- Research
- Open Access
Recursive load balance scheme for two-tier cellular networks using enhanced inter-cell interference coordination
- Myunghoon Hong^{1} and
- Seungyoung Park^{1}Email author
https://doi.org/10.1186/s13638-015-0335-0
© Hong and Park; licensee Springer. 2015
Received: 14 November 2014
Accepted: 18 March 2015
Published: 9 April 2015
Abstract
Two-tier cellular networks in which small cells are overlaid with macro-cells have attracted considerable attention because these networks are expected to accommodate the rapidly increasing mobile traffic. Enhanced inter-cell interference coordination (eICIC) has also been proposed to further enhance the overall system performance by offloading more macro-cell users to small cells. Even with this approach, it is likely that macro-cell users are effectively offloaded to the small cells in the network because of the following reasons: i) some macro-cell users are offloaded to small cells by simply comparing their received signal strengths, and ii) the almost blank subframe (ABS) in the small cell is strictly assigned to users who experience strong interference from its nearby macro-cells. In this paper, we propose a load balance scheme for improving the downlink network-wide proportional fairness (PF) for two-tier cellular networks using eICIC. In particular, employing a cumulative distribution function-based scheduling scheme that supports sharing ABS across all users in each small cell, the proposed scheme recursively combines i) the user association between the cells and ii) ABS rate adaptation to improve the network PF. Through system-level simulations, we demonstrate that the proposed scheme noticeably improves the network PF compared to the eICIC scheme regardless of the number of macro-cell users offloaded to small cells.
Keywords
- Load balance
- Enhanced inter-cell interference coordination
- eICIC
- Two-tier cellular network
- Almost blank subframe
- ABS
- CDF-based scheduling
1 Introduction
The wireless network has been evolved with the latest technology such as Long-Term Evolution (LTE) to meet the exponential traffic growth in mobile broadband services. However, LTE is likely to be still insufficient to meet this traffic growth because mobile data traffic has been predicted to increase 13-fold between 2012 and 2017 [1]. To meet the increasing traffic demands, the concept of spatial reuse has attracted considerable attention.
To enable improved spatial reuse, two-tier cellular networks in which small cells are overlaid by macro-cells have been introduced [2]. A large number of cells deployed in a fixed area can reduce the distances between transmitter-receiver pairs; hence, their radio link qualities can be enhanced to possibly support larger data rates. Typically, the coverage of a macro-cell is much larger than that of a small cell because the transmit power of the macro-cell is much higher. Thus, a severe imbalance results with respect to the numbers of users associated with macro-cells and small cells, if a user is served by a cell for which the received signal strength is strongest.
The performance of two-tier networks using eICIC is known to be sensitive to the setting of CRE bias and the ABS rate [7]. Thus, several schemes have been proposed to maximize the sum of users’ utilities in the network (i.e., network-wide utility) through adapting the ABS rate and determining users that should receive the resource within the ABS or non-ABS [8-10]. However, it is unlikely that these schemes effectively balance the loads among the macro-cells and the small cells. The reason is that some macro-cell users are offloaded to the small cells by simply comparing the received signal strengths due to CRE.
In a single-tier macro-cell network, a load balance (LB) problem was formulated as maximizing the network-wide utility such as proportional fairness (PF). As the problem was shown to be non-deterministic polynomial-time (NP)-hard, a heuristic algorithm was proposed such that each user is offloaded to another cell only when the network utility increases in a distributed manner [11,12]. Therefore, we expect that the network load of a two-tier network using eICIC becomes better balanced if a heuristic algorithm similar to those in [11,12] is employed instead of CRE.
Typically, the numbers of victim and non-victim users are quite different among the cells. For a given ABS rate, when the number of the non-victim users is much larger than that of the victim users in some small cells, non-victim users in these small cells could not be assigned a sufficient resource while victim users would be assigned too much resource. This unbalanced resource allocation cannot be mitigated because the ABS rate which is identical to all cells cannot be adjusted only for these small cells. However, as ABS can be assigned to the non-victim users without any interference problem, the unbalanced allocation problem is expected to be mitigated if ABS is shared across the non-victim and the victim users. Computer simulations have demonstrated that the throughput performance can be improved if a similar assignment policy sharing both subframes among the victim and the non-victim users is employed using a proportional fair scheduling [13]. In this case, each small-cell user separately estimates its transmission rates corresponding to ABS and non-ABS, respectively, because the interference power levels at a small cell may be quite different from ABS and non-ABS [14].
To achieve this, the small cell transmits a pilot signal and each small-cell user estimates its channels on ABS and non-ABS using the pilot signal. Note that the pilot signal is not transmitted on the entire frame. Particularly, in LTE, the pilot signal occupies prespecified locations of time and frequency resources within the frame [15]. After the channel estimation, the received pilot signals are regenerated. Then, the signals of interference plus noise on ABS and non-ABS are estimated by subtracting the corresponding regenerated pilot signals from the corresponding received signals [16]. After the interference-plus-noise powers are estimated using these signals, the signal-to-interference-plus-noise power ratios (SINRs) on ABS and non-ABS are estimated. From the estimated SINRs, the transmission rates are estimated using rate estimation techniques such as the exponential effective SINR [17].
