Skip to main content

Neighbor-friendly autonomous power control in wireless heterogeneous networks

Abstract

The widespread deployment of base stations constitutes a promising solution to cope with the ever-increasing wireless data rate demands. However, it also increases the interference levels, especially at the cell-edge. Most interference management techniques assume coordination between base stations, which involves undesired overhead and delays. To solve this problem, we propose a neighbor-friendly autonomous algorithm for power control in wireless heterogeneous networks that protects victim users from neighboring cells through a penalty factor in the power allocation level. We refer to this algorithm as neighbor-friendly iterative waterfilling (NF-IWF). In addition, we propose a low-complexity closed-form version that fixes the penalty factor by assuming a linear approximation of the victim user data rate. In high interference conditions, it can achieve a victim user data rate increase by a factor of 3.5 compared to IWF, 15 compared to soft frequency reuse (SFR), and 60 compared to equal power allocation (EPA) with a marginal decrease of the primary user data rate.

Introduction

The boost of novel wireless applications is producing an ever-increasing demand for larger data rates.

Furthermore, the massive market penetration of smartphones adds more pressure to network operators, mobile manufacturers, and standardization groups to satisfy the demands of an ever-larger number of users.

Improvements from a physical layer perspective have shown a low potential to deal with these demands. For instance, considering new coding techniques, link adaptation, and larger bandwidths, from 1950 to 2000, the network capacity gains have increased by a factor of 5 from the first, a factor of 5 from the second, and a factor of 15 from the third.

Surprisingly, just from the deployment of more (smaller) cells, the network capacity gains have increased by an overwhelming factor of 2,700[1].

Femtocells offer the easiest and most cost-effective way to increase the current cell deployment[2].

These are low-power base stations mainly for indoor usage with a coverage of tens of meters, compared to a few kilometers of high-power base stations, or macrocells. The coexistence of different types of cells in the same area is referred to as a heterogeneous network.

Most urban areas are already fully covered by macrocells. Hence, the addition of more cells in these areas creates serious inter-cell interference problems in both uplink and downlink transmissions, especially in closed-access mode. In this paper, we focus on the downlink transmission. Since femtocells are likely to be deployed in an unplanned manner by end-users and not by network operators, this problem is only going to grow in the coming years[3, 4].

Base stations play a crucial role in dealing with an inter-cell interference. The power and time-frequency resources they allocate to users within the cell have an impact on users from neighboring cells. The impact is especially high for users located at the cell-edge.

Therefore, the implementation of inter-cell interference coordination (ICIC) techniques is of paramount importance. Nevertheless, most of the ICIC techniques allocate separate resources to neighboring cells, i.e., they exploit resource orthogonalization[510]. This is usually done in the frequency domain or in the time domain, while variable power levels are rarely exploited. Thus, in this paper, we focus on and advocate for power control schemes that control an inter-cell interference by sharing (rather than orthogonalizing) resources.

Power control techniques implemented in current wireless networks such as LTE focus on resource orthogonalization between cells. A typical example is soft frequency reuse (SFR)[11], in which the total bandwidth of each cell is divided into two non-overlapping frequency bands, one for center users (primary users in our case) and one for cell-edge users (victim users in our case). The center user band can be reused in all the cells, while the cell-edge user band is non-overlapping between neighboring cells, as can be seen in Figure1. The transmit power level is constant in each band but larger for the cell-edge user band to compensate for the performance degradation.

Figure 1
figure 1

Soft frequency reuse.

This approach offers a simple way to deal with frequency and power allocation jointly without interference but with the disadvantage of a fixed allocation of frequency bands and transmit powers. The optimization of SFR is usually done by adapting parameters α and β, which represent the total power fraction and total bandwidth fraction of the center user band, respectively[12]. However, this can only be achieved through network coordination.

To support coordination between base stations, a dedicated backhaul link is required. In LTE, the X2 interface between macrocells helps to configure dynamically the frequency bands and power levels[1317].

However, this interface is not yet standardized between macro- and femtocells in early versions of LTE release[11, 18, 19]. Even with an interface available, the dynamics of the wireless channel and the variability in the number of users attached to a cell, users’ location, and interference conditions, this coordination constitutes a significant information overhead resulting in large delays.

An alternative approach is that each base station optimizes its own resource allocation without any information exchange. We refer to it as an autonomous algorithm.

Two well-known autonomous power control algorithms for OFDM networks are equal power allocation (EPA) and iterative waterfilling (IWF)[20]. In EPA, the total transmit power is allocated equally in all available subcarriers. In IWF, each base station maximizes its own data rate in a greedy way by allocating more power to those subcarriers with the best channel to interference and noise ratio (CINR), without considering the interference caused to victim users from neighboring cells.

Non-greedy autonomous power control algorithms have been studied in the context of digital subscriber line (DSL) networks.

In[21] and[22], low-complexity autonomous power control algorithms for DSL, called ASB and ASB-2 are presented, which allow a non-orthogonalized share of resources. The concept of a protected reference line (or reference user) is introduced in these papers as a statistical average of all victim lines suffering interference. However, the implementation of these algorithms in practical wireless networks imposes a challenge given the multi-user scheduling and non-stationarity of the wireless channel.

A first attempt was made in[23] to apply the previous concept to a wireless network where the user suffering the strongest interference from the neighboring cells is selected as the reference user. However, this scheme is not autonomous since it needs periodical information exchange between base stations to adapt to the time-varying reference user channel characteristics.

