Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization...

135
Stochastic Analysis and Optimization of Heterogeneous Wireless Networks by Wei Bao A thesis submitted in conformity with the requirements for the degree of Doctor of Philosophy Graduate Department of Electrical and Computer Engineering University of Toronto c Copyright 2016 by Wei Bao

Transcript of Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization...

Page 1: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Stochastic Analysis and Optimization of Heterogeneous WirelessNetworks

by

Wei Bao

A thesis submitted in conformity with the requirementsfor the degree of Doctor of Philosophy

Graduate Department of Electrical and Computer EngineeringUniversity of Toronto

c⃝ Copyright 2016 by Wei Bao

Page 2: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Abstract

Stochastic Analysis and Optimization of Heterogeneous Wireless Networks

Wei Bao

Doctor of Philosophy

Graduate Department of Electrical and Computer Engineering

University of Toronto

2016

In order to improve the performance of mobile networks, one widely promoted approach is to install

a diverse set of small-cells overlaying the current macrocell network to form a multi-tier heterogeneous

wireless network (HWN). In this thesis, I propose new stochastic approaches to evaluate and design

HWNs by investigating user load, interference patterns, and user mobility, the results of which provide

new analytical insights and design guidelines to improve future HWNs.

In the first part of this thesis, I focus on the evaluation of user load through characterizing the

joint distribution of users in different cells in an HWN with arbitrary user movement trajectories and

dependently distributed user channel holding times. Through developing a new stochastic network

analysis framework, I derive a closed-form expression for the joint user distribution, which is only related

to the average arrival rate and the average channel holding time of each cell, and hence it is irrelevant to

the general user movement patterns and distributions of channel holding times. This property suggests

that accurate evaluation of the user distribution and other associated metrics such as the system workload

can be achieved with low complexity, without the need to collect a large amount of user location data.

The multi-tier architecture of HWNs introduces complicated interference patterns in the system. In

the second part of this thesis, I introduce a stochastic analytical framework to compare the performance

of open and closed access modes in a two-tier network with macrocells and femtocells, with regard

to uplink interference and outage at both the macrocell and femtocell levels. A stochastic geometric

approach is employed as the basis for the analysis to characterize the distributions of uplink interference

and the outage probabilities. I further derive sufficient conditions for open and closed access modes to

outperform each other in terms of the outage probability at either the macrocell or femtocell level. This

leads to closed-form expressions to upper and lower bound the difference in the targeted received power

between the two access modes.

In the third part of this thesis, I study the resource allocation and user association problem in HWNs

with random distributed users and BSs for optimizing the average user data rate. Both the user load and

interference patterns are considered. I first derive the average user data rate through stochastic geometric

analysis. The expression is employed as the objective function of the optimization problem, which is

ii

Page 3: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

non-convex in nature and cannot be solved with a standard method. Then, I propose an innovative

approach, solving the optimization problem optimally for low user density, and asymptotically optimally

for high user density.

The deployment of small-cell BSs in HWNs leads to a higher user data rate, but it also introduces

more handoffs to the users. In the fourth part of this thesis, I present a new stochastic geometric analysis

framework on user mobility in HWNs, which captures the spatial randomness and various scales of cell

sizes in different tiers. I derive analytical expressions for the rates of all handoff types experienced by

an active user with arbitrary movement trajectory. Noting that the data rate of a user also depends on

the set of cell tiers that it is willing to use, I also provide guidelines for tier selection under various user

velocity, so that an optimal tradeoff between the handoff rate and the data rate can be achieved.

iii

Page 4: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Acknowledgements

First, I would like to express my deepest gratitude to my supervisor, Prof. Ben Liang, for his

patient guidance, constant encouragement, and excellent advice throughout my PhD study. Without his

invaluable help, this work would not be possible.

I would like to thank Prof. Wei Yu for being my thesis committee member and for his collaboration

with me on part of my research. His suggestions significantly improved the quality of the thesis. I would

also like to thank committee member Prof. Jorg Liebeherr for his careful proof reading and insightful

suggestions on this thesis. In addition, Prof. Jianping Pan graciously agreed to be my external examiner,

and his feedback in the final stage was very helpful. I am also very grateful to Dr. Stefen Valentin, who

offered me the precious research intern opportunity at the Bell Labs and helped a lot in my research.

I am very grateful to Dr. Wei Wang for his help in improving my research skills and planning my

future career. His strong support and encouragement kept me motivated and confident. I would also like

to thank Dr. Yicheng Lin for his collaboration with me on our IEEE JSAC paper. His visions on future

mobile networks greatly inspired me. Special thanks also go to Dr. Sun Sun, Jaya Prakash Champati,

Yuhan Zhou, and Binbin Dai, who provided me with precious assistance during my PhD study. Thanks

to all my colleagues who offered helpful discussions: Dr. Mahdi Hajiaghayi, Ali Ramezani, Meng-Hsi

Chen, Dr. Ruhallah Ali Hemmati, Yujie Xu, Sowndarya Sundar, Qiang Xiao, Dr. Honghao Ju, Juan

Wen, Caiyi Zhu, Wanyao Zhao, Samer Fouad Zakhary, and others.

I must also mention the joy moments I had on weekends and holidays, such as badminton games,

board games, travels, picnics, and so on. They will definitely become special memories of mine when

looking back to my PhD life. Thanks to Dr. Wei Wang, Dr. Yicheng Lin, Yu Xiao, Binbin Dai, Dan

Fang, Dr. Tony Liang Liang, Jessica Yihua Hu, Yuhan Zhou, Caiyi Zhu, Wanyao Zhao, Dr. Qi Zhang,

and Siyu Liu who have brought happiness to my life. I must also mention Yifei Hao, Yu Xia, Dr. Wenbo

Shi, Candy Tian Yu, and Yichun Qiu. Thanks for their encouragement, support, and most of all their

humor. They kept things light and me smiling.

I must acknowledge with tremendous thanks to my wife, Zhi Zeng. Through your love, patience,

support, and unwavering belief in me, I’ve been able to complete my long PhD journey. Thank you with

all my heart and soul. I love you and am forever indebted to you for giving me your love and heart.

Finally, I take this opportunity to express my profound gratitude to my beloved parents for under-

standing, support, and endless love during my study in Canada. To you I dedicate this thesis.

This research was partially funded by Bell Canada and the Natural Sciences and Engineering Research

Council (NSERC) of Canada.

iv

Page 5: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Contents

1 Introduction 1

1.1 New Challenges in Analysis and Design of HWNs . . . . . . . . . . . . . . . . . . . . . . . 1

1.1.1 Understanding User Distribution in HWNs . . . . . . . . . . . . . . . . . . . . . . 1

1.1.2 Characterization of Interference Patterns . . . . . . . . . . . . . . . . . . . . . . . 2

1.1.3 Design of User Association Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.1.4 Quantification of Handoff Patterns . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.2 Thesis Outline and Main Contributions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4

1.2.1 User Distribution under General Mobility and Session Patterns . . . . . . . . . . . 4

1.2.2 Uplink Interference Comparison of Open Access and Closed Access . . . . . . . . . 5

1.2.3 Optimal Spectrum Allocation and User Association . . . . . . . . . . . . . . . . . 5

1.2.4 Handoff Rate Analysis in HWNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6

2 Related Works 7

2.1 User Mobility Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2.1.1 Queueing Networks Models . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7

2.1.2 Insensitivity Property of Queueing Networks . . . . . . . . . . . . . . . . . . . . . 7

2.1.3 Mobility Modeling with Cell Geometry . . . . . . . . . . . . . . . . . . . . . . . . . 8

2.2 Interference Analysis of HWNs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

2.2.1 Stochastic Geometry as a Basic Tool . . . . . . . . . . . . . . . . . . . . . . . . . . 8

2.2.2 Downlink Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8

2.2.3 Uplink Interference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9

2.3 Spectrum Allocation and User Association . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

2.4 A Brief Review on Queueing Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

2.4.1 Queueing Network under Consideration . . . . . . . . . . . . . . . . . . . . . . . . 11

2.4.2 Routing Balance Equations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11

2.4.3 Stationary Distributions of Jackson Networks . . . . . . . . . . . . . . . . . . . . . 11

2.5 A Brief Review on Stochastic Geometry . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

2.5.1 Interference Analysis Based on Poisson Point Process . . . . . . . . . . . . . . . . 12

2.5.2 Random Fibre Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

2.6 Publications Related to this Thesis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13

3 Insensitivity of User Distribution in HWNs 14

3.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

3.2 Stationary User Distribution in Single-Route Network . . . . . . . . . . . . . . . . . . . . 16

v

Page 6: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

3.2.1 Queueing Network Model for Single-Route Network . . . . . . . . . . . . . . . . . 16

3.2.2 Reference Single-Route Memoryless Network . . . . . . . . . . . . . . . . . . . . . 17

3.2.3 Insensitivity of Single-Route Network . . . . . . . . . . . . . . . . . . . . . . . . . 18

3.3 Stationary User Distribution in Multiple-Route Network . . . . . . . . . . . . . . . . . . . 21

3.3.1 Queueing Network Model for Multiple-Route Network . . . . . . . . . . . . . . . . 21

3.3.2 Insensitivity of π(x) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

3.3.3 Insensitivity of π1(y) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22

3.4 Experimental Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

3.4.1 Requirements and the Dartmouth Traces . . . . . . . . . . . . . . . . . . . . . . . 23

3.4.2 Data Preprocessing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

3.4.3 Trace Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24

3.4.4 Marginal User Distribution at a Single AP . . . . . . . . . . . . . . . . . . . . . . . 26

3.4.5 KL Divergence and Entropy Gap for Multiple APs . . . . . . . . . . . . . . . . . . 26

3.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30

4 Uplink Interference Analysis: Open Access versus Closed Access 31

4.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

4.1.1 Two-tier Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

4.1.2 Open Access versus Closed Access . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

4.1.3 Path Loss and Power Control . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

4.1.4 Outage Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33

4.2 Open Access vs. Closed Access at the Macrocell Level . . . . . . . . . . . . . . . . . . . . 34

4.2.1 Open Access Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 34

4.2.2 Closed Access Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36

4.2.3 Parameter Normalization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

4.2.4 Open Access vs. Closed Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37

4.3 Open Access vs. Closed Access at the Femtocell Level . . . . . . . . . . . . . . . . . . . . 39

4.3.1 Open Access Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 39

4.3.2 Closed Access Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

4.3.3 Open Access vs. Closed Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41

4.4 Numerical Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42

4.5 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46

5 Rate Maximization through Spectrum Allocation and User Association 47

5.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

5.1.1 Multi-tier Wireless Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47

5.1.2 Power and Path Loss Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

5.1.3 Spectrum Allocation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

5.1.4 Coverage Probability and UE Data Rate . . . . . . . . . . . . . . . . . . . . . . . . 48

5.1.5 Flexible User Association . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48

5.1.6 Problem Statement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

5.2 Closed-form Average UE Data Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49

5.3 Optimization Problem and SSAUA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 51

5.3.1 Density Thresholding Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52

vi

Page 7: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

5.3.2 SSAUA under∑K

i=1 ai > 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53

5.3.3 SSAUA under∑K

i=1 ai < 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 54

5.3.4 Computational Complexity Comparison . . . . . . . . . . . . . . . . . . . . . . . . 56

5.4 Nash Equilibrium for SSAUA . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57

5.5 The Multiple-MCS Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

5.5.1 Average UE Data Rate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58

5.5.2 SSAUA in the Multiple-MCS Case . . . . . . . . . . . . . . . . . . . . . . . . . . . 59

5.6 Numerical Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60

5.6.1 Average UE Data Rate under Different UE Densities . . . . . . . . . . . . . . . . . 60

5.6.2 Average UE Data Rate under Different Path Loss Exponents . . . . . . . . . . . . 62

5.6.3 Association Bias Values and Prices . . . . . . . . . . . . . . . . . . . . . . . . . . . 62

5.6.4 Run Time Experiment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

5.6.5 Performance of SSAUA in the Multiple-MCS Case . . . . . . . . . . . . . . . . . . 63

5.6.6 Performance Comparison under More Realistic Network Topologies . . . . . . . . . 64

5.7 Summary and Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

6 Stochastic Geometric Analysis of User Mobility in HWNs 67

6.1 Handoff Rate Analysis in HWNs with Poisson Patterns . . . . . . . . . . . . . . . . . . . 67

6.1.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68

6.1.2 Handoff Rate Analysis in Multi-tier HWNs . . . . . . . . . . . . . . . . . . . . . . 69

6.1.3 UE’s Data Rate and Tier Selection . . . . . . . . . . . . . . . . . . . . . . . . . . . 73

6.1.4 Experimental Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75

6.2 Handoff Rate Analysis in HWNs with Poisson and Poisson Cluster Patterns . . . . . . . . 81

6.2.1 System Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

6.2.2 Handoff Rate Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

6.2.3 Numerical Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88

6.3 Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

7 Conclusions 91

A Proofs of Theorems in Chapter 4 93

A.1 Proof of Theorem 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93

A.2 Proof of Theorem 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94

A.3 Proof of Theorem 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96

A.4 Proof of Theorem 6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97

A.5 Proof of Lemma 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98

B Properties and Proofs of Chapter 5 100

B.1 Useful Properties of Mk(Ak) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

B.2 Proof of Lemma 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

B.3 Proof of Lemma 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100

B.4 Useful Properties of Mk(Ak) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

B.5 Proof of Lemma 4 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101

B.6 Proof of Theorem 10 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103

B.7 Some Properties Used for Exhaustive Search . . . . . . . . . . . . . . . . . . . . . . . . . . 103

vii

Page 8: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

B.8 Proofs of Properties of Mk(·) in the Multiple-MCS Case . . . . . . . . . . . . . . . . . . . 103

B.8.1 Property (M-1) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

B.8.2 Property (M-2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

B.8.3 Property (M-3) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

B.8.4 Property (M-4) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104

B.9 Numerical Verification of Properties (M-2’) and (M-5’) of Mk(Ak) in the Multiple-MCS

Case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

C Derivations and Proofs of Theorems in Chapter 6 106

C.1 Proof of Theorem 11 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106

C.2 Proof of Theorem 12 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109

C.3 Derivation of P(Rk > R0) when k ∈ KC . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110

C.4 Proof of Theorem 15 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

C.5 Proof of Theorem 16 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111

C.6 Proof of Theorem 18 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112

C.7 Proof of Lemma 7 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114

Bibliography 115

viii

Page 9: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

List of Tables

3.1 Number of stages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

ix

Page 10: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

List of Figures

1.1 (a) Three separated tiers of BSs. From top to bottom: macrocell, picocell, and femtocell

BSs. (b) A three-tier HWN. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2

1.2 An example of a three-tier HWN. Macrocell BSs, picocell BSs, and femtocell BSs are

represented by squares, circles, and triangles, respectively; users are represented by dots;

blue solid lines show cell boundaries; dashed lines represent connections between users

and BSs. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3

1.3 An example of a three-tier HWN and selective tier association. Tier-1, 2, and 3 BSs are

represented by squares, circles, and triangles, respectively; blue curves show intra-tier cell

boundaries; green curves show inter-tier cell boundaries. . . . . . . . . . . . . . . . . . . . 4

3.1 System model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15

3.2 Single-route network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16

3.3 Decoupled network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18

3.4 Reference memoryless decoupled network. . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

3.5 Multiple-route network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21

3.6 The pdf of channel holding time in different stages. . . . . . . . . . . . . . . . . . . . . . . 26

3.7 Comparison of distributions for single APs. Real distributions are in solid lines; analytical

distributions are in dashed lines. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

3.8 Hkl and Hreal under the influence of non-Poisson arrivals. . . . . . . . . . . . . . . . . . . 28

3.9 Hgap and Hreal under the influence of non-Poisson arrivals. . . . . . . . . . . . . . . . . . 28

3.10 Hkl, Hgap and Hreal under the influence of distance restriction. . . . . . . . . . . . . . . . 28

3.11 Hkl, Hgap and Hreal under the influence of one-stage sessions. . . . . . . . . . . . . . . . . 28

4.1 Two-tier network with macrocells and femtocells. . . . . . . . . . . . . . . . . . . . . . . . 32

4.2 Macrocell outage probability under different λ, with µ = 4 units/km2/sub-band and T = 0.1. 43

4.3 Femtocell outage probability under different λ, with µ = 4 units/km2/sub-band and T = 0.1. 43

4.4 Macrocell outage probability under different µ, with λ = 4 units/km2/sub-band and T = 0.1. 43

4.5 Femtocell outage probability under different µ, with λ = 4 units/km2/sub-band and T = 0.1. 43

4.6 Macrocell outage probability under different T , with λ = 8 units/km2/sub-band and µ = 8

units/km2/sub-band. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

4.7 Femtocell outage probability under different T , with λ = 8 units/km2/sub-band and µ = 8

units/km2/sub-band. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

4.8 ρ∗ under different R at the macrocell level. . . . . . . . . . . . . . . . . . . . . . . . . . . 45

4.9 ρ∗∗ under different R at the femtocell level. . . . . . . . . . . . . . . . . . . . . . . . . . . 45

x

Page 11: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

4.10 ρ∗∗ under different xB , xB = (xB , 0), at the femtocell level. . . . . . . . . . . . . . . . . . 45

4.11 ρ∗∗ under different xB , xB = (0, yB), at the femtocell level. . . . . . . . . . . . . . . . . . 45

5.1 Average UE data rate under different UE density µ. . . . . . . . . . . . . . . . . . . . . . 60

5.2 Comparison of different schemes under different UE density µ. . . . . . . . . . . . . . . . 60

5.3 Average UE data rate under different path loss exponent γ. . . . . . . . . . . . . . . . . . 61

5.4 Comparison of different schemes under different path loss exponent γ, analytical case. . . 61

5.5 Comparison of different schemes under different path loss exponent γ, simulation case. . . 62

5.6 Designed association bias values under different UE density µ. “o” represents the opti-

mality region, and “a. o.” represents the asymptotic-optimality region. . . . . . . . . . . . 62

5.7 Pricing values under different UE density µ. “o” represents the optimality region, and “a.

o.” represents the asymptotic-optimality region. . . . . . . . . . . . . . . . . . . . . . . . . 63

5.8 Comparison of run time. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63

5.9 Comparison of different schemes in the multiple-MCS case. . . . . . . . . . . . . . . . . . 64

5.10 Comparison of different schemes under more realistic network settings, (λ′1, λ

′2, λ

′3) =

(1, 2, 3) unit/km2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

5.11 Comparison of different schemes under more realistic network settings, (λ′1, λ

′2, λ

′3) =

(1, 5, 10) unit/km2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

6.1 The blue curves show T(1); and the region within red dashed curves shows T(2)(∆d). . . . 70

6.2 Cumulative distribution function of the latitude and longitude. . . . . . . . . . . . . . . . 77

6.3 Two-tier case: comparison of analytical and empirical handoff rates. . . . . . . . . . . . . 77

6.4 One-tier case: comparison of analytical and empirical handoff rates. . . . . . . . . . . . . 77

6.5 Two-tier case: handoff rates under different λ1 values. . . . . . . . . . . . . . . . . . . . . 78

6.6 Three-tier case: handoff rates under different λ2 values. . . . . . . . . . . . . . . . . . . . 78

6.7 Two-tier case: handoff rates under different B1 values. . . . . . . . . . . . . . . . . . . . . 79

6.8 Three-tier case: handoff rates under different B2 values. . . . . . . . . . . . . . . . . . . . 79

6.9 Two-tier case: overall utility comparison of different tier selections. . . . . . . . . . . . . 79

6.10 Three-tier case: overall utility comparison of different tier selections. . . . . . . . . . . . . 80

6.11 Two-tier case: tier selection velocity threshold. . . . . . . . . . . . . . . . . . . . . . . . . 81

6.12 Three-tier case. The set of dashed and solid curves show the velocity threshold values for

tier selection, under UR = 1 and UR = 1.05, respectively. Each set of curves separates the

plane into multiple regions, and each region corresponds to a specific optimal tier selection

scheme (labeled in the region). For example, a vertical line at λ3 = 16 has 3 intersections

with the set of solid curves, illustrating that under λ3 = 16 and UR = 1.05, tier selections

1, 2, 3, 1, 3, 1, 2, and 1 are optimal in four different velocity ranges separated by

the 3 intersections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81

6.13 An example of a two-tier HWN with Poisson and Poisson cluster patterns. Tier-1 and 2

BSs are represented by “” and “”, respectively. Tier-2 BSs are clustered in four disk

regions. Blue, red, and green curves show cell boundaries within tier-1, between tier-1

and tier-2, and within tier-2, respectively. The magenta arrow represents the trajectory

of an active UE. The UE makes two handoffs at the intersections between its trajectory

and the set of cell boundary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82

6.14 Geometric patterns of two intersecting circles. . . . . . . . . . . . . . . . . . . . . . . . . . 85

xi

Page 12: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

6.15 Accuracy of PCP handoff rate analysis under different µ2 values, for µ2 · ν2 = 0.5. For

comparison, black dashed lines indicate analytical results assuming all PPP BSs. . . . . . 88

6.16 Handoff rates under different λ1 values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

6.17 Handoff rates under different B2 values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89

6.18 Handoff rates, two P-tiers and two C-tiers. . . . . . . . . . . . . . . . . . . . . . . . . . . . 90

B.1 Diagrams of Mi(·), Mj(·), Mi(·), and Mj(·). . . . . . . . . . . . . . . . . . . . . . . . . . 101

B.2 [Mj(aj)− Mj(aj +D)]− [Mi(ai)− Mi(ai +D)] versus D (curves) and Mj(aj)− Mi(ai)

(dots). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105

C.1 The region (shaded part) of Skj(∆d). . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108

xii

Page 13: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 1

Introduction

Traditional single-tier macro-cellular networks provide wide coverage for mobile users, but they are

insufficient to satisfy the exploding demand for high bandwidth access driven forth by modern mobile

traffic, such as multimedia transmissions and cloud computing tasks. In order to resolve this issue, one

efficient means is to provide more serving stations in a geographical area, i.e., installing a diverse set

of small-cells, such as picocells [1], femtocells [2], hotspots [3], and cooperative relays [4], overlaying the

macrocells, to form a multi-tier heterogeneous wireless network (HWN) [5, 6], as illustrated in Fig. 1.1.

Each small-cell is equipped with a shorter-range and lower-cost base station (BS) or access point (AP),

to provide nearby users with higher bandwidth network access with lower power usage, and to offload

heavy data traffic from macrocells. In next generation wireless networks, this heterogeneity in network

structure is expected to become a key feature to improve network coverage and throughput. In practice,

commercial deployment of small-cells has attracted increasing attention. For example, AT&T Inc. has

released its femtocell product [7]. It has also deployed WiFi hotspots in a number of metropolitan areas

with dense population [8], to offload data traffic from macro-cellular networks.

1.1 New Challenges in Analysis and Design of HWNs

In the presence of the multiple tiers of BSs in wireless networks, new challenges are introduced due

to the random spatial patterns of BSs and random movement of users. First, small-cell BSs are often

installed incrementally and irregularly, with a high level of spatial randomness. Second, different tiers of

BSs communicate at different power levels, causing various scales of cell sizes, and complex cell shapes.

Finally, the movement of users may be individually arbitrary, without following any common mobility

pattern. As a consequence, many important mechanisms to operate the networks, such as mobility

management, user association, and interference control should be carefully reconsidered and redesigned

to accommodate such complex randomness.

1.1.1 Understanding User Distribution in HWNs

The distribution of active users is an important factor in the management and planning of wireless net-

works. However, the analytical modeling of user distribution is burdened with many technical challenges

due to the complex random spatial patterns of BSs and random movement of users. Moreover, the

1

Page 14: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 1. Introduction 2

(a) (b)

Figure 1.1: (a) Three separated tiers of BSs. From top to bottom: macrocell, picocell, and femtocellBSs. (b) A three-tier HWN.

session durations of users have a general probability distribution, and the channel holding times of users

at different cells are correlated, which further complicates the analysis of user distribution.

1.1.2 Characterization of Interference Patterns

An important challenge that limits the throughput in an HWN is the interference. Interference patterns

are more complicated in HWNs compared with conventional single-tier networks, as the deployment of

small-cell BSs induces more interference sources. Small-cell BSs are often randomly deployed. In the

downlink, it is not straightforward to quantify the sum interference from all interfering BSs. Uplink

interference analysis is even more challenging compared with the downlink case because (1) the spatial

patterns of interfering users are more complicated, and (2) uplink power control further burdens the

analysis by introducing a coupling effect between users and BSs. Therefore, in order to improve user

performance in HWNs, we are motivated to characterize the interference levels in the system and then

design new mechanisms to decrease them.

1.1.3 Design of User Association Rules

In order to improve the user data rate in the system, it is important to wisely design user-BS association

schemes in HWNs. An appropriate user association scheme should jointly consider the signal quality

and interference from the users’ perspective and load balancing from the BSs’ perspective, since a user’s

data rate is relevant to both its spectrum efficiency and the fraction of spectrum it can access.

A most direct approach is association by maximum received power, in which users are associated

with the BS (in any tier) with the highest received power. However, in this case, because small-cell

BSs transmit at lower power levels, only a small number of users close to them will connect with them,

Page 15: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 1. Introduction 3

−1 −0.5 0 0.5 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1(a)

x coordinate (km)

y c

oord

inate

(km

)

(a) Association by maximum received power.

−1 −0.5 0 0.5 1−1

−0.8

−0.6

−0.4

−0.2

0

0.2

0.4

0.6

0.8

1(a)

x coordinate (km)

y c

oord

inate

(km

)

(b) Flexible user association.

Figure 1.2: An example of a three-tier HWN. Macrocell BSs, picocell BSs, and femtocell BSs arerepresented by squares, circles, and triangles, respectively; users are represented by dots; blue solid linesshow cell boundaries; dashed lines represent connections between users and BSs.

while most other users crowd in macrocells, leading to degraded performance. An example is shown in

Fig. 1.2(a), in which many users occupy the macrocells, while some small-cells are nearly empty.

In order to resolve this issue, a flexible user association approach (also called ranged expansion in some

literature) may be employed [9–13], in which each tier of BSs is assigned a user association bias value, and

a user is associated with a BS with the maximum received power multiplied by the bias value. If small-

cell BSs are assigned larger association bias values, the small-cells are “expanded” accordingly. This can

result in a more balanced mobile traffic pattern and thus better network performance. Fig. 1.2(b) shows

an example of flexible user association. However, if the association bias values for small-cell BSs are too

large, it will cause improper expansion of small-cells such that users at their cell-edge may suffer from

inadequate received power. As a consequence, we are motivated to properly design the association bias

values so that the overall network performance is optimized despite the randomness in BS location, user

location, channel condition, and interference levels.

1.1.4 Quantification of Handoff Patterns

User movement in HWNs introduces vertical handoffs, i.e., handoffs made between two BSs in different

tiers [14]. Compared with horizontal handoffs, i.e., handoffs made between two BSs in the same tier,

vertical handoffs impact both the users and the overall system in more complicated ways. For example,

extra traffic latency and additional network signaling are incurred during channel setup and tear down

when a vertical handoff is made; more user power may be consumed due to simultaneously active network

interface to multiple tiers; call drops or degraded quality of service (QoS) could also be experienced by

users due to the lack of radio resource after handoff. As a prerequisite to performance evaluation and

system design in HWNs, it is essential to quantify the rates of different handoff types. However, the

analysis on handoff rates in HWNs is complicated by the irregularly shaped multi-tier network topologies

introduced by the small-cell structure. It is difficult to characterize the cell boundaries and to track

boundary crossings made by users (i.e., handoffs) in the system.

Another design concern is the tradeoff between the handoff rates and the data rate. As shown in the

example in Fig. 1.3(a), a user starts a call at X and terminates it at Y . By choosing to access all of tier-1,

2, and 3 cells, it experiences one horizontal handoff at B1 and two vertical handoffs at B2 and B3. As

Page 16: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 1. Introduction 4

-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1-1

-0.8

-0.6

-0.4

-0.2

0

0.2

0.4

0.6

0.8

1

x coordinate (km)

y c

oord

inate

(km

)

X

Y

B1

B2

B3

(a) A user starts a call at X and terminates it at Y . Itexperiences one horizontal handoff at B1 and two verticalhandoffs at B2 and B3.

-1 -0.8 -0.6 -0.4 -0.2 0 0.2 0.4 0.6 0.8 1-1

-0.8

-0.6

-0.4

-0.2

0

0.2

0.4

0.6

0.8

1

x coordinate (km)

y c

oord

inate

(km

)

C1

C2

X

Y

(b) Same BS locations and user trajectory. Tier-3 BSs arenot accessed. The same user experiences one horizontalhandoff at C1 and one vertical handoff at C2.

Figure 1.3: An example of a three-tier HWN and selective tier association. Tier-1, 2, and 3 BSs arerepresented by squares, circles, and triangles, respectively; blue curves show intra-tier cell boundaries;green curves show inter-tier cell boundaries.

shown in Fig. 1.3(b), by choosing to access tier-1 and 2 cells only, it experiences one horizontal handoff

at C1 and only one vertical handoff at C2. However, in the latter case, the user misses the opportunity

to access a high-bandwidth tier-3 BS. Thus, a user could choose to access high-bandwidth small-cell

BSs to improve data rate, but this may also lead to more frequent vertical handoffs, which potentially

deteriorates the service quality. Therefore, we are motivated to optimize the user tier selection scheme,

by taking both the handoff rates and the data rate into consideration.

1.2 Thesis Outline and Main Contributions

The goal of this thesis is to develop new methods and models to evaluate and design HWNs by investigat-

ing user load, interference patterns, and user mobility, the results of which provide new analytical insights

and design guidelines that will help improve future HWNs. The main contributions are summarized as

follows.

1.2.1 User Distribution under General Mobility and Session Patterns

In Chapter 3, we study the joint stationary distribution for the number of users in all cells in an

HWN. Prior studies have proposed several analytical models to estimate the user distribution with

various degrees of detail and generality [15–19]. Instead, we consider general mobility and session

patterns, only requiring that the new session arrivals form a Poisson process, which is well supported

by experimental data [19–21]. We model the user mobility with a general system with multiple routes,

each representing one type of users with a specific movement pattern. A general probability distribution

is used to represent the session durations. Moreover, the channel holding times at different cell sites are

no longer independent.

Through a decomposition-composition approach, we derive a closed-form expression for the joint

stationary distribution for the number of users in all cells. We observe five important conclusions on the

stationary user distribution: first, it is insensitive to how the users move through the system; second, it

Page 17: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 1. Introduction 5

is insensitive to the general distribution of channel holding times; third, it is insensitive to the correlation

among the channel holding times; fourth, it depends only on the average arrival rate and average channel

holding time at each cell; and fifth, it is perfectly captured by an open Jackson network with M/M/∞queues.

The conclusion of this chapter has important consequence to performance analysis and practical

system design. It suggests that accurate calculation of the user distribution, and other associated

metrics such as the system workload, can be achieved with much lower requirement for system parameter

estimation than previously expected.

1.2.2 Uplink Interference Comparison of Open Access and Closed Access

In Chapter 4, we focus on a two-tier wireless network with macrocells and femtocells. In the network,

two different access mechanisms may be applied: closed access and open access. Under closed access, a

femtocell BS only provides service to its local users, without further admitting nearby macrocell users.

In contrast, under open access, all nearby macrocell users are allowed to access the femtocell BS. We

study how the two access modes may affect both macrocell users and local femtocell users, in terms of

the uplink interference and outage probabilities. We present a stochastic geometric analysis framework

to derive numerical expressions for the uplink interference and outage probabilities of open access and

closed access by modeling macrocell BSs as a regular grid, macrocell users as a Poisson point process

(PPP), and femtocell users as a two-level clustered Poisson point process, which captures the spatial

patterns of different network components. However, uplink interference analysis is notoriously complex

for the two-tier network under consideration, our analysis yields non-closed forms requiring numerical

integrations. This motivates us to further develop closed-form sufficient conditions for open access and

closed access to outperform each other, at both the macrocell and femtocell levels.

Based on the above analysis, we are able to extract a key factor that influences the performance

difference between open access and closed access: the power enhancement factor ρ, which is defined as

the ratio, of the uplink targeted received power of an open access user in the femtocell, to its original

targeted received power in the macrocell. We investigate the threshold value ρ∗ (resp. ρ∗∗) such that

macrocell (resp. femtocell) users may benefit through open access if ρ < ρ∗ (resp. ρ < ρ∗∗) as we apply

open access to replace closed access. Upper and lower bounds of ρ∗ are derived in closed forms, and the

bounds of ρ∗∗ can be found by numerically searching through closed-form equations, providing system

design guidelines with low computational complexity.

1.2.3 Optimal Spectrum Allocation and User Association

In Chapter 5, our objective is to study jointly optimal spectrum allocation and user association in an

HWN with multiple tiers of BSs. First, we develop a stochastic geometric model to study the network

performance analytically. A closed-form expression for the average downlink user data rate is derived,

which is then employed as the objective function for jointly optimizing the spectrum allocation among

tiers and the user association bias values. This resultant optimization problem is of non-convex pro-

gramming in nature and cannot be solved with a standard method. Instead, we explore two important

structures in solving the problem. Referred to as the density thresholding structure, we show that the

problem can be studied separately over two regions, divided by a parameter specific user density thresh-

old. Referred to as the priority ordering structure, we show that a tier with higher BS density should

Page 18: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 1. Introduction 6

have higher priority in spectrum allocation. Based on these observations, we propose a computationally

efficient Structured Spectrum Allocation and User Association (SSAUA) approach to solve the problem

optimally and asymptotically optimally in the two density regions respectively. Finally, toward practi-

cal implementation of SSAUA, we propose a Surcharge Pricing Scheme (SPS), such that the designed

association bias values can be achieved in Nash equilibrium. Hence, each user is incentivized to adopt

the proposed design with individual rationality.

1.2.4 Handoff Rate Analysis in HWNs

In Chapter 6, we contribute to user mobility modeling and network access optimization in HWNs by

providing new technical tools to quantify the rates of horizontal and vertical handoffs, under random

multi-tier BSs, arbitrary user movement trajectory, and flexible user-BS association. A new stochastic

geometric analysis framework on user mobility is proposed. In this framework, different tiers of BSs are

firstly modeled as Poisson point processes (PPPs) to capture their spatial randomness in Section 6.1. To

model flexible scaling of cell sizes in different tiers, we consider the biased user association scheme dis-

cussed in Section 1.1.3. Through stochastic and analytic geometric analysis, we derive exact expressions

for the rates of all handoff types experienced by an active user with arbitrary movement trajectory. In

addition, as a study on the application of the above handoff rate analysis, after calculating the downlink

data rate of an active user given the set of BS tiers that it chooses to use, we further study optimal tier

selection by the user, considering both the handoff rates and the data rate. Finally, motivated by the fact

that some BSs are likely to aggregate around highly populated geographical regions (e.g., urban areas,

attractions, etc.), in Section 6.2, we extend the above handoff analysis by allowing BSs to form Poisson

cluster processes (PCPs) [22–24], in order to capture their non-uniform and dependent aggregation in

space.

Page 19: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 2

Related Works

In this chapter, we summarize the prior research in stochastic analysis and optimization of HWNs, and

discuss the relation between this thesis and the prior works.

2.1 User Mobility Model

2.1.1 Queueing Networks Models

In order to characterize user mobility, one common category of previous works employed queueing

systems to model wireless networks. In this case, cells are modeled as queues, users are modeled as units

in the queues, and handoffs correspond to unit transfers among queues. Through this approach, user

distributions were derived in different environments, such as wireless multimedia networks [16], vehicular

ad-hoc networks [17], and WLANs [18, 19]. However, these works did not allow arbitrary mobility or

arbitrary user session patterns. In terms of user movement, [16], [17], and [19] assumed that users move

from one cell to another probabilistically and memorylessly, while [18] focused on scattered single cells, so

that user movement among multiple cells was not discussed. None of them considered the arbitrary user

movement patterns. In terms of channel holding times, [16] used the sum of hyper-exponentials or the

Coxian distribution to approximate arbitrary distributions; [18] assumed generally distributed channel

holding times but concerned only a single cell; and [17] and [19] considered generally but independently

distributed channel holding times in different cells. Compared with our proposed model in Chapter 3,

none of the above works considered the dependence among channel holding times.

2.1.2 Insensitivity Property of Queueing Networks

The insensitivity of queueing networks indicates the situation where the stationary distribution remains

unchanged while the distribution of service times takes arbitrary forms. When the service times are

assumed independent among different queues, there are several well known conditions for insensitivity.

For example, networks with symmetric queues are insensitive [25]. In [26] and [27], the partial balance

of probability flows was shown to be a sufficient condition for insensitivity. In [28], partial reversibility is

shown to be a necessary and sufficient condition for insensitivity. However, none of these known results

considered the case where the service times between different queues are dependent. For example, the

queueing network closely related to our model in Chapter 3 is one with M/G/∞ queues. It is known to

7

Page 20: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 2. Related Works 8

be insensitive when the service times are independent [25], but to the best of our knowledge, there is no

further general result for dependent service times.

2.1.3 Mobility Modeling with Cell Geometry

In order to characterize the geometric patterns of network topologies, another category of works modeled

the shape of cells, mostly in non-random regular grids. Zonoozi and Dassanayake [29] modeled a one-

tier cellular network as a hexagonal grid. Anpalagan and Katzela [30] studied a two-tier network by

modeling small-cells as hexagons, and each macrocell as a cluster of neighbouring small-cells. Shenoy

and Hartpence [31] studied a two-tier network by modeling WLAN small-cells as squares, and macrocells

as larger squares, each covering 5× 5 WLAN cells. Hasib and Fapojuwo [32] studied a two-tier cellular

network including one hexagonal macrocell and a predetermined number of circular microcells.

To further capture the spatial randomness of network topologies, Lin et al. [33] conducted a pioneering

study on the user mobility in a one-tier cellular network with randomly distributed BSs, where the BSs

are modeled as a homogeneous Poisson point process (PPP), and cell splitting is modeled as a standard

Poisson Voronoi. Our work in Section 6.1 extends the above study to the multi-tier case, where each

tier of BSs is modeled as a homogeneous PPP, and the resultant cell splitting is modeled as a weighted

Poisson Voronoi. Note that our studies in Section 6.1 follow conventional stochastic geometric analysis

of HWNs, where the PPP is commonly used to model the distribution of BSs to capture their spatial

randomness (e.g., [34–36]). However, in reality, a higher density of BSs are often installed in more

populated regions, hence the PPP assumption may not be accurate in such a scenario. In order to

resolve this issue, in Section 6.2, as an extension of Section 6.1, we further model some tiers of BSs as

Poisson cluster processes (PCPs) [22–24], in order to capture the non-uniform and dependent aggregation

of BSs.

2.2 Interference Analysis of HWNs

2.2.1 Stochastic Geometry as a Basic Tool

Stochastic geometry [37–41] is an important mathematical tool to characterize random spatial patterns

of wireless networks. In recent years, this tool has succeeded to develop tractable models to analyze

interference and provide design guidelines for HWNs. Through standard stochastic geometric approach,

interferers are modeled as a Poisson point process (PPP), and their interference can be analyzed as the

shot noise on the two-dimensional Euclidean space R2. Then, the Laplace transform of the shot noise

can be derived directly from the Laplace functional [37,38] or the generating functional [39] of the PPP.

2.2.2 Downlink Interference

The downlink interference and outage performance in wireless networks have been extensively studied

using the stochastic geometric approach. Dhillon et al. [35, 42] analyzed the downlink performance of

heterogeneous networks with multiple tiers by assuming the signal-to-interference plus noise ratio (SINR)

threshold is greater than 1. Keeler et al. [43] extended the work by allowing the SINR threshold to be

less than 1. Kim et al. [44] studied the maximum tier-1 user and tier-2 cell densities under downlink

outage constraints. Dhillon et al. [45] studied the downlink interference considering load balance. Singh

Page 21: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 2. Related Works 9

et al. [13] studied the downlink user achievable rate in a heterogeneous network considering both SINR

and spatial user distributions. Jo et al. [46] studied open access versus closed access in femtocell networks

in terms of downlink performance.

2.2.3 Uplink Interference

The analysis of uplink interference in multi-tier networks is more challenging compared with the downlink

case. For uplink analysis, the interference generators are the set of users, which are more complicatedly

distributed compared with the interference generators (i.e., BSs) in downlink analysis. Under closed

access, without considering random spatial patterns, Kishore et al. [47] studied the uplink performance

of a single tier-1 cell and a single femtocell, while the same authors [48] extended it to the case of multiple

tier-1 cells and multiple femtocells. An and Pianese [49] studied the co-channel uplink interference in

LTE-based multi-tier cellular networks, considering a constant number of femtocells in a macrocell.

However, none of [47–49] considered the random spatial patterns of users or femtocells.

By considering random spatial patterns, Novlan et al. [50] analyzed the uplink performance of cellular

networks, but it was limited to the one-tier case. The work was extended in [51] where frequency reuse

among edge users and inner users were accommodated. Chakchouk and Hamdaoui [52] studied the

two-tier case with one macrocell and randomly spatially distributed femtocells and femtocell users.

