Abstract
A semicentralized joint cell muting and user scheduling scheme for interference coordination in a multicell network is proposed under two different temporal fairness criteria. In the proposed scheme, at a decision instant, each base station (BS) in the multicell network employs a celllevel scheduler to nominate one user for each of its inner and outer sections and their available transmission rates to a networklevel scheduler which then computes the potential overall transmission rate for each muting pattern. Subsequently, the networklevel scheduler selects one pattern to unmute, out of all the available patterns. This decision is shared with all celllevel schedulers which then forward data to one of the two nominated users provided the pattern they reside in was chosen for transmission. Both user and pattern selection decisions are made on a temporal fair basis. Although some pattern sets are easily obtainable from static frequency reuse systems, we propose a general pattern set construction algorithm in this paper. As for the first fairness criterion, all cells are assigned to receive the same temporal share with the ratio between the temporal share of a cell center section and that of the cell edge section being set to a fixed desired value for all cells. The second fairness criterion is based on maxmin temporal fairness for which the temporal share of the networkwide worst case user is maximized. Extensive numerical results are provided to validate the effectiveness of the proposed schemes and to study the impact of choice of the pattern set.
1. Introduction
Frequency reuse of the scarce radio spectrum is key to building high capacity wireless cellular networks [1, 2]. However, when frequency reuse increases as in a frequency reuse 1 LTE system for which all cells use the same band of frequencies, controlling the adverse impact of Intercell Interference (ICI) is a challenging task, especially for cell edge users. Mitigationbased Intercell Interference Coordination (ICIC) consists of methods that are employed to reduce ICI through approaches such as interference cancellation and adaptive beamforming [3]. Avoidancebased ICIC techniques consist of frequency reuse planning algorithms through which resources are restricted or allocated to users in time and frequency domains whereas power levels are also selected with the aim of increasing SINR and network throughput [1, 4]. Avoidancebased ICIC schemes can be static and frequency reusebased or dynamic and cell coordinationbased [1]. In static ICIC, the celllevel resource allocation is fixed and does not change over time. The most wellknown frequency reuse schemes include (i) conventional frequency reuse schemes, (ii) fractional frequency reuse (FFR), and (iii) soft frequency reuse (SFR). The focus of this paper will be on avoidancebased ICIC.
A conventional frequency reuse system with reuse factor statically partitions the system bandwidth into subbands each of which is allocated to individual cells with the reuse factor (typical values being 3, 4, or 7) determining the distance between any two closest interfering cells using the same subband [5]. In conventional frequency reuse systems, cell edge users are penalized due to poor channel conditions and ICI. In order to alleviate this situation, FFR partitions the system bandwidth into two groups, one for cell center (also referred to as inner or interior) users and the other for cell edge (outer or exterior) users. The association of a given user to a cell center or cell edge section is made on the basis of its distance from the serving BS or SINR measurements [6]. The frequency reuse parameter is set to unity for inner users whereas a strictly larger reuse factor (typically three) is used for outer users [3]. It is shown in [7] that the optimal frequency reuse factor for outer users is 3. Despite increased SINR for outer users as shown in [3], FFR has the apparent disadvantage that a subband of the outer group is left unused in cell center sections. On the other hand, SFR performs persection power allocation by assigning a lower (higher) transmission power to inner (outer) users thereby making it possible to use the whole frequency band for the cell center section. SFR is shown to be superior to FFR in achieving higher spectral efficiency [8, 9]. Moreover, using power optimization can improve the performance of SFR as shown in [10]. For other variations of static frequency reusebased ICIC schemes, we refer to the recent survey papers on ICIC specific to OFDMbased LTE networks [1, 2, 6].
In realistic cellular wireless networks, the traffic demand is spatially inhomogeneous and changes over time. At one time, users may be concentrated in a given cluster of cells while at other times user concentration may move to another cluster. Moreover, user distributions in the cell center and the cell edge sections may also change in time in an unpredictable way throughout the cellular network. Therefore, static frequency reusebased ICIC schemes fall short in coping with dynamic workloads in time and space and methods are proposed for dynamic workloads in [4, 11, 12]. Dynamic ICIC (DICIC), on the other hand, relies on cell coordinationbased methods that dynamically react to changes in traffic demands and user distributions [13]. Despite the apparent theoretical advantage of DICIC network throughput, most proposed schemes in this category are very complex to implement. DICIC schemes are categorized into centralized, semicentralized, and decentralized, on the basis of how celllevel coordination is achieved and subsequently the complexity of implementation of the underlying scheme [14]. In centralized DICIC, the channel state information of each user is fed to a centralized entity which then makes scheduling decisions to maximize the throughput under fairness and power constraints [15]. However, such centralized scheduling is complex to implement due to the requirement of timely and large peruser feedback information as well as the complexity of the centralized scheduler [16]. Semicentralized schemes use centralized entities which only perform celllevel coordination while userlevel allocation is performed by each BS [17, 18]. Reference [19] considers a semicentralized radio resource allocation scheme in OFDMA networks where radio resource allocation is performed at two layers. At the upper layer, a centralized algorithm coordinates ICI between BSs at the superframe level and each BS makes its scheduling decisions opportunistically based on instantaneous channel conditions of users. The computational complexity of semicentralized schemes is much less than centralized schemes with reduced feedback requirement; however, a sufficiently lowdelay infrastructure is still needed. In decentralized DICIC, there is no centralized entity but a local signaling exchange is still needed among BSs [14]. The focus of this paper is the multicell scheduling problem with semicentralized DICIC which can be implemented provided a lowdelay and efficient backhaul exists.
