resource optimization and power allocation in in-band full … · 2017-06-20 · channel allocation...

15
1 Resource Optimization and Power Allocation in In-band Full Duplex (IBFD)-Enabled Non-Orthogonal Multiple Access Networks Mohammed S. Elbamby, Student Member, IEEE, Mehdi Bennis, Senior Member, IEEE, Walid Saad, Senior Member, IEEE, Mérouane Debbah, Fellow, IEEE, and Matti Latva-aho, Senior Member, IEEE Abstract—In this paper, the problem of uplink (UL) and downlink (DL) resource optimization, mode selection and power allocation is studied for wireless cellular networks under the assumption of in-band full duplex (IBFD) base stations, non- orthogonal multiple access (NOMA) operation, and queue sta- bility constraints. The problem is formulated as a network utility maximization problem for which a Lyapunov framework is used to decompose it into two disjoint subproblems of auxiliary variable selection and rate maximization. The latter is further decoupled into a user association and mode selection (UAMS) problem and a UL/DL power optimization (UDPO) problem that are solved concurrently. The UAMS problem is modeled as a many-to-one matching problem to associate users to small cell base stations (SBSs) and select transmission mode (half/full- duplex and orthogonal/non-orthogonal multiple access), and an algorithm is proposed to solve the problem converging to a pairwise stable matching. Subsequently, the UDPO problem is formulated as a sequence of convex problems and is solved using the concave-convex procedure. Simulation results demonstrate the effectiveness of the proposed scheme to allocate UL and DL power levels after dynamically selecting the operating mode and the served users, under different traffic intensity conditions, network density, and self-interference cancellation capability. The proposed scheme is shown to achieve up to 63% and 73% of gains in UL and DL packet throughput, and 21% and 17% in UL and DL cell edge throughput, respectively, compared to existing baseline schemes. Index Terms—Interference management, Lyapunov optimiza- tion, matching theory, power optimization, resource allocation, successive interference cancellation Manuscript received January 27, 2017; revised April 21, 2017; Ac- cepted May 22, 2017. This research has been supported by TEKES grant 2364/31/2014, the Academy of Finland CARMA project, the U.S. National Science Foundation under Grant CNS-1460316, and the ERC Starting Grant 305123 MORE (Advanced Mathematical Tools for Complex Network Engi- neering). The authors would like to thank Kien-Giang Nguyen and Trung Kien Vu for their constructive comments Mohammed S. Elbamby, Mehdi Bennis, and Matti Latva-aho are with the Centre for Wireless Communications, University of Oulu, Finland, email: {mohammed.elbamby,mehdi.bennis,matti.latva-aho}@oulu.fi. Mehdi Bennis is also with the Department of Computer Engineering, Kyung Hee University, South Korea. Walid Saad is with the Wireless@VT, Bradley Department of Electri- cal and Computer Engineering, Virginia Tech, Blacksburg, VA, USA, email: [email protected]. Mérouane Debbah is with the Large Networks and System Group (LANEAS), CentraleSupélec, Université Paris-Saclay, Gif- sur-Yvette, France, and also with the Mathematical and Algorith- mic Sciences Lab, Huawei France, Paris, France, email: mer- [email protected]. I. I NTRODUCTION AND RELATED WORK Due to the rapid increase in the demand for wireless data traffic, there has been substantial recent efforts to develop new solutions for improving the capacity of wireless cellular networks, by enhancing the access to the scarce radio spec- trum resources [1]. In view of the scarcity of the frequency resources, smart duplexing, resource allocation, and interfer- ence management schemes are crucial to utilize the available resources in modern cellular networks and satisfy the needs of their users. In-band full duplex (IBFD) communication has the poten- tial of doubling the resource utilization of cellular networks through transmitting in the uplink (UL) and downlink (DL) directions using the same time and frequency resources. How- ever, this comes at the cost of experiencing higher levels of interference, not the least of which is the self-interference (SI) leaked from the transmitter to the receiver of a IBFD radio. Moreover, IBFD cellular networks suffer from addi- tional interference generated from having base stations and users transmitting on the same channel. These interference types, namely, DL-to-UL interference and UL-to-DL interfer- ence significantly degrade the performance of IBFD networks. Figure 1 (a) illustrates desired and interference signals in a FD-enabled base station. Recent results have shown significant advances in the SI cancellation of wireless IBFD radios, putting full duplex (FD) operation in wireless cellular networks within reach. By employing a combination of analog and digital cancellation techniques [2], [3], it was shown that as much as 110 dB of SI cancellation is achieved. Another approach to avoid SI is to emulate a FD base station using two spatially separated and coordinated half duplex (HD) base stations [4]. The performance of FD is investigated in [5], [6] using tools from stochastic geometry. In [5], the combined effect of SI and FD interference is analyzed. Throughput analysis are conducted in [6] with respect to network density, interference and SI levels. A system-level simulation study of the performance of IBFD ultra-dense small cell networks is conducted in [7]. The study concludes that FD may be useful for asymmetric traffic conditions. However, none of these studies take into account user selection and power allocation, which are key factors to mitigate interference in a IBFD environment. To further increase the utilization of frequency resources, the possibility of multiple users sharing the same channel arXiv:1706.05583v1 [cs.IT] 17 Jun 2017

Upload: others

Post on 11-Apr-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

1

Resource Optimization and Power Allocation inIn-band Full Duplex (IBFD)-Enabled

Non-Orthogonal Multiple Access NetworksMohammed S. Elbamby, Student Member, IEEE, Mehdi Bennis, Senior Member, IEEE,

Walid Saad, Senior Member, IEEE, Mérouane Debbah, Fellow, IEEE, and Matti Latva-aho, Senior Member, IEEE

Abstract—In this paper, the problem of uplink (UL) anddownlink (DL) resource optimization, mode selection and powerallocation is studied for wireless cellular networks under theassumption of in-band full duplex (IBFD) base stations, non-orthogonal multiple access (NOMA) operation, and queue sta-bility constraints. The problem is formulated as a networkutility maximization problem for which a Lyapunov frameworkis used to decompose it into two disjoint subproblems of auxiliaryvariable selection and rate maximization. The latter is furtherdecoupled into a user association and mode selection (UAMS)problem and a UL/DL power optimization (UDPO) problemthat are solved concurrently. The UAMS problem is modeledas a many-to-one matching problem to associate users to smallcell base stations (SBSs) and select transmission mode (half/full-duplex and orthogonal/non-orthogonal multiple access), and analgorithm is proposed to solve the problem converging to apairwise stable matching. Subsequently, the UDPO problem isformulated as a sequence of convex problems and is solved usingthe concave-convex procedure. Simulation results demonstratethe effectiveness of the proposed scheme to allocate UL andDL power levels after dynamically selecting the operating modeand the served users, under different traffic intensity conditions,network density, and self-interference cancellation capability. Theproposed scheme is shown to achieve up to 63% and 73% of gainsin UL and DL packet throughput, and 21% and 17% in ULand DL cell edge throughput, respectively, compared to existingbaseline schemes.

Index Terms—Interference management, Lyapunov optimiza-tion, matching theory, power optimization, resource allocation,successive interference cancellation

Manuscript received January 27, 2017; revised April 21, 2017; Ac-cepted May 22, 2017. This research has been supported by TEKES grant2364/31/2014, the Academy of Finland CARMA project, the U.S. NationalScience Foundation under Grant CNS-1460316, and the ERC Starting Grant305123 MORE (Advanced Mathematical Tools for Complex Network Engi-neering). The authors would like to thank Kien-Giang Nguyen and TrungKien Vu for their constructive comments

Mohammed S. Elbamby, Mehdi Bennis, and Matti Latva-aho are with theCentre for Wireless Communications, University of Oulu, Finland,email: mohammed.elbamby,mehdi.bennis,[email protected] Bennis is also with the Department of Computer Engineering, KyungHee University, South Korea.

Walid Saad is with the Wireless@VT, Bradley Department of Electri-cal and Computer Engineering, Virginia Tech, Blacksburg, VA, USA,email: [email protected].

Mérouane Debbah is with the Large Networks and SystemGroup (LANEAS), CentraleSupélec, Université Paris-Saclay, Gif-sur-Yvette, France, and also with the Mathematical and Algorith-mic Sciences Lab, Huawei France, Paris, France, email: [email protected].

I. INTRODUCTION AND RELATED WORK

Due to the rapid increase in the demand for wireless datatraffic, there has been substantial recent efforts to developnew solutions for improving the capacity of wireless cellularnetworks, by enhancing the access to the scarce radio spec-trum resources [1]. In view of the scarcity of the frequencyresources, smart duplexing, resource allocation, and interfer-ence management schemes are crucial to utilize the availableresources in modern cellular networks and satisfy the needsof their users.

In-band full duplex (IBFD) communication has the poten-tial of doubling the resource utilization of cellular networksthrough transmitting in the uplink (UL) and downlink (DL)directions using the same time and frequency resources. How-ever, this comes at the cost of experiencing higher levels ofinterference, not the least of which is the self-interference(SI) leaked from the transmitter to the receiver of a IBFDradio. Moreover, IBFD cellular networks suffer from addi-tional interference generated from having base stations andusers transmitting on the same channel. These interferencetypes, namely, DL-to-UL interference and UL-to-DL interfer-ence significantly degrade the performance of IBFD networks.Figure 1 (a) illustrates desired and interference signals in aFD-enabled base station.

Recent results have shown significant advances in the SIcancellation of wireless IBFD radios, putting full duplex(FD) operation in wireless cellular networks within reach. Byemploying a combination of analog and digital cancellationtechniques [2], [3], it was shown that as much as 110 dB ofSI cancellation is achieved. Another approach to avoid SI isto emulate a FD base station using two spatially separatedand coordinated half duplex (HD) base stations [4]. Theperformance of FD is investigated in [5], [6] using tools fromstochastic geometry. In [5], the combined effect of SI and FDinterference is analyzed. Throughput analysis are conductedin [6] with respect to network density, interference and SIlevels. A system-level simulation study of the performance ofIBFD ultra-dense small cell networks is conducted in [7]. Thestudy concludes that FD may be useful for asymmetric trafficconditions. However, none of these studies take into accountuser selection and power allocation, which are key factors tomitigate interference in a IBFD environment.

To further increase the utilization of frequency resources,the possibility of multiple users sharing the same channel

arX

iv:1

706.

