You are on page 1of 15

Equivalent Capacity in Carrier Aggregation-Based

LTE-A Systems: A Probabilistic Analysis


Ran Zhang, Student Member, IEEE, Zhongming Zheng, Student Member, IEEE,
Miao Wang, Student Member, IEEE, Xuemin (Sherman) Shen, Fellow, IEEE,
and Liang-Liang Xie, Senior Member, IEEE

Abstract—In this paper, we analyze the user accommodation CA-based LTE-A systems, where LTE users can use only
capabilities of LTE-A systems with carrier aggregation for one CC while LTE-A users can enjoy concurrent multi-CC
the LTE users and LTE-A users, respectively. The adopted transmissions exploiting CA.
performance metric is equivalent capacity (EC), defined as the
maximum number of users allowed in the system given the While LTE-A is attracting considerable attention, the indus-
user QoS requirements. Specifically, both LTE and LTE-A try is busy with its realization, which not only covers prototype
users are divided into heterogeneous user classes with different design of the cellphone chipsets [6], but also expands LTE-A
QoS requirements, traffic characteristics and bandwidth weights. into many new areas, such as LTE-A in unlicensed spectrum
Two bandwidth allocation strategies are studied, i.e., the fixed- [7], direct device-to-device [8], vehicular communications [9],
weight strategy and the cognitive-weight strategy, where the
bandwidth weights of different user classes are prefixed under the [10], etc. Many research issues emerge in the realization
former and dynamically changing with the cell load conditions process of LTE-A, among which Resource Management (RM)
under the latter. For each strategy, closed-form expressions of is indispensable in optimizing the network resource utilization.
ECs of different user classes are derived for LTE and LTE-A Since LTE-A adopts Orthogonal Frequency Division Multiple
users, respectively. A net-profit-maximization problem is further Access (OFDMA) as the downlink access technology [11],
formulated to discuss the tradeoff among the bandwidth weights.
Extensive simulations are conducted to corroborate our analytical RM in LTE-A systems can date back to that in OFDMA
results, and demonstrate an interesting discovery that only a networks [12]–[14], where the subcarrier allocation and power
slightly higher spectrum utilization of LTE-A users than LTE management problems are fully analyzed. However, due to
users can result in a significant EC gain when the user traffic the unique features of the new standard, these works may
is bursty. Moreover, the cognitive-weight strategy is shown to not be directly applicable to LTE-A systems. For instance,
outperform considerably the fixed-weight one due to stronger
adaptability to the cell load conditions. different from subcarriers in OFDMA networks, the minimum
Index Terms—LTE-A systems, carrier aggregation, admission bandwidth allocation unit in LTE-A is Physical Resource
control, equivalent capacity, QoS provisioning. Block (PRB) [11], composed of 12 continuous subcarriers;
besides, as CA allows cross-CC load balancing and scheduling
I. I NTRODUCTION [15], new methods are required to further improve the overall
In order to meet the fulminic growth of the high-data-rate resource utilization.
aspiration, the 3rd Generation Partnership Project (3GPP) has Recently, many works have been done to incorporate the
proposed the Long Term Evolution-Advanced (LTE-A) [2] as unique characteristics of LTE-A into the design of RM strate-
the 4G mobile communication standard, providing substantial gies, aiming to improve the throughput [15] [16], enhance the
improvements over its original LTE standard [3]. Specifically, energy efficiency [17], mitigate the intercell interference [18],
LTE-A could achieve 1Gbps peak data rate for downlink and etc. Most of the works so far conduct evaluations based on the
500Mbps for uplink with a maximum 100MHz bandwidth, user-centric performance, e.g., average user throughput. The
respectively, compared with 300Mbps and 75Mbps with up theoretical analysis on the system-centric limiting capabilities
to 20MHz bandwidth under LTE; besides, LTE-A standard is still embryonic, which, however, can serve as essential
has higher spectral efficiency, stronger intercell interference benchmarks for system stability maintenance and Quality
control and supports the coexistence of multi-tier cells [4] by of Service (QoS) guarantee. In this paper, we explore the
integrating several advanced techniques. As one of the most downlink admission control process in a CA-based LTE-A
momentous techniques in LTE-A, Carrier Aggregation (CA) system and analyze its user accommodation capabilities for
allows scalable bandwidth extension via aggregating multiple the legacy LTE and LTE-A users, respectively. Specifically,
smaller band segments, each called a Component Carrier (CC), both the LTE and LTE-A users are divided into heterogeneous
into a wider virtual frequency band to transmit at higher classes with different QoS requirements (i.e., throughput and
rates [5]. With the backward compatibility of LTE-A, both loss probability requirements) and traffic descriptors (i.e.,
the legacy LTE users and LTE-A users can operate under active probabilities) as defined in Section III-B. Each user
class is allocated with a bandwidth weight. Two bandwidth
This work was presented in part at the IEEE ICC 2013 [1]. allocation strategies are studied, namely the fixed-weight s-
The authors are with the Department of Electrical and Computer En- trategy and the cognitive-weight strategy, where the bandwidth
gineering, University of Waterloo, 200 University Avenue West, Waterloo,
Ontario, Canada N2L 3G1 (e-mail: {r62zhang, z25zheng, m59wang, sshen, weights of different classes are pre-fixed in the former while
llxie}@uwaterloo.ca). can be dynamically changed in the latter according to the
instantaneous load conditions of different classes. The adopted quantifying the benefits of CA but also on benchmarking the
performance metric is equivalent capacity (EC) [19], referring QoS-aware admissible region for heterogeneous user classes
to the maximum number of users of each class that can be in the admission control process of CA.
admitted into the system based on the QoS requirements. The remainder of this paper is organized as follows. Section
To properly determine the EC in LTE-A systems, the II surveys the related works and Section III describes the
following challenges should be deliberated. First, unlike the system model. Sections IV and V present the theoretical
wired networks, the channel conditions of the wireless mobile analysis of the closed-form relationship under the fixed-weight
environment are dramatically time-fluctuating due to the com- strategy and cognitive-weight strategy, respectively. The trade-
plicated propagation environment. Consequently, the assigned off among bandwidth weights of different user classes is
bandwidth to satisfy the minimum throughput requirement of a evaluated in Section VI. Extensive simulation results are given
user changes from time to time, making it difficult to determine in Section VII. Finally, Section VIII concludes the paper.
the EC based on the user throughput requirements. Second,
II. R ELATED W ORKS
based on the statistics of user traffic, how to determine the EC
of each class to satisfy the loss probability requirements under In this section, we review the related works on LTE-A RM
different bandwidth allocation strategies is a challenging issue. and the concept of effective bandwidth.
Third, as LTE-A users can transmit with CA, whether the LTE-
A. RM in LTE-A Systems
A users can benefit much from CA over the LTE users needs
to be justified. Last but not least, since heterogeneous user RM in LTE-A systems can be traced to the works on
classes coexist, the tradeoff among the bandwidth allocation RM in OFDMA networks, where previous studies [12]–[14]
weights for different classes and the criteria therein should be mainly focus on reorganizing the limited network resources to
carefully discussed. Revolving around these challenges, the optimize the network performance. In [12], a novel scheme
contributions of this paper are fivefold. for the allocation of subcarriers, rates, and power was pro-
posed to maximize the aggregated data rates. In [13], the
• We take advantage of the concept effective bandwidth
energy efficiency problem was investigated for cognitive ra-
[20] to map the minimum required throughput of each
dio systems under the QoS constraints. In [14], the uplink
user class to a unified bandwidth, considering the multi-
relay selection problem was discussed to enhance the total
cell co-channel interference. With the derived bandwidth,
achievable throughput under total power constraint. Different
users are provided with probabilistic QoS guarantee,
from OFDMA networks, RM in LTE systems has some
which means that instead of guaranteeing the QoS by
new challenges. For instance, since the minimum bandwidth
100%, the system allows the QoS requirement to be
allocation unit in LTE is the PRB, [21] put forward a dis-
violated with a very small probability.
tributed and coordinated PRB and power allocation scheme
• A simple yet effective on-off model is applied to depict
to mitigate the intercell interference in LTE. As the control
the per-user traffic generation, based on which the aggre-
channel structure is updated in LTE over OFDMA systems,
gate traffic generation of each user class is modeled as a
[22] showed different conditions when an LTE system is data-
birth-death random process.
channel limited or control-channel limited. [23] further gave
• Under each bandwidth allocation strategy, closed-form
a comprehensive overview of downlink RM for LTE systems.
expressions of ECs are deduced first for a single-CC LTE-
As one of the most promising technologies adopted in LTE-
A system leveraging the binomial-normal approximation.
A systems, CA provides the opportunities for cross-CC load
The result is then extended to LTE-A systems with
balancing and scheduling. [15]–[18] studied the benefits of CA
multiple CCs, where the ECs between LTE and LTE-A
from different perspectives. In [15], a joint carrier load bal-
users are compared.
ancing and cross-CC packet scheduling scheme was presented,
• The tradeoff between the bandwidth weights of different
which compared the average and cell-edge throughput between
user classes is evaluated via a net-profit-maximization
LTE and LTE-A users. In [16], the average user throughput
problem for both LTE and LTE-A users under both
was compared between N separate LTE carriers and N aggre-
bandwidth allocation strategies, considering the operator
gated LTE-A CCs. In [17], uplink cross-layer carrier selection
service profits, user satisfaction and instantaneous traffic
and power control problems were investigated, aiming to
load conditions.
improve the average user throughput with the power offset
• Extensive simulation results are provided to validate our
effects. In [18], a novel intercell interference control scheme,
theoretical analysis and compare the EC performance be-
called ACCS, was proposed, where femtocells adaptively
tween LTE and LTE-A users and between two bandwidth
choose CC subsets for interference mitigation. However, most
allocation strategies. The optimal net-profits under two
of the existing works evaluate the system performance based
bandwidth allocation strategies are also compared.
on the metric - average throughput, without comprehensive
To the best of our knowledge, this is the first work in analysis on the system limiting capabilities. Our previous work
literature that gives theoretical analysis on the admission [1] studied the system-level user accommodation capabilities
control process in CA-based LTE-A systems. The research for heterogeneous user classes based on the metric - EC,
outcomes should shed some light not only on theoretically but the characteristics of the wireless physical channel is not
involved into the analysis. Besides, the bandwidth weights for users are considered for the analysis, respectively. Both LTE
different classes were assumed to be fixed and no discussion and LTE-A users are divided into K classes with different
about the tradeoff among the weights was given. In this work, QoS requirements (i.e., the throughput and loss probability
we focus on EC performance of LTE-A systems with CA requirements) and traffic descriptors (i.e., active probabilities).
considering both fixed and dynamically changing bandwidth For each class-k user, the minimum required throughput is
weights under the wireless fading statistics. In addition, a rku and the maximum loss probability is δk . δk refers to the
net-profit-maximization problem is formulated to discuss the maximum probability that there exist class-k users which are
tradeoff for both LTE and LTE-A users under different band- admitted into the system but cannot get any bandwidth when
width allocation strategies. they turn active, i.e., having packets to deliver. The important
symbols are summarized in Table I.
B. The Effective Bandwidth Concept
The effective bandwidth concept was first proposed in [24], Symbol Definitions
where Elwalid et al. initiated the concept by assigning a λBS The density measure of BSs in the considered area A
ΦBS The set of BSs in the considered area A
unified notional bandwidth to each connection with identical αk , β k The state transition rates of the on-off Markov traffic
grade of service and traffic characteristics to control the model
buffer overflow probability. In [25], Chang et al. provided a Blcc The channel bandwidth of lth CC
cc(,nor)
simple intuitive derivation of the effective bandwidth by using Blk The (normalized) bandwidth assigned to user class k
in lth CC
large deviation theory and the Laplace integration method. Bku The effective bandwidth assigned to each class-k user
In [20], Wu et al. took a step further by incorporating the Bku,ins (t) The instantaneous required bandwidth to satisfy rku at
wireless channel statistics into the derivation framework and time t when the channel gain is hu,ins
k (t)
studied the wireless link-level delay bound by employing δku The maximum loss probability of user class k
K The total number of user classes in the system
the dual of the effective bandwidth - effective capacity. In Nlk The equivalent capacity (EC) of user class k in CC l
[26], Abdrabou et al. applied the results of [20] to model Nk
LT E(−A)
The total EC of user class k when LTE (LTE-A) users
the probabilistic packet delivery delay in vehicular ad hoc are considered
ad
Nl1 The current number of admitted class-1 users in CC l
networks. In this paper, we apply the concept to an LTE-
nlk The number of class-k users currently being served
A system to evaluate its EC performance. Considering the in lth CC
wireless multi-cell co-channel interference, unified effective pk The active probability of user class k
bandwidth is derived while keeping the violation probability πik The steady-state probability of the state i of the
composite birth-death process for user class k
of the minimum throughput requirement under a small level. rku The minimum throughput requirement of user class k
Based on the effective bandwidth, closed-form expressions of Γk A constant which varies with δk
EC can be deduced. σlk The standard derivation of the number of active class-k
users in lth CC when Nlk class-k users are admitted
So,lk The overload state in and beyond which the loss occurs
III. S YSTEM M ODEL for user class k in lth CC
max )
ωlk (ωlk The (maximum) bandwidth weight of class k in CC l
We consider a multi-cell downlink scenario where the base
stations (BSs) are deployed following a homogeneous Poisson TABLE I: Summary of Important Mathematical Notations.
point process (PPP) [27] with density measure λBS , i.e., the
number of BSs within any given region A with area |A| is
a Poisson random variable with parameter λBS |A|, and the A. CC Bandwidth Structure
BSs are uniformly located within A. Denote all the BSs as We first present the CC bandwidth structure in LTE-A
a set ΦBS . The users are uniformly distributed within region systems. As shown in Fig. 2, the channel bandwidth Blcc of the
A. Each user will be associated to its nearest BS for service. lth CC is up to 20MHz and contains two parts: the guard bands
Under such an association policy, the actual coverage area (GBs) and the transmission bandwidth. As specified in [29],
of a BS becomes a Voronoi cell [28] where any point in the GBs are set on both sides of each CC to avoid interference
a Voronoi cell has a shorter distance to the corresponding caused by Doppler Shift and Frequency Aliasing Effect in
BS than to other BSs, as shown in Fig. 1. LTE-A and LTE real systems [30]. No effective data will be transmitted in the
10
GBs. The total percentage of GBs is denoted as θ. For the lth
CC, the transmission bandwidth is divided into Pl PRBs, each
8
composed of Nlsc continuous subcarriers with bandwidth Blsc .
6
The relationship of all the above variables is given as
4 (1−θ)Blcc
Pl = Blsc Nlsc , l = 1, 2, ..., n, (1)
2