Chandrasekhar and Andrews [53] evaluated the uplink performance of two-tier networks considering

multiple macrocells, femtocells, macrocell users, and femtocell users. However, several interference

components were analyzed based on approximations, such as BSs see a femtocell as a point interference

source, and femtocell users transmit at the maximum power at the edge of cells. Cheung et al. [54]

studied both uplink and downlink interference of femtocell networks based on a Neyman-Scott Process.

However, it assumed that each user transmits at the same power and femtocell users are uniformly

distributed in an infinitesimally thin ring around the femtocell BS. With a more general system model,

we [55] derived the uplink interference in a two-tier network with multiple types of users and small-cell

BSs, but no closed-form result was obtained. Note that [53–55] considered only the closed access case.

Compared with the closed access mode, the uplink interference analysis of the open access mode

is even more complicated. This is because the model for open access needs to capture the impact of

the users disconnecting from the original macrocell BS and connecting to a small-cell BS. In order

to achieve mathematical tractability, the previous analysis of open access used simplified assumptions.

Xia et al. [56] compared the performance of open access and closed access based on a model with

one macrocell, one femtocell, and a given number of macrocell users, and Tarasak et al. [57] used a

model with one macrocell, a constant number of macrocell users, and randomly distributed femtocells.

Although [56] and [57] provide useful insights into the performance comparison between open access

and closed access, their limited system models cannot account for the challenging issues brought by the

diverse spatial patterns of BSs and users. Zeinalpour-Yazdi et al. [58] studied a model with one macrocell

and randomly spatially distributed macrocell users and femtocells. The model in [58] is still limited to

a single-macrocell scenario where the spatial patterns of macrocell BSs and inter-macrocell interference

cannot be accommodated. ElSawy and Hossain [59] studied the uplink outage performance of multi-tier

cellular networks with truncated channel inversion power control. Open access was considered in [59],

but approximations had to be used for mathematical tractability, e.g, the correlation of the locations of

interfering users and their transmit power levels were ignored. Focusing on a different scope from our

analysis in Chapter 4, [59] did not compare the performance of open access and closed access.

Page 22: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 2. Related Works 10

Another category of previous works employed geometrical probability models to characterize inter-

ference patterns in mobile networks. Geometrical probability models are employed when the cell shapes

are predetermined (e.g., triangles [60], rhombuses [61], hexagons [62], trapezoids [63], and other polygon-

s [64]). On the other hand, stochastic geometry models are more advanced when the network topology

is random.

2.3 Spectrum Allocation and User Association

Flexible user association is an important approach to improve user data rate in HWNs, which has

attracted much attention in recent years. Through flexible user association approach, each tier of BSs

is assigned a user association bias value, and a user is associated with a BS with the largest received

power multiplied by the bias value [9–13]. If small-cell BSs are assigned larger association bias values,

the small-cells are “expanded” accordingly. An example is shown in Fig. 1.2.

Assuming a fixed number of users and BSs and without considering their random spatial patterns,

the authors of [10, 11] investigated performance benefit introduced by flexible user association; and the

authors of [65–70] studied optimal user association with deterministic utility optimization.

With a stochastic geometric approach, some prior studies considered either spectrum allocation or

user association separately. For example, Cheung et al. [36] studied optimal spectrum allocation, in

cellular networks limited to two tiers of BSs, without flexible user association. We [71, 72] studied

optimal spectrum allocation among different tiers of BSs in HWNs, without further optimizing user

association bias values. Jo et al. [12] presented the performance evaluation of flexible user association

model with bias values. They derived the coverage probability and user data rate, considering cross-tier

interference, but in non-closed forms. They did not provide a means to optimize the derived performance

metrics. This work was later extended in [13] to study optimal user association in a network with two

tiers of BSs, without considering spectrum allocation.

Through stochastic geometric analysis, spectrum allocation and user association were jointly studied

in [73–76]. Singh and Andrews [73] analyzed the network performance in terms of coverage probability

and data rate under different spectrum allocation and user association settings. However, the optimal

spectrum allocation and user association were not derived. A similar problem was also studied by Lin

and Yu [74], with frequency reuse instead of tiered spectrum division as the approach for spectrum

sharing.

Different from the above studies, in Chapter 5, we consider multiple tiers of BSs with disjoint spec-

trum, and provide optimal and analytically bounded asymptotically optimal solutions for joint spectrum

allocation and user association. The closest works to our analysis in Chapter 5 may be [75, 76], where

joint spectrum allocation and user association was also considered. However, [75, 76] aimed to optimize

the average log-utility per user, such that the logarithm function cancels the exponential term corre-

sponding to the Laplace transform of interference [37, 38]. This alternate objective led to substantial

difference in the optimization problem formulation and solution. Different from [75, 76], our model in

Chapter 5 aims to optimize the average user data rate directly, leading to an even more challenging

problem and requiring the proposed structured optimization solution. Furthermore, only the single

modulation and coding scheme (MCS) was considered in [75, 76], while we additionally study multiple

MCSs in this Chapter.

Page 23: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 2. Related Works 11

2.4 A Brief Review on Queueing Networks

In this section, we briefly review some preliminaries for queueing networks [77], which are employed in

the analysis in Chapter 3.

2.4.1 Queueing Network under Consideration

Consider an m-node queueing network with single unit movements. Let x = [x1, x2, . . . , xm]T be an

m-dimensional vector representing the state where there are xi units at node i, ∀i = 1, 2, . . . ,m. Let Sdenote the state space. The network may be one of the following types1:

• Closed network with A units: S = x : |x| = A.

• Open network with unlimited capacity: S = x : |x| < ∞.

• Open network with capacity A: S = x : |x| ≤ A.

In the queueing network, the units are moving in the node setM . In a closed network,M = 1, 2, . . . ,M.In an open network, M = 0, 1, 2, . . . ,M, where node 0 represents the outside of the network.

Let ei be the unit vector where the ith entry is 1. We define Tjkx , x − ej + ek if j = k, j = 0,

and k = 0; Tjkx , x + ek if j = 0 and k = 0; and Tjkx , x − ej if j = 0 and k = 0. In state x,

the time to the next movement of a single unit from node j to node k (i.e., transition from x to Tjkx)

is independently exponentially distributed with rate λjkϕj(x), where the term λjk denotes the routing

intensity from node j to node k, j = k, and the term ϕj(x) denotes the service rate at node j when

the network is in state x. Note that if the network is open, λ0kϕ0(x) represents the arrival rate to node

k from the outside. In a Jackson network, ϕj(x) is a function ϕj(xj) only of xj , ∀j = 1, 2, . . . ,m, and

ϕ0(·) ≡ 1 when the network is open.

2.4.2 Routing Balance Equations

Let wj , j ∈ M , denote a positive invariant measure that satisfies the routing balance equations as follows

wj

∑k∈M

λjk =∑k∈M

wkλkj . (2.1)

When the network is open, we adopt the convention that w0 = 1.

2.4.3 Stationary Distributions of Jackson Networks

The stationary distribution of a closed Jackson network with A units is

π(x) = cm∏j=1

wxj

j

xj∏n=1

ϕj(n)−1, ∀x ∈ S = x : |x| = A, (2.2)

where c is the normalizing constant given by

c−1 =∑x∈S

m∏j=1

wxj

j

xj∏n=1

ϕj(n)−1. (2.3)

1Note that |x| ,∑

i xi in Section 2.4.

Page 24: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 2. Related Works 12

Substituting the definition S = x : |x| ≤ A into (2.2) and (2.3), we derive the stationary distribution

of an open Jackson network with capacity A.

The stationary distribution of an open Jackson network with unlimited capacity is given as follows.

First, suppose we have

cj =∞∑

xj=0

wxj

j

xj∏n=1

ϕj(n)−1 < ∞, ∀j = 1, 2, . . . ,m. (2.4)

Then the stationary distribution is

π(x) = π1(x1)π2(x2) . . . πm(xm), ∀x ∈ S, (2.5)

where

πj(xj) = cjwxj

j

xj∏n=1

ϕj(n)−1. (2.6)

From (2.5), we notice that the joint distribution is the product of the marginal distributions among

individual queues.

2.5 A Brief Review on Stochastic Geometry

Stochastic geometry is an important mathematical tool to characterize random spatial patterns of wire-

less networks. In recent years, this tool has succeeded to develop tractable models to analyze perfor-

mance and provide design guidelines for HWNs. In this section, we briefly review some preliminaries for

stochastic geometry [37–39], which are employed in the analysis in Chapters 4-6.

2.5.1 Interference Analysis Based on Poisson Point Process

Suppose interferers are modeled as a Poisson point process (PPP) on the two dimensional Euclidean

space R2. Their sum interference can be analyzed as the shot noise of the PPP. The Laplace transform

of the shot noise can be derived directly from the Laplace functional or the generating functional of the

PPP.

Consider the following simple example: assume that mobile users form a homogeneous PPP Φ with

intensity λ on R2. Each user transmits at power level P . Let L(x,y) denote the path loss function from

coordinate x to y. Consider an observer located at y0, which regards all the mobile users as interferers.

In this case, because the mobile users form a PPP, which is a random point process, the overall

interference I is a random variable. To investigate the distribution of I, we can focus on its Laplace

transform L(s) = E(e−sI). Because I can be computed as the sum of interference from each user, we

have I =∑

x∈Φ PL(x,y0). Thus,

L(s) = E(e−

∑x∈Φ sPL(x,y0)

)= E

(∏x∈Φ

e−(sPL(x,y0))

). (2.7)

The generating functional of a PPP is defined as G(v) = E(∏

x∈Φ v(x)) for an arbitrary function v,

Page 25: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 2. Related Works 13

which can be computed as G(v) = exp(−λ∫R2(1− v(x))dx

). Substituting it into (2.7), we have

L(s) = exp

(−λ

∫R2

(1− e−sPL(x,y0))dx

). (2.8)

In the above steps, the sum form of the interference is converted to the product form through the

exponential function, which then matches the form of the generating functional of the PPP. Through

this way, the sum interference in the system is analytically characterized.

2.5.2 Random Fibre Process

A random fibre process is defined as a random collections of curves on R2. A fibre process is stationary

if its distribution is invariant under translation through any vector. It is isotropic if its distribution is

invariant under rotations about the origin.

Let Ψ denote a stationary and isotropic fibre process on R2. Then, the intensity of Ψ, LA(Ψ), is

defined as its mean line length per unit area.

LA(Ψ) = E(∣∣∣Ψ∩B

∣∣∣1

), (2.9)

where |·|1 represents one-dimensional Lebesgue measure, and B is an arbitrary region with a unit area.

Let T be an arbitrary curve on R2 with finite length L. Then, the expected number of intersections

between T and Ψ is equivalent to (a generalized version of the Buffon’s needle problem)

2

πLA(Ψ)L. (2.10)

2.6 Publications Related to this Thesis

A version of Chapter 3 is published in [78, 79]; a version of Chapter 4 is published in [80, 81]; a version

of Chapter 5 is published in [82, 83]; a version of Section 6.1 is published in [84, 85]; and a version of

Section 6.2 is published in [86].

Page 26: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3

Insensitivity of User Distribution in

HWNs

In this chapter, we study the joint stationary distribution for the number of users in all cells in a

multicell network, which has important utilization in network management and planning. As discussed

in Section 2.1.1, to facilitate tractable analysis, existing studies often adopt simplified models. Instead,

we consider more general user mobility and session patterns, only requiring that the new session arrivals

form a Poisson process, which is well supported by experimental data [19–21]. We model the user

mobility with a general system with multiple routes, each representing one type of users with a specific

movement pattern. A general probability distribution is used to represent the session durations. The

channel holding times at different cell sites are generally distributed and are no longer independent.

Through a decomposition-composition approach, we derive a closed-form expression for the joint

stationary distribution for the number of users in all cells. In spite of the general user movement

patterns and complicated dependency and distribution of channel holding times, we observe that the

stationary user distribution (1) is insensitive to the user movement patterns, (2) is insensitive to general

and dependently distributed channel holding times, (3) depends only on the average arrival rate and

average channel holding time at each cell, and (4) is completely characterized by an open network with

M/M/∞ queues. We use the Dartmouth trace to validate our analysis, which shows that the analytical

model is accurate when new session arrivals are Poisson and remains useful when non-Poisson session

arrivals are also included in the data set. Our results suggest that accurate calculation of the user

distribution, and other associated metrics such as the system workload, can be achieved with much

lower complexity than previously expected.

3.1 System Model

Consider a multicell network with C cells. There are L unique routes, each defined as a finite ordered

sequence of cells. The jth stage on the lth route corresponds to the jth cell in the sequence, which is

denoted as c(l, j). Let Nl be the number of stages on the lth route. Each user of the lth route starts

a new session in cell c(l, 1); then it moves along the route through cells c(l, 1), c(l, 2) . . . c(l, Nl), as long

as the session remains active. The user is considered to have departed the network when its session

terminates or when it exits cell c(l, Nl). We allow an arbitrary number of arbitrary routes to cover all

14

Page 27: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 15

handoffT1

τ12 τ13τ11

t11 t12 t13

T1

Cell 3

Cell 4

Cell 6

Cell 2Route 3

Cell 5

Route 1

τ11 = t11τ12 = t12 t13

τ13

Route 2

start

Cell 1

handoff terminate

Figure 3.1: System model.

possible movement patterns.

For each route, we assume the arrivals of new sessions to form a Poisson process. Note that although

the arrivals of packets in the Internet may not form Poisson processes [87], the arrivals of new sessions

are at a much larger time scale and are well justified as Poisson [20,21]. Furthermore, in [19] and later in

Section 3.4, experimental data show that new sessions in the type of mobile networks under consideration

are indeed Poisson barring some extreme cases. We emphasize that only the new session arrivals are

Poisson, while the handoff arrivals at each cell have general statistics with complicated dependencies.

The session duration of a user on the lth route is modeled as an arbitrarily distributed random

variable Tl. Let λl0 be the new session arrival rate at the lth route. After a new session arrival, let

τl1 denote the residual cell dwell time of the user in the 1st stage on the lth route, which is arbitrarily

distributed. Let τlj , 2 ≤ j ≤ Nl, denote the cell dwell time of the user in the jth stage on the lth route,

which are also arbitrarily distributed. Then, the channel holding time of the jth stage on the lth route,

tlj , if it exists, can be represented as follows:

tlj =

minTl, τl1, if j = 1,

minTl −j−1∑i=1

τli, τlj, if Tl >∑j−1

i=1 τli, 2 ≤ j ≤ Nl.(3.1)

Fig. 3.1 shows an example network with 3 routes. Route 1 starts from cell 1 and passes cell 3, 4

and 6 (i.e., c(1, 1) = 1, c(1, 2) = 3, c(1, 3) = 4 and c(1, 4) = 6). A user starts a session in cell 1, and

the session is terminated in cell 4. The corresponding T1, τ11, τ12, τ13, t11, t12, and t13 are labeled in the

figure.

Note that a user is being active from the initiation of its session until the termination of its session.

Given a route l, we know the sessions start at cell c(l, 1) but the cell where they end is random since

the session duration is random. Furthermore, we do not assume independence between Tl and τlj , and

the channel holding times tlj are not independent either. Finally, each route defines the user movement

Page 28: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 16

trace and the distribution of channel holding times, which implicitly characterizes the speed of users on

this route.

Let xlj , 1 ≤ l ≤ L, 1 ≤ j ≤ Nl, denote the number of active users in the jth stage on the lth route; let

yn, 1 ≤ n ≤ C, denote the number of active users in the nth cell. Let x = [xlj : 1 ≤ l ≤ L, 1 ≤ j ≤ Nl]T

and y = [y1, y2, . . . , yC ]T . We aim to derive π(x) and π1(y), the joint stationary user distributions for

active users x and y, respectively. Note that since π(x) and π1(y) are defined in the steady state, we

explicitly ignore any temporal fluctuation in these distributions.

3.2 Stationary User Distribution in Single-Route Network

We first derive the stationary user distribution on a single route. We construct a reference single-

route memoryless network, where all the channel holding times are independently and exponentially

distributed. We prove insensitivity by showing an equivalence between the original network and the

memoryless network in terms of stationary user distribution.

3.2.1 Queueing Network Model for Single-Route Network

...

. . .

(a) Single-route network.

λl0

tl1 tl2 tl3 tlNl

0

(b) Reference single-route memoryless network.

. . .λl0

pl1∑Nlj=1 plj

λl1

pl2∑Nlj=2 plj

λl2

0

λlNl

pl(Nl)

pl(Nl−1)+plNl

λl(Nl−1)

∑Nlj=2 plj∑Nlj=1 plj

λl1

∑Nlj=3 plj∑Nlj=2 plj

λl2

pl(Nl−1)

pl(Nl−1)+plNl

λl(Nl−1)

...

Figure 3.2: Single-route network.

Consider exclusively the lth route in the network. Throughout Section 3.2, we will carry the route

index l in most symbols, since they will be re-used in the analysis of multiple-route networks.

As shown in Fig. 3.2(a), we model the route as a tandem-like queueing network. The node labeled

with 0 represents the exogenous world. The jth queue, 1 ≤ j ≤ Nl, represents the jth stage of the route,

and units in this queue represent sessions in the jth stage. Each queue has infinite servers, since the

Page 29: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 17

sessions are served in parallel with no waiting1.

The channel holding time of a session in the jth stage, tlj , is equivalent to the service time of the

jth queue. The handoff of a session from the jth stage to the (j + 1)th stage is equivalent to a unit

movement from the jth queue to the (j + 1)th queue. The termination of a session is equivalent to the

movement from a queue to node 0.

Let plk denote the probability that a session lasts for k stages. It is given by

plk = P[ k−1∑j=1

τlj < Tl ≤k∑

j=1

τlj

], for 2 ≤ k ≤ Nl − 1,

with pl1 = P [Tl ≤ τl1] and plNl= P

[∑Nl−1j=1 τlj < Tl

]. Note that we have

∑Nl

k=1 plk = 1. Given a session

in the kth stage, it enters the (k+1)th stage with probability∑Nl

j=k+1 plj∑Nlj=k plj

and terminates with probability

plk∑Nlj=k plj

.

3.2.2 Reference Single-Route Memoryless Network

We define a reference single-route memoryless network, as a Jackson network with the same topology

as the original single-route network, where each queue has infinitely many independent and exponential

servers. An illustration is shown in Fig. 3.2(b). By matching the mean service times in this memoryless

network with those of the original network, we see that its external arrival rate is λl0, the service rate

of the jth queue is λlj = 1tlj

. The routing probability from the kth queue to the (k + 1)th queue is the

probability that a session enters the (k+1)th stage conditioned on it is in the kth stage,∑Nl

j=k+1 plj∑Nlj=k plj

. The

routing probability from the kth queue to node 0 is plk∑Nlj=k plj

. Thus, the service rate from the kth queue

to the (k+1)th queue is∑Nl

j=k+1 plj∑Nlj=k plj

λlk, and the service rate from the kth queue to node 0 is plk∑Nlj=k plj

λlk.

Let w′lj denote the positive invariant measure of the jth queue that satisfies the routing balance

equations of the single-route memoryless network. w′0 is the positive invariant measure of node 0. We

adopt the convention that w′0 = 1. It can be derived from the topology of Fig. 3.2(b) that

λl0w′0 =w′

l1, (3.2)∑Nl

n=j pln∑Nl

n=j−1 plnw′

lj−1 =w′lj , 2 ≤ j ≤ Nl, (3.3)

which leads to

w′l1 =λl0, (3.4)

w′lj =λl0(1−

j−1∑n=1

pln), 2 ≤ j ≤ Nl. (3.5)

Because each queue has infinite servers, the departure intensity at the jth queue is λljxlj when there

1Users move into and out of each cell in parallel. Therefore, when considering the channel holding time as the servicetime of a queue that models mobility, this is equivalent to all users being served at the same time by its own dedicatedserver, which is the same as having infinite servers. This model is accurate for communication systems with no admissioncontrol (e.g., WiFi) and gives reasonable approximation to systems with many available channels.

Page 30: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 18

tlNl21

λl110pl1λl0

tl2Ml21 tl2Ml22

......tl221 tl222

λl220

tl211 tl212

pl2λl0

...

λl120

λl210

λl1Ml10

tl1Ml11

tl111

tl121

0

. . .

tlNlMlNl1 tlNl2Nl

...

tlNlMlNl2 tlNlMlNl

3

tlNl22 tlNl23 tlNlMlNlNl

tlNl1Nl

.........

. . .

tlNl12 tlNl13

. . .

.... . .

plNlλl0

λlNl10

λlNlMlNl0

λlNl20

λl2Ml20

tlNl11

Figure 3.3: Decoupled network.

are xlj users in it. Let wlj =w′

lj

λlj. Then the stationary user distribution w.r.t. x of this network is [77]

π0(x) =

Nl∏j=1

e−wljwxlj

lj

1

xlj !. (3.6)

3.2.3 Insensitivity of Single-Route Network

For the original single route network, we employ a decomposition-composition approach to derive its

stationary user distribution.

Given that one session lasts for k stages, we denote the channel holding times as a k-dimensional

random vector tlk = tlk1, . . . tlkj , . . . , tlkk, where tlkj is the channel holding time at the jth stage.

We assume that tlk is an arbitrarily distributed discrete random vector with Mlk possible realizations2.

For any i, 1 ≤ i ≤ Mlk, we define a k-dimensional deterministic vector tlki = [tlki1, . . . , tlkij , . . . , tlkik]T

corresponding to the ith realization of tlk. Let qlki be the probability of the ith realization given that

the session lasts for k stages. Also, let Plki = plkqlki denote the probability that a session lasts for k

stages and it is in the ith realization.

By doing so, we decompose the original network into a multiple-branch queueing network as shown in

Fig. 3.3, which is referred to as the decoupled network. In this network, there are Nl main branches, where

the kth main branch represents the event that a session lasts for k stages. The kth main branch contains

2For a vector of continuous channel holding times, we can use a sequence of discrete distributions with decreasinggranularity to approach its distribution. The granularity does not influence the computational complexity of the stationaryuser distribution of the original multicell network. See Section 3.3 for more details.

Page 31: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 19

λlNlMlNlNl

0

λl110pl1λl0

λl2Ml21 λl2Ml22

......λl221 λl222

λl220

λl211 λl212

pl2λl0

...

λl120

λl210

λl1Ml10

λl1Ml11

λl111

λl121

. . .

...

λlNlMlNl3

λlNl22 λlNl23

λlNl1Nl

.........

. . .

λlNl12 λlNl13

. . .

.... . .

plNlλl0

λlNl10

λlNlMlNl0

λlNl20

λl2Ml20

λlNl11

λlNl2NlλlNlMlNl

2

λlNl21

λlNlMlNl1

Figure 3.4: Reference memoryless decoupled network.

Mlk sub-branches, where the ith sub-branch represents the realization where tlk = tlki. Furthermore,

the jth queue in the ith sub-branch of the kth main branch represents the jth stage of the ith realization

of the sessions that last for k stages.

Hence, each queue of the decoupled network has infinite servers with deterministic service time, tlkij ,

for the jth stage of the ith sub-branch of the kth main branch. Furthermore, the arrival rate of the ith

sub-branch of the kth main branch is λlki0 = Plkiλl0. Let x = [xlkij : 1 ≤ k ≤ Nl, 1 ≤ j ≤ k, 1 ≤i ≤ Mlk]T be the vector of number of sessions in the jth stage of the ith sub-branch of the kth main

branch. Denote by πD(x) the stationary user distribution of the decoupled network.

Note that the stationary distribution of a Jackson network with infinite servers at each queue is

insensitive with respect to the distribution of the service times [26]. Therefore, πD(x) remains unchanged

if we create a reference Jackson network by replacing each queue with deterministic service time in the

decoupled network with a queue that has exponential distributed memoryless service time with the same

mean (e.g., the service rate at the jth queue of the ith sub-branch of the kth main branch λlkij =1

tlkij),

as shown in Fig. 3.4, which is referred to as the reference memoryless decoupled network.

Let w′lkij be the positive invariant measure of the jth queue of the ith sub-branch of the kth main

branch of the reference memoryless decoupled network, which satisfies the routing balance equations

with the convention that at node 0, w′0 = 1. Since each sub-branch is a chain network, we have

w′lkij = Plkiλl0. (3.7)

Let wlkij =w′

lkij

λlkij. Then the stationary user distribution of the decoupled network as well as the reference

Page 32: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 20

memoryless decoupled network is

πD(x) =

Nl∏j=1

Nl∏k=j

Mlk∏i=1

e−wlkij wxlkij

lkij

1

xlkij !. (3.8)

The stationary user distribution of the original single route network, π(x), is the sum of πD(x)

satisfying xlj =∑Nl

k=j

∑Mlk

i=1 xlkij , ∀j. To derive π(x), we first introduce the following lemma.

Lemma 1. Consider a stationary open Jackson network with N queues each with an infinite number of

servers. Let xj be the number of units in the jth queue and x = [x1, . . . xN ]T . Suppose J1,J2, . . .JMis a set of mutually exclusive subsets of 1, 2, . . . , N. Let zi =

∑j∈Ji

xj , i = 1, 2, . . . ,M , denoting the

sum of units in the queues inside Ji. Then, the distribution of z = [z1, . . . zM ]T is

π(z) =

M∏i=1

e−vivzii1

zi!, (3.9)

where vi =∑

j∈Jiwj , and wj is the expected number of units in the jth queue.

Proof. For a Jackson network with infinite servers at each queue, the stationary queue lengths are

independent Poisson random variables with mean wj for the jth queue. Hence, zi is Poisson with mean

vi =∑

j∈Jiwj for all i. Furthermore, since Ji are mutually exclusive, zi are independent.

Next, we note that the expected service time spent in the jth stage given that the jth stage exists,

i.e., j ≤ k for the kth main branch, can be computed as

tlj =

∑Nl

k=j

∑Mlk

i=1 Plkitlkij∑Nl

k=j

∑Mlk

i=1 Plki

=

∑Nl

k=j

∑Mlk

i=1 Plkitlkij

1−∑j−1

n=1 pln. (3.10)

Combining this with (3.7), we have

Nl∑k=j

Mlk∑i=1

wlkij =

Nl∑k=j

Mlk∑i=1

λl0Plki

λlkij

=

Nl∑k=j

Mlk∑i=1

λl0Plkitlkij

= λl0(1−j−1∑n=1

pln)tlj

=λl0

λlj(1−

j−1∑n=1

pln)

= wlj . (3.11)

Page 33: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 21

tLNL

. . .λ10

λL0

λ20...

· · ·

...

...t11 t1N1

t13t12

. . .

0

tL1 tL2 tL3

Figure 3.5: Multiple-route network.

Therefore, by Lemma 1, we have

π(x) =∑

x:xlj=∑Nl

k=j

∑Mlki=1 xlkij ,∀j

πD(x)

=

Nl∏j=1

e−wljw

xlj

lj

xlj !, (3.12)

which is restated as the following theorem:

Theorem 1. The single-route network has the same stationary user distribution as that of the corre-

sponding single-route memoryless network: π(x) = π0(x).

3.3 Stationary User Distribution in Multiple-Route Network

In this section, we study the general case with multiple routes. We first extend the results from the

previous section to show π(x) = π0(x) in a multiple-route network. We then derive the stationary user

distribution π1(y) with respect to cells and show its insensitivity.

3.3.1 Queueing Network Model for Multiple-Route Network

Since the L routes are independent, we model the multiple-route network as a paralleling of L single-

route networks, as shown in Fig. 3.5. Similar to Section 3.2, we consider a reference multiple-route

memoryless network, which is a paralleling of L corresponding single-route memoryless networks. Then,

we construct the decoupled multiple-route network, which is a paralleling of L corresponding single-route

decoupled networks.

3.3.2 Insensitivity of π(x)

Theorem 2. The multiple-route network has the same stationary user distribution as that of the

corresponding multiple-route memoryless network.

Proof. Since the routes are independent, the stationary user distribution of the multiple-route network

Page 34: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 22

can be computed as the product of the stationary user distribution of single-route networks:

π(x) =

L∏l=1

Nl∏j=1

e−wljwxlj

lj

1

xlj !. (3.13)

Since the same holds for the multiple-route memoryless network, we have π(x) = π0(x).

3.3.3 Insensitivity of π1(y)

Let λn be the average total arrival rate to cell n, including both new and handoff arrivals. Let tn be the

average channel holding time in cell n, considering all routes and stages. Thus,

λn =∑

l,j:c(l,j)=n

Nl∑k=j

Mlk∑i=1

λl0Plki, (3.14)

tn =

∑l,j:c(l,j)=n

∑Nl

k=j

∑Mlk

i=1 λl0Plkitlkij∑l,j:c(l,j)=n

∑Nl

k=j

∑Mlk

i=1 λl0Plki

. (3.15)

Then from (3.11), we have

λntn =∑

l,j:c(l,j)=n

Nl∑k=j

Mlk∑i=1

λl0Plkitlkij

=∑

l,j:c(l,j)=n

Nl∑k=j

Mlk∑i=1

wlkij

=∑

l,j:c(l,j)=n

wlj . (3.16)

The joint stationary user distribution among all cells can be computed as a summation over those

entries of π0(x) satisfying yn =∑

l,j:c(l,j)=n xlj , ∀n. Then from Lemma 1, we obtain

π1(y) =∑

x:yn=∑

l,j:c(l,j)=n xlj ,∀n

L∏l=1

Nl∏j=1

e−wljwxlj

lj

1

xlj !

=∏n

e−(∑

l,j:c(l,j)=n wlj)

∑l,j:c(l,j)=n

wlj

yn

1

yn!

=∏n

e−(λntn) (λntn)yn 1

yn!. (3.17)

We make the following observations from (3.17):

• The marginal distribution within a single cell depends only on the average arrival rate and average

channel holding time at that cell.

• The number of users in each cell is independent and Poisson. This is in accordance with Theorem

9.27 in [77].

• The stationary user distribution depends only on the average arrival rates and average channel

Page 35: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 23

holding times in individual cells, having the exact same form of an M/M/∞ open Jackson network.

It is insensitive with respect to the distribution of channel holding times, or the correlation among

them. Furthermore, it is insensitive with respect to movement patterns, since the exact routing in

the network is irrelevant.

In reality, λn and tn can be easily obtained at the base station or access point of cell n by tracking

user arrivals and departures at the cell. Then the base station or access point can report the two local

values λn and tn to a central controller. After knowing λn and tn values of all cells, the central controller

can easily obtain the joint user distribution by (3.17). Obviously, the above approach facilitates efficient

system management and planning in practice, helping to avoid the need for collecting a large amount of

user location data. Note that in Section 3.2.3, for continuous channel holding times, we use a sequence of

discrete distributions with decreasing granularity to approach its distribution. The granularity does not

influence the computational complexity of the stationary user distribution in (3.17), since the discrete

distributions are only used in an intermediate step to prove the insensitivity property. We do not need

to explicitly compute the user distributions from the discrete distributions.

3.4 Experimental Study

In this section, our analysis is validated via experimenting with real-world traces. We first present the

data source and experimental settings. We then compare the experimental and analytical results.

3.4.1 Requirements and the Dartmouth Traces

There are serval publicly available traces online, including the Dartmouth traces [88–90], the UCSD

traces [91], the IBM-Watson traces [92], and the Montreal traces [93]. To choose proper traces, we

need to consider the following requirements. First, there should be a large amount of sample points to

facilitate an estimation of the user distribution by relative frequency, which is to be compared with the

distribution derived by the proposed analysis. Note that the support of the user distribution increases

exponentially with the number of cells. Most available traces do not have a large enough data set.

Second, the location of cells should be close enough so that there is enough handoff traffic among them

to create strong dependency between channel holding times. Data from already independently operated

cells can be analyzed using exiting techniques and hence are not challenging enough to test our analytical

model. To the best of our knowledge, the Dartmouth traces are the most recent public traces satisfying

both requirements. They have been widely studied in the literature [19, 94–96]. We use data from the

academic area in the Dartmouth traces [90], a comprehensive record of network activities in a large

wireless LAN (using 802.11b) in Dartmouth College. The traces includes the data of 152 APs and more

than 5000 users, during a 17-week period (Nov. 1, 2003 to Feb. 28, 2004). Most users are students

walking on campus. We focus on the Simple Network Management Protocol (SNMP) logs of the traces,

which are constructed every five minutes, when each AP polls all users attached to it. Each polling

message includes the information such as the name of AP, timestamp, the MAC and IP addresses of

users attached to it, signal strength, and the number of packets transmitted. By analyzing such data, we

can derive the average arrival rate, average channel holding time, and the user distribution by relative

frequency.

Page 36: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 24

3.4.2 Data Preprocessing

3.4.2.1 Data Extraction

Since the behavior of users may change greatly between daytime and nighttime, or workdays and holidays,

we focus on data accumulated from 9 am to 5 pm on Monday to Friday. We also discard the data

accumulated during the periods of holiday breaks, including Thanksgiving (Nov. 26, 2003 to Nov. 30,

2003) and Christmas and New Year (Dec. 17, 2003 to Jan. 4, 2004). In addition, for some APs, we

observed periods when they are temporally power off. If the total service time of an AP on a certain

day is less than 1/3 of its average value, we discard the data for this day.

3.4.2.2 Trace Gap Padding

The session duration is defined as the period of time during which a user is continuously connected to

the network. The user may move from one AP to another during a session. Occasionally, a user may

disappear from the SNMP report and soon reappear. This may be caused by the user departing and then

returning to the network, or due to the missing of an SNMP report. Following the solution proposed

in [19], we set a departure length threshold Td = 10 minutes. Only if a user disappears and reappears

within Td, it is regarded as staying in the network and the missing SNMP logs are padded.

3.4.2.3 Multiple Association and Ping-Pong Effect

We also observe that some users are simultaneously associated with multiple APs within a small time

interval. Some even ping-pong among multiple APs. We use two methods to offset these effects. First,

when multiple associations occur, we check the number of packets exchanged with the user. We deem

the user is associated with the AP which has exchanged the largest number of packets with the user

during its multiple association period. In addition, if a user leaves one AP and then returns within 5

minutes, it is regarded as having stayed in the AP.

3.4.2.4 Open Users

A fraction of the users may stay in the system during almost all working hours. These users are regarded

as closed users. Since our analytical model assumes an open network, the closed users are excluded in

our experiment. If a user stays for greater than or equal to 7.5 hours during working hours on a valid

day, it is regarded as a closed user. In our experiment, we observe that 9.91% of all users are closed

users. An analytical model for accommodating closed users is provided in [19], which can also be applied

to our work.

3.4.3 Trace Analysis

3.4.3.1 Poisson Arrivals

Analysis of the Dartmouth trace in [19] has shown that the overall new session arrivals into the network

are well modeled by a Poisson process. In this section, we further test the arrival process of new

sessions at each AP against the Poisson assumption. This is divided into two steps. In the first step,

we run an independence test, which indicates whether the numbers of arrivals in different time intervals

are approximately independent. Since it is not practical to account for all time intervals, we test the

Page 37: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 25

Table 3.1: Number of stages.Stages 1 2 3 4 ≥ 5

Observations 80448 15767 7410 3553 6107

independence of arrivals in two consecutive hours at each AP. If the AP passes the test, we regard the

arrivals at this AP to be sufficiently independent. Let H2 denote the entropy in the number of new

arrivals in two consecutive hours and H1 denote the entropy in the number of arrivals in one hour. Let

η = 2H1−H2

H2be the normalized entropy gap. If η < 0.15, we regard the AP as passing the independence

test. We observe that 144 of the 152 APs pass the independence test.

In the second step, we run a Poisson distribution test, which indicates whether the number of arrivals

is approximately Poisson distributed in a fixed time interval. For each AP that passes the independence

test, we count the number of new arrivals in each hour and calculate its real distribution. Furthermore,

by using the actual average arrival rate per hour, we can determine the corresponding theoretical Poisson

distribution. Then, we compute the Kullback-Leibler (KL) divergence H0 between the real distribution

and the theoretical distribution3. Let θ = H0

H1be the normalized KL value. If θ < 0.15, we regard

the AP as passing the Poisson distribution test. We observe that 124 of the 144 APs pass the Poisson

distribution test.4

Those 124 APs are referred to as valid APs, as the new arrivals at these APs can be well approximated

as Poisson. The other 28 APs are referred to as invalid APs. In our experiments, we study the effects

of both including and excluding the non-Poisson new sessions. We emphasize that the Poisson test is

for new arrivals only. Even for those APs that pass the Poisson test, the overall session arrival process

includes both new arrivals and handoff arrivals and hence is non-Poisson.

From the SNMP logs, we observe that the invalid APs tend to have occasional bursty arrivals.

Since they are within the academic area, we conjecture that they correspond to large classrooms, which

experience periodic rushes at the beginning of lecture hours. Even though such APs do not match our

analytical model, their user distribution is likely easy to predict in practice.

3.4.3.2 Number of Stages and Channel Holding Times

We have collected the distributions of number of stages in each route, which is shown in Table 3.1. It

can be seen that there is a large percentage of sessions staying for just one stage. To rigorously test the

analytical stationary user distribution, we will later present different cases where one-stage sessions are

either included or excluded.

Note that if the channel holding times are independently exponentially distributed, our conclusions

on the stationary user distribution trivially holds. Therefore, more challenging channel holding times

(i.e., arbitrarily distributed and correlated) are necessary to test our analytical results. Fig. 3.6 shows

the real distributions of channel holding times in different stages. This figure illustrates that none of

3Kullback-Leibler (KL) divergence is a standard approach to measure the difference between two probability distribu-tions X and Y . It can be regarded as a measure of the information lost (in bits) when Y is used to represent X. When KLdivergence is 0, Y is exactly the same with X. If the KL divergence is small compared with the entropy of the distributionX, the distribution Y is a close approximation of that of X.

4In the experiment, we do not employ the statistical hypothesis test. This is because the session arrival data extractedfrom the Dartmouth trace are noisy (e.g., there are fluctuations and abnormal points), so that most APs cannot pass thetest if a typical significance level 0.05 is used. Therefore, we resort to the KL divergence to show if the number of arrivals isapproximately Poisson distributed. Note that in Sections 3.4.4 and 3.4.5, we only need to show that our analytical modelis accurate when new session arrivals are approximately Poisson.

Page 38: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 26

0 50 100 1500

0.05

0.1

0.15

0.2

0.25

0.3

0.35

minutes

Stage 1 usersStage 2 usersStage 3 usersStage 4 users

Figure 3.6: The pdf of channel holding time in different stages.

them are exponentially distributed. Furthermore, we check the dependency of channel holding times in

different stages. The entropies of the distributions of channel holding times at stages 1, 2, 3 and 4 are

4.0657, 3.4172, 3.3942 and 2.9792, respectively, in bits. The entropy of their joint distribution is 10.2998

bits. Hence, the entropy gap is 4.0657 + 3.4172 + 3.3942 + 2.9792− 10.2998 = 3.5565 bits, much larger

than 0. This shows that the channel holding times at different stages are dependent.

3.4.3.3 AP Locations and Distance Constraint

APs that are far away are likely to have little effect on each other, regardless of the mobility and session

patterns. Therefore, to rigorously test the joint distribution of multiple APs, we are more interested

in selecting adjacent APs with spatial correlation. We set a distance constraint, under which APs are

located pairwisely less than 500 meters from each other. In the experiments, when we study the joint

distribution over multiple APs, this distance constraint is enforced by default, unless otherwise stated.

However, we will also present comparison results for cases with and without it.

3.4.4 Marginal User Distribution at a Single AP

We first show the marginal user distribution at individual APs. For this test, we applied all data after

the pre-processing described in Section 3.4.2, without further exclusions. We show a sampling of the

152 APs. In order to avoid selection bias, we choose APs according to their numeric identity. For each

building (with at least one AP), we select the AP with the smallest identity number (i.e., AP1 if it

exists; otherwise, we select AP2 if it exists; and so forth). There are 32 buildings with at least one AP,

and thus 32 APs are selected accordingly.

Fig. 3.7 shows a comparison between the real distributions and the analytical distributions of these

APs. Each subplot is labeled with Y or N, where Y indicates that the AP passes the two-step Poisson

test and N indicates the opposite. The figure illustrates that the real distributions and the analytical

distributions agree well with each other for those APs that pass the Poisson test.

