- Research
- Open Access

# Neighbor-friendly autonomous power control in wireless heterogeneous networks

- Rodolfo Torrea-Duran
^{1}Email author, - Paschalis Tsiaflakis
^{2}, - Luc Vandendorpe
^{3}and - Marc Moonen
^{1}

**2014**:175

https://doi.org/10.1186/1687-1499-2014-175

© Torrea-Duran et al.; licensee Springer. 2014

**Received:**19 June 2014**Accepted:**17 October 2014**Published:**24 October 2014

## Abstract

The widespread deployment of base stations constitutes a promising solution to cope with the ever-increasing wireless data rate demands. However, it also increases the interference levels, especially at the cell-edge. Most interference management techniques assume coordination between base stations, which involves undesired overhead and delays. To solve this problem, we propose a neighbor-friendly autonomous algorithm for power control in wireless heterogeneous networks that protects victim users from neighboring cells through a penalty factor in the power allocation level. We refer to this algorithm as neighbor-friendly iterative waterfilling (NF-IWF). In addition, we propose a low-complexity closed-form version that fixes the penalty factor by assuming a linear approximation of the victim user data rate. In high interference conditions, it can achieve a victim user data rate increase by a factor of 3.5 compared to IWF, 15 compared to soft frequency reuse (SFR), and 60 compared to equal power allocation (EPA) with a marginal decrease of the primary user data rate.

## Keywords

- Interference management
- Heterogeneous networks
- Autonomous power control

## Introduction

The boost of novel wireless applications is producing an ever-increasing demand for larger data rates.

Furthermore, the massive market penetration of smartphones adds more pressure to network operators, mobile manufacturers, and standardization groups to satisfy the demands of an ever-larger number of users.

Improvements from a physical layer perspective have shown a low potential to deal with these demands. For instance, considering new coding techniques, link adaptation, and larger bandwidths, from 1950 to 2000, the network capacity gains have increased by a factor of 5 from the first, a factor of 5 from the second, and a factor of 15 from the third.

Surprisingly, just from the deployment of more (smaller) cells, the network capacity gains have increased by an overwhelming factor of 2,700[1].

Femtocells offer the easiest and most cost-effective way to increase the current cell deployment[2].

These are low-power base stations mainly for indoor usage with a coverage of tens of meters, compared to a few kilometers of high-power base stations, or macrocells. The coexistence of different types of cells in the same area is referred to as a heterogeneous network.

Most urban areas are already fully covered by macrocells. Hence, the addition of more cells in these areas creates serious inter-cell interference problems in both uplink and downlink transmissions, especially in closed-access mode. In this paper, we focus on the downlink transmission. Since femtocells are likely to be deployed in an unplanned manner by end-users and not by network operators, this problem is only going to grow in the coming years[3, 4].

Base stations play a crucial role in dealing with an inter-cell interference. The power and time-frequency resources they allocate to users within the cell have an impact on users from neighboring cells. The impact is especially high for users located at the cell-edge.

Therefore, the implementation of inter-cell interference coordination (ICIC) techniques is of paramount importance. Nevertheless, most of the ICIC techniques allocate separate resources to neighboring cells, i.e., they exploit resource orthogonalization[5–10]. This is usually done in the frequency domain or in the time domain, while variable power levels are rarely exploited. Thus, in this paper, we focus on and advocate for power control schemes that control an inter-cell interference by sharing (rather than orthogonalizing) resources.

This approach offers a simple way to deal with frequency and power allocation jointly without interference but with the disadvantage of a fixed allocation of frequency bands and transmit powers. The optimization of SFR is usually done by adapting parameters *α* and *β*, which represent the total power fraction and total bandwidth fraction of the center user band, respectively[12]. However, this can only be achieved through network coordination.

To support coordination between base stations, a dedicated backhaul link is required. In LTE, the X2 interface between macrocells helps to configure dynamically the frequency bands and power levels[13–17].

However, this interface is not yet standardized between macro- and femtocells in early versions of LTE release[11, 18, 19]. Even with an interface available, the dynamics of the wireless channel and the variability in the number of users attached to a cell, users’ location, and interference conditions, this coordination constitutes a significant information overhead resulting in large delays.

An alternative approach is that each base station optimizes its own resource allocation without any information exchange. We refer to it as an autonomous algorithm.

