Skip to main content

Cooperative power control in OFDMA small cell networks

Abstract

This paper aims at improving the system throughput of orthogonal frequency division multiple access small cell networks. Different with traditional schemes that neglect the cooperation among small cells, a scheme named as resource block exclusion-based power control (RBEBPC) is proposed by sharing the interference correlated information. RBEBPC consists of two steps that are iteratively conducted. First, based on current power allocation results, partial system resource blocks are excluded by playing the formulated cooperative coalition formation games. Second, the transmission power of each small cell is determined by solving a modified throughput maximization problem after the resource block exclusion. As the generated interference is constrained in the second step, part of the small cells transmit without full power. Thereby, the overall system interference keeps non-increasing after RBEBPC is adopted. Simulation results indicate that about 15% system throughput gain and 13% power saving gain are obtained compared to traditional iterative water filling scheme.

1 Introduction

The wireless data traffic of cellular system is soaring. Based on the report of future mobile data forecast by Cisco, the compound annual growth rate of mobile data traffic from 2011 to 2016 will be 78% [1]. The wireless industry faces a big challenge: a 1,000-fold data traffic increase in a decade [2]. The emergence of small cell releases the cost pressure on the dense cell deployment, which makes it one of the most promising solutions to the explosive wireless traffic growth. Small cell is the node whose transmission power is lower than that of the macro base station [3]. Both picocell and femtocell are included in the concept of small cell. Small cell is cheap, plug and play, and self-configuring, which can be easily embedded in the existing cell deployment. The deployment of small cell shortens the distance between service providers and subscribers. As a consequence, subscribers can achieve the same quality of service with lower power consumption. The shorter distance also enables the small cell to use a higher carrier frequency that is not suitable for the macro cell.

However, when small cells share the same spectrum band with macro cells, strong interference may exist. There are two categories of interference in small cell networks. The first category, which is known as cross-tier interference, is the interference between small cells and macro cells. The second category, which is known as co-tier interference, is the interference among small cells. Strong interference drops the advantages of small cell deployment and becomes the bottleneck of throughput improvement. Some previous works on small cell interference mitigation focus on orthogonal resource reuse from time or frequency domain. Authors of [4-7] propose orthogonal time domain interference mitigation schemes, e.g., almost blank subframe and the enhanced versions. Authors of [8,9] provide frequency domain interference mitigation scheme, e.g., fractional frequency reuse. The orthogonal resource reuse schemes have the common drawback that the interference is mitigated at the cost of resource utilization. Authors of [10] analyze the development trend of small cell networks and point out that small cell deployment would become denser in the future. Marginal reward would be obtained in the orthogonal resource reuse schemes due to the large quantity of weak interference sources. In addition to orthogonal resource reuse, power control is also considered to mitigate the interference. Authors of [11] provide a price-based power control scheme to manage the first category of interference. But only one sub-channel case is considered. In [12], hierarchical competition schemes for downlink power allocation in orthogonal frequency division multiple access (OFDMA) femtocell networks are proposed. A Stackelberg game model is used to manage the cross-tier interference of Femtocell and macro cell. In [13], the potential game is used with a designed payoff function to manage both the co-tier and cross-tier interferences. Some works adopt the centralized manner to manage the power control issues in small cell networks. Authors of [14] provide centralized suboptimal algorithms to manage the downlink scheduling and power allocation issues in multicell OFDMA networks. Authors of [15] provide a binary power allocation scheme to mitigate the second category of interference but the research is limited to indoor scenario.

As described in [3], the scenario where spectrum bands used for small cells and macro cells are different is one of the scenarios remaining to be studied. Besides, the deployment of small cells are more random and flexible than conventional macro cells, which makes the interference mitigation issues among small cells rather challenging. In this paper, we resort to the cooperative game theory and convex optimization theory to deal with the interference issues in small cell networks. Our target is to establish an effective method to improve the system throughput. Considering the deployment trend [2,3], we only deal with the co-tier interference of the small cells. Based on the resource structure of OFDMA small cell networks, the proposed scheme, which is called resource block exclusion based power control (RBEBPC), conducts the following two steps iteratively. 1) Small cells cooperatively exclude the disadvantage resource blocks by using the coalition formation game theory. An interference constraint is obtained based on the channel exclusion results for each small cell. 2) The transmission power of small cell is determined by solving the modified throughput maximization problems. The system total interference is non-increasing during the conduction of RBEBPC. Besides, RBEBPC is also energy efficient, i.e., not all available power is used during the transmission.

2 System model and basic assumptions

In this paper, bold lower case letters denote vectors and bold upper case letters denote matrices. The element of the i-th row and the j-th column of X is denoted by [X] ij . The transpose of X is X T. \(\mathbb {R}^{M\times N}\) represents the M×N real space and represents the real line. Calligraphic upper case letters denote sets. The cardinal number of is denoted by \(\vert \mathcal {S}\vert \), and the power set of is denoted by \(\eta (\mathcal {S})\). Notation \(\left (\begin {array}{l}n\\k\end {array}\right)\)represents ‘n choose k’ and equals \(\frac {n!}{k!(n-k)!}\). Notation ⇔ means ‘if and only if’. Finally, ‘s.t.’ is the abbreviation of ‘subject to’.

As shown in Figure 1, the considered small cell network is under the coverage of a macro cell. The frequency bandwidth used by the macro cell is F1. The frequency bandwidth shared by small cells is F2. The used spectrum of F1 is orthogonal to that of F2, i.e., there is no cross-tier interference between the macro cell and small cells. Each small cell is assumed to have a backhaul link to the macro cell so that some mutual information can be exchanged. Small cells in the considered system model are denoted by \(\mathcal {N}=\{1,2,\dots,N\}\). Without loss of generality, each small cell is assumed to serve only one user equipment (UE). In other words, in our system, each small cell first schedules a UE, then performs power allocation. The set of UEs is denoted by \(\mathcal {M}=\{1,2,\dots,M\}\) and M=N. The i-th UE is assumed to be served by the i-th small cell. F2 equals W and is equally divided into L sub-channels. The available sub-channels for small cells in the system are denoted by \(\mathcal {L}=\{1,2,\dots,L\}\).

Figure 1
figure 1

System model. The macro cell transmits data with frequency band F1. Small cells share frequency band F2. The used spectrum of F1 is orthogonal to that of F2.

Figure 2 shows the resource structure of the small cell network that is based on the above description. The system resource can be depicted from two dimensions: the small cell dimension and the frequency dimension. In the small cell dimension, each small cell owns at most L available sub-channels and all these sub-channels are able to share the total transmission power P0. However, in the frequency dimension, each sub-channel can be occupied by at most N small cells and these small cells cannot share the transmission power. The resource block of the l-th sub-channel occupied by the j-th small cell (denoted by R B lj ) can be uniquely determined by the tuple (l,j).

Figure 2
figure 2

Resource structure of the small cell network.

The wireless channel is assumed to vary in a slower pace compared to our power control scheme, i.e., the channel gain during our analysis remains constant. The channel gain between the i-th UE and the j-th small cell on the l-th sub-channel is denoted by \(G_{\textit {ij}}^{l}\). The system channel gain matrix is denoted by \(\mathbf {G}\in \mathbb {R}^{M\times N\times L}\). The channel gain matrix related to the i-th UE is defined as \(\mathbf {G}_{i \cdot }^{\cdot }\in \mathbb {R}^{N\times L}\), which contains all the channel gain between the i-th UE and all the small cells on all the sub-channels. Similarly, the channel gain related to the j-th small cell and the l-th sub-channel are defined as \(\mathbf {G}_{\cdot j}^{\cdot }\in \mathbb {R}^{M\times L}\) and \(\mathbf {G}_{\cdot \cdot }^{l}\in \mathbb {R}^{M\times N}\) separately.