To tackle the mentioned problems, we propose in this paper a neighbor-friendly autonomous algorithm for power control in wireless heterogeneous networks. It protects victim users within a certain distance from the base station through a frequency-dependent penalty factor in the power allocation level. The level of protection can be tuned to provide individualized quality of service (QoS). We refer to this algorithm as neighbor-friendly iterative waterfilling (NF-IWF). Additionally, we propose a low-complexity closed-form version that fixes the penalty factor by assuming a linear approximation of the data rate of the victim users.

We can summarize the main contributions of the paper as follows:

  1. 1.

    A power control algorithm that protects victim users from neighboring cells located at a distance from the base station without any coordination between base stations.

  2. 2.

    A practical way to tune the protection to victim users from neighboring cells.

  3. 3.

    A practical way to obtain the channel information of victim users attached to neighboring cells without communication between base stations.

  4. 4.

    A low-complexity closed-form version of the previous algorithm by assuming a linear approximation of the data rate of the victim users.

  5. 5.

    The exploitation of frequency and time correlation of the wireless channel to further reduce the complexity of the algorithm.

IWF-based power control

Autonomous algorithms do not rely on information between base stations, they only exploit locally available (and a priori known) information about the environment such as direct channel gains, received interference, and noise.

IWF exploits this information to maximize the data rate in each cell:

maximize s k c k R c s.t. k K s k c P c , tot 0 s k c s k c , mask k K
(1)

with

R c = f s k K b k c = f s k K log 2 1 + 1 Γ | h k c | 2 s k c c ˉ c c ˉ C | h k c ˉ | 2 s k c ˉ + σ k c
(2)

where Rc is the data rate of all users in cell c; f s is the symbol rate; b k c , h k c , σ k c , s k c , and s k c , mask are the bit loading for a standard interference channel model, the channel transfer function, the noise power, the base station transmit power, and the spectral emission mask constraints on subcarrier k in cell c, respectively; h k c ˉ and s k c ˉ are the channel transfer function and transmit power on subcarrier k from the interfering cell c ˉ , which are both assumed to be known as they affect users in cell c. We call h k c the direct channel and h k c ˉ the interfering channel of the users attached to cell c. The parameters and are the set of available cells and subcarriers, respectively, and Pc,tot is the total power budget in cell c. A given subcarrier can only be allocated to one user in cell c, but it can also be allocated to a user from a neighboring cell resulting in an inter-cell interference. The allocation of subcarriers to users in cell c can be done prior to the power allocation strategies described in this paper (based, for example, on instantaneous channel conditions or iteratively with the power allocation). However, our focus is only on the power allocation. A joint autonomous power and subcarrier allocation algorithm is nevertheless an interesting scenario that we will study for future work. The parameter Γ denotes the signal-to-noise ratio (SNR) gap to capacity, which depends on the desired bit error rate (BER), the coding gain, and the noise margin. We will assume it to be equal to 1 without loss of generality.

It can be shown, using the corresponding Karush-Kuhn-Tucker (KKT) conditions, that the transmit powers have a closed-form solution as follows

s k c = f s log ( 2 ) λ c - c ˉ c Γ | h k c ˉ | 2 s k c ˉ + Γ σ k c | h k c | 2 0 s k c , mask
(3)

where x a b =max(a,min(x,b)) and λ c is the Lagrange multiplier that should be updated (e.g., with bisection) to satisfy the corresponding total power constraint Pc,tot.

To analyze the benefit of exploiting locally available information, we consider a network with 5 macrocells evenly distributed over a 30×30 km area, each with a 43 dBm total transmit power and 5 MHz bandwidth. As a channel model, we use the 3GPP spatial channel model (SCM[24]) with suburban macro environment and a distance (d)-dependent path loss of 31.5 + 35 log10(d[m]). We show in Figure2 the difference between the data rates obtained using IWF and EPA of a user moving along every possible location on this area. The results can be seen in a tri-dimensional plot where the x and y axes correspond to the area, and the z axis corresponds to the data rate difference between IWF and EPA. A maximum difference of 400 Mbps can be observed, interestingly, at the cell-edge of neighboring cells.This scenario becomes more critical when femtocells are deployed. We now introduce into the previous network topology 20 femtocells randomly distributed (i.e., deployed in an unplanned manner), each with a 15 dBm total transmit power. The exact location of each base station can be seen in Figure3. We compute again the difference between the data rates obtained using IWF and EPA of a user moving along every possible location. The results are shown in Figure4. The femtocells’ deployment results in more severe interference problems, especially at the cell-edges. Remarkably, a maximum difference of 1,250 Mbps can be observed at the cell-edge of multiple interfering cells (macro- and femtocells). This again shows the potential gains exploiting locally available information.

Figure 2
figure 2

Data rate difference between IWF and EPA. Data rate difference between IWF and EPA for a network with 5 macrocells evenly distributed over a 30×30 km area.

Figure 3
figure 3

Network with 5 macrocells, 20 femtocells, and 500 users.

Figure 4
figure 4

Data rate difference between IWF and EPA. Data rate difference between IWF and EPA for a network with 5 macrocells evenly distributed and 20 femtocells randomly distributed over a 30 × 30 km area.

The advantage of IWF is its simplicity, its closed-form solution, and the fact that it does not need any information exchange between base stations. However, each cell maximizes its own data rate in a greedy fashion by allocating power especially to those subcarriers with the best CINR, without considering the interference caused to victim users from neighboring cells.