In nondense frequency reuse networks with , a singlecell scheduler decides which user to schedule without a need for coordination among cells. In this paper, we focus on opportunistic scheduling with fairness constraints. In opportunistic scheduling, the scheduler tries to select a user having the best channel condition at a given time [20]. Such a greedy opportunistic scheduler would maximize the throughput; however fairness among users would not be achieved. Practical opportunistic schedulers exploit the timevarying nature of the wireless channels for maximizing cell throughput under certain fairness constraints. In proportional fair (PF) scheduling, at a scheduling instant, the BS chooses to serve the user which has the largest ratio of available transmission rate to its exponentially smoothed average throughput [21, 22]. Different variations of the PF algorithm are possible depending on how the scheduler treats empty or short queues and how the average throughput is maintained [23]. In temporal fair (TF) (or airtime fair) singlecell opportunistic scheduling, the cell throughput is maximized under the constraint that users receive the same temporal share, that is, the same average airtime [24]. The work in [24] shows that the optimum singlecell TF scheduler chooses the user that has the largest sum of available transmission rate and another userdependent term when an appropriate channel model is available, or alternatively this additional term can be obtained using an online learning algorithm. Under some simplifying assumptions involving channel characteristics of users, the PF and TF methods are shown to be equivalent [22, 25]. We refer the reader to [26] for a survey on singlecell scheduling in LTE networks. There have been few studies to generalize singlecell fairness to multicell or networkwide fairness in multicell networks. Reference [27] shows via simulations that networkwide opportunistic scheduling and power control are effective for fairnessoriented networks. The authors in [28] propose a semicentralized approach to achieve intercell and intracell temporal fairness in multicell networks but userlevel networkwide fairness is not studied in that work.
In this paper, we focus on networkwide throughput maximization with two separate fairness criteria involving temporal fairness. Although PF scheduling is more commonly used in LTE networks [29], we choose TF criteria in this paper since it is relatively easier to tell whether a resource allocation scheme satisfies TF constraints in different time scales by means of monitoring timeuse of individual users, cells, and so on. This also makes it possible to propose semicentralized and computationally efficient algorithms for TF criteria which is in contrast with centralized approaches and higher computational complexities encountered in PFbased resource allocation in multicell networks [30]. In particular, we propose a semicentralized joint cell muting and user scheduling scheme for interference coordination in the downlink of a multicell network. In the proposed scheme, a set of cell muting patterns are a priori given each of which is associated with a set of cells that can transmit simultaneously with acceptable ICI in the multicell network. The scheduler operates in two levels (celllevel and networklevel) as in [19] as follows. Each BS employs a celllevel scheduler (CLS) to nominate one user for each of its inner and outer sections at a scheduling instant and their available transmission rates to the networklevel scheduler (NLS) on the basis of TF constraints. The NLS then computes the potential overall transmission rate for each muting pattern. Subsequently, the NLS decides which pattern to activate. This decision is then shared with all BSs. The BSs then forward data to one of the two nominated users (by the CLS) provided the pattern they reside in was chosen for transmission.
The CLS and NLS can be tuned to conform to one of two different temporal fairness criteria studied in this paper. As for the first fairness criterion, all cells receive the same temporal share with the ratio between the temporal share of a cell center section and that of the cell edge section being set to a fixed desired value for all cells. Within a section, all users receive the same temporal share. Although the first fairness criterion achieves fairness among cells and also users within the same section, this criterion does not seek networkwide user fairness. As a remedy, we propose using networkwide maxmin temporal fairness as the second fairness criterion. A broad range of centralized and/or distributed algorithms are available in the literature to implement maxmin fairness in the context of sharing resources including link bandwidth [31], network bandwidth [32], CPU [33], and cloud computing [34]. Algorithms seeking maxmin fairness in resource allocation problems involving wireless networks have been proposed in [35–37]. The high popularity of the notion of maxmin fairness in general computing and communication systems has led us to study in this paper the networkwide maxmin temporal fairness for which the temporal share of the networkwide worst case user in the multicell network is to be maximized. To the best of our knowledge, networkwide maxmin temporal fairness in this context has not been studied before. Both fairness criteria are shown to be handled within the framework we propose in this paper. As a further contribution, we propose a novel general pattern set construction algorithm with reasonable computational complexity using fractional frequency reuse principles with cell muting patterns. The complexity of the proposed NLS scheduler turns out to be the same as that of a singlecell TF scheduler with users and is therefore quite efficient for relatively small cardinality parameter . The impact of choice of the cell muting pattern set and its cardinality is also studied through numerical examples for various cellular topologies. The proposed approach leads to reduced computational complexity of the NLS and reduced information exchange requirements between CLSs and the NLS in comparison with centralized schemes that have higher implementation complexities [15].
Although most of the literature on the interference coordination techniques is based on OFDMbased LTE networks, we consider in this paper a timeslotted singlecarrier air interface for the sake of simplicity. Most of the wellknown wireless scheduling algorithms were originally designed for singlecarrier systems [38] such as proportional fair scheduler [21, 22], temporal fair scheduler [24], and maxweight scheduler [39]. Reference [38] presents existing work on how singlecarrier scheduling algorithms can be adapted to multicarrier environments including OFDMbased LTE networks. Multicarrier systems have their own requirements; for example, a user may have to use the same adaptive modulation and coding scheme on different carriers [29] or a user should be assigned consecutive carriers rather than an arbitrary subset of carriers [40]. These further requirements are known to give rise to complications in multicarrier adaptation [38]. The adaptation of the proposed singlecarrier multicell scheduler to multicarrier networks such as LTEA is deliberately left for future research.