Two well-known autonomous power control algorithms for OFDM networks are equal power allocation (EPA) and iterative waterfilling (IWF)[20]. In EPA, the total transmit power is allocated equally in all available subcarriers. In IWF, each base station maximizes its own data rate in a greedy way by allocating more power to those subcarriers with the best channel to interference and noise ratio (CINR), without considering the interference caused to victim users from neighboring cells.

Non-greedy autonomous power control algorithms have been studied in the context of digital subscriber line (DSL) networks.

In[21] and[22], low-complexity autonomous power control algorithms for DSL, called ASB and ASB-2 are presented, which allow a non-orthogonalized share of resources. The concept of a protected reference line (or reference user) is introduced in these papers as a statistical average of all victim lines suffering interference. However, the implementation of these algorithms in practical wireless networks imposes a challenge given the multi-user scheduling and non-stationarity of the wireless channel.

A first attempt was made in[23] to apply the previous concept to a wireless network where the user suffering the strongest interference from the neighboring cells is selected as the reference user. However, this scheme is not autonomous since it needs periodical information exchange between base stations to adapt to the time-varying reference user channel characteristics.

To tackle the mentioned problems, we propose in this paper a neighbor-friendly autonomous algorithm for power control in wireless heterogeneous networks. It protects victim users within a certain distance from the base station through a frequency-dependent penalty factor in the power allocation level. The level of protection can be tuned to provide individualized quality of service (QoS). We refer to this algorithm as neighbor-friendly iterative waterfilling (NF-IWF). Additionally, we propose a low-complexity closed-form version that fixes the penalty factor by assuming a linear approximation of the data rate of the victim users.

- 1.
A power control algorithm that protects victim users from neighboring cells located at a distance from the base station without any coordination between base stations.

- 2.
A practical way to tune the protection to victim users from neighboring cells.

- 3.
A practical way to obtain the channel information of victim users attached to neighboring cells without communication between base stations.

- 4.
A low-complexity closed-form version of the previous algorithm by assuming a linear approximation of the data rate of the victim users.

- 5.
The exploitation of frequency and time correlation of the wireless channel to further reduce the complexity of the algorithm.

## IWF-based power control

Autonomous algorithms do not rely on information between base stations, they only exploit locally available (and *a priori* known) information about the environment such as direct channel gains, received interference, and noise.

where *R*^{
c
} is the data rate of all users in cell *c*; *f*_{
s
} is the symbol rate;${b}_{k}^{c}$,${h}_{k}^{c}$,${\sigma}_{k}^{c}$,${s}_{k}^{c}$, and${s}_{k}^{c,\text{mask}}$ are the bit loading for a standard interference channel model, the channel transfer function, the noise power, the base station transmit power, and the spectral emission mask constraints on subcarrier *k* in cell *c*, respectively;${h}_{k}^{\stackrel{\u02c9}{c}}$ and${s}_{k}^{\stackrel{\u02c9}{c}}$ are the channel transfer function and transmit power on subcarrier *k* from the interfering cell$\stackrel{\u02c9}{c}$, which are both assumed to be known as they affect users in cell *c*. We call${h}_{k}^{c}$ the direct channel and${h}_{k}^{\stackrel{\u02c9}{c}}$ the interfering channel of the users attached to cell *c*. The parameters
and
are the set of available cells and subcarriers, respectively, and *P*^{c,tot} is the total power budget in cell *c*. A given subcarrier can only be allocated to one user in cell *c*, but it can also be allocated to a user from a neighboring cell resulting in an inter-cell interference. The allocation of subcarriers to users in cell *c* can be done prior to the power allocation strategies described in this paper (based, for example, on instantaneous channel conditions or iteratively with the power allocation). However, our focus is only on the power allocation. A joint autonomous power and subcarrier allocation algorithm is nevertheless an interesting scenario that we will study for future work. The parameter Γ denotes the signal-to-noise ratio (SNR) gap to capacity, which depends on the desired bit error rate (BER), the coding gain, and the noise margin. We will assume it to be equal to 1 without loss of generality.

where${\left[x\right]}_{a}^{b}=max(a,min(x,b))$ and *λ*_{
c
} is the Lagrange multiplier that should be updated (e.g., with bisection) to satisfy the corresponding total power constraint *P*^{c,tot}.

