Academia.eduAcademia.edu

Fairness in cellular mobile networks

2002, IEEE Transactions on Information Theory

Channel allocation algorithms for channelized cellular systems are discussed from a new perspective, viz., fairness of allocation. The concepts of relative and absolute fairness are introduced and discussed. It is shown that under certain reasonable assumptions, there exists an absolute (max-min) fair carried traffic intensity vector (a vector describing the traffic carried in the cells of the system). We also show that this vector is unique. We describe some properties of the max-min fair carried traffic intensity vector in an asymptotic limit where the traffic and the number of channels are scaled together. For each traffic pattern, we determine a fixed channel allocation which attains this max-min fair carried traffic intensity vector independent of the value of the offered traffic, in the same asymptotic limit. Finally, we discuss a tradeoff between being max-min fair and trying to maximize revenue. We conclude by discussing some possible extensions of our work.

University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering August 2002 Fairness in Cellular Mobile Networks Saswati Sarkar University of Pennsylvania, [email protected] Kumar N. Sivarajan Tejas Networks Follow this and additional works at: htp://repository.upenn.edu/ese_papers Recommended Citation Saswati Sarkar and Kumar N. Sivarajan, "Fairness in Cellular Mobile Networks", . August 2002. Copyright 2002 IEEE. Reprinted from IEEE Transactions on Information heory, Volume 48, Issue 8, August 2002, pages 2418-2426. Publisher URL: htp://ieeexplore.ieee.org/xpl/tocresult.jsp?isNumber=21938&page=1 his material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permited. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. his paper is posted at ScholarlyCommons. htp://repository.upenn.edu/ese_papers/27 For more information, please contact [email protected]. Fairness in Cellular Mobile Networks Abstract Channel allocation algorithms for channelized cellular systems are discussed from a new perspective, viz., fairness of allocation. he concepts of relative and absolute fairness are introduced and discussed. It will be shown that under certain reasonable assumptions, there exists an absolute (max-min) fair carried traic intensity vector (a vector describing the traic carried in the cells of the system). We also show that this vector is unique. We describe some properties of the max-min fair carried traic intensity vector in an asymptotic limit where the traic and the number of channels are scaled together. For each traic patern, we determine a ixed channel allocation which atains this max-min fair carried traic intensity vector independent of the value of the ofered traic, in the same asymptotic limit. Finally, we discuss a tradeof between being max-min fair and trying to maximize revenue. We conclude this correspondence by discussing some possible extensions of our work. Keywords Asymptotic analysis, cellular networks, channel assignment algorithms, fairness, max-min fairness, revenue maximization Comments Copyright 2002 IEEE. Reprinted from IEEE Transactions on Information heory, Volume 48, Issue 8, August 2002, pages 2418-2426. Publisher URL: htp://ieeexplore.ieee.org/xpl/tocresult.jsp?isNumber=21938&page=1 his material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permited. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. his journal article is available at ScholarlyCommons: htp://repository.upenn.edu/ese_papers/27 2418 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 8, AUGUST 2002 Fairness in Cellular Mobile Networks Saswati Sarkar, Member, IEEE, and Kumar N. Sivarajan, Member, IEEE Abstract—Channel allocation algorithms for channelized cellular systems are discussed from a new perspective, viz., fairness of allocation. The concepts of relative and absolute fairness are introduced and discussed. It will be shown that under certain reasonable assumptions, there exists an absolute (max-min) fair carried traffic intensity vector (a vector describing the traffic carried in the cells of the system). We also show that this vector is unique. We describe some properties of the max-min fair carried traffic intensity vector in an asymptotic limit where the traffic and the number of channels are scaled together. For each traffic pattern, we determine a fixed channel allocation which attains this max-min fair carried traffic intensity vector independent of the value of the offered traffic, in the same asymptotic limit. Finally, we discuss a tradeoff between being max-min fair and trying to maximize revenue. We conclude this correspondence by discussing some possible extensions of our work. Index Terms—Asymptotic analysis, cellular networks, channel assignment algorithms, fairness, max-min fairness, revenue maximization. I. INTRODUCTION AND SUMMARY In a cellular system, the coverage area is logically divided into cells. Each cell has a cell site or a base station. The communication from the mobile user is directed to a central switching office by the base station. The central switching office directs this communication to the destination. Depending on the mode of multiple access used by the mobile customers, cellular systems can be broadly classified into channelized and nonchannelized systems. In a channelized cellular system, the multiple access is time-division multiple access (TDMA) or frequency-division multiple access (FDMA), or a combination of both. The term channel refers to a time slot in TDMA, a frequency slot in FDMA, and a combination of both in TDMA/FDMA systems such as the Global System for Mobile Communications (GSM). Calls arrive and depart at random times in the cells of the system and a channel assignment algorithm must assign a channel to each call for its duration, while obeying certain channel reuse constraints. These reuse constraints can be modeled by a hypergraph [2], as explained in [7]. This correspondence will deal entirely with channelized systems. The cellular network operator whose task it is to choose an appropriate channel assignment algorithm is usually interested in maximizing his revenue and this amounts to maximization of the total traffic carried in the system, if we assume calls in all cells are charged at the same rate (dollars per unit time). In addition, in order to keep his customers satisfied, the operator has to provide them a