The paper is organized as follows. We present the proposed multicell architecture along with the descriptions of cell muting patterns and pattern set construction algorithms in Section 2. The two forms of fairness criteria that we employ as well as the twolevel scheduler proposed to satisfy both criteria are presented in Section 3. We validate the effectiveness of the proposed approach in Section 4. Finally, we draw a conclusion.
2. Proposed Multicellular Architecture
2.1. Cells and Users
We consider the downlink of a timeslotted singlecarrier frequency reuse 1 unsectored cellular network (CN) with bandwidth where the time slots are indexed by . We assume that each cell is divided into inner and outer sections; see Figure 1 for a cell with cell radius and inner section radius . Let , , denote cell in the CN where is the total number of cells. Let denote the base station located in . Also let and denote the inner and outer sections of , respectively. We let denote the total number of users in the network and let , , and denote the number of users associated with cell and with sections and , respectively. The cell or section association of a given user is assumed to be a priori known throughout this paper. Obviously, and . Let , and , denote the user associated with and , respectively. We assume all users are persistent; that is, they always have data to receive. For a given time slot , the cell is active (unmuted) if its is transmitting. Otherwise, is said to be muted. When is active and is transmitting to a user in , then is called active; otherwise is active.
2.2. Cell Muting Patterns
A cell muting or transmission pattern (or pattern in short) is defined as a subset of the set of all sections in the CN satisfying the following two properties:(i)Patterns are noiselimited as opposed to being interferencelimited; that is, the elements of a pattern can be activated simultaneously without the associated base stations creating destructive interference on users associated with other active cells. Obviously, when a pattern is selected by the scheduler, all cells which do not have any inner or outer sections in that chosen pattern would be muted.(ii)Patterns are maximal; that is, a pattern cannot be included in another pattern with larger cardinality.
Obviously, a pattern is governed by the geometry of the CN, the power levels used by a BS for transmitting to inner and outer section users, and the definition of destructive interference.
In this paper, patterns are constructed on the basis of an underlying fractional frequency reuse (FFR) type CN; see [41, 42]. In our proposed architecture, the entire bandwidth of the frequency reuse 1 system is dynamically shared by the available patterns in time and not in frequency, by means of dynamically muting all but one pattern at a given time slot. Deployment of a general FFR system with for some nonnegative integers and can provide patterns for [5]. We call the set of patterns an Essential Pattern Set (EPS) for the associated FFR system. Among the patterns in ESP, except one transmission pattern which consists of all inner sections in the network, there are patterns each of which consists of a number of outer sections in the network. We call all such patterns a Mother Pattern Set (MPS). As an example, Figure 2 illustrates ESP3 which consists of four patterns in a 9cell CN. Here, MPS3 denotes the set .
On the other hand, a general pattern set (GPS) is an arbitrary collection of patterns in which each section in the CN is an element of at least one pattern. It is clear that EPS is a GPS. The Universal Pattern Set (UPS) is the set of all possible patterns. Obviously, GPSs are subsets of the UPS. A pattern is said to be active at a given slot if all the sections included in the pattern are active. A section may be included in multiple patterns for a GPS. However, for EPS, the patterns are mutually exclusive. Figure 3 illustrates a sample GPS for the 9cell CN; note that is an element of the three patterns , , and for this sample GPS.
2.3. General Pattern Set Construction Mechanism
In this section, we propose an algorithm to construct a GPS which can effectively be used in multicell networks. For this purpose, let the operator represent the interference relationship in an FFR system with implying the activation of sections and causing destructive interference of on and vice versa. In the lack of destructive interference between the two associated cells, we say . We assume that the interference is not destructive if its power is much lower (e.g., 5 times) than the noise power. The interference relationship which holds for any two given sections and depends on the following two parameters:(i)The physical distance between the BSs with which sections and are associated(ii)The transmission power levels assigned to inner and outer section users.
In order to quantify interference between two sections, we make use of the mother patterns in an FFR system. Let denote the distance between the centers of the nearest active cells in the patterns of MPS. According to [5], we have . Let us denote by the distance between the centers of and . Consequently, we have the following interference identities in an FFR system:Moreover, we consider different fixed downlink power levels for inner and outer section users, designed in a way that (1)–(3) hold. We note that, based on (2), meaning that at most one section per cell can be active at a time slot. The following theorem (given without a proof since it is relatively straightforward) provides the necessary and sufficient conditions for a set of sections to constitute a pattern in an associated FFR CN with cells.
Theorem 1. A set of sections amounts to a pattern if and only if(a),(b),(c),(d),(e) or .
In Theorem 1, the first three conditions are required for a pattern to be noiselimited whereas the remaining two conditions are required for a pattern to be maximal. One straightforward way to construct all transmission patterns (UPS) is an Exhaustive Search (ES) among all possible sets of sections of cardinality since each cell’s inner section or outer section is included in a given set or not, leading to three possibilities for each cell and there are such cells. In the ES method, all of these sets are generated first; then, using Theorem 1, one can check whether each set of sections is a pattern or not. Consequently, in order to check the validity of all the generated sets of sections, the ES method requires steps.
