Skip to main content

A dual threshold listen-before-talk for unlicensed LTE systems

Abstract

The insufficient wireless frequency bands are likely to arise with the increase in mobile traffic demand. Many mobile operators suffer from a high annual increase in the cost of licensed wireless bands. Unlicensed bands present a potential opportunity for mobile operators. A single 5-GHz band with a large bandwidth provides faster transmission for each user. However, interference caused by existing wireless transmissions, such as Wi-Fi in unlicensed bands, is a serious issue in the effective utilization of unlicensed bands by mobile operators. The Listen-Before-Talk (LBT) was proposed as a promising method to ensure the coexistence of Wi-Fi and commercial mobile services such as LTE. We focus on effective control of the contention window (CW) size to maximize the operability of LBT. Control of the CW size depends on the repetition of extended clear channel assessment (ECCA). We introduce a dual threshold system that counts the repetition of ECCA. The newly developed NS-3-based unlicensed band network simulator shows the effectiveness of the proposed control mechanism. The results indicated that the advantage of the proposed method improves 4.3–7.6% than traditional LBT method. We develop a composite metric of throughput and fairness to evaluate the performance of LTE-LAA access.

1 Introduction

The widespread use of mobile devices and various high-quality contents cause a significant increase in mobile internet traffic. VR/AR media and personal video streaming, such as Facebook Live, cause an exponential increase in traffic. A report by Cisco indicates that mobile connections will reach 11.5 billion and global mobile data traffic will exceed 24.3 exabytes in 2020 [1]. The explosion of mobile data traffic increases the need of additional wireless bandwidth. Although licensed wireless bands are extremely affordable with respect to guaranteeing service quality, the usability of licensed bands is strictly limited. Limited amounts of licensed bands (i.e., 20–40 MHz for single-LTE operators) are allocated to mobile operators under strict regulations by domestic governments. Specifically, LTE Licensed-Assisted Access (LTE-LAA) proposes aggregated carrier utilization between licensed and unlicensed bands (see Fig. 1). A large unlicensed bandwidth (i.e., 455 MHz bandwidth in Europe and 580 MHz in the USA in the 5-GHz band) can be used as sufficient supplementary carriers under the assistance of control signaling of licensed bands.

Fig. 1
figure 1

Band aggregation of LTE-LAA [2]

Current unlicensed bands are widely used for various wireless access systems. Wi-Fi systems, such as IEEE 802.11 ac, present an access method over the unlicensed bands [3]. Fair radio resource sharing between Wi-Fi access systems and LTE-LAA is a key issue in the utilization of unlicensed bands. A traditional LTE system promptly transmits signals without censoring the channel condition (i.e., static resource scheduling is applied to LTE systems), and thus, it is not possible to simply share radio resources with Wi-Fi wireless access systems. Therefore, a novel technical standard for the LTE-LAA channel access method is required to guarantee fair radio resource sharing with Wi-Fi access systems over unlicensed bands. A study by Dimatteo et al. proposed an integrated architecture to exploit the opportunistic networking paradigm. They built a data traffic migration method from cellular networks to metropolitan Wi-Fi access points [4]. Jeon et al. focused on the mutual effect between LTE and Wi-Fi systems. They developed an intersystem interference analysis technique based on continuum field approximation and spiral representation [5]. Liu et al. proposed a simultaneous access framework for small cells over licensed and unlicensed bands. A small cell dynamically arranges its channel access system parameters for effective coexistence with incumbent unlicensed band users. The coexistence was analytically modeled and proved via extensive simulations [6]. Cavalcante et al. compared performance evaluations of coexistence between LTE and Wi-Fi systems and pointed out technical challenges with respect to the two different access systems. They focused on a system-level analysis for specific environments such as an office or small closed area. The simulation results indicated that the LTE system performance is slightly affected by coexistence, while Wi-Fi is significantly affected by LTE transmissions [7]. A study by Almeida et al. suggested a simple coexistence scheme that reused the concept of almost blank subframes (ABS) in LTE [8]. The use of ABS is an essential point of LTE unlicensed [9, 10]. Major wireless technology companies, such as Qualcomm or Ericsson, have focused on Carrier Sensing Access Technology (CSAT) for LTE adaptation over unlicensed bands.