minimum grade of service (maximum blocking probability). However, many channel assignment algorithms provide unequal grades of service in the various cells of the system, and are thus “unfair.” This correspondence attempts to study the concept of fairness in cellular networks. First, we shall motivate the study of fairness with an example. Manuscript received February 5, 1997; revised January 18, 2000. The work of S. Sarkar was supported in part by the National Science Foundation under Grant ANI01-06984. A portion of this work was performed at the Indian Institute of Science, Bangalore, supported under a grant from Nortel Networks. The material in this correspondence was presented in part at the 34th Annual Allerton Conference on Communications, Control, and Computing, Allerton, IL, September 1996, and published in the Proceedings of that conference. S. Sarkar is with the Department of Electrical Engineering, University of Pennsylvania, Philadelphia, PA 19104 USA (e-mail: [email protected]). K. N. Sivarajan is with Tejas Networks, Bangalore, 560 012, India (e-mail: [email protected]). Communicated by R. Cruz, Associate Editor for Communication Networks. Publisher Item Identifier 10.1109/TIT.2002.800495. Fig. 1. Three-cell system. Example: Consider the three-cell system shown in Fig. 1 and assume that a total of 80 channels are available. Adjacent cells are forbidden from using the same channel, but cells 1 and 3 can reuse the same channel. Consider two fixed channel algorithms, FCAA1 and FCAA2. FCAA1 allocates 40 channels to each cell and FCAA2 allocates 42 channels to cells 1 and 3 and 38 channels to cell 2. Let the offered traffic in each cell be 35 Erlangs. Let us assume that there are no handovers and no intercell calls. We also assume that neither algorithm allows any queuing of call requests. If there is a free channel in the cell in which a call is requested, the call request is honored; otherwise it is blocked. FCAA1 achieves a blocking probability of 5.4% in each cell and the total carried traffic is 99.3 Erlangs. For FCAA2, the blocking probability is 3.6% in cells 1 and 3 and 7.8% in cell 2. The total carried traffic is 99.8 Erlangs, slightly better than that of FCAA1. FCAA1 can be said to be “fairer” than FCAA2 since it treats the individual cells more “equally.” It is reasonable to assume that in this case a network operator will prefer FCAA1 to FCAA2 even though his total carried traffic is slightly reduced. Otherwise, he will risk the desertion of customers in cell 2 for a competitor operator. Thus, the problem of ensuring some level of fairness in channel allocation becomes an interesting one. We remark that fairness does not necessarily imply “equal blocking probability.” Various definitions of fairness are possible but the most appropriate one appears to be the notion of “max-min fairness.” A similar notion of fairness is widely used in the context of flow control [3]. Roughly speaking, max-min fairness minimizes the overall blocking probability without decreasing the blocking probability in any cell at the expense of other cells which are already worse off. More precise definitions follow in later sections. We make the following assumptions regarding the cellular system. The system consists of N cells and the underlying offered traffic model is independent from cell to cell; in particular, we ignore the effect of call handovers and intercell calls. However, it is likely that we can extend our results to the case in which this independence assumption is dropped and handovers and intercell calls can be included. Our optimism is derived from the fact that the results of [7], to which we shall refer extensively, have been extended to include handovers in [9]. The call requests form a Poisson process and the call duration is exponentially distributed. The N cells share a common set of n channels. If Ai denotes the offered traffic in cell i (the expected number of calls that would be in progress in cell i if all call requests could be honored), then Ai =n is the offered traffic intensity in cell i. The offered traffic intensity in the system, r , is the sum of the offered traffic intensities N Ai repin the cells, thus r = Ai =n. The ratio pi = Ai = i=1 resents the fraction of the total offered traffic in cell i and the vector p ~ = (p1 ; p2 ; . . . ; pN ) is the traffic pattern. The carried traffic intensity in cell i, xi , is the carried traffic (expected number of calls in progress) in cell i per available channel in the system. We call the vector x ~ = (x1 ; x2 . . . ; xN ) the carried traffic intensity vector. When a call request arrives in a cell, the channel assignment algorithm either assigns it a channel for its entire duration, or blocks it. (A blocked call 0018-9448/02$17.00 © 2002 IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 8, AUGUST 2002 2419 = Fig. 2. Scale diagram. In all three cases illustrated B is fairer than A. In (a) and (b) N 2. In (c) N = 5. For both A; B of (a) and (b) and A of (c) components are represented in order, with component 1 the lowermost. For B of (c) the order is 1, 2, 3, 5, 4, component 1 being the lowermost on the vertical line. Note that corresponding components of B are joined with those of A. The numbers are the values of the corresponding call acceptances. disappears from the system.) The decision regarding blocking or honoring a call request is taken by the channel assignment algorithm based entirely on the current value of a suitably defined state vector. Further, we assume that the state vector assumes a finite, or countably infinite, set of values. In a nutshell, we assume that channel assignment algorithms can be modeled by continuous-time Markov chains (CTMCs). Further, we assume that there exists a probability distribution on the states of the CTMC, which satisfies the balance equations and all state probabilities are positive.1 An example of a state vector is a list that specifies the calls in progress in each cell of the system and the channels assigned to them. The assignment of channels to calls at any stage must satisfy certain reuse constraints which essentially specify the sets of cells that may simultaneously use the same channel. Each possible channel assignment algorithm corresponds to one and only one carried traffic intensity vector under fixed r , p~, and n. We denote the set of achievable carried traffic intensity vectors under fixed r , p~, and n, by F (r; p; ~ n) or simply F . The blocking probability in cell i is bi = 1 0 xi =pi r . We denote ci as the call acceptance in cell i, where ci = xi =pi . c ~ = (c1 ; c2 ; . . . ; cN ) is denoted as the call acceptance vector. ci =r is the call acceptance probability in cell i. We consider only systems in which pi > 0 for all i.2 The carried traffic, blocking probability, and call acceptance probability depend on the channel assignment algorithm used and we shall denote this by an appropriate suA perscript. For example, x ~ is the carried traffic intensity vector under channel assignment algorithm A. We will proceed as follows. In Section II, we formally define the concept of relative fairness and present a simple necessary and sufficient condition for relative fairness. In Section III, we introduce the notion of absolute fairness and prove its existence and uniqueness. In Section IV, we deal with fairness in the asymptotic limit, i.e., when the number of channels is arbitrarily large. We also discuss the computation of the ab- solutely fair carried traffic intensity vector in the asymptotic limit and give the corresponding channel allocation strategy to attain it. In Section V, we discuss the loss of revenue brought about by fairness and discuss a tradeoff between being fair and maximizing the revenue. We conclude this correspondence by discussing how our work can be extended. 1This is equivalent to assuming the CTMCs to be positive, recurrent, and regular. 2This means that we eliminate from the system cells with no offered traffic. 3Scale diagram is a schematic representation of vectors. The components (call acceptances for the cellular examples) are represented as points on a vertical line. Corresponding components of vectors are joined. II. RELATIVE FAIRNESS Informally, a channel assignment algorithm A is fairer than another channel assignment algorithm B , for given r , p~, and n, if for every cell i whose blocking probability is decreased by B compared to A, there is some other cell j whose blocking probability was already no less than that of i under A and has been increased further by B . A more formal definition of relative fairness is as follows. A channel assignment algorithm A is fairer than another channel assignment algorithm B , under the same r , p~ and n if A 6 x~B and • x ~ = • if there exists an i such that biA > biB , then there exists a j such that bjA  biA and bjB > bjA . Equivalently, if there exists an i such that ciA < ciB , then there exists a j such that cjA  ciA and B A cj < cj . Since a channel assignment algorithm corresponds to a unique carried traffic intensity vector for fixed r , p~, and n, we will usually speak of the fairness of carried traffic intensity vectors rather than the fairness of channel assignment algorithms. Note that given any one of the vectors, x b = (b1 ; . . . ; bN ), and c ~ = (c1 ; . . . ; cN ), we can determine ~, ~ the other two uniquely (since r and p~ are fixed). Thus, we may also equivalently consider the fairness of the vectors ~b or c~ instead of x ~. Fig. 23 shows pairs of carried traffic intensity vectors. In each case, one is fairer than the other. 2420 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 8, AUGUST 2002 Theorem 1: A channel assignment algorithm A is fairer than another channel assignment algorithm B if and only if there exists an A = mini2S ciA and Amin 2 S  U = f1; 2; . . . N g such that cA B A B A > cA , where S = fi: ci 6= ci g. cA Remarks: In other words, this theorem states that the necessary and sufficient condition for fairness of a channel assignment algorithm A over another B is that the least call acceptance probability (over all cells, ignoring those with equal call acceptance probabilities under both A and B ) under A is strictly greater than the corresponding call acceptance probability in B . This theorem will be useful in discussing absolute fairness. Note that relative fairness is different from lexicographic ordering.4 If a vector is fairer than another, it is lexicographically greater as well. However, a vector may be lexicographically greater than another, but neither of the two may be fairer than the other. Thus, the necessary and sufficient condition in this theorem is sufficient but not necessary for lexicographic comparison. Proof of Theorem 1: The proof will be given in two steps. First, the sufficiency will be proved and then the necessity A Let cA B > cA Then for every B such that cA j A where cA ; 2 A , for which U A jA Amin 2 < c (1) S: jB , there exists Amin c and < c A = min ct ; t2S 2 = min U c If possible, let A A  c B A B < cA A cA 2 fo all Amin satisfying (1). Since A is fairer than B , there exists j A A j  cA A A S; c 6= B A c 2 U , for which (3) A B j > cj : (4) c For j 2 U nS , (cjA = cjB ) and, hence, inequality (4) is never satisfied for any j 2 U n S . For j of Amin in (1) 2 S , from inequality (3), and the definition A A j = cA c i.e., A t2S t = min c satisfies (1). Hence, from (2), (4) cannot be satisfied for any . Therefore, there is no j 2 U for which both inequalities (3) and (4) are satisfied and that is a contradiction. } j 2 j S We now prove another interesting result which we shall use in obtaining some results on absolute fairness. Lemma 1: If the channel assignment algorithm A is fairer than the channel assignment algorithm B , then B cannot be fairer than A. (In other words, fairness is an antisymmetric relation.) 4Two B A 2 such that AA B since  min i2S i S A > cB c A i2S i = min c c Amin 2 (5) S: Since B is fairer than A, by Theorem 1 Bmin B = cB > cA : c B B i2S i A A , since Bmin 2 S and by inmini2S ci = cA 2 S such that min A  Again cB equality (5). Combining the above inequalities we get A A c B A  > c . Hence, (2) c and Amin B B c A B > c  A A c : This is a contradiction. Hence the existence of two channel assignment algorithms mutually fairer than each other is not possible. c for all Amin satisfying (1). Since Amin 9 9 c jA 6= cjB , j 2 S .) Since Amin 2 S , S is nonempty and thus A ~B . Thus, A is fairer than B . x ~ 6= x A ~B and hence S is nonempty. Let A be fairer than B . Thus, x ~ 6= x (Since Proof of Lemma 1: Assume there exist channel assignment algorithms A and B , each fairer than the other. Since A is fairer than B , by Theorem 1 c A  cA : j t2S t A A c Fig. 3. Scale diagram. This figure compares the fairness of two vectors A and B with two components each. Neither A nor B is fairer than the other. For A, components are represented