Context-Aware Radio Resource Management in HetNets Nikos Dimitriou, Andreas Zalonis, Andreas Polydoros* Institute of Accelerating Systems and Applications Athens, Greece {nikodim | azalonis | polydoros}@phys.uoa.gr Adrian Kliks Oliver Holland Chair of Wireless Communications Poznan University of Technology Poznań, Poland [email protected] King’s College London London, UK [email protected] Abstract—In order to address the rapid increase in data-rate requirements in existing and upcoming wireless communication systems, one solution is to add more base-stations to achieve increased spectrum reuse. A Heterogeneous Network (HetNet)— consisting of a deployment of a variety of different types of small cells in a cellular infrastructure—is one manifestation of that approach. In this HetNet case, Radio Resource Management (RRM) techniques are important to balance and optimize the radio resource allocation among users of different systems by avoiding or controlling the generated interference. This paper provides a concise description of the role of RRM techniques in HetNets by analyzing the criteria and tradeoffs that are assumed, and presents a framework for the exploitation of the available context information within the HetNet environment, that leads to optimized spectrum usage. I. INTRODUCTION In recent years there has been a rapid increase in data-rate requirements in existing and upcoming wireless communication systems. The approach to address this has been to allocate more bandwidth. However, the proliferation of applications that use air interface transmission mediums limits the available bandwidth in the radio-frequency spectrum, making it a very scarce and costly resource. Research activities are focusing on improving the spectral efficiency of wireless communications, such that higher data rates can be achieved within a given bandwidth. An alternative approach is to add more antennas and/or transmitters in order to reduce the distance between the transmitter and the receiver, or allow for increased reuse of spectrum. It is envisioned that future networks will consist of the composition of various access and core “sub-networks” with different characteristics and capabilities. These sub-networks may have different topologies (e.g., star, mesh, hybrid) and may provide different services (e.g., communication, broadcasting, web-browsing, sensing) and thus may have different Quality of Service (QoS) and security specifications and they may as well follow different networking concepts (e.g., address-based, content-based). Additionally, these networks will include various terminal and intermediate network nodes with This work has been supported by the “Network of Excellence in Wireless Communications”, ICT-NEWCOM, http://www.newcom-project.eu, and partially supported by the “ICT-ACROPOLIS Network of Excellence”, www.ict-acropolis.eu, and the “Spectrum Overlay through Aggregation of Heterogeneous Dispersed Bands” project, ICT-SOLDER, www.ict-solder.eu. *A. Polydoros is also Distinguished Adjunct Professor at King Abdulaziz University, Saudi Arabia. different characteristics (mobility patterns, connectivity modes, processing power, transmission power, throughput, reconfigurability options, awareness and cognition capabilities, etc.). The Heterogeneous Network (HetNet) concept [1] is a first step towards that direction. A HetNet can be defined as a network comprised of traditional large macrocells and smaller cells including microcells, picocells and femtocells. HetNets can also involve the combination of different types/standards of wireless systems, such as WiFi and WiMAX, for the application of traffic offloading. In such an environment, legacy network architectures and resource management protocols may not be suitable to support ubiquitous network requirements, which may affect the provided QoS to the end user. RRM plays a key role in network operation, since it regulates the allocation and usage of available resources to the various users. In Radio Access Networks (RANs), the fundamental resource that is shared among users is represented by portions of RF spectrum, that are allocated to users or groups of users according to specific multiple access protocols. Band sharing by different systems is quite different from band sharing by the users of the same systems, since the former case involves the co-existence within the same band of networks that may have different operating protocols, traffic characteristics and service requirements. In order to achieve the coexistence of different systems within the same band and the dynamic sharing of the common resources, new advanced functionalities have to be introduced, to enable the awareness of the environment and to avoid cases in which the same resource is allocated/used in the same time by two different systems, that may lead to excessive interference and in outage events. The paper will provide a concise description of the role of RRM techniques in HetNets by exploiting related context information. First, the role of context information in this environment will be discussed. Then, in section 3, the paper will present the various issues that are involved in performing RRM based on the abovementioned rich context information. It will present the fundamental characteristics of RRM either within a single system or within a heterogeneous system environment. Finally, in section 4 some specific examples of context-aware