 Research
 Open access
 Published:
Neighborfriendly autonomous power control in wireless heterogeneous networks
EURASIP Journal on Wireless Communications and Networking volume 2014, Article number: 175 (2014)
Abstract
The widespread deployment of base stations constitutes a promising solution to cope with the everincreasing wireless data rate demands. However, it also increases the interference levels, especially at the celledge. Most interference management techniques assume coordination between base stations, which involves undesired overhead and delays. To solve this problem, we propose a neighborfriendly autonomous algorithm for power control in wireless heterogeneous networks that protects victim users from neighboring cells through a penalty factor in the power allocation level. We refer to this algorithm as neighborfriendly iterative waterfilling (NFIWF). In addition, we propose a lowcomplexity closedform version that fixes the penalty factor by assuming a linear approximation of the victim user data rate. In high interference conditions, it can achieve a victim user data rate increase by a factor of 3.5 compared to IWF, 15 compared to soft frequency reuse (SFR), and 60 compared to equal power allocation (EPA) with a marginal decrease of the primary user data rate.
Introduction
The boost of novel wireless applications is producing an everincreasing demand for larger data rates.
Furthermore, the massive market penetration of smartphones adds more pressure to network operators, mobile manufacturers, and standardization groups to satisfy the demands of an everlarger number of users.
Improvements from a physical layer perspective have shown a low potential to deal with these demands. For instance, considering new coding techniques, link adaptation, and larger bandwidths, from 1950 to 2000, the network capacity gains have increased by a factor of 5 from the first, a factor of 5 from the second, and a factor of 15 from the third.
Surprisingly, just from the deployment of more (smaller) cells, the network capacity gains have increased by an overwhelming factor of 2,700[1].
Femtocells offer the easiest and most costeffective way to increase the current cell deployment[2].
These are lowpower base stations mainly for indoor usage with a coverage of tens of meters, compared to a few kilometers of highpower base stations, or macrocells. The coexistence of different types of cells in the same area is referred to as a heterogeneous network.
Most urban areas are already fully covered by macrocells. Hence, the addition of more cells in these areas creates serious intercell interference problems in both uplink and downlink transmissions, especially in closedaccess mode. In this paper, we focus on the downlink transmission. Since femtocells are likely to be deployed in an unplanned manner by endusers and not by network operators, this problem is only going to grow in the coming years[3, 4].
Base stations play a crucial role in dealing with an intercell interference. The power and timefrequency resources they allocate to users within the cell have an impact on users from neighboring cells. The impact is especially high for users located at the celledge.
Therefore, the implementation of intercell interference coordination (ICIC) techniques is of paramount importance. Nevertheless, most of the ICIC techniques allocate separate resources to neighboring cells, i.e., they exploit resource orthogonalization[5–10]. This is usually done in the frequency domain or in the time domain, while variable power levels are rarely exploited. Thus, in this paper, we focus on and advocate for power control schemes that control an intercell interference by sharing (rather than orthogonalizing) resources.
Power control techniques implemented in current wireless networks such as LTE focus on resource orthogonalization between cells. A typical example is soft frequency reuse (SFR)[11], in which the total bandwidth of each cell is divided into two nonoverlapping frequency bands, one for center users (primary users in our case) and one for celledge users (victim users in our case). The center user band can be reused in all the cells, while the celledge user band is nonoverlapping between neighboring cells, as can be seen in Figure1. The transmit power level is constant in each band but larger for the celledge user band to compensate for the performance degradation.
This approach offers a simple way to deal with frequency and power allocation jointly without interference but with the disadvantage of a fixed allocation of frequency bands and transmit powers. The optimization of SFR is usually done by adapting parameters α and β, which represent the total power fraction and total bandwidth fraction of the center user band, respectively[12]. However, this can only be achieved through network coordination.
To support coordination between base stations, a dedicated backhaul link is required. In LTE, the X2 interface between macrocells helps to configure dynamically the frequency bands and power levels[13–17].
However, this interface is not yet standardized between macro and femtocells in early versions of LTE release[11, 18, 19]. Even with an interface available, the dynamics of the wireless channel and the variability in the number of users attached to a cell, users’ location, and interference conditions, this coordination constitutes a significant information overhead resulting in large delays.
An alternative approach is that each base station optimizes its own resource allocation without any information exchange. We refer to it as an autonomous algorithm.
Two wellknown autonomous power control algorithms for OFDM networks are equal power allocation (EPA) and iterative waterfilling (IWF)[20]. In EPA, the total transmit power is allocated equally in all available subcarriers. In IWF, each base station maximizes its own data rate in a greedy way by allocating more power to those subcarriers with the best channel to interference and noise ratio (CINR), without considering the interference caused to victim users from neighboring cells.
Nongreedy autonomous power control algorithms have been studied in the context of digital subscriber line (DSL) networks.