*d*)-dependent path loss of 31.5 + 35 log

_{10}(

*d*[

*m*]). We show in Figure2 the difference between the data rates obtained using IWF and EPA of a user moving along every possible location on this area. The results can be seen in a tri-dimensional plot where the

*x*and

*y*axes correspond to the area, and the

*z*axis corresponds to the data rate difference between IWF and EPA. A maximum difference of 400 Mbps can be observed, interestingly, at the cell-edge of neighboring cells.This scenario becomes more critical when femtocells are deployed. We now introduce into the previous network topology 20 femtocells randomly distributed (i.e., deployed in an unplanned manner), each with a 15 dBm total transmit power. The exact location of each base station can be seen in Figure3. We compute again the difference between the data rates obtained using IWF and EPA of a user moving along every possible location. The results are shown in Figure4. The femtocells’ deployment results in more severe interference problems, especially at the cell-edges. Remarkably, a maximum difference of 1,250 Mbps can be observed at the cell-edge of multiple interfering cells (macro- and femtocells). This again shows the potential gains exploiting locally available information.

The advantage of IWF is its simplicity, its closed-form solution, and the fact that it does not need any information exchange between base stations. However, each cell maximizes its own data rate in a greedy fashion by allocating power especially to those subcarriers with the best CINR, without considering the interference caused to victim users from neighboring cells.

## Neighbor-friendly autonomous power control

### Victim users protection with NF-IWF

Our aim is therefore to design a neighbor-friendly approach that, without any information exchange in the network, limits this damage.

*c*, or primary users, denoted as

*R*

^{ c }and the data rate of victim users attached to one neighboring cell, denoted as

*R*

^{ vc }. Both cells share the set of subcarriers . Adding extra optimization terms for other neighboring cells only brings minimal performance at a high-complexity cost since most of the per-subcarrier interference comes from one base station[23]. However, other neighboring cells can be considered if they share a different set of subcarriers with cell

*c*. Again, the subcarrier allocation to users is assumed to be done prior to the power allocation.

where${b}_{k}^{\mathit{\text{vc}}}$,${h}_{k}^{\mathit{\text{vc}}}$,${s}_{k}^{\mathit{\text{vc}}}$, and${\sigma}_{k}^{\mathit{\text{vc}}}$ are the bit loading, the direct channel, the transmit power, and the noise power on subcarrier *k* of the victim user, respectively, and${h}_{k}^{\mathit{\text{vc}},c}$ is the interfering channel on subcarrier *k* from cell *c* to a victim user. *w*^{
c
} and *w*^{
vc
} are the weights of the primary users and the victim users, respectively. We assume *w*^{
c
} equal for all primary users and *w*^{
vc
} equal for all victim users. We consider that *w*^{
c
} = 1 - *w*^{
vc
}, which represents a trade-off between protecting victim users of a neighboring cell at the cost of degrading the data rate of primary users. In practice, these weights can be chosen based on upper layer information such as queue length or quality of service requirements. Setting *w*^{
vc
} = 0 shifts to a greedy algorithm like IWF, which can be useful when interference between neighboring cells is negligible.

Note the similarity with the IWF solution. The first term in Equation 7 corresponds to a power level with per-subcarrier penalty factor${P}_{k}^{\mathit{\text{NF}},c}$ that reduces the interference to victim users from a neighboring cell. Setting${P}_{k}^{\mathit{\text{NF}},c}$ to zero will reduce to the IWF algorithm. However, in contrast to Equation 3, this is a fixed-point equation as${P}_{k}^{\mathit{\text{NF}},c}$ depends on${s}_{k}^{c}$.

Problem 4 is a nonconvex function for which a duality gap exists to the optimal solution. However, as the number of subcarriers increase, this duality gap becomes zero and it can be solved via bisection[25].

By adding to Equation 7 a bisection search on the Lagrange multiplier to satisfy the total cell power constraint, we obtain Algorithm 1, which we refer to as NF-IWF. The parameter *δ* indicates the accuracy of the total power constraint, *γ* indicates the stopping criterion of the bisection search on *λ*_{
c
} in the case of an inactive total power constraint, and Λ^{max} is the maximum value for *λ*_{
c
}.

The transmit powers of the neighboring cells${s}_{k}^{\mathit{\text{vc}}}$ are assumed as an EPA without performance degradation as observed in later sections.