Neighbor-friendly autonomous power control

Victim users protection with NF-IWF

Our aim is therefore to design a neighbor-friendly approach that, without any information exchange in the network, limits this damage.

Using the concept of a protected reference user, we formulate optimization problem (1) as the weighted sum of the data rate of users attached to cell c, or primary users, denoted as Rc and the data rate of victim users attached to one neighboring cell, denoted as Rvc. Both cells share the set of subcarriers. Adding extra optimization terms for other neighboring cells only brings minimal performance at a high-complexity cost since most of the per-subcarrier interference comes from one base station[23]. However, other neighboring cells can be considered if they share a different set of subcarriers with cell c. Again, the subcarrier allocation to users is assumed to be done prior to the power allocation.

maximize s k c k w c R c + w vc R vc s.t. k s k c P c , tot 0 s k c s k c , mask k K
(4)

with

R vc = f s k K b k vc = f s k K log 2 1 + 1 Γ | h k vc | 2 s k vc | h k vc , c | 2 s k c + σ k vc
(5)

where b k vc , h k vc , s k vc , and σ k vc are the bit loading, the direct channel, the transmit power, and the noise power on subcarrier k of the victim user, respectively, and h k vc , c is the interfering channel on subcarrier k from cell c to a victim user. wc and wvc are the weights of the primary users and the victim users, respectively. We assume wc equal for all primary users and wvc equal for all victim users. We consider that wc = 1 - wvc, which represents a trade-off between protecting victim users of a neighboring cell at the cost of degrading the data rate of primary users. In practice, these weights can be chosen based on upper layer information such as queue length or quality of service requirements. Setting wvc = 0 shifts to a greedy algorithm like IWF, which can be useful when interference between neighboring cells is negligible.

Applying the KKT stationarity condition to problem (4) leads to

k : w c f s | h k c | 2 log ( 2 ) | h k c | 2 s k c + c ˉ c Γ | h k c ˉ | 2 s k c ˉ + Γ σ k c - w vc f s | h k vc | 2 s k vc | h k vc , c | 2 log ( 2 ) Γ | h k vc , c | 2 s k c + Γ σ k vc | h k vc | 2 s k vc + Γ | h k vc , c | 2 s k c + Γ σ k vc - λ c = 0 .
(6)

By taking into account the KKT complementarity conditions of (4), s k c from the first term of Equation 6 can be isolated to obtain:

s k c = w c f s log ( 2 ) λ c + P k NF , c - c ˉ c Γ | h k c ˉ | 2 s k c ˉ + Γ σ k c | h k c | 2 0 s k c , mask
(7)

where P k NF , c is referred to as the penalty factor, defined as

P k NF , c = w vc f s | h k vc | 2 s k vc Γ | h k vc , c | 2 log ( 2 ) Γ | h k vc , c | 2 s k c + Γ σ k vc | h k vc | 2 s k vc + Γ | h k vc , c | 2 s k c + Γ σ k vc .
(8)

Note the similarity with the IWF solution. The first term in Equation 7 corresponds to a power level with per-subcarrier penalty factor P k NF , c that reduces the interference to victim users from a neighboring cell. Setting P k NF , c to zero will reduce to the IWF algorithm. However, in contrast to Equation 3, this is a fixed-point equation as P k NF , c depends on s k c .

Problem 4 is a nonconvex function for which a duality gap exists to the optimal solution. However, as the number of subcarriers increase, this duality gap becomes zero and it can be solved via bisection[25].

By adding to Equation 7 a bisection search on the Lagrange multiplier to satisfy the total cell power constraint, we obtain Algorithm 1, which we refer to as NF-IWF. The parameter δ indicates the accuracy of the total power constraint, γ indicates the stopping criterion of the bisection search on λ c in the case of an inactive total power constraint, and Λmax is the maximum value for λ c .

The transmit powers of the neighboring cells s k vc are assumed as an EPA without performance degradation as observed in later sections.

Contrary to most ICIC techniques that orthogonalize resources, an advantage of NF-IWF is that it allows subcarriers to be shared between users as long as adequate power levels are used. This can be seen in Figure5. Interestingly, NF-IWF allocates more power to those subcarriers less used for transmission by the interfering base station, which uses IWF. Still, some subcarriers are shared by both base stations.

Figure 5
figure 5

Transmit power allocation from two neighboring base stations to two cell-edge users over 200 subcarriers. Each base station is transmitting to a cell-edge user and interfering with the other base station. One base station uses NF-IWF and the other uses IWF.

The challenge of implementing NF-IWF in a wireless network resides on obtaining the parameters in Equation 8 in an autonomous way. For example, h k vc , c can be obtained from the channel feedback of victim users when scanning pilot signals of a neighboring cell for a potential handover[26, 27]. However, the direct channel h k vc can only be known from the information received from other base stations.

Therefore, we propose in the ‘Estimation of the victim user channel’ section a novel approach to estimate h k vc based on the distance from the base station to the cell-edge.

Estimation of the victim user channel

Full knowledge of h k vc is unfeasible in an autonomous fashion.