The Listen-Before-Talk (LBT) framework is a de facto standard of LTE-LAA channel access methods to aid in fair sharing over unlicensed bands. The adjusting LTE MAC protocols for adopting LBT are proposed [11]. It concludes that LTE-LAA can gain high-throughput performance without harming Wi-Fi performance with the proposed MAC mechanisms. The study of Ratasuk et al. [12] proposed a fairness mechanism for LAA coexistence. Downlink system performance is analyzed for multi-operator LAA deployment in an indoor hotspot, an indoor office, and an outdoor small cell. LBT similar to Wi-Fi DCF presented good fairness with Wi-Fi. But, they only hold when the coexistence channel model can accurately simulate the interference. An analysis by Chen et al. proved the effective sharing of LTE-LAA and Wi-Fi over the downlink unlicensed bands [13]. They applied a Markov chain model to a simple LBT method. Um et al. investigated the effectiveness of two alternatives, frame-based equipment (FBE) and load-based equipment (LBE), as practical implementations for LBT. The results indicated that LBE has an advantage in terms of flexible channel waiting time on busy periods despite the complexity of the LBE implementation [14, 15]. The extensive survey of LBT is provided in the study of Chen et al. [16]. They provided a holistic study for not only coexistence schemes but also overall operations of LBT.

The backoff time defined in LTE-LAA plays an important role in how the traffic will be split between Wi-Fi and LTE-LAA and, hence, is a factor in how fair the coexistence will be [17]. The adoption of an extended clear channel assessment (ECCA) for LBE granted flexibility with respect to the design of a backoff time control algorithm. When a channel is subject to a highly competitive condition, sufficient backoff time can be achieved by a sufficient contention window (CW) while minimizing unnecessary waiting time. In the study of 3GPP [18], they proposed the design of three LBT design options: (1) LBT without random backoff, (2) LBT with random backoff in a contention window of fixed size, and (3) LBT with random backoff in a contention window of variable size. Yin et al. [19] presented the minimum CW size adaptively adjusted according to the available licensed spectrum. An analytical model was developed to estimate the collision probability. Tao et al. [20] focus on CW size adaptively adjusted to an appropriate value by means of collecting the QoS metric signals from neighbor mobile stations. They assumed that the information can be exchanged over the inter-cell interfaces such as X2 interface. Fanrong et al. [21] determined the CW size based on the slot utilization. They built the analytical model of LTE-LAA slot structure and calculated slot utilization rate. Baswade and Tamma [22] also suggested CW size adjustment based on waiting time that can be directly derived from slot utilization. Saadat et al. [23] suggested a variety of CW size control method. They presented LAA-Wi-Fi coexisting scheme with transmission opportunity (TXOP) backoff control method. Instead of doubling backoff time for every unsuccessful transmission attempt, TXOP is reduced by half. TS37.213 (rel. 15) [24] presents the current LBT implementation of 3GPP LTE-LAA. The basic structure of 3GPP implementation is similar to LBE or FBE. It employs the CW and a counter. The 3GPP makes a categorization by the channel access priority. The higher access priority has smaller CW size. The smaller CW can guarantee the more opportunity to access channels.

The aforementioned research works have their own importance and try to make meaningful insights. However, they have some limitations to describe the practical LTE-LAA operations. First, almost all CW update procedures are based on LAA user feedback and base station assessment on a relatively slow time scale. They need the estimation of available licensed bandwidth and load over the Wi-Fi network. In addition, they assume the adoption of inter-cell interfaces such as X2 interface for the information exchange. The frequent measurements from the Wi-Fi networks and information exchange via separated interfaces are actually unrealistic. The hardware and software limitation of LTE-LAA networks (especially for small cell LTE-LAA networks) restricts the sufficient inter RAT (Radio Access Technology) measurements and separated physical interfaces between networks. Moreover, the analytical channel access model such as a Markovian model considered in the aforementioned works has only a limited description for contention stage. The environmental variations over network are not sufficiently considered.

In the present study, an effective design for the CW control algorithm of LBT is proposed. The proposed design suggests a dual threshold structure with respect to the CW control method to prevent improper ascending or descending relative to the waiting time. Extensive simulations and intuitive gradient-descending method indicate that the proposed dual threshold structure achieved high performance while guaranteeing fair radio resource sharing with Wi-Fi systems. We need only simple counting on unsuccessful transmission trials. The complicated analytical model and information exchange between networks are not required. Note that, we assume that all mobile nodes have same access priority to estimate holistic performance of access technologies. The study is organized as follows: A dual threshold design under the ECCA structure is suggested in Section 2. The gradient control of the dual threshold is proposed in Section 3. The computational results are analyzed in Section 4. The concluding remarks are presented in Section 5.

2 ECCA structure and channel access method

2.1 Background

The ECCA-based channel access method is based on the European standard LBE [12]. A mobile device performs a clear channel assessment (CCA) using “energy detect” prior to a transmission over an operating channel. A mobile device performs observations over the operating channel with respect to the CCA sensing time (that typically corresponds to less than 18 μs). The operating channel is considered as occupied if the detected energy level over the operating channel exceeds the predefined level. The mobile device commences ECCA sensing when the mobile device detects channel occupation within the CCA sensing time. The ECCA sensing time is randomly selected within (CCA Sensing Time × (1, , q)), where q denotes the maximum ECCA sensing time. The mobile device may resume transmissions (i.e., TXOP state, less than 10 ms) over the operating channel if the ECCA sensing identifies that the operating channel is not occupied. Following the ending of the TXOP state, the mobile device continues a short control signal transmission time (usually equal to CCA sensing time) over the operating channel, and this provides management and control frames (e.g., ACK and Block ACK frames). The LBE estimates channel contention by measuring consecutive repetitions of ECCA sensing. A new ECCA is repeatedly activated whenever the operating channel is occupied by other devices. The state transition diagram shown in Fig. 2 represents the details of the ECCA structure.