in order, with component 1 the lowermost. For B , the order is 2,1, component 2 being the lowermost on the vertical line. Note that the corresponding components of B are joined with those of A. The numbers are the values of the corresponding call acceptances. vectors can be lexicographically compared as follows. If the minimum components are unequal, then the vector with a larger minimum component is lexicographically greater. If the minimum components are equal, then the second minimum component must be considered, and so on. III. ABSOLUTE FAIRNESS A channel assignment algorithm is absolutely fair or max-min fair if it is fairer than any other channel assignment algorithm which achieves a different carried traffic intensity vector under the same r , p~, and n. We shall refer to the carried traffic intensity vector corresponding to the max-min fair channel assignment algorithm as the MMF carried traffic intensity vector, or simply the MMF. Informally, a carried traffic intensity vector is the MMF if the blocking (probability) in any cell under it cannot be decreased without increasing the blocking in any cell already experiencing greater or equal blocking. It is not obvious that every set of carried traffic intensity vectors F has an MMF. Consider the following examples. Example III.1: Let F consist of only the carried traffic intensity vectors corresponding to the vectors c~A and c~B shown in Fig. 3. Neither A nor B is fairer than the other. Hence, no MMF exists in F in either case. Example III.2: Let F = RN . (RN is the set of N -dimensional V vectors with real components.) For any vector x ~ 2 F , there exists C another vector, x ~ 2 F , each of whose components is greater than the V V C corresponding one in x ~ . Thus, x ~ is not fairer than x ~ and hence is not the MMF. The same observation applies for F = f~ = ( x x1 ; x2 ; ...; x N ): 0  xi < 1g: In view of the above examples, it becomes necessary to prove the existence of an MMF. In this section, we will first show that any set of vectors with certain properties has an MMF. The definition of fairness in any set of N -dimensional vectors remains the same as that for carried IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 8, AUGUST 2002 traffic intensity vectors. cVi = xVi =pi , where xVi , is the ith component of the vector V~ . p~ = (p1 ; p2 ; . . . ; pN ) is the same for the entire set. pi > 0, for all i 2 U . The necessary and sufficient condition given in Theorem 1 for relative fairness of channel assignment algorithms holds for that of vectors in any N -dimensional vector set as well. A vector is the MMF if it is fairer than all other vectors in the set. Next, we discuss whether the set of achievable carried traffic intensity vectors of a cellular system has these properties. We end this section with the result that the MMF is unique. Theorem 2: If P is a nonempty, coordinate convex,5 convex, closed, bounded subset of RN , P has an MMF. Proof of Theorem 2: For brevity, we only give a construction for a vector that can be proved to be max-min fair using Theorem 1. For details, refer to [11]. Unless otherwise stated, U = f1; 2; . . . ; N g. Construction: Start from the all-zero vector ci = 0, 8 i 2 U . Always find the largest subset Il  U such that ci ’s, i 2 Il , can be increased equally without decreasing any ci . Increase the ci ’s of this subset equally without decreasing any ci , till it is no longer possible to do so. The procedure terminates when the largest subset which can be increased equally without decreasing any ci is empty, i.e., no ci can be increased without decreasing some other ci . Informally, the procedure goes as follows: Start from the vector (0; 0 . . . ; 0). Suppose the largest subset which can be increased is f1; 2; . . . ; kg, where 1  k  N . Increase c1 ; . . . ; ck equally till a vector (p1 ; . . . ; pk ; 0; . . . ; 0) is reached and  0 is such that (p1 ( + ); . . . ; pk ( + ); 0; . . . ; 0) 62 P for any > 0. Again increase the largest possible subset equally without decreasing any component. The largest possible subset will be a proper subset of f1; . . . ; kg. Let it be f1; . . . ; mg, m < k . The increase of this subset continues till (p1 + ); . . . ; pm ( + ); pm+1 ; . . . ; pk ; 0; . . . ; 0) 62 P for any  > 0. The procedure terminates when no element can be increased without decreasing some other(s). Note that this is a generalization of the construction of max-min fair rate allocation presented in [3]. The construction in [3] applies to polytope feasible sets defined by linear constraints of the type, AX  B . The construction we present here applies to more general feasible sets. We discuss the validity of the assumptions that the set of carried traffic intensity vectors is nonempty, closed, bounded, convex and coordinate convex. Nonempty: The set of carried traffic intensity vectors is clearly nonempty. Closed: In an asymptotic limit where the number of channels and the offered traffic are made arbitrarily large while keeping the ratio finite, and which we consider in the next section, for the model we have assumed (underlying model of offered traffic independent from cell to cell, etc.), the set of carried traffic intensity vectors is given by the following inequalities (refer to [7]): xi  M j=1 subset of R (R negative components), 5A x~ = ( x ;x to F for all Xj aij ; i = 1; 2; . . . N (6) is the set of all N -dimensional vectors with real nonF , is said to be coordinate convex if for each vector ; . . . ; x ) in F , x~ = (x ; x ; . . . ; x ; . . . ; x ), belongs satisfying 0 < 1 and for all i 2 f1; 2; . . . ; N g.  