Sie sind auf Seite 1von 7

Uygungelen, S.; Bauch, G.; Taoka, H.; Bharucha, Z.

: Protection of cell-edge
users in wireless systems by using almost blank subframes. International
Conference on Systems, Communications and Coding (SCC), Munich, Germany,
January 21-24, 2013.

2013 IEEE. Personal use of this material is permitted. Permission from IEEE
must be obtained for all other uses, in any current or future media, including
reprinting / republishing this material for advertising or promotional purposes,
creating new collective works, for resale or redistribution to server or lists, or
reuse of any copyrighted component of this work in other works.
6&&-DQXDU\LQ0XQLFK*HUPDQ\

Protection of Cell-Edge Users in Wireless Systems


by Using Almost Blank Subframes
Serkan Uygungelen1 , Gerhard Bauch1,2 , Hidekazu Taoka1 and Zubin Bharucha
1
DOCOMO Euro-Labs, Munich, Germany
2
Technische Universitat Hamburg-Harburg, Germany
{uygungelen, taoka}@docomolab-euro.com, {bauch}@tuhh.de

AbstractIn long term evolution (LTE) networks, resource low power within the coverage of a macrocell. Such multi-
assignment for user data can be adapted in the frequency layer networks are called heterogeneous networks (Het-Nets).
domain so as to exploit multi-user and frequency diversity Pico-BS are deployed by operators for ofoading the trafc
properties of the wireless channel. In order to enable this, every
data transmission is preceded by a control region where the from the overlaid macrocell, especially in areas of heavy
location of the data reserved for each user is indicated. Since trafc. These pico-BSs are also used for removing coverage
the control channels typically spans the entire bandwidth, for holes typically present in macrocell networks. Femto-BSs, or
densely deployed networks, there is a high probability that base home evolved node B (HeNB) according to Third Generation
stations (BSs) destructively interfere with one another causing Partnership Project (3GPP) terminology, are mainly deployed
cell-edge users to go into outage. LTE also has the property
of almost blank subframe (ABS) which allows for time domain indoors. These BSs are inexpensive short-range devices and
interference mitigation by muting interfering BSs during certain more importantly they can be deployed by end users de-
predened subframes. Based on this feature, we develop a mands in an unplanned manner as is presently done for per-
method known as dynamic subframe assignment (DSA) to protect sonal/public Wi-Fi access points. Therefore, unlike macrocell
control channels. We believe that this method is suited for future networks, femtocell networks have a dynamic environment
uncoordinated and densely deployed networks. The proposed
method is designed such that each BS proactively protects the where the number and location of femto-BSs can change
control channels reserved for its own users. Additionally, the during the operation of the network as they are turned on
interference protection does not coincide with an intolerable or off.
reduction in the attainable spatial reuse of radio resources. The One major drawback of Het-Nets is the increase in co-
effectiveness of our proposal is corroborated via system-level channel interference between small cells, particularly when
simulations which reveal that cell outage ratios are signicantly
decreased without increasing the complexity at user terminals or they are densely and randomly deployed. Additionally, the
BSs. uncoordinated deployment of BSs, indicates the necessity for
dynamic interference mitigation techniques that automatically
I. I NTRODUCTION adapt to the observed interference conditions. Most of the
Wireless data trafc has dramatically increased in recent existing studies in the literature focus on data channel inter-
times due to the widespread usage of smart phones and data- ference mitigation between small cells. However, the improve-
hungry applications. Dealing with such a high data demand ments in data channel performance cannot be realized unless
has become one of the most urgent issues for network op- the performance of the control channels is within tolerable lim-
erators. Migration to the next generation long term evolution its. The reason for this is because in every subframe, the data
(LTE) service has already begun. For instance, in 2010, NTT transmission is preceded by the transmission of control chan-
DOCOMO launched a commercial LTE service in Japan. Nev- nels, which, among other things, point the user equipments
ertheless, it is clear that further countermeasures are needed to (UEs) to their assigned data channels in the frequency domain.
keep up with the relentless demand for capacity. It is predicted It must be noted that corrupted reception of the control
that in 2016, the mobile data trafc will be 18 times higher channels will necessarily result in a loss of the subsequent data
than the trafc generated in 2011 [1]. Many solutions can in that subframe. Therefore, there is a necessity for developing
be used for increasing the network capacity such as using methods to allow robust performance of the control channels
smart antennas techniques, applying higher order modulations, even under heavy interference conditions. Furthermore, it must
developing smarter scheduling techniques, etc. However, the be mentioned that unlike the data channels, where techniques
most effective solution is to reduce cell sizes by deploying such as resource partitioning can be implemented, this does not
more base stations (BSs). Dense deployment of macro-BSs, hold for the control channels. The reason for this is because
on the other hand, increases the operators operation and the control channels span the entire frequency domain, such
infrastructure costs. Furthermore, it was shown that 50 % of that any possibility of implementing resource partitioning-like
all voice calls and over 70 % of all data trafc originates from techniques is non-existent.
indoor areas [2]. Conventional macro-cellular networks may There are some techniques developed to protect both data
most likely fail to deliver broadband experience to indoor and control regions simultaneously for Het-Nets. In 3GPP, the
users because the transmitted signal faces high attenuation almost blank subframe (ABS) technique is proposed to miti-
when passing through walls. One solution to this problem is gate the interference from macro-BSs to picocell users or from
deploying small scale BSs such as pico- and femto-BSs with femto-BSs to macrocell users [3]. For instance, in the picocell

