Learning Based Uplink Interference Management in 4G LTE Cellular Systems
Learning Based Uplink Interference Management in 4G LTE Cellular Systems
Learning Based Uplink Interference Management in 4G LTE Cellular Systems
I. I NTRODUCTION
LTE uplink (UL) consists of a single carrier frequency
division multiple access (SC-FDMA) technique that orthogonalizes different users transmissions in the same cell, by
explicit assignments of groups of DFT-precoded orthogonal
subcarriers. This is fundamentally different from 3G, where
users interfered with each other over the carrier bandwidth and
advanced receivers, such as successive interference cancellers,
were employed to suppress same cell interference. Same cell
interference is mitigated by design in LTE, however, other
cell interference has a very different structure compared to
3G. This calls for new power control techniques for setting
user transmit power and managing uplink interference. In this
paper, we design and evaluate LeAP, a new system that uses
measurement data to set power control parameters for optimal
uplink interference management in LTE.
A. Uplink interference in 4G systems: Distinctive Properties
Uplink interference in cellular systems is managed through
careful power control which has been a topic of extensive
research for more than two decades (see Section II). However,
uplink interference in LTE networks needs to be managed over
multiple narrow bands (each corresponding to collection of a
few sub-carriers) over the entire bandwidth, thus giving rise to
unique research challenges.
To understand this better, we start by making two observations. Firstly, the uplink data rate of a user in LTE depends
The authors are with Wireless Chief Technology Office, Alcatel-Lucent
USA. e-mail: first name.last [email protected]
(1)
Tx
where PSD P(u)
is expressed in Watt/RB. Thus, if a UE
is assigned M RBs in the uplink scheduling grant then its
Tx
max
max
total transmit power is min(M P(u)
, Ptot
) where Ptot
is
a cap on the total transmission power of a UE. We remark
that, can be interpreted as a fairness parameter that leads
to higher SINR for UEs closer to eNB.
2. At the faster time-scale, each UE is closed loop power
controlled around a mean transmit power PSD (1) to
ensure that a suitable average SINR-target is achieved.
This closed loop power control involves sending explicit
power control adjustments, via the UL grants transmitted
in Physical Downlink Control Channel (PDCCH), that can
be either absolute or relative.
Challenges: LTE standards leave unspecified how each cell
sets the value of P (0) , and average cell-specific mean
interference targets that are useful for setting UE SINR targets
(see Remark 5, Section V). Since the choice of parameters
results in a suitable mean interference level at every cell
above the noise floor, this problem of setting the cell power
control parameters is referred to as IoT control problem.
Clearly, aggressive (conservative) parameter setting in a cell
will improve (degrade) the performance in that cell but will
cause high (low) interference in neighboring cells. Since FPC scheme and its parameters are cell-specific, its configuration
lies within the scope of self-organized (SON) framework, i.e.,
the the solution should adapt the parameters based on suitable
periodic network measurements.
TABLE I
L IST OF PARAMETERS AND VARIABLES USED
Notation
C, c
(c C)
(0)
Pc , c
c
Uc
Jc
lc(u)
Lc
(u)
lec
Lec
c , ec
lc (b), pc (b)
c (b)
Fig. 2.
Description
Set of cells and index for a
typical cell, respectively
FPC-parameters of cell-c: nominal transmit power and
path loss compensation factor respectively.
ln(Pc(0) ), .i.e., nominal transmit power in log-scale
Set of UEs associated with cell-c
Set of cells that interfere with cell-c
Mean path loss of UE-u to eNB of its serving cell-c
Random variable for path loss of a
random UE u Ue to its serving cell-c
Mean path loss of UE-u Ue to cell-cs eNB
Random variable for path loss of a random
UE-u Ue to cell-cs eNB
c = ln Lc , ec = ln Lec
For path loss histogram bin-b of cell-c,
bin value and bin probability respectively
Expected SINR (in ln-scale) of a cell-c UE with path loss lc (b).
4
1
resource block S also used at cell-c
Oec =
(2)
0
else
In the above, we assume that Oec does not depend on the
specific choice of S and has identical distribution for all S.
Denoting by v the UE that occupies S at cell-e, ignoring fastfading, the interfering signal at serving cell-c of UE-u for
transmissions over S in cell-e can be expressed as follows.