Fig. 2
figure 2

State transition diagram

2.2 Proposed access control

The ECCA sensing time is denoted by a function of q (i.e., CCA Sensing Time × (1, , q)). We introduce two counts to determine an effective q value, namely an ECCA increase counter and an ECCA decrease counter. The ECCA increase counter is used to determine the increasing event of ECCA sensing time. When the ECCA increase counter reaches iTH (i.e., ECCA increase threshold), the q value is doubled and the ECCA sensing time can then be increased. The ECCA decrease counter is used to determine the decreasing event of the ECCA sensing time. When a mobile device is in a high contention environment, the ECCA increase counter by itself results in an unnecessarily long waiting time to gain access over the operation channel. The ECCA decrease counter and dTH (i.e., ECCA decrease threshold) can guarantee the minimum accessibility of a device in a high contention environment. The ECCA increase counter simply increases at the beginning of each ECCA. Whenever ECCA increase counter equals iTH, the q value is doubled and the ECCA increase counter resets to 0. The ECCA decrease counter also increases at the beginning of each ECCA, but it retains the same value when the q value is doubled. If the ECCA decrease counter reaches dTH, then the q value resets to the minimum and ECCA decrease counter resets to 0. The ECCA decrease counter is increased by 1 only when the value of the ECCA increase counter is smaller than iTH. Thus, ECCA sensing time only decreases when the ECCA decrease counter corresponds to dTH. These dual counters and thresholds allow a simple but effective method of LBT implementation. Figure 3 shows the access control process flow chart. Figure 3a represents an overall access control process in which ECCA sensing time calculation is included as a submodule. Figure 3b provides a detailed calculation procedure for the ECCA sensing time.

Fig. 3
figure 3

Flow chart for access Control. a Overall access control process. b ECCA sensing time calculation

The maximum ECCA sensing time is determined by the q value. The maximum ECCA sensing time doubles when the ECCA increase counter reaches iTH. In contrast, the maximum ECCA sensing time resets to the minimum value when the value of the ECCA decrease counter corresponds to dTH. Figure 4 illustrates examples of operational actions of counters and thresholds. The success of channel access is strongly dependent on the ECCA sensing time. An increase in the ECCA sensing time results in a lower success rate of the LTE channel access. The proposed dual threshold method presents a mixing strategy of the short and long ECCA sensing times even over an overloaded channel. As shown in Fig. 4, the proposed dual threshold method guarantees that the LTE retains channel occupancy while permitting sufficient channel access chance to Wi-Fi devices. It is assumed that iTH and dTH correspond to 4 (i.e., iTH = dTH = 4), and Wi-Fi transmission is occasional. The #/# form values denote {ECCA increase counter/ECCA decrease counter} for each ECCA beginning. The red dotted rectangle depicts that ECCA increase counter reaches iTH. When the ECCA increase counter reaches iTH, the value of the ECCA increase counter immediately drops from 4 to 0 (ECCA decrease counter continues to remain at 3), and the q value is doubled. The blue dotted rectangle shows the actions of the ECCA decrease counter. Whenever the value of the ECCA decrease counter reaches dTH, the value of the ECCA decrease counter decreases from 4 to 0, and the q value decreases to the minimum value. The operation of the ECCA decrease counter allows more frequent access trials for the LTE over the overloaded channel.

Fig. 4
figure 4

Example of Action: iTH = dTH = 4

3 Gradient control of dual threshold

The two thresholds (i.e., iTH and dTH) induce a critical impact on the LBT performance over the operating channel. The ECCA increase threshold, iTH, denotes the consecutive occurrence of ECCA that is required to double the maximum ECCA sensing time (i.e., q value). Higher values of iTH restrict the increase in the q value, and the ECCA sensing time is then slowly extended. An increase in the ECCA sensing time results in fewer Wi-Fi access trials. Lower iTH values cause a frequent increase in the q value. A rapid increase in the q value results in excessive ECCA sensing time that reduces the access trials of LTE. The behavior of dTH can be interpreted in a similar manner. Higher values of dTH restrict the possibility of initializing the q value, and subsequently, the channel access of LTE is excessively limited. Lower dTH values result in the frequent initialization of the q value. The excessively short ECCA sensing time poses a serious disadvantage for Wi-Fi access trials. Performance metrics are typically designed as a combining function of throughput and fairness for the two given thresholds. The throughput is easily obtained by a summation of the traffic throughputs of the LTE and Wi-Fi while the fairness is indirectly estimated by the weighted difference between the traffic throughputs of the LTE and Wi-Fi.