,6%1 9'(9(5/$**0%+%HUOLQ2IIHQEDFK
6&&-DQXDU\LQ0XQLFK*HUPDQ\



case, the macro-BSs remain idle during certain predened 
subframes. Such subframes are called ABSs, since no signal 

except cell-specic reference signals (CRSs) are transmitted. 



This way, pico-BSs schedule their cell-edge users during these


 
subframes where there is no macro-BS interference on control


  


and data regions. In a similar manner, for femtocell deploy-


ment, macrocell users are scheduled during subframes which
  
are set as ABS by femto-BSs. Although the proposed ABS 




technique solves the control channel interference issue with
low complexity, it does not work effectively in uncoordinated  






networks. As the ABS congurations of BSs are considered
static, no adaptation to variable interference conditions is of-  
  
  

fered. This eventually decreases the utilization efciency of the
resources, since during ABSs, BSs do not transmit any data. Fig. 1. Overview of the basic scheduling unit in LTE. Note that depending
on the BS identity, reference-signals are shifted in frequency domain.
Furthermore, as all pico- and femto-BSs use the same time and
frequency resources, the proposed method does not offer any
solution to reduce same-cell interference. However, in dense
In LTE, UEs can differentiate between the received signals
deployments, interference between femtocells and picocells
from various BSs in their vicinity with the help of CRSs.
requires more attention. Therefore, in this paper, we propose
The received signal strength observed by UE u from BS b is
a method based on the ABS technique for uncoordinated
determined by
networks which aims at decreasing the interference on the
control channel, and hence, improving the cell-edge coverage. Ru,b = T CRS Gu,b (1)
Section II describes the system model used. A detailed where T CRS is the constant CRS transmit power and Gu,b is
description of dynamic subframe assignment (DSA) is given the channel gain comprising the combined effect of path loss
in Section III. The simulation setup is explained in Section IV and shadowing between BS b and UE u. The UE then sends
and results are presented in Section V. Finally, Section VI a measurement report to its serving BS, which includes the
draws conclusions. identities of the most dominant BSs in its vicinity along with
the associated reference signal received powers (RSRPs) [5].
II. S YSTEM M ODEL However a UE cannot measure the received power from all
In this work, we focus solely on the downlink. The system BSs but only some in its vicinity. Therefore, only a limited
model consists of a traditional macrocell network with em- number of RSRP measurements can be sent by a UE to its
bedded femtocells. Although the DSA technique is used on serving BS.
femtocell deployments in this paper, it is seamlessly applicable Furthermore, an LTE UE is also capable of calculating a
also to picocellular networks. The exact distribution of the wideband signal-to-interference-plus-noise ratio (SINR) over
BSs in the evaluation is detailed later in Section IV. We make the whole frequency bandwidth during a subframe via the
use of the standard LTE air interface [4], where orthogonal reference signals. The signaling of SINR levels to a serving
frequency-division multiplexing (OFDM) is the driving tech- BS, in terms of suitable modulation and coding scheme, is
nology. The most fundamental element in LTE is known as achieved by using the channel quality indicator (CQI) [6].
the resource element (RE) which corresponds to one OFDM Finally, in our system model, we assume that each BS sends
symbol in the time domain and one subcarrier in the frequency the subframe pattern i.e., which subframes contain data and
domain. A resource block (RB) is a 7 (OFDM symbols) which are set as ABS, to its neighboring BSs which cause
12 (subcarriers) matrix of REs. Two consecutive RBs in the high interference. Although such an indicator is not explicitly
time domain constitute the most basic unit for scheduling and specied in the standards, it can be applied with minor changes
has a time duration of one subframe. All BSs in the network on the signals already dened in standardization, such as the
are synchronized with each other where subframe timings are relative narrow-band transmit power (RNTP) [6] indicator. The
same at every BSs. The structure of the subframe is shown in detailed explanation of the usage of these signals is given in
Fig. 1. the sequel.
In order to facilitate channel estimation, every subframe
consists of CRSs which occur periodically in time and fre- III. DYNAMIC S UBFRAME A SSIGNMENT
quency as indicated in Fig. 1. CRSs are transmitted during In order to clarify the workings of the DSA scheme, a toy
each subframe even if no data is transmitted. That is why example is depicted in Fig. 2, where the macro-BS serves
subframes during which BSs do not transmit any data are three UEs (painted black) and both femto-BSs serve two UEs
called almost blank. In order to avoid collisions between CRSs (painted white). The arrows indicate the high interference that
of neighboring cells, a shift in the frequency domain is usually should be mitigated in order to decode the control channels
employed such that the CRSs of neighboring cells do not meaningfully. It is clearly seen that in each cell there is a cell-
collide. Therefore, we assume that interference originating edge UE that needs active protection. As mentioned above,
from CRSs is negligible. The reader may refer to [4] for further with the DSA, the protection is achieved by preventing inter-
details. fering neighbors from using the same (vulnerable) subframes.

