Wireless Downlink Data Channels: User Performance and Cell Dimensioning
Wireless Downlink Data Channels: User Performance and Cell Dimensioning
ABSTRACT only one user in each slot. It has been shown that, assum-
We consider wireless downlink data channels where the trans- ing the feasible transmission rate is linear in the signal to
mission power of each base station is time-shared between a interference-plus-noise (SINR) ratio, this maximizes overall
dynamic number of active users as in CDMA/HDR systems. throughput [18, 11, 4]. Note that this optimality principle
We derive analytical results relating user performance, in is not strictly valid when only a discrete set of data rates is
terms of blocking probability and data throughput, to cell available [4].
size and traffic density. These results are used to address a A key component of such a TDMA-like scheme is the
number of practically interesting issues, including the trade- scheduling, i.e., deciding which user should be served in each
off between cell coverage and cell capacity and the choice of time slot. In fact, it is not directly clear what a “good”
efficient scheduling and admission control schemes. scheduling strategy is, as the potential data rate of a user
depends on her/his radio conditions, mainly determined by
the distance to the BS and fading effects. To transmit always
Categories and Subject Descriptors to the user with the highest potential rate maximizes overall
B.8 [Performance and Reliability]: Performance Analy- throughput but typically results in the starvation of distant
sis and Design Aids users. Another strategy, which realizes a reasonable trade-
off between efficiency and fairness, consists in transmitting
General Terms to the user with the highest potential rate proportionally to
her/his current mean data rate [23]. This algorithm, termed
Performance Proportional Fair (PF) and implemented in HDR systems,
has indeed been shown to fairly share the transmission re-
Keywords source [10]. Many other scheduling algorithms have been
proposed and analyzed (see [8] and references therein).
CDMA/HDR systems, flow-level analysis, dimensioning
As a general rule the evaluation of scheduling algorithms is
performed with an assumed static population of users (see,
1. INTRODUCTION e.g., [12]). We maintain that this may lead to misleading
Data services are expected to constitute a significant part conclusions since the actual set of active users is dynamic
of traffic in future CDMA networks. In this paper, we derive and varies as a random process as new data flows are initi-
analytical performance results for downlink data channels, ated and others complete. In particular, while users are gen-
accounting for the random nature of traffic demand, and erally assumed to be uniformly distributed in the cell, the
show the practical interest of these results in dimensioning location of active users in steady state does depend on the
cells and designing radio control algorithms. scheduling employed. This is due to the inherent “elasticity”
To support high data rates, a number of new technologies of data transfers: the resource attributed to any user deter-
have been standardized, such as HDR (High Data Rate) sys- mines how long that user will stay active. Thus a scheduling
tems [6], corresponding to the CDMA2000 1xEV-DO stan- scheme that favors near users results in a large proportion
dard, and their 3GPP equivalent, HSDPA (High Speed Down- of active users being far from the BS.
link Packet Access) systems [1, 17]. Both systems are based A further issue when accounting for the statistical nature
on an intra-cell interference cancellation principle: time is of traffic is that of admission control: situations may arise
slotted and the base station (BS) transmits at full power to where it is preferable to block new demands rather than to
further degrade the performance of ongoing data flows. Ad-
mission control has already been proposed for data services
in a wireline context to preserve network efficiency in over-
Permission to make digital or hard copies of all or part of this work for load [5]. The design and evaluation of admission control
personal or classroom use is granted without fee provided that copies are schemes for the considered wireless network are still largely
not made or distributed for profit or commercial advantage and that copies unexplored areas.
bear this notice and the full citation on the first page. To copy otherwise, to
republish, to post on servers or to redistribute to lists, requires prior specific In evaluating scheduling and admission control it is im-
permission and/or a fee. portant to understand how offered traffic impacts user per-
MobiCom’03, September 14–19, 2003, San Diego, California, USA. ceived performance, in terms of transfer delays and blocking
Copyright 2003 ACM 1-58113-753-2/03/0009 ...$5.00.
rates. Given the ever changing nature of data applications, 2. MODEL
control mechanisms should be designed so that performance In this section, we first present the model of the radio re-
depends mainly on an appropriately defined load factor, and source and the way this resource is shared. We then describe
not on precise traffic characteristics like the distribution of the characteristics of offered traffic.