0558

3v1

[cs

.IT

] 1

7 Ju

n 20

17

Page 2: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

2

(c) DL NOMA mode

U5 U6

p5<p6

h5>h6

(b) UL NOMA mode

p3h3>p4h4

U3U4

SI

DL SBS UL SBS

FD SBS

(a) Full duplex mode

...UL

DL

Time frame

1 2 3

U1U2

U5U6

U3U4

U2

U1

Decoded assuming

U4 data is noiseDecoded after U3

Decodes U6 data first treats U5 data as noise

Figure 1. An illustration of (a) FD (b) UL NOMA and (c) DL NOMAoperations, UDI: UL-to-DL interference, DUI: DL-to-UL interference and SI:self-interference.

by exploiting differences in the power domain has recentlybeen proposed in the context of non-orthogonal multipleaccess (NOMA) [8]. Different from orthogonal multiple access(OMA) schemes, NOMA allows multiple users to occupythe same channel, whereas multi-user detection methods,such as successive interference cancellation (SIC) are usedto decode users’ messages [9]. In DL NOMA, users withhigher channel gains can decode and cancel messages ofusers with lower channel gains before decoding their ownmessages, whereas users with lowest channel gains decodetheir messages first, treating other users’ messages as noise.In UL NOMA, base station performs successive decoding andcancellation of different users data, ranked by their channelstrength. The UL and DL NOMA operation is illustratedfor a two-user case in Figure 1 (b) and (c), respectively.The decoding order as well as the power allocation are keyfactors that affect the performance of NOMA. Since NOMAcomes with an additional receiver complexity for the decodingphase, practical limitations on the maximum number of usersoperating in NOMA must be considered. The combination ofUL NOMA and SIC has been shown to also enhance the cell-edge user throughput in [10].

User scheduling and power optimization are crucial factorsin achieving the promised gains of both FD and NOMAschemes. Intra-cell and inter-cell cross-link interference occurdue to IBFD operation. Therefore, smart resource and interfer-ence management schemes are needed to reap the gains of FDand NOMA operation. In [11], a hybrid HD/FD scheduler isproposed that can assign FD resources only when it is advan-tageous over HD resource assignment. An auction-based algo-rithm to pair UL and DL users in a single-cell IBFD networkis proposed in [12]. User scheduling and power allocationalgorithms are presented for IBFD networks in [13] and for DLNOMA networks in [14], [15], [16]. In the proposed approachof [14], a many-to-many matching algorithm is used to assignchannel to users in a single cell scenario. The performance

of NOMA in the UL is investigated in [17] using an iterativechannel allocation algorithm. All of the above works focus onsingle-cell optimization and hence, avoid handling the inter-cell interference. A distributed sub-optimal algorithm for theproblem of user selection and power allocation in a multi-cellfull duplex network discussed in [18] showing that IBFD canachieve up to double the throughput of HD in indoor sce-narios and 65% in outdoor scenarios. However, the proposedalgorithm relies on information exchange between neighboringbase stations. It also does not take into account queue stateinformation (QSI), which has a significant impact on the userpacket throughput. Several algorithms are proposed in [19],[20], [21] to optimize user pairing/scheduling, and powerallocation. These algorithms are either centralized or inter-cell interference is overlooked. In [22], the authors consider amulti-cell UL and DL NOMA system where they propose auser grouping and power optimization framework. The optimalpower allocation is derived for a single macro cell and limitednumber of users. The problem of UL/DL decoupled userassociation is studied in [23] for multi-tier IBFD networkswhere many-to-one matching algorithms are proposed to solvethe problem. However, dynamic user scheduling and powerallocation are not considered in the optimization problem.Studying the operation of both FD and NOMA was firstconsidered in [24], where the problem of subcarrier and powerallocation in a multicarrier and single-cell FD-NOMA systemis optimized. Taking into account the user traffic dynamicin the optimization problem is also missing in the literature.A summary of the state of the art contributions to FD andNOMA resource and power optimization problems is providedin Table I.

A. Paper ContributionThe main goal of this paper is to study the problem of user

association and power allocation in a multi-cell IBFD-enablednetwork operating in NOMA. Our objective is to investigatethe benefits of operating in HD or FD, as well as in OMAor NOMA modes, depending on traffic conditions, networkdensity, and self-interference cancellation capabilities. Wepropose a Lyapunov based framework to jointly optimize theduplex mode selection, user association and power allocation.The problem is formulated as a network utility maximizationwhere the main objective is to minimize a Lyapunov drift-plus-penalty function that strikes a balance between maximizing asystem utility that is a function of the data rate, and stabilizethe system traffic queues. The optimization problem is de-composed into two subproblems that are solved independentlyper SBS. User association and mode selection (UAMS) isformulated as a many-to-one matching problem. A distributedmatching algorithm aided by an inter-cell interference learningmechanism is proposed which is shown to converge to apairwise stable matching. The matching algorithm allowsSBSs to switch their operation between HD and FD and selecteither OMA or NOMA schemes to serve its users. Followingthat, UL/DL power optimization (UDPO) is formulated as asequence of convex problems and an iterative algorithm toallocate the optimal power levels for the matched users andtheir SBSs is proposed.

Page 3: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

3

Simulation results show that using the proposed matchingalgorithm, a network can dynamically select when to operate inHD or FD and when to use OMA or NOMA to serve differentusers. It is also shown that significant gains in UL and DL userthroughput and packet throughput can be achieved using theproposed scheme, as compared to different baseline schemes.

The rest of this paper is organized as follows: Section IIdescribes the system model. The optimization problem is for-mulated and decomposed into disjoint subproblems using theLyapunov framework in Section III. Section IV discusses theproposed matching algorithm and power allocation scheme.The performance of the proposed framework is analyzed inSection V. Finally, Section VI concludes the paper and outlinesfuture open research lines.

Notations: Lower case symbols represent scalars, boldfacesymbols represent vectors, whereas upper case calligraphicsymbols represent sets. 1condition is the indicator function,which equals to 1 whenever condition is true and 0 otherwise,|X | denotes the cardinality of a set X , [x]

+= maxx, 0, and

∇f(x) is the gradient of the function f(x).

II. SYSTEM MODEL

We consider a time division duplexing (TDD) system ina network of small cells, where a set B of B SBSs operatein either FD or HD mode, with SI cancellation capability ofζ, whereas a set U of U users are available in the networkand are restricted to HD operation. An open-access policy isconsidered where users associate to any SBS in the UL orDL. Furthermore, we assume that base stations and users canoperate in NOMA scheme, where multiple users can share thesame time-frequency resource in either UL or DL. To cancelthe resulting multi-user interference, SBSs or users operatingin NOMA can perform SIC at the receiver side. In this regard,we assume that the decoding ordering is done in an descendingorder of channel strength in DL NOMA. Moreover, we adoptthe ascending order of channel strength in UL NOMA, whichwas analytically shown in [26] to outperform OMA.

UL and DL service rates of user u are defined as:

rULu (t) =

∑b∈B

xULbu (t)RUL

bu (t),

=∑b∈B

xULbu (t)fb log2(1 + ΓUL

bu (t)) (1)

rDLu (t) =

∑b∈B

xDLbu (t)RDL

u (t),

=∑b∈B

xDLbu (t)fb log2(1 + ΓDL

bu (t)) (2)

where xULbu (t) ∈ XUL, xDL

bu (t) ∈ XDL are indicator variablesthat user u is associated to SBS b at time instant t in ULor DL, respectively, fb is the allocated bandwidth, and RUL

bu

and RDLbu are the UL and DL data rates between SBS b and

user r. The UL and DL signal to interference plus noise ratiosbetween SBS b and user u at time instant t, are given by:

ΓULbu (t)=

pULu (t)hbu(t)

N0+IUL-ULb (t)+IDL-UL

b (t)+INOMA-ULbu (t)+pDL

b (t)/ζ,

(3)

ΓDLbu (t)=

pDLbu (t)hbu(t)

N0 + IDL-DLu (t) + IUL-DL

u (t) + INOMA-DLbu (t)

, (4)

where pULu is the UL transmit power of user u, and pDL

b =∑u∈U p

DLbu is the total DL transmit power of SBS b, hx,y(t) =

|gx,y(t)|2 is the channel gain between the two nodes x and y,gx,y(t) is the propagation channel between the two nodes xand y, and the interference terms in (3) and (4) are expressedas follows1:

IUL-ULb (t) =

∑u′∈U\u

pULu′ (t)hbu′(t),

IDL-ULb (t) =

∑b′∈B\b

pDLb′ (t)hb′b(t),

IDL-DLu (t) =

∑b′∈B\b

pDLb′ (t)hb′u(t),

IUL-DLu (t) =

∑u′∈U

pULu′ (t)hu′,u(t),

INOMA-ULbu (t) =

∑u′:xUL

bu′=1,hbu′<hbu

pULu′ (t)hbu′(t),

INOMA-DLbu (t) =

∑u′:xDL

bu′=1,hbu′>hbu

pDLbu′(t)hbu(t),

pDLb (t)/ζ is the leaked SI and N0 is the noise variance. To

guarantee a successful NOMA operation in the DL, a user u′

should decode the data of user u with an SINR level Γu′DLbu (t)

that is at least equal to the user u received SINR ΓDLbu (t).

Otherwise, the data rate of user u is higher than what useru′ can decode. Accordingly, the inequality Γu

′DLbu (t) ≥ ΓDL

bu (t)must hold, where:

Γu′DLbu (t) =

pDLbu (t)hbu′(t)

pDLbu′(t)hbu′(t)+N0+IDL-DL

u′ (t)+IUL-DLu′ (t)+INOMA-DL

bu′ (t).

Let QUL(t) = [QUL1 (t), ..., QUL

U (t)], and QDL(t) =[QDL

1 (t), ..., QDLU (t)] denote the UL and DL traffic queues at

time instant t, with Qlu(t), l ∈ UL,DL representing theUL/DL queues of a given user u. Then, the queue dynamicsfor user u are given by:

Qlu(t+ 1) = [Qlu(t)− rlu(t)]+

+Alu(t), (5)

where Alu is the data arrival for user u in the link directionl at time instant t, which is assumed to be independent andidentically distributed with mean λlu/µ

lu > 0, and bounded

above by the finite value Almax. λlu and 1/µlu are the meanpacket arrival rate and mean packet size, which follow Poissonand exponential distributions, respectively. Here [.]

