User association strategies in HetNets leading to rate balancing under energy constraints
Abstract
This paper deals with the development of several strategies for associating users to base stations (BSs) in heterogeneous networks. These strategies are able to balance the rate among users and BSs and increase the overall network utility. Constraints related to the energy availability at BSs are considered explicitly in the design, assuming that the BSs are equipped with batteries that are recharged through energy harvesting. We develop a general association strategy, and then we present several suboptimum but less complex solutions suitable for scenarios with high mobility or deployments of BSs with low computational capabilities. We also present an implementation that is to be executed in a distributed way among users and BSs without the need of having a central entity gathering all the information. The performance of the proposed strategies is evaluated through simulations in terms of rate balancing and the effect of the energy harvesting capabilities on the network throughput is shown. We also compare the proposed strategies with the traditional maxSINR user association approach.
Keywords
User association strategies Heterogeneous networks Energy harvesting Rate balancingAbbreviations
 BS
Base station
 CDF
Cumulative distribution function
 CDMA
Code division multiple access
 CSI Channel state information; DL
Downlink
 DP
Dynamic programming
 FVTD
Firstvoice thendata
 HetNet
Heterogeneous network
 LTE
Longterm evolution
 OFDMA
Orthogonal frequencydivision multiple access
Probability density function
 PF
Proportionally fair
 SINR
Signal to interference plus noise ratio
 SISO
Singleinput singleoutput
 WCDMA
Wideband code division multiple access
1 Introduction
Traffic demands are currently increasing extremely fast [2, 3], which implies that technical solutions have to be provided to face this fact. Among these solutions, multitier Heterogeneous Networks (HetNets) [4] are being considered as a way to increase the system capacity and coverage. The main concept behind HetNets is the joint deployment of small base stations (BSs) of different sizes (e.g., picocells, femtocells, etc.) with already existing macro BSs. The main difference among these BSs relies on characteristics such as the transmit power, physical size, size of coverage areas, and cost, among others. HetNets enable a more flexible, easy to install, and economical deployment as new infrastructure can be deployed when and where necessary, thus, reducing the deployment cost.
In this paper, we are targeting scenarios where energy harvesting (based, for example, on solar panels) is the only power source at the BSs. An example is a rural deployment in developing countries, where access to the electric power grid is too expensive or impossible. In such locations, some main challenges arise: cost of BSs, cost of solar panels and batteries, cost of terminals, and business models adapted to people with low incomes. The solution adopted in some real deployments consists of an access network based on 3G BSs empowered by solar panels of limited size in outdoor scenarios [5]. 3G is usually the only viable technology to be deployed thanks to the low costs of the equipment and the terminals.
In these scenarios where small cells and macro BSs have often overlapping coverage regions, users will have several possible BSs to connect with. This implies that user association strategies need to be developed. Classical solutions adopted by the 3GPP standard based on maximizing the received signal to interference plus noise ratio (SINR) may lead to situations where the macro BS will be heavily loaded whereas small cells will provide service only to a few users. This will imply that a load imbalance will happen, which in turn may produce a heavy reduction of the overall network throughput. This motivates the need for the development of dynamic user association strategies that offload traffic from the macro BSs to the small cells in order to obtain a more fairly balanced rate among users and load among all BSs.
Another aspect to be taken into account is the fact that the BSs have batteries with limited capacity that can only be recharged through energy harvesting. This should be taken into account explicitly in the design of the user association strategies; otherwise, the batteries of the BSs providing larger data rates would get empty very fast.
Although the problem of user association under the objective of balancing the load in the network has been studied so far, most works have addressed only the case of networks composed of macro BSs (see examples [6, 7, 8, 9]). The generalization to the case of HetNets has been considered only recently, such as in [10]. In this paper, some simple heuristic user association techniques for longterm evolution (LTE) setups are proposed taking into account the interference among cells. Another strategy for user association based on the dual coordinate descent method is derived in [11] in order to balance the network load by adopting a design criterion driven by the network utilization and proportional fairness. One of the drawbacks of this proposed solution is that the transmit powers of the BSs are considered fixed and not optimized. The optimization of the longterm data rate for user association is addressed in [12]. Unlike the previous papers, there are only a few works that present joint resource allocation and mechanisms for BS assignment. One of them is [13], where the authors consider the joint resource allocation and cell selection in code division multiple access (CDMA) networks. In this paper, a pricingbased distributed algorithm is developed taking into account the congestion of the BSs in addition to the channel states of the mobile terminals. The case of orthogonal frequencydivision multiple access (OFDMA) networks is considered in [14], where the joint BS selection and the resource allocation is analyzed. The main drawback of the previous proposals is that the proposed user association techniques are run at the same time scale as the scheduling, whereas in practice this is not realistic since the mobility of the users is slower than the changes of the wireless channels.
Regarding user association strategies with BSs powered by energy harvesting sources, only a few works are available in the literature. In [15], authors propose a user association problem where the average traffic delay is modeled using queuing theory and optimized. In [16], authors propose a strategy that aims to maximize the number of accepted users and minimize the radio resource consumption where the available energy of BSs is dependent on the harvested energy in a certain period of time. A lexicographic minimization of ongrid energy consumption is proposed in [17], which involves the optimization in both the space and time dimensions, due to the temporal and spatial dynamics of mobile traffic and green energy generation. Finally, the authors in [18] propose a user association based on the concept of topology potential which takes the traffic load of users and the available renewable energy of base stations into consideration for energyload tradeoffs.