,6%1 9'(9(5/$**0%+%HUOLQ2IIHQEDFK
6&&-DQXDU\LQ0XQLFK*HUPDQ\

In order to achieve this, a subframe pattern indicating the contact with the BSs in their vicinity. Therefore, if the macro-
active and idle subframes is dened for each BS. For instance, BSs were to implement the same procedure as described in
in Fig. 2, BSs follow a subframe pattern with a period of four the previous paragraph, due to the large number of macro
subframes. Essentially, this is similar to dividing the overall and femto interferers, the number of subframes available to
bandwidth into four subbands and assigning different subbands transmit data would be very limited. Also, the limited number
to interfering BSs but we apply the partitioning in time domain of subframes available would mean that a large number of
for the sake of protection of the control channels. users per cell would not be supported, which is clearly an
undesirable situation. Additionally, macro-BSs serve a higher
 number of users than femto-BSs so the available resource per
 
macro user is already less than the users served by femto-BSs.
The remaining subframes which are neither set as protected
nor blocked by other BSs, such as sf 3 and sf 4 of femto-


BS1 , can be used by the femto-BSs for their cell-center
users without any restriction but also without enjoying any


protection privileges. This is the main advantage of the DSA
 
 
  that BSs can protect their cell-edge users with PSs and they
 can use further subframes as long as they do not cause
high interference to their neighbors. Such exibility eventually

 increases the resource utilization of the network.

The subframe patterns at BSs are updated on an event


           
triggered basis which means that BSs change their subframe
 
   
 
 
   
 
 
   
 
pattern only if there is a change in the interference environ-
             
           
ment. BSs in the network periodically update their subframe

   
   
   
   
   
     patterns at the same time. The period of updating the subframe
           
pattern a time duration equal to that of a so-called time slot. A
  time slot in this sense has the duration of multiple subframe
     

  
 
