2015
DOI: 10.1007/s11276-015-1165-z
|View full text |Cite
|
Sign up to set email alerts
|

Survey of ICIC techniques in LTE networks under various mobile environment parameters

Abstract: LTE networks' main challenge is to efficiently use the available spectrum, and to provide satisfying quality of service for mobile users. However, using the same bandwidth among adjacent cells leads to occurrence of Inter-cell Interference (ICI) especially at the cell-edge. Basic interference mitigation approaches consider bandwidth partitioning techniques between adjacent cells, such as frequency reuse of factor m schemes, to minimize cell-edge interference. Although SINR values are improved, such techniques … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
28
0
10

Year Published

2016
2016
2020
2020

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 45 publications
(38 citation statements)
references
References 45 publications
0
28
0
10
Order By: Relevance
“…For these fifty survey articles that were retrieved from SCO-PUS and Web of Science and were published from 2007 to 2017 we performed a categorization which is presented in table III. Based on this categorization it is obvious that except from three big categories of articles, one dealing with scheduling and interference mitigation [11], [12], [13], [14], [15], [8], the other with D2D Communication [16], [17], [18], [19], [20], [21] and the third with security and privacy issues [22], [23], [24], [25], [8], [26], [27], all areas of research that are somehow related to 3G, 4G and 5G networks were surveyed and presented in previous surveys from at least one review article. As the technology progress and the networks evolve from 3G to 4G, 5G and even 6G [28], the number of articles that survey 4G and 5G networks increases from only one that was published back in 2007, to over twenty articles published in 2016.…”
Section: Existing Surveys For 4g and 5g Cellularmentioning
confidence: 99%
“…For these fifty survey articles that were retrieved from SCO-PUS and Web of Science and were published from 2007 to 2017 we performed a categorization which is presented in table III. Based on this categorization it is obvious that except from three big categories of articles, one dealing with scheduling and interference mitigation [11], [12], [13], [14], [15], [8], the other with D2D Communication [16], [17], [18], [19], [20], [21] and the third with security and privacy issues [22], [23], [24], [25], [8], [26], [27], all areas of research that are somehow related to 3G, 4G and 5G networks were surveyed and presented in previous surveys from at least one review article. As the technology progress and the networks evolve from 3G to 4G, 5G and even 6G [28], the number of articles that survey 4G and 5G networks increases from only one that was published back in 2007, to over twenty articles published in 2016.…”
Section: Existing Surveys For 4g and 5g Cellularmentioning
confidence: 99%
“…We also compare the performance of our proposed centralized and decentralized resource and power allocation approaches with that of state-of-the-art resource and power allocation approaches [36] such as the frequency reuse-1 400 model, the frequency reuse-3 model, FFR, SFR, and a single cell resource and power allocation approach [12]. Note that our centralized approach searches for the optimal resource and power allocation.…”
Section: Comparison With State-of-the-art Resource Allocation Approachesmentioning
confidence: 99%
“…Nevertheless, this deployment leads to significant interference in such heterogeneous networks. Femtocell-aware ICIC techniques modify resource allocation between the macro LTE/LTE-A cells and the small cells deployed within their coverage area [6]. The available spectrum is divided into a macro-dedicated portion and a Femto-sharing portion.…”
Section: E Frequency Scheduling Techniquesmentioning
confidence: 99%
“…It is inferred from the geographical locations of the UEs. In the second step, resource allocation is performed by finding among the possible resource assignments, the one that best leverages the instantaneous channel quality [6]. Each node of the interference graph represents a base station, and each link indicates that the two connected nodes are interfering with each other.…”
Section: G Graph Theorymentioning
confidence: 99%