3.4.5 KL Divergence and Entropy Gap for Multiple APs

In this section, we use KL divergenceHkl to compare the real and analytical joint distributions of multiple

APs. We also test the independence of the numbers of users in different cells by computing the entropy

Page 39: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 27

0 5

0

0.5

1Y

0 20 40

0

0.5N

0 5

0

0.5

1Y

0 10 20

0

0.2

0.4Y

0 20 40

0

0.1

0.2N

0 20 40

0

0.1

0.2N

0 5 10

0

0.2

0.4Y

0 5 10

0

0.5Y

0 10 20

0

0.2

0.4Y

0 2 4

0

0.5

1Y

0 10 20

0

0.5

1N

0 2 4

0

0.5

1Y

0 5 10

0

0.2

0.4Y

0 5 10

0

0.5

1Y

0 5 10

0

0.5Y

0 1 2

0

0.5

1Y

0 20 40

0

0.1

0.2N

0 20 40

0

0.2

0.4Y

0 10 20

0

0.2

0.4Y

0 5 10

0

0.5Y

0 2 4

0

0.5

1Y

0 10 20

0

0.2

0.4N

0 10 20

0

0.2

0.4Y

0 50

0

0.1

0.2N

0 20 40

0

0.1

0.2Y

0 10 20

0

0.2

0.4Y

0 10 20

0

0.2

0.4Y

0 5 10

0

0.2

0.4Y

0 5 10

0

0.5

1Y

0 5 10

0

0.5Y

0 5 10

0

0.5Y

0 1 2

0

0.5

1Y

Figure 3.7: Comparison of distributions for single APs. Real distributions are in solid lines; analyticaldistributions are in dashed lines.

gap Hgap, between the sum of the entropies of real marginal distributions and the entropy of the real

joint distribution. The entropy of the real joint distribution Hreal is also presented for reference. Note

that if Hkl is much smaller than Hreal, the analytical distribution is a close approximation of the real

distribution; if Hgap is much smaller than Hreal, the numbers of users of single APs are approximately

independent.

Given n, the number of APs we aim to study, we randomly choose n different APs. Then we compute

Hkl, Hgap, and Hreal with respect to these APs. By running this procedure 100 times, we obtain the

sample mean and sample standard deviation of Hkl, Hgap, and Hreal. In subsequent studies, we plot the

sample mean versus n, along with bars showing one sample standard deviation, in Figs. 3.8-3.11. Note

that the plot points are slightly shifted to avoid overlaps. Because the sample space of user distribution

increases exponentially with the number of cells, and the real user distribution is counted through its

relative frequency, we limit n ≤ 5 in the experiment in order to ensure enough data are counted for each

sample point.

Page 40: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 28

1 2 3 4 50

2

4

6

8

10

12

Number of APsV

alu

e(b

its)

Hkl, excluding invalid APs

Hreal, excluding invalid APs

Hkl, excluding invalid sessions

Hreal, excluding invalid sessions

Hkl, without exclusion

Hreal, without exclusion

Figure 3.8: Hkl and Hreal under the influence of non-Poisson arrivals.

1 2 3 4 50

2

4

6

8

10

12

Number of APs

Valu

e(b

its)

Hgap, excluding invalid APs

Hreal, excluding invalid APs

Hgap, excluding invalid sessions

Hreal, excluding invalid sessions

Hgap, without exclusion

Hreal, without exclusion

Figure 3.9: Hgap and Hreal under the influence of non-Poisson arrivals.

1 2 3 4 50

2

4

6

8

10

12

Number of APs

Valu

e(b

its)

Hkl, with distance constraint

Hgap, with distance constraint

Hreal, with distance constraint

Hkl, without distance constraint

Hgap, without distance constraint

Hreal, without distance constraint

Figure 3.10: Hkl, Hgap and Hreal under the influence of distance restriction.

1 2 3 4 50

2

4

6

8

10

12

Number of APs

Valu

e(b

its)

Hkl, with one-stage sessions

Hgap, with one-stage sessions

Hreal, with one-stage sessions

Hkl, without one-stage sessions

Hgap, without one-stage sessions

Hreal, without one stage sessions

Figure 3.11: Hkl, Hgap and Hreal under the influence of one-stage sessions.

Page 41: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 29

3.4.5.1 Influence of Non-Poisson Arrivals

Clearly, excluding non-Poisson arrivals could improve the accuracy of the analytical model. We compare

Hkl, Hgap, and Hreal under the conditions of either including or excluding non-Poisson arrivals.

A direct method to exclude non-Poisson session arrivals is to remove from the data set all sessions

that are initiated at invalid APs. However, this will reduce the number of handoff session arrivals even

in valid APs, hence biasing the analysis. An alternate approach is to simply remove the invalid APs

from the data set, while allowing those non-Poisson sessions to be counted in the valid APs that they

pass through. In this way, accurate average arrival rates at the valid APs are maintained.

Thus, we study the following three cases: 1) Excluding sessions initiating at invalid APs (i.e., invalid

sessions); 2) Excluding invalid APs; and 3) Without exclusion. Fig. 3.8 illustrates Hkl compared with

Hreal for the three cases, and Fig. 3.9 illustrates Hgap compared with Hreal for the three cases. We

observe that both Hkl and Hgap are much smaller than Hreal, when we either exclude invalid sessions

or exclude invalid APs, illustrating that the real distributions are close to the analytical distributions,

and the numbers of users of single APs are approximately independent. When we do not exclude

invalid sessions or invalid APs, Hkl and Hgap become larger, showing that the analytical distribution

is influenced by the non-Poisson arrivals. However, Hkl and Hgap remain much smaller than Hreal,

illustrating that the analytical distribution is still valid to approximate the real distribution, even the

arrivals are not strictly Poisson.

In addition, excluding invalid sessions only brings small decrements in Hkl and Hgap compared with

excluding invalid APs. Note that when we exclude invalid sessions, both the one-stage and multiple-stage

non-Poisson arrival sessions are excluded; when we exclude invalid APs, only the one-stage non-Poisson

arrival sessions are excluded. This illustrates that multiple-stage non-Poisson arrival sessions have only

weak influence on the modeling accuracy.

3.4.5.2 Influence of Distance Constraint

Fig. 3.10 shows Hkl, Hgap, and Hreal with and without the distance constraint. For both cases, we

exclude the invalid APs. We observe that Hkl, Hgap, and Hreal are nearly unchanged with or without

the distance constraint, confirming our expectation that the distance constraint does not influence the

accuracy of the analytical model, since the analytical model predicts that the numbers of users of adjacent

APs are independent.

3.4.5.3 Influence of One-Stage Sessions

Fig. 3.11 shows Hkl, Hgap, and Hreal with and without the one-stage sessions. For both cases, we exclude

the invalid APs. We observe that when we exclude the one-stage sessions, Hkl and Hgap becomes smaller,

suggesting that our model is even more accurate in this case. This is an apparently counter-intuitive

result, since the analytical distribution trivially holds for one-stage sessions. An explanation for this is

the following. Since one-stage sessions are more likely to be new sessions corresponding to attending

lectures in a classroom, they are more likely to be non-Poisson. Since not all non-Poisson arrivals can

be excluded by removing the invalid APs, when we further exclude one-stage sessions, we obtain more

accurate analytical results.

Note that one-stage sessions can be analyzed as a single-queue model [18]. Thus, in practice, one may

separately analyze one-stage and multiple-stage sessions and combine the resultant user distributions.

Page 42: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 3. Insensitivity of User Distribution in HWNs 30

3.5 Summary

In this chapter, we have studied the user distribution in multicell network by establishing a precise ana-

lytical model, considering arbitrary user movement and arbitrarily and dependently distributed channel

holding times. We have derived the stationary distribution of the number of users in each cell, which is

only related to the average arrival rate and the average channel holding time of each cell, and hence is

insensitivity with respect to the general movement and session patterns. We have used the Dartmouth

trace to validate our analysis, which shows that the analytical model is accurate when new session ar-

rivals are Poisson and remains useful when non-Poisson session arrivals are also included in the data

set.

Page 43: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4

Uplink Interference Analysis: Open

Access versus Closed Access

As discussed in Chapter 1, in order to achieve higher capacity, better service quality, lower power usage,

and ubiquitous coverage in mobile networks, one effective approach is to install a second tier of smaller

cells, referred to as femtocells, overlapping the original macrocell network [97]. In the presence of

femtocells, whenever some user equipment (UE) is near a femtocell BS, two different access mechanisms

may be applied: closed access and open access. Under closed access, a femtocell BS only provides service

to its local users, without further admitting nearby macrocell users. In contrast, under open access, all

nearby macrocell users are allowed to access the femtocell BS.

In this chapter, we mainly discuss how the two access modes may affect both macrocell users and local

femtocell users, in terms of the uplink interference and outage probabilities. We present a stochastic

geometric analysis framework to derive numerical expressions for the uplink interference and outage

probabilities of open access and closed access by modeling macrocell BSs as a regular grid, macrocell

UEs as a Poisson point process (PPP), and femtocell UEs as a two-level clustered Poisson point process,

which captures the spatial patterns of different network components. Due to the complexity of uplink

interference, the expressions of outage probabilities for both the open and closed access cases are in

non-closed forms, requiring multiple levels of integration. Then, we further derive sufficient conditions

for open and closed access modes to outperform each other in terms of the outage probability at either

the macrocell or femtocell level. This leads to closed-form expressions to upper and lower bound the

difference in the targeted received power between the two access modes. Simulations are conducted to

validate the accuracy of the analytical model and the correctness of the bounds.

4.1 System Model

4.1.1 Two-tier Network

We consider a two-tier network with macrocells and femtocells as shown in Fig. 4.1. In this chapter,

we assume that the macrocells form an infinite hexagonal grid in the two-dimensional Euclidean space

R2. Macrocell BSs are located at the centers of the hexagons B = ( 32aRc,√32 aRc +

√3bRc)|a, b ∈ Z,

where Rc is the radius of the hexagon. Macrocell UEs are randomly distributed in the system, which are

31

Page 44: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 32

Macrocell UEs Femtocell UEs

Open access UEs

Macrocells

Femtocells

Rc

R

Figure 4.1: Two-tier network with macrocells and femtocells.

modeled as a homogeneous Poisson point process (PPP) Φ with intensity λ. We focus on interference

analysis in a single shared radio frequency sub-band (which is referred to as the reference sub-band)

[52,53,58,98,99]. The UEs (macrocell UEs and femtocell UEs) considered in this chapter are those using

the reference sub-band.

Femtocell BSs are randomly spatially deployed. We assume femtocell BSs form a homogeneous PPP

Θ with intensity µ. Each femtocell BS is connected to the core network by high-capacity wired links

that have no influence on our wireless performance analysis.

Each femtocell BS communicates with local femtocell UEs surrounding it, constituting a femtocell.

We assume R as the maximum communication radius of each femtocell BS. Given the location of a

femtocell BS at x0, we assume that its femtocell UEs, denoted by Ψ(x0), are distributed as a non-

homogenous PPP in the disk centered at x0 with radius R. Its intensity at x is described by ν(x− x0),

a non-negative function of the vector x− x0. Note that the UE intensity ν(x− x0) = 0 if |x− x0| > R.

The femtocell UEs in one femtocell are independent of femtocell UEs in other femtocells, as well as the

macrocell UEs. We assume the scale of femtocells is much smaller than the scale of macrocells [97],

R ≪ Rc.

To better understand the spatial distribution of femtocell BSs and femtocell UEs, the femtocell

BSs Θ can be regarded as a parent point process in R2, while femtocell UEs Ψ is a daughter process

associated with a point in the parent point process, forming a two-level random pattern (see Section

5.3 of [39]). Note that the aggregating of femtocell UEs around a femtocell BS implicitly defines the

location correlation among femtocell UEs.

Let 0 denote the origin of the plane. Let H(x) denote the hexagon region centered at x with radius

Rc; let B(x, R) denote the disk region centered at x with radius R; let BS(x) denote the hexagon center

nearest to x (i.e., BS(x) = x0 ⇔ x ∈ H(x0)).

4.1.2 Open Access versus Closed Access

If a macrocell UE is covered by a femtocell BS (i.e., within a distance of R from a femtocell BS), under

closed access, the UE still connects to the macrocell BS. Under open access, the UE is handed off to

the femtocell BS and disconnects from the original macrocell BS; the UE is then referred to as an open

Page 45: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 33

access UE.

Given a femtocell BS located at x0, let Ω(x0) denote the point process corresponding to the open

access UEs connecting to it. We assume that the probability of two femtocells overlapping can be

ignored [53].1 Thus, Ω(x0) corresponds to points of Φ inside the range of the femtocell BS at x0, which

is a PPP with intensity λ inside B(x0, R).

Let ν =∫B(0,R)

ν(x)dx be the average number of local femtocell UEs inside a femtocell (using the

reference radio frequency sub-band). In the open access case, λ = πR2λ is the average number of open

access UEs inside a femtocell (using the reference radio frequency sub-band).

4.1.3 Path Loss and Power Control

Let Pt(x) denote the transmission power at x and Pr(y) denote the received power at y. We assume that

Pr(y) =Pt(x)hx,y

|x−y|γ , where |x − y|γ is the propagation loss function with predetermined constant γ > 2,

and hx,y is the fast fading term. Note that we focus on the scenario where different tiers in the system

use the same radio spectrum under a similar radio environment, and thus the path loss exponent values

of different tiers are identical [58,59,100]. Also, following a common assumption of stochastic geometric

modeling of wireless networks, we assume that hx,y is independently exponentially distributed with unit

mean (i.e., Rayleigh fading) [12, 13, 35, 50, 58, 59]. Let H(·) be the cumulative distribution function of

hx,y.

We also assume that uplink power control adjusts for propagation losses [53, 98, 101, 102]. The

targeted received power level of macrocell UEs, femtocell UEs, and open access UEs are P , Q, and

P ′, respectively2. Given the targeted received power PT (where PT = P , Q, or P ′), receiver at y,

and transmitter at x, the transmission power is PT |x − y|γ . Then, the resultant interference at y′ isPT |x−y|γhx,y′

|x−y′|γ .

We define ρ , P ′/P , which is the targeted received power enhancement if a macrocell UE becomes

an open access UE. In this chapter, we study the performance variation when open access is applied

to replace closed access. Therefore, as a parameter corresponding to open access UEs, ρ is regarded

as an important designed parameter. The other parameters, such as P, Q, T , and γ are considered as

predetermined system-level constants.

4.1.4 Outage Performance

In this chapter, the performance of macrocell UEs and femtocell UEs (under open access or closed

access) is examined through the outage probability, which is defined as the probability that the signal

to interference ratio (SIR) is smaller than a given threshold value T . Because we focus on interference

analysis, the noise is assumed to be negligible.

1Given a femtocell, the probability that it does not overlap with another femtocell (i.e., no other femtocell BSs arelocated 2R from it) is Pnonover = exp(−4πR2µ). We assume that R and µ are small enough such that Pnonover can beapproximated by 1.

2It is recommended (Section 7.3 of [103]) that the received power level at macrocell BSs is lower than that at femtocellBSs. Here, we assume a single fixed level of targeted received power at the macrocell or femtocell level for mathematicaltractability. We show that our model is still valid when the targeted received power is randomly distributed throughsimulations in Section 4.4.

Page 46: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 34

4.2 Open Access vs. Closed Access at the Macrocell Level

In this section, we analyze the uplink interference and outage performance of macrocell UEs. Consider a

reference macrocell UE, termed the typical UE, communicating with its macrocell BS, termed the typical

BS. We aim to investigate the performance of the typical UE.

Due to the stationarity of point processes corresponding to macrocell UEs, femtocell BSs, and fem-

tocell UEs, throughout this section we will re-define the coordinates so that the typical BS is located at

0. Correspondingly, the typical UE is located at some xU that is uniformly distributed in H(0), since

macrocell BSs form a deterministic hexagonal grid (see page 60 of [37]).

Let Φ′ be the point process of all other macrocell UEs conditioned on the typical UE, which is a

reduced Palm point process [37] with respect to (w.r.t.) Φ. Because the reduced Palm point process of

a PPP has the same distribution as its original PPP, Φ′ is still a PPP with intensity λ [37]. Therefore,

for presentation convenience, we still use Φ to denote this reduced Palm point process.

4.2.1 Open Access Case

4.2.1.1 Interference Components

The overall interference in the uplink has three parts: from macrocell UEs not inside any femtocell

(denoted by I1), from open access UEs (denoted by I2), and from femtocell UEs (denoted by I3).

I1 can be computed as the sum of interference from each macrocell UE:

I1 =∑x∈Φ0

P |x− BS(x)|γhx,0

|x|γ, (4.1)

where Φ0 denotes the points of Φ not inside any femtocell.

I2 can be computed as the sum of interference from all open access UEs of all femtocells:

I2 =∑x0∈Θ

∑x∈Ω(x0)

P ′|x− x0|γhx,0

|x|γ. (4.2)

I3 can be computed as the sum of interference from all femtocell UEs of all femtocells:

I3 =∑x0∈Θ

∑x∈Ψ(x0)

Q|x− x0|γhx,0

|x|γ. (4.3)

The overall interference of open access is I = I1 + I2 + I3.

4.2.1.2 Laplace Transform of I

In this subsection, we study the Laplace transform of I, denoted by LI(s), which leads to the following

theorem:

Theorem 3. Under the open access mode, the Laplace transform of uplink interference at a typical

macrocell BS is given by

LI(s) =E( ∏

x∈Φ

u(x, s)

)· E

[ ∏x0∈Θ

E(∏

x∈Ω(x0)v(x,x0, s)

)E(∏

x∈Ω(x0)u(x, s)

) E( ∏

x∈Ψ(x0)

w(x,x0, s)))]

, (4.4)

Page 47: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 35

where u(x, s) , exp(− sP |x−BS(x)|γhx,0

|x|γ

), v(x,x0, s) , exp

(− sρP |x−x0|γhx,0

|x|γ

), and w(x,x0, s) ,

exp(− sQ|x−x0|γhx,0

|x|γ

).

See Appendix A.1 for the proof.

4.2.1.3 Numeric Computation of LI(s)

In this subsection, we present a numeric approach to compute LI(s) derived in (4.4), which will facilitate

later comparison between open access and closed access. Let L0(s) = E(∏

x∈Φ u(x, s)), which is a

generating functional corresponding to Φ [37, 39]. It can be re-written in a standard integral form as

follows:

L0(s) = exp

(− λ

∫R2

(1−

∫R+

e−sP |x−BS(x)|γh

|x|γ H(dh)

)dx

)

=exp

(− λ

∫R2

sP |x− BS(x)|γ

sP |x− BS(x)|γ + |x|γdx

). (4.5)

Given the location of a femtocell BS at x0, let W(x0, s) = E

( ∏x∈Ψ(x0)

w(x,x0, s)

), which is a

generating functional corresponding to Ψ(x0). It can be expressed in a standard form through the

Laplace functional of PPP Ψ(x0):

W(x0, s) = exp

(−

∫B(0,R)

sQ|x|γ

sQ|x|γ + |x+ x0|γν(x)dx

). (4.6)

Similarly, let V(x0, s) = E(∏

x∈Ω(x0)v(x,x0, s)

), and U(x0, s) = E

(∏x∈Ω(x0)

u(x, s)), we have

V(x0, s) = exp

(− λ

∫B(0,R)

sρP |x|γ

sρP |x|γ + |x+ x0|γdx

), (4.7)

U(x0, s) = exp

(− λ

∫B(x0,R)

sP |x− BS(x)|γ

sP |x− BS(x)|γ + |x|γdx

). (4.8)

Let J (x0, s) = V(x0,s)U(x0,s)

W(x0, s), which is numerically computable through (4.6)-(4.8). Finally, we

note that

E

[ ∏x0∈Θ

E(∏

x∈Ω(x0)v(x,x0, s)

)E(∏

x∈Ω(x0)u(x, s)

) E( ∏

x∈Ψ(x0)

w(x,x0, s)))]

=E

[ ∏x0∈Θ

(V(x0, s)

U(x0, s)W(x0, s)

)]= E

( ∏x0∈Θ

J (x0, s)

)

=exp

(−µ

∫R2

(1− J (x0, s)) dx0

), (4.9)

where (4.9) is derived from the generating functional with respect to PPP Θ. Substituting (4.5) and

Page 48: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 36

(4.9) into (4.4), we can numerically compute LI(s):

LI(s) = L0(s) · exp(−µ

∫R2

(1− J (x0, s)) dx0

). (4.10)

An intuitive explanation to the above is as follows. First, in terms of the Laplace transform, additive

interference is in the product form, and interference reduction is in the division form. Suppose that there

are no femtocells at the beginning, and L0(s) corresponds to the interference from macrocell UEs. Then,

we add femtocells to the system. Given a femtocell BS at x0, W(x0, s) corresponds to the interference

from local femtocell UEs inside the femtocell, V(x0, s) corresponds to interference from open access UEs

inside the femtocell, and U(x0, s) corresponds to interference reduction due to open access UEs as they

disconnect from their original macrocell BS. Thus, J (x0, s) = V(x0,s)U(x0,s)

W(x0, s) represents the overall

interference variation when a femtocell centered at x0 is added. Finally, exp(−µ∫R2(1− J (x0, s))dx0

)is the overall interference variation after adding all femtocells. As a consequence, the overall interference

can be computed in formula (4.10).

4.2.1.4 Outage Probability

Given the SIR threshold T , the outage probability of the typical UE can be computed as the probability

that the signal strength PhxU ,0 over the interference I is less than T :

P oout = P(PhxU ,0 < TI) = 1− LI(s)|s= T

P. (4.11)

The last equality above is due to hxU ,0 being exponentially distributed with unit mean. As a result,

P oout can be derived directly from LI(s) (see Section 16.2.2.1 of [37]).

4.2.2 Closed Access Case

Different from the open access case, the overall interference has only two parts: from macrocell UEs

(denoted by I1) and from femtocell UEs (denoted by I3).

I1 can be computed as the sum of interference from each macrocell UE:

I1 =∑x∈Φ

P |x− BS(x)|γhx,0

|x|γ. (4.12)

I3 is exactly the same as I3 in (4.3).

Then, the total interference can be computed as I = I1 + I3. Similar to Section 4.2.1.3, the Laplace

transform of I is

LI(s) =E

[ ∏x∈Φ

u(x, s)∏

x0∈Θ

∏x∈Ψ(x0)

w(x,x0, s)

]

=L0(s) · E

[ ∏x0∈Θ

(W(x0, s)

)]

=L0(s) · exp(−µ

∫R2

(1−W(x0, s))dx0

), (4.13)

where L0(s) is the same as (4.5), and W(x0, s) is the same as (4.6).

Page 49: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 37

An intuitive explanation to the above is as follows. First, L0(s) corresponds to the interference of all

macrocell UEs. Given a femtocell BS at x0, W(x0, s) corresponds to interference from local femtocell UEs

inside the femtocell. Then, exp(−µ∫R2(1−W(x0, s))dx0

)is the overall interference from all femtocells.

As a consequence, the overall interference can be computed as formula (4.13).

Finally, the outage probability of the typical UE can be computed as

P cout = P(PhxU ,0 < T I) = 1− LI(s)|s= T

P. (4.14)

4.2.3 Parameter Normalization

From the above performance analysis of both open access and closed access, we see that one can normalize

the radius of macrocells Rc to 1, so that R is equivalent to the ratio of the radius of femtocells to that

of macrocells (R ≪ 1). Also, we can normalize the target received power of macrocell UEs P to 1, so

that Q is equivalent to the ratio of the target received power of femtocell UEs to that of macrocell UEs,

and P ′ = ρ. Therefore, in the rest of this section, without loss of generality, we set Rc = 1 and P = 1.

4.2.4 Open Access vs. Closed Access

We compare the outage performance of open access and closed access at the macrocell level. Due to the

integral form of the Laplace transform, the expressions of outage probabilities for both the open and

closed access cases are in non-closed forms, requiring multiple levels of integration. As a consequence,

we are motivated to derive closed-form bounds to compare open access and closed access.

Let Vmax , 4π2R4(Tρ)2γ

(18 + 1

4(γ+2) +1

(γ+2)(γ−2)

), Vmin , 2π2R4(Tρ)

(18 + 1

4(γ+2) +1

(γ+2)(γ−2)

),

and Cu ,∫R2

(T |x−BS(x)|γ

T |x−BS(x)|γ+|x|γ

)dx be a system-level constant determined by T and γ. We have the

following theorem:

Theorem 4. A sufficient condition for P oout < P c

out is

−Vmax + πR2Cue−ν > 0, (4.15)

and a sufficient condition for P oout > P c

out is

−πR2Cueλ +Vmine

−λ−ν > 0. (4.16)

See Appendix A.2 for the proof.

Through Theorem 4, closed-form expressions can be used to compare the outage probabilities between

open access and closed access without the computational complexity introduced by numeric integrations

in (4.10) and (4.13).

In the following, we focus on the performance variation if open access is applied to replace closed

access. The parameter corresponding to open access UEs, ρ, is regarded as a design parameter. If

we fix all the other network parameters (including targeted received power level of macrocell UEs,

femtocell UEs), increasing ρ implies better performance for open access UEs, but it will also increase the

interference from open access UEs to macrocell BSs. As a consequence, we aim to derive the threshold

ρ∗ such that P oout = P c

out. At the macrocell level, macrocell UEs experience less outage iff ρ < ρ∗.

Thus, ρ∗ is referred to as the maximum power enhancement tolerated at the macrocell level. Thus, in the

Page 50: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 38

deployment of open access femtocells, the network operator is motivated to limit ρ below ρ∗ to guarantee

that the performance of macrocell UEs under open access is no worse than that under closed access. One

way to derive ρ∗ is through numerical computation of (4.10) and (4.13) and numerical search, which

introduces high computational complexity due to the multiple levels of integration. A more efficient

alternative is to find the bounds of ρ∗ through Theorem 4. Simple algebra manipulation leads to

ρ∗min =1

T

Cue−ν

4πR2(

18 + 1

4(γ+2) +1

(γ+2)(γ−2)

)

γ2

, (4.17)

ρ∗max =1

T

Cueν+2λ

2πR2(

18 + 1

4(γ+2) +1

(γ+2)(γ−2)

)

γ2

, (4.18)

where ρ∗min and ρ∗max are the lower bound and upper bound of ρ∗, respectively. If the network operator

limits ρ < ρ∗min, the performance of macrocell UEs under open access can be guaranteed no worse than

their performance under closed access.

Furthermore, through (4.17) and (4.18), we observe that ρ∗min = Θ( 1Rγ ) and ρ∗max = Θ( 1

Rγ ), leading

to the following corollary:

Corollary 1.

ρ∗ = Θ(1

Rγ). (4.19)

Note that, in (4.19), Rc is normalized to 1 and R represents the ratio of the radius of femtocells to

that of macrocells. If Rc is not normalized, (4.19) should be re-written as ρ∗ = Θ((

Rc

R

)γ).

Intuitively, as a rough estimation, open access UEs have their distance to the BS reduced approxi-

mately by a factor of R, leading to the capability to increase their received power by the corresponding

gain in the propagation loss function, as their average interference level is maintained. However, Corol-

lary 1 cannot be trivially obtained from the above intuition. This is because the outage probability does

not only depend on the average interference, but also depends on the distribution of the interference

(i.e., the Laplace transform of the interference). Comparing (4.10) with (4.13), we note that if we switch

from closed access to open access, the distribution of the interference will change drastically. Corollary

1 can be derived only after rigorously comparing and bounding the Laplace transforms of interference

under open access and closed access.

From (4.17) and (4.18), the gap between the upper and lower bounds can be expressed asρ∗max

ρ∗min

=

2γ2 eγ(ν+λ). We emphasize that in this chapter, interference analysis is conducted for a single shared

radio frequency sub-band (i.e., the reference sub-band). The average number of UEs in a macrocell or

femtocell using the reference sub-band is usually no greater than one. Note that ν + λ is the average

number of UEs in a femtocell using the reference sub-band and is expected to typically be a small value.

For example, as indicated in the 3GPP guidelines in Annex A of [104], the number of femtocell UEs per

femtocell is much smaller than the number of macrocell UEs per macrocell. Therefore,ρ∗max

ρ∗min

is expected

to be small in practical systems.

Page 51: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 39

4.3 Open Access vs. Closed Access at the Femtocell Level

In this section, we analyze the uplink interference and outage performance of femtocell UEs. Given a

reference femtocell UE, termed the typical femtocell UE, communicating with its femtocell BS, termed

the typical femtocell BS, we aim to study the interference at the typical femtocell BS. We also define

the femtocell corresponding to the typical femtocell BS as the typical femtocell, and the macrocell BS

nearest to the typical femtocell BS as the typical macrocell BS.

Similar to Section 4.2, we re-define the coordinate of the typical macrocell BS as 0. Correspondingly,

the typical femtocell BS is located at some xB that is uniformly distributed in H(0) [37]. Given the

typical femtocell centered at xB, let Θ′ denote the point process of other femtocell BSs conditioned

on the typical femtocell BS, i.e., the reduced Palm point process w.r.t. Θ. Then, Θ′ is still a PPP

with intensity µ [37]. For presentation convenience, we still use Θ to denote this reduced Palm point

process. Let Ψ(xB) denote the other femtocell UEs inside the typical femtocell conditioned on the typical

femtocell UE. Similarly, Ψ(xB) has the same distribution as Ψ(xB). Let Ω(xB) denote open access UEs

connecting to the typical femtocell BS.

4.3.1 Open Access Case

4.3.1.1 Interference Components

The overall interference in the uplink of the typical femtocell UE has five parts: from macrocell UEs

not inside any femtocell (I ′1(xB)), from open access UEs outside the typical femtocell (I ′2(xB)), from

femtocell UEs outside the typical femtocell (I ′3(xB)), from local femtocell UEs inside the typical femtocell

(I ′4(xB)), and from open access UEs inside the typical femtocell (I ′5(xB)). We have

I ′1(xB) =∑x∈Φ0

P |x− BS(x)|γhx,xB

|x− xB |γ, (4.20)

I ′2(xB) =∑x0∈Θ

∑x∈Ω(x0)

ρP |x− x0|γhx,xB

|x− xB |γ, (4.21)

I ′3(xB) =∑x0∈Θ

∑x∈Ψ(x0)

Q|x− x0|γhx,xB

|x− xB |γ, (4.22)

I ′4(xB) =∑

x∈Ψ(xB)

Qhx,xB, (4.23)

I ′5(xB) =∑

x∈Ω(xB)

ρPhx,xB . (4.24)

The overall interference is I ′(xB) =∑5

i=1 I′i(xB).

4.3.1.2 Laplace Transform of I ′(xB)

In this subsection, we study the Laplace transform of I ′(xB), denoted by LI′(xB, s). We have the

following theorem:

Theorem 5. Under the open access mode, the Laplace transform of uplink interference at a typical

Page 52: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 40

femtocell BS located at xB is given by

LI′(xB , s) =E( ∏

x∈Φ

u′(x,xB , s)

)E

[ ∏x0∈Θ

(E( ∏

x∈Ω(x0)

v′(x,x0,xB , s))

E( ∏

x∈Ω(x0)

u′(x,xB , s)) E

( ∏x∈Ψ(x0)

w′(x,x0,xB , s)))]

E( ∏

x∈Ψ(xB)

w′(x,xB ,xB, s)

)E(∏

x∈Ω(xB) v′(x,xB,xB , s)

)E(∏

x∈Ω(xB) u′(x,xB , s)

) . (4.25)

where u′(x,xB , s) , exp(− sP |x−BS(x)|γhx,xB

|x−xB |γ

), v′(x,x0,xB, s) , exp

(− sρP |x−x0|γhx,xB

|x−xB |γ

), and

w′(x,x0,xB, s) , exp(− sQ|x−x0|γhx,xB

|x−xB |γ

).

See Appendix A.3 for the proof.

4.3.1.3 Numeric Computation of LI′(xB , s)

First, similar to the derivations of (4.5)-(4.8) in Section 4.2.1.3, we have

L′0(xB , s) =E

( ∏x∈Φ

u′(x,xB , s)

)= exp

(− λ

∫R2

sP |x− BS(x)|γ

sP |x− BS(x)|γ + |x− xB |γdx

), (4.26)

W ′(x0,xB , s) =E( ∏

x∈Ψ(x0)

w′(x,x0,xB , s))= exp

(−

∫B(x0,R)

sQ|x− x0|γ

sQ|x− x0|γ + |x− xB |γν(x− x0)dx

),

(4.27)

V ′(x0,xB , s) =E( ∏

x∈Ω(x0)

v′(x,x0,xB , s))= exp

(− λ

∫B(x0,R)

sρP |x− x0|γ

sρP |x− x0|γ + |x− xB |γdx

), (4.28)

U ′(x0,xB , s) =E( ∏

x∈Ω(x0)

u′(x,xB , s))= exp

(− λ

∫B(x0,R)

sP |x− BS(x)|γ

sP |x− BS(x)|γ + |x− xB |γdx

), (4.29)

In addition, we can derive

W ′′(xB , s) =E( ∏

x∈Ψ(xB)

w′(x,xB ,xB, s)

)= exp

(− sQν

sQ+ 1

), (4.30)

V ′′(xB , s) =E( ∏

x∈Ω(xB)

v′(x,xB ,xB , s)

)= exp

(− sρPλ

sρP + 1

), (4.31)

U ′′(xB , s) =E( ∏

x∈Ω(xB)

u′(x,xB, s)

)= exp

(− λ

∫B(xB ,R)

sP |x− BS(x)|γ

sP |x− BS(x)|γ + |x− xB|γdx

). (4.32)

Then, following the same steps as (4.9), LI′(xB , s) is derived as

LI′(xB , s) = L′0(xB, s) exp

(− µ

∫R2

(1− V ′(x0,xB , s)W ′(x0,xB , s)

U ′(x0,xB , s)

)dx0

)W ′′(xB , s)V ′′(xB , s)

U ′′(xB , s).

(4.33)

Page 53: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 41

An intuitive explanation to the above is as follows. First, L′0(xB , s) corresponds to the interference of

all macrocell UEs. Second, similar to the discussions in Section 4.2.1.3, V′(x0,xB ,s)W′(x0,xB ,s)U ′(x0,xB ,s) represents

the overall interference variation when a femtocell centered at x0 is added. Third, exp(− µ

∫R2

(1−

V′(x0,xB ,s)W′(x0,xB ,s)U ′(x0,xB ,s)

)dx0

)is the overall interference variation after adding all femtocells other than the

typical femtocell. Fourth, W′′(xB ,s)V′′(xB ,s)U ′′(xB ,s) represents the overall interference variation after adding the

typical femtocell. As a consequence, the overall interference can be computed as formula (4.33).

4.3.1.4 Outage Probability

Similar to (4.11), the outage probability (given xB) is

P oout(xB) = P(QhxU ,xB

< TI ′(xB)) = 1− LI′(xB , s)|s=T ′ , (4.34)

where xU is the coordinate of the typical femtocell UE (irrelevant to the result), T ′ = TQ , and T is

the SIR threshold. Because xB is uniformly distributed in H(0), the average outage probability can be

computed as∫H(0)

P oout(xB)dxB/|H(0)|, where |H(0)| = 3

√3R2

c

2 is the area of a macrocell.

4.3.2 Closed Access Case

The overall interference has three parts: from macrocell UEs (I ′1(xB)), from femtocell UEs outside the

typical femtocell (I ′3(xB)), and from femtocell UEs inside the typical femtocell (I ′4(xB)). I′1(xB) can be

computed as

I ′1(xB) =∑x∈Φ

P |x− BS(x)|γhx,xB

|x− xB |γ, (4.35)

and I ′3(xB) and I ′4(xB) are exactly the same as I ′3(xB) in (4.22) and I ′4(xB) in (4.23), respectively.

The overall interference is I ′(xB) = I ′1(xB)+ I ′3(xB)+ I ′4(xB). Then, the Laplace transform of I ′(xB)

is

LI′(xB , s) = L′0(xB, s) · exp

(−µ

∫R2

(1−W ′(x0,xB)) dx0

)· W ′′(xB , s). (4.36)

The outage probability (given xB) is

P cout(xB) = 1− LI′(xB , s)|s=T ′ . (4.37)

The average outage probability is∫H(0)

P cout(xB)dxB/|H(0)|. Similar to the discussion in Section 4.2.3,

we still can normalize Rc and P . Hence, in the rest of this section, without loss of generality, we set

Rc = 1 and P = 1.

4.3.3 Open Access vs. Closed Access

In this subsection, we compare the outage performance of open access and closed access at the femtocell

level.

LetV′max , 4π2R4(T ′ρ)

(18 + 1

4(γ+2) +1

(γ+2)(γ−2)

),V′

min , 2π2R4(T ′ρ)2γ

(18 + 1

4(γ+2) +1

(γ+2)(γ−2)

),

C ′u be a system-level constant shown in (A.35), Rmin and Rmax be as shown in (A.36) and (A.37) in the

Page 54: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 42

proof of Theorem 6, which are in closed forms if γ is a rational number3. Then we have the following

theorem:

Theorem 6. Given xB , a sufficient condition for P oout(xB) < P c

out(xB) is

K1 , −µV′max + µπR2C ′

ue−ν − πR2T ′ρ

T ′ρ+ 1+Rmin > 0, (4.38)

and a sufficient condition for P oout(xB) > P c

out(xB) is

K2 , −µπR2C ′ue

λ + µV′mine

−ν−λ +πR2T ′ρ

T ′ρ+ 1−Rmax > 0. (4.39)

See Appendix A.4 for the proof.

Through Theorem 6, the closed-form expressions can be used to compare the outage probabilities

between open access and closed access without the computational complexity introduced by numeric

integrations in (4.34) and (4.37).

Similar to the discussion in Section 4.2.4, let ρ∗∗ denote the threshold value of ρ such that P oout(xB) =

P cout(xB). At the femtocell level, given that a femtocell BS is located at xB (the relative coordinate

w.r.t. the nearest macrocell), its local femtocell UEs experience less outage iff ρ < ρ∗∗. Thus, ρ∗∗ is

referred to as the maximum power enhancement tolerated by the femtocell.

Instead of deriving ρ∗∗ through (4.34) and (4.37), which introduces high computational complexity

due to multiple levels of integration, we can find the lower bound ρ∗∗min and upper bound ρ∗∗max of ρ∗∗

through Theorem 6. Accordingly, ρ∗∗min is the value satisfying K1 = 0 and ρ∗∗max is the value satisfying

K2 = 0. Thus, ρ∗∗min and ρ∗∗max can be found by a numerical search approach w.r.t. the closed-form

expressions.

4.4 Numerical Study

We present simulation and numerical studies on the outage performance in the two-tier network with

femtocells. First, we study the performance of open access and closed access under different user densities,

femtocell densities, and SIR thresholds. Second, we present the numerical results of ρ∗ and ρ∗∗. Unless

otherwise stated, Rc = 500 m, R = 50 m, γ = 3; and fast fading is Rayleigh with unit mean. Each

simulation data point is averaged over 50000 trials.

First, we study the performance under different µ, λ, and T . The network parameters are as follows:

ν(x) = 80 units/km2/sub-band if |x| < R, and ν(x) = 0 otherwise; P = −60 dBm, and Q = P ′ = −54

dBm (ρ = 6 dB). Figs. 4.2 and 4.3 show the uplink outage probabilities of macrocell and femtocell

UEs under different λ; Figs. 4.4 and 4.5 show the same under different µ; and Figs. 4.6 and 4.7 show

the same under different T . The analytical results are derived from the exact expressions in Sections

4.2.1, 4.2.2, 4.3.1, and 4.3.2, without applying any bounds. The error bars show the 95% confidence

intervals for simulation results. For easier inspection, in Figs. 4.2-4.7, the plot points are slightly shifted

horizontally to avoid overlapping error bars. The figures illustrate the accuracy of our analytical results.

In addition, the figures show that the macrocell UE density strongly influences the outage probability

of both macrocell and femtocell UEs, while the femtocell density only has a slight influence. At the

3It is acceptable to assume γ as a rational number in reality, because each real number can be approximated by arational number with arbitrary precision.

Page 55: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 43

3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 8

0.3

0.35

0.4

0.45

0.5

0.55

0.6

λ [units/km2/sub-band]

Ou

tag

e p

rob

abil

ity

Open access, simulation

Open access, analytical

Closed access, simulation

Closed access, analytical

Figure 4.2: Macrocell outage probability under different λ, with µ = 4 units/km2/sub-band and T = 0.1.

3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 80.2

0.25

0.3

0.35

0.4

0.45

λ [units/km2/sub-band]

Ou

tag

e p

rob

abil

ity

Open access, simulation

Open access, analytical

Closed access, simulation

Closed access, analytical

Figure 4.3: Femtocell outage probability under different λ, with µ = 4 units/km2/sub-band and T = 0.1.

3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 80.35

0.355

0.36

0.365

0.37

0.375

0.38

0.385

0.39

µ [units/km2/sub-band]

Outa

ge

pro

bab

ilit

y

Open access, simulation

Open access, analytical

Closed access, simulation

Closed access, analytical

Figure 4.4: Macrocell outage probability under different µ, with λ = 4 units/km2/sub-band and T = 0.1.

3 3.5 4 4.5 5 5.5 6 6.5 7 7.5 80.245

0.25

0.255

0.26

0.265

0.27

0.275

0.28

0.285

0.29

µ [units/km2/sub-band]

Ou

tag

e p

robab

ilit

y Open access, simulation

Open access, analytical

Closed access, simulation

Closed access, analytical

Figure 4.5: Femtocell outage probability under different µ, with λ = 4 units/km2/sub-band and T = 0.1.

Page 56: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 44

−2 −1.5 −1 −0.5 0 0.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

log10

(T )

Ou

tag

e p

rob

abil

ity

Open access, simulation

Open access, analytical

Closed access, simulation

Closed access, analytical

Figure 4.6: Macrocell outage probability under different T , with λ = 8 units/km2/sub-band and µ = 8units/km2/sub-band.