(v) 1
Tx
(v)
)
Iec = Oec P(v)
. lec
= Oec Pe(0) (le(v) )e (lec
Rx
P(u)
I c + N0
(0) (u)
Pc (lc )(1c )
(0)
eJc
(4)
(5)
Here V (.) is a concave increasing function and we have
(u)
explicitly shown the SINR depends on the path loss lc .
Choosing the utility as a function of E[ln SINRu ] has two
benefits. Firstly, ln(SINRu ) is a measure of the data rate with
SINRu . Secondly, converting the SINR into a log-scale makes
the problem tractable since it is well known that feasible power
region is log-convex [35]8 , and thus, we can use elements of
convex optimization theory.
Having defined a utility for a typical UE, we are now
in a position to define network wide performance metric
obtained by averaging over all UE path losses that can realize
the measurement data. We need additional notations for the
histogram of Lc s. Suppose the path loss histogram of Lc
is divided into k disjoint intervals with mid-point of the
intervals given by lc (1), lc (2), . . . , lc (kc ). Suppose in cellc, the empirical probability9 of items in histogram bin-b is
7 This is the most prevalent MAC scheduling in LTE.
8 In simple terms, if all powers are represented in log-scale then the feasible power
"
kc
XX
kc
XX
cC b=1
kc
XX
+ N0
(8)
eJc
cC b=1
!#
X
c = E ln
cC
(6)
cC b=1
(9)
(10)
The notations are also shown in Table I. We can now rewrite c (lc (b)) (given by (4)) in terms of these above variables
as
c (lc (b)) = c (1 c )c (b) c
where,
"
!#
X
c = E ln
Oec e(e +e e ec ) + N0
(11)
(12)
eJc
c pc (b)V (c (b))
c,b
subject to,
c C, b [1, kc ] : c (b) c (1 c )c (b) c
(13)
"
!#
X
c C : c E ln
Oec e(e +e e ec ) + N0
eJc
(14)
(15)
(16)
h
i
(u)
(0)
(u)
min Pmax (lc )1 , Pc
(lc )(1c )
Ic
.
(17)
[ (b) c (1 c )c (b)]cC,b[1,kc ]
Pc
(e +e e ec )
+ N0 c cC
= ln
eJc Oec e
[c + c c (b) ln Pmax ]cC,b[1,kc ]
(18)
Thus, the IoTC-SCP problem can be simply stated as
X
max
V (c (b)) s.t. E[h(z, O, )] 0 .
z
c,b
p0
(20)
Intuition and a stochastic iterative algorithm: The equivalent problem (20) is referred to as the saddle point problem
and one could use standard primal-dual techniques to solve
this problem [29]. In such an approach, the primal variables
and dual variables are updated alternatively in an iterative
fashion, and each update uses a gradient (of E[L(.)]) ascent
for the primal variables and gradient descent for the dual
variables. However, computing the expectation and its gradient
K
is computationally expensive (can be O(Bmax
) where Bmax
is maximum histogram bins and K is maximum number of
interferers) and this has to be done in every iteration which
is practically impossible. Instead, we perform primal-dual
iterations by substituting the random variables with random
samples of the random variables in every iteration: thus
expectation computation is replaced by a procedure to draw a
random sample from the histograms which is a computationally light procedure. The idea of replacing a random variable
by a sample in an iterative scheme is not new, the entire field
of stochastic approximation theory deals with such schemes
and conditions for this to work [11]. Our contribution is in
applying this powerful technique to the IoTC-SCP problem.
By using elements of stochastic approximation theory, we also
show that the resulting output converges to optimal.
We now describe our algorithm. Denote the value of the
primal variables in iteration-n by zn and the value of the dual
n and p
n
variables in iteration-n by pn . We also denote by z
the iteration average of the primal and dual variables respectively. The overall algorithm is summarized in Algorithm 1
and is described as follows:
n , p
n are initialized to positive
Initialization: First zn , pn , z
values within bounds specified by Lemma VI.1.
Iterative steps: Denote by an = 1/n , 0.5 < 1 as the
step size in iteration-n. The following steps are repeated for
n = 0, 1, 2, . . .:
1. Random Sampling of Interferers: This step is performed
for each interfering cell pair (c, e). For each cell-e Jc
the following steps are performed:
Toss a coin with probability of head Pr(Oec = 1).