+ indicatesthat the actual served rate cannot exceed the amount of trafficin a queue. To satisfy queue stability requirements, SBSs needto ensure that traffic queues are mean rate stable. This isequivalent to ensuring that the average service rate is higheror equal to the average data arrival, i.e., Alu ≤ rlu.

1Note that the term IUL-DL includes the intra-cell interference, to accountfor the interference due to FD operation.

Page 4: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

4

Table ISUMMARY OF EXISTING LITERATURE IN FD AND NOMA-BASED RESOURCE ALLOCATION PROBLEMS.

Reference Network scenario Implementation FD scheduling Powerallocation

Queuedynamics

[11] single-cell local HD/FD mode selection × ×[12] single-cell local FD user pairing and channel allocation

√×

[13] single-cell local OFDMA channel allocation√

×[18] multi-cell local suboptimal HD/FD user selection

√×

[19] multi-cell (subcarrier isreused once)

central mode selection and subcarrierallocation

√×

[20] multi-cell central matching subcarriers to user pairs√

×[21] multi-cell local local scheduling, ignores inter-cell

interference

√×

[23] multi-cell central/local UL/DL decoupled user association × ×(a) FD

Reference Link scenario Network scenario Scheduling and power allocation scheme Queuedynamics

[14] DL single-cell matching algorithm ×[17] UL single-cell iterative subcarrier and power allocation ×[16] DL single-cell subchannel assignment and power allocation ×[15] DL single-cell user selection and power optimization ×[22] UL + DL multi-cell optimal power allocation

for limited number of users×

[25] DL multi-cell matching algorithm and power allocation ×[26] UL heterogeneous user clustering and power allocation ×[24] UL+DL+FD single-cell joint subchannel and power allocation ×

(b) NOMA

III. PROBLEM FORMULATION

In small cell networks, the network utility is affected byvarious factors such as user association, UL/DL mode selec-tion, OMA/NOMA mode selection, and UL and DL powerlevels. Let XUL = [xUL

bu ] and XDL = [xDLbu ] be the UL and

DL user association matrices, pUL = [pUL1 , ..., pUL

U ] be the ULpower vector, and pDL

b = [pDLb1 , ..., p

DLbU ] be the DL power vector

of SBS b. Therefore, a joint optimization problem of userassociation, mode selection and power allocation to maximizea continuous utility function of time-averaged UL and DLservice rates, is cast as follows:

maxXUL,XDL,pUL,pDL

b

U(rULu , rDL

u )

(6a)

=∑u∈U

(fUL(rUL

u ) + fDL(rDLu ))

subject to AULu ≤ rUL

u , ADLu ≤ rDL

u , ∀u ∈ U , (6b)

pULu ≤ δUL

u , pDLb ≤ δDL

b , ∀u ∈ U , (6c)

δULu ≤ PUL

max, ∀u ∈ U , (6d)

δDLb ≤ PDL

max, ∀b ∈ B, (6e)∑b∈B

xULbu + xDL

bu ≤ 1, ∀u ∈ U , (6f)(∑u∈U

xULbu

).(∑u∈U

xDLbu

)≤ 1, ∀b ∈ B. (6g)∑

u∈Uxlbu ≤ q, ∀b ∈ B, ∀l ∈ UL,DL. (6h)

Yuu′ ≥ 0 ∀u, u′ ∈ U , (6i)

Constraint (6b) ensures the stability of UL and DL trafficqueues. Constraints (6c) limit the effect of aggregate inter-ference by maintaining the average transmit powers of SBSsand users constrained by threshold values δUL

b and δDLu . Here,

PULmax and PDL

max denote the maximum UL and DL powers. Notethat maintaining the average transmit power below a thresholdvalue allows SBSs to limit their leaked interference within pre-defined limits without the need to exchange information withothers, which, in turn, allows for distributed implementation.Constraint (6i), where Yuu′ = 1hbu′>hbu

xDLbux

DLbu′(Γ

u′DLbu −ΓDL

bu )is to guarantee a successful SIC in the DL. Constraint (6f)states that a user is associated to a single SBS at a time ineither UL or DL. (6g) ensures that an SBS cannot operatein both FD and NOMA at the same time instant, i.e., ifit serves one user in one direction it can serve at mostone user in the other direction. Finally, the number of usersan SBS can simultaneously serve in UL or DL NOMA islimited to a quota of q users by constraint (6h)2. We notethat the restriction in (6g) is imposed to avoid high intra-cellinterference resulting from operating in both FD and NOMA,in which case assuming that users can perform SIC of multipleusers transmitting in both directions might be impractical asthe number of users scheduled under NOMA increases.

We define sets of UL and DL auxiliary variables for eachuser, denoted as γUL

u , γDLu ,∀u ∈ Ub such that the problem

in (6) is transformed from a utility function of time-averagedrates into an equivalent optimization problem with a time-averaged utility function of instantaneous rates. Subsequently,

2Note that, in theory, the number of users that can be served simulatea-neously using NOMA is unrestricted. However, we impose a quota to avoidhigh complexity SIC in the receiver side if a high number of users arescheduled.

Page 5: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

5

the problem can be solved in an online manner at each time in-stant without prior knowledge of the statistical information ofthe network variables. In this regard, we define the equivalentoptimization problem as follows:

maxXUL

b ,XDLb ,pUL,pDL

b γUL

u ,γDLu

U(γULu , γDL

u ) (7a)

=∑u∈U

(fUL(γUL

u ) + fDL(γDLu ))

subject to γULu ≤ rUL

u , γDLu ≤ rDL

u , ∀u ∈ U , (7b)

γULu ≤ rUL

max, γDLu ≤ rDL

max, ∀u ∈ U , (7c)(6b)− (6i). (7d)

The transformed problem in (7) is equivalent to the orig-inal problem in (6). To show this [27], suppose that U∗1and U∗2 are the optimal utility values of problems (6) and(7), and X∗UL

b , X∗DLb ,p∗UL, p∗DL

b are the optimal station-ary and randomized configurations that solve (6) and corre-spond to users’ optimal expected rates r∗UL

u , r∗DLu . Then,

U∗1 = U(r∗ULu , r∗DL

u ).

At all time instants, the values X∗ULb , X∗DL

b ,p∗UL, p∗DLb

as well as the auxiliary variables γULu = r∗UL

u , γDLu = r∗DL

u satisfy the constraints of problem (7) and correspond to theutility value U(γUL

u , γDLu ) = U∗1 . As this value is not

necessarily optimal in problem (7), then U∗2 ≥ U∗1 .Then, let XUL

b , XDLb ,pUL, pDL

b γULu , γDL

u be the con-figurations that solve the transformed problem (7). Thesevalues satisfy the original problem (6) and correspond to autility value that is not greater than U∗1 . Therefore:

U∗1 ≥ U(rULu , rDL

u )

≥ U(γULu , γDL

u )

≥ U(γULu , γDL

u )= U∗2 ,

where the second inequality is due to the constraint (7b)and the continuity of the utility function, the third inequalityfollows from Jensen’s inequality, and the last step is due to theconfigurations being the optimal solution for (7). Therefore,one gets that U∗2 = U∗1 and any solution to (7) is also asolution to (6).

Next, we invoke the framework of Lyapunov optimiza-tion [28], the time-average inequality constraints can besatisfied by converting them into virtual queues and main-taining their stability. Therefore, we define the followingvirtual queues HUL(t) = [HUL

1 (t), ...,HULU (t)], HDL(t) =

[HDL1 (t), ...,HDL

U (t)], ZUL(t) = [ZUL1 (t), ..., ZUL

U (t)], andZDL(t) = [ZDL

1 (t), ..., ZDLb (t)] that correspond to the con-

straints over the auxiliary variables and transmit power levels,respectively. Accordingly, the virtual queues are updated asfollows:

H lu(t+ 1) = [H l

u(t)− rlu(t)]+

+ γlu(t), (8)

ZULu (t+ 1) = [ZUL

u (t)− δULu (t)]

++ pUL

u (t), (9)

ZDLb (t+ 1) = [ZDL

b (t)− δDLb (t)]

++ pDL

b (t). (10)

Let a combination of the queues bey(t) , [QUL(t),QDL(t),HUL(t),HDL(t),ZUL(t),ZDL(t)],we define the Lyapunov function L

(y(t)

)and the drift-plus-

penalty function ∆(y(t)

)as:

L(y(t)

)=

1

2

∥∥QUL(t)∥∥2

+∥∥QDL(t)

∥∥2

+∥∥HUL(t)

∥∥2+∥∥HDL(t)

∥∥2+∥∥ZUL(t)

∥∥2+∥∥ZDL(t)

∥∥2,

(11)

∆(y(t)

)=E

L(y(t+1)

)−L(y(t)

)−vU(γUL

u ,γDLu )|Y (t)

,

(12)where v is a non-negative parameter that controls the tradeoffbetween achieving the optimal utility and ensuring the stabilityof the queues.

Proposition 1. At time instant t, the Lyapunov drift-plus-penalty satisfies the inequality in (13) under any controlstrategy and queue state, where C = 1

2

∑u∈U

[AUL

max2

+

ADLmax

2+ 2PUL

max2

+ 3rULmax

2+ 3rDL

max2]

+∑b∈B 2PDL

max2 is a

finite parameter.

Proof: By squaring equations (5), (8), (9) and (10),and from the fact that ([a− b]+ + c)2 ≤ a2 + b2 + c2 −2a(b−c),∀a, b, c ≥ 0, we can show that:

Qlu2(t+1)−Qlu

2(t)≤Alu

2(t)+rlu

2(t)−2Qlu(t)

(rlu(t)−Alu(t)

),

H lu

2(t+1)−H l

u

2(t)≤γlu

2(t)+rlu

2(t)−2H l

u(t)(rlu(t)−γlu(t)

),

ZULu

2(t+1)−ZUL

u2(t)≤pUL

u2(t)+δUL

u2(t)−2ZUL

u (t)(δULu (t)−pUL

u (t)),

ZDLb

2(t+1)−ZDL

b2(t)≤pDL

b2(t)+δDL

b2(t)−2ZDL

b (t)(δDLb (t)−pDL

b (t)).