M j=1 Xj  0 (7) Xj = 1 (8) xi  pi r; xi  0; i = 1; 2; . . . N i = 1; 2; . . . N (9) (10) where aij = 0 or 1 depending on the system configuration and channel reuse constraint. The aij can be found by modeling the system by a hypergraph [7]. This set is closed. For the finite channel case, we could not prove that the set of carried traffic intensity vectors F is closed. This remains an assumption. However, even if the assumption turns out to be invalid our result is not seriously weakened. It can be shown that the closure of any convex, coordinate convex, and bounded set is also convex, coordinate convex, and bounded and obviously closed. Also, clearly closure of a nonempty set is nonempty. We are going to show that the set of carried traffic intensity vectors is convex, coordinate convex, and bounded. Thus, the closure of the set of carried traffic intensity vectors is nonempty, convex, coordinate convex, bounded, and M (by Theorem 2). a closed subset of RN and hence has an MMF x ~ M Even if x ~ does not belong to F (closedness is not necessary for the M existence of MMF, x ~ may belong to F ), we have carried traffic inM tensity vectors in F arbitrarily close to x ~ . For practical purposes, it suffices to assume that the set of carried traffic intensity vectors is closed. Bounded: The set of carried traffic intensity vectors F is bounded. This is because the carried traffic intensity can neither exceed the offered traffic intensity in any cell nor can it exceed 1 (since the total number of channels available in the system is n, the traffic carried in any cell cannot exceed n) and it is also nonnegative. Thus, 0  xi  min(pi r; 1) for each i and hence 0  ci  min(r; 1=pi ) for each i, where 0 < pi < 1. Theorem 3: The set of achievable carried traffic intensity vectors for a cellular system F is convex. ; . . . ; pm ; pm+1 ; . . . ; pk ; 0; . . . ; 0) is reached and (p1 ( 2421 For brevity, we give an outline of the proof of this important result. Refer to [11] for details. Our assumptions about channel assignment algorithms, the call arrival process, and call duration distribution allow the operation of the channel assignment algorithms to be modeled by a CTMC. Furthermore, we assume the CTMCs to be positive recurrent A and irreducible. Let there be two carried traffic intensity vectors x ~ and B x~ realized by channel assignment algorithms A and B , respectively. Let SA = fA1 ; A2 ; . . . ; g (resp., SB = fB1 ; B2 ; . . . ; g) denote the state space of A (resp., B ). Denote one null state (state in which the number of calls in progress in the system is 0) of A by TA and one of B by TB . A third channel assignment algorithm C , whose state space is the union of SA and SB , operates as follows. When in TA it switches over to TB at rate AB and when in TB it switches over to TA at rate BA . Otherwise, C behaves in the same manner as A or B depending on whether it is in a state that belongs to SA or SB , respectively (all other transition rates remain the same). It can be shown that the CTMC C A ~ + corresponding to C is positive recurrent and irreducible. x ~ = x B A B 0 1 (10 )~ x , where = (1+ T =T ) , = AB = BA , and fA g and f B g are the steady-state probability distributions of algorithms A and B , respectively. By adjusting we can get any 2 (0; 1). Theorem 4: The set of achievable carried traffic intensity vectors for a cellular system F is coordinate convex. We need to prove that if there exists a carried traffic intensity vector x~A 2 F , then any vector of the form x~B A ; xA ; . . . ; i xi ; . . . ; xA ) 2 F 2 N = (x1 2422 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 8, AUGUST 2002 where 0  i < 1, for any i 2 U . A slight variation of the technique used to prove Theorem 3 in conjunction with Theorem 3 can be used to prove this theorem. Refer to [11] for details. Thus, the set of achievable carried traffic intensity vectors for a cellular system is closed, bounded, convex, and coordinate convex. It is also a subset of RN . Hence, it has an MMF by Theorem 2. Theorem 5: MMF is unique. Proof of Theorem 5: Let the max-min fair carried traffic intensity vector (MMF) not be unique. Hence, there exist at least two different M M MMFs, x ~ and x ~ . Thus, the corresponding channel assignment algorithms, M1 , M2 are both fairer than each other (~ xM 6= x~M ). This violates Lemma 1. Hence this is not possible. } IV. PROPERTIES AND COMPUTATION OF MMF IN THE ASYMPTOTIC LIMIT In this section, we shall consider an asymptotic limit where Ai and n ! 1 but !1 !1lim !1 A =n = p r A ;n i i is finite. Thus, both the offered traffic and the number of channels are made arbitrarily large while keeping the ratio—the offered traffic intensity—finite. The properties of channel assignment algorithms in this asymptotic limit were studied in [7]. The feasible set of carried traffic vectors can be described by some linear inequalities in this case. Incidentally, [5] studied a different notion for fairness, proportional fairness, for resource allocation in wireline case, and presented computational strategies for obtaining the same. Also, [5] showed that max-min fairness is a limiting case of a generalization of proportional fairness, and as such a max-min fair allocation can be approximated arbitrary closely using the techniques for computing proportionally fair allocation. The similarity between the wireline case considered in [5] and the asymptotic case for cellular networks considered in this section is that the feasible sets can be described by linear inequalities in both cases (the nature of the inequalities differ in the two cases though). The computational approaches differ in the two cases. The important advantage of our approach is that we exploit specific properties of max-min fair allocation and the feasible set in the cellular mobile case to develop parametrized closed-form expressions for MMFs and the corresponding channel allocations. The parameters in the closed-form expressions can be obtained by solving linear programs. The approach in [5] is to use a nonlinear optimization based iterative update technique for obtaining the proportionally fair allocation, and the iterative procedure is not guaranteed to converge in finite number of iterations. We present our results in what follows. M Let x (r ) denote the MMF carried traffic intensity vector at load r ~ in this asymptotic limit. In this limit, the set of achievable carried traffic intensity vectors F (r) at r is described by inequalities (6)–(10) for our model [7]. The proofs in this section use results from [7]. 