0
where n denotes the number of CCs. The assignment of PRBs
0 2 4 6 8 10
for each user is determined according to the throughput re-
Fig. 1: The Voronoi cells formed by 9 BSs uniformly located quirement and channel conditions. The interference from other
within a 10km × 10km area. users in the same cell is ignorable due to the orthogonality of
PRBs. For LTE users, the transmission bandwidth may not Mk (M >> 1) independent and statistically multiplexed mini-
be fully utilized as the remaining PRBs in one CC may not sources with identical constant data rate rkmini . Each mini-
be sufficient to serve any more users. However, for LTE-A source can be modeled with the above on-off model. There-
users, these unused PRBs in different CCs could be combined fore, when the video sources are considered, the equivalent
together to jointly serve a user through the CA technique. In mini-sources can be treated in a similar way with the voice
this way, the LTE-A users could achieve higher spectrum usage sources, except that the EC for the mini-sources of the same
than the LTE users. In this paper, such PRBs are referred to video user class should be a multiple of Mk . As the main
as semi-usage PRBs. emphasis of this paper lies in the EC comparison between LTE
and LTE-A users, we only use voice sources in the following
Channel bandwidth of one CC Bl
cc analysis for the simplicity of computation and presentation.
Transmission bandwidth (1 - q ) Blcc
Guard Guard
Band
with Pl PRBs
Band
Guard C. Bandwidth Sharing Model
sc sc
Band
PRB PRB PRB PRB ( N B ) PRB PRB
l l
For bandwidth allocation among different user classes,
two strategies are considered, i.e., fixed-weight strategy and
··· ··· ··· ··· cognitive-weight strategy. Under the former strategy, the band-
width allocation weights ωlk for class-k users are pre-fixed;
while under the latter one, the weights can dynamically
One subcarrier Transmission bandwidth
f change with the instantaneous number of active users of each
Remaining PRB not
( Blsc ) for one user sufficient for one LTE user class. Moreover, in the latter strategy, different user classes
Fig. 2: Bandwidth structure for LTE-A systems based on are endowed with different priorities. Preemptive priority is
OFDMA. considered with which the services of some lower-priority
users will be interrupted by the higher-priority users when
there is no available bandwidth. Thus, the loss probability of
B. Traffic Generating Model one user class is merely affected by the number of users with
higher priorities. Without loss of generality, the priorities are
Throughput requirement
set in a descending order with respect to k. In addition, to
ak avoid the spectrum monopoly and evaluate the impact of user
rku on
Off On 1 1 dissatisfaction factor on ECs, a maximal bandwidth allocation
ak max
bk weight ωlk is set for each class in the latter strategy.
bk off off t One important application scenario of the latter strategy is
(a) (b) the bandwidth allocation for user classes with diverse delay
requirements, where the user class with more strict delay
Fig. 3: On-off traffic generation model of one user.
requirement will be assigned with higher priority.
For spectrum sharing within one user class, random spec-
We consider both voice sources and video sources. Two trum access (RSA) method is used. In each transmission time
traffic models which are corroborated by empirical data [31] slot, if there are not enough PRBs for every active user in one
[32] are exploited, respectively. For the voice sources, we use class, the system randomly chooses a subset of active users
an on-off traffic source model to describe the dynamics of the to schedule. One scheduled user is randomly assigned with
user traffic [31]. Each voice source is represented by a two- several PRBs according to its QoS requirements. One LTE
state continuous-time Markov chain. with the states on and user can only be assigned with PRBs within one CC; while
off, as depicted in Fig. 3(a). The state on means the user is one LTE-A user can be assigned with PRBs from different
active and requires a minimum throughput of rku for class-k CCs. Transmission buffers are not considered here, thus, the
users, while the user remains silent in the state off. The on and packets that are generated in one slot but cannot be transmitted
off intervals are exponential with transition rates denoted as within the same slot are considered as lost.
βk and αk , respectively. Then the average on and off period
are 1/βk and 1/αk as shown in Fig. 3(b)). Therefore, the D. Definition of EC
average probability that a class-k user is on (denoted as active
a) Loss-probability-aware ECs. With RSA, the utilization
probability pk ) can be calculated as,
factor ρl of the lth CC is defined as,
1/βk αk ∑
K
pk = 1/αk +1/βk = αk +βk , k = 1, 2, ..., K. (2) Mlk pk Bku
∆ k=1 (3)
ρl = (1−θ)Blcc ,
Notice that we consider bursty users satisfying pk ≪ 1, e.g.,
the average on period is far smaller than the average off period. where Mlk is the number of admitted class-k users in lth CC,
Unlike the constant data rate generated by voice sources, and Bku is the effective bandwidth provided by the operator for
one video source has time-varying data rate which cannot be each class-k user. When ρl equals to 1, the spectrum utilization
simply modeled as an on-off model. However, according to can be maximized, however, the loss probabilities for some
[32], one class-k video source can be effectively modeled as class k may exceed δk . Thus to keep the loss probability of
each class under the desired level, ρl should be less than 1. To According to the LTE-A standard [11], the frequency reuse
this end, the loss-probability-aware EC for class k in lth CC, factor of LTE-A systems is 1, which means each cell operates
denoted as Nlk , is defined as the maximum Mlk that satisfies on the same spectrum and the co-channel interference of the
the loss probability requirement δk , given specified bandwidth considered cell is the summation of the interference from
allocation strategy and bandwidth weights {ωlk } (or {ωlk max
}). all the other cells in area A. For a probabilistic analysis,
With the derived EC set {Nlk }, a class-k user will be admitted the statistical behaviors of the user SINR (i.e., user SINR
if the current number of admitted class-k users is less than distributions) are required. Our previous work [33] has applied
max
Nlk . As different ωlk (or ωlk ) can result in different ECs, the Stochastic geometry [34] to provide tractable probabilistic
the tradeoff among the bandwidth weights is further discussed interference modeling for users in LTE-A systems. Therefore,
in Section VI for both bandwidth allocation strategies. based on [33], the detailed analysis for user SINR distribution
b) Mapping from minimum required throughput to the and effective bandwidth is shown as follows.
effective bandwidth. As EC is defined on a bandwidth basis,
the user’s minimum throughput requirement should be mapped
into bandwidth requirement to be included in Eq. (3). As
aforementioned in Section I, in a wireless mobile environment,
The channel gain of a user consists of two parts: the path
the time-varying channel conditions make it difficult for the
loss and fast fading. The shadowing effect is not considered
operators to provide a unified bandwidth to satisfy the mini-
since the shadowing is shown to be well approximated by the
mum throughput requirement rku for all the class-k users at one
randomness of the Poisson distributed BS locations [35]. This
time. To this end, effective bandwidth is exploited to derive a
is a strong justification that we can model the locations of
unified bandwidth Bku to provide probabilistic QoS guarantee
BSs into a PPP. Denote the power spectral density (PSD) of
for all class-k users. In particular, the bandwidth Bku should
the BS transmission power and noise power as Pt and N0 ,
be chosen such that
respectively. Then, the PSD of the received power of a user
sup Pr{Bku,ins (t) ≥ Bku } ≤ e (0 < e ≪ 1), (4) from BS B is calculated as
t