−2 −1.5 −1 −0.5 0 0.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

log10

(T )

Ou

tag

e p

rob

abil

ity

Open access, simulation

Open access, analytical

Closed access, simulation

Closed access, analytical

Figure 4.7: Femtocell outage probability under different T , with λ = 8 units/km2/sub-band and µ = 8units/km2/sub-band.

macrocell level, increasing the density of femtocell leads to more proportion of macrocell UEs becoming

open access UEs, which gives higher performance gap between open access and closed access. At the

femtocell level, the interference is observed at femtocell BSs, and the average number of macrocell UEs

in a femtocell becomes a more important factor influencing the performance gap.

Next, we present the numerical results of ρ∗ and ρ∗∗. The network parameters are as follows: λ = 4

units/km2/sub-band; µ = 4 units/km2/sub-band; ν(x) = 20 units/km2/sub-band if |x| < R, and

ν(x) = 0 otherwise; P = −60 dBm, and Q = −54 dBm.

Fig. 4.8 presents the value of ρ∗ at the macrocell level. We compute the actual value of ρ∗ by numer-

ically searching for the value such that (4.11) is equal to (4.14). Through the closed-form expressions

in Theorem 4, we are able to derive the upper and lower bounds of ρ∗. Through simulation, we can

also search for the value of ρ∗ such that the simulated outage probability of open access is equal to that

of closed access. Furthermore, we also simulate a more general scenario, where the received power is

randomly distributed, rather than perfectly fixed to a single level. We study the scenario where the

received power level of macrocell UEs is randomly distributed among 0.5P , P , 1.5P , and 2P with equal

probability. If a macrocell UE is handed off to a femtocell, then its targeted received power is multiplied

by ρ. The figure shows that ρ∗ is indeed within the upper bound and the lower bound, and the simulated

ρ∗ agrees with the analytical ρ∗, validating the correctness of our analysis. Furthermore, this remains

the case when the targeted received power is random, indicating the usefulness of our analysis in more

practical scenarios.

Figs. 4.9, 4.10, and 4.11 present the value of ρ∗∗ at the femtocell level. Fig. 4.9 shows ρ∗∗ under

different R as we fixed xB = (0, 100m); Figs. 4.10 and 4.11 show ρ∗∗ under different xB as we fixed

Page 57: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 45

5 10 15 20 25 30 35 40 45 5020

25

30

35

40

45

50

55

60

R [m]

ρ∗

(dB

)

Lower bound

Upper bound

Analytical result

Simulation, with fixed received power

Simulation, with random received power

Figure 4.8: ρ∗ under different R at the macrocell level.

5 10 15 20 25 30 35 40 45 5010

15

20

25

30

35

40

45

50

55

60

R [m]

ρ∗∗

(dB

)

Lower bound

Upper bound

Analytical result

Simulation, with fixed received power

Simulation, with random received power

Figure 4.9: ρ∗∗ under different R at the femtocell level.

0 50 100 150 200 250 300 350 400 450 5005

10

15

20

25

30

35

xB [m]

ρ∗∗

(dB

)

Lower bound

Upper bound

Analytical result

Simulation, with fixed received power

Simulation, with random received power

Figure 4.10: ρ∗∗ under different xB , xB = (xB , 0), at the femtocell level.

0 50 100 150 200 250 300 350 400 4505

10

15

20

25

30

35

yB [m]

ρ∗∗

(dB

)

Lower bound

Upper bound

Analytical result

Simulation, with fixed received power

Simulation, with random received power

Figure 4.11: ρ∗∗ under different xB , xB = (0, yB), at the femtocell level.

Page 58: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 4. Uplink Interference Analysis: Open Access versus Closed Access 46

R = 50 m. The y-coordinates of xB , yB , are fixed to 0 in Fig. 4.10, and the x-coordinates of xB , xB,

are fixed to 0 in Fig. 4.11. The results show that ρ∗∗ is indeed within the upper and lower bounds, and

the simulated values of ρ∗∗ agree with their analytical values, validating the correctness of our analysis.

Furthermore, ρ∗∗ decreases in R at a rate slightly faster than that of ρ∗, while it increases in xB and

yB , until saturating when the femtocell BS is near the macrocell edge. This quantifies when femtocells

are more beneficial as they decrease in size and increase in distance away from the macrocell BS.

4.5 Summary

We have presented a theoretical framework to analyze the performance difference between open access

and closed access in a two-tier femtocell network. Through establishing a stochastic geometric mod-

el, we capture the spatial patterns of different network components. We derive the numerical outage

probabilities of open access and closed access at the macrocell and femtocell levels. As in most uplink in-

terference analysis, the outage probability expressions are in non-closed forms. Hence, we further derive

closed-form bounds for the maximum tolerated received power enhancement, to compare the two access

modes. Simulations and numerical studies are conducted, validating the correctness of the analytical

model as well as the usefulness of the bounds even when the received power is random.

Page 59: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5

Rate Maximization through

Spectrum Allocation and User

Association

In this chapter, we study spectrum allocation and user association in HWNs with multiple tiers of

BSs. A stochastic geometric approach is applied as the basis to derive the average downlink user

data rate in a closed-form expression. Then, the expression is employed as the objective function in

optimizing spectrum allocation and user association, which is of non-convex programming in nature.

A computationally efficient Structured Spectrum Allocation and User Association (SSAUA) approach

is proposed, solving the problem optimally and asymptotically optimally in two regions divided by

a parameter specific threshold. A Surcharge Pricing Scheme (SPS) is also presented, such that the

designed association bias values can be achieved in Nash equilibrium. Simulations and numerical studies

are conducted to validate the accuracy and efficiency of the proposed SSAUA approach and SPS.

5.1 System Model

5.1.1 Multi-tier Wireless Network

We consider an HWN with randomly spatially distributed K ≥ 2 tiers of BSs. As in conventional

stochastic geometric modeling of multi-tier HWNs [12,13,35,73,74], each tier of BSs independently form

a homogeneous Poisson point process (PPP) in two-dimensional Euclidean space R2. Let Φk denote

the PPP corresponding to tier-k BSs, with intensity λk. Without loss of generality, we assume that

λ1 < λ2 . . . < λK . (If λi = λj , i = j in reality, we may approximate by setting λj = λi + ξ, where ξ is

arbitrarily close to 0.) UEs are also modeled as a homogeneous PPP Ψ with intensity µ, independent of

all BSs. We assume each BS is connected to the core network by separate high-capacity wired or wireless

links that have no influence on our performance analysis. In addition, because we focus on downlink

analysis, we assume that the downlink and uplink of the system are operated in different spectra, so

that uplink interference and capacity have no influence on downlink analysis.

47

Page 60: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 48

5.1.2 Power and Path Loss Model

We define the tiers of BSs by their transmission power. Let Pk be the transmission power of tier-k

BSs, which is a given parameter. Let x and y denote some two-dimensional coordinates throughout

this chapter. If Pt(x), Pt(x) ∈ P1, P2, . . . , PK, is the transmission power from a BS at x and Pr(y)

is the received power at y, we have Pr(y) =Pt(x)hx,y

|x−y|γ , where |x − y|γ is the propagation loss function,

γ > 2 is the path loss exponent, and hx,y is the fast fading term. We assume that γ is constant for

all tiers. Corresponding to common Rayleigh fading with power normalization, hx,y is independently

exponentially distributed with unit mean. Let h(·) be the probability density function of hx,y.

5.1.3 Spectrum Allocation

In order to avoid cross-tier interference, different tiers of BSs are allocated separated spectrum. Note

that such separated spectrum allocation approach is also advocated in practical systems (e.g., Section 5.1

of [105]). Assume the total spectrum bandwidth isW . We allocate ηkW to each tier-k BS, where ηk is the

spectrum allocation factor and∑K

k=1 ηk = 1. Let η = (η1, η2, . . . , ηK). Note that BSs in the same tier are

operated on the same spectrum. We additionally consider the possible constraints ηmin,k ≤ ηk ≤ ηmax,k,

for k = 1, 2, . . . ,K. Clearly, we have∑K

k=1 ηmin,k ≤ 1 ≤∑K

k=1 ηmax,k. Furthermore, we assume that

0 < ηmin,1 ≤ ηmin,2 . . . ≤ ηmin,K and 0 < ηmax,1 ≤ ηmax,2 . . . ≤ ηmax,K , i.e., the network operator is likely

(but not necessarily) to allocate more spectrum to a tier with higher BS density.

Given a specific tier-k BS, it is common to assume that all its associated UEs are equally allocated

spectrum [12, 36, 74]. Hence, the per-UE assigned spectrum bandwidth is βk = ηkW/Nk, where Nk is a

random variable denoting the number of UEs associated with the BS.

5.1.4 Coverage Probability and UE Data Rate

Following conventional stochastic geometric modeling [12, 36, 74], in Sections 5.2 and 5.3, we assume

that UEs employ a single modulations coding scheme (MCS). In this case, let T denote the minimum

required Signal-to-Interference Ratio (SIR) of UEs. The coverage probability of a UE is defined as the

probability that its SIR is no lower than T [37]. Initially, we assume that if a UE experiences coverage

probability P′ and is allocated spectrum bandwidth β′, its data rate is β′ log(1 + T ) if the SIR is no

lower than T , and its data rate is 0 if the SIR is lower than T (i.e., outage occurs). Thus, the overall

data rate of the UE is β′ log(1+T )P′. In Section 5.5, we present the extension of our model considering

multiple MCSs, where N different threshold values T1, . . . , TN are accommodated.

Note that log is in base 2 throughout this chapter. Also, we have assumed the system is interference

limited [13,36,74–76], such that noise is negligible.

5.1.5 Flexible User Association

Given that a UE is located at y, it associates itself with the BS that provides the maximum biased

received power [12, 13,74] as follows:

BS(y) = arg maxx∈Φk,∀k

BkPk|x− y|−γ , (5.1)

Page 61: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 49

where BS(y) denotes the location of the BS associated with the UE, and Pk|x−y|−γ is the received power

from a tier-k BS located at x, and Bk is the association bias, indicating the connecting preference of a UE

toward tier-k BSs. In this case, the resultant cell splitting forms a generalized Dirichlet tessellation, or

weighted Poisson Voronoi [106], shown in Fig. 1.2(b). Note that for B1, B2, . . . , BK , their effects remain

the same if we multiply all of them by the same positive constant. Thus, without loss of generality, in

this chapter, we normalize them such that∑K

k=1 Bk = 1. Let B = (B1, B2, . . . , BK).

Let Ak denote the probability that a UE associates itself with a tier-k BS, and A = (A1, A2, . . . , AK).

As derived in [12], we have

Ak =λk(PkBk)

2γ∑K

j=1 λj(PjBj)2γ

, (5.2)

and thus

Bk =P−1k (Ak/λk)

γ2∑K

j=1 P−1j (Aj/λj)

γ2

. (5.3)

Hence, there is a one-to-one mapping between A and B, so we can view them interchangeably.

5.1.6 Problem Statement

We first aim to derive a closed-form expression for the average UE data rate. Then, our objective is

to maximize the average UE data rate by optimizing the spectrum allocation factors η and the user

association bias values B (or equivalently A). Finally, we give a pricing scheme to incentivize each UE

to adopt the designed B.

5.2 Closed-form Average UE Data Rate

In this section, we derive the average UE data rate via stochastic geometric analysis. Consider a reference

UE, termed the typical UE, communicating with its BS, termed the typical BS. Due to the stationarity of

UEs and BSs, throughout this section we will re-define the coordinates so that the typical UE is located

at 0. We are interested in the typical UE since the average UE performance in the system is the same

as the performance of the typical UE [37].

First, we study the coverage probability given that the typical UE is associating with a tier-k BS

and their distance is d. In this case, the overall interference to the typical UE is the sum interference

from all tier-k BSs other than the typical BS. Let Ik(d) denote such interference. Then

Ik(d) =∑x∈Φ′

k

Pkhx,0

|x|γ. (5.4)

where Φ′k is the reduced Palm point process corresponding to all tier-k BSs other than the typical BS,

given that the typical BS is located at a distance of d from the typical UE. It can be shown that Φ′k is

a PPP with intensity 0 in B(0, d) and intensity λk in R2\B(0, d), where B(0, d) denotes the disk region

centered at 0 with radius d [37].

Page 62: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 50

The distribution of Ik(d) is derived through its Laplace transform as follows:

LIk(d, s) = E

exp−

∑x∈Φ′

k

sPkhx,0

|x|γ

=exp

(−λk

∫R2\B(0,d)

(1−

∫R+

e−sPkh

|x|γ h(h)dh

)dx

)(5.5)

= exp

(−λk

∫R2\B(0,d)

sPk

|x|γsPk

|x|γ + 1dx

)(5.6)

= exp

(−2πλk

∫ ∞

d

sPkr

sPk + rγdr

), (5.7)

where (5.5) is obtained from the Laplace functional of PPP Φ′k [37], (5.6) is because the fading term is

exponentially distributed with unit mean, and (5.7) is through a transformation to polar coordinates.

Let Pcover,k(d) denote the conditional coverage probability of the typical UE (given k and d). Then

Pcover,k(d) =P(PkhxB ,0

dγ≥ TIk(d)

)=LIk(d, s)|s=Tdγ

Pk

, (5.8)

where xB is the coordinate of the typical BS, and |xB| = d. Substituting (5.7) into (5.8), we have

Pcover,k(d) = exp

(−2πλk

∫ ∞

d

Tdγr

Tdγ + rγdr

)t= r2

T2/γd2= exp

(−πλkT

2γ d2

∫ ∞

( 1T )

1

1 + tγ2

dt

). (5.9)

Furthermore, the probability density function of the distance between the typical UE and its associ-

ated tier-k BS is

fk(d) =2πλk

Akd exp

−πd2K∑j=1

λj

(PjBj

PkBk

) 2γ

(5.10)

=2πλk

Akd exp

(−πd2

λk

Ak

), (5.11)

where (5.10) is derived in [12], and (5.11) is by substituting (5.2) into (5.10).

Hence, the coverage probability Pcover,k of the typical UE associated with a tier-k BS can be computed

as

Pcover,k =

∫ ∞

0

fk(d)Pcover,k(d)dd

=

∫ ∞

0

2πλk

Akd exp

(−πd2

λk

Ak

)exp

(−πλk (T )

2γ d2

∫ ∞

( 1T )

1

1 + tγ/2dt

)dd

=πλk

Ak

1

π λk

Ak+ πλk (T )

2γ∫∞( 1

T )2γ

11+tγ/2 dt

Page 63: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 51

=1

1 +AkC, (5.12)

where C , (T )2γ∫∞( 1

T )2γ

11+tγ/2 dt is a system-level constant only related to γ and T . Note that the

coverage probability is given in non-closed form in [12] for a system where the spectrum is shared by

all tiers. Here we are able to obtain a closed-form expression, mainly as a consequence of different tiers

using separate spectrum.

Let E0(βk) denote the expected spectrum bandwidth allocated to the typical UE (connecting to a

tier-k BS). Following the model in Section 5.1.3, E0(βk) equals the spectrum bandwidth allocated to the

typical tier-k BS divided by the average number of UEs associated with it conditioned on the typical

UE, which is Akµ/λk + 1. Hence,

E0(βk) =ηkW

Akµ/λk + 1. (5.13)

Then, by Section 5.1.4, the conditional expected data rate of the typical UE, given it is associated with

a tier-k BS, can be computed as [12,74]

Rk = E0(βk) log(1 + T )Pcover,k. (5.14)

Note that by doing so, we slightly underestimate the average data rate because the coverage event

and βk are not completely independent. Although some efforts have been made to approximate their

correlation [13, 107], all of them are inexact but result in tremendous mathematical complexity. In

Section 5.6, we show that the resultant analysis is close to actual performance via simulation.

Finally, the average data rate of the typical UE, and hence the average data rate per UE in the

system, is

F =K∑

k=1

AkRk =K∑

k=1

AkE0(βk) log(1 + T )Pcover,k

=K∑

k=1

ηkW log(1 + T )

(Akµ/λk + 1)( 1Ak

+ C). (5.15)

Note that stochastic geometric analysis often leads to non-closed forms requiring numerical integra-

tions (e.g., [12, 13, 34, 35]), due to the integral form of the Laplace functional or generating functional

of PPPs applied in analysis [37,39]. Fortunately, our derived closed-form expression for the average UE

data rate facilitates the tractability of the resultant optimization problem.

5.3 Optimization Problem and SSAUA

We aim to maximize the average UE data rate F with respect to η and B. As there is a one-to-

one mapping between A and B, we study the optimization problem over (η,A) instead for analytical

convenience. This is formally stated as optimization problem P as follows:

maximizeη,A

F(η,A) =K∑

k=1

ηkMk(Ak)

Page 64: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 52

subject to

K∑k=1

ηk = 1, ηmin,k ≤ ηk ≤ ηmax,k,∀k,

K∑k=1

Ak = 1, Ak ≥ 0, ∀k, (5.16)

where Mk(Ak) is defined as

Mk(Ak) =1

(Akµ/λk + 1)(

1Ak

+ C) . (5.17)

Problem P is non-convex and cannot be solved through standard methods. Instead, we investigate

into two important structures of the optimal solution, termed density thresholding and priority order-

ing, based on which we propose a computationally efficient Structured Spectrum Allocation and User

Association (SSAUA) approach to solve the problem.

5.3.1 Density Thresholding Structure

First, we define an important parameter

ak ,√λk/(µC). (5.18)

Note that Mk(Ak) is increasing on [0, ak] and decreasing on [ak,∞). We further observe several useful

properties of Mk(Ak), which are presented in Appendix B.1. Based on these properties, we obtain the

following lemma, whose proof is given in Appendix B.2.

Lemma 2. Consider a potential solution (η∗∗,A∗∗) to Problem P. If ∃i = j, such that A∗∗i < ai and

A∗∗j > aj , then (η∗∗,A∗∗) is not an optimal solution.

Lemma 2 suggests that, in an optimal solution, every Ak must be on the same side of ak. This

directly leads to the following theorem, which is fundamental to our optimization solution.

Theorem 7. (Density Thresholding) Let (η∗,A∗) be an optimal solution to ProblemP. If∑K

k=1 ak >

1, then ∀k,A∗k ≤ ak; if

∑Kk=1 ak < 1, then ∀k,A∗

k ≥ ak; if∑K

k=1 ak = 1, then ∀k,A∗k = ak.

Proof. If∑K

k=1 ak > 1, because∑K

k=1 A∗k = 1, ∃l such that A∗

l < al. This leads to A∗k ≤ ak, ∀k,

according to Lemma 2. The cases where∑K

k=1 ak < 1 and∑K

k=1 ak = 1 are similar.

Note that, the condition∑K

i=1 ai > 1 (i.e.,√

1C

(∑Ki=1

√λi

)>

õ) is referred to as the optimality

region throughout this chapter, since the optimization problem P can be solved optimally in this case,

as shown later in Section 5.3.2. The condition∑K

i=1 ai < 1 (i.e.,√

1C

(∑Ki=1

√λi

)<

õ) is referred to

as the asymptotic-optimality region throughout the chapter, since the optimization problem P can be

solved asymptotically optimally in this case, as shown later in Section 5.3.3. If∑K

i=1 ai = 1, Problem P

can be trivially solved and is ignored in the rest of our discussion. Note that because ak can be computed

directly from the given parameters, one can judge in which region Problem P falls before solving the

problem. Next, the solution to P will be investigated separately under∑K

i=1 ai > 1 and∑K

i=1 ai < 1.

Page 65: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 53

5.3.2 SSAUA under∑K

i=1 ai > 1

In this case, the original Problem P becomes Problem P1 as follows:

maximizeη,A

F(η,A) =

K∑k=1

ηkMk(Ak)

subject to

K∑k=1

ηk = 1, ηmin,k ≤ ηk ≤ ηmax,k,∀k,

K∑k=1

Ak = 1, 0 ≤ Ak ≤ ak, ∀k. (5.19)

We first observe an important ordering property of the optimal solution to P1, as shown in the

following lemma, whose proof is given in Appendix B.3.

Lemma 3. (Ordering Property) If A∗ is optimal for Problem P1, then M1(A∗1) ≤ M2(A

∗2) ≤ . . . ≤

MK(A∗K).

Next, by sequentially computing η∗ as follows:

η∗K = min(1−∑K−1

k=1 ηmin,k, ηmax,K),

η∗K−1 = min(1− η∗K −∑K−2

k=1 ηmin,k, ηmax,K−1),

. . . ,

η∗l = min(1−∑K

k=l+1 η∗k −

∑l−1k=1 ηmin,k, ηmax,l),

. . . ,

η∗1 = min(1−∑K

k=2 η∗k, ηmax,1),

(5.20)

we have the following theorem:

Theorem 8. (Priority Ordering) If A∗ is optimal for Problem P1, then (η∗,A∗), where η∗ is

computed in (5.20), is an optimal solution to P1.

Proof. Consider Problem P1A as follows:

maximizeη

K∑k=1

ηkMk(A∗k)

subject to

K∑k=1

ηk = 1, ηmin,k ≤ ηk ≤ ηmax,k,∀k. (5.21)

It is a simple linear programming problem with ordered linear coefficients in the objective, since

M1(A∗1) ≤ M2(A

∗2) ≤ . . . ≤ MK(A∗

K) due to Lemma 3. Note that η∗ does not depend on the exact

values of A∗; it only requires the ordering property as shown in Lemma 3. Also, η∗ is in the feasible

region due to∑K

k=1 ηmin,k ≤ 1 ≤∑K

k=1 ηmax,k. It is easy to verify that (η∗,A∗) is an optimal solution

to P1.

In Theorem 8, we note that (5.20) indicates a priority ordering structure in spectrum allocation. Tier-

K has the highest priority in spectrum allocation, followed by tier-(K − 1), and so forth. Furthermore,

Page 66: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 54

Theorem 8 provides a means to derive an optimal η∗ regardless of the A∗ values. We need one further

step to derive the corresponding optimal A∗ by solving the following Problem P1B:

maximizeA

K∑k=1

η∗kMk(Ak)

subject to

K∑k=1

Ak = 1, 0 ≤ Ak ≤ ak, ∀k. (5.22)

Note that P1B is a convex programming problem, since Mk(Ak) is concave on [0, ak]. Thus, A∗ can

be computed by a computationally efficient algorithm, such as the interior-point method. Hence both

steps to compute the optimal solution (η∗,A∗) have low computational complexity.

In summary, under∑K

i=1 ai > 1, the original optimization problem can be solved optimally, and thus∑Ki=1 ai > 1 is referred to as the optimality region.

5.3.3 SSAUA under∑K

i=1 ai < 1

In this case, the original Problem P becomes Problem P2 as follows:

maximizeη,A

F(η,A) =K∑

k=1

ηkMk(Ak)

subject to

K∑k=1

ηk = 1, ηmin,k ≤ ηk ≤ ηmax,k,∀k,

K∑k=1

Ak = 1, Ak ≥ ak, ∀k. (5.23)

Problem P2 is more complicated than Problem P1, as Mk(Ak) is not concave, but an S-shaped function,

in the feasible region. Hence, P2 generally incurs high computational complexity even if an optimal η∗

is given [108,109].

Therefore, instead of directly solving P2, we first approximate Mk(Ak) by Mk(Ak) defined as follows:

Mk(Ak) =1

(Akµ/λk)(

1Ak

+ C) . (5.24)

Note that this approximation is reasonable when Akµ/λk is much larger than 1, e.g., when µ is large.

This observation is also supported by the performance gap as derived in Section 5.3.3.2. Some useful

properties of Mk(Ak) are shown in Appendix B.4.

The approximated problem is referred to as Problem P2A, where we simply replace the objective

function of P2 by the following:

F′(η,A) =K∑

k=1

ηkMk(Ak). (5.25)

Page 67: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 55

5.3.3.1 Solution to P2A

The important ordering property still holds for Problem P2A, as formalized in the following lemma,

whose proof is given in Appendix B.5.

Lemma 4. (Ordering Property) If A∗ is optimal for Problem P2A, then M1(A∗1) ≤ M2(A

∗2) ≤ . . . ≤

MK(A∗K).

We observe that with the same ordering property, (5.20) can again be adopted as an optimal solution

to P2A, leading to the following theorem:

Theorem 9. (Priority Ordering) If A∗ is optimal for Problem P2A, then (η∗, A∗), where η∗ is

computed the same way as η∗ in (5.20), is an optimal solution to Problem P2A.

Proof. The proof is similar to that of Theorem 8.

Given an optimal η∗ for P2A, we find the corresponding optimal A∗ for P2A by solving the following

Problem P2B:

maximizeA

K∑k=1

η∗kMk(Ak)

subject toK∑

k=1

Ak = 1, Ak ≥ ak,∀k. (5.26)

Unlike in the optimality region, here we have an explicit solution, as stated in the following theorem:

Theorem 10. Given an optimal η∗ for P2A (computed the same way as η∗ in (5.20)), the corresponding

optimal A∗ can be expressed as follows:A∗

k = ak, k ≥ 2

A∗1 = 1−

∑Kl=2 A

∗l .

(5.27)

See Appendix B.6 for the proof.

Note that both (5.20) and (5.27) can be computed with low computational complexity.

5.3.3.2 Bounding the Performance Gap

Since (η∗, A∗) is optimal for P2A rather than P2, we next quantify the performance gap between

(η∗, A∗) and an optimal solution (η∗,A∗) to P2.

The performance gap is defined as

E = F(η∗,A∗)− F(η∗, A∗). (5.28)

Because F(η∗, A∗) ≤ F(η∗,A∗) ≤ F′(η∗,A∗) ≤ F′(η∗, A∗), we have

E ≤ F′(η∗, A∗)− F(η∗, A∗) , E′. (5.29)

Page 68: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 56

Substituting η∗ and A∗ into E′, we have

E′ =K∑

k=1

η∗kA∗

λk

(A∗

λk+ 1)(

1

A∗k

+ C) . (5.30)

Therefore, the relative performance gap is bounded:

ϵ , E

F(η∗,A∗)≤ E′

F(η∗, A∗)

=

∑Kk=1

η∗k

A∗kµ

λk

(A∗

λk+1

)(1

A∗k

+C

)∑K

k=1η∗k(

A∗kµ

λk+1

)(1

A∗k

+C

) (5.31)

(a)

≤ maxk

λk

A∗kµ

≤ maxk

λk

akµ

=√λKC/µ, (5.32)

where inequality (a) is obtained by observing the common factor in the summations in the numerator

and denominator of (5.31). This result implies that ϵ scales as O(√

λK/µ). Note that when µ ≫ λK ,

we have ϵ ≃ 0 and the performance of SSAUA is asymptotically optimal. Thus∑K

i=1 ai < 1 is referred

to as the asymptotic-optimality region.

5.3.4 Computational Complexity Comparison

In this subsection, we discuss the computational complexity of SSAUA and that of an exhaustive search

approach to solve the original optimization problem.

5.3.4.1 Computational Complexity of SSAUA

In the optimality region, the optimal η∗ can be derived with computational complexity O(K) through

(5.20). Given the optimal η∗, the remaining problem (5.22) is a convex optimization problem, which

can be solved using the interior-point method. Let ε denote the error bound between the output and

the optimal solution. According to Section 11.5 of [110], the interior-point method involves O(log(Kε )K)

Newton iterations; each Newton iteration involves a matrix inversion operation, which has computational

complexity O(K3). Therefore, the overall computational complexity is O(log(Kε )K4). In the asymptotic-

optimality region, the asymptomatically optimal η∗ and A∗ can be derived through (5.20) and (5.27),

respectively, with an overall computational complexity O(K).

5.3.4.2 Computational Complexity of Exhaustive Search

As explained in detail in Appendix B.7, we observe that at least one of the optimal solutions to P,

(η∗,A∗), has the following property: there is at most one k ∈ 1, 2, . . .K such that ηmin,k < η∗k < ηmax,k;

∀j = k, either η∗j = ηmin,j or η∗j = ηmax,j (i.e., at the boundary). Thus, the search for η∗ needs to be

performed at these boundary cases only, leading to a complexity of O(2K).

In the optimality region, if η is fixed, the remaining problem is a convex optimization problem. The

interior-point method takes another fold of computational complexity of O(log(Kε )K4). Consequently,

Page 69: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 57

the overall computational complexity is O(2K log(Kε )K4). In the asymptomatic-optimality region, if η

is fixed, the remaining problem is still a non-convex optimization problem. A numerical search over

all solutions to the KKT condition is required, leading to another fold of computational complexity of

O( 2K

ε ). Consequently, the overall computational complexity is O( 4K

ε ).

5.4 Nash Equilibrium for SSAUA

Individual UEs may behave selfishly to derive unfair advantage despite our design of B∗ (or equivalently

A∗). Thus, in this section, we propose a Surcharge Pricing Scheme (SPS), such that the designed B∗ is

the natural outcome of a Nash equilibrium. We assume that the designed spectrum allocation factors

η∗ are centrally maintained by the network operator.

We consider a reference individual UE, whose association bias values are B′ = (B′1, B

′2, . . . , B

′K). Let

A′ = (A′1, A

′2, . . . , A

′K) be its corresponding association probabilities. For the other UEs, suppose they

all obey the association bias values B∗ assigned by the network operator. Similar to the discussions in

Sections 5.1 and 5.2, the average data rate of the reference UE is

F =K∑

k=1

η∗kW log(1 + T )

(A∗kµ/λk + 1)( 1

A′k+ C)

. (5.33)

If the reference UE performs an optimization on F with respect to A′, the resultant optimal A′∗ =

(A′∗1 , A

′∗2 , . . . , A

′∗K) is unlikely to be the same as A∗. Therefore, we add the following Surcharge Pricing

Scheme: the network operator applies a surcharge ck to each UE associated with a tier-k BS. Let

c = (c1, c2, . . . , cK). In this case, the average surcharge for the reference UE is∑K

k=1 ckA′k. Accordingly,

the reference UE will perform the following optimization Problem P3:

maximizeA′

F′ =

K∑k=1

η∗kW log(1 + T )

(A∗kµ/λk + 1)

(1A′

k+ C

) − ckA′k

subject to

K∑k=1

A′k = 1, A′

k ≥ 0. (5.34)

Different from P, it can be shown that P3 is a standard convex optimization problem. By the KKT

conditions, its optimal solution A′∗ satisfies

Hk

(1 + CA′∗k )

2− ck − ν + θk = 0, (5.35)

θkA′∗k = 0, θk ≥ 0, (5.36)

where Hk =η∗kW log(1+T )A∗

kµ/λk+1 , θk is a Lagrange multiplier corresponding to the inequality constraint A′k ≥ 0,

and ν is a Lagrange multiplier corresponding to the equality constraint∑K

k=1 A′k = 1.

Setting A′∗k = A∗

k, we have

ck =

∞, if A∗k = 0,

Hk

(1+CA∗k)

2 − ν, otherwise.(5.37)

Page 70: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 58

Note that ν could be set arbitrarily due to the equality constraint. Without loss of generality, we

set ν = minkHk

(1+CA∗k)

2 so that the minimum surcharge among tiers is 0. As a consequence, a Nash

Equilibrium is achieved where every UE adopts the assigned B∗.

5.5 The Multiple-MCS Case

In this section, we discuss the usefulness of our proposed SSAUA in systems with multiple modulation

and coding schemes (i.e., the multiple-MCS case). Instead of considering only one SIR threshold T

(see Section 5.1.4), N SIR threshold values, T1, T2, . . . , TN , where T1 < T2 < . . . < TN , corresponding

to N MCSs, are accommodated. In this case, if a UE is allocated spectrum bandwidth β′, its data

rate is β′ log(1 + TN ), β′ log(1 + TN−1), . . ., β′ log(1 + T1), and 0, respectively, if its SIR is in [TN ,∞),

[TN−1, TN ), . . ., [T1, T2), and [0, T1).

5.5.1 Average UE Data Rate

First, similar to the derivations of (5.4)-(5.12), given that the typical UE is associated with a tier-k BS,

we can find its coverage probabilities under T1, T2, . . . , TN to be

P(SIRk ≥ Tn) =Pcover,k,n =1

1 +AkCn, n = 1, 2, . . . , N, (5.38)

where Cn , (Tn)2γ∫∞( 1

Tn)

11+tγ/2 dt. Note that because T1 < T2 < . . . < TN , we have C1 < C2 < . . . <

CN and Pcover,k,1 > Pcover,k,2 > . . . > Pcover,k,N .

Then, the conditional expected data rate of the typical UE, given it is associated with a tier-k BS,

is recomputed as

Rk =E0(βk)

[log(1 + TN )Pcover,k,N +

N−1∑n=1

log(1 + Tn)(Pcover,k,n − Pcover,k,n+1

)](5.39)

=E0(βk)

[log(1 + T1)Pcover,k,1 +

N∑n=2

(log(1 + Tn)− log(1 + Tn−1)

)Pcover,k,n

](5.40)

=ηkW

(Akµ/λk + 1)

[log(1 + T1)

1 +AkC1+

N∑n=2

log(1 + Tn)− log(1 + Tn−1)

1 +AkCn

](5.41)

=ηkW

(Akµ/λk + 1)

( N∑n=1

bn1 +AkCn

), (5.42)

where b1 , log(1 + T1), b2 , log(1 + T2)− log(1 + T1), . . . , bN , log(1 + TN )− log(1 + TN−1).

Similar to (5.15), the average data rate of the typical UE (unconditioned on k), and hence the average

data rate per UE in the system, is recomputed as

F =K∑

k=1

AkRk =K∑

k=1

ηkW

(Akµ/λk + 1)

( N∑n=1

bn1Ak

+ Cn

). (5.43)

Page 71: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 59

The optimization problem (5.16) is updated correspondingly, such that Mk(Ak) is redefined as

Mk(Ak) =1

(Akµ/λk + 1)

( N∑n=1

bn1Ak

+ Cn

). (5.44)

5.5.2 SSAUA in the Multiple-MCS Case

In this subsection, we discuss the usefulness of our proposed SSAUA in solving the modified optimization

problem considering multiple-MCS.

5.5.2.1 Density Thresholding

We redefine ak as the unique positive solution to M ′k(Ak) = 0. The existence and uniqueness of ak

is shown in Appendix B.8. Properties (M-1) to (M-4) presented in Appendix B.1 still hold with the

redefined Mk(Ak) and ak. The proofs of these properties are also shown in Appendix B.8.

As a result, Lemma 2 and Theorem 7 still hold in the multiple-MCS case. Note that different from the

single-MCS case (5.18), ak cannot be represented in an explicit expression. As shown in Appendix B.8,

ak is the unique solution to fk(A) = 0, where fk(A) =∑N

n=1bn(1−A2Cnµ/λk)

(ACn+1)2 is a decreasing function. A

simple binary search method can be applied to compute ak, which has low computational complexity.

5.5.2.2 Optimality Region

When∑K

i=1 ai > 1, since Properties (M-1) to (M-4) still hold, Lemma 3 and Theorem 8 still hold in

the multiple-MCS case. Then, the same method presented in Section 5.3.2 can be applied to solve the

optimization problem.

5.5.2.3 Asymptotic-optimality Region

When∑K

i=1 ai < 1, Mk(Ak) is approximated by Mk(Ak) redefined as follows:

Mk(Ak) =1

Akµ/λk

[N∑

n=1

bn1Ak

+ Cn

]. (5.45)

If Properties (M-1’)-(M-6’) presented in Appendix B.4 still hold for the above redefined Mk(Ak), then

Lemma 4, Theorem 9, and Theorem 10 still hold in the multiple-MCS case, and the same method

employed in Section 5.3.3 can be applied to solve the optimization problem.

It is straightforward to verify Properties (M-1’), (M-3’), and (M-4’). Property (M-6’) is implied by

(M-4’) and (M-5’). However, Properties (M-2’) and (M-5’) are difficult to verify analytically, as ak is no

longer expressed in closed form. Therefore, we conduct numerical validation to check Properties (M-2’)

and (M-5’) under a wide range of parameter settings.

We set T = 10−1, 10−0.9, . . . , 100.9, 101, U = 101, 101.1, . . . , 103, Γ = 3, 3.5, 4, 4.5, 5. It is shownthat Properties (M-2’) and (M-5’) are true under N = 2, 3, and 4; ∀T1, T2, . . . , TN ∈ T (T1 < T2 < . . . <

TN ); ∀µ/λi, µ/λj ∈ U (µ/λi > µ/λj); and ∀γ ∈ Γ. Therefore, at least for the wide range of parameter

settings that are tested, the proposed SSAUA is still useful in the asymptotic-optimality region. See

Appendix B.9 for visualized verification results.

Page 72: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 60

100 200 300 400 500 6000.4

0.6

0.8

1

1.2

1.4

1.6

1.8

2

µ (units/km2)

Dat

a R

ate

(Mb

ps)

Analytical (SSAUA)

Analytical (upper bound)

Analytical (exhaustive search)

Simulation (SSAUA)

Threshold value

optimalityregion

asymptotic−optimalityregion

Figure 5.1: Average UE data rate under different UE density µ.

100 150 200 250 300 350 400 450 500 550 600 6500.4

0.6

0.8

1

1.2

1.4

1.6

1.8

2

µ (units/km2)

Dat

aR

ate

(Mbps)

SSAUA (analytical)Scheme 1 (analytical)Scheme 2 (analytical)Scheme 3 (analytical)Scheme 4 (analytical)SSAUA (simulation)Scheme 1 (simulation)Scheme 2 (simulation)Scheme 3 (simulation)Scheme 4 (simulation)Threshold value

asymptotic−optimalityregion

optimalityregion

Figure 5.2: Comparison of different schemes under different UE density µ.

5.6 Numerical Study

In this section, we present numerical studies on the performance of SSAUA. Unless otherwise stated,

we label the SSAUA solution as (η∗, B∗) and (η∗, B∗) in the optimality and asymptotic-optimality

regions, respectively. Note that (η∗, B∗) is optimal in the optimality region. We use (η∗,B∗) to label an

optimal solution obtained from exhaustive search in the asymptotic-optimality region. In this section,

each simulation point is derived as follows: in each round of simulation, UEs and BSs are generated on

a 10 km × 10 km square, and the UEs in the central 5 km × 5 km square are sampled for performance

evaluation (in order to remove the edge effect). Each simulation data point is averaged over all sampled

UEs during 1000 rounds of simulations.

5.6.1 Average UE Data Rate under Different UE Densities

In this subsection, we study the average UE data rate of SSAUA under different values of UE density

µ, and compare it with four reference schemes. The network parameters are as follows: K = 3, λ1 = 1

units/km2, λ2 = 5 units/km2, λ3 = 10 units/km2, P1 = 56 dBm, P2 = 46 dBm, P3 = 36 dBm,

ηmin,1 = 0.2, ηmin,2 = 0.25, ηmin,3 = 0.3, ηmax,1 = 0.35, ηmax,2 = 0.4, ηmax,3 = 0.45, γ = 4, W = 200

MHz, and T = 0.2.

The performance of SSAUA is shown in Fig. 5.1. A vertical line indicates the threshold value of µ,

as given in Theorem 7, separating the optimality and asymptotic-optimality regions. For both regions,

we show results of the analytical and simulated performance of SSAUA. Since SSAUA is not optimal in

the asymptotic-optimality region, we also add two sets of results accordingly: the optimal performance

Page 73: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 61

3 3.5 4 4.5 50

0.5

1

1.5

2

2.5

3

γ

Data

Rate

(Mbps)

optimality region, µ = 100 units/km2

Anlytical(SSAUA)Simulation(SSAUA)

(a) Optimality region.

5 3 3.5 4 4.5 50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

γ

Data

Rate

(Mbps)

asymptotic-optimality region, µ = 500 units/km2

Anlytical(SSAUA)Analytical (upper bound)Analytical (exhaustive search)Simulation (SSAUA)

(b) Asymptotic-optimality re-gion.

Figure 5.3: Average UE data rate under different path loss exponent γ.

3 3.5 4 4.5 50

0.5

1

1.5

2

2.5

3

γ

Data

Rate

(Mbps)

optimality region, µ = 100 units/km2

SSAUAScheme 1Scheme 2Scheme 3Scheme 4

(a) Asymptotic-optimality re-gion.

5 3 3.5 4 4.5 50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

γ

Data

Rate

(Mbps)

asymptotic-optimality region, µ = 500 units/km2

SSAUAScheme 1Scheme 2Scheme 3Scheme 4

(b) Asymptotic-optimality re-gion.

Figure 5.4: Comparison of different schemes under different path loss exponent γ, analytical case.

F(η∗,B∗) through exhaustive search and its analytical upper bound F′(η∗, B∗). Fig. 5.1 illustrates that

the performance of SSAUA is very close to the optimal solution in the asymptotic-optimality region.

Next, we compare the performance of SSAUA with four reference schemes listed as follows:

• Scheme 1 employs equal spectrum allocation, and user association based on the maximum received

power.

• Scheme 2 employs equal spectrum allocation, and optimal user association as in SSAUA.