For the i-th small cell, the power allocation result is denoted by \(\mathbf {p}_{i}=[{p_{i}^{1}},{p_{i}^{2}},\dots,{p_{i}^{L}}]^{T}\in \mathbb {R}^{L\times 1}\), where \({p_{i}^{l}}\) represents the allocated power level on the l-th sub-channel. The system power allocation result is denoted by \(\mathbf {P}=[\mathbf {p}_{1},\mathbf {p}_{2},\dots,\mathbf {p}_{N}]\in \mathbb {R}^{L\times N}\).

Based on above assumptions, the throughput of the j-th small cell is as follows:

$$ R_{j}=\frac{W}{L}\sum\limits_{l=1}^{L}\log_{2}(1+\frac{{p_{j}^{l}} G_{jj}^{l}}{\sigma^{2}+{I_{j}^{l}}}), $$
((1))

where σ 2 is the noise power of each sub-channel and

$$ {I_{j}^{l}}=\sum\limits_{i=1,i\neq j}^{N}{p_{i}^{l}} G_{ji}^{l} $$
((2))

is the suffered interference on the l-th sub-channel. The transmission power of each small cell is usually constrained by:

$$ \sum\limits_{l=1}^{L}{p_{j}^{l}}\le P0, \forall j\in\mathcal{N}, $$
((3))

where P0 is the maximum transmission power of each small cell and

$$ {p_{j}^{l}}\ge 0, \forall j\in\mathcal{N},\forall l\in\mathcal{L}. $$
((4))

The system throughput maximization problem of the small cell network is described as:

$$ \textbf{P1}:\quad\max\sum\limits_{j=1}^{N}R_{j} $$
((5))

s.t. (Equation 3), (Equation 4).

3 Motivation of cooperative power control

Since P 1 is non-concave to its domain, it is difficult to obtain the global optimal solution. Some sub-optimal solutions concentrate on the non-cooperative manner such as the iterative water filling (IWF) to slove P 1. Due to the neglect of possible mutual cooperation, the non-cooperative sub-optimal solutions to P 1 may not be efficient. To see this, a simple example of small cell network that motivates the cooperation is analyzed below.

Let us consider a simple small cell network with parameters W=2, L=2, P0=1, \(\mathcal {N}=\{1,2\}\), \(\mathcal {M}=\{1,2\}\), σ 2=0.01. The performance of IWF and equal power allocation (EPA) is discussed. The IWF scheme, which provides a non-cooperative sub-optimal solution to P 1, can be perfectly represented as a non-cooperative game \(\mathcal {O}=\{\mathcal {N},\mathcal {Y}, \mathcal {R} \}\). is the player set. is the strategy space whose elements are system power allocation results. is the payoff set, in which the j-th (\(\forall j\in \mathcal {N}\)) element is R j . In IWF, the j-th small cell selfishly determines p j to maximize R j based on previous interference level. By conducting the power allocation for several rounds, the system can reach a stable state where each small cell has no incentive to change its power allocation results. The EPA scheme just equally allocates the available power to all sub-channels. Two scenarios with above system parameters are considered. Scenario 1 is a strong interference scenario, whose system channel matrix \(\mathbf {G}\in \mathbb {R}^{2\times 2\times 2}\) is described as:

$$ \mathbf{G}_{\cdot\cdot}^{1}=\left[ \begin{array}{ll} 0.7 & \textbf{0.3} \\ \textbf{0.3} & 0.5 \end{array} \right], \mathbf{G}_{\cdot\cdot}^{2}=\left[ \begin{array}{ll} 0.9 & \textbf{0.5} \\ \textbf{0.5} & 0.8 \end{array} \right]. $$
((6))

Scenario 2 is a weak interference scenario whose system channel matrix \(\mathbf {F}\in \mathbb {R}^{2\times 2\times 2}\) is as follows:

$$ \mathbf{F}_{\cdot\cdot}^{1}=\left[ \begin{array}{cc} 0.7 & \textbf{0.03} \\ \textbf{0.03} & 0.5 \end{array} \right], \mathbf{F}_{\cdot\cdot}^{2}=\left[ \begin{array}{cc} 0.9 & \textbf{0.05} \\ \textbf{0.05} & 0.8 \end{array} \right]. $$
((7))

The system throughput of IWF with above system configuration is shown in Figure 3. The start point of each sub-figure is the system throughput of EPA. We can see that the system throughput improves about 8% at the stable state in scenario 1. But in scenario 2, the throughput improvement of IWF can be neglected.

Figure 3
figure 3

System throughput of IWF.

However, if small cells in scenario 1 follow some cooperation rules, the following power allocation can be obtained:

$$ \hat{\mathbf{P}}=\left[ \begin{array}{ll} {p_{1}^{1}}&{p_{2}^{1}}\\ {p_{1}^{2}}&{p_{2}^{2}} \end{array} \right] =\left[ \begin{array}{ll} 1&0\\ 0&1 \end{array} \right] $$
((8))

and the corresponding throughput is (R 1,R 2)=(6.5850,5.9307). Since both of the small cells improve the throughput by more than 70% compared to the stable state of IWF, \(\hat {\mathbf {P}}\) is more favored. If the total transmission power is further reduced by 20%, the following solution is achieved:

$$ \tilde{\mathbf{P}}=\left[ \begin{array}{ll} {p_{1}^{1}}&{p_{2}^{1}}\\ {p_{1}^{2}}&{p_{2}^{2}} \end{array} \right] =\left[ \begin{array}{cc} 0.8&0\\ 0&0.8 \end{array} \right] $$
((9))

and the corresponding throughput is (R 1,R 2)=(6.2668,5.6147), which is comparable to the full transmission power allocation results \(\hat {\mathbf {P}}\). The great improvements of \(\hat {\mathbf {P}}\) and \(\tilde {\mathbf {P}}\) motivate the cooperation of small cell networks where strong interference exists. Besides, for the non-cooperative solutions such as IWF, the convergence is not always guaranteed [16].

In this paper, we aim at achieving such cooperation gain. Some papers seek cooperation solution to the interference issues in small cells via coalition game. Authors of [17] use the recursive core approach to cluster the small cells. Small cells first form clusters by using the recursive core approach. To mitigate the interference, a time division duplex scheduling strategy is used in the formed clusters. The scheme proposed in [18] promotes the scheme in [17] by allowing a small cell to join more than one coalitions. There are obvious differences between the schemes in [17,18], and RBEBPC which will be introduced in the next section. First, both the schemes proposed in [17,18] are distributed schemes, while RBEBPC is a centralized solution. Second, no power control is used in the schemes of [17,18], while RBEBPC uses the power control method to deal with the interference.

4 Resource block exclusion-based power control

In RBEBPC, the goal is to improve the system throughput by excluding the strong interference resource blocks and by redistributing the system interference among small cells. To conduct RBEBPC, some mutual interference correlated information, such as G and previous P, should be exchanged among small cells. Considering the large number of small cells and the backhaul ability of each small cell, the centralized cooperation structure is adopted to guarantee the efficiency of information exchange. The macro cell, which covers all the small cells in the system, acts as the centralized node to collect and forward all the necessary information. The procedure of RBEBPC is described in Algorithm 1.

In order to obtain G, in the initialization state, all small cells transmit with equal power on all available sub-channels (line 3 in Algorithm 1). Then, the macro cell collects and forwards the necessary part of G to the small cells (line 4 and line 5). After information collection, small cells will conduct the cooperative power control for K rounds. In each round, small cells first report the used power levels to the macro cell (line 7). The macro cell, based on the reported power level, plays the resource block exclusion game and calculates the interference constraint based on the resource block exclusion results for each small cell (step 1). Then each small cell solves a throughput maximization problem by following the received constraint from the macro cell (step 2).