1 i Theorem 6: There exist finite nonnegative f 2 U and r  0 c M i (r ) = min(r; i g such that for each V ~ may be the all-zero construction remains identical for some time. x vector) and then let the constructions differ (if the constructions never M M M M differ x (r1 ) = ci (r2 ) for all i 2 U (r1 ) = x ~ (r2 ), ci ~ and there is nothing to prove). Let the largest subset of components V of x ~ whose ci s can be increased equally without decreasing others be I1 and I2 at r1 and r2 , respectively. Since the constructions differ, henceforth I1 6= I2 . Let, if possible, I1 be nonempty. At any r , if I is V the largest subset of components of any vector x ~ 2 F (r ), whose ci ’s can be increased equally without decreasing any other component, V ~ with j in U n I can be increased without decreasing then no cjV of x any other component, else from convexity and coordinate convexity of F (r), all ci ’s of I [ fj g  I can be increased equally without V decreasing any other component. Thus, no component of x ~ in U n I1 (U n I2 ) can be increased at r1 (r2 ). Observe F (r1 )  F (r2 ) V for r1 < r2 . Thus, the ci ’s of x ~ in I1 can also be increased equally V ~ without decreasing others at r2 . Hence, I1  I2 . Since ci ’s of x in I2 n I1 can be increased at r2 , but not at r1 , without decreasing others, from inequalities (6)–(10), ciV = r1 , for i 2 I2 n I1 , but from construction principle at r2 , ciV = cjV for all i; j 2 I2 (till this point ci ’s of sets I2 have been increased equally and that is how x~V has been reached). Thus, ciV = r1 for all i 2 I2  I1 and no component V of x ~ in I1 can be increased at r1 (inequality (9)). Thus, I1 = , i.e., V M V construction at r1 has terminated and x ~ = x ~ (r1 ). Since x ~ is an intermediate vector in the construction procedure for MMF at r2 , from construction principle 1 1 c (r2 ) c M i V i c = (r1 ) M i 2 U and this part of the theorem is proved. for each i 2 U at r = 0. Thus, for each i 2 U , there exists some  0 (possibly 0) such that for all r  , c (r) = r. Clearly, for each i 2 U , there exists some finite r  0, such that for all i (r ) = 0 c M i i c M i (r ) c M i M i i < r (e.g., for r > M ). Let = i (r ) = r for r < of r , and c M i ( i) M i ( c  i) inf (r )<r r: c r < 1: . Since ciM (r) is a nondecreasing function i (inequality (9)) i 2 [ 0 ; ]; i for all  > 0: i M Hence, cM ( i ) = i . Consider any r1 > i , for which ci (r1 ) < i r1 (clearly, there exists at least one such finite r1 since i is finite). ConM V V sider any r2 > r1 . Let x (r2 )), ~ be a vector with cj = min(r1 ; cj M V for each j 2 U . Clearly, x ~ 2 F (r1 ). Since cj (r ) is a nondecreasing function of r , and cjM (r)  r (from inequality (9)) 1 c M j Since x ~ V (r1 )  min(r ; c 1 is not fairer than x ~ M j for each j 2 U and c from the definition of (r1 ) c M i (r1 ) = c ; c < r1 . Thus, c c M i M i 0 (r1 ) = M i c M i (r2 ) and i c  > 2 U: (r2 )) M j (r2 ); for all r1 ; Again, from the nondecreasing property of upper-bounded by r for each r > i. for each j V j (r1 ) (r1 ) = min(r1 ; M i : (r2 )) = M j M c i) Proof of Theorem 6: First we shall prove that ciM (r) is a nondecreasing function of r . Consider 0  r1 < r2 . We show that M cM (r1 )  ci (r2 ) for all i 2 U . Carry out the construction given i in proof of Theorem 2 for both, in the asymptotic limit. The outputs M M will be the respective unique MMF’s, x ~ (r1 ) and x ~ (r2 ). Let the construction procedures for both remain identical upto a certain V point, when the carried traffic intensity vector reached is x ~ (since construction for both start from the same vector, i.e., the null vector, the 1 1 (r ) and for any 2[ ; r > i i i c M i r2 > : i (r ), and since it is + ] . Thus, c M i (r ) = i , for all } The construction procedure given in proof for Theorem 2 can be M implemented using the inequalities (6)–(10) to yield x ~ (r ), at any IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 8, AUGUST 2002  0, as follows. Start from the null vector. Find the largest sibly 0), such that (p1 ; p2 ; . . . ; pN ) 2 F1 (r) r s: s  = max M j M j =1 Xa j X =1 i :  0; j = 1; 2; . . . ; M ; s  r X j = 1; (pos- p ; i = 1; 2; . . . ; N ; ij j 2423 V 2 F1 (r)g, where x~V is any carried traffic Next find I = fi: x ~ intensity vector of the form > ;  ; c V j j=i otherwise V (inequalities (6)–(10) may be used to test whether x ~ 2 F1 (r )). I is thus the largest subset whose call acceptances can be increased equally without decreasing any other component of (p1 ; p2 ; . . . ; pN ). Without loss of generality, let I = f1; 2; . . . ; kg, k < N . All call acceptances of I cannot be increased equally without decreasing any other component when a carried traffic intensity vector (p1 ; p2 ; . . . ; pk ; pk+1 ; . . . ; pN +1 ) is obtained such that (p1 ( +); for any p2 ( > +); . . . ; p +); k( p +1 ; . . . ; p +1 N k ) 62 F1 (r) Fig. 4. 0 s: s  M = max j M j X j =1 M j Xa j =1 = 1; X j Xa =1 ij j ij p ; i 2 I; i  p ; i 2 U nI ; i :  0; j = 1; 2; . . . ; M ; s  r V Again, I1 = fi: x ~ 2 F1 (r)g is the largest subset of components whose call acceptances can be increased without decreasing any other component of (p1 ; p2 ; . . . ; pk ; pk+1 ; . . . ; pN +1 ), where x~V is any carried traffic intensity vector of the of the form: c V j > ;  ;  ; j=i j 2 I n fig otherwise . The procedure terminates when no call acceptance can be increased M without decreasing others. The output will be x (r ). ~ M 0 If x ~ (r ) is found at some sufficiently large r , say r for which M M 0 0 0 ci (r ) < r , for all i 2 U , then ci (r ) = i , for all i 2 U , from 0 M Theorem 6. Thus, the i ’s can be determined from x (r ). Using ~ M these i ’s, x ~ (r ) can be determined for all r  0 from Theorem 6. M Thus, x ~ (r ) need not be found separately at all values of r . (Using inequalities (6), (8), and (9), for any r > 1= mini2U pi , ciV < r , for M V all i 2 U , and any x ~ 2 F1 (r ). Hence, ci (r ) < r for each i 2 U , if r > 1= mini2U pi .] Theorem 7: The carried traffic intensity vector corresponding to the fixed channel assignment algorithm which allocates bnpi i c channels to cell i, for all i 2 U , is the MMF for all r  0 in the asymptotic limit. Remark: This fixed channel allocation scheme is similar to the one used to attain the highest carried traffic intensity in [7]. First, we show that it is possible to allocate bnpi i c channels to each cell i at all r . For some rl  maxi2U i , ciM (rl ) = i , by Theorem 6 (rl is finite). Thus, xi = pi i satisfies inequality (6) at all r where fXj g of inequality (6) satisfies inequalities (7) and (8) at all r . From [7] bn M Xj aij c channels can be allocated to each cell i j =1 where fXj g satisfies inequalities (7) and (8). Thus, from inequality (6) bnpi i c channels can be allocated to each cell i at all r. Again from [7], in the asymptotic limit any allocation which gives bnfi c channels to a cell i attains a carried traffic intensity Nineteen-cell system. of min(fi ; ri ) in cell i, if offered traffic intensity in cell i is ri for the model we have assumed. Thus, the algorithm allocating bnpi i c channels to each cell i attains a carried traffic intensity of pi min( i ; r) in each call i in the asymptotic limit, for all r , i.e., } ci (r) = min( i ; r) = ciM (r) at all r (Theorem 6). Example IV.1: Consider the system of 19 cells (see Fig. 4) with the following reuse constraint. A set of cells can use the same channel simultaneously if the interference in each cell of the set is  3=8. The interference in any cell u is given by v2S; v 6=u d(u; v )04 , where S is the set of cells using the same channel simultaneously and d(u; v ) is the distance between the centers of cells u and v . We assume the cell p radius to be 1= 3 or equivalently, the distance between the centers of adjacent cells to be unity. (This system and reuse constraints are the same as those in [7, Example 1.2].) 