In[21] and[22], lowcomplexity autonomous power control algorithms for DSL, called ASB and ASB2 are presented, which allow a nonorthogonalized share of resources. The concept of a protected reference line (or reference user) is introduced in these papers as a statistical average of all victim lines suffering interference. However, the implementation of these algorithms in practical wireless networks imposes a challenge given the multiuser scheduling and nonstationarity of the wireless channel.
A first attempt was made in[23] to apply the previous concept to a wireless network where the user suffering the strongest interference from the neighboring cells is selected as the reference user. However, this scheme is not autonomous since it needs periodical information exchange between base stations to adapt to the timevarying reference user channel characteristics.
To tackle the mentioned problems, we propose in this paper a neighborfriendly autonomous algorithm for power control in wireless heterogeneous networks. It protects victim users within a certain distance from the base station through a frequencydependent penalty factor in the power allocation level. The level of protection can be tuned to provide individualized quality of service (QoS). We refer to this algorithm as neighborfriendly iterative waterfilling (NFIWF). Additionally, we propose a lowcomplexity closedform version that fixes the penalty factor by assuming a linear approximation of the data rate of the victim users.
We can summarize the main contributions of the paper as follows:

1.
A power control algorithm that protects victim users from neighboring cells located at a distance from the base station without any coordination between base stations.

2.
A practical way to tune the protection to victim users from neighboring cells.

3.
A practical way to obtain the channel information of victim users attached to neighboring cells without communication between base stations.

4.
A lowcomplexity closedform version of the previous algorithm by assuming a linear approximation of the data rate of the victim users.

5.
The exploitation of frequency and time correlation of the wireless channel to further reduce the complexity of the algorithm.
IWFbased power control
Autonomous algorithms do not rely on information between base stations, they only exploit locally available (and a priori known) information about the environment such as direct channel gains, received interference, and noise.
IWF exploits this information to maximize the data rate in each cell:
with
where R^{c} is the data rate of all users in cell c; f_{ s } is the symbol rate;{b}_{k}^{c},{h}_{k}^{c},{\sigma}_{k}^{c},{s}_{k}^{c}, and{s}_{k}^{c,\text{mask}} are the bit loading for a standard interference channel model, the channel transfer function, the noise power, the base station transmit power, and the spectral emission mask constraints on subcarrier k in cell c, respectively;{h}_{k}^{\stackrel{\u02c9}{c}} and{s}_{k}^{\stackrel{\u02c9}{c}} are the channel transfer function and transmit power on subcarrier k from the interfering cell\stackrel{\u02c9}{c}, which are both assumed to be known as they affect users in cell c. We call{h}_{k}^{c} the direct channel and{h}_{k}^{\stackrel{\u02c9}{c}} the interfering channel of the users attached to cell c. The parameters and are the set of available cells and subcarriers, respectively, and P^{c,tot} is the total power budget in cell c. A given subcarrier can only be allocated to one user in cell c, but it can also be allocated to a user from a neighboring cell resulting in an intercell interference. The allocation of subcarriers to users in cell c can be done prior to the power allocation strategies described in this paper (based, for example, on instantaneous channel conditions or iteratively with the power allocation). However, our focus is only on the power allocation. A joint autonomous power and subcarrier allocation algorithm is nevertheless an interesting scenario that we will study for future work. The parameter Γ denotes the signaltonoise ratio (SNR) gap to capacity, which depends on the desired bit error rate (BER), the coding gain, and the noise margin. We will assume it to be equal to 1 without loss of generality.
It can be shown, using the corresponding KarushKuhnTucker (KKT) conditions, that the transmit powers have a closedform solution as follows
where{\left[x\right]}_{a}^{b}=max(a,min(x,b)) and λ_{ c } is the Lagrange multiplier that should be updated (e.g., with bisection) to satisfy the corresponding total power constraint P^{c,tot}.
To analyze the benefit of exploiting locally available information, we consider a network with 5 macrocells evenly distributed over a 30×30 km area, each with a 43 dBm total transmit power and 5 MHz bandwidth. As a channel model, we use the 3GPP spatial channel model (SCM[24]) with suburban macro environment and a distance (d)dependent path loss of 31.5 + 35 log_{10}(d[m]). We show in Figure2 the difference between the data rates obtained using IWF and EPA of a user moving along every possible location on this area. The results can be seen in a tridimensional plot where the x and y axes correspond to the area, and the z axis corresponds to the data rate difference between IWF and EPA. A maximum difference of 400 Mbps can be observed, interestingly, at the celledge of neighboring cells.This scenario becomes more critical when femtocells are deployed. We now introduce into the previous network topology 20 femtocells randomly distributed (i.e., deployed in an unplanned manner), each with a 15 dBm total transmit power. The exact location of each base station can be seen in Figure3. We compute again the difference between the data rates obtained using IWF and EPA of a user moving along every possible location. The results are shown in Figure4. The femtocells’ deployment results in more severe interference problems, especially at the celledges. Remarkably, a maximum difference of 1,250 Mbps can be observed at the celledge of multiple interfering cells (macro and femtocells). This again shows the potential gains exploiting locally available information.
