Skip to main content Accessibility help
×
Hostname: page-component-848d4c4894-pftt2 Total loading time: 0 Render date: 2024-05-11T06:51:10.743Z Has data issue: false hasContentIssue false

2 - Fundamentals of access control in femtocells

Published online by Cambridge University Press:  05 May 2013

Ping Xia
Affiliation:
University of Texas at Austin
Han-Shin Jo
Affiliation:
University of Texas at Austin
Jeffrey G. Andrews
Affiliation:
University of Texas at Austin
Tony Q. S. Quek
Affiliation:
Singapore University of Technology and Design
Guillaume de la Roche
Affiliation:
Mindspeed Technologies
İsmail Güvenç
Affiliation:
Florida International University
Marios Kountouris
Affiliation:
SUPÉLEC (Ecole Supérieure d'Electricité)
Get access

Summary

Access control in femtocell deployments

One unique trait of femtocells is that they are paid, installed, and managed by the end users. Compared with macrocells, which are installed by the network operators and thus can be accessed by any user, femtocells can choose the set of users that is allowed for access. In the simplest scenario, the femtocell can be configured for either: (i) closed access, where only registered home users can use the femtocell; or (ii) open access where any nearby users are allowed to use the femtocell. The choice of femtocell access control involves many important issues in two-tier femtocell networks [1-6].

The first important issue is cross-tier interference. Unlike wireless fidelity (WiFi) access points, femtocells serve users in licensed spectrum to guarantee quality of service (QoS) and because the devices they communicate with are developed for those frequencies. Compared to allocating separate channels inside the licensed spectrum exclusively to femtocells, sharing spectrum would be preferred from an operator perspective [1, 5, 7]. However, the co-channel spectrum sharing between femtocells and macrocells potentially gives rise to serious cross-tier interference in closed access. As shown in Figures 2.1 and 2.2, in closed access a cellular user, even when it is geographically close to a femtocell, is forced to communicate with the distant macro base station (BS). Therefore, this cellular user suffers from strong downlink interference from the nearby femtocell (see Figure 2.1), and likewise causes strong uplink interference to that femtocell (see Figure 2.2) [8-10].

Type
Chapter
Information
Small Cell Networks
Deployment, PHY Techniques, and Resource Management
, pp. 13 - 43
Publisher: Cambridge University Press
Print publication year: 2013