In this paper, we generalize our previous conference version [1] by, first of all, presenting a generalized formulation of the user association problem taking into account the temporal evolution of the scenario. Then, based on a previous strategy by ourselves (summarized and extended in Section 4.1.1) we derive several new user association algorithms that perform load balancing (based on user connections to BSs) among the different network tiers and that consider explicitly the battery status of the BSs as well as the energy that is being harvested. We also consider that the coverage areas depend explicitly on the available energies at the batteries. We propose a general centralized approach as well as several new suboptimum ones featuring reduced complexity solutions. We also design a new distributed strategy that is to be executed at each individual. As it will be discussed in the corresponding section, the decision to apply either the centralized or the distributed approach depends on several aspects, characterstics, and requirements of the concrete scenario at hand since each approach has its own pros and cons. Finally, we also study the asymptotic behavior of the evolution of the batteries.
The organization of the paper is as follows. Section 2 introduces the description of the system model and the assumptions considered. Then, in Section 3 we introduce the formulation of the most general user association scenario. Later in Section 4, we introduce some simplification and develop the proposed centralized and distributed user association techniques. Some results concerning the asymptotic behavior of the batteries are derived in Section 5. Simulation results are presented in Section 6, and finally, conclusions are drawn in Section 7.
2 System model
2.1 System description
Let us consider a Downlink (DL) cellular multitier SingleInput SingleOutput (SISO) system composed of several BSs. Each of these BSs belongs to a particular BS class, each having different capabilities (transmission power, battery size, etc.), where each class is categorized as a tier. Each BS is indexed by i and the set of all BSs is denoted as \(\mathcal {B}\). We consider that there are two types of users: users that demand a fixed service rate and users that request a flexible service rate. This could correspond to a cellular system comprised of voice users^{1}, that demand a fixed service rate, and data users, who are usually provided with a dynamic flexible rate depending on the system load and the channel conditions. Let us denote the set of voice users as \(\mathcal {U}_{V}\) and the set of data users as \(\mathcal {U}_{D}\). \(\mathcal {U}_{V}^{(i)}\) and \(\mathcal {U}_{D}^{(i)}\) represent the set of voice and data users that are associated to BS i, respectively. The set that contains all users in the system is denoted as \(\mathcal {U}_{T} = \mathcal {U}_{V} \cup \mathcal {U}_{D}\) and the set of all users connected to BS i as \(\mathcal {U}_{T}^{(i)} = \mathcal {U}_{V}^{(i)} \cup \mathcal {U}_{D}^{(i)}\).
We assume a wide band code division multiple access (WCDMA) network [13, 19], which implies that users are multiplexed using codes. As we mentioned in the introduction, energy harvesting HetNets are usually applied in low cost rural scenarios, where network operators can only deploy 3Gbased systems in order to have a successful business. However, the methodology presented in this paper could be easily extended to consider 4G systems by just considering the specific ratepower function and multiplexing users with carriers instead of codes. In any case, we assume that the network operator has already reserved a set of codes for the voice users and the remaining codes are to be allocated among the data users. Thus, the amount of available codes in each set is known and fixed at each BS, a strategy followed by network operators [20].
Each BS is solely powered with its own harvesting source and battery. The energy harvesting sources allow the BSs to collect energy from the environment and recharge the batteries. We consider that, at a given moment of time, only information of the past and current harvesting and battery dynamics of the BSs will be available to perform the user association, yielding to an online approach.
Let us denote the time instants (epochs) between association periods by index τ∈Υ and the duration of these epochs as T _{e}. Let us also denote the scheduling periods by \(t\in \mathcal {T}\) with a duration of T _{ f }. In general, the user association procedure should be executed in a time scale longer than the scheduling periods. This makes the association problem very challenging since the decision has to be taken considering, amongst others, the current channel state information (CSI), but the channel may vary during the whole association period. As a consequence, the association decision should be implemented considering the expected throughput (over the channel realizations) within the duration of the association period.
2.2 Power consumption model and battery dynamics
The power consumption at any BS is modeled as the addition of the radiated power, which is divided into the power devoted to the common DL channels, \(P^{i}_{\text {CPICH}}\), the power consumed by the userspecific physical channels, \(P^{i}_{\text {BS}}(t)\), and a fixed power consumed by the electronics and cooling, \(P^{i}_{c}\). Let \(P^{i}_{\text {RAD}}(t) = P^{i}_{\text {BS}}(t) + P^{i}_{\text {CPICH}}\) be the overall radiated power by the ith BS.
where H _{ i }(t) is the energy harvested in Joules during the whole scheduling period t, \((x)^{b}_{a}\) is the projection of x onto the interval [a,b], i.e., \((x)^{b}_{a} = \min \{\max \{a,x\},b\}\), which accounts for possible battery overflows and assures that the battery levels are nonnegative, and \(C^{i}_{\max }\) is the battery capacity. Notice that the whole harvest collected during period t is assumed to be available in the battery at the end of the epoch for simplicity.