RRM schemes will be presented demonstrating the abovementioned approach and highlighting the benefits in those specific cases. II. CONTEXT INFORMATION Based on [2] context information can be defined as the information possessed by an entity that can be used to describe and characterize the current situation of this entity (element of the network). Depending on the entity type (e.g., mobile or fixed node/antenna) the useful and available context information changes significantly. For instance some information accessible in cellular networks cannot be obtained in WiFi systems. Furthermore, the quality of the context information may vary. Inaccurate or outdated collected information may result in wrong characterization of the current network situation. In the HetNet environment, context information may be collected by direct local sensing/measurements performed by the terminals and the network access points or it may be based on information exchanged between these network elements that may also be gathered in specific databases for joint use. This context information may include the following: • Measurements of the received signal strength, or the SINR for specific frequency slots, possibly augmented by information regarding the direction of the emitting signal source. • The capabilities of the systems covering the area, such as maximum offered throughput, minimum QoS and supported services. • The bandwidth availability and access rules (e.g., primary/secondary access, licensed/unlicensed bands, contention based/contention-less access etc.) • The actual radio access network types co-existing within the geographical area and the supported air interfaces and transmission modes (e.g., GPRS, 3G, 4G, etc.) • A list of the operators offering the aforementioned radio access networks, along with information regarding their cost and offers for the services they provide. • The current traffic load per cell for each of the coexisting operators within the area. In order to efficiently store, update and exploit all this information the use of specific databases has been considered, that can be accessed by the network elements and used by the RRM algorithms. The Radio Environment Map (REM) has been envisaged as an integrated information structure that consists of various types of information or metrics such as geolocation data, available services, spectral usage regulations, locations and activities of radio nodes, user and service policies and past experience [3]. The REM is supposed to include all the necessary information regarding the (location dependent) radio characteristics of a geographical area. A REM may have a wide scope covering a whole city or prefecture area (global REM), or it may only be confined within a radius of few meters around a receiving terminal node (local REM). It can be stated that these two different kinds of REMs may provide different views; the local REM may include information that is related to real-time measurements that may have a quick update rate, characterizing the short-term dynamics of the observed radio environment (that may be dominated by fast fading effects in both frequency and time domains). It is also conceivable that the local REM may have a finer spatial granularity than the global REM. On the other extreme, the global REM is expected to integrate the views of the local REMs within the area of interest, averaging the reported measurements over time and space, in order to provide a broader long-term view of the area radio environment. The global REM may also incorporate elements of networkspecific context information (e.g., operator services & capabilities) that are directly provided by the operators themselves by information servers that collect and integrate this context information (e.g., an IEEE 802.21 Media Independent Information Server). III. RRM IN HETNETS RRM encompasses all the functionalities that control of the communication link parameters of the users sharing the same transmission medium (cable or wireless). These parameters are related to the QoS requirements of each link (e.g., BER, PER, SINR target etc.), the transmission/reception capabilities of each mobile/base transceiver (e.g., maximum transmitted power, receiver noise figure, transmit/receive antenna gains etc.), the transmission medium characteristics (e.g., slow/fast fading parameters, power loss exponent etc.) and the multiple access scheme specific mechanisms (e.g., time/frequency slot duration, scheduling schemes etc.). The abovementioned parameters dictate the percentage of the available capacity that each user link requires and they reflect the actual contribution of each connection to the system load. The following procedures can be considered to be parts of RRM: Call Admission Control, Packet Scheduling, Congestion Control, Mobility Management, Power Control, Rate Adaptation, Frequency Planning, Interference Management etc. In all cases the objective is to manage the available radio resources efficiently, taking into account conditions and constraints related to different OSI layers, such as transmitted power and received signal strength on the physical layer, frame/packet scheduling and time slots organization (MAC layer), QoS and QoE requirements (upper layers) etc. The definition of a resource varies according to its reference viewpoint. From the mobile node/user’s point of view, the resources correspond to the QoS requirements. Voice, video