Nevertheless, the path loss, i.e., the average channel gain over all the allocated subcarriers, is easier to obtain because it mainly depends on the distance to the base station. Since the signal strength coming from two neighboring base stations can be considered equal at the cell-edge (this is how the cell-edge is typically defined), the path loss from each base station to the cell-edge can be known. This can be exploited to approximate the direct channel of any victim user ( h k vc ) by using the path loss from the base station to the cell-edge. Therefore, h ~ vc is assumed to be an average over all the available subcarriers such that any user located at a distance d from the base station would present the same average channel and experience the same path loss given by 31.5 + 35 log10(d[m])[24]. This results in a constant value for h k vc along all the set of subcarriers, i.e., h k vc = h ~ vc kK where h ~ vc = 1 K k = 1 K h k c . Even though an irregular propagation channel (i.e., with shadowing) might affect each victim user differently, we will see later that h ~ vc is a good approximation for the direct channel of all potential victim users if h k vc , c of each user is known.

To estimate d in practice, we can use the information available at the base station on the channel estimated by new users entering the cell[28] or predefined by the manufacturer. As we will see later, an exact definition of d is not necessary for improved performance.

Furthermore, this information does not need to be updated regularly (since the cell-edge will only be modified when a new base station is deployed in the neighborhood).

Despite its simplicity, this model provides an accurate estimation of the victim users channel characteristics. To analyze the sensitivity of this model, we consider two users in a high interference case 1 (where the victim user is severely interfered by cell c) and a low interference case 2 (where the victim user is at the cell-edge) as reconstructed in Figure6 and Figure7, respectively. MBS stands for macro base station, and FBS stands for femto base station. The color regions indicate the signal strength in the direct channel to the closest base station, and the user color indicates the base station to which the user is attached.

Figure 6
figure 6

Case 1: high interference. The victim user is located within the coverage of the neighboring cell, resulting in high interference.

Figure 7
figure 7

Case 2: low interference. The victim user is located between two cells, resulting in low interference.

We assume that there is no handover, like in a closed-access base station.

Figure8 computes the normalized data rate of both users for cases 1 and 2 by evaluating h ~ vc at different values of d, but keeping the users’ positions as in Figure5 and Figure6. The distance d is then varied between 0 and the actual distance between base stations and it is normalized such that dnorm = 0 means a radius of zero and dnorm = 1 means a radius equal to the distance between both base stations (dBS). The smaller the path loss distance, the more protection to the victim user at the cost of the primary user data rate.

Figure 8
figure 8

Normalized data rates for different values of distance d when applying NF-IWF.

At dnorm = 0.5, i.e., between the two base stations, we have the highest normalized data rate of the victim user for a primary user data rate of 20% in case 1 and 50% in case 2. This is because in case 1, the base station needs to significantly reduce the transmit power to the primary user when protecting a more vulnerable victim user located within its coverage.

Figure8 also shows that the accuracy to define h ~ vc is not so critical when dnorm ranges between 0.5 and 0.75, decreasing at most 20% of the data rate of the victim cell-edge user. To achieve the maximum performance for the victim user, from here on, we assume a victim user path loss at a distance dnorm = 0.5.

Complexity reduction of NF-IWF

Since the channel conditions can change rapidly in a wireless environment, it is crucial from a practical point of view that the power allocation computation be performed with a small number of iterations. However, Equation 7 does not have a closed form since P k NF , c depends on s k c . Therefore, we propose an approximation of the penalty factor that reduces the complexity of Algorithm 1 by eliminating the loop of line 11.

Let us first expand expression (4) into

maximize s k c k w c f s k log 2 1 + 1 Γ | h k c | 2 s k c c ˉ c c ˉ C | h k c ˉ | 2 s k c ˉ + σ k c + w vc f s k log 2 1 + 1 Γ | h k vc | 2 s k vc | h k vc , c | 2 s k c + σ k vc s.t. k s k c P c , tot 0 s k c s k c , mask k K
(9)

We approximate (9) by linearizing the second term in the objective function such that the maximization problem becomes

maximize s k c k w c f s k log 2 1 + 1 Γ | h k c | 2 s k c c ˉ c c ˉ C | h k c ˉ | 2 s k c ˉ + σ k c - w vc f s k | h k vc , c | 2 s k c s.t. k s k c P c , tot 0 s k c s k c , mask k K
(10)

For a linear equation of type ax + b, b is disregarded when applying the KKT conditions, while the slope a is included in wvc when tuning a particular operating point. The KKT stationarity condition of (10) leads to

k : w n , c f s | h k c | 2 log ( 2 ) | h k c | 2 s k c + c ˉ c Γ | h k c ˉ | 2 s k c ˉ + Γ σ k c - w vc f s | h k vc , c | 2 - λ c = 0
(11)

resulting in

s k c = w c f s log ( 2 ) λ c + P ~ k NF , c - c ˉ c Γ | h k c ˉ | 2 s k c ˉ + Γ σ k c | h k c | 2 0 s k c , mask
(12)

where the penalty factor is approximated by

P ~ k NF , c = w vc f s | h k vc , c | 2 .
(13)

This corresponds to a linear penalty on the power level determined by the interfering channel of the victim users. In other words, the power allocation is proportionally penalized in those subcarriers with a strong interfering channel because this can easily damage the victim user data rate. This approximation results in a closed-form formula with complexity similar to IWF (and lower than NF-IWF) but improved performance as we will see later. We refer to it as NF-IWF-approx.

Performance evaluation

We consider a wireless OFDM network with the parameters shown in Table1. In order to evaluate the performance of our approaches, we first focus on two users (one primary user and one victim user) connected to neighboring cells. We consider two scenarios, one with interference between macrocells and one with interference between a femtocell and a macrocell. For each scenario, we analyze two cases, one with a high and another with a low interference.