2.3 Energy harvesting model
In this paper we assume a discretized model for the energy arrivals as also did in [21, 22, 23]. In the formulation and algorithms proposed for the user association in Sections 3 and 4, we assume no concrete model for the energy arrivals. However, in Section 5, devoted to the analysis of the asymptotic behavior of the batteries and in the simulations (Section 6), we will assume that H _{ i }(t) follows an ergodic Bernoulli process. As a result, only two values of harvested energy are possible, i.e., H _{ i }(t)∈{0,e _{ i }}, where e _{ i } is the amount of Joules contained in an energy packet. The probability of receiving an energy harvesting packet during one epoch depends on the actual harvesting intensity (in the case of solar energy, it depends on the particular hour of the day) and is denoted by p _{ i }(t). Note that a higher value of p _{ i }(t) will be obtained in epochs where the harvesting intensity is higher, e.g., during the day, and a lower value of p _{ i }(t) during the night or during cloudy days. Note that, in some cases, it is possible to predict or estimate partially the expected energy available to be harvested. This situation can be included in our formulation by adjusting our model parameters by knowing that \(\mathbb {E}[H_{i}(t)] = p_{i}(t)\cdot e_{i}\). As a result, the majority of harvesting sources can be modeled with the previous stochastic model. Nevertheless, that analysis and also the simulations results could be extended to other statistics for the energy arrivals.
2.4 System assumptions
where M _{ D } is the spreading factor for data codes, \(\tilde {\textbf {p}} \triangleq \{\tilde {p}_{ji}\,\, j\in \mathcal {U}_{D}, i\in \mathcal {B}\}\) and \(\tilde {\textbf {n}}\triangleq \{\tilde {n}_{ji}\,\, j\in \mathcal {U}_{D}, i\in \mathcal {B}\}\) are the power and code allocation variables (random variables), and where we have assumed that the same power is allocated to all the codes of the same user. The code allocation variable \(\tilde {n}_{ji}(t)\) refers to the number of codes that the jth BS assigns to the ith user. Note that the instantaneous allocated powers and codes depend upon the concrete scheduling policy and, generally, they do not only depend on the instantaneous channels, but also on other factors. That is why we model \(\tilde {\textbf {p}}\) and \(\tilde {\textbf {n}}\) as random variables, and average w.r.t. them have to be applied in (8).
We use the power and code variables to measure the load that a given BS is experiencing so that a well loadbalanced network can be obtained by a proper user association strategy.
3 General user association formulation
In systems where variables with temporal evolution affect the longterm system performance (such as, for example, the energy available in the battery that constrains the amount of power that can be allocated among the users), it is important to take decisions considering not only the current impact on the overall system performance, but also taking into account the future impact. It is evident that if we spend much power in the current epoch and the conditions of the wireless channels are poor, we may be missing the opportunity to use better this energy in the near future when the channel conditions improve. In this sense, the user association procedure should be coupled in time, and associations that are being carried out at present time should consider the past knowledge as well as the future impact. For example, if a given BS is harvesting a lot of energy, this BS should accept more users as more energy will be available in the future. If, on the other hand, the energy is decaying fast, then an intelligent strategy would be to allocate such users to the neighboring BSs gracefully (an aggressive strategy would not be smart either since if there was a massive reallocation of users, the neighboring BSs would need a lot of energy to satisfy the users demands).
Another point to consider is the fact that the association strategy should run in real time. This implies that the association strategy must be implemented considering only current information of the channels, the batteries, and the harvesting being collected. Contrary, offline solutions that require future knowledge, i.e., noncausal knowledge of the channel, the batteries, the harvesting, etc., have been proposed extensively in situations where network nodes are provided with energy harvesting sources [22, 24]. However, the assumption of knowing when the energy will be available in future instant times is usually hard to accept. Therefore, in this paper we focus only on online approaches that are more suitable for a realistic implementation.
4 Proposed greedybased user association strategies
 The expected rate expression given in (8) is very difficult to compute as it depends on the probability density function (PDF) of the powers, the codes, and the channels. Instead, an approximation of the average rate is considered in this paper following the same criteria used in papers like [12, 27, 28]. In this approximation, we consider average channels instead of instantaneous ones so that the channels now change from epoch to epoch, i.e., \(h_{ji}(\tau) = \mathbb {E}_{\textbf {h}}[\tilde {h}_{ji}(t)]\), which includes shadowing, path loss, and antenna gain. Now, all the variables change at the time scale given by τ and the expectations w.r.t. the powers and the codes are also removed since these new variables, \(p_{ji}(\tau), \,\check {p}_{ji}(\tau)\), and n _{ ji }(τ), can be interpreted as average allocation variables, i.e., estimates of the average values of the instantaneous powers and codes allocated by the scheduler during one epoch. By carrying out this can be approximated as (again in b/s/Hz)$$ {\begin{aligned} &\bar{R}_{ji}(\tau)\\ &= n_{ji}(\tau) \log_{2} \left(1 + \frac{M_{D}p_{ji}(\tau)}{n_{ji}(\tau)\left(\theta \left(P^{i}_{\text{RAD}}(\tau)  p_{ji}(\tau)\right) + A_{ji}(\tau)\right)}\right). \end{aligned}} $$(10)
Since all variables now depend on τ, there are no more shortterm variables dependent on t and, hence, there is no need to compute the user scheduling together with user association as the output of the optimization problem.
