Low Complexity Power and Scheduling Policies for Wireless Networks to Provide Quality of Service∗ Satya Kumar V, Vinod Sharma Department of Electrical Communications Engineering, Indian Institute of Science, Bangalore Email: satyakumar@ece.iisc.ernet.in, vinod@ece.iisc.ernet.in Abstract—We consider optimal power allocation policies for a single server, multiuser system. The power is consumed in transmission of data only. The transmission channel may experience multipath fading. We obtain very efficient, low computational complexity algorithms which minimize power and ensure stability of the data queues. We also obtain policies when the users may have mean delay constraints. If the power required is a linear function of rate then we exploit linearity and obtain linear programs with low complexity. Index Terms—Fading channels, Average queue constraint, Optimal average power policies. I. INTRODUCTION Information and communications technology (ICT) industry is consuming about 3% of world power consumption. This percentage will further increase as the number of mobile users is growing at a rapid pace across the globe. Any reduction in power consumption in the ICT will reduce the ever increasing carbon footprint from this sector. It will also reduce the operational cost of the service providers and will need smaller diesel generators and batteries. Thus one of the primary challenges for Next Generation Networks (NGN) is to reduce energy consumption in the cellular network [7]. In a Base Station (BS) the power is consumed mainly in the air conditioner (25%), Radio equipment (61%), DC power (11%) and RF load and Feeder (3%). In this paper we will concentrate on reducing power in RF transmission, while providing quality of service (QoS) to the users. This indirectly reduces the power consumed in the other components also [16]. Goldsmith and Varaiya [10] obtained a power allocation policy for a single fading link which optimizes the rate. Energy efficient scheduling under average delay constraint was first addressed in [4], [5]. Goyal et al. [11] considered the same problem, proved existence of an optimal policy and obtained some structural results for the optimal policy. [24] proposed delay and power optimal policies in a single server queue when the power used in transmission is a linear function of rate. [9] proposed an energy efficient scheduling with individual packet hard delay constraints. [13] presented a policy which minimizes energy for sending a fixed number of packets under given delay constraints. Neely [18] proposed a new innovative algorithm which optimizes power while satisfying an upper bound on the sum of the average queue lengths of multiple users. The algorithm needs to learn a parameter. [25] proposed *Partially funded by a project from ANRC. a suboptimal policy which minimizes the average power under average queue constraint when there is an upper bound on packet loss also. [28] obtained asymptotic lower bounds for average queue length and average power consumption. Neely [17] presented an algorithm for a multiuser and multi channel scenario subject to an upper bound on the sum of average queue length. To meet the constraints the algorithm needs to learn two parameters. In [21] new throughput optimal energy management policies were developed when the transmitter is powered by energy harvesting sources. Explicit throughput optimal policies which also minimize mean delay were also obtained when linear power rate relation holds. [22] provides efficient MAC policies in the same setup. [19] implemented an online algorithm by modifying the value iteration equation and provides QoS by minimizing the average power for a single user. A. Problem Statement and our contribution Our objective is to minimize the average transmit power while providing QoS, such as stability of the data queue or an upper bound on the average delay. The later problem is usually formulated as an Markov Decision Problem (MDP). However, finding an optimal solution via an MDP is computationally hard and does not usually provide any insights to the solution. A few other algorithms provided in literature use learning algorithms. These can be slow to converge and also do not provide any insight into the optimal solution. We are not aware of any algorithm which guarantees an upper bound on mean delay especially in a multiuser fading environment except via MDP or learning. As against the above work, we provide algorithms which are in closed form or require very low