Table 1 Simulation parameters

We compare our proposed approaches against EPA and IWF by generating the achievable rate region, which shows the trade-off between the two user data rates. In the case of NF-IWF and NF-IWF-approx, changing the weights wc and wvc allows us to reach different full-power operating points to form the achievable rate region. This is not possible with IWF, for which the total power budget has to be tuned between 0 and Pc,tot to obtain different operating points. This controllable tunability can be seen as an important advantage of NF-IWF.

We also compare our proposed approaches with a practical scheme like SFR, in which we divide the total bandwidth into two non-overlapping frequency bands. In order to achieve different operating points, we need to vary parameters α and β from Figure1. In the case of a multi-user scenario, each band is assigned to either primary or victim users and has a constant power level. However, in the case of two users connected to neighboring cells, the optimal approach consists in transmitting with full power to each user in one non-overlapping band, i.e., in each cell α = 1 and β varies from 0 to 1 to achieve different operating points (discontiguous bands are not considered). In the multi-user case, this results in starvation of resources for some users.

As an upper bound, we consider the case in which the base station has full knowledge of the interfering and direct channels and of the power allocation of the neighboring base station. We call this approach NF-full, which is equivalent to the distributed algorithm (DSB) of Tsiaflakis et al.[22]. Evidently, this is not an autonomous approach, since it requires coordination between base stations.

For all the evaluated approaches, the transmit powers are updated alternately between base stations until network convergence is reached. In the following simulations, only three to five iterations are necessary for convergence.

Macro-macro interference

The two cases to be analyzed for the macro-macro scenario are shown in Figures6 and7. In case 1, the victim user is located within the coverage of the neighboring cell, resulting in a high interference. In case 2, the interference to the victim user is low as it is located between the coverage of the two cells.Figure9 shows the gains in the rate region that can be achieved with NF-IWF in the case of a high interference. For example, with a primary user data rate of 600 Mbps, NF-IWF can achieve 6 Mbps for the victim user instead of 1.7 Mbps for IWF, 0.4 Mbps for SFR, and 0.1 Mbps for EPA, i.e., an increase by a factor of 3.5 compared to IWF, a factor of 15 compared to SFR, and a factor of 60 compared to EPA. Furthermore, the difference between the approach with full knowledge and NF-IWF proves to be marginal. NF-IWF-approx can achieve similar gains with reduced complexity when the data rate of the primary user is lower than 500 Mbps. Needless to say, the underperformance and lack of tunability of EPA are evident. SFR is able to improve the performance for both primary and victim users compared to EPA, but not compared to IWF. This is because SFR partitions the available bandwidth in non-overlapping bands, avoiding interference in this way. However, SFR does not exploit a variable per-subcarrier power allocation, which results in a large degradation.Figure10 shows the rate region for the low interference case. Except for EPA and SFR, the performance of all algorithms is similar. This is because the direct channels are stronger compared to the interfering channels; hence, even a greedy algorithm like IWF has improved performance.

Figure 9
figure 9

Rate region of the primary and victim users of the macro-macro high interference case.

Figure 10
figure 10

Rate region of the primary and victim users of the macro-macro low interference case.

Femto-macro interference

The two cases to be analyzed for the scenario with femto-macro interference are shown in Figures11 and12. In case 1, the victim user of the macrocell is located within the coverage of the neighboring femtocell, resulting in a high interference. In case 2, the interference to the victim user is low as it is located far from the femtocell coverage.Figure13 shows that with a primary user data rate of 80 Mbps, NF-IWF can achieve 1.45 Mbps for the victim user instead of 0.5 Mbps for IWF, 0.7 for SFR, and 0.02 Mbps for EPA, i.e., an increase by a factor of 2.9 compared to IWF, a factor of 2 compared to SFR, and a factor of 73 compared to EPA. For this primary user data rate, NF-IWF-approx achieves the same gains. In the low interference case, all the algorithms perform similar except for EPA and SFR as seen in Figure14.

Figure 11
figure 11

Case 1: high interference. The victim user attached to the macrocell is located within the coverage of the neighboring femtocell, resulting in a high interference.

Figure 12
figure 12

Case 2: low interference. The victim user attached to the macrocell is far from the femtocell, resulting in a low interference.

Figure 13
figure 13

Rate region of the primary and victim users of the macro-femto high interference case.

Figure 14
figure 14

Rate region of the primary and victim users of the macro-femto low interference case.

It is interesting to note that with a high interference, NF-IWF-approx provided more than a 50% increase in the victim user data rate compared to IWF with less complexity than NF-IWF. This result indicates that the linear approximation of the penalty factor indeed provides most of the useful information to achieve significant gains.

Multi-user multi-cell interference

The achievable rate regions presented so far show the advantages of our proposed approaches in a two-user evaluation. However, a multi-user multi-cell evaluation is needed to assess the total network gains.We consider a wireless heterogeneous network consisting of 5 macrocells (evenly distributed), 20 femtocells (randomly distributed), and 500 users (randomly distributed). Any two neighboring cells share a set of subcarriers and each user is randomly allocated the same number of consecutive subcarriers within a cell. This topology is shown in Figure3, and the performance results are shown in Figure15. The user color indicates the base station to which the users are attached. Users located within the coverage of their macrocell are classified as macro primary users, while users located farther than the coverage of their macrocell (i.e., closer to a neighboring cell than to the cell they are attached to) are classified as macro victim users and are those to be protected. Users attached to femtocells are classified as femto users.

Figure 15
figure 15

CDF of victim and primary users of the multi-user scenario.

