On the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints

Similar documents
TRANSMISSION STRATEGIES FOR SINGLE-DESTINATION WIRELESS NETWORKS

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

USING multiple antennas has been shown to increase the

NOMA: Principles and Recent Results

Dirty Paper Coding vs. TDMA for MIMO Broadcast Channels

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Error Exponent Region for Gaussian Broadcast Channels

On the Throughput of Proportional Fair Scheduling with Opportunistic Beamforming for Continuous Fading States

Short-Packet Communications in Non-Orthogonal Multiple Access Systems

K User Interference Channel with Backhaul

Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting

Channel Allocation Using Pricing in Satellite Networks

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

IN this paper, we show that the scalar Gaussian multiple-access

A Half-Duplex Cooperative Scheme with Partial Decode-Forward Relaying

AN EXTERNALITY BASED DECENTRALIZED OPTIMAL POWER ALLOCATION SCHEME FOR WIRELESS MESH NETWORKS

NOMA: An Information Theoretic Perspective

Joint FEC Encoder and Linear Precoder Design for MIMO Systems with Antenna Correlation

On Network Interference Management

Optimal Power Allocation for Parallel Gaussian Broadcast Channels with Independent and Common Information

Optimum Transmission through the Gaussian Multiple Access Channel

Information in Aloha Networks

Multi-User Gain Maximum Eigenmode Beamforming, and IDMA. Peng Wang and Li Ping City University of Hong Kong

Duality, Achievable Rates, and Sum-Rate Capacity of Gaussian MIMO Broadcast Channels

Joint Source-Channel Coding for the Multiple-Access Relay Channel

Average Throughput Analysis of Downlink Cellular Networks with Multi-Antenna Base Stations

ECE Information theory Final (Fall 2008)

TCP over Cognitive Radio Channels

Game Theoretic Approach to Power Control in Cellular CDMA

On the Capacity Region of the Gaussian Z-channel

5958 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 12, DECEMBER 2010

Cell throughput analysis of the Proportional Fair scheduler in the single cell environment

Interference Channel aided by an Infrastructure Relay

On queueing in coded networks queue size follows degrees of freedom

Optimal Power Allocation for Cognitive Radio under Primary User s Outage Loss Constraint

Scheduling Multicast Traffic with Deadlines in Wireless Networks

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel

Rate and Power Allocation in Fading Multiple Access Channels

ALOHA Performs Optimal Power Control in Poisson Networks

Sum Capacity of General Deterministic Interference Channel with Channel Output Feedback

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Information Theory vs. Queueing Theory for Resource Allocation in Multiple Access Channels

On Gaussian MIMO Broadcast Channels with Common and Private Messages

Random Access: An Information-Theoretic Perspective

A Two-Phase Power Allocation Scheme for CRNs Employing NOMA

Simple Semi-Grant-Free Transmission Strategies Assisted by Non-Orthogonal Multiple Access

Practical Polar Code Construction Using Generalised Generator Matrices

User Selection and Power Allocation for MmWave-NOMA Networks

P e = 0.1. P e = 0.01

Primary Rate-Splitting Achieves Capacity for the Gaussian Cognitive Interference Channel

Information Theory Meets Game Theory on The Interference Channel

On Compound Channels With Side Information at the Transmitter

Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel

Medium Access Control and Power Optimizations for Sensor Networks with Linear Receivers

Morning Session Capacity-based Power Control. Department of Electrical and Computer Engineering University of Maryland

A Proof of the Converse for the Capacity of Gaussian MIMO Broadcast Channels

A Novel Asynchronous Communication Paradigm: Detection, Isolation, and Coding

Optimum Power Allocation in Fading MIMO Multiple Access Channels with Partial CSI at the Transmitters

Optimal Sequences, Power Control and User Capacity of Synchronous CDMA Systems with Linear MMSE Multiuser Receivers

Efficient Rate-Constrained Nash Equilibrium in Collision Channels with State Information

Two-Stage Channel Feedback for Beamforming and Scheduling in Network MIMO Systems

Maximizing System Throughput by Cooperative Sensing in Cognitive Radio Networks

Competitive Scheduling in Wireless Collision Channels with Correlated Channel State

Queue Proportional Scheduling in Gaussian Broadcast Channels

Characterization of Convex and Concave Resource Allocation Problems in Interference Coupled Wireless Systems

Channel Probing in Communication Systems: Myopic Policies Are Not Always Optimal

Optimal power-delay trade-offs in fading channels: small delay asymptotics

Broadcasting over Fading Channelswith Mixed Delay Constraints

Upper Bounds on MIMO Channel Capacity with Channel Frobenius Norm Constraints

Upper Bounds on the Capacity of Binary Intermittent Communication

Node-based Distributed Optimal Control of Wireless Networks

Robust Network Codes for Unicast Connections: A Case Study

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery

Network Control: A Rate-Distortion Perspective

Capacity of a Two-way Function Multicast Channel

On the Design of Scalar Feedback Techniques for MIMO Broadcast Scheduling

Optimal Channel Probing and Transmission Scheduling in a Multichannel System

Performance of Round Robin Policies for Dynamic Multichannel Access

Ergodic Stochastic Optimization Algorithms for Wireless Communication and Networking