a typical transfer volume. This requirement underscores the
interest of analytical modeling tools, in addition to simu- 2.1 Radio resource
lation, in order to gain the necessary insight and identify We consider a cell with a single downlink channel whose
efficient design choices. resource is time-shared between active users. Denote by φbu
Regarding dimensioning issues, it is not straightforward the fraction of time base station (BS) b transmits to user u,
to define the traffic carrying capacity of a CDMA network with u φbu = 1. The data rate of user u is then:
handling data. Resource consumption depends in particular
on the position of the users so that, in addition to the usual Cu = C × φbu , (1)
notion of intensity, traffic also has a spatial component. It
is notably important to know how the capacity of a cell where C is the peak data rate, obtained in the absence of
depends on its size, in analogy with the known trade-off in any other user in the cell, i.e., for φbu = 1.
circuit switched CDMA networks [22, 25]. In practice, the peak data rate depends in a complex way
on the radio environment and varies over time due to user
Related work. To our knowledge, very few papers address mobility, shadowing and multi-path reflections. Unless oth-
the issue of user performance for wireless data channels, erwise specified, we ignore these fading effects, i.e., we as-
accounting for the random nature of traffic and the inher- sume the peak data rate is approximately constant during
ent “elasticity” of data transfers. Most existing models in- data transfer. Section 6 is devoted to the impact of fast fad-
deed represent data transfers as circuit services (see, e.g., ing. To simplify the presentation, we also assume that the
[2]). A notable exception is the recent work of Borst for peak rate C depends on the distance r from BS b to user
CDMA/HDR systems [8]. User performance is explicitly u only. This last assumption is not essential and the the-
evaluated and shown to be insensitive to the flow size distri- oretical results derived in the following still hold in a more
bution, with or without admission control, in a symmetric realistic radio environment, given any peak rate function of
scenario where all users experience the same fast fading and user’s location in the cell. We denote by C0 the maximum
the resource allocation is that realized by the PF scheduler. peak rate (which depends on channel bandwidth and coding
The radio channel is modeled at flow level by a processor- efficiency) and by r0 the maximum distance at which this
sharing queue which is indeed known to have the insensitiv- maximum peak rate is achieved:
ity property [20]. C(r) = C0 for all r ≤ r0 . (2)
1 if r ≤ ε, 0
Γ(r) =
ε α
r
otherwise, Users experience quality of service through the duration of
where ε denotes the maximum distance at which the full data transfers. Note that, in view of (1), this does not only
power P is received and α is the path loss exponent which depend on user characteristics such as her/his peak rate,
characterizes the radio environment (typical values of α are but also on the cell activity, i.e., on the dynamic number of
between 2 and 5). Assuming that the maximum peak rate active users who share the transmission resource. We are
C0 can be achieved (thus r0 > ε), it follows from (2) that interested in the mean flow duration T (r) for a user whose
the peak rate function is: distance to the BS is r (recall that active users don’t move
during their data transfer in our model). Let dx(r) be the
1 if r ≤ r0 , mean number of active users whose distance to the BS is
C(r) = C0 ×
r0 α (4)
r
otherwise. between r and r + dr. Applying Little’s law [16], we get:
dx(r) = T (r)λ × 2πrdr.
Coding constraints. Expression (4) corresponds to an ideal Thus the flow throughput γ(r) of users whose distance to
case where the set of achievable peak rates is continuous. In the BS is r, defined as the ratio of the mean flow size E[σ]
practice, coding constraints result in a discrete set of achiev- to the mean flow duration T (r), is given by:
able peak rates C0 ≡ c0 > c1 > . . . > cn . In view of (4),
these rates define a set of concentric “rings” of external ra- dρ(r)
γ(r) = . (6)
dius r0 < r1 < . . . < rn corresponding to regions where dx(r)
these rates are achievable. Table 1 below gives the rates This quantifies the average performance of data transfers at
defined for HDR channels [6] with the corresponding radius a distance r from the BS.
