Skip to main content
Erschienen in: EURASIP Journal on Wireless Communications and Networking 1/2009

Open Access 01.12.2009 | Research Article

Busy Bursts for Trading off Throughput and Fairness in Cellular OFDMA-TDD

verfasst von: Birendra Ghimire, Gunther Auer, Harald Haas

Erschienen in: EURASIP Journal on Wireless Communications and Networking | Ausgabe 1/2009

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Decentralised interference management for orthogonal frequency division multiple access (OFDMA) operating in time division duplex (TDD) cellular systems is addressed. Interference aware allocation of time-frequency slots is accomplished by letting receivers transmit a busy burst (BB) in a time-multiplexed minislot, upon successful reception of data. Exploiting TDD channel reciprocity, an exclusion region around a victim receiver is established, whose size is determined by a threshold parameter, known at the entire network. By adjusting this threshold parameter, the amount of cochannel interference (CCI) caused to active receivers in neighbouring cells is dynamically controlled. It is demonstrated that by tuning the interference threshold parameter, system throughput can be traded off for improving user throughput at the cell boundary, which in turn enhances fairness. Moreover, a variable BB power is proposed that allows an individual link to signal the maximum CCI it can tolerate whilst satisfying a certain quality-of-service constraint. The variable BB power variant not only alleviates the need to optimise the interference threshold parameter, but also achieves a favourable tradeoff between system throughput and fairness. Finally, link adaptation conveyed by BB signalling is proposed, where the transmission format is matched to the instantaneous channel conditions.

1. Introduction

Orthogonal frequency division multiplexing (OFDM) has been selected as a radio access technology for a number of wireless communication systems, for instance, the wireless local area network (WLAN) standard IEEE 802.11 [1], the European terrestrial video broadcasting standard DVB-T [2], and for beyond 3rd generation (B3G) mobile communication systems [3]. In OFDMA, the available resources are partitioned into time-frequency slots, also referred to as chunks, which can be flexibly distributed among a number of users who share the wireless medium. Provided that channel knowledge is available at the transmitter, resources can be assigned to users with favourable channel conditions, giving rise to multiuser diversity [4].
Interference management is one of the major challenges for cellular wireless systems, as transmissions in a given cell cause cochannel interference (CCI) to the neighbouring cells. Full-frequency reuse where the transmitters are allowed an unrestricted access to all resources causes high CCI, which particularly impacts the cell-edge users [57]. Although CCI can be mitigated by traditional frequency planning, this potentially results in a loss in bandwidth efficiency due to insufficient spatial reuse of radio resources. Fractional frequency reuse (FFR) [46, 8] addresses this issue by realising that in the cellular networks CCI predominantly affects users near the cell boundary. FFR typically involves a subband with full-frequency reuse that is exempt from any slot assignment restrictions. The allocation of the remaining subbands is coordinated among neighbouring cells, in a way that the users in the given cell are denied access to subbands assigned to the cell-edge users in the adjacent cells. To this end, in [5] a user is classified as a cell-edge user based on the path loss to the desired base station (BS). This approach ignores the fact that the channel attenuation of the desired and the interfering signals is uncorrelated, and therefore fails to exploit interference diversity. Moreover, frequency planning results in a hard spatial reuse of the available resources. As a result, it cannot cater for the dynamic traffic and load across different sites. Furthermore, in systems where BSs are dynamically added in an uncoordinated manner, such as home base stations [9], reconfigurable frequency reuse planning may prove to be increasingly cumbersome.
The busy-signal concept [1016] has been identified as an enabler for decentralised and interference aware slot assignment. Receiver feedback informs a potential transmitter about the instantaneous CCI it causes to the "victim" receivers, which enables the transmitter to take appropriate steps to avoid interference, such as deferring its own transmission to another chunk. Early works [10, 11] rely on dedicated frequency-multiplexed channels that carry narrowband busy tones for channel reservation. As the protocol requires the transceivers to listen to the out-of-band busy tones whilst transmitting, complex RF units are required due to additional filters and duplexers involved. This drawback is avoided in [1214], where time-multiplexed busy bursts (BBs) serve as a reservation indicator for a reservation-based medium access control (MAC) protocol. By transmitting an in-band BB in an associated minislot following a successful transmission, two important goals are accomplished [13, 14]. First, the transmitter of its own link is informed whether or not the data is successfully received. Second, at the same time potential transmitters of the competing links are notified about ongoing transmissions, so that these transmitters can take appropriate steps to avoid interference. Therefore, both slot reservation and channel sensing tasks are accomplished. Furthermore, interference diversity is exploited, in the way that competing links may spatially reuse the same slot, given the interfering links are sufficiently attenuated.
None of the busy tone-based MAC protocols [1114] allow for dynamic resource allocation where multiple users share a set of parallel frequency slots of a broadband frequency-selective radio channel, such as the 100 MHz channel of the WINNER (Wireless world Initiative New Radio, http://​www.​ist-winner.​org) TDD mode [17]. By extending the BB concept to OFDMA [15, 16], the channel reciprocity of TDD [18] is exploited for decentralised interference management such that the chunks can be dynamically assigned on a short-term basis thereby ensuring a soft spatial reuse of chunks among cells. This concept termed BB-OFDMA works in a completely decentralised fashion and is therefore applicable to self-organising networks, which may consist of cellular as well as ad hoc network topologies.
The attainable system throughput of BB-OFDMA is sensitive to the selected interference threshold [15, 16]. In this paper, it is demonstrated how the interference threshold can be tuned to tradeoff system throughput to enhance cell-edge user throughput, thereby enhancing fairness. Moreover, by using a variable BB power that takes into account the quality of the intended link, a favourable tradeoff between system throughput and fairness is achieved. A variable BB power exhibits the further advantage that the sensitivity of the selected interference threshold on the performance is mitigated. Finally, BB-OFDMA with variable BB power is the basis for a novel receiver-driven link adaptation algorithm. System-level simulations demonstrate a significant improvement both in terms of fairness and total system throughput of BB-OFDMA, compared to the system with full-frequency reuse, where attempts to avoid interference are not made.
The remainder of the paper is arranged as follows. Section 2 describes the air interface of WINNER-TDD. The allocation of radio resources among the competing user population is discussed in Section 3. Section 4 introduces the BB signalling mechanism and its variants as well as the proposed link adaptation algorithm. The considered Manhattan grid deployment scenario and the system level simulator are introduced in Section 5, and the simulation results are discussed in Section 6. Finally, the conclusions are drawn in Section 7.