The challenge of implementing NF-IWF in a wireless network resides on obtaining the parameters in Equation 8 in an autonomous way. For example,${h}_{k}^{\mathit{\text{vc}},c}$ can be obtained from the channel feedback of victim users when scanning pilot signals of a neighboring cell for a potential handover[26, 27]. However, the direct channel${h}_{k}^{\mathit{\text{vc}}}$ can only be known from the information received from other base stations.

Therefore, we propose in the ‘Estimation of the victim user channel’ section a novel approach to estimate${h}_{k}^{\mathit{\text{vc}}}$ based on the distance from the base station to the cell-edge.

### Estimation of the victim user channel

Full knowledge of${h}_{k}^{\mathit{\text{vc}}}$ is unfeasible in an autonomous fashion.

Nevertheless, the path loss, i.e., the average channel gain over all the allocated subcarriers, is easier to obtain because it mainly depends on the distance to the base station. Since the signal strength coming from two neighboring base stations can be considered equal at the cell-edge (this is how the cell-edge is typically defined), the path loss from each base station to the cell-edge can be known. This can be exploited to approximate the direct channel of any victim user (${h}_{k}^{\mathit{\text{vc}}}$) by using the path loss from the base station to the cell-edge. Therefore,${\stackrel{~}{h}}^{\mathit{\text{vc}}}$ is assumed to be an average over all the available subcarriers such that any user located at a distance *d* from the base station would present the same average channel and experience the same path loss given by 31.5 + 35 log_{10}(*d*[*m*])[24]. This results in a constant value for${h}_{k}^{\mathit{\text{vc}}}$ along all the set of subcarriers
, i.e.,${h}_{k}^{\mathit{\text{vc}}}={\stackrel{~}{h}}^{\mathit{\text{vc}}}\phantom{\rule{2.77626pt}{0ex}}\forall k\in \mathcal{K}$ where${\stackrel{~}{h}}^{\mathit{\text{vc}}}=\frac{1}{\mathcal{K}}{\sum}_{k=1}^{\mathcal{K}}{h}_{k}^{c}$. Even though an irregular propagation channel (i.e., with shadowing) might affect each victim user differently, we will see later that${\stackrel{~}{h}}^{\mathit{\text{vc}}}$ is a good approximation for the direct channel of all potential victim users if${h}_{k}^{\mathit{\text{vc}},c}$ of each user is known.

To estimate *d* in practice, we can use the information available at the base station on the channel estimated by new users entering the cell[28] or predefined by the manufacturer. As we will see later, an exact definition of *d* is not necessary for improved performance.

Furthermore, this information does not need to be updated regularly (since the cell-edge will only be modified when a new base station is deployed in the neighborhood).

*c*) and a low interference case 2 (where the victim user is at the cell-edge) as reconstructed in Figure6 and Figure7, respectively. MBS stands for macro base station, and FBS stands for femto base station. The color regions indicate the signal strength in the direct channel to the closest base station, and the user color indicates the base station to which the user is attached.

We assume that there is no handover, like in a closed-access base station.

*d*, but keeping the users’ positions as in Figure5 and Figure6. The distance

*d*is then varied between 0 and the actual distance between base stations and it is normalized such that

*d*

_{norm}= 0 means a radius of zero and

*d*

_{norm}= 1 means a radius equal to the distance between both base stations (

*d*

_{BS}). The smaller the path loss distance, the more protection to the victim user at the cost of the primary user data rate.

At *d*_{norm} = 0.5, i.e., between the two base stations, we have the highest normalized data rate of the victim user for a primary user data rate of 20% in case 1 and 50% in case 2. This is because in case 1, the base station needs to significantly reduce the transmit power to the primary user when protecting a more vulnerable victim user located within its coverage.

Figure8 also shows that the accuracy to define${\stackrel{~}{h}}^{\mathit{\text{vc}}}$ is not so critical when *d*_{norm} ranges between 0.5 and 0.75, decreasing at most 20% of the data rate of the victim cell-edge user. To achieve the maximum performance for the victim user, from here on, we assume a victim user path loss at a distance *d*_{norm} = 0.5.