The necessary signaling overhead among the small cells, the serving UEs, and the macro cell in RBEBPC scheme can be estimated as follows. In the Basic information collection phase, if the quantification of a sub-channel gain of a certain small cell needs α bits, each UE should feedback α N L bits to the access small cell to indicate the interfering channel gain on all the sub-channels. Then, each small cell forwards the α N L bits to the macro cell via the backhaul link. Each small cell receives α N L bits information to indicate the channel gains correlated to the interfering UEs in the system. In the Cooperation based power control phase, each small cell forwards β L bits to indicate the previous power level in step 1, where β is the necessary bits to quantify the power level on a sub-channel. Each small cell receives NL bits that indicate the resource block exclusion results and receives γ(L+1) bits that indicate the suffered interference on each sub-channel and the generated total interference, where γ is the necessary bits to quantify the interference level on a sub-channel. So in Algorithm 1, the signaling overhead between a UE and the serving small cell is α N L bits. The signaling overhead between a small cell and the macro cell is 2α N L+K(β L+N L+γ(L+1)) bits. As for the typical wireless channel, the time scale for change of path amplitude is several hundreds of millisecond [19]. In long-term evolution (LTE), the transmission time interval is 1 ms, which is much smaller than the time of path amplitude change. So in the extreme case, the backhaul link between the small cell and the macro cell should satisfy the data rate max{α N L,β L,N L+γ(L+1)} kbps. For the typical configuration α=β=γ=64, N=10, L=50, the backhaul link data rate should satisfy 0.032 Gbps. If the backhaul links are implemented by using the standardized passive optical network (PON) [20] systems whose downstream is about 2.5 Gbps, the signaling overhead of RBEBPC is acceptable in practice.

In the following subsections, the resource block exclusion, interference calculation, and power optimization in RBEBPC are described in detail.

4.1 Resource block exclusion

Given the system power allocation result P and system channel gain matrix G, a binary matrix A∈{0,1}L×N is defined to map the available sub-channels in the system:

$$ [\mathbf{A}]_{lj} =\left\{ \begin{array}{ll} 1, & \text{if \([\mathbf{P}]_{lj}> 0\)}, \\ 0, & \text{if \([\mathbf{P}]_{lj}\le 0\)}. \end{array} \right. $$
((10))

For the j-th small cell, the l-th sub-channel is available if and only if [A] lj =1. Otherwise, [A] lj =0 and the j-th small cell does not use the l-th sub-channel.

In Figure 2, the total available system resource blocks can be partitioned into \(\mathcal {C}=\{\mathcal {N}_{1},\mathcal {N}_{2},\dots,\mathcal {N}_{L}\}\), where \(\vert \mathcal {C}\vert =L\) and \(\mathcal {N}_{l}\subseteq \mathcal {N}\) denotes the set of small cells for which the l-th sub-channel is available (i.e., \(\mathcal {N}_{l}=\{j\in \mathcal {N}|[\mathbf {A}]_{\textit {lj}}=1\}\)). Given a sub-channel, the allocated power is not transferable, i.e., the power cannot be shared among small cells in an arbitrary ratio. For the sub-channels with strong interference, the system throughput will improve if some small cells mute the sub-channels. In this subsection, we resort to the coalition game to determine the sub-channels that need to be muted. Note that the system interference on the l-th sub-channel is only determined by the small cells in \(\mathcal {N}_{l}\). Besides, the system interferences of different sub-channels are independent once P is given. So in the following analysis, we only consider the l-th sub-channel and the correlated small cells in \(\mathcal {N}_{l}\).

Definition 1.

Let \(\mathcal {N}=\{1,2,\dots,N\}\) be a set of fixed players called the grand coalition. Non-empty subsets of are called coalitions. A collection (in the grand coalition ) is any family \(\mathcal {D}=\{\mathcal {D}_{1},\mathcal {D}_{2},\dots,\mathcal {D}_{s}\}\) of mutually disjoint coalition, and s is called its size. If additionally \(\mathop \cup \limits _{t=1}^{s}\mathcal {D}_{t}=\mathcal {N}\), the collection is called a partition of .

Based on Definition 1, the throughput of a coalition \(\mathcal {E}\subseteq \mathcal {N}_{l}\) is as follows:

$$ R(\mathcal{E})=\sum\limits_{j\in\mathcal{E}}\frac{W}{L}\log_{2}\left(1+\frac{{p_{j}^{l}} G_{jj}^{l}}{\sigma^{2}+{I_{j}^{l}}}\right). $$
((11))

If the small cells in the coalition mute in a cooperative manner and only one small cell in transmits, the achievable throughput is as follows:

$$ \tilde{R}(\mathcal{E})=\max\limits_{j\in\mathcal{E}}\frac{W}{L}\log_{2}\left(1+\frac{{p_{j}^{l}} G_{jj}^{l}}{\sigma^{2}+\sum\limits_{i\in\mathcal{N}_{l}\backslash\mathcal{E}}{p_{i}^{l}} G_{ji}^{l}}\right). $$
((12))

The formulated coalition game of the l-th sub-channel is denoted by \(\mathcal {G}^{l}=(\mathcal {N}_{l},v)\), where \(\mathcal {N}_{l}\) is the set of players and \(v: \eta (\mathcal {N}_{l})\mapsto \mathbb {R}\) is the payoff function of the coalitions [21]. The payoff function should take the interference and system throughput into consideration. A suitable payoff function for coalition (\(\forall \mathcal {E}\in \eta (\mathcal {N}_{l})\)) is as follows:

$$ v(\mathcal{E}) =\left\{ \begin{array}{ll} \tilde{R}(\mathcal{E}), & \text{if} \,\,\,R(\mathcal{E}) < \tilde{R}(\mathcal{E}), \\ 0, & \text{if} \,\,\,R(\mathcal{E}) \ge \tilde{R}(\mathcal{E}). \end{array} \right. $$
((13))

Note that for ∅, we have v(∅)=0. Based on Equation 13, the establishment of coalition (\(\vert \mathcal {E}\vert \ge 2\)) has two effects. The first effect is the reduction of transmission resource blocks for small cells in . Before the formulation of , small cells in can have at most \(\vert \mathcal {E}\vert \) transmission resource blocks (i.e., each small cell owns a transmission resource block) and at least two transmission resource blocks (i.e., is established based on two existing coalitions). However, when is formulated, small cells in only have one transmission resource block. The second effect is the reduction of interference of the remaining transmission resource block. Since the small cells in mute in a cooperative manner, the interference of small cells in is canceled.

Some properties of \(\mathcal {G}^{l}\) are summarized as follows.

Definition 2.

The form of a coalition game \((\mathcal {N},v)\) is the characteristic form, if and only if the value of a coalition \(\mathcal {E}\in \eta (\mathcal {N})\) solely depends on the players in and is in independent with how the players in \(\mathcal {N}\backslash \mathcal {E}\) are structured.

Property 1.

The form of game \(\mathcal {G}^{l}\) is the characteristic form.

Proof.

This property directly follows by the definition of payoff function (Equation 13).

From Property 1, we can see that the value of the formulated payoff function is only sensitive to the players in the given coalition. In small cell networks, small cells are coupled with each other via the effect of interference. In (Equation 13), the effect of small cells beyond the given coalition is treated as a whole and is independent with their partition structure. By using Equation 13, we can obtain the value of a coalition once the coalition is given.

Given a partition \(\mathcal {P}=\{\mathcal {P}_{1},\mathcal {P}_{2},\dots,\mathcal {P}_{s}\}\) of \(\mathcal {N}_{l}\), we can find a unique vector \(\mathbf {v}=[v(\mathcal {P}_{1}),v(\mathcal {P}_{2}),\dots,v(\mathcal {P}_{s})]^{T}\in \mathbb {R}^{s\times 1}\) to represent the value of each coalition in . Besides, since the coalition value of \(\mathcal {G}^{l}\) is the maximum achievable throughput by a single member small cell, game \(\mathcal {G}^{l}\) has a transferable utility, i.e., the achievable throughput can be arbitrarily portioned among the small cells of a coalition (for example, via the proper choice of coding strategy [18]).

Definition 3.

A transferable utility coalition game is supperadditive if and only if \(\forall \mathcal {E}_{1}\subseteq \mathcal {N}_{l}\), \(\mathcal {E}_{2}\subseteq \mathcal {N}_{l}\) and \(\mathcal {E}_{1}\cap \mathcal {E}_{2}=\emptyset \):

$$ v(\mathcal{E}_{1}\cup\mathcal{E}_{2})\ge v(\mathcal{E}_{1})+v(\mathcal{E}_{2}). $$
((14))

For the transferable utility coalition game with supperadditivity, establishing a bigger coalition is always beneficial.