For a fair comparison, all base stations use the same algorithm with the best rate region operating point for any two neighboring cells. For IWF, the best operating point corresponds to a full-power scheme, while for SFR, NF-IWF, NF-IWF-approx, and NF-full, we consider a point on the rate region boundary with a tangent of slope equal to -1.From the cumulative distribution function (CDF) of Figure15, we can observe the gains achieved by our proposed approaches. As expected, NF-full achieves the best data rate performance for the macro victim users, followed closely by NF-IWF and NF-IWF-approx. IWF and EPA present a clear underperformance due to their greediness towards victim users, while the SFR suffers from the band partitioning and lack of power control within each band. For example, with the NF algorithms, macro victim users have a very large probability of obtaining a normalized data rate higher than 95%; while with SFR, IWF, and EPA, they have 40% probability of a normalized data rate lower than 70%, 50%, and 5%, respectively. Femto users achieve similar gains.

Additionally, the gains come with a marginal degradation in the macro primary user data rates. Since we consider the full-power operating point for IWF, it achieves the highest data rate for the macro primary users, followed closely by NF-full, NF-IWF, NF-IWF-approx, and SFR. EPA can sometimes present a higher primary user data rate compared to SFR and NF algorithms. This is because, depending on the channel conditions, the EPA operating point can have a higher primary user data rate than the operating point of SFR and NF algorithms. However, the NF algorithms never achieve a normalized data rate lower than 75%.

Sensitivity analysis

In this section, we evaluate the data rate performance of our approaches for a given channel estimation error in all the channels with some frequency variation, i.e., h k c , h k c ˉ , and h k vc , c . We model the channel estimation error Δ as a Gaussian random variable with zero mean and different values of standard deviation (std). A visual representation of the channel estimation error is shown in Figure16. The value of std represents a fraction of the average channel value.

Figure 16
figure 16

Channel transfer function with an estimation error of zero mean and standard deviation ( std ).

The power allocation is then computed as

ŝ k c = w c f s log ( 2 ) λ c + P ̂ k NF , c - c ˉ c Γ | h ˆ k c ˉ | 2 s k c ˉ + Γ σ k c | h ˆ k c | 2 0 s k c , mask
(14)

with the penalty factor of NF-IWF modeled as

P ̂ k NF , c = w vc f s | h ~ vc | 2 s k vc Γ | h ˆ k vc , c | 2 log ( 2 ) Γ | h ˆ k vc , c | 2 s k c + Γ σ k vc | h ~ vc | 2 s k vc + Γ | h ˆ k vc , c | 2 s k c + Γ σ k vc
(15)

and the penalty factor of NF-IWF-approx modeled as

P ~ ̂ k NF , c = w vc f s | h ˆ k vc , c | 2
(16)

where h ˆ =h+Δ for all channels, with h being the true channel (subscripts and superscripts omitted).

With the obtained power allocation values, we compute the achievable data rate for each cell as

R c = f s k K log 2 1 + 1 Γ | h k c | 2 ŝ k c c ˉ c c ˉ C | h k c ˉ | 2 ŝ k c ˉ + σ k c .
(17)

Figure17 shows that our approaches are robust to very high channel estimation errors and can still present significant gains compared to IWF even with std = 1. It is also interesting to note that for small values of std, the primary user data rate can improve compared to the case without errors. This is because the primary user is less vulnerable to channel estimation errors and can profit from the power level decrease of the victim user.

Figure 17
figure 17

Sensitivity analysis on the channel estimation.

Computational complexity for convergence

In this section, we quantify the computational complexity needed for each algorithm to converge to transmit powers satisfying the total power constraints. EPA and SFR do not need to update the transmit powers. All the NF algorithms have two or three levels of iterations as shown in Algorithm 1. First, there is an outer level that iterates over the base stations until network convergence in the power allocation is achieved. The number of iterations at this level is denoted with N o . A second level of iterations is used for the bisection search of λ c in each base station until the total power constraint is satisfied. The number of iterations at this level is denoted by N λ . These two levels of iterations are shared by IWF, NF-IWF, and NF-IWF-approx. However, NF-IWF has an extra level of iterations on P k NF , c to update s k c . The number of iterations at this level is denoted with N P .

The convergence properties of the proposed algorithms can be seen in Figure18 in terms of the number of iterations per subcarrier per base station, i.e., we evaluate the product N λ N P . We can observe that after ten iterations, all of the proposed algorithms reach convergence. However, NF-IWF-approx is the first one to reach convergence at three iterations within a 10% range of the final value, followed by NF-IWF at four iterations, and finally NF-full at six iterations. Since we consider the best operating point in the rate region of each algorithm, the different algorithms converge to a different value. Interesting to note is that both NF-IWF and NF-IWF-approx show a fluctuating behavior during the first iterations, while NF-full shows a smoother behavior. This is due to the approximations involved in NF-IWF and NF-IWF-approx that make the algorithms fluctuate before reaching convergence.

Figure 18
figure 18

Number of iterations per subcarrier per base station to reach convergence in the proposed algorithms.

Within the different levels of iterations, the transmit power computation needs to be done on a per-subcarrier basis, i.e., we need transmit power calculations. This leads to a total complexity in the number of power computations of N o N λ N P K for NF-IWF and N o N λ K for IWF and NF-IWF-approx.