• Scheme 3 employs optimal spectrum allocation as in SSAUA, and user association based on the

maximum received power.

• Scheme 4 employs optimal spectrum allocation as in SSAUA, and user association based on a

simple range expansion scheme by setting Bk = 1Pk

, ∀k.

Fig. 5.2 shows that SSAUA outperforms these schemes. This illustrates that both the spectrum allocation

component and the user association component of SSAUA bring performance benefits. Note that due

to the approximation made in (5.14), the analytical data rate is slightly lower than the simulated one,

matching our discussion in Section 5.2.

Page 74: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 62

3 3.5 4 4.5 50

0.5

1

1.5

2

2.5

3

γ

Data

Rate

(Mbps)

optimality region, µ = 100 units/km2

SSAUAScheme 1Scheme 2Scheme 3Scheme 4

(a) Optimality region.

5 3 3.5 4 4.5 50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

γ

Data

Rate

(Mbps)

asymptotic-optimality region, µ = 500 units/km2

SSAUAScheme 1Scheme 2Scheme 3Scheme 4

(b) Asymptotic-optimality re-gion.

Figure 5.5: Comparison of different schemes under different path loss exponent γ, simulation case.

0 100 200 300 400 500 600 7000

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

µ (units/km2)

Val

ue

B∗

1(o.)

B∗

2(o.)

B∗

3(o.)

B∗

1(a. o.)

B∗

2(a. o.)

B∗

3(a. o.)

B∗

1(a. o.)

B∗

2(a. o.)

B∗

3(a. o.)

Threshold

optimalityregion

asymptotic−optimalityregion

Figure 5.6: Designed association bias values under different UE density µ. “o” represents the optimalityregion, and “a. o.” represents the asymptotic-optimality region.

5.6.2 Average UE Data Rate under Different Path Loss Exponents

Fig. 5.3 shows the optimal network performance under different values of the path loss exponent γ. The

network parameters are the same as those used in Fig. 5.1 except µ is fixed at 100 (i.e., optimality region)

and 500 (i.e., asymptotic-optimality region) units/km2 in Figs. 5.3 (a) and (b), respectively. This figure

further confirms the observations from Fig. 5.1. Furthermore, it shows that SSAUA is effective for a

wide range of path loss conditions.

Fig. 5.4 shows further analytical performance comparison of SSAUA and the four reference schemes

stated in Section 5.6.1. The results illustrate that in both the optimality and asymptotic-optimality

regions, SSAUA outperforms Scheme 2, Scheme 3, and Scheme 4, and both Scheme 2 and Scheme 3 out-

perform Scheme 1, confirming the observations from Fig. 5.2. Fig. 5.5 shows the simulated performance

comparison of SSAUA and the four reference schemes. The results show that the performance orders of

the five schemes agree with those in Fig. 5.4 in both the optimality region and the asymptotic-optimality

region.

5.6.3 Association Bias Values and Prices

Fig. 5.6 shows B∗, B∗, and B∗; and Fig. 5.7 shows their corresponding prices c∗, c∗, and c∗, under

different µ values. The other network parameters are the same as those used in Fig. 5.1. We observe

that the B∗ and c∗ computed based on SSAUA are close to their counterparts B∗ and c∗.

Page 75: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 63

0 100 200 300 400 500 600 700

0

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

1.8

2

µ (units/km2)P

rici

ng

c∗

1(o.)

c∗

2(o.)

c∗

3(o.)

c∗

1(a. o.)

c∗

2(a. o.)

c∗

3(a. o.)

c∗

1(a. o.)

c∗

2(a. o.)

c∗

3(a. o.)

Threshold

optimalityregion

asymptotic−optimalityregion

Figure 5.7: Pricing values under different UE density µ. “o” represents the optimality region, and “a.o.” represents the asymptotic-optimality region.

2 3 4 5 6 7 8 9 10

10−4

10−2

100

102

104

K

Tim

esp

ent

(s)

SSAUA, asymptotic−optimality region

SSAUA, optimality region

Exhaustive search, optimality region

Exhaustive search, asymptotic−optimality region

Figure 5.8: Comparison of run time.

5.6.4 Run Time Experiment

In this subsection, a run time experiment is presented to compare the computational complexity of

SSAUA with that of exhaustive search. The experiment is executed by Matlab R2011a on an ASUS PC

with Intel i7-3610QM 2.3GHz processor and 4GB RAM. The results are averaged over 1000 runs for

SSAUA and 10 runs for exhaustive search (both with randomly generated parameters). Fig. 5.8 shows

that the run time of SSAUA is almost negligible compared with exhaustive search. Note that the y-axis

is in log scale. When K increases, the run time of exhaustive search exhibits an exponential growth

tendency, while SSAUA remains computationally efficient.

5.6.5 Performance of SSAUA in the Multiple-MCS Case

In this subsection, a numerical experiment is presented to validate the usefulness of SSAUA in the

multiple-MCS case. The network parameters are as follows: N = 3, T1 = 0.1, T2 = 0.3, T3 = 0.5, K = 3,

λ1 = 1 units/km2, λ2 = 5 units/km2, λ3 = 10 units/km2, P1 = 56 dBm, P2 = 46 dBm, P3 = 36 dBm,

ηmin,1 = 0.2, ηmin,2 = 0.25, ηmin,3 = 0.3, ηmax,1 = 0.35, ηmax,2 = 0.4, ηmax,3 = 0.45, γ = 4, and W = 200

MHz.

Fig. 5.9 shows the comparison of SSAUA with the four reference schemes. Similar to the results in

5.6.1, in the multiple-MCS case, we can still observe that SSAUA outperforms Scheme 2, Scheme 3,

and Scheme 4, and both Scheme 2 and Scheme 3 outperform Scheme 1. Both the spectrum allocation

part and the user association part used in SSAUA bring performance benefits, and the joint spectrum

allocation and user association of SSAUA brings the greatest performance benefits in the Multiple-MCS

Page 76: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 64

100 150 200 250 300 350 4001

2

3

4

5

6

7

8

µ (units/km2)

Data

Rate

(Mbps)

SSAUA (analytical)Scheme 1 (analytical)Scheme 2 (analytical)Scheme 3 (analytical)Scheme 4 (analytical)SSAUA (simulation)Scheme 1 (simulation)Scheme 2 (simulation)Scheme 3 (simulation)Scheme 4 (simulation)Threshold value

optimalityregion

asymptotic−optimalityregion

Figure 5.9: Comparison of different schemes in the multiple-MCS case.

case.

5.6.6 Performance Comparison under More Realistic Network Topologies

In this subsection, we present simulation of SSAUA and the four reference schemes in more realistic

network settings. First, the UE and BS density settings follow the 3GPP simulation guidelines from

Annex A of [104], which recommend that there are between 1 to 10 small cell BSs, and 10 to 100 UEs

per macrocell. Second, BSs are non-Poisson, and UEs are inhomogeneously distributed.

The Matern hard core (MHC) point process is an alternative point process adopted in the literature

to counter the drawback of PPP modeling of HWNs [111, 112]. MHC point processes can additionally

capture the effect that two BSs are unlikely to be located very close to each other. In our simulation,

tier-k BSs are generated as an MHC point process as follows: First, we generate a PPP with intensity

λ′k. Each point in the PPP is associated with a “mark”, which is independently uniformly distributed

on [0, 1]. A point is retained in the point process if its mark is the largest among all the points within

a distance Dk from it (or there are no other points within this range); otherwise, the point is removed

from the point process. The remaining points form an MHC point process. Note that the distance

between any two points in the point process is no less than Dk. In our simulation, each tier of BSs

is independently generated as an MHC point process. Then, the spectrum allocation factors and user

association bias values are determined, by either SSAUA or one of the reference schemes, based on PPP

BSs with equivalent densities λk = 1−e−πD2kλ′

k

πD2kλ

′k

.

We also consider the scenario where UEs are likely to crowd near BSs. At the beginning, UEs follow

a PPP with intensity µ′. Then, each tier-k BS brings increment of µ0 to the UE density in the disk

region centered at the BS with a radius of Rk. In our simulation, the spectrum allocation factors and

user association bias values are determined, by either SSAUA or one of the reference schemes, based on

an equivalent UE density µ = µ′ + µ0

(∑Kk=1 λkπR

2k

).

In Figs. 5.10 and 5.11, we set γ = 4; (P1, P2, P3) = (56, 43, 33) dBm; ηmin,1 = 0.2, ηmin,2 = 0.25,

ηmin,3 = 0.3, ηmax,1 = 0.35, ηmax,2 = 0.4, ηmax,3 = 0.45; W = 50 MHz; N = 3, T1 = 1, T2 = 2, T3 = 3.

In Fig. 5.10, (λ′1, λ

′2, λ

′3) = (1, 2, 3) unit/km2, (D1, D2, D3) = (200, 80, 40) m, (R1, R2, R3) = (200, 80, 40)

m, and µ0 = µ′. The equivalent BS densities are (λ1, λ2, λ3) = (0.9397, 1.9603, 2.9775) unit/km2, and

the equivalent UE density is µ = 1.1725µ′. In Fig. 5.11, we set (λ′1, λ

′2, λ

′3) = (1, 5, 10) unit/km2,

(D1, D2, D3) = (200, 80, 40) m, (R1, R2, R3) = (200, 80, 40) m, and µ0 = µ′. The equivalent BS densities

are (λ1, λ2, λ3) = (0.9397, 4.7569, 9.7528) unit/km2, and the equivalent UE density is µ = 1.2628µ′. In

both figures, µ ranges from 10 to 100. The performance ratios of SSAUA to all four reference schemes

are shown in the figures. The result suggests that, under more realistic network topologies, SSAUA still

Page 77: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 65

10 20 30 40 50 60 70 80 90 1001

1.05

1.1

1.15

1.2

1.25

1.3

1.35

1.4

1.45

µ (units/km2)

Per

form

ance

ratio

Gain over Scheme 1Gain over Scheme 2Gain over Scheme 3Gain over Scheme 4

Figure 5.10: Comparison of different schemes under more realistic network settings, (λ′1, λ

′2, λ

′3) = (1, 2, 3)

unit/km2.

10 20 30 40 50 60 70 80 90 1001

1.05

1.1

1.15

1.2

1.25

1.3

1.35

µ (units/km2)

Per

form

ance

ratio

Gain over Scheme 1Gain over Scheme 2Gain over Scheme 3Gain over Scheme 4

Figure 5.11: Comparison of different schemes under more realistic network settings, (λ′1, λ

′2, λ

′3) =

(1, 5, 10) unit/km2.

brings useful performance gain compared with the reference schemes.

5.7 Summary and Discussion

In this chapter, we provide a theoretical framework to study the optimization of spectrum allocation and

user association in HWNs. We establish a stochastic geometric model that captures the random spatial

patterns of BSs and UEs, and a closed-form expression of the analytical average UE data rate is derived.

We then consider the problem of maximizing the average UE data rate by optimizing the spectrum

allocation factors and user association bias values, which is non-convex programming in nature. We

propose the SSAUA approach to solve this problem with low computational complexity. We show that

SSAUA is either optimal or asymptotically optimal with a quantified bound scaling as O(√λK/µ). We

also propose a pricing scheme such that the designed association bias values can be achieved in Nash

equilibrium.

So far we have focused on the spectrum allocation under the constraints of ηmin,k ≤ ηk ≤ ηmax,k, ∀k.We note that our proposed SSAUA is effective when ηmin,k > 0 and ηmax,k < 1, which is necessary in

some practical scenarios. For one example, different BS tiers are operated by different network carriers.

For another example, spectrum has already been allocated to different BS tiers, and now some extra

spectrum is available to be further allocated. Note that if the spectrum allocation factors are given

(e.g., [13]), SSAUA gives an optimal or asymptotically optimal user association solution. However, if we

allow 0 ≤ ηk ≤ 1, ∀k, because the average user data rate (5.16) is linear with respect to the spectrum

allocation factors, the spectrum allocation component of SSAUA (5.20) leads to a simple solution, where

Page 78: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 5. Rate Maximization through Spectrum Allocation and User Association 66

only the BS tier with the highest density will be allocated with 100% spectrum, which may not be

desirable in reality. This implies that the user data rate may not be the only design goal in this scenario.

In order to resolve this issue, in one of our follow-up works [76], we choose the average log-utility of

user data rate as our objective. The log-utility can capture a tradeoff between opportunism and user

fairness, by encouraging low-rate cell edge users to improve their rates while saturating the utility gain

of high-rate users. Through this way, all BS tiers will be allocated with non-zero potions of spectrum.

Of course, in future works, it will also be important to design user association and spectrum allocation

schemes to benefit network traffic through decreasing traffic delay, reducing data rate fluctuation, and

improving quality of experience.

Page 79: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6

Stochastic Geometric Analysis of

User Mobility in HWNs

Horizontal and vertical handoffs have important ramifications for user mobility in multi-tier HWNs.

They directly impact the signaling overhead and quality of calls. However, they are difficult to analyze

due to the irregularly shaped network topologies introduced by multiple tiers of cells. In this chapter, a

stochastic geometric analysis framework on user mobility is proposed to capture the spatial randomness

and various scales of cell sizes in different tiers.

In Section 6.1, we model different tiers of BSs as Poisson point processes (PPPs) to capture their

spatial randomness. Then, we derive expressions for the rates of all handoff types experienced by an

active user with arbitrary movement trajectory. Furthermore, noting that the data rate of a user depends

on the set of cell tiers that it is willing to use, we provide guidelines for optimal tier selection under various

user velocity, taking both the handoff rates and the data rate into consideration. Empirical studies using

user mobility trace data and extensive simulation are conducted, demonstrating the correctness and

usefulness of our analysis.

In Section 6.2, motivated by the fact that some BSs are likely to aggregate around highly populated

geographical regions (e.g., urban areas, attractions, etc.), we extend the handoff analysis in Section 6.1

by allowing BSs to form Poisson cluster processes (PCPs), in order to capture their non-uniform and

dependent aggregation in space. We then derive analytical expressions for the rates of all handoff types

in this more realistic scenario.

6.1 Handoff Rate Analysis in HWNs with Poisson Patterns

In this section, we aim to derive the rates of all handoff types experienced by an active user with

arbitrary movement trajectory. Furthermore, we study the optimal tier selection under various user

velocity, taking both the handoff rates and the data rate into consideration. Note that we employ the

conventional assumption on HWNs that each BS tier forms a homogeneous PPP in this section.

67

Page 80: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 68

6.1.1 System Model

In this subsection, we describe the network under consideration, clarifying the notions of cell boundaries

and handoffs.

6.1.1.1 Multi-tier Network

We consider an HWN with spatially randomly distributed K tiers of BSs. Let K = 1, 2, . . . ,K.In order to characterize the random spatial patterns of BSs, in this section, we use the conventional

assumption that each tier of BSs independently form a homogeneous Poisson point process (PPP) in

two-dimensional Euclidean space R2 [12, 13, 35, 37, 38, 73, 74]. Let Φk denote the PPP corresponding to

tier-k BSs, and let λk be its intensity.

6.1.1.2 Biased User Association

Different tiers of BSs transmit at different power levels. Let Pk be the transmission power of tier-k BSs,

which is a given parameter. If Pt(x), for Pt(x) ∈ P1, P2, . . . , PK, is the transmission power from a

BS at x and Pr(y) is the received power at y, we have Pr(y) =Pt(x)hx,y

|x−y|γ , where γ > 2 is the path loss

exponent, |x − y|γ is the propagation loss function, and hx,y is the fast fading term. Corresponding

to common Rayleigh fading with power normalization, hx,y is independently exponentially distributed

with unit mean.

In order to capture various scales of different cell sizes, biased user association considered in Section

5.1.5 is also employed in this chapter. Bk is the association bias of tier-k BSs, and the user association

rule follows formula (5.1). As a consequence, the resultant cell splitting forms a generalized Dirichlet

tessellation, or weighted Poisson Voronoi [106], an example of which is shown in Fig. 1.3. Let T(1)

denote the overall set of cell boundaries, and let T(1)kj denote the set of boundaries between tier-k cells

and tier-j cells, which is also referred to as type k-j cell boundaries in this chapter. Clearly, T(1)kj and

T(1)jk are equivalent.

Note that the effects of B1, B2, . . . , BK remain the same if we multiply all of them by the same positive

constant. For presentation convenience, we define βkj =(

PkBk

PjBj

)1/γ. Clearly, βkj = 1

βjk. Furthermore,

let Ak denote the probability that a UE associates itself with a tier-k BS. We still have

Ak =λk(PkBk)

2γ∑K

j=1 λj(PjBj)2γ

. (6.1)

6.1.1.3 UE Trajectory and Handoff Rate

We aim to study the rates of all handoff types of some active UE moving in the network. Let T0 denote

the trajectory of the UE, which is of finite length. The number of handoffs the UE experiences is equal

to the number of intersections between T0 and T(1), which is denoted by N (T0,T(1)). In this chapter,

a handoff made from a tier-k cell to a tier-j cell is called a type k-j handoff. The number of type k-j

handoffs is denoted by Nkj(T0,T(1)kj ).

If j = k, a type k-j (vertical) handoff is not equivalent to a type j-k handoff. When the UE

crosses some type k-j boundary, either a type k-j or a type j-k handoff is made, depending on its

direction of movement. Thus, the number of type k-j plus type j-k handoffs is equal to the num-

ber of intersections between T0 and T(1)kj , which is denoted by N (T0,T(1)

kj ). In other words, we have

Page 81: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 69

N (T0,T(1)kj ) = Nkj(T0,T(1)

kj ) +Njk(T0,T(1)kj ).

If j = k, N (T0,T(1)kk ) = Nkk(T0,T(1)

kk ) indicates the number of type k-k (horizontal) handoffs.

In Section 6.1.2, we aim to study the rates of all handoff types, which correspond to the expected

numbers of handoffs experienced by an active UE per unit time.

6.1.2 Handoff Rate Analysis in Multi-tier HWNs

The proposed analysis of handoff rates consists of a progressive sequence of four components, which are

described in the following subsections.

6.1.2.1 Length Intensity of Cell Boundaries

Handoffs occur at the intersections between an active UE’s trajectory with cell boundaries. In order to

track the number of intersections, we need to first study the intensities of cell boundaries T(1) and T(1)kj .

Higher intensity of cell boundaries leads to greater opportunities for boundary crossing, and thus higher

handoff rates.

The set of cell boundaries T(1) is a fiber process [39] generated by Φ1,Φ2, . . . ,ΦK . T(1) also corre-

sponds to the set of points on R2, where the same biased power level is received from two nearby BSs,

and this biased received power level is no less than those from any other BSs. Mathematically, we have

T(1) =

x

∣∣∣∣∣∀k, j ∈ K, ∃x1 ∈ Φk,x2 ∈ Φj ,x1 = x2,

s.t. Pr =PkBk

|x1 − x|γ=

PjBj

|x2 − x|γ, and ∀i ∈ K,y ∈ Φi, Pr ≥ PiBi

|y − x|γ

.

Similarly, T(1)kj can be expressed as

T(1)kj =

x

∣∣∣∣∣∃x1 ∈ Φk,x2 ∈ Φj ,x1 = x2,

s.t. Pr =PkBk

|x1 − x|γ=

PjBj

|x2 − x|γ, and ∀i ∈ K,y ∈ Φi, Pr ≥ PiBi

|y − x|γ

.

Note that∪K

k=1

∪Kj=k T

(1)kj = T(1).

Let µ1

(T(1)

)denote the length intensity of T(1), which is the expected length of T(1) in a unit

square1 [39]:

µ1

(T(1)

)= E

(∣∣∣T(1)∩

[0, 1)2∣∣∣1

), (6.2)

where |L|1 denotes the length of L (i.e., one-dimensional Lebesgue measure of L). Similarly, let µ1

(T

(1)kj

)denote the length intensity of T

(1)kj :

µ1

(T

(1)kj

)= E

(∣∣∣T(1)kj

∩[0, 1)2

∣∣∣1

). (6.3)

1Because Φ1, . . . ,ΦK are stationary, T(1) is also stationary, and thus the unit square could be arbitrarily picked on R2.

Page 82: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 70

−4 −3 −2 −1 0 1 2 3−2

−1.5

−1

−0.5

0

0.5

1

1.5

2

2.5

3

3.5

T(1)

T(2)(∆d)∆d

Tier-1 BS

Tier-2 BS

Tier-2 BS

Figure 6.1: The blue curves show T(1); and the region within red dashed curves shows T(2)(∆d).

Note that we have µ1

(T(1)

)=∑K

k=1

∑Kj=k µ1

(T

(1)kj

).

6.1.2.2 ∆d-Extended Cell Boundaries

It is difficult to directly quantify the one-dimensional measures µ1

(T(1)

)and µ1

(T

(1)kj

)on the two-

dimensional plane. Instead, we first introduce ∆d-extended cell boundaries, which extends the one-

dimensional measures to two-dimensional measures.

The ∆d-extended cell boundaries of T(1), denoted by T(2)(∆d), is defined as

T(2)(∆d) =x∣∣∣∃y ∈ T(1), s.t. |x− y| < ∆d

. (6.4)

In other words, T(2)(∆d) is the ∆d-neighbourhood of T(1). A point is in T(2)(∆d) iff its (shortest)

distance to T(1) is less than ∆d, as shown in Fig. 6.1. Similarly, we define T(2)kj (∆d) as the ∆d-extended

cell boundaries of T(1)kj (i.e, ∆d-neighbourhood of T

(1)kj ):

T(2)kj (∆d) =

x∣∣∣∃y ∈ T

(1)kj , s.t. |x− y| < ∆d

. (6.5)

The area intensity of T(2)(∆d) is defined as the expected area of T(2)(∆d) in a unit square:

µ2

(T(2)(∆d)

)= E

(∣∣∣T(2)(∆d)∩

[0, 1)2∣∣∣) , (6.6)

where |S| denotes the area of S (i.e., two-dimensional Lebesgue measure of S). Similarly, the area

intensity of T(2)kj (∆d) is

µ2

(T

(2)kj (∆d)

)= E

(∣∣∣T(2)kj (∆d)

∩[0, 1)2

∣∣∣) . (6.7)

Because Φ1,Φ2, . . . ,ΦK are stationary and isotropic, T(2)(∆d) and T(2)kj (∆d) are also stationary and

isotropic. By definition, the area intensity of T(2)(∆d) (resp. T(2)kj (∆d)) is the average area of T(2)(∆d)

(resp. T(2)kj (∆d)) in a unit square, which is equal to the probability that an arbitrarily located point in

the unit square is in T(2)(∆d) (resp. T(2)kj (∆d)). Thus, we have

µ2

(T(2)(∆d)

)= P(0 ∈ T(2)(∆d)), (6.8)

µ2

(T

(2)kj (∆d)

)= P(0 ∈ T

(2)kj (∆d)). (6.9)

Page 83: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 71

Note that 0 is the origin of the plane.

We observe that the probabilities in (6.8) and (6.9) are analytically tractable, which will be presented

in the next subsection.

6.1.2.3 Derivations of the Area Intensities

In this subsection, we present the derivations of P(0 ∈ T(2)(∆d)) and P(0 ∈ T(2)kj (∆d)). First, we study

the probability that the reference UE at 0 is in T(2)kj (∆d), given that it is associated with a tier-k BS

at a distance of R0 from it. By employing both analytic geometric and stochastic geometric tools, we

derive the following theorem:

Theorem 11. Suppose the reference UE is located at 0; it is associated with a tier-k BS; and their

distance is R. The conditional probability that 0 ∈ T(2)kj (∆d) given R = R0 is

P(0 ∈ T

(2)kj (∆d)|R = R0, tier = k

)= 1− exp

(−2λj∆dR0F(βkj) +O(∆d2)

), (6.10)

where O represents big O notation and

F(β) , 1

β2

∫ π

0

√(β2 + 1)− 2β cos(θ)dθ. (6.11)

See Appendix C.1 for the proof.

Second, through stochastic geometric tools and deconditioning on R, we can derive the unconditioned

probabilities that the reference UE at 0 is in T(2)(∆d) and in T(2)kj (∆d):

Theorem 12. The area intensities of T(2)(∆d) and T(2)kj (∆d) are

(a)

µ2

(T(2)(∆d)

)=

K∑k=1

λk

(∑Ki=1 λi∆dF(βki)

)(∑K

i=1 λiβ2ik

) 32

+O(∆d2). (6.12)

(b)

µ2

(T

(2)kj (∆d)

)=

λk(λj∆dF(βkj))

(∑K

i=1 λiβ2ik)

32

+λj(λk∆dF(βjk))

(∑K

i=1 λiβ2ij)

32

+O(∆d2) if k = j,

λ2k∆dF(1)

(∑K

i=1 λiβ2ik)

32+O(∆d2) if k = j.

(6.13)

See Appendix C.2 for the proof.

6.1.2.4 From Area Intensities to Handoff Rates

In this subsection, we derive handoff rates from area intensities derived in Theorem 12. This involves

two steps: (1) from area intensities µ2

(T(2)(∆d)

)and µ2

(T

(2)kj (∆d)

)to length intensities µ1

(T(1)

)and

µ1

(T

(1)kj

), and (2) from length intensities to handoff rates.

First, we derive the length intensity µ1

(T(1)

)(resp. µ1

(T

(1)kj

)) from the area intensity µ2

(T(2)(∆d)

)(resp. µ2

(T

(2)kj (∆d)

)) by taking ∆d → 0. Following [113] and Section 3.2 in [114], µ1

(T(1)

)=

lim∆d→0µ2

(T(2)(∆d)

)2∆d and µ1

(T

(1)kj

)= lim∆d→0

µ2

(T

(2)kj (∆d)

)2∆d . Therefore, we have

Page 84: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 72

Theorem 13. The length intensities of T(1) and T(1)kj can be computed as follows:

(a)

µ1

(T(1)

)=

K∑k=1

λk

(∑Ki=1 λiF(βki)

)2(∑K

i=1 λiβ2ik

) 32

. (6.14)

(b)

µ1

(T

(1)kj

)=

λkλjF(βkj)

2(∑K

i=1 λiβ2ik)

32+

λjλkF(βjk)

2(∑K

i=1 λiβ2ij)

32

if k = j,

λ2kF(1)

2(∑K

i=1 λiβ2ik)

32

if k = j.(6.15)

Remark 1. Note that, if we consider the single-tier case by taking K = 1, we have F(1) = 4, and

µ1

(T(1)

)= µ1

(T

(1)11

)= 2

√λ1. This matches the length intensity of a standard Poisson Voronoi. See

Section 10.6 of [39].

Second, we can derive the expected number of handoffs of an active UE. Since T(1) and T(1)kj are

stationary and isotropic fiber processes with length intensity µ1

(T(1)

)and µ1

(T

(1)kj

), respectively, we can

derive the expected number of intersections between T0 and T(1) (resp. T(1)kj ) following the conclusion

in Section 9.3 of [39]. We have

Theorem 14. Let T0 denote an arbitrary UE’s trajectory on R2 with length |T0|1. Then, the expected

number of intersections between T0 and T(1) (resp. T(1)kj ) are

E(N (T0,T(1))

)=2

πµ1

(T(1)

)|T0|1, (6.16)

E(N (T0,T(1)

kj ))=2

πµ1

(T

(1)kj

)|T0|1, (6.17)

and the expected number of type k-j handoffs are

E(Nkj(T0,T(1)

kj ))=

12E(N (T0,T(1)

kj ))

if k = j,

E(N (T0,T(1)

kj ))

if k = j.(6.18)

Note that the expected number of type k-j handoffs is the same as the expected number of type j-k

handoffs, both of which are equal to half of E(N (T0,T(1)

kj )).

Let v denote the instantaneous velocity of an active UE, H(v) denote its overall handoff rate (i.e.,

sum handoff rate of all types), and Hkj(v) denote its type k-j handoff rate. Then we have the following

Corollary from Theorem 14:

Corollary 2.

H(v) =2

πµ1

(T(1)

)v, (6.19)

Hkj(v) =

1πµ1

(T

(1)kj

)v if k = j,

2πµ1

(T

(1)kj

)v if k = j.

(6.20)

Page 85: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 73

Note that the above handoff rates are instantaneous rates. Thus, our analysis allows time-varying

velocity for the UEs, in which case the handoff rates are also time varying.

6.1.3 UE’s Data Rate and Tier Selection

In this subsection, we discuss optimal BS tier selection as an application of the above analysis, taking

both the handoff rates and the user data rate into consideration. Let S ⊂ K be the set of BS tiers that

an active UE chooses to use. We assume that 1 ∈ S (i.e., the UE always selects tier-1 macrocells).

6.1.3.1 UE Data Rate

6.1.3.1.1 Spectrum Allocation and Multiple Modulation and Coding Schemes In multi-

tier HWNs, in order to avoid cross-tier interference, and the prohibitive complexity in tracking and

provisioning for such interference especially with unplanned deployment of small cells, a disjoint spec-

trum mode is advocated (e.g., [36, 73, 115]), where different tiers of BSs are allocated non-overlapping

portions of the spectrum. In what follows, we consider this scenario as an illustrative example. However,

we emphasize that, since the proposed handoff rate analysis above is independent of the spectrum allo-

cation strategy, the subsequent study on optimal tier selection is applicable to more general scenarios of

spectrum sharing, as long as the average UE data rate can be derived (e.g., [12, 13,35]).

We assume that each active UE associated with a tier-k BS is allocated the same spectrum with

bandwidth Wk. The UE adaptively selects one of N available modulation and coding schemes (MCSs).

Each MCS corresponds to a specific Signal-to-Interference Ratio (SIR) Tn, for 1 ≤ n ≤ N . Without loss

of generality, we set T1 < T2 < . . . < TN . If a UE is allocated spectrum bandwidth W ′, its data rate

is W ′ log(1 + TN ), W ′ log(1 + TN−1), . . ., W′ log(1 + T1), and 0, respectively, if its SIR is in [TN ,∞),

[TN−1, TN ), . . ., [T1, T2), and [0, T1). Note that log is in base 2 throughout this chapter. Also, we

consider the common scenario where the system is interference limited, such that noise is negligible.

6.1.3.1.2 Average UE Data Rate Derivation An approach similar to one proposed in Chapter

5 is used to derive a closed-form expression for the average UE data rate.

Following (6.1), the probability that the active UE associates itself with a tier-k BS, for k ∈ S, is

Ak,S =λk(PkBk)

2γ∑

j∈S λj(PjBj)2γ

. (6.21)

Given that the UE is associated with a tier-k BS and their distance is d, the overall interference to

the UE is the sum interference from all tier-k BSs other than the BS serving the UE:

Ik,S(d) =∑x∈Φ′

k

Pkhx,0

|x|γ, (6.22)

where Φ′k is the reduced Palm point process [12] corresponding to all tier-k BSs other than the BS serving

the UE. It can be shown that Φ′k is a PPP with intensity 0 in B(0, d) and intensity λk in R2\B(0, d),

where B(x, r) denotes the disk region centered at x with radius r [37].

Page 86: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 74

The distribution of Ik,S(d) is derived through its Laplace transform as follows:

LIk,S (d, s) = E

exp−

∑x∈Φ′

k

sPkhx,0

|x|γ

=exp

(−2πλk

∫ ∞

d

sPkr

sPk + rγdr

). (6.23)

Let Pcov,k,S(d, Tn) denote the conditional probability that the SIR of the active UE is larger than Tn

(given k and d). Then,

Pcov,k,S(d, Tn) =P(PkhxB ,0

dγ≥ TnIk,S(d)

)=LIk,S (d, s)|s=Tndγ

Pk

, (6.24)

where xB is the coordinate of the BS serving the UE, and |xB | = d. We have the second equality in

(6.24) because hxB ,0 is exponentially distributed. Substituting (6.23) into (6.24), we have

Pcov,k,S(d, Tn) = exp

(−2πλk

∫ ∞

d

Tndγr

Tndγ + rγdr

)t= r2

d2·T2/γn= exp

(−πλkT

2γn d2

∫ ∞

( 1Tn

)2γ

1

1 + tγ2

dt

). (6.25)

Note that by the change of variable in the second equality above, we are able to capture the fact that

the UE’s data rate is higher if it is closer to its serving BS.

Next, the probability density function of the distance between the UE and its serving BS is

fk,S(d) =2πλk

Ak,Sd exp

−πd2∑j∈S

λj

(PjBj

PkBk

) 2γ

(6.26)

=2πλk

Ak,Sd exp

(−πd2

λk

Ak,S

), (6.27)

where (6.26) is derived in [12], and (6.27) is obtained by substituting (6.21) into (6.26).

Let Pcov,k,S(Tn) denote the probability that the SIR of the active UE is larger than Tn (given that

it is associated with a tier-k BS). It can be computed as

Pcov,k,S(Tn) =

∫ ∞

0

fk,S(d)Pcov,k,S(d, Tn)dd

=1

1 +Ak,SCn, (6.28)

where Cn , (Tn)2γ∫∞( 1

Tn)

11+tγ/2 dt. Note that because T1 < T2 < . . . < TN , we have C1 < C2 < . . . <

CN .

Consequently, by using multiple MCSs, the average data rate of the UE (given that it is associated

Page 87: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 75

with a tier-k BS) can be computed as

Rk,S =Wk

[log(1 + TN )Pcov,k,S(TN ) +

N−1∑n=1

log(1 + Tn)(Pcov,k,S(Tn)− Pcov,k,S(Tn+1)

)](6.29)

=Wk

[log(1 + TN )

1 +Ak,SCN+

N−1∑n=1

log(1 + Tn)

(1

1 +Ak,SCn− 1

1 +Ak,SCn+1

)]. (6.30)

Finally, the expected data rate of the active UE can be computed as

RS =∑k∈S

Ak,SRk,S . (6.31)

6.1.3.2 Optimal Tier Selection

Following the derivations in Section 6.1.2 and 6.1.3.1, we see that different tier selections lead to different

data rates and handoff rates. Let Ckj be the cost for one type k-j handoff, and UR be the utility value

for one bit of data transmission. We assume the UE also pays service charge Pk per second when it is

associated with a tier-k BS. Note that Ckj , UR, and Pk may be assigned arbitrarily, and Ckj and Cjkmay be different if k = j [14]. If the UE favors higher data rate, it could assign a larger value for UR; if

it favors lower handoff rates, it could assign larger values for Ckj .If the active UE’s tier selection is S, its overall average utility on data transmission per second is

URRS , overall average service charge per second is P(S) =∑

k∈S Ak,SPk, and overall average expense

on handoffs per second is

C(S, v) = 2

πv∑k∈S

λk

(∑i∈S

(Cki+Cik)2 λiF(βki)

)2(∑

i∈S λiβ2ik

) 32

, (6.32)

where (6.32) follows the conclusions of Theorem 13 and Corollary 2. Consequently, the overall average

utility per second of tier selection S is

G(S, v) = URRS − C(S, v)− P(S). (6.33)

Finally, the optimal tier selection is

Sopt = argmaxS∈S

(URRS − C(S, v)−P(S)

), (6.34)

where S is the set of all possible tier selections. Sopt can be determined through comparing all possible

tier selections.

6.1.4 Experimental Study

In this subsection, our analysis is validated via experimenting with real-world traces and simulations.

6.1.4.1 Yonsei Trace Data

We use the Yonsei Trace [116] to validate our analytical results. The trace was accumulated from 12

commercial mobile phones during an eight-month period in 2011 in the city of Seoul. An application

Page 88: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 76

named SmartDC was running on the commercial mobile phones equipped with GPS, GSM, and WiFi.

For every 2 to 5 minutes, the application collected UE’s location information (latitude and longitude),

the MAC addresses of surrounding WiFi APs, and the cell IDs of nearby cellular BSs they could detect.

Each AP has a unique MAC address and each BS has a unique cell ID. By analyzing the data set, we are

able to determine which APs and BSs a UE could detect at the recorded coordinates and time instants.

In the following, we regard cellular BSs as tier-1 BSs and APs as tier-2 BSs.

6.1.4.2 Data Processing

6.1.4.2.1 Location Approximations of APs and BSs As the data set does not explicitly provide

the latitudes and longitudes of APs and BSs, we apply the following approach to approximate their

locations: for each AP (resp. BS), we list all the coordinates recorded by UEs when they are able to

detect the AP (resp. BS). Then, we approximate the location of the AP (resp. BS), by taking the

average of these recorded coordinates.

6.1.4.2.2 Reference Region In order to avoid the edge effect, we define a reference region, in which

most recorded coordinates are located. The UEs’ trajectories are only accounted inside the reference

region. By plotting the cumulative distribution function (cdf) of the latitude (resp. longitude) of

all recorded coordinates (shown in Fig. 6.2), we observe a sharp step upward between 37.48N and

37.58N (resp.126.9E and 127.1E). As a consequence, we employ the rectangle defined by 37.48N ,

and 37.58N , 126.9E, and 127.1E as the reference region.

6.1.4.2.3 UE Trajectory In the trace data, the coordinates of a UE are recorded only once every

few minutes. To recover its full trajectory, we regard it as moving in a straight line at a constant

velocity between two consecutive recorded coordinates. Thus, interpolation can be made to determine

the coordinate of the UE at any time. Note that only the trajectories inside the reference region are

used.

6.1.4.2.4 Handoff Rates Through the locations of BSs and APs, as well as the UE trajectories, we

are able to derive the empirical rates of all handoff types following the biased user association scheme

discussed in Section 6.1.1.2. We set P1 = 45 dBm, P2 = 20 dBm, B1 = 100B2, and γ = 3. If we ignore

all the APs, we can also derive the empirical handoff rates for the one-tier case.

6.1.4.2.5 BS and AP Intensities The AP (resp. BS) density is computed as the number of APs

(resp. BSs) over the area of the reference region, which is 455.1 unit/km2 (resp. 52.6 unit/km2). This

indicates an urban area with high population and BS densities.

6.1.4.2.6 Empirical Results We compare the handoff rates derived from our analysis and those

from our empirical study based on the Yonsei Trace. The empirical handoff rates are derived from the

steps in Sections 6.1.4.2.1 - 6.1.4.2.4. For the analytical results, we use the BS and AP intensities shown

in Section 6.1.4.2.5 as input parameters.

For the two-tier case (considering both APs and BSs), the comparison of analytical and empirical

handoff rates is shown in Fig. 6.3. For the one-tier case (by eliminating all the APs), the comparison is

shown in Fig. 6.4. Both figures illustrate the accuracy of our analysis. When the UE’s velocity is low,

Page 89: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 77

36.5 37 37.5 38 38.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Latitude (N)

cdf

126 126.5 127 127.5 128 128.50

0.1

0.2

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

Longitude (E)

cdf

Figure 6.2: Cumulative distribution function of the latitude and longitude.

0 20 40 60 80 100 120 140 160 180 2000

0.5

1

1.5

2

2.5

3

3.5

4

Velocity (m/minute)

Han

doff

rate

(unit/m

inute

)

1-1, analytical1-1, empirical1-2 (or 2-1), analytical1-2, empirical2-1, empirical2-2, analytical2-2, empirical

Figure 6.3: Two-tier case: comparison of analytical and empirical handoff rates.

0 20 40 60 80 100 120 140 160 180 2000

0.5

1

1.5

2

2.5

3

3.5

4

Velocity (m/minute)

Han

doff

rate

(unit/m

inute

)

analytical

empirical

Figure 6.4: One-tier case: comparison of analytical and empirical handoff rates.

empirical handoff rates are slightly greater than analytical handoff rates. This is because the locations

of APs and BSs are not strictly homogeneously distributed (e.g., some APs and BSs are crowding along

some streets, or at the center of the urban region). We also observe that UEs with lower velocity are

more likely to be sampled in regions with higher AP and BS densities. As a consequence, the empirical

handoff rates are higher than those computed by our analytical results.

Fig. 6.3 and Fig. 6.4 also show that type 1-1 horizontal handoff rates are almost the same in the

one-tier and two-tier cases, but extra type 1-2 and type 2-1 vertical handoffs are introduced in the

two-tier case. This agrees with our expectation that adding a second tier of APs brings more vertical

handoffs. In addition, as a validation of (6.18), type 1-2 and type 2-1 handoff rates are almost the same

in empirical results.

Page 90: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 78

1 2 3 4 5 6 7 8 9 100

0.5

1

1.5

2

2.5

3

3.5

4

λ1 (unit/km2)

Han

doff

rate

(unit/m

inute

)

1-1, analytical

1-1, simulation

1-2 & 2-1, analytical

1-2 & 2-1, simulation

2-2, analytical

2-2, simulation

Figure 6.5: Two-tier case: handoff rates under different λ1 values.

1 2 3 4 5 6 7 8 9 100

0.5

1

1.5

2

λ2 (unit/km2)

Han

doff

rate

(unit/m

inute

)

1-1, analytical1-1, simulation1-2 & 2-1, analytical1-2 & 2-1, simulation1-3 & 3-1, analytical1-3 & 3-1, simulation2-2, analytical2-2, simulation2-3 & 3-2, analytical2-3 & 3-2, simulation3-3, analytical3-3, simulation

Figure 6.6: Three-tier case: handoff rates under different λ2 values.