After the estimated rates are sent to its serving small cell, each resource in ABS and non-ABS is assigned to the user with the largest proportional fair metric irrespective of whether the user is a victim or a non-victim. However, if non-ABS is assigned to the victim user, the transmission rate would be almost near zero due to strong cross-tier interference from nearby macro-cells. For this reason, in this paper, non-ABS is allowed to be assigned strictly to the non-victim users while ABS is allowed to be assigned to the non-victim and the victim users.
Unfortunately, it is unlikely that the sharing assignment using proportional fair scheduling can be easily employed in a LB problem for two-tier networks using eICIC. This is because a particular user’s throughput needs to be estimated in advance to determine whether it is offloaded [11]. However, the theoretical evaluation of user throughput has not yet been known. This difficulty can be avoided if a cumulative distribution function (CDF)-based scheduling is employed, because the throughput of a particular user can be easily evaluated, while the performance is similar to that of proportional fair scheduling [18,19].
Therefore, in this paper, we propose a LB scheme to improve the downlink network-wide utility using the CDF-based scheduling that supports sharing ABS across victim and non-victim users. In particular, the proposed scheme recursively combines i) the user association between cells and ii) the adaptation of the ABS rate such that the network utility is improved. System-level simulations demonstrate that the proposed scheme improves the network utility compared to the eICIC scheme regardless of the number of macro-cell users offloaded to small cells.
The remainder of this paper is organized as follows. Section 2 describes the frame structure supporting eICIC in a two-tier cellular network, the received system model, and the user association. The scheduling process supporting the assignment policy that shares ABS across victim as well as non-victim users is described in Section 3. The proposed recursive LB scheme is described in Section 4. System-level simulation results are presented in Section 5. Finally, we draw a conclusion in Section 6.
The notations adopted in this paper are as follows. We use \(|{\mathcal {U}}|\) to denote the cardinality of set , abs(a) to denote the absolute value of complex number a, (·)^{∗} to denote complex conjugate, δ(·) to denote the Kronecker-delta function, and F _{ X }(·) to denote a CDF of random variable X, respectively. Further, a complex random variable Z is called a zero-mean circularly symmetric complex Gaussian random variable, if and only if the real and imaginary parts of Z are statistically independent and identically distributed (i.i.d.) Gaussian with a zero mean and a variance of \(\frac {\sigma ^{2}}{2}\) and it is expressed as \(Z \sim {\mathcal {C}}{\mathcal {N}}\left (0,\sigma ^{2}\right)\).
2 System description
2.1 Frame structure
In practice, each macro-cell does not transmit data, but it still transmits the most essential information such as the pilot signal during ABS [20]. To fully benefit from ABS, each victim user who receives data from a small cell during ABS may employ an interference cancellation receiver such that data is detected after the pilot signals from nearby macro-cells are estimated and subtracted from the received signal [21]. Assuming that the pilot signals from macro-cells are perfectly cancelled on ABS duration, the victim users would not experience strong cross-tier interference on ABS duration. Therefore, we assume that the small-cell users do not experience the interference from the macro-cells during ABS.
2.2 Received signal model
respectively. In (2), , , \({\mathcal {A}}_{\alpha }\), and \({\mathcal {B}}_{\alpha }\) denote a set of macro-cells, a set of small cells, a set of PRBs within non-ABS, and a set of PRBs within ABS for a given value of α, respectively. Assume that \(h_{i,k,b}^{q}\) is static during each frame, independent from PRB to PRB, known perfectly to the receiver, distributed according to \({\mathcal {C}}{\mathcal {N}}(0,1)\), and \(E\left \{\left (h_{i,k,b}^{q}\right)^{\ast } h_{i',k',b'}^{q'}\right \} =\delta (i-i')\delta (k-k')\delta (b-b')\delta (q-q')\).
and
respectively. Note that (??) is derived using the assumption that small-cell users do not experience the interference from the macro-cells during ABS as discussed in Section 2.1. In addition, assume that the downlink data queues of different users are infinitely backlogged and any queueing dynamics are not considered in this paper.
In the remainder of this paper, for simplicity, we drop the superscript q indicating the frame index.
2.3 CRE and eICIC
and it is associated with cell \(\hat i\), where Γ _{ i } denotes the CRE bias of cell i such that Γ _{ i }>1 for \(i\in {\mathcal {S}}\), and Γ _{ i }=1 for \(i\in {\mathcal {M}}\). Note that the CRE mechanism does not change the network operation considerably, because it uses the framework already available to carry out the handover procedure.
After the user association, a user associated with a macro-cell is assigned non-ABS (i.e., macro-cell user). Further, a user that is associated with a small cell and receives the strongest signal from it is assigned non-ABS (i.e., non-victim user). Besides, a user forcibly associated with a small cell satisfying (7) is assigned only ABS because it experiences strong cross-tier interference (i.e., victim user).
We have described the user association and resource assignment policy in the eICIC scheme where non-ABS and ABS are strictly assigned to the non-victim and the victim users, respectively. In the following, we describes the user association and resource assignment to support sharing ABS across the non-victim and victim users for the proposed scheme.