computational complexity. Our algorithms do not require queue length information or arrival statistics. These algorithms are optimal in the class of algorithms requiring only channel gains and provide explicit guarantees on mean delays for individual users. These algorithms do not require any learning. Furthermore, either these are probably optimal or shown to be close to optimal via computations on explicit examples and perform better than other existing low complexity algorithms. The paper is organized as follows. Section II presents the system model. Section III presents our algorithm that minimizes average power and guarantees stability of the data queue. Section IV considers the problem when the users also specifically consider the case, when fj can be approximated by a linear function, Rkj = αPkj Hkj , Fig. 1. where αj > 0. This is a good approximation of Shannon formula (2) at low SNR [24] and also at high bandwidth ([3], [14]). However as shown in [21], even when (2) cannot be approximated well by a linear function, (3) can still hold in a practical systems.We will show that linearity can be exploited to obtain more efficient algorithms. First, we consider the system without a delay constraint. Later on we provide the solution with delay constraints. System Model. require mean delay guarantees. Section V provides examples illustrating these algorithms and compares our results with other existing well known algorithms. Section VI concludes this paper. III. OPTIMAL POLICIES : STABLE SYSTEM In this section we consider the problem of minimizing average power lim sup II. SYSTEM MODEL n→∞ We consider a single server, discrete time queue with M user. A slot is of duration 1. Let Ajk bits arrive in slot k, representing interval [k, (k + 1)), k ≥ 0 for user j. The data to be transmitted arrives into the system from higher layers at the beginning of each slot and placed into an infinite buffer queue till transmission (Figure 1). Arrival process {Ajk , k ≥ 0} is an independent and identically distributed (iid) sequence with mean E[Aj ]. We will some times also consider the case, when the arrival process is stationary, ergodic (e.g. modeled as Markov chain) We assume that channel gain Hkj is constant over the duration of slot k and {Hkj , k ≥ 0} is iid, where Hkj ∈ {hj1 , hj2 , ..., hjLj } and 0 < hji < hjl < ∞, for i < l, ∀1 ≤ j ≤ M and hjLj < ∞. We also assume that the channel gain Hk = (Hk1 , ..., HkM ) is available at the transmitter at time k. Let P [Hk = h] = p(h). The i.i.d assumption on {Ajk } and {Hkj } are commonly made ([1], [6], [27]). The Hkj taking values on a finite set can be a good approximation for continuous distribution, e.g., Rayleigh, Rician, Nakagami, by taking the finite set arbitrarily large. Let Rkj bits be transmitted in slot k from user j and let the power used be Pkj . Let qkj denote the queue length in packets at time k for user j. Then {qkj } evolves as, j qk+1 = (qkj + Ajk − Rkj )+ , k ≥ 0, (1) + where (x) = max(0, x). We relate Rkj with Pkj via a general relationship Rkj = fj (Pkj , Hkj ), where fj is a nondecreasing (in Pkj and Hkj ), nonnegative function. A common function is, the Shannon function, 1 log2 (1 + Pkj Hkj /σ 2 ). (2) 2 This assumes that the channel is Additive White Gaussian Noise (AWGN) fading channel with noise power σ 2 . We will Rkj = (3) M n−1 1 XX j E Pk , n j=1 (4) k=0 subjected to the stability of all the queues, i.e., the queue length process qk = (qk1 , ..., qkM ) has a stationary distribution. This could be the QoS if all the users are best effort users in the Internet. This problem can be solved via MDP but computing the optimal solution is too complex to compute for more than one user. To reduce complexity we ignore the queue length process in obtaining the optimal policy. We will see that by obtaining an optimal policy which depends only on the channel states and the dynamics of the queue we can obtain policies which are close to the optimal policies, obtainable via MDP. For simplicity first we obtain the policy for a single user in Section III-A and will then extend to the multiuser case in Section III-B. We will call these policies greedy opportunistic policies. A. Single User In this section we remove the user index j. We want to obtain a power control policy P (h) that minimizes X p(hi )P (hi ), (5) i subjected to, X p(hi )f (P (hi ), hi ) ≥ E[A] + , (6) i where > 0 is an arbitrarily small constant. The constraint (6) is to ensure that the queue is stable. If f is concave, e.g., Shannon