Power Control in Multi-Carrier CDMA Systems

On the Throughput, Capacity and Stability Regions of Random Multiple Access over Standard Multi-Packet Reception Channels

Dynamic spectrum access with learning for cognitive radio

Energy-Efficient Transmission Scheduling with Strict Underflow Constraints

The Optimality of Beamforming: A Unified View

Sum-Power Iterative Watefilling Algorithm

Random Access Protocols for Massive MIMO

On the Optimality of Myopic Sensing. in Multi-channel Opportunistic Access: the Case of Sensing Multiple Channels

Throughput Maximization for Delay-Sensitive Random Access Communication

On the Duality between Multiple-Access Codes and Computation Codes

On the Duality of Gaussian Multiple-Access and Broadcast Channels

Cooperative Interference Alignment for the Multiple Access Channel

CDMA Systems in Fading Channels: Admissibility, Network Capacity, and Power Control

Cooperative HARQ with Poisson Interference and Opportunistic Routing

Information Theory for Wireless Communications, Part II:

A Comparison of Superposition Coding Schemes

Decodability Analysis of Finite Memory Random Linear Coding in Line Networks

AS computer hardware technology advances, both

Transcription:

1 On the Fundamental Limits of Multi-user Scheduling under Short-term Fairness Constraints arxiv:1901.07719v1 [cs.it] 23 Jan 2019 Shahram Shahsavari, Farhad Shirani and Elza Erkip Dept. of Electrical and Computer Engineering New York University, NY. Abstract In the conventional information theoretic analysis of multiterminal communication scenarios, it is often assumed that all of the distributed terminals use the communication channel simultaneously. However, in practical wireless communication systems due to restricted computation complexity at network terminals a limited number of users can be activated either in uplink or downlink simultaneously. This necessitates the design of a scheduler which determines the set of active users at each time-slot. A well-designed scheduler maximizes the average system utility subject to a set of fairness criteria, which must be met in a limited window-length to avoid long starvation periods. In this work, scheduling under short-term temporal fairness constraints is considered. The objective is to maximize the average system utility such that the fraction of the time-slots that each user is activated is within desired upper and lower bounds in the fairness window-length. The set of feasible window-lengths is characterized as a function of system parameters. It is shown that the optimal system utility is non-monotonic and super-additive in window-length. Furthermore, a scheduling strategy This work is supported by NYU WIRELESS Industrial Affiliates and National Science Foundation grants EARS- 1547332 and NeTS-1527750.

2 is proposed which satisfies short-term fairness constraints for arbitrary window-lengths, and achieves optimal average system utility as the window-length is increased asymptotically. Numerical simulations are provided to verify the results. I. Introduction The design of efficient resource allocation and scheduling schemes in cellular communications is a topic of significant interest [1] [7]. Opportunistic scheduling strategies maximize system utility by exploiting the channel state information while guaranteeing satisfaction of fairness constraints such as temporal fairness for individual users in the network. In practice, these fairness constraints often need to be satisfied over limited window-lengths to avoid long starving periods and control system latency [4], [6]. In cellular networks, each cell operates in the uplink or downlink mode of operation at any given time. In uplink communication, a subset of users transmit their messages to the base station (BS). This can be modeled as communication over a multiple-access channel (MAC). In downlink communication, the BS transmits messages to a subset of users. This can be modeled as a broadcast channel (BC) communication problem. While the traditional information theoretic approach considers optimal communication rates for a given set of users, scheduling strategies determine which users are activated by the BS at each transmission block. The choice is made in accordance with the user s fairness demands (e.g. temporal demands) as well as the resulting system utility (e.g. sum-rate). Once the choice of active users is taken, physical layer techniques developed for MAC and BC are used for communication over the resulting channel [8], [9]. In this work, we study the design of optimal scheduling strategies under short-term temporal fairness constraints. Temporal fairness requires the fraction of the resource blocks that each user is activated to be within desired upper and lower bounds. Temporally fair schedulers provide each user with a minimum temporal share in order to control the average delay [2]. Additionally, the maximum power drain of users can be restricted by limiting their activation time through placing upper-bounds on their temporal shares [3]. There has been a significant body of work