The advantage of IWF is its simplicity, its closedform solution, and the fact that it does not need any information exchange between base stations. However, each cell maximizes its own data rate in a greedy fashion by allocating power especially to those subcarriers with the best CINR, without considering the interference caused to victim users from neighboring cells.
Neighborfriendly autonomous power control
Victim users protection with NFIWF
Our aim is therefore to design a neighborfriendly approach that, without any information exchange in the network, limits this damage.
Using the concept of a protected reference user, we formulate optimization problem (1) as the weighted sum of the data rate of users attached to cell c, or primary users, denoted as R^{c} and the data rate of victim users attached to one neighboring cell, denoted as R^{vc}. Both cells share the set of subcarriers. Adding extra optimization terms for other neighboring cells only brings minimal performance at a highcomplexity cost since most of the persubcarrier interference comes from one base station[23]. However, other neighboring cells can be considered if they share a different set of subcarriers with cell c. Again, the subcarrier allocation to users is assumed to be done prior to the power allocation.
with
where{b}_{k}^{\mathit{\text{vc}}},{h}_{k}^{\mathit{\text{vc}}},{s}_{k}^{\mathit{\text{vc}}}, and{\sigma}_{k}^{\mathit{\text{vc}}} are the bit loading, the direct channel, the transmit power, and the noise power on subcarrier k of the victim user, respectively, and{h}_{k}^{\mathit{\text{vc}},c} is the interfering channel on subcarrier k from cell c to a victim user. w^{c} and w^{vc} are the weights of the primary users and the victim users, respectively. We assume w^{c} equal for all primary users and w^{vc} equal for all victim users. We consider that w^{c} = 1  w^{vc}, which represents a tradeoff between protecting victim users of a neighboring cell at the cost of degrading the data rate of primary users. In practice, these weights can be chosen based on upper layer information such as queue length or quality of service requirements. Setting w^{vc} = 0 shifts to a greedy algorithm like IWF, which can be useful when interference between neighboring cells is negligible.
Applying the KKT stationarity condition to problem (4) leads to
By taking into account the KKT complementarity conditions of (4),{s}_{k}^{c} from the first term of Equation 6 can be isolated to obtain:
where{P}_{k}^{\mathit{\text{NF}},c} is referred to as the penalty factor, defined as
Note the similarity with the IWF solution. The first term in Equation 7 corresponds to a power level with persubcarrier penalty factor{P}_{k}^{\mathit{\text{NF}},c} that reduces the interference to victim users from a neighboring cell. Setting{P}_{k}^{\mathit{\text{NF}},c} to zero will reduce to the IWF algorithm. However, in contrast to Equation 3, this is a fixedpoint equation as{P}_{k}^{\mathit{\text{NF}},c} depends on{s}_{k}^{c}.
Problem 4 is a nonconvex function for which a duality gap exists to the optimal solution. However, as the number of subcarriers increase, this duality gap becomes zero and it can be solved via bisection[25].
By adding to Equation 7 a bisection search on the Lagrange multiplier to satisfy the total cell power constraint, we obtain Algorithm 1, which we refer to as NFIWF. The parameter δ indicates the accuracy of the total power constraint, γ indicates the stopping criterion of the bisection search on λ_{ c } in the case of an inactive total power constraint, and Λ^{max} is the maximum value for λ_{ c }.
The transmit powers of the neighboring cells{s}_{k}^{\mathit{\text{vc}}} are assumed as an EPA without performance degradation as observed in later sections.
Contrary to most ICIC techniques that orthogonalize resources, an advantage of NFIWF is that it allows subcarriers to be shared between users as long as adequate power levels are used. This can be seen in Figure5. Interestingly, NFIWF allocates more power to those subcarriers less used for transmission by the interfering base station, which uses IWF. Still, some subcarriers are shared by both base stations.
The challenge of implementing NFIWF in a wireless network resides on obtaining the parameters in Equation 8 in an autonomous way. For example,{h}_{k}^{\mathit{\text{vc}},c} can be obtained from the channel feedback of victim users when scanning pilot signals of a neighboring cell for a potential handover[26, 27]. However, the direct channel{h}_{k}^{\mathit{\text{vc}}} can only be known from the information received from other base stations.
Therefore, we propose in the ‘Estimation of the victim user channel’ section a novel approach to estimate{h}_{k}^{\mathit{\text{vc}}} based on the distance from the base station to the celledge.
Estimation of the victim user channel
Full knowledge of{h}_{k}^{\mathit{\text{vc}}} is unfeasible in an autonomous fashion.
