Professional Documents
Culture Documents
IST-4-027756 WINNER II
D4.7.2 v1.0
Interference avoidance concepts
Abstract:
This document presents selected inter-cell interference avoidance techniques for the WINNER system,
addressing resource management and partitioning as well as resource allocation and scheduling. These
techniques are assessed by means of computer simulations at system level for the baseline evaluation
scenarios and corresponding recommendations given also for possible combinations with other inter-cell
interference mitigation schemes.
Keyword list:
Inter-cell interference, interference avoidance, frequency re-use, interference coordination, resource
management and partitioning, resource allocation and scheduling
Disclaimer:
Page 1 (85)
WINNER II D4.7.2 v1.0
Executive Summary
The goal of WINNER is to develop a single ubiquitous radio access system adaptable to a wide range of
mobile communication scenarios. The designed system will be based on a single radio access technology with
enhanced capabilities in order to provide users with superior quality wireless access.
Wireless links may experience different kinds of interference such as inter-symbol interference (ISI), multiple
access interference (MAI), and interference from external sources. MAI can be further categorized into intra-
cell and inter-cell interference depending on whether it is generated from own cell or other cells, respectively.
Inter-cell interference mitigation has been identified as a key issue to be investigated in WINNER as it is
directly coupled with achievable re-use of the scarce spectrum. Three main types of inter-cell interference
mitigation techniques have been defined in the WINNER II framework: interference averaging, interference
avoidance and smart antennas based interference mitigation.
This document presents selected techniques for inter-cell interference avoidance which have been classified in
resource management and partitioning on one side, and resource allocation and scheduling on the other side.
Wide area and Metropolitan area scenarios have been investigated, as well as the Local area scenario
considered to an extent as a special case of the Metropolitan area scenario.
The inter-cell interference avoidance techniques have been assessed by means of System Level simulations
taking the WINNER evaluation scenarios, the baseline simulation parameters as well as realistic traffic models
(in some schemes) into account. Common assessment criteria together with other specific performance
indicators are used for the evaluation of the techniques proposed. The possible impact on the WINNER system
architecture as well as the complexity of each method is addressed too. Combinations with interference
averaging techniques and smart antennas based mitigation techniques are also investigated.
The assessment results obtained for each technique together with their potential impacts on the System
Architecture and complexity issues have led to first recommendations for inter-cell avoidance techniques. The
combination with other inter-cell interference mitigation techniques like interference averaging [WIN2D471]
and the use of smart antennas [WIN2D473] has also been considered.
In order to complete the picture for the whole inter-cell interference mitigation further combinations of the
techniques and their refinement have to be addressed; this will be the goal of the work in the remaining phase
of WINNER II.
Page 2 (85)
WINNER II D4.7.2 v1.0
Authors
Partner Name Phone / Fax / e-mail
Alcatel-Lucent Germany
Geneviève Mange Phone: +49 711 82141407
Fax: +49 711 82132300
e-mail: genevieve.mange@alcatel-lucent.de
DoCoMo
Gunther Auer Phone: +49 89 56824 219
Fax: +49 89 56824 301
e-mail: auer@docomolab-euro.com
Page 3 (85)
WINNER II D4.7.2 v1.0
Table of Contents
1. Introduction ..................................................................................................9
1.1 Background..................................................................................................................................9
1.2 Scope ...........................................................................................................................................9
1.3 Outline .........................................................................................................................................9
Page 4 (85)
WINNER II D4.7.2 v1.0
8. References .................................................................................................46
Page 5 (85)
WINNER II D4.7.2 v1.0
Page 6 (85)
WINNER II D4.7.2 v1.0
Page 7 (85)
WINNER II D4.7.2 v1.0
Page 8 (85)
WINNER II D4.7.2 v1.0
1. Introduction
1.1 Background
The goal of WINNER is to develop a single ubiquitous radio access system adaptable to a wide range of
mobile communication scenarios. The designed system will be based on a single radio access technology with
enhanced capabilities in order to provide users with superior quality wireless access. The radio interface should
also be efficient - both spectrally and in cost of deployment. One way to improve spectrum efficiency and limit
deployment costs is to create a radio interface which is inherently robust to interference.
Wireless links may experience different kinds of interference such as inter-symbol interference (ISI), multiple
access interference (MAI), and interference from external sources. MAI can be further categorized into intra-
cell and inter-cell interference depending on whether it is generated from own cell or other cells, respectively.
Inter-cell interference mitigation has been identified as a key issue to be investigated in WINNER as it is
directly coupled with achievable re-use of the scarce spectrum. The main objectives of such investigations are
as follows:
N To develop optimal interference avoidance and rejection strategies for the system to support universal
coverage based on the refined air interface proposal in WINNER II.
N To investigate and assess methods for coping with inter-cell interference in order to be able to offer a
high and reliable Quality of Service especially at the cell borders and under high traffic load
conditions.
The investigations should focus on the scenarios where the interference level is limitative for the coverage.
This implies that mostly the wide area and metropolitan area deployment scenarios are important to be
considered. The ultimate goal is to achieve high system capacity using an optimal effective frequency re-use
factor. Three main types of inter-cell interference mitigation techniques have been defined in the WINNER II
framework as listed below:
This document presents selected techniques for inter-cell interference avoidance. Proposed methods with and
without inter-cell coordination are examined and validated by computer simulations. Wide area and
Metropolitan area scenarios have been investigated, as well as the Local area scenario considered to an extent
as a special case of the Metropolitan area scenario. Inter-cell interference averaging and interference
mitigation using smart antennas have been investigated in [WIN2D471] and [WIN2D473], respectively.
1.2 Scope
The proposed inter-cell interference avoidance techniques are assessed by means of System Level simulations
taking the WINNER evaluation scenarios [WIN2D6131] , the baseline simulation parameters [WIN2D6137] as
well as realistic traffic models (in some schemes) into account. Common assessment criteria together with
other specific performance indicators are used for the evaluation of the techniques proposed. The possible
impact on the WINNER system architecture and functionality [WIN2D6138] as well as the complexity of each
method are addressed too.
1.3 Outline
The document is organized as follows:
Chapter 2 gives an overview of the classification chosen for the selected inter-cell interference avoidance
techniques which will be investigated; each technique is then described in more detail.
Chapter 3 presents the assessment methodology followed in this work, like evaluation scenarios, common
assessment criteria and inter-cell interference modelling methods for system-level simulators. In addition, the
Page 9 (85)
WINNER II D4.7.2 v1.0
most relevant aspects of the System and Protocol Architecture are addressed as well as guidelines for the
complexity evaluation.
Chapters 4 and 5 contain the mains results obtained for each avoidance technique according to the assessment
methodology described in chapter 3. Combinations with interference averaging techniques [WIN2D471] and
smart antennas based mitigation techniques [WIN2D473] are also investigated.
Chapter 6 recapitulates the outcomes of the investigations and provides recommendations for inter-cell
interference avoidance, addressing also possible combinations of interference mitigation techniques.
Chapter 7 finally gives a summary of the document contents and conclusions.
In addition, methods for system level interference modelling as well as further detailed results on the
investigated interference avoidance techniques can be found in the appendices.
To the first type belong techniques based on restrictions on the transmit power over the resources where pre-
defined frequency re-use schemes apply as well as techniques for flexible or even self-adaptive re-use
partitioning where the frequency re-use itself varies inside the cells.
The second type of techniques take intrinsically a frequency re-use value of 1 into account; dynamic chunk
allocation using cell coordination is one of them, decentralized dynamic channel allocation for the TDD mode
a further one. Scheduling schemes based on a Cost function or QoS Provisioning and aware of inter-cell
interference are considered here as well.
Following sections contain further detailed descriptions of each investigated schemes by addressing their most
important characteristics alongside the classification chosen.
Page 10 (85)
WINNER II D4.7.2 v1.0
follows a frequency re-use scheme which determines the subset of resources restricted in each cell taking its
position among its neighbours into account. This scheme allows keeping the inter-cell interference at a low
level while still using all available frequency resources for the transmission; it can also be called soft frequency
re-use scheme. Increasing the re-use value leads to restrict the transmit power in a lower portion of the
resources like e.g. for the case of soft frequency re-use 7/6 it is 1/7 of the bandwidth available which is reduced
in power.
Another family of schemes typically involve a sub-band commonly used by all the cells (i.e. with a frequency
re-use of 1) with equal power, while the power allocation of the remaining sub-bands is coordinated among the
neighbouring cells in order to create one sub-band with a lower inter-cell interference level in each cell. This
particular sub-band is called the cell-edge sub-band in the following. Several transmit power allocation
strategies are possible, leading to Fractional Frequency Re-use (FFR) schemes with different frequency re-use
factors in the various sub-bands, either with full power isolation between the sub-bands of adjacent cells, or
partial isolation only. The full transmit power isolation means the cells are not allowed to transmit on the cell-
edge sub-band of their neighbours, which totally suppresses the inter-cell interference from the neighbouring
cells at the expense of a reduction of the amount of available resources. The partial isolation achieves a trade-
off between inter-cell interference mitigation and loss of frequency resource by allowing the neighbouring cells
to use the cell-edge sub-band of a given cell, but with a lower power level in order to keep inter-cell
interference low.
The feedback necessary from the UTs to support the resource allocation performed by the scheduler depends
on the adopted power allocation strategy: it can be either the indication of which interfering base stations are
strongly received and which is the strongest, or the average SINR (or CQI) measured over the whole
bandwidth. In both cases, neither additional measurement nor signalling is required compared to the normal
mode of operation of WINNER: the interferers' identification and reporting are known from classical handover
algorithms, it is just necessary that the base station number identifies the inhibited frequency sub-bands.
Similarly, the CQI reporting is required for the link adaptation.
We consider here a static resource management scheme where the power and bandwidth of each sub-band
inside the whole frequency domain are re-configured on a time scale corresponding to days by Network
Planning. In addition different scheduling policies are investigated in order to prioritize the cell-edge UTs in
the sub-bands with enhanced channel conditions.
Page 11 (85)
WINNER II D4.7.2 v1.0
Two different kind of schemes are addressed: Flexible Re-use Partitioning and Self Adaptive Re-use
Partitioning.
2.2.2.1 Flexible Re-use Partitioning
From a cell point of view, Flexible Re-use Partitioning (FRP) is a method which implements different re-use
zones per cell i.e. which divides the cell coverage area into concentric zones with different re-use factors based
on the received Broadcast Channel (BCH) level. A “cell” is recognized by its BCH geographical coverage area
[WIN2D6138]. The inner zone in each cell is re-use 1 zone and therefore will be exempted from resource
partitioning restrictions. The simplest yet promising form of implementing FRP is to divide the cell into inner
(re-use 1) and outer (e.g. re-use 3) zones.
At network planning stage, re-use resources are defined and set for the outer zones in the individual cells. This
is a one-time process to make the base stations aware of their partitions per zone before hand and there are no
further updates or signalling required in that sense. UTs in each zone will be identified, grouped, and scheduled
accordingly.
Threshold values for the received BCH level can be updated due to load balancing and/or interference
management commands as follows:
Load balancing can take place by mutual negotiations between base stations. This method can be implemented
in three steps: in the first step, each base station adjusts its re-use zones individually according to its cell load
without coordinating with other cells. In this case, no signalling is required. In the second step, co-ordination
between neighbouring base stations takes place to adjust re-use zones mutually. In this case request signal will
be sent to neighbouring cells.
Finally, in case the situation did not improve or if there are conflicting requests, then a more central controlling
approach takes place which enforces the updated thresholds based on its knowledge of relative load and
resources in each cell. The additional signalling needed corresponds to the threshold values for different re-use
zones in each cell.
The proposed scheme sub-optimally finds a set of chunks to be restricted in each sector depending on mutual
interference situations and UT data rate requirements. These chunk restriction lists are refreshed on a time-
scale which is less than the channel coherence time. The scheme is comprised of separate algorithms residing
at each sector and at a central controller. Based on the received interference from neighbouring sectors as well
as UT data rate requirements, each sector prepares a tentative list of chunks to be restricted at the neighbouring
sectors determined by its algorithm, and sends a corresponding restriction request to the central controller. The
central controller gathers all such requests from all involved sectors and prepares final chunk restriction lists
for all sectors using its own algorithm. This results in a dynamic re-use factor for each chunk.
Once the chunk restriction list is available to the sector, it is up to the scheduler to schedule the eligible chunks
with its criteria; i.e., scheduling is considered to be independent of the dynamic coordination scheme. In the
studied scheme a scheduler based on the iterative Hungarian (Munkres) algorithm that achieves maximized
throughput with UT data rate constraints is used.
Page 12 (85)
WINNER II D4.7.2 v1.0
Due to its decentralized nature, the algorithm can be utilized in both cellular and multi-hop networks. Further
applications include the peer-to-peer (P2P) communications within the WINNER system, and dynamic
spectrum assignment for a multiple operator scenario, where the WINNER system is deployed in license
exempt spectrum. For performance evaluation simulations are conducted for the metropolitan area (MA) with a
regular grid of buildings, as well as a local area (LA) peer-to-peer network.
3. Assessment methodology
3.1 Introduction
This chapter contains the different aspects of the assessment methodology followed by the evaluation of the
inter-cell interference avoidance techniques described in the previous chapter. First the basic assumptions made
for the investigations concern the WINNER II evaluation scenarios as well as the models and methods used for
Page 13 (85)
WINNER II D4.7.2 v1.0
the System Level simulations themselves. The description of the common assessment criteria used and their
specific purpose is then detailed. The way the schemes studied may impact or be related to the WINNER II
System Architecture including Measurements and Signalling is shown as well as their complexity itself being a
further important aspect for the assessment.
The scope of the investigations reported in this deliverable covers all three WINNER test scenarios, i.e. the
base coverage urban, the microcellular, and the indoor scenarios [WIN2D6137]. The FDD physical layer mode
is used for the base coverage urban scenario, while TDD mode is used for the microcellular and indoor
scenarios. The emphasis is given to downlink interference avoidance for the studies involving base coverage
urban FDD scenario. Both downlink and uplink are investigated in the schemes proposed for microcellular and
indoor scenarios. According to deployment specific baseline parameters [WIND6137], inter-site distance of 1
km is used for base coverage urban (macro-cellular) FDD scenario and ‘Manhattan grid’ with defined building
and street dimensions is considered for microcellular TDD scenario.
While full-buffer traffic model is assumed mostly as defined in the baseline design, in order to obtain realistic
queue and delay statistics, realistic traffic models for VoIP, streaming video, FTP etc are implemented in some
investigated schemes. The detailed descriptions of various traffic models can be found in Appendix A in
[WIN2D6137].
For modelling inter-cell interference at system level, both central cell and wrap-around techniques are used. In
the central cell technique, the system statistics are collected only in the central part of the simulated multi-cell
layout. Wrap-around technique is well known to be an effective way of emulating much larger number of cells
than what is actually simulated. In this technique, UTs can be placed in all cells from where statistics can be
gathered. The details on both methods are provided in Appendix A.2.
Based on the performance parameters to be observed for different proposed schemes, both Class II and III
simulators are used [WIN2D6131] [WIN2D6137]. Class II and III are system level simulators defined to
capture dynamic and quasi-static aspects of the system behaviour, respectively.
In [WIN2D6137], a refined list of assessment criteria is provided. It has been agreed for our work to define
mandatory and optional criteria for performance evaluation from this list. The mandatory criteria are:
N CDF of the user throughput
N CDF of the (chunk) SINR
N The average sector throughput
CDF of user throughput seems to be the most important one, because it can be used for deriving the standard
performance measure criteria like fairness, average throughput and spectrum efficiency as well as the cell edge
user throughput considering a defined percentile value.
The gain of interference avoidance techniques which are the focus of our investigations can be sometimes
directly read from the CDF of SINR: e.g., gain in mean SINR, decreasing the percentage of UTs having SINR
below certain threshold etc. The SINR measure is defined as the SINR after receiver processing but prior to
Page 14 (85)
WINNER II D4.7.2 v1.0
decoding and for both the frequency adaptive and the non adaptive modes represents the average channel
quality on the scheduled resources.
Since networks’ providers are often interested in maximizing average performance per cell or sector, the
average cell/sector throughput is also an important performance criterion.
Delay distribution is also an important performance criterion for E2E evaluations, since delay experienced by a
user has a great impact on user’s satisfaction, especially in the case of real-time services.
Delay is defined in [WIN2D6137] as follows:
N Packet delay is the time interval from when the packet enters the transmission queue to when the
packet is received successfully. If a packet is not successfully delivered by the end of a simulation
run, none of the information bits of the packet shall be counted.
N Packet call delay is the time interval from when the first packet of a packet call enters the transmission
queue to when the last packet of the packet call is received successfully. If a packet call is not
successfully delivered by the end of a simulation run, the packet call shall not be counted in the
performance statistics.
However, it must be taken into account that:
N The packet delay criterion is not applicable to the full queue traffic model
The packet call delay criterion may not be easily applicable in class III simulators, where only a fraction of the
packet call is generally considered. Note this depends actually on the traffic model. For an HTTP traffic model,
the packet call represents the download of one web page (made up of several packets), whose duration (less
than 1 second) can be encompassed in one snapshot. However, considering the mean reading time of 30
seconds, it is likely that one snapshot will not be able to capture one complete packet call for each UT, except
at the price of very long simulation durations (note that the discussion about traffic models for class III
simulators is still open in [WIN2D6137]).
That is why the delay criterion may not be the most relevant for our investigations compared to, e.g., the cell or
sector and user throughput. On the other hand, CDF of the delay is important for scheduling investigations,
since scheduling can make a trade-off between throughput and delay. Therefore in the case of scheduling
simulations we need also delay CDF along with throughput CDF to evaluate the performance. Furthermore,
delay could be indirectly estimated from SINR CDF, which is an important performance criterion for us as
discussed above.