6.1.4.3 Simulation Study

In this subsection, we present simulation results to further demonstrate our analysis in more complex

HWNs.

6.1.4.3.1 Simulation Setup The simulation procedure is as follows: in each round of simulation,

two or three tiers of BSs are generated on a 10 km × 10 km square. Then, we randomly generate 5

waypoints X1, . . . ,X5 in the central 5 km × 5 km square (uniformly distributed). The four line segments

X1X2,X2X3, . . . ,X4X5 form the trajectory of an active UE. In this way, we derive the simulated handoff

rates in one round of simulation. The above procedure is repeated 2000 rounds to derive one simulated

data point. Note that in this subsection, in order to avoid overlapping in figures, we only show the sum

rate of type j-k and type k-j (k = j) handoffs for easier inspection; the individual handoff rates are half

of the sum handoff rate.

6.1.4.3.2 Handoff Rates under Different BS Intensities We study handoff rates under different

BS intensities. Fig. 6.5 shows a two-tier case, with parameters as follows: (P1, P2) = (30, 20) dBm,

(B1, B2) = (1, 1), and λ2 = 1 unit/km2. Fig. 6.6 shows a three-tier case, with parameters as follows:

(P1, P2, P3) = (30, 20, 10) dBm, (B1, B2, B3) = (1, 1, 1), and (λ1, λ3) = (1, 1) unit/km2. The parameter

values γ = 3 and v = 60 km/h are used for both Fig. 6.5 and Fig. 6.6.

Fig. 6.5 illustrates that increasing λ1 leads to higher type 1-1 handoff rate but lower type 2-2 handoff

rate. Fig. 6.6 illustrates that increasing λ2 leads to higher type 2-2 handoff rate but lower type 1-1,

1-3, and 3-1 handoff rates. Both observations suggest that increasing the BS intensity of one tier causes

higher horizontal handoff rate within the tier, but lower handoff rates outside the tier.

6.1.4.3.3 Handoff Rates under Different Association Bias Values Next, we study handoff

rates under different association bias values. Fig. 6.7 shows a two-tier case, with parameters as follows:

Page 91: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 79

101

102

103

104

105

0

0.2

0.4

0.6

0.8

1

1.2

1.4

B1/B2

Handoff

rate

(unit/m

inute

)

1-1, analytical

1-1, simulation

1-2 & 2-1, analytical

1-2 & 2-1, simulation

2-2, analytical

2-2, simulation

Figure 6.7: Two-tier case: handoff rates under different B1 values.

101

102

103

104

105

0

0.2

0.4

0.6

0.8

1

1.2

1.4

B2

Handoff

rate

(unit/m

inute

)

1-1, analytical1-1, simulation1-2 & 2-1, analytical1-2 & 2-1, simulation1-3 & 3-1, analytical1-3 & 3-1, simulation2-2, analytical2-2, simulation2-3 & 3-2, analytical2-3 & 3-2, simulation3-3, analytical3-3, simulation

Figure 6.8: Three-tier case: handoff rates under different B2 values.

5 10 15 20 25 30 35 40 45 500

0.2

0.4

0.6

0.8

1

1.2

1.4

1.6

1.8

2

velocity (km/h)

unit

utility

/sec

ond

Utility of tier selection 1,2, simulationUtility of tier selection 1, simulationAnalytical tier selection threshold

Figure 6.9: Two-tier case: overall utility comparison of different tier selections.

(P1, P2) = (30, 20) dBm, B2 = 1, and (λ1, λ2) = (1, 1) unit/km2. Fig. 6.8 shows a three-tier case, with

parameters as follows: (P1, P2, P3) = (30, 20, 10) dBm, (B1, B3) = (1, 1), and (λ1, λ2, λ3) = (1, 1, 1)

unit/km2. The parameter values γ = 3 and v = 60 km/h are used for both Fig. 6.7 and Fig. 6.8. These

figures suggest that, increasing the association bias value of one tier has a similar effect as increasing

the BS intensity of this tier, leading to higher horizontal handoff rate within the tier, but lower handoff

rates outside the tier.

6.1.4.3.4 UE’s Utility under Different Tier Selections Fig. 6.9 shows the simulated utility of

an active UE under different velocity values in a two-tier case. The parameters are as follows: (P1, P2) =

(40, 20) dBm, (B1, B2) = (1, 1), (λ1, λ2) = (1, 10) units/km2, γ = 3, N = 3, T1 = 0.2, T2 = 0.4, T3 = 0.8,

(W1,W2) = (2, 5) MHz, (C11, C12, C21, C22) = (10, 45, 35, 20), UR = 1, and (P1,P2) = (0.1, 0.1)2. The

vertical line shows the analytical tier selection threshold on the UE velocity, which is 28.82 km/h. This

figure demonstrates that the simulation results agree with the analysis of tier selection as discussed in

Section 6.1.3. Tier selection 1, 2 is optimal if the UE’s velocity is low, but its overall utility decreases

faster due to the higher handoff expense. Tier selection 1 is optimal if the UE’s velocity is greater

2In this section, Ckj is in unit utility/handoff, UR is in unit utility/Mbit, and Pk is in unit utility/s.

Page 92: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 80

5 10 15 20 25 30 35 40 45 50 55 600

0.5

1

1.5

2

2.5

velocity (km/h)

unit

utility

/sec

ond

Utility of tier selection 1,2,3, simulationUtility of tier selection 1,3, simulationUtility of tier selection 1,2, simulationUtility of tier selection 1, simulationAnalytical threshold, 1,2,3 and 1,2Analytical threshold, 1,2 and 1

Figure 6.10: Three-tier case: overall utility comparison of different tier selections.

than 28.82 km/h.

Fig. 6.10 shows the simulated utility of an active UE under different velocity values in a three-

tier case. The parameters are as follows: (P1, P2, P3) = (40, 20, 10) dBm, (B1, B2, B3) = (1, 1, 1),

(λ1, λ2, λ3) = (1, 5, 20) units/km2, γ = 3, N = 3, T1 = 0.2, T2 = 0.4, T3 = 0.8, (W1,W2,W3) = (2, 5, 10)

MHz, (C11, C12, C21, C22, C13, C31, C23, C32, C33) = (10, 35, 25, 20, 45, 35, 55, 45, 30), UR = 1, and (P1,P2,P2)

= (0.1, 0.1, 0.1). Two vertical lines show the analytical tier selection thresholds, which are 27.15 km/h

and 42.15 km/h, respectively. This figure again shows that the simulation results agree with the analysis

of tier selection. When the velocity is in the range [0, 27.15) km/h, tier selection 1, 2, 3 is optimal;

when the velocity is in the range [27.15, 42.15) km/h, tier selection 1, 2 is optimal; when the velocity

is in the range [42.15,∞) km/h, tier selection 1 is optimal.

6.1.4.3.5 Velocity Threshold Fig. 6.11 and Fig. 6.12 show the computed velocity thresholds for

tier selection, under different BS densities. Fig. 6.11 shows a two-tier case. The parameters are as

follows: (P1, P2) = (40, 20) dBm, λ1 = 1 units/km2, γ = 3, N = 3, T1 = 0.2, T2 = 0.4, T3 = 0.8,

(W1,W2) = (3, 7) MHz, (C11, C12, C21, C22) = (10, 45, 35, 20), and (P1,P2) = (0.1, 0.1). Fig. 6.12 shows a

three-tier case. The parameters are as follows: (P1, P2, P3) = (30, 20, 10) dBm, (B1, B2, B3) = (1, 1, 1),

(λ1, λ2) = (1, 5) units/km2, γ = 3, N = 3, T1 = 0.2, T2 = 0.4, T3 = 0.8, (W1,W2,W3) = (2, 5, 10) MHz,

(C11, C12, C21, C22, C13, C31, C23, C32, C33) = (10, 35, 25, 20, 45, 35, 55, 45, 30), and (P1,P2,P2) = (0.1, 0.1, 0.1).

In the two-tier case, increasing λ2 or B2 improves the average UE data rate (as the UE has higher

probability to be associated with tier-2 BSs), but it could also cause higher handoff rates. Through

our theoretical analysis, we could observe that the latter factor has a stronger effect and the velocity

threshold value is lowered if λ2 increases; while the former factor dominates and the velocity threshold

value increases if B2 becomes greater. In addition, increasing UR leads to a higher weight in data rate,

so the threshold values increase.

In the three-tier case, increasing λ3 could have more complicated impact on optimal tier-selection.

We observe that the tier selection 1, 3 is broken into two separate regions. When λ3 is small, the

velocity range of tier selection 1, 2 is below the velocity range of tier selection 1, 3, while the former

range is above the latter one when λ3 becomes larger. Still, increasing UR leads to a higher weight in

data rate, thus the threshold values are increased (i.e., the solid curves are shifted upward compared

with the dashed curves).

Page 93: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 81

1 2 3 4 5 6 7 8 9 10

35

40

45

50

55

60

65

λ2 (unit/km2)Sel

ection

thre

shold

(km

/h)

B1/B2 = 2, UR = 1B1/B2 = 2, UR = 1.05B1/B2 = 1, UR = 1B1/B2 = 1, UR = 1.05B1/B2 = 0.5, UR = 1B1/B2 = 0.5, UR = 1.05

Figure 6.11: Two-tier case: tier selection velocity threshold.

2 4 6 8 10 12 14 16 18 200

10

20

30

40

50

60

70

80

90

λ3 (unit/km2)

Sel

ection

thre

shol

d(k

m/h

)

1,3

1,3

1,2

1

UR = 1 UR = 1.05

1,2,3

1,2 performs best

1 performs best

1,2,3 performs best

1,3 performs best

Figure 6.12: Three-tier case. The set of dashed and solid curves show the velocity threshold valuesfor tier selection, under UR = 1 and UR = 1.05, respectively. Each set of curves separates the planeinto multiple regions, and each region corresponds to a specific optimal tier selection scheme (labeledin the region). For example, a vertical line at λ3 = 16 has 3 intersections with the set of solid curves,illustrating that under λ3 = 16 and UR = 1.05, tier selections 1, 2, 3, 1, 3, 1, 2, and 1 are optimalin four different velocity ranges separated by the 3 intersections.

6.2 Handoff Rate Analysis in HWNs with Poisson and Poisson

Cluster Patterns

In Section 6.1, we employed the conventional assumption on HWNs that each BS tier forms a homoge-

neous PPP. However, the PPP model cannot capture the non-uniform and dependent aggregation of BSs

in, for example, popular regions of the network where more BSs tend to be installed, as the positions

of the points in PPP are independent of each other. In this section, as an extension of Section 6.1, we

accommodate the non-uniform and dependent aggregation by modeling some BS tiers as Poisson cluster

processes (PCPs) [39]. Each BS cluster includes multiple nearby BSs, and multiple BS clusters are ran-

domly distributed in space. In this case, the resultant cell splitting is a tessellation generated by both

PPPs and PCPs. Through our improved stochastic and analytic geometric analysis, we derive exact

expressions for the rates of all handoff types experienced by an active user with arbitrary movement

trajectory.

6.2.1 System Model

We consider an HWN with randomly distributed K tiers of BSs. It includes KP Poisson tiers (P-tiers)

and KC Poisson cluster tiers (C-tiers), so that K = KP +KC . Let KP = 1, . . . ,KP denote the set of

P-tiers, and KC = KP + 1, . . . ,KP +KC denote the set of C-tiers. Let K = 1, . . . ,KP +KC.

Page 94: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 82

-2 -1.5 -1 -0.5 0 0.5 1 1.5 2

-2

-1.5

-1

-0.5

0

0.5

1

1.5

2

Figure 6.13: An example of a two-tier HWN with Poisson and Poisson cluster patterns. Tier-1 and 2BSs are represented by “” and “”, respectively. Tier-2 BSs are clustered in four disk regions. Blue,red, and green curves show cell boundaries within tier-1, between tier-1 and tier-2, and within tier-2,respectively. The magenta arrow represents the trajectory of an active UE. The UE makes two handoffsat the intersections between its trajectory and the set of cell boundary.

Let Φk denote the point process representing the locations of tier-k BSs. If k ∈ KP , Φk is a

homogeneous PPP with intensity of λk on the two-dimensional space R2. If k ∈ KC , Φk is a PCP defined

as follows: First, cluster centers are generated as a parent point process Θk, which is a homogeneous

PPP with intensity µk on the two-dimensional space R2. Second, for each parent point (cluster center) x

in Θk, a cluster of BSs form a child point process Ωk(x), which is a PPP with intensity νk in the region

B(x, Rk), where B(x, r) is defined as the disk region centered at x with radius r. The overall PCP Φk

is the union of all child point processes, i.e., Φk =∪

x∈ΘkΩk(x). Note that Φk does not include parent

points Θk. Given the location of some BS xBS in a tier-k PCP, let C(xBS) denote the cluster center of

the BS. Thus Ωk(C(xBS)) is the cluster it belongs to.

In this section, the assumptions on the biased user association, UE trajectory, and handoffs are

exactly the same with those in Sections 6.1.1.2 and 6.1.1.3. The definitions of Pk, Bk, βkj , T0, T(1),

T(1)kj , N (T0,T(1)), Nkj(T0,T(1)

kj ) are exactly the same as those defined in Sections 6.1.1.2 and 6.1.1.3.

Note that since a BS tier is modeled as a PPP or a PCP, the resultant cell splitting is a tessellation

generated by both PPPs and PCPs. An example cell splitting is shown in Fig. 6.13 (a two-tier scenario

including one P-tier and one C-tier).

6.2.2 Handoff Rate Analysis

Following Section 6.1.2, the proposed analysis of handoff rates consists of a progressive sequence of four

components, which are described in the following subsections.

6.2.2.1 Length Intensity of Cell Boundaries

Following Section 6.1.2.1, we first study the length intensity of different types of cell boundaries T(1)kj ,

which is defined as the expected length of T(1)kj in a unit square.

The set of cell boundaries T(1)kj is generated by all K tiers of BSs Φ1,Φ2, . . . ,ΦK . It corresponds to

the set of points on R2 where the same biased power level is received from a tier-k BS and a tier-j BS,

and this biased received power level is greater than those from any other BS in all tiers. Mathematically,

Page 95: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 83

T(1)kj is expressed as

T(1)kj =

x

∣∣∣∣∣∃x1 ∈ Φk,x2 ∈ Φj ,x1 = x2,

s.t. Pr =PkBk

|x1 − x|γ=

PjBj

|x2 − x|γ, and ∀i ∈ K,y ∈ Φi, Pr ≥ PiBi

|y − x|γ

. (6.35)

A main challenge in this section is in characterizing handoff rates across the highly irregular cell

boundaries generated by BSs that form PCPs. If we consider the cell boundaries within tier-k, and

tier-k is a C-tier (i.e., k ∈ KC), then we can further classify the set of cell boundaries T(1)kk into the set

of intra-cluster cell boundaries (i.e., the two BSs that provide the largest biased received power belong

to the same cluster), which is denoted by T(1)kk,in, and the set of inter-cluster cell boundaries (i.e., the

two BSs belong to two different clusters), which is denoted by T(1)kk,out. We formally express

T(1)kk,in =

x

∣∣∣∣∣∃x1 ∈ Φk,x2 ∈ Φk,x1 = x2, C(x1) = C(x2), (6.36)

s.t. Pr =PkBk

|x1 − x|γ=

PjBj

|x2 − x|γ, and ∀i ∈ K,y ∈ Φi, Pr ≥ PiBi

|y − x|γ

.

Similarly, by replacing C(x1) = C(x2) by C(x1) = C(x2) in (6.36), we have the expression of T(1)kk,out.

Note that we have T(1)kk = T

(1)kk,in

∪T

(1)kk,out. Also, if k, j ∈ KC and k = j, we cannot classify T

(1)kj in

the same way, as the cell boundary is surely formed by two BSs in two different clusters in two different

tiers.

Let µ1

(T

(1)kj

)denote the length intensity of T

(1)kj , which is the expected length of T

(1)kj in a unit square.

Because Φ1, . . . ,ΦK are stationary, T(1)kj is also stationary, and thus the unit square could be arbitrarily

picked on R2. Hence, we have

µ1

(T

(1)kj

)= E

(∣∣∣T(1)kj

∩[0, 1)2

∣∣∣1

), (6.37)

where |L|1 denotes the length of a collection of curves L (i.e., one-dimensional Lebesgue measure of L).

Similarly, if k ∈ KC ,

µ1

(T

(1)kk,x

)= E

(∣∣∣T(1)kk,x

∩[0, 1)2

∣∣∣1

), (6.38)

where the subscript “x” indicates either “in” or “out”. Note that µ1

(T

(1)kk

)= µ1

(T

(1)kk,in

)+µ1

(T

(1)kk,out

).

6.2.2.2 ∆d-Extended Cell Boundaries

Following Section 6.1.2.2, we study the ∆d-neighbourhoods of T(1)kj , denoted by T

(2)kj (∆d).

T(2)kj (∆d) =

x∣∣∣∃y ∈ T

(1)kj , s.t. |x− y| < ∆d

. (6.39)

Similarly, T(2)kk,in(∆d) and T

(2)kk,out(∆d) are defined as the ∆d-neighbourhoods of T

(1)kk,in and T

(1)kk,out,

respectively.

Page 96: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 84

The area intensity of T(2)kj (∆d) is defined as the expected area of T

(2)kj (∆d) in a unit square:

µ2

(T

(2)kj (∆d)

)= E

(∣∣∣T(2)kj (∆d)

∩[0, 1)2

∣∣∣) , (6.40)

where |S| denotes the area of some region S (i.e., two-dimensional Lebesgue measure of S).

The area intensity of T(2)kj (∆d) is equal to the probability that the reference UE at 0 is in T

(2)kj (∆d).

µ2

(T

(2)kj (∆d)

)= P(0 ∈ T

(2)kj (∆d)). (6.41)

Similarly, if k ∈ KC ,

µ2

(T

(2)kk,x(∆d)

)= P(0 ∈ T

(2)kk,x(∆d)), (6.42)

where the subscript “x” indicates either “in” or “out”.

6.2.2.3 Derivation of Area Intensities

In this subsection, we present the derivation of P(0 ∈ T(2)kj (∆d)). It consists of a progressive sequence of

four steps. In the first step, we recall a few important properties of two intersecting circles, which will be

frequently used in the subsequent steps. In the second step, we study the distribution of the distance from

the reference UE at 0 to the BS it is associated with, which is referred to as the reference BS throughout

the rest of this section. In the third step, we study the conditional probability of 0 ∈ T(2)kj (∆d) given

the distance from the reference UE to the reference BS. Based on step two and step three, we derive the

unconditioned probability of 0 ∈ T(2)kj (∆d) in the fourth step.

6.2.2.3.1 Geometric Patterns of Two Intersecting Circles We first recall a few important

properties of two intersecting circles (as shown in Fig. 6.14), which will be frequently used in the subse-

quent steps to derive P(0 ∈ T(2)kj (∆d)). Let r1 and r2 be the radii of these circles, and r be the distance

between their centers. We assume |r1 − r2| ≤ r ≤ r1 + r2.

As labeled in Fig. 6.14, let C(r1, r2, r) denote the area of the overlapping part of the two circles,

L(r1, r2, r) denote the arc length of circle 1 covered by circle 2, and θm(r1, r2, r) denote the half central

angle corresponding to the arc. The expressions of C(·), L(·), and θm(·) are all in closed form, which

are shown as follows:

C(r1, r2, r) = arccos((r21 + r2 − r22)/(2r1r)

)· r21 + arccos

((r22 + r2 − r21)/(2r2r)

)· r22

− 2√((r1 + r2 + r)/2) ((r1 + r2 + r)/2− r1) ·

√((r1 + r2 + r)/2− r2) ((r1 + r2 + r)/2− r),

(6.43)

L(r1, r2, r) = 2r1 arccos((r21 + r2 − r22)/(2r1r)

), (6.44)

θm(r1, r2, r) = arccos((r21 + r2 − r22)/(2r1r)

). (6.45)

Note that θm(r1, r2, r) = θm(r, r2, r1).

Page 97: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 85

r1

r2

rC(r1, r2, r)

L(r1, r2, r)m(r1, r2, r)

Figure 6.14: Geometric patterns of two intersecting circles.

6.2.2.3.2 Distance Distribution of Reference UE-BS Pair Let Rk denote the distance from

0 to the nearest tier-k BS. If k ∈ KP , i.e., Φk is a PPP, by the Markovian property of PPPs, it is

straightforward to derive the complementary cumulative distribution function (ccdf) and probability

density function (pdf) of Rk:

ccdfRk(R0) =P(Rk > R0) = exp

(−πR2

0λk

), (6.46)

pdfRk(R0) =2πR0λk

(−πR2

0λk

). (6.47)

If k ∈ KC , the ccdf of Rk is more complex due to the dependent and non-uniform aggregation of

points in PCP. It can be shown in Appendix C.3 that

ccdfRk(R0) , P(Rk > R0) = (6.48) exp[− π(R0 −Rk)

2µk

(1− e−πR2

kνk

)−∫ R0+Rk

R0−Rk2πrµk

(1− e−C(R0,Rk,r)νk

)dr], if R0 ≥ Rk,

exp[− π(R0 −Rk)

2µk

(1− e−πR2

0νk

)−∫ Rk+R0

Rk−R02πrµk

(1− e−C(R0,Rk,r)νk

)dr], if R0 < Rk.

By taking the first derivative, we find the pdf of Rk as

pdfRk(R0) = (6.49)

exp[− π(R0 −Rk)

2µk

(1− e−πR2

kνk

)−∫ R0+Rk

R0−Rk2πrµk

(1− e−C(R0,Rk,r)νk

)dr]

·µk

∫ R0+Rk

R0−Rk2πre−νkC(R0,Rk,r)νkL(R0, Rk, r)dr, if R0 ≥ Rk,

exp[− π(R0 −Rk)

2µk

(1− e−πR2

0νk

)−∫ Rk+R0

Rk−R02πrµk

(1− e−C(R0,Rk,r)νk

)dr]

·µk

[2π2(Rk −R0)

2R0e−πR2

0νkνk +∫ Rk+R0

Rk−R02πre−νkC(R0,Rk,r)νkL(R0, Rk, r)dr

], if R0 < Rk.

We note that the reference UE is placed at 0. Hence, Rk is also the distance from the reference UE to

its nearest BS in tier-k. However, the reference UE is associated with the BS providing the largest biased

received power (i.e., the reference BS), which may not be the nearest BS. Let R denote the distance

between the reference UE and the reference BS. The probability that the reference BS is a tier-k BS and

R is greater than some R0 is derived as follows:

P[R > R0, tier = k] = P[R > R0|tier = k]P[tier = k]

=

∫ ∞

R0

K∏i=1,i=k

P[Ri > βikr]pdfRk(r)dr. (6.50)

Page 98: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 86

The last equality reflects the fact that the biased received power from the nearest BSs in all other tiers

should not exceed that from the reference BS.

Let pdfR|k(R0) denote the pdf of R given that the reference BS is in tier-k, and let fR,k(R0) ,pdfR|k(R0)P[tier = k], we have

fR,k(R0) =

K∏i=1,i =k

ccdfRi(βikR0) · pdfRk(R0). (6.51)

6.2.2.3.3 Conditional Probability of 0 ∈ T(2)kj (∆d) In this subsection, we study the conditional

probabilities that the reference UE at 0 is in T(2)kj (∆d), given that it is associated with a tier-k BS

(reference BS) at a distance of R0 from it, which is denoted as P(0 ∈ T

(2)kj (∆d)|R = R0, tier = k

). By

employing both analytic geometric and stochastic geometric tools, we derive the probability in different

cases, given in Theorems 15-18 below. We note that the handoff rates for P-tiers are already known in

Section 6.1. These theorems additionally address boundaries between P-tiers and C-tiers, boundaries

between different C-tiers, and inter-cluster and intra-cluster boundaries within a C-tier.

For brevity, we define the following quantities that will be used extensively in the rest of this section:

F(β) , 1

β2

∫ π

0

√(β2 + 1)− 2β cos(θ) dθ, (6.52)

and

Hkj(R0) ,1

πF(βkj)βkj

pdfRj(R0βjk)

ccdfRj (R0βjk). (6.53)

Theorem 15. If tier-j is a P-tier, i.e., j ∈ KP , for all k ∈ K (k = j is allowed), we have

P(0 ∈ T

(2)kj (∆d)|R = R0, tier = k

)= 2λj∆dR0F(βkj) +O(∆d2). (6.54)

See Appendix C.4 for the proof.

Theorem 16. If tier-j is a C-tier, i.e., j ∈ KC , for all k ∈ K, k = j, we have

P(0 ∈ T

(2)kj (∆d)|R = R0, tier = k

)= Hkj(R0)∆d+O(∆d2). (6.55)

See Appendix C.5 for the proof.

Theorem 17. If tier-k is a C-tier, i.e., k ∈ KC , we have

P(0 ∈ T

(2)kk,out(∆d)|R = R0, tier = k

)= Hkk(R0)∆d+O(∆d2). (6.56)

Proof. Given the reference tier-k BS located at xBS, we know that xBS belongs to some BS cluster

Ωk(C(xBS)). Because the point process of cluster centers Θk is a PPP, by the Slivnyak Theorem [37], the

set of all cluster centers other than C(xBS) remain a PPP with the same statistics as Θk. Consequently,

if we denote the set of all tier-k BSs other than the cluster Ωk(C(xBS)) as Φ′k, then Φ′

k remains a PCP

with the same statistics as Φk. Because the set of inter-cluster cell boundaries T(2)kk,out(∆d) is generated

by xBS and Φ′k, and Φ′

k is still a PCP, the proof of Theorem 17 is the same as that of Theorem 16.

Page 99: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 87

The set of intra-cluster cell boundaries T(2)kk,in(∆d) is generated by xBS and Ωk(C(xBS))\xBS. We

have the following theorem:

Theorem 18. If tier-k is a C-tier, i.e., k ∈ KC , we have P(0 ∈ T

(2)kk,in(∆d)|R = R0, tier = k

)=

Gk(R0)∆d+O(∆d2), where Gk(R0) is expressed as follows:

If R0 ≥ Rk,

Gk(R0) =

∫ R0+Rk

R0−RkrνkR0 (16θm(r,Rk, R0)− 16 sin(θm(r,Rk, R0))) exp(−νkC(R0, Rk, r))dr∫ R0+Rk

R0−Rk2θm(r,Rk, R0)r exp(−C(R0, Rk, r)νk)dr

. (6.57)

If R0 < Rk,

Gk(R0) =π(Rk − R0)

2 exp(−πR2

0νk

)8νkR0 +

∫ Rk+R0Rk−R0

rνkR0 (16θm(r,Rk, R0) − 16 sin(θm(r, Rk, R0))) exp(−νkC(R0, Rk, r))dr

π(Rk − R0)2 exp(−πR2

0νk

)+

∫ Rk+R0Rk−R0

2θm(r,Rk, R0)r exp(−C(R0, Rk, r)νk)dr.

(6.58)

See Appendix C.6 for the proof.

6.2.2.3.4 Unconditioned Probability of 0 ∈ T(2)kj (∆d) Through deconditioning on R, we derive

the unconditioned probabilities that the reference UE at 0 is in T(2)kj (∆d). If k = j, we have

P(0 ∈ T(2)kj (∆d)) =

∫ ∞

0

P(0 ∈ T(2)kj (∆d)|R = R0, tier = k)fR,k(R0)dR0 (6.59)

+

∫ ∞

0

P(0 ∈ T(2)kj (∆d)|R = R0, tier = j)fR,j(R0)dR0.

If k ∈ KP , we have

P(0 ∈ T(2)kk (∆d)) =

∫ ∞

0

P(0 ∈ T(2)kk (∆d)|R = R0, tier = k)fR,k(R0)dR0. (6.60)

If k ∈ KC , we have

P(0 ∈ T(2)kk,x(∆d)) =

∫ ∞

0

P(0 ∈ T(2)kk,x(∆d)|R = R0, tier = k)fR,k(R0)dR0, (6.61)

where the subscript “x” indicates either “in” or “out”.

6.2.2.4 From Area Intensities to Handoff Rates

Next, we compute the handoff rates using the area intensities derived in Section 6.2.2.3.

First, following Section 6.1.2.4, we derive the length intensity µ1

(T

(1)kj

)µ1

(T(1)

y

)= lim

∆d→0

µ2

(T

(2)y (∆d)

)2∆d

, (6.62)

where the subscript “y” indicates “kj”, “kk, in”, or “kk, out”.

Consequently, combining (6.51)-(6.62), we have

Page 100: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 88

0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

1

2

3

4

5

6

7

8

9

10

11

µ2 (unit/km2)

Han

doff

rate

(unit/hour)

1 − 1, analytical1 − 1, simulation1 − 2 or 2 − 1, analytical1 − 2, simulation2 − 1, simulation2 − 2 intra-cluster, analytical2 − 2 intra-cluster, simulation2 − 2 inter-cluster, analytical2 − 2 inter-cluster, simulation2 − 2 all, analytical2 − 2 all, simulation

1 − 1, Poisson

1 − 2 or 2 − 1, Poisson

2 − 2, Poisson

Figure 6.15: Accuracy of PCP handoff rate analysis under different µ2 values, for µ2 · ν2 = 0.5. Forcomparison, black dashed lines indicate analytical results assuming all PPP BSs.

Case 1: If k, j ∈ KP and k = j,

µ1

(T

(1)kj

)=

∫ ∞

0

K∏i=1,i=k

ccdfRi(βikR0)pdfRk(R0)λjR0F(βkj)dR0 (6.63)

+

∫ ∞

0

K∏i=1,i=j

ccdfRi(βijR0)pdfRj

(R0)λkR0F(βjk)dR0.

Case 2: If k ∈ KP we have

µ1

(T

(1)kk

)=

∫ ∞

0

K∏i=1,i=k

ccdfRi(βikR0)pdfRk(R0)λkR0F(1)dR0. (6.64)

Case 3: If k ∈ KP and j ∈ KC , µ1

(T

(1)kj

)can be obtained by replacing the term λjR0F(βkj) with

12Hkj(R0) in (6.63).

Case 4: If k, j ∈ KC and k = j, µ1

(T

(1)kj

)can be obtained by replacing the term λjR0F(βkj) with

12Hkj(R0) and the term λkR0F(βjk) with

12Hjk(R0) in (6.63).

Case 5: If k ∈ KC , by replacing the term λkR0F(1) with 12Hkk(R0) and

12Gk(R0) in (6.64), we find

the expressions of µ1

(T

(1)kk,out

)and µ1

(T

(1)kk,in

), respectively.

Let v denote the instantaneous velocity of an active UE, and Hkj(v) denote its type k-j handoff rate.

Following Section 6.1.2.4, we have:

Hkj(v) =

1πµ1

(T

(1)kj

)v, if k = j,

2πµ1

(T

(1)kj

)v, if k = j.

(6.65)

6.2.3 Numerical Study

In this subsection, we present simulation studies to validate the accuracy and usefulness of the pro-

posed analytical framework. In each round of simulation, multiple tiers of BSs are generated on a 20

km × 20 km square. Then, we randomly generate 5 waypoints X1,X2, . . . ,X5 in the central 10 km

× 10 km square. The four line segments X1X2,X2X3, . . . ,X4X5 form the trajectory of an active UE

in one round of simulation. By tracking which BSs the UE is associated with along its trajectory, we

can obtain its handoff rates in this round of simulation. Each simulation data point is averaged over

2000 simulation rounds. Error bars in the figures show the 95% confidence intervals for simulation results.

Page 101: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 89

0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 20

2

4

6

8

10

12

14

λ1 (unit/km2)

Han

doff

rate

(unit/hour)

1 − 1, analytical1 − 1, simulation1 − 2 or 2 − 1, analytical1 − 2, simulation2 − 1, simulation2 − 2 intra-cluster, analytical2 − 2 intra-cluster, simulation2 − 2 inter-cluster, analytical2 − 2 inter-cluster, simulation

Figure 6.16: Handoff rates under different λ1 values.

10−1

100

101

0

2

4

6

8

10

12

B2

Han

doff

rate

(unit/hour)

1 − 1, analytical1 − 1, simulation1 − 2 or 2 − 1, analytical1 − 2, simulation2 − 1, simulation2 − 2 intra-cluster, analytical2 − 2 intra-cluster, simulation2 − 2 inter-cluster, analytical2 − 2 inter-cluster, simulation

Figure 6.17: Handoff rates under different B2 values.

6.2.3.1 Comparison with PPP Modeling

First, we focus on a two-tier HWN with one P-tier (representing macrocell BSs) and one C-tier (repre-

senting clustered femtocell BSs). Tier-1 is the P-tier, with λ1 = 1 unit/km2, P1 = 30 dBm, and B1 = 1;

tier-2 is the C-tier, with R2 = 1 km, P2 = 20 dBm, and B2 = 1; γ = 3.5; and v = 10 km/hour. In

Fig. 6.15, we study the handoff rates under different µ2 values while maintaining a constant µ2ν2 = 0.5

(i.e., the overall tier-2 BS intensity is a constant 0.5π unit/km2). For reference, we also show the handoff

rates (black dashed lines) if tier-2 is replaced by a P-tier with the same BS intensity of 0.5π unit/km2.

Fig. 6.15 shows that the actual handoff rates obtained from simulation match well with the proposed

analysis, while they are far from the dashed lines when µ2 is small (and ν2 is large). This interesting

observation suggests that using a simple PPP to model the BSs as in can lead to substantial numeri-

cal errors in computing the handoff rates in HWNs with clustered BSs. The PPP model gives a close

approximation only when the cluster intensities are high but per cluster BS intensities are low in the

C-tier. In general, we observe that the actual handoff rates vary drastically as µ2 and ν2 change, which

can be accounted for only by the proposed PCP analysis.

6.2.3.2 Effect of BS Densities and Association Bias Values

We further study the influence of different network parameters on the handoff rates. In Figs. 6.16 and

6.17, we consider a two-tier network with the same default parameter values as in Fig. 6.15, except

µ2 = 0.5 unit/km2 and ν2 = 1 unit/km2.

Fig. 6.16 shows handoff rates under different tier-1 BS intensities λ1. The figure illustrates that

increasing λ1 leads to a higher type 1-1 handoff rate but a lower type 2-2 handoff rate. Fig. 6.17

Page 102: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 6. Stochastic Geometric Analysis of User Mobility in HWNs 90

1,1 1,2/2,1 2,2 1,3/3,1 1,4/4,1 2,3/3,2 2,4/4,2 3,3,out 3,3,in 3,4/4,3 4,4,out 4,4,in0

1

2

3

4

5

6

Handoff type

Han

doff

rate

(unit/hour)

AnalyticalSimulation

Figure 6.18: Handoff rates, two P-tiers and two C-tiers.

shows the handoff rates under different tier-2 association bias values B2. We observe that increasing the

association bias value of one tier has a similar effect as increasing the BS intensity of this tier, leading

to a higher horizontal handoff rate within this tier, but lower handoff rates outside the tier. Moreover,

both figures illustrate that the simulation results agree with the analytical results, demonstrating the

correctness of our analysis for different types of handoff rates.

6.2.3.3 A More Complex Example

In Fig. 6.18, we study different types of handoff rates in a network with four tiers. The network pa-

rameters are as follows: Tier-1 and tier-2 are P-tiers, with (λ1, λ2) = (1, 1) unit/km2; tier-3 and tier-4

are C-tiers, with (µ3, µ4) = (0.5, 1) unit/km2, (R3, R4) = (0.9, 1.1) unit/km2, and (ν3, ν4) = (1, 0.5)

unit/km2; (P1, P2, P3, P4) = (30, 33, 20, 23) dBm; (B1, B2, B3, B4) = (1, 1, 1, 1); γ = 3.5; and v = 10

km/hour. In order to avoid redundancy, we only show the sum rate of type k-j and type j-k (k = j)

handoffs for easier inspection; the individual handoff rates are half of the sum handoff rate. We again

observe that the simulation results agree with the analytical results, validating the correctness of our

analysis. We further observe that the handoff rates of types 2-2, 2-3/3-2, and 2-4/4-2 are higher than

those of 1-1, 1-3/3-1, and 1-4/4-1, respectively, due to the higher transmission power of tier-2 BSs com-

pared with tier-1 BSs. The handoff rates of types 4-4, 1-4/4-1, and 2-4/4-2 are higher than those of 3-3,

1-3/3-1, and 2-3/3-2, respectively, due to the higher transmission power and higher intensity of tier-4

BSs, i.e., πR24µ4ν4, compared with tier-3 BSs.

6.3 Summary

In this chapter, we provide a theoretical framework to study user mobility in multi-tier HWNs. Through

a stochastic geometric framework, we capture the irregularly shaped network topologies introduced by

the small-cell structure. In Section 6.1, we are able to capture (1) the spatial randomness of BSs, and

(2) the various scales of cell sizes. In Section 6.2, we additionally capture (3) the non-uniform and

dependent aggregation of BSs, by allowing BSs to form Poisson cluster processes. Analytical expressions

for the rates of all handoff types experienced by an active UE with arbitrary movement trajectory are

derived. In addition, we study the downlink data rate of the UE under different tier selections. Based

on these results, we propose an optimal tier selection formulation considering both the handoff rates and

the data rate. Empirical study on the Yonsei Trace and extensive simulation are conducted, validating

the accuracy and usefulness of our analytical conclusions.

Page 103: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 7

Conclusions

In this thesis, we develop new methods and models to evaluate and design HWNs by investigating user

load, interference patterns, and user mobility, the results of which provide new analytical insights and

design guidelines that will help improve the performance of HWNs.

In Chapter 3, we focus on the evaluation of user load through characterizing the joint distribution of

users in different cells in an HWN with arbitrary user movement trajectories and dependently distributed

user channel holding times. Through developing a new queueing network model, we derive a closed-form

expression for the user distribution, revealing several desirable properties: the joint user distribution is

only related to the average arrival rate and the average channel holding time of each cell, and hence

it is insensitive to the general user movement patterns and distributions of channel holding times;

the marginal user distribution within a single cell depends only on the average arrival rate and the

average channel holding time at that cell. These properties suggest that accurate evaluation of the

user distribution and other associated metrics such as the system workload can be achieved with low

complexity, without the need to collect a large amount of user location data.

In Chapter 4, we study the interference patterns in HWNs with randomly spatially distributed users

and BSs. We additionally characterize the outage performance of closed access mode and open access

mode. However, in order to capture the complicated spatial patterns of users and BSs, the mathematical

expressions of the outage performance inevitably involve multiple folds of integrals. Therefore, we further

derive sufficient conditions in simple expressions for open and closed access modes to outperform each

other, at either the macrocell or the femtocell level. Further, we prove that the maximum allowable ratio

of the received power level of an open access user in the femtocell to its original received power level in

the macrocell is in the scale of Θ((

Rc

R

)γ)(where Rc, R, and γ represent the radius of macrocells, the

radius of femtocells, and path loss exponent, respectively), so that the network can benefit through the

replacement of closed access by open access.

In Chapter 5, we study the spectrum allocation and user association problem in HWNs with random

distributed users and BSs for optimizing the average user data rate. Both the user load and interference

patterns are considered. We first derive the average user data rate through stochastic geometric analysis.

The expression is employed as the objective function of the optimization problem, which is non-convex

in nature and cannot be solved with a standard method. Then, we propose an innovative approach,

solving the optimization problem optimally for low user density, and asymptotically optimally for high

user density. In this chapter, if the spectrum allocation factors are not constrained, SSAUA leads to a

91

Page 104: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Chapter 7. Conclusions 92

simple solution, where only the BS tier with the highest density will be allocated with 100% spectrum,

which may not be desirable in reality. Therefore, the user data rate may not be the only design goal.

It will also be crucial to benefit network traffic through improving network fairness, decreasing traffic

delay, reducing data rate fluctuation, and improving quality of experience, which are still challenging

open problems left for future research.

In Chapter 6, a stochastic geometric analysis framework on user mobility is proposed, which captures

the spatial randomness and various scales of cell sizes in different tiers. We derive theoretical expressions

for the rates of all handoff types experienced by an active user with an arbitrary movement trajectory.

In Section 6.1, we employ the conventional assumption on HWNs that each BS tier forms a homogeneous

PPP. In Section 6.2 we further extend the analysis by allowing BSs to form PCPs, in order to capture

their non-uniform and dependent aggregation in space. Then, we provide guidelines for tier selection

under various user velocity, so that an optimal tradeoff between the handoff rate and the data rate can

be achieved. The handoff rates in this chapter are derived under the assumption that the BSs in each

tier form PPPs or PCPs. In reality, BSs may be even more complicated distributed (e.g., Matern hard

core point process). Handoff analysis for more general BS models remains a challenging open problem

for future research.