  
   
       patterns. The subframe patterns of BSs remain undisturbed
between the starting instances of two time slots. BSs update
Fig. 2. Overview of an example subframe pattern assignment. The arrows their subframe pattern only at the start of the time slots
indicate intolerable interference.
depending on the feedback from UEs and BSs.
As can be seen in the gure, femto-BS1 transmits data to
A. Required Measurement and Signaling
its cell-edge user during subframe sf 1 . In order to protect
this user, femto-BS2 should not transmit anything during In DSA, each BS must designate one subframe to be used
sf 1 . In other words, sf 1 is blocked at femto-BS2 by femto- as a PS to protect its cell-edge users. For this purpose, a BS
BS1 . Therefore, we call sf 1 the protected subframe (PS) of requires feedback from neighboring BSs (PS indicator) and
femto-BS1 , since interfering neighbors are forced to remain from its UEs (RSRP and CQI measurements). This feedback
idle during this subframe. In order to block a subframe at is used for identifying the interfering neighbors and updating
interfering neighbors, a BS sends a so-called PS indicator the PS assignment.
to the neighboring BSs which have the potential to cause Due to the cluttered and more-or-less random deployment
interference. When a BS receives such a message, it sets the of BSs, it is not possible for a BS to know its interfering
marked subframe as an ABS and does not transmit data during neighbors. For this purpose, we use the measurements from
the given subframe, thereby reducing the interference caused UEs that are updated periodically. Theoretically, by assuming
to its neighboring cells. In a similar manner, femto-BS1 should that all BSs are active during the same subframe, the control
set its sf 2 as an ABS which is the PS of femto-BS2 and so region SINR experienced by UE u served by BS b is calculated
on. as
Ru,b
Turning our attention now to the macro layer, we notice u =   (2)
that there is a macro-UE trapped within the connes of the Ru,m + Ru,f +
mMu f Fu
femto-BS2 . Clearly, without coordination, this macro-UE will
experience very high control channel interference from the where Mu and Fu are the set of interfering macro-BSs and
nearby femtocell. Therefore, in order to avoid this situation, in femto-BSs respectively and accounts for thermal noise. The
this example, the trapped macro-UE, M1 , receives data during SINR of the control region, u , should be higher than the
sf 1 which does not face interference from femto-BS2 . In such minimum SINR, min , required to decode the control channels.
heterogeneous deployments, macro-BSs have more priority If this is not the case, u can be increased by removing
than femto-BSs meaning they can block subframes at femto- the largest interfering femto-BS, i.e., if the most dominant
BSs, however, femto-BSs cannot restrict macro-BSs subframe femto-BS interferer did not transmit anything during the given
usage. One reason for this is that femtocells are deployed over subframe, u would improve. Note here that although the same
the macrocell layer and no disruption to service on the macro can be achieved by imposing this limitation on macro-BSs,
layer should be allowed. However, femto-BSs are only in we do not allow it, as we explained above, the macro layer is

,6%1 9'(9(5/$**0%+%HUOLQ2IIHQEDFK
6&&-DQXDU\LQ0XQLFK*HUPDQ\


assumed to have priority over the femto layer. This process of 
  

successively removing the most dominant interferer continues $


 
!
 
until u min or until all interfering femto-BSs are removed.  

   
  
The set of removed femto-BSs constitutes the interfering BSs     "

    
  #
of UE u. These femto-BSs must refrain from sending data   #

during the subframe that UE u receives data, so that u may


achieve an SINR of at least min to decode the transmitted   

signals reasonably.
In practice, the interference seen by a UE depends on !
 
the topology of the femtocell network and the geographical    
   
position of the UE in its cell. Therefore, the identication of #
interfering femtocells is a task best undertaken by the UEs
themselves rather than the BSs whose positions are xed. To   
this end, the RSRP reports from UEs are used. However, due 
 
  


  
 
to implementation restrictions, the serving BS only receives a
limited number of RSRP measurements, in other words, only
a subset of Mu and Fu can be known by it. Additionally,
although the effect is negligible, the noise cannot be exactly   


     
measured. Consequently, what a serving BS b of UE u can
calculate is u,calc which is always higher than u . Therefore,
        


it is reasonable to add a bias value to min to deal with such     
 


measurement errors. Depending on RSRP measurements from


UE u, the serving BS b can calculate the interfering femto-BSs Fig. 3. Overview of the DSA.
of u according to the restriction
a subframe sf calculated by BS b as
u,calc min + bias (3) 
1(usf th ) if sf is not blocked
Asf,b = uUb (4)