3 dedicated to the study of temporally fair single-user [10] [12] and multi-user [7] schedulers under long-term fairness constraints. Short-term temporal fairness, where the fairness criteria are required to be satisfied over a limited scheduling window, has been considered in several prior works for single-user schedulers [4] [6]. Short-term temporal fairness avoids long waiting times for users with low average channel quality. The use of timers in the networking protocols (e.g. TCP) gives further merit to considering short-term temporal fairness as the timer may expire and cause a loss of connectivity absent short-term temporal fairness guarantees [4]. In [4], it is argued that long-term scheduling policies do not provide fairness guarantees in scheduling windows with practical length. In this work, we provide a general formulation of multi-user scheduling under short-term temporal fairness constraints. We characterize the set of feasible window-lengths and user temporal shares as a function of system parameters. We show that in general, the optimal utility function is non-monotonic and super-additive as a function of the window-length. We build upon our prior works on the design of threshold based strategies under long-term fairness constraints [7], [13] to propose an implementable scheduler which guarantees short-term fairness. Concentration of measure tools such as typicality are used to analyze the resulting utility of the proposed strategy. We show that as the window-length increases, the utility approaches that of the optimal one under long-term temporal constraints. Furthermore, we investigate bounds on the optimal system utility as a function of the window-length and derive rates of convergence to optimal long-term utility. The rest of the paper is organized as follows: Section II explains the notation used in the rest of the paper. Section III provides the problem formulation. Section IV investigates the monotonicity of the optimal system utility as a function of window-length. Section V includes the proposed scheduling strategy. Section VI provides various simulations of practical scenarios to verify the results. Section VII concludes the paper.

4 II. Notation The set of natural numbers, rational numbers and the real numbers are shown by N, Q and R respectively. The set of numbers {1, 2,, n}, n N is represented by [n]. For the numbers n 1, n 2,, n k N, the least common multiple is written as lcm(n 1, n 2,, n k ). We write a b if the integer a is a divisor of b. The vector (x 1, x 2,, x n ) is written as x n. The m t matrix [g i, j ] i [m], j [t] is denoted by g m t. For a random variable X, the corresponding probability space is (X, F X, P X ), where F X is the underlying σ-field. For an event A, the random variable 1 A is the indicator function. Families of sets are shown using sans-serif letters such as X. The notation x ( x ) is used to represent the closest integer smaller (bigger) than x. III. Problem Formulation Opportunistic multi-user scheduling under long-term temporal fairness constraints was formulated in [7]. We provide a summary and formulate multi-user scheduling under short-term fairness constraints. We consider a cell consisting of n users and one BS. Only specific subsets of users may be activated simultaneously. For instance, in practical wireless communication systems due to restricted computation complexity at network terminals a limited number of users can be activated either in uplink or downlink at each time-slot. Subsets of users which can be activated simultaneously are called virtual users. The set of virtual users is denoted by V = {V 1, V 2,, V m } where V j, j [m] are subsets of users and m 2 n. The choice of the active virtual user at a given time-slot determines the resulting system utility at that time-slot. The vector of system utilities due to activating each of the virtual users is called the performance vector. As an example, the elements of the performance vector may be the sum-rate resulting from activating the corresponding virtual user in the downlink BC or uplink MAC. In this case, the performance vector is random and its value depends on the realization of the underlying time-varying channel. In a given time-slot, the system utilities due to activating different virtual users may depend on each other. The performance vectors in different time-slots are assumed to be independent of each other.

5 Definition 1 (Performance Vector). The vector of jointly continuous variables (R 1,t, R 2,t,, R m,t ), t N is the performance vector of the virtual users at time t. The sequence (R 1,t, R 2,t,, R m,t ) is a sequence of independent 1 vectors distributed identically according to the joint density f R m. Under temporal fairness, it is required that the fraction of time-slots in which each user is activated is bounded from below (above). The vector of lower (upper) bounds w n (w n ) is called the lower (upper) temporal demand vector. We assume that the temporal demand vectors take values among the rational numbers (i.e. (w n, w n ) Q n Q n ). This does not cause a loss of generality since the rational numbers are dense in R. Furthermore, we write w i = k i d i, i N and w i = k i d i, i N, where (k i, d i ) and (k i, d i ) are assumed to be coprime integers. The objective is to design a scheduling strategy satisfying the temporal fairness constraints in a given window-length while maximizing the resulting system utility. Accordingly, a scheduling strategy is defined as follows. Definition 2 (s-scheduler). Consider the scheduling setup parametrized by (n, V, w n, w n, f R m). A scheduling strategy Q = (Q t ) t [s] with window-length s N (s-scheduler) is a family of (possibly stochastic) functions Q t : R m t V, t [s], where: The input to Q t, t [s] is the matrix of performance vectors R m t which consists of t independently and identically distributed column vectors with distribution f R m. The temporal demand constraints are satisfied: P ( w i A Q i,s w i, i [n] ) = 1, (1) where, the temporal share of user u i, i [n] up to time t [s] is defined as A Q i,t = 1 t 1 t { }, i [n], t [s]. (2) u i Q k (R m k ) k=1 1 Note that the realization of the performance vector is independent over time, however the performance of the virtual users at a given time-slot may be dependent on each other.