(normalized so that r0 = 1) evaluated from (4) with two
values of the path loss exponent. Coding constraints. When the set of achievable peak rates
is discrete, the traffic intensity in ring 0 is given by:
Ring k Rate ck Radius rk Radius rk
(Kbit/s) (α = 4) (α = 2) ρ0 = ρπr02 ,
0 2457.6 1 1 while the traffic intensity in ring k, k = 1, . . . , n, is given by:
1 1843.2 1.07 1.15
2 1228.8 1.19 1.41
2
ρk = ρπ(rk2 − rk−1 ).
3 921.6 1.28 1.63 As above, we define the cell load as:
4 614.4 1.41 2.00 n
5 307.2 1.68 2.83
ρ̄ = ρ̄k ,
6 204.8 1.86 3.46 k=0
7 153.6 2.00 4.00
8 102.6 2.21 4.90 where ρ̄k = ρk /ck denotes the load of ring k. The shape and
9 76.8 2.37 5.61 the load contribution of each ring are illustrated in Figure 1
for the values given in Table 1 and n = 4, 7, 10, correspond-
10 38.4 2.82 7.94
ing to cells of radius r4 , r7 , r10 , respectively1 . We observe
that for large cells (corresponding to a large spectrum of
Table 1: Rates and ring radius. possible peak rates), most load is concentrated in the outer
ring.
We are interested in the mean flow duration Tk for a user
2.2 Traffic characteristics in ring k. Denote by xk the mean number of active users in
We assume traffic demand is uniformly distributed in the ring k. By Little’s law:
cell. Data flows arrive as a Poisson process of intensity λ×ds E[x0 ] = T0 λ × πr02 ,
in any area of surface ds. Flow sizes are independent and
identically distributed (i.i.d.). We denote by σ the corre- and for k = 1, . . . , n,
sponding random variable and by ρ = λ × E[σ] the traffic 2
E[xk ] = Tk λ × π(rk2 − rk−1 ).
density (in Kbit/s per surface unit). The traffic intensity
generated by those users whose distance to the BS is be- We deduce the flow throughput for a user in ring k, defined
tween r and r + dr is dρ(r) = ρ × 2πrdr. We consider two as the ratio of the mean flow size E[σ] to the mean flow
cases, depending on whether coding constraints are taken duration Tk :
into account or not. ρk
γk = . (7)
E[xk ]
No coding constraint. In the ideal case where a continuous 1
The maximum cell radius obtained for α = 2 is in fact
set of peak rates is achievable, the load generated by those almost three times larger than that obtained for α = 4; we
users whose distance to the BS is between r and r + dr is changed the scale between the two sets of cells of Figure 1
the ratio dρ(r)/C(r) of their traffic intensity to their peak for sake of readability.
Path loss exponent α = 4 grows indefinitely in overload (ρ̄ > 1). In the latter case,
the data rate C(r)/x tends to zero for all users, whatever
their distance to the BS: the cell is saturated.
1
Path loss exponent = 2
< 10% > 10% > 20% > 50% Path loss exponent = 4
0.8
Cell capacity
0.6
3. THROUGHPUT PERFORMANCE 0
0 1 2 3 4 5 6 7 8
(NO ADMISSION CONTROL) Cell radius
In this section, we evaluate user performance in terms of
flow throughput in the absence of admission control, i.e., Figure 2: Cell capacity – defined as the maximum
when the number of active users is not limited. We first as- traffic intensity without saturation – with respect to
sume that the radio resource is fairly shared between active cell radius, for path loss exponents α = 2 and α = 4.
users, i.e., φbu = 1/x, when x users are active in the cell.