Note that all other variables depending on the powers, such as A _{ ji }(τ), will be considered dependent on the average channels h _{ ji }(τ). However, the battery evolution will be updated with the “true” radiated powers that are the outcome of the scheduler running at time scale t. In any case, we will use the notation dependent on τ, which means that C _{ i }(τ) is the battery level at the beginning of epoch τ once all powers allocated by the scheduler have been incorporated. Additionally, in order to guarantee that constraints in (5) are still fulfilled (with a certain outage probability since they cannot be strictly fulfilled for all possible channel realizations), we could increase the threshold γ _{CPICH} to make the constraints more restrictive.

The most important simplification is described next. We are transforming the DP problem (3) into a standard optimization problem. Regarding constraint C1, we will not consider the summation term over all time instants. Then, instead of having constraint C6 that couples the battery evolution and, hence, couples all allocation variables, our online user association strategy is executed at each epoch independently by allowing each BS to spend just a given fraction of the energy available at the battery during that particular epoch. The amount of energy to be spent at each epoch can be further optimized offline (see [29]). This can be seen as a greedy policy, where at each epoch we execute the association strategy with just past and current information of the battery levels, channel states, etc.
In general, the total energy consumed by a given BS during one epoch, i.e., E _{ i }(τ), is limited by a function of the current battery level as$$ T_{\mathrm{e}} \cdot \left(P^{i}_{\text{CPICH}} + P^{i}_{\text{BS}}(\tau) + P^{i}_{\mathrm{c}}\right) \le g_{i}(C_{i}(\tau)), \quad \forall i, \tau, $$(11)where the function g _{ i }(·) is defined as \(g_{i}(C_{i}(\tau)) \triangleq \min \left \{T_{\mathrm {e}}\cdot \big ((P^{i}_{\text {CPICH}} + P^{\max }_{\text {BS}_{i}} + P^{i}_{\mathrm {c}}\big), \alpha _{i} C_{i}(\tau)\right \}\), where 0≤α _{ i }≤1. Note that α _{ i } controls the fraction of energy that is allowed to be used in a given epoch.

For simplicity in the notation, in the expression in (10), we will approximate \(\theta \left (P^{i}_{\text {RAD}}(\tau) p_{ji}(\tau)\right) + A_{ji}(\tau)\) by \(\theta P^{i}_{\text {RAD}}(\tau) + A_{ji}(\tau)\) throughout the paper^{2}. Notice that now \(\bar {R}_{ji}(\tau)\) is jointly concave in n _{ ji }(τ) and p _{ ji }(τ) and \(\bar {R}_{ji}(\tau) = 0\) if n _{ ji }(τ)=0, for any p _{ ji }(τ)≥0.

Note that the power variables affect both the coverage (see (5)) and the data rates. However, it is extremely difficult to deal with both effects jointly. For this reason, we assume a worstcase approach when defining the coverage areas assuming that the interference is maximum^{3}. The worstcase coverage sets are, therefore, defined as \(\mathcal {S}_{j}(\tau) = \left \{i\in \mathcal {B} \,\,\middle \,\, \frac {P^{i}_{\text {CPICH}}}{\bar {P}^{i}_{\text {BS}}(C_{i}(\tau)) + \bar {A}_{ji}(\tau)} \ge \gamma _{\text {CPICH}}\right \}\), where \(\bar {A}_{ji}(\tau) = \frac {\sigma _{j}^{2} + \sum _{m\in \mathcal {B}, m\neq i}h_{jm}(\tau)(\bar {P}^{m}_{\text {BS}}\left (C_{m}(\tau)) + P^{m}_{\text {CPICH}}\right)}{h_{ji}(\tau)}\). With this, the coverage areas only depend on the current battery and channel state.

Due to the integrity of the variables x _{ ji }(τ), it is a combinatorial problem, whose computational burden grows as \(\mathcal {O}(\mathcal {B}^{\mathcal {U}_{T}})\). A typical approach to follow in this situation is to relax the association variables so that x _{ ji }(τ)∈[0,1], ∀i,j [12]. Notice that this relaxation will result in another optimization problem with a different optimum objective value as the constraint set has been expanded. If the optimum solution of the relaxed problem is integer, this corresponds to the optimum solution of the original problem. Otherwise, we can, for example, round the relaxed association variables so that x _{ ji }(τ)∈{0,1}.
Now, we present the different user association techniques developed assuming the previous simplifications.
4.1 General epochbyepoch user association formulation
In the previous optimization problem, \(\bar {P}^{i}_{\text {BS}}(C_{i}(\tau))\triangleq \big (g_{i}(C_{i}(\tau))/T_{\mathrm {e}}  \big ((P^{i}_{\text {CPICH}} + P^{i}_{c} \big)\big)^{\infty }_{0}\) is the maximum power that the BS can use for traffic and pilot channels taking into account that the overall radiated power is limited and also the current battery level. Note that, even though at a particular epoch just the current battery is present in the formulation, the past harvesting and battery spendings also affect the current performance of the epoch as they appear in C _{ i }(τ) through (2) (even though in (2) we used the time dependence t). Note that constraint C6 assures that if \(x^{\star }_{ji} = 0\), then \(n^{\star }_{ji}=0\) and the rate \(R^{\star }_{ji} = 0\). In this case, the allocated power will also be zero, \(p^{\star }_{ji}=0\), as it does not improve the objective function but wastes power if \(p^{\star }_{ji}>0\). Note that, at the optimum, C4 is attained with equality. Otherwise, if C4 is not fulfilled with equality, we could rescale all the powers with a common positive factor higher than 1 until C4 is fulfilled with equality. This would increase the objective function and all the other constraints would still be fulfilled. Then, \(P^{i\star }_{\text {RAD}}(\tau) = \bar {P}^{i}_{\text {BS}}(C_{i}(\tau)) + P^{i}_{\text {CPICH}}\) and we can eliminate constraint C5 in problem (12).