or data services have specific throughput and bit error rate requirements, which can be translated into specific received signal strength and signal to noise-plus-interference requirements. These individual user requirements are reflected on the transmitted power requirements for each frequency/time slot used by the base station or the access point. These in turn are translated into specific spectrum usage requirements for the respective coverage area by the operator. The abovementioned context information offer opportunities for more efficient allocation of the available radio resources among the users within a composite wireless network. The challenge that lies ahead is related to the actual exploitation of the context data (e.g., related to PHY measurements, power profiles, topological data, RAN lists, directional spectrum sensing data, measured interference etc.) for the development of RRM algorithms (either extending some of those previously analyzed or proposing new schemes). These schemes may be dealing with both intra-layer and cross-layer parameters’ selection, and will account for a balance between power and bandwidth efficiency. The metrics for assessing those schemes have to be related to both the performance enhancements that they will provide (in terms of user and system throughput efficiency and capacity utilization) and the actual complexity that they will require (in terms of signalling overhead, storage needs etc). In any case RRM decisions are based on network- and user-specific information, which assists in identifying the suitable (according to specific criteria) amount of resources that should be allocated to each user. A. Legacy intra-System scenarios In legacy cellular systems such as GSM, GPRS/EDGE, CDMA, HSDPA, HSUPA the resource allocation and planning among the different cells and among the users of the same cells is such that the communication links within any area are orthogonal (either by different frequency carriers, different timeslots of the same frequency carrier, or different spreading codes). In the 3GPP LTE and IEEE 802.16 standards, that consider subcarriers allocated on a TDMA or FDMA basis, the aim is full frequency reuse between the cells by also controlling and minimizing the effects of the co-channel interference. In this case the resource management is based on some parameters that are fed back from the user to the basestation. Usually these parameters are related to measurements of the received signal strength or the SINR on specific frequencies that may assist in determining the propagation channel losses and variations between the base station and the mobile. Apart from assessing the link quality between the base-station and the mobile, it is important to assess the interference that may be generated by other co-channel links (e.g., neighboring cell connections reusing the same frequency) and to also estimate the expected consequences to the other users after allocating a specific resource to the user of interest (e.g., generated interference to the other active co-channel links). Full frequency re-use enables the full exploitation of the available spectrum throughout the wireless network and – if combined with proper interference mitigation/avoidance schemes – it may lead to the optimum spectral and usage efficiency of resources. The main characteristics and limitations of the traditional RRM approaches are summarized below: • The cellular infrastructure is considered as fixed and the amount of resources allocated in each cell does not change in short term. • The user feeds back only channel and signal quality metrics and not any location information. • The user does not sense explicitly other systems that may exist in other frequency bands. • The baseline configuration of the cellular systems does not involve the cooperation between base stations for optimized resource usage. • There is no provision for opportunistic resource access or for primary/secondary prioritization of users in resource allocation B. Inter-System, joint RRM scenarios As discussed above, the evolution of networks has led to the formation of an environment in which different access and core networks coexist (HetNets). Currently, each user is bound to use one or a subset of these networks, since most often the user is a subscriber to a specific operator and is allowed to roam among the access networks that are owned by this specific operator or are covered by service level agreements with other operators. Additionally, the user may connect to other low range access networks in unlicenced bands (such as WiFi). Thus, the opportunity to offload part of the traffic to WiFi network has become an attractive option for cellular operators. The so-called Integrated Femto-WiFi (IFW) networks have been recently proposed for installation in residential buildings, in enterprise premises as well as in metro stations [4]. Other opportunities for cellular traffic offloading include the use of available TV Wight Space (TVWS) spectrum. In those scenarios, where two or more systems can have access to the same band, or the user can be assigned resources from various Radio Access Networks (RANs), the role of context-aware RRM becomes very important. Two or more RANs may share the same spectrum band either by dynamically dividing among themselves different parts of it, or by opportunistically accessing unused channels over the whole common