2. System Model

A time-frequency slotted OFDMA-TDD air interface based on the WINNER-TDD mode [8] is implemented, as illustrated in Figure 1. A chunk comprises of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq1_HTML.gif subcarriers and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq2_HTML.gif OFDM symbols and represents a resource unit that can be allocated to one out of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq3_HTML.gif users located in cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq4_HTML.gif . Successive downlink (DL) and uplink (UL) slots, each of which contains https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq5_HTML.gif chunks, constitute a frame. A chunk with frequency index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq6_HTML.gif at frame https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq7_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq8_HTML.gif . The transmit power of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq9_HTML.gif at chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq10_HTML.gif is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq11_HTML.gif .
The transmitted signal of chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq12_HTML.gif propagates through a mobile radio channel. The corresponding channel gain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq13_HTML.gif comprises radio effects such as distance-dependent path loss, log-normal shadowing as well as channel variations due to frequency-selective fading and user mobility [19]. While channel variations of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq14_HTML.gif between adjacent chunks in time and frequency are taken into account, fluctuations within a chunk are neglected. This approximation is justified as long as the chunk dimensions are significantly smaller than the coherence time and frequency [20].
The received signal power of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq15_HTML.gif can be expressed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ1_HTML.gif
(1)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq16_HTML.gif is the thermal noise power. Both the received signal powers of the intended and the interfering links, denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq17_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq18_HTML.gif , may vary significantly between different chunks, as elaborated in more detail in Section 4. The achieved signal-to-interference-plus-noise ratio (SINR) at chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq19_HTML.gif is in the form
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ2_HTML.gif
(2)

3. Multiuser Resource Allocation

Provided that only one user per cell transmits on a given chunk, the base station (BS) may flexibly assign chunks to users, such that the intracell interference is avoided. However, as chunks may be simultaneously accessed by adjacent cells, CCI is encountered. Multiuser resource allocation is carried out by a score-based scheduler [21] variant, which distributes the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq20_HTML.gif chunks among https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq21_HTML.gif users served by the BS in cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq22_HTML.gif . Assuming that the channel gains https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq23_HTML.gif are available at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq24_HTML.gif , the score for user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq25_HTML.gif at chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq26_HTML.gif is computed as
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ3_HTML.gif
(3)
where the Boolean operator https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq27_HTML.gif is set to 1 or 0 when the condition https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq28_HTML.gif is true or false, respectively. The parameter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq29_HTML.gif indicates whether or not user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq30_HTML.gif is granted access to chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq31_HTML.gif . For interference aware and reservation-based MAC protocols such as BB-OFDMA (see Section 4.4), setting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq32_HTML.gif ensures that user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq33_HTML.gif in cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq34_HTML.gif is denied access to chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq35_HTML.gif . This effectively avoids radiation of CCI from cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq36_HTML.gif to any neighbouring cells that use the same chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq37_HTML.gif .
Score based multiuser scheduling with reservation assigns chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq38_HTML.gif to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq39_HTML.gif if either a reservation indicator was set in the previous frame, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq40_HTML.gif , or the score given by (3) is minimised
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ4_HTML.gif
(4)
In case https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq41_HTML.gif for all users, cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq42_HTML.gif leaves chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq43_HTML.gif unassigned in (4). The user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq44_HTML.gif that is assigned chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq45_HTML.gif transmits data to its intended receiver. The set of chunks https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq46_HTML.gif at time https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq47_HTML.gif , for which https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq48_HTML.gif are denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq49_HTML.gif . Allocated chunks https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq50_HTML.gif whose achieved SINR https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq51_HTML.gif exceeds the target https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq52_HTML.gif , such that
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ5_HTML.gif
(5)
represent the set of successfully allocated chunks of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq53_HTML.gif , denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq54_HTML.gif [15].
For BB-OFDMA chunks with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq55_HTML.gif are reserved and protected from interference at the next frame https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq56_HTML.gif by setting the reservation indicator to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq57_HTML.gif in (4). When the SINR target is not met, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq58_HTML.gif , the reservation indicator is reset to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq59_HTML.gif . These chunks https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq60_HTML.gif are released in a way that user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq61_HTML.gif is prohibited access in the next slot https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq62_HTML.gif by setting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq63_HTML.gif . Subsequently, chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq64_HTML.gif is assigned to other users by (4).
In a cellular OFDMA system without interference protection, there is no restriction for accessing any chunks, so https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq65_HTML.gif in (3) for all users in the cell. Moreover, no reservation indicator is set, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq66_HTML.gif in (4), irrespective of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq67_HTML.gif in (5).

4. Busy Burst Signalling

Interference management using busy burst (BB) signalling [13, 14] establishes an exclusion region around active receivers. An exclusion region defines an area around an active receiver in cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq68_HTML.gif , where potential transmitters in adjacent cells https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq69_HTML.gif must not transmit, so that excessive CCI by close-by interferers is mitigated. In the context of OFDMA, the exclusion regions are to be established individually for each chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq70_HTML.gif [15]. In BB-OFDMA, an MAC frame is divided into data slots and BB minislots as illustrated in Figure 1. The BS transmits data in slot "Data DL." Provided that the SINR target for an allocated chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq71_HTML.gif is met, the intended mobile station (MS) transmits a BB in the associated minislot "BB UL" at uplink chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq72_HTML.gif . This reserves chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq73_HTML.gif of "Data DL" for the next frame https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq74_HTML.gif . Likewise, for uplink data transmitted by the MS in slot "Data UL," the BB is transmitted by the intended BS in the downlink minislot "BB DL." In summary, BB-OFDMA is described by the following protocol.
(1)
All potential transmitters must sense the BB associated to the data chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq75_HTML.gif prior to transmission.
 
(2)
Transmitters are prohibited to access chunks where a BB is detected above a given threshold.
 
The resulting BB signalling overhead amounts to 6.7%, as 2 OFDM symbols out of 30 OFDM symbols per frame are used for BB signalling. However, instead of dismissing BB signalling as overhead, the BB minislots may be utilised to convey the feedback and control information. Hence, BB signalling may serve as an alternative control channel.
To exemplify the principle of BB-enabled interference avoidance in cellular system, a typical downlink and uplink interference scenario is illustrated in Figure 2. In the downlink shown in Figure 2(a), MS1 has transmitted a BB after successful reception from BS1. As BS2 detects a strong BB from MS1, BS2 cannot spatially reuse this chunk with BS1. In the uplink shown in Figure 2(b), BS1 has transmitted a BB after successful reception from MS1. While MS2 is denied access to this chunk, as it detects a strong BB from BS1, MS3 is located outside the exclusion region of BS1, and may therefore simultaneously access this chunk with MS1.
To mathematically describe BB-enabled interference avoidance, let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq76_HTML.gif define a transmitter or receiver (either BS or MS) of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq77_HTML.gif within cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq78_HTML.gif . With this notation, the channel gain of the intended link at chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq79_HTML.gif becomes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq80_HTML.gif . The channel gain of an interfering link, between transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq81_HTML.gif of user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq82_HTML.gif located in an adjacent cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq83_HTML.gif and receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq84_HTML.gif , is denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq85_HTML.gif . In case two links compete for resources, the CCI between transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq86_HTML.gif and receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq87_HTML.gif amounts to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq88_HTML.gif . (The term https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq89_HTML.gif is equivalent to the CCI https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq90_HTML.gif as defined in (1). While the notation https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq91_HTML.gif is preferred for intercellular interference management, the latter is used for intracell resource allocation. The same rule applies for related quantities that denote transmitted and received signal powers.) Likewise, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq92_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq93_HTML.gif are the transmit power of the BB transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq94_HTML.gif (data receiver) and the interfering BB power received at data transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq95_HTML.gif (BB receiver), respectively.
Exploiting TDD channel reciprocity [18], transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq96_HTML.gif can ascertain https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq97_HTML.gif , the potential amount of interference it causes to an existing link https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq98_HTML.gif , by measuring https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq99_HTML.gif at the associated BB minislot [13]. Applying the channel reciprocity property of TDD, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq100_HTML.gif , yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ6_HTML.gif
(6)
The maximum CCI https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq101_HTML.gif that a candidate transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq102_HTML.gif may cause to an active receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq103_HTML.gif is determined by the interference threshold https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq104_HTML.gif , which is constant and known to the entire network. When https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq105_HTML.gif , transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq106_HTML.gif is located outside the exclusion range of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq107_HTML.gif . Provided that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq108_HTML.gif is known to the candidate transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq109_HTML.gif , (6) enables https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq110_HTML.gif to verify whether https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq111_HTML.gif by invoking the threshold test [13, 14]
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ7_HTML.gif
(7)
In case https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq112_HTML.gif , condition (7) reduces to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ8_HTML.gif
(8)
By tuning https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq113_HTML.gif , the maximum CCI https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq114_HTML.gif in (2) is adjusted, which determines the size of the exclusion range around active receivers.