Denote the outcome of this coin-toss by the 0 1
variable ec where ec takes value one if there is a
head.
If ec = 1, then draw a random sample from the joint
distribution of (Le , Lec ) based on the histogram of
this joint distribution. Denote the random sample, which
is a 2-tuple by (sa[1], sa[2]). Let (ec [1], ec [2]) denote
the logarithm of this random sample, i.e., ec [i] =
ln(sa[i]), i = 1, 2 .
In the function h(.) given by (18) representing the
constraints of IoTC-SCP, replace the random variables
(e , ec ) by the random sample (e c[1], ec [2]).
Denote by , as the vector of ec , ec s samples. We
write h(zn , , ), pn ) as a function of these random samples along with the primal and dual variables in iteration-n.
2. Primal Update: The primal variables are updated as
zn+1 = zn + an z L(zn , h(zn , , ), pn )
(21)
(22)
4:
5:
6:
7:
8:
"
c C : c E ln
Oec e
(e +e e ec )
+ N0
eJc
(23)
E Oec e
(e +e e ec )
+ N0
!
.
eJc
(24)
n+1
z
pn+1
1
n zn + (1
1
n pn + (1
1
zn
n )
1
pn
n )
with probability 1 .
where
g(e , e ) = E[e(e +e e ec ) ] .
(26)
D ISTRIBUTION M ODEL FOR PATH LOSS : For each interfering cell pair, (c, e), the joint distribution of the random
variables (Le , Lec ) are log-normal. In other words, the distribution of (e , ec ) = (ln Le , ln Lec ) is jointly Normal.
Indeed, log-normal distribution is a very reasonable statistical model for spatial path loss distribution [22]. For ease of
exposition, we define the following two dimensional vectors:
e
e
Zec =
, e =
,
(27)
ec
1
Zec is defined for each interfering cell pair (c, e) and e
for each cell e. Note that, under our modeling assumption,
the random variable Zec is bi-variate jointly Normal random
variable. The parameters of Zec are defined by the following
mean and correlation matrix:
t
(28)
max
c pc (b)V (c (b))
c,b
subject to,
c (b) c (1 c )c (b) c
"
#
X
1 t
t
(e +e
Cec e )
mec + e
2
c ln
aec e
+ N0
eJc
c + c c (b) ln Pmax
c [0, 1], c [ln N0 , ln Imax ], c (b) [min , )
Algorithm 2 S OLVE I OTC-CE: Regression based deterministic heuristic for IoTC COntrol.
1: Regression step: For each interfering cell pair (e, c), we use
the path-loss measurements to find a normal fit of the Gaussian random random variable Zec given by (27). Suppose the
histogram bins based on the measurement of joint distribution
of (Le , Lec ) are indexed by b where b = 1, 2, . . .. Suppose
bin-b represents the values (le (b), lec (b)) and has empirical
probability mass pec (b). Let (e , ec ) = (ln le (b), ln lec (b)).
Then a maximum-likelihood estimator [25] of mec , Cec is as
follows:
P
2
e2
ec
b pec (b)e (b)
mec = P p
,
C
ec =
2
ec
e2
b ec (b)ec (b)
where,
e2 =
2 =
ec
P
Lemma VII.1. The function ln( eJc g(e , e ) + N0 ) is
convex in e and e . Thus IoTC-CE is a convex NLP.
Proof: Since convex and component-wise increasing
function of a vector of convex functions is convex [8], the
result follows. The details are omitted for want of space.
Overall algorithm by putting it all together: As outlined
in Algorithm 2, we have two steps. First we use the measurement data to estimate the parameter-matrices me , Cec of the
distribution Zce . Second, we use these values to solve IoTCCE using standard NLP solving techniques.
The main benefit of the approach in this section is that, it
is computationally not so intensive and can be solved using
powerful commercial NLP solvers; the price we pay is the
sub-optimality.
VIII. E VALUATION USING P ROPAGATION M AP FROM A
R EAL LTE D EPLOYMENT
The primary goal of our evaluation is two fold. First,
to understand the gains provided by LeAP as compared to
other popular approaches. Second, to understand the effect
of important design parameters like histogram bin-size and
IoT-cap on LeAP performance. In addition, we also provide a
comparison of the two proposed LeAP algorithms.
