5. A. Paul, A. Banerjee and S. P. Maity, "Throughput maximisation in cognitive radio networks with residual bandwidth," IET Communications, vol. 13, no. 10, pp. 1327-1335, 25 June 2019. https://doi.org/10.1049/iet-com.2018.5928
  6. T. Yang, R. Zhang, X. Cheng and L. Yang, "Secure Massive MIMO Under Imperfect CSI: Performance Analysis and Channel Prediction," IEEE Transactions on Information Forensics and Security, vol. 14, no. 6, pp. 1610-1623, June 2019. . https://doi.org/10.1109/TIFS.2018.2883150
  7. F. Fang, H. Zhang, J. Cheng, S. Roy and V. C. M. Leung, "Joint User Scheduling and Power Allocation Optimization for Energy-Efficient NOMA Systems With Imperfect CSI," IEEE Journal on Selected Areas in Communications, vol. 35, no. 12, pp. 2874-2885, Dec. 2017. https://doi.org/10.1109/JSAC.2017.2777672
  8. Maity S.P., Paul A. "On Joint Maximization in Energy and Spectral Efficiency in Cooperative Cognitive Radio Networks," Multi-Objective Optimization, Springer, Singapore, pp. 141-157, 2018.
  9. Y. Hao, Q. Ni, H. Li and S. Hou, "On the Energy and Spectral Efficiency Tradeoff in Massive MIMO-Enabled HetNets With Capacity-Constrained Backhaul Links," IEEE Transactions on Communications, vol. 65, no. 11, pp. 4720-4733, Nov. 2017. https://doi.org/10.1109/TCOMM.2017.2730867
  10. L. Kleinrock, Queuing Systems, Hoboken, Wiley, NJ, 1975.
  11. X. Wang, F. Zheng, P. Zhu and X. You, "Energy-Efficient Resource Allocation in Coordinated Downlink Multicell OFDMA Systems," IEEE Transactions on Vehicular Technology, vol. 65, no. 3, pp. 1395-1408, Mar. 2016. https://doi.org/10.1109/TVT.2015.2413950
  12. L. Wang, H. Tang, H. Wu and G. L. Stuber, "Resource Allocation for D2D Communications Underlay in Rayleigh Fading Channels," IEEE Transactions on Vehicular Technology, vol. 66, no. 2, pp. 1159-1170, Feb. 2017. https://doi.org/10.1109/TVT.2016.2553124
  13. A. Gjendemsjo, D. Gesbert, G. E. Oien and S. G. Kiani, "Binary Power Control for Sum Rate Maximization over Multiple Interfering Links," IEEE Transactions on Wireless Communications, vol. 7, no. 8, pp. 3164-3173, August 2008. https://doi.org/10.1109/TWC.2008.070227
  14. J. Papandriopoulos and J. S. Evans, "Low-Complexity Distributed Algorithms for Spectrum Balancing in Multi-User DSL Networks," in Proc. of 2006 IEEE International Conference on Communications, Istanbul, pp. 3270-3275, 2006.
  15. S. Chatterjee, S. P. Maity and T. Acharya, "Energy-Spectrum Efficiency Trade-Off in Energy Harvesting Cooperative Cognitive Radio Networks," IEEE Transactions on Cognitive Communications and Networking, vol. 5, no. 2, pp. 295-303, June 2019. https://doi.org/10.1109/TCCN.2019.2903503

Cited by

  1. Non-Orthogonal Multiple Access for Unicast and Multicast D2D: Channel Assignment, Power Allocation and Energy Efficiency vol.21, pp.10, 2020, https://doi.org/10.3390/s21103436