After replacing the squared queue values in the drift-plus-penalty function in (12) by the above inequalities, andgiven the fact that the variables in the following term12E

∑u∈U

[AULu

2+ ADL

u2

+ δULu

2+ pUL

u2

+ γULu

2+ γDL

u2

+

2rULu

2+ 2rDL

u2]

+∑b∈B

[δDLb

2+ pDL

b2] are bounded above

by constant values that are independent of t, replacing thisterm by the upper bound constant C yields equation (13).

A. Problem Decomposition Using the Lyapunov Framework

Next, the problem in (13) is solved by choosing the controlaction that minimizes the terms in the right-hand side ateach time instant t. Since the optimization parameters ineach of the two terms in (13) are disjoint, each term can bedecoupled and solved independently and concurrently basedon the observation of the system and virtual queues.

1) Auxiliary variables selection: The term #1 in the drift-plus-penalty equation is related to the auxiliary variable selec-tion. By decoupling the problem per user, the optimal valuesof the auxiliary variables are selected by solving the followingmaximization problem:

maxγULu ,γDL

u

v.fUL(γULu (t))−HUL

u (t)γULu (t) (14a)

Page 6: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

6

∆(Y (t)

)≤ C (13)

+

fixed at time t︷ ︸︸ ︷E∑u∈U

[(QUL

u (t))AULu (t) + (QDL

u (t))ADLu (t)

]

−[ impact of auxiliary variables and virtual queues︷ ︸︸ ︷E∑u∈U

[v.fUL(γUL

u (t))−HULu (t)γUL

u (t) + v.fDL(γDLu (t))−HDL

u (t)γDLu (t)

]]

#1

−[ impact of scheduling and QSI︷ ︸︸ ︷E∑u∈U

[(QUL

u (t) +HULu (t))rUL

u (t) + (QDLu (t) +HDL

u (t))rDLu (t)

+

impact of power allocation and power queues︷ ︸︸ ︷ZULu (t)(δUL

u (t)− pULu (t))

] − E

∑b∈B

[ZDLb (t)(δDL

b (t)− pDLb (t))

]]

#2

+ v.fDL(γDLu (t))−HDL

u (t)γDLu (t)

subject to γULu (t) ≤ rUL

max, γDLu (t) ≤ rDL

max (14b)

We choose to maximize linear UL and DL utility functions,i.e., fUL(γUL

u ) = (γULu ) and fDL(γDL

u ) = (γDLu ). In this case,

the parameter v balances the tradeoff between maximizingthe instantaneous rate and maintaining fairness between usersby prioritizing users with higher queue sizes to ensure queuestability. Since (14) is a linear function, the optimal value ofthe auxiliary variables will equal their maximum value whenv −H l

u(t) is not negative, and zero when it is negative, i.e.:

γlu(t) =

rlmax H l

u(t) ≤ v,0 otherwise.

(15)

2) User scheduling and power allocation problem:By substituting rUL

u and rDLu from (1) and (2), and

pDLb =

∑u∈U x

DLbu p

DLbu , the term #2 in the drift-plus-penalty

equation can be reformulated as:

∑u∈U

[∑b∈B

[(QUL

u (t) +HULu (t))xUL

bu (t)RULbu (t)

+ (QDLu (t) +HDL

u (t))xDLbu (t)RDL

bu (t)]

+ ZULu (t)(δUL

u (t)− pULu (t))

]+∑b∈B

[ZDLb (t)(δDL

b (t)−∑u∈U

xDLbu (t)pDL

bu (t))],

=∑u∈U

∑b∈B

[ΨULbu (t) + ΨDL

bu (t)]

+ ΩULu (t) +

∑b∈B

ΩDLb (t). (16)

Therefore, the decomposed problem can be expressed as:

maxXUL

b ,XDLb ,pUL,pDL

b

∑u∈U

[∑b∈B

[ΨULbu (t) + ΨDL

bu (t)]

+ ΩULu (t)

]+∑b∈B

ΩDLb (t), (17a)

subject to (6d)− (6i), (17b)

The above problem is a combinatorial problem of associ-ating users to SBSs and selecting whether to operate in HD-OMA, HD-NOMA, or FD-OMA mode, and allocating UL andDL power, which has an exponential complexity. To solve thisproblem, we decouple the user association and mode selectionproblem from the power allocation problem. First, a lowcomplexity matching algorithm is proposed that matches usersto SBSs and selects the transmission mode. Given the outcomeof the matching algorithm, a power allocation problem isproposed to optimally allocate UL and DL powers.

IV. USER ASSOCIATION AND POWER ALLOCATION

In this section, the proposed solutions for the UAMS andUDPO problems are presented. First, the UAMS problemobjective is to solve the user association and mode selection,which is formulated as a matching game between users andSBSs assuming a fixed power allocation. Subsequently, alocal matching algorithm inspired from the Gale and Shapleyalgorithm [29], [30] is proposed. To solve the problem locally,knowledge of inter-cell interference is needed. Therefore, alearning based inter-cell interference estimation method isdevised. Subsequently, the UDPO problem of allocating ULand DL powers is formulated as a DC (difference of convexfunctions) programing problem and is solved iteratively.

A. User-SBS Matching

1) Matching preliminaries: Matching theory is a frame-work that solves combinatorial problems of matching mem-bers of two disjoint sets of players in which each player isinterested in matching to one or more player in the other set[30], [31]. Matching is performed on the basis of preferenceprofiles of players. Here, both SBSs and users are assumed tohave preferences towards each other to form matching pairs.Preferences of the sets of SBSs and users (B,U), denoted band u, represent each player ranking of the players in theother set.

Definition 2. A many-to-one matching Υ is defined as amapping from the set B ∪ U into the set of all subsets of

Page 7: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

7

B ∪ U , where B = [1, . . . , B] and U = [1, . . . , U ] are twodisjoint sets of SBSs and users, respectively, such that for eachb ∈ B and u ∈ U : 1) Υ(b) ⊆ U ; 2) Υ(u) ∈ B; 3) Υ(b) ≤ q;4) Υ(u) ≤ 1; 5) Υ(u) = b ⇔ u ∈ Υ(b). Note from 3)that an SBS is matched to at most a quota of q users, whereasfrom 4) that users are matched to at most one SBS.

Definition 3. Preferences of Both SBSs and users are tran-sitive, such that if b u b′ and b′ u b′′, then b u b′′, andsimilarly, if u b u′ and u′ b u′′, then u b u′′.

Definition 4. Given a matching Υ and a pair (u, b) with u /∈Υb and b /∈ Υu, (u, b) is said to be blocking the matching Υand form a blocking pair if: 1) T b Υb, T = u ∪ Υb, 2)b u b′, Υu = b′.

2) Preference profiles: Matching allows defining preferenceprofiles that capture the utility function of the players. Accord-ingly, to construct preference profiles that leads to maximizingthe system-wide utility, SBSs and users rank each other withthe objective of maximizing the utility function in (17). Noticefrom (17) that the utility function is a sum of weighted ratemaximization terms, i.e., (Ψl

bu) and power control terms, thatare ΩUL

u (t) and ΩDLb (t). Essentially, the preference of user u

should reflect the user preference to maximize its own UL andDL rate, which is expressed as:

b u b′ ⇔∑

l∈UL,DL

Ψlbu >

∑l∈UL,DL

Ψlb′u. (18)

On the other hand, each SBS aims to maximize the rate ofits serving users as well as maintaining the UL and DL powerqueues stable through optimizing its user and mode selection.Therefore, SBSs rank the subsets of proposing users (includingthe individual users). The proposed preference of SBS b overtwo subsets of users M⊆ U and M′ ⊆ U is defined as:

MbM′

⇔ ΩDLb (M) +

∑u∈M

l∈UL,DL

[Ψlbu(M) + Ωlu(M)

]>

ΩDLb (M′) +

∑u∈M′

l∈UL,DL

[Ψlbu(M′) + Ωlu(M′)

]. (19)

3) Matching algorithm: A matching algorithm to solve themany-to-one matching problem is introduced. The algorithm isa modified version of the deferred acceptance (DA) matchingalgorithm [30]. In each round of the proposed algorithm, eachunmatched user proposes to the top SBS in its preference list,SBSs then accept or reject the offers. Due to the fact thatan SBS accepts only users who maximize its own utility andrejects others, it eliminates the possibility of having blockingpairs, since it would have formed blocking pairs with theseusers otherwise. The detailed matching algorithm is presentedin Algorithm 1.Remark 5. For a fixed preference profile, Algorithm 1 isguaranteed to find a two-sides stable matching between SBSsand users [29].

Algorithm 1 User-SBS Matching Algorithm (a modified DAalgorithm [30])

1: Initialization: all users start unmatched, SBSs initialize empty lists ofproposals.

2: Users construct their own preference lists following (18).3: repeat each unmatched user with nonempty preference list propose to

its most preferred SBS.4: foreach SBS j do.5: SBS observes the subset of users that are in its proposal list, denoted

as Mj .6: if |Mj | = 1,7: The user in Mj is accepted.8: elseif |Mj | = 2,9: Both users in the list are accepted only if Mj b M′

j , ∀M′j ⊆

Mj .10: Otherwise, the user in the most preferredM′

j is accepted and theother is rejected.

11: elseif |Mj | > 2,12: SBS identifies the feasible subsets M′

j ⊆ Mj that satisfyconstraints (6g), (6h), and (6i).

13: SBS calculates its preference of all the feasible subsets.14: SBS accepts the users in the highest preferred subset, other users

are rejected.15: end if16: An accepted user is marked as matched.17: A rejected user removes SBS j from its preference list.18: end foreach19: until all users are either matched or not having SBSs remaining in their

preference lists.20: Output: a stable matching Υ.

The above remark states that if the preference profiles ofsome of the players are not affected by the current matching ofother players, the DA-based matching algorithm will convergeto a stable matching. However, since the preference profilesare function of the instantaneous service rates, there existinterdependencies between the player’s preferences, which isknown as matching externalities. With these externalities, DA-based algorithms are not guaranteed to find a stable matching.Moreover, the dependency of the preference on other players’current matching makes it necessary for SBSs to communicatewith each other to calculate the system-wide utility. Theoverhead due to this communication grows as the number ofusers and SBSs increase, rendering the matching algorithmimpractical. To this end, a utility estimation procedure throughinter-cell interference learning is carried out in the followingsubsection.