4.2. Extension to Multiple Cells

In a multicell scenario, signals from multiple links superimpose at the receiver. The total interference at data receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq115_HTML.gif amounts to
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ9_HTML.gif
(9)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq116_HTML.gif is the set of simultaneously active transmitters. Likewise, the received BB at the data transmitter (BB receiver) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq117_HTML.gif yields
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ10_HTML.gif
(10)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq118_HTML.gif is the set active receivers (BB transmitters).
Unlike the case when two links compete for resources, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq119_HTML.gif is no longer equivalent to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq120_HTML.gif in the threshold test (8). This is because in (9) the interference powers from multiple transmitters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq121_HTML.gif add up. Consequently, the total CCI at data receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq122_HTML.gif may exceed the tolerable threshold such that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq123_HTML.gif , although the BB power (10) observed by the individual interferers https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq124_HTML.gif is below the threshold, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq125_HTML.gif . On the other hand, in (10) the interfering BB powers from multiple simultaneously active receivers observed at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq126_HTML.gif add up. It is, therefore, possible that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq127_HTML.gif , so that link https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq128_HTML.gif is prohibited from accessing chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq129_HTML.gif , although its individual CCI contribution, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq130_HTML.gif would be below https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq131_HTML.gif . Note that the former effect partly compensates the latter. Moreover, in many cases the interference is dominated by one strong interfering source. Therefore, the threshold test (8) provides a good approximation to the level of interference potentially caused to the active receivers.

4.3. Initial Access in Contention

Initial access of unreserved slots in BB-OFDMA is carried out in contention. During contention, two or more transmitters from adjacent cells may access chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq132_HTML.gif simultaneously. As a result, one or several links may encounter a collision on chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq133_HTML.gif where the SINR target is not met. To reduce the occurrence of simultaneously accessed chunks in contention, a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq134_HTML.gif -persistent chunk allocation procedure is applied to BB-OFDMA, where chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq135_HTML.gif in cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq136_HTML.gif is accessed with probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq137_HTML.gif . Denoting the outcome of the https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq138_HTML.gif -persistent chunk allocation with the binary random variable https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq139_HTML.gif , the access probability yields https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq140_HTML.gif . The impact of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq141_HTML.gif on the system performance is investigated in Section 6.1.

4.4. Decentralised Chunk Reservation with BB Signalling

The BB-OFDMA protocol enables a link https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq142_HTML.gif to contend for a chunk once it is ensured that the CCI caused to the coexisting links https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq143_HTML.gif in the neighbouring cells is below a given threshold (8). Prior to accessing chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq144_HTML.gif , transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq145_HTML.gif listens to the associated BB minislot. Whether a user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq146_HTML.gif within cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq147_HTML.gif may contend for chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq148_HTML.gif in (4) is controlled by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ11_HTML.gif
(11)
Chunks, where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq149_HTML.gif in (4), are allocated to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq150_HTML.gif . Those chunks where the achieved SINR is above a required SINR target, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq151_HTML.gif , are reserved by setting the reservation indicator https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq152_HTML.gif in (4), and are subsequently protected from CCI by BB broadcast. The BB broadcast from the intended data receiver is observed as a surge in the received BB power [14], which effectively notifies the transmitter that the data of chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq153_HTML.gif has been correctly received. User https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq154_HTML.gif then reserves chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq155_HTML.gif in the next frame https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq156_HTML.gif by setting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq157_HTML.gif in (5). On the other hand, if the transmitter does not detect a BB surge, it is understood that the SINR target was not met due to high CCI. These chunks are released by a reset of the reservation indicator to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq158_HTML.gif and setting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq159_HTML.gif , so that chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq160_HTML.gif may be assigned to other users.

4.5. Balancing System Throughput and Fairness

Cell-edge users are particularly affected by CCI for two reasons. First, the desired signal levels https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq161_HTML.gif are, on average, much weaker compared to users in close vicinity to the desired BS due to relatively low channel gains on their intended links https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq162_HTML.gif . Second, cell-edge users suffer from high CCI in the downlink, or cause high CCI to the adjacent cells in the uplink.
By tuning the interference threshold https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq163_HTML.gif in (8), the amount of CCI https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq164_HTML.gif caused to the receiver of a preestablished and coexisting link https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq165_HTML.gif is adjusted. Lowering https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq166_HTML.gif enforces a larger exclusion region around a vulnerable receiver. This enables cell-edge users to meet their SINR target https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq167_HTML.gif with a greater likelihood. On the other hand, by augmenting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq168_HTML.gif , the number of simultaneously served links increases, giving rise to an enhanced system throughput. However, the cell-edge users are less likely to maintain their SINR target as interference protection is gradually eliminated. The chunks are released where the SINR target is not met, which means that these chunks are no longer reserved. Since the cell-centre users are less exposed to CCI, the chunks released by the cell-edge users are likely to be reallocated to the cell-centre users. As the allocation of the resources is shifted from the cell-edge users towards the cell-centre users, fairness is compromised. Hence, by adjusting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq169_HTML.gif , system throughput is traded off for fairness.
A common measure to quantify fairness is Jain's fairness index [22], defined by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ12_HTML.gif
(12)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq170_HTML.gif is the number of users in a given cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq171_HTML.gif . The user throughput https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq172_HTML.gif accounts for the number of successfully transmitted/received bits by user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq173_HTML.gif , as defined in (5). A fairness index of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq174_HTML.gif represents a perfectly fair system where all users achieve the same throughput. On the other extreme, a fairness index of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq175_HTML.gif represents an unfair system where one user is served while all other users starve. We note that the fairness definition (12) is a relative measure, which ignores the absolute achieved throughput per user. To this end, a good fairness index https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq176_HTML.gif may coincide with poor spectrum utilisation. For instance, a system where two users achieve https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq177_HTML.gif Mbps and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq178_HTML.gif Mbps would result in a poorer fairness index than a system where both users achieve only https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq179_HTML.gif Mbps. When analysing fairness, the fairness definition (12) should therefore be considered jointly with user throughput results.
(1) Consequences for the Downlink In the downlink, MSs at the cell edge are exposed to high CCI from transmitters in adjacent cells (see Figure 2(a)). Note that the CCI observed at a given cell (cell 1 in Figure 2(a)) is independent of the user distribution in adjacent cells (cell 2 in Figure 2(a)), assuming a constant transmit power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq180_HTML.gif . This implies that if BS2 lies within the exclusion region of MS1, resources reserved by MS1 cannot be spatially reused by any of the links in cell 2. However, if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq181_HTML.gif is increased such that BS2 is located outside the exclusion region of MS1, all links in cell 2 qualify for a spatial reuse of the resources reserved by MS1. However, the SINR target at MS1 is less likely to be met. Should the SINR target at MS1 not be met, this would cause the chunk allocated to MS1 to be released and reallocated to another user served by BS1- possibly a user that is located closer to the the serving BS1. Therefore, the cell-edge throughput would suffer.
(2) Consequences for the Uplink In the uplink, the transmitters (MSs) are distributed uniformly over the coverage area of the BS (see Figure 2(b)). Unlike the downlink, the CCI at the tagged BS depends on which MS transmits in the adjacent cell. To this end, the CCI observed at BS1 in Figure 2(b) depends on whether MS2 or MS3 transmits to BS2. Suppose that in cell 2 both MS2 and MS3 contend with MS1 in cell 1 for chunks https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq182_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq183_HTML.gif . In case MS2 and MS1 simultaneously access chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq184_HTML.gif , while MS3 and MS1 simultaneously access chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq185_HTML.gif , the SINR at BS1 tends to be superior on chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq186_HTML.gif due to the lower CCI caused by MS3. While MS2 causes excessive CCI to BS1, MS1 and MS3 may share chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq187_HTML.gif , although both users might be located near the cell boundary. Thus the uplink benefits from interference diversity due to the distributed location of mobile users. As a result, the degradation of performance at the cell edge at high https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq188_HTML.gif in uplink mode is less severe compared to the downlink.