Note that problem (12) is a convex optimization problem that can be solved using standard numerical algorithms [30]. However, less complex algorithms can be derived by making use of the analytical structure of the problem. According to this, we propose in the following a more efficient algorithm based on the dual problem and the subgradient method.
4.1.1 Primaldual solution
In this subsection, we develop the association algorithm based on the dual problem of (12). The optimal solution will be presented first as a function of the Lagrange multipliers (or dual variables). A gradienttype scheme will later be developed for computing the optimum multipliers. Let \(\boldsymbol {\nu } = \{\nu _{j}, \,j\in \mathcal {U}_{V}\}\), \(\boldsymbol {\beta } = \{\beta _{j}, \,j\in \mathcal {U}_{T}\}\), \(\boldsymbol \mu = \{\mu _{i}, \,i\in \mathcal {B}\}\), \(\boldsymbol \lambda = \{\lambda _{i}, \,i\in \mathcal {B}\}\), \(\boldsymbol \pi = \{\pi _{ji}, \,j\in \mathcal {U}_{D},i\in \mathcal {B}\}\), and \(\boldsymbol {\xi } = \{\xi _{ji}, \,j\in \mathcal {U}_{V},i\in \mathcal {B}\}\) denote the vectors of dual variables associated to constraints C1,…,C4, C6, and C7 in problem (12). We collect all the Lagrange multipliers in Ψ={ν, β, μ, λ, π, ξ}.
where the projection guarantees that the codes satisfy the nonnegative constraints C6 and the definition by parts of the function of the codes is due to constraint C8. Notice that the bisection method can also be used in this case to compute the optimum code allocation, n _{ k ℓ }.
At this point, we have the expressions of the optimum primal variables, either in closedform in (13) and (14) or iteratively in (16) and (18), for given dual variables. If the dual variables were optimum, then the expressions for the primal variables would yield the optimum values. The optimum Lagrange multipliers can be obtained from the dual problem by maximizing the dual function in (not presented for brevity) [30]. As the dual function is concave and generally not differentiable, we can apply any subgradienttype algorithm to find the optimum solution. A valid supergradient for each particular dual variable is given by the constraint it is associated with [31]. The update equations of the dual variables are not presented due to space constraints.
Once we know the optimal dual variables Ψ ^{⋆}, we can obtain the optimum associations x ^{⋆}(Ψ ^{⋆}). The last step requires the quantization or rounding of such variables since the solution of (12) will provide, in general, a value of \(x^{\star }_{ji} \in [0,1]\), but, for the actual implementation of the user association, we require \(x^{\star }_{ji} \in \{0,1\}\) with \(\sum _{i\in \mathcal {B}} x^{\star }_{ji} = 1, \,\forall j\).
If multiple maximums exist simultaneously in (19), we propose to select just one randomly.
4.2 Suboptimum user association strategies: low complexity solutions
In this section, we develop some strategies with lower complexity than the solution presented in the previous section. The goal is to provide algorithms with a reduced computational burden that could be of interest in scenarios where there is high mobility and the association procedure has to be executed more frequently.
4.2.1 Association of voice and data users separately
The first approach to consider is to split the two sets of users, namely the sets of voice and data users, and solve the association procedure for each group separately, first the voice users and then the data users. This is a good approach if the users are more or less spread out throughout the network. The assumption would not be valid if most of the data users are concentrated around just one BS and the voice users are connected to that BS, even though they could be connected to the neighboring BSs due to their overlapping coverage areas. In any case, if the number of voice users is relatively low compared to the number of data users, such approximation is reasonably fair.
4.2.1.1 Voice users association
The association is feasible if \(P^{(i)}_{V}(\tau) \triangleq \sum _{j\in \mathcal {U}_{V}}\check {p}^{\star }_{ji}(\tau) \le \bar {P}^{i}_{\text {BS}}(C_{i}(\tau))\), \(\forall i \in \mathcal {B}\), otherwise there is not enough energy at the batteries to fulfill all the minimum SINR constraints. In such case, a few users should be dropped from the system or their target SINR, γ _{ j }, should be reduced.
4.2.1.2 Data users association
Notice the similarities of the previous optimization problem w.r.t. (12). We have eliminated the constraints involving the voice users. Strong duality also holds for this problem and, therefore, it can be solved using the primaldual approach presented in the previous section. The details of the procedure employed to solve this problem will not be presented in the paper. This association strategy will be referred as firstvoice thendata (FVTD).
4.2.2 Fixed resources per data user
We can go one step further and reduce the complexity of the previous algorithm by considering that the number of codes or the power assigned to data users are fixed. In this case, similar to the approach from [12], only one variable (code or power) will be used as a load metric of the BS. There is a slight conceptual difference between these two approaches (fixed codes and fixed power) when compared to the previous approach or the general approach in (12). In the two previous cases, the association strategy did not force to assign resources to all users, i.e., some data users could be assigned to a particular BS but the average rate they are assigned could be zero. However, as in this case a given user is already assigned a portion of the total power or a certain number of codes, the associated rate will be greater than zero, i.e., the BS will spend resources as long as such user is associated to it.