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

[1] V., Chandrasekhar, J. G., Andrews, and A., Gatherer, “Femtocell networks: a survey,” IEEE Commun. Mag., vol. 46, no. 9, pp. 59–67, Sep. 2008.Google Scholar
[2] A., Golaup, M., Mustapha, and L., Patanapongpibul, “Femtocell access control strategy in UMTS and LTE,” IEEE Commun. Mag., vol. 47, no. 9, pp. 117–23, Sep. 2009.Google Scholar
[3] R. Y., Kim, J. S., Kwak, and K., Etemad, “WiMAX femtocell: requirements, challenges, and solutions,” IEEE Commun. Mag., vol. 47, no. 9, pp. 84–91, Sep. 2009.Google Scholar
[4] G., de la Roche, A., Valcarce, D., López-Pérez, and J., Zhang, “Access control mechanisms for femtocells,” IEEE Commun. Mag., vol. 48, no. 1, pp. 33–9, Jan. 2010.Google Scholar
[5] J. G., Andrews, H., Claussen, M., Dohler, S., Rangan, and M. C., Reed, “Femtocells: past, present, and future,” IEEE J. Sel. Areas Commun. (JSAC), vol. 30, no. 3, pp. 497–508, Apr. 2012.Google Scholar
[6] S., Yun, Y., Yi, D.-H., Cho, and J., Mo, “Open or close: on the sharing of femtocells,” in Proc. IEEE Int. Conf. on Computer Commun. (INFOCOM), Apr. 2011, pp. 116–20.Google Scholar
[7] D., Choi, P., Monajemi, S., Kang, and J., Villasenor, “Dealing with loud neighbors: the benefits and tradeoffs of adaptive femtocell access,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Nov.–Dec. 2008.Google Scholar
[8] S., Joshi, R., Cheung, P., Monajemi, and J., Villasenor, “Traffic-based study of femtocell access policy impacts on HSPA service quality,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Nov. 2009, pp. 1–6.Google Scholar
[9] “Initial Home NodeB coexistence simulation results,” Nokia Siemens Networks, 3GPP Document Reference R4-070902, 3GPP TSG-RAN WG4 Meeting 43bis, June 2007.
[10] “3rd Generation Partnership Project; Technical Specification Group Radio Access Networks; 3G Home NodeB Study Item Technical Report (Release 8),” 3GPP, 3GPP TR 25.820, Mar. 2008.
[11] “Open and closed access for Home NodeBs,” Nortel, Vodafone, 3GPP document Reference R4-071231, 3GPP TSG-RAN WG4 Meeting 44, Aug. 2007.
[12] D., López-Pérez, A., Valcarce, G. D. L., Roche, E., Liu, and J., Zhang, “Access methods to WiMAX femtocells: a downlink system-level case study,” in IEEE Singapore Int. Conf. on Commun. Systems (ICCS), Nov. 2008, pp. 1657–62.Google Scholar
[13] V., Chandrasekhar, J. G., Andrews, T., Muharemovic, Z., Shen, and A., Gatherer, “Power control in two-tier femtocell networks,” IEEE Trans. Wireless Commun., vol. 8, no. 8, pp. 4316–28, Aug. 2009.Google Scholar
[14] “Cisco visual networking index: global mobile data traffic forecast update, 2010–2015,” White Paper, Cisco, Feb. 2011.
[15] A., Khandekar, N., Bhushan, J., Tingfang, and V., Vanghi, “LTE advanced: heterogeneous networks,” in European Wireless Conference, June 2010, pp. 978–82.Google Scholar
[16] D., López-Pérez, A., Valcarce, A., Ladanyi, G., de la Roche, and J., Zhang, “Intracell handover for interference and handover mitigation in OFDMA two-tier macrocell-femtocell networks,” EURASIP J. Wireless Commun. Networking, vol. 2010 (2010), pp. 1–15, Feb. 2010.Google Scholar
[17] P., Tarasak, T. Q. S., Quek, and F. P. S., Chin, “Uplink timing misalignment in open and closed access OFDMA femtocell networks,” IEEE Commun. Lett., vol. 15, no. 9, pp. 926–8, Sep. 2011.Google Scholar
[18] T., Elkourdi and O., Simeone, “Outage and diversity-multiplexing trade-off analysis of closed and open-access femtocells,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Dec. 2010.Google Scholar
[19] O., Simeone, E., Erkip, and S., Shamai, “Robust communication against femtocell access failures,” in Proc. IEEE Inform. Theory Workshop (ITW), Oct. 2009, pp. 263–7.Google Scholar
[20] S., Barbarossa, A., Carfagna, S., Sardellitti, M., Omilipo, and L., Pescosolido, “Optimal radio access in femtocell networks based on Markov modeling of interferers' activity,” in Proc. IEEE Int. Conf. on Acoustics, Speech, and Sig. Proc. (ICASSP), May 2011, pp. 3212–15.Google Scholar
[21] S., Mukherjee, “UE coverage in LTE macro network with mixed CSG and open access femto overlay,” in Proc. IEEE Int. Conf. on Commun. (ICC), June 2011.Google Scholar
[22] S., Mukherjee, “Analysis of UE outage probability and macrocellular traffic offloading for WCDMA macro network with femto overlay under closed and open access,” in Proc. IEEE Int. Conf. on Commun. (ICC), June 2011.Google Scholar
[23] Y., Chen, J., Zhang, and Q., Zhang, “Utility-aware refunding framework for hybrid access femtocell network,” IEEE Trans. Wireless Commun., vol. 11, no. 5, pp. 1688–97, May 2012.Google Scholar
[24] Y. Y., Li, L., Yen, and E. S., Sousa, “Hybrid user access control in HSDPA femtocells,” in Proc. IEEE Global Telecommun. Conf. (GLOBECOM), Dec. 2010, pp. 679–83.Google Scholar
[25] V., Chandrasekhar, M., Kountouris, and J. G., Andrews, “Coverage in multi-antenna two-tier networks,” IEEE Trans. Wireless Commun., vol. 8, no. 10, pp. 5314–27, Oct. 2009.Google Scholar
[26] V., Chandrasekhar and J. G., Andrews, “Spectrum allocation in two-tier networks,” IEEE Trans. on Communications, vol. 57, no. 10, pp. 3059–68, Oct. 2009.Google Scholar
[27] M.-S., Alouini and A., Goldsmith, “Area spectral efficiency of cellular mobile radio systems,” IEEE Trans. Veh. Technol., vol. 48, no. 4, pp. 1047–66, July 1999.Google Scholar
[28] F., Baccelli, B., Blaszczyszyn, and P., Muhlethaler, “An ALOHA protocol for multihop mobile wireless networks,” IEEE Trans. Inform. Theory, vol. 8, no. 6, pp. 569–86, Feb. 2006.Google Scholar
[29] D. N., Knisely, T., Yoshizawa, and F., Favichia, “Standardization of femtocells in 3GPP,” IEEE Commun. Mag., vol. 47, no. 9, pp. 68–75, Sep. 2009.Google Scholar
[30] D. N., Knisely and F., Favichia, “Standardization of femtocells in 3GPP2,” IEEE Commun. Mag., vol. 47, no. 9, pp. 76–82, Sep. 2009.Google Scholar
[31] P., Humblet, B., Raghothaman, A., Srinivas, S., Balasubramanian, C., Patel, and M., Yavuz, “System design of cdma2000 femtocells,” IEEE Commun. Mag., vol. 47, no. 9, pp. 92–100, Sep. 2009.Google Scholar
[32] M., Yavuz, F., Meshkati, S., Nanda, A., Pokhariyal, N., Johnson, B., Raghothaman, and A., Richardson, “Interference management and performance analysis of UMTS/HSPA+ femtocells,” IEEE Commun. Mag., vol. 47, no. 9, pp. 102–9, Sep. 2009.Google Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×