Having knowledge of the (sub-optimal) set of interfering 0 if sf is blocked
femto-BSs, BS b can inform the (potential) interfering BSs where 1(.) is a conditional binary function whose output is
of UE u via a PS indicator (which could be implemented 1 if its argument holds true and 0 otherwise. Here, usf is the
in practice as a bitmap, similar to the RNTP indicator). In wideband SINR measured during the subframe sf by UE u
this way, BS b prevents those interfering BSs from using the and Ub is the set of all UEs served by BS b.
subframe it sets as PS and the required SINR can be achieved
at UE u. If BS b serves multiple UEs, then it should perform B. Assignment of Subframes
the same process for all UEs since each UE has a distinct A BS updates its PS if any of the following conditions hold.
set of interfering BSs depending on its location. The set of If another BS sends a PS indicator pointing to the BSs
interfering neighbors of b is then the union of the sets of current PS. This is only the case for femto-BSs as macro-
interferers of all UEs served by b. BSs cannot be restricted. In such a case, to avoid a
In order to update the PS, it is important for a BS to make collision, a femto-BS must change its own PS in the next
the least impact on the network. For this purpose, in DSA, time slot. In order to optimize the performance, the new
a BS sorts the subframes according to their availability for PS should be chosen as the subframe having the highest
data transmission. A subframe is said to be available for a availability. This way, more users can be scheduled in the
user, if the user experiences an SINR above the min during chosen subframe without restricting the neighboring BSs.
that subframe because only then the user can decode the If there is a subframe with higher availability. In this
data received from the serving BS. Therefore, the availability case, a BS choses the subframe with the highest avail-
of a subframe in a cell is nothing but the number of users ability. This way, a BS has to protect less users.
that experiences an SINR higher than min . By setting the Since the update of the subframe pattern is determined by a
PS as the subframe with highest availability, a serving BS BS based on the feedback it receives, which inherently induces
needs to protect less users by sending a PS indicator which latency, it is possible that multiple BSs use the same subframe
decreases the BSs effect on the network. In order to calculate giving rise to destructive interference. The occurrence of such
a subframes availability, we use the wideband CQI reports failed subframe assignments decreases as BSs learn the nature
from the UEs. It is important to mention that the availability of their environment. Moreover, frequent update of the PS
of a subframe becomes 0 independent of the feedback from creates a cascading effect whereby neighboring BSs must
UEs if a BS receives a PS indicator marking that subframe. update their subframe selection, which increases the time
This way we ensure that the subframe is less likely to be required to reach a stable resource assignment. Therefore, we
used by the BS during the next time slot. The availability of introduce a p-persistent slot allocation in PS assignment. In the

,6%1 9'(9(5/$**0%+%HUOLQ2IIHQEDFK
6&&-DQXDU\LQ0XQLFK*HUPDQ\

TABLE I
p-persistent slot allocation policy [7], when a channel is sensed S IMULATION PARAMETERS
idle by a transmitter, meaning no other transmitters send any
packet, the transmitter sends the packet with a probability of Parameter Value
p. In a similar manner, in DSA, if a BS is required to update
its PS, it does so with a probability of p. System bandwidth 10 MHz
Macro-BS Tx power 46 dBm
As mentioned before, a BS can also use the remaining
Femto-BS Tx power 20 dBm
subframes which are not blocked by other BSs (via PS
Macro-UEs per cell 10 (on average)
indicators) for its cell-center users without any protection.
5x5 grids per cell 1 (on average)
Therefore, the number of subframes to be used in a subframe
Apartment dimensions 10 m 10 m
pattern is non-deterministic and depends on the prevailing Femto-BS activation probability 0.2
interference conditions. Femto-UEs per active femto-BS variable between 1 and 4
Fig. 3 summarizes the actions taken by a BS to update its Macro-BS shadowing std. dev. 8 dB
subframe pattern for the time slot t + 1 based on the feedback Femto-BS Shadowing std. dev. 10 dB
of time slot t from the served UEs and neighboring BSs. Fading model No fast fading
As a nal remark, it is clear that the BS does not change Number of Tx antennas 1
the subframe pattern as long as the interference environment Number of Rx antennas 1
remains stable which favors the stability of the process.