4) Dealing with externalities: Having the instantaneous ratein the term Ψbu causes the preferences of players to vary asthe matching changes, due to having both the intra-cell andinter-cell interference as per equations (1)-(4). Consequently,externalities are introduced to the matching problem, whichmakes it a computationally hard task to find a stable matching.Instead, we propose an inter-cell interference learning methodthat allows SBSs and users to locally estimate their utility ateach time instant t. Hence, externalities due to varying inter-cell interference are avoided.

Under this procedure, all SBSs and users keep record of theinter-cell interference experienced at each time instant. Let themeasured inter-cell interference at SBS b and user u in the timeinstant t−1 be Ib,inter(t−1) and Ju,inter(t−1), respectively, andIb,inter(t) and Ju,inter(t) are the estimated inter-cell interferenceat time instant t. A time-average estimation of the inter-cell

Page 8: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

8

interference is performed as follows:

Ib,inter(t)=ν1(t)Ib,inter(t−1)+(1−ν1(t))Ib,inter(t−1), (20)

Ju,inter(t)=ν2(t)Ju,inter(t−1)+(1−ν2(t))Ju,inter(t−1), (21)

where ν1and ν2 are learning parameters.Once the learning procedure has been established, the

preference profiles of players are built using the estimatedterms. First, we assume that players build their preferenceprofiles over SBSs using the estimated inter-cell interferenceto calculate the estimated weighted rate term, denoted as Ψl

bu.This assumption avoids the complexity of taking into accountthe intra-cell interference in calculating users’ utility, in whichthe preference will vary significantly according to the SBScurrent mode selection as well as the SIC order if NOMA isselected. Hence, the user preference can be expressed as:

b u b′ ⇔∑

l∈UL,DL

Ψlbu >

∑l∈UL,DL

Ψlb′u. (22)

On the other hand, as a set of more than one user can proposeto an SBS, the preference of a subset of users over another hasto take into account the actual intra-cell interference, as well asthe estimated inter-cell interference. Therefore, the estimatedUL and DL SINR values of user u at SBS b are expressed as:

ΓULbu (t) =

pULu (t)hbu(t)

N0 + Ib,inter(t) + Ib,intra(t) + pDLb (t)/ζ

, (23)

ΓDLbu (t) =

pDLbu (t)hbu(t)

N0 + Ju,inter(t) + Ju,intra(t), (24)

where Ib,intra and Ju,intra are the actual intra-cell interferenceresulting from FD or NOMA operation. Subsequently, thepreference of SBS b over two subsets of users M and M′is defined as:

MbM′

⇔ ΩDLb (M) +

∑u∈M

l∈UL,DL

[Ψlbu(M) + Ωlu(M)

]>

ΩDLb (M′) +

∑u∈M′

l∈UL,DL

[Ψlbu(M′) + Ωlu(M′)

]. (25)

5) Analysis of matching stability:

Definition 6. Matching Υ is pairwise stable if it is not blockedby any pair that does not exist in Υ.

Lemma 7. Algorithm 1 converges to a pairwise-stable match-ing Υ∗.

Proof: Suppose that there exists an arbitrary pair (u, b)which does not exist in Υ∗ in which T b Υ∗b , T = u∪Υ∗b ,and b u b′, Υ∗u = b′. Since b u b′, this implies that useru has proposed to b and got rejected at an intermediate roundi before being matched to b′. Accordingly, Υi

b b u ∪ Υib.

As Υ∗b b Υib, this implies that u /∈ Υ∗b since the prefer-

ence lists are transitive, which contradicts our supposition.

Therefore, the matching Υ∗ is not blocked by any pair, i.e., ispairwise-stable.

Theorem 8. Algorithm 1 converges to a pairwise-stablematching Υ∗ in a finite number of rounds.

Proof: Since each user can propose to an SBS only once,removing it from its preference list if it is rejected, it is easyto see that a user u has a preference list of maximum lengthof B. As more rounds are conducted, the preference lists growsmaller. This means that each user performs a maximum ofB proposals. After which the algorithm will converge to apairwise-stable matching Υ∗.

B. UL/DL Power Optimization Problem (UDPO)

After users are associated to SBSs and transmission modesare selected, power allocation is performed to optimize theUL and DL power levels for each scheduled UE and SBS. Weassume that a central-controller performs the optimal powerallocation. The central-controller requires channel knowledgeof only the scheduled users. This substantially reduces thecomplexity of the channel reporting, as compared to a fullycentralized solution. Given the user association obtained fromthe matching algorithm, equation (16) can be rewritten asfollows:

∑b∈B

∑u∈Υb(t)

[ΨULbu (t) + ΨDL

bu (t) + ΩULu (t)

]+∑b∈B

ΩDLb (t)

=∑b∈B

[ ∑u∈Υb(t)

[wULu (t)RUL

bu (t) + wDLu (t)RDL

bu (t)

+ ZULu (t)(δUL

u (t)− pULu (t))

]+ ZDL

b (t)(δDLb (t)−

∑u∈Υb(t)

pDLbu (t))

], (26)

where wlu = Qlu + H lu. The power optimization problem is

expressed as3:

maxp=pUL,pDL

b

∑b∈B

∑u∈Υb

[ΨULbu (p)+ΨDL

bu (p)+ΩULu (p)

]+ΩDL

b (p),

(27a)

pULu ≤ PUL

max, ∀u ∈ Υ, (27b)

pDLb ≤ PDL

max, ∀b ∈ Υ. (27c)Yuu′ ≥ 0 ∀u, u′ ∈ Υ, (27d)

The above problem is a non-concave utility maximizationproblem, due to the interference terms in the UL and DLrate expressions. This makes it complex to solve, even witha central controller, with complexity that increases with thenumber of SBSs and users. To obtain an efficient solution, wetransform the problem into a DC programming optimizationproblem and solve it iteratively [32]. First, we substitute theservice rate terms in the objective function:

3For the sake of brevity, we omit the time index t from this poweroptimization subproblem, as it is performed each time instant.

Page 9: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

9

=∑b∈B

[ ∑u∈Υb(t)

[wULu fb log2(1+ΓUL

bu (p))

+wDLu f log2(1+ΓDL

bu (p))

+ ΩULbu (p)

]+ ΩDL

b (p)

], (28)

Then, the SINR expressions from (3) and (4) is rewritten as:

ΓULbu (p) =

pULu hbu

N0 + Ibu,UL(p), (29)

ΓDLbu (p) =

pDLbuhbu

N0 + Ibu,DL(p), (30)

where Ibu,UL = IUL-ULb + IDL-UL

b + INOMA-ULbu + pDL

b /ζ andIbu,DL = IDL-DL

u + IUL-DLu + INOMA-DL

bu .By substituting (29) and (30) in (28), the objective function

becomes:

=∑b∈B

[ ∑u∈Υb(t)

[wULu fb

(log2(N0 + pUL

u hbu + Ibu,UL(p))

− log2(N0 + Ibu,UL(p)))

+ wDLu fb

(log2(N0 + pDL

b hbu + Ibu,DL(p))

− log2(N0 + Ibu,DL(p)))

+ ΩULu (p)

]+ ΩDL

b (p)

], (31)

=∑b∈B

[ ∑u∈Υb

[ concave︷ ︸︸ ︷FULu (p) +

convex︷ ︸︸ ︷GULu (p) +

concave︷ ︸︸ ︷FDLu (p) +

convex︷ ︸︸ ︷GDLu (p)

+

affine︷ ︸︸ ︷ΩULu (p)

]+

affine︷ ︸︸ ︷ΩDLb (p)

]. (32)

Finally, we use the convex-concave procedure [33] to con-vexify the above problem. The convex functions are first sub-stituted by their first order linear approximation at iteration it:

Glu(p,p(it)) = Glu(p,p(it)) +∇Glu(p,p(it))

T (p− p(it)) .(33)

Algorithm 2 Iterative Power Allocation Algorithm (UDPO)at time instant t

1: Initialization: find an initial feasible point, set it = 0.2: repeat3: calculate Gl

u(p,p(it)),∀u ∈ Υb from (33).4: solve the convex minimization problem using the interior point method.5: update iteration: it = it + 1.6: until the utility improvement ≤ δ.7: Output: optimal power vectors: p = pUL, pDL

b .

The problem is then solved iteratively, as depicted in Algo-rithm 2. The feasibility problem [34] is solved to find a feasibleinitial starting point. In this problem, the utility function is setto zero such that if the optimal value is zero, the solution fitsas an initial point that satisfies the problem constraints. In thesubsequent iterations, the initial point is always feasible, as itis the optimal solution of the previous iteration.

Theorem 9. Algorithm 2 generates a sequence of p(it) thatconverges to a local optimum p∗.

Proof: Let the utility function fp(p) =

concave︷ ︸︸ ︷Flu(p) +

convex︷ ︸︸ ︷Glu(p)

+

affine︷ ︸︸ ︷Ωlu(p) be the function to be maximized. At iteration

it, the convex function Glu(p, ) is replaced by the affine

function Glu(p,p(it)) to make the objective function con-

cave with respect to the reference point p(it). Accordingly,we have a concave utility function at iteration it, that canbe solved efficiently and results in the solution p∗(it). Atthis point, the original utility function can be expressed asfp(p

∗(it)) = Flu(p∗(it)) + Glu(p∗(it)) + Ωl

u(p∗(it)). Subse-quently, the obtained solution is utilized at iteration it+1 suchthat Gl

u(p,p(it + 1)) = Glu(p,p∗(it)), in which the optimal

solution will be p∗(it + 1) and the corresponding utility ofthe original problem is fp(p∗(it + 1)) = Flu(p∗(it + 1)) +Glu(p∗(it + 1)) + Ωl

u(p∗(it + 1)).By comparing the original utility functions in the two

subsequent iterations, we can find that:

fp(p∗(it))=Flu(p∗(it))+Gl

u(p∗(it))+Ωlu(p∗(it))

=Flu(p∗(it))+Glu(p∗(it),p(it + 1))+Ωl

u(p∗(it))

≤Flu(p∗(it+1))+Glu(p∗(it+1),p(it+1))+Ωl

u(p∗(it+1))

≤Flu(p∗(it + 1))+Glu(p∗(it + 1))+Ωl

u(p∗(it + 1))

=fp(p∗(it + 1)),

where the first inequality is due to the lower term beingthe optimal (maximum) solution to the problem at iterationit + 1, and the second inequality is due to the convexity ofGlu(p,p(it + 1)) ≤ Gl

u(p). Therefore, Algorithm 2 will gen-erate a sequence of p(it) that leads to a non-decreasing utilityfunction, i.e., fp(p∗(1)) ≤ · · · ≤ fp(p∗(it)) ≤ fp(p∗(it+1)).Finally, due to the bounded constraints, the utility function isbounded, and will converge to a solution that is local optimal.