Property 2.

Due to the implied tradeoff between interference and throughput in (Equation 13), the formulated game \(\mathcal {G}^{l}\) is not supperadditive and the grand coalition is not always formed; thus, disjoint independent coalitions will form in the network.

The proof of Property 2 can be found in the Appendix. The payoff function (Equation 13) shows that in the formulated coalition, only one player transmits and the rest in the coalition keep silent. Once a coalition is formulated, the available number of resource blocks reduces but the quality of the remaining resource block improves. Due to the random deployment of small cell and the fluctuation of the wireless channel quality, small cells may not be prone to form the grand coalition. In small-scale area where strong interference exists, small cells form a coalition with a higher possibility since the payoff of the coalition is probably higher if the interference is removed. The main obstacle of the grand coalition construction lies in (Equation 13) because the reduction of the available resource blocks is the cost of coalition construction. In practice, the construction of grand coalition needs harsh conditions. In the case that the interferences among small cells are so strong that if more than one small cell share the sub-channel the total throughput of the sub-channel reduces, the grand coalition will form.

Definition 4.

A comparison relation ⊳ is defined for two collections \(\mathcal {D}=\{\mathcal {D}_{1},\mathcal {D}_{2},\dots,\mathcal {D}_{s}\}\) and \(\mathcal {F}=\{\mathcal {F}_{1},\mathcal {F}_{2},\dots,\mathcal {F}_{w}\}\) that satisfy \(\mathop \cup \limits _{m=1}^{s}\mathcal {D}_{m}=\mathop \cup \limits _{n=1}^{w}\mathcal {F}_{n}=\mathcal {H}\subseteq \mathcal {N}\). Thus, \(\mathcal {D}\triangleright \mathcal {F}\) means that the way partitions is preferred to the way partitions .

Definition 5.

For collection and defined in Definition 4:

$$ \mathcal{D}\triangleright\mathcal{F} \iff \sum\limits_{m=1}^{s}v(\mathcal{D}_{m})>\sum\limits_{n=1}^{w}v(\mathcal{F}_{n}). $$
((15))

Definitions 4 and 5 provide a preference among partitions. Definition 5 indicates that ‘social welfare’ (the total throughput) is considered as the baseline. So the defined preference is coordinate with the target of system throughput improvement. We can use the exhaustive search method to obtain the maximum throughput partition structure of \(\mathcal {G}^{l}\), in which a rather large search space should be considered. For the player set \(\mathcal {N}_{l}\), the number of possible partition, which is given by a value known as Bell number, grows sharply with the number of players in \(\mathcal {N}_{l}\). For example, the Bell number of \(\mathcal {N}_{l}\) is 115,975 when \(\vert \mathcal {N}_{l}\vert =10\). However, by following some simple rules, we can obtain a stable practical partition structure of \(\mathcal {G}^{l}\).

For any two collections \(\mathcal {D}=\{\mathcal {D}_{1},\mathcal {D}_{2},\dots,\mathcal {D}_{s}\}\), \(\mathcal {F}=\{\mathcal {F}_{1},\mathcal {F}_{2},\dots,\mathcal {F}_{w}\}\) and the grand coalition that satisfy \((\mathop \cup \limits _{m=1}^{s}\mathcal {D}_{m})\cup (\mathop \cup \limits _{n=1}^{w}\mathcal {F}_{n})=\mathcal {N}\) and \((\mathop \cup \limits _{m=1}^{s}\mathcal {D}_{m})\cap (\mathop \cup \limits _{n=1}^{w}\mathcal {F}_{n})=\emptyset \), we define two operation rules to construct the stable partition structure.

Definition 6.

Merge rule: If \(\{\mathop \cup \limits _{m=1}^{s}\mathcal {D}_{m}\}\cup \mathcal {F}\triangleright \mathcal {D}\cup \mathcal {F}\), merge into \(\{\mathop \cup \limits _{m=1}^{s}\mathcal {D}_{m}\}\):

$$ \begin{aligned} &\text{Merge}(\mathcal{D}\cup\mathcal{F})=\\ &\left\{ \begin{array}{l} \{\mathop\cup\limits_{m=1}^{s}\mathcal{D}_{m}\}\cup\mathcal{F},\quad \text{if} \{\mathop\cup\limits_{m=1}^{s}\mathcal{D}_{m}\}\cup\mathcal{F}\triangleright\mathcal{D}\cup\mathcal{F}, \\ \mathcal{D}\cup\mathcal{F},\quad \text{if} \mathcal{D}\cup\mathcal{F}\triangleright\{\mathop\cup\limits_{m=1}^{s}\mathcal{D}_{m}\}\cup\mathcal{F}. \end{array} \right. \end{aligned} $$
((16))

Definition 7.

Split rule: If \(\mathcal {D}\cup \mathcal {F}\triangleright \{\mathop \cup \limits _{m=1}^{s}\mathcal {D}_{m}\}\cup \mathcal {F}\), split \(\{\mathop \cup \limits _{m=1}^{s}\mathcal {D}_{m}\}\) into :

$$ \begin{aligned} &\text{Split}(\{\mathop\cup\limits_{m=1}^{s}\mathcal{D}_{m}\}\cup\mathcal{F})=\\ &\left\{ \begin{array}{l} \{\mathop\cup\limits_{m=1}^{s}\mathcal{D}_{m}\}\cup\mathcal{F},\quad \text{if} \{\mathop\cup\limits_{m=1}^{s}\mathcal{D}_{m}\}\cup\mathcal{F}\triangleright\mathcal{D}\cup\mathcal{F}, \\ \mathcal{D}\cup\mathcal{F},\quad \text{if} \mathcal{D}\cup\mathcal{F}\triangleright\{\mathop\cup\limits_{m=1}^{s}\mathcal{D}_{m}\}\cup\mathcal{F}. \end{array} \right. \end{aligned} $$
((17))

Note that the above operation rules of Definitions 6 and 7 use ⊳ ‘locally’, by focusing on the coalitions that take part and result from the merge operation and split operation. Algorithm 2 summarizes the procedure that uses the merge-split rule to obtain the stable partition structure of \(\mathcal {G}^{l}\). Due to Property 1, the conduction of the split rule in Algorithm 2 can be transformed into the merge rule, if the coalition remains to be splitted is treated as a smaller grand coalition. The split operation is equivalent to the merge operation in the smaller grand coalition as long as we treat the effect of the players beyond the smaller grand coalition as a whole.

It is difficult to directly describe the complexity of Algorithm 2, because the termination condition of Algorithm 2 depends on the specific state of the small cell network. But we can estimate the complexity of Algorithm 2 in some extreme cases. Since the split operation can be treated as a special kind of merge operation, we only analyze the complexity of merge operation here. In the worst case where no coalition with size bigger than two is formed, the potential number of possible coalitions that should be considered is \(\zeta _{1}=2^{\vert \mathcal {N}_{l}\vert }-\vert \mathcal {N}_{l}\vert -1=\sum \limits _{k=2}^{\vert \mathcal {N}_{l}\vert }\begin {pmatrix}\vert \mathcal {N}_{l}\vert \\k\end {pmatrix}\). While in the best case where the grand coalition is formed, the potential number of possible coalitions that should be considered is \(\zeta _{2}=\vert \mathcal {N}_{l}\vert -1\). So for each merge or split operation, the number of coalitions that should be considered is between ζ 1 and ζ 2.

Definition 8.

A partition \(\mathcal {P}=\{\mathcal {P}_{1},\mathcal {P}_{2},\dots,\mathcal {P}_{s}\}\) of the grand coalition is \(\mathbb {D}_{c}\) stable, if no players in are interested in leaving through any operation (not necessary merge or split) to form a partition different with . A partition \(\mathcal {Q}=\{\mathcal {Q}_{1},\mathcal {Q}_{2},\dots,\mathcal {Q}_{w}\}\) of the grand coalition is \(\mathbb {D}_{\textit {hp}}\) stable if no coalition has the incentive to split or merge.