$$ throughput\left( iTH, dTH\right)=\sum \limits_i{r}_i^{LTE}+\sum \limits_j{r}_j^{Wi- Fi} $$
(1)
$$ fairness\left( iTH, dTH\right)=w\times \left|\sum \limits_i{r}_i^{LTE}-\sum \limits_j{r}_j^{Wi- Fi}\right| $$
(2)

where \( {r}_i^{LTE} \) denotes the ith traffic throughput of LTE flow and \( {r}_j^{Wi- Fi} \) denotes the jth traffic throughput of Wi-Fi flow. Additionally, w denotes the applied weight of the throughput difference. The theoretical bases of LTE unlicensed band and Wi-Fi 5 GHz are similar. They both use OFDM and LBT technology. The performance difference is only originated from the bandwidth allocation. The allocated bandwidth is directly related to its throughput. The throughput is essential resource to users. The users share the total system throughput. The fair bandwidth allocation guarantees the fair system throughput between two technologies where two user groups of two technologies can share the throughput. Therefore, the throughput difference between two technologies directly presents the fairness between two technologies.

Note that the throughput (1) and fairness (2) calculation are performed by simulations. We build a simulation environment and then extract representative simulation results to calculate throughput and fairness (Table 3 in the Appendix shows the abstracted simulation results).

Both the throughput and fairness functions have two independent variables of iTH and dTH. Figure 5 shows an example of the LTE throughput and Wi-Fi throughput. The x-axis and y-axis denote iTH and dTH, respectively, and the z-axis denotes the throughput (in Mbps). The system setup is described in the following Section 4.1. The throughput function (1) is directly illustrated as the uppermost gray surface in Fig. 5. The fairness function (2) can be estimated by the weighted difference between LTE throughput (denoted by the light red surface) and Wi-Fi throughput (denoted by the light blue surface). The value of the fairness function is close to zero when the throughput difference between the LTE and Wi-Fi converges to a minimum value.

Fig. 5
figure 5

3D Throughput analysis. a Throughput summation. b Fairness

The determination of proper iTH and dTH values is an essential part of the proposed CW control method to maintain a balance between LTE and Wi-Fi. Function (3) shows a functional model to obtain proper values of iTH and dTH as follows:

$$ {\displaystyle \begin{array}{l}{\arg}_{\left( iTH, dTH\right)}\max f\left( iTH, dTH\right)\\ {}=\left\{\left( iTH, dTH\right)|f\left( iTH, dTH\right)= throughput\left( iTH, dTH\right)- fairness\left( iTH, dTH\right)\right\}\end{array}} $$
(3)

It is hard to model the f(iTH, dTH) as a closed form due to the irregular discreteness of f(iTH, dTH). However, the functional form can be approximated by behavioral pattern analysis for the dual threshold (iTH, dTH). Figure 5 shows the typical behaviors of LTE and Wi-Fi throughputs. The Wi-Fi throughput linearly increases with respect to dTH and exponentially decreases with respect to iTH. The LTE throughput logarithmically increases relative to iTH and exponentially decreases relative to dTH as follows:

$$ \mathrm{Wi}\hbox{-} \mathrm{Fi}\ \mathrm{throughput}={\theta}_1 dTH+{\theta}_2{e}^{iTH}+{\theta}_3 $$
(4)
$$ \mathrm{LTE}\ \mathrm{throughput}={\theta}_4\log (iTH)+{\theta}_5{e}^{dTH}+{\theta}_6 $$
(5)
$$ {\displaystyle \begin{array}{l}f\left( iTH, dTH\right)\\ {}=\left({\theta}_1 dTH+{\theta}_2{e}^{iTH}+{\theta}_3+{\theta}_4\log (iTH)+{\theta}_5{e}^{dTH}+{\theta}_6\right)\\ {}-w\left({\theta}_1 dTH+{\theta}_2{e}^{iTH}+{\theta}_3-{\theta}_4\log (iTH)-{\theta}_5{e}^{dTH}-{\theta}_6\right)\\ {}=\left(1-w\right)\left({\theta}_1 dTH+{\theta}_2{e}^{iTH}+{\theta}_4\log (iTH)+{\theta}_5{e}^{dTH}+{\theta}_3+{\theta}_6\right)\end{array}} $$
(6)

To determine proper (iTH, dTH), the parameters θi(i = 1, , 6) should be estimated appropriately. The gradient decent method [25] is very useful for multivariate function parameter estimation. The function, f(iTH, dTH), has a good presentation to apply the gradient decent method (Fig. 5 shows a typical decent direction to optimize the function f(iTH, dTH)). The selected results of LTE and Wi-Fi throughput are already gathered by the carefully designed network simulator (see Table 3 in appendix). For efficient application of the gradient decent method, we slightly modify the function f(iTH, dTH)(Eq. (6)) as follows (Eq. (7)).

$$ {h}_{\xi }(x)={\xi}_0+{\xi}_1{x}_1+{\xi}_2{x}_2+{\xi}_3{x}_3+{\xi}_4{x}_4 $$
(7)

where x1 = dTH,x2 = eiTH,x3 = log(iTH),x4 = edTH,ξ0 = (1 − w)(θ3 + θ6),ξ1 = (1 − w)θ1,,ξ4 = (1 − w)θ4.