4.6. Interference Tolerance Signalling via Busy Bursts

With fixed power BB signalling, the same level of interference protection is given to all links, disregarding the quality of the intended link. In case two receivers MS1 and MS2 with respective channel gains https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq189_HTML.gif are exposed to the same interference, as illustrated in Figure 3, the SINR target https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq190_HTML.gif is more likely met for MS1 than for MS2. By allowing MS1 and MS2 to transmit a BB with variable power, the individual amount of interference that can be tolerated by MS1 and MS2 is signalled to candidate transmitters in adjacent cells. Exclusion regions of different size are effectively formed around MS1 and MS2, as illustrated in Figure 3.
For busy burst with interference tolerance signalling (BB-ITS), the objective is that a given SINR target, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq191_HTML.gif , is maintained for an active receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq192_HTML.gif . This means that the maximum allowable interference depends on the intended link quality https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq193_HTML.gif . Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq194_HTML.gif denote the interference limit, for which the SINR (2) approaches https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq195_HTML.gif . Then the tolerable interference at receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq196_HTML.gif is upper bounded by
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ13_HTML.gif
(13)
Adjusting the tolerable interference level (13) implies that larger exclusion regions are formed for links with weak desired signal levels https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq197_HTML.gif and vice versa.
To signal the variable interference tolerance level https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq198_HTML.gif of a victim receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq199_HTML.gif to candidate transmitters https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq200_HTML.gif in adjacent cells, the BB transmit power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq201_HTML.gif is adjusted, such that the simple threshold test https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq202_HTML.gif in (8) is retained. Hence no additional information for channel sensing is required for BB-ITS. The received BB power approaches a fixed threshold, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq203_HTML.gif , if the CCI approaches https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq204_HTML.gif . Inserting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq205_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq206_HTML.gif into (6) yields the variable BB power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq207_HTML.gif . Assuming that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq208_HTML.gif is fixed and denoted by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq209_HTML.gif , the BB transmit power is adjusted as follows [23]:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ14_HTML.gif
(14)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq210_HTML.gif is the maximum BB transmit power. The https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq211_HTML.gif operator ensures that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq212_HTML.gif . Note that when https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq213_HTML.gif , we get https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq214_HTML.gif . In this situation, the chunk is released and no BB is transmitted. Therefore, it is ensured that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq215_HTML.gif in (14) always has a positive value. We note that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq216_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq217_HTML.gif . It can be checked by plugging (14) into (8) that the threshold test (8) effectively checks if https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq218_HTML.gif , regardless of the threshold used, as long as the BB transmit power is not clipped. In this paper, we choose https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq219_HTML.gif dBm because the probability of BB transmit power being clipped was found to be lower than 0.05 for the given deployment scenario with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq220_HTML.gif  dB used. Furthermore, with this threshold, the received BB at the intended transmitter (the lower bound of which is approximated by https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq221_HTML.gif ) remains well above the noise floor https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq222_HTML.gif  dBm, such that it can be reliably detected.
Receiver feedback based on BB-ITS (see Section 4.6) allows for receiver-driven link adaptation, where the chosen transmission rate is adapted to the instantaneous channel conditions. Let https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq223_HTML.gif be the set of supported modulation schemes. Associated to each modulation scheme https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq224_HTML.gif is an SINR target https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq225_HTML.gif that must be achieved to satisfy a given frame error rate (FER).
Provided that the channel response does not change between successive frames, changes in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq226_HTML.gif may be signalled from receiver to transmitter through (14), since any fluctuation in received BB power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq227_HTML.gif is due to a change of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq228_HTML.gif in (14). In summary, BB-ITS serves two important objectives. First, by adjusting the SINR target https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq229_HTML.gif , the receiver implicitly signals to the transmitter through BB-ITS that the transmission format should be changed; second, by varying the BB power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq230_HTML.gif in (14), the size of the exclusion region around the active receiver is adjusted, so that the required SINR target https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq231_HTML.gif is met in successive frames.
Link adaptation with BB-ITS is carried out in two phases: the contention phase, where the link is established and the link adaptation (LA) phase, where the receiver adjusts its transmission format to the current channel conditions.
Contention Phase
In contention, multiuser chunk allocation is carried out as described in Section 4.3. To contend for an unreserved chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq232_HTML.gif , transmitter https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq233_HTML.gif initially uses the modulation scheme with the lowest spectral efficiency https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq234_HTML.gif . Chunks that satisfy https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq235_HTML.gif are reserved in the next frame https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq236_HTML.gif by BB signalling (see Section 4.4), where the transmit power https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq237_HTML.gif in (14) is set using https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq238_HTML.gif . Then the transmission proceeds to the link adaptation phase.
Link Adaptation Phase
The objective of the link adaptation phase is to select the modulation scheme https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq239_HTML.gif for chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq240_HTML.gif , which yields the highest spectral efficiency, for which https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq241_HTML.gif holds. By utilising BB-ITS link, adaptation is accomplished without any explicit feedback. The receiver executes the following algorithm.
(1)
Calculate the achieved SINR https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq242_HTML.gif at chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq243_HTML.gif .
 
(2)
Increment the number of bits per symbol based on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq244_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ15_HTML.gif
(15)
 
(3)
If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq245_HTML.gif , adjust the BB power (14) using the SINR target https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq246_HTML.gif and transmit the BB.
 
(4)
If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq247_HTML.gif , terminate the link adaptation phase and return to the contention phase.
 
The transmitter senses the BB minislot associated to chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq248_HTML.gif . In order to determine the modulation scheme https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq249_HTML.gif requested by the receiver, the transmitter executes the following algorithm.
(1)
Measure the busy signal power received from the intended data receiver https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq250_HTML.gif and compute the difference to the BB power received from intended data receiver in the preceding slot, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq251_HTML.gif .
 
(2)
The modulation format is adjusted based on https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq252_HTML.gif as follows:
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ16_HTML.gif
(16)
where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq253_HTML.gif , https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq254_HTML.gif . The constant https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq255_HTML.gif introduces a detection margin to enhance the robustness towards estimation errors in https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq256_HTML.gif due to channel variations and noise.
 
