AN UPLINK POWER CONTROL ROUTINE FOR QUALITY-OF-SERVICE EQUALIZATION IN WIRELESS DATA TRANSFER NETWORKS CONSTRAINED TO EQUIDISTANT POWER LEVELS
DOI:
https://doi.org/10.20535/kpi-sn.2019.2.160199Keywords:
Wireless data transfer network, Equal quality of service, Uplink power control, Distances to the base station, Power levels, Path loss exponent, DichotomizationAbstract
Background. Power control is a process of adjusting transmitter power output in a communication system to achieve satisfactory performance within the system. In wireless data transfer networks, this process refers to uplink connection, when information about the transmitter power output is sent to the base station, whereupon the power is adjusted in accordance with one or more transmit power control commands received in the downlink. The uplink power control is intended to ensure quality of service declared by the system provider including maintaining a sufficient signal-to-noise ratio and link data rate, reducing interference, overloading, and preserving the battery life.
Objective. Whereas the sum of power levels is constrained to the grand total of the powers transmitted in the uplink off all the transmitters, the quality-of-service equalization is a fundamental task. Henceforward, for a set of equidistant power levels, the goal is to achieve the quality-of-service equalization by non-decreasing powers when moving away from the base station with using the distances from the mobiles to the base station. Inasmuch as the uplink power grand total is “allowed”, the sum of all the powers should be as much as closer to the grand total.
Methods. Principally, ratios of distances to the base station are calculated using an initial value of the path loss exponent. Then the case of the overloaded network is checked out. After that, the base station power responses are calculated using the ratios and the principle of the equal quality of service, wherein the received uplink power should be closely the same for all the users by every uplink transmission. If the farthest/closest transmitters’ powers are out of the power range, they are set down/up to the proper maximum/minimum. The path loss exponent is decreased if the proper maximum is re-violated. Finally, the base station power responses are rounded to values within a set of power levels.
Results. The suggested algorithm deals with powers in watts fitting wireless data transfer networks working in shallow areas (like Wi-Fi, Bluetooth, etc.), for which the number of power levels is relatively great and the range of active uplink transmission powers is relatively narrow. The routine which implements the algorithm still can be optimized depending on the programming environment and paradigm. For instance, C++ and Python will fit for speeding up the performance. Nevertheless, the routine would not sustain the UMTS update frequency, unless a network works with a few tens of users.
Conclusions. The uplink power control routine stated with the six algorithmic items effectively equalizes quality of service in shallow wireless data transfer networks, where user uplink powers are constrained to equidistant power levels in watts. It is not a one-step but a multi-step process during which four types of conditions are successively tried to get satisfied. Eventually, the factual sum of all the powers transmitted in the uplink may become “harmlessly” less than the grand total.References
E. Dahlman et al., “Power control, scheduling, and interference handling”, in 4G: LTE/LTE-Advanced for Mobile Broadband, E. Dahlman et al., eds. Academic Press, 2011, pp. 265–299. doi: 10.1016/C2013-0-06829-6
E. Dahlman et al., “Uplink power and timing control”, in 5G NR: The Next Generation Wireless Access Technology, E. Dahlman et al., eds. Academic Press, 2018, pp. 301–310. doi: 10.1016/C2017-0-01347-2
M.C. Chuah and Q. Zhang, Design and Performance of 3G Wireless Networks and Wireless LANs. Springer, 2006, 349 p. doi: 10.1007/b104641
J. Kennington et al., Wireless Network Design. Optimization Models and Solution Procedures. Springer, 2011, 373 p. doi: 10.1007/978-1-4419-6111-2
I. Stojmenović, Handbook of Wireless Networks and Mobile Computing. Wiley-Interscience, 2002, 630 p. doi: 10.1002/0471224561
E. Hossain and V.K. Bhargava, Cognitive Wireless Communication Networks. Springer, 2007, 440 p. doi: 10.1007/978-0-387-68832-9
S.V. Ahamed, “Wireless networks”, in Intelligent Networks, S.V. Ahamed, Ed. Elsevier, 2013, pp. 107–125. doi: 10.1016/B978-0-12-416630-1.00006-6
X. Chen and D. Guo, “Public safety broadband network with rapid-deployment base stations”, in Wireless Public Safety Networks, D. Câmara and N. Nikaein, eds. Elsevier, 2016, pp. 173–198. doi: 10.1016/B978-1-78548-052-2.50006-2
Z. Zheng et al., “Base station deployment and resource allocation in sustainable wireless networks”, in Handbook of Green Information and Communication Systems, M.S. Obaidat et al., eds. Academic Press, 2013, pp. 423–440. doi: 10.1016/B978-0-12-415844-3.00016-4
V.V. Romanuke, “CDMA system error probability with M channels while using first M elements of the eight known orthonormal binary functions bases for M equaling 9 through 15”, Optoelectronic Information-Power Technologies, no. 1, pp. 214–224, 2007.
G. Miao et al., Fundamentals of Mobile Data Networks. Cambridge University Press, 2016, 332 p. doi: 10.1017/CBO9781316534298
V.V. Romanuke, “Interval uncertainty reduction via division-by-2 dichotomization based on expert estimations for short-termed observations”, J. Uncertain Systems, vol. 12, no. 1, pp. 3–21, 2018.
Downloads
Published
Issue
Section
License
Copyright (c) 2019 The Author(s)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication with the work simultaneously licensed under CC BY 4.0 that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work