In this paper, we propose a novel algorithm with reduced computational complexity (compared to ES) to construct a GPS using MPS. For this purpose, we let be the patterns of MPS. Also, let denote the subset of the set of sections included in , where denotes the number of sections included in . For convenience, let and for each . Algorithm 1 proposes a method to generate a GPS using MPS for an arbitrary value of . Figure 4 illustrates the working principle of Algorithm 1 for . In Figure 4(a), one of the mother patterns in the FFR3 system is depicted. Figure 4(b) depicts one of the subsets of that mother pattern. Due to interference, neither the inner nor the outer sections of the shadowed cells can be a member of the new pattern in Figure 4(c) based on (1) and (2). In Figure 4(d), inner sections of the remaining cells are added to the pattern to attain maximality based on (3). It is clear that EPS is a subset of the pattern set constructed by this algorithm. This is because (i) the set of all inner sections is obtained as a pattern when we start from the subset for any and (ii) is obtained by Algorithm 1 when is used in the inner loop for every . According to the definition, the collection of all of these patterns is EPS. Next, we present Theorem 2 along with its proof showing that the pattern set produced by Algorithm 1 is indeed a GPS.

(a)
(b)
(c)
(d)
Theorem 2. The pattern set produced by Algorithm 1 is a GPS.
Proof. We need to show that the elements of the pattern set produced by Algorithm 1 are noiselimited and maximal and moreover each section in the CN is an element of at least one pattern in the pattern set. It is clear that all the patterns are noiselimited due to the way a new pattern, , is generated by Algorithm 1. This is because (i) is noiselimited since and is noiselimited for every and (ii) line of the algorithm ensures that any added inner section to does not make destructive interference. On the other hand, assume at least one of the generated patterns is not maximal meaning that we can at least add one other section (say section ) to it, while it remains noiselimited. Clearly, section cannot be an inner section, because Algorithm 1 adds all possible inner sections (line of Algorithm 1). On the other hand, cannot be an outer section because of assuming that is the outer section of cell with the inner section . If adding would not cause destructive interference, then adding also would not cause destructive interference. However, this contradicts with the way the algorithm works (line of Algorithm 1). To show that each section is an element of at least one pattern, recall that patterns which belong to MPS are among the generated patterns and each of the outer sections is an element of an individual MPS. Moreover, the set of all inner sections is obtained as a pattern when we start from the subset for any . This concludes the proof.
We now elaborate on the computational aspects of the GPS construction algorithm that we have proposed. The outer loop of Algorithm 1 requires iterations and the inner loop requires approximately iterations. To see this, there are mother patterns, namely, , and each mother pattern consists of approximately outer sections, so each inner loop will be executed approximately times. Therefore, the total number of required iterations is which is substantially less than that of the ES method. Moreover, the periteration computational load of Algorithm 1 is less than that of ES. However, recall that this GPS is only a subset of the UPS and there may be patterns in the UPS that cannot be constructed by the proposed algorithm. To evaluate the pattern construction capability of Algorithm 1, we consider two different CNs illustrated in Figure 5 depicting (a) 9cell and (b) 6cell scenarios, which will be used in numerical examples. We use the FFR3 interference relationships and subsequently MPS3 as input to the proposed algorithm. The ES and Algorithm 1 are run for each of the two scenarios and the patterns constructed by each method are presented in Tables 1 and 2, respectively, for the 9cell and 6cell scenarios. We observe that ES generates the UPS with cardinality 42 and cardinality 13, whereas Algorithm 1 constructs 22 and 10 patterns, respectively, for the 9cell and 6cell scenarios. Although the proposed algorithm cannot construct the UPS, we will later show through numerical examples that the network performance obtained by the GPS produced by the proposed algorithm is only slightly inferior to that attained by that of the UPS.
(a)
(b)
3. The Proposed Multicell Scheduler
In this section, we assume that the pattern set is a priori given whether being EPS, or the UPS if available, or the GPS produced by the algorithm presented in the previous section, or any other GPS. At a decision epoch , the NLS decides to activate one of the available patterns, say , from the available patterns in the GPS, and mutes all other patterns. How this decision is to be made will be discussed in the sequel.
3.1. PerPattern and PerUser Temporal Shares
Let , , and denote the longterm temporal (or equivalently airtime) share of pattern , user , and user , respectively:where denotes the conventional indicator function which is either one or zero depending on whether the argument is true or not, respectively. Similarly, let , , and denote the longterm airtime share of section , section , and cell , respectively. Mathematically, We introduce positive (target) scheduling weights for patterns satisfying . The target scheduling weight is the longterm target average probability that pattern is selected by the scheduler. Note that use of scheduling weight by the scheduler should give rise to . In this case, the system is said to be interpattern weighted temporal fair with respect to the weights . In the specific case of , the system is called interpattern temporal fair. Similarly, we introduce target positive scheduling weights and for user and user , respectively, satisfying and for each of the cells . We remark that the use of user scheduling weights and leads to , for any section and , for any section . In this case we have intrasection weighted temporal fairness in sections and , respectively, with respect to the weights and . In this paper, we only consider ordinary intrasection temporal fairness which leads to the following two identities:In case when or is zero, no peruser scheduling weights are assigned for that particular section. Moreover, no downlink transmission would take place due to the lack of a user in that section even if the included pattern is selected for transmission. Therefore, the only unknowns to the scheduler in the numerical examples of the current study are the perpattern weights. Once the weights are decided, then the following identities immediately hold:where and . In the next subsection, we focus on methods of obtaining these weights leading to two different forms of temporal fairness being sought in the CN.
3.2. Temporal Fairness Criteria
In this paper, we consider two different TF criteria for the multicell CN for which the perpattern weights can easily be obtained at reasonable computational complexity. The first TF criterion is the socalled Intersection Proportional Temporal Fairness (ISPTF) in which the CN is intercell temporal fair one but an inner section of each cell receives a temporal share proportional to the temporal share of the outer section of the same cell using the same networkwide proportionality constant. Mathematically, , and , hold for a fairness proportionality constant to be chosen by the network operator. As a matter of fact, employing causes the inner sections to be scheduled more often than the outer sections and vice versa for the case . It is clear that ISPTF cannot be achieved for some general pattern sets such as GPS of Figure 3. However, as stated in the theorem below, ISPTF is achievable when EPS is used as the pattern set.