2.4 User association
where X _{ i,k }, Y _{ i,k }, and Z _{ i,k } denote variables to indicate which resource in cell i is assigned to user k. In particular, X _{ i,k }=1 if user k is assigned PRBs in non-ABS of cell i for \(i\in {\mathcal {M}}\), and 0 otherwise. Besides, Y _{ i,k }=1 if user k is assigned PRBs in non-ABS and ABS of cell i for \(i\in {\mathcal {S}}\), and 0 otherwise. Z _{ i,k }=1 if user k is assigned PRBs in ABS of cell i for \(i\in {\mathcal {S}}\), and 0 otherwise. Note that a given non-victim user k receiving the strongest signal from its associated small cell is allowed to be assigned non-ABS and ABS (i.e., Y _{ i,k }=1) because non-ABS can be assigned without a severe cross-tier interference problem. However, the victim user receiving the strongest interference signal from its nearby macro-cells is allowed to be assigned ABS only (i.e., Z _{ i,k }=1).
where \({\mathcal {V}}_{i} = \left \{k\mid Y_{i,k}=1\right \}\) and \({\mathcal {W}}_{i} = \left \{k \mid Z_{i,k}=1\right \}\). From (8), it is satisfied that \({\mathcal {U}}_{i}\cap {\mathcal {U}}_{j} =\emptyset \) for i≠j and \({\mathcal {V}}_{i}\cap {\mathcal {W}}_{i} = \emptyset \) for all i.
3 Description of scheduling process
In this section, we describe a CDF-based scheduling scheme supporting the assignment policy in which ABS is shared among the non-victim and the victim users in a small cell.
3.1 Description of CDF-based scheduling
First, we describe CDF-based scheduling under a single-tier cellular network as shown in the following lemma.
Lemma 1.
where w _{ i,k } is a non-negative weighting factor and identical to all PRBs for given cell i and user k, and \(\sum _{k} w_{i,k} = 1\phantom {\dot {i}\!}\). Then, cell i sends the downlink signal with a rate of \(R_{i,k^{\dag },b}\phantom {\dot {i}\!}\) to user k ^{ † } on PRB b.
respectively.
The proof of this lemma can be found in [18]. In this scheduling, each user feels as if virtually 1/w _{ i,k } users with the rate distributions identical to its own distribution were competing for a given PRB [18]. It implies that CDF-based scheduling exploits multiuser diversity. Also, when the average resource allocation rate is identical for all users in the cell (i.e., w _{ i,k } is the same for all users), each user’s throughput performance approaches that of a proportional fair scheduling scheme under a Rayleigh fading channel as its moving window size to estimate the average throughput increases.
Further, we can extend to the case when the spatial diversity from multiple transmit antennas is exploited along with the CDF-based scheduling if employing the unitary beamforming technique in which multiple signal streams are simultaneously transmitted through the orthonormal beamforming vectors at the transmitter as suggested in [22]. In particular, the transmitter sends the multiple orthogonal pilot signals through the orthonormal beamforming vectors. Using these pilot signals, each user estimates the rates of the signal streams and sends them to the scheduler. Then, each stream is assigned to the user with the maximum scheduling metric. As shown in [22], it is expected that the throughput performance is increased roughly proportional to the number of the streams when the number of users in the scheduler is sufficiently large.
In addition, from (11), we see that the average resource allocation rates among the users can be easily controlled by adjusting {w _{ i,k }} and their corresponding throughput performances. Due to these properties, we apply CDF-based scheduling in the proposed scheme to support sharing ABS among the non-victim and victim users in the following.
3.2 Scheduling process of proposed scheme
with \(\sum _{k\in {\mathcal {U}}_{i}}w_{i,k}=1\).
respectively.
In this case, recalling that ABS can be also assigned to non-victim users, we can fairly assign the resource among the users at the small cell if ABS is allowed to be assigned to both victim and non-victim users. To do this, we employ the scheduling scheme as follows.
First, assume that small cell i transmits a pilot signal on both non-ABS and ABS. Recalling that a small cell assigns PRBs in both non-ABS and ABS to non-victim user k in \({\mathcal {V}}_{i}\), this user estimates its downlink maximum achievable rates {R _{ i,k,b }} and \(\{\tilde R_{i,k,b}\}\) on non-ABS and ABS, respectively. On the other hand, because victim user k in \({\mathcal {W}}_{i}\) can be assigned PRBs only on ABS to avoid the cross-tier interference, this user estimates its downlink maximum achievable rates \(\{\tilde R_{i,k,b}\}\).
with \(\sum _{k\in {\mathcal {U}}_{i}}\tilde w_{i,k} =1\) and \(\tilde w_{i,k}\) is assumed to be identical to all PRBs.
respectively.
3.3 Implementation issues
Note that CDF-based scheduling requires the condition that all users’ rate distributions \(\left \{F_{R_{i,k, b}}(\cdot)\right \}\) and \(\left \{F_{\tilde R_{i,k,b}}(\cdot)\right \}\) are perfectly known to the scheduler. However, because this condition is not feasible practically, their empirical CDFs are employed [23,24]. To achieve this, user k estimates the transmission rate on PRB b using the pilot signal from its associated cell i and sends it to cell i. Then, cell i generates the empirical CDF of the rate on PRB b by accumulating user k’s rate feedback information on PRB b.