(3)
If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq257_HTML.gif , transmit data on chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq258_HTML.gif using the new modulation scheme https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq259_HTML.gif .
 
(4)
If https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq260_HTML.gif , terminate the link adaptation phase and return to the contention phase.
 
Estimation errors due to channel variations and noise may cause detection errors, so that https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq261_HTML.gif . Mismatch between the selected modulation schemes at transmitter and receiver can be mitigated if the transmitter announces https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq262_HTML.gif together with payload data on chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq263_HTML.gif .

4.8. Benchmark System

Full-frequency reuse with adaptive score-based chunk allocation (ASCA) is considered as the benchmark system. This means that neither chunk reservation nor interference avoidance mechanisms is in place. In order to maintain a fair comparison, the same fair scheduling algorithm (3) as in BB-OFDMA is applied. With ASCA, the score-based scheduler assigns chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq264_HTML.gif to user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq265_HTML.gif whose score (3) is minimised
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_Equ17_HTML.gif
(17)
Chunk allocation for ASCA (17) corresponds to (4) by setting the reservation indicator to zero, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq266_HTML.gif , and by allowing a cell to access all chunks, which is achieved by setting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq267_HTML.gif for all https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq268_HTML.gif in (3).

5. Manhattan Grid Deployment

An urban microcell deployment with a rectangular grid of streets (Manhattan grid) as defined in scenario B1 in WINNER [17] is considered, where antennas are mounted below the rooftop. The deployment scenario consists of building blocks of dimensions 200 m   https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq269_HTML.gif   200 m, interlaced with the streets of width 30 m, forming a regular structure called the Manhattan grid, as shown in Figure 4. The network consists of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq270_HTML.gif building blocks (72 BSs). However, the performance statistics are collected only over the central core of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq271_HTML.gif building blocks (6 BSs), so as to reduce edge effects.
On average https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq272_HTML.gif  MSs are served by one cell, uniformly distributed in the streets and moving with a constant velocity of 5 km/h. BSs are placed in the middle of the street canyons with an inter-BS distance of 4 building blocks, as depicted in Figure 4. Distance dependent path loss, log-normal shadowing, and frequency selective fading are taken into account, as specified in [24], channel model B1. While the effect of user mobility on the channel response due to the Doppler effect is taken into account, movement of users along the streets is not considered during the duration of one snapshot. Links where transmitter and receiver are located on the same street are modelled as line-of-sight (LoS) channels, with significantly lower path loss attenuation than nonline-of-sight (NLoS) links [24]. WINNER channel models B1-LOS and B1-NLOS [24] are used to model the LoS and NLoS channels, respectively. MSs are connected to the BS with the least path loss. A network synchronised in time and frequency is assumed.
The traffic in the system is modeled as a burst of 100 protocol data units (PDUs) whose interarrival time is exponentially distributed. A PDU of 112 bit is assumed, which is the smallest unit of data that can be transmitted in one chunk. The average offered load per user https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq273_HTML.gif is adjusted by the interburst duration. It is considered that the arrival times for different users are independent. The maximum number of chunks that a user can be assigned in a given slot is the total number of available chunks in a frame. The simulation parameters are summarised in Table 1.
Table 1
Simulation parameters.
Parameters
Value
Carrier centre frequency
3.95 GHz
System bandwidth https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq274_HTML.gif
89.84 MHz
No. of subcarriers (SCs)
1840
Subcarriers spacing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq275_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq276_HTML.gif kHz
OFDM symbols/frame https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq277_HTML.gif
30
OFDM symbol duration https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq278_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq279_HTML.gif s
Frame duration
0.6912 ms
No. of chunks/frame https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq280_HTML.gif
230
Chunk size https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq281_HTML.gif
8 (freq.) https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq282_HTML.gif 15 (time) = 120
PDU size
112 bits
Access probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq283_HTML.gif
0.3
No. of sectors/cell
1
No. of users/cell https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq284_HTML.gif
10
Tx power/chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq285_HTML.gif
16.4 dBm
Antenna gain
0 dBi
Noise level/chunk https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq286_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq287_HTML.gif dBm
No. of snapshots
500
Snapshot duration
75 ms
User load https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq288_HTML.gif
30 Mbps
A https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq289_HTML.gif -rate convolutional code and the SINR targets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq290_HTML.gif for a given modulation scheme https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq291_HTML.gif are selected to attain a packet error ratio of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq292_HTML.gif per PDU, given in Table 2. For nonadaptive modulation, we consider a 16-QAM constellation with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq293_HTML.gif and a corresponding SINR target of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq294_HTML.gif dB. For link adaptation, the modulation schemes https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq295_HTML.gif are chosen based on the achieved SINR targets https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq296_HTML.gif .
Table 2
Look up table for modulation scheme.
Modulation, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq297_HTML.gif link PDUs per slot
Achieved SINR https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq298_HTML.gif (dB)
No transmission https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq299_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq300_HTML.gif
BPSK https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq301_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq302_HTML.gif
QPSK https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq303_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq304_HTML.gif
Cross 8-QAM https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq305_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq306_HTML.gif
16-QAM https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq307_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq308_HTML.gif
Cross 32-QAM https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq309_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq310_HTML.gif
64-QAM https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq311_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq312_HTML.gif
Cross 128-QAM https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq313_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq314_HTML.gif
256-QAM https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq315_HTML.gif
https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq316_HTML.gif

6. Results and Discussion

The performance of BB-OFDMA and the benchmark system (ASCA) are evaluated in terms of user and system throughput. User throughput is defined as the number of successfully received bits per user per unit time. A transmission is considered successful if the SINR target https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq317_HTML.gif is met at the receiver. The system throughput is defined as the aggregate throughput of all users per cell.

6.1. Collisions Based on Access Probability

The likelihood of achieving the SINR target during the initial access in contention is depicted in Figure 5 for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq318_HTML.gif with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq319_HTML.gif dB, where https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq320_HTML.gif is the number of bits per symbol. The cell-edge region suffers from collisions (SINR target not met) both in the uplink (Figure 5(a)) and the downlink (Figure 5(b)). Decreasing the access probability https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq321_HTML.gif substantially reduces the occurrence of collisions, since the probability of simultaneous access of chunks in contention reduces (see Section 4.3). In the downlink, cell-edge users suffer from weaker desired signal power and at the same time experience strong CCI. Furthermore, the users located at the street crossings at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq322_HTML.gif m are exposed to strong LoS interference from BSs in the perpendicular streets. In the uplink, however, these users cause CCI to the neighbouring cells; which may impact either users at the cell-edge or users closer to the intended BS. Consequently, the SINR target is met with less likelihood at street crossings and the cell edge in the downlink mode compared to the uplink mode.

6.2. Setting the Threshold for Fixed Power BB Signalling

The impact of the choice of interference threshold on the mean system throughput is shown in Figure 6 for fixed 16-QAM modulation with https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq328_HTML.gif . It is seen that for lower values of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq329_HTML.gif , the amount of allocated resources (Set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq330_HTML.gif ) and the achieved throughput (Set https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq331_HTML.gif ) are approximately equal. This is because at low https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq332_HTML.gif , larger exclusion regions around active receivers are enforced. Thus, CCI is mitigated at the expense of spatial reuse. By increasing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq333_HTML.gif , the system throughput gradually improves until the maximum is reached. However, increasing https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq334_HTML.gif introduces additional links that cause more CCI to the existing links. As a result, some of the links (mainly cell-edge users) are less likely to meet the SINR target. Although it is desirable to maximise the spectral efficiency, it may be necessary to maintain a fair distribution of resources to all users. Achieving a balance between maximising spectral efficiency and enhancing fairness is addressed in Section 6.3.