is satisfied, where Bku,ins (t) denotes the instantaneous min- Pr = Pt HDB −α , B ∈ ΦBS , (5)
imum required bandwidth to guarantee rku at time t, and e where H is the fast fading channel gain; DB is the distance
is the upper bound of the QoS violation probability. Eq. (4) between the considered user to BS B; and α is the path loss
indicates that given the statistical behaviors of the co-channel exponent. Then the user SINR is calculated as
interference, the constant bandwidth Bku provided by the
operator to each class-k user should be no less than Bku,ins (t) Pt HDB0 −α
SIN Rk = ∑ , (6)
with probability 1 − e. In this way, the effective bandwidth Pt H inf DB −α + n0
Bku provides a bridge between the throughput requirement rku B∈Φinf
BS \B0

and the EC Nlk over the wireless channel statistics. In this where ΦinfBS denotes the set of interfering BSs in ΦBS that
paper, we mainly focus on the intra-band CA [30], where all transmit on the same bandwidth with the considered user;
the CCs are located in the same frequency band and thus have Φinf
BS \B0 means the set of interfering BSs excluding B0 ;
the same radio channel statistics. and H inf denotes the fast fading channel gain between the
IV. E QUIVALENT C APACITIES WITH F IXED BANDWIDTH considered user and the interfering BSs. In this paper, the fast
A LLOCATION W EIGHTS fading between the considered user and the serving BS B0 is
The fixed-weight bandwidth allocation strategy is analyzed Rayleigh fading, and the fast fading between the considered
in this section. Specifically, we first show how to obtain the user and the interfering BSs is generally distributed. There-
user effective bandwidth from the throughput requirement, fore, the probability density function of H is an exponential
considering the multi-cell co-channel interference. Then, the distribution with parameter µ. For simplicity, µ is set to 1.
analysis on a single CC is conducted to find the closed-form
{Nlk }-Blcc relationship, subject to the user equivalent QoS
requirements (i.e., Bku and δk ) and traffic descriptors (i.e.,
active probability pk ). The results are further extended to an To obtain the SINR distribution for one user, we calculate
LTE-A system with n aggregated CCs, where the ECs are the cumulative probability function (cdf) of SIN Rk . The
compared between LTE and LTE-A users under the same probability that SIN Rk is larger than a threshold Tk is
system setting.
P{SIN Rk > Tk }
A. Effective Bandwidth from User Throughput Requirement Pt HDB0 −α (I+n0 )DB0 α Tk
= P{ I+n0 > Tk } = P{H > Pt }
For downlink LTE-A systems, as users within the same cell ∑ (7)
are assigned with orthogonal PRBs, there is no interference where I = Pt H inf DB −α .
B∈Φinf
BS \B0
among themselves. The co-channel interference is only from
other cells that use the same PRBs with the considered cell. Following the procedure in [33], the final result of
P(SIN Rk > Tk ) is given directly as er) while decrease approaching 0 when QoS is made more
∫ +∞ α Tk loose (i.e., δk becomes larger). In the following, systematic
P{SIN Rk ≥ Tk } = 1 − 0 2πλBS re−πλBS r e−n0 r Pt
2
derivations are given to justify Eq. (13) with derived relation
· exp{−2πθusa λBS ρ(r, H inf , Tk )}dr, between Γk and δk . Substituting σlk into Eq. (13), we can get
where ρ(r, H[inf , Tk ) = − 21 r2 + 12 r2 EH inf {e−T] k H + √
inf

(Tk H inf )2/α Γ(1 − α2 , 0) − Γ(1 − α2 , Tk H inf ) },


cc
Blk = (Nlk pk + Γk Nlk pk (1 − pk ))Bku . (14)
∫ +∞ s−1 −x cc
and Γ(s, t) = t x e dx. By normalizing the bandwidth Blk with Bku , we can obtain
(8) cc,nor

In Eq. (8), θusa is the bandwidth usage probability that one Blk = Nlk pk + Γk Nlk pk (1 − pk ), (15)
BS transmits on the same bandwidth with the considered user. where Blk cc,nor
= Blk cc
/Bku is the normalized bandwidth,
If the worst case is considered, i.e., every BS transmits on the and ⌊Blk cc,nor cc,nor
⌋, i.e., the largest integer smaller than Blk ,
same bandwidth with the considered user, the bandwidth usage indicates the maximum number of class-k users that can be
probability is equal to 1. According to Eq. (4), the effective served concurrently by bandwidth Blk cc
. With RSA method,
bandwidth Bku should be chosen such that cc,nor
Blk < Nlk should hold when pk < 1.
sup P{Bku,ins (t) ≥ Bku } ≤ e (0 < e ≪ 1), (9)
t Underload Overload
that is, Nlka k ( Nlk - 1)a k ( Nlk - So ,lk + 1)a k

sup P{rku,ins (t) ≤ rku } ≤ e (0 < e ≪ 1), (10)


t 0 1 2 So,lk -1 So ,lk N lk
bk 2b k So ,lk b k
where Bku,ins (t)
is the instantaneous required bandwidth of
class-k user, and rku,ins (t) is the instantaneous achieved Fig. 4: Composite traffic model for the system states
throughput when bandwidth Bku is assigned. The left hand In our analysis, all the users are on or off independently.
side of Eq. (10) can be rewritten as Therefore, the Nlk class-k users, each with the traffic model
sup P{rku,ins (t) ≤ rku } = P{Bku log(1 + SIN Rk ) ≤ rku } ≤ e described in Subsection III-C, give rise to the composite traffic
t u u model in Fig. 4. This model is essentially an (Nlk + 1)-state
⇒ P{SIN Rk ≥ 2rk /Bk − 1} ≥ 1 − e birth-death process, where state i indicates there are i active
(11) class-k users in the system. Due to the independency among
u u
Let Tk = 2rk /Bk − 1. Based on Eq. (8), Bku can be finalized all the users, the state-transition rate αk , βk of the traffic model
as the minimum integral multiple of Nlsc Blsc that satisfies Eq. of each user can be directly added together to form the inter-
(11), where Nlsc Blsc is the bandwidth for one PRB, and the state transition rates as shown in Eq. (16), where Ri,j denotes
constraint of integral multiple is due to the fact that one PRB the transition rate from state i to state j.
is the minimum bandwidth allocation unit in LTE-A systems. 
 Ri,i+1 = (Nlk − i)αk , 0 ≤ i ≤ Nlk − 1,

B. Equivalent Capacity for a Single Carrier
Ri,i−1 = iβk , 1 ≤ i ≤ Nlk , (16)
For the fixed-weight strategy, ωlk is fixed, thus Nlk is only 

Ri,j = 0, |i − j| ̸= 1.
related to the parameters of class k. As aforementioned in
Subsection III-D, if the utilization factor ρl equals to 1, the loss The overload state So,lk is defined for each class k as So,lk =
cc,nor cc,nor
probability requirements may not be guaranteed. To control ⌈Blk ⌉, which is the minimum integer larger than Blk .
the loss probabilities below desired levels {δk }, the bandwidth The state So,lk is the critical state above which loss will occur,
assigned to class k should be larger than the average bandwidth i.e, the system is overloaded. We now calculate the steady-state
requirement of class k, i.e., probabilities {πik } (i = 1, ..., Nlk ) that the system is in state
cc
i. As all the users are independent, the probabilities {πik }
Blk > Nlk pk Bku , l = 1, 2, ..., n; k = 1, 2, ..., K, (12) follow the binomial distribution, where i out of Nlk users are
where cc
Blk = ωlk (1−θ)Blcc
is the bandwidth assigned to class- active and the other (Nlk − i) are off. Therefore, we have

K
k users. ωlk cc
denotes the weight of Blk , satisfying ωlk = 1.
i
πik = CN p i (1 − pk )Nlk −i , i = 0, 1, ..., Nlk ,
lk k
(17)
k=1
We intuitively and heuristically add some multiple of to σlk Bku where i
CN lk
is the number of choices when picking i out of
the right hand side of (12), where σlk is the standard deviation Nlk . With {πi }, the loss probability δk can be calculated as
of the number of√active class-k users in lth CC [36], thus the summation of πik of all the overload states, i.e.,
satisfying σlk = Nlk pk (1 − pk ), i.e., ∑
Nlk

cc δk = πik . (18)
Blk = Nlk pk Bku + Γk σlk Bku , (13) i=So,lk

where Γk is a constant which varies with the specified QoS It is well known that when Nlk ≫ 1 and pk is much
requirement (e.g., loss probability δk ). Γk should increase smaller than 1, the binomial distribution πik can be closely
when the QoS is more strictly defined (i.e., δk becomes small- approximated by the normal distribution with the mean value
Nlk pk and variance σlk 2
= Nlk pk (1 − pk ) [37]. In this CCs, the total EC for class k, denoted as NkLT E , should be
paper, this condition is satisfied for large number of class- the summation of every Nlk . Hence we have,
k users with bursty traffic. We convert i and summation to ∑n
continuous variable x and integrals, respectively, and then the NkLT E = Nlk
loss probability δk is approximated by ⌊
∑ Blk
n
l=1
cc,nor [√ ]⌋
cc,nor
∫ +∞ −(x−Nlk pk )2 /(2σlk 2 ) ∫ +∞ = − p1k 4λk (Blk + λk ) − 2λk ,
e−y
2 pk
e l=1
δk ≈ √ dx = S −N p √ dy,
2πσlk o,lk lk k π where
So,lk √
2σlk √
(19) λk = Γk 2 (1 − pk )/4, Γk = −2 ln δk − ln(2π),
cc,nor
where
√ the second step is achieved by replacing x with Blk = ωlk (1 − θ)Blcc /Bku .
2σlk y + Nlk pk . Then, integration by parts method is applied (26)
to keep the dominant parts of the integration. By multiplying For LTE-A users, they can use PRBs from different CCs
numerator and denominator of the integral by y, we have, to transmit concurrently on a wider aggregated virtual band-
∫ +∞ −y2 ∫ width. The normalized virtual bandwidth for each class k is

e−z e−z 3 +∞ e−y
2 2 2
ye n cc,nor
dy = − + dy, (20) l=1 Blk . Therefore, the total EC for class k, denoted as
z y 2z 4z 3 4 z y4 NkLT E−A , is given below,

where z = (So,lk − Nlk pk )/ 2σlk . When z is greater than 3 N LT E−A
=
k ⌊n ⌋
(can be easily guaranteed in our setting), the first two items  LT E ∑ cc,nor ∑n