A flowchart of the UAMS and the UDPO problems ispresented in Figure 2. Next, we analyze the complexity ofthe proposed scheme in terms of signaling overhead.

C. Complexity Analysis

First, to analyze the complexity of Algorithm 1, we investi-gate the maximum number of request signals coming fromusers’ proposal to an arbitrary SBS in a time instant. LetUb ⊆ U be the set of users under the coverage of SBS b.In the worst case scenario, let all the users have SBS b astheir most preferred SBS. Hence, the SBS will receive requestsfrom all the users in the first iterations, and it has to acceptat most a single user in HD-OMA operation, a pair of usersin FD-OMA mode, or a maximum of q users in HD-NOMAmode. The worst case will occur if, at each iteration, theSBS is only accepting one user for HD-OMA operation andrejecting the others. In this case, the maximum number ofiterations will be |Ub|, and the total number of proposals is|Ub|+ (|Ub| − 1) + · · ·+ 1 = |Ub|(|Ub|+ 1)/2. Therefore, thecomplexity of Algorithm 1 is O(|Ub|2).

Page 10: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

10

Next we analyze the complexity of Algorithm 2. Since thepower allocation is performed only over the subset of usersthat are selected using Algorithm 1, the maximum number ofusers from an SBS will be in the HD-NOMA mode, whichis equivalent to the quota q. Then, the maximum number ofusers in the network (assuming all SBSs are in operation) willbe qtot = |B|q. Then, an SBS needs to report the channelbetween its q users and the other qtot − q users. The totalamount of signaling will be = |B|q(qtot−q) = |B|q(|B|q−q) =|B|q2(|B| − 1) which results in a complexity of O

((|B|q)2

).

Users estimate

experienced during the DL.

[equation (21)]

are reported to the SBS.

SBSs estimate

experienced during the UL.

[equation (20)]SBSs admit most preferred set

of users and reject others

Users propose to the most

preferred SBS in their lists

All users are

matched or have

empty preference

lists

SBSs report the channels of

all matched users to the

central controller

Yes

No

Optimal UL and DL power allocation of the matched users and their SBSs

(Algorithm 2)

and are fed to

the matching algorithm

Inter-cell interference learningMatching algorithm

(Algorithm1)

Use

r le

vel

SB

S level

Users remove rejecting

SBSs from their

preference list

Centr

al c

ontr

oll

er l

evel

Optimal power levels are

reported to the SBSs

Figure 2. A flowchart illustrating the sequence, implementation and connec-tions between the proposed learning scheme, matching algorithm and powerallocation scheme.

V. SIMULATION RESULTS

In this section, we present simulation results and analysisto evaluate the performance of the proposed framework. Forbenchmarking, we consider the following baseline schemes:

1) HD-OMA scheme: users are associated to the nearestSBS and are allocated orthogonal resources for ULand DL. Requests are served using a round robin (RR)scheduler.

2) HD-NOMA only scheme: users are associated to thenearest SBS and RR scheduler is used to serve UL andDL queues. If there are multiple users in a schedulingqueue, they are ranked according to their channel gains,and are served using NOMA if the ratio between theirchannel gains is at least 2, otherwise, OMA is used.Power is allocated to NOMA users based on theirchannel ranking, in uniform descending order for ULNOMA and uniform ascending order for DL NOMA.SBSs operate either in UL or in DL depending on thequeue length on each link direction.

3) FD-OMA scheme: users are associated to the nearestSBS and a pair of users is served in FD mode if thechannel gain between them is greater than a certainthreshold, otherwise users are served in HD mode usingRR scheduler.

4) Uncoordinated scheme: in this scheme, users can beserved in either HD or FD and in OMA or NOMAmodes. The proposed matching algorithm, with inter-cell interference learning, is used for mode selectionand user association. Power is assumed to be fixed forOMA and is similar to that of baseline 2 for NOMA.This baseline represents an uncoordinated version of theproposed scheme.

A. Simulation setup

We consider an outdoor cellular network where SBSs aredistributed uniformly over the network area and users are dis-tributed uniformly within small cells area. An SBS is locatedat the center of each small cell. SBS operate in TDD HD orin FD. If HD is used, they can operate in NOMA or OMAto serve multiple users. A packet-level simulator is consideredand each experiment is run for 4000 time subframes, whichare sufficient for the traffic and virtual queues to get stable.Each result is averaged over 30 different network topologies.The main simulation parameters are presented in Table II.

Table IISIMULATION PARAMETERS

Parameter ValueSystem bandwidth 10 MHzDuplex modes TDD HD/ FDMultiplexing mode OMA/NOMASub-frame duration 1 msNetwork size 500× 500m2

Small cell radius 40mMax. SBS transmit power 22 dBmMax. user transmit power 20 dBmPath loss model Multi-cell pico scenario [35]Shadowing standard deviation 4 dBPenetration loss 0 dBSI cancellation capability 110 dBMax. quota of NOMA users q 5

Lyapunov parametersv parameter 5× 107

UL power threshold δULu 0.5× PUL

max

DL power threshold δDLb 0.9× PDL

maxLearning parameters

SBS learning parameter ν1 0.1User learning parameter ν2 0.1

B. Performance under different traffic intensity conditions

We start by evaluating the performance of the proposedscheme under different traffic intensity conditions. An averageof 10 users per SBS are distributed within the small cell area,with a user mean packet arrival rate λtotal

u = λULu + λDL

u ,and λlu = 5 packet/s. Traffic intensity is varied by changingthe mean packet size 1/µlu between 50 kb and 400 kb. InFigure 3, the packet throughput performance is depicted forthe different schemes. The packet throughput is defined asthe packet size successfully transmitted to the user dividedby the delay encountered to complete its transmission. Inmoderate traffic conditions, the packet throughput increaseswith increasing traffic intensity, as the packet size increasesand not much queuing delay is encountered. As the trafficintensity increases, queuing delay increases, correspondingly

Page 11: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

11

decreasing the packet throughput. Figure 3 shows that theproposed scheme outperforms the baseline schemes in packetthroughput performance. At higher traffic intensity condition,gains of up to 63% and 73% are observed over HD-NOMA andFD-OMA baseline schemes, respectively. The performanceof the uncoordinated scheme with matching is close to theproposed scheme at low traffic conditions. However, as thetraffic load increases, the coordination gain reaches up to 31%.

5 10 15 20 25 30 35 40

Mean traffic intensity (Mbps)

10

20

30

40

50

60

Ave

rage

pac

ket t

hrou

ghpu

t (M

bps)

Proposed SchemeHD-OMAHD-NOMAFD-OMAUncoordinated

Figure 3. Average packet throughput performance for different schemes asthe traffic intensity increases, for a network of 10 SBSs and an average of 10UEs per SBS.

We continue by investigating the effect of traffic intensity onSBS mode selection. To that end, Figure 4 provides the ratio oftransmissions carried out in FD or NOMA with respect to alltransmissions in different traffic intensity conditions. Noticehere that, although not explicitly represented, HD-OMA wasthe operation mode for the remaining of the transmissions.

The results show an increasing rate of operation in both FDand NOMA as the traffic intensity increases. The use of FDvaries from about 3% at low traffic conditions to 13% at hightraffic intensity, whereas NOMA operation accounts for up to10% of the transmissions under high traffic intensity condi-tions. The rest of transmissions are in HD-OMA mode. Theseresults clearly indicate that an SBS can benefit more fromscheduling multiple users simultaneously as traffic intensifies.This is mainly due to the higher request diversity, in whichthe chances to have subsets of users that benefit from beingserved simultaneously increase.

Next, the impact of traffic intensity on UL/DL user ratethroughput performance is analyzed through Figure 5. Aclose up look into Figure 5(a) and Figure 5(b) shows thatresults from all baseline schemes fall below HD-OMA for ULwhereas for the DL this scheme is outperformed.

The DL-to-UL interference has a significant impact in theuncoordinated schemes due to the higher transmitting power ofSBSs and lower pathloss between the SBS and user. In the DLcase, the UL-to-DL interference can be partly avoided withineach cell by the pairing thresholds used in the FD-OMA andHD-NOMA baselines. As our proposed scheme optimizes theUL and DL power allocation, it achieves UL and DL gains

5 10 15 20 25 30 35 40

Mean traffic intensity (Mbps)

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

Mod

e se

lect

ion

ratio

FDUL-NOMADL-NOMA

Figure 4. FD and NOMA mode selection ratios at different traffic intensitylevels, for a network of 10 SBSs and an average of 10 UEs per SBS.Remaining transmissions are in HD-OMA mode.

of 9% and 23% over the HD scheme, and of about 12% inboth UL and DL over the HD-NOMA and FD-OMA baselineschemes. Moreover, the coordination gain over the FD-NOMAmatching scheme is even more evident in the UL (12%) ascompared to the DL (7%), which is due to the dominance ofDL-to-UL interference in the uncoordinated scenarios.

10 20 30 40

Mean traffic intensity (Mbps)

0.5

1

1.5

2

2.5

3

3.5

4

Ave

rage

use

r ra

te th

roug

hput

(M

bps)

(a) UL

10 20 30 40

Mean traffic intensity (Mbps)

0.5

1

1.5

2

2.5

3

3.5

4

Ave

rage

use

r ra

te th

roug

hput

(M

bps)

(b) DL

Proposed Scheme

HD-OMA

HD-NOMA

FD-OMA

Uncoordinated

Figure 5. Average (a) UL and (b) DL rate throughput performance fordifferent schemes as the network traffic intensity increases, for a networkof 10 SBSs and an average of 10 UEs per SBS.

To further analyze the data rate throughput performance inthe UL and DL, the cumulative distribution functions (CDFs)of the UL and DL user rate throughput for light and heavytraffic intensity cases are provided in Figure 6. As expected, inthe presence of light traffic no significant gains are achievedwith respect to HD scheme performance; Light traffic doesnot enable enough diversity for user scheduling purposes.Accordingly, most of the transmissions are in HD mode,as was also shown in Figure 4 for the proposed scheme.