The cost function, J(ξ0, , ξ4), which present the deference between functionally estimated and actually simulated performances, is given as Eq. (8).

$$ J\left({\xi}_0,\cdots, {\xi}_4\right)=\frac{1}{2m}\sum \limits_{i=1}^m{\left({h}_{\xi}\left({x}^{(i)}\right)-{y}^{(i)}\right)}^2 $$
(8)

where x(i) = (dTH, eiTH, log(iTH), edTH)(i) (i.e., variables from the ith dual thresholds(iTH, dTH)) and m is the number of simulated performances in Table 3 in Appendix.

The value, y(i), is obtained from the ith simulated performance ofthroughput(iTH, dTH) − fairness(iTH, dTH) (see Table 3 in Appendix). The gradient decent for parameter ξj’s are described as following (9).

$$ {\xi}_j:= {\xi}_j-\alpha \frac{1}{m}\sum \limits_{i=1}^m\left({h}_{\xi}\left({x}^{(i)}\right)-{y}^{(i)}\right){x}_j^{(i)}\ \mathrm{for}\ j=\left\{0,\cdots, 4\right\} $$
(9)

where α is the learning rate (i.e., the smaller α denotes slower learning and vice versa).

The training data set (x(i), y(i)) determines the proper parameters of function (7). Table 3 in the Appendix shows the examples of training data set. The input instances, x(i), are obtained from(iTH, dTH), and output values, y(i), can be obtained from the small number of simulations. After determining the parameters, ξ0, ξ4, we can estimate the holistic behavior of function (6) for every dual threshold (iTH, dTH) (i.e., we calculate θ1, , θ6 of function (6) using ξ0, ξ4). However, the nonlinearity of function (6) given as (iTH, dTH) cannot guarantee a proper finding of dual threshold. A search method is applied as follows:

$$ \left({iTH}^{k+1},{dTH}^{k+1}\right)=\left({iTH}^k,{dTH}^k\right)+{\delta}^k\nabla f\left({iTH}^k,{dTH}^k\right) $$
(10)
$$ \nabla f\left({iTH}^k,{dTH}^k\right)=\left\{\begin{array}{c}\left(-1,0\right)\kern1.75em if\kern0.75em f\left({iTH}^k-1,{dTH}^k\right)-f\left({iTH}^k,{dTH}^k\right)>0\\ {}\left(+1,0\right)\kern1.75em if\kern0.75em f\left({iTH}^k+1,{dTH}^k\right)-f\left({iTH}^k,{dTH}^k\right)>0\\ {}\left(0,-1\right)\kern1.75em if\kern0.75em f\left({iTH}^k,{dTH}^k-1\right)-f\left({iTH}^k,{dTH}^k\right)>0\\ {}\left(0,+1\right)\kern1.75em if\kern0.75em f\left({iTH}^k,{dTH}^k+1\right)-f\left({iTH}^k,{dTH}^k\right)>0\\ {}\kern1.5em \left(0,0\right)\kern2.25em otherwise\kern14.25em \end{array}\right. $$
(11)

It is necessary to update the kth dual threshold, (iTHk, dTHk), by the increasing direction of function f. The increasing direction, f, has a unit vector form (i.e., (±1, 0) or (0, ± 1)). The difference in the function values between kth dual threshold and its one step neighbors (i.e., f(iTHk ± 1, dTHk) − f(iTHk, dTHk) or f(iTHk, dTHk ± 1) − f(iTHk, dTHk) determines the increasing direction,f. Additionally, δk denotes a step size for the kth dual threshold. The k + 1th dual threshold (iTHk + 1, dTHk + 1) is determined by the product of the kth increasing direction and the step size. The operation commences with a wide step size for fast improvement, and the step size is then gradually reduced for minor calibration. The dual threshold update ends without any significant improvement with respect to function f(iTH, dTH). If f(iTHk + 1, dTHk + 1) − f(iTHk, dTHk) < ε, then the threshold update is stopped and the current dual threshold, (iTHk, dTHk), is reported as the best threshold.

Note that, the solution processes of optimization problem are derived by an offline application. The active code of proposed gradient decent method is very simple to activate in small cell eNB. We check the capability of commercial eNB. The installed CPU of small cell eNB is Intel SoC T3300(2Core, 2 GHz). The computing overhead of proposed gradient descent method is less than 1% of T3300.