 N , if B − cc,nor
⌊Blk ⌋ < 1;
on the RHS of Eq. (20) are much larger than the third one. 
 k lk

 ∑ [√l=1 l=1
]
Therefore, we can obtain n

 l=1 Blk 
cc,nor

∫ +∞ −y2 ∑ cc,nor
n
−z 2 −z 2   − 1
4λ ( B + λ ) − 2λ ,
e dy ≈ ( e 2z − e4z3 ). (21) 
 p p k lk k k
z 

k k
l=1
cc,nor 

Finally, since So,lk ≈ Blk , combining (19)-(21), we derive otherwise,
the expression of loss probability δk as, (27)
cc,nor with the same λk , Γk and Blk defined in Eq. (26). From
σlk e−(Blk −Nlk pk )/2σlk
2

δk ≈ √ cc,nor . (22) Eq. (26) and (27), we can observe that the ECs of both
2π(Blk − Nlk pk ) LTE and LTE-A users increase when one of the following
Take natural logs for both sides of (22), we have situations occurs: i) the active probability pk decreases, ii) the
maximum loss probability δk increases, or iii)⌊ the normalized ⌋
√ σlk cc,nor
(Blk − Nlk pk )
2
∑n
ln( 2πδk ) = ln cc,nor − . bandwidth B cc,nor increases. Besides, when cc,nor
Blk −
(Blk − Nlk pk ) 2σlk 2 l=1
(23) ∑
n
cc,nor
The first item on the RHS of (23) is neglectable compared ⌊Blk ⌋ < 1, the maximal number of LTE-A users that
l=1
with the second, so Eq. (23) can be further simplified and can be concurrently served is equal to that of LTE users, since
rearranged as even combining the left PRBs of all CCs is not enough to
cc,nor
√ support one more user. In this situation, NkLT E−A and NkLT E
Blk ≈ Nlk pk + σlk −2 ln δk − ln(2π). (24)
are equal, which is called the zero-gain situation. However,
Now, the previously proposed
√ heuristic thought in Eq. (15) when it is not the case, more PRBs will be used by LTE-A
is justified with Γk = −2 ln δk − ln(2π), and Nlk can be users for multi-CC transmission, and NkLT E−A will be larger
solved easily from Eq. (24), than NkLT E , which will be verifed in Section VII.
⌊ cc,nor [√ ]⌋
Nlk =
Blk
− p1k cc,nor
4λk (Blk + λk ) − 2λk , V. E QUIVALENT C APACITIES WITH C OGNITIVE
pk
BANDWIDTH A LLOCATION W EIGHTS
where
λk = Γk 2 (1 − pk )/4, Blkcc,nor
= ωlk (1 − θ)Blcc /Bku . In this section, the cognitive-weight strategy is studied.
(25) Similar to Section IV, we first derive the closed-from ex-
Therefore, combining Eq. (12), (15) and (25), we can finally pression in single-carrier LTE-A systems and then extend the
conclude that for the lth CC, given fixed bandwidth weight expression to multi-carrier case where the ECs between LTE
ωlk , users’ effective bandwidth Bku , loss probability δk , active and LTE-A users are compared. For the sake of analytical
cc,nor simplicity and presentation, we only show the closed-form
probability pk , the normalized bandwidth Blk and the EC
Nlk have the relationship shown in Eq. (25) for each class k. results and conduct simulations for the two-user-class case.
The methodology to obtain the results for generalized cases is
C. EC Comparison in Multi-Carrier LTE-A Systems also given in the last.

The ECs between LTE users and LTE-A users for each class A. Single-Carrier Case
k are compared in this subsection. n CCs are considered. For In this section, we consider downlink transmission in a
the LTE users, as they cannot aggregate PRBs from different single carrier with only two user classes. Without loss of
ad
generality, class 1 is assumed with higher priority than class ∑
Nl1

Nl2

2. We follow the effective bandwidth mapping procedure in πnl1 1 πnl2 2 .


Section IV. All the previous notations are applicable in this nl1 =Kl1 +1 nl2 =⌊a(Kl1 )⌋+1
max
| {z }
section. Moreover, we denote ωl1 as the maximal bandwidth A2 (33)
weight for class 1 in lth CC, thus ωl1 ≤ ωl1 max
. Then, nl1
where πnl1 1 = CN ad p1
nl1
(1 − p1 )Nl1
ad
−nl1
,
l1
the maximal number of class-1 users that can be served
concurrently by lth CC (denoted as Kl1 ) is
nl2
πnl2 2 = CN p nl2 (1 − p2 )Nl2 −nl2 ,
l2 2
⌊ cc max ⌋ ad
nl1 = 0, 1, ..., Nl1 , nl2 = 0, 1, ..., Nl2 .
Bl ωl1 (1−θ)
Kl1 = B u . (28)
1 A1 is the loss probability of class-2 users when there is no loss
Given the number of class-1 users concurrently being served, from class-1. A2 is the loss probability when the loss of class
max
i.e., nl1 , the maximum number of class-2 users that can be 1 occurs, i.e., maximal bandwidth allocation weight ωl1 is
concurrently served by lth CC, denoted as Kl2 (nl1 ), can be reached. Similar as Section IV, since Nl1 ≫ 1, Nl2 ≫ 1
ad

expressed as and pk ≪ 1 (k = 1, 2), the steady-state probabilities {πnlk k }


{ can be approximated by normal distribution with mean value
⌊a(nl1 )⌋ , if nl1 ≤ Kl1 ;
Kl2 (nl1 ) = (29) Nl1ad
p1 (or Nl2 p2 ) and variance σl1 2
= Nl1 ad
p1 (1 − p1 ) (or
⌊a(Kl1 )⌋ , if nl1 > Kl1 ;
σl2 = Nl2 p2 (1 − p2 )) as shown below,
2

where a(·) is a function defined as ∫ Kl1 e−(x−Nl1


ad p )2 /(2σ 2 ) ∫
1 l1 +∞ e−(y−Nl2 p2 )2 /(2σl2 2 )
δ2 = −∞ √ √ dydx
∆ Blcc (1−θ)−xB1u 2πσ a(x) 2πσ
a(x) = B2u . (30) l1 l2

∫ +∞ ad 2 2
e−(x−Nl1 p1 ) /(2σl1 )
∫ +∞ e −(y−Nl2 p2 )2 /(2σl2 2 )
+ √ dydx. √
As aforementioned, all the users are on or off independently Kl1 2πσl1 a(Kl1 ) 2πσl2
(34)
with the traffic generation model described in Subsection
We first calculate A1 . Similar as Eq. (19)-(21), we utilize
III-C. Thus the Nl1 class-1 and Nl2 class-2 users can form
integration by parts to keep the dominant parts of the single
two independent birth-death processes with (Nl1 + 1) and
integral with respect to variable y. Then the double integral
(Nl2 + 1) states, respectively, as shown in Fig. 4. Having
A1 is turned into single integral with respect to x as
preemptive priority over class-2 users, a class-1 user can get
ad p )2
served immediately as long as ωl1 ≤ ωl1 max
after it is accepted. ∫ Kl1 −
(x−Nl1 1

[a(x)−Nl2 p2 ]2
A1 ≈ √ 1 e √
2σl1 2 2σl2 2
dx
As a result, the overload state of class 1 is fixed while that of 2πσl1
−∞ 2[a(x)−Nl2 p2 ]/σl2
class 2 changes with nl1 , | {z }
A3
ad p )
(x−Nl1
2
[a(x)−Nl2 p2 ]2
(35)
So,l1 = Kl1 + 1, So,l2 = Kl2 (nl1 ) + 1. (31) ∫ Kl1 −
1

− √2πσ
1
e √
2σl1 2 2σl2 2
dx .
l1
−∞ 2[a(x)−Nl2 p2 ]3 /σl2 3
Given the loss probability requirement δ1 and active probabil- | {z }
ity p1 of class-1 users, the EC Nl1 can be calculated similarly A4
as Eq. (25), √
⌊ [√ ]⌋ The approximation holds when [a(x) − Nl2 p2 ]/( 2σ2 ) > 3
Nl1 = Kp1l1 − p11 4λ1 (Kl1 + λ1 ) − 2λ1 , for all x ∈ (−∞, Kl1 ), which can be easily satisfied by our
√ settings. We continue to calculate A3 as labelled in Eq. (35).
where λ1 = Γ1 2 (1 − p1 )/4, Γ1 = −2 ln δ1 − ln(2π).
(32) Re-define z = a(x) − Nl2 p2 and A3 can be rewritten as

The calculation of Nl2 is the most challenging part of the σl2 B2u ∫ +∞ −
[r−Nl1 p1 −(B2u /B u )z]2
1 − 2σz
2
dz
A3 = √ u e 2σl1 2 l2
2
2B1 a(Kl1 )−Nl2 p2 z
derivation. Different from the fixed-weight strategy, Nl2 in ∫ +∞ 2 −C z+C
σl2 B2u
√ u e−C1 z 2 3
the cognitive-weight strategy is closely related to the current = 2B1 a(Kl1 )−Nl2 p2 z dz,
ad ad
number of admitted class-1 users (denoted as Nl1 ). Nl1 is where
considered to be Kl1 ≪ Nl1 ≤ Nl1 , because the number of
ad
(B2u /B1u )2 B2u (Nl1
ad
p1 −r)
C1 = 2σl1 2 + 2σ1l2 2 > 0, C2 = σl1 2 B1u ,
admitted users can be much larger than the maximum number 2
(N p −r)
ad
of users that can be concurrently served due to the small active C3 = − l12σl11 2 ,
probability p1 in the considered scenarios. B u +B cc (1−θ)−N p B u Blcc (1−θ)−Nl2 p2 B2u
r = 2 l B u l2 2 2 ≈ B1u .
1
ad max
Given Nl1 , ωl1 and loss probability requirement δ2 , (36)
we still exploit the binomial-normal approximation to get As C1 is positive, we can still use integration by parts to only
a closed-form relationship between Blcc and Nl2 . With the keep the dominant first two items,
steady-state probabilities {πi1 } and {πi2 }, the loss probability [ ]
σ Bu
of class-2 users can be calculated with two parts, A3 ≈ √l22B2u 2C1 η21+C2 η − (2C η+C4C)(2C
1 η+C2
2 2
1 1 2 1 η +C2 η)