### Complexity reduction of NF-IWF

Since the channel conditions can change rapidly in a wireless environment, it is crucial from a practical point of view that the power allocation computation be performed with a small number of iterations. However, Equation 7 does not have a closed form since${P}_{k}^{\mathit{\text{NF}},c}$ depends on${s}_{k}^{c}$. Therefore, we propose an approximation of the penalty factor that reduces the complexity of Algorithm 1 by eliminating the loop of line 11.

*ax*+

*b*,

*b*is disregarded when applying the KKT conditions, while the slope

*a*is included in

*w*

^{ vc }when tuning a particular operating point. The KKT stationarity condition of (10) leads to

This corresponds to a linear penalty on the power level determined by the interfering channel of the victim users. In other words, the power allocation is proportionally penalized in those subcarriers with a strong interfering channel because this can easily damage the victim user data rate. This approximation results in a closed-form formula with complexity similar to IWF (and lower than NF-IWF) but improved performance as we will see later. We refer to it as NF-IWF-approx.

## Performance evaluation

**Simulation parameters**

Parameter | Value |
---|---|

System bandwidth | 5 MHz |

Number of subcarriers | 200 |

Γ | 1 |

| 10 |

| 10 |

Λ | 10 |

| 2.8 Gsymbols/s |

Channel profile | 3GPP SCM suburban macro |

Macrocell total transmit power | 43 dBm |

Femtocell total transmit power | 15 dBm |

We compare our proposed approaches against EPA and IWF by generating the achievable rate region, which shows the trade-off between the two user data rates. In the case of NF-IWF and NF-IWF-approx, changing the weights *w*^{
c
} and *w*^{
vc
} allows us to reach different full-power operating points to form the achievable rate region. This is not possible with IWF, for which the total power budget has to be tuned between 0 and *P*^{c,tot} to obtain different operating points. This controllable tunability can be seen as an important advantage of NF-IWF.

We also compare our proposed approaches with a practical scheme like SFR, in which we divide the total bandwidth into two non-overlapping frequency bands. In order to achieve different operating points, we need to vary parameters *α* and *β* from Figure1. In the case of a multi-user scenario, each band is assigned to either primary or victim users and has a constant power level. However, in the case of two users connected to neighboring cells, the optimal approach consists in transmitting with full power to each user in one non-overlapping band, i.e., in each cell *α* = 1 and *β* varies from 0 to 1 to achieve different operating points (discontiguous bands are not considered). In the multi-user case, this results in starvation of resources for some users.

As an upper bound, we consider the case in which the base station has full knowledge of the interfering and direct channels and of the power allocation of the neighboring base station. We call this approach NF-full, which is equivalent to the distributed algorithm (DSB) of Tsiaflakis et al.[22]. Evidently, this is not an autonomous approach, since it requires coordination between base stations.

For all the evaluated approaches, the transmit powers are updated alternately between base stations until network convergence is reached. In the following simulations, only three to five iterations are necessary for convergence.

### Macro-macro interference

### Femto-macro interference

It is interesting to note that with a high interference, NF-IWF-approx provided more than a 50% increase in the victim user data rate compared to IWF with less complexity than NF-IWF. This result indicates that the linear approximation of the penalty factor indeed provides most of the useful information to achieve significant gains.

### Multi-user multi-cell interference

For a fair comparison, all base stations use the same algorithm with the best rate region operating point for any two neighboring cells. For IWF, the best operating point corresponds to a full-power scheme, while for SFR, NF-IWF, NF-IWF-approx, and NF-full, we consider a point on the rate region boundary with a tangent of slope equal to -1.From the cumulative distribution function (CDF) of Figure15, we can observe the gains achieved by our proposed approaches. As expected, NF-full achieves the best data rate performance for the macro victim users, followed closely by NF-IWF and NF-IWF-approx. IWF and EPA present a clear underperformance due to their greediness towards victim users, while the SFR suffers from the band partitioning and lack of power control within each band. For example, with the NF algorithms, macro victim users have a very large probability of obtaining a normalized data rate higher than 95%; while with SFR, IWF, and EPA, they have 40% probability of a normalized data rate lower than 70%, 50%, and 5%, respectively. Femto users achieve similar gains.