A. Evaluation Platform
Evaluation platform: For our evaluation purpose, we
implemented the following components in Figure 2: SQL
database (DB) that saves network information, the data access
layer which interacts with the DB and creates the measurement
data discussed in Section V, and the IoT-control parameter
(P (0) , s) computation engine. All our implementations were
based on .NET using C# and are multi-threaded using the Task
Parallelization Library (TPL) facilities. We implemented Algorithm 1 within our framework using suitable data structures
to enable multi-threaded implementation. We skip these implementation details for want of space. For network measurement
information saved in the DB, we used real signal propagation
10
11
Fig. 5.
(a)
(b)
(c)
LeAP performance gain over fixed- FPC for (a) all UEs,
(b) macro cell UEs, and (c) pico cell UEs.
Fig. 4.
12
Fig. 6.
(a)
[7]
[8]
[9]
[10]
(b)
Effect of (a) histogram bin size on median LeAP performance, and (b) effect of IoT-cap on median LeAP performance.
http://www.sonlte.com/technology/.
http://lteworld.org/category/tags/son.
3GPP Technical Specification 36.331. Available from www.3gpp.org.
Atoll 3.2, Radio Network Planning Tool. http://www.forsk.com/atoll/.
A LEXOPOULOS , C. In Winter Simulation Conference.
A MIRIJOO , M., J ORGUSESKI , L., L ITJENS , R., AND NASCIMENTO ,
R. Effectiveness of cell outage compensation in lte networks. In
Consumer Communications and Networking Conference (CCNC), 2011
IEEE (2011), pp. 642-647.
B ERTSEKAS , D. Nonlinear Programming. Athena Scientific, 1999.
B ERTSEKAS , D., N EDIC , A., AND O ZDAGLAR , A. Convex Analysis
and Optimization. Athena Scientific, 2003.
B ISHOP, C. M. Pattern Recognition and Machine Learning (Information
Science and Statistics). Springer-Verlag New York, Inc., Secaucus, NJ,
USA, 2006.
B OCHE , H., AND S TANCZAK , S. Strict convexity of the feasible log-sir
region. IEEE Transactions on Communications 56, 9 (2008), 1511-1518.
[11] B ORKAR , V. Stochastic Approximation: A Dynamical Systems Viewpoint. Cambridge University Press, 2008.
[12] C HIANG , M., AND B ELL , J. Balancing supply and demand of bandwidth
in wireless cellular networks: Utility maximization over powers and
rates. In IEEE INFOCOM (2004).
[13] C HIANG , M., H ANDE , P., L AN , T., AND TAN , C. W. Power Control
in Wireless Cellular Networks Power Control in Wireless Cellular
Networks: Foundation and Trends in Networking. now, 2008.
[14] C OUPECHOUX , M., AND K ELIF, J.-M. How to set the fractional power
control compensation factor in lte ? In Sarnoff Symposium, 2011 34th
IEEE (2011).
[15] CVX R ESEARCH , I. CVX: Matlab software for disciplined convex
programming, version 2.0 beta. http://cvxr.com/cvx, Sep 2012.
[16] DAHLMAN , E., PARKVALL , S., S KOLD , J., AND B EMING , P. 3G
Evolution: HSPA and LTE for Mobile Boradband. Academic Press,
2008.
[17] ET. AL ., C. U. C. Performance of Uplink Fractional Power Control in
UTRAN LTE. In VTC Spring (2008), pp. 2517-2521.
[18] ET. AL ., M. B. Interference Based Power Control Performance in LTE
Uplink. In Wireless Communication Systems. 2008. ISWCS 08. IEEE
International Symposium on (2008), pp. 698-702.
[19] F OSCHINI , G. J., AND M ILJANIC , Z. A simple distributed autonomous
power control algorithm and its convergence. Vehicular Tech., IEEE
Trans. on 42, 4 (Nov 1993), 641-646.
[20] G EORGE , A. P., AND P OWELL , W. B. Adaptive stepsizes for recursive
estimation with applications in approximate dynamic programming.
Mach. Learn. 65, 1 (Oct 2006), 167198.
[21] G HAOUI , L. E. Hyper-Textbook: Optimization Models and Applications.
[22] G OLDSMITH , A. Wireless Communications. Cambridge University
Press, New York, NY, USA, 2005.