4 Computational results

4.1 A system model for simulations

The test analysis was performed using NS-3, which is a C++–based discrete event simulator. Both LTE and Wi-Fi operate over 5180 MHz of center frequency with a bandwidth of 20 MHz. The transport protocol is dedicated to UDP for pure data rate measurement. The Wi-Fi operation is dictated by IEEE 802.11n. The CCA time is assigned as 18 μs to implement the proposed dual threshold method. The q value has a variable range corresponding to 5–30. Additionally, the single-channel occupation time (i.e., TXOP time) for the transmission is assigned as 8 ms. The simulation time is set to 30 s, and the analysis is performed for the following environments (as shown in Fig. 6).

Fig. 6
figure 6

Simulation environments. a Low interference environment. b High interference environment

Two interference environments are constructed for test cases. Figure 6a shows a low-interference environment in which 1 eNodeB and 1 Wi-Fi AP are co-located at the center position. The Wi-Fi stations (STAs) and LTE user equipment (UE) are circularly located at a distance of 10 m from the center. The 8UEs/8STAs and 12UEs/12STAs are tested for the low-interference environment. A more complicated environment, namely a high-interference environment, is tested in Figure 6b. The center co-location of 1 eNodeB and 1 AP is identical to that in the low interference environment. However, additional Wi-Fi APs are installed to ensure additional interference. Furthermore, LTE UEs Wi-Fi STAs are closely located to maximize their interference. Moreover, 8UEs/8STAs and 12UEs/12STAs are also tested. Table 1 shows other system model for the simulations.

Table 1 Basic LTE/WI-FI system model

In addition, we show the modification of NS-3 for simulations. Table 2 shows NS-3 modifications.

Table 2 Modified NS-3 modules

4.2 Simulations

To define the parameters of function (6) for each interference environment, we use a small number of training data obtained from simulations. The Table 3 in the Appendix shows the extensive simulation results for every dual threshold (iTH, dTH). The only small selected simulations are sufficient to define the function (6). Approximately 8~10 simulations for each interference environment are applied to define the parameters of function (6). This applicability gives a strong advantage to define function (6) for various inference environments those are not exploited in our test experiments.

After the defining the function (6) for test environments, we apply the dual threshold update procedure presented in Section 3. With respect to each test environment, the operation commences with a randomly selected dual threshold, and the aforementioned threshold update procedure is then applied. Figure 7 shows the effectiveness of the procedure. The proper dual threshold could be determined for each weight within a very small time bound. The highest converging time of the dual threshold corresponds to within 2000 ms, and the maximum number of procedure steps corresponds to less than 18. The x-axis in Fig. 7 denotes the obtained {iTH, dTH} pairs and their weights.

Fig. 7
figure 7

Convergence of thresholds. a Low interference: 12UEs/12STAs. b High interference: 12UEs/12STAs. c Low interference: 8UEs/8STAs. d High interference: 8UEs/8STAs

Now, we demonstrate that the obtained dual threshold is close to the optimal value. Numerous search graphs are illustrated for test environments to identify the optimality. Figure 8 illustrates the enumerative space for dual threshold pairs. The x-axis and y-axis denote iTH and dTH, respectively. The lowest plane corresponds to the highest weight for function f(iTH, dTH) (i.e., assigned weight is 1.0), and conversely, the highest plane corresponds to the lowest weight.

Fig. 8
figure 8

3D Performance graph. a Low interference: 12UEs/12STAs. b High interference: 12UEs/12STAs. c Low interference: 8UEs/8STAs. d High interference: 8UEs/8STAs

Balanced points can be determined from the 3D performance illustration. Both LTE and Wi-Fi could only obtain balanced throughputs under similar values of iTH and dTH. Specific pairs of iTH and dTH obtain a good performance in all the test cases. The pairs of (iTH, dTH) = {(3, 3), (4, 4), (7, 7), (7, 8)} indicate a good balance of LTE and Wi-Fi. The dual threshold pair (7, 7) shows the smallest throughput difference between LTE and Wi-Fi in the “Low Interference:12UEs/12STAs” case. The same dual threshold is obtained in Fig. 7a in which the value is obtained by the proposed threshold update procedure as described in Section 3. The proper iTH and dTH as the similar values (i.e., (iTH, dTH) = (3, 3), (4, 4), (7, 7), (7, 8)) denotes that the repetitive extension of ECCA sensing time is not appropriate to achieve good performance. In traditional random backoff mechanism, the sensing time is exponentially extended by the repetitive channel access failure. However, the iTH and dTH as the similar values prevent the repetitive extension of sensing time. Within a small number of access failures after the extension of ECCA sensing time, the maximum ECCA sensing time resets to the minimum value by the action of dTH (the dTH has a similar value of iTH). Remember the example of Action: iTH = dTH = 4 in Fig. 4. The same value of iTH and dTH restricts the repetitive extension of sensing time to only a single time.