Additionally, the gains come with a marginal degradation in the macro primary user data rates. Since we consider the full-power operating point for IWF, it achieves the highest data rate for the macro primary users, followed closely by NF-full, NF-IWF, NF-IWF-approx, and SFR. EPA can sometimes present a higher primary user data rate compared to SFR and NF algorithms. This is because, depending on the channel conditions, the EPA operating point can have a higher primary user data rate than the operating point of SFR and NF algorithms. However, the NF algorithms never achieve a normalized data rate lower than 75%.

## Sensitivity analysis

*std*). A visual representation of the channel estimation error is shown in Figure16. The value of

*std*represents a fraction of the average channel value.

where$\stackrel{\u02c6}{h}=h+\mathrm{\Delta}$ for all channels, with *h* being the true channel (subscripts and superscripts omitted).

*std*= 1. It is also interesting to note that for small values of

*std*, the primary user data rate can improve compared to the case without errors. This is because the primary user is less vulnerable to channel estimation errors and can profit from the power level decrease of the victim user.

## Computational complexity for convergence

In this section, we quantify the computational complexity needed for each algorithm to converge to transmit powers satisfying the total power constraints. EPA and SFR do not need to update the transmit powers. All the NF algorithms have two or three levels of iterations as shown in Algorithm 1. First, there is an outer level that iterates over the base stations until network convergence in the power allocation is achieved. The number of iterations at this level is denoted with *N*_{
o
}. A second level of iterations is used for the bisection search of *λ*_{
c
} in each base station until the total power constraint is satisfied. The number of iterations at this level is denoted by *N*_{
λ
}. These two levels of iterations are shared by IWF, NF-IWF, and NF-IWF-approx. However, NF-IWF has an extra level of iterations on${P}_{k}^{\mathit{\text{NF}},c}$ to update${s}_{k}^{c}$. The number of iterations at this level is denoted with *N*_{
P
}.

*N*

_{ λ }

*N*

_{ P }. We can observe that after ten iterations, all of the proposed algorithms reach convergence. However, NF-IWF-approx is the first one to reach convergence at three iterations within a 10% range of the final value, followed by NF-IWF at four iterations, and finally NF-full at six iterations. Since we consider the best operating point in the rate region of each algorithm, the different algorithms converge to a different value. Interesting to note is that both NF-IWF and NF-IWF-approx show a fluctuating behavior during the first iterations, while NF-full shows a smoother behavior. This is due to the approximations involved in NF-IWF and NF-IWF-approx that make the algorithms fluctuate before reaching convergence.

Within the different levels of iterations, the transmit power computation needs to be done on a per-subcarrier basis, i.e., we need transmit power calculations. This leads to a total complexity in the number of power computations of${N}_{o}{N}_{\lambda}{N}_{P}\mathcal{K}$ for NF-IWF and${N}_{o}{N}_{\lambda}\mathcal{K}$ for IWF and NF-IWF-approx.

*wd*subcarriers in which we reuse the transmit power value of one of the middle subcarriers. The data rate impact of this reduction can be seen in Figure19. We note that the degradation is marginal for a window of two and four subcarriers and becomes more visible for a window of eight subcarriers. A similar rationale can be used to exploit the time correlation of the channel.

## Conclusions

In this paper, we have proposed NF-IWF, a neighbor-friendly autonomous algorithm for power control in wireless heterogeneous networks. In contrast to greedy algorithms like EPA and IWF, NF-IWF protects the data rate of victim users located within a certain distance from the base station. This is done through a factor that penalizes the power allocation in those subcarriers that damage the data rate of victim users. Furthermore, we have developed a low-complexity version, NF-IWF-approx, which reduces the complexity by assuming a linear approximation of the victim user data rate, resulting in a closed-form formula. Other options have been analyzed to further reduce complexity by exploiting frequency and time correlation of the channel. We have evaluated our algorithms under high and low interference conditions in a heterogeneous network with macro- and femtocells. Our approaches present higher tunability, robustness, and better data rate performance, especially in high interference conditions. We have shown an increase by a factor of 3.5 compared to IWF, 15 compared to SFR, and 60 compared to EPA in the victim user data rate with a marginal decrease of the primary user data rate. We have also shown that the rate region of our approaches lies close to the upper bound with full knowledge of the interfering channel and the power allocation of the neighboring cell.