[23] H ANDE , P., R ANGAN , S., C HIANG , M., AND W U , X. Distributed
uplink power control for optimal SOR assignment in cellular data
networks. IEEE/ACM Trans. Netw. 16, 6 (2008), 1420-1433.
[24] H U , H., Z HANG , J., Z HENG , X., YANG , Y., AND W U , P. Selfconfiguration and self-optimization for LTE networks. Communications
Magazine, IEEE 48, 2 (February), 94-100.
[25] K AY, S. M. 1 ed. Apr.
[26] K HALIL , H. Nonlinear Systems. Prentice Hall, 2002.
[27] L OBINGER , A., S TEFANSKI , S., JANSEN , T., AND BALAN , I. Load
balancing in downlink lte self-optimizing networks. In Vehicular
Technology Conference (VTC 2010-Spring), 2010 IEEE 71st (May),
pp. 1-5.
[28] M ADAN , R., B ORRAN , J., S AMPATH , A., B HUSHAN , N., K HAN DEKAR , A., AND J I , T. Cell association and interference coordination in
heterogeneous lte-a cellular networks. IEEE Journal on Selected Areas
in Communications 28 (2010), 14791489.
[29] N EDIC , A., AND O ZDAGLAR , A. Subgradient methods for saddle-point
problems. Journal of Optimization Theory and Applications (2009),
205-228.
[30] P ENTTINEN , J. T. J. The LTE/SAE Deployment Handbook. John Wiley
& Sons, January 2012.
[31] R AHMAN , M., YANIKOMEROGLU , H., AND W ONG , W. Enhancing
cell-edge performance: a downlink dynamic interference avoidance
scheme with inter-cell coordination. IEEE Transactions on Wireless
Communications 9, 4 (2010), 14141425.
[32] S ARAYDAR , C., M ANDAYAM , N. B., AND G OODMAN , D. J. Pricing
and power control in a multicell wireless data network. IEEE JOURNAL
ON SELECTED AREAS IN COMMUNICATIONS 19 (2001), 1883
1892.
13
A PPENDIX A
T WO S IMPLE U SEFUL L EMMAS
We will need the following inequalities in our proof. The
proofs of the inequalities are there in a longer version of the
paper.
Lemma A.1. The following holds for a0 = 1 and real ai >
0, i = 1, 2, . . . , k:
k
X
ln2 (
i=0
k
X
a2i .
i=0
In the above, zi,min and zi,max are the lower and the upper
bounds of the corresponding primal variables. Similarly, define
the functions +
p (q) parametrized by p = [p1 , p2 , . . . pn ] as
+
+
+
+
p (q) = p1 (q1 ) p2 (q2 ) . . . pn (qn )
where,
+
pj (qj ) =
(y
)
.
.
.
(y
)
.
.
.
,
m
1
2
z1
z2
zm
qj I{qj >0}
qj
, if pj = 0
, if pj > 0
A PPENDIX B
P ROOF OF T HEOREM 1
z L(zn , h(zn , , ), pn )
h(zn , , )
(31)
z (t)
(E[Lz (z(t), h(z(t), O, ), p(t))])
= (z(t),p(t))
p(t)
E[h(z(t), O, )]
where
(x) (y) = lim
0
P(x + y) P(y)
.
where
yi I{yi >0}
yi I{yi <0}
(i)
(y
)
=
i
zi
yi
, if zi = zi,min
, if zi = zi,max
, else
14
Lemma B.2. The ODE given by (30) is globally asymptotically stable and the system converges to saddle point solution
of L(z, p) which also corresponds to the optimai value of z.
Proof: Consider the Lyapunov function
2
W
t
= 2(z(t) z ) z(t) (E[Lz (z(t), h(z(t), O, ), p(t))])
+ 2(p(t) p )t +
p(t) (E[h(z(t), O, )])
cC
(zi zi )(i)
zi (yi ) (zi zi )yi ,
(pi pi )+
pi (qi ) (pi pi )qi .
e+
e e(e,n +e,n e ec ) + N0
+ ln2 N0
eJc
2
E[Zc,n
]
h
i
E e e(e,n +e,n e ec ) + e + N0
!
+ ln2 N0
eJc
!
ln2
!#
E ln2
ln2
(33)
eJc
ee,n + e + N0
+ ln2 N0
eJc
eJc
E[Mn2 ] K5 + K6 k n k
p0
p0