· e−C1 η −C2 η+C3 ,


2
(37)

Kl1 ∑
Nl2
δ2 = πnl1 1 πnl2 2 + where η = a(Kl1 ) − Nl2 p2 .
nl1 =0 nl2 =⌊a(nl1 )⌋+1
| {z }
A1
A4 can be approximated in the same way and given as shown below,
[ ] ∑n
σ 3 Bu 3 2
A4 ≈ √l22B u2 η3 (2C11η+C2 ) − (2C η48C 1 η +3C2 η
2
+C η 2 ) (2C η+C ) N1LT E = Nl1
1 1 2 1 2
l=1 ⌊ [√ ]⌋
· e−C1 η −C2 η+C3
2
. ∑n
p1 − 4λ1 (Kl1 + λ1 ) − 2λ1 ,
Kl1 1
(38) = p1
l=1
Now we have derived the first part A1 of loss probability δ2 ∑
n
with the summation of A3 and A4 as shown in Eq. (37) and N2LT E = Nl2
(38). The second part A2 is easier to calculate, since the two
l=1
∑n ⌊ [√ ]⌋
a(Kl1 )
integrals in A2 are independent with each other and thus can = p2 − 1
p2 4λ2l (a(Kl1 ) + λ2l ) − 2λ2l ,
l=1
be viewed as the product of two single integrals with respect where
to x and y, respectively. Applying the integration by parts √
λ1 = Γ1 2 (1 − p1 )/4, Γ1 = −2 ln(δ1 ) − ln(2π),
method, we can get the value of A2 as
√2l (1 − p2 )/4,
2
λ2l = Γ
1 −1) (2z2 −1) −C1 η −C2 η+C3
2 2 2
A2 ≈ π1 (2z4z 4z2 3 e , Γ2l = −2 ln(δ2 ) − (Kl1 − Nl1
ad p ) /σ 2 , 2
1
3
√ ⌊ ⌋ 1 l1
where z1 = (Kl1 − Nl1 ad
p1 )/( √
2σl1 ), (39)
Kl1 =
cc max
Bl ωl1 (1−θ)
.
Bu
z2 = [a(Kl1 ) − Nl2 p2 ]/( 2σl2 ). 1
(43)
Eq. (37)-(39) can hold only if both z1 and z2 are larger than 3, On the other hand, LTE-A users can use PRBs from differ-
which can be satisfied by our settings. It can be seen that A3 , ent CCs to transmit concurrently on a wider aggregated virtual
A4 and A2 all have the same exponential part e−C1 η −C2 η+C3 .
2
bandwidth. For class∑1 with higher priority, the aggregated
n
Let ζ denote the summation of all the coefficients of the virtual bandwidth is l=1 Blcc (1 − θ)ωl1max
. Define
exponentials from A1 and A2 . By taking natural logs for the ∑n
K1 := ⌊ ∑l=1 Blcc (1 − θ)ωl1
max
/B1u ⌋ ,
loss probability δ2 , we can have n (44)
â(x) := [ l=1 Bl (1 − θ) − xB1u ] /B2u .
cc

ln(δ2 ) = ln(ζ) − C1 η 2 − C2 η + C3 , ζ > 0. (40) Then the maximal number of class-2 users ∑nthat can be concur-
The first item of RHS in Eq. (40) is neglectable compared with rently served by n CCs is â(K1 ) when l=1 ωl1 reaches the
the remaining items, thus Eq. (40) can be further simplified as maximum. Thus the total EC of class k (k = 1, 2), denoted as
NkLT E−A , is given as,
ln(δ2 ) ≈ −C1 η 2 − C2 η + C3 , (41) 
 ∑n
 N1LT E , if K1 −
 Kl1 < 1;
Finally, by solving Nl2 from Eq. (41), the closed-form rela- 
LT E−A ⌊ [√ l=1 ]⌋
tionship between EC Nl2 and the system bandwidth Blcc can N1 =


K1
− 1
4λ 1 (K 1 + λ 1 ) − 2λ 1 ,
be obtained given Nl1 ad max
, δ2 , p2 and ωl1 , 

p 1 p 1

⌊ [√ ]⌋ otherwise;
Nl2 = a(K p2
l1 )
− p12 4λ2l (a(Kl1 ) + λ2l ) − 2λ2l , N
2
LT E−A
=
where√λ2l = Γ2l 2 (1 − p2 )/4,  N LT E , if K − ∑

n

 1 Kl1 < 1 and
ad p )2 /σ 2 .


2
l=1
Γ2l = −2 ln(δ2 ) − (Kl1 − Nl1 1 l1 ∑n ∑
n
(42)  â( n l1 ) − Kl2 (nl1 ) < 1, ∀nl1 ≤ Kl1 ;

 ⌊ [√ ]⌋
From Eq. (42), we can observe that the structure of the closed- 

l=1 l=1
 â(K1 ) − 1 4λ 2 (â(K 1 ) + λ 2 ) − 2λ 2 , otherwise
form relationship of EC Nl2 is very similar to that of Nl1 (i.e., p2 p2

Eq. (32)), except that i) a(Kl1 ) is the maximal number of where √


class-2 users that can be concurrently served by lth CC when λ1 = Γ1 2 (1 − p1 )/4, Γ1 = −2 ln(δ1 ) − ln(2π),
√2 (1 − p2 )/4,
2
ωl1 reaches its maximum, and ii) Γ2l is not only related to loss λ2 = Γ
probability δ2 but also modulated by the parameters of class 1. ∑n ad p )2 /σ 2 ,
Γ2 = −2 ln(δ2 ) − (K1 − l=1 Nl1
Furthermore, with the decrease of δ2 or the increase of ωl1max
, ∑ n
1 1
σ1 2 = l=1 Nl1 ad
p1 (1 − p1 ).
λ2l will increase and EC Nl2 will decrease accordingly, which (45)
satisfies the intuitions. Under this strategy, the zero-gain situation will hardly occur
since its occurrence conditions are much harder due to that the
B. Multi-Carrier Case: LTE Users vs. LTE-A Users bandwidth weight of class-2 users can dynamically change in
a cognitive manner as the secondary users do in the cognitive
In this subsection, we extend the derived closed-form ex- radio networks.
pression of EC under the cognitive-weight strategy to the
multi-carrier case with n aggregated CCs. Similar as Subsec- C. Generalization of the Loss Probability Derivation
tion IV-C, the ECs become different between LTE users and This subsection gives the generalized derivation of the loss
LTE-A users. For the LTE users, as they cannot use PRBs from probability δk given K user classes in the lth CC. Without loss
different CCs concurrently, the total EC for class k (k = 1, 2), of generality, we consider descending priorities from class 1 to
denoted as NkLT E , should be the summation of every Nlk , as class K. The maximum bandwidth weights of class k is ωlk max
,
max max max
and ωl1 < ... < ωlk < ... < ωlK = 1. As δk (k > 1) is different user classes are the three most important ones. On
related to the parameters of user classes with higher priorities, one hand, the operators tend to allocate more bandwidth to the
max
it can be expressed as a function of ωlm (m=1,...,k) and the user class that can bring higher profits per PRB, i.e., short-term
current numbers of admitted users of the first k − 1 classes profits. On the other hand, only maximizing the short-term
ad
(i.e., Nlm , m=1,...,k − 1) in the following profits may incur undesired user dissatisfaction for some kinds
of user classes, which may in turn hurt the operators’ long-
δk = ∑ ad ad term benefits. Therefore, the optimal decision of the bandwidth
px1 ...xk−1 (ωl1 , ..., ωlk , Nl1 , ..., Nl(k−1) )
xm ∈{0,1},m=1∼k−1 allocation weights should balance the operators’ short-term
(46) profits and the satisfaction of all the user classes. Moreover, to
where xm is a binary variable taking 0 when there is no loss enhance the bandwidth utilization, the weight decision should
from class m and 1 otherwise. The px1 ...xk−1 (·) is the loss be conducted dynamically to adapt to the time-varying traffic
probability of class k given the values of x1 ,...,xk−1 , which conditions of different user classes.
can be further calculated as, To formulate the tradeoff into an optimization problem, we
ad
px1 ...xk−1 (ωl1 , ..., ωlk , Nl1 ad
, ..., Nl(k−1) )= consider that the average number of users for each class k in
a cell is constant within a certain time period τ but changes

η1 ∑
η m ∑
N lk
πnl1 1 ... πnlm m ... πnlk k , from period to period. For a particular τ , denote the average
nl1 =µ1 nlm =µm nlk =µk number of class-k users in the cell as Nk (τ ). The Nk (τ ) users
where can be on or off following the traffic model in Subsection
 (47)

 0, if xm = 0, 1 ≤ m < k; III-C. The profit per PRB achieved by the operator from class-

⌊Blcc ωl1
max
/B1u ⌋ + 1, if x1 = 1; k users is denoted as Gk,P RB . Our objective is to maximize
µm = ; the net benefits that the operator can get considering the user

 am (ωl1 , ..., ωlm , x1 , ..., xm−1 ) + 1,
 satisfaction factor for each period τ .
if xm = 1, 1 < m < k


 ⌊Bl ωl1 /B1u ⌋ , if x1 = 0;
cc max
 A. Fixed-Weight Bandwidth Allocation Strategy
am (ωl1 , ..., ωlm , x1 , ..., xm−1 ),
ηm = ;

 if xm = 0, 1 < m < k; For the fixed-weight strategy, the optimization problem for
 ad
Nlm , if xm = 1, 1 ≤ m < k LTE users is given as
a m (ωl1 , ..., ωlm , x1 , ..., xm−1 ) =