Theorem 3. With EPS used as the pattern set, ISPTF is achieved by the following choice of weights:where and the pattern is the set of all inner sections of the CN; that is, .
Proof. We note that EPS MPS ∪ and , and are the temporal shares of th individual MPS and , respectively. Furthermore, the scheduler can guarantee that and . Patterns in MPS are mutually exclusive; thus for each section there is only one index , such that . Furthermore, . We thus conclude that, for all , there exists , such that . Recall that intercell fairness requires which in turn implies that . Moreover, using intersection fairness we have . Finally, the pattern weights sum to unity; that is, . Therefore, which implies that and .
For the special case of EPS3, there are patterns depicted in Figure 2 where the corresponding weights are and .
Although ISPTF criterion guarantees equal user temporal shares within each section, it does not seek networkwide fairness among all the network users. That is why ISPTF does not take into account the number of users located in each section for obtaining pattern weights . As a result, using ISPTF along with unbalanced user distribution may lead to unequal temporal share for the users located in different sections of the network. The second TF criterion we study in this paper is maxmin temporal fairness (MMTF) for which the pattern weights are selected so that the minimum user temporal share in the network is maximized. Thus, MMTF is a networkwide fairness criterion. The MMTF is easily shown to be reducible to the following linear program:where is the minimum networkwide user temporal share.
The convexity of optimization problem (10) follows from the linearity of the objective function and constraints [43]. It is not difficult to show that for a given GPS this linear program has at least one solution and in the case of a nonunique solution, the objective function value, that is, , is the same for all the solutions due to the convexity of the program. While there is no general closed form solution for MMTF, Theorem 4 provides a closed form solution when the patterns are mutually exclusive (e.g., EPS). When patterns are not mutually exclusive, there are numerous efficient numerical methods including simplex and interior point algorithms via which one can obtain a solution for MMTF with reasonable effort.
Theorem 4. If the patterns are mutually exclusive, the solution to the MMTF problem is unique and one haswhere denotes the number of users in the most crowded section of pattern ; that is, = .
Proof. Let and denote the solution of MMTF problem (10). Because the patterns are mutually exclusive, each section of the network is covered by one pattern. Therefore, according to (7), the minimum user airtime in pattern is . In other words, users in the most crowded section of pattern have the minimum airtime share among all the users in that pattern. The claim is that the value of is the same for every . Let us assume that the claim is not correct. Therefore, if the user with minimum airtime share is in pattern , then there exists at least one for which . It is clear that we can increase the minimum user airtime share in the network by decreasing and increasing . Therefore, and are not optimal which is contradiction and the claim is correct. We can conclude that . On the other hand, we know that . Eventually, we can find the unique solution of MMTF problem, that is, and , by solving the system of these independent linear equations as given in (11).
We should note that, unlike ISPTF, the MMTF problem always has a solution for any GPS. We also note that to solve the MMTF problem each is required to send the values and to the NLS which subsequently solves linear program (10) to obtain the perpattern scheduling weights . Note that it is not necessary to solve the MMTF problem at each time slot. Instead, the MMTF problem can be solved when the number of users in any one of the sections of the CN changes. Alternatively, the MMTF linear program can be solved if the change in the number of users in the individual sections of the CN is substantial and the previous solutions’ weights can be used until such a substantial change. It is clear that this alternative mechanism may reduce the computational burden on the NLS.
For the two fairness criteria studied in this paper, namely, ISPTF and MMTF, we have described methods by which the scheduling weights are obtained. Exploration of other temporal fairness criteria are left for future research. In the next subsection, we are going to introduce a twolevel scheduler that uses these scheduling weights so as to make opportunistic fair decisions to select patterns at the networklevel and also users belonging to these patterns at the celllevel.
3.3. TwoLevel Opportunistic Scheduler
In this section, we assume that the scheduling weights , , and are a priori given. Although the peruser scheduling weights in the current study are based on the identities (6), the proposed twolevel scheduler described later in this section works for arbitrary peruser scheduling weights and . Subsequently, we introduce a credit parameter for each inner section user and another credit parameter for each outer section user with these two peruser credit parameters maintained by the CLS at . We also introduce a credit parameter for each pattern maintained by the NLS. The initial values of all these credit parameters are set to zero at the beginning of network operation. We also define the instantaneous spectral efficiency (SE) () in units of bps/Hz for user () at time slot . In particular, in our numerical experiments, we use the Shannon formulawhere and denote the signal to noise ratio of users and , respectively, at slot [44]. Other relationships of SE to the SNR than (12) can also be used. Next, we describe our proposed twolevel multicell scheduling algorithm at a given time slot in a sixstep process.
Step 1. As for the CLS, of each cell selects two users and from the inner section and outer section of the cell, respectively, based on the instantaneous user SEs and peruser credit parameter values as follows:where is an algorithm parameter that we will study in the numerical examples to be shown to affect the convergence time and the overall network throughput.
Step 2. For each cell, the CLS of cell then nominates the users and and the instantaneous persection SEs of the sections and , denoted byrespectively, if the nominated users were to be served. then disseminates the values and to the NLS.
Step 3. For the pattern selection, in the third step, the NLS obtains the networkwide SE of pattern , denoted by , as follows:
Step 4. The NLS selects the pattern to be activated based on the following identity:where is a second algorithm parameter similar to in (13).
Step 5. Once is determined, the perpattern credit parameters are updated in the fifth step as follows:The NLS then sends a message to all CLSs with the information on which pattern was selected in the current slot.