Page 105: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix A

Proofs of Theorems in Chapter 4

A.1 Proof of Theorem 3

LI(s) = E (exp(−sI)) = E

[ ∏x∈Φ0

u(x, s)∏

x0∈Θ

∏x∈Ω(x0)

v(x,x0, s)∏

x0∈Θ

∏x∈Ψ(x0)

w(x,x0, s)

](A.1)

=E

[E( ∏

x∈Φ0

u(x, s)

∣∣∣∣Θ)E( ∏x0∈Θ

∏x∈Ω(x0)

v(x,x0, s)

∣∣∣∣Θ)E( ∏x0∈Θ

∏x∈Ψ(x0)

w(x,x0, s)

∣∣∣∣Θ)]

(A.2)

=E

[E( ∏

x∈Φ0

u(x, s)

∣∣∣∣Θ)E( ∏

x∈Φ1

u(x, s)

∣∣∣∣Θ)E( ∏

x∈Φ1

u(x, s)

∣∣∣∣Θ)E( ∏

x0∈Θ

∏x∈Ω(x0)

v(x,x0, s)

∣∣∣∣Θ)E( ∏x0∈Θ

∏x∈Ψ(x0)

w(x,x0, s)

∣∣∣∣Θ)]

(A.3)

=E

[E( ∏

x∈Φ

u(x, s)

∣∣∣∣Θ)E(∏

x0∈Θ

∏x∈Ω(x0)

v(x,x0, s)

∣∣∣∣Θ)E(∏

x0∈Θ

∏x∈Ω(x0)

u(x, s)

∣∣∣∣Θ) E( ∏

x0∈Θ

∏x∈Ψ(x0)

w(x,x0, s)

∣∣∣∣Θ)]

(A.4)

=E( ∏

x∈Φ

u(x, s)

)E

[ ∏x0∈Θ

(E(∏

x∈Ω(x0)v(x,x0, s)

)E(∏

x∈Ω(x0)u(x, s)

) E( ∏

x∈Ψ(x0)

w(x,x0, s)))]

. (A.5)

Proof. The steps to derive Theorem 3 is shown in (A.1)-(A.5), where Φ0 is the point process correspond-

ing to macrocell UEs not inside any femtocell, Φ1 is the point process corresponding to macrocell UEs

inside some femtocell, and Φ is the aggregation of Φ0 and Φ1.

By the law of total expectation, we derive (A.2) from (A.1). Φ1 can be rewritten as the union of all the

open access UEs in each femtocell, so E(∏

x∈Φ1 u(x, s)

∣∣∣∣Θ) is equal to E(∏

x0∈Θ

∏x∈Ω(x0)

u(x, s)

∣∣∣∣Θ).In addition, because Φ is the aggregation of Φ0 and Φ1, E

( ∏x∈Φ0

u(x, s)

∣∣∣∣Θ) E( ∏

x∈Φ1

u(x, s)

∣∣∣∣Θ) is equal

to E(∏

x∈Φ u(x, s)

∣∣∣∣Θ). By considering the two equalities, we derive (A.4) from (A.3). Finally, we

obtain (A.5) from the law of total expectation.

93

Page 106: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix A. Proofs of Theorems in Chapter 4 94

A.2 Proof of Theorem 4

Proof. We use the fact that P and Rc can be normalized and set P = Rc = 1. Furthermore, we substitute

s = T into (4.6), (4.7), and (4.8) such that

W(x0, T ) = exp

(−

∫B(0,R)

TQ|x|γ

TQ|x|γ + |x+ x0|γν(x)dx

), (A.6)

V(x0, T ) = exp

(− λ

∫B(0,R)

Tρ|x|γ

Tρ|x|γ + |x+ x0|γdx

), (A.7)

U(x0, T ) = exp

(− λ

∫B(x0,R)

T |x− BS(x)|γ

T |x− BS(x)|γ + |x|γdx

). (A.8)

(a) A sufficient condition for P oout < P c

out

According to (4.10), (4.11), (4.13), and (4.14), P oout < P c

out iff

exp

(− µ

∫R2

(1− V(x0,T )

U(x0,T )W(x0, T ))dx0

)exp

(− µ

∫R2

(1−W(x0, T )

)dx0

) > 1, (A.9)

which is equivalent to ∫R2

(V(x0, T )

U(x0, T )− 1

)W(x0, T )dx0 > 0. (A.10)

Let

V (x0) =

∫B(x0,R)

Tρ|x− x0|γ

Tρ|x− x0|γ + |x|γdx =

∫B(0,R)

Tρ|x|γ

Tρ|x|γ + |x+ x0|γdx, (A.11)

U(x0) =

∫B(x0,R)

T |x− BS(x)|γ

T |x− BS(x)|γ + |x|γdx. (A.12)

Then, (A.10) becomes ∫R2

(exp(−λV (x0))

exp(−λU(x0))− 1

)W(x0, T )dx0 > 0. (A.13)

Because exp(A)−1 ≥ A for arbitraryA, andW(x0, T ) > 0, we have∫R2

(exp(−λV (x0))exp(−λU(x0))

− 1)W(x0, T )dx0 >∫

R2 (−λV (x0) + λU(x0))W(x0, T )dx0. Therefore, the following inequality is a sufficient condition for

(A.13): ∫R2

(−λV (x0) + λU(x0))W(x0, T )dx0 > 0. (A.14)

Let Wmin and Wmax be the lower bound and upper bound of W(x0, T ), respectively. According to

Page 107: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix A. Proofs of Theorems in Chapter 4 95

(4.6), Wmax = 1 and Wmin = e−ν . Thus, the following is a sufficient condition for (A.14):

−Wmax

∫R2

V (x0)dx0 +Wmin

∫R2

U(x0)dx0 > 0. (A.15)

Let V =∫R2 V (x0)dx0, we have the following lemma corresponding to the upper and lower bounds

of V.

Lemma 5. Suppose γ > 2. Let

Vmax = 4π2R4(Tρ)2γ

(1

8+

1

4(γ + 2)+

1

(γ + 2)(γ − 2)

), (A.16)

Vmin = 2π2R4(Tρ)2γ

(1

8+

1

4(γ + 2)+

1

(γ + 2)(γ − 2)

). (A.17)

Then Vmin ≤ V ≤ Vmax.

See Appendix A.5 for the proof.

Hence, the following is a sufficient condition for (A.15):

−WmaxVmax +Wmin

∫R2

U(x0)dx0 > 0. (A.18)

In addition, we have∫R2

U(x0)dx0 =

∫R2

∫B(x0,R)

(T |x− BS(x)|γ

T |x− BS(x)|γ + |x|γ

)dxdx0

= πR2

∫R2

(T |x− BS(x)|γ

T |x− BS(x)|γ + |x|γ

)dx = πR2Cu, (A.19)

where

Cu =

∫R2

(T |x− BS(x)|γ

T |x− BS(x)|γ + |x|γ

)dx (A.20)

is only related to predetermined system-level constants T and γ.

As a consequence, (A.18) becomes

−WmaxVmax +WminπR2Cu > 0. (A.21)

(b) A sufficient condition for P oout > P c

out

According to (4.10), (4.11), (4.13), and (4.14), P oout > P c

out iff

exp

(− µ

∫R2

(1−W(x0, T )

)dx0

)exp

(− µ

∫R2

(1− V(x0,T )

U(x0,T )W(x0, T ))dx0

) > 1, (A.22)

Similar to the steps in (A.9)-(A.14), the following is a sufficient condition for (A.22):∫R2

(−λU(x0, T ) + λV (x0, T ))V(x0, T )

U(x0, T )W(x0, T )dx0 > 0. (A.23)

Page 108: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix A. Proofs of Theorems in Chapter 4 96

Let W ′min and W ′

max be the lower bound and upper bound of V(x0,T )U(x0,T )W(x0, T ), respectively. According

to (4.6), (4.7), and (4.8), W ′max = exp

(λ)and W ′

min = exp(−λ− ν

). Finally, the following is a sufficient

condition for (A.23):

−W ′maxπR

2Cu +W ′minVmin > 0. (A.24)

A.3 Proof of Theorem 5

E(exp

(−s(I ′(xB))

))(A.25)

=E

[ ∏x∈Φ0

u′(x,xB , s) ·∏

x0∈Θ

∏x∈Ω(x0)

v′(x,x0,xB , s) ·∏

x0∈Θ

∏x∈Ψ(x0)

w′(x,x0,xB , s) (A.26)

·∏

x∈Ω(xB)

v′(x,xB ,xB , s) ·∏

x∈Ψ(xB)

w′(x,xB ,xB , s)

]

=E

[E( ∏

x∈Φ0

u′(x,xB , s)

∣∣∣∣Θ)E( ∏

x∈Φ1

u′(x,xB , s)

∣∣∣∣Θ)E( ∏

x∈Φ1

u′(x,xB , s)

∣∣∣∣Θ)E( ∏

x0∈Θ

∏x∈Ω(x0)

v′(x,x0,xB , s)

∣∣∣∣Θ) (A.27)

E( ∏

x0∈Θ

∏x∈Ψ(x0)

w′(x,x0,xB , s)

∣∣∣∣Θ)E( ∏x∈Ω(xB)

v′(x,xB ,xB , s)

∣∣∣∣Θ)E( ∏x∈Ψ(xB)

w′(x,xB ,xB , s)

∣∣∣∣Θ)]

=E

[E( ∏

x∈Φ

u′(x,xB , s)

∣∣∣∣Θ)E(∏

x0∈Θ

∏x∈Ω(x0)

v′(x,x0,xB , s)

∣∣∣∣Θ)E(∏

x0∈Θ

∏x∈Ω(x0)

u′(x,xB , s)

∣∣∣∣Θ)E(∏

x∈Ω(xB) v′(x,xB ,xB , s)

∣∣∣∣Θ)E(∏

x∈Ω(xB) u′(x,xB , s)

∣∣∣∣Θ) (A.28)

E( ∏

x0∈Θ

∏x∈Ψ(x0)

w′(x,x0,xB , s)

∣∣∣∣Θ)E( ∏x∈Ψ(xB)

w′(x,xB ,xB , s)

∣∣∣∣Θ)]

=E( ∏

x∈Φ

u′(x,xB , s)

)E

[ ∏x0∈Θ

(E(∏

x∈Ω(x0)v′(x,x0,xB , s)

)E(∏

x∈Ω(x0)u′(x,xB , s)

) E( ∏

x∈Ψ(x0)

w′(x,x0,xB , s)))]

(A.29)

E( ∏

x∈Ψ(xB)

w′(x,xB ,xB , s)

)E(∏

x∈Ω(xB) v′(x,xB ,xB , s)

)E(∏

x∈Ω(xB) u′(x,xB , s)

) .

Proof. The steps to derive Theorem 5 is shown in (A.25)-(A.29). Substituting (4.20)-(4.24) into (A.25),

we derive (A.26). According to the law of total expectation, we derive (A.27) from (A.26). Φ1 can be

rewritten as the union of all open access UEs in each femtocell (including the typical femtocell). Thus

E(∏

x∈Φ1 u′(x,xB , s)

∣∣∣∣Θ) is equal to E(∏

x0∈Θ

∏x∈Ω(x0)

u′(x,xB, s)

∣∣∣∣Θ)·E(∏x∈Ω(xB) u′(x,xB, s)

∣∣∣∣Θ).Also, E

(∏x∈Φ0 u′(x,xB, s)

∣∣∣∣Θ)· E(∏x∈Φ1 u′(x,xB , s)

∣∣∣∣Θ) is equal to E(∏

x∈Φ u′(x,xB , s)

∣∣∣∣Θ). By

considering the two equalities, we derive (A.28) from (A.27). Finally, we derive (A.29) from the law of

Page 109: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix A. Proofs of Theorems in Chapter 4 97

total expectation.

A.4 Proof of Theorem 6

Proof. We use the fact that P and Rc can be normalized and set P = Rc = 1. Furthermore, we substitute

s = T ′ into (4.27)-(4.32) such that

W ′(x0,xB , T′) = exp

(−

∫B(x0,R)

T ′Q|x− x0|γ

T ′Q|x− x0|γ + |x− xB |γν(x− x0)dx

),

V ′(x0,xB , T′) = exp

(− λ

∫B(x0,R)

T ′ρ|x− x0|γ

T ′ρ|x− x0|γ + |x− xB |γdx

),

U ′(x0,xB , T′) = exp

(− λ

∫B(x0,R)

T ′|x− BS(x)|γ

T ′|x− BS(x)|γ + |x− xB |γdx

),

V ′′(xB , T′) =e

− T ′ρλT ′ρ+1 ,

U ′′(xB , T′) = exp

(− λ

∫B(xB ,R)

T ′|x− BS(x)|γ

T ′|x− BS(x)|γ + |x− xB |γdx

). (A.30)

(a) A sufficient condition for P oout(xB) < P c

out(xB)

According to (4.33), (4.34), (4.36), and (4.37), P oout(xB) < P c

out(xB) iff

exp

(− µ

∫R2

(1− V′(x0,xB ,T ′)

U ′(x0,xB ,T ′)W′(x0,xB , T

′))dx0

)exp

(− µ

∫R2

(1−W ′(x0,xB, T ′)

)dx0

) V ′′(xB, T′)

U ′′(xB, T ′)> 1. (A.31)

Let

V ′(x0,xB) =

∫B(x0,R)

T ′ρ|x− x0|γ

T ′ρ|x− x0|γ + |x− xB |γdx,

U ′(x0,xB) =

∫B(x0,R)

(T ′|x− BS(x)|γ

T ′|x− BS(x)|γ + |x− xB |γ

)dx,

R =

∫B(xB ,R)

T ′|x− BS(x)|γ

T ′|x− BS(x)|γ + |x− xB |γdx. (A.32)

Similar to (A.14), the following is a sufficient condition for (A.31):

µ

∫R2

(−λV ′(x0,xB) + λU ′(x0,xB))W ′(x0,xB, T′)dx0 −

λπR2T ′ρ

T ′ρ+ 1+ λR > 0. (A.33)

Let W ′′min and W ′′

max be the lower bound and upper bound of W ′(x0,xB , T′), respectively. According

to (4.27), W ′′max = 1 and W ′′

min = exp (−ν). Thus, the following is a sufficient condition for (A.33):

µ

∫R2

(−V ′(x0,xB)W′′max + U ′(x0,xB)W

′′min) dx0 −

πR2T ′ρ

T ′ρ+ 1+R > 0, (A.34)

Page 110: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix A. Proofs of Theorems in Chapter 4 98

where∫R2 V

′(x0,xB)dx0 =∫R2

∫B(x0,R)

T ′ρ|x−x0|γ|x|γ

T ′ρ|x−x0|γ|x|γ +1

dxdx0 is in the same form as (A.41). Thus, by

applying Lemma 5, we can derive its upper bound and lower bound as V′max and V′

min from (A.44) and

(A.47), respectively. Similar to the derivation of (A.19),∫R2 U

′(x0,xB)dx0 = πR2C ′u where

C ′u ,

∫R2

(T ′|x− BS(x)|γ

T ′|x− BS(x)|γ + |x− xB|γ

)dx. (A.35)

In addition, the lower bound Rmin and the upper bound Rmax of R can be derived as follows:

Rmin =

π∫ R

0T ′(|xB |)γr

T ′(|xB |)γ+rγ dr if |xB | ≤ R,

π∫ R

0T ′(|xB |−R)γr

T ′(|xB |−R)γ+rγ dr + π∫ R

0T ′(|xB |)γr

T ′(|xB |)γ+rγ dr if |xB | > R,(A.36)

and

Rmax =π

∫ R

0

T ′(|xB|+R)γr

T ′(|xB |+R)γ + rγdr + π

∫ R

0

T ′(√|xB|2 +R2)γr

T ′(√|xB |2 +R2)γ + rγ

dr. (A.37)

Note that∫

Brrγ+Bdr is in closed form when γ is a rational number. Therefore, both Rmin and Rmax

are expressed in closed forms.

Finally, the following is a sufficient condition for (A.34):

− µV′max + µπR2C ′

uW′′min − πR2T ′ρ

T ′ρ+ 1+Rmin > 0. (A.38)

(b) A sufficient condition for P oout(xB) > P c

out(xB)

Similar to the derivations of (A.31) and (A.33), P oout(xB) > P c

out(xB) iff

µ

∫R2

(−λU ′(x0,xB) + λV ′(x0,xB))W ′(x0,xB , T

′)V ′(x0,xB , T′)

U ′(x0,xB , T ′)dx0 +

λπR2T ′ρ

T ′ρ+ 1− λR > 0. (A.39)

Let W ′′′min and W ′′′

max be the lower bound and upper bound value of W′(x0,xB ,T ′)V′(x0,xB ,T ′)U ′(x0,xB ,T ′) , respec-

tively. According to (4.27)-(4.29), W ′′′max = exp

(λ)and W ′′′

min = exp(−λ− ν

). Then similar to the

derivation of (A.38), we see that the following is a sufficient condition for (A.39):

− µπR2C ′uW

′′′max + µV′

minW′′′min +

πR2T ′ρ

T ′ρ+ 1−Rmax > 0. (A.40)

A.5 Proof of Lemma 5

Proof. Upper Bound of V

V =

∫R2

∫B(x0,R)

Tρ|x−x0|γ|x|γ

Tρ|x−x0|γ|x|γ + 1

dxdx0 (A.41)

Page 111: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix A. Proofs of Theorems in Chapter 4 99

=

∫R2

∫B(x,R)

Tρ|x−x0|γ|x|γ

Tρ|x−x0|γ|x|γ + 1

dx0dx

=

∫ ∞

0

2πr1

∫ R

0

Tρrγ2rγ1

Tρrγ2rγ1

+ 12πr2dr2dr1 (A.42)

≤∫ ∞

0

2πr1

∫ R

0

1(Tρrγ2rγ1

≥ 1)2πr2dr2dr1+∫ ∞

0

2πr1

∫ R

0

1(Tρrγ2rγ1

< 1)Tρrγ2rγ1

2πr2dr2dr1 (A.43)

=4π2R4(Tρ)2γ

(1

8+

1

4(γ + 2)+

1

(γ + 2)(γ − 2)

). (A.44)

In (A.42), the integrated item is in the form of XX+1 , where X =

Tρrγ2rγ1

≥ 0. The bound of the integrated

item can be found as follows: if X ≥ 1, 12 ≤ X

X+1 ≤ 1; otherwise, if X < 1, X2 ≤ X

X+1 ≤ X. Accordingly,

we can separate the integration region into theTρrγ2rγ1

≥ 1 region and theTρrγ2rγ1

< 1 region. As a

consequence, the upper bound of (A.42) can be derived as (A.43).

Lower Bound of V

Following a similar approach as above, we have

V =

∫ ∞

0

2πr1

∫ R

0

Tρrγ2rγ1

Tρrγ2rγ1

+ 12πr2dr2dr1 (A.45)

≥∫ ∞

0

2πr1

∫ R

0

1(Tρrγ2rγ1

≥ 1)πr2dr2dr1+∫ ∞

0

2πr1

∫ R

0

1(Tρrγ2rγ1

< 1)Tρrγ2rγ1

πr2dr2dr1 (A.46)

=2π2R4(Tρ)2γ

(1

8+

1

4(γ + 2)+

1

(γ + 2)(γ − 2)

). (A.47)

Page 112: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix B

Properties and Proofs of Chapter 5

B.1 Useful Properties of Mk(Ak)

(M-1) Mk(Ak) is increasing on [0, ak] and decreasing on [ak,∞).

(M-2) Mk(Ak) is concave on [0, ak].

(M-3) If λi < λj , then Mi(A) < Mj(A), ∀A > 0.

(M-4) If λi < λj , then Mj(A)−Mi(A) is strictly increasing on [0, aj ].

B.2 Proof of Lemma 2

Proof. Suppose A∗∗ is optimal, A∗∗i < ai, and A∗∗

j > aj . Consider that we increase A∗∗i by a small

value ∆ > 0 and decrease A∗∗j by ∆. According to property (M-1), η∗∗i Mi(A

∗∗i ) + η∗∗j Mj(A

∗∗j ) <

η∗∗i Mi(A∗∗i + ∆) + η∗∗j Mj(A

∗∗j − ∆). Thus, through replacing A∗∗

i and A∗∗j by A∗∗

i + ∆ and A∗∗j − ∆,

respectively, we find a better solution to P, leading to a contradiction.

B.3 Proof of Lemma 3

Proof. Suppose ∃i < j such that Mi(A∗i ) > Mj(A

∗j ). This implies that A∗

i > A∗j . (Otherwise, if A∗

i ≤ A∗j ,

then we have Mi(A∗i ) ≤ Mi(A

∗j ) < Mj(A

∗j ), leading to a contradiction.) A corresponding diagram is

shown in Fig. B.1(a).

Case 1: η∗i ≤ η∗j .

Let A∗j = A∗

i and A∗i = A∗

j . Then we have

[η∗i Mi(A∗i ) + η∗jMj(A

∗j )]− [η∗iMi(A

∗i ) + η∗jMj(A

∗j )]

=[η∗i Mi(A∗j ) + η∗jMj(A

∗i )]− [η∗iMi(A

∗i ) + η∗jMj(A

∗j )]

=η∗j [Mj(A∗i )−Mj(A

∗j )] + η∗i [Mi(A

∗j )−Mi(A

∗i )]

≥η∗i [Mj(A∗i )−Mj(A

∗j ) +Mi(A

∗j )−Mi(A

∗i )] > 0, (B.1)

where (B.1) is due to property (M-4).

100

Page 113: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix B. Properties and Proofs of Chapter 5 101

Ai*

Aj*

Mi(Ai*)

Mi(Aj*)

Mj(Aj*)

Mj(Ai*)

Mj

Mi

(a) Diagram of Mi(·) and Mj(·).Aj*

Mi(Ai*)

~

Mj(Ai*)

~

Mj(Aj*)

~

Mi(Aj*)

~ ~Mi

~Mj

ai aj Ai*~

~

~

~

~

~

(b) Diagram of Mi(·) and

Mj(·), Case 1.1 and 2.1.

Aj*

D

D

Mi(Ai*)

~ Mj(Aj*)

~

Mj(Aj*)

~Mi

~Mj

~ ^

Mi(Ai*)

~ ^

ai ajAi*~

~ ~

~

(c) Diagram of Mi(·) and

Mj(·), Case 1.2 and 2.2.

Figure B.1: Diagrams of Mi(·), Mj(·), Mi(·), and Mj(·).

As a consequence, if A∗i and A∗

j are replaced by A∗i and A∗

j , respectively, we obtain a larger F, leading

to a contradiction.

Case 2: η∗i > η∗j .

Let A∗j = A∗

i , A∗i = A∗

j , η∗j = η∗i , and η∗i = η∗j . (Note that because ηmin,i ≤ ηmin,j and ηmax,i ≤ ηmax,j ,

η∗j and η∗i are guaranteed to be in the feasible region.)

[η∗i Mi(A∗i ) + η∗jMj(A

∗j )]− [η∗iMi(A

∗i ) + η∗jMj(A

∗j )]

=[η∗jMi(A∗j ) + η∗i Mj(A

∗i )]− [η∗iMi(A

∗i ) + η∗jMj(A

∗j )]

=η∗i [Mj(A∗i )−Mi(A

∗i )] + η∗j [Mi(A

∗j )−Mj(A

∗j )]

>η∗j [Mj(A∗i )−Mi(A

∗i ) +Mi(A

∗j )−Mj(A

∗j )] > 0. (B.2)

Thus, if A∗i , A

∗j , η

∗i , and η∗j are replaced by A∗

i , A∗j , η

∗i , and η∗j , respectively, we can find a larger F,

leading to a contradiction.

B.4 Useful Properties of Mk(Ak)

(M-1’) Mk(Ak) is a decreasing convex function.

(M-2’) If λi < λj , then Mi(ai) < Mj(aj).

(M-3’) If λi < λj , then Mj(A)− Mi(A) is a strictly decreasing function.

(M-4’) Mk(A)− Mk(A+D) > Mk(A′)− Mk(A

′ +D), for any A′ > A ≥ ak and D > 0.

(M-5’) If λi < λj , then Mj(aj)− Mj(aj +D) > Mi(ai)− Mi(ai +D), for any D > 0.

(M-6’) If λi < λj , then Mj(aj) − Mj(aj + D) > Mi(A′) − Mi(A

′ + D), for any D > 0 and A′ > ai

(combining (M-4’) and (M-5’)).

B.5 Proof of Lemma 4

Proof. Suppose that ∃i < j (i.e., λi < λj) such that Mi(A∗i ) > Mj(A

∗j ), which also implies that

ai ≤ A∗i < A∗

j . The corresponding diagrams are shown in Figs. B.1(b) and B.1(c).

Case 1: η∗i ≤ η∗j .

Page 114: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix B. Properties and Proofs of Chapter 5 102

Case 1.1: A∗i ≥ aj.

Let A∗j = A∗

i and A∗i = A∗

j . We have

[η∗i Mi(A∗i ) + η∗j Mj(A

∗j )]− [η∗i Mi(A

∗i ) + η∗j Mj(A

∗j )]

=[η∗i Mi(A∗j ) + η∗j Mj(A

∗i )]− [η∗i Mi(A

∗i ) + η∗j Mj(A

∗j )]

=η∗j [Mj(A∗i )− Mj(A

∗j )] + η∗i [Mi(A

∗j )− Mi(A

∗i )]

≥η∗i [Mj(A∗i )− Mj(A

∗j ) + Mi(A

∗j )− Mi(A

∗i )] > 0, (B.3)

where (B.3) is due to property (M-3’).

Thus, if A∗i and A∗

j are replaced by A∗i and A∗

j , respectively, we obtain a larger F′, leading to a

contradiction.

Case 1.2: A∗i < aj.

Let A∗j = aj , D = A∗

j − aj and A∗i = A∗

i +D. We have

[η∗i Mi(A∗i ) + η∗j Mj(A

∗j )]− [η∗i Mi(A

∗i ) + η∗j Mj(A

∗j )]

=[η∗i Mi(A∗i +D) + η∗j Mj(aj)]− [η∗i Mi(A

∗i ) + η∗j Mj(A

∗j )]

=η∗j [Mj(aj)− Mj(A∗j )] + η∗i [Mi(A

∗i +D)− Mi(A

∗i )]

≥η∗i [Mj(aj)− Mj(A∗j ) + Mi(A

∗i +D)− Mi(A

∗i )] > 0, (B.4)

where (B.4) is due to property (M-6’).

Thus, if A∗i and A∗

j are replaced by A∗i and A∗

j , respectively, we obtain a larger F′, leading to a

contradiction.

Case 2: η∗i > η∗j .

Case 2.1: A∗i ≥ aj.

Let A∗j = A∗

i , A∗i = A∗

j , η∗j = η∗i , and η∗i = η∗j . (Note that because ηmin,i ≤ ηmin,j and ηmax,i ≤ ηmax,j ,

η∗j and η∗i are guaranteed to be in the feasible region.)

[η∗i Mi(A∗i ) + η∗j Mj(A

∗j )]− [η∗i Mi(A

∗i ) + η∗j Mj(A

∗j )]

=[η∗j Mi(A∗j ) + η∗i Mj(A

∗i )]− [η∗i Mi(A

∗i ) + η∗j Mj(A

∗j )]

=η∗i [Mj(A∗i )− Mi(A

∗i )] + η∗j [Mi(A

∗j )− Mj(A

∗j )]

>η∗j [Mj(A∗i )− Mi(A

∗i ) + Mi(A

∗j )− Mj(A

∗j )] > 0. (B.5)

Thus, if A∗i , A

∗j , η

∗i , and η∗j are replaced by A∗

i , A∗j , η

∗i , and η∗j , respectively, we obtain a larger F′,

leading to a contradiction.

Case 2.2: A∗i < aj.

Let A∗j = aj , D = A∗

j − aj , A∗i = A∗

i +D, η∗j = η∗i , and η∗i = η∗j . We have

[η∗i Mi(A∗i ) + η∗j Mj(A

∗j )]− [η∗i Mi(A

∗i ) + η∗j Mj(A

∗j )]

=[η∗j Mi(A∗i +D) + η∗i Mj(aj)]− [η∗i Mi(A

∗i ) + η∗j Mj(A

∗j )]

=η∗i [Mj(aj)− Mi(A∗i )] + η∗j [Mi(A

∗i +D)− Mj(A

∗j )]

>η∗j [Mj(aj)− Mi(A∗i ) + Mi(A

∗i +D)− Mj(A

∗j )] > 0. (B.6)

Page 115: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix B. Properties and Proofs of Chapter 5 103

Thus, if A∗i , A

∗j , η

∗i , and η∗j are replaced by A∗

i , A∗j , η

∗i , and η∗j , respectively, we obtain a larger F′,

leading to a contradiction.

B.6 Proof of Theorem 10

Proof. Suppose ∃k ≥ 2 such that A∗k > ak. Let l = 1, A∗

k = ak, D = A∗k − ak, and A∗

l = A∗l +D. Note

that we have η∗k ≥ η∗l through Lemma 4. Thus,

[η∗kMk(A∗k) + η∗l Ml(A

∗l )]− [η∗kMk(A

∗k) + η∗l Ml(A

∗l )]

=[η∗kMk(ak) + η∗l Ml(A∗l +D)]− [η∗kMk(A

∗k) + η∗l Ml(A

∗l )]

=η∗k[Mk(ak)− Mk(A∗k)] + η∗l [Ml(A

∗l +D)− Ml(A

∗l )]

≥η∗l [Mk(ak)− Mk(A∗k) + Ml(A

∗l +D)− Ml(A

∗l )] > 0. (B.7)

As a consequence, if we replace A∗l and A∗

k by A∗l and A∗

k, respectively, we find a better solution to

Problem P2A, which leads to a contradiction.

B.7 Some Properties Used for Exhaustive Search

Lemma 6. Let (η∗,A∗) be an optimal solution to P. Suppose ∃i = j, such that ηmin,i < η∗i < ηmax,i

and ηmin,j < η∗j < ηmax,j . Then, let η∗i = ηmax,i and η∗j = η∗i + η∗j − ηmax,i if ηmax,i− η∗i ≤ η∗j − ηmin,j ; let

η∗i = η∗i + η∗j − ηmin,j and η∗j = ηmin,j otherwise. Let η∗ = (η∗1 , . . . , η∗i , . . . , η

∗j , . . . , η

∗K). Then (η∗,A∗) is

still an optimal solution to Problem P.

Proof. First, we have Mi(A∗i ) = Mj(A

∗j ). Otherwise, suppose Mi(A

∗i ) > Mj(A

∗j ) (without loss of

generality); then we can find a better solution by replacing η∗i and η∗j by η∗i + δ and η∗j − δ, respectively,

where δ > 0.

Given that Mi(A∗i ) = Mj(A

∗j ), the same F can be obtained when we replace η∗i and η∗j by η∗i and η∗j .

Lemma 6 demonstrates that if there are η∗i and η∗j not at the boundary, we can “push” one of them

to the boundary and maintain the optimization in P. If there are more than two terms in η∗ not at the

boundary, we can “push” them to the boundary one by one, until there is at most one term in η∗ not

at the boundary. Thus, Lemma 6 directly leads to the following Theorem:

Theorem 19. At least one of the optimal solutions to P, (η∗,A∗), has the following property: There

is at most one k ∈ 1, 2, . . .K such that ηmin,k < η∗k < ηmax,k, and ∀j = k, either η∗j = ηmin,j or

η∗j = ηmax,j .

B.8 Proofs of Properties of Mk(·) in the Multiple-MCS Case

In this appendix, we prove Properties (M-1) to (M-4) when we redefine Mk(A) as in (5.44). In the proof,

we set uk = µ/λk.

Page 116: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix B. Properties and Proofs of Chapter 5 104

B.8.1 Property (M-1)

The first derivative of Mk(A) is

M ′k(A) =

1

(Auk + 1)2

[ N∑n=1

bn(1−A2Cnuk)

(ACn + 1)2

]. (B.8)

M ′k(A) is positive at A = 0, and is negative when A is sufficient large. Thus, there exists pos-

itive ak such that it is a solution to M ′k(A) = 0. In addition, we have

[∑Nn=1

bn(1−A2Cnuk)(ACn+1)2

]′=

−∑N

n=12bnCn(Auk+1)

(ACn+1)3 < 0, demonstrating that∑N

n=1bn(1−A2Cnuk)

(ACn+1)2 is a decreasing function. Thus, ak is

the unique solution to M ′k(A) = 0. M ′

k(A) is positive on [0, ak), and negative on (ak,∞). Note that a

simple binary search method can be applied to numerically search for ak.

Note that

N∑n=1

bn(1−A2Cnuk)

(ACn + 1)2> 0 (B.9)

on [0, ak), which will be used in the subsequent steps.

B.8.2 Property (M-2)

We have

M ′′k (A) =

[∑Nn=1 z

′n(A)

]v(A)−

[∑Nn=1 zn(A)

]v′(A)

(v(A))2, (B.10)

where zn(A) =bn(1−A2Cnuk)

(ACn+1)2 , and v(A) = (Auk + 1)2. Then, we have

z′n(A) = −2bnCn(Auk + 1)

(ACn + 1)3, (B.11)

which is negative.

Consequently, on [0, ak),∑N

n=1 z′n(A) is negative, v(A) is positive,

∑Nn=1 zn(A) is positive (due to

(B.9)), and v′(A) is positive. Thus, M ′′k (A) is negative. Property (M-2) is proved.

B.8.3 Property (M-3)

Trivially true.

B.8.4 Property (M-4)

Let λk > λj . Then we have uk < uj . Let ∆Mkj(A) = Mk(A)−Mj(A). Then

∆M ′kj(A) = M ′

k(A)−M ′j(A) (B.12)

=uk − uj

(Auk + 1)2(Auj + 1)2·[ N∑n=1

Abn(A3Cnukuj −Auk −Auj −ACn − 2)

(ACn + 1)2

](B.13)

Page 117: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix B. Properties and Proofs of Chapter 5 105

0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 10

0.05

0.1

0.15

0.2

0.25

D

Valu

e

Figure B.2: [Mj(aj) − Mj(aj + D)] − [Mi(ai) − Mi(ai + D)] versus D (curves) and Mj(aj) − Mi(ai)(dots).

=uk − uj

(Auk + 1)2(Auj + 1)2·[ N∑n=1

A2bnuj(A2Cnuk − 1)

(ACn + 1)2−

N∑n=1

Abn(Auk +ACn + 2)

(ACn + 1)2

]. (B.14)

Note that∑N

n=1A2bnuj(A

2Cnuk−1)(ACn+1)2 = A2uj

∑Nn=1

bn(A2Cnuk−1)

(ACn+1)2 < 0 on [0, ak) (see (B.9)), and uk < uj .

Consequently, ∆M ′kj(A) > 0. Property (M-4) is proved.

B.9 Numerical Verification of Properties (M-2’) and (M-5’) of

Mk(Ak) in the Multiple-MCS Case

Fig. B.2 visualizes a typical example in our numerical verification of Properties (M-2’) and (M-5’). In

this figure, we narrow the parameter sets to T = 10−1, 10−0.5, 1, 100.5, 101, U = 101, 101.5, . . . , 103,and Γ = 4. For all T1, T2, T3 ∈ T (T1 < T2 < T3), ∀µ/λi, µ/λj ∈ U (µ/λi > µ/λj), and ∀γ ∈ Γ, we plot

[Mj(aj)− Mj(aj +D)]− [Mi(ai)− Mi(ai +D)] versus D, and values of Mj(aj)− Mi(ai). Consequently,

100 curves and points are plotted in Fig. B.2. The curves and points are all above zero, illustrating the

correctness of Properties (M-2’) and (M-5’) under the range of parameter settings that are tested. The

results for other parameter setting are similar and are omitted to avoid redundancy.

Page 118: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix C

Derivations and Proofs of Theorems

in Chapter 6

C.1 Proof of Theorem 11

Proof. In this proof, the tier-k BS serving the reference UE is referred to as the reference BS. Without

loss of generality, we assume the reference BS is located at R0 = (R0, 0). Note that because the reference

UE receives the highest biased power level from the reference BS, there are no tier-j BSs, ∀j ∈ K, located

within B(0, R0

βkj), where B(x, r) denotes the disk region centered at x with radius r, and B(x, r) denotes

R2\B(x, r).Let x0 = (x0, y0) denote the position of some tier-j BS (other than the reference BS if j = k). Let

T (R0,x0, βkj) denote the curve satisfying the following condition:

T (R0,x0, βkj) =

(x, y)

∣∣∣∣∣ PkBk

((x−R0)2 + y2)γ/2

=PjBj

((x− x0)2 + (y − y0)2)γ/2

. (C.1)

Note that 0 ∈ T(2)kj (∆d) is equivalent to the event the distance from 0 to curve T (R0,x0, βkj) is less

than ∆d.

In the following, we discuss three cases respectively: βkj > 1, βkj = 1, and βkj < 1.

Case 1: βkj > 1.

In this case, we have

T (R0,x0, βkj) =

(x, y)

∣∣∣∣∣[x−

(β2kjx0 −R0

β2kj − 1

)]2+

[y −

β2kjy0

β2kj − 1

]2=

β2kj(R

20 + x2

0 + y20 − 2x0R0)

(β2kj − 1)2

,

(C.2)

which is a circle centered at(

β2kjx0−R0

β2kj−1

,β2kjy0

β2kj−1

)with radius

βkj

√(R2

0+x20+y2

0−2x0R0)

(β2kj−1)

. Thus, the distance

from 0 to the trace T (R0,x0, βkj) is

d(R0,x0, βkj) =

∣∣∣∣∣∣√(β2

kjx0 −R0)2 + (β2kjy0)

2 −√β2kj(R

20 + x2

0 + y20 − 2x0R0)

(β2kj − 1)

∣∣∣∣∣∣ . (C.3)

106

Page 119: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix C. Derivations and Proofs of Theorems in Chapter 6 107

Thus, 0 ∈ T(2)kj (∆d) iff d(R0,x0, βkj) < ∆d, or equivalently, x0 ∈ Skj(∆d), where

Skj(∆d) =x0

∣∣∣d(R0,x0, βkj) < ∆d. (C.4)

Mathematical manipulations1 of (C.4) lead to

Skj(∆d) =

(x0, y0)

∣∣∣∣∣∣∣∣∣(x2

0 + y20)−R2

0

β2kj

∣∣∣∣ < ∆d

β2kj

· (C.5)

√2(β4kj + β2

kj

)(x2

0 + y20)− 8β2kjx0R0 + 2(β2

kj + 1)R20 +O(∆d2)

.

By converting (x0, y0) into polar coordinates (r, θ), (C.5) becomes

Skj(∆d) =

(r, θ)

∣∣∣∣∣∣∣∣∣r2 − R2

0

β2kj

∣∣∣∣ < ∆d

β2kj

· (C.6)

√2(β4kj + β2

kj

)r2 − 8β2

kjR0r cos(θ) + 2(β2kj + 1)R2

0 +O(∆d2)

.

Note that there are no tier-j BSs located inside B(0, R0

βkj). Let Skj(∆d) = Skj(∆d)

∩B(0, R0/βkj). As

a result, 0 ∈ T(2)kj (∆d) iff x0 ∈ Skj(∆d), where

Skj(∆d) =

(r, θ)

∣∣∣∣∣r ≥ R0

βkjand

∣∣∣∣r2 − R20

β2kj

∣∣∣∣ < ∆d

β2kj

· (C.7)

√2(β4kj + β2

kj

)r2 − 8β2

kjR0r cos(θ) + 2(β2kj + 1)R2

0 +O(∆d2)

.

Fig. C.1 shows the region Skj(∆d). The inner circle, middle circle, and outer circle showR2

0

β2kj

r2 = ∆dβ2kj

·√2(β4kj + β2

kj

)r2 − 8β2

kjR0r cos(θ) + 2(β2kj + 1)R2

0 +O(∆d2), r = R0

βkj, and r2 − R2

0

β2kj

=

∆dβ2kj

·√2(β4kj + β2

kj

)r2 − 8β2

kjR0r cos(θ) + 2(β2kj + 1)R2

0 +O(∆d2), respectively. Therefore, Skj(∆d)

corresponds to the shaded area shown in Fig. C.1. Given an angular coordinate θ, the difference be-

tween the radial coordinates of the outer circle and the middle circle is defined as ∆Dkj(θ) (i.e., the

thickness of Skj(∆d) at angular coordinate θ). We can observe that ∆Dkj(θ) is in the scale of O(∆d),

and thus ∀(r, θ) ∈ Skj(∆d), r = R0

βkj+O(∆d). Substituting it into (C.7) gives,

Skj(∆d) =

(r, θ)

∣∣∣∣∣r ≥ R0

βkjand

∣∣∣∣r2 − R20

β2kj

∣∣∣∣ < (C.8)

∆d

β2kj

·[2(β4kj + β2

kj

)( R0

βkj+O(∆d)

)2

− 8β2kjR0

(R0

βkj+O(∆d)

)cos(θ) + 2(β2

kj + 1)R20 +O(∆d2)

]1/2,

1Let A = (β2kjx0−R0)2+(β2

kjy0)2, B = β2

kj(R20+x2

0+y20 −2x0R0), and C = β2kj −1.

∣∣∣√A−√

BC

∣∣∣ < ∆d is equivalent to

|A−B| < ∆d√2AC2 + 2BC2 − C4∆d2, i.e., |A−B| < ∆d

√2AC2 + 2BC2 +O(∆d2), which is then equivalent to (C.5).