Figure 9 shows the performance comparison between the proposed dual threshold control method and the well-established random backoff algorithm. The random backoff algorithm is applied to both the LBE and FBE with variable size CW. It should be noted that the difference between LBE and FBE is not significant. The results indicated that the advantage of the proposed method improves in the case of a high-interference environment. The high interference: 12UEs/12STAs case shows a maximum enhancement of 7.6% for the weight 1.0 (the average enhancement for every weight corresponds to 6.6%). The other cases show enhancement in the approximate range of 4.3–7.2%. Note that, we add the results of random backoff with fixed size CW. The performance of fixed size CW is not considerable for comparison.

Fig. 9
figure 9

Performance comparison. a Low interference: 12UEs/12STAs. b High interference: 12UEs/12STAs. c Low interference: 8UEs/8STAs. d High interference: 8UEs/8STAs

Figures 10 and 11 present separate figures of the throughput and the fairness metric. We can observe that the fairness metric is the more dominant factor for performance enhancement of the proposed dual threshold access control method.

Fig. 10
figure 10

Throughput comparison

Fig. 11
figure 11

Fairness comparison. a Low interference: 12UEs/12STAs. b High interference: 12UEs/12STAs. c Low interference: 8UEs/8STAs. d High interference: 8UEs/8STAs

5 Concluding remarks

It is necessary for wireless service operators to build the best service portfolio strategy for each user by focusing on the maximum benefit for network convergence while maximizing the overall network utilization. The LTE-LAA is one of the best methods to obtain a connection set for every user in multiple access networks. The proposed channel access method improves the balance between LTE and Wi-Fi for the LTE-LAA. The number of consecutive ECCAs is counted, and the dual threshold is applied to obtain a proper CW size. The dual threshold mechanism guarantees sufficient opportunities to access shared channels to the LTE-LAA while maintaining fair resource sharing between coexisting Wi-Fi users.

The study involved developing a fast and efficient converging scheme for a dual threshold. A gradient climbing method was adopted to update the dual threshold. The extensive enumerative simulations demonstrate the near optimality of the proposed approach. The overall decision process is unique and useful for unlicensed bands. The utility of the proposed dual threshold and the updating method in an LTE-LAA operation framework provides opportunities to design fair sharing for unlicensed resources. The network effect of a newly designed access scheme can be tested and adapted to any given network environment even under very serious interferences. The simple and practical design scheme demonstrated in the present study provides an appropriate decision-making process for new LTE-LAA adaptation in a network service.

References

  1. Cisco Visual Networking Index: global mobile data traffic forecast Update, 2014–2019, 1st ed. Cisco Public, 2015, pp. 3–16.

  2. EverythingRF, https://www.everythingrf.com/community/what-is-lte-license-assisted-access.

  3. E. H. Ong, J. Kneckt, O. Alanen, Z. Chang, T. Huovinen, Timo Nihtilä , “IEEE 802.11 ac: Enhancements for very high throughput WLANs”, PIMRC 2011

  4. S. Dimatteo, P. Hui, B. Han, V.O.K. Li, in 8th IEEE International Conferece on Mobile Ad-Hoc Sensor Systems. Cellular traffic offloading through WiFi networks (2011)

    Google Scholar 

  5. J. Jeon, Q. Li, H. Niu, A. Papathanassiou, G. Wu, LTE in the unlicensed spectrum: a novel coexistence analysis with WLAN systems. Globecom (2014)

  6. F. Liu, E. Bala, E. Erkip, R. Yang, in 2011 International Symposium on Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks (WiOpt). A framework for femtocells to access both licensed and unlisenced bands (2011)

    Google Scholar 

  7. A.M. Cavalcante, E. Almeida, R.D. Vieira, S. Choudhury, E. Tuomaala, K. Doppler, Performance evaluation of LTE and WiFi coexistence in unlicensed bands. 2013 IEEE 77th Vehicular Technology Conference (VTC Spring) (2013)

  8. E. Almeida, A.M. Cavalcante, R.C.D. Paiva, F.S. Chaves, F.M. Abinader Jr., R.D. Vieira, Enabling LTE/WiFi coexistence by LTE blank subframe allocation. ICC (2013)

  9. Qualcomm, "LTE-U technology and coexistence", LTE-U Forum, 2015

  10. Ericsson, "LTE-U coexistence", LTE-U Forum, 2015

  11. R. Ratasuk et al., “License-exempt LTE deployment in heterogeneous network,” in Proc. IEEE Int. Symp. Wireless Commun. Syst. (ISWCS), Paris, France, Aug. 2012, pp. 246?250.