K
Bu
⌊[ ] ⌋ max [min{Nk (τ ), NkLT E }pk B sc N
k
sc Gk,P RB

m−1 ωlk k=1 l l
Bl (ωlm − ω̂lm∗ ) −
cc max max
Bb · nlb /Bm ;
u u
− χk max{Nk (τ ) − NkLT E , 0}] (48)
{ b=m∗+1
s.t. equation (26);
0, if ∀xb = 0, 1 ≤ b < m.
m∗ = arg max b, otherwise .
l = 1, 2, ...n; k = 1, 2, ..., K,
1≤b<m, xb =1
where min{Nk (τ ), NkLT E } is the actual number of admitted
The physical meaning of am (·) is the maximum number of class-k users and max{Nk (τ ) − NkLT E , 0} is the average
class-m users that can be concurrently served by lth CC given number of class-k users that are rejected to get into the
max Bku
ωlk , xk and nlk of all classes with priorities higher than m. system. Thus min{Nk (τ ), NkLT E }pk B sc N sc is the average
l l
With similar binomial-normal approximation approach, each number of PRBs that are occupied by class-k users within
summation in (47) can be turned into one integral. Therefore, period τ . χk is a weighting parameter to adjust the rela-
to calculate the closed-form expression of δk , 2k−1 items will tive importance of class-k users’ satisfaction over short-term
be summed together (see (46)), and each item is a k-fold profits. The optimization can be simplified by introducing
integral (see (47)). However, with higher k, the approximation auxiliary variables ϕk = min{Nk (τ ), NkLT E } and φk =
accuracy will be lower as the difference between the exact and max{Nk (τ ) − NkLT E , 0},
approximated values accumulates with integrals.
K [
∑ ]
Bku
max ϕk pk B sc N sc Gk,P RB − χk φk
VI. N ET-P ROFIT M AXIMIZATION U NDER D IFFERENT ωlk k=1 l l

BANDWIDTH A LLOCATION S TRATEGIES s.t. equation (18), ∀k = 1, 2, ..., K;


In previous sections, we have derived the closed-form ϕk ≤ Nk (τ ), ∀k = 1, 2, ..., K;
(49)
expressions of ECs considering user loss probability require- ϕk ≤ NkLT E , ∀k = 1, 2, ..., K;
ments for both LTE and LTE-A users under the fixed-weight φk ≥ Nk (τ ) − NkLT E , ∀k = 1, 2, ..., K;
and cognitive-weight strategies. In this section, we discuss the φk ≥ 0, ∀k = 1, 2, ..., K;
economic tradeoff among the bandwidth allocation weights of 0 ≤ ωlk ≤ 1.
different user classes via a net-profit-maximization problem. The optimization problem (49) is a typical nonlinear program-
The decision of the bandwidth allocation weights depends ming problem which can be effectively solved following [38].
on a combination of factors. Among these factors, operator Similarly, for LTE-A users, the optimization problem is the
profits, user satisfaction and the dynamic traffic conditions of same as (49) with replacing Eq. (26) with Eq. (27).
20 Parameter Group 1 Values

Effective bandwith (number of PRBs)


e=0.02 Considered area, |A| 20 × 20km2
e=0.03 Transmission power spectrum density, Pt 0.2 W/Hz
e=0.05 Noise power spectrum density, N0 10−9 W/Hz
15
e=0.1 Path loss exponent, a 4
BS density, λBS 1/(π5002 )m−2
Fast fading of the interfering signals Rayleigh fading
10 Subcarrier bandwidth, Blsc 15kHz
Number of subcarriers per PRB, Nlsc 12

TABLE II: Simulation Parameters I


5
Parameter Group 2 Class 1 Class 2
Number of CCs, n 1∼5 1∼5
CC bandwidth, Blcc 20MHz 20MHz
0 Number of PRBs per user, Pku 8∼20 1∼10
60 80 100 120 140 Loss probability, δk 10−5 ∼ 10−1 10−6 ∼ 10−3
Minimum user throughput requirement ru (kbps) Active probability, pk 0.02∼0.2 0.02∼0.2
k
Total percentage of GBs, θ 0.1 0.1
Fig. 5: Effective bandwidth vs. minimum throughput Normalized profit, Gk,P RB 3 2
requirement under different e values. Satisfaction weighting factor, χk 0.075 0.05
TABLE III: Simulation Parameters II
B. Cognitive-Weight Bandwidth Allocation Strategy 700
Analytical results of LTE−A
Analytical results of LTE−A
1000 Simulated results of LTE−A
Simulated results of LTE−A
For the cognitive-weight strategy, the optimization problem 600 Analytical results of LTE Analytical results of LTE

Equivalent capacity
Simulated results of LTE Simulated results of LTE

Equivalant capacity
for LTE users is formulated similarly as 500
800


2
Bu
600

[min{Nk (τ ), NkLT E }pk B sc N


400
max
max
k
sc Gk,P RB
ωl1 k=1 l l 300
400

−χk max{Nk (τ ) − NkLT E , 0}] 200 200


s.t. equation (43);
ad
{ } max ∑ 2 100 −5
10 10
−4
10
−3 −2
10
−1
10
0
8 10 12 14 16 18 20
Nl1 = min N1 (τ ), N1LT E ωl1 / max
ωl1 . Loss probability
(a) User loss probability
Number of assigned PRBs per user
(b) Assigned bandwidth per user
l=1
(50) 450 900
Analytical results of LTE−A Analytical results of LTE−A
The main difference of optimization problem (50) from (48) 400 Simulated results of LTE−A 800 Simulated results of LTE−A
Analytical results of LTE Analytical results of LTE
is the decision of N2LT E . In (50), N2LT E is closely related to 350 Simulated results of LTE 700 Simulated results of LTE

Equivalent capacity
Equivalent capacity

ad 300 600
the number of admitted class-1 users in each CC (i.e., Nl1 )
250 500
ad LT E LT E
and Nl1 is further limited by N1 ; while in (48), N2 is 200 400
only related to its own weight ωl2 , which is fixed for a certain 150 300

τ . Therefore, the cognitive bandwidth allocation has stronger 100 200

adaptability in capturing the time-varying traffic demands of 50 100

0 0
different users, thus having higher bandwidth utilization. Here, 1 2 3
Number of CCs
4 5 0.05 0.1 0.15
User active probability
0.2

we consider that all the admitted LTE users in the same class (c) Number of CCs (d) User active probability
max
are assigned to different CCs in proportion to ωl1 . For LTE-
Fig. 6: Fixed-weight strategy: ECs under 4 different
A users, the optimization problem is the same as (50) except
parameters (default values: p1 =0.04, n=5, P1u =16,
that i) Eq. (43) is replaced by Eq. (45); ii) the equation about
∑n δ1 = 10−3 ).
ad ad
Nl1 is replaced by Nl1 = ϕ1 since all the CCs can be
l=1
aggregated as a virtual band and it is not necessary to know
ad
the specific value of each Nl1 . A. Effective Bandwidth
We first show how the effective bandwidth Bku changes with
VII. S IMULATION R ESULTS the minimum throughput requirement rku in Fig. 5 via Monte
To validate our proposed closed-form expressions of EC, Carlo simulations. The parameter values in Table II are used. It
system-level simulations are conducted for a multi-cell down- can be seen that for all the simulated values of e, Bku presents
link scenario. Furthermore, the ECs are compared between a non-decreasing trend with increasing rku . This is because the
LTE users and LTE-A users for both fixed-weight and system has to spend more bandwidth to guarantee a larger
cognitive-weight strategies. Finally, the results of the formu- minimum throughput requirement given e and the wireless
lated optimization problems are presented to illustrate the channel statistics. For each curve, the flat part occurs, because
economic advantages of CA and the cognitive bandwidth a PRB is the minimum bandwidth allocation unit. Besides,
allocation strategy. The main simulation parameters are listed we can observe that the effective bandwidth increases faster
in Table II and III, where the effective bandwidth is measured with smaller e. This is explained as follows. According to Eq.
by the number of PRBs per user, i.e., Pku . (11), e is positively correlated with rku /Bku . Therefore, if rku
450
increases by a fixed ratio, Bku has to increase by larger ratio LTE−A users of class 1
for smaller e, i.e., for smaller e, the slope of the rku −Bku curve 400 LTE users of class 1
LTE−A users of class 2
is larger. 350 LTE users of class 2

Equivalent capacity
300
B. Fixed-Weight Strategy
250
In this subsection, we evaluate the EC performance for the
fixed-weight strategy. We first consider single user class to 200
show how the ECs N LT E and N LT E−A vary with different 150
parameters. The class-1 values in Table III are used. Both
100
analytical and simulated results are shown in Fig. 6, where the
four evaluated parameters are loss probability δ1 , the number 50

of assigned PRBs Pku , the number of aggregated CCs n, and 0


0 0.2 0.4 0.6 0.8 1
active probability p1 . We have the following observations. Bandwidth weight of user class 1
i) The simulated results agree well with the analytical ones
Fig. 7: Fixed-weight strategy: The relationship between the
for both LTE-A and LTE users under all simulated parameters,
ECs of 2 user classes with changing bandwidth weights.
except when the loss probability is higher than 0.01 in Fig.
6(a). The reason is that when the loss probability is very high 1800

Equivalent capacity of class−2 users

Equivalent capacity of class−2 users


Analytical results of LTE Analytical results of LTE
(e.g., larger than 0.01), the third item of Eq. (20) becomes 600
Simulated results of LTE 1600 Simulated results of LTE
Analytical results of LTE−A Analytical results of LTE−A
non-negligible since z is very close to or even lower than 3, 500 Simulated results of LTE−A 1400 Simulated results of LTE−A

making the approximation inaccurate. 400


1200

1000
ii) For all the subfigures, the ECs of LTE-A users surpass 300
800
those of LTE users significantly except in the zero-gain sit- 200 600

uations. The gain (i.e., the ratio of ECs between LTE-A and 100
400

LTE users) comes from the semi-usage PRBs mentioned in 200


0 −6 0
Subsection III-A. Although these PRBs only account for a 10 10
−5 −4
10
Loss probability
−3
10 2 4 6 8
Number of assigned PRBs per class−2 user
10

very small portion of the whole transmission bandwidth, i.e., (a) User loss probability (b) Assigned bandwidth per user
the spectrum utilization of LTE-A users is only 2.5% ∼ 16% 400 1200

Equivalent capacity of class−2 users


Equivalent capacity of class−2 users

Analytical results of LTE Analytical results of LTE


higher than that of LTE users in Fig. 6, the achieved EC gain 350 Simulated results of LTE Simulated results of LTE
Analytical results of LTE−A 1000 Analytical results of LTE−A
can be as high as around 2. The notable gain can be explained 300 Simulated results of LTE−A Simulated results of LTE−A

as follows. Recall Eq. (26) and (27), due to the introduction of 250 800

δk , EC increases nonlinearly and faster when the normalized 200 600

bandwidth increases. Take the default settings of Fig. 6 as an 150


400
100
intuitive example: The 5 CCs can concurrently serve at most 200
50
30 LTE users or 31 LTE-A users. When there are 31 LTE users
0 0
in the system, the loss probability is p31 . When there are 32 1 2 3
Number of aggregated CCs
4 5 0.05 0.1
Active probability
0.15 0.2