IV. S IMULATION S ETUP BSs (both macro- and femto-BSs) and, in addition, its own
serving BS.
The simulation area consists of seven tessellated hexagonal For DSA, bias in (3) is taken as 3 dB and the probability,
sectors with macro-BSs placed at the junction of three sectors p, of updating a PS is set as 0.5. The performance of DSA
such that each macro-BS serves three sectors separated by is compared to conventional full-reuse, reuse 2/4 and femto
120 from one another. The entire simulation scenario is there- resource partitioning methods. The subframe patterns applied
fore served by seven macro-BSs. Macro-UEs are randomly by macro- and femto-BSs are illustrated in Fig. 4.
deployed over the simulation area and they are associated to
the macro-BS from which they receive the highest power. 


The natural clustered distribution of femtocells is simulated    


by employing the 3GPP 55 grid structure [8]. The 55
grid represents a square building consisting of 25 regularly   
 
arranged square-shaped apartments. Every apartment hosts a
femto-BS with a certain activation probability. Each femto-BS

   
has a closed-access policy which means that if an apartment
contains an active femto-BS, it serves femto-UEs which are    

randomly distributed within the connes of the apartment


  
 
such that every femto-BS exclusively serves a xed set of
UEs. Full-buffer transmission is assumed such that every BS
(macro or femto) assigns all available data resources during 


all active subframes to their served UEs. Additionally, each    
snapshot of the simulator lasts for 10 time slots. The duration
of each time slot is equal to the duration of one subframe   
 
pattern where a subframe pattern is set as four subframes.
Therefore, a snapshot contains 40 subframes. During the
Fig. 4. Subframe pattern used by macro- and femto-BSs for the different
snapshot, positions and shadowing values of BSs and UEs benchmark methods. Colorless subframes represent the ABS.
are assumed to remain unchanged. The statistics, such as
SINR, are calculated at the end of the 10th time slot by
using the last subframe pattern, i.e. last four subframes. The V. S IMULATION R ESULTS
simulation parameters are based on LTE specications [8, 9] We focus particularly on the performance of femto-UEs.
and summarized in Table I. Fig. 5 shows the cumulative distribution function (CDF) of
In LTE, the minimum required SINR to decode the control SINRs of femto-UEs. As can be seen, for femto-UEs, full-
channels is around 6 dB [10]. Therefore, we set min as reuse and femto resource partitioning methods exhibit the
6 dB. The scheduler at the BSs always allocates RBs to the worst performance since femto-BSs cannot protect their UEs.
users during the subframe that the user experiences highest Please note that the two show identical performance. This is
wideband SINR. Thus, it is assumed that the UEs go into because, as seen in Fig. 4, regardless of whether full reuse
outage if its wideband SINRs are lower than min during all or partitioning is used, the interference originating from the
subframes in the pattern. Additionally, the number of RSRP macro layer remains the same. With reuse 2/4, the performance
reports that a UE can send is limited to 8, i.e. the UE feeds is slightly improved because interference from macro-BSs
back RSRP reports from the seven most dominant neighboring is removed. However, such an improvement comes with the