  12. R. Ratasuk, N. Mangalvedhe, and A. Ghosh, “LTE in unlicensed spectrum using licensed-assisted access,” in Proc. IEEE GLOBECOM,Austin, TX, USA, Dec. 2014, pp. 746?751.

  13. C. Chen, R. Ratasuk, A. Ghosh, "Downlink performance analysis of LTE and Wi-Fi coexistence in unlicensed bands with a simple Listen-Before-Talk scheme," IEEE 81st. Vehicular Technology Conference (VTC Spring), 2015.

  14. ETSI EN 301 893, Harmonized European Standard, "Broadband radio access networks (BRAN); 5 GHz high performance RLAN(v1.7.2)," July. 2014.

  15. J.S. Um, S.J. Yoo, S.K. Park, A study on channel access mechanism of LTE for coexistence with Wi-Fi on 5GHz unlicensed spectrum. The Journal of Korean Institute of Electromagnetic Engineering and Science (2015)

  16. B. Chen, J. hen, Y. Gao and J. Zhang, "Coexistence of LTE-LAA and Wi-Fi 5GHz with corresponding development scenarios: a survey", IEEE Communications Survey and Tutorials, Vol.19, No.1, 2017

  17. Monica Paolini, “LTE unlicensed and Wi-Fi: Moving beyond coexistence,”Senza Fili, Sammamish, WA, USA, Tech. Rep., 2015. [Online]. Available: https://www.slideshare.net/SmallCellForum1/lte-unlicensed-and-wifi-moving-beyond-coexistence-from-monica-paolini-senza-fili

  18. 3GPP,“3rd generation partnership project; feasibility study on licensedassisted access to unlicensed spectrum; study on licensed-assisted access to unlicensed spectrum (release 13),” 3GPP, Sophia Antipoles, France, TR 36.889 V13.0.0, Jul. 2015.

  19. Rui Yin, Guanding Yu, Amine Maaref, and Geoffrey Ye Li, " Adaptive LBT for licensed assisted access LTE networks ", IEEE Globecom 2015

  20. Tao Tao, Feng Han and Yong Liu "Enhanced LBT algorithm for LTE-LAA in unlicensed band", IEEE PIMRC 2015

  21. F. Hao, C. Yongyu, H. Li, J. Zhang, W. Quan, Contention window size adaptation algorithm for LAA-LTE in unlicensed band. ISWCS (2016)

  22. Anand M. Baswade and Bheemarjuna Reddy Tamma, "Channel sensing based dynamic adjustment of contention window in LAA-LTE networks", COMSNETS 2016

  23. Salman Saadat, Da Chen, Kai Luo, Mingjie Feng, and Tao Jiang, " License assisted access-WiFi coexistence with TXOP backoff for LTE in unlicensed band", China Communications, Vol.14, Issue 3, 2017

  24. 3GPP TS 37.213, “Physical layer procedures for shared spectrum channel access (Release15), 2018.9

  25. Chris Burges, Tal Shaked, Erin Renshaw, Ari Lazier, Matt Deeds, Nicole Hamilton, Greg Hullender, "Learning to rank using gradient descent", ICML '05 Proceedings of the 22nd international conference on Machine learning, 2005, Pages 89 - 96

Download references

Funding

This work was supported by the Institute for Information & communications Technology Promotion (IITP) grant funded by the Korea government (MSIP) (No.2016-0-00160, Versatile Network System Architecture for Multi-Dimensional Diversity, No.2016-0-00151, Development of LTE Small Cell supporting LWA/ LAA dual mode). This work is supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT) (No. NRF-2017R1A2B1009709)

Author information

Authors and Affiliations

Authors

Contributions

JHK is the first author of the manuscript. He developed algorithmic processes and mathematical interpretations. In addition, he designed the simulator and experiments. SC is the second author of the manuscript. He built the simulator and perform all experiments. He also suggested the framework of dual threshold control mechanism. All authors read and approved the final manuscript.

Corresponding author

Correspondence to Jae-Hoon Kim.

Ethics declarations

Competing interests

The authors declare that they have no competing interests.

Additional information

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix

Appendix

The results of the four scenarios are listed in Table 3. The range of iTH and dTH is set as 2–8 for the simulation in the study. Table 3 shows simulated results of proposed dual thresholds. The figures in the Table 3 are the throughput of LTE and Wi-Fi (per network). Each throughput value is calculated from the (iTH, dTH). Figure5 shows the holistic throughput pattern. We can roughly find the balance points of total throughout and fairness in the Fig. 5. However, the generic form of gradient descent method needs detailed throughput data of LTE and Wi-Fi. The data of Table 3 can be useful input of the generic form of gradient descent method.

Table 3 Throughput by dual threshold

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Kim, JH., Choi, S. A dual threshold listen-before-talk for unlicensed LTE systems. J Wireless Com Network 2019, 182 (2019). https://doi.org/10.1186/s13638-019-1495-0

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/s13638-019-1495-0

Keywords