band. In these cases, there are some specific pre-defined priorities and policies that are followed. For example, the users of a specific network may be considered as ‘primary’ users (having the right for exclusive channel usage) and the rest of the users from other networks may be characterized as ‘secondary’, having the obligation to release the resources that a ‘primary’ user may require. Between users of different networks the signals accessing the same frequency channel may be overlaid (allowing only concurrent transmissions), underlaid (allowing simultaneous transmissions) or interweaved (allowing exclusive transmission to primary users). The terminals may be able to sense all or part of the accessible network elements (access points and terminals). Terminal context awareness may be extended to the identification of nearby available radio access networks. They may also have the capability to exchange control information and data (related to ‘peer to peer’ communication capabilities that can be used in an ad-hoc manner). In heterogeneous access networks, belonging to the same or different operators, the following hierarchical view may be considered. From the operator’s point of view, the level of resource usage is directly connected to the actual turnover that is achieved by utilizing the operator’s owned or leased spectrum within the operator’s RANs. The operator may formulate policies aiming at the optimization of the spectrum usage and the consequent maximization of the profits coming from individual customer contracts, package deals, offers etc. The operator may also perform long-term coverage measurements to verify the penetration and the quality of the services that it provides to its customers. These measurements may be used for the reconfiguration of the operator’s RANs to match the network coverage characteristics to the customer requirements and services demands. These coverage characteristics drive the specifications of the RAN infrastructure (e.g., transmitted power of base stations) and the links’ maximum achievable throughput. The RANs themselves may perform more frequent measurements to monitor the wireless access load (linked to the number of users per cell and the actual services distributed per cell) and based on the actual measured load levels they may invoke different radio resource management algorithms to satisfy the traffic demands and to balance the tradeoff between performance and fairness among the users sharing the same resources in each cell. Finally, the lower level of the described hierarchy corresponds to the users. The user terminals have varying capabilities in terms of the applications that they can run/download, the services that they can provide and the Quality of Service that they may require. Additionally, the users may have different preferences regarding the usage of different available networks, depending on their offered se services and other factors such as cost. In terms of measurements, the terminals may be capable of performing short term mon monitoring of the received signal level, the SINR, the battery level the terminal coordinates and the user’s speed which may all be used for efficient resource allocation. Package Deals Spectrum usage policies Coverage Studies Network Operators Managing Entities RAN specifications Figure 3 depicts the areas of feasible power allocation for users controlled by the APss B and C when a user controlled by AP A is located in a specific point. These areas correspond to three different tests. In each test the users were assumed to have ave the same SINR requirement, which was set equal to 4, 8 and 12 dB. It is evident that as the required SINR increases, the corresponding required transmitted power for each user increases and so does the generated co co-channel interference between the neighboring hboring cells. As a consequence, the areas of feasible power allocation in the B and C cells tend to shrink and the required SINR increases. The same effect would be observed if the user of cell A moved closer to the cell border, towards cells B and C. Network Load Measurements RRM Algorithms Radio Access Networks Terminal capabilities Required QoS Information Collection & Processing Policy formulation, Dissemination & enforcement RRM algorithms execution User Preferences Signal Measurements User Location / Mobility users Battery level hetFigure 1: Hierarchical view of the joint RRM among he erogeneous networks. Figure 2: Co-channel single-tier single allocation scenario Therefore, within a HetNet we may envisage a multilevel hierarchy of network entities (Figure 1) that may retrieve, possess and store different kinds of information and measur measurements, they may initiate, disseminate or execute various ne network policies and they may also employ different radio rresource management algorithms. For such a complex network of networks to operate efficiently, it is necessary to introduce managing entities that will ill monitor the different operator ne networks and will regulate their operation, allowing for distribu distributed decision making. IV. EXAMPLES OF CONTEXT-AWARE RRM IN HETNETS SCENARIOS Herein, three specific examples of context context-aware resource allocation strategies proposed oposed in the literature, literature in three different scenarios encountered in the HetNet concept concept, are presented. In each, the context information used is identified and