function, then (5)-(6) has a linear cost function with convex constraints. Instead of solving for P (h) for each h, we can solve for rate R(h) for each h and then this becomes an optimization problem with convex cost function with linear functions. In either case it is a comparatively easy optimization problem to solve and the globally optimal solution can be obtained by solving KKT conditions. Also, it requires only channel statistics, current channel gain and E[A]. Another important feature of this policy is that when {(Ak , Hk ), k ≥ 0} is iid then this optimal policy retains the GI/GI/1 character of the queue. Thus, the numerous results and approximations available [2] for such queues will be applicable for this system and can be exploited to provide QoS guarantees to the wireless system. We will also see that the optimal policy obtained is very close to the overall optimal policy via MDP which requires arrival statistics and queue length information also and has a very high computational complexity. If {Ak , Hk } is stationary, ergodic (a generalization very useful in practice, especially to model voice and video traffic) then the solution of (5)-(6) again provides the optimal policy in the class of policies which consider only the channel gain. If the function f is linear, then a simple optimal closed form policy is available, in the whole class of policies : serve all the data in the queue whenever Hk = hL , i.e., clear the queue whenever the channel gain is maximum. This is the optimal policy even when {(Ak , Hk )} is stationary, ergodic. This policy does not require any arrival or channel statistics; only the current channel gain and consumes average power = E[A] αhL . For this optimal policy, the system has several other desirable features. When {Ak , Hk } is iid (in fact we can allow {Ak } iid and {Hk } Markov modulated with the modulating Markov chain irreducible with a finite state space), the epochs when Hk = hL are regeneration epochs for the process {qk }. The process has a stationary distribution π. The queue length process converges in total variation to π exponentially. Furthermore Eπ [q γ ] < ∞ for any γ ≥ 1 if E[Aγ+1 ] < ∞. 1 We also have Eπ [q] = E[A]( p1L − 1). B. Multiuser MATLAB). Starting the optimization algorithm with different initial conditions and picking the best solution provides an efficient solution. Any solution obtained this way has the desirable property that each of the queues behaves as an independent GI/GI/1 queue and hence its performance, e.g., mean delay can be approximately obtained from available GI/GI/1 queue results. The problem becomes much simpler if we can approximate fj by linear functions. Then an optimal policy (among all policies) is : in slot k clear queue j if Hkj = hjLj . If there is more than one such queue, pick one among them with the longest queue. If even then there is more than one such queue, pick with equal probability any one of them. This policy does not require any channel or arrival statistics but only channel gains and queue lengths in the current slots. Serving the longest queue does not reduce average power; only mean queue length. If we ignore the queue length and serve one of the j users satisfying (8), with probability (say equal), then from the channel statistics we can compute the probability pj for user j with which its queue is served in any slot. In addition to being optimal, this remarkably simple policy has all the desirable properties mentioned above for a single user : P E[Aj ] • The overall average power consumed = . j α hj j • • If there are M > 1 users, the optimal policy, ignoring the queue length information is obtained as follows. Let the power needed to transmit R bits in channel state h for user j be gj (R, h) (obtainable from fj ). Then we seek an optimal policy which provides rate Rj (h) in channel state h for user j with probability β(j, h). In a slot only one user will transmit. Thus, we find Rj (h) and β(j, h) for each channel state vector h and j that (8) • • • Lj The system has a unique stationary distribution π and starting from any initial distribution, qk converges in total variation to π exponentially fast. 0 Eπ [qjγ ] < ∞ whenever E[(Aj1 )γ ] < ∞ for any γ 0 > 1. Eπ [q j ] = E[Aj ]( p1 − 1), ∀j = 1, ..., M . j This policy is optimal for any {(Ak , Hk )} process and does not require any arrival or channel gain statistics. It does not require any fragmentation of packets. IV. OPTIMAL POLICIES : WITH MEAN DELAY CONSTRAINTS (7d) Thus far we