Nevertheless, the path loss, i.e., the average channel gain over all the allocated subcarriers, is easier to obtain because it mainly depends on the distance to the base station. Since the signal strength coming from two neighboring base stations can be considered equal at the celledge (this is how the celledge is typically defined), the path loss from each base station to the celledge can be known. This can be exploited to approximate the direct channel of any victim user ({h}_{k}^{\mathit{\text{vc}}}) by using the path loss from the base station to the celledge. Therefore,{\stackrel{~}{h}}^{\mathit{\text{vc}}} is assumed to be an average over all the available subcarriers such that any user located at a distance d from the base station would present the same average channel and experience the same path loss given by 31.5 + 35 log_{10}(d[m])[24]. This results in a constant value for{h}_{k}^{\mathit{\text{vc}}} along all the set of subcarriers, i.e.,{h}_{k}^{\mathit{\text{vc}}}={\stackrel{~}{h}}^{\mathit{\text{vc}}}\phantom{\rule{2.77626pt}{0ex}}\forall k\in \mathcal{K} where{\stackrel{~}{h}}^{\mathit{\text{vc}}}=\frac{1}{\mathcal{K}}{\sum}_{k=1}^{\mathcal{K}}{h}_{k}^{c}. Even though an irregular propagation channel (i.e., with shadowing) might affect each victim user differently, we will see later that{\stackrel{~}{h}}^{\mathit{\text{vc}}} is a good approximation for the direct channel of all potential victim users if{h}_{k}^{\mathit{\text{vc}},c} of each user is known.
To estimate d in practice, we can use the information available at the base station on the channel estimated by new users entering the cell[28] or predefined by the manufacturer. As we will see later, an exact definition of d is not necessary for improved performance.
Furthermore, this information does not need to be updated regularly (since the celledge will only be modified when a new base station is deployed in the neighborhood).
Despite its simplicity, this model provides an accurate estimation of the victim users channel characteristics. To analyze the sensitivity of this model, we consider two users in a high interference case 1 (where the victim user is severely interfered by cell c) and a low interference case 2 (where the victim user is at the celledge) as reconstructed in Figure6 and Figure7, respectively. MBS stands for macro base station, and FBS stands for femto base station. The color regions indicate the signal strength in the direct channel to the closest base station, and the user color indicates the base station to which the user is attached.
We assume that there is no handover, like in a closedaccess base station.
Figure8 computes the normalized data rate of both users for cases 1 and 2 by evaluating{\stackrel{~}{h}}^{\mathit{\text{vc}}} at different values of d, but keeping the users’ positions as in Figure5 and Figure6. The distance d is then varied between 0 and the actual distance between base stations and it is normalized such that d_{norm} = 0 means a radius of zero and d_{norm} = 1 means a radius equal to the distance between both base stations (d_{BS}). The smaller the path loss distance, the more protection to the victim user at the cost of the primary user data rate.
At d_{norm} = 0.5, i.e., between the two base stations, we have the highest normalized data rate of the victim user for a primary user data rate of 20% in case 1 and 50% in case 2. This is because in case 1, the base station needs to significantly reduce the transmit power to the primary user when protecting a more vulnerable victim user located within its coverage.
Figure8 also shows that the accuracy to define{\stackrel{~}{h}}^{\mathit{\text{vc}}} is not so critical when d_{norm} ranges between 0.5 and 0.75, decreasing at most 20% of the data rate of the victim celledge user. To achieve the maximum performance for the victim user, from here on, we assume a victim user path loss at a distance d_{norm} = 0.5.
Complexity reduction of NFIWF
Since the channel conditions can change rapidly in a wireless environment, it is crucial from a practical point of view that the power allocation computation be performed with a small number of iterations. However, Equation 7 does not have a closed form since{P}_{k}^{\mathit{\text{NF}},c} depends on{s}_{k}^{c}. Therefore, we propose an approximation of the penalty factor that reduces the complexity of Algorithm 1 by eliminating the loop of line 11.
Let us first expand expression (4) into
We approximate (9) by linearizing the second term in the objective function such that the maximization problem becomes
For a linear equation of type ax + b, b is disregarded when applying the KKT conditions, while the slope a is included in w^{vc} when tuning a particular operating point. The KKT stationarity condition of (10) leads to
resulting in
where the penalty factor is approximated by
This corresponds to a linear penalty on the power level determined by the interfering channel of the victim users. In other words, the power allocation is proportionally penalized in those subcarriers with a strong interfering channel because this can easily damage the victim user data rate. This approximation results in a closedform formula with complexity similar to IWF (and lower than NFIWF) but improved performance as we will see later. We refer to it as NFIWFapprox.