,6%1 9'(9(5/$**0%+%HUOLQ2IIHQEDFK
6&&-DQXDU\LQ0XQLFK*HUPDQ\

1 TABLE III
R ESOURCE U TILIZATION
0.9

0.8 Method Macro-BS [%] Femto-BS [%]


0.7 Full-reuse 100 100
0.6 Femto Res. Part. 100 50
Reuse 2/4 50 50
CDF

0.5
DSA 100 71.7
0.4

0.3

Full Reuse
all available resources actively. Therefore, DSA improves the
0.2
FemtoPart. coverage of macro and femto-BSs without compromising the
0.1 Reuse2/4 resource utilization.
DSA
0 VI. C ONCLUSION
20 15 10 6 0 5 10 15 20 25 30
SINR [dB] In this work, the main contribution is the protection of
downlink control channels especially for uncoordinated and
Fig. 5. CDF of SINRs of femto-UEs.
densely deployed networks. For this purpose, we use a dy-
namic time domain interference mitigation technique based on
ABSs. Simulation results demonstrate that our innovative DSA
reduction of the resources used by macro-BSs by a factor of 2.
technique attains a signicant improvement in the outage ratios
Finally, with DSA, the best protection is achieved thanks to the
of both macro and femto-UEs, compared to static conventional
active protection of cell-edge users by sending PS indicators
methods. Additionally, the proposed method requires low
using the procedure described in Section III.
signaling overhead as existing LTE signaling procedures are
TABLE II used with small extensions and implementation restrictions
O UTAGE R ATIOS OF MACRO AND FEMTO -UE S are also taken into account. As BSs autonomously assign
subframes and are able to dynamically adapt to the interfer-
macro-UE femto-UE ence conditions faced in random deployments, the proposed
Method Outage Ratio [%] Outage Ratio [%] method can be applied to unplanned wireless networks without
Full-reuse 3.6 21.5
any need for a central controller. Finally, the exibility in
Femto Res. Part. 0 21.5
the assignment of subframes depending on the interference
Reuse 2/4 0 20.4 environment increases the utilization of the resources leading
DSA 0.14 3.1 to a high system capacity.
ACKNOWLEDGMENT
Table II gives the corresponding outage ratios (fraction of The authors would like to thank Gunther Auer for his
UEs having SINR below 6 dB) of the four methods. As valuable comments and feedback.
expected, full-reuse exhibits the worst performance from all
the methods. Femto resource partitioning, on the other hand, R EFERENCES
only protects the macro-UEs and therefore, we get the lowest [1] Cisco, Cisco Visual Networking Index: Global MobilebData Traf-
macro-UE outage ratio in this case. However, this method c Forecast Update, 20112016, White Paper, Retrieved from
www.cisco.com, Feb. 2012.
brings no protection for femto-UEs so their outage ratio is as [2] V. Chandrasekhar, J. Andrews, and A. Gatherer, Femtocell Networks:
bad as for the full-reuse case. Reuse 2/4 slightly decreases the A Survey, IEEE Communications Magazine, vol. 46, no. 9, pp. 5967,
outage ratio of femto-UEs but because of the high interference 2008.
[3] 3GPP, E-UTRA and E-UTRAN Overall Description; Stage 2 (Release
between femtocells, one fth of the users are still in outage. 9), 3GPP TS 36.300 V9.2.0, Dec. 2009.
These outage ratios show why interference mitigation is also [4] , Physical Channels and Modulation (Release 9), 3GPP TS 36.211
needed between femtocells. Simply addressing the interfer- V 9.1.0, Mar. 2010.
[5] , Evolved Universal Terrestrial Radio Access (E-UTRA); Physical
ence only between macro- and femto-cells, brings limited Layer Measurements (Release 10), 3GPP TS 36.214 V 10.1.0, Mar.
improvement. The protection of cell-edge users with DSA 2011.
distinctively decreases the outage ratio of both macro and [6] , Evolved Universal Terrestrial Radio Access (E-UTRA); Physical
Layer Procedures (Release 9), 3GPP TS 36.213 V 9.1.0, Mar. 2010.
femto-UEs. Unlike other methods, with DSA, BSs proactively [7] L. Kleinrock and F. Tobagi, Packet Switching in Radio Channels: Part
assign subframes depending on the interference conditions. ICarrier Sense Multiple-Access Modes and Their Throughput-Delay
Finally, Table III shows the ratio of the subframes used Characteristics, IEEE Transactions on Communications, vol. 23, no. 12,
pp. 14001416, Dec. 1975.
actively by BSs. Since all macro- and femto-BSs use all sub- [8] 3GPP, Simulation Assumptions and Parameters for FDD HeNB RF
frames actively with full-reuse, the ratio is 100%. With femto Requirements, 3GPP TSG RAN WG4 R4-092042, May 2009.
resource partitioning, each femto-BS uses 50% (since we force [9] , Further Advancements for E-UTRA Physical Layer Aspects
(Release 9), 3GPP TR 36.814 V0.4.1, Sep. 2009.
each femto-BS to use two subframes at each subframe pattern). [10] Huawei, Control Channel Performance Evaluations for Co-channel
With reuse 2/4, both macro- and femto-BSs use the 50%. On Deployment with MeNBs and Outdoor Picos, 3GPP TSG RAN WG1
the other hand, with DSA, femto-BSs can use nearly 70% of Meeting #60bis R1-101983, 12 16 Apr. 2010.

,6%1 9'(9(5/$**0%+%HUOLQ2IIHQEDFK

Das könnte Ihnen auch gefallen