categorized based on the hierarchical framework of the various network entities. A. Co-channel single-tier allocation This scenario may be viewed both as intra system (one o operator) or inter-system system (multiple operators with common aaccess to the Managing entity). Thee goal is to examine the possibility of re-using using the same frequency channels for different users and the corresponding consequences of the generated co cochannel interference. In [5] it was demonstrated for the case of three co-channel APs (Figure 2)) in the same area, that the use of context information can be exploited in order to determine the options of feasible power allocation for each user by a central managing entity according to the terminal QoS rrequirements and location details. Figure 3:: Identification of areas of co-channel co use in cells B and C for SINR thresholds equal to 4,8,12 dB. In this case the context elements used are related to the location and the QoS requirements of all users, users which are combined with the use of propagation models for all the possible user links. The context information exploited in this scenario is summarized in the following table. All this information can be stored in a REM and accessed acce and used by a managing entity which is located in the core network network. TABLE I. CO-CHANNEL SINGLE-TIER SCENARIO Operators Context information used Spectrum bands, QoS provision, APs locations RANs QoS, SINR requirements, UE locations, area propagation models Users UE locations victim macro-user is 31% while by using the above-mentioned context information the outage drops to 22%. Macrocell User Outage B. Co-channel two-tier allocation One of the most challenging interference scenarios in twotwo tier networks is the interference caused by a small cell (e.g. femtocell) to a nearby macrocell user in the case of shared spectrum and closed access small cell (Figure Figure 4). 4 45% full context knowledge 40% baseline 35% 30% 25% 20% 15% 10% 5% 0% 0,2 0,3 0,4 0,5 0,6 0,7 Distance from macro BS (km) 0,8 0,9 Figure 5: Macro-user user Outage in various distances from the macrocell Figure 4: Co-channel two-tier allocation scenario In [6] a power control mechanism was proposed that eexploit environmental and other available context knowledge. In this example, the femto-AP AP has access to a REM (which may reside in the AP or in the core network) and use the collected information autonomously, without a centralized control. Thus, in this case the managing entity lies within the AP. The control mechanism is based on an approach proposed in [7]. The femtocell detects a neighboring victim macro-user and reduces its transmission power aiming to maintain maintai a predefined SINR target for the macro-user.. In case the target cannot be achieved, the femtocell transmits at a predefined minimum power level. It is clear in the above approach that the context inforinfo mation needed exceeds the information collected from the Channel State Information (CSI) in the femto-AP. The enhanced context information includes the macrocell and femtocell locations, the victim macro-user user detection and location, and the channel gains between etween these network elements elements. TABLE II. CO-CHANNEL TWO-TIER SCENARIO Operators Context information used Spectrum bands, QoS provision, Macro BS location RANs Femto-AP location, Macro acro UE detection,, area propagation models, building characchara teristics C. Channel allocation in inter-system scenario (two-tier cellular with WiFi offloading) In [8] the scenario of an Integrated Femto Femto-WiFi Network in a cellular environment nment was investigated (Figure 6). 6 The paper tackles the problem of resource-efficient resource traffic management through the application ication of the WiFi offloading conco cept in cellular networks. As it is illustrated in the figure, both small cells, i.e. WiFi spot or LTE femtocell, are connected to the core network via stable DSL backhaul. Thus from the operator viewpoint, access to both entities will be ensured through IP network. On the other hand, as femtocells utilize operator’s frequency bands, the WiFi Access Points operates in one of the ISM frequency regions. As a consequence the later are susceptible to high interference coming from fr other WiFi links in the vicinity, and operator has rather limited conco trol of that phenomena. Nevertheless, the possibility of traffic offloading seems to be beneficial for network operator, since the amount of multimedia data transferred via the cellular cellula networks grown particularly fast. Shifting portion of the traffic to the public WiFi networks will result in rarer cellular network congestion or will allow for controlled switching switching-off of unused base-stations stations reducing the overall power consumption. Users Macro UE location It was shown in [6] that the use of enhanced context info information significantly reduce the macro-user user outage percentage, with respect to the case where no such info was available (baseline algorithm of [7]). In Figure 6 the average macro-user macro outage is presented for various macro-to--femto-cell distances based on the OFDMA Interference Scenario Evaluation Methodology for LTE femtocells for the suburban case [7]. The macro-user SINR target was set to 3 dB. The benefit of using context-aware power control can be clearly observed. For example with a co-channel femtocell deployed at