Property 3.

The partition structure of \(\mathcal {G}^{l}\) obtained by Algorithm 2 is \(\mathbb {D}_{\textit {hp}}\) stable. The existence of \(\mathbb {D}_{c}\) stable partition in game \(\mathcal {G}^{l}\) is not always guaranteed. If the \(\mathbb {D}_{c}\) stable partition of \(\mathcal {G}^{l}\) exists, the partition structure obtained by Algorithm 2 is \(\mathbb {D}_{c}\) stable.

The proof of Property 3 can be found in the Appendix. Property 3 indicates that the final outcome of Algorithm 2 is stable. The outcome of Algorithm 2 can not be improved by any merge or split operation. Generally speaking, the optimal partition results can be found by using the exhaustive method. But the number of possible cases (the Bell number) that should be considered in the exhaustive method is too huge to manage. The outcome of Algorithm 2 may not be globally optimal but it is at least stable.

Denote the outcome of Algorithm 2 by \(\mathcal {P}^{*}=\{\mathcal {P}_{1}^{*},\mathcal {P}_{2}^{*},\dots,\mathcal {P}_{x}^{*}\}\). From Equation 13, we can find the set of players \(\mathcal {U}=\{y_{1},y_{2},\dots,y_{x}\}\), where \(y_{t}\in \mathcal {P}_{t}^{*}\) is the player whose throughput on the sub-channel equals \(\tilde {R}(\mathcal {P}_{t}^{*})\), if other players in \(\mathcal {P}_{t}^{*}\) mute in the sub-channel. So the resource blocks with strong interference are marked by modifying the available sub-channel mapping matrix:

$$ [\mathbf{A}]_{lj} =\left\{ \begin{array}{ll} 1, & \text{for} j \in \mathcal{U}, \\ 0, & \text{for} j\in \mathcal{N}_{l}\backslash\mathcal{U}. \end{array} \right. $$
((18))

The resource blocks with strong interference are excluded by setting zero value to the corresponding elements in the available sub-channel mapping matrix. Figure 4 shows a schematic diagram of resource block exclusion. Part of the total system blocks are excluded by playing the formulated games. A detailed example of the resource exclusion procedure can be found in the simulation part.

Figure 4
figure 4

A schematic diagram of resource block exclusion. The grid resource blocks such as R B 11 and R B l2 are excluded. From the small cell dimension, each small cell may own more than one sub-channel. From the frequency dimension, each sub-channel can be occupied by more than one small cell.

4.2 Interference calculation

After the resource block exclusion, the suffered interference of the j-th UE on the l-th sub-channel is as follows:

$$ \tilde{I}_{j}^{l}=\sum\limits_{i=1,i\neq j}^{N}{p_{i}^{l}}G_{ji}^{l}[\mathbf{A}]_{li}. $$
((19))

The interference power level on the excluded resource block is not considered in \(\tilde {I}_{j}\). The generated interference of small cell j is defined as:

$$ \bar{I}_{j}=\sum\limits_{l=1}^{L}\sum\limits_{i=1,i\neq j}^{M}{p_{j}^{l}} G_{ij}^{l} [A]_{li}. $$
((20))

The generated interference depends on three factors: the previous allocated power vector, the interference channel gain and the channel availability. If the sub-channel is unavailable for some small cells, the interference to the small cell on this sub-channel has no contribution to the generated interference. Based on the system channel gain matrix G, previous system power allocation results P and system current mapping matrix A, the macro cell calculates the generated interference vector \(\bar {\mathbf {I}}=[\bar {I}_{1},\bar {I}_{2},\dots,\bar {I}_{N}]^{T}\in \mathbb {R}^{N\times 1}\) and the suffered interference vector \(\tilde {\mathbf {I}}_{j}=[\tilde {I}_{j}^{1},\tilde {I}_{j}^{2},\dots,\tilde {I}_{j}^{L}]^{T}\in \mathbb {R}^{L\times 1}\) (\(\forall j\in \mathcal {M}\)) after the sub-channel exclusion operation. The two interference correlated vectors are delivered to the small cells to be used in the power optimization procedure.

4.3 Power optimization

After obtaining the interference constraint \(\bar {\mathbf {I}}\) and available sub-channel mapping matrix A, each small cell will optimize the transmission power on each available sub-channel based on the last transmission power allocation result P. Instead of solving P 1, the j-th (\(\forall j\in \mathcal {N}\)) small cell will solve the following problem:

$$ \textbf{P2:}\quad \max\sum\limits_{l\in\mathcal{L}_{j}}\frac{W}{L}\log_{2}(1+\frac{{p_{j}^{l}} G_{jj}^{l}}{\sigma^{2}+\tilde{I}_{j}^{l}}) $$
((21))
$$ s.t.\quad \sum\limits_{i\in\mathcal{M}\backslash\{j\}}\sum\limits_{l\in\mathcal{L}_{j}} {p_{j}^{l}} G_{ij}^{l}[A]_{li}\le \bar{I}_{j}, $$
((22))
$$ \sum\limits_{l\in\mathcal{L}_{j}}{p_{j}^{l}}\le P0, $$
((23))
$$ {p_{j}^{l}}\ge0, \forall l\in\mathcal{L}_{j}, $$
((24))

where \(\mathcal {L}_{j}\) is the set of available sub-channels for the j-th small cell (i.e., \(\mathcal {L}_{j}=\{l\in \mathcal {L}|[\mathbf {A}]_{\textit {lj}}=1\}\)). The constraint of (Equation 22) is used to redistribute the total generated interference on all the available sub-channels. The formulated P 2 is a concave problem and the proof can be found in the Appendix.

Since P 2 is concave to the domain \(\mathbf {p}_{j}\in \mathbb {R}^{\vert \mathcal {L}_{j}\vert \times 1}\), we can use the interior point method [22] to solve it. However, it is more convenient to solve the dual problem of P 2, if we take the problem structure into consideration. First, due to concavity, the optimal solution to P 2 is equivalent to the optimal solution to the dual problem. Second, the number of variables in P 2 is \(\vert \mathcal {L}_{j}\vert \). While in the dual problem, the number of variables reduces to two. Because constraints (Equation 24) are treated as slack conditions, only (Equation 22) and (Equation 23) are used when solving the dual problem. Third, in some special cases, the close form solution to the dual problem can be obtained, which greatly accelerates the computation. The details of solving the dual problem are represented as follows. The Lagrangian of P 2 is as follows:

$$ \begin{aligned} &L\left(\lambda,\mu,\mathbf{\theta},\mathbf{p}_{j}\right)= \\ &\sum\limits_{l\in\mathcal{L}_{j}}\frac{W}{L}\log_{2}\left(1+\frac{{p_{j}^{l}} G_{jj}^{l}}{\sigma^{2}+\tilde{I}_{j}^{l}}\right)+\lambda\left(\bar{I}_{j}-\right.\\ &\sum\limits_{i\in\mathcal{M}\backslash\{j\}}\sum\limits_{l\in\mathcal{L}_{j}} {p_{j}^{l}} G_{ij}^{l}[A]_{li}\left.\right)+\mu\left(P0- \sum\limits_{l\in\mathcal{L}_{j}}{p_{j}^{l}}\right)+\sum\limits_{l\in\mathcal{L}_{j}}\theta_{l} {p_{j}^{l}}\\ & \equiv \sum\limits_{l\in\mathcal{L}_{j}}[z\log_{2}\left({b_{j}^{l}}+ {p_{j}^{l}}\right)+{a_{j}^{l}}]+\lambda\left(\bar{I}_{j}-\sum\limits_{l\in\mathcal{L}_{j}}{c_{j}^{l}}{p_{j}^{l}}\right)+\\ &\mu\left(P0-\sum\limits_{l\in\mathcal{L}_{j}}{p_{j}^{l}}\right)+\sum\limits_{l\in\mathcal{L}_{j}}\theta_{l} {p_{j}^{l}}, \end{aligned} $$
((25))

where \(z=\frac {W}{L}\), \({a_{j}^{l}}=\frac {W}{L}\log _{2}\left (\frac {G_{\textit {jj}}^{l}}{\sigma ^{2}+\tilde {I}_{j}^{L}}\right)\), \({b_{j}^{l}}=\frac {\sigma ^{2}+\tilde {I}_{j}^{l}}{G_{\textit {jj}}^{l}}\), \({c_{j}^{l}}=\sum \limits _{i\in \mathcal {M}\backslash \{j\}}G_{\textit {ij}}^{l}[\mathbf {A}]_{\textit {li}}\). The first-order partial derivatives of \({p_{j}^{l}}\) is as follows:

$$ \frac{\partial L(\lambda,\mu,\mathbf{\theta},\mathbf{p}_{j})}{\partial {p_{j}^{l}}}=\frac{z}{\ln 2}\frac{1}{{b_{j}^{l}}+ {p_{j}^{l}}}-\lambda {c_{j}^{l}}-\mu+\theta_{l}. $$
((26))