Page 12: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

12

Under heavy traffic conditions, the baseline schemes suffer adegraded cell-edge throughput in the UL due to the DL-to-ULinterference, as discussed above. Figure 6 also shows that theproposed scheme power optimization overcomes the cell-edgethroughput degradation and achieves gains of at least 21% and17% in the UL and DL 10-th percentile throughput.

0 1 2 3 4 5 6 7 8

(a) UL user data throughput (Mbps)

0

0.2

0.4

0.6

0.8

1

CD

F

0 1 2 3 4 5 6 7 8

(b) DL user data throughput (Mbps)

0

0.2

0.4

0.6

0.8

1

CD

F

Proposed Scheme

HD-OMA

HD-NOMA

FD-OMA

Uncoordinated

light traffic

heavy traffic

Figure 6. CDFs of UL and DL user throughput at light (20 Mbps) and heavy(40 Mbps) traffic intensity cases for a network of 10 SBSs and an averageof 10 UEs per SBS.

C. Performance under different network densities

We proceed by evaluating the performance of our proposedscheme as the network density increases. Different networkdensities will be simulated by introducing an increased numberof SBSs in the system, while intra-cell user density and trafficinflux rates are kept constant. First, we compare the packetthroughput performance against the baseline schemes. Figure 7shows that, at low network density, all schemes achieve almostdouble the packet throughput of the HD baseline scheme.This is due to multiplexing gain where SBSs are able toserve more than one user simultaneously and with not muchinter-cell interference to affect the performance. For the samereason, the uncoordinated scheme performance is close tothe proposed scheme, since coordinating the power to avoidinter-cell interference is not crucial in this case. On the otherhand, as the network density increases, the coordination gainincreases, reaching up to 55% for 14 SBSs.

Next, we investigate the ratio of selecting FD and NOMAmodes in the proposed schemes as the network density varies.As Figure 8 shows, as the network density increases, theselection of DL NOMA decreases. The decrease is due to theway power is allocated in DL NOMA, where users with lesschannel gains (typically cell-edge users) have to be allocatedhigher power as compared to users with higher channel gains.In that case, user with higher channel gains can decode andcancel others’ data before decoding their own. Therefore, asthe network density increases, inter-cell interference levels

4 6 8 10 12 14

Number of SBSs

10

20

30

40

50

60

70

Ave

rage

pac

ket t

hrou

ghpu

t (M

bps)

Proposed SchemeHD-OMAHD-NOMAFD-OMAUncoordinated

Figure 7. Average packet throughput performance for different schemes asthe network density increases for an average of 10 UEs per SBS and a meantraffic intensity of 3 Mbps per user.

increase, making it is less likely to benefit from DL NOMA.Instead, SBSs schedule DL users either in HD-OMA or FDmodes.

4 6 8 10 12 14

Number of SBSs

0

0.02

0.04

0.06

0.08

0.1

0.12

0.14

Mod

e se

lect

ion

ratio

FDUL-NOMADL-NOMA

Figure 8. FD and NOMA mode selection ratios as the network densityincreases for an average of 10 UEs per SBS and a mean traffic intensityof 3 Mbps per user. Remaining transmissions are in HD-OMA mode.

D. Impact of SI cancellation capability

Finally, in this subsection, the effect of the SBS SI can-cellation capability on the proposed and baseline schemes isanalyzed. Figure 9 compares the average packet throughputperformance of the different schemes as the SI cancellationvaries from 30 dB to 110 dB, which is the highest reportedcapability level. As Figure 9 shows, the degradation in the pro-posed scheme performance due to having lower SI cancellationlevels is minor compared to the FD-OMA baseline scheme.As the proposed scheme optimizes the mode selection, it canoperate more frequently in UL NOMA instead of FD to serve

Page 13: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

13

UL users, so that the high interference from the SBS DL signalis avoided.

20 40 60 80 100 120

SI cancelation (dB)

15

20

25

30

35

40

45

50

55

Ave

rage

pac

ket t

hrou

ghpu

t (M

bps)

Proposed SchemeHD-OMAHD-NOMAFD-OMAUncoordinated

Figure 9. Average packet throughput performance for different schemes as theSBS SI cancellation capability varies, for a network of 10 SBSs, an averageof 10 UEs per SBS, and a mean traffic intensity rate of 3 Mbps per user.

Figure 10 shows the selection ratio of FD and NOMAmodes in the proposed scheme at different SI cancellationlevels. It can be seen that FD mode is selected more frequentlyat higher SI cancellation levels, whereas the UL NOMA ratiodecreases correspondingly. The ratio of DL NOMA selectionmaintains the same, since SI interference only affects the ULtransmissions.

30 50 70 90 110

SI cancelation (dB)

0

0.02

0.04

0.06

0.08

0.1

0.12

Mod

e se

lect

ion

ratio

FDUL-NOMADL-NOMA

Figure 10. FD and NOMA mode selection ratios at different SBS SIcancellation capability levels, for a network of 10 SBSs, an average of 10UEs per SBS, and a mean traffic intensity rate of 3 Mbps per user. Remainingtransmissions are in HD-OMA mode.

VI. CONCLUSIONS

In this paper, the problem of mode selection, dynamicuser association, and power optimization has been studied forIBFD and NOMA operating networks. The problem of time-averaged UL and DL rate maximization problem under queue

stability constraints has been formulated and solved usingLyapunov framework. A many-to-one matching algorithm isproposed that locally select which users to serve and in whichtransmission mode to operate. Then, a power optimizationproblem of the matched users has been formulated and solvediteratively. Simulations results show significant gains of up to63% and 73% in UL and DL packet throughput, and 21%and 17% in UL and DL cell edge throughput, respectively.Possible future research directions are to study the problemin ultra-dense network environments as well as optimizing thenetwork for latency and reliability requirements.

REFERENCES

[1] Q. C. Li, H. Niu, A. T. Papathanassiou, and G. Wu, “5G networkcapacity: Key elements and technologies,” IEEE Vehicular TechnologyMagazine, vol. 9, pp. 71–78, March 2014.

[2] M. Duarte and A. Sabharwal, “Full-duplex wireless communications us-ing off-the-shelf radios: Feasibility and first results,” in 2010 ConferenceRecord of the Forty Fourth Asilomar Conference on Signals, Systems andComputers, pp. 1558–1562, Nov 2010.

[3] M. Jain, J. I. Choi, T. Kim, D. Bharadia, S. Seth, K. Srinivasan, P. Levis,S. Katti, and P. Sinha, “Practical, real-time, full duplex wireless,” inProceedings of the 17th Annual International Conference on MobileComputing and Networking, MobiCom ’11, (New York, NY, USA),pp. 301–312, 2011.

[4] H. Thomsen, P. Popovski, E. d. Carvalho, N. K. Pratas, D. M. Kim, andF. Boccardi, “CoMPflex: CoMP for in-band wireless full duplex,” IEEEWireless Communications Letters, vol. 5, pp. 144–147, April 2016.

[5] H. Alves, C. H. M. de Lima, P. H. J. Nardelli, R. D. Souza, andM. Latva-aho, “On the average spectral efficiency of interference-limited full-duplex networks,” in 2014 9th International Conferenceon Cognitive Radio Oriented Wireless Networks and Communications(CROWNCOM), pp. 550–554, June 2014.

[6] J. Lee and T. Q. S. Quek, “Hybrid full-/half-duplex system analysisin heterogeneous wireless networks,” IEEE Transactions on WirelessCommunications, vol. 14, pp. 2883–2895, May 2015.

[7] M. Gatnau, G. Berardinelli, N. H. Mahmood, and P. Mogensen, “Canfull duplex boost throughput and delay of 5G ultra-dense small cellnetworks?,” in 2016 IEEE 83st Vehicular Technology Conference (VTCSpring), pp. 1–5, May 2016.

[8] Y. Saito, Y. Kishiyama, A. Benjebbour, T. Nakamura, A. Li, andK. Higuchi, “Non-orthogonal multiple access (NOMA) for cellularfuture radio access,” in Vehicular Technology Conference (VTC Spring),2013 IEEE 77th, pp. 1–5, June 2013.

[9] Z. Wei, J. Yuan, D. W. K. Ng, M. Elkashlan, and Z. Ding, “Asurvey of downlink non-orthogonal multiple access for 5G wirelesscommunication networks,” CoRR, vol. abs/1609.01856, 2016.

[10] T. Takeda and K. Higuchi, “Enhanced user fairness using non-orthogonalaccess with SIC in cellular uplink,” in Vehicular Technology Conference(VTC Fall), 2011 IEEE, pp. 1–5, Sept 2011.

[11] S. Goyal, P. Liu, S. Panwar, R. A. DiFazio, R. Yang, J. Li, and E. Bala,“Improving small cell capacity with common-carrier full duplex radios,”in 2014 IEEE International Conference on Communications (ICC),pp. 4987–4993, June 2014.

[12] J. M. B. da Silva, Y. Xu, G. Fodor, and C. Fischione, “Distributedspectral efficiency maximization in full-duplex cellular networks,” in2016 IEEE International Conference on Communications Workshops(ICC), pp. 80–86, May 2016.

[13] P. Tehrani, F. Lahouti, and M. Zorzi, “Resource allocation in OFDMAnetworks with half-duplex and imperfect full-duplex users,” CoRR,vol. abs/1605.01947, 2016.

[14] B. Di, S. Bayat, L. Song, and Y. Li, “Radio resource allocationfor downlink non-orthogonal multiple access (NOMA) networks usingmatching theory,” in 2015 IEEE Global Communications Conference(GLOBECOM), pp. 1–6, Dec 2015.

[15] P. Parida and S. S. Das, “Power allocation in OFDM based NOMAsystems: A DC programming approach,” in 2014 IEEE GlobecomWorkshops (GC Wkshps), pp. 1026–1031, Dec 2014.

[16] F. Fang, H. Zhang, J. Cheng, and V. C. M. Leung, “Energy-efficient re-source allocation for downlink non-orthogonal multiple access network,”IEEE Transactions on Communications, vol. 64, pp. 3722–3732, Sept2016.

Page 14: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

14

[17] M. Al-Imari, P. Xiao, M. A. Imran, and R. Tafazolli, “Uplink non-orthogonal multiple access for 5G wireless networks,” in 2014 11th In-ternational Symposium on Wireless Communications Systems (ISWCS),pp. 781–785, Aug 2014.