Performance evaluation
We consider a wireless OFDM network with the parameters shown in Table1. In order to evaluate the performance of our approaches, we first focus on two users (one primary user and one victim user) connected to neighboring cells. We consider two scenarios, one with interference between macrocells and one with interference between a femtocell and a macrocell. For each scenario, we analyze two cases, one with a high and another with a low interference.
We compare our proposed approaches against EPA and IWF by generating the achievable rate region, which shows the tradeoff between the two user data rates. In the case of NFIWF and NFIWFapprox, changing the weights w^{c} and w^{vc} allows us to reach different fullpower operating points to form the achievable rate region. This is not possible with IWF, for which the total power budget has to be tuned between 0 and P^{c,tot} to obtain different operating points. This controllable tunability can be seen as an important advantage of NFIWF.
We also compare our proposed approaches with a practical scheme like SFR, in which we divide the total bandwidth into two nonoverlapping frequency bands. In order to achieve different operating points, we need to vary parameters α and β from Figure1. In the case of a multiuser scenario, each band is assigned to either primary or victim users and has a constant power level. However, in the case of two users connected to neighboring cells, the optimal approach consists in transmitting with full power to each user in one nonoverlapping band, i.e., in each cell α = 1 and β varies from 0 to 1 to achieve different operating points (discontiguous bands are not considered). In the multiuser case, this results in starvation of resources for some users.
As an upper bound, we consider the case in which the base station has full knowledge of the interfering and direct channels and of the power allocation of the neighboring base station. We call this approach NFfull, which is equivalent to the distributed algorithm (DSB) of Tsiaflakis et al.[22]. Evidently, this is not an autonomous approach, since it requires coordination between base stations.
For all the evaluated approaches, the transmit powers are updated alternately between base stations until network convergence is reached. In the following simulations, only three to five iterations are necessary for convergence.
Macromacro interference
The two cases to be analyzed for the macromacro scenario are shown in Figures6 and7. In case 1, the victim user is located within the coverage of the neighboring cell, resulting in a high interference. In case 2, the interference to the victim user is low as it is located between the coverage of the two cells.Figure9 shows the gains in the rate region that can be achieved with NFIWF in the case of a high interference. For example, with a primary user data rate of 600 Mbps, NFIWF can achieve 6 Mbps for the victim user instead of 1.7 Mbps for IWF, 0.4 Mbps for SFR, and 0.1 Mbps for EPA, i.e., an increase by a factor of 3.5 compared to IWF, a factor of 15 compared to SFR, and a factor of 60 compared to EPA. Furthermore, the difference between the approach with full knowledge and NFIWF proves to be marginal. NFIWFapprox can achieve similar gains with reduced complexity when the data rate of the primary user is lower than 500 Mbps. Needless to say, the underperformance and lack of tunability of EPA are evident. SFR is able to improve the performance for both primary and victim users compared to EPA, but not compared to IWF. This is because SFR partitions the available bandwidth in nonoverlapping bands, avoiding interference in this way. However, SFR does not exploit a variable persubcarrier power allocation, which results in a large degradation.Figure10 shows the rate region for the low interference case. Except for EPA and SFR, the performance of all algorithms is similar. This is because the direct channels are stronger compared to the interfering channels; hence, even a greedy algorithm like IWF has improved performance.
Femtomacro interference
The two cases to be analyzed for the scenario with femtomacro interference are shown in Figures11 and12. In case 1, the victim user of the macrocell is located within the coverage of the neighboring femtocell, resulting in a high interference. In case 2, the interference to the victim user is low as it is located far from the femtocell coverage.Figure13 shows that with a primary user data rate of 80 Mbps, NFIWF can achieve 1.45 Mbps for the victim user instead of 0.5 Mbps for IWF, 0.7 for SFR, and 0.02 Mbps for EPA, i.e., an increase by a factor of 2.9 compared to IWF, a factor of 2 compared to SFR, and a factor of 73 compared to EPA. For this primary user data rate, NFIWFapprox achieves the same gains. In the low interference case, all the algorithms perform similar except for EPA and SFR as seen in Figure14.
It is interesting to note that with a high interference, NFIWFapprox provided more than a 50% increase in the victim user data rate compared to IWF with less complexity than NFIWF. This result indicates that the linear approximation of the penalty factor indeed provides most of the useful information to achieve significant gains.
Multiuser multicell interference
The achievable rate regions presented so far show the advantages of our proposed approaches in a twouser evaluation. However, a multiuser multicell evaluation is needed to assess the total network gains.We consider a wireless heterogeneous network consisting of 5 macrocells (evenly distributed), 20 femtocells (randomly distributed), and 500 users (randomly distributed). Any two neighboring cells share a set of subcarriers and each user is randomly allocated the same number of consecutive subcarriers within a cell. This topology is shown in Figure3, and the performance results are shown in Figure15. The user color indicates the base station to which the users are attached. Users located within the coverage of their macrocell are classified as macro primary users, while users located farther than the coverage of their macrocell (i.e., closer to a neighboring cell than to the cell they are attached to) are classified as macro victim users and are those to be protected. Users attached to femtocells are classified as femto users.