## Declarations

### Acknowledgments

This research work was carried out at the ESAT Laboratory of KU Leuven, in the frame of KU Leuven Research Council PFV/10/002 (OPTEC), Concerted Research Action GOA-MaNet, FWO project G091213N ‘Cross-layer optimization with real-time adaptive dynamic spectrum management for fourth generation broadband access networks’, and the Belgian Programme on Interuniversity Attraction Poles initiated by the Belgian Federal Science Policy Office: IUAP ‘Belgian network on Stochastic modelling, analysis, design and optimization of communication systems’ (BESTCOM) 2012-2017. The scientific responsibility is assumed by its authors. The first author acknowledges the support of the Mexican National Council for Science and Technology (CONACYT). Part of this work has been submitted for presentation at the 11th International Symposium on Wireless Communication Systems (ISWCS), Barcelona, August, 2014.

## Authors’ Affiliations

## References

- Webb W: The european spectrum capacity crunch. [Online; accessed 6-March-2013], Available:, Sep. 2012 http://www.microwavejournal.com/articles/18176-the-european-spectrum-capacity-crunch [Online; accessed 6-March-2013], Available:, Sep. 2012Google Scholar
- Chapman O: Small cell vendors race to fulfill operator demand for LTE. [Online; accessed 11-September-2013], Available:, Feb. 2012 http://www.smallcellforum.org/newsstory-small-cell-vendors-race-to-fulfill-operator-demand-for-lte [Online; accessed 11-September-2013], Available:, Feb. 2012Google Scholar
- 3GPP: Small cell forum - new name for 3GPP partner. [Online; accessed 6-March-2013], Available:, Feb. 2012 http://www.3gpp.org/Small-Cell-Forum-new-name-for-3GPP [Online; accessed 6-March-2013], Available:, Feb. 2012Google Scholar
- Small Cell Forum [Online; accessed 6-March-2013], Available:, Feb. 2013 http://www.smallcellforum.org [Online; accessed 6-March-2013], Available:, Feb. 2013
- Kosta C, Hunt B, UI Quddus A, Tafazolli R: On interference avoidance through inter-cell interference coordination (ICIC) based on OFDMA mobile systems.
*IEEE Commun. Surv. Tutor*2013, 15(3):1-23.View ArticleGoogle Scholar - Wang T, Vandendorpe L: Iterative resource allocation for maximizing weighted sum min-rate in downlink cellular OFDMA systems.
*IEEE Trans. Signal Process*2011, 59(1):223-234.MathSciNetView ArticleGoogle Scholar - Lopez-Perez D, Guvenc I, de la Roche G, Kountouris M, Quek TQS, Zhang J: Enhanced inter-cell interference coordination challenges in heterogeneous networks.
*IEEE Wireless Commun*2011, 18(3):22-30.View ArticleGoogle Scholar - Kwan R, Leung C: A survey of scheduling and interference mitigation in LTE.
*J. Electrical Comput. Eng*2010, 2010: 1-10.View ArticleGoogle Scholar - Boudreau G, Panicker J, Guo N, Chang R, Wang N, Vrzic S: Interference coordination and cancellation for 4G networks.
*IEEE Commun. Mag*2009, 47(4):74-81.View ArticleGoogle Scholar - Necker M: Interference coordination in cellular OFDMA networks.
*IEEE Netw*2008, 22(6):12-19.View ArticleGoogle Scholar - 3GPP: Soft frequency reuse scheme for UTRAN LTE. [Online; accessed 6-March-2013], Available:, R1-050507, Athens, Greece, May 2005 ftp://ftp.3gpp.org/tsg_ran/WG1_RL1/TSGR1_41/Docs/R1-050507.zip [Online; accessed 6-March-2013], Available:, R1-050507, Athens, Greece, May 2005Google Scholar
- Gonzalez G D, Garcia-Lozano M, Ruiz Boque S, Seop Lee D: Optimization of soft frequency reuse for irregular LTE macrocellular networks.
*IEEE Trans. Wireless Commun*2013, 12(5):2410-2423.View ArticleGoogle Scholar - Oh S, Kim H, Ryu B, Park N: Inbound mobility management on LTE-advanced femtocell topology using X2 interface. In