Performance of the studied schemes based on the assessment criteria will also be sensitive to the overall design
and assumptions related to environment and deployment. For instance, the performance of an interference
avoidance scheme may depend on the resource management/scheduling strategy used. Accordingly, when
analyzing the performance of a specific strategy, the other assumptions should be well described and the
impact of changing these other strategies/assumptions should be investigated as far as possible.
The Logical Nodes (LNs) building the WINNER II System architecture are: GWLN nodes, BSLN nodes, RNLN
nodes and UTLN nodes and optionally RRMserverLN. They correspond to Network Elements as such but
describe their functionalities and interfaces in a generic way independently from possible implementations in
future networks. The most relevant LNs for the assessment to be conducted for our purpose will be the BSs
and UTs and the communication among them; but the RNs may be concerned as well when indicating whether
a specific interference avoidance scheme may be applied to the Relaying concepts in WINNER II. The
optional RRM server will come into the discussion when the need for a centralized architecture rather than a
distributed one is identified.
The Protocol Architecture is defined for the User Plane and the Control Plane comprising the lower layers
PHY, MAC and RLC as well as RRC for the later case. The investigated schemes will be mostly related to the
Page 15 (85)
WINNER II D4.7.2 v1.0
PHY and MAC layers esp. concerning scheduling together with the constraint processing but some of them
will also address the RRC layer when e.g. its resource partitioning function is considered.
4.1 Introduction
This chapter is devoted to inter-cell interference avoidance techniques based on resource management and
inter-cell resource partitioning. These techniques typically adjust the re-use factor of the resources across
neighbouring cells in order to manage the level of inter-cell interference. Inter-cell resource partitioning
implies sharing a common set of resources among different cells. One of the advantages of OFDMA is the
ability to perform the frequency resource partitioning in a fractional way, by sharing exclusively only a fraction
of the spectrum between neighbouring cells, the remaining spectrum being reused in all cells simultaneously.
Another way to manage interference is to coordinate the transmit power of neighbouring cells on defined sub-
bands (or frequency subsets if the concerned subcarriers are not co localized), in order to create sub-bands with
lower inter-cell interference levels. Note the boundary between frequency resource partitioning and
interference management through transmit power restrictions in frequency is not strict, since using the latter
with null power settings on some sub-bands leads to effective frequency resource partitioning. On the other
hand, transmit power restrictions can be seen as a kind of resource partitioning, where the partitioned resource
is the transmit power.
Resource management and inter-cell resource partitioning can be either static, where the resource allocation
across neighbouring cells remains fixed over time, or dynamic in order to adapt to the load variations in the
neighbouring cells. In the latter case, inter-cell resource partitioning together with inter-cell load balancing tries
to maximize the spectral efficiency without changing the available spectrum assignment, in order to make sure
that the most has been made from the available spectrum before requesting more from the higher layers of the
WINNER architecture (see Section 4.3 for an overview of the various steps involved in the WINNER spectrum
assignment, and how inter-cell resource partitioning interacts with it). Both the static and dynamic approaches
are addressed in this chapter.
Relays have not been considered as such in this deliverable, although most of the techniques considered (if not
all) should be applicable in the context of relay-enhanced cells [WIN2D352].
The remainder of this chapter is organised as follows: Section 4.2 investigates static resource management by
means of transmit power restriction schemes, as well as different scheduling policies accounting for the
transmit power restrictions. Note although the power allocations are static, their performance assessments
presented in this section provide insights into the performance dynamic schemes would achieve when
(temporary) matching the same settings. Section 4.3 addresses resource partitioning schemes that can be
implemented either in a static or a dynamic way. Flexible re-use partitioning is proposed in Section 4.3.1 as a
method to allow fast load balancing between neighbouring cells on top of inter-cell interference mitigation.
Section 4.3.2 proposes self adaptive re-use partitioning, which exploits a priority-based partitioning of the
chunks available to a given cell, the modifications in the priorities calculation leading to different partitioning
schemes that operate in a static or dynamic fashion.
Page 16 (85)
WINNER II D4.7.2 v1.0
In the first family, each cell uses the whole frequency band but a specific subset is reduced in power according
to a specific frequency re-use scheme, the remaining ones using equally full power [R1050272]. At the cell-
edge, UTs are assigned the subsets with reduced power of their strongest interfering base station. This scheme
allows keeping the inter-cell interference at a low level while still using all available frequency resources for
the transmission; it can also be called soft frequency re-use scheme. Increasing the re-use value leads to restrict
the transmit power in a lower portion of the resources like e.g. for the case of soft frequency re-use 7/6 it is 1/7
of the bandwidth available which is reduced in power. Figure B-1 in Appendix B.1.1 illustrates this concept.
This latter method will be referred to in the following as Interference Coordination (IFC) through cell-specific
transmit power reduction.
The other family of schemes is Fractional Frequency Re-use (FFR), which typically involves a sub-band
commonly used by all cells (i.e. with a frequency re-use of 1) with equal power, while the power allocation of
the remaining sub-bands is coordinated among the neighbouring cells in order to create one sub-band with a
lower inter-cell interference level in each cell. This particular band is called the cell-edge band in the
following. FFR schemes can be further subdivided into FFR with full transmit power isolation (FFR FI) and
FFR with partial isolation only (FFR PI).
The full power isolation means the cells are not allowed to transmit on the cell-edge sub-band of their
neighbours, which suppresses inter-cell interference from the neighbouring cells in the cell-edge sub-bands at
the expense of a reduction of the amount of available resources (see Figure B-4 in Appendix B.1.2).
With partial power isolation, all the system bandwidth is available in all cells; therefore, the number of
available frequency resources is the same than for the re-use 1 scheme, similarly to the IFC through cell-
specific transmit power reduction. In the FFR PI scheme considered here, the enhanced channel quality is
achieved by allocating a higher power to the cell-edge sub-band, and consequently reducing the transmit power
of the remaining sub-bands in order to maintain the same total transmit power (see Figure B-5 in Appendix
B.1.2). Note the term "frequency re-use" is misleading in the case of partial power isolation, since all the
frequencies are used at all cells; in that case, it refers actually to the re-use of the frequency resources
benefiting from reduced interference levels.
Whatever the scheme using the full system bandwidth, the interference level experienced in the sub-band with
enhanced channel quality is higher than in the FFR with full isolation case since interference from the
neighbouring cells is still present.
Only static coordination schemes are considered here, where the power and bandwidth of each sub-band
remain fixed over time.
In addition, this study addresses different scheduling policies in order to prioritize the cell-edge UTs in the sub-
bands with enhanced channel conditions.
Cell-edge UTs first (priority scheme 1): This scheme is restrained to the frequency-adaptive mode. The chunk
assignment is performed in two steps: first, the cell-edge UTs select their best chunks (i.e. the chunks with the
highest CQI) in priority. When the cell-edge UTs have been allocated all their chunks, the chunks assignment
process is performed for the non cell-edge UTs using the remaining chunks. This scheme has no interest in the
Page 17 (85)
WINNER II D4.7.2 v1.0
non frequency-adaptive mode since the chunk CQI is not taken into account there. However, this scheme can
be used also for the re-use 1 scheme with the frequency-adaptive mode.
Cell-edge UTs constrained to the cell-edge band (priority scheme 2): Like the previous one, this scheme
assigns chunks to the cell-edge UTs first, but in addition the cell-edge UTs are constrained to be allocated
chunks from their cell-edge band. When the cell-edge UTs are too numerous to be allocated all their chunks in
the cell-edge band, this scheme shares the cell-edge band evenly between the cell-edge UTs associated with
this cell-edge band. In the non frequency-adaptive mode, this scheme reduces to allocating the cell-edge UTs in
their cell-edge band first, in an evenly manner if the cell-edge band is too narrow to contain all the chunks of
the associated cell-edge UTs
Only the first cell-edge UTs are constrained to the cell-edge band (priority scheme 3): This scheme differs
from the previous one only when the number of cell-edge UTs selected for transmission is too large compared
to the available cell-edge band. In this case, only the N first cell-edge UTs are constrained to be allocated in the
cell-edge band, where N is chosen so that all the chunks of these N UTs can be allocated within the cell-edge
band. The remaining cell-edge UTs are then allocated outside the cell-edge band, but still have the priority over
the non cell-edge UTs in the frequency-adaptive mode.
The construction of the frequency patterns has also to be compatible with the pilot patterns distribution over
the cells. Especially pilots corresponding to power reduced frequency subsets will also be reduced in power.
As for the proposed prioritization schemes, the only measurement needed is the average SINR measured over
the whole bandwidth, or equivalently the average CQI, which is available at the BS for link adaptation. In the
case of IFC through cell-specific transmit power reduction, the resource allocation achieved by the scheduler is
supported by the mobile terminals reporting to their serving base station which other base stations are strongly
received and which is the strongest. These reports are known from classical handover algorithms and therefore
do not require additional signalling to be introduced. It is just necessary that the base station number identifies
the inhibited frequency subset. As a consequence, for all the considered coordination schemes, no additional
feedback or measurement is required compared to those needed by the normal mode of operation of the
WINNER system.
4.2.4 Complexity
The complexity added by the considered schemes resides in the scheduler implementation at the base station,
taking into account the additional constraints required by the prioritization schemes. Nevertheless, this
complexity increase is minor. No other additional complexity is introduced by this technique, neither on the
network elements nor on the system functionality itself.
Page 18 (85)
WINNER II D4.7.2 v1.0
0.9 0.45
0.8 0.4
0.7 0.35
0.6 0.3
0.5 0.25
cdf
cdf
Figure 4-1: CDF of the average user throughput for different re-use values
This figure shows the better performance of the IFC scheme for the re-use value 7/6 over re-use values 3/2 and
3/1 in that order, whereby overall performance degradation occurs as expected when the UT velocity increases.
This holds for the average user throughput as well as for the cell edge user throughput (determined by the 5
percentile of the CDF average user throughput). These results reflect the greater amount of resources available
using this IFC scheme with the re-use 7/6 since in that case only 1/7 of the resources are reduced in power as
well as the improvement of the situation at cell edge border. The corresponding detailed results are shown
below for both UT velocities investigated:
Table 4-1: Performance of the IFC scheme for different re-use values
IFC 7/6 IFC 7/6 IFC 3/2 IFC 3/2 IFC 3/1 IFC 3/1
UT vel 3 UT vel 30 UT vel 3 UT vel 30 UT vel 3 UT vel 30
km/h km/h km/h km/h km/h km/h
Cell edge user
throughput (Mb/s) 2.43 2.33 2.27 2.17 1.79 1.72
Average sector
throughput (Mb/s) 77.6 71.4 67.3 62.2 62.9 57.6
Sector spectral
efficiency (b/s/Hz) 1.55 1.43 1.35 1.24 1.26 1.15
Page 19 (85)
WINNER II D4.7.2 v1.0
In the case of UT velocity 3 km/h for instance the investigated IFC scheme used with the re-use value 7/6
outperforms the cases of re-use values 3/2 resp. 3/1 by 15% resp 23% for the average sector throughput and by
7 % resp 36% for the cell edge throughput.
Besides these results obtained for the different frequency re-use values for the IFC scheme considered, further
investigations have been conducted for comparison with the configuration without IFC; still one single
transmit antenna at BS side and two receive antennas at UT side were used while keeping the MRC diversity
scheme at UT side. This later case corresponds to a frequency re-use value of 1 over the whole bandwidth for
all cells.
Under the simulation assumptions stated above degradation of the performance has been observed for the
average sector throughput for all re-use values investigated for the IFC scheme compared with the situation
without IFC whereby the worst case is the re-use 3/1. For re-use 7/6 the degradation observed amounts -8.1%
and for the re-use values 3/2 resp. 3/1 it corresponds to -20.3% resp. -25.5%. The cell edge user throughput
improves slightly by +0.4 % for the IFC scheme with 7/6 re-use compared to the case without IFC but also
decreases for the 3/2 and 3/1 re-use values in that order by -6.2% resp. -25.7% ; these results are detailed in
Table B-2 in the Appendix B.1.1.
First remarks for this measured behaviour which indicates that a frequency re-use of 1 without any
coordination addressing the inter-cell interference situation performs in average better than the IFC scheme
investigated have to address the simulation assumptions themselves. For example the number of UTs simulated
per sector is 10 in average whereby the Inter Site Distance is set to 1000 m in the deployment scenario
considered. This corresponds to a rather low density of UTs which does not ensure a uniform distribution as
such which would be beneficial for schemes based on restrictions in the cells. Furthermore the type of
scheduler used in combination with the IFC scheme would also have an impact on the performance achieved.
Preliminary investigations have been conducted addressing a further variant of the Base Coverage Urban
scenario indicated in [WIN2D6133] with a scheduler based on a minimum target throughput per served UT;
this kind of scheduler would apply for real-time services like e.g. VoIP. Appendix B.1.1 contains the
simulations assumptions together with the first results obtained which indicate that significant improvements at
the cell border could be achieved by the IFC scheme with 7/6 re-use over the case without IFC; however
further consolidation of these results is needed taking the complete WINNER II evaluation baseline for Wide
Area into account..
The CDF of the average SINR at UT receiver output as further assessment criteria is shown in Figure 4-2 for
all re-use values investigated at both UT velocities:
1 1
0.9 0.9
0.8 0.8
0.7 0.7
cdf of av. SINR
0.2 0.2
0.1 0.1
0 0
-10 -5 0 5 10 15 20 25 30 -10 -5 0 5 10 15 20 25 30
av. SINR (dB) av. SINR (dB)
Figure 4-2: CDF of the average SINR (left 3 km/h; right 30 km/h)
In order to further evaluate the behaviour of the IFC scheme still taking into account the simulation
assumptions indicated above investigations have been conducted combining this scheme with transmit
diversity at BS side, diversity at UT side being maintained by the MRC scheme.
For this the fixed Grid of Beams (GoB) technique as specified in the baseline [WIN2D6137] has been
evaluated for the IFC scheme using the re-use value of 7/6; configurations with 2 and 4 transmitting antennas
at BS side have been considered for UT velocity 3 km/h.
Page 20 (85)
WINNER II D4.7.2 v1.0
av. user TP cdf - vel. 3 km/h av. user TP cdf - vel. 3 km/h
1 0.5
Tx: fix GoB 2 Rx: 2 (MRC)
0.9 0.45
IFC 7/6 Tx: fix GoB 2 Rx: 2 (MRC)
0.8 0.4 Tx: fix GoB 4 Rx: 2 (MRC)
IFC 7/6 Tx: fix GoB 4 Rx: 2 (MRC)
0.7 0.35 Tx:1 Rx:2 (MRC)
IFC 7/6 Tx:1 Rx:2 (MRC)
0.6 0.3
0.5 0.25
cdf
cdf
Tx: fix GoB 2 Rx: 2 (MRC)
0.4 0.2
IFC 7/6 Tx: fix GoB 2 Rx: 2 (MRC)
0.3 Tx: fix GoB 4 Rx: 2 (MRC) 0.15
IFC 7/6 Tx: fix GoB 4 Rx: 2 (MRC)
0.2 Tx:1 Rx:2 (MRC) 0.1
IFC 7/6 Tx:1 Rx:2 (MRC)
0.1 0.05
0 0
0 5.0 10.0 15.0 20.0 25.0 30.0 0 5.0 2.0 3.0 4.0 5.0 6.0 7.0
TP [Mbit/s] TP [Mbit/s]
Figure 4-3: CDF of the average user throughput (IFC 7/6 with GoB)
Table 4-2: Performance of IFC re-use 7/6 combined with fixed GoB configurations
Improvements for the assessment criteria are achieved when the single antenna at transmit side is replaced by a
fixed GoB configuration in all cases but for the combination with the IFC scheme the same behaviour is
observed as above: the cell edge throughput degrades compared to the re-use 1 case by -6.5 % resp -2.7% for 2
resp. 4 transmit antennas used in the fixed GoB scheme. Degradation for the average sector throughput
amounts -4.8 % resp. -6.8% in those cases compared to the re-use 1 scheme.
The CDF of the average SINR at UT receiver output is shown Figure 4-4 for these cases of combination of the
IFC scheme with fixed GoB for the UT velocity value of 3 km/h:
UT vel. 3 km/h
0.9
Tx: 1 x Rx: 2 (MRC)
0.8
IFC 7/6 Tx: 1 x Rx: 2 (MRC)
0.7
cdf of av. SINR
0
-10 -5 0 5 10 15 20 25 30
av. SINR (dB)
Figure 4-4: CDF of the average SINR (IFC 7/6 with GoB)
Page 21 (85)
WINNER II D4.7.2 v1.0
The observations made earlier remain also with this configuration: degradation of the performance occurs
when the IFC scheme is used in combination with GoB in all cases compared to the situation without IFC
(frequency re-use 1).
0.8 0.09
Prob( av. user throughput < X)
0.08
0.7
Prob( av. user throughput < X)
0.07
0.6
0.06
0.5
0.05
0.4
1 Tx - 2Rx MRC - reuse 1 0.04
0.3 1 Tx - 2Rx MRC - FFR FI - no priority
0.03
1 Tx - 2Rx MRC - FFR FI - priority scheme 2
0.2 1 Tx - 2Rx MRC - reuse 1
1 Tx - 2Rx MRC - FFR FI - priority scheme 3 0.02 1 Tx - 2Rx MRC - FFR FI - no priority
0.1 1 Tx - 2Rx MRC - FFR FI - priority scheme 2
0.01
1 Tx - 2Rx MRC - FFR FI - priority scheme 3
0 0
0 1 2 3 4 5 6 7 8 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7
Av. user throughput (Mb/s) Av. user throughput (Mb/s)
Figure 4-5: user throughput CDF in the non-adaptive mode for FFR FI
The tables below summarize the results obtained for the FFR FI and FFR PI schemes with the various
prioritization schemes, as well as their relative improvements w.r.t. the re-use 1 scheme, for the non-adaptive
and adaptive modes, respectively.