6.3. Impact of Interference Threshold on Fairness

Figure 7 shows the average user throughput versus distance https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq338_HTML.gif from the serving BS. It is observed that the performance of BB-OFDMA is sensitive to the chosen threshold https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq339_HTML.gif . The system throughput is maximised for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq340_HTML.gif dBm in the downlink and for https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq341_HTML.gif dBm in the uplink (see Figure 6). However, these thresholds severely affect cell-edge user throughput. Increasing interference protection by lowering https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq342_HTML.gif enhances user throughput at the cell edge at the expense of system throughput. In the uplink (Figure 7(a)), the cell edge throughput (measured at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq343_HTML.gif m from the desired BS) improves from 1.5 Mbps ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq344_HTML.gif dBm) to 3.08 Mbps ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq345_HTML.gif  dBm), an approximately onefold increase, whereas in the downlink (Figure 7(b)), user throughput increases from 267 kbps ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq346_HTML.gif dBm) to 2.9 Mbps ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq347_HTML.gif dBm), an approximately tenfold increase. At https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq348_HTML.gif m, MSs are exposed to LOS interference from BSs in perpendicular streets in the downlink. Consequently, high CCI compromises throughput for these users. In the uplink, MSs located at street crossings at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq349_HTML.gif m transmit, so that these users are not exposed to LOS interference. Hence the uplink throughput of ASCA is not affected at https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq350_HTML.gif m. For BB-OFDMA, however, MSs located at street crossings are exposed to strong BB signals from BSs in perpendicular streets, which reduces the number of chunks such users can compete for, causing a drop of throughput for users located at street crossings.
Fairness is numerically quantified using Jain's fairness index (12). The cdf of the fairness distribution is presented in Figure 8(a) for the uplink and Figure 8(b) for the downlink. Applying the interference threshold that maximises system throughput, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq355_HTML.gif dBm in the downlink and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq356_HTML.gif dBm in the uplink, results in median fairness index of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq357_HTML.gif and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq358_HTML.gif respectively. Increasing the interference protection by lowering https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq359_HTML.gif improves fairness, as this enables cell-edge users to meet their SINR target. To this end, using https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq360_HTML.gif dBm in the uplink and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq361_HTML.gif dBm in the downlink, approximately 22% of system throughput, is traded off for median fairness indices of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq362_HTML.gif . In the uplink, the median fairness index can be further improved to 0.78 by setting https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq363_HTML.gif dBm. However, the improved fairness significantly degrades system throughput (see Figure 6).
On the other hand, with BB-ITS, median fairness indices of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq364_HTML.gif 0.7 are achieved. The corresponding average uplink and downlink user throughputs at the cell edge amount to 2.57 Mbps and 2.99 Mbps, respectively. The corresponding reduction in system throughput compared to the respective optimal thresholds with fixed power BB is only 1% in the uplink and 8% in the downlink. Note that BB-OFDMA with fixed BB power requires a 22% reduction in system throughput for a comparable performance at the cell edge. In light of this, BB-ITS results in a better tradeoff between system throughput and fairness.
For comparison, the median fairness resulting from ASCA is https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq365_HTML.gif in the uplink and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq366_HTML.gif in the downlink. The corresponding average user throughputs at the cell edge are 2.278 Mbps and 208 kbps, respectively. This means that ASCA is more fair in the uplink compared to the downlink. The reason is that in the downlink cell-edge users are exposed to high CCI, while in the uplink cell-edge users cause high CCI to adjacent cells. Hence the detrimental effects of interference on the uplink tend to be more equally distributed among all users.

6.4. Comparison between BB-OFDMA and ASCA

Figures 9(a)9(d) depict the cumulative distribution function (cdf) of the user throughput and the system throughput. The results shown in Figures 9(a)-9(b) demonstrate that BB-enabled interference avoidance exhibits a gain in median system throughput of up to 50% compared to ASCA, both in uplink and downlink. Using a modulation format of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq367_HTML.gif  bits per symbol and a https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq368_HTML.gif -rate convolutional code, the upper bound on system throughput achieved in an isolated cell (CCI free system) is 111.8 Mbps. With https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq369_HTML.gif dBm in the uplink and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq370_HTML.gif dBm in the downlink, a median system throughput of about https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq371_HTML.gif % and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq372_HTML.gif % of the upper bound (CCI free system) is achieved.
Figures 9(c)-9(d) show the cdf of the user throughput for BB-OFDMA and ASCA. When fairness is the primary concern, https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq373_HTML.gif dBm in the uplink and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq374_HTML.gif dBm in the downlink are preferable. Then the 10%-ile of the achieved user throughput amounts to https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq375_HTML.gif Mbps in the uplink (see Figure 9(c)) and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq376_HTML.gif Mbps in the downlink (see Figure 9(d)). In contrast, ASCA fails to deliver any downlink throughput to more than 20% of the users. In the uplink, the 10%-ile of the user throughput of BB-OFDMA is improved by 40% compared to ASCA. With these uplink and downlink thresholds of https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq377_HTML.gif dBm and https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq378_HTML.gif dBm, the median system throughput of BB-OFDMA is still 15% and 18% higher than that achieved with ASCA (see Figures 9(a)-9(b)).
The results of BB-OFDMA with variable BB power, termed BB-ITS, are also included in Figures 9(a)9(d). With BB-ITS, the lower 10%-ile of user throughput achieved is 1.04 Mbps in uplink and 1.416 Mbps in downlink (see Figures 9(c)-9(d)), at a modest degradation in system throughput (see Figures 9(a)-9(b)) compared to BB-OFDMA with fixed threshold that maximises the respective system throughput. BB-ITS, therefore, not only avoids the need for tuning the interference threshold so as to match a certain interference scenario (e.g., in uplink or downlink), but also achieves a preferable compromise between maximising system throughput and maintaining fairness.
Figures 10(a)-10(b) compare the system and user throughput achieved by performing link adaptation (LA) with BB-ITS and ASCA. Both BB-ITS and ASCA utilise the same link adaptation algorithm presented in Section 4.7; the only difference is that for ASCA interference protection is omitted. The results shown in Figure 10(a) reveal that BB-ITS with link adaptation attains an improvement of 50% (uplink) and 13% (downlink) in median system throughput compared to ASCA with link adaptation. Furthermore, Figure 10(b) shows that the BB-ITS outperforms ASCA by a factor of 2.75 in terms of the lower 10%-ile of the downlink user throughput. On the other hand, the cell-edge user throughput of BB-ITS and ASCA in the UL is comparable, while significant improvements of up to 70% are observed for higher percentiles of the user throughput in Figure 10(b).
By performing link adaptation with BB-ITS, the cell-edge users benefit in the downlink, whereas the users that are closer to their desired BS benefit in the uplink. The reason for this opposite trend for the uplink and the downlink is elaborated in the following. Due to the specific point-to-multipoint structure in the downlink, the CCI observed by the cell-edge users is dominated by the interference originating from the closest BS. When a chunk is assigned to a cell-edge user in the downlink, interference tolerance signalling enforces that this chunk cannot be spatially reused by the closest BS in an adjacent cell. By ensuring that, this dominant interferer does not access this chunk, the achieved SINR is greatly improved, potentially enough to meet the higher SINR target(s), thus allowing for the higher-order modulation schemes. In the uplink, on the other hand, the chunks assigned to the cell-edge users are more likely to be reused in the adjacent cells due to the distributed location of the MSs transmitters (see Section 4.5). Consequently, it is less likely that a more spectrally efficient modulation scheme can be used by the cell-edge users. Furthermore, in the uplink, the distance between the MSs (transmitters) and the victim BSs (receivers) in neighbouring cells is larger for the cell-centre MSs than the cell-edge users. Hence the cell-centre users are more likely to be located outside the exclusion range of BSs receivers (BB transmitters). This results in a larger number of chunks that are available to be spatially reused for the cell-centre users. Lastly, the cell-centre users also benefit from higher SINRs as a result of which throughput is particularly boosted by performing link adaptation.