have been concerned about minimizing constraints subject to stability of the system. For some real time and data applications, it will be desirable to have upper bounds on mean delay. Such constraints can be translated into mean queue length constraints via Little’s law [2]; the exact relationship between mean delay and queue length depends on whether we consider a packet model or fluid model. In the following we assume that it has been sorted out and finally we have translated our QoS to the constraint, X n 1 lim sup E qkj ≤ q j , j = 1, ..., M. (9) n→∞ n This is a non-convex optimization problem : the objective function as well as the constraints are non-convex even when gi are convex. But if all the functions gi are smooth enough, e.g., have continuous second order partial derivatives, then we can obtain locally optimal solutions quite easily (using Again, this problem can be addressed via MDP but getting optimal solution, at least for the multiuser case is computationally very demanding. Due to all the desirable properties we have discussed so far, we limit ourselves to policies which depend only on the channel state information. min M X X p(h)gj (Rj (h), h)β(j, h) (7a) j=1 h∈H subject to: X Rj (h)p(h)β(j, h) ≥ E[Aj ] + , j = 1, ..., M, (7b) h∈H M X β(j, h) ≤ 1, ∀h, (7c) j=1 0 ≤ β(j, h) ≤ 1, ∀j, h. k=1 EECA B−Bernoulli MaxTrans B−Bernoulli TOCA B−Bernoulli Greedy Total average queue length 4.5 4 3.5 3 2.5 2 1.5 1 0.4 Fig. 2. 0.5 0.6 0.7 Average power 0.8 0.9 Comparison of policies for three users for Bernoulli arrivals. We consider a policy which selects user j with probability β(j, h) when the system channel state is h and chooses to transmit Rj (h) bits. We find β(j, h), Rj (h) that solve the optimization problem (7a), (7c), (7d) with the additional constraints (9). Under our policy, left hand side of (9) can be replaced by Eπ [q j ] where π is the stationary distribution of {qk } under the given policy. Even though under our policy each queue is like a GI/GI/1 queue with qkj satisfying j qk+1 = (qkj + Ajk − Rkj )+ , (10) a closed form expression for Eπ [q j ] is not available. But several approximation are available for mean delay of a GI/GI/1 queue (which can be used here because qkj satisfies the Lindeley equation [11]) we use [12], Eπ [q j ] ≈ 2 2 (j)) (j) + CR ρ(j)d(j)E[Aj](CA . 2(1 − ρ(j)) (11) where ρ(j) = E[Aj ] 2 , CA (j) = E[Rj ] Algorithm (EECA). We have considered three users. The arrival and channel statistics of the three users are same and independent of each other. The arrival process {Ak } is a Bernoulli arrival process with average arrival rate 1 and batch size 10. The channel gains take values in the set {0.01, 1} and the respective channel gain probabilities are {0.2, 0.8}. The sum average queue length vs the corresponding average powers of our opportunistic greedy policy and the TOCA and EECA policies of [17] are plotted in Fig. 2. We see that our greedy policy works much better than TOCA and EECA. In the figure we have also plotted MaxTrans policy of [20] when we have included power control and obtained the optimal policy to provide the required mean delay. EECA becomes unstable at average power 0.54. A. Linear Case If the fi can be taken linear, then we have seen in Section III that an optimal policy to ensure stability should transmit data from user j only if its channel gain is hjLj . Since multiple users may have their best channels in a slot, then a user among them is picked with a certain probability. Thus eventually (because {hk } are iid, independent of {Ak }), we obtain an optimal policy where user j will transmit all of its data in any given slot with probability pj independently of other system variables. The queue length process {qkj } is regenerative with the regeneration epochs as the epochs when the jth queue is cleared. Let N be the interval between two such epochs. It is geometrically distributed with parameter pj and independent of {Ajk }. Thus, for this queue, we can explicitly compute its mean queue length under stationarity as, NX −1 ∞ X qlj |N = k P [N = k] E l=0 Eπ q j = = k=1 E[N ] ∞ X E[Aj1 (k − 1) + ... + Ajk−1 ]P [N = k] V ar[Aj ] V ar(Rj ) 2 , CR = j 2 (E[A ]) (E[Rj ])2 (12) = k=1 E[N ] E[A ](E[N ] − E[N ]) = 2E[N ] 1 = E[Aj ]( j − 1). pLj j 2 2 (j))2 2(1 − ρ(j)) (1 − CR 2 (15) exp[− 3ρ(j) C 2 (j) + C 2 (j) ], if CR (j) < 1 R A d(j) = (C 2 (j) − 1) 2 If we did not have an upper bound on Eπ q j , then any exp[−(1 − ρ(j)) 2 R ], if C (j) ≥ 1 R 2 (j) CR (j) + 4CA pj > 0 is sufficient to