1) We shall consider uniform traffic, i.e., pi = 1=19 for each cell i 2 U . The carried traffic intensity in the system under an MMF is given by T M (r ) = N =1 x M i (r ) = min(r; 247=49) i (r ) = min(r=19; 13=49), 8 i 2 U . (see Fig. 6 (a)). xM i Thus, ciM (r) = xM (r )=pi = min(r; 247=49), 8 i 2 U . i In Fig. 5(a), these call acceptances have been plotted. A fixed channel allocation algorithm allocating b13n=47c channels to each cell achieves the MMF carried traffic intensity vector at all r in the asymptotic limit. 2) Let us consider nonuniform traffic 1=24; p i = 1=16; 1=8; i 2 f1; 2; 3; 4; 7; 8; 12 13; 16; 17; 18; 19g i 2 f5; 6; 9; 11; 14; 15g i = 10. and This pattern of nonuniform traffic resembles that in cities in which traffic is maximum in the central portion and decreases as we move toward the outskirts. The max-min fair carried traffic intensity in the system TM (r) = min(r; 2 + r2 ; 13 3 ) (refer to Fig. 6 (b)]. 2424 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 8, AUGUST 2002 xM i (r ) = i= pi min(r; i ), 8 i 2 U . 14=3; 4; i 2 f1; 2; 3; 4; 7; 8; 12; 13; 16; 17; 18; 19g otherwise. In Fig. 5(b), call acceptances have been plotted for these cells. The following fixed channel allocation algorithm gives the MMF at all r in the asymptotic limit (ni is the number of channels allocated to the ith cell): b7n=36c; ni = bn=4c; bn=2c; (a) i 2 f1; 2; 3; 4; 7; 8; 12; 13; 16; 17; 18; 19g i 2 f5; 6; 9; 11; 14; 15g and i = 10. V. TRADEOFF BETWEEN FAIRNESS AND REVENUE MAXIMIZATION More often than not, MMF is not the carried traffic intensity vector which yields the maximum revenue. At present, we consider the rate-per-call-per-unit time to be uniform throughout the system and hence the total carried traffic intensity in the system gives the rate at which revenue is earned, except for a multiplicative constant which we take as unity. We define the marginal revenue (see [8]) of a channel assignment algorithm A (or the corresponding carried traffic intensity A vector x ~ (r )) at load r and number of channels n, as TA (r; n) = N i=1 (b) Fig. 5. Maxmin fair call acceptances (c ) in a 19-cell system. S = 6; 9; 10; 11; 14; 15g (central cell and its neighbors). (a) Uniform traffic. (b) Nonuniform traffic. f5; xA i (r): So the marginal revenue of a channel assignment algorithm is the rate at which revenue is earned per channel using that algorithm. Let TM (r; n) be the marginal revenue of the MMF. Let TR (r; n) = N i=1 xR i (r) (a) ~ (r ) the channel assignbe the maximum marginal revenue [8] and R R ment algorithm (x ~ (r ) the corresponding carried traffic intensity vector at load r ) yielding this marginal revenue at load r . Let TM (r) and TR (r) be the corresponding asymptotic marginal revenues. Consider the following examples. Example V.1: 1) Consider the system of Example IV.1 1). TM (r) and TR (r)6 have been plotted versus r in Fig. 6(a). For r > 247=49, TM (r) < TR (r). 2) Consider the system of Example IV.1 2). For r TM (r) < TR (r) (refer to Fig. 6(b)). > 4:0, Clearly, TM (r; n)  TR (r; n) for all systems. Generally this inequality is strict. Whenever this inequality is strict, the channel assignment algorithm attaining TR (r; n) is unfair compared to that attaining TM (r; n). In other words, revenue is maximized at the expense of fairness. If the operator maximizes revenue at the cost of fairness, it may cause customer dissatisfaction (customers will be dissatisfied throughout the system as they will experience poor-quality service when they move to certain cells) and possibly customer desertion to a competitor operator, which will result in reduced r and hence reduced revenue. Instead, if the network operator had opted for a carried traffic 6Computation of T (r ) has been discussed in [7]. (b) Fig. 6. Loss in revenue brought about by max-min fairness for a 19-cell system. (a) Uniform traffic. (b) Nonuniform traffic. intensity vector which fetches less revenue but is fairer, customer desertion may have been less and it is possible that the ultimate revenue earned would be greater. While we are still in the process of modeling the effects of customer desertion on fairness and revenue, it seems plausible that the ideal channel assignment algorithm in many situations would earn less marginal revenue than TR (r; n) (which we get by not caring about fairness) and more than TM (r; n) (which we get by being max-min fair). It would also, in some sense (not necessarily that of Sec~ (r ) but not “as fair” as the MMF channel tion II), be “fairer” than R ~ (r ) at load r . A possible approach is to fix the assignment algorithm M IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 8, AUGUST 2002 ( ) ( ) revenue at some value between TM r; n and TR r; n , say m, and choose the channel assignment algorithm corresponding to the MMF among those carried traffic intensity vectors that earn a marginal revenue of at least m. We denote this carried traffic intensity vector by M m; r; n (xM m; r in the asymptotic limit). Consider the folx lowing example. ~ ( )~ ( ) Example V.2: 1) Consider the system of 19 cells with uniform traffic (refer to Example IV.1 1)). At r r = : = , TR and TM r = : . A carried traffic intensity vector xR r which maximizes the marginal revenue in the asymptotic limit (computed as per [7]) has a blocking probability of 50% in the central cell (cell 10) and 0% in all other cells. : gives following On the other hand, xM m; r at m blocking probabilities: ( ) = 37 7 = 5 2856 = 38 7 ( ) = 247 49 = 5 0408 ~ () ~ ( ) b ; : ; i ; ; ; ; ; i ; ; ; ; ; ; ; x m; r x : = r x x : ; r r ( ) = 4 348 ~ () =45 ( )= ~ ( =43 ) 15 553% = 10 2 f5 6 9 11 14 15g i = 6 668% 0% otherwise. Clearly, ~M (4 3 ) is much fairer than ~R ( ), while it fetches only slightly less revenue (4 3 as compared to 4 348) at = 4 5. Again this suggests that a network operator may be better off in the long run sacrificing the additional revenue achieved by ~R ( ) and using ~M (4 3 ) instead, at = 4 5. MMF gives a blocking probability of 11.11% in cells : b ; : i ; i ; ; ; ; ; ; x : ; r x r : r r x : ; r : 5, 6, 9, 10, 11, 14, 15, and 0% blocking in other cells. The value of m could possibly be the result of modeling customer desertion in an appropriate manner. Further investigation in this direction is an interesting topic for future research. We have so far assumed that the set of carried traffic intensity vectors F m; r; p; n which fetch a marginal revenue of at least m at r has an MMF. This can be proved using the following theorem. ( ~ ) Theorem 8: If D is any nonempty, convex, closed, bounded subset N , D has an MMF. of R+ Note that the assumption of coordinate convexity is not required. Consider a set s= D A~ 2D ( ~) S A where ( ~) = f ~ : (0 0. . . 