7. Conclusions

In this paper, the busy signal concept for decentralised and self-organised interference aware medium access has been applied to OFDMA-TDD systems operated in Manhattan grid deployment scenarios. An exclusion zone around victim receivers is established by means of receiver feedback in the form of time-multiplexed busy bursts (BBs), wherein no active transmitter from an adjacent cell may be located. BB enabled interference avoidance exhibits impressive gains in system and user throughputs compared to the benchmark system, with full-frequency reuse without interference avoidance, both in the uplink and the downlink. The impact of the BB specific threshold parameter that controls the interference imposed on coexisting links in neighbouring cells has been studied.
By adjusting this threshold parameter, the system benefits from flexible operation of either achieving high system throughput or enhanced fairness in terms of cell-edge user throughput. A onefold (uplink) and tenfold (downlink) improvement in average cell-edge user throughput is achieved at a reduction in system throughput of about https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq379_HTML.gif ( https://static-content.springer.com/image/art%3A10.1155%2F2009%2F462396/MediaObjects/13638_2008_Article_1667_IEq380_HTML.gif 20 Mbps/cell) in both cases. BB-enabled interference avoidance is therefore particularly powerful in enhancing downlink cell-edge user throughput, since in the downlink high interference is coupled with low-desired signal levels, resulting in poor average SINRs at the cell edge. In the uplink, on the other hand, cell-edge users cause high CCI, so that the detrimental effects of uplink interference are distributed more equally among all users, giving rise to interference diversity.
By allowing each receiver to signal the amount of interference it can tolerate, by using a variable busy burst power, an even better tradeoff between system throughput and fairness is achieved. Especially in the downlink, a tenfold improvement has been achieved at the cost of only 8% reduction in maximum system throughput. Furthermore, this scheme also alleviates the need to adjust the BB threshold parameter. The latter property is particularly important for self-organising wireless networks, as the optimum choice of the BB threshold is sensitive to changes in the network topology, and may not be known a priori.
Finally, link adaptation has been combined with busy burst-enabled interference avoidance, where changes in the transmission format are implicitly signalled to the transmitter by virtue of a variable BB power. BB signalling with link adaptation attained a superior performance than the benchmark system with link adaptation, both in terms of system throughput and user throughput. Due to the particular interference scenario, the cell-edge users achieved larger gains in the downlink whereas the cell-centre users benefitted more in the uplink. Consequently, larger gains in system throughput in the uplink mode were achieved compared to the gains achieved in the downlink mode.