Step 6. The nominated users in the sections belonging to the selected pattern are scheduled in the current time slot. Moreover, the credit parameters of users in the sections belonging to the selected pattern are updated as follows:The credit parameters of users in sections that do not reside in the selected pattern are not updated and those sections are not activated in the current slot.
Moreover, one can write the longterm average network throughput as follows:
3.4. Remarks on the Proposed Algorithm
Perpattern credit parameters are updated in (17) and it is obvious that these parameters cannot grow to either plus or minus infinity. This can be observed from the decision made to activate a pattern at the networklevel according to (16) which ensures that credit parameters will stay bounded. Bounded credit parameters are indication of satisfaction of desired temporal fairness constraints at the pattern level. Similar conclusions can be drawn for the peruser credit parameters and the satisfaction of desired temporal fairness constraints at the user level. Although we do not have optimality results for the proposed multicell scheduler, we note that the structures of the two TF schedulers NLS in (16) and the CLSs in (13) follow that of the singlecell optimum TF scheduler described in [24] except that we use fixed coefficients and as in [28] instead of those that decay in time. The purpose of this choice is to satisfy fairness constraints not only in the longterm but also in shorter time scales. Numerical examples will be presented to validate these choices.
The NLS has computational complexity and storage requirements and presents a scalable solution when compared to existing methods whose complexity depends on the overall number of users in the network. Due to low communications overhead between the CLSs and the NLS, the proposed method is relatively practical and can be implemented using a sufficiently lowdelay backhaul. However, we note that the twoway CLS to NLS communication should be completed before any data transmission can start in the proposed algorithm. For larger slot lengths, this communication delay is less of a problem. However, for shorter slots, inefficiencies due to signaling overhead may be significant. The adaptation of the proposed algorithm to more realistic multicarrier wireless networks with short slots (e.g., LTEA with subframes of 0.1 ms) is left for future research.
4. Numerical Examples
In all the numerical examples, we use one of the 6cell and 9cell CNs provided in Figure 5 and an additional 37cell CN depicted in Figure 6. The radii parameters and are assumed to be km and km, respectively, for all the CNs. The system frequency is assumed to be GHz and is set to MHz. Noise power spectral density and user equipment noise figure are assumed to be −174 dBm/Hz and 9 dB, respectively. Transmission power of each BS to the inner and outer users is 30 dBm and 40 dBm, respectively. It is straightforward to show that the choices of transmit powers and radii parameters and satisfy (1)–(3) for which is our focus in this section. The largescale fading channel coefficients are modeled based on the COST231 model as in dB scale, where is the distance between the corresponding user and BS, and represents the lognormal shadowing effect. We assume that = . Rayleigh fading model is adopted for smallscale channel coefficient variations [5]. It is assumed that smallscale fading channel coefficients are fixed during each time slot and vary independently over different time slots (block fading). Also, we assume that shadow fading coefficients are fixed in the duration of 50 consecutive time slots and vary independently otherwise.
4.1. Study of Scheduler Parameters and
In this example, we study the effect of the algorithm parameters and employed through the identities (13) and (16), on the convergence time and longterm network throughput. We assume that the scheduler uses EPS3 with cardinality 4 in the 9cell network of Figure 5(a). We employ ISPTF with the parameter set to unity; that is, we seek ordinary intercell and intersection fairness in this example. For a given section (), let () denote Jain’s fairness index for the temporal shares () which are shares of the users up to time . We refer to [45] for the definition of Jain’s fairness index. Let us also define the intrasection fairness index () for inner (outer) sections. Proximity of () to unity is representative of intrasection fairness for the inner (outer) section users up to time . Also, let the interpattern fairness index be defined by Jain’s fairness index for the individual perpattern temporal shares . Similarly, proximity of to unity is representative of interpattern fairness up to time . Furthermore, we note that interpattern fairness is equivalent to ordinary intercell fairness in this example since the patterns are mutually exclusive. We assume uniformly located users in the 9cell network of Figure 5(a) for each of the 20 simulation instances and for each instance we run the twolevel scheduler for a duration of slots with various choices of and . In each simulation instance, we obtain the values and (), which are defined as the minimum value of such that and (), respectively, for a small tolerance parameter which is set to and for a sampling parameter set to 1000. A relatively large value of () is indicative of longer convergence times and therefore adverse impact on shortterm intrasection fairness for inner (outer) section users. On the other hand, a relatively large value of is indicative of shortterm intercell unfairness. The steadystate throughput and three fairness metrics , , and (average values obtained over the 20 simulation instances) are tabulated in Table 3 for various choices of and .
We observe from Table 3 that the particular choice of the algorithm parameters and has only a slight impact on the overall throughout with slight improvement in with lower choices of and . On the other hand, when and are decreased, as a penalty, the various fairness indices of interest converge in a slower manner and shortterm intercell and intrasection fairness measures are consequently compromised. In particular, while is more sensitive to the change of , and appear to more sensitive to the change of . Similar observations are made in other scenarios as well but are not reported in the current manuscript. As a tradeoff between shortterm intercell and intrasection fairness and total network throughput, we fix in the remaining numerical examples.