The throughput performance loss due to the empirical CDF of any arbitrary channel is shown to be negligible as the number of each user’s rate feedbacks to estimate its empirical CDF grows roughly O(K ^{2}), where K is the number of users at the scheduler [24]. In particular, when the rate of a given PRB is statistically independent from frame to frame, at most \(\frac {K}{2\epsilon }\) rate feedbacks per user are needed to achieve the performance loss of ε [24]. For example, when the number of users is 50 in a cell, at most 1,000 rate feedbacks per user are needed to achieve the loss of 2.5%.
Assuming that \(F_{R_{i,k,b}}(\cdot)\) is i.i.d. for any PRB b of user k, cell i generates the empirical CDF of R _{ i,k,b }, which is identical to any PRB of user k, by accumulating the rate feedback information of all PRBs from user k. Subsequently, its empirical CDF can be easily estimated with negligible throughput performance loss within a few frame durations because each frame typically consists of a large number of PRBs. However, in the OFDMA system, the channel fading correlations between adjacent PRBs for a given user are typically large. This means that \(F_{R_{i,k,b}}(\cdot)\) is not i.i.d. for each PRB b of user k. To make the actual channel fading experienced on each PRB to be approximately i.i.d., we can employ random beamforming vectors that are identical within one PRB but independently generated between PRBs, because the random beamforming approach reduces the correlation between PRBs [25].
Now, we discuss how many rate feedbacks are required to acquire the empirical CDF for a given user. Recall that the number of rate feedbacks to acquire the empirical CDF is at most 1,000 for the number of users in a cell of 50 and performance loss of 2.5% [24]. In LTE with a 10-MHz bandwidth and 10-ms frame duration, the number of PRBs per frame is 1,000 [15]. It means that the empirical CDF can be acquired if each user estimates its rates of all PRBs within one frame.
Furthermore, we can reduce the feedback load to acquire the empirical CDF because the number of modulation and coding scheme (MCS) levels supported in a real system is limited. This means that the rate is one of the transmission rates supported by the MCS levels. Therefore, the probability mass function (PMF) of the MCS levels is required to perform the scheduling instead of the CDF [18]. Assuming that the rate of each PRB is i.i.d., the PMF can be estimated as follows. Each user estimates the probability that a given MCS level is estimated on each PRB by accumulating the number of PRBs supporting the corresponding MCS level among all the PRBs [18]. Then, the estimated PMF is sent to the scheduler. As the number of the probabilities in PMF sent by each user is the same as that of MCS levels, each user’s feedback loads can be significantly reduced compared to the empirical CDF case. In addition, the PMF needs to be updated at an appropriate interval when users move. However, further work is required to determine how often the PMF should be updated.
4 Description of the proposed LB scheme
4.1 Problem formulations
for given \(\{X_{i,k}\}_{i\in {\mathcal {M}}}\), \(\{Y_{i,k},Z_{i,k}\}_{i\in {\mathcal {S}}}\), and α, respectively. Note that if the utility function is linear, e.g., U _{ k }(γ _{ k })=γ _{ k } for all k, (30) is maximized if the maximal-rate scheduling that selects the user with the largest transmission rate is employed [27]. Although the maximal-rate scheduling is throughput-optimal, it is not a satisfactory solution in terms of fairness among users. Instead of the linear function, in this paper, we employ a logarithmic function, i.e., U _{ k }(·)= log(·) for all k because it has been known that the throughput and the fairness are well balanced among users [28]. Note that the sum of log throughputs of all users in the network, \(\sum _{k\in {\mathcal {U}}}\log \gamma _{k}\), is defined as a network-wide PF. In addition, owing to the property of the logarithmic function, the network PF can be noticeably increased if the throughput of the users with low rates is improved rather than that of the users with high rates.
To find an optimal solution, the value of network-wide PF should be evaluated for all possible combinations of \(\{X_{i,k}\}_{i\in {\mathcal {M}}}\), \(\{Y_{i,k},Z_{i,k}\}_{i\in {\mathcal {S}}}\), and α. In particular, because the number of all possible combinations of indicator variables for a given α is \(\left (|{\mathcal {M}}|+2|{\mathcal {S}}|\right)^{|{\mathcal {U}}|}\), this problem has been known to be NP-hard [11]. Thus, we propose a heuristic algorithm to find a suboptimal solution in this work. In particular, the proposed scheme combines i) the user association among the cells and ii) the ABS rate update in a recursive manner while improving the network-wide PF.
Now, we describe the main steps of the proposed scheme qualitatively. The user association consists of i) the intra-cell user association in which each user within a given small cell is associated between non-victim and victim user groups and ii) the inter-cell user association in which each user within a given cell is associated with different cells. In particular, in the intra-cell user association, the small cell evaluates the sum of log of throughputs of the users within its cell if one of the users in the non-victim user group moves to the victim user group and vice versa. After the evaluation is performed for all users within a given small cell, one user maximizing the sum of log user throughputs is selected and moved to a different user group.
In the inter-cell user association, on the other hand, a given cell evaluates the sum of log of throughputs of the users within it and one of its neighboring cells, if one of the users within the cell is offloaded to a corresponding neighboring cell. To achieve this, the rate CDFs of a given user measured at the neighboring cells are required. Recalling that each user measures and reports its neighboring cells’ channel state information to its associated cell to facilitate the handover procedure, it is expected that the required rate CDFs can be obtained without changing the network operation considerably. After evaluating the sum of log user throughputs, we select one of the combinations of the users and the neighboring cells that maximizes the sum of log user throughputs. Then, the chosen user is offloaded to the corresponding neighboring cell.