Page 22 (85)
WINNER II D4.7.2 v1.0
The results show that the FFR PI scheme as almost no impact on the sector throughput, but does not bring a
sufficient SINR improvement to allow significant cell-edge throughput increases (no gain in non-adaptive
mode, +10% in adaptive mode). However, non-negligible gains in cell-edge throughput are achieved by the
FFR FI scheme (+155% in both mode), but at the expense of a significant sector throughput degradation (-13%
in non-adaptive mode, -20% in adaptive mode), due to the reduction of the available resources.
For a given scheme, the gain in cell-edge throughput is lower in the frequency-adaptive mode because the
frequency adaptivity already provides robustness w.r.t. inter-cell interference by allocating to UTs the
resources where they benefit from the best channel conditions, even in the absence of additional interference
mitigation techniques.
Among the investigated prioritization schemes, the one that exhibits the best trade-off between the cell-edge
throughput improvement and the sector throughput degradation depends on the frequency adaptivity.
In the non-adaptive mode, the most efficient scheme is the one which allocates the totality of the chunks of
some cell-edge UTs into the cell-edge band, all the chunks of the other cell-edge UTs being assigned outside
the cell-edge band (scheme 3). Note that the prioritization scheme which shares evenly the cell-edge band
among the cell-edge UTs achieves a lower degradation of the sector throughput, but a lower gain in cell-edge
throughput (+125% vs. +160% for the FFR FI). However, since the sector throughput difference between both
schemes is only 1 Mbits/s, the best trade-off appears to be achieved by prioritization scheme 3.
In the adaptive mode, the most efficient scheme allows the cell-edge UTs to be allocated their chunks first,
without being constrained into the cell-edge band (scheme 1). This result is logical since the best chunks of the
cell-edge UTs may not necessarily be located in the cell-edge sub-band due to the frequency selectivity of the
channel.
Page 23 (85)
WINNER II D4.7.2 v1.0
The combination of the FFR FI scheme with multiple-antenna interference mitigation techniques is also
assessed. Figure 4-6 presents the user throughput CDF in the cell-edge region for the non-adaptive and
adaptive modes, respectively (see Appendix B.1.2 for the full set of results).
0.1 0.1
0.08 0.08
0.06 0.06
0.04 0.04
0.02 0.02
0 0
0 0.5 1 1.5 2 2.5 0 0.5 1 1.5 2 2.5
Av. user throughput (Mb/s) Av. user throughput (Mb/s)
Figure 4-6: user throughput CDF for combination of FFR FI with Grid of Beams for the non-adaptive
(left) and frequency-adaptive modes (right)
The FFR FI scheme benefits from increased performances when used in conjunction with IRC. However it
brings poor improvement in cell-edge throughput when used in combination with the GoB (+7% in non-
adaptive mode), and even degrades it in frequency-adaptive mode. This behaviour can be explained by the fact
that in FFR schemes, the interference reduction in the cell-edge bands is achieved at the expense of a transmit
power reduction in other resources. The GoB, because of the directivity of the interference, dynamically
creates almost interference-exempt resources, when the UT is not hit by an interfering beam. As a
consequence, the GoB has very little to gain from sub-bands with lower interference levels (the actual gain is
likely to depend on the probability to be interfered by a beam versus the probability to be scheduled in
resources with reduced interference, as well as the effective interference reduction in the latters). On the
contrary, the reduced power on other sub-bands affects the useful signal power received on these sub-bands,
which effectively reduces the efficiency of the GoB compared to the re-use 1 scheme.
In conclusion, among the studied schemes, only the FFR FI appears to present an interest for practical
implementation. Unfortunately, the significant sector throughput degradation it induces prevents it from being
applied for data channels in case of high network load. Nevertheless, it can be used for low to medium loads,
when the network can afford a lower sector throughput, in order to enhance the user experience at the cell-
edge. On top of this, it has been shown that interference coordination schemes are almost useless when GoB is
used at the transmitter. Therefore, interference coordination schemes should be reserved to situations where
GoB can not be employed, for instance for common channels.
An option is to use the FFR FI scheme whatever the load for control channels only, in particular the BCH
which is transmitted in the preamble of the super-frame. Such an approach increases the minimum SINR
experienced during the BCH transmission, thus allowing higher MCS to be used in order to transmit essential
control information to UTs experiencing bad radio conditions, while retaining the full set of resources available
for data transmission. Of course, the resulting reduction of the control overhead has to be traded off against a
Page 24 (85)
WINNER II D4.7.2 v1.0
reduction of the bandwidth available for control channels, so it is not sure whether such a scheme would be
beneficial in the end. In addition, note the super-frame transmission would need to be time-aligned across
neighbouring cells, which would require network synchronization.
Long Term
Assignment
no yes
Multi-
RAN?
Inter-RAN HO/
“Single Load Balancing
RAN
Intra-RAN HO
Intra-RAN HO
Short Term ST assignment Req.
Assignment
Available spectrum
yes
no
yes Inter-cell No
WINNER Inter-cell Overloaded Resource Still
Overloaded?
RAN Load Balancing cell? Partitioning
Apart from resource partitioning, there are a number of other interference mitigation techniques intensively
studied in WINNER (see [WIN2D471] and [WIN2D473] for details). Simulation results show that under some
circumstances, these techniques provide enough protection against inter-cell interference and partitioning may
not be required. However, the investigations performed so far assume perfect estimation of essential
parameters such as control signalling and channel parameters. In the presence of estimation errors, it is possible
that the maximum interference level tolerated by some users to access the system will degrade, making
necessary additional interference control mechanisms. Moreover, there may be situations where efficient
spatial interference mitigation techniques such as the Grid of Beams are not implemented at the access point.
These are examples in which Inter-cell resource partitioning may become necessary as the last resort to control
and maintain the interference level. It should be noted however that resource partitioning is a trade-off between
improved SINR and restricted access to resources (i.e. trunking efficiency). The resource partitioning scheme
should therefore be able to adjust the relative load with the available resources in each partition to avoid this
set back as much as possible.
Resource partitioning can be implemented in conjunction with these techniques in a hybrid manner as
illustrated in Figure 4-8. In every base station, Spectrum assignment function [WIN1D63] at RRC layer sets
the total available spectrum for the constraint processor [WIN1D63] at MAC layer. This is in fact same as if re-
use 1 was considered for all cells. At this stage, other mitigation techniques are operating trying to maintain
interference in an acceptable level. When the load increases to some extent then inter-cell resource partitioning
enforces partitioning limitations in the constraint processor based on network load and interference conditions.
Page 25 (85)
WINNER II D4.7.2 v1.0
Spectrum Assignment
Inter-cell
Load
Resource Partitioning/ No Partitioning
Increases
Load balancing
Constraint Processing
The level of inter-cell interference in this zone can be adjusted by ThresholdReuse1 value. We can further extend
this definition to zones with higher re-use factors that gives more protection against inter-cell interference. A
sector with three different re-use zones is illustrated in Figure 4-9 where green zone is the area exempted form
partitioning (i.e. re-use 1), and yellow and orange zones have re-use 3 and re-use 7 partitioning respectively.
Each sector is considered a separate cell with a unique BCH channel. The threshold values are dynamically
adjusted according to the interference level and load distribution in the system.
PBCH i
Orange zone criteria for cellj (Reuse 7) : N @ Threshold Re use7
¦P
j 1,i z j
BCH j
PBCH i
Yellow zone criteria for cellj (Reuse 3): Threshold Re use3 N J Threshold Re use7
¦P
j 1,i z j
BCH j
PBCH i
Green zone criteria for cellj (Reuse 1): N J Threshold Re use1
¦P
j 1,i z j
BCH j
The simplest yet promising form of implementing FRP is to divide the cell into inner (re-use 1) and outer (re-
use 3) zones. ThresholdReuse3 is set to 0 (-inf dB) letting re-use 3 zone to cover the outer region of cell’s
coverage area. An optimum value for ThresholdReuse1 is subject to the propagation environment, interference
and load situation and should be adjusted dynamically to maximize spectral efficiency. Early works on re-use
Page 26 (85)
WINNER II D4.7.2 v1.0
partitioning suggest that for a cell radius of R with re-use 1 and re-use k for inner and outer regions
respectively, the inner-outer boundary should be set at R / k [Hal83]. Recent studies however show significant
improvement in system throughput for higher values of outer zone radius to some extent prior to a sharp fall in
the throughput afterwards [Bla01].
It should be noted that re-use zones defined above are considered identical for both downlink and uplink.
Although partitioning for relay nodes within a REC is a form of intra-cell resource partitioning and not
considered here, it is possible to implement FRP in a REC with some adjustments.
To implement FRP with hybrid approach as shown in Figure 4-8, by setting low ThresholdReuse1 value, one can
make the whole cell as re-use 1 zone and eliminate the partitioning restrictions. This is in fact very useful when
the traffic load is not high and inter-cell interference is kept within an acceptable range thanks to other
mitigation techniques.
It is assumed that resources for broadcasting preamble (including BCH) in each cell will be decided in network
planning phase based on a fixed frequency re-use pattern. At the same stage, re-use 3 (and optionally re-use 7)
resources are defined and set for individual cells based on dedicated spectrum available to each WINNER
operator. Not to be mentioned, this is a one-time process to make the base stations aware of their partitions per
zone before hand and there are no further updates or signalling required in that sense. UTs in each zone will be
identified, grouped, and scheduled accordingly based on received signal strength of own cell’s BCH relative to
other cells’ BCH or alternatively received BCH’s SINR level. This information in one form or another is
already available in each BS as it is required for handover process and there is no need for further measurement
or signalling. In case of spectrum re-adjustment due to e.g. ST spectrum assignment, the constraint processor
will be updated directly as shown in Figure 4-8 affecting re-use 1 resources only.
Threshold values can be updated due to load balancing and/or interference management commands. Whenever
is necessary, the threshold values per cell (see Figure 4-9) can be updated. When a cell is underloaded, base
station reduces its re-use 1 zone which in turn reduces its inter-cell emission. If it becomes overloaded, it
increases its re-use 1 zone and also triggers load balancing if needed. Load balancing can take place by mutual
negotiations between base stations. The overloaded cell sends a request to its neighbouring cells to reduce their
re-use 1 zone. After allowing some transition time, in case the situation did not improve or if there are
conflicting requests, then a more central controlling approach takes place which enforces the updated
thresholds based on its knowledge of relative load and resources in each cell.
Estimation of cell load can be taken from the scheduler’s buffer status in MAC layer or flow buffer status in
RLC layer.
4.3.1.2 Impact on System Architecture, Measurements and Signalling
The resource partitioning in this scheme is a one-time process at network planning stage and there are no
further updates or signalling required for resource partitions since they will not change. UTs in each zone will
be identified, grouped, and scheduled accordingly based on relative BCH signal strength or received BCH’s
SINR level. This information is already available in each BS for handover process.
Threshold values on the other hand, can be updated due to load balancing and/or interference management
commands. When a cell is overloaded, it increases its re-use 1 zone and also triggers load balancing if needed.
Load balancing can take place by mutual negotiations between base stations. The overloaded cell sends a
request to its neighbouring cells to reduce their re-use 1 zone. After allowing some transition time, in case the
situation did not improve or if there are conflicting requests, then a more central controlling approach takes
place which enforces the updated thresholds based on its knowledge of relative load and resources in each cell.
Estimation of cell load can be taken from the scheduler’s buffer status in MAC layer or flow buffer status in
RLC layer.
The signalling required is the threshold values for different re-use zones in each cell. Assuming re-use 1 in
inner and re-use 3 in outer zones, only one threshold value per cell is required. The thresholds values can also
be signalled as up/down commands. The RRC functions involved in this scheme are spectrum assignment,
congestion control, and resource partitioning. The MAC function involved in this scheme is constraint
processing.
4.3.1.3 Complexity
Since the re-use partitioning takes place at network planning stage, there is no additional complexity
introduced by this method during network operation since there is no need to update the partitions afterwards.
The UTs however need to be grouped according to their location and this grouping will be updated if the re-use
threshold changes. However, this information in one form or another is already available in each BS as it is
required for handover process and there is no need for further measurement or signalling.
In case of centralized controlling approach, the additional signalling needed is threshold values for different re-
use zones in each cell and cell loads. Assuming re-use 1 in inner and re-use 3 in outer zones, only one
threshold value per cell is required. The thresholds values can also be signalled as up/down commands.
Page 27 (85)
WINNER II D4.7.2 v1.0
0.9
0.8
0.7
Cumulative distribution
0.6
0.5
0.4
0.3
0.2
0.1
0
-20 -15 -10 -5 0 5 10 15 20 25 30
dB
The threshold values to define zone boundaries are chosen based on preamble SINR values – see Figure B-14
in Appendix B.2. The outer zone (with re-use 3) is defined as the area with preamble SINR less than 20dB.
Figure 4-11 illustrates the CDF for downlink SINR in this case.
1
0.9
0.8
0.7
Cumulative distribution
0.6
0.5
0.4
0.3
0.2
0.1
0
-20 -15 -10 -5 0 5 10 15 20 25 30
dB
Figure 4-11: CDF of downlink SINR for FRP with inner-outer re-use zones
4.3.1.6 Assessment
FRP is a partitioning scheme only, and the assessment criteria used here is CDF of SINR. The results are
assessed in comparison to CDF of SINR in re-use 1 (no partitioning). Throughput however very much depends
on the scheduling algorithm being used.
This method can be implemented in three steps: in the first step, each base station adjusts its re-use zones
individually according to its load without coordinating with other cells. In this case, no signalling is required.
Page 28 (85)
WINNER II D4.7.2 v1.0
In the second step, co-ordination between neighbouring base stations takes place to adjust re-use zones
mutually. In this case request signal will be sent to neighbouring cells.
Finally, in case the situation did not improve or if there are conflicting requests, then a more central controlling
approach takes place which enforces the updated thresholds based on its knowledge of relative load and
resources in each cell.
4.3.1.7 Conclusions and recommendations
Comparing the results from re-use 1 in Figure 4-10 and FRP in Figure 4-11 (e.g. at 50% CDF point), it
suggests significant improvement of up to 10dB in downlink SINR by implementing FRP in its simplest form
of inner-outer partitioning.
The recommendation is to implement FRP in conjunction with other interference mitigation techniques in a
hybrid manner as illustrated in Figure 4-8. In every base station, Spectrum assignment function sets the total
available spectrum for the constraint processor. This is in fact same as if re-use 1 was considered for all cells.
At this stage, other mitigation techniques are operating trying to maintain interference in an acceptable level.
When the load increases to some extent then inter-cell resource partitioning enforces partitioning limitations in
the constraint processor based on network load and interference conditions.
Page 29 (85)
WINNER II D4.7.2 v1.0
To reduce the overall simulation complexity, we simplify the resource modelling specified in [WIN2D6131]
and refined in [WIN2D6137]. One resource unit (RU) in our simulator represents 3 chunks. Therefore, in total
48 RUs are simulated. Furthermore, we consider perfect time and frequency synchronization at system level,
and thus any inter-symbol or inter-carrier interference is neglected. We summarize specific simulation
parameters in Table B-1 in Appendix B.3.
Figure 4-12 depicts the mean E2E user throughput for different loads and resource partitioning algorithms.
We can see that the highest mean throughput is obtained by ISARP within the considered range of loads.
Furthermore, with increasing load the mean throughput for ISARP, R3SARP-115 and R3SARP-118 decreases
and converges to the same value. As one would expect, the lowest mean throughput is achieved by RSARP
when chunks are partitioned in a random fashion. Since we performed simulations using VoIP traffic model,
the mean throughput values as well as the differences between different partitioning schemes are low. We can
expect that under different traffic conditions, these values could increase significantly and the differences
between different cases could become more noticeable.
Page 30 (85)
WINNER II D4.7.2 v1.0
145 40
RSARP RSARP
140
ISARP ISARP
35
R3SARP-115
30
130
125
25
120
20
115
110 15
0 10 20 30 40 50 60 70 80 90 0 10 20 30 40 50 60 70 80 90
Users per cell Users per cell
Figure 4-12: Mean E2E user throughput for Figure 4-13: E2E user throughput at 5th
different resource partitioning schemes percentile for different resource partitioning
schemes
An important aspect that needs to be considered in the case of real time services is the outage probability. In
our case we consider that the outage probability corresponds to the 5th percentile of E2E throughput CDF.
Figure 4-13 depicts the 5th percentile for different loads.
We observe that the highest E2E throughout at 5% is achieved by ISARP and R3SARP-115. Similarly to mean
E2E throughput performance, we see that the differences between considered partitioning schemes are small.
This is in line with the observed distribution of SINR depicted for 40 UTs in Figure 4-14. As can be seen, the
distribution is essentially the same for all SARP strategies. This is caused by the use of GoB and the nature of
traffic used leading to a low level of inter-cell interference in the system (see Figure B-16 in Appendix B.3).
Therefore, under such assumptions the gain of the proposed techniques is not high in terms of absolute
throughput values. However, in our case even small differences play an important role as they can reduce the
outage probability of real time services. This is in fact more important than absolute values of overall
throughput.
100
90
80
70
60
CDF [%]
50
40 RSARP
ISARP
30
R3SARP-115
20 R3SARP-118
10
0
0 10 20 30 40 50 60
SINR [dB]
4.3.2.6 Recommendations
The simulation results show that random self-adaptive re-use partitioning performs almost as well as
interference based self-adaptive re-use partitioning or re-use greater than 1 at the cell border. This is because
interference is reduced by GoB considerably, and thus it seems that the use of additional mechanisms to protect
Page 31 (85)
WINNER II D4.7.2 v1.0
the UTs at the cell border is unnecessary. Nevertheless, for VoIP even a small improvement in the outage
probability achieved by interference based self-adaptive re-use partitioning or by higher re-use at the cell
border could be important. This improvement might be also beneficial for other real-time services (e.g.
streaming) or if higher loads or UL is considered. On top of this, the use of Proportional Fair scheduler can
further improve performance by exploiting channel fluctuations due to fast fading. Since only PF scheduler
was used in this study, we refer to chapter 5 in [WIN2D471], where different scheduling algorithms were
compared.