4.2. Comparison of Opportunistic FFR versus Benchmark FFR
The use of the pattern set EPS3 with the proposed opportunistic scheduler based on ISPTF is referred to as opportunistic FFR (OFFR) in this paper. In this example, OFFR uses the ISPTF formulation with a certain choice of the parameter introduced in (9). In particular, we first study three different values of the parameter , namely, , and consequently use the perpattern weights as given in (9). The benchmark system called benchmark FFR (BFFR) splits the BW into four subbands, the bandwidth of each subband being proportional to for based on identity (9). The intracell scheduler of BFFR is the same as that of the OFFR. Besides, we note that there is no NLS in BFFR and ICI is handled by static spectrum partitioning as described above. For each value of , we simulated BFFR and OFFR in both 9cell and 37cell CNs for a total of 400 instances each of which spans time slots. In each of these simulations, the number of users is set to 64 and the users are randomly spread over the CN. Let and denote the overall network throughput when we employ OFFR and BFFR, respectively. Also, let and denote the average throughput of user when we employ OFFR and BFFR, respectively. Similarly, let and denote the average throughput of user when OFFR and BFFR, respectively, are employed. Furthermore, letdenote the network throughput percentage gain of OFFR over BFFR. Similarly, let denote the user throughput percentage gain of OFFR over BFFR for users and , respectively. Figures 7(a) and 7(b) illustrate the empirical Cumulative Distribution Function (CDF) of the gains and for the specific case of for 9cell and 37cell CNs, respectively.
(a) 9cell scenario
(b) 37cell scenario
We first note that as the parameter decreases, the patterns including outer sections are scheduled more frequently in OFFR and a wider frequency band is assigned to outer section users in BFFR. We have the following observations from Figures 7(a) and 7(b):(i)In all studied cases, a large majority of users benefited from OFFR, that is, positive gains, in comparison with BFFR. This situation is more apparent in the 37cell scenario. These positive gains stem from networkwide opportunistic scheduling in OFFR as opposed to conventional singlecell scheduling along with static spectrum partitioning in BFFR.(ii)We also observe that when increases (decreases), outer (inner) section users gain substantially more with OFFR against BFFR.
We further extend this example by varying and the parameter and simulate the same scenario. Let , , and denote the empirical expected values of the quantities , , and , respectively, out of the 400 simulation instances. Also, let , , and denote the percentage fraction of samples of , , and , respectively, which are below zero, that is, those scenarios or users who do not benefit from OFFR. Table 4 provides the quantities , , , , and , for varying choices of and . We note that the quantity is found to be zero for all studied cases; that is, all networks benefited from OFFR in comparison with BFFR in terms of average throughput. Our further findings are as follows:(i)As the number of users in the network increases, the average gain obtained with OFFR decreases and moreover the fraction of users that do not benefit from OFFR also increases with increased . The OFFR gain becomes more substantial when the number of users in the network is relatively smaller. This observation can be explained by the fact that when there is just one user or few users within a cell (which happens when the overall number of users is small), opportunistic scheduling within a cell as in BFFR is not as effective. In such scenarios, networkwide opportunistic scheduling helps the network users significantly.(ii)The OFFR average gains are slightly more substantial in the 37cell network than the 9cell network.(iii)Only a relatively small fraction of users appeared to fail to gain with OFFR. This quantity is observed to diminish significantly in the particular 37cell network scenario. For example, in the worst case, for the 37cell network scenario, only 6.8% (1.1%) of the outer (inner) users failed to gain with OFFR for () out of all the studies we have performed.
4.3. Impact of GPS Selection for the MMTF Formulation
In this section, we study the impact of the choice of the underlying pattern set in the context of MMTF problem (10). The performance metric is taken as the minimum of the temporal shares of all the users served in the CN ( in (10)). Recall that MMTF attempts to maximize this quantity through the linear program given in Section 3.2 through which we obtain the perpattern weights for this numerical example and consequently the performance metric. For this purpose, given the CNs with or 9 cells depicted in Figure 5, users are spread through the CN uniformly, leading to an average population of 10 users per cell. After locating users in the CN, one section is selected at random and users are further introduced in this cell for the purpose of making the user distribution through the network more nonuniform. To quantify this nonuniformity, we introduce the parameter which gives the expected number of users in the most crowded cell divided by the overall number of users in the network. The larger the parameter or is, the more nonuniform the user distribution becomes. Subsequently, each MMTF problem is solved 1000 times each of which is obtained by associating users in the CN with the individual cells and their sections. The average of the 1000 instances is then reported. We first study the 9cell scenario given in Figure 5(a). We study the following pattern sets in the simulation study (the individual patterns are defined in Table 1):(i) = (ii) = (iii) = (iv): pattern set obtained by Algorithm 1 with cardinality 22 which is presented in Table 1(v)EPS3(vi)UPS presented in Table 1.
Figure 8 depicts the performance of the six pattern sets of choice mentioned above in terms of the minimum temporal share as a function of the nonuniformity parameter . As increases, the minimum temporal share decreases for all the employed pattern sets. This observation stems from the fact that an increase in implies that one of the sections gets more crowded and consequently the users in that section get less chance to be scheduled. UPS outperforms all the other pattern sets for all values of . This is because UPS includes every possible pattern which leads to the largest possible feasible set for problem (10). We remark that that the performance of UPS is an upperbound for any GPS since every GPS is a subset of UPS according to Section 2.2. On the other hand, the performance of , obtained by Algorithm 1, is only slightly below that of UPS while the computational load required by Algorithm 1 to construct is remarkably lower than that of ES. This implies that the patterns generated by Algorithm 1 can be used along with MMTF scheduler to manage nonuniform user distribution well. Furthermore, we observe that outperforms which in turn outperforms . This is because . Therefore, we conclude that adding more patterns to an employed pattern set consistently enhances the performance of the MMTF scheduler as expected. Similar conclusions are drawn for the 6cell scenario for which we comparatively study four pattern sets, namely, EPS3, UPS, = , and being the GPS obtained by Algorithm 1 where the patterns are illustrated in Table 2. Figure 9 illustrates the performance of these four pattern sets. We conclude that pattern set selection and/or its cardinality are crucial for MMTF schedulers especially for CNs with larger number of cells.