Acknowledgments

Initial parts of this work have been supported by DFG Grant HA 3570/1-2 within the program SPP-1163 (Techniken, Algorithmen und Konzepte für zukünftige COFDM Systeme-TakeOFDM) while some latter parts of this work have been performed within the framework of the IST Project IST-4-027756 WINNER, which is partly funded by the European Union. Harald Haas acknowledges the Scottish Funding Council support of his position within the Edinburgh Research Partnership in Engineering and Mathematics between the University of Edinburgh and Heriot Watt University. This work was presented in part at the IEEE International Symposium of Personal, Indoor and Mobile Radio Communications (PIMRC) 2008, Cannes, France.
Open Access This article is distributed under the terms of the Creative Commons Attribution 2.0 International License ( https://​creativecommons.​org/​licenses/​by/​2.​0 ), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Literatur
1.
Zurück zum Zitat IEEE802.11a-1999 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications; High-Speed Physical Layer in the 5 GHz Band. IEEE Standard Institution, Piscataway, NJ, USA, 1999 IEEE802.11a-1999 : Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications; High-Speed Physical Layer in the 5 GHz Band. IEEE Standard Institution, Piscataway, NJ, USA, 1999
2.
Zurück zum Zitat ETSI EN 300 744 v1.5.1 (2004-06) : Digital Video Broadcasting (DVB); Framing Structure, Channel Coding and Modulation for Digital Terrestrial Television. European Telecommunications Standards Institute (ETSI), June 2004 ETSI EN 300 744 v1.5.1 (2004-06) : Digital Video Broadcasting (DVB); Framing Structure, Channel Coding and Modulation for Digital Terrestrial Television. European Telecommunications Standards Institute (ETSI), June 2004
3.
Zurück zum Zitat 3rd Generation Partnership Project (3GPP) : Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels and Modulation (Release 8). Technical Specification Group Radio Access Network, 3GPP TS 36.211 V8.2.0, 3GPP March 2008 3rd Generation Partnership Project (3GPP) : Evolved Universal Terrestrial Radio Access (E-UTRA); Physical Channels and Modulation (Release 8). Technical Specification Group Radio Access Network, 3GPP TS 36.211 V8.2.0, 3GPP March 2008
4.
Zurück zum Zitat Sternad M, Svensson T, Ottosson T, Ahlen A, Svensson A, Brunstrom A: Towards Systems Beyond 3G Based on Adaptive OFDMA Transmission. Proceedings of the IEEE 2007, 95(12):2432-2455.CrossRef Sternad M, Svensson T, Ottosson T, Ahlen A, Svensson A, Brunstrom A: Towards Systems Beyond 3G Based on Adaptive OFDMA Transmission. Proceedings of the IEEE 2007, 95(12):2432-2455.CrossRef
5.
Zurück zum Zitat Elayoubi S-E, Ben Haddada O, Fourestie B: Performance evaluation of frequency planning schemes in OFDMA-based networks. IEEE Transactions on Wireless Communications 2008, 7(5, part 1):1623-1633.CrossRef Elayoubi S-E, Ben Haddada O, Fourestie B: Performance evaluation of frequency planning schemes in OFDMA-based networks. IEEE Transactions on Wireless Communications 2008, 7(5, part 1):1623-1633.CrossRef
6.
Zurück zum Zitat Necker MC: Local interference coordination in cellular OFDMA networks. Proceedings of the 66th IEEE Vehicular Technology Conference (VTC '07), September-October 2007, Baltimore, Md, USA 1741-1746. Necker MC: Local interference coordination in cellular OFDMA networks. Proceedings of the 66th IEEE Vehicular Technology Conference (VTC '07), September-October 2007, Baltimore, Md, USA 1741-1746.
7.
Zurück zum Zitat Heikkinen SM, Haas H, Povey GJR: Investigation of adjacent channel interference in UTRA-TDD system. Proceedings of the IEE Colloquium on UMTS Terminals and Software Radio, April 1999, Glasgow, UK 13/1-13/6. Heikkinen SM, Haas H, Povey GJR: Investigation of adjacent channel interference in UTRA-TDD system. Proceedings of the IEE Colloquium on UMTS Terminals and Software Radio, April 1999, Glasgow, UK 13/1-13/6.
9.
Zurück zum Zitat Bharucha Z, Haas H: Application of the TDD underlay concept to home nodeB scenario. Proceedings of the 67th IEEE Vehicular Technology Conference (VTC '08), May 2008, Singapore 56-60. Bharucha Z, Haas H: Application of the TDD underlay concept to home nodeB scenario. Proceedings of the 67th IEEE Vehicular Technology Conference (VTC '08), May 2008, Singapore 56-60.
10.
Zurück zum Zitat Tobagi FA, Kleinrock L: Packet switching in radio channels—part II: the hidden terminal problem in carrier sense multiple-access and the busy-tone solution. IEEE Transactions on Communications 1975, 23(12):1417-1433. 10.1109/TCOM.1975.1092767CrossRefMATH Tobagi FA, Kleinrock L: Packet switching in radio channels—part II: the hidden terminal problem in carrier sense multiple-access and the busy-tone solution. IEEE Transactions on Communications 1975, 23(12):1417-1433. 10.1109/TCOM.1975.1092767CrossRefMATH
11.
Zurück zum Zitat Haas ZJ, Deng J: Dual busy tone multiple access (DBTMA)—a multiple access control scheme for ad hoc networks. IEEE Transactions on Communications 2002, 50(6):975-985. 10.1109/TCOMM.2002.1010617CrossRef Haas ZJ, Deng J: Dual busy tone multiple access (DBTMA)—a multiple access control scheme for ad hoc networks. IEEE Transactions on Communications 2002, 50(6):975-985. 10.1109/TCOMM.2002.1010617CrossRef
12.
Zurück zum Zitat Zhao R, Walke B, Einhaus M: Constructing efficient multi-hop mesh networks. Proceedings of the 30th Anniversary IEEE Conference on Local Computer Networks (LCN '05), November 2005, Sydney, Australia 166-173.CrossRef Zhao R, Walke B, Einhaus M: Constructing efficient multi-hop mesh networks. Proceedings of the 30th Anniversary IEEE Conference on Local Computer Networks (LCN '05), November 2005, Sydney, Australia 166-173.CrossRef
13.
Zurück zum Zitat Omiyi PE, Haas H: Improving time-slot allocation in 4th generation OFDM/TDMA TDD radio access networks with innovative channel-sensing. Proceedings of the IEEE International Conference on Communications (ICC '04), June 2004, Paris, France 6: 3133-3137. Omiyi PE, Haas H: Improving time-slot allocation in 4th generation OFDM/TDMA TDD radio access networks with innovative channel-sensing. Proceedings of the IEEE International Conference on Communications (ICC '04), June 2004, Paris, France 6: 3133-3137.
14.
Zurück zum Zitat Omiyi P, Haas H, Auer G: Analysis of TDD cellular interference mitigation using busy-bursts. IEEE Transactions on Wireless Communications 2007, 6(7):2721-2731.CrossRef Omiyi P, Haas H, Auer G: Analysis of TDD cellular interference mitigation using busy-bursts. IEEE Transactions on Wireless Communications 2007, 6(7):2721-2731.CrossRef
15.
Zurück zum Zitat Haas H, Nguyen VD, Omiyi P, Nedev N, Auer G: Interference aware medium access in cellular OFDMA/TDD networks. Proceedings of the IEEE International Conference on Communications (ICC '06), July 2006, Istanbul, Turkey 4: 1778-1783. Haas H, Nguyen VD, Omiyi P, Nedev N, Auer G: Interference aware medium access in cellular OFDMA/TDD networks. Proceedings of the IEEE International Conference on Communications (ICC '06), July 2006, Istanbul, Turkey 4: 1778-1783.
16.
Zurück zum Zitat Ghimire B, Haas H, Auer G: Busy burst enabled interference avoidance in winner-TDD. Proceedings of the 18th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '07), September 2007, Athens, Greece 1-5. Ghimire B, Haas H, Auer G: Busy burst enabled interference avoidance in winner-TDD. Proceedings of the 18th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (PIMRC '07), September 2007, Athens, Greece 1-5.
18.
Zurück zum Zitat Haas H, McLaughlin S (Eds): Next Generation Mobile Access Technologies: Implementing TDD. Cambridge University Press, Cambridge, UK; 2008. Haas H, McLaughlin S (Eds): Next Generation Mobile Access Technologies: Implementing TDD. Cambridge University Press, Cambridge, UK; 2008.
19.
Zurück zum Zitat Rappaport TS: Wireless Communications: Principles and Practice. 2nd edition. Prentice Hall, Upper Saddle River, NJ, USA; 2001.MATH Rappaport TS: Wireless Communications: Principles and Practice. 2nd edition. Prentice Hall, Upper Saddle River, NJ, USA; 2001.MATH
20.
Zurück zum Zitat Wang W, Ottosson T, Sternad M, Ahlén A, Svensson A: Impact of multiuser diversity and channel variability on adaptive OFDM. Proceedings of the 58th IEEE Vehicular Technology Conference (VTC '03), October 2003, Orlando, Fla, USA 1: 547-551. Wang W, Ottosson T, Sternad M, Ahlén A, Svensson A: Impact of multiuser diversity and channel variability on adaptive OFDM. Proceedings of the 58th IEEE Vehicular Technology Conference (VTC '03), October 2003, Orlando, Fla, USA 1: 547-551.
21.
Zurück zum Zitat Bonald T: A score-based opportunistic scheduler for fading radio channels. Proceedings of the European Wireless Conference (EWC '04), February 2004, Barcelona, Spain 283-292. Bonald T: A score-based opportunistic scheduler for fading radio channels. Proceedings of the European Wireless Conference (EWC '04), February 2004, Barcelona, Spain 283-292.
22.
Zurück zum Zitat Jain R, Chiu D, Hawe W: A quantitative measure of fairness and discrimination for resource allocation in shared computer systems. DEC, Maynard, Mass, USA; 1984. Jain R, Chiu D, Hawe W: A quantitative measure of fairness and discrimination for resource allocation in shared computer systems. DEC, Maynard, Mass, USA; 1984.
23.
Zurück zum Zitat Agyapong P, Haas H, Tyrrell A, Auer G: Interference tolerance signaling using TDD busy tone concept. Proceedings of the 65th IEEE Vehicular Technology Conference (VTC '07), April 2007, Dublin, Ireland 2850-2854. Agyapong P, Haas H, Tyrrell A, Auer G: Interference tolerance signaling using TDD busy tone concept. Proceedings of the 65th IEEE Vehicular Technology Conference (VTC '07), April 2007, Dublin, Ireland 2850-2854.
Metadaten
Titel
Busy Bursts for Trading off Throughput and Fairness in Cellular OFDMA-TDD
verfasst von
Birendra Ghimire
Gunther Auer
Harald Haas
Publikationsdatum
01.12.2009
Verlag
Springer International Publishing
DOI
https://doi.org/10.1155/2009/462396

Weitere Artikel der Ausgabe 1/2009

EURASIP Journal on Wireless Communications and Networking 1/2009 Zur Ausgabe