*International Conference on Computer Communications and Networks (ICCCN)*. Maui, Hawaii; 2011.Google Scholar - Liu W, Hu C, Wei D, Peng M, Wang W: An overload indicator & high interference indicator hybrid scheme for inter-cell interference coordination in LTE system. In
*IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT)*. Beijing, China; 2010:514-518.Google Scholar - Combes R, Altman Z, Haddad M, Altman E: Self-optimizing strategies for interference coordination in OFDMA networks. In
*IEEE international conference on communications workshops (ICC)*. Kyoto, Japan; 2011.Google Scholar - Rahman M, Yanikomeroglu H, Wong W: Interference avoidance with dynamic inter-cell coordination for downlink LTE system. In
*IEEE Wireless Communications and Networking Conference (WCNC)*. Budapest, Hungary; 2009.Google Scholar - Fodor G, Koutsimanis C, Racz A, Reider N, Simonsson A, Muller W: Intercell interference coordination in OFDMA networks and in the 3GPP long term evolution system.
*Journal of Commun*2002, 4(7):445-453.Google Scholar - 3GPP: Evolved universal terrestrial radio access (EUTRA); overall description; stage 2 (release 11). [Online; accessed 6-March-2013], Available:, TS 36.300 V11.1.0, Mar. 2012 http://www.3gpp.org/ftp/Specs/archive/36_series/36.300/36300-b10.zip [Online; accessed 6-March-2013], Available:, TS 36.300 V11.1.0, Mar. 2012Google Scholar
- 3GPP: Physical layer procedures. [Online; accessed 6-March-2013], Available:, TS 36.213 V10.2.0, Mar. 2012 http://www.3gpp.org/ftp/Specs/archive/36_series/36.213/36213-a20.zip [Online; accessed 6-March-2013], Available:, TS 36.213 V10.2.0, Mar. 2012Google Scholar
- Yu W, Ginis G, Cioffi J: Distributed multiuser power control for digital subscriber lines.
*IEEE Trans. Selected Areas Commun*2002, 20(5):1105-1115. 10.1109/JSAC.2002.1007390View ArticleGoogle Scholar - Cendrillon R, Huang J, Chiang M, Moonen M: Autonomous spectrum balancing for digital subscriber lines.
*IEEE Trans. Signal Process*2007, 55(8):4241-4257.MathSciNetView ArticleGoogle Scholar - Tsiaflakis P, Diehl M, Moonen M: Distributed spectrum management algorithms for multiuser DSL networks.
*IEEE Trans. Signal Process*2008, 56(2):4825-4843.MathSciNetView ArticleGoogle Scholar - Son K, Lee S, Yi Y, Chong S: REFIM: A practical interference management in heterogeneous wireless access networks. IEEE Trans. Selected Areas Commun 2011., 29(6):Google Scholar
- 3GPP: Spatial channel model for multiple input multiple output (MIMO) simulations. [Online; accessed 6-March-2013], Available:, TR 25.996, v11.0.0, Sep. 2012 http://www.3gpp.org/ftp/Specs/archive/25_series/25.996/25996-b00.zip [Online; accessed 6-March-2013], Available:, TR 25.996, v11.0.0, Sep. 2012Google Scholar
- Cendrillon R, Yu W, Moonen M, Verlinden J, Bostoen T: Optimal multiuser spectrum balancing for digital subscriber lines.
*IEEE Trans. Commun*2006, 54(5):922-933.View ArticleGoogle Scholar - 3GPP: Considerations on interference coordination in heterogeneous networks. [Online; accessed 6-March-2013], Available:, R1-101369, San Francisco, CA, Feb. 2010 http://www.3gpp.org/ftp/tsg_ran/WG1_RL1/TSGR1_59b/Docs/R1-100236.zip [Online; accessed 6-March-2013], Available:, R1-101369, San Francisco, CA, Feb. 2010Google Scholar
- 3GPP: Summary of the description of candidate eICIC solutions. [Online; accessed 6-March-2013], Available:, R1-104968, Madrid, Spain, Aug. 2010 http://www.3gpp.org/ftp/tsg_ran/WG1_RL1/TSGR1_62/Docs/R1-105081.zip [Online; accessed 6-March-2013], Available:, R1-104968, Madrid, Spain, Aug. 2010Google Scholar
- Yang T, Zhang L: Approaches to enhancing autonomous power control at femto under co-channel deployment of macrocell and femtocell. In
*IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications*. Toronto, Canada; 2011.Google Scholar

## Copyright

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.