4.2.2.1 Fixed power allocation per data user
We will not present the details of the solution of this problem for the sake of space as we have already presented the methodology for the previous two association problems. We will just evaluate the performance of the strategy in the simulations section.
4.2.2.2 Fixed code allocation per data user
Also in this case, we will not present the details of the solution of the problem as we have already presented the methodology for the previous two association problems. We will just evaluate the performance of the strategy in the numerical sections.
4.3 Distributed algorithm

All link connections among the BSs and the central entity are required to operate in the centralized approach. If one link fails, it is not possible to solve the optimization problem. The distributed algorithms are usually more robust in this sense since they require only connections with neighbor BSs and if one link does not work the rest of the network can still compute the user association.

Usually, the information sharing in the distributed approach is only required among neighbor nodes, which are physically close. Hence, there is no need to deploy long backhaul connections from all BSs to the central entity. However, in the particular solution that we will present, backhaul connections are not needed since BSs do not need to exchange any message among them.

The computational load required at each individual element to solve the distributed approach is lower than its centralized counterpart since fewer variables are considered.

For the aforementioned issues, the distributed solution is more scalable than the centralized one.
It is important to note that we decided to present first the centralized approach and then the distributed one. This is so since distributed solutions are derived from centralized optimization problems and, therefore, it is required to first mathematically model the centralized approach and then derive the distributed one. The distributed solution has some drawbacks as well. For example, it is known that distributed solutions require more iterations than the centralized ones to converge and more frequent message exchange among BSs and users [32], which means than the centralized approach is preferable to the distributed one when the convergence speed is important, that is, when the dynamics of the users are high and the network should adapt quickly. Also, if a centralized entity exists collecting all the needed information, then there is no reason to resort to a distributed approach since this would imply increasing the computational effort of the individual entities (both BSs and users in the distributed approach proposed in this section) unnecessarily. In other words, both the centralized and the distributed approaches have pros and cons, and the final decision on what approach to apply depends on the different aspects mentioned before and the concrete requirements and characteristics of the scenario at hand.
In this section, we propose a distributed algorithm of the general problem presented in (12) via Lagrange dual decomposition [32]. We can apply a dual decomposition to the original problem in (12) and solve it separately by users and BSs. This implies that only local information is required to solve the subproblems, i.e., users only need to know the available resources of the BSs they are able to connect to and the individual propagation channels with them.
Having introduced the motivation behind the distributed solution, we proceed now to explain the steps of the procedure. As the objective function of the problem cannot be decomposed for each BS, the users will be the ones carrying out the computation of the association. The role of the BSs will be to provide certain prices to the users as a function of the association demands. Because each user selects the preferred BS, the criterion to be employed for the voice users is the one explained in Section 4.2.1. As a consequence, the voice users and data users must select the BSs separately, first the voice users and then the data users.
Notice that the knowledge of the Lagrange multipliers μ(τ) and λ(τ) is required to solve the previous problem. Notice also that only local information is needed, which is represented by the set of available BSs for each particular user given by \(\mathcal {S}_{j}(\tau)\) for the jth user. The previous optimization problem is convex and can be solved using any standard procedure as the one explained in this document (primaldual iteration) in Section 4.1.1.
4.3.1 Complexity, exchange messages, and convergence
Then, the BSs broadcast the information of the updated values of the Lagrange multipliers to the users, and then users execute again the association procedure.
It is important to note that since the dual problem is convex, any subgradienttype algorithm yields asymptotically the optimum solution. Because Slater’s condition is satisfied, strong duality holds and the original problem (23) can be equivalently solved in a distributed fashion without coordination among the users or the BSs and the convergence is guaranteed.
4.3.2 Detailed steps of the distributed algorithm
The final distributed algorithm is shown in Algorithm 2. In the algorithm, δ ^{(q)} is the step size. The multipliers μ(τ) and λ(τ) work as messages between data users and BSs. They represent the price of the resources of the particular BS determined by the load situation. If, for example, the demand of code resources for a given BS i, \(\sum _{j} n_{ji}(\tau)\), is larger than the maximum number that the BS can offer, \(\sum _{j} n_{ji}(\tau) > n^{(i)}_{D}\) then, the price μ _{ i } increases, which means that the users will have to pay more to utilize its code resources making the users consider other BS options with lower prices that would improve its objective function (and, thus, its throughput). The same reasoning can be applied to the power. If a given BS is underutilized, then its corresponding prices will be low making it appealing for the users achieving a well loadbalanced network.
5 Asymptotic analysis of the battery evolution
In this section, we present the asymptotic behavior of the battery evolution of the system. This analysis will help us understand how the system works when the number of epochs grows up to infinity. Note that the performance of an energylimited network, such as the one considered in this paper, depends on the sizes of the batteries. According to this, the usefulness of the analysis in this section relies on the fact that we can study which is the energy that is asymptotically stored in the batteries. This could be taken as a basis for an initial calculation of the sizes of the batteries that will be needed to avoid overflowing, that is, as a basis study for the energydimensioning of the network so that all the energy that is harvested can be used effectively and not lost due to overflowing.