5.1 Introduction
In this chapter the attainable bandwidth efficiency of a cellular system is closely tied with the ability of the
system to cope with interference. Due to the dynamic arrivals of data in packet switched networks, as well as
the time-varying characteristics of the mobile radio channel, the optimal assignment of resources that
maximizes the utilization of the available resources changes over time. Several schemes for resource allocation
and scheduling, designed to actively avoid inter-cell interference, are addressed in this chapter.
Provided that a central controller monitors and manages inter-cellular resource assignment, maximum
utilization of the available resources can be achieved. For a wide area (WA) downlink scenario, a dynamic
chunk allocation scheme relying on central control is presented in Section 5.2. The attainable gains are offset
by signalling overhead, and induced latency due to signalling of measurements to/from the central controller.
While a centralized approach ultimately maximizes the utilization of resources, a central controller might not
always be available. A distributed approach to dynamic chunk allocation is described in Section 5.3. This
decentralized approach relies on channel reservation using the busy signal concept, by exploiting channel
reciprocity in the TDD mode. For performance evaluation simulations are conducted for the metropolitan area
(MA) with a regular grid of buildings, as well as a local area (LA) peer-to-peer network.
Means to optimize the scheduling of resources for a cellular system are investigated in Sections 5.4 and 5.5.
These scheduling algorithms target the fairness problem that is intrinsically coupled with opportunistic
scheduling approaches. While some UTs with good links hardly suffer from interference, UTs with less
favourable links, typically located close to the cell border, starve for resources. The cost function based
scheduler in Section 5.4 introduces a cost function that aims to improve fairness by giving cell-edge UTs
priority. An interference aware scheduler that takes service dependent QoS requirements of users into account
is evaluated in Section 5.5. The score based scheduler, specified for the WINNER baseline design,
[WIN2D6137], is used as a benchmark of the attainable performance gains. Performance evaluations for WA
frequency adaptive downlinks are provided for both scheduling schemes.
Page 32 (85)
WINNER II D4.7.2 v1.0
The restriction list is determined based on instantaneous channel knowledge and it can be valid as long as the
channel coherence time permits. The scheduler can only use the eligible chunks. Once the chunk restriction list
is available to the sector, it is up to the scheduler to schedule the eligible chunks with its criteria; i.e.,
scheduling is considered to be independent of the dynamic coordination based interference avoidance scheme.
The layout of the network used for the study is shown in Figure 5-1. In simulations, UTs are considered only in
the shaded sectors. Interference is considered from the first and the second tier sectors, of which the first tier
interferers are considered to be dominant (as shown enclosed by the wider circle in the figure with the sector of
interest in the centre). We assume that the UTs have the capability to identify and estimate dominant interferer
channels along with the desired channel. The UTs forward this channel information to the serving sector from
time to time; the rate of this feedback depends on the channel coherence time.
44 43
29 28 45 26 25
47 46 30 8 7 27 41 40
48 11 10 9 5 4 42
32 31 12 2 1 6 23 22
33 14 13 3 20 19 24
50 49 15 17 16 21 56 55
51 35 34 18 38 37 57
36 53 52 39
54
The algorithm at the sector is an utility maximization problem, where utility Uk,n is the utility of allocating
chunk k to UT n. This utility measure takes the status of desired channel, dominant interferer channels, and the
demand of resources for a UT into account. Also, in order for this algorithm not to be greedy (i.e. to maintain
fairness among neighbouring sectors), utility of a chunk decreases as the number of surrounding sectors to be
restricted increases. The details about this utility and the pseudo codes to prepare utility matrix are given in
Appendix C.1. At the sector, utility matrix Uk,n is solved using Hungarian (Munkres) algorithm, and chunk to
UT mapping is performed in an iterative manner until data rates of all UTs are satisfied or the resource is
exhausted. Note that this mapping is performed in order to prepare a tentative chunk restriction list for the
surrounding cells.
The central controller receives requests from involved sectors and finds an optimal combination of sectors that
can use a chunk concurrently. For a particular chunk, Figure 5-2 shows an example problem to be solved at the
central controller using its algorithm. In this figure, the green and red arrows indicate that interference received
at the arrow originating sector from the arrowhead sector is acceptable and unacceptable, respectively. For
example, for a chunk of interest, sector B can tolerate interference from sector A, but the opposite is not true as
there is a red arrow from sector A towards sector B. In this case, either sector A or B has to be restricted for
this chunk. Based on the utility of the chunk at each sector, the central controller finds the set of sectors that
can tolerate mutual interference and yet achieve maximum aggregate utility.
B C
Page 33 (85)
WINNER II D4.7.2 v1.0
Page 34 (85)
WINNER II D4.7.2 v1.0
1
5
Throughput (Mbps)
4
0.6
3.5
0.4
3
No Coordination (Fitted)
0.2 2.5 No Coordination (Scatter)
Coordination Coordination (Fitted)
No Coordination 2 Coordination (Scatter)
0
-5 0 5 10 15 20 25 30 35 100 200 300 400 500 600
SINR on Scheduled Chunks (dB) UT Distance (meters)
Figure 5-3: CDF of chunk SINR on scheduled Figure 5-4: Scatter plot of UT data rates (S = 0.5)
chunks (S = 0.5)
1
5
Probability (SINR <= Abscissa)
0.8 4.5
Throughput (Mbps)
4
0.6
3.5
0.4
3
No Coordination (Fitted)
0.2 2.5 No Coordination (Scatter)
Coordination Coordination (Fitted)
No Coordination 2 Coordination (Scatter)
0
-5 0 5 10 15 20 25 30 35 100 200 300 400 500 600
SINR on Scheduled Chunks (dB) UT Distance (meters)
Figure 5-5: CDF of chunk SINR on scheduled Figure 5-6 :Scatter plot of UT data rates (S=0.25)
chunks (S=0.25)
5.3.1 Description
The efficiency of dynamic channel allocation (DCA) algorithms is inevitably tied with their capability to deal
with the hidden and exposed node problems. One means to provide the transmitter with the relevant
information about the interference at the receiver has been identified by the busy-signal approach [HD02],
[OH04], [OHA07]. By letting receivers transmit either an out of band busy-tone [HD02] or an in-band busy-
signal in an associated mini-slot [OH04], [OHA07], two important goals are accomplished. First, the own
transmitter is informed about the level of interference at the receiver. Second, at the same time other nodes
intending to establish a transmission are notified about ongoing transmissions, so that these nodes can take
appropriate steps to avoid interference. Therefore, both channel sensing and reservation are accomplished, and
the hidden and exposed node problems are effectively mitigated. Since there is no central controller which
coordinates the individual links, network operation in a decentralized, self organized manner is maintained.
Page 35 (85)
WINNER II D4.7.2 v1.0
Moreover, a method for interference management is established so that time-frequency slots (chunks) can be
dynamically assigned on a short-term basis. The protocol works in a completely decentralized fashion and can
therefore be applied to self-organizing networks which may consist of cellular as well as ad hoc network
topologies.
The attainable improvements of DCA are offset by the required additional signalling overhead, typically about
10% of the available bandwidth. On the other hand, instead of simply dismissing the busy-tone as overhead, an
alternative interpretation is to view the busy-tone as a feedback link from the receiver to the transmitter. With
the current development on highly adaptive communication systems that achieve a spectral efficiency close to
Shannon’s channel capacity, the provision of a reliable feedback link with low latency is becoming
increasingly important. To this end, various types of feedback information may be “piggy packed” on the busy-
tone. Examples for feedback information are: a retransmission protocol such as hybrid ARQ, or link adaptation
in the way that the receiver requests a change in the chosen transmission format.
Figure 5-7: MAC frame structure including in-band minislots for busy-tone signalling and low-rate
feedback
The MAC frame structure of the busy tone concept proposed in [HNO06] is depicted in Figure 5-7. Associated
to each chunk carrying data are so-called busy-slots dedicated to interference management and for low rate
feedback. So, any chunk scheduled for a certain UT has a busy-slot reserved for the feedback link from the
receiver to the transmitter. A busy-slot always occupies the same number of subcarriers as the corresponding
data chunk, but spans typically only over one OFDM symbol in time. The integration of BT-OFDMA to the
WINNER system concept, including the support of UL-DL channel asymmetries, is thoroughly described in
Appendix C.2.
5.3.1.1 Properties of the Busy-Tone Concept
The properties of the proposed busy-tone OFDMA (BT-OFDMA) are summarized as follows (More detailed
description is provided in Appendix C.2.2):
N Self-organised and decentralised interference management for arbitrary network topologies.
A mechanism for interference awareness and link protection is established (Æ C.2.2.1)
N Support of TDD uplink-downlink asymmetry ratios (Æ C.2.2.2)
N Network synchronization is required (Æ C.2.2.3)
N Complement not replacement of existing intra-cell scheduling policies (Æ C.2.2.4)
N Inherent “interference free” low-rate feedback mechanism to support link adaptation (Æ
C.2.2.5)
N Key enabler for cognitive radio networks (Æ C.2.2.6)
N Efficient support of various MIMO and SDMA approaches (Æ C.2.2.7)
Page 36 (85)
WINNER II D4.7.2 v1.0
interference avoidance and link adaptation concept with low overhead. The BT-OFDMA can be
flexibly combined with multi-user MIMO, and it supports downlink-uplink channel asymmetries.
N Measurements: No dedicated measurements are needed. Rather the feedback link may be viewed as a
source to provide measurements on the intended as well as interfering links.
N Requirements: Inter-cellular time synchronization is required. As mentioned above, the adjustments of
frame structure of the WINNER system are required.
5.3.3 Complexity
The busy tone concept is of low complexity. Essentially, only the power of a time-multiplexed feedback
channel needs to be measured and compared to a fixed threshold
5.3.4 Scenarios and Simulation Assumptions
Decentralized chunk assignment is applicable to local and metropolitan area (LA and MA) scenarios, i.e.
scenarios utilizing the WINNER TDD mode. Extension to wide area (WA) with WINNER FDD mode is
feasible by taking the average of the chunks assignment equations (C.4) and (C.10) over frequency.
For the performance evaluation the MA urban micro-cell environment with two-dimensional regular grid of
buildings, known as Manhattan grid [WIN2D6137], [WIN2D111] was implemented (see Section C.2.3).
Transmitters (Tx) and receivers (Rx) located along the same street are modelled by a line of sight (LoS)
channel, while other links are modelled as non-line of sight (NLoS) channels. According the specifications in
[WIN2D111], channel model B1 LOS and B1 NLOS are used to simulate LoS and NLoS channels,
respectively. Only outdoor UTs served by outdoor BSs are considered.
Moreover, to demonstrate the flexibly support of arbitrary network topologies, a local area environment where
mobiles form a peer-to-peer network is also tested in Appendix C.2.4.
The cdf of the SINR distribution of scheduled chunks is shown in Figure 5-8. BT_OFDMA is plotted for
uplink (UL) as well as downlink (DL) with Ithre = -90dBm, and is compared with a fixed allocation scheme
without any interference protection. A significant improvement in SINR through application of the busy tone
concept is observed. For low SINR the improvement exceeds 10dB.
Figure 5-8: CDF of SINR distribution for BT-OFDMA. A fixed channel allocation scheme is drawn as a
benchmark.
Page 37 (85)
WINNER II D4.7.2 v1.0
More simulation for Manhattan Grid as well as a local area peer-to-peer network can be found in Appendices
C.2.3 and C.2.4.
5.3.6 Recommendations
Significant gains in the CDF of the SINR and throughput are observed for MA deployment scenario with a
Manhattan Grid channel model. The attainable gains in terms of throughput however very much depend on the
scheduling algorithm being used. For the simulation results a simple score based scheduler was used, adaptive
modulation has not been implemented.
Generally, the efficiency of the proposed interference avoidance concept very much depends on the considered
deployment scenario. The Manhattan Grid channel model with its regular structure only a fraction of UTs are
exposed to strong inter-cell interference. The situation is to become worse when also indoor UTs served by
outdoor BSs are also taken into account. As for indoor UTs no favourable LoS channel exists, interference
might more difficult to manage, suggesting that advanced interference avoidance scheme could help to
significantly improve the spectral efficiency of the WINNER system.
The potential of BT-OFDMA is highlighted in an uncoordinated local area peer-to-peer network. Here a
threefold increase in throughput is achieved with respect to random slot allocation.
5.4.1 Description
Inter-cell interference mitigation by means of a cost function (CF) based scheduler is investigated in this
section. The allocation of UTs to resources is done by the scheduler that takes into consideration QoS of the
service, channel quality of the UTs (interference, path-loss) and data rate achieved by the UTs so far. This
scheduler evaluates a cost function for all eligible combinations of users and resources. The combinations
leading to a minimum cost function value are scheduled for transmission. In our investigations, we have
considered a cost function of the form
CF (u, ru ) W R R(u ) W I I (u, ru ) W L L (u, ru ) C , (1)
where W R , W I , W L and C are real-valued weights, u denotes the user and ru denotes the resource unit.
Further, R (u ) stands for the data rate achieved by the user u . The terms I (u , ru ) and L (u , ru ) represent
the interference and loss (geometrical path-loss, shadowing and fast-fading) measured by the user u on the
resource unit ru . The values of R (u ), I (u , ru ) and L (u , ru ) are normalized and
R(u ), I (u, ru ), L(u, ru ) 0,1 . Clearly, by changing the values of the weights WR ,WI ,WL and C , the
resource distribution and thus the inter-cell interference experienced by the UTs varies.
In order to obtain an optimal performance of scheduling even for different loads, it is necessary to
automatically adapt the values of WL , WI , W R and C . We present here a solution based on the LMS
algorithm that is widely used in signal processing, neural networks and machine learning. The actually
encountered network utility (Utilityn) is considered and the weights are updated according to the following
equation
CF
W (n 1) W (n) OUtility n ,
W
where O is a parameter ( 0 @ O @ 1 ) and Utilityn is the difference between the desired utility and the
actually encountered utility i.e. the number of the satisfied users and average data rate. A simple adaptation of
weights can be achieved by keeping weights W L W I 1 and C 0 fixed and changing the weight W R
according to
WR (n 1) WR (n) O PSU min PSU WR , O 0,1 (2)
where PSUmin is the minimum required percentage of satisfied users (90% in our case), PSU refers to the actual
percentage of satisfied users averaged over certain time period and O is a parameter controlling the speed of
parameter change. From equation (2) it can be seen that when PSU is above PSUmin the weight W R is
decreased. Consequently, the impact of the data rate on the cost function value obtained by (1) is lowered.. It
means that UTs with a higher channel gain (lower loss and interference) are scheduled more frequently, which
Page 38 (85)
WINNER II D4.7.2 v1.0
increases the throughput in the system. When PSU is lower than PSUmin the weight WR increases. Therefore,
the probability that a user will be scheduled increases with the decreasing average data rate of the given user.
This increases the fairness in the system, represented by the PSU, but also reduces overall throughput.
5.4.4 Scenarios
In the specified multi-cell environment, we use central-cell technique to account for the impact of surrounding
cells and inter-cell interference. All links are accurately modelled; however, the results are collected only from
three innermost cells. The system parameters are based on [WIN2D6137] for the base coverage urban scenario.
To reduce the overall simulation complexity, we reduce the total number of chunks specified in [WIN2D6133]
to 1/3. Therefore, in total 48 RUs are simulated.
Link adaptation is used to choose an appropriate modulation and coding scheme (MCS) from 10 different MCS
levels specified in Table 3-6 of [WIN2D6137]. We consider four different modulation schemes (BPSK, QPSK,
16-QAM and 64-QAM) and 3 possible code rates (1/2, 2/3 and 3/4) of block LDPC codes.
We consider perfect time and frequency synchronization at system level, and thus any inter-symbol or inter-
carrier interference is neglected.
We summarize specific simulation parameters in Table 5-1:
Channel model C2
UT velocity 3 km/h
Multiple access OFDMA
Central cell Yes
Interference modelling All links modelled
Transmission mode frequency adaptive transmission
Traffic model Realistic FTP model
Scheduler Proportional Fair, Best CQI,
Adaptive CF based
Measurements and Signalling Ideal channel information
Retransmission / HARQ Yes
BS Antenna 4 elements Grid of Beams
MS Antenna 2 RX antennas, MRC
Page 39 (85)
WINNER II D4.7.2 v1.0
5.4.5 Simulations
In Figure 5-9 and Table 5-2 we depicted end-to-end (E2E) user throughput for three scheduling algorithms:
best CQI, proportional fair and adaptive CF based. As can be seen, unlike best CQI scheduler the adaptive CF
based scheduler is able to keep the percentage of unsatisfied users (users having data rate below 300 kbps)
below the required threshold (10 %). At the same time the adaptive scheduler achieves higher throughput than
the proportional fair scheduler (although slightly higher probability of achieving very low data rates).
Table 5-2: E2E throughput and percentage of unsatisfied users for different schedulers
The adaptive CF based scheduler combines the advantages of two scheduling algorithms: “fairness” provided
by proportional fair and “throughput optimization” provided by best CQI.
5.4.6 Recommendations
Scheduler algorithms make a trade-off between fairness and maximizing total system throughput. Fairness is
improved by increasing the weight of UT’s data rate in the cost function. On the other hand, throughput is
improved by increasing the weight of UT’s channel quality. For lower loads almost all UTs could achieve their
minimum data rates, so higher channel quality should be emphasized in scheduling decisions.. For higher loads
however, the achieved data rate should be emphasized, in order to ensure at least the minimum number of
satisfied users. Trade-off between maximizing data rate and providing minimum data rate with high probability
depends also on service type i.e. QoS requirements. That is why the optimal scheduling setting should be
chosen according to load and QoS requirements. We provided above a cost function based scheduler algorithm
with self-adaptive weight setting. By using the proposed algorithm parameters are adapted automatically to
reflect the time varying nature of load conditions.