6 Unless otherwise stated, we consider homogeneous systems where the scheduler is allowed to activate subsets of at most N max users at each time-slot. More precisely, for a homogeneous multi-user system with n users and maximum number of active users N max n, the set of virtual users is defined as V = { V j U V j N max }. We write (n, N max, w n, w n, f R m) instead of (n, V, w n, w n, f R m) to characterize a homogeneous system. A scheduling setup where the user temporal shares are required to take a specific value, i.e. A Q i,s = w i, i [n], is called a setup with equality temporal constraints and is parametrized by (n, N max, w n, w n, f R m). A necessary condition for the existence of a scheduling strategy is that i [n] w i N max must hold since at most N max users can be activated simultaneously. Note that some temporal demand vectors (w n, w n ) are not feasible given a specific windowlength s. For instance if the window-length is taken to be s = 2, then each user can be activated for 0,1 or 2 time-slots. Consequently, only temporal shares in the set {0, 1 2, 1} are feasible. The feasibility is also affected by N max, the maximum number of users which can be activated simultaneously since i [n] w i = i [n] k i d i N max, where d i s. The following defines the set of feasible window-lengths given a temporal demand vector and virtual user set. Definition 3. (Feasible Scheduling Window) For a given temporal demand vector (w n, w n ) Q n Q n and virtual user set V, the window-length s is called feasible if a scheduling strategy satisfying the temporal demand constraints (w n, w n ) exists. The set of all feasible window-lengths is denoted by S(w n, w n, V). For a homogeneous systems, the set of feasible window-lengths is denoted by S(w n, w n, N max ). Consider the setup with equality temporal fairness constraints (n, N max, w n, w n, f R m). Assume that the window-length s is feasible (i.e. s S(w n, w n, N max )). Then, there exists a vector of virtual user temporal shares a m satisfying the fairness constraints, where a j, j [m] is the fraction of

7 time-slots in which the jth virtual user is activated. This yields a mapping from w n R n to a m R m which is described below. Definition 4. For a tuple (s, w n, N max ) such that s S(w n, w n, N max ), let a m be a vector of virtual user temporal shares such that i) j [m] a j = 1, ii) j:u i V j a j = w i, i [n], and iii) 0 a j, j [m], where a j = l j s, j [m]. We define the mapping Θ as Θ : (s, wn, N max ) (a 1, a 2,, a m ). We make particular use of a class of non-opportunistic scheduling strategies called the ordered round robin in investigating the feasibility of scheduling window-lengths. The ordered round robin strategy is an extension of single-user round robin to the multi-user settings, in which the virtual users are activated in a specific order. Definition 5 (Ordered Round Robin). For the scheduling setup (n, N max, w n, w n, f R m) with window-length s S(w n, w n, N max ), an ordered round robin strategy has the form Q t (R m t ) = V jt, t [s] where j t is the unique index for which the following inequality holds sa j + 1 t sa j, (3) j< j t j j t where a m = Θ(s, w n, N max ) for some w n such that w i w i w i, i [n]. The average system utility of an s-scheduler is defined as: Definition 6 (System Utility). For an s-scheduler Q: The average system utility up to time t, is defined as U Q t = 1 t m R j,k 1 t { } Q k (R m k )=V. (4) j k=1 j=1 The variable Us Q is called the average system utility for the s-scheduler. An s-scheduler Q s is optimal if and only if Q s argmax Q Qs Us Q, where Q s is the set of all s-schedulers for the scheduling setup. The optimal utility is denoted by Us.

8 Our objective is to study properties of U s and to design scheduling strategies satisfying the short-term fairness constraints while achieving average system utilities close to U s. IV. Characteristics of Short-term Schedulers In this section, we study the set of feasible window-lengths, and show that under equality temporal constraints, the set is non-contiguous, whereas, under inequality temporal constraints, the set is asymptotically contiguous. Consequently, under inequality constraints, for any given temporal demand vectors and a set of virtual users, there is a minimum window-length such that all larger window-lengths are feasible. This allows us to investigate the optimal utility function as the window-length is increased asymptotically. Furthermore, we show that the optimal utility function Us is a non-monotonic and supper-additive function of the window-length s. A. Contiguity of the Feasible Window-length Set As a first step, we show an equivalence relation between the feasibility of a given windowlength and the existence of an ordered round robin strategy with that window-length. This leads to a significant simplification of the proofs provided in the rest of the section. Proposition 1. For an scheduling setup (n, N max, w n, w n, f R m), the window-length s is feasible iff there exists an ordered round robin strategy satisfying the temporal constraints. Proof. Assume that the window-length is feasible, then by definition a strategy satisfying the temporal fairness criteria exists. Assume that the strategy results in temporal share vector w n. Let a m = Θ(w n ), where the mapping Θ( ) is defined in Definition 4. Using Equation (3), one can construct an ordered round robin strategy satisfying the fairness constraints. The converse proof holds by definition of feasibility. The following proposition shows that under equality temporal constraints, the set of feasible window-lengths is non-contiguous at every point.