6 Simulations results
Figure 5b presents the CDF of the rates of the data users with α=0.1 and p=0.6 for the lowcomplexity approaches derived from (24) and (25), the distributed solution from (26), and the maxSINR. In this case, the distributed solution yields the same performance as the FVTD strategy (even though it is not shown in the figure). This is expected as both problems attempt to solve the same optimization problem. As we can see, even if we use the simple lowcomplexity solution fixing the power or the codes to be allocated, the performance obtained is quite close to the rest of the strategies proposed in this paper. All the strategies outperforms the maxSINR providing a better balanced network. The results obtained from (24) and (25) are similar to the results that would be obtained from the method in [12] as the measure of the load is only based on one variable, but now we also consider battery limitations and time evolution.
7 Conclusions
In this paper, we have proposed several user association strategies driven by DL metrics in a scenario composed of several BSs to achieve load balancing in terms of balanced network throughput for heterogeneous networks. In this scenario, the BSs were solely powered with finite batteries and energy harvesting sources that allowed them to recharge their batteries. An iterative solution based on a primaldual approach has been derived that considers explicitly the current and the past energy at the batteries. We have also proposed a distributed solution to be solved by each user and the BSs with just local information. Several lowcomplexity solutions aimed at high mobility scenarios have also been developed. We have compared the proposed strategies with the classical maxSINR approach and showed that improvement in terms of loadbalancing is possible if a proper balancing technique is designed and the information of the battery status is considered in the user association procedure.
8 Endnotes
^{1} From now on, we will assume that the users that request a fixed service rate are voice users, but this set could indeed contain any type of service requiring fixed service rates.
^{2} If the number of users is relatively high, then \(P^{i}_{\text {RAD}}(\tau) \gg p_{ji}(\tau)\), and the approximation is fair. In any case, the approximation provides a lower bound of the actual SINR value.
^{3} It is a worstcase solution as the BSs may not necessarily be transmitting at full power all the time.
^{4} The modelling of the user scheduling is out of the scope of this paper. In the simulations section of this paper, we comment on the type of user scheduling used to run the simulations.
^{5} The scenario considered has been taken similar to that taken as reference in our previous conference paper [1].
^{6} The CDFs are presented instead of the average values of the rates since this allows to evaluate the rates of all the users in the scenario. For example, the CDFs allow to evaluate which is the probability of a user of receiving a very low rate for the different strategies, which could not be done by resorting only to the average values.
^{7} The computational complexity shown in these figures has been measured in terms of the ’simulation time’ of each algorithm in relative terms with respect to the general solution ‘G’. These results have been obtained through simulations running each algorithm in the same server without any other process running simultaneously. The simulation time includes, thus, not only the complexity in terms of mathematical operations, but also the time required to manage the data, the memory, etc. Of course, if a different server or a different way of implementing the optimization procedures were used, the results could change slightly, although the main conclusions would remain the same. Note that an analytical study of the complexity is not possible, or at least extremely complicated, in this case since it should account for the number of iterations needed for convergence, the complexity of the numerical method used to solve the problems, the scenario, etc.
Notes
Funding
This work has been partially funded by the Spanish Ministry of Economy, Industry and Competitiveness through the projects 5G&B RUNNERUPC (TEC201677148C21R (AEI/FEDER, UE)), GRE3NLINKMAC (TEC201129006C0302), and the FPI grant BES2012052850; the European Commission in the framework of the FP7 Network of Excellence in Wireless COMmunications NEWCOM# (Grant agreement no. 318306) and the project TUCAN3G (Grant agreement no. ICT2011601102); and the Catalan Government (AGAUR) through the grant 2014 SGR 60.
Authors’ contributions
JR put forward the idea and wrote the manuscript. API, JdO, and JV took part in the discussion and they also guided, reviewed, and checked the writing. JR and JdO carried out experiments. All authors contributed to the interpretation of the results and read and approved the final manuscript.
Competing interests
The authors declare that they have no competing interests.
Publisher’s Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
 1.J Rubio, A PascualIserte, J Del Olmo, J Vidal, in Proc. IEEE Global Communications Conference (GLOBECOM). User association for load balancing in heterogeneous networks powered with energy harvesting sources, (2014). doi:10.1109/GLOCOMW.2014.7063604.
 2.A Damnjanovic, et al., A survey on 3GPP heterogeneous networks. IEEE Wirel. Comm. Mag. 18(3), 10–21 (2011).CrossRefGoogle Scholar
 3.X Wu, B Murherjee, D Ghosal, Hierarchical architectures in the thirdgeneration cellular network. IEEE Wirel. Commun. 11(3), 62–71 (2004).CrossRefGoogle Scholar
 4.A Damnjanovic, et al., Multitier cell design. IEEE Commun. Mag. 35(8), 60–64 (1997).CrossRefGoogle Scholar
 5.ICT601102 STP, in Deliverable D42. TUCAN3G: optimization and monitoring of HNB network, (2014). Available online: http://www.icttucan3g.eu.
