Exploiting Channel Memory for Joint Estimation and Scheduling in Downlink Networks

被引:0
|
作者
Ouyang, Wenzhuo [1 ]
Murugesan, Sugumar [1 ]
Eryilmaz, Atilla [1 ]
Shroff, Ness B. [1 ]
机构
[1] Ohio State Univ, Dept ECE, Columbus, OH 43210 USA
关键词
D O I
暂无
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
We address the problem of opportunistic multiuser scheduling in downlink networks with Markov-modeled outage channels. We consider the scenario in which the scheduler does not have full knowledge of the channel state information, but instead estimates the channel state information by exploiting the memory inherent in the Markov channels along with ARQ-styled feedback from the scheduled users. Opportunistic scheduling is optimized in two stages: (1) Channel estimation and rate adaptation to maximize the expected immediate rate of the scheduled user; (2) User scheduling, based on the optimized immediate rate, to maximize the overall long term sum-throughput of the downlink. The scheduling problem is a partially observable Markov decision process with the classic 'exploitation vs exploration' trade-off that is difficult to quantify. We therefore study the problem in the framework of Restless Multi-armed Bandit Processes (RMBP) and perform a Whittle's indexability analysis. Whittle's indexability is traditionally known to be hard to establish and the index policy derived based on Whittle's indexability is known to have optimality properties in various settings. We show that the problem of downlink scheduling under imperfect channel state information is Whittle indexable and derive the Whittle's index policy in closed form. Via extensive numerical experiments, we show that the index policy has near-optimal performance. Our work reveals that, under incomplete channel state information, exploiting channel memory for opportunistic scheduling can result in significant performance gains and that almost all of these gains can be realized using an easy-to-implement index policy.
引用
收藏
页码:3056 / 3064
页数:9
相关论文
共 50 条
  • [31] A utility-based algorithm for joint uplink/downlink scheduling in wireless cellular networks
    Saad, Walid
    Dawy, Zaher
    Sharafeddine, Sanaa
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2012, 35 (01) : 348 - 356
  • [32] A Model Based Poisson Point Process for Downlink Cellular Networks Using Joint Scheduling
    Sinh Cong Lam
    Sandrasegaran, Kumbesan
    WIRELESS PERSONAL COMMUNICATIONS, 2019, 107 (04) : 1717 - 1725
  • [33] A Model Based Poisson Point Process for Downlink Cellular Networks Using Joint Scheduling
    Sinh Cong Lam
    Kumbesan Sandrasegaran
    Wireless Personal Communications, 2019, 107 : 1717 - 1725
  • [34] Joint Channel Probing and Proportional Fair Scheduling in Wireless Networks
    Zhou, Hui
    Fan, Pingyi
    Guo, Dongning
    IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2011, 10 (10) : 3496 - 3505
  • [35] Downlink, scheduling optimization in CDMA networks
    Kwan, R
    Leung, C
    IEEE COMMUNICATIONS LETTERS, 2004, 8 (10) : 611 - 613
  • [36] Downlink scheduling in CDMA data networks
    Bedekar, A
    Yeh, E
    GLOBECOM'99: SEAMLESS INTERCONNECTION FOR UNIVERSAL SERVICES, VOL 1-5, 1999, : 2653 - 2657
  • [37] Joint estimation of binaural distance and azimuth by exploiting deep neural networks
    Ding, Jiance
    Ke, Yuxuan
    Cheng, Linjuan
    Zheng, Chengshi
    Li, Xiaodong
    JOURNAL OF THE ACOUSTICAL SOCIETY OF AMERICA, 2020, 147 (04): : 2625 - 2635
  • [38] Joint adaptive combining and multiuser downlink scheduling
    Park, Ki-Hong
    Ko, Young-Chai
    Alouini, Mohamed-Slim
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2008, 57 (05) : 2958 - 2968
  • [39] Downlink Joint Processing CoMP Channel Estimation with Partial Channel State Information in LTE Advanced System
    Vijayarani, R.
    Nithyanandan, L.
    2014 INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION CONTROL AND COMPUTING TECHNOLOGIES (ICACCCT), 2014, : 739 - 743
  • [40] Queueing delay analysis for the joint scheduling exploiting multiuser diversity over a fading channel
    Ishizaki, Fumio
    Hwang, Gang Uk
    WIRELESS PERSONAL COMMUNICATIONS, 2008, 46 (04) : 397 - 411