4.4. Performance of the Proposed Scheduler in Nonhomogeneously Populated Networks
In this example, we use Zipfdistributed user populations in the multicell CN for nonuniform traffic demands [46]. The Zipf distribution has been successfully used in modeling various behaviors in computing and communications systems [46, 47]. Particular to traffic demand distribution in wireless networks, [48] uses a Zipf distribution to model traffic demands across multiple access points in an enterprise wireless LAN. The work in [49] studies a wireless network with heterogeneous clusters in which the cluster population sizes are distributed according to a Zipf distribution. In order to describe the Zipf distribution based on [46], let be the number of elements and be the rank of an element. Let denote the parameter characterizing the Zipf distribution. A given entity is an element of rank with probability where is a normalization constant. When , the parameter should satisfy . When is finite and , we have a discrete uniform distribution. When the parameter is increased, the population of the individual elements in the entire population becomes more nonuniform.
In this example, we will study the impact of the parameter if a selected user resides in a cell according to a Zipf distribution with parameters and . We fix and we distribute users in the 9cell CN according to a Zipf distribution with parameter . The ranks of cells in the 9cell network are depicted in Figure 5(a). The user location within a cell is uniformly random. For each value of , we distribute the users in the CN as described above and subsequently run the twolevel scheduler using the MMTF formulation with in Section 4.3 with 22 patterns. We also run the scheduler using ISPTF with EPS3 and as a benchmark. For each pair of and , we run the experiment 100 times each with a duration of time slots. We obtain the minimum user temporal share and minimum and average user throughput for each instance using MMTF and ISPTF schedulers and take the averages of these individual values over all the 100 simulated instances for a given pair . Table 5 illustrates the minimum user temporal share (denoted by ), the minimum user throughput (denoted by ), and the average user throughput (denoted by ) for both MMTF and ISPTF schedulers as a function of and . In general, we observe that the MMTF scheduler leads to higher minimum user throughput than ISPTF. This is not surprising since MMTF is guaranteed to maximize minimum temporal share according to (10). Also, when increases, the minimum user throughput and temporal share decrease for both schedulers because increasing leads to less chance for the users to be scheduled. Furthermore, when increases, the performance of the MMTF scheduler gets better relative to the ISPTF scheduler in terms of and . This is because the user distribution is more nonuniform for larger values of and MMTF scheduler takes into account the number of users in different sections of the network while ISPTF does not. Therefore, we conclude that the MMTF scheduler becomes more effective in nonhomogeneously populated cellular networks if the performance metric is to be taken as the minimum user throughput or temporal share. We also observe that while the average user throughput is slightly larger with ISPTF in most of the cases, the gap between ISPTF and MMTF is small.
4.5. Transient Behavior of the Proposed Scheduler
In this example, we study the transient behavior of the proposed twolevel scheduler in the 9cell CN considering the two different fairness criteria, namely, ISPTF and MMTF. For the MMTF criterion, we obtain pattern weights by solving problem (10) while employing the GPS constructed by Algorithm 1 with . For the ISPTF criterion, we consider the pattern set EPS3 and use (9) with the proportionality parameter set to unity. At time , we distribute 3 and 9 users in each inner and outer section of the 9cell CN, respectively, at uniformly random locations within the cells. Subsequently, we run the proposed twolevel scheduler using the pattern weights obtained based on the corresponding fairness criterion. At time slot , we add 3 and 9 more users to and , respectively, and update the perpattern weights. At time slot , we remove these users back from the network and update back the perpattern weights. Figures 10(a) and 10(b) illustrate the sampled cumulative temporal share of a randomly selected user in with sampling rate of (one sample per ten slots) as a function of time, for the ISPTF and MMTF scenarios, respectively. We observe that the proposed scheduler converges with the employed parameters as time evolves for any of the three time intervals (before the next perpattern weight updates take place). Figures 11(a) and 11(b) depict the sampled average throughput of the same user as a function of time for the ISPTF and MMTF criteria, respectively. We observe that the steadystate throughput of the selected user is higher in each interval with the MMTF criterion in place, compared with ISPTF. This is because MMTF considers the number of users in different cells while ISPTF does not.
(a) Cumulative temporal share of an outer user in cell 5 using ISPTF criterion with respect to time
(b) Cumulative temporal share of an outer user in cell 5 using MMTF criterion with respect to time
(a) Throughput of an outer user in cell 5 using ISPTF criterion with respect to time
(b) Throughput of an outer user in cell 5 using MMTF criterion with respect to time
5. Conclusions
We have proposed a semicentralized joint cell muting and user scheduling scheme for interference coordination in a multicell network under two temporal fairness criteria, namely, ISPTF and MMTF. We have also proposed a novel cell muting pattern set construction algorithm required for this joint scheme. For the ISPTF criterion, we have shown that the proposed scheme, OFFR, outperforms the benchmark FFR system in in terms of network and users’ average throughput. On the other hand, the MMTF criterion allows one to perform dynamic load balancing with reasonable computational complexity. Furthermore, it has been shown that the general pattern set and its cardinality play a major role in the performance of the networkwide worst case user temporal share which is the performance metric we have used in this paper. For various cellular topologies and scenarios, we have shown that the pattern set we use by the proposed construction algorithm performs almost as well as using all possible patterns. Future work will consist of extending the methodology to more realistic OFDMAbased LTE networks and heterogeneous networks as well as incorporation of alternative fairness criteria and dynamic traffic models.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.