LTE-A users, the loss probability is p32 . As p ≪ 1, p32 is (c) Number of CCs (d) User active probability
much smaller than p31 . Hence, many more LTE-A users can
Fig. 8: Cognitive-weight strategy: ECs of class-2 users under
be admitted into the system to make the two loss probabilities
different parameters.
the same, resulting in a high EC gain.
iii) The gain increases as the number of PRBs per user or
the number of aggregated CCs increases (except for the zero- Besides, a two-user-class case is further simulated to exhibit
gain situation), but stays unchanged with the active probability. the relationship between the ECs of two user classes under
This is because the portion of the semi-usage PRBs becomes different bandwidth weights, as shown in Fig. 7, where LTE
larger (except the zero-gain situation) with the increase of the and LTE-A users are considered, respectively. The default
number of PRBs per user or CCs, resulting in a larger spectrum parameter values of class 1 are the same as the above single-
utilization with LTE-A users, while the utilization stays the class case; and those of class 2, i.e., P2u , p2 and δ2 are set to be
same for different active probabilities. 15, 0.06 and 10−4 , respectively. From Fig. 7, we can observe
iv) The zero-gain situations occur in Fig. 6(b) when the that the ECs of the two classes present a strong negative
number of assigned PRBs per user is equal to 9-11,14 or 20. correlation and either achieves the maximum when assigned
The reason is as follows. Based on the parameter settings, with the whole transmission bandwidth.
there are totally 100 PRBs per CC. If we take P1u = 9 as an
example, at most 11 users can be concurrently served in each C. Cognitive-Weight Strategy
CC. When n = 5, the left 5 PRBs (one from each CC) are In this subsection, we evaluate the EC performance for the
still not enough to support one more user cooperatively. As cognitive-weight strategy with two user classes. As the main
a result, the bandwidth utilization remains the same for LTE difference from the previous strategy is the EC of the lower-
and LTE-A users, leading to zero gain. priority user class (i.e., class 2), we only present the ECs of
1000

Equivalent capacity of class−2 users


1600 Analytical results of LTE

Equivalent capacity of class−2 users


Fixed−weight, LTE
Simulated results of LTE
1400 Cognitive−weight, LTE
Analytical results of LTE−A Fixed−weight, LTE−A
800
Simulated results of LTE−A Cognitive−weight, LTE−A
1200

1000 600

800
400
600

400
200
200

0 0
0.2 0.4 0.6 0.8 0.4 0.5 0.6 0.7 0.8 0.9
max
Maximum bandwidth allocation weight: ωl1 max
Maximum bandwidth allocation weight of class 1: ωl1

Fig. 9: Cognitive-weight strategy: theoretical vs. Fig. 10: EC comparison between fixed-weight and
max
simulated results with changing ωl1 . cognitive-weight strategies.

class-2 users with different changing parameters. As shown LTE-A users under the fixed-weight one. This is because the
in Fig. 8-9, both analytical and simulated results are given bandwidth weight of class-2 users under the cognitive-weight
under the parameters in Table III. The default settings are: 1) strategy can dynamically change in a cognitive manner as the
δ1 = 10−4 , δ2 = 10−3 , P1u = 7, P2u = 5, n = 4, p1 = 0.02, secondary users do in the typical cognitive radio networks.
max
and p2 = 0.06; 2) ωl1 = 0.8 and the actually admitted As a result, more class-2 users can be concurrently served on
ad
number of class-1 users Nl1 is set to be 90% of the EC Nl1 . average, and thus larger EC will be obtained under the same
First, it can be observed that the analytical and simulated loss probability requirement.
results match well in both Fig. 8 and 9 except two cases: when Furthermore, we compare the optimal net profits obtained
the loss probability is larger than 10−3 (Fig. 8(a)) and when from the utility-maximization problems formulated in Section
max
ωl1 is less than 0.3 (Fig. 9). These relatively large gaps are VI. The scales of the collected annual average hourly traffic in
expected and can be explained with the similar reason as in [39] are used to generate the hourly average number of users
the fixed-weight strategy: when δ2 > 10−3 or ωl1 max
< 0.3, per cell in Fig. 11. The hourly optimal net profits are presented
the condition that z2 in Eq. (39) should be larger than 3 cannot in Fig. 12. We can observe that the cognitive-weight strategy
hold, and thus our approximation method becomes inaccurate. outperforms the fixed-weight one significantly for most of
Besides, the EC gain of the class-2 LTE-A users over the the time. The gain comes from that the class-2 ECs under
LTE users increases when the number of CCs, the number of the cognitive-weight strategy are larger when both strategies
max
assigned PRBs per user or ωl1 increases, while stays almost have the same the class-1 ECs. As shown in Fig. 12, for the
unchanged with the active probability. This can be explained LTE-A users, when the traffic load is light (e.g., 1-6a.m.),
with the same reason as in the fixed-weight strategy in terms of all the users in the cell can be admitted into the system,
bandwidth utilization. Moreover, no zero-gain situations occur thus the net benefits under two strategies are the same. As
in Fig. 8(b) when P2u changes. This is because for cognitive- the traffic load increases (e.g., 6-7a.m.), the cell under the
weight strategy, the conditions for the zero-gain situation are fixed-weight strategy will be first saturated and the net profits
much harder to achieve since the parameters of both user will be affected by the increasing user dissatisfaction from the
classes are involved therein, as indicated in Eq. (45). rejected users. Since the cell in the cognitive-weight strategy
D. Performance Comparison between Two Bandwidth Alloca- has larger EC, the corresponding net profits will be higher.
tion Strategies However, when there are too many users in the cell (e.g., 7-
9a.m.), user dissatisfaction will have larger impact on the net
The performance comparisons between the above two s- profits, thus leading to a profit reduction. The performance of
trategies in terms of EC and the achieved normalized operator the LTE users can be explained similarly.
profits are shown in Fig. 10 and Fig. 11-12, respectively. The
parameter values in Table III are used with the same default VIII. C ONCLUSION
settings as Subsection VII-C except that n = 5.
Fig. 10 shows how class-2 ECs under different strategies In this paper, we have studied the EC performance of
ad
change with the allocation weight of class-1 users. Nl1 is LTE-A systems with CA for LTE and LTE-A users under
set to the full EC Nl1 . It can be found that the ECs under two bandwidth allocation strategies. The concept of effective
the cognitive-weight strategy are considerably higher than bandwidth has been introduced to map the user throughput
those under the fixed-weight strategy for both LTE and LTE- requirement into the bandwidth requirement considering the
A users. For some weight values, the ECs of LTE users wireless channel statistics. Then, closed-form expressions of
under the cognitive-weight strategy are even close to those of EC have been derived with the binomial-normal approximation
4500 1200
Class−1 Users Fixed case, LTE
4000 Class−2 Users Fixed case, LTE−A
1000 Cognitive case, LTE
Anual average daily user
3500 Cognitive case, LTE−A
number in urban area

3000 800

Net profit
2500

2000 600

1500
400
1000

500 200

0 0 5 10 15 20 25
0 5 10 15 20 25
Hours (h) Hours (h)

Fig. 11: Annual average hourly number of users per cell Fig. 12: Net profits comparison between fixed-weight
in the tested cell. and cognitive-weight strategies.