Page 40 (85)
WINNER II D4.7.2 v1.0
5.5.5 Results
The following results show a comparison between TBFQ algorithm and the Score Based (SB) algorithm with
window sizes of 100 and 1000. Since the interference model being shown here is obtained by the brute force
method, therefore different levels of interference form the first tier are shown defined by different activity
factors (AF). An AF is defined as the percentage of active interferers. AF of 1 denotes a high level of
interference where all the links are being interfered at (100% interference). Figure 5-10 compares the CDF of
the scheduled SINR for TBFQ and SB for 20 UTs at an AF of 0.7. Since maximum SINR method is used to
assign chunks to the selected UTs, therefore in the early part of the scheduling interval, best chunks are
allocated to the scheduled UTs. That’s why a higher SINR is seen beyond the 60th percentile for TBFQ as
compared to SB. As more chunks are scheduled, we see a decrease in the SINR.
Page 41 (85)
WINNER II D4.7.2 v1.0
Figure 5-10: CDF of SINR on scheduled Chunks Figure 5-11: Sector Throughput
Figure 5-12: CDF of average user throughput (Bytes Figure 5-13: CDF of average user throughput
per frame) for low loading (Bytes per frame) for high loading
We see the sector throughput with an AF of 0.7 in Figure 5-11. TBFQ performs better at lower-medium
loading levels. But as the number of UTs approaches 20, SB with a window size of 1000 achieves higher
throughput. This is because SB is opportunistic in nature whereas TBFQ tries to maintain fairness. As the
number of UTs increase, SB takes advantage of the multi-user diversity to achieve higher throughput. Figure
5-12 and Figure 5-13 shows the CDF of average user throughput (bytes per frame) for 8 and 20 UTs
respectively. TBFQ performs better for the lower loading case whereas SB achieves higher throughput at
higher loading.
The CDF of the queuing delay is shown in Figure 5-14 and Figure 5-15 for 8 and 20 UTs respectively. As the
traffic type considered for this study is video, therefore packets are dropped if they face a queuing delay of
more than 0.19 seconds. Therefore the queuing delay does not exceed beyond 0.19 sec. TBFQ has a better
delay performance than SB at both lower and higher loading.
Figure 5-16 shows the packet transmit ratio (defined as the packets transmitted/total packets) vs. distance from
BS for 20 UTs. It can be observed that as the distance increases, the packet transmit ratio for SB decreases i.e.
the number of dropped packets increases. This can be further visualized by the fitted curves for both algorithms
which show their respective trends with the varying distance. As SB tries to maximize the throughput, the cell
edge UTs are affected and suffer packet losses. TBFQ on the other hand is fair in nature and tries to also look
after the cell edge UTs. If a cell edge UT is suffering from bad channel conditions, TBFQ gives it priority to
transmit in the next scheduling interval. By assigning priorities in such a manner, TBFQ also keeps track of the
queue levels and tries to maintain constant queuing delay for the cell edge UTs as shown in Figure 5-17. The
same cannot be said for SB as the average UT queuing delay increases exponentially with the distance. The
odd discrepancies in the scatter plots could be explained due to shadowing.
Page 42 (85)
WINNER II D4.7.2 v1.0
Further results shown in Appendix C.3.4 demonstrate the average queuing delay and the average packets
dropped plotted against varying number of UTs and activity factors.
Figure 5-14: CDF of average user queuing delay for Figure 5-15: CDF of average user queuing delay for
low (left) and high loading (right) low (left) and high loading (right)
1 0.1
SB(1000)
0.09
0.9
TBFQ
0.08 Fitted curve TBFQ
Ratio Packets Transmitted
Fitted Curve SB
0.8 0.07
Delay (sec)
0.06
0.7
0.05
0.6
0.04
0.5 0.03
SB(1000)
0.02
TBFQ
0.4
Fitted Curve SB 0.01
Fitted Curve TBFQ
0
100 200 300 400 500 600 700 100 200 300 400 500 600 700
Distance From BS (m) Distance From BS (m)
Figure 5-16: Ratio of packets transmitted vs. distance Figure 5-17: Average user queuing delay vs.
from BS for 20 UTs case distance from BS for 20 UTs case
5.5.6 Recommendations
The Score Based (SB) scheduler is an opportunistic scheduler belonging to the proportional fair class. It tries to
maximize throughput making use of multi-user diversity while trying to maintain fairness. But this comes at a
certain cost as in this scheme the cell edge UTs suffering from bad channel conditions are more severely
affected. Also due to the bursty nature of traffic such UTs face higher queuing delays which results in higher
packet drops. Compared to SB, TBFQ is a credit based scheme which tries to accommodate the burstiness of
traffic for those UTs by assigning them more resources in the short term provided that long term fairness is
maintained. For lower to medium loading, TBFQ performs better than SB in terms of throughput, queuing
delay and packet dropping. At high loading TBFQ still performs better than SB with regards to the queuing
delay and packet dropping while the throughput is comparable.
Page 43 (85)
WINNER II D4.7.2 v1.0
The resource management and partitioning techniques have been evaluated for the WINNER II Base Coverage
Urban scenario.
The investigations conducted on the static schemes for resource management based on transmit power
restriction showed that the Fractional Frequency Re-use with Full power Isolation (FFR FI) allows significant
throughput improvements at the cell border but at the expense of non-negligible sector throughput degradation.
It is therefore recommended to use this scheme for data transmission when the network load remains in a low
to medium range, where such degradation can be afforded, in order to enhance the user experience at the cell-
edge. Nevertheless, FFR FI may be used for control channels, in particular the BCH which is transmitted in the
preamble of the super-frame, while retaining the full set of resources available for data transmission. However,
this approach sets requirements on the network time-synchronisation, since the super-frame transmission then
needs to be time-aligned across neighbouring cells. In addition, the FFR FI scheme appears an efficient
solution when powerful beamforming techniques such as the Grid of Beams can not be used.
It should also be mentioned that a tight interplay exists between the scheduler and the transmit power
restriction schemes themselves. A first attempt to define scheduling policies prioritizing the cell-edge UTs into
the sub-bands with lower interference levels has shown the interest of this approach. Further studies should
consequently investigate this interplay deeper in order to reveal the full potential of this kind of resource
management techniques. Moreover, the impact of non Full Buffer traffic models on their performance should
be further addressed as well. In particular, preliminary results on the IFC scheme with cell specific power
reduction have shown significant gains when used with a type of scheduler more suitable for real time data
traffic than the Score Based Proportional Fair.
Concerning resource partitioning, a technique based on Flexible re-use has been proposed in order to allow the
resource re-use to be adjusted dynamically in a hybrid combination with other interference mitigation
techniques. Depending on the network load and local interference environment, the Flexible re-use Partitioning
can configure the resource partitioning from pure re-use 1 to fractional re-use values. This procedure is applied
without any coordination in a first step, then with decentralized coordination among the neighbouring BSs.
Centralized coordination can then be used at the last resort in order to enforce partitioning decisions if
decentralized mechanisms have failed. Note that this last option requires a centralized entity in the network,
while the coordination itself requires BS to BS communications.
For the selected self-adaptive re-use partitioning technique the evaluations have shown that either the
interference-based variant with re-use 1 (ISARP) or the variant with re-use 3 at the cell border (R3SARP) can
be recommended for the cases which need additional gain e.g. for the VoIP service. This would also hold for
other real-time services (e.g. streaming) or when the load increases in the network. This technique works in
a decentralized manner and therefore does not require any additional inter-BS coordination.
The WINNER II Base Coverage Urban scenario has been investigated as well for most of the selected
resource allocation and scheduling techniques; the corresponding outcome is summarized here:
Given its inherent algorithm complexity the use of the dynamic chunk allocation scheme based on inter-cell
coordination should be reserved to the cell/sector edge UTs only. The additional requirements on the System
Architecture for a central controller have also to be taken into account here.
Furthermore a cost based scheduler algorithm with self-adaptive weight settings is recommended in order to
maximize the total system throughput and keep at the same time the percentage of unsatisfied users below the
predefined limit. The scheduler optimizes itself for different loads and service types by self-adaptive parameter
settings.
Additionally the Token Bank Fair Queuing (TBFQ) scheduler can represent an alternative to the Score Based
scheduler: for lower to medium load the sector throughput, queuing delay and packet dropping are improved;
for high load queuing delay and packet dropping are still improved whereas the sector throughput remains
comparable. However, the TBFQ degrades the cell-edge throughput for low loads compared to the Score Based
Page 44 (85)
WINNER II D4.7.2 v1.0
scheduler; therefore, it should be assessed whether the benefits brought by the TBFQ algorithm are worth this
cell-edge throughput degradation for low loads.
The WINNER II Metropolitan Area scenario has been addressed in the TDD mode for the decentralized
dynamic Channel Allocation based on the ‘busy signal’ concept. The scheme utilizes the channel reciprocity of
the WINNER TDD mode and establishes a decentralized resource reservation protocol that effectively
mitigates excessive inter-cell interference. The performance has been assessed for MA Manhattan Grid
deployment scenario and for a LA self-organized peer-to-peer network. Another important application is
dynamic spectrum sharing. In general the scheme is applicable to a distributed system architecture without
a centralized controller and without sophisticated network planning.
Consequently the investigations conducted for the resource management and partitioning techniques in the
Base Coverage Urban scenario for wide area show that for user data transmission (especially non-real time
data) frequency re-use 1 provides maximal network capacity under a given outage probability. On the other
side, for more sensitive data like signalization or high priority real-time data or in the case of network
congestion, frequency re-use values greater than one may be employed at least at the cell border in order to
ensure some guaranteed signal quality for all UTs.
Furthermore the assessment of the selected resource allocation and scheduling algorithms show that there is no
“optimal algorithm” for all cases. Parameterized scheduling algorithms are therefore recommended here which
are able to adapt their parameters to different loads, interference and QoS requirements
For the TDD mode used in the Metropolitan area scenario as well as in Local Area ones resource allocation can
be achieved by the generation of ‘busy signals’ on the desired spectrum by BS or UT. This is especially useful
in distributed architectures without a centralized controller.
Inter-cell interference avoidance techniques can be advantageously combined with other mitigation schemes:
Interference Rejection Combining (IRC) at UT side [WIN2D473] can still bring performance improvements on
both cell edge and sector throughput when used in addition to the FFR FI technique. It is also expected that the
combination of FFR schemes with the inter-cell interference cancellation techniques studied in [WIN2D471]
will exhibit a similar behaviour, although performance results are not available for the combination of these
schemes.
Furthermore, the interference coordination schemes in general should be used in cases where the fixed Grid of
Beams [WIN2D473] cannot be employed, e.g. for common channels, due to the degradation caused by the
interference coordination schemes on the performance of the fixed Grid of Beams when combined together.
The recommendations given in this chapter have to be seen together with the ones indicated for interference
averaging [WIN2D471] and for interference mitigation with smart antennas [WIN2D473] in order to complete
the picture for the whole WINNER System.
Page 45 (85)
WINNER II D4.7.2 v1.0
8. References
[Bla01] P. M. Blair, G. C. Polyzos, M. Zorzi, “Plane Cover Multiple Access: A New Approach to
Maximizing Cellular System Capacity,” IEEE JSAC, VOL. 19, NO. 11, pp. 2131-2141, Nov.
2001
[BrAs05] K. Brueninghaus, D. Astely, et. al. 'Link Performance Models for System Level Simulations of
Broadband Radio Access Systems,' IEEE Proc. of PIMRC, September 2005
[Hal83] S. W. Halpern, “Reuse partitioning in cellular systems,” IEEE Trans. Vehic. Technol., pp. 322–
327, 1983
[HD02] Z. J. Haas and J. Deng, “Dual Busy Tone Multiple Access (DBTMA) - A Multiple Access
Control Scheme for Ad Hoc Networks,” IEEE Transactions on Communications, vol. 50, no. 6,
pp. 975–985, June 2002.
[HNO06] H. Haas, V. D. Nguyen, P. Omiyi, N. H. Nedev, and G. Auer, “Interference Aware Medium
Access in Cellular OFDMA/TDD Network,” in Proc. IEEE Int. Conference on
Communications (ICC 2006),.Istanbul, Turkey, June 2006.
[OH04] P. Omiyi and H. Haas, “Improving Time-Slot Allocation in 4th Generation OFDM/TDMA
TDD Radio Access Networks With Innovative Channel-Sensing,” in Proc. IEEE IEEE Int.
Conference on Communications (ICC 2004), Paris, France, June 2004, pp. 3133–3137.
[OHA07] P. Omiyi, H. Haas, and G. Auer, “Analysis of TDD Cellular Interference Mitigation using
Busy-Bursts,” in IEEE Transactions Wireless Communications, July 2007.
[R1050272] OFDM air interface with QoS at cell edge, Alcatel, 3GPP TSG RAN WG1 #40bis, Beijing,
China, April 2005
[R1050841] 3GPP R1-050841, “Further Analysis of Soft Frequency Reuse Scheme”, Huawei, RAN1#42,
September 2005.
[R1060864] Overview of Resource Management techniques for Interference Mitigation in EUTRA, Texas
Instruments, 3GPP TSG RAN WG1 #44bis, Athens, Greece, March 2006
[R1062365] Comparison of efficiency of DL Interference Coordination schemes and view on measurements
on intra-frequency neighbour cells, Alcatel, 3GPP TSG RAN WG1 #46, Tallinn, Estonia,
September 2006
[TAB06] A. Tyrrell, G. Auer and C. Bettstetter, “Fireflies as Role Models for Synchronization in Ad
Hoc Networks”, in Proc. Int. Conf. Bio-Insp. Models of Network, Info. and Comp. Sys.
(BIONETICS 2006), Cavalese, Italy, Dec. 2006.
[WIN1D35] IST-2003-507581 WINNER I deliverable D3.5 “Proposal of the best Suited Deployment
Concepts for the identified Scenarios and related RAN Protocols”, December 2005.
[WIN1D63] IST-2003-507581 WINNER I deliverable D6.3 “WINNER Spectrum Aspects: Assessment
report”, December 2005.
[WIN2D111] IST-4-027756 WINNER II deliverable D1.1.1 “WINNER II interim channel models”,
February 2007
[WIN2D341] IST-4-027756 WINNER II deliverable D3.4.1 “The WINNER II Air Interface: Refined
Spatial-Temporal Processing Solutions”, November 2006
[WIN2D352] IST-4-027756 WINNER II deliverable D3.5.2 “Assessment of relay based deployment
concepts”, June 2007
[WIN2D471] IST-4-027756 WINNER II deliverable D4.7.1 “Interference averaging concepts”, June 2007
[WIN2D473] IST-4-027756 WINNER II deliverable D4.7.3 “Smart antenna based interference mitigation”,
June 2007
[WIN2D482] IST-4-027756 WINNER II deliverable D4.8.2 “Cooperation schemes validation”, June 2007
[WIN2D6111] IST-4-027756 WINNER II deliverable D6.11.1 “Refined WINNER II System Requirements”,
June 2007
[WIN2D6131] IST-4-027756 WINNER II deliverable D6.13.1 “WINNER II Test Scenarios and Calibration
Cases Issue 1”, June 2006
Page 46 (85)
WINNER II D4.7.2 v1.0
[WIN2D6133] IST-4-027756 WINNER II deliverable D6.13.3 “Intermediate concept proposal (“wide area”)
and evaluation”, November 2006
[WIN2D6134] IST-4-027756 WINNER II deliverable D6.13.4 “Intermediate concept proposal (“metropolitan
area”) and evaluation”, November 2006
[WIN2D6137] IST-4-027756 WINNER II deliverable D6.13.7 “WINNER II Test scenarios and calibration
cases Issue 2”, December.2006
[WIN2D6138] IST-4-027756 WINNER II deliverable D6.13.8 “Intermediate WINNER II System Concept”,
November 2006
[ZK01] J. Zander, S-L. Kim et al. “Radio resource Management for Wireless Networks”, Artech
House, 2001
[802.20EC] IEEE 802.20: Evaluation Criteria, Version 15, 30.03.2005, Eval_Criteria_ver15r1-track-
changes.doc
Page 47 (85)
WINNER II D4.7.2 v1.0
A.1 Introduction
When analyzing or assessing the performance of a radio network it is typically not sufficient to study the
performance of a single radio link. Instead, one would like to assess the overall network performance,
accounting for that several pairs of communicating nodes must share a common radio resource. For instance, in
a cellular network it must be considered that the resources in a cell are shared among all UTs associated with
the cell and it is further of great importance to account for interference from neighbouring cells. Multi-cell
evaluations of cellular networks are often performed by computer simulations, here referred to as system-level
simulations.
System-level simulations include, among others, deployment models, UT behaviour models, and channel
models. They further comprise models of the network functionality and the radio network algorithms. The
deployment models consider e.g. the base station density, the base station equipment, and the base station
antenna positions (below or above roof-tops etc.). UT behaviour models include models for the UT position,
the UT mobility, and the traffic generated by the UT (in uplink and downlink). Channel models model the
radio channel of desired and interfering links.
Furthermore, in a system level simulation it is typically so that there is no explicit modelling of physical layer
procedures such as modulation and coding. Instead, less complex link performance models are used to estimate
the performance of single links. Such a link performance model is often referred to as a link-to-system
interface. The link-to-system interface needs as input a measure of the radio link quality and delivers as output
an estimate of the packet error probability. Often, the SINR is used as a measure of the radio link quality,
which means that system level simulations must include the calculation of the received SINR. Here we can
distinguish between actual value interfaces, where the SINR depends on the fast fading realizations of the
channel [BrAs05], and average value interfaces, where channel quality metrics are an average of the
instantaneous SINRs over the fast fading.
The next chapter in this Appendix describes different methods and models that may be used in multi-cell
system level simulations. Two different options to set-up a multi-cell system simulation that accounts for
interference from neighbouring cells are discussed.
Compared to a multi-cell simulation where UTs are generated in multiple cells, e.g. using the wrap-around
technique (see next section A.2.2), the central cell technique allows considerable savings in memory
resources, as only a reduced number of links needs to be monitored and managed at the same time. From the
simulation duration perspective, however, the central-cell technique may be equivalent to a multi-cell
simulation using the wrap-around technique since more snapshots of UT locations are needed to collect the
Page 48 (85)
WINNER II D4.7.2 v1.0
same number of statistics on UTs within the central cell, compared to collecting data from UTs studied
simultaneously within a larger number of cells.