For a fair comparison, all base stations use the same algorithm with the best rate region operating point for any two neighboring cells. For IWF, the best operating point corresponds to a fullpower scheme, while for SFR, NFIWF, NFIWFapprox, and NFfull, we consider a point on the rate region boundary with a tangent of slope equal to 1.From the cumulative distribution function (CDF) of Figure15, we can observe the gains achieved by our proposed approaches. As expected, NFfull achieves the best data rate performance for the macro victim users, followed closely by NFIWF and NFIWFapprox. IWF and EPA present a clear underperformance due to their greediness towards victim users, while the SFR suffers from the band partitioning and lack of power control within each band. For example, with the NF algorithms, macro victim users have a very large probability of obtaining a normalized data rate higher than 95%; while with SFR, IWF, and EPA, they have 40% probability of a normalized data rate lower than 70%, 50%, and 5%, respectively. Femto users achieve similar gains.
Additionally, the gains come with a marginal degradation in the macro primary user data rates. Since we consider the fullpower operating point for IWF, it achieves the highest data rate for the macro primary users, followed closely by NFfull, NFIWF, NFIWFapprox, and SFR. EPA can sometimes present a higher primary user data rate compared to SFR and NF algorithms. This is because, depending on the channel conditions, the EPA operating point can have a higher primary user data rate than the operating point of SFR and NF algorithms. However, the NF algorithms never achieve a normalized data rate lower than 75%.
Sensitivity analysis
In this section, we evaluate the data rate performance of our approaches for a given channel estimation error in all the channels with some frequency variation, i.e.,{h}_{k}^{c},{h}_{k}^{\stackrel{\u02c9}{c}}, and{h}_{k}^{\mathit{\text{vc}},c}. We model the channel estimation error Δ as a Gaussian random variable with zero mean and different values of standard deviation (std). A visual representation of the channel estimation error is shown in Figure16. The value of std represents a fraction of the average channel value.
The power allocation is then computed as
with the penalty factor of NFIWF modeled as
and the penalty factor of NFIWFapprox modeled as
where\stackrel{\u02c6}{h}=h+\mathrm{\Delta} for all channels, with h being the true channel (subscripts and superscripts omitted).
With the obtained power allocation values, we compute the achievable data rate for each cell as
Figure17 shows that our approaches are robust to very high channel estimation errors and can still present significant gains compared to IWF even with std = 1. It is also interesting to note that for small values of std, the primary user data rate can improve compared to the case without errors. This is because the primary user is less vulnerable to channel estimation errors and can profit from the power level decrease of the victim user.
Computational complexity for convergence
In this section, we quantify the computational complexity needed for each algorithm to converge to transmit powers satisfying the total power constraints. EPA and SFR do not need to update the transmit powers. All the NF algorithms have two or three levels of iterations as shown in Algorithm 1. First, there is an outer level that iterates over the base stations until network convergence in the power allocation is achieved. The number of iterations at this level is denoted with N_{ o }. A second level of iterations is used for the bisection search of λ_{ c } in each base station until the total power constraint is satisfied. The number of iterations at this level is denoted by N_{ λ }. These two levels of iterations are shared by IWF, NFIWF, and NFIWFapprox. However, NFIWF has an extra level of iterations on{P}_{k}^{\mathit{\text{NF}},c} to update{s}_{k}^{c}. The number of iterations at this level is denoted with N_{ P }.
The convergence properties of the proposed algorithms can be seen in Figure18 in terms of the number of iterations per subcarrier per base station, i.e., we evaluate the product N_{ λ }N_{ P }. We can observe that after ten iterations, all of the proposed algorithms reach convergence. However, NFIWFapprox is the first one to reach convergence at three iterations within a 10% range of the final value, followed by NFIWF at four iterations, and finally NFfull at six iterations. Since we consider the best operating point in the rate region of each algorithm, the different algorithms converge to a different value. Interesting to note is that both NFIWF and NFIWFapprox show a fluctuating behavior during the first iterations, while NFfull shows a smoother behavior. This is due to the approximations involved in NFIWF and NFIWFapprox that make the algorithms fluctuate before reaching convergence.
Within the different levels of iterations, the transmit power computation needs to be done on a persubcarrier basis, i.e., we need transmit power calculations. This leads to a total complexity in the number of power computations of{N}_{o}{N}_{\lambda}{N}_{P}\mathcal{K} for NFIWF and{N}_{o}{N}_{\lambda}\mathcal{K} for IWF and NFIWFapprox.