provide stability andminimum average (13) power. However, now it is possible that Eπ q j obtained. (15) is greater than q j for some j (otherwise we have already X Rj (h)β(j, h)p(h). (14) obtained an optimal solution for the current problem). Let E[(Rj )] = p̂j be the probability such that using this in (15) provides h∈H We use these approximations on the LHS of (9) and equality for j. Now we would like to obtain β(j, h) such that solve the optimization problem (7). Again it is a non-convex ∀j = 1, ..., M , optimization problem and we obtain our solution by getting locally optimal solutions from several initial conditions and choosing the best solution. We compare our results with Neely’s [17] Tradeoff Optimal Control Algorithm (TOCA) and Energy Efficient Control β(j, h) > 0, only if hj = hjLj , (16) β(j, h) = p̂j (17) and X h If such a solution does not exist (in particular this will happen when P (hjLj ) < p̂j , we need to relax condition (16). In particular, we find β(j, h), the probability we will pick user j in state h and clear its queue that solves min M X X p(h)β(j, h) j=1 h∈H E[Aj ] αj hj p̂j subject to 0 ≤ β(j, h) ≤ 1, X β(j, h) = p̂j , h X β(j, h) ≤ 1. j This is a Linear Program (LP) and hence provides a global optimum with comparatively much lower complexity. If Lj = L for all j then this LP has M LM variables. It’s complexity can be further reduced if we consider the Dual LP which has (M +LM ) variables. The complexity of this LP is much lower than that of the LP for the MDP because in MDP, queue length state is also considered. For a single user, the solution is available in closed form. We compare our greedy policy with the optimal policy via MDP. The optimal policy is obtained via policy iteration [8]. We consider the MDP with the average cost that includes r transmission power (w(h, r) , αh ) and storage cost βq with a single state cost being w(h, s) + βq (which can be interpreted as a Lagrangian relaxation of our original problem [15]). For this MDP, the new average cost optimality equation is, Fig. 3. Single user for Poisson arrivals. J(q, h) = min{w(h, r) + βq − g ∗ + E[J(Q+ , H + )]}, (18) r where r is the action representing data transmission in the slot, J(q, h) is the optimal relative value function, g ∗ is the optimal average cost, Q+ = (q − r + A) and H + are the next slot queue length and channel gain. For our example within 10 iterations of the policy iteration, we obtain the optimal policy. The β used is such that at the optimal policy the average queue length is q. We compare the greedy policy of the last section and the optimal policy for two examples. In the first example, the arrival process {Ak } is Poisson with rate 2. The channel gains take values in the set {0.3, 0.5, 1, 2} and the respective channel gain probabilities are {0.2, 0.4, 0.3, 0.1}. The average queue length vs the corresponding average powers of greedy policy and optimal policy are plotted in Fig. 3. We observe that the optimal curve and the greedy curve are very close to each other. We also present results, when the incoming arrival distribution is Binomial with parameters B(30, 0.1) whose average arrival rate is 3. The channel statistics are as above. We observe from Fig. 4. that the average queue length vs average power for greedy policy and the optimal policy are very close. Fig. 4. Single user for Binomial arrivals. V. CONCLUSIONS In this paper, we have presented computational low cost optimal transmit power policies for a wireless system. The user may experience channel fading and may have an average delay constraint. Obtaining optimal policies via MDP can be very computationally complex. Thus we present a greedy suboptimal policy in closed form which is very close to optimal and does not require queue length information. Next, we have extended our greedy policy to a multiuser downlink. The users may have individual average delay constraints. This policy is close to optimal and is computationally much simpler. It can also be used for an uplink. Our study shows that if we search for optimal policies using only the channel gains and ignore the queue lengths, we obtain very efficient policies at very low computational cost which can also guarantee QOS in a multiuser fading environment. Sum of Average Queue Lengths 140 TOCA Policy Opportunistic Greedy Policy EECA Policy 120 100 80 60 40 20 5 5.2 Fig. 5. 