In addition, assume that each cell performs the intra-cell association and the inter-cell association at every M _{intra} frames and every M _{inter} frames, respectively. In particular, cell i performs the inter-cell association at frame (l M _{inter}+ϖ _{ i }) where ϖ _{ i } is a randomly chosen value for cell i among {0,1,…,M _{inter}−1}. Similarly, cell i performs the intra-cell association at frame \(({lM}_{\text {intra}}+\tilde \varpi _{i})\) where \(\tilde \varpi _{i}\) is a randomly chosen value for cell i among {0,1,…,M _{intra}−1}.
In the following sections, we describe in detail the processes of the proposed scheme.
4.2 User association update
Note that the user association can be performed in a distributed manner because user k can be offloaded to one of the candidate cells in \({\mathcal {C}}_{k}\), which exchange the association information irrespective of whether they are macro-cells or small cells. Specifically, the association information to be exchanged is as follows. For a given user k in cell i, \(\Psi _{i,k}, \left \{\sum _{k'\in {\mathcal {U}}_{i'}} \gamma _{k'}\right \}_{i'\in {\mathcal {C}}_{k}}\), and \(\left \{\Phi _{i',k}\right \}_{i' \in {\mathcal {C}}_{k}\backslash \{i\}}\) are required to determine the most feasible candidate cell \(i_{k}^{\ast }\) as shown in (35). From (36), we see that Ψ _{ i,k } can be easily calculated because the throughputs of the users in \({\mathcal {U}}_{i}\) are already available. On the other hand, to calculate \(\Phi _{i^{\prime },k}\) in (37), first user k measures the downlink rates from cell i ^{′} and sends them to cell i. Using them, cell i acquires the rate CDF of user k for cell i ^{′} and sends it to cell i ^{′} using inter-cell interface such as the X2 interface in LTE [15]. Using the received rate CDF, cell i ^{′} calculates \(\Phi _{i^{\prime },k}\) and sends it to cell i as well as \(\sum _{k'\in {\mathcal {U}}_{i'}}\gamma _{k'}\). This process for user k is performed for all cells in \({\mathcal {C}}_{k}\backslash \{i\}\). After receiving \(\{\Phi _{i',k}\}_{i'\in {\mathcal {C}}_{k}\backslash \{i\}}\), cell i determines the most feasible candidate cell \(i_{k}^{\ast }\) for user k. Compared to the handover procedure, it is expected that the additional overhead to exchange the association information is not a heavy burden.
4.3 ABS rate update
Then, the user association processes as described in Section 4.2 are performed again with the value of α ^{∗}. The recursive process that combines user associations and the ABS rate determination iterates as long as the value of network-wide PF, i.e., \(\sum _{k\in {\mathcal {U}}}\log \gamma _{k}(\alpha ^{\ast })\), at the current iteration is larger than that of the previous iteration.
To perform the ABS rate update, it is required that the information required to estimate the throughput of all users in (39) should be provided to the central controller. Thus, to reduce this complexity, we might i) increase the period of ABS update, which increases the convergence time, or ii) perform the ABS update using only some of cells, which results in performance loss.
4.4 Extension to N-tier cellular network
Consider the case when the inter-cell user association is employed in a N-tier cellular network which consists of N spatially and spectrally coexisting tiers, and each tier is distinguished by its transmit power, cell density, and data rate [29]. In this case, the information required to perform the inter-cell user association might exchange among the cells in only some tiers. For example, it is not allowed that a user is offloaded to a cell for a closed subscriber group (CSG) if it is not a member of the corresponding CSG [30]. It means that a given user in a cell might not be offloaded to some neighboring cells. This limits the performance improvement compared to the case when the information exchanges among all cells in all tiers.
Also, when only macro-cells employ ABS, the proposed ABS rate update can be employed without any modification. However, when the ABS rate is different for each tier in a N-tier cellular network, it is not easy to determine the ABS rates for all tiers maximizing the network PF at once. The simplest way to update the ABS rates is that the ABS rate for an arbitrary chosen tier is updated every after all cells complete their user association processes. Therefore, a further work is required to develop the ABS rate update algorithm supporting different ABS rates in a N-tier cellular network.
4.5 Power control aspects
Although we have considered that the transmit power levels of the cells are fixed, it is expected that the performance can be further improved if each cell’s transmission power is adaptively controlled. However, it is very hard to determine the optimal power levels of the cells to improve network PF. The reason is that increasing the power in one cell increases interference in the other and vice versa, making most of the cases a non-convex or non-concave problem. To solve this problem, we may combine the power control process with the association process and the ABS rate update process in a recursive manner. The power control process is described as follows.
Assume that each cell can select its power level from a set of multiple power levels \(\tilde {\mathcal {P}}\) that is common to all cells. Under this setup, at every given frame, a given cell estimates the sum of log throughputs of the users within itself for all possible combinations of transmit power levels of itself and its neighboring cells. Then, the information on the sum of log user throughputs is exchanged among them. Using the received information received from its neighboring cells, the cell evaluates the sum of log throughputs of the users in itself and its neighboring cells. Finally, the cell selects a combination of power levels that maximizes the sum of log throughputs of the users in itself and its neighboring cells and applies the power levels on itself and its neighboring cells. Similar to the association process and the ABS rate update process, the power control process for each cell is iterated every M _{ p } frames. The detailed process is described as follows.