This complexity can be further reduced by exploiting the frequency correlation of the wireless channel. We analyze the impact of this complexity reduction for both NFIWF and NFIWFapprox. For this purpose, we define a window of wd subcarriers in which we reuse the transmit power value of one of the middle subcarriers. The data rate impact of this reduction can be seen in Figure19. We note that the degradation is marginal for a window of two and four subcarriers and becomes more visible for a window of eight subcarriers. A similar rationale can be used to exploit the time correlation of the channel.
Conclusions
In this paper, we have proposed NFIWF, a neighborfriendly autonomous algorithm for power control in wireless heterogeneous networks. In contrast to greedy algorithms like EPA and IWF, NFIWF protects the data rate of victim users located within a certain distance from the base station. This is done through a factor that penalizes the power allocation in those subcarriers that damage the data rate of victim users. Furthermore, we have developed a lowcomplexity version, NFIWFapprox, which reduces the complexity by assuming a linear approximation of the victim user data rate, resulting in a closedform formula. Other options have been analyzed to further reduce complexity by exploiting frequency and time correlation of the channel. We have evaluated our algorithms under high and low interference conditions in a heterogeneous network with macro and femtocells. Our approaches present higher tunability, robustness, and better data rate performance, especially in high interference conditions. We have shown an increase by a factor of 3.5 compared to IWF, 15 compared to SFR, and 60 compared to EPA in the victim user data rate with a marginal decrease of the primary user data rate. We have also shown that the rate region of our approaches lies close to the upper bound with full knowledge of the interfering channel and the power allocation of the neighboring cell.
References
Webb W: The european spectrum capacity crunch. [Online; accessed 6March2013], Available:, Sep. 2012 http://www.microwavejournal.com/articles/18176theeuropeanspectrumcapacitycrunch [Online; accessed 6March2013], Available:, Sep. 2012
Chapman O: Small cell vendors race to fulfill operator demand for LTE. [Online; accessed 11September2013], Available:, Feb. 2012 http://www.smallcellforum.org/newsstorysmallcellvendorsracetofulfilloperatordemandforlte [Online; accessed 11September2013], Available:, Feb. 2012
3GPP: Small cell forum  new name for 3GPP partner. [Online; accessed 6March2013], Available:, Feb. 2012 http://www.3gpp.org/SmallCellForumnewnamefor3GPP [Online; accessed 6March2013], Available:, Feb. 2012
Small Cell Forum [Online; accessed 6March2013], Available:, Feb. 2013 http://www.smallcellforum.org [Online; accessed 6March2013], Available:, Feb. 2013
Kosta C, Hunt B, UI Quddus A, Tafazolli R: On interference avoidance through intercell interference coordination (ICIC) based on OFDMA mobile systems. IEEE Commun. Surv. Tutor 2013, 15(3):123.
Wang T, Vandendorpe L: Iterative resource allocation for maximizing weighted sum minrate in downlink cellular OFDMA systems. IEEE Trans. Signal Process 2011, 59(1):223234.
LopezPerez D, Guvenc I, de la Roche G, Kountouris M, Quek TQS, Zhang J: Enhanced intercell interference coordination challenges in heterogeneous networks. IEEE Wireless Commun 2011, 18(3):2230.
Kwan R, Leung C: A survey of scheduling and interference mitigation in LTE. J. Electrical Comput. Eng 2010, 2010: 110.
Boudreau G, Panicker J, Guo N, Chang R, Wang N, Vrzic S: Interference coordination and cancellation for 4G networks. IEEE Commun. Mag 2009, 47(4):7481.
Necker M: Interference coordination in cellular OFDMA networks. IEEE Netw 2008, 22(6):1219.
3GPP: Soft frequency reuse scheme for UTRAN LTE. [Online; accessed 6March2013], Available:, R1050507, Athens, Greece, May 2005 ftp://ftp.3gpp.org/tsg_ran/WG1_RL1/TSGR1_41/Docs/R1050507.zip [Online; accessed 6March2013], Available:, R1050507, Athens, Greece, May 2005
Gonzalez G D, GarciaLozano M, Ruiz Boque S, Seop Lee D: Optimization of soft frequency reuse for irregular LTE macrocellular networks. IEEE Trans. Wireless Commun 2013, 12(5):24102423.
Oh S, Kim H, Ryu B, Park N: Inbound mobility management on LTEadvanced femtocell topology using X2 interface. In International Conference on Computer Communications and Networks (ICCCN). Maui, Hawaii; 2011.
Liu W, Hu C, Wei D, Peng M, Wang W: An overload indicator & high interference indicator hybrid scheme for intercell interference coordination in LTE system. In IEEE International Conference on Broadband Network and Multimedia Technology (ICBNMT). Beijing, China; 2010:514518.
Combes R, Altman Z, Haddad M, Altman E: Selfoptimizing strategies for interference coordination in OFDMA networks. In IEEE international conference on communications workshops (ICC). Kyoto, Japan; 2011.