Based on the KKT condition of P 2, we can see that θ is a slack variable vector that can be eliminated [22]. By solving \(\frac {\partial L(\lambda,\mu,\mathbf {p}_{j})}{\partial {p_{j}^{l}}}=0\) and substituting the results to Equation 25, we can obtain the dual problem of P 2:

$$ \begin{aligned} &\mathbf{P3:}\quad \min g(\lambda,\mu)\\ &=\min\max\limits_{\mathbf{p}_{j}}L(\lambda,\mu,\mathbf{p}_{j}) \\ &=\min\limits_{\lambda,\mu}\sum\limits_{l\in\mathcal{L}_{j}}\left[-z\log_{2}(\lambda {c_{j}^{l}}+\mu)+(\lambda {c_{j}^{l}}+\mu){b_{j}^{l}}\right]+\\ &\lambda \bar{I}_{j}+\mu P0+\sum\limits_{l\in\mathcal{L}_{j}}\left[z\log_{2}(\frac{z}{\ln 2})+{a_{j}^{l}}-\frac{z}{\ln 2}\right] \end{aligned} $$
((27))
$$ s.t. \quad \lambda\ge 0,\mu\ge 0. $$
((28))

It is easy to verify that P 3 is a convex optimization problem. By using the KKT conditions, constraints (Equation 28) can be neglected, i.e., we can first solve P 3 without constraints (Equation 28) and then using (Equation 28) to examine the correctness of the solution. So P 3 can be efficiently solved by using the Newton Method, which is a method suitable for the convex optimization problem without constraints [22]. In some cases, we can obtain the close form optimal solution (λ ∗,μ ∗) to P 3.

Case 1.

λ=0. If λ=0, then g(λ,μ) degenerates into g(0,μ). By solving \(\frac {\partial g(0,\mu)}{\partial \mu }=0\), we can obtain the optimal μ:

$$ \mu^{*}=\frac{z}{\ln 2}\frac{\vert\mathcal{L}_{j}\vert}{ P0+\sum\limits_{l\in\mathcal{L}_{j}}{b_{j}^{l}}}. $$
((29))

Case 2.

μ=0. If μ=0, then g(λ,μ) degenerates into g(λ,0). By solving \(\frac {\partial g(\lambda,0)}{\partial \lambda }=0\), we can obtain the optimal λ:

$$ \lambda^{*}=\frac{z}{\ln 2}\frac{\vert\mathcal{L}_{j}\vert}{\bar{I}_{j} +\sum\limits_{l\in\mathcal{L}_{j}}{c_{j}^{l}}{b_{j}^{l}}}. $$
((30))

When the optimal (λ ∗,μ ∗) is obtained, we can use Equation 26 and solve \(\frac {\partial L(\lambda ^{*},\mu ^{*},\mathbf {p}_{j})}{\partial {p_{j}^{l}}}=0\) to obtain the optimal \( {p}_{j}^{l*}\). Due to the elimination of θ, we must verify the correctness of the power results. If \( p_{j}^{l*}\ge 0\) for all \(l\in \mathcal {L}_{j}\), we can conclude that \(\mathbf {p}_{j}^{*}\) is the solution to P 2. If some elements of \(\mathbf {p}_{j}^{*}\) are negative, we must remove these sub-channels with the minimum power and solve P 3 again until a solution \({p}_{j}^{l*}\ge 0\) for all \(l\in \mathcal {L}_{j}\) is found.

The power optimization procedure is summarized in Algorithm 3. It is difficult to analyze the complexity of Algorithm 3 directly. But the number of iteration times of the Newton Method of Algorithm 3 can be estimated in some extreme cases. In the best cases where the optimal value can be achieved by (Equation 29) or (Equation 30), the iteration time of the Newton Method is one. In the worst case where the optimal value is obtained without using these close form equations, the maximum number of iterations is bounded by \(\frac {g(\lambda ^{0},\mu ^{0})-g(\lambda ^{*},\mu ^{*})}{\tau }+6\) [22], where λ 0 and μ 0 separately represent the initialized value of λ and μ, respectively, and τ is the maximum reduction value of function g(λ,μ) during the iterations.

5 Simulations and discussions

In this section, system throughput, power consumption, and interference variation are tracked and analyzed during the conduction of RBEBPC. Then, the average performance of the RBEBPC is evaluated. Based on the suggestion of [23], the deployment of small cells is based on the concept of cluster. A small cell cluster consists of a certain number of small cells that are randomly deployed in a certain area. The interference among different small cell clusters can be ignored because the total transmission power of a small cell is small and the distance between clusters is far. For simplicity, in our simulation, we use the square as the area of cluster and focus on the performance of single small cell cluster. The small cells are uniformly distributed in the square with side length d meters. UEs are uniformly distributed in the circles whose center is the serving small cells and radius equals R meters. Figure 5 shows a distribution example of small cells and UEs with parameters d=120, N=M=10. Besides, a minimum distance r is set between the small cell and the served UE. The simulation parameters are summarized in Table 1. As a comparison, the performance of EPA and IWF is also tracked.

Figure 5
figure 5

An example of the small cell network topology.

Table 1 Simulation parameters

5.1 Track of RBEBPC

In this subsection, the system performance of RBEBPC based on the topology of Figure 5 is analyzed. For convenience, the value of K in Algorithm 1 equals 10 and the number of sub-channels is L=6. The maximum power of each small cell is 14 dBm. The distance pair (R,r) equals (20,10) and bandwidth F2 equals 1.25 M.

Figure 6 shows the system throughput variations of EPA, IWF, and RBEBPC. The initial points of Figure 6 are the system throughput of EPA. RBEBPC outperforms IWF, and IWF outperforms EPA. IWF arrives at the slight fluctuation state after the second iteration and RBEBPC arrives at the stable state after the third iteration.

Figure 6
figure 6

Track of the system throughput after each iteration.

The resource block exclusion results of the first round and the second round are shown in Tables 2 and 3 separately. After the second round (k≥3), no merge or split operation of the resource blocks happens. From the exclusion results, we can see that the merge or split operation happens frequently in the first or second iteration. So the value of K in Algorithm 1 can be set as a small positive integer. From Tables 2 and 3, we can see that coalitions containing two or less players are frequently formed. No grand coalition is formed.

Table 2 Resource exclusion results, k=1
Table 3 Resource exclusion results, k=2

Figure 7 shows the throughput difference between RBEBPC and IWF after each iteration. On the one hand, only small cell 6, small cell 7, and small cell 9 have negative throughput growth in RBEBPC compared to IWF. We can see from Table 2 that in the first round, small cell 6 joints the coalitions that has more than two players on all the available sub-channels. Only on sub-channel 4, small cell 6 is the player with advantage, which means that in the following iterations, small cell 6 only occupies the sub-channel 4. Small cell 7 is in the same condition as the small cell 6. Due to the interference constraint of Equation 22, small cell 9, will not greedily allocate the power to the sub-channel with the best channel gain. To see this, we can refer to the final power allocation results of IWF and RBEBPC in Tables 4 and 5 separately. From the topology of Figure 5, we can see that the possible coalition player of small cell 9 is small cell 1 and small cell 5. In the first round of resource block exclusion (Table 2), small cell 9 abandons sub-channel 2 and sub-channel 4 compared to IWF. So the abandon of sub-channel and the interference constraint lead to the throughput reduction of small cell 9. On the other hand, the rest seven small cells benefit from RBEBPC compared to IWF.