0)  ~  ~g S A V ; ; ~ iV ;  ciV ; M i ~ ~2  is not fairer than V the MMF in Ds . M ( ( ) D i 6= F R N = ~: V n = j j: s . This contradicts the fact that M~ is D ~ ) = \ ( ), where F m; r; p; n intensity vectors at r; R m for some i < c ~ ~ ~ ~ ~ c ~ 0 R m F is the set of carried traffic (and traffic pattern p) and N i=1 V i x  m ~ where xVi is the ~ th component of V i ( ) Clearly, R m is closed and convex. F is also closed and convex. Thus, the intersection of these two is also closed and convex. Since F is bounded, F m; r; p; n  F is also bounded. m  TR r; n means xR r which fetches revenue equal to TR r; n  m is in set R m and it is also there in F . Thus, the intersection is nonempty. F m; r; p; n  F  R+NN. F m; r; p; n is a nonempty closed, bounded, convex subset of R+ . Hence, F m; r; p; n has an MMF by Theorem 8. () ( ) ( ~ ) ( ~ ) ( ) ( ( ) ~ ) ( ~ ) VI. CONCLUSION AND FUTURE WORK : : x r ~ = 2) Consider the system of 19 cells with nonuniform traffic (refer to Example IV.1 2)). At r r : and TM r : , TR : . A carried traffic intensity vector xR r which maximizes the marginal revenue in the asymptotic limit (computed as per [7]) has a blocking probability of 26.98% in the central cell (cell 10) and 0% in all other cells. On the other hand, xM m; r at m : gives following blocking probabilities: 4 25 ~ r : r ~ where we say V1  V2 if xiV  xVi , for each i 2 U . We call Ds the coordinate convex extension of D . Thus, for every vector V 2 Ds , there exists some vector A 2 D such that  ciV  ciA for all i 2 U . Clearly, Ds  D , hence Ds is coordinate convex. Ds is closed, bounded, convex, nonempty if D has these properties. (It can be shown that coordinate convex extension of a closed, N is also closed, bounded, convex, bounded, convex, nonempty set in R+ and nonempty.) Thus, by Theorem 2 Ds has an MMF. Let it be M . Clearly, M is fairer than all vectors in D  Ds . Hence, M is the MMF in D if it belongs to D . If M 62 D , M 2 Ds n D . Thus, there exists V 2 D such that = 52 11 175% 2 f5 6 9 10 11 14 15g 2 f2 4 7 13 16 18g i = 0 287% 0% otherwise. Clearly, ~M ( ) is much fairer than ~R ( ), while it fetches only slightly less revenue (5 2 as compared to 5 286) at = 38 7. This suggests that a network operator may be better off in the long run sacrificing the additional revenue achieved by ~R ( ) and using ~M (5 2 ) instead, at = 38 7. : 2425 V A We have developed the notions of relative and absolute fairness. We have obtained a simple necessary and sufficient condition for relative fairness which is useful in determining if a vector is fairer than another. We have shown that any subset of RN satisfying certain properties has an MMF and the set of carried traffic intensity vectors satisfies those properties. We have shown that the MMF is unique. We have been able to specify a fixed channel assignment algorithm which yields the MMF at all loads, in the asymptotic limit. Future research may be directed toward determining optimal channel assignment algorithms that would maximize revenue taking into account the effects of customer desertion. We would like to point out that many of our results are very general in nature and apply to a large class of other networks as well. The problem of max-min fair bandwidth allocation is very relevant in context of other networks as well, e.g., automated teller machine (ATM) networks. The set of feasible allocations often satisfies the conditions of Theorem 8. Thus, we know from Theorem 8 that the max-min fair allocation exists uniquely (uniqueness follows from Theorem 5) and the construction of Theorem 2 actually yields this allocation if the set of feasible allocations is known. Our results may find application in the problem of max-min fair allocation of available bandwidth to competing available bit rate (ABR) traffic in ATM networks with minimum cell rate requirements (MCR) [1]. 2426 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 48, NO. 8, AUGUST 2002 REFERENCES [1] S. P. Abraham and A. Kumar, “Algorithms for max–min fair rate control of ABR connections with nonzero MCR in ATM networks,” in Proc. Conf. Communication Technologies, 1996. [2] C. Berge, Hypergraphs. Amsterdam, The Netherlands: North-Holland, 1989. [3] D. Bertsekas and R. Gallager, Data Networks. Englewood Cliffs, NJ: Prentice-Hall, 1987. [4] E. Kreyszig, Introductory Functional Analysis With Applications. New York: Wiley, 1978. [5] F. Kelly, A. Maulloo, and D. Tan, “Rate control for communication networks: Shadow prices, proportional fairness and stability,” J. Oper. Res. Soc., vol. 49, no. 3, pp. 237–252, Mar. 1998. [6] V. H. Macdonald, “The cellular concept,” Bell Syst. Tech. J., vol. 58, no. 1, Jan. 1979. [7] R. J. McEliece and K. N. Sivarajan, “Performance limits for channelized cellular telephone systems,” IEEE Trans. Inform. Theory, vol. 40, pp. 21–34, Jan. 1994. [8] , “Maximizing marginal revenue in generalized blocking service networks,” in Proc. 30th Annu. Allerton Conf. Communications, Control, and Computing, vol. 18, 1992, pp. 455–464. [9] K. N. Sivarajan, “Performance limits for cellular systems with handoffs,” in Proc. 31st Annu. Allerton Conf. Communications, Control, and Computing, vol. 19, 1993, pp. 887–897. [10] R. W. Wolff, Stochastic Modeling and the Theory of Queues. Englewood Cliffs, NJ: Prentice-Hall, 1989. [11] S. Sarkar and K. N. Sivarajan, “Fairness in cellular mobile networks,” Lab. Resource Allocation in Networks, Elec. Comput. Eng. Dept., Indian Institute of Science, Bangalore, Tech. Rep.LRAN-1, 1997.