This is the allocation realized by the PF scheduler or a sim-
ple round-robin scheduler, for instance (these are equivalent
in the absence of fast fading). Other power allocations are Flow throughput. To evaluate user performance in under-
considered in §3.3. load, we use a key property of the processor-sharing queue:
the stationary distribution of the number of customers is
3.1 A continuous set of peak rates insensitive to the distribution of service times. This follows
We first consider the ideal case where a continuous set from the reversibility of the underlying Markov process [14,
of peak rates is achievable. As the transmission resource 20]. We deduce that the stationary distribution π of the
is fairly shared between active users, the number of active number of active users is insensitive to the flow size distri-
users x evolves like the number of customers in a processor- bution and given by:
sharing queue with Poisson arrivals of intensity λπR 2 and
i.i.d. service times [16]. Each service time is equal to the flow π(x) = ρ̄x (1 − ρ̄). (9)
duration in the absence of any other user in the cell, i.e., Note that the number of active users is typically rather small
σ/C(r) for a user whose distance to the BS is r. Thus the in steady state: the probability having more than x active
distribution of the random variable σ̄ representing a typical users decreases geometrically with rate ρ̄. In addition, the
service time is given by: probability that the distance of an active user to the BS is
σ 2rdr between r and r+dr is proportional to the load generated by
dσ̄(r) = , r ≤ R. these users, namely dρ(r)/C(r). In particular, the density
for all users in dr C(r) R2
of active users is inversely proportional to their peak rate
In particular, the load of the processor-sharing queue corre- C(r). We deduce:
sponds to the cell load:
dρ(r)
R R dx(r) = × E[x],
E[σ] 2rdr ρ ρ̄C(r)
λπR2 × = 2πrdr ≡ ρ̄. (8)
C(r) R2 C(r)
pk
Hence, the flow throughput is equal to the peak rate for C̄(R) = .
ck
k=0
0.6 ρ̄k
E[xk ] = ,
1 − ρ̄
0.4 and from (7):
γk = ck (1 − ρ̄).
0.2
Again, the flow throughput decreases linearly in the cell
load. This is illustrated in Figure 4 for each ring of Table 1.
0
0 1 2 3 4
Cell radius 2.5
Path loss exponent α = 2
1 2
Without coding constraint
Throughput (Mbit/s)
0.6 1
0.4 0.5
0.2 0
0 0.2 0.4 0.6 0.8 1
Cell load
0
0 1 2 3 4 5 6 7 8
Cell radius
Figure 4: Flow throughput with respect to cell load
for the 11 rings of Table 1.
Figure 3: Cell capacity – defined as the maximum
traffic intensity without saturation – with respect to
cell radius, with and without coding constraints. 3.3 Other power allocations
The allocation so far considered, referred to as “fair power”
sharing, has the practically interesting property that user
performance can be explicitly evaluated and is insensitive These allocations, which are known to outperform the pro-
to the flow size distribution. It may be considered as “un- cessor sharing discipline for a heavy-tailed service distribu-
fair”, however, as the flow throughput experienced by a user tion, have been proposed to be implemented in Web servers
is proportional to her/his peak data rate (refer to Figure 4). in a wireline context [3, 19] and more recently in scheduling
algorithms in a wireless context [13]. They would here exac-
Fair rate sharing. Consider another allocation, referred to erbate the discrimination against far users, whose processing
as “fair rate” sharing, where the data rates of all active users time is typically much higher than that of near users.
are made equal. This is realized if BS b transmits to user The above observations suggest that no significant gain is
u a fraction of time inversely proportional to her/his peak achieved by those allocations which do not share the trans-
rate: mission resource in a fair way and that the so-called “near-
1/C(r(u)) far” unfairness (in terms of flow throughput) is inherent to
φbu = 0
, wireless data systems. The only way to achieve approxi-
u0 1/C(r(u )) mately fair throughput performance is to limit the cell size
where r(u0 ) denotes the distance from BS b to user u0 . The so that all users can achieve high data rates. Finally, it is
number of active users then evolves like the number of cus- worth noting that the key properties satisfied by the “fair
tomers in a discriminatory processor-sharing queue [9] of power” allocation (explicit performance evaluation and in-
load ρ̄. Again, the cell is saturated in overload (ρ̄ > 1). In sensitivity) still hold in the presence of admission control,
underload (ρ̄ < 1), the number of active users x tends to as shown in the next section. The impact of admission con-
a finite stationary regime, but the stationary distribution is trol on user performance is typically extremely difficult to
sensitive to the flow size distribution. evaluate for other power allocations.