Rahman M, Yanikomeroglu H, Wong W: Interference avoidance with dynamic intercell coordination for downlink LTE system. In IEEE Wireless Communications and Networking Conference (WCNC). Budapest, Hungary; 2009.
Fodor G, Koutsimanis C, Racz A, Reider N, Simonsson A, Muller W: Intercell interference coordination in OFDMA networks and in the 3GPP long term evolution system. Journal of Commun 2002, 4(7):445453.
3GPP: Evolved universal terrestrial radio access (EUTRA); overall description; stage 2 (release 11). [Online; accessed 6March2013], Available:, TS 36.300 V11.1.0, Mar. 2012 http://www.3gpp.org/ftp/Specs/archive/36_series/36.300/36300b10.zip [Online; accessed 6March2013], Available:, TS 36.300 V11.1.0, Mar. 2012
3GPP: Physical layer procedures. [Online; accessed 6March2013], Available:, TS 36.213 V10.2.0, Mar. 2012 http://www.3gpp.org/ftp/Specs/archive/36_series/36.213/36213a20.zip [Online; accessed 6March2013], Available:, TS 36.213 V10.2.0, Mar. 2012
Yu W, Ginis G, Cioffi J: Distributed multiuser power control for digital subscriber lines. IEEE Trans. Selected Areas Commun 2002, 20(5):11051115. 10.1109/JSAC.2002.1007390
Cendrillon R, Huang J, Chiang M, Moonen M: Autonomous spectrum balancing for digital subscriber lines. IEEE Trans. Signal Process 2007, 55(8):42414257.
Tsiaflakis P, Diehl M, Moonen M: Distributed spectrum management algorithms for multiuser DSL networks. IEEE Trans. Signal Process 2008, 56(2):48254843.
Son K, Lee S, Yi Y, Chong S: REFIM: A practical interference management in heterogeneous wireless access networks. IEEE Trans. Selected Areas Commun 2011., 29(6):
3GPP: Spatial channel model for multiple input multiple output (MIMO) simulations. [Online; accessed 6March2013], Available:, TR 25.996, v11.0.0, Sep. 2012 http://www.3gpp.org/ftp/Specs/archive/25_series/25.996/25996b00.zip [Online; accessed 6March2013], Available:, TR 25.996, v11.0.0, Sep. 2012
Cendrillon R, Yu W, Moonen M, Verlinden J, Bostoen T: Optimal multiuser spectrum balancing for digital subscriber lines. IEEE Trans. Commun 2006, 54(5):922933.
3GPP: Considerations on interference coordination in heterogeneous networks. [Online; accessed 6March2013], Available:, R1101369, San Francisco, CA, Feb. 2010 http://www.3gpp.org/ftp/tsg_ran/WG1_RL1/TSGR1_59b/Docs/R1100236.zip [Online; accessed 6March2013], Available:, R1101369, San Francisco, CA, Feb. 2010
3GPP: Summary of the description of candidate eICIC solutions. [Online; accessed 6March2013], Available:, R1104968, Madrid, Spain, Aug. 2010 http://www.3gpp.org/ftp/tsg_ran/WG1_RL1/TSGR1_62/Docs/R1105081.zip [Online; accessed 6March2013], Available:, R1104968, Madrid, Spain, Aug. 2010
Yang T, Zhang L: Approaches to enhancing autonomous power control at femto under cochannel deployment of macrocell and femtocell. In IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications. Toronto, Canada; 2011.
Acknowledgments
This research work was carried out at the ESAT Laboratory of KU Leuven, in the frame of KU Leuven Research Council PFV/10/002 (OPTEC), Concerted Research Action GOAMaNet, FWO project G091213N ‘Crosslayer optimization with realtime adaptive dynamic spectrum management for fourth generation broadband access networks’, and the Belgian Programme on Interuniversity Attraction Poles initiated by the Belgian Federal Science Policy Office: IUAP ‘Belgian network on Stochastic modelling, analysis, design and optimization of communication systems’ (BESTCOM) 20122017. The scientific responsibility is assumed by its authors. The first author acknowledges the support of the Mexican National Council for Science and Technology (CONACYT). Part of this work has been submitted for presentation at the 11th International Symposium on Wireless Communication Systems (ISWCS), Barcelona, August, 2014.
Author information
Authors and Affiliations
Corresponding author
Additional information
Competing interests
The authors declare that they have no competing interests.
Authors’ original submitted files for images
Below are the links to the authors’ original submitted files for images.
Rights and permissions
Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0), which permits use, duplication, adaptation, distribution, and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.
About this article
Cite this article
TorreaDuran, R., Tsiaflakis, P., Vandendorpe, L. et al. Neighborfriendly autonomous power control in wireless heterogeneous networks. J Wireless Com Network 2014, 175 (2014). https://doi.org/10.1186/168714992014175
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/168714992014175