[18] S. Goyal, P. Liu, and S. Panwar, “User Selection and Power Allocationin Full Duplex Multi-Cell Networks,” ArXiv e-prints arXiv:1604.08937,Apr. 2016.

[19] R. Sultan, L. Song, K. G. Seddik, Y. Li, and Z. Han, “Mode se-lection, user pairing, subcarrier allocation and power control in full-duplex OFDMA HetNets,” in 2015 IEEE International Conference onCommunication Workshop (ICCW), pp. 210–215, June 2015.

[20] B. Di, S. Bayat, L. Song, and Y. Li, “Radio resource allocation for full-duplex OFDMA networks using matching theory,” in Computer Com-munications Workshops (INFOCOM WKSHPS), 2014 IEEE Conferenceon, pp. 197–198, April 2014.

[21] I. Atzeni, M. Kountouris, and G. C. Alexandropoulos, “Performanceevaluation of user scheduling for full-duplex small cells in ultra-densenetworks,” CoRR, vol. abs/1604.05979, 2016.

[22] M. S. Ali, H. Tabassum, and E. Hossain, “Dynamic user clusteringand power allocation for uplink and downlink non-orthogonal multipleaccess (NOMA) systems,” IEEE Access, vol. PP, no. 99, pp. 1–1, 2016.

[23] S. Sekander, H. Tabassum, and E. Hossain, “Decoupled uplink-downlinkuser association in multi-tier full-duplex cellular networks: A two-sidedmatching game,” IEEE Transactions on Mobile Computing, vol. PP,no. 99, pp. 1–1, 2016.

[24] Y. Sun, D. W. K. Ng, Z. Ding, and R. Schober, “Optimal joint power andsubcarrier allocation for full-duplex multicarrier non-orthogonal multi-ple access systems,” IEEE Transactions on Communications, vol. 65,pp. 1077–1091, March 2017.

[25] B. Di, L. Song, and Y. Li, “Sub-channel assignment, power allocationand user scheduling for non-orthogonal multiple access networks,”CoRR, vol. abs/1608.08313, 2016.

[26] A. Celik, R. M. Radaydeh, F. S. Al-Qahtani, A. H. A. El-Malek, andM.-S. Alouini, “Resource allocation and cluster formation for imperfectNOMA in DL/UL decoupled hetnets,” in IEEE Global CommunicationsConference (GLOBECOM), pp. 1–7, Dec 2017.

[27] M. J. Neely, “A Lyapunov optimization approach to repeated stochasticgames,” CoRR, vol. abs/1310.2648, 2013.

[28] M. J. Neely, “Stochastic network optimization with application tocommunication and queueing systems,” Synthesis Lectures on Commu-nication Networks, vol. 3, no. 1, pp. 1–211, 2010.

[29] D. Gale and L. S. Shapley, “College admissions and the stability ofmarriage,” The American Mathematical Monthly, vol. 69, no. 1, pp. 9–15, 1962.

[30] A. Roth and M. Sotomayor, “Two-sided matching: A study in game-theoretic modeling and analysis,” Cambridge University Press, Cam-bridge, 1992.

[31] Y. Gu, W. Saad, M. Bennis, M. Debbah, and Z. Han, “Matching theoryfor future wireless networks: fundamentals and applications,” IEEECommunications Magazine, vol. 53, pp. 52–59, May 2015.

[32] A. L. Yuille and A. Rangarajan, “The Concave-convex Procedure,”Neural Comput., vol. 15, pp. 915–936, Apr. 2003.

[33] T. Lipp and S. Boyd, “Variations and extension of the convex–concaveprocedure,” Optimization and Engineering, vol. 17, no. 2, pp. 263–287,2016.

[34] S. Boyd and L. Vandenberghe, Convex Optimization. CambridgeUniversity Press, 2009.

[35] 3GPP, “Further Enhancements to LTE TDD for DL-UL InterferenceManagement and Traffic Adaptation,” TR 36.828, 3rd Generation Part-nership Project (3GPP), June 2012.

Mohammed S. Elbamby received his B.Sc. degree(honors) in electronics and communications engi-neering from the Institute of Aviation Engineeringand Technology (IAET), Egypt, in 2010, and hisM.Sc. degree in Communications engineering fromCairo University, Egypt, in 2013. After receivinghis M.Sc. degree, he joined the Centre for WirelessCommunications (CWC) at the University of Oulu,where he is working toward his doctoral degree.His research interests include resource optimization,UL/DL configuration, fog networking, and caching

in wireless cellular networks. Mohammed S. Elbamby is a recipient of theBest Student Paper Award from the European Conference on Networks andCommunications (EuCNC’2017).

Mehdi Bennis (Senior Member, IEEE) received hisM.Sc. degree in Electrical Engineering jointly fromthe EPFL, Switzerland and the Eurecom Institute,France in 2002. From 2002 to 2004, he worked as aresearch engineer at IMRA-EUROPE investigatingadaptive equalization algorithms for mobile digitalTV. In 2004, he joined the Centre for WirelessCommunications (CWC) at the University of Oulu,Finland as a research scientist. In 2008, he was avisiting researcher at the Alcatel-Lucent chair onflexible radio, SUPELEC. He obtained his Ph.D.

in December 2009 on spectrum sharing for future mobile cellular systems.Currently Dr. Bennis is an Adjunct Professor at the University of Ouluand Academy of Finland research fellow. His main research interests arein radio resource management, heterogeneous networks, game theory andmachine learning in 5G networks and beyond. He has co-authored one bookand published more than 100 research papers in international conferences,journals and book chapters. He was the recipient of the prestigious 2015Fred W. Ellersick Prize from the IEEE Communications Society, the 2016Best Tutorial Prize from the IEEE Communications Society and the 2017EURASIP Best paper Award for the Journal of Wireless Communicationsand Networks. Dr. Bennis serves as an editor for the IEEE Transactions onWireless Communication.

Walid Saad (S’07, M’10, SMŠ15) received hisPh.D degree from the University of Oslo in 2010.Currently, he is an Associate Professor at the De-partment of Electrical and Computer Engineeringat Virginia Tech, where he leads the Network Sci-ence, Wireless, and Security (NetSciWiS) labora-tory, within the Wireless@VT research group. Hisresearch interests include wireless networks, gametheory, cybersecurity, unmanned aerial vehicles, andcyber-physical systems. Dr. Saad is the recipient ofthe NSF CAREER award in 2013, the AFOSR sum-

mer faculty fellowship in 2014, and the Young Investigator Award from theOffice of Naval Research (ONR) in 2015. He was the author/co-author of fiveconference best paper awards at WiOpt in 2009, ICIMP in 2010, IEEE WCNCin 2012, IEEE PIMRC in 2015, and IEEE SmartGridComm in 2015. He is therecipient of the 2015 Fred W. Ellersick Prize from the IEEE CommunicationsSociety. In 2017, Dr. Saad was named College of Engineering Faculty Fellowat Virginia Tech. From 2015 U 2017, Dr. Saad was named the Steven O.Lane Junior Faculty Fellow at Virginia Tech. He currently serves as an editorfor the IEEE Transactions on Wireless Communications, IEEE Transactionson Communications, and IEEE Transactions on Information Forensics andSecurity.

Page 15: Resource Optimization and Power Allocation in In-band Full … · 2017-06-20 · channel allocation algorithm. All of the above works focus on single-cell optimization and hence,

15

Mérouane Debbah entered the Ecole NormaleSupérieure Paris-Saclay (France) in 1996 where hereceived his M.Sc and Ph.D. degrees respectively.He worked for Motorola Labs (Saclay, France) from1999-2002 and the Vienna Research Center forTelecommunications (Vienna, Austria) until 2003.From 2003 to 2007, he joined the Mobile Communi-cations department of the Institut Eurecom (SophiaAntipolis, France) as an Assistant Professor. Since2007, he is a Full Professor at CentraleSupelec (Gif-sur-Yvette, France). From 2007 to 2014, he was the

director of the Alcatel-Lucent Chair on Flexible Radio. Since 2014, he is Vice-President of the Huawei France R&D center and director of the Mathematicaland Algorithmic Sciences Lab. His research interests lie in fundamentalmathematics, algorithms, statistics, information & communication sciencesresearch. He is an Associate Editor in Chief of the journal Random Matrix:Theory and Applications and was an associate and senior area editor forIEEE Transactions on Signal Processing respectively in 2011-2013 and 2013-2014. Mérouane Debbah is a recipient of the ERC grant MORE (AdvancedMathematical Tools for Complex Network Engineering). He is a IEEE Fellow,a WWRF Fellow and a member of the academic senate of Paris-Saclay. Hehas managed 8 EU projects and more than 24 national and internationalprojects. He received 17 best paper awards, among which the 2007 IEEEGLOBECOM best paper award, the Wi-Opt 2009 best paper award, the2010 Newcom++ best paper award, the WUN CogCom Best Paper 2012 and2013 Award, the 2014 WCNC best paper award, the 2015 ICC best paperaward, the 2015 IEEE Communications Society Leonard G. Abraham Prize,the 2015 IEEE Communications Society Fred W. Ellersick Prize, the 2016IEEE Communications Society Best Tutorial paper award, the 2016 EuropeanWireless Best Paper Award and the 2017 Eurasip Best Paper Award as well asthe Valuetools 2007, Valuetools 2008, CrownCom2009, Valuetools 2012 andSAM 2014 best student paper awards. He is the recipient of the Mario Boellaaward in 2005, the IEEE Glavieux Prize Award in 2011 and the QualcommInnovation Prize Award in 2012.

Matti Latva-aho received the M.Sc., Lic.Tech. andDr. Tech (Hons.) degrees in Electrical Engineeringfrom the University of Oulu, Finland in 1992, 1996and 1998, respectively. From 1992 to 1993, hewas a Research Engineer at Nokia Mobile Phones,Oulu, Finland after which he joined Centre forWireless Communications (CWC) at the Universityof Oulu. Prof. Latva-aho was Director of CWCduring the years 1998-2006 and Head of Departmentfor Communication Engineering until August 2014.Currently he is Professor of Digital Transmission

Techniques at the University of Oulu. He serves as Academy of FinlandProfessor in 2017 - 2022. His research interests are related to mobilebroadband communication systems and currently his group focuses on 5Gsystems research. Prof. Latva-aho has published 300+ conference or journalpapers in the field of wireless communications. He received Nokia FoundationAward in 2015 for his achievements in mobile communications research.