For an exponential flow size distribution, we obtain using
[9] the results of Figure 5 for a 5-ring cell, with the values
of Table 1. We observe that the gain in flow throughput for 4. BLOCKING RATE
users in the outer ring is very limited. On the other hand,
the impact on the performance of users in the inner disk is (WITH ADMISSION CONTROL)
significant. This may be explained as follows. First, the fact In the absence of admission control, we have seen that the
that active users have the same data rate does not imply cell is saturated in overload (ρ̄ > 1): the number of ongoing
that users have the same flow throughput. When the cell transfers grows indefinitely and the data rate of each transfer
load ρ̄ is close to 0 for instance, an active user is typically eventually tends to zero. Admission control is necessary to
alone in the cell so that the flow throughput is equal to the guarantee a minimum data rate cmin for all users whatever
peak rate. Second, most load is concentrated in the outer the cell load. For a given target rate cmin , 0 < cmin < C0 , the
rings (refer to Figure 1): the performance experienced by cell radius R cannot exceed Rmax , the maximum distance r
far users is essentially due to their own load and cannot such that C(r) ≥ cmin .
be significantly improved; the performance experienced by In the presence of admission control, users experience
near users, on the other hand, mainly depends on the load quality of service not only through flow throughput but also
generated by far users thus may be significantly worsened. through blocking rate. In this section, cell capacity is eval-
uated in terms of the maximum traffic intensity for given
2.5 minimum data rate cmin and target blocking probability.
Fair power sharing
Fair rate sharing
2 4.1 Admission control based on the number of
active users
Throughput (Mbit/s)
Throughput (Mbit/s)
1 + ρ̄ + . . . + ρ̄m
1.5
In addition, the probability that the distance of an active
user to the BS is between r and r + dr is proportional to the
actual load generated by these users, namely: 1
dρ(r)
(1 − B) . 0.5
C(r)
In particular, the density of active users is inversely propor- 0
tional to their peak rate C(r) as in the absence of admission 0 0.5 1 1.5 2
control (refer to §3.1). We also deduce: Cell load
ρ 1 − (m + 1)ρm + mρm+1
E[x] = × . (13)
1−ρ 1 − ρm+1
The objective here is to evaluate the gain in terms of
As the actual traffic intensity generated by those users whose blocking probability compared to the admission control based
distance to the BS is between r and r + dr is (1 − B)dρ(r), on a maximum number of active users m given by:
expression (6) becomes:
C(R)
dρ(r) m= .
γ(r) = (1 − B) . cmin
dx(r)
It then follows from (12) and (13) that: No coding constraint. For a continuous set of available
(1 − ρ)(1 − ρm ) peak rates, admissible states are those for which
γ(r) = C(r) × .
1 − (m + 1)ρm + mρm+1 min1≤u≤x C(r(u))
≥ cmin ,
Hence, the flow throughput is equal to the peak rate for x
ρ̄ = 0 and decreases to C(r)/m when the cell load ρ̄ tends where r(u) denotes the distance from the BS to active user
to infinity. u. Assume M is an integer for simplicity. Let L = M − m,
and for j = 0, . . . , L, define Rj as the maximum distance r
Coding constraints. The results are similar if the set of such that:
available peak rates is discrete. For a cell of radius R = rn ,
the maximum number of users is m = cn /cmin . The blocking C(r) ≥ (M − j)cmin .
rate is the same in all rings and given by (12). The flow Note that r0 ≡ R0 < R1 < . . . < RL ≡ R. Admissible
throughput in ring k is: states are those for which there are less than m active users
(1 − ρ)(1 − ρm ) or there are x = M −j active users and the distance from the
γk = c k × . BS to any of these users does not exceed Rj , j = 0, . . . , L.
1 − (m + 1)ρm + mρm+1
As in §4.1, the reversibility property implies that the sta-
Figure 6 gives the corresponding flow throughput for a 5- tionary distribution π of the number of active users is insen-
ring cell with the values of Table 1 and a maximum number sitive to the flow size distribution and given by the restric-
of users m = 12, corresponding to a minimum data rate tion to admissible states of the stationary distribution (9)
cmin = 51 Kbit/s (cmin /C0 ≈ 0.02). The flow throughput associated with the unconstrained system. Noting that in
decreases from ck to ck /m for each ring k. this unconstrained system, the probability that the distance
of an active user to the BS is less than Rj is equal to ρ̄→j /ρ̄,
4.2 Admission control based on the minimum where
data rate Rj
We now consider an admission control based on the mini- dρ(r)
ρ̄→j = ,
C(r)
M −i
B(r) = B0 if r ≤ R0 , where
L −1
and for j = 1, . . . , L, M −i
and for k = 0, . . . , n,
we get the mean blocking rate:
k
L
Rj2 − Rj−1
2
R2
ρ̄→k = ρ̄j .