Then, the power levels in \({\mathcal {P}}_{i,j^{\ast }}\) are employed at cells in \({\mathcal {N}}_{i} \cup \{i\}\). After every cell performs the power control process once, the association process and the ABS rate update process are performed sequentially.
As more additional research is required to combine the power control with the current proposed scheme, we would like to earmark the work of combining the power control process with the proposed scheme as a future research topic.
5 System-level simulation results
5.1 Simulation assumptions
To evaluate the average system performance, we employ most of the simulation assumptions suggested in [31]. In particular, we consider a wraparound structure consisting of 19 hexagonal macro-cell sites, each having three sectors. Note that each sector in a macro-cell site represents a macro-cell. In this configuration, the inter-site distance is 500 m and each macro-cell employs an 18-dBi gain directional antenna with 70° horizontal 3-dB beamwidth, 10° vertical 3-dB beamwidth, 15° down-tilt angle, and 32 m in height. In each macro-cell’s geographical area, L=4 small cells are uniformly distributed unless stated otherwise. Also, each small cell’s minimum distances to its overlaid macro-cell and the other small cells are 75 and 40 m, respectively. Each small cell employs an omnidirectional antenna with 5-dBi antenna gain, and each user employs an omnidirectional antenna with 0-dBi gain and 1.5 m in height.
Each cell employs an OFDMA system using a 9-MHz bandwidth and 10-ms frame length. Each PRB occupies 180 kHz in frequency [15]. Assume that each PRB experiences flat fading while it is i.i.d. between PRBs. We perform the scheduling process on each PRB independently as described in Section 3. The transmit powers of macro-cells and small cells are 46 and 37 dBm, respectively. The thermal noise density is −174 dBm/Hz, and the noise figure is 7 dB. The number of users per one geographical macro-cell area is 60.
The clustered user placement for small cells is employed as shown in [31]. In particular, \(\left (\frac {1}{15}\right)\) of the users in each macro-cell area are uniformly distributed within the 40-m radius of each underlying small cell. In addition, these users are static and distributed in such a way as to satisfy the minimum distance to a macro-cell of 35 m and the minimum distance to a small cell of 10 m. The rest of the users, i.e., \(\left (1-\frac {L}{15}\right)\) of all users, are assumed to be static and uniformly distributed in the whole area.
Summary of simulation assumptions
Parameter | Value |
---|---|
Number of macro-cell sites | 19 |
Inter-site distance of macro-cell site | 500 m |
Number of sectors (macro-cell) per | 3 |
macro-cell site | |
Number of small-cells per macro-cell | 4 |
Number of users per macro-cell | 60 |
Transmit antenna pattern of macro-cell | 70° 3-dB beamwidth, 18 dBi |
Transmit antenna pattern of small-cell | Omnidirectional, 5 dBi |
Receive antenna pattern of user | Omnidirectional, 0 dBi |
System bandwidth | 9 MHz |
PRB bandwidth | 180 kHz |
Thermal noise density | −174 dBm/Hz |
Noise figure at user | 7 dB |
Transmit power of macro-cell | 46 dBm |
Transmit power of small-cell | 37 dBm |
Standard deviation of shadowing | 10 dB |
Shadowing correlation | 0.5 |
Penetration loss | 20 dB |
Minimum distance between | 75 m |
macro- and small-cells | |
Minimum distance between small-cells | 40 m |
Minimum distance between | 35 m |
macro-cell and user | |
Minimum distance between | 10 m |
small-cell and user |
To get the average performance, we numerically averaged over 100 different simulated realizations of the locations of small cells and users. To fairly compare the performance, we assumed that the eICIC scheme employs the same scheduling process described in Section 3 and determines the ABS rate such that the network-wide PF is maximized for a given value of CRE bias unless stated otherwise [9,10].
5.2 Numerical results
Performance metrics: We present the performance metrics to compare the performance of the proposed scheme and eICIC schemes as follows. The xth percentile user throughput indicates the value of user throughput below which a given x % of user throughputs fall. For example, the 5th percentile user throughput can be interpreted that 95% of the time, an arbitrary user can have the value of user throughput which is larger than that of the 5th percentile user throughput. Alternatively, 95% of users have the values of user throughputs larger that of the 5th percentile user throughput.
Recalling that a logarithmic function is employed as the utility function in Section 4.1, the network PF can be noticeably increased if the throughput of the users with low rates is improved rather than that of the users with high rates. Therefore, we are mainly interested in the low user-throughput performance improvement, i.e., the 5th percentile user throughput (i.e., the low user throughput) improvement. With this aim, we performed the simulations of the eICIC scheme for CRE bias values of {3,6,9,12,15,18,21,24} (in dB) for L=4, and we found that the low user throughput of the eICIC scheme is maximized with a CRE bias of 15 dB. Therefore, we employ the CRE bias value of 15 dB for the eICIC scheme unless stated otherwise.
Note that ranges between \(\frac {1}{|{\mathcal {U}}|}\) representing the least fair case and 1 representing the best fair case in which all users’ throughputs are the same.