5.4 5.6 Average Power 5.8 6 Five users for Poisson arrivals. R EFERENCES [1] M. S. Alouini and A. J. Goldsmith, “Adaptive Modulation over Nakagami Fading Channels”, Wireless Personal Communications-Springer, 2000. [2] S. Asmussen, “Applied probability and queues”, 2nd ed, Springer-Verlag, 2003. [3] F. Berggren and R. Jantti, “Asymptotically Fair Transmission Scheduling over Fading Channels”, IEEE Transactions on Wireless Communications, Vol. 3, pp. 326-336, No. 1, Jan 2004. [4] R. A. Berry and R. G. Gallager, “Communication over Fading Channels with Delay Constraints”, IEEE Transactions on Information Theory, Vol. 48, no. 5, pp. 1135-1149, May 2002. [5] R. A. Berry, “Power and Delay Trade-offs in Fading Channels“, June 2000, Phd Thesis, MIT. [6] J. K. Cavers, “An Analysis of Pilot Symbol Assisted Modulation for Rayleigh Fading Channels”, IEEE Transactions on Vehicular Technology, Vol. 40, No. 4, November 1991. [7] A. Chatzipapas, S. Alouf and V. Mancuso, “On the Minimization of Power Consumption in Base Stations using on/off Power Amplifiers”, IEEE Online Conference on Green Communications, pp. 18-23, Sept. 2011 [8] Dimitri P. Bertsekas, “Dynamic Programming and Optimal Control”, Fourth Edition, Vol. 2, 2012. [9] W. Chen, U. Mitra and J.Neely, “Energy-efficient scheduling with individual delay constraint over a fading channel”, WiOpt, pp. 1-10, Apr 2007. [10] A. J. Goldsmith, P. Varaiya, “Capacity of Fading Channels with Channel Side Information”, IEEE Transaction on Information Theory, Vol. 43, No. 6, pp. 1986-1992, Nov 1997. [11] M. Goyal, A. Kumar and V. Sharma, “Power Constrained and Delay optimal policies for Scheduling Transmission over a Fading Channel,” IEEE Infocom, Vol. 1, pp. 311-320, Apr 2003. [12] W. Kramer , M. Langenbach-Beltz, ” Approximate formulae for the delay in the queueing systems GI/GI/1“,Eighth International Telemetric Congress, Melbourne, pp. 235-1-8, 1976. [13] A. Fu. E. Modiano and J. Tsitsiklis, “Optimal Energy Allocation for Delay-Constrained Data Transmission over a Time-Varying channel”, Proc. IEEE INFOCOM, 2003. [14] A. Fu, E. Modiano and J. Tsitsiklis, “Optimal Transmission Scheduling over a Fading Channel with Energy and Deadline Constraints”, IEEE Transactions on Wireless Communications, Vol. 5, No. 3, pp. 630-641, March 2006. [15] D. J. Ma, A. M. Makowski, A. Shwartz, “Estimation and Optimal Control for Constrained Markov Chains”, IEEE Conf. on Decision and Control, Dec. 1986. [16] Gerson A. S. M, “Low-power HF Microelectronics: A Unified Approach”, The Institution Of Engineering And Technology, 1996. [17] M. J. Neely, “Optimal Energy and Delay Tradeoffs for Multiuser Wireless Downlinks”, IEEE Transactions on Information Theory, Vol. 53, No. 9, pp. 3095-3113, Sep 2007. [18] M. J. Neely, “Intelligent Packet Dropping for Optimal Energy- Delay Tradeoffs in Wireless Downlinks”, IEEE Transactions on Automatic Control, Vol. 54, no. 3, March 2009. [19] N. Salodkar, A. Bhorkar, A. Karandikar and V. S. Borkar, “An On-Line Learning Algorithm for Energy Efficient Delay Constrained Scheduling over a Fading Channel”, IEEE Journal on Selected Areas in Communications, Vol. 26, No. 4, pp. 732-742 May 2008. [20] V. Sharma, D. K. Prasad and E. Altman, Opportunistic scheduling of wireless links, 20th International Teletraffic Congress, Canada, June 2007. [21] V. Sharma, Utpal Mukherji, Vinay Joseph and Shrey Gupta, “Optimal Energy Management Policies for Energy Harvesting Sensor Nodes”, IEEE Transactions on Wireless Communications , Vol.9, No.4, pp. 13261336, Apr 2010. [22] V. Sharma, Utpal Mukherji and Vinay Joseph, “Efficient Energy Management Policies for Networks with Energy Harvesting Sensor Nodes”, 46t h Annual Allerton COnference, pp. 375-383 Sep 2008 [23] D. Tse, V. Pramod, “ Fundamentals of Wireless Communication”, Cambridge University, 2005. [24] Satya Kumar V, A. Lalitha, V. Sharma, “Power and Delay Optimal Policies for Wireless Systems”, National Conference on Communications(NCC), India , pp. 1-4, Feb 2012. [25] H. Wang and N. Mandayam, “ A Simple Packet transmission Scheme for Wireless Data over Fading Channels”, IEEE Transactions on Communications, vol. 50, no. 1, pp 125-144, 2004. [26] D. G. Luenberger, “Linear and Nonlinear Programming”, Springer, second edition, 2003. [27] L. Vandendorpe, “Multitone Spread Spectrum Multiple Access Communications System in a Multipath Rician Fading Channel”, IEEE Transactions on Vehicular Technology, Vol. 44, No. 2, May 1995. [28] B. S. Vineeth and Utpal Mukherji, “Tradeoff of Average Power and Average Delay for Point-to-Point Link with Fading”, National Conference on Communications(NCC), India , pp. 1-5, Feb 2013.