B = B0 02 + Bj . (14)
R j=1
R 2 j=0
say). We explain this result in §4.3 below. where jk denotes the minimum integer j 0 such that kj 0 = k,
and the mean blocking rate is
n
Number of users r02
rk2 − rk−1
2
1 Minimum data rate B = B0 + Bk . (15)
R2 R 2
k=1
0.8
Figure 8 is the analog of Figure 7 for the values of Table
Cell capacity
0.2
Number of users
1 Minimum data rate
0
0 0.5 1 1.5 2 2.5
Cell radius 0.8
Cell capacity
0.8
Cell capacity
0
0 0.5 1 1.5 2 2.5
0.6
Cell radius
0.4
Figure 11: Comparison of the cell capacity – defined
as the maximum traffic intensity for a minimum data
0.2
rate cmin = 0.02 and a target blocking rate 1% – ob-
tained for a constant target energy-per-bit to noise
0
ratio and for HDR channels with two admission cri- 0 0.5 1 1.5 2 2.5
teria (path loss exponent α = 4). Cell radius
0
sponding distances: r 0 ≈ 0.47, r00 ≈ 1.3.
As illustrated in Figure 12 for Rayleigh fading, the impact We denote by x the number of near users, x00 the number
of fast fading on cell capacity is significant for a cell radius of far users, and x0 the number of other users. For near
R ≈ 1 only (recall the convention r0 = 1). This can be users, we have C(r) ≈ C0 and there is no scheduling gain.
explained by the fact that, due to the maximum peak rate For far users, we have C(r) ≈ C0 ×( rr0 )α and the distribution
C0 , the positive effects of fast fading do not compensate of the feasible rate is approximately that of ξ × C(r). The
transmission rate of any user at distance r > r 00 from the 7. IMPACT OF INTERFERENCE
BS is then: In order to assess the impact of interference on cell capac-
C(r) ity, we consider two types of homogeneous networks: linear
G00 × ,
x + x0 + x00 networks, where BS are equidistant and placed on a common
infinite line; hexagonal networks, where cells are hexagons of
where G00 denotes the scheduling gain. In the presence of
the same size and cover the entire plane. In both cases, de-
i far users, a conservative approximation of the scheduling
note by 2 × R the distance between two BS. We assume that
gain G00 (i) is what one would obtain in the absence of any
the BS are always active and transmit at the same power P .
other users, corresponding to a symmetric scenario as con-
The interference suffered by user u served by BS b is then:
sidered in [8]. Denoting by ξ1 , ξ2 , . . . , ξi i.i.d. copies of ξ, we
deduce: 0
Iu = P × Γ(rub ),
G00 (i) = E[max(ξ1 , ξ2 , . . . , ξi )]. b0 6=b
r0
0
we still denote by r0 the maximum distance at which this
where ξ is a unit mean random variable representing the maximum peak rate is achieved in the absence of interfer-
variations around the mean rate C 0 . The transmission rate ence, i.e.,
of any user at distance r ∈ [r 0 , r00 ] from the BS is then:
W Γ(r0 )
C0 C0 = × . (17)
G0 × , δ η̄
x + x0 + x00
where G0 denotes the scheduling gain. In the presence of i 7.1 Linear networks
such users, a conservative approximation of the scheduling We first consider a linear network. A reasonable approxi-
gain G0 (i) is what one would obtain in the absence of any mation consists in considering that interference is generated
other users, corresponding again to a symmetric scenario as by the 2 closest BS only. The interference term I¯ is then:
considered in [8]. Denoting by ξ10 , ξ20 , . . . , ξi0 i.i.d. copies of ξ 0 , ¯ = Γ(2R − r) + Γ(2R + r).
we deduce: I(r)
G0 (i) = E[max(ξ10 , ξ20 , . . . , ξi0 )]. We deduce the peak rate function:
given by:
x0 x00
(x + x0 + x00 )! x ρ̄0 ρ̄00
π(x, x0 , x00 ) = π(0) 0 00
ρ̄ .