Figure 7
figure 7

Track of throughput difference after each iteration.

Table 4 Power allocation results of IWF (Watt)
Table 5 Power Allocation Results of RBEBPC (Watt)

Compare Table 4 to Table 5 and we can see that RBEBPC is energy-saving, i.e., not all small cells transmit with the total available power. The small cells can be divided into three groups based on the two tables. The first group (including small cells 2, 6, 7, and 9) consists of the small cells whose total transmit power and available resource blocks vary greatly in RBEBPC compared to IWF. The small cells belong to the first group follow the constraint (Equation 22) and transmit without full power. The second group (including small cell 3) consists of the small cells that use all the available power but different resource blocks compared to IWF. Small cells in the second group are influenced by the resource block exclusion operation. The disadvantage resource blocks are excluded. The third group (including small cell s1, 4, 5, 8, and 10) consists of the small cells that only have different power on all the sub-channels compared with IWF. In the third group of small cells, the power allocation difference among RBEBPC and IWF comes from the other small cells because all the small cells in the system are influenced by the interference. The power allocation variation of the other two groups leads to the power allocation result of the third group.

Figure 8 shows the system total interference under different iterations. The total system interference decreases in both IWF and RBEBPC. At the stable state, RBEBPC further reduces the interference by 56%. Compared to Figure 6, the reduction of interference transforms into the growth of system throughput.

Figure 8
figure 8

Track of system interference after each iteration.

5.2 Average performance of RBEBPC

In this subsection, we will provide the average performance of RBEBPC. The used system parameters are P0=20 dBm, F2=5 MHz, L=25. The proposed overlapping coalition formation (OCF) scheme in [18] is also simulated as the comparison scheme. Note that when we conduct the OCF, the power limitation of coalition formation is removed, i.e., all the small cells in the simulation areas have the potentials to form coalition.

Figure 9 shows the average system throughput of different values of K in Algorithm 2. The difference of average throughput can be neglected when K is bigger than 2. So in practice, the value of K can be set as a small positive number such as 2 or 3.

Figure 9
figure 9

Average system throughput of RBEBPC under different values of K , (R,r)=(20,10) , d=100 .

Figure 10 shows the average system throughput under different simulation areas. For each scheme, the average system throughput increases as the simulation area becomes bigger. The proposed RBEBPC scheme outperforms IWF by about 15% in dense case (d=100) and by about 10% in sparse case (d=160). IWF outperforms the OCF scheme. First, in OCF, the small cells are cooperatively scheduled rather than greedily transmit to achieve the maximum throughput. Second, no power control is used during the transmission in OCF. The gains of RBEBPC, IWF, and OCF over the EPA become weaker as d increases because the interference is not a key factor that influence the system throughput in the sparse scenario.

Figure 10
figure 10

Average system throughput under different d , (R,r)=(20,10) , K=10 .

Figure 11 shows the cumulative distribution function (CDF) of the average system throughput. From the distribution, we can see that under these parameters, the OCF scheme improves the system throughput of EPA by about 30 Mbit, IWF improves the system throughput of OCF by about 20 Mbit and RBEBPC improves the system throughput of IWF by about 20 Mbit, which indicates that RBEBPC is an effective method to improve the system throughput.

Figure 11
figure 11

CDF of system throughput, d=100 , (R,r)=(20,10) , K=10 .

Figure 12 shows the CDF of small cell throughput growth in RBEBPC over the IWF scheme. About 36% of small cell suffers the loss of throughput (point A). Half of the throughput-decreasing small cells suffer a growth rate of −24% (point B). In the rest throughput-increasing small cells, half of them have a growth rate of 22% (point C). The extreme small cells, whose growth rate is more than 100% (point D), occupy about 5% of the total small cells. So the benefit of small cells in RBEBPC is bigger than the loss of the victim small cells.

Figure 12
figure 12

CDF of throughput growth rate, d=100 , (R,r)=(20,10) , K=10 .

Figure 13 shows the average system throughput of different link qualities. We consider three cases: the strong link, the moderate link, and the weak link. The elements of the triples represents the growth rate of IWF, OCF, and RBEBPC to the EPA separately. For all the schemes, the average system throughput grows when the link quality become stronger. The growth rates over EPA scheme become bigger when the link quality is weak because in this scenario, the interference has a stronger effect on the system throughput and the mitigation of interference achieves more significant payback in throughput.

Figure 13
figure 13

Average system throughput under different link quality, d=100 , K=10 .

Figure 14 shows the average system power consumption of different simulation areas. The IWF/EPA scheme will always use all the available power, while in RBEBPC, not all power is used. Compared with IWF/EPA, about 13% power is saved in dense scenario (d=100). In spare deployment scenario, the small cells are prone to use more power. If the deployment of small cells is sparse enough, the interference among small cells will be neglected and the constraint in Equation 22 can be ignored and RBEBPC degenerates into IWF which will consume all the available power.

Figure 14
figure 14

Average system power consumption of different d , (R,r)=(20,10) , K=10 .

6 Conclusions

This paper focuses on the system throughput improvement via cooperative power control in OFDMA small cell networks. Based on the system resource structure, a cooperative power control scheme named as RBEBPC is proposed. Two steps are iteratively conducted in RBEBPC. First, the small cells play L independent coalition formation games to cooperatively determine the exclusion of resource blocks. Interference constraints are calculated based on the exclusion results for each small cell. Second, each small cell solves a modified throughput maximization problem to determine the power level on each sub-channel. By following the interference constraints, the system total interference is non-increasing and part of the small cells transmit without full power. Simulation results show that both system throughput and energy consumption are improved in RBEBPC compared to the traditional IWF scheme. However, the conduction of RBEBPC relies on the backhaul link ability between the small cell and the macro cell. The performance improvement is based on the performance sacrifice of partial small cells, which may lead to the unfairness of the network. Both signaling overhead optimization and small cell fairness will be considered in our future study.

7 Appendix

7.1 Proof of Property 2

Proof.

Consider two coalitions, \(\mathcal {E}_{1}\subseteq \mathcal {N}_{l}\), \(\mathcal {E}_{2}\subseteq \mathcal {N}_{l}\) and \(\mathcal {E}_{1}\cap \mathcal {E}_{2}=\emptyset \), which satisfy a) slightly interference with each other such that \(\tilde {R}(\mathcal {E}_{1}\cup \mathcal {E}_{2})\le R(\mathcal {E}_{1}\cup \mathcal {E}_{2})=R(\mathcal {E}_{1})+R(\mathcal {E}_{2})\) and b) strong interference within each coalition such that \(\tilde {R}(\mathcal {E}_{1})> R(\mathcal {E}_{1})\) and \(\tilde {R}(\mathcal {E}_{2})>R(\mathcal {E}_{2})\). In this case, \(v(\mathcal {E}_{1}\cup \mathcal {E}_{2})=0<\tilde {R}(\mathcal {E}_{1})+\tilde {R}(\mathcal {E}_{2})=v(\mathcal {E}_{1})+v(\mathcal {E}_{2})\), which means game \(\mathcal {G}^{l}\) is not supperadditive.

7.2 Proof of Property 3

Proof.

The \(\mathbb {D}_{\textit {hp}}\) stability of partition structure obtained by Algorithm 2 follows by the termination condition of Algorithm 2. The necessary and sufficient conditions for \(\mathbb {D}_{c}\) stability of a partition can be found in [24]. Since the partition structure of \(\mathcal {G}^{l}\) is based on location and wireless channel state which are all random variables, these conditions are not always satisfied. But if \(\mathbb {D}_{c}\) stable partition of \(\mathcal {G}^{l}\) exists, the merge-split rule converges to this partition because the optimal \(\mathbb {D}_{c}\) stable partition is the unique outcome of any arbitrary merge-split rule operation [24].