In Figure 5b, it is observed that approximately two times longer time is required to converge the performance compared to those of the static case for M _{inter}≤100. However, the performance is maintained after converging the performance. On the other hand, for M _{inter}=200, the performance degrades noticeably because M _{inter} is too large to support the mobile users adequately. This means that the value of M _{inter} needs to be chosen carefully under the mobility condition.
From these figures, we first notice that the eICIC scheme with the sharing assignment outperforms the eICIC scheme with the strict assignment. This implies that the user throughput performance is noticeably improved by simply allowing ABS to be shared among all users in a given small cell. In addition, we observe that the proposed scheme improves most users’ throughput performances compared to those of eICIC schemes. In particular, in Figure 6b, the 5th percentile user throughput (i.e., the low user throughput) is improved by approximately 29.6% compared to that of the eICIC scheme with the sharing assignment. However, the 95th percentile user throughput (i.e., the high user throughput) is slightly decreased by approximately 2.8%. The reason is that the proposed scheme increases the network PF by mainly improving the low user-throughput performance.
Jain’s index improvement over eICIC schemes
CRE bias for eICIC (dB) | ||||
---|---|---|---|---|
3 | 9 | 15 | 21 | |
Jain’s index improvement (%) | 57.0 | 27.0 | 15.4 | 11.5 |
Compared to the eICIC scheme, it is observed that the performance of the 95th percentile user throughput (i.e., the high user throughput) is degraded. The reason is that the proposed scheme increases the network PF by mainly improving low user-throughput performance. However, it is observed that the proposed scheme improves the performance of the 5th percentile user throughput (i.e., the low user throughput) and the mean throughput regardless of L. This means that the proposed scheme finds suitable sets of user association and the ABS rate that improves the system performance under various system conditions.
6 Conclusions
In this paper, we proposed an LB scheme for two-tier cellular networks using the eICIC scheme under the CDF-based scheduling scheme that supports sharing ABS among all users in a given small cell. In particular, the user association between the cells and the ABS rate determination are recursively combined to improve the network-wide PF. System-level simulations demonstrated that the proposed scheme improves the network-wide PF compared to the eICIC scheme regardless of the number of macro-cells offloaded to the small cells.
We have considered the case where every cell transmits with a fixed transmission power. However, it is expected that the overall system performance could be further improved if each cell’s transmission power is adaptively controlled. Therefore, an LB algorithm that includes the transmit power control process is a topic of interest for future work. In addition, as it has been known that multiple antenna transmission can further improve throughput performance, it is necessary to extend this work in the future to the case when spatial diversity mechanisms to schedule multiple users simultaneously are employed along with exploiting multiuser diversity from the CDF-based scheduling. Finally, we have considered only the time-domain interference management scenario for two-tier cellular networks without CA. However, it was demonstrated in [6] that the overall throughput performance of a two-tier network with CA is significantly improved if joint interference management and cell association is performed in both time and frequency domains. Therefore, future work will involve the development of an LB algorithm to improve the network PF for two-tier cellular networks with CA.
Declarations
Acknowledgements
This research was supported by the Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Science, ICT & Future Planning (NRF-2012R1A1A1001769).
Authors’ Affiliations
References
- Cisco, Cisco visual networking index: global mobile data traffic forecast update, 2012-2017. Technical report (February 2013).Google Scholar
- A Damnjanovic, J Montojo, Y Wei, T Ji, T Luo, M Vajapeyam, T Yoo, O Song, D Malladi, A survey on 3GPP heterogeneous networks. IEEE Wireless Commun. 18(3), 10–21 (2011).View ArticleGoogle Scholar
- D López-Pérez, I Güvenc, G de la Roche, M Kountouris, TQS Quek, J Zhang, Enhanced intercell interference coordination challenges in heterogeneous networks. IEEE Wireless Commun. 18(3), 22–30 (2011).View ArticleGoogle Scholar
- X Lin, JG Andrews, A Ghosh, Modeling, analysis and design for carrier aggregation in heterogeneous cellular networks. IEEE Trans. Commun. 61(9), 4002–4015 (2013).View ArticleGoogle Scholar
- L Lindbom, R Love, S Krishnamurthy, C Yao, N Miki, V Chandrasekhar, Enhanced inter-cell interference coordination for heterogeneous networks in LTE-advanced: a survey (2011). CoRR abs/1112.1344.Google Scholar
- M Simsek, M Bennis, I Guvenc, Learning based frequency- and time-domain inter-cell interference coordination in HetNets. IEEE Trans. Vehicular Technol (2015). in press.Google Scholar