 6.K Son, S Chong, G Veciana, Dynamic association for load balancing and interference avoidance in multicell networks. IEEE Trans. Wirel. Commun. 8(7), 3566–3576 (2009).CrossRefGoogle Scholar
 7.A Sang, X Wang, M Madihian, RD Gitlin, Dynamic association for load balancing and interference avoidance in multicell networks. Wirel. Netw. 14:, 103–120 (2008).CrossRefGoogle Scholar
 8.SK Das, SK Sen, R Jayaram, A dynamic load balancing strategy for channel assignment using selective borrowing in celular mobile environment. Wirel. Netw. 3(5), 333–347 (1997).CrossRefGoogle Scholar
 9.E Yanmaz, OK Tonguz, Dynamic load balancing and sharing performance of integrated wireless networks. IEEE J. Sel. Areas Comm. 22(5), 862–872 (2004).CrossRefGoogle Scholar
 10.R Madan, et al., Cell association and interference coordination in heterogeneous LTEA cellular networks. IEEE J. Sel. Areas Comm. 28(9), 1479–1489 (2010).CrossRefGoogle Scholar
 11.K Shen, W Yu, in IEEE International Conference on Acoustics, Speech, and Signal Processing. Downlink cell association optimization for heterogeneous networks via dual coordinate descents (IEEEVancouver, 2013).Google Scholar
 12.Q Ye, et al., User association for load balancing in heterogeneous cellular networks. IEEE Trans. Wirel. Commun. 12(6), 2706–2716 (2013).CrossRefGoogle Scholar
 13.JW Lee, RR Mazumbar, NB Shroff, Joint resource allocation and base station assignment for the downlink in CDMA networks. IEEE/ACM Trans. Netw. 14(1), 1–14 (2006).CrossRefGoogle Scholar
 14.M Hong, A Garcia, Mechanisms design for base station association and resource allocation in downlink OFDMA network. IEEE J. Sel. Areas Comm. 30(11), 2238–2250 (2012).CrossRefGoogle Scholar
 15.X Hongzhang, Z Tiankui, Z Zhimin, L Dantong, in IEEE Wireless Communications and Networking Conference Workshops (WCNCW). Distributed user association for delayload tradeoffs in energy harvesting enabled HetNets (IEEENew Orleands, 2015).Google Scholar
 16.L Dantong, et al., in 21st International Conference on Telecommunications (ICT). Adaptive user association in HetNets with renewable energy powered base stations (IEEELisbon, 2014).Google Scholar
 17.L Dantong, et al., Two dimensional optimization on user association and green energy allocation for HetNets with hybrid energy sources. IEEE Trans. Commun. 63:, 4111–4124 (2015).CrossRefGoogle Scholar
 18.T Zhang, et al., User association for energyload tradeoffs in HetNets with renewable energy supply. IEEE Commun. Lett. 19(12), 2214–2217 (2015).CrossRefGoogle Scholar
 19.A Goldsmith, Wireless communications (Cambridge University Press, Cambridge, 2005).CrossRefGoogle Scholar
 20.J Laiho, A Wacker, T Novosad, Radio Network Planning and Optimisation for UMTS (Wiley, Hoboken, 2006).Google Scholar
 21.C Ho, R Zhang, Optimal energy allocation for wireless communications with energy harvesting constraints. IEEE Trans. Signal Process. 60(9), 4808–4818 (2012).MathSciNetCrossRefGoogle Scholar
 22.J Yang, O Ozel, S Ulukus, Broadcasting with an energy harvesting rechargeable transmitter. IEEE Trans. Wirel. Commun. 11(2), 571–583 (2012).CrossRefGoogle Scholar
 23.M Gregori, A PascualIserte, M Payaró, in IEEE Wireless Comm. Networking Conference (WCNC). Mutual information maximization for a wireless energy harvesting node considering the circuitry power consumption (IEEEShanghai, 2013).Google Scholar
 24.O Ozel, K Tutuncuoglu, J Yang, S Ulukus, A Yener, Transmission with energy harvesting nodes in fading wireless channels: optimal policies. IEEE J. Sel. Areas Comm. 29(8), 1732–1743 (2011).CrossRefGoogle Scholar
 25.DP Bertsekas, Dynamic programming and optimal control, third edition (Athena Scientific, Belmont, 2005).zbMATHGoogle Scholar
 26.X Wang, GB Giannakis, AG Marques, A unified approach to QoSguaranteed scheduling for channeladaptive wireless networks. Proc. IEEE. 95(12), 2410–2431 (2007).CrossRefGoogle Scholar
 27.Q Ye, M AlShalash, C Caramanis, JG Andrews, in IEEE Global Communications Conference (GLOBECOM). On/Off macrocells and load balancing in heterogeneous cellular networks (IEEEAtlanta, 2013).Google Scholar
 28.L Wei, Y Xu, RQ Hu, Y Qian, in IEEE Global Communications Conference (GLOBECOM). An algebraic framework for mobile association in wireless heterogeneous networks (IEEEAtlanta, 2013).Google Scholar
 29.J Rubio, A PascualIserte, Energyaware broadcast MUMIMO precoder design with imperfect channel and battery knowledge. IEEE Trans. Wirel. Comm. 13(6), 3137–3152 (2014).CrossRefGoogle Scholar
 30.S Boyd, L Vandenbergue, Convex optimization (Cambridge University Press, Cambridge, 2004).CrossRefGoogle Scholar
 31.DP Bertsekas, Nonlinear programming, second edition (Athena Scientific, Belmont, 1999).zbMATHGoogle Scholar
 32.D Palomar, M Chiang, A tutorial on decomposition methods for network utility maximization. IEEE J. Sel. Areas Comm. 24(8), 1439–1451 (2006).CrossRefGoogle Scholar
 33.O Awoniyi, NB Mehta, LJ Greenstein, Characterizing the orthogonality factor in WCDMA downlinks. IEEE Trans. Wirel. Commun. 4(2), 621–625 (2003).CrossRefGoogle Scholar
Copyright information
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.