a distance of 500 m from the macrocell,, the average outage of a nearby Figure 6: Two-tier/WiFi tier/WiFi offloading allocation scenario In [8] it was shown that even significant amount of traffic can be under some circumstances offloaded from the regular to WiFi networks, thus providing relevant gains to the operaoper tor. However, the benefits from such an approach will be higher when rich context information nformation will be exchanged beb tween the particular entities of that heterogeneous network. First, the WiFi offloading scenario is is, in some sense, an exten- sion of the case presented in previous subsection, i.e. cochannel two-tier channel allocation. It is due to the fact that the mobile terminal could be served either by femto-AP or by the macrocell base station. Thus, most of the entries presented in the second table TABLE II. should be applied here as well. However here other possibilities appear, the managing entity can allow the user to: (i) connect to femto access point and offload e.g. mobile data thorough the WiFi AP, (ii) connect to the femto-AP and then switch to unlicensed networks due to the user’s mobility and lack of the signal coverage in its new location, (iii) connect to the WiFi network in a case when the regular system is not accessible. In all cases some specific context data should be known, such as precise location of the WiFi access points, its IP address and number of users operating in the assigned channels, the number of interfering access points, number of users per each WiFi channel, daily traffic statistics on each channel etc. These are summarized in Table III. The benefits of the possessing of rich context information, listed in Table III, has been illustrated in Fig. 7 as a traffic distribution among macro base stations, femto or WiFi access points. In that scenario the dual-strip model of the three-floor building has been applied. It was assumed that there are 50 inside users and 20 outside uses which can be served by either one of two available macro base station, femto access point or WiFi hot spot. The goal was to check how much traffic could be offloaded from macrocells to smaller cells resulting in lower utilization of macro base station allowing for application of e.g. intelligent switching-off mechanism of lowly occupied base stations. As it can be seen that under some predefined assumptions (e.g. interference limits in WiFi networks, number of access points etc.) around 80% of the traffic can be shifted from macro base stations to femto access points. In consequence the unused macro base stations could be switched off leading to some energy and financial benefits. TABLE III. WIFI OFFLOADING SCHEME (LIST OF CONTEXT DATA BESIDE ELEMENTS SHOWN IN TABLE II) Operators Context information used Distribution of the served traffic [2] [3] 0.6 [4] [5] 0.2 15 10 FAP 5 WiFiAP Number of FAPs [6] 0 [7] Figure 7: Exemplary traffic distribution among macro base station, femto and WiFi access points Users WiFi UE location, number of connected user, reliability and stability of the connection, movement speed and direction, types of the supported technologies REFERENCES 0.8 0 MacroBS RANs WiFi-AP location, frequency band and technology, WiFi channel availability and average occupation, WiFi coverage area, possibility of (vertical) handover, propagation models and building characteristics, daily traffic characteristic, current number of connected users V. CONCLUSIONS The paper presents the main principles and issues involved in RRM for HetNets scenarios. RRM techniques are important to balance and optimize the radio resource usage among users of different systems sharing the same frequency band, by regulating the generation of co-channel interference. The focus in this paper has been on the concepts of context awareness, and proposed a framework for the RRM algorithms to exploit that information. The proposed framework has been demonstrated and discussed in specific examples in three different HetNet scenarios. [1] 0.4 Operator WiFi access point location (if applicable), supported technology [8] A. Damnjanovic, J. Montojo, W. Yongbin, L. Tao, M. Vajapeyam, Y. Taesang, S. Osok, D. Malladi, “A survey on 3GPP heterogeneous networks”, IEEE Wireless Communications, vol.18, no.3, pp.10,21, June 2011. A.K. Dey. Architectural Support for Building Context-Aware Applications. PhD thesis, Georgia Institute of Technology, December 2000. Youping Zhao; Le, B; Reed, J.H. Network Support: The Radio Environment Map, Chapter 11 in Cognitive Radio Technology, 2nd Ed.; B.Fette Ed.; Publisher: Butterworth-Heinemann, March 2009. http://www.smallcellforum.org: “Integrated Femto-WiFi networks”, white paper, February 2012. Adrian Kliks, Andreas Zalonis, Nikos Dimitriou, Jad Nasreddine, Fanghua Li, Youngwook Ko, "Interference Management in heterogeneous wireless networks based on context information", Proceedings of the 9th International Symposium on Wireless Communication Systems (ISWCS2012), Paris, France, Aug. 2012. A. Zalonis, N. Dimitriou, A. Polydoros, J, Nasreddine, P. Mähönen, “Femtocell Downlink Power Control based on Radio Environment Maps”, IEEE WCNC 2012, Paris, France, April 2012. www.femtofotum.org: “Interference Management in OFDMA Femtocells”, white paper, March 2010. Adrian Kliks, Nikos Dimitriou, Andreas Zalonis, Oliver Holland, “WiFi Traffic Offloading for Energy Saving” ICT 2013, Morocco, May 2013.
© Copyright 2024 ExpyDoc