for both kinds of users under both strategies. We have further [11] 3GPP TR 36.808 v10.0.0, Evolved universal terrestrial radio access (E-
formulated a net-profit-maximization problem to investigate UTRA); carrier aggregation; base station (BS) radio transmission and
reception (Release 10). Tech. Spec. Group Radio Access Network, June
the tradeoff among the bandwidth weights for heterogeneous 2012.
user classes. Finally, extensive simulations have demonstrated [12] M. Awad, V. Mahinthan, M. Mehrjoo, X. Shen, and J. W. Mark, “A dual-
the accuracy of our analytical results, and have shown that: i) decomposition-based resource allocation for OFDMA networks with
imperfect CSI,” IEEE Trans. on Vehicular Technology, vol. 59, no. 5,
with only a small increase in the spectrum utilization, LTE- pp. 2394-2403, June 2010.
A users can have considerably higher EC than LTE users [13] J. Mao, G. Xie, J. Gao, and Y. Liu, “Energy efficiency optimization
when the user traffic is bursty; and that ii) the cognitive- optimization for OFDM-based cognitive radio systems: A water-filling
factor aided search method,” IEEE Trans. on Wireless Communications,
weight strategy performs better than the fixed-weight one due vol. 12, no. 5, pp. 2366-2375, May 2013.
to stronger adaptability to the traffic load conditions. For the [14] M. S. Alam, J. W. Mark, and X. Shen, “Relay selection and resource
future work, we will investigate the EC performance of LTE-A allocation for multi-user cooperative OFDMA networks,” IEEE Trans.
systems where users have MIMO capabilities. on Wireless Communications, vol. 12, no. 5, pp. 2193-2205, May 2013.
[15] Y. Wang, K. I. Pedersen, T. B. Sørensen, and P. E. Mogensen, “Carrier
load balancing and packet scheduling for multi-carrier systems,” IEEE
Trans. on Wireless Communications, vol. 9, no. 5, pp. 1780-1789, May
R EFERENCES 2010.
[16] K. I. Pedersen, F. Frederiksen, C. Rosa, H. Nguyen, L. G. U. Garcia,
[1] R. Zhang, Z. Zheng, M. Wang, X. Shen, and L. Xie, “Equivalent capacity and Y. Wang, “Carrier aggregation for LTE-advanced: Functionality and
analysis of LTE-advanced systems with carrier aggregation,” Proc. IEEE performance aspects,” IEEE Communications Magazine, vol. 49, no. 6,
ICC’13, Budapest, Hungary, June 2013. pp. 89-95, June 2011.
[2] R. A. Khan and A. A. Shaikh, “LTE advanced: Necessities and tech- [17] R. Zhang, M. Wang, Z. Zheng, X. Shen, and L. Xie, “Cross-layer carrier
nological challenges for 4th generation mobile network,” International selection and power control for LTE-A uplink with carrier aggregation,”
Journal of Engineering and Technology, vol. 2, no. 8, pp. 1336-1342, Proc. IEEE Globecom’13, Atlanta, USA, Dec. 2013.
Aug. 2012. [18] L. G. U. Garcia, I. Z. Kovcs, K. I. Pedersen, G. W. O. Costa, and P. E.
[3] D. Astély, E. Dahlman, A. Furuskar, Y. Jading, M. Lindstrom, and S. Mogensen, “Autonomous component carrier selection for 4G femtocells
Parkvall, “LTE: The evolution of mobile broadband,” IEEE Communi- - a fresh look at an old problem,” IEEE Journal on Selected Areas in
cations Magazine, vol. 47, no 4, pp. 44-51, Apr. 2009. Communications, vol. 30, no. 3, pp. 525-537, Apr. 2012.
[4] N. A. Ali, A.-E. M. Taha, and H. S. Hassanein, “Quaility of service [19] R. Guérin, H. Ahmadi, and M. Naghshineh, “Equivalent capacity and
in 3GPP R12 LTE-advanced,” IEEE Communications Magzine, vol. 51, its application to bandwidth allocation in high-speed networks,” IEEE
no. 8, pp. 103-109, Aug. 2013. Journal on Selected Areas in Communications, vol. 9, no. 7, Sept. 1991.
[5] Z. Shen, A. Papasakellariou, J. Montojo, D. Gerstenberger, and F. Xu, [20] D. Wu and R. Negi, “Effective capacity: A wireless link model for
“Overview of 3GPP LTE-advanced carrier aggregation for 4G wireless support of quality of service,” IEEE Trans. on Wireless Communicaitons,
communications,” IEEE Communications Magazine, vol. 50, no. 2, pp. vol. 2, no. 4, pp. 630-643, July 2003.
122-130, Feb. 2012. [21] D. López-Pérez, X. Chu, A. V. Vasilakos, and H. Claussen, “On dis-
[6] Snapdragon 800 processors, [Online] Available: http://www.qualcomm. tributed and coordinated resource allocation for interference mitigation
com/snapdragon/processors/800. in self-organizing LTE networks,” IEEE Trans. on Networking, vol. 21,
[7] LTE advanced in unlicensed spetrum, [Online] Available: http://www. no. 4, pp. 1145-1158, Aug. 2013.
qualcomm.com/solutions/wireless-networks/technologies/lte-unlicensed. [22] J. Brown and J. Y. Khan, “Key performance aspects of an LTE FDD
[8] LTE direct, Operator enabled proximity services, [Online] Available: based smart grid communications network,” Computer Communications,
http://www.qualcomm.com/solutions/wireless-networks/technologies/lte vol. 36, no. 5, pp. 551-561, Mar. 2013.
/lte-direct. [23] K. I. Pedersen, T. E. Kolding, F. Frederiksen, I. Z. Kovács, D. Laselva,
[9] M. Wang, H. Liang, R. Zhang, R. Deng, and X. Shen, “Mobility-aware and P. E. Mogensen, “An overview of downlink radio resource manage-
coordinated charging for electric vehicles in VANET-enhanced smart ment for UTRAN long-term evolution,” IEEE Communications Magzine,
grid,” IEEE Journal on Selected Areas in Communications, to appear. vol. 47, no. 7, pp. 86-93, July 2009.
[10] M. Wang, H. Shan, R. Lu, R. Zhang, X. Shen, and F. Bai, “Real-time [24] A. I. Elwalid and D. Mitra, “Effective bandwidth of general markovian
path planning based on hybrid-VANET-enhanced transportation system,” traffic sources and admission control of high speed networks,” IEEE
IEEE Trans. on Vehicular Technology, to appear. Trans. on Networking, vol. 1, no. 3, pp. 329-343, June 1993.
[25] C. Chang and J. A. Thomas, “Effective bandwidth in high-speed digital Miao Wang received her B.Sc. degree from Bei-
networks,” IEEE Journal on Selected Areas in Communications, vol. 13, jing University of Posts and Telecommunications
no. 6, pp. 1091-1100, Aug. 1995. and M.Sc. degree from Beihang University, Beijing,
[26] A. Abdrabou and W. Zhuang, “Probabilistic delay control and road China, in 2007 and 2010, respectively. She is cur-
side unit placement for vehicular ad hoc networks with disrupted rently working toward the Ph.D. degree with the
connectivity,” IEEE Journal on Selected Areas in Communications, vol. Department of Electrical and Computer Engineering,
29, no. 1, pp. 129-139, Jan. 2011. University of Waterloo, Waterloo, ON, Canada. Her
[27] R. E. Miles, “On the homogeneous planar Poisson point process,” current research interests include the capacity and
Mathematical Biosciences, vol. 6, pp. 85-127, 1970. delay analysis in vehicular networks and electrical
[28] F. Aurenhammer, “Voronoi diagrams - a survey of a fundamental vehicle charging control in smart grids.
geometric data structure,” ACM Computing Surveys (CSUR), vol. 23,
no. 3, pp. 345-405, 1991.
[29] 3GPP TS 36.104 v9.1.0, Base station (BS) radio transmission and
reception (release 9). Tech. Spec. Group Radio Access Network, Sept.
2009.
[30] G. Yuan, X. Zhang, W. Wang, and Y. Yang, “Carrier aggregation for Xuemin (Sherman) Shen (IEEE M97-SM02-F09)
LTE-advanced mobile communication systems,” IEEE Communications received the B.Sc. (1982) degree from Dalian Mar-
Magazine, vol. 48, no. 2, pp. 88-93, Feb. 2010. itime University (China) and the M.Sc. (1987) and
[31] P. T. Brady, “A model for genrating on-off speech patterns in two-way Ph.D. degrees (1990) from Rutgers University, New
conversations,” Bell System Tech. J., 48(Sept. 1969): 2445-2472. Jersey (USA), all in electrical engineering. He is
[32] B. Maglaris, D. Anastassiou, P. Sen, G. Karlsson, and J. D. Robbins, a Professor and University Research Chair, Depart-
“Performance models of statistical multiplexing in packet video commu- ment of Electrical and Computer Engineering, Uni-
nications,” IEEE Trans. on Communications, Vol. 36, No. 7, pp. 834-844, versity of Waterloo, Canada. He was the Associate
July 1988. Chair for Graduate Studies from 2004 to 2008. Dr.
[33] R. Zhang, M. Wang, Z. Zheng, X. Shen, and L. Xie, “Stochastic geo- Shens research focuses on resource management
metric performance analysis for carrier aggregation in LTE-A systems”, in interconnected wireless/wired networks, wireless
Proc. IEEE ICC’14, Sydney, Australia, June, 2014. network security, social networks, smart grid, and vehicular ad hoc and sensor
[34] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschet- networks. He is a co-author/editor of 12 books, and has published more than
ti, “Stochastic geometry and random graphs for the analysis and design 700 papers and book chapters in wireless communications and networks,
of wireless networks,” IEEE Journal on Selected Areas in Communica- control and filtering. Dr. Shen is an elected member of IEEE ComSoc Board
tions, vol. 27, no. 7, pp. 1029-1046, 2009. of Governor, and the Chair of Distinguished Lecturers Selection Committee.
[35] B. Błaszczyszyn, M. K. Karray, and H.-P. Keeler, “Using poisson He served as the Technical Program Committee Chair/Co-Chair for IEEE
processes to model lattice cellular networks,” Proc. IEEE INFOCOM’13, Infocom14, IEEE VTC10 Fall, the Symposia Chair for IEEE ICC10, the
Turin, Italy, Apr. 2013. Tutorial Chair for IEEE VTC’11 Spring and IEEE ICC08, the Technical
[36] M. Schwartz, Broadband integrated networks. Prentice Hall PTR, vol. Program Committee Chair for IEEE Globecom’07, the General Co-Chair
19, pp. 26-29 and 126-140, 1996. for Chinacom07 and QShine06, the Chair for IEEE Communications Society
[37] G. E. P. Box, J. S. Hunter, and W. G. Hunter, Statistics for experimenters: Technical Committee on Wireless Communications, and P2P Communications
Design, innovation, and discovery, 2nd edition. Wiley Online Library, and Networking. He also serves/served as the Editor-in-Chief for IEEE Net-
pp. 130, 2005. work, Peer-to-Peer Networking and Application, and IET Communications; a
[38] S. L. S. Jacoby, J. S. Kowalik, and J. T. Pizzo, Iterative methods Founding Area Editor for IEEE Transactions on Wireless Communications; an
for nonlinear optimization problems. Prentice-Hall Series in Automatic Associate Editor for IEEE Transactions on Vehicular Technology, Computer
Computation, pp. 10-100, 1972. Networks, and ACM/Wireless Networks, etc.; and the Guest Editor for IEEE
[39] O. Järv, R. Ahas, E. Saluveer, B. Derudder, and F. Witlox, “Mobile JSAC, IEEE Wireless Communications, IEEE Communications Magazine, and
phones in a traffic flow: A gegographical perspective to evening rush ACM Mobile Networks and Applications, etc. Dr. Shen received the Excellent
hour traffic analysis using call detail records,” PLoS ONE, vol. 7, no. Graduate Supervision Award in 2006, and the Outstanding Performance Award
11, Nov. 2012. in 2004, 2007 and 2010 from the University of Waterloo, the Premiers
Research Excellence Award (PREA) in 2003 from the Province of Ontario,
Canada, and the Distinguished Performance Award in 2002 and 2007 from
the Faculty of Engineering, University of Waterloo. Dr. Shen is a registered
Ran Zhang received his B.E. degree (2010) from Professional Engineer of Ontario, Canada, an IEEE Fellow, an Engineering
Tsinghua University (China) in Electronics Engi- Institute of Canada Fellow, a Canadian Academy of Engineering Fellow,
neering. He is now working toward his Ph.D. de- and a Distinguished Lecturer of IEEE Vehicular Technology Society and
gree in Broadband Communication Research Group Communications Society.
from University of Waterloo (Canada). His current
research interest includes resource management in
heterogeneous networks (HetNets), carrier aggrega-
tion (CA) in Long Term Evolution - Advanced (LTE-
A) systems, wireless green networks and electrical Liang-Liang Xie (M’03-SM’09) received the B.S.
vehicle charging control in smart grids. degree in mathematics from Shandong University,
Jinan, China, in 1995 and the Ph.D. degree in con-
trol theory from the Chinese Academy of Sciences,
Beijing, China, in 1999.
He did postdoctoral research with the Automatic
Control Group, Linkoping University, Linkoping,
Zhongming Zheng received the B.Eng. (2007) and Sweden, during 1999-2000 and with the Coordi-
M.Sc. (2010) degrees from City University of Hong nated Science Laboratory, University of Illinois at
Kong. Currently, he is a Ph.D student in Electrical Urbana-Champaign, during 2000-2002. He is cur-
and Computer Engineering with University of Wa- rently a Professor at the Department of Electrical
terloo. His research interests include green wireless and Computer Engineering, University of Waterloo, Waterloo, ON, Canada.
communication, smart grid and wireless sensor net- His research interests include wireless networks, information theory, adaptive
works. control, and system identification.

You might also like