9 Proposition 2. For any scheduling setup with equality constraints (n, N max, w n, w n, f R m), the set of feasible is characterized as follows: S = { kd res (w n ) k N }, where d res (w n ) = lcm(d 1, d 2,, d n ), where w i = k i d i, i [n] and (k i, d i ) are coprime integers. Proof. First we prove that S {k d res k N}. Assume that s S(w n, w n, N max ), then there exists a scheduling strategy Q satisfying the temporal fairness constraints. Let l j, j [m] be the number of time-slots when the jth virtual user is activated by Q. Define a j = l j s, j [m] as the temporal share of the jth virtual user. Then, j:u i V j a j = j:u i V j l j s = w i = k i d i, i [n]. As a result, we must have d i k i s, i [n]. Using the fact that (k i, d i ) are coprime, we conclude that d i s, i [n]. Consequently, d res s. This proves that S {kd res k N}. In the next step, we will show that for any s = k d res, k N, there exists a scheduling strategy satisfying the equality temporal constraints. Note that since d res = lcm(d n ), we can write w i = k i kd res, k i N, i [n]. It is straightforward to show that the following choice of Q t (R m t ) satisfies the fairness constraints: i Q t (R m t ) k i = sw i < t sw i = k i. i <i i <i Note that in the above construction, Q t (R m t ) is a valid virtual user. In other words, we have Q t (R m t ) N max since i [n] w i N max. The following theorem shows that under inequality temporal fairness constraints, the set of feasible window-lengths is asymptotically contiguous. i i i i Theorem 1. For any scheduling setup with inequality constraints (n, N max, w n, w n, f R m), the set of feasible window-lengths is as follows: { S = kdres (w n ) } k N, (5) w n W

10 where d res (w n ) is defined in Proposition 2, and W = {w n w n w n w n : i [n] w i N max }. Particularly, the set is contiguous for large enough window lengths. More precisely, we have: { dres (w n ) + nd ɛ + k k N } S, (6) where d ɛ = max(d α, d δ ), are coprime integers. k α d α = N max i [n] w i, k δ d δ = min i [n] (w i w i ), and (k α, d α ), and (k δ, d δ ) Proof. The proof of Equation (5) follows from Proposition 2. We prove Equation (6) by construction. Fix k N and let w i = l i d res (w n ), i [n]. Define w i(l) = l i+nd ɛ +k l d res (w n )+nd ɛ +k, l {0, 1,, nd ɛ +k}. In order to have w n (l) W, one needs to verify that w n w n (l) w n and i [n] w i (l) N max. Clearly, we have w i w i (0), i [n] and w i (l) is decreasing in l. Also, w i > w i (nd ɛ + k), i [n]. Consequently, there exists li, i [n] be such that w i(li + 1) w i i [n] w i (li ) N max. To see this, note that by construction, we have: i [n] :w i (li ) w i w i(li ) w i(li 1 + 1) = d(w n ) + nd ɛ + k w i (li ) w i 1 1. d ɛ d α i [n] On the other hand, by definition, we have 1 d α that i [n] w i (l i ) N max. Furthermore, i [n] w i (li ). We argue that N max i [n] w i. Consequently, we have shown w i (l i ) w i 1 nd ɛ w i w i (l i ) n 1 nd ɛ 0. Hence, w n = (w i (l i )) i [n] W. This concludes the proof. B. Characteristics of Optimal Utility Next, we investigate the monotonicity of the optimal utility function over the feasible set of window-lengths, and show that in general, it is non-monotonic. This is explained through the following example and the ensuing proposition. Example 1. Consider a scheduling system consisting of two users (n = 2) with N max = 1. Let the users utilities be fixed over time and equal to R 2 = 2R 1 = 2. Consider the temporal