The central cell technique is particularly suited to the downlink, as it avoids the explicit simulation of the UTs
in the neighbouring cells. Indeed, the interference situation can here be generated accurately by simulating the
transmitted signal from the neighbouring base stations only. In the uplink, however, where the interference is
created by the signals transmitted from the UTs in neighbouring cells, an accurate modelling of their positions,
transmit powers and channels towards the base station of interest cannot be avoided in most cases. Hence the
savings in simulator complexity may be much lower in the uplink case, which may decrease the interest of this
method with respect to a full multi-cell simulation using the wrap-around technique.
In practice, wrap-around may be implemented by creating six copies of the studied network deployment and
placing these copies around the original network, see e.g. [802.20EC] or Figure A-1 below which shows an
example of the wrap-around technique in which a hexagonal cell layout comprising 19 base stations with 120
degrees cell sectors is considered. In this example, each base station is located at the centre of one hexagon
with one transceiver per sector. In an inter-cell interference scenario each transceiver is considered as an
interferer to other victims. There is a one-to-one mapping between cells/sectors of the centre network and
cells/sectors of each copy, so that every cell in the extended network is identified with one of the cells in the
central (original) hexagonal network. Those corresponding cells have thus the same antenna configuration,
traffic, fading etc., as illustrated in Figure A-1 below. Hence, every base station in the original network has one
and only one corresponding base station in each of the copies and the channel between a UT and a base station
may now be determined by calculating the channel between the UT of interest and all seven base stations – the
base station in the original cell layout and one base station in each of the six copies. Among the seven
calculated channels, the one with the lowest attenuation is selected for further use. Typically, the selection is
performed based on long-term channel information including distance attenuation, shadow fading, and antenna
gains. Short-term channel variations caused by multi-path propagation and fast fading may later be added to
get a full representation of the frequency-selective channel.
D
J
11
D D E D
11 12 10
J J J
D E D D E D E D
J
12 J
10 J
13 J
3 J
9
D E D E D E D E D E
13 3 9 4 2
J J J J J
E D E D E D E D E D
4 2 14 1 8
J J J J J
D E D E D E D E D E
J
14 J
1 J
8 5 J
7
J
E D E D E D - D E D
5 7 15 6 19
J J J J J
D - D E D E D E D E D
J
15 J
6 J
19 J
16 J
18 11
J
E D E D E D E D E D E D
16 18 11 17 12 10
J J J J J J
D E D E D E D E D E D E D
11 17 12 10 13 3 9
J J J J J J J
D E D E D E D E D E D E D E
12 10 J
13 J
3 J
9 J
4 J
2
J J
D E D E D E D E D E D E D E D
13 3 9 4 2 14 1 8
J J J J J J J J
E D E D E D E D E D E D E D E
4 2 14 1 8 5 7
J J J J J J J
D E D E D E D E D E D - D E D
14 1 8 J
5 J
7 J
15 J
6 J
19
J J J
E D E D E D - D E D E D E D E
5 7 15 6 19 16 18
J J J J J J J
D - D E D E D E D E D E D E
15 6 19 16 18 11 17
J J J J J J J
E D E D E D E D E D E D E
16 18 J
11 J
17 J
12 J
10
J J
E D E D E D E D E D E D
17 12 10 13 3 9
J J J J J J
E D E D E D E D E D E
13 3 9 4 2
J J J J J
E D E D E D E D E D
J
4 J
2 J
14 J
1 J
8
D E D E D E D E D E
14 1 8 5 7
J J J J J
E D E D E D - D E D
J
5 J
7 J
15 J
6 J
19
D - D E D E D E D E
15 6 19 16 18
J J J J J
E D E D E E D E
16 18 17
J J J
E D E E
J
17
E
Page 49 (85)
WINNER II D4.7.2 v1.0
Note that Figure A-1 shows transceivers equipped with sector antennas but they may also be equipped with
beamforming antennas.
The wrap-around technique is suitable both for downlink and uplink simulations. An advantage compared to
the central-cell technique is that simulation data can be collected from all cells, which may reduce the required
simulation time to collect sufficient statistics.
Page 50 (85)
WINNER II D4.7.2 v1.0
2 6
3 7
7 4
4 1 5
5 2 6
2 6 3
3 7
4 1
1 5
Figure B-1: IFC scheme with frequency re-use 7/6 for the power reduced frequency subsets
Page 51 (85)
WINNER II D4.7.2 v1.0
Table B-2: comparison of IFC 7/6, 3/2 and 3/1 with the case of frequency re-use 1
The results obtained for the IFC scheme using re-use values of 7/6 and 3/2 compared with the situation given
without IFC (re-use value of 1) are shown in Figure B-2 below first for UT velocity 3 km/h:
UT velocity 3 km/h
0.50
5% CDF av user TP (b/s/Hz)
0.45
0.40
0.35
0.30
0.25
0.20
0.15 IFC 7/6
0.10 IFC 3/2
0.05 NoIFC
0.00
0.00 0.20 0.40 0.60 0.80 1.00 1.20 1.40 1.60 1.80
av sector TP (b/s/Hz)
The 5% CDF User throughput decreases and the mean sector throughput increases when this minimum
throughput value decreases (from left to right in the figure). The saturation observed on the left side of the
figure corresponds to the lack of additional resources needed to maintain the high targeted minimum
throughput value for the served UTs. For lower values on the right side of the figure the IFC performance
decreases (last measurement points corresponds to a target of 20 kbps) since in those cases less resources are
allocated to cell border UTs.
Page 52 (85)
WINNER II D4.7.2 v1.0
Furthermore the results show that with this IFC scheme a frequency re-use value of 7/ 6 performs better than
value 3/2 (more frequency resources are available in the first case) and that the improvement area compared to
the IFC case is wider for a re-use 7 than a re-use 3.
The measurements points correspond to the parameterization of the scheduler with values for the targeted
minimum throughput per served UT decreasing from 220 kbps to 20 kbps in 20 kbps steps from the left to the
right in the figure. The point where saturation occurs in this case of low UT velocity corresponds for both
frequency re-use values to 160 kb/s for the minimum target throughput.
Table B-3 below gives the corresponding values for the cell edge user throughput as well as the average sector
throughput:
Further investigations have been conducted with UT velocity 30 km/h instead of 3 km/h; the corresponding
results are presented below in Figure B-3 and Table B-4, whereby degradation in overall performance occurs
as expected:
UT velocity 30 km/h
0.30
5% CDF av user TP (b/s/Hz)
0.25
0.20
0.15
0.10
IFC 7/6
0.05 IFC 3/2
NoIFC
0.00
0.00 0.20 0.40 0.60 0.80 1.00 1.20 1.40 1.60
av sector TP (b/s/Hz)
The point where saturation is reached corresponds to 100 kb/s in these measurements for higher UT velocity
which is lower than the previous value (140 kb/s).
Table B-4 below gives the corresponding values for the cell edge user throughput as well as the average sector
throughput:
Table B-4: comparison of the IFC scheme with re-use 1 (30 km/h)
Page 53 (85)
WINNER II D4.7.2 v1.0
4 f
1
f
6 2
Allocation for sectors 2, 4, 6
f
Figure B-4: FFR FI bandwidth allocation with re-use 3 at the cell edge. Note the geographical
representation of the cell-edge bands allocation in the left-hand side figure is symbolic only, since low-
SINR UTs are not necessarily at the cell border.
Sector 1
Sectors 3, 5, 7
Sectors 2, 4, 6
f
Figure B-5: Power allocation of the FFR PI with re-use 3 at the cell edge
Page 54 (85)
WINNER II D4.7.2 v1.0
The scenario considered almost matches the WINNER2 Base coverage urban downlink scenario, whose
parameters are detailed in [WIN2D6137], except the following deviations:
N in the frequency non-adaptive mode, chunk-based resource allocation is used instead of the B-
EFDMA. However, like in the B-EFDMA, the allocated resources are regularly spaced apart within
the whole system bandwidth;
N in the frequency non-adaptive mode, the link adaptation is performed based on the average channel
quality on all the allocated chunks, i.e. there is no chunk-wise modulation adaptation;
N receive diversity at the UT is obtained through a linear antenna array instead of cross-polarized
antennas
N the duo-binary turbo codes are used instead of the LDPC codes;
N variable FEC block sizes (max size in the order of 5100 bits) are used instead of fixed ones, without
modulation adaptation within a FEC block. One retransmission unit contains a single FEC block only.
Channel model C2
Number of sectors 57
Number of UTs per sector 24 in average
Inter-site distance 1000 m
Multi-cell simulation method Central cell
System bandwidth 45 MHz
Interference modelling The channels of the 7 dominant interferers
on a long term basis are modelled accurately
The remaining ones are modelled as single-path SISO channels
All the interfering BSs transmit at full power with full load
BS antenna configuration 1 element
4-element ULA with antenna element separation 0.5λ
BS spatial processing None
GoB with 4 antennas
UT antenna configuration 2-element ULA, antenna element separation 0.5λ
UT spatial processing MRC
IRC
UT velocity 3 km/h in frequency adaptive mode
50 km/h in non-adaptive mode
Modulation and coding schemes 10 MCS
BPSK, QPSK, 16QAM, 64QAM
Duo binary turbo code with rates 1/2 , 2/3, 3/4
Link adaptation simulated with CQI feedback delayed from one frame
Retransmission / HARQ 4 / Chase combining simulated with explicit feedback
of ACK/NACK messages
Multiple access Chunk-wise OFDMA
regularly spaced apart within the whole
system bandwidth in non-adaptive mode
Scheduling Score based (window size: 30) in frequency-adaptive mode
Round Robin in non-adaptive mode
Traffic model Full buffer
Channel and Perfect
interference parameters estimation
Feedback messages transmission Perfect
For GoB simulations, the interfering cells whose contribution to the interference is accurately modelled also
use the GoB, whereas the cells simulated in a simplified manner are assumed to transmit using a single
transmit antenna. The beam allocation in the interfering cells is drawn randomly in a uniform and independent
manner for each chunk, and changes at each time slot.
Page 55 (85)
WINNER II D4.7.2 v1.0
The FFR FI and FFR PI schemes use a frequency re-use factor of 3 for the cell-edge resources. For the FFR FI,
the cell-edge band involves 16 chunks, which due to the frequency re-use 3, leads to 112 chunks available for
use to each sector over the 144 chunks of the total system bandwidth.
For the FFR PI scheme, the cell-edge band represents 1/3 of the cell bandwidth and is allocated 1.5 times more
transmit power than the rest of the band (see Figure B-4).
For the re-use 1 and FFR PI schemes, 9 UTs are scheduled simultaneously in the 45 MHz bandwidth, which
leads to 16 chunks per UT which are not necessarily co-localized. In the FFR FI scheme, only 7 UTs (16
chunks each) are scheduled simultaneously at each time slot due to the reduced available bandwidth.
In the frequency–adaptive mode, the chunks are assigned to the UTs in a turn by turn policy taking into
account their score (from the Score-Based scheduler) and their CQI within each chunk: the first selected UT
(the one with the highest score) is allocated its “best” chunk (i.e. its chunk with the largest CQI), then the
second selected UT is allocated its best chunk among the remaining ones, until all the UTs have been allocated
one chunk. Then the process is repeated (starting from the first selected UT) until all the available chunks have
been allocated.
In the frequency non-adaptive mode, the chunks are allocated irrespectively of the UTs’ score and the chunk’s
CQI, so that the chunks of a particular UT are distributed evenly across the bandwidth.
The prioritisation schemes described in Section 4.2.2 impose restrictions on the chunks available to a given UT
during the chunk assignment step, depending on whether the UT is classified as “cell-edge” or not. The SINR
threshold below which UTs are classified as cell-edge is fixed to 1.5 dB for partial isolation and to 3.5 dB for
full isolation, in order to account for the higher mean SINR (over the whole available bandwidth) in the latter
case.
We invite the reader to refer to Section 4.2.5.2 for comments on the results and for the conclusions of the
study.
Page 56 (85)
WINNER II D4.7.2 v1.0
140 140
1 Tx - 2Rx MRC - reuse 1 1 Tx - 2Rx MRC - reuse 1
1 Tx - 2Rx MRC - FFR FI - no priority 1 Tx - 2Rx MRC - FFR FI - no priority
120 120
Not applicable 1 Tx - 2Rx MRC - FFR FI - priority scheme 1
Average sector througthput (Mb/s)
80 80
60 60
40 40
20 20
0 0
Technique Technique
Figure B-6: Average sector throughput in the non-adaptive (left) and frequency-adaptive (right) modes
0.9 0.9
0.8 0.8
Prob( av. user throughput < X)
0.7 0.7
0.6 0.6
0.5 0.5
0.4 0.4
0.3 0.3
1 Tx - 2Rx MRC - reuse 1 1 Tx - 2Rx MRC - reuse 1
0.2 1 Tx - 2Rx MRC - FFR FI - no priority 0.2 1 Tx - 2Rx MRC - FFR FI - no priority
1 Tx - 2Rx MRC - FFR FI - prio. 2 1 Tx - 2Rx MRC - FFR FI - prio. 1
0.1 1 Tx - 2Rx MRC - FFR FI - prio. 3 0.1 1 Tx - 2Rx MRC - FFR FI - prio. 2
1 Tx - 2Rx MRC - FFR FI - prio. 3
0 0
0 1 2 3 4 5 6 7 8 0 1 2 3 4 5 6 7 8
Av. user throughput (Mb/s) Av. user throughput (Mb/s)
0.09 0.09
0.08 0.08
Prob( av. user throughput < X)
0.07 0.07
0.06 0.06
0.05 0.05
0.04 0.04
0.03 0.03
1 Tx - 2Rx MRC - reuse 1 1 Tx - 2Rx MRC - reuse 1
0.02 1 Tx - 2Rx MRC - FFR FI - no priority 0.02 1 Tx - 2Rx MRC - FFR FI - no priority
1 Tx - 2Rx MRC - FFR FI - prio. 2 1 Tx - 2Rx MRC - FFR FI - prio. 1
0.01 1 Tx - 2Rx MRC - FFR FI - prio. 3 0.01 1 Tx - 2Rx MRC - FFR FI - prio. 2
1 Tx - 2Rx MRC - FFR FI - prio. 3
0 0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0 0.2 0.4 0.6 0.8 1 1.2 1.4
Av. user throughput (Mb/s) Av. user throughput (Mb/s)
Figure B-7: CDF of the user throughput in the non-adaptive (left) and frequency-adaptive (right) modes
Page 57 (85)
WINNER II D4.7.2 v1.0
CDF of the average SINR over the scheduled chunks CDF of the average SINR over the scheduled chunks
1 1
0.9 0.9
0.8 0.8
0.7 0.7
Prob( SINR < X)
0.5 0.5
0.4 0.4
CDF of the average SINR over the scheduled chunks CDF of the average SINR over the scheduled chunks
0.1 0.1
reuse 1
reuse 1 0.09
0.09 FFR FI - no priority
FFR FI - no priority
FFR FI - prio. 1
0.08 FFR FI - priority scheme 2 0.08
FFR FI - prio. 2
FFR FI - priority scheme 3
0.07 FFR FI - prio. 3
0.07
Prob( SINR < X)
Prob( SINR < X)
0.06 0.06
0.05 0.05
0.04 0.04
0.03 0.03
0.02 0.02
0.01 0.01
0 0
-5 -4 -3 -2 -1 0 1 0 1 2 3 4 5 6
SINR (dB) SINR (dB)
Figure B-8: CDF of the average SINR measured over the allocated chunks in the non-adaptive (left) and
frequency-adaptive (right) modes
Table B-6: Summary of the performance results for the FFR FI in non-adaptive mode
Table B-7: Summary of the performance results for the FFR FI in frequency-adaptive mode
Page 58 (85)
WINNER II D4.7.2 v1.0
140 140
1 Tx - 2Rx MRC - reuse 1 1 Tx - 2Rx MRC - reuse 1
1 Tx - 2Rx MRC - FFR PI - no priority 1 Tx - 2Rx MRC - FFR PI - no priority
120 120
Not applicable 1 Tx - 2Rx MRC - FFR PI - prio. 1
Average sector througthput (Mb/s)
80 80
60 60
40 40
20 20
0 0
Technique Technique
Figure B-9: Average sector throughput in the non-adaptive (left) and frequency-adaptive (right) modes
0.9 0.9
0.8 0.8
Prob( av. user throughput < X)
0.7 0.7
0.6 0.6
0.5 0.5
0.4 0.4
1 Tx - 2Rx MRC - reuse 1
0.3 0.3
1 Tx - 2Rx MRC - FFR PI - no priority 1 Tx - 2Rx MRC - reuse 1
0.2 1 Tx - 2Rx MRC - FFR PI - prio. 2 0.2 1 Tx - 2Rx MRC - FFR PI - no priority
1 Tx - 2Rx MRC - FFR PI - prio. 3 1 Tx - 2Rx MRC - FFR PI - prio. 1
0.1 0.1 1 Tx - 2Rx MRC - FFR PI - prio. 2
1 Tx - 2Rx MRC - FFR PI - prio. 3
0 0
0 1 2 3 4 5 6 7 8 0 1 2 3 4 5 6 7 8
Av. user throughput (Mb/s) Av. user throughput (Mb/s)
0.09 0.09
0.08 0.08
Prob( av. user throughput < X)
0.07 0.07
0.06 0.06
0.05 0.05
0.04 0.04
Figure B-10: CDF of the user throughput in the non-adaptive (left) and frequency-adaptive (right)
modes
Page 59 (85)
WINNER II D4.7.2 v1.0
CDF of the average SINR over the scheduled chunks CDF of the scheduled resource SINR
1 1
0.9 0.9
0.8 0.8
0.7 0.7
Prob( SINR < X)
0.5 0.5
0.4 0.4
CDF of the average SINR over the scheduled chunks CDF of the scheduled resource SINR
0.1 0.1
1 Tx - 2Rx MRC - reuse 1
0.09 0.09
1 Tx - 2Rx MRC - FFR PI - no priority reuse 1
0.08 1 Tx - 2Rx MRC - FFR PI - prio. 2 FFR PI - no priority
0.08
1 Tx - 2Rx MRC - FFR PI - prio. 3 FFR PI - prio. 1
0.07 0.07 FFR PI - prio. 2
FFR PI - prio. 3
Prob( SINR < X)
0.06 0.06
0.05 0.05
0.04 0.04
0.03 0.03
0.02 0.02
0.01 0.01
0 0
-5 -4 -3 -2 -1 0 0 1 2 3 4 5
SINR (dB) SINR (dB)
Figure B-11: CDF of the average SINR measured over the allocated chunks in the non-adaptive (left)
and frequency-adaptive (right) modes
Table B-8: Summary of the performance results for the FFR PI in non-adaptive mode
Table B-9: Summary of the performance results for the FFR PI in frequency-adaptive mode
Page 60 (85)
WINNER II D4.7.2 v1.0
The user throughput CDFs (together with an enlargement of the cell-edge throughput region) obtained for the
considered cell-edge UTs prioritization schemes are shown in Figure B-12, whereas the corresponding average
sector throughput are presented graphically in Figure B-13. The results for the non-adaptive mode are on the
left-hand side of the figures, while the results for frequency-adaptive mode are on the right-hand side. Finally,
Table B-10 and Table B-11 summarize the main results for the non-adaptive and frequency-adaptive modes,
respectively.
