Sensitivity Study of Optimal eICIC Configurations in Different Heterogeneous Network Scenarios

Yuanye Wang, Beatriz Soret Alvarez, Klaus I. Pedersen

Research output: Contribution to book/anthology/report/conference proceedingArticle in proceedingResearchpeer-review

22 Citations (Scopus)

Abstract

Heterogeneous Networks (HetNet) have been recognized as a key enabler for providing high data rates. However, co-channel deployed HetNet will experience inter-layer interference, and hence calls for use of enhanced Inter-Cell Interference Coordination (eICIC) to solve such interference problems. In order to achieve the full performance benefits of eICIC, its corresponding configuration parameters shall be carefully adjusted. In this paper we study how sensitive the HetNet performance is for different eICIC parameters in different HetNet scenarios, and provide guidelines on how to set them. Among others, it is concluded how the spatial UE distribution, the used propagation models, and pico eNB transmit power settings influence the performance and the optimal eICIC parameter choice.
Original languageEnglish
Title of host publicationProceedings of 2012 IEEE International Conference on Communications (ICC) : International Workshop on Small Cell Wireless Networks
Number of pages5
PublisherIEEE Press
Publication date2012
Pages6792-6796
ISBN (Print)978-1-4577-2052-9
ISBN (Electronic)978-1-4577-2051-2
DOIs
Publication statusPublished - 2012
Event2012 IEEE International Conference on Communications - Ottawa Convention Centre (OCC), 55 Colonel By Drive
, Ottawa, Ontario K1N 9J2, Ottawa, Canada
Duration: 10 Jun 201215 Jun 2012

Conference

Conference2012 IEEE International Conference on Communications
LocationOttawa Convention Centre (OCC), 55 Colonel By Drive
, Ottawa, Ontario K1N 9J2
CountryCanada
CityOttawa
Period10/06/201215/06/2012
SeriesI E E E International Conference on Communications
ISSN1550-3607

Fingerprint Dive into the research topics of 'Sensitivity Study of Optimal eICIC Configurations in Different Heterogeneous Network Scenarios'. Together they form a unique fingerprint.

Cite this