11 constraints w 1 = w 2 = 1 4 and w 1 = w 2 = 3 4. Note that k 2, w2 = ( k/2 k, k/2 ) k is feasible. From Equation (5), we have S = {s s 2}. Note that the utility of user 2 is larger than that of user 1. So, an optimal strategy activates the second user as long as the first user s fairness constraints are not violated. The optimal utility function is given as follows: U 2 = 3 2, U 3 = 5 3, and Us = s+3 s/4 s, s 4. The optimal utility is decreasing when 4 s and increasing everywhere else. Consequently, we have shown the following proposition. Proposition 3. There exists scheduling setups (n, N max, w n, w n, f R m) for which the optimal utility function U s is non-monotonic in s in an infinite number of points. The next theorem shows that the optimal utility is a superadditive function of the windowlength. This is useful in proving the existence of an optimal utility value as the window-length is increased asymptotically and in analyzing rates of convergence of the optimal utility function to the optimal utility value. Theorem 2. For any scheduling setup (n, N max, w n, w n, f R m), the optimal utility function U s is superadditive in s: s, s S : su s + s U s (s + s )U s+s. Proof. The proof follows by a construction argument. Let Q s and Q s be optimality achieving strategies for window lengths s and s, respectively. Consider the concatenated strategy Q s+s defined as follows: Q s,t if t s Q s+s,t = Q s,t if s + 1 t s + s, where Q s,t and Q s,t are the output of the scheduling strategies Q s and Q s at time t, respectively. The strategy Q s+s satisfies the temporal fairness constraints and has average utility s s+s U s + s s+s U s. This concludes the proof.

12 The following is direct consequence of Theorem 2. Corollary 1. For the setup (n, N max, w n, w n, f R m), let U be the optimal utility under long-term temporal fairness constraints. Then, U s U, s S and lim s U s = U. V. Multi-user Scheduling Strategy In this section, we provide a scheduling strategy satisfying short-term fairness constraints for an arbitrary feasible window-length. The strategy achieves optimal utility as the window-length is increased asymptotically. We further derive the rates of convergence to the long-term optimal utility. It was shown in [7], that under long-term fairness constraints, a special class of scheduling strategies called threshold based strategies (TBS) achieve optimal system utility. However, application of TBSs does not guarantee short-term fairness. In the following, we modify TBSs to ensure that the fairness criteria are satisfied in the given window-length. At a high level, the proposed strategy modifies the set of virtual users which can be activated at each time-slot based on the virtual users which have been activated in the prior time-slots so as to ensure that the short-term fairness constraints are satisfied. The proposed class of scheduling strategies are called augmented threshold based strategies (ATBS). Algorithm 1 provides a step-by-step description of the ATBS. The following defines the class of ATBSs. Definition 7 (ATBS). For the scheduling setup (n, N max, w n, w n, f R m) with window-length s S, an ATBS is characterized by the vector λ n R n. The strategy Q AT BS (s, λ n ) = (Q AT BS,t ) t N is defined as: ( Q AT BS,t R m t ) = argmax M ( ) V j, R t, j, t N, (7) V j V t where M ( V j, R t, j ) = Rt, j + n i=1 λ i 1 {ui V j } is the scheduling measure corresponding to the virtual user V j, and V t is the feasible virtual user set at time t and consists of all virtual users V j

13 satisfying the following conditions: ( s t max swi (t 1)A Q i [n] i,t 1 1 ) {u i V j }, (8) where x + = x 1 x 0. sw i (t 1)A Q i,t 1 + 1 {u i V j }, i [n], (9) ( (s t)n max swi (t 1)A Q i,t 1 1 ) + {u i V j }, (10) i [n] Inequalities (8) (10) ensure short-term fairness. More specifically, (8) and (10) verify that if V j is activated in the next time-slot, then the lower temporal demands can be satisfied in the remaining time-slots. Inequality (9) verifies the feasibility of the upper temporal demands given that V j is activated in the next time-slot. Remark 1. If t = s, then Equations (8)-(10) are equivalent to the temporal fairness constraints in Definition 2. In order to reduce the computational complexity of the ATBS, the feasible virtual user set may be derived iteratively as in Line 4 of Algorithm 1. This is stated in the next proposition. Proposition 4. The feasible virtual user set can be derived iteratively since V t+1 V t, t [s 1]. Proof. We prove the proposition for inequality (8). The proof for the other two inequalities follows by the same arguments. Assume that inequality (8) is violated at time t 1: ( s t + 1 > max swi (t 2)A Q i [n] i,t 2 1(u i V j ) ) We show that the inequality is also violated at time t regardless of the value of Q AT BS,t : ( s t + 1 1 < max swi ((t 2)A Q i [n] i,t 2 + 1) 1(u i V j ) ) max i [n] This completes the proof. ( swi ((t 1)A Q i,t 1 ) 1(u i V j ) ).

14 Algorithm 1 Augmented Threshold based Strategy (ATBS) 1: V 0 = V 2: for t = 1 to s with step-size 1 do 3: V t = φ 4: for j : V j V t 1 do 5: if Equations (8), (9), and (10) are satisfied then 6: V t = V t {V j } 7: end if 8: end for 9: Q AT BS,t ( R m t ) = argmax V j V t S ( V j, R t, j ) 10: end for Next we argue that ATBSs satisfy the short-term temporal constraints. We make use of the following propositions to prove this claim. Proposition 5. For the setup (n, N max, w n, w n, f R m) and a feasible window-length s, let Q be a strategy satisfying the short term fairness constraints. Then, Q t (R m t ) V 1, t [s]. Proof. We prove the proposition by contradiction. Assume that Q t (R m t ) V 1. Then at least one of the Equations (8)-(10) is violated. We continue the proof based on the assumption that Equation (8) is violated. The proof when the other cases follows by similar arguments. Assume that i [n] : s 1 < sw i 1 {ui V j }, where V j = Q t (R m t ). Then, the temporal share of user i is less than 1 s sw i even if it is activated in all other time-slots since 1 s ( sw i 1) < w i. This contradicts the assumption that the scheduler satisfies the lower temporal demands for user i.