0.9 0.9
0.8 0.8
Prob( av. user throughput < X)
0.6 0.6
0.5 0.5
0.4 0.4
1 Tx - 2Rx MRC - reuse 1
0.3 0.3 1 Tx - MRC - reuse 1
1 Tx - 2Rx MRC - FFR FI - prio. 3
1 Tx - 2Rx IRC - reuse 1 1 Tx - MRC - FFR FI - prio. 1
0.2 0.2 1 Tx - IRC - reuse 1
1 Tx - 2Rx IRC - FFR FI - prio. 3
1 Tx - MRC - FFR FI - prio. 1
0.1 4 Tx GoB - 2Rx IRC 0.1 4 Tx GoB - IRC - reuse 1
4 Tx GoB - 2Rx IRC- FFR FI - prio. 3 4 Tx GoB - IRC- FFR FI - prio. 1
0 0
0 1 2 3 4 5 6 7 8 0 1 2 3 4 5 6 7 8
Av. user throughput (Mb/s) Av. user throughput (Mb/s)
0.1 0.1
0.08 0.08
0.06 0.06
0.04 0.04
0.02 0.02
0 0
0 0.5 1 1.5 2 2.5 0 0.5 1 1.5 2 2.5
Av. user throughput (Mb/s) Av. user throughput (Mb/s)
Figure B-12: CDF of the user throughput for the combination of multiple-antenna techniques with the
FFR FI scheme, in the non-adaptive (left) and frequency-adaptive (right) modes
Page 61 (85)
WINNER II D4.7.2 v1.0
180 180
1 Tx - 2Rx MRC - reuse 1 1 Tx - 2Rx MRC - reuse 1
160 1 Tx - 2Rx MRC - FFR FI - prio. 3 160 1 Tx - 2Rx MRC - FFR FI - prio. 1
1 Tx - 2Rx IRC - reuse 1 1 Tx - 2Rx IRC - reuse 1
Average sector througthput (Mb/s)
100 100
80 80
60 60
40 40
20 20
0 0
Technique Technique
Figure B-13: Average sector throughput in the non-adaptive (left) and frequency-adaptive (right) modes
When used in conjunction with IRC and/or GoB, the FFR FI scheme still experiences approximately the same
reduction of sector throughput compared to the re-use 1 scheme (-15% in non-adaptive mode and -20% in
frequency-adaptive mode).
On the other hand, the sector throughput gains provided by IRC and GoB are of the same order of magnitude
with FFR than with re-use 1: approximately +15% and +80%, respectively, in the non-adaptive mode, and +9%
and +21%, respectively, in the frequency-adaptive mode.
In terms of cell-edge throughput, the FFR FI and MRC at the UT provides slightly less gains than the re-use 1
with IRC in the non-adaptive mode (+100% instead of +140%), but both scheme perform exactly the same in
the frequency-adaptive mode. However, IRC + FFR FI yields approximately a +270% increase of the cell-edge
throughput in both modes.
When used in conjunction with the GoB, however, the improvement brought by the FFR FI is small in the non-
adaptive mode (+80 kb/s, i.e. +7%), and even degrades the cell-edge throughput in the frequency-adaptive
mode. In particular, it can be observed that the crossing point between the CDFs of the GoB with and without
FFR is much below the ones observed with single-antenna transmission, which illustrates the reduction of the
FFR capability for user throughput improvements when used in combination with the GoB. We invite the
reader to refer to section 4.2.5.2 for an explanation of this phenomenon.
Page 62 (85)
WINNER II D4.7.2 v1.0
0.9
0.8
0.7
Cumulative distribution
0.5
0.4
0.3
0.2
0.1
0
10 15 20 25 30 35 40 45 50 55 60
dB
Page 63 (85)
WINNER II D4.7.2 v1.0
Channel model C2
UT velocity 3 km/h
UT receiver diversity MRC
Multiple access OFDMA
Central cell Yes
Interference modelling All links modelled
Number of chunks per RU 3
Traffic model Realistic, VoIP
Scheduler Proportional Fair
Scheduler period 0.6912 ms
Modulation BPSK, QAM, 16-QAM,
64-QAM
Coding B-LDPC rate 1/2, 2/3, 3/4
Link adaptation Ideal
Retransmission / HARQ Yes
-106.8
-106.85 RSARP
ISARP
-106.9
R3SARP-115
R3SARP-118
Mean Interference [dBm]
-106.95
-107
-107.05
-107.1
-107.15
-107.2
-107.25
0 10 20 30 40 50 60 70 80 90
Users per cell
Page 64 (85)
WINNER II D4.7.2 v1.0
The working principle of the proposed inter-cell interference avoidance scheme is illustrated by block diagram
in Figure C-1.
Sector 1 solves
Sector 1 receives Sector 1 prepares utility matrix,
UTs in sector 1 channel info utility matrix Uk,n; prepares
sends channel including dominant where k and n are tentative chunk
information interferer links the indices for restriction list,
chunks and UTs, and sends to
Central
controller
refines
Sector 2 solves
Sector 2 prepares chunk
Sector 2 receives utility matrix,
utility matrix Uk,n; restriction
UTs in sector 2 channel info prepares
where k and n are lists for
sends channel including dominant tentative chunk
the indices for all
information interferer links restriction list,
chunks and UTs, sectors
and sends to
and
sends
NNN informati
on back
Sector N solves to the
Sector N receives Sector N prepares utility matrix, sectors
UTs in sector N channel info utility matrix Uk,n; prepares
sends channel including dominant where k and n are tentative chunk
information interferer links the indices for restriction list,
chunks and UTs, and sends to
Algorithm at Algorithm at
Sector Central Controller
Figure C-1: Schematic of the avoidance scheme
FOR UT i = 1: n,
FOR Chunk j = 1:k,
Calculate SINR on chunk j for UT i (only non-dominant second tier sectors are considered initially)
Calculate initial rate based on above SINR
N c 0;
FOR Int = 1: Nt -1; all first tier sector interferers
Calculate SINR with one interferer at a time
Page 65 (85)
WINNER II D4.7.2 v1.0
END FOR
END FOR
END FOR
Figure C-2: Pseudo codes to generate utility matrix
C.2 Decentralized Dynamic Channel Allocation for the WINNER TDD mode
We consider the application of future wireless networks for high peak data rate transmission that rely on full
frequency re-use and dynamic, self-organizing network configuration capabilities. It is well known that in an
OFDM-TDD network with full frequency re-use, pure OFDMA provides poor throughput performance
because of the excessive inter-cellular interference. This is due to the fact that interference is generally present
at the receiver, while the transmitter is responsible for the channel assignment.
The implementation of an efficient medium access in distributed self-organized networks is inevitably tied with
the ability to deal with the hidden and exposed node problems. To motivate the hidden node problem, Figure
C-3 illustrates an example interference scenario for a slotted system, where multiple BSs are operated in close
proximity to one another on the same radio frequency channels. In the example, BS1Tx attempts to transmits to
user terminal (UT) UT1Rx. Suppose UT2Tx enters the network and establishes a connection to BS2Rx. Now UT1Rx
is exposed to strong interference from UT2Tx, causing outage (lost transmission slots). Since UT2Tx cannot
Page 66 (85)
WINNER II D4.7.2 v1.0
know that UT1Rx is receiving data from another (distant) transmitter, the receiver UT1Rx is said to be hidden
from the transmitter UT2Tx. The region around UT1Rx where competing transmissions cause prohibitive
interference is termed hearability region of UT1Rx, indicated by a shaded circular region around UT1Rx. On the
other hand, UT3Tx connected to BS3Rx, which is assumed outside the hearability region, may coexist with link
BS1Tx to UT1Rx, as the interference UT3Tx imposes on UT1Rx is sufficiently low.
The exposed node problem occurs when a transmitter refrains from access due to strong interference from
nearby transmissions. This however, may not be necessary as transmitters are not sensitive to interference, and
both links might coexist, as long as the respective receivers are sufficiently far away. Then, the transmitter is
said to be exposed to the interference of ongoing transmissions.
Busy-signal concept
The key principle of the busy-signal concept is that the receiver sends out a busy-signal on a time-multiplexed
channel when it has successfully received a data packet [OH04], [OHA07]. Note that this is different from the
dual busy-tone concept in [HD02] where a busy-signal is transmitted on a different narrow-band radio
frequency channel. There simultaneous receiving and transmitting is required, affecting the complexity and
cost of the RF (radio frequency) front-end. Moreover, due to the out-of band busy tones the algorithm in
[HD02] cannot rely on channel reciprocity. On the other hand, for busy-tone (BT) DCA channel reciprocity is
a key element, and simultaneous transmit–receive is not necessary. The BT-DCA protocol, however, requires a
synchronized network.
In the considered busy-tone concept, a number of time/frequency resource units (chunks) are grouped into
fixed-duration frames, and associated with each chunk is a minislot. Provided that the data is successfully
received and the transmitter intends to transmit more data, in response UT1Rx broadcasts a busy signal in the
associated minislot. Provided that channel reciprocity holds, the region where the busy signal can be detected
coincides with the hearability region of the vulnerable receiver. In the interference scenario shown in Figure
C-3, the shaded hearability region around UT1Rx therefore also marks the area in which the busy signal can be
detected. Hence, an exclusion zone around vulnerable receivers for protection against inter-cell interference is
established by the following protocol:
i. All potential transmitters must sense the busy slot prior to transmission;
ii. Transmitters that sense a strong busy signal are prohibited to use this chunk.
In the context of the interference scenario shown in Figure C-3, UT2Tx would be obliged to reschedule its
transmission to another slot, as UT2Tx detects a strong busy signal. On the other hand, UT3Tx may proceed with
its transmission as originally scheduled, as the received busy signal at UT3Tx is sufficiently low, which implies
that, due to channel reciprocity, the interference to UT1Rx would be equally low. In case an outage occurred or
the transmitter has no more data to transmit, no busy signal is broadcast by the target receiver and the slot
remains unreserved.
Page 67 (85)
WINNER II D4.7.2 v1.0
Figure C-4: Decentralized interference avoidance by busy-tone dynamic chunk allocation (BT-DCA).
(a.) Interference scenario, (b.) Channel response of the target and competing links over frequency for
OFDMA-TDD systems
Suppose that UT2Tx intends to set up a link to BS2Rx, while the transmission between BS1Tx and UT1Rx is
already established as indicated in Figure C-4.a. The objective of BT-DCA is twofold [HNO06]:
(i) which time-frequency slots (chunks) cause negligible interference towards existing competing
links. In the example in Figure C-4.a, the interference from UT2Tx to UT1Rx
(ii) which chunks on the intended link achieve a sufficient SINR at the target receiver BS2Rx.
To meet the first objective, the received busy tone for each chunk is compared against a given threshold
according to (C.2). As illustrated in Figure C-4.b, the received busy signal power measured over frequency,
varies due to frequency selective fading | H n1,,2 |2 and/or the fact that BS1Tx may not have accessed all chunks.
The chunks where the received busy-tone power falls below the threshold may be subsequently selected for
data transmission, denoted by Set A. In order to meet objective (ii), in Figure C-4. BS2Rx determines the signal-
to-interference plus noise ratio (SINR) on each of the selected chunks. Those chunks with sufficient SINR at
BS2Rx are reserved by protection through the busy-tone, denoted by Set B. Otherwise, no busy-tone is
transmitted so the chunk is released. Note that the SINR at a particular chunk might be low either because this
chunk on the intended link is deeply faded, or because there is high interference resulting from another
transmission.
Page 68 (85)
WINNER II D4.7.2 v1.0
2
Td H ni ,,i 1
J ni , 1 2
(C.5)
¦ j zi
Td H ni ,,j 1 Z n, 1
and decides whether a particular chunk, that has been selected by the transmitter ( a ni ,
1 1 ), is to be reserved.
The outcome of this decision is bni , , with bni , 1 if the estimated SINR is above the required SINR,
J ni ,
1 J J tg , otherwise bni , 0 , described by [HNO06]
°1, a ni ,
1 1 and J ni ,
1 t J tg
bni , ® (C.6)
°̄0 , elsewhere
Note that the decision for the value of a ni ,
1 is made by the transmitter to mitigate interference, whereas the
decision for the value of bni , is made by the receiver to ensure that the required SINR is maintained. It is
assumed that the receiver detects a ni ,
1 without errors.
The condition 1 ani ,
1 Bni ,
2
I th implies that chunk n has not been used in the previous MAC frame
(
1) , and the received busy tone on this chunk at MAC frame is lower than the threshold Ith. The
Page 69 (85)
WINNER II D4.7.2 v1.0
condition bˆni ,
1 1 means that the chunk n has been selected in the previous MAC frame and the required
SINR at the receiver J tg is maintained.
Let C denote a set of all chunks. The notations Am and B m are the sets of the chunks within a arbitrary cell m
for which bni , 1 at frame . In the proposed protocol, it is assumed that each chunk can only be assigned to
one UT within a given cell. It is clear that B m Am C .
Note that this algorithm does not require channel knowledge at the transmitter as the chunk assignment is
solely based on received busy-tone levels. In case channel knowledge about the target received SINR is
available at the transmitter the algorithm can be modified as follows. The selected chunks a ni ,
1 can then be
selected not only dependent on the interference to competing links, but also on the achieved SINR at the target
receiver. Then, (C.10) is modified to yield
ª
¬
2 º
°1, « 1 a ni ,
1 Bni , I th or bˆni ,
1 1» and Jˆni , t J tg
a ni , ® ¼ (C.11)
°̄0 , elsewhere
where Jˆni , is the predicted SINR for chunk n at frame . We note that Jˆni , is potentially different to the true
SINR, in particular for initial access, as two adjacent BSs may select the same chunk for the first time. This
will result in high interference with significantly lower actual SINR J ni , . It is obvious that the number of
rejected chunks (set Am
B m ) for link initialization can be significantly reduced by chunk assignment
according to (C.11). Now, only interference for initial access of a chunk can cause outage.
It is important to note that the set of selected chunks Am at cell m marks the chunks which may be scheduled
by the intra-cell scheduler. The intra-cell scheduler itself can allocate these chunks to various UTs in the cell
dependent on his scheduling policy, QoS constraints, and channel conditions.
Page 70 (85)
WINNER II D4.7.2 v1.0
Figure C-5: Impact of same entity interference on busy tone use in cellular TDD systems with variable
DL-UL switching points
When using the busy tone concept in such system the following problem arises: In Figure C-5 a typical
scenario with different DL-UL switching points between neighbouring cells is depicted. Different DL-UL
switching points are the cause for the so-called crossed slot problem; i.e. both other entity and same entity
interference (in Figure C-5 BS-UT and BS-BS interference).
In order to solve this problem, the busy-tone part somehow has to follow the asymmetry in the data part. The
straightforward solution would be to add a busy slot on the end of every chunk, as illustrated in Figure C-6. As
the busy-tone transmission is in opposite direction to the data transmission direction (the receiver broadcasts
the busy signal), additional DGs are required. Hence, this solution is clearly infeasible, due to the high number
of duplex guards (DG) required.
Figure C-6: Adding busy slots at the end of each chunk. Although the crossed-slot problem is mitigated,
this solution results in prohibitive overhead.
Page 71 (85)
WINNER II D4.7.2 v1.0
Figure C-7: Proposed frame structure for the support of different DL-UL channel asymmetries:
dedicating a slot at the end of the frame for busy signal transmission
The key to avoid the insertion of additional DGs is to appropriately replace the busy slots. This is achieved by
dedicating one slot at the beginning or the end of a frame for busy signal transmission, as illustrated in Figure
C-7. Busy slots to protect DL transmissions are inserted after the UL slots, and vice versa. As can be seen, for
the entire frame, only two DG periods are needed, i.e., no additional DG are required compared to the original
frame structure without busy slots.
Overhead: The UL-DL channel asymmetry support in Figure C-7 imposes an overhead of one OFDM symbol
per chunk for busy tone reservation. For the WINNER TDD parameters according to [WIN2D6131], the
overhead amounts to 6 OFDM symbols per frame. On the other hand, only one subcarrier per chunk is required
to effectively support the busy signal approach. Although remaining subcarriers are available for low-rate
feedback piggy packed on the busy signal (Æ see section C.2.2.5), unnecessary high overheads might be
encountered. This problem can effectively be avoided by choosing a shorter OFDM symbol length of the busy
chunks than for the corresponding data chunks.