x!x !x ! i=1
G0 (i) i=1
G00 (i)
0 r0 r 00
Denoting by m the maximum number of users, the blocking Note that, in view of (17), this function is entirely deter-
rate is independent of user location and given by: mined by the maximum peak rate C0 , the distance r0 and
the ratio W/δ. Previous results still hold, with the cell load
x+x0 +x00 =m π(x, x0 , x00 ) given by:
B= 0 00
(16)
x+x0 +x00 ≤m π(x, x , x ). R
ρ2dr
ρ̄ = . (18)
As illustrated in Figure 12 for Rayleigh fading, the impact C(r)
0
of opportunistic scheduling on cell capacity is relatively lim-
The cell capacity, defined as the maximum traffic intensity
ited, especially for large cells. This is a rather counter-
without saturation, is given by:
intuitive result in view of the high scheduling gains (e.g.,
G0 (i) ≈ 1.5 and G00 (i) ≈ 2.9 for i = 10). This may notably R
dr
−1
0
ing gain and admission control, the number of active users
is typically rather small in steady state (cf. Section 3). The Figure 14 gives the cell capacity with respect to the cell
number of active users is here further limited by admission radius (normalized values C0 = 1, r0 = 1) for HDR param-
control, especially for large cells. eters (W = C0 /2, δ = 2.5dB) and negligible ε. This is a
decreasing function of the cell radius, with a maximum cell 7.2 Hexagonal networks
capacity equal to: Now consider a hexagonal network. The interference suf-
fered by a user u served by BS b is almost entirely generated
0.86 for α = 4,
C(0) ≈ by the 6 surrounding BS. A conservative approximation of
0.70 for α = 2.
the interference term I¯ is given by the following function of
Thus the impact of interference on cell capacity is significant, the distance r from BS b to user u:
especially for small cells. This is notably due to the fact ¯
I(r)= Γ(2R − r) + 2Γ( (R − r)2 + 3R2 )
that, for HDR parameters, the maximum peak rate C0 is
achievable at a distance r strictly smaller than R, whatever +2Γ( (R + r)2 + 3R2 ) + Γ(2R + r).
the cell radius R. This approximation is obtained assuming that user u is on
a segment from BS b to a neighbor BS b0 . We deduce the
1 peak rate function:
With interference
Without interference W Γ(r)
0.8 C(r) = min C0 , × ¯ .
δ η + I(r)
Cell capacity
0.6
0.4
0.2
0
0 2 4 6 8 10 12
Cell radius
1
With interference
Without interference
With interference 0.8
1 Without interference
Cell capacity
0.8 0.6
Cell capacity
0.6 0.4
0.4 0.2
0.2 0
0 2 4 6 8 10 12
0 Cell radius
0 0.5 1 1.5 2 2.5 3
Cell radius Figure 17: Cell capacity in a hexagonal network
– defined as the maximum traffic intensity with-
Figure 15: Cell capacity in a linear network – de- out saturation for path loss exponent α = 4 (lower
fined as the maximum traffic intensity for a mini- curves) and α = 2 (lower curves) – with and without
mum data rate cmin = 0.02 and target blocking rates interference.
1% (lower curves) and 5% (upper curves) – with and
without interference.
For simplicity, we approximate the hexagonal cells by cir-
cular cells of radius R. Figure 17 compares the cell capacity
In the presence of an admission control based on a max- – defined as the maximum traffic intensity without satura-
imum number of active users m = C(R)/cmin , the blocking tion – with and without interference. This is a decreasing
rate is given by expression (12) for the cell load (18). Fig- function of the cell radius, with a maximum cell capacity
ure 15 gives the corresponding cell capacity for a path loss equal to:
exponent α = 4. Again, we observe that the impact of in- 0.65 for α = 4,
C(0) ≈
terference on cell capacity is significant. 0.29 for α = 2.
With interference
1 Without interference Some issues need to be further explored. For instance, we
assumed in Section 7 that BS are always active and observed
0.8 an important decrease of the cell capacity due to interfer-
ence. It would be useful to study how idle periods of BS
Cell capacity