15 Proposition 6. For the scheduling setup (n, N max, w n, w n, f R m) assume that the window-length s is feasible. Then, Q AT BS,t (R m t ) = V j s t S(w n, w n, V t+1 ) where w i = ( sw i (t 1)A Q i,t 1 1 + {u i V j }), i [n], w i = sw i (t 1)A Q i,t 1 1 {u i V j }, i [n]. Proof. Note that by definition w i w i. If Q AT BS,t (R m t ) = V j, then V j V t. So, s t max i [n] (w i ), w i 0, i [n], (s t)n max i [n] w i, t [s 1]. Consequently, s t S(w n, w n, N max ). So, there exists an ordered round robin strategy Q ORR satisfying the short term fairness constraints (w n, w n ) with window-length s t. By Proposition 5, we have {Q ORR,t t [s t]} V t+1. Consequently, s t S(w n, w n, V t+1 ). The following theorem shows that ATBSs satisfy the short term fairness constraints for any feasible window-length s. Theorem 3. For the scheduling setup (n, N max, w n, w n, f R m) assume that the window-length s is feasible. Then, the class of ATBSs described in Definition 7 satisfy the short-term temporal demand constraints. Outline of proof. From Remark 1, in order for the ATBS to satisfy the short-term temporal constraints, we must have P(V s φ) = 1. Note that by the feasibility assumption, we must have V 1 φ. So, Q AT BS,1 is well-defined. Then, by Proposition 6, we must have V 2 φ. Similarly, by induction, we must have V s φ. In [7], it was shown that TBSs achieve optimal average system utility under long-term temporal fairness constraints. The following theorem builds upon this to show that ATBSs

16 achieve optimal average system utility as the window-length is increased asymptotically and to provide rates of convergence to the optimal long-term utility. Theorem 4. For the scheduling setup (n, N max, w n, w n, f R m) let λ n be the threshold vector which achieves optimal performance under long-term fairness constraints 2. Then, 1 m 4sɛ lim U AT BS (s, λ n ) Us lim 1, 2 s U T BS s U T BS where U T BS is the optimal expected utility under long-term fairness constraints and w n is the corresponding temporal demand vector, U AT BS (s, λ n ) is the expected utility due to Q AT BS (s, λ n ), ɛ = min(ɛ 1, ɛ 2 ), ɛ 1 = min i [n] (w i w i, w i w i ), ɛ 2 = N max i [n] w i. Proof. Let M t, t [s] be the index of the virtual user which is selected by the ATBS strategy at time t. Let A be the stopping time for which V A 1 = V V A. As mentioned in [5], the sequence M A consists of independently and identically distributed components with Pr(M t = j) = a j, j [m], t [A], where a m = Θ(w n ), and Θ( ) is defined in Definition 4. For a given natural number s A, we define the ɛ-typical set of sequences as: Aɛ s (M) = Ms 1 s 1 {M j = j} a j ɛ, j [m]. i [s ] From [14], we have Pr(Aɛ s (M)) 1 m. Note that if ɛ is taken as in the theorem statement, 4s ɛ 2 and if M s Aɛ(M), s then V s = V. On the other hand, from Wald s identity [15] we have Us U AT BS (s, λ n 1 s m ) = E R j,k 1 s { } Q AT BS,k (R m k )=V j (11) k=1 j=1 1 A m E R j,k 1 s { } Q AT BS,k (R m k )=V j = 1 m s E(A)E R j,1 1 { } Q T BS,1 (R m )=V j = 1 s E(A)U, k=1 j=1 where we have used the fact that U = U T BS when λ n is used as the threshold vector. Consequently, j=1 U s 1 s E(A)U Pr(A = s)u (1 m 4sɛ 2 )U. 2 The existence of λ n is shown in [7].