- Y Wang, B Soret, KI Pedersen, in Proc. IEEE International Conference on Communications. Sensitivity study of optimal eICIC configurations in different heterogeneous network scenarios (Ottawa, ON, 2012), pp. 6792–6796.Google Scholar
- J Pang, J Wang, D Wang, G Shen, Q Jiang, J Liu, in Proc. IEEE Wireless Commun. and Networking Conference. Optimized time-domain resource partitioning for enhanced inter-cell interference coordination in heterogeneous networks (Shanghai, China, 2012), pp. 1613–1617.Google Scholar
- S Vasudevan, RN Pupala, K Sivanesan, Dynamic eICIC − a proactive strategy for improving spectral efficiencies of heterogeneous LTE cellular networks by leveraging user mobility and traffic dynamics. IEEE Trans. Wireless Commun. 12(10), 4956–4969 (2013).View ArticleGoogle Scholar
- S Lembo, P Lunden, O Tirkkonen, K Valkealahti, in Proc. IEEE International Conference on Communications. Optimal muting ratio for enhanced inter-cell interference coordination (eICIC) in HetNets (Budapest, Hungary, 2013), pp. 1145–1149.Google Scholar
- T Bu, L Li, R Ramjee, in Proc. IEEE Conference on Computer Communications. Generalized proportional fair scheduling in third generation wireless data networks (Barcelona, Spain, 2006), pp. 1–12.Google Scholar
- K Son, S Chong, G de Veciana, Dynamic association for load balancing and interference avoidance in multi-cell networks. IEEE Trans. Wireless Commun. 8(7), 3566–3576 (2009).View ArticleGoogle Scholar
- A Weber, O Stanze, in Proc. IEEE International Conference on Communications. Scheduling strategies for HetNets using eICIC (Ottawa, Canada, 2012), pp. 6787–6791.Google Scholar
- KI Pedersen, Y Wang, S Strzyz, F Frederiksen, Enhanced inter-cell interference coordination in co-channel multi-layer LTE-advanced networks. IEEE Wireless Commun. 20(3), 120–127 (2013).View ArticleGoogle Scholar
- H Holma, A Toskala, LTE for UMTS-OFDMA and SC-FDMA Based Radio Access (John Wiley & Sons Ltd, West Sussex, UK, 2009).Google Scholar
- AM Mourad, L Brunel, A Okazaki, U Salim, in Proc. IEEE Vehicular Technology Conference. Channel quality indicator estimation for OFDMA systems in the downlink (Dublin, Ireland, 2007), pp. 1771–1775.Google Scholar
- R Giuliano, F Mazzenga, Exponential effective SINR approximations for OFDM/OFDMA-based cellular system planning. IEEE Trans. Wireless Commun. 8(9), 4434–4439 (2009).View ArticleGoogle Scholar
- D Park, H Seo, H Kwon, B Lee, Wireless packet scheduling based on the cumulative distribution function of user transmission rates. IEEE Trans. Commun. 53(11), 1919–1929 (2005).View ArticleGoogle Scholar
- J-G Choi, S Bahk, Cell-throughput analysis of the proportional fair scheduler in the single-cell environment. IEEE Trans. Vehicular Technol. 56(2), 766–778 (2007).View ArticleGoogle Scholar
- B Soret, H Wang, KI Pedersen, C Rosa, Multicell cooperation for LTE-advanced heterogeneous network scenarios. IEEE Wireless Commun. 20(1), 27–34 (2013).View ArticleGoogle Scholar
- B Soret, Y Wang, KI Pedersen, in Proc. IEEE International Conference on Communications. CRS interference cancellation in heterogeneous networks for LTE-advanced downlink (Ottawa, Canada, 2012), pp. 6797–6801.Google Scholar
- M Sharif, B Hassibi, On the capacity of MIMO broadcast channels with partial side information. IEEE Trans. Inf. Theory. 51(2), 506–522 (2005).View ArticleMATHMathSciNetGoogle Scholar
- T Bonald, in Proc. European Wireless. A score-based opportunistic scheduler for fading radio channels (Barcelona, Spain, 2004), pp. 1–7.Google Scholar
- S Patil, G de Veciana, Measurement-based opportunistic scheduling for heterogenous wireless systems. 57(9), 2745–2753 (2009).Google Scholar
- P Svedman, SK Wilson, LJ Jr Cimini, B Ottersten, Opportunistic beamforming and scheduling for OFDMA systems. 55(5), 941–952 (2007).Google Scholar
- S Stanczak, M Wiczanowski, H Boche, Fundamentals of Resource Allocation in Wireless Networks: Theory and Algorithms (Springer, Berlin Heidelberg, 2009).Google Scholar
- R Knopp, PA Humblet, in Proc. IEEE International Conference on Communications, 1. Information capacity and power control in single-cell multiuser communications (Seattle, WA, 1995), pp. 331–335.Google Scholar
- HJ Kushner, PA Whiting, Convergence of proportional-fair sharing algorithms under general conditions. IEEE Trans. Wireless Commun. 3(4), 1250–1259 (2004).View ArticleGoogle Scholar
- HS Dhillon, RK Ganti, F Baccelli, JG Andrews, Modeling and analysis of K-tier downlink heterogeneous cellular networks. IEEE J. Selected Areas Commun. 30(3), 550–560 (2012).View ArticleGoogle Scholar
- RQ Hu, Y Qian, Heterogeneous Cellular Networks (John Wiley & Sons Ltd, West Sussex, UK, 2013).View ArticleGoogle Scholar
- 3GPP TR 36.814 v9.0.0., Further advancement for E-UTRA physical layer aspects (Release 9). Technical report, 3GPP (2010).Google Scholar
- R Jain, The Art of Computer Systems Performance Analysis: Techniques for Experimental Design, Measurement, Simulation and Modeling (Wiley, New York, 1991).MATHGoogle Scholar
Copyright
This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly credited.