This complexity can be further reduced by exploiting the frequency correlation of the wireless channel. We analyze the impact of this complexity reduction for both NF-IWF and NF-IWF-approx. For this purpose, we define a window of wd subcarriers in which we reuse the transmit power value of one of the middle subcarriers. The data rate impact of this reduction can be seen in Figure19. We note that the degradation is marginal for a window of two and four subcarriers and becomes more visible for a window of eight subcarriers. A similar rationale can be used to exploit the time correlation of the channel.

Figure 19
figure 19

Complexity analysis for different values of windows.

Conclusions

In this paper, we have proposed NF-IWF, a neighbor-friendly autonomous algorithm for power control in wireless heterogeneous networks. In contrast to greedy algorithms like EPA and IWF, NF-IWF protects the data rate of victim users located within a certain distance from the base station. This is done through a factor that penalizes the power allocation in those subcarriers that damage the data rate of victim users. Furthermore, we have developed a low-complexity version, NF-IWF-approx, which reduces the complexity by assuming a linear approximation of the victim user data rate, resulting in a closed-form formula. Other options have been analyzed to further reduce complexity by exploiting frequency and time correlation of the channel. We have evaluated our algorithms under high and low interference conditions in a heterogeneous network with macro- and femtocells. Our approaches present higher tunability, robustness, and better data rate performance, especially in high interference conditions. We have shown an increase by a factor of 3.5 compared to IWF, 15 compared to SFR, and 60 compared to EPA in the victim user data rate with a marginal decrease of the primary user data rate. We have also shown that the rate region of our approaches lies close to the upper bound with full knowledge of the interfering channel and the power allocation of the neighboring cell.

References

  1. Webb W: The european spectrum capacity crunch. [Online; accessed 6-March-2013], Available:, Sep. 2012 http://www.microwavejournal.com/articles/18176-the-european-spectrum-capacity-crunch [Online; accessed 6-March-2013], Available:, Sep. 2012

    Google Scholar 

  2. Chapman O: Small cell vendors race to fulfill operator demand for LTE. [Online; accessed 11-September-2013], Available:, Feb. 2012 http://www.smallcellforum.org/newsstory-small-cell-vendors-race-to-fulfill-operator-demand-for-lte [Online; accessed 11-September-2013], Available:, Feb. 2012

    Google Scholar 

  3. 3GPP: Small cell forum - new name for 3GPP partner. [Online; accessed 6-March-2013], Available:, Feb. 2012 http://www.3gpp.org/Small-Cell-Forum-new-name-for-3GPP [Online; accessed 6-March-2013], Available:, Feb. 2012

    Google Scholar 

  4. Small Cell Forum [Online; accessed 6-March-2013], Available:, Feb. 2013 http://www.smallcellforum.org [Online; accessed 6-March-2013], Available:, Feb. 2013

  5. Kosta C, Hunt B, UI Quddus A, Tafazolli R: On interference avoidance through inter-cell interference coordination (ICIC) based on OFDMA mobile systems. IEEE Commun. Surv. Tutor 2013, 15(3):1-23.

    Article  Google Scholar 

  6. Wang T, Vandendorpe L: Iterative resource allocation for maximizing weighted sum min-rate in downlink cellular OFDMA systems. IEEE Trans. Signal Process 2011, 59(1):223-234.

    Article  MathSciNet  Google Scholar 

  7. Lopez-Perez D, Guvenc I, de la Roche G, Kountouris M, Quek TQS, Zhang J: Enhanced inter-cell interference coordination challenges in heterogeneous networks. IEEE Wireless Commun 2011, 18(3):22-30.

    Article  Google Scholar 

  8. Kwan R, Leung C: A survey of scheduling and interference mitigation in LTE. J. Electrical Comput. Eng 2010, 2010: 1-10.

    Article  Google Scholar 

  9. Boudreau G, Panicker J, Guo N, Chang R, Wang N, Vrzic S: Interference coordination and cancellation for 4G networks. IEEE Commun. Mag 2009, 47(4):74-81.

    Article  Google Scholar 

  10. Necker M: Interference coordination in cellular OFDMA networks. IEEE Netw 2008, 22(6):12-19.

    Article  Google Scholar 

  11. 3GPP: Soft frequency reuse scheme for UTRAN LTE. [Online; accessed 6-March-2013], Available:, R1-050507, Athens, Greece, May 2005 ftp://ftp.3gpp.org/tsg_ran/WG1_RL1/TSGR1_41/Docs/R1-050507.zip [Online; accessed 6-March-2013], Available:, R1-050507, Athens, Greece, May 2005

    Google Scholar 

  12. Gonzalez G D, Garcia-Lozano M, Ruiz Boque S, Seop Lee D: Optimization of soft frequency reuse for irregular LTE macrocellular networks. IEEE Trans. Wireless Commun 2013, 12(5):2410-2423.

    Article  Google Scholar 

  13. Oh S, Kim H, Ryu B, Park N: Inbound mobility management on LTE-advanced femtocell topology using X2 interface. In International Conference on Computer Communications and Networks (ICCCN). Maui, Hawaii; 2011.

    Google Scholar 

  14. Liu W, Hu C, Wei D, Peng M, Wang W: An overload indicator & high interference indicator hybrid scheme for inter-cell interference coordination in LTE system. In IEEE International Conference on Broadband Network and Multimedia Technology (IC-BNMT). Beijing, China; 2010:514-518.

    Google Scholar 

  15. Combes R, Altman Z, Haddad M, Altman E: Self-optimizing strategies for interference coordination in OFDMA networks. In IEEE international conference on communications workshops (ICC). Kyoto, Japan; 2011.