Page 72 (85)
WINNER II D4.7.2 v1.0
Tx2
Rx1
Rx2
The control information from a receiver to its corresponding transmitter is implicitly protected from
interference by BT-OFDMA, as it can be shown that the minislots carrying the low rate feedback information
are effectively free of (significant) inter-cellular interference. The reason is the TDD channel reciprocity, and
that a busy tone is only sent by a receiver following the successful reception of a data chunk, and not when the
receiver is idle. This is illustrated by means of an example in Figure C-8. Suppose that Tx2 is communicating
with Rx2, and a nearby receiver Rx1 intends to send control information back towards Tx1, creating a potential
conflict at Tx2 (receiver of the feedback information). However, the interference from Tx2 on the preceding
data chunk “jams” the nearby receiver Rx1. Therefore, Rx1 is unable to detect the transmission from Tx1 and so
it does not broadcast a busy signal. Thus, Tx2 receives the busy signal including the piggy packed control
information with low interference.
C.2.2.6 Cognitive radio networks
The need for tremendously increased peak data rates and the limited available spectrum impose paradigm shifts
on the operation of cellular systems. The challenges lie in license exempt spectrum sharing operation, as well
as efficient resource allocation and interference management. This calls for a cognitive radio which is able to
sense, as well as dynamically share the available spectrum in a decentralized manner, preferably on a short-
term basis, without the need to rely on central control.
With various operators sharing the same spectrum and with a variety of independently owned wireless
networks, sophisticated network planning in the traditional way, where base station (BS) sites are carefully
placed to minimize the interference between cells may no longer be feasible. In addition, there is the need to
cater for high density environments (airports, shopping malls, business centres, etc.) which attract higher UT
concentrations (and therefore also higher BS concentrations). In such a scenario distributed network functions
that allows for self-organized medium access control (MAC) become increasingly important.
C.2.2.7 Application of BT-OFDMA to MIMO and SDMA
BT-OFDMA is inherently suited to complement interference mitigation by MIMO, e.g. through adaptive
beamforming or dynamic grid of beams (GoB). In general, BT-OFDMA can be effectively combined with
various multi-user (MU) MIMO approaches. This is particularly true for MIMO utilizing short-term CSI at the
transmitter, since a feedback link where uplink pilots transfer the channel knowledge to the transmitter is
already established. So, effectively BT-OFDMA can be implemented without any extra overhead, as a
feedback link already exists.
In abstract, for BT-OFDMA to support a MIMO system the effective channel (the channel including spatial
processing at transmitter and receiver) needs to be reciprocal. This is accomplished by using the transmit
beamforming vector on the feedback link for receive processing, and vice versa. Then the dynamic chunk
assignment described previously is readily extended to interference aware spatial layer assignment.
The application of BT-OFDMA to MIMO is described in more detail for the downlink in the following. The
uplink case is analogous. Every base station (BS) is connected to a number of UTs. The BS and UTs are
equipped with Nbs and Nut antennas. Each chunk carries a number of spatial layers. The spatial layers
transmitted by the BS, Sbs, serve Sbs/Sut UTs, each UT are assigned Sut spatial streams. From this general MU-
MIMO case, single user MIMO and SDMA are obtained by setting S ut S bs and S ut 1 , respectively.
The transmitted signal after spatial processing reads
>
s bs V x bs , V v1 , , v Sbs N bs u S bs @ (C.12)
>
where v s v s ,1 , , v s, N bs @
T
and x bs
>
x1 , , x S bs @
T
denote the transmit beamforming vector of spatial
stream s with dimension Nbs and the transmitted sequence of the Sbs spatial layers. The signal is transmitted
over an N ut K N bs MIMO channel and is received by the user terminal:
Page 73 (85)
WINNER II D4.7.2 v1.0
h11 h1, N
> @
bs
ut bs ut
r r1 , , rN ut H s
n , H N ut N bs (C.13)
h h
N ut ,1 N ut , N bs
ut
where H and n denote the spatial channel matrix and the AWGN term. After spatial processing at the mobile
receiver, the received signal of the Sut spatial layers is obtained:
> @
y ut U T r ut U T H V x bs U T n ut , U u1 , , u Sut N ut S ut (C.14)
>
where u s u s ,1 , , u s , N ut @T
denotes the receive beamforming vector of spatial stream s with dimension Nut.
In (C.14) the S ut K S bs matrix U T H V describes the effective channel including spatial processing between BS
and UT.
The objective of the busy-tone protocol is to protect transmissions in a certain cell by utilizing channel
reciprocity in TDD mode. A specific multi-user (MU) MIMO downlink scenario is depicted in Figure C-9. In
Figure C-9 UT11Rx is exposed to interference from BS2Tx from an adjacent cell. Due to the spatial processing,
the interference from BS2Tx towards UT11Rx is no longer omni-directional. The spatial processing is effectively
taking into account, if on the feedback link the transmitter and receiver spatial processing is such that the
effective channel U T H V is reciprocal. Then, BS2Tx is informed about the interference it potentially causes to
UT11Rx (and other vulnerable receivers from adjacent cells) by listening to the busy tone in the associated
minislot. The effective channel becomes reciprocal if transmitters scan the minislot using the beamforming
matrix V that is to be used for subsequent data transmission in (C.12).
T
To demonstrate channel reciprocity ( H bs H ut ) of the effective channel, consider the feedback link, where
UTs transmit the busy tones according to
s ut U x ut (C.15)
>
where x ut x1 ,, x Sut @ T
denotes the transmitted feedback sequence with Sut spatial layers. Transmitters in
adjacent cells scanning the busy tone receive the following signal (in Figure C-9 BS2Tx measures the busy tone
transmitted from UT11Rx)
r bs H T s ut n bs (C.16)
where nbs denotes the AWGN term at the receiving BS. The transmitter scanning the busy tone uses the same
spatial matrix as that it intends to use for its scheduled transmission (in Figure C-9 BS2Tx uses the matrix for
transmission towards UT21Rx), given by
y bs V T r bs V T H T U x ut n bs (C.17)
>
where r bs r1 , , rS bs @T
denotes the received feedback sequence impinging at the Nbs antennas of the BS.
Comparing (C.14) with (C.17) it is seen that the effective channel is indeed reciprocal, so
> @T
V T H T U U T H V . Hence, BS2Tx can effectively measure the interference its scheduled transmission
towards UT21Rx causes to other active receivers in its vicinity.
BT-OFDMA in combination with SDMA offers an additional degree of freedom for interference management.
For instance, with a dynamic grid of beams (GoB) a BS can choose between a set of N spatial precoding
matrices ^V1 , , VN ` [WIN2D341]. Now a BS can choose the most appropriate precoding matrix, so that
interference to transmissions in other cells is minimized.
Page 74 (85)
WINNER II D4.7.2 v1.0
were conducted for the inner 3x3 building blocks in the centre of 11x11 building blocks, as shown in Figure
C-10. User terminals (UT) are uniformly distributed on the streets (outdoor UTs only). While all LoS links are
modeled, the NLoS links are only implemented for the inner 7x7 blocks.
Figure C-10: Metropolitan area urban micro-cells with two-dimensional regular grid of buildings
(“Manhattan grid”).
Knowledge about the channel state information (CSI) was assumed for the simulations. However, no
knowledge about the instantaneous level of interference at the receiver was assumed. The following table
summarizes the simulation assumptions:
The distribution of served UTs (black points) by base stations in the inner 3x3 building blocks is shown in
Figure C-11. User terminals (UT) are always connected to the base station with the lowest pathloss. Due to the
favourable pathloss condition of LoS channels, UTs are always connected to BSs with direct line of sight. The
cdf of the SINR distribution of scheduled chunks is shown in Figure 5-8.
Page 75 (85)
WINNER II D4.7.2 v1.0
Figure C-11: Distribution of served UTs (black points) by base stations in the inner 3x3 building blocks
(marked with red bullets).
CDF of the aggregate throughput for BT-OFDMA with Ithres = -90dBm is depicted in Figure C-12. It is seen
that BT-OFDMA significantly outperforms fixed chunk allocation without any interference protection.
Especially cell edge users benefit from the interference mitigation mechanism, seen by the steeper slope of the
CDF of BT-OFDMA.
Figure C-12: CDF of aggregate throughput for BT-OFDMA. Fixed chunk allocation is drawn as a
reference, Ithres = -90dBm.
The cdf of the throughput per user is shown in Figure C-13. It is seen in Figure C-12 that the throughput on the
uplink is higher than on the downlink. For fixed chunk allocation the CDF severely degrades for low SINR.
The flattening of the CDF at throughputs less than 4 Mbps is due to the LoS interference at street corners.
Users which are located at street corners are exposed to strong interference, due to the LoS of both the intended
and the interfering link, compared to users in street canyons, where interference is typically NLoS. The
interference protection offered by BT-OFDM effectively avoids this problem.
Page 76 (85)
WINNER II D4.7.2 v1.0
Figure C-13: CDF of user throughput for BT-OFDMA. Results for downlink and uplink are plotted with
interference thresholds Ithres = -90dBm.
Parameters Value
Channel model Indoor scenario (A1)
Number of links 15
Environment characteristics One floor of a building with regular grid of rooms, walls
and corridors [WIN2D6137] (see Figure C-14)
Number of rooms: 40 (size 10 m x 10 m x 3 m)
Number of corridors: 2 (size 100 m x 5 m x 3 m)
Wrap-around No
Interference modelling All links modelled
MS transmit power 21 dBm
MS height 1.5m
Symbol length 20.48 µs
Guard interval 1.28 µs
Total symbol length 21.76 µs
Total bandwidth 100 MHz
Total number of subcarriers (SCs) 2048
Number of SCs used for data 1664
transmission
Chunk size 15 (time) K 8 (frequency) = 120
Number of chunks/frame 2 (time) K 208 (frequency)
Packet size 12208 bits
Modulation scheme QPSK, rate ½ convolutional code
SINR target 5 dB
Page 77 (85)
WINNER II D4.7.2 v1.0
Y−coordinate [m]
30
25
20
15
10
5 Transmitter
Receiver
0
0 20 40 60 80 100
X−coordinate [m]
Figure C-14: Indoor scenario with its corresponding distribution of UTs. The each transmitter selects its
receiver randomly from the distribution.
The deployment scenario and the distribution of UTs are illustrated in Figure C-14. For forming the links, two
mobiles A and B are randomly selected from the mobiles distributed in the system, forming a peer-to-peer
(P2P) link.
At the beginning of a snapshot, each transmitter has a buffer which queues a fixed number of packets of
constant length. The offered load to the system is changed by changing the packet arrival rate which is
assumed to be the same for all UTs. The packets in the buffer are characterized by linearly increasing
expiration time, k t , where k is the position of the packet in the queue, corresponding to the equidistant inter-
packet arrival by rate 1 / t .
The performance of BT-OFDMA applied to local area peer-to-peer (P2P) networks is evaluated on the basis of
four metrics: throughput, data rejection rate, delay and packet expiration rate. Throughput is the number of bits
that are transmitted successfully. A transmission is considered successful if the received SINR is greater than
or equal to the SINR target. The data rejection rate corresponds to the average number of bits transmitted per
unit time but fail to meet the SINR target. Delay is the time elapsed between the beginning of the snapshot to
the time the packet is completely transmitted. The packets that expire before fully transmitted are assumed to
have infinite delay, which for simulation purposes is made equal to the snapshot duration (100 ms). The
packets are assumed to expire if the transmission of the entire packet is not completed before the expiration
deadline. The optimum value for the interference threshold in (C.2) is determined by simulations as Ithres =
100dBm.
The performance of the above algorithm is compared against the random allocation scheme. The random
allocation scheme schedules transmission on any chunk with probability p if there is data to be transmitted.
Page 78 (85)
WINNER II D4.7.2 v1.0
Total system throughput in WINNER−TDD adhoc network Data rejection in WINNER−TDD adhoc network
140 1000
900
120 Busy tone (Ithres = −100 dBm)
Total system throughput [Mbps] 800
Random allocation (p = 0.10)
100 Random allocation (p = 0.25)
40 300
200
20
100
0 0
0 200 400 600 800 1000 1200 1400 0 200 400 600 800 1000 1200 1400
System offered load [Mbps] System offered load [Mbps]
Figure C-15: Total system throughput (left) and data rejection rate (right) in WINNER–TDD ad hoc
network.
The simulation results show that the busy tone concept achieves approximately a three-fold gain in throughput
compared to the benchmark systems, as can be seen in Figure C-15. A maximum throughput of approximately
130 Mbps is achieved with busy tone scheme whereas the random allocation scheme with p = 0.1 and p = 0.25
only give a maximum throughput of only 40 Mbps. Using fixed allocation scheme in which the total number of
chunks per timeslot are divided by the number of links in the system, the maximum system throughput that can
be obtained would be 67.4 Mbps. In this case, the system is free of interference as no chunk is re-used. From
this it can be found that the BB algorithm approximately achieves an effective re-use of two as the maximum
throughput is about 130Mbps.
The busy tone algorithm performs better than the benchmark systems also in terms of delay and packet success
rate as can be seen from Figure C-16. The lower delay and packet expiration rate is of paramount importance
for time sensitive traffic and therefore establishes the busy tone as a preferred choice among the methods
studied here.
Packet delay in WINNER−TDD adhoc network Packet success rate in WINNER−TDD adhoc network
100 90
Busy tone (Ithres = −100 dBm)
90 80 Random allocation (p = 0.10)
80 Random allocation (p = 0.25)
70
Random allocation (p = 0.50)
70 Random allocation (p = 1.00)
Packet success rate
Packet delay [ms]
60
60
50
50
40
40
Busy tone (Ithres = −100 dBm) 30
30
Random allocation (p = 0.10)
20 Random allocation (p = 0.25) 20
Random allocation (p = 0.50)
10 10
Random allocation (p = 1.00)
0 0
0 200 400 600 800 1000 1200 1400 0 200 400 600 800 1000 1200 1400
System offered load [Mbps] System offered load [Mbps]
Figure C-16: Delay performance (left) and packet success rate (right) in WINNER–TDD ad hoc
network.
Page 79 (85)
WINNER II D4.7.2 v1.0
C.3.1 Description
r1
P1
D1
Flow 1 E1
r2 Token
Bank
B
P2
D2
Flow 2 E2
Output Buffer
rN
PN
DN
Flow N EN
Page 80 (85)
WINNER II D4.7.2 v1.0
provided the session does not exceed its bandwidth allocation in the long term. This prevents sudden
degradation of QoS experienced by the end user as a result of traffic profile violations.
The second level of scheduling considers the channel state information. It is assumed that at the start of each
scheduling interval, the base station knows the SINR values for each UT in every chunk for the downlink case.
Therefore, the function of this level of scheduling is to assign the best chunk to the UT (who is selected in the
first level of scheduling). For this level of scheduling we use the Maximum SINR algorithm where the
selected UT receives the best chunk available to it.
Video streaming traffic is generated using the 2 IRP model. The packet size is 188 bytes or 1504 bits. The
average data rate is 1263 pkts/sec * 1504 bits = 1.9 Mbps. The parameters for this model are given in Table
C-3.
Table C-3: Video traffic generation parameters
All the traffic generated in the system is organized in the following manner (c.f. Figure C-18):
I. Traffic from each service class is en-queued in a separate queue
II. Within each queue, each UT is queued in a separate sub-queue
As described above there are two levels of scheduling. The first level of scheduling takes into account the
traffic queue levels and the QoS issues and then schedules the UTs accordingly. The factors included are
mainly:
I. Priority
II. Interflow Fairness
III. Delay Constraints
The network layout of the system is shown in Figure C-19. Each cell in the network has three sectors. In our
simulation we are only considering the effect of interference on the central cell. For this purpose the
interference form the first tier will be taken into account. We also assume a frequency re-use factor of one in
each sector.
Page 81 (85)
WINNER II D4.7.2 v1.0
Page 82 (85)
WINNER II D4.7.2 v1.0
users). The trend for both these cases is the same in the presence of low to medium interference i.e. TBFQ
outperforms SB. But at high interference the performance is comparable.
Figure C-22 shows average packets dropped per frame vs. number of users. This is shown for two different
AF’s of 0.5 and 0.7. At an AF=0.5 we observe the average packets dropped per frame for TBFQ is less than
SB. The curve is almost constant till 14 users and then increases linearly with the number of users. The same
trend is observed for SB but with more packets dropped. At higher interference (shown by an AF =0.7), we
observe the same trend for TBFQ as compared to the lower interference between lower to medium loading. But
at higher loading, the number of packets dropped per frame is comparable for both TBFQ and SB.
This trend is again visible in Figure C-23 which shows the average packets dropped per frame vs. different
AF’s for low and high loading.
0.02
0.015
0.01
0.005
0
8 10 12 14 16 18 20
Number of Users
Figure C-20: Average queuing delay vs. number of UTs
Page 83 (85)
WINNER II D4.7.2 v1.0
0.035
TBFQ 20 Users
Score Based(1000) 20 Users
Average Queueing delay (sec) 0.03 Score Based(100) 20 Users
TBFQ 8 Users
Score Based(100) 8 Users
0.025
Score Based(1000) 8 Users
0.02
0.015
0.01
0.005
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Activity Factor
Figure C-21: Average queuing delay vs. activity factors (AF)
3
Score Based(1000) Act =0.7
TBFQ Act =0.7
Average Packets dropped per frame
1.5
0.5
0
4 6 8 10 12 14 16 18 20
Number of Users
Figure C-22: Packets dropped per frame vs. number of UTs
Page 84 (85)
WINNER II D4.7.2 v1.0
5
TBFQ 20 Users
4.5
Score Based(1000) 20 Users
Score Based(100) 20 Users
Packets Dropped (pkts/frame) 4
TBFQ 8 Users
Score Based(100) 8 Users
3.5
Score Based(1000) 8 Users
3
2.5
1.5
0.5
0
0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1
Activity Factor
Figure C-23: Packets dropped per frame vs. activity factors
Page 85 (85)