7.3 Concavity Proof of P 2

Proof.

The domain of P 2 is non-empty because at least the solution \([0,0,\dots,0]^{T}\in \mathbb {R}^{\vert \mathcal {L}_{j}\vert \times 1}\) satisfies all the constraints of P 2. Since all the constraints of P 2 are linear, the domain formed by these constraints is a convex set. The Hessian of the target function is as follows:

$$ \left[ \begin{array}{llllll} {\delta_{j}^{1}} \\ & {\delta_{j}^{2}} \\ & & \ddots \\ & & & {\delta_{j}^{l}}\\ & & & & \ddots\\ & & & & &\delta_{j}^{\vert\mathcal{L}_{j}\vert} \end{array} \right] \in\mathbb{R}^{\vert\mathcal{L}_{j}\vert\times\vert\mathcal{L}_{j}\vert}, $$
((31))

where \({\delta _{j}^{l}}=\frac {W}{L\ln 2}\frac {-1}{({p_{j}^{l}}+\frac {\sigma ^{2}+\tilde {I}_{j}^{l}}{G_{\textit {jj}}^{l}})^{2}},\forall l\in \mathcal {L}_{j}\). Note that when we calculate the Hessian, the interference on each sub-channel is processed as a constant. Since the Hessian of the target function of P 2 is a diagonal matrix and each element in the diagonal is negative, the Hessian is negative semidefinite. Based on the second order conditions [22], we conclude that the target function of P 2 is a concave function. So P 2 is a concave optimization problem.

References

  1. Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2011–2016. http://www.cisco.com/en/US/solutions/collateral/ns341/ns525/ns537/ns705/ns827/white_paper_c11-520862.html.

  2. I Hwang, B Song, SS Soliman, A holistic view on hyper-dense heterogeneous and small cell networks. IEEE Commun. Mag. 51, 20–27 (2013).

    Article  Google Scholar 

  3. TR 36.932, Scenarios and Requirements for Small Cell Enhancements for E-UTRA and E-UTRAN (Release 12) (2012).

  4. MI Kamel, KMF Elsayed, in Global Telecommunications Conference. Performance evaluation of a coordinated time-domain eICIC framework based on ABSF in heterogeneous LTE-advanced networks (IEEE Piscataway,New Jersey, USA, 2012), pp. 5326–5331.

    Google Scholar 

  5. L Jiang, M Lei, in Personal Indoor and Mobile Radio Communications. Resource allocation for eICIC scheme in heterogeneous networks (IEEE Piscataway,New Jersey, USA, 2012), pp. 448–453.

    Google Scholar 

  6. J Oh, Y Han, in Personal Indoor and Mobile Radio Communications. Cell selection for range expansion with almost blank subframe in heterogeneous networks (IEEE Piscataway,New Jersey, USA, 2012), pp. 653–657.

    Google Scholar 

  7. J Pang, J Wang, D Wang, G Shen, Q Jiang, J Liu, in Wireless Communications and Networking Conference. Optimized time-domain resource partitioning for enhanced inter-cell interference coordination in heterogeneous networks (IEEE Piscataway,New Jersey, USA, 2012), pp. 1613–1617.

    Google Scholar 

  8. S Uygungelen, G Auer, Z Bharucha, in Vehicular Technology Conference. Graph-based dynamic frequency reuse in femtocell networks (IEEE Piscataway,New Jersey, USA, 2011), pp. 1–6.

    Google Scholar 

  9. W Noh, W Shin, C Shin, K Jang, Choi H-h, in Wireless Communications and Networking Conference. Distributed frequency resource control for intercell interference control in heterogeneous networks (IEEE Piscataway,New Jersey, USA, 2012), pp. 1794–1799.

    Google Scholar 

  10. T Nakamura, S Nagata, A Benjebbour, Y Kishiyamaand, T Hai, S Xiaodong, Y Ning, L Nan, Trends in small cell enhancements in LTE advanced. IEEE Commun. Mag. 51, 98–105 (2013).

    Article  Google Scholar 

  11. P Li, Y Zhu, in Personal Indoor and Mobile Radio Communications. Price-based power control of femtocell networks: a Stackelberg game approach (IEEE Piscataway,New Jersey, USA, 2012), pp. 1185–1191.

    Google Scholar 

  12. S Guruacharya, D Niyato, DI Kim, E Hossain, Hierarchical competition for downlink power allocation in OFDMA femtocell networks. IEEE Trans. Wireless Comm. 12, 1543–1553 (2013).

    Article  Google Scholar 

  13. L Giupponi, C Ibars, in Personal Indoor and Mobile Radio Communications. Distributed interference control in OFDMA-based femtocells (IEEE Piscataway,New Jersey, USA, 2010), pp. 1201–1206.

    Chapter  Google Scholar 

  14. L Venturino, N Prasad, X Wang, Coordinated scheduling and power allocation in downlink multicell OFDMA networks. IEEE Trans. Veh. Tech. 58, 2835–2848 (2009).

    Article  Google Scholar 

  15. J Kimm, D-H Cho, A joint power and subchannel allocation scheme maximizing system capacity in indoor dense mobile communication systems. IEEE Trans. Veh. Tech. 59, 4340–4353 (2010).

    Article  Google Scholar 

  16. KW Shum, K-K Leung, CW Sung, Convergence of iterative waterfilling algorithm for Gaussian interference channels. IEEE J. Sel. Area Comm. 25, 1091–1100 (2007).

    Article  Google Scholar 

  17. F Pantisano, M Bennis, W Saad, R Verdone, M Latva-aho, in Wireless Communications and Networking Conference. Coalition formation games for femtocell interference management: a recursive core approach (IEEE Piscataway,New Jersey, USA, 2011), pp. 1161–1166.

    Google Scholar 

  18. Z Zhang, L Song, Z Han, W Saad, Z Lu, in Wireless Communications and Networking Conference. Overlapping coalition formation games for cooperative interference management in small cell networks (IEEE Piscataway,New Jersey, USA, 2013), pp. 643–648.

    Google Scholar 

  19. D Tse, P Viswanath, Fundamentals of Wireless Communication (Cambridge University Press, USA, 2004).

    Google Scholar 

  20. CS Ranaweera, PP Iannone, KN Oikonomou, KC Reichmann, RK Sinha, Design of cost-optimal passive optical networks for small cell backhaul using installed fibers. IEEE/OSA J. Opt. Commun. Netw. 5, 230–239 (2013).

    Article  Google Scholar 

  21. W Saad, Z Han, M Debbah, A Hjorungnes, T Basar, Coalitional game theory for communication networks. IEEE Signal Process. Mag. 26, 77–97 (2009).

    Article  Google Scholar 

  22. S Boyd, L Vandenberghe, Convex Optimization (Cambridge University Press, USA, 2004).

    Book  MATH  Google Scholar 

  23. 3GPP, TR 36.814, Further advancements for E-UTRA physical layer aspects (Release 9) (2010).

  24. KR Apt, T Radzik, in arXiv:cs/0605132v1 [cs.GT]. Stable partitions in coalitional games (New York, USA, May, 2006).

Download references

Acknowledgements

This work was supported by the ‘Radio Resource Management for Small Cell Deployment’ Project of DOCOMO Beijing Communications Laboratories Co., Ltd, the National Natural Science Foundation of China (Grant No.61471060) and the Funds for Creative Research Groups of China (Grant No.61421061).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hui Tian.

Additional information

Competing interests

The authors declare that they have no competing interests.

Rights and permissions

Open Access  This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made.

The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.

To view a copy of this licence, visit https://creativecommons.org/licenses/by/4.0/.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Nie, G., Tian, H., Ren, J. et al. Cooperative power control in OFDMA small cell networks. J Wireless Com Network 2015, 66 (2015). https://doi.org/10.1186/s13638-015-0304-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-015-0304-7

Keywords