    Google Scholar 

  16. Rahman M, Yanikomeroglu H, Wong W: Interference avoidance with dynamic inter-cell coordination for downlink LTE system. In IEEE Wireless Communications and Networking Conference (WCNC). Budapest, Hungary; 2009.

    Google Scholar 

  17. Fodor G, Koutsimanis C, Racz A, Reider N, Simonsson A, Muller W: Intercell interference coordination in OFDMA networks and in the 3GPP long term evolution system. Journal of Commun 2002, 4(7):445-453.

    Google Scholar 

  18. 3GPP: Evolved universal terrestrial radio access (EUTRA); overall description; stage 2 (release 11). [Online; accessed 6-March-2013], Available:, TS 36.300 V11.1.0, Mar. 2012 http://www.3gpp.org/ftp/Specs/archive/36_series/36.300/36300-b10.zip [Online; accessed 6-March-2013], Available:, TS 36.300 V11.1.0, Mar. 2012

    Google Scholar 

  19. 3GPP: Physical layer procedures. [Online; accessed 6-March-2013], Available:, TS 36.213 V10.2.0, Mar. 2012 http://www.3gpp.org/ftp/Specs/archive/36_series/36.213/36213-a20.zip [Online; accessed 6-March-2013], Available:, TS 36.213 V10.2.0, Mar. 2012

    Google Scholar 

  20. Yu W, Ginis G, Cioffi J: Distributed multiuser power control for digital subscriber lines. IEEE Trans. Selected Areas Commun 2002, 20(5):1105-1115. 10.1109/JSAC.2002.1007390

    Article  Google Scholar 

  21. Cendrillon R, Huang J, Chiang M, Moonen M: Autonomous spectrum balancing for digital subscriber lines. IEEE Trans. Signal Process 2007, 55(8):4241-4257.

    Article  MathSciNet  Google Scholar 

  22. Tsiaflakis P, Diehl M, Moonen M: Distributed spectrum management algorithms for multiuser DSL networks. IEEE Trans. Signal Process 2008, 56(2):4825-4843.

    Article  MathSciNet  Google Scholar 

  23. Son K, Lee S, Yi Y, Chong S: REFIM: A practical interference management in heterogeneous wireless access networks. IEEE Trans. Selected Areas Commun 2011., 29(6):

  24. 3GPP: Spatial channel model for multiple input multiple output (MIMO) simulations. [Online; accessed 6-March-2013], Available:, TR 25.996, v11.0.0, Sep. 2012 http://www.3gpp.org/ftp/Specs/archive/25_series/25.996/25996-b00.zip [Online; accessed 6-March-2013], Available:, TR 25.996, v11.0.0, Sep. 2012

    Google Scholar 

  25. Cendrillon R, Yu W, Moonen M, Verlinden J, Bostoen T: Optimal multiuser spectrum balancing for digital subscriber lines. IEEE Trans. Commun 2006, 54(5):922-933.

    Article  Google Scholar 

  26. 3GPP: Considerations on interference coordination in heterogeneous networks. [Online; accessed 6-March-2013], Available:, R1-101369, San Francisco, CA, Feb. 2010 http://www.3gpp.org/ftp/tsg_ran/WG1_RL1/TSGR1_59b/Docs/R1-100236.zip [Online; accessed 6-March-2013], Available:, R1-101369, San Francisco, CA, Feb. 2010

    Google Scholar 

  27. 3GPP: Summary of the description of candidate eICIC solutions. [Online; accessed 6-March-2013], Available:, R1-104968, Madrid, Spain, Aug. 2010 http://www.3gpp.org/ftp/tsg_ran/WG1_RL1/TSGR1_62/Docs/R1-105081.zip [Online; accessed 6-March-2013], Available:, R1-104968, Madrid, Spain, Aug. 2010

    Google Scholar 

  28. Yang T, Zhang L: Approaches to enhancing autonomous power control at femto under co-channel deployment of macrocell and femtocell. In IEEE International Symposium on Personal, Indoor, and Mobile Radio Communications. Toronto, Canada; 2011.

    Google Scholar 

Download references

Acknowledgments

This research work was carried out at the ESAT Laboratory of KU Leuven, in the frame of KU Leuven Research Council PFV/10/002 (OPTEC), Concerted Research Action GOA-MaNet, FWO project G091213N ‘Cross-layer optimization with real-time adaptive dynamic spectrum management for fourth generation broadband access networks’, and the Belgian Programme on Interuniversity Attraction Poles initiated by the Belgian Federal Science Policy Office: IUAP ‘Belgian network on Stochastic modelling, analysis, design and optimization of communication systems’ (BESTCOM) 2012-2017. The scientific responsibility is assumed by its authors. The first author acknowledges the support of the Mexican National Council for Science and Technology (CONACYT). Part of this work has been submitted for presentation at the 11th International Symposium on Wireless Communication Systems (ISWCS), Barcelona, August, 2014.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rodolfo Torrea-Duran.

Additional information

Competing interests

The authors declare that they have no competing interests.

Authors’ original submitted files for images

Rights and permissions

Open Access This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0), which permits use, duplication, adaptation, distribution, and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Torrea-Duran, R., Tsiaflakis, P., Vandendorpe, L. et al. Neighbor-friendly autonomous power control in wireless heterogeneous networks. J Wireless Com Network 2014, 175 (2014). https://doi.org/10.1186/1687-1499-2014-175

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1687-1499-2014-175

Keywords