17 Fig. 1. System utility as a function of window-length s for the optimal threshold based strategy (TBS) and proposed augmented threshold based strategy (ATBS) using the same thresholds as the optimal TBS. VI. Simulation Results In this section, we provide simulations of practical scenarios to validate the results presented in the previous sections and evaluate the performance short-term fair scheduling strategy proposed in Section V. We consider the downlink of a single-cell wireless system consisting of a BS and five users distributed uniformly at random in a ring around the BS with inner and outer radii of 20 m and 100 m, respectively. We consider a practical propagation channel model including path loss, shadowing, and Rayleigh fading as well as a truncated Shannon rate model provided in Table I of [7]. The performance value of the virtual users are calculated as in [7] where the users perform successive interference cancellation to decode their signals and achieve maximum symmetric BC sum-rate. We assume that at most two users can be activated at each time-slot, i.e. N max = 2, and w i = 0.2, w i = 1, i [5], i.e., each user is active for at least one-fifth of the time-slots. Furthermore, we consider fairness window-lengths s {10, 10 2, 10 3, 10 4, 10 5 }. From Theorem 1, it can be shown that these window-lengths are feasible.

18 Figure 1 shows the average system utility as a function of fairness window-length s. From [7], it is known that optimal system utility under long-term temporal constraints is achieved by TBSs. By Corollary 1, the optimal utility U provides an upper-bound for the utility of ATBS. We observe that the utility of ATBS, using the same thresholds as the optimal TBS, approaches to the optimal utility as window-length increases, confirming Theorem 4. Furthermore, we can see that the gap between the utility of ATBS and optimal utility is small even for relatively small window-length such as s = 100. Figure 1 also plots the simulated value of the lower-bound provided in the right hand side of Equation (11). VII. Conclusion We have investigated multi-user scheduling under short-term temporal fairness constraints. We have characterized the set of feasible window lengths as a function of system parameters, and we have shown that the optimal system utility is non-monotonic and super-additive in windowlength. We have proposed a scheduling strategy which satisfies short-term fairness constraints for arbitrary feasible window-lengths. The utility due to the proposed strategy approaches longterm optimal utility as the window-length is increased asymptotically. Numerical simulations are provided in various practical scenarios to verify the theoretical results. An avenue of future research is to consider scheduling for multi-cell wireless networks under short-term and longterm fairness constraints. References [1] A. Asadi and V. Mancuso, A survey on opportunistic scheduling in wireless communications, IEEE Communications Surveys & Tutorials, vol. 15, no. 4, pp. 1671 1688, 2013. [2] T. Issariyakul and E. Hossain, Throughput and temporal fairness optimization in a multi-rate TDMA wireless network, in Communications, 2004 IEEE International Conference on, vol. 7. IEEE, 2004, pp. 4118 4122. [3] S. S. Kulkarni and C. Rosenberg, Opportunistic scheduling for wireless systems with multiple interfaces and multiple constraints, in Proc. ACM Intl. Workshop on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2003.

19 [4], Opportunistic scheduling policies for wireless systems with short term fairness constraints, in Global Telecommunications Conference, 2003. GLOBECOM 03. IEEE, vol. 1, Dec 2003, pp. 533 537 Vol.1. [5] X. Liu, E. K. P. Chong, and N. B. Shroff, Opportunistic transmission scheduling with resource-sharing constraints in wireless networks, IEEE J. Sel. Areas Commun., vol. 19, no. 10, pp. 2053 2064, 2001. [6] S. Lu, V. Bharghavan, and R. Srikant, Fair scheduling in wireless packet networks, IEEE/ACM Transactions on networking, vol. 7, no. 4, pp. 473 489, 1999. [7] S. Shahsavari, F. Shirani, and E. Erkip, A general framework for temporal fair user scheduling in NOMA systems, available on arxiv.org. [8] R. Ahlswede, Multi-way communication channels, in Second International Symposium on Information Theory: Tsahkadsor, Armenia, USSR, Sept. 2-8, 1971, 1973. [9] W. Yu and J. M. Cioffi, Sum capacity of Gaussian vector broadcast channels, IEEE Transactions on Information Theory, vol. 50, no. 9, pp. 1875 1892, 2004. [10] X. Liu, E. K. P. Chong, and N. B. Shroff, Transmission scheduling for efficient wireless utilization, in Proc. IEEE Intl. Conf. on Computer Communications, vol. 2, 2001, pp. 776 785 vol.2. [11] S. Shahsavari and N. Akar, A two-level temporal fair scheduler for multi-cell wireless networks, IEEE Wireless Commun. Letters, vol. 4, no. 3, pp. 269 272, 2015. [12] S. Shahsavari, N. Akar, and B. H. Khalaj, Joint cell muting and user scheduling in multicell networks with temporal fairness, Wireless Communications and Mobile Computing, vol. 2018, 2018. [13] S. Shahsavari, F. Shirani, and E. Erkip, Opportunistic temporal fair scheduling for non-orthogonal multiple access, available on arxiv.org. [14] I. Csiszar and J. Körner, Information theory: coding theorems for discrete memoryless systems. Cambridge University Press, 2011. [15] J. Janssen and R. Manca, Applied Semi-Markov Processes. Springer Science & Business Media, 2006.