O represents big O notation.

Page 120: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix C. Derivations and Proofs of Theorems in Chapter 6 108

−0.5 −0.4 −0.3 −0.2 −0.1 0 0.1 0.2 0.3 0.4 0.5

−0.4

−0.2

0

0.2

0.4

0.6

Skj(∆d)

θ′

r = R0/βkj

∆Dkj(θ′)

−r2 +R2

0

β2

kj

= ∆dβ2

kj

2(β4

kj + β2

kj )r2 − 8β2

kj R0r cos(θ) + 2(β2

kj + 1)R20

+O(∆d2)

r2−

R2

0

β2

kj

= ∆dβ2

kj

2(β4

kj + β2

kj )r2 − 8β2

kj R0r cos(θ) + 2(β2

kj + 1)R20

+O(∆d2)

Figure C.1: The region (shaded part) of Skj(∆d).

which leads to,

Skj(∆d) =

(r, θ)

∣∣∣∣∣r ≥ R0

βkjand

∣∣∣∣r2 − R20

β2kj

∣∣∣∣ <2∆dR0

β2kj

√(β2kj + 1

)− 2βkj cos(θ) +O(∆d2)

. (C.9)

The area of Skj(∆d) is

|Skj(∆d)| =2

∫ π

0

∫ √R2

0β2kj

+2∆dR0

β2kj

√(β2

kj+1)−2βkj cos(θ)+O(∆d2)

R0βkj

rdrdθ (C.10)

=2∆dR0

β2kj

∫ π

0

√(β2kj + 1

)− 2βkj cos(θ)dθ +O(∆d2).

Given the reference UE and BS, it can be shown that Φj2 is a PPP with intensity 0 in B

(0, R0

βkj

)and

intensity λj in B (0, R0/βkj) [37]. Because P(0 ∈ T

(2)kj (∆d)|R = R0, tier = k

)is equal to the probability

that there is at least one point of Φj in Skj(∆d) (i.e., some x0 in Skj(∆d)), we have

P(0 ∈ T

(2)kj (∆d)|R = R0, tier = k

)(C.11)

=1− exp (−λj |Skj(∆d)|)

=1− exp(−2λj∆dR0F(βkj) +O(∆d2)

),

which completes the proof of Case 1.

Case 2: βkj < 1. The proof is similar to that of Case 1.

Case 3: βkj = 1.

In this case, we have

T (R0,x0, 1) =

(x, y)

∣∣∣∣y0 (y − y02

)= −(x0 −R0)

(x− x0 +R0

2

), (C.12)

2If k = j, it is the reduced Palm point process [12] corresponding to all tier-k BSs other than the reference BS.

Page 121: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix C. Derivations and Proofs of Theorems in Chapter 6 109

which is a line. Thus, the distance from 0 to T (R0,x0, 1) is

d(x0,R0, 1) =

∣∣∣y20

2 − (R0−x0)(R0+x0)2

∣∣∣√(R0 − x0)2 + y20

. (C.13)

Consequently, similar to (C.4), 0 ∈ T(2)kj (∆d) iff d(x0,R0, 1) < ∆d, or equivalently, x0 ∈ Skj(∆d),

where

Skj(∆d) =

(x0, y0)

∣∣∣∣∣∣∣∣∣y2

0

2 − (R0−x0)(R0+x0)2

∣∣∣√(R0 − x0)2 + y20

< ∆d

. (C.14)

After converting (x0, y0) into polar coordinate (r, θ),

Skj(∆d) =

(r, θ)

∣∣∣∣∣∣r2 −R20

∣∣ < 2∆d√R2

0 + r2 − 2R0r cos θ

, (C.15)

which is a special case of (C.6) with βkj = 1. Thus, following the same steps as (C.7)-(C.11), we can

still derive (6.10), which completes the proof of Case 3.

C.2 Proof of Theorem 12

Proof. (a) Let Ei denote the event that there is at least one tier-i BS located in Ski(∆d). Then

P(0 ∈ T(2)(∆d)|R = R0, tier = k

)=1− P

(E1

∩E2

∩. . .∩

EK

∣∣R = R0, tier = k)

=1− exp

(−

K∑i=1

|Ski(∆d)|λi

)

=1− exp

(−

K∑i=1

2λi∆dR0F(βki) +O(∆d2)

)

=

K∑i=1

2λi∆dR0F(βki) +O(∆d2). (C.16)

Furthermore, according to the results in [12], the probability density function of the distance between

the reference UE and the reference BS is

fk(R0|tier = k) =2πλk

AkR0 exp

(−πR2

0

K∑i=1

λiβ2ik

). (C.17)

Also, we have P(tier = k) = Ak. Thus

P(0 ∈ T(2)(∆d)

)=

K∑k=1

∫ ∞

0

P(0 ∈ T(2)(∆d)|R = R0, tier = k)fk(R0|tier = k)P(tier = k)dR0

Page 122: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix C. Derivations and Proofs of Theorems in Chapter 6 110

=

K∑k=1

∫ ∞

0

2πλkR0 exp

(−πR2

0

K∑i=1

λiβ2ik

)(K∑i=1

2λi∆dR0F(βki) +O(∆d2)

)dR0

=

K∑k=1

λk

(∑Ki=1 λi∆dF(βki) +O(∆d2)

)(∑K

i=1 λiβ2ik

) 32

, (C.18)

which completes the proof of (a).

(b)

Similar to (C.18), if k = j, we have

P(0 ∈ T

(2)kj (∆d)

)=

∫ ∞

0

P(0 ∈ T(2)kj (∆d)|R = R0, tier = k)fk(R0|tier = k)P(tier = k)dR0

+

∫ ∞

0

P(0 ∈ T(2)kj (∆d)|R = R0, tier = j)fj(R0|tier = j)P(tier = j)dR0

=λk

(λj∆dF(βkj) +O(∆d2)

)(∑Ki=1 λiβ2

ik

) 32

+λj

(λk∆dF(βjk) +O(∆d2)

)(∑Ki=1 λiβ2

ij

) 32

. (C.19)

Otherwise, if k = j, we have

P(0 ∈ T

(2)kk (∆d)

)=

λk

(λk∆dF(1) +O(∆d2)

)(∑Ki=1 λiβ2

ik

) 32

, (C.20)

which completes the proof of (b).

C.3 Derivation of P(Rk > R0) when k ∈ KC

In this appendix, we aim to compute the probability

P(Rk > R0) = P(Φk

∩B(0, R0) = ∅). (C.21)

Based on the definition in Section 6.2.1, Φk =∪

x∈ΘkΩk(x), where Θk is the parent point process,

and Ωk(x) is a child point process. In order to investigate the event Φk

∩B(0, R0) = ∅, we construct a

point process Θ′k, which is a thinned point process on Θk as follows

Θ′k = x ∈ Θk|Ωk(x)

∩B(0, R0) = ∅. (C.22)

By its definition, we have Θ′k = ∅ iff

(∪x∈Θk

Ωk(x))∩

B(0, R0) = ∅, or equivalently, Φk

∩B(0, R0) = ∅.

Thus, we have

P(Φk

∩B(0, R0) = ∅) = P(Θ′

k = ∅). (C.23)

Because Ωk(x) is a PPP with intensity νk in B(x, Rk), we have

pk(x) , P(Ωk(x)∩

B(0, R0) = ∅) =

Page 123: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix C. Derivations and Proofs of Theorems in Chapter 6 111

1− exp(−νkC(R0, Rk, |x|)), if |Rk −R0| ≤ |x| < R0 +Rk,

1− exp(−νkπR2k)), if |x| < R0 −Rk and R0 ≥ Rk,

1− exp(−νkπR20)), if |x| < Rk −R0 and R0 < Rk,

0, if |x| ≥ Rk +R0.

(C.24)

Note that since Ωk(x) are independent with respect to different x, the events Ωk(x)∩B(0, R0) = ∅ are

also independent with respect to different x. As a result, Θ′k is an independently thinned point process

on Θk, with thinning probability pk(x) at x. Thus, Θ′k is a PPP with intensity pk(x)µk at x, and we

have

P(Θ′k = ∅) = exp

(∫R2

−µkp(x)dx

). (C.25)

Substituting (C.24) into (C.25), and transforming to polar coordinate, we derive (6.48). Note that

because p(x) is 0 in the region |x| ≥ Rk +R0, the value∫R2 −µkp(x)dx in (C.25) is finite.

C.4 Proof of Theorem 15

Proof. In this proof, we study the probability P(0 ∈ T

(2)kj (∆d)|R = R0, tier = k

). Without loss of

generality, we assume the reference BS is located at R0 = (R0, 0). Then, following the similar steps in

(C.2)-(C.9) in the proof of Theorem 11, 0 ∈ T(2)kj (∆d) is equivalent to the event that there is at least

one point of Φj in the ring region Skj(∆d). Note that the ring region here is still expressed in (C.9) and

shown in Fig. C.1. Given the reference UE and BS, Φj3 is a PPP with intensity 0 in B

(0, R0

βkj

)and

intensity λj in B (0, R0/βkj) [37]. Because P(0 ∈ T

(2)kj (∆d)|R = R0, tier = k

)is equal to the probability

that there is at least one point of Φj in Skj(∆d) (i.e., some x0 in Skj(∆d)), we have

P(0 ∈ T

(2)kj (∆d)|R = R0, tier = k

)(C.26)

=1− exp (−λj |Skj(∆d)|)

=1− exp(−2λj∆dR0F(βkj) +O(∆d2)

)=2λj∆dR0F(βkj) +O(∆d2),

which completes the proof.

C.5 Proof of Theorem 16

Proof. In this proof, we study the probability P(0 ∈ T

(2)kj (∆d)|R = R0, tier = k

). Without loss of

generality, we assume the reference BS is located at R0 = (R0, 0). Then, following the similar steps in

(C.2)-(C.9) in the proof of Theorem 11, 0 ∈ T(2)kj (∆d) is equivalent to the event that there is at least

one point of Φj in the ring region Skj(∆d), given that no point of Φj is in B(0, R0/βkj). Note that the

ring region here is still expressed in (C.9) and shown in Fig. C.1.

3If k = j, it is the reduced Palm point process [12] corresponding to all tier-k BSs other than reference BS.

Page 124: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix C. Derivations and Proofs of Theorems in Chapter 6 112

As labeled in Fig. C.1, we also define ∆Dkj(θ) as the thickness of the “ring” region of Skj(∆d) at

angular coordinate θ. We have

∆Dkj(θ) =

√R2

0

β2kj

+2∆dR0

β2kj

√(β2kj + 1

)− 2βkj cos(θ) +O(∆d2)− R0

βkj(C.27)

=∆d

√β2kj + 1− 2βkj cos(θ)

βkj+O(∆d2).

Then, we have

P(0 ∈ T

(2)kj (∆d)|R = R0, tier = k

)(C.28)

=P(Φj

∩Skj(∆d) = ∅

∣∣∣Φj

∩B(0, R0/βkj) = ∅

)(C.29)

=1

π

∫ π

0

ccdfRj

(R0

βkj

)− ccdfRj

(R0

βkj+∆Dkj(θ)

)+O(∆d2)

ccdfRj (R0/βkj)dθ

=1

π

∫ π

0

∆Dkj(θ)dθpdfRj

(R0/βkj)

ccdfRj (R0/βkj)+O(∆d2) (C.30)

=1

π

∫ π

0

∆d

√β2kj + 1− 2βkj cos(θ)

βkjdθ

pdfRj(R0/βkj)

ccdfRj (R0/βkj)+O(∆d2)

=1

πF(βkj)βkj∆d

pdfRj(R0/βkj)

ccdfRj (R0/βkj)+O(∆d2), (C.31)

which completes the proof.

Note that because the location of the reference tier-k BS is given, whether tier-k is a P-tier or a

C-tier does not influence this proof. The proof is true for all k ∈ K.

C.6 Proof of Theorem 18

Proof. In this proof, we study the probability P(0 ∈ T

(2)kk,in(∆d)|R = R0, tier = k

). Without loss of

generality, we assume the reference BS is located at xBS = R0 = (R0, 0). C(R0) is the cluster center

of the reference BS, and Ωk(C(R0)) is the cluster that the reference BS belongs to. Note that C(R0) is

surely located in B(R0, Rk) as its distance to the reference BS cannot be larger than Rk.

Following the similar steps in (C.2)-(C.9) in the proof of Theorem 15, 0 ∈ T(2)kk,in(∆d) is equivalent

to the event that there is at least one point of Ωk(C(R0)) in the ring region Skk(∆d), which is defined

in (C.9) with βkk = 1. Thus, we have

P(0 ∈ T(2)kk,in(∆d)|xBS = R0, tier = k) (C.32)

=P(Ωk(C(R0))

∩Skk(∆d) = ∅

∣∣xBS = R0, tier = k).

The event Ωk(C(R0))∩

Skk(∆d) = ∅ depends on the location of cluster center C(R0). Then we have

P(Ωk(C(R0))

∩Skk(∆d) = ∅

∣∣xBS = R0, tier = k)

(C.33)

Page 125: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix C. Derivations and Proofs of Theorems in Chapter 6 113

=

∫B(R0,Rk)

P[Ωk(C(R0))

∩Skk(∆d) = ∅

∣∣C(R0) = x]pdfcen,k(x)dx

=

∫B(R0,Rk)

(1− exp

(−νk

∣∣∣B(x, Rk)∩

Skk(∆d)∣∣∣))pdfcen,k(x)dx

=

∫B(R0,Rk)

νk

∣∣∣B(x, Rk)∩

Skk(∆d)∣∣∣ pdfcen,k(x)dx+O(∆d2),

where pdfcen,k(x) is defined as the pdf of the location of the cluster center C(R0), given the reference

UE is associated to the reference tier-k BS located at R0.

The distribution pdfcen,k(x) is derived in the following lemma:

Lemma 7. Given that the reference UE located at 0 is associated with the reference tier-k BS located

at R0 = (R0, 0), the probability density function of the location of the cluster center C(R0) is given in

(C.34), where (r, θ) is the polar coordinate of the cluster center.

pdfcen,k(r, θ) = (C.34)

exp(−C(R0,Rk,r)νk)∫R0+RkR0−Rk

2θm(r′,Rk,R0)r′ exp(−C(R0,Rk,r′)νk)dr′, if R0 ≥ Rk and R0 −Rk ≤ r < R0 +Rk

and − θm(r,Rk, R0) ≤ θ ≤ θm(r,Rk, R0),

exp(−C(R0,Rk,r)νk)

π(Rk−R0)2 exp(−πR20νk)+

∫Rk+R0Rk−R0

2θm(r′,Rk,R0)r′ exp(−C(R0,Rk,r′)νk)dr′, if R0 < Rk and Rk −R0 ≤ r < Rk +R0,

exp(−πR20νk)

π(Rk−R0)2 exp(−πR20νk)+

∫Rk+R0Rk−R0

2θm(r′,Rk,R0)r′ exp(−C(R0,Rk,r′)νk)dr′, if R0 < Rk and r < Rk −R0,

0, Otherwise.

See Appendix C.7 for the proof.

Based on Lemma 7, we derive (C.32) in two cases: R0 ≥ Rk and R0 < Rk.

Case one R0 ≥ Rk. After transforming to polar coordinate, (C.33) becomes

P(0 ∈ T(2)kk,in(∆d)|xBS = R0, tier = k)

=

∫ R0+Rk

R0−Rk

∫ θm(r,Rk,R0)

−θm(r,Rk,R0)

r · pdfcen,k(r, θ) · νk ·∣∣∣B((r, θ), Rk)

∩Skk(∆d)

∣∣∣dθdr +O(∆d2). (C.35)

Given (r, θ) as the polar coordinate of the cluster center of Ωk(C(R0)), we derive the area of over-

lapping region of B((r, θ), Rk) and Skk(∆d) as follows:∣∣∣B((r, θ), Rk)∩

Skk(∆d)∣∣∣ (C.36)

=∆dR0

∫ θ+θm(R0,Rk,r)

θ−θm(R0,Rk,r)

√2− 2 cos(θ′)dθ′ +O(∆d2)

=∆dR0

[− 4 cos

(θ + θm(R0, Rk, r)

2

)− 4 cos

(θ − θm(R0, Rk, r)

2

)+ 8

]+O(∆d2).

Substituting (C.36) into (C.35), we obtain Gk(R0)∆d+O(∆d2), where Gk(R0) is expressed as (6.57).

Case Two R0 < Rk. After transforming to polar coordinate, (C.33) becomes

P(0 ∈ T(2)kk,in(∆d)|xBS = R0, tier = k)

=

∫ Rk+R0

Rk−R0

∫ θm(r,Rk,R0)

−θm(r,Rk,R0)

r · pdfcen,k(r, θ) · νk ·∣∣∣B((r, θ), Rk)

∩Skk(∆d)

∣∣∣dθdr

Page 126: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix C. Derivations and Proofs of Theorems in Chapter 6 114

+

∫ Rk−R0

0

∫ π

−π

r · pdfcen,k(r, θ) · νk ·∣∣∣B((r, θ), Rk)

∩Skk(∆d)

∣∣∣dθdr +O(∆d2). (C.37)

Given (r, θ) as the polar coordinate of the cluster center of Ωk(C(R0)), we derive the area of over-

lapping region of B((r, θ), Rk) and Skk(∆d). If r ≥ Rk −R0, we have∣∣∣B((r, θ), Rk)∩

Skk(∆d)∣∣∣

=∆dR0

∫ θ+θm(R0,Rk,r)

θ−θm(R0,Rk,r)

√2− 2 cos(θ′)dθ′ +O(∆d2)

=∆dR0

[− 4 cos

(θ + θm(R0, Rk, r)

2

)− 4 cos

(θ − θm(R0, Rk, r)

2

)+ 8

]+O(∆d2). (C.38)

If r < Rk −R0, Skk(∆d) is covered by B((r, θ), Rk), then we have∣∣∣B((r, θ), Rk)∩

Skk(∆d)∣∣∣

=∆dR0

∫ π

−π

√2− 2 cos(θ′)dθ′ +O(∆d2)

=8∆dR0 +O(∆d2). (C.39)

Substituting (C.38) and (C.39) into (C.37), we obtainGk(R0)∆d+O(∆d2), whereGk(R0) is expressed

as (6.58).

C.7 Proof of Lemma 7

Proof. Because the reference UE located at 0 is associated with the reference tier-k BS located at

R0, it is true that Ωk(C(xBS))∩B(0, R0) = ∅, as R0 is the closest point to 0 in the cluster. Let

Xc = C(xBS) denote the location of the cluster center. We aim to derive the pdf of Xc given xBS = R0

and Ωk(C(xBS))∩B(0, R0) = ∅. For simplicity, we use the term Ω0 to represent Ωk(C(xBS)) in the rest

of this proof.

pdfcen,k(x) =pdfXc

[x∣∣xBS = R0,Ω0

∩B(0, R0) = ∅

](C.40)

=pdfXc

[x,Ω0

∩B(0, R0) = ∅

∣∣∣xBS = R0

]P [Ω0

∩B(0, R0) = ∅|xBS = R0]

=pdfXc

[x∣∣xBS = R0]P[Ω0

∩B(0, R0) = ∅|Xc = x

]∫B(R0,Rk)

pdfXc[x′|xBS = R0]P [Ω0

∩B(0, R0) = ∅|Xc = x′] dx′ .

Consider a single BS cluster. BSs are homogeneously Poisson distributed in the disk region centered

at the cluster center with radius Rk. If given the location of one BS, it can be shown that the cluster

center is uniformly distributed in the disk region centered at the BS with radius Rk. pdfXc[x|xBS = R0]

follows a uniform distribution in the disk region centered at xBS with radius Rk:

pdfXc[x|xBS = R0] =

1

πR2k

, if x ∈ B(R0, Rk). (C.41)

Page 127: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Appendix C. Derivations and Proofs of Theorems in Chapter 6 115

Given the cluster center x, Ω0 is a PPP in the disk region B(x, Rk) with intensity νk. We have

P[Ω0

∩B(0, R0) = ∅|Xc = x

]=exp

(−νk|B(0, R0)

∩B(x, Rk)|

)(C.42)

=

exp

(−νkπ(min(R0, Rk))

2), if |x| < |Rk −R0|,

exp (−νkC(R0, Rk, |x|)) , if |Rk −R0| ≤ |x| < Rk +R0,

1, if |x| ≥ Rk +R0.

(C.43)

Substituting (C.41) and (C.43) into (C.40), and transforming into polar coordinate, we obtain (C.34).

Note that when a transformation to polar coordinates is made,∫B(R0,Rk)

(·)dx is converted to∫ R0+Rk

R0−Rk∫ θm(r,Rk,R0)

−θm(r,Rk,R0)r(·)dθdr if R0 ≥ Rk, and

∫ Rk+R0

Rk−R0

∫ θm(r,Rk,R0)

−θm(r,Rk,R0)r(·)dθdr +

∫ Rk−R0

0

∫ π

−πr(·)dθdr if R0 <

Rk.

Page 128: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Bibliography

[1] X. Lagrange, “Multitier cell design,” IEEE Communications Magazine, vol. 35, no. 8, pp. 60–64,

Aug. 1997.

[2] V. Chandrasekhar, J. Andrews, and A. Gatherer, “Femtocell networks: a survey,” IEEE Commu-

nications Magazine, vol. 46, no. 9, pp. 59–67, Sep. 2008.

[3] A. Doufexi, E. Tameh, A. Nix, S. Armour, and A. Molina, “Hotspot wireless LANs to enhance

the performance of 3G and beyond cellular networks,” IEEE Communications Magazine, vol. 41,

no. 7, pp. 58–65, Jul. 2003.

[4] J. Sydir and R. Taori, “An evolved cellular system architecture incorporating relay stations,” IEEE

Communications Magazine, vol. 47, no. 6, pp. 115 – 121, Jun. 2009.

[5] A. Damnjanovic, J. Montojo, Y. Wei, T. Ji, T. Luo, M. Vajapeyam, T. Yoo, O. Song, and D. Mal-

ladi, “A survey on 3GPP heterogeneous networks,” IEEE Wireless Communications, vol. 18, no. 3,

pp. 10–21, Jun. 2011.

[6] A. Ghosh, N. Mangalvedhe, R. Ratasuk, B. Mondal, M. Cudak, E. Visotsky, T. A. Thomas, J. G.

Andrews, P. Xia, H. S. Jo, H. S. Dhillon, and T. D. Novlan, “Heterogeneous cellular networks:

From theory to practice,” IEEE Communications Magazine, vol. 50, no. 6, pp. 54–64, Jun. 2012.

[7] “AT&T 3G Microcell,” http://www.att.com/standalone/3gmicrocell.

[8] “AT&T Wi-Fi hot spot locations,” https://www.att.com/maps/wifi.

[9] “Performance of eICIC with control channel coverage limitation,” 3GPP Standard Contribution,

R1-103264, NTT DOCOMO, May 2010.

[10] R. Madan, J. Borran, A. Sampath, N. Bhushan, A. Khandekar, and T. Ji, “Cell association and

interference coordination in heterogeneous LTE-A cellular networks,” IEEE Journal on Selected

Areas in Communications, vol. 28, no. 9, pp. 1479–1489, Dec. 2010.

[11] D. Lopez-Perez, X. Chu, and I. Guvenc, “On the expanded region of picocells in heterogeneous

networks,” IEEE Journal of Selected Topics in Signal Processing, vol. 6, no. 3, pp. 281–294, Jun.

2012.

[12] H.-S. Jo, Y. J. Sang, P. Xia, and J. G. Andrews, “Heterogeneous cellular networks with flexible cell

association: a comprehensive downlink SINR analysis,” IEEE Trans. on Wireless Communications,

vol. 11, no. 10, pp. 3484–3495, Oct. 2012.

116

Page 129: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Bibliography 117

[13] S. Singh, H. Dhillon, and J. G. Andrews, “Offloading in heterogeneous networks: Modeling, analy-

sis, and design insights,” IEEE Trans. on Wireless Communications, vol. 12, no. 5, pp. 2484–2497,

May 2013.

[14] M. Stemm and R. H. Katz, “Vertical handoffs in wireless overlay networks,” ACM/Springer Mobile

Networks and Applications, vol. 3, no. 4, pp. 335–350, Jan. 1998.

[15] C. Bettstetter, G. Resta, and P. Santi, “The node distribution of the random waypoint mobility

model for wireless ad hoc networks,” IEEE Trans. on Mobile Computing, vol. 2, no. 3, pp. 257 –

269, Jul. - Sept. 2003.

[16] F. Ashtiani, J. Salehi, and M. Aref, “Mobility modeling and analytical solution for spatial traffic

distribution in wireless multimedia networks,” IEEE Journal on Selected Areas in Communica-

tions, vol. 21, no. 10, pp. 1699 – 1709, Dec. 2003.

[17] G. Mohimani, F. Ashtiani, A. Javanmard, and M. Hamdi, “Mobility modeling, spatial traffic

distribution, and probability of connectivity for sparse and dense vehicular ad hoc networks,”

IEEE Trans. on Vehicular Technology, vol. 58, no. 4, pp. 1998 – 2007, May 2009.

[18] A. Ghosh, R. Jana, V. Ramaswami, J. Rowland, and N. Shankaranarayanan, “Modeling and

characterization of large-scale Wi-Fi traffic in public hot-spots,” in Proc. of IEEE INFOCOM,

Shanghai, China, Apr. 2011.

[19] Y. Chen, J. Kurose, and D. Towsley, “A mixed queueing network model of mobility in a campus

wireless network,” in Proc. of IEEE INFOCOM Mini-Conference, Orlando, FL, Mar. 2012.

[20] V. B. Iversen, Teletraffic Engineering Handbook. ITU-D SG 2/16 & ITC Draft 2001-06-20, 2001.

[21] P. Heegaard, “Empirical observations of traffic patterns in mobile and IP telephony,” in Next

Generation Teletraffic and Wired/Wireless Advanced Networking, ser. Lecture Notes in Computer

Science. Springer Berlin / Heidelberg, 2007, vol. 4712, pp. 26–37.

[22] Z. Jako and G. Jeney, “Outage probability in poisson-cluster-based lte two-tier femtocell networks,”

Wiley Wireless Communications and Mobile Computing, Jun. 2014.

[23] K. Gulati, B. Evans, J. Andrews, and K. Tinsley, “Statistics of co-channel interference in a field

of poisson and poisson-poisson clustered interferers,” IEEE Trans. on Signal Processing, vol. 58,

no. 12, pp. 6207–6222, Dec. 2010.

[24] Y. Zhong andW. Zhang, “Multi-channel hybrid access femtocells: A stochastic geometric analysis,”

IEEE Trans. on Communications, vol. 61, no. 7, pp. 3016–3026, Jul. 2013.

[25] F. P. Kelly, Reversibility and Stochastic Networks. Cambridge, 1979.

[26] D. Y. Burman, “Insensitivity in queueing systems,” Advances in Applied Probability, vol. 13, no. 4,

pp. 846 – 859, Dec. 1981.

[27] P. Whittle, “Partial balance and insensitivity,” Journal of Applied Probability, vol. 22, no. 1, pp.

168 – 176, Mar. 1985.

Page 130: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Bibliography 118

[28] T. Bonald, “Insensitive queueing models for communication networks,” in Proc. of International

Conference on Performance Evaluation Methodologies and Tools (VALUETOOLS), Pisa, Italy,

Oct. 2006.

[29] M. M. Zonoozi and P. Dassanayake, “User mobility modeling and characterization of mobility

patterns,” IEEE Journal on Selected Areas in Communications, vol. 15, no. 7, pp. 1239–1252, Sep.

1997.

[30] A. Anpalagan and I. Katzela, “Overlaid cellular system design, with cell selection criteria for mobile

wireless users,” in Proc. of IEEE Canadian Conference on Electrical and Computer Engineering,

Edmonton, Canada, May 1999.

[31] N. Shenoy and B. Hartpence, “A mobility model for cost analysis in integrated cellular/WLANs,”

in Proc. of International Conference on Computer Communications and Networks, Chicago, IL,

Oct. 2004.

[32] A. Hasib and A. Fapojuwo, “Mobility model for heterogeneous wireless networks and its application

in common radio resource management,” IET Communications, vol. 2, no. 9, pp. 1186–1195, Oct.

2008.

[33] X. Lin, R. Ganti, P. Fleming, and J. Andrews, “Towards understanding the fundamentals of

mobility in cellular networks,” IEEE Trans. on Wireless Communications, vol. 12, no. 4, pp.

1686–1698, Apr. 2013.

[34] J. G. Andrews, F. Baccelli, and R. Ganti, “A tractable approach to coverage and rate in cellular

networks,” IEEE Trans. on Communications, vol. 59, no. 11, pp. 3122–3134, Nov. 2011.

[35] H. Dhillon, R. Ganti, F. Baccelli, and J. G. Andrews, “Modeling and analysis of K-tier downlink

heterogeneous cellular networks,” IEEE Journal on Selected Areas in Communications, vol. 30,

no. 3, pp. 550–560, Apr. 2012.

[36] W. C. Cheung, T. Q. S. Quek, and M. Kountouris, “Throughput optimization, spectrum allo-

cation, and access control in two-tier femtocell networks,” IEEE Journal on Selected Areas in

Communications, vol. 30, no. 3, pp. 561–574, Apr. 2012.

[37] F. Baccelli and B. Blaszczyszyn, “Stochastic geometry and wireless networks, volume 1: Theory,”

Foundations and Trends in Networking, vol. 3, no. 3-4, pp. 249 – 449, 2009.

[38] ——, “Stochastic geometry and wireless networks, volume 2: Applications,” Foundations and

Trends in Networking, vol. 4, no. 1-2, pp. 1–312, 2009.

[39] D. Stoyan, W. Kendall, and J. Mecke, Stochastic Geometry and Its Applications, 2nd ed. Wiley,

1995.

[40] J. Andrews, R. Ganti, M. Haenggi, N. Jindal, and S. Weber, “A primer on spatial modeling and

analysis in wireless networks,” IEEE Communications Magazine, vol. 48, no. 11, pp. 156–163, Nov.

2010.

[41] M. Haenggi, J. G. Andrews, F. Baccelli, O. Dousse, and M. Franceschetti, “Stochastic geometry

and random graphs for the analysis and design of wireless networks,” IEEE Journal on Selected

Areas in Communications, vol. 27, no. 7, pp. 1029 – 1046, Sep. 2009.

Page 131: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Bibliography 119

[42] H. Dhillon, R. Ganti, F. Baccelli, and J. Andrews, “A tractable framework for coverage and outage

in heterogeneous cellular networks,” in Information Theory and Applications Workshop, San Diego,

CA, Feb. 2011.

[43] H. Keeler, B. Blaszczyszyn, and M. Karray, “SINR-based k-coverage probability in cellular net-

works with arbitrary shadowing,” in Proc. of IEEE ISIT, Istanbul, Turkey, Jul. 2013, pp. 1167–

1171.

[44] Y. Kim, S. Lee, and D. Hong, “Performance analysis of two-tier femtocell networks with outage

constraints,” IEEE Trans. on Wireless Communications, vol. 9, no. 9, pp. 2695–2700, Sep. 2010.

[45] H. S. Dhillon, R. K. Ganti, and J. G. Andrews, “Load-aware heterogeneous cellular networks:

Modeling and SIR distribution,” in Proc. of IEEE GLOBECOM, Anaheim, CA, Dec. 2012, pp.

4314–4319.

[46] H.-S. Jo, P. Xia, and J. G. Andrews, “Open, closed, and shared access femtocells in the downlink,”

EURASIP Journal on Wireless Communications and Networking, vol. 2012, no. 363, Dec. 2012.

[47] S. Kishore, L. Greenstein, H. Poor, and S. Schwartz, “Uplink user capacity in a CDMA macrocell

with a hotspot microcell: exact and approximate analyses,” IEEE Trans. on Wireless Communi-

cations, vol. 2, no. 2, pp. 364–374, Mar. 2003.

[48] ——, “Uplink user capacity in a multicell CDMA system with hotspot microcells,” IEEE Trans.

on Wireless Communications, vol. 5, no. 6, pp. 1333–1342, June 2006.

[49] X. An and F. Pianese, “Understanding co-channel interference in LTE-based multi-tier cellular

networks,” in Proc. of ACM PE-WASUN, Paphos, Cyprus, Oct. 2012, pp. 107–112.

[50] T. D. Novlan, H. S. Dhillon, and J. G. Andrews, “Analytical modeling of uplink cellular networks,”

IEEE Trans. on Wireless Communications, vol. 12, no. 6, pp. 1536–1276, Jun. 2013.

[51] T. Novlan and J. Andrews, “Analytical evaluation of uplink fractional frequency reuse,” IEEE

Trans. on Wireless Communications, vol. 61, no. 5, pp. 2098–2108, May 2013.

[52] N. Chakchouk and B. Hamdaoui, “Uplink performance characterization and analysis of two-tier

femtocell networks,” IEEE Trans. on Vehicular Technology, vol. 61, no. 9, pp. 4057–4068, Nov.

2012.

[53] V. Chandrasekhar and J. Andrews, “Uplink capacity and interference avoidance for two-tier fem-

tocell networks,” IEEE Trans. on Wireless Communications, vol. 8, no. 7, pp. 3498–3509, Jul.

2009.

[54] W. C. Cheung, T. Q. S. Quek, and M. Kountouris, “Stochastic analysis of two-tier networks:

Effect of spectrum allocation,” in Proc. of IEEE ICASSP, Prague, Czech Republic, May 2011, pp.

2964–2967.

[55] W. Bao and B. Liang, “Uplink interference analysis for two-tier cellular networks with diverse

users under random spatial patterns,” IEEE Trans. on Wireless Communications, vol. 14, no. 3,

pp. 1252–1265, Mar. 2015.

Page 132: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Bibliography 120

[56] P. Xia, V. Chandrasekhar, and J. Andrews, “Open vs. closed access femtocells in the uplink,”

IEEE Trans. on Wireless Communications, vol. 9, no. 12, pp. 3798–3809, Dec. 2010.

[57] P. Tarasak, T. Q. S. Quek, and F. P. S. Chin, “Uplink timing misalignment in open and closed

access OFDMA femtocell networks,” IEEE Communications Letters, vol. 15, no. 9, pp. 926–928,

Sep. 2011.

[58] Z. Zeinalpour-Yazdi and S. Jalali, “Outage analysis of uplink two-tier networks,” IEEE Trans. on

Communications, vol. 62, no. 9, pp. 3351–3362, Sep. 2014.

[59] H. ElSawy and E. Hossain, “On stochastic geometry modeling of cellular uplink transmission with

truncated channel inversion power control,” IEEE Trans. on Wireless Communications, vol. 13,

no. 8, pp. 4454–4469, Aug. 2014.

[60] F. Tong, M. Ahmadi, and J. Pan, “Random distances associated with arbitrary triangles: A

systematic approach between two random points,” arXiv:1312.2498 [math.GM], 2013.

[61] Y. Zhuang and J. Pan, “Random distances associated with rhombuses,” arXiv:1106.1257

[math.GM], 2011.

[62] ——, “Random distances associated with hexagons,” arXiv:1106.2200 [math.GM], 2011.

[63] M. Ahmadi and J. Pan, “Random distances associated with trapezoids,” arXiv:1307.1444

[math.GM], 2013.

[64] M. Ahmadi, F. Tong, L. Zheng, and J. Pan, “Performance analysis for two-tier cellular systems

based on probabilistic distance models,” in Proc. of IEEE INFOCOM, Hong Kong, China, Apr.

2015.

[65] J.-W. Lee, R. Mazumdar, and N. Shroff, “Joint resource allocation and base-station assignment

for the downlink in CDMA networks,” IEEE/ACM Trans. on Networking, vol. 14, no. 1, pp. 1–14,

Feb. 2006.

[66] Q. Ye, B. Rong, Y. Chen, M. Al-Shalash, C. Caramanis, and J. G. Andrews, “User association for

load balancing in heterogeneous cellular networks,” IEEE Trans. on Wireless Communications,

vol. 12, no. 6, pp. 2706–2716, Jun. 2013.

[67] M. Hong and A. Garcia, “Mechanism design for base station association and resource allocation in

downlink OFDMA network,” IEEE Journal on Selected Areas in Communications, vol. 30, no. 11,

pp. 2238–2250, Dec. 2012.

[68] C. S. Chen, F. Baccelli, and L. Roullet, “Joint optimization of radio resources in small and macro

cell networks,” in Proc. of VTC (Spring), Budapest, Hungary, May 2011.

[69] K. Shen and W. Yu, “Downlink cell association optimization for heteregeneous networks via dual

coordinate descent,” in Proc. of IEEE ICASSP, Vancouver, Canada, May 2013, pp. 4779–4783.

[70] D. Fooladivanda, A. A. Daoud, and C. Rosenberg, “Joint channel allocation and user association

for heterogeneous wireless cellular networks,” in Proc. of IEEE PIMRC, Toronto, Canada, Sep.

2011, pp. 384–390.

Page 133: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Bibliography 121

[71] W. Bao and B. Liang, “Near-optimal spectrum allocation in multi-tier cellular networks with

random inelastic traffic,” in Proc. of IEEE ICASSP, Florence, Italy, May 2014.

[72] ——, “Radio resource allocation in heterogeneous wireless networks: a spatial-temporal perspec-

tive,” in Proc. of IEEE INFOCOM, Hong Kong, China, Apr. 2015.

[73] S. Singh and J. G. Andrews, “Joint resource partitioning and offloading in heterogeneous cellular

networks,” IEEE Trans. on Wireless Communications, vol. 13, no. 2, pp. 888 – 901, Feb. 2014.

[74] Y. Lin and W. Yu, “Optimizing user association and frequency reuse for heterogeneous network

under stochastic model,” in Proc. of IEEE Globecom, Atlanta, GA, Dec. 2013, pp. 2045–2050.

[75] ——, “Joint spectrum partition and user association in multi-tier heterogeneous networks,” in

Proc. of CISS, Princeton, NJ, Mar. 2014.

[76] Y. Lin, W. Bao, W. Yu, and B. Liang, “Optimizing user association and spectrum allocation in

HetNets: a utility perspective,” IEEE Journal on Selected Areas in Communications, vol. 33, no. 6,

pp. 1025–1039, Jun. 2015.

[77] R. Serfozo, Introduction to Stochastic Networks. Springer, 1999.

[78] W. Bao and B. Liang, “On the insensitivity of user distribution in multicell networks under general

mobility and session patterns,” in Proc. of IEEE INFOCOM, Turin, Italy, Apr. 2013.

[79] ——, “Insensitivity of user distribution in multicell networks under general mobility and session

patterns,” IEEE Trans. on Wireless Communications, vol. 12, no. 12, pp. 6244–6254, Dec. 2013.

[80] ——, “Understanding the benefits of open access in femtocell networks: Stochastic geometric

analysis in the uplink,” in Proc. of ACM MSWiM, Barcelona, Spain, Nov. 2013.

[81] ——, “Stochastic analysis of uplink interference in two-tier femtocell networks: Open versus closed

access,” to appear in IEEE Trans. on Wireless Communications, 2015.

[82] ——, “Structured spectrum allocation and user association in heterogeneous cellular networks,”

in Proc. of IEEE INFOCOM, Toronto, Canada, Apr.-May 2014.

[83] ——, “Rate maximization through structured spectrum allocation and user association in hetero-

geneous cellular networks,” to appear in IEEE Trans. on Communications, 2015.

[84] ——, “Handoff rate analysis in heterogeneous cellular networks: a stochastic geometric approach,”

in Proc. of ACM MSWiM, Montreal, Canada, Sep. 2014.

[85] ——, “Stochastic geometric analysis of user mobility in heterogeneous wireless networks,” IEEE

Journal on Selected Areas in Communications, vol. 33, no. 10, pp. 2212–2225, Oct. 2015.

[86] ——, “Handoff rate analysis in heterogeneous wireless networks with poisson and poisson cluster

patterns,” in Proc. of ACM MobiHoc, Hangzhou, China, Jun. 2015.

[87] V. Paxson and S. Floyd, “Wide area traffic: the failure of poisson modeling,” IEEE/ACM Trans.

on Networking, vol. 3, no. 3, pp. 226–244, Jun. 1995.

Page 134: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Bibliography 122

[88] D. Kotz, T. Henderson, I. Abyzov, and J. Yeo, “CRAWDAD

trace dartmouth/campus/snmp/fall01 (v. 2004-11-09),” Downloaded from

http://crawdad.cs.dartmouth.edu/dartmouth/campus/snmp/fall01, Nov. 2004.

[89] ——, “CRAWDAD trace dartmouth/campus/snmp/spring02 (v. 2004-11-09),” Downloaded from

http://crawdad.cs.dartmouth.edu/dartmouth/campus/snmp/spring02, Nov. 2004.

[90] ——, “CRAWDAD trace dartmouth/campus/snmp/fall0304 (v. 2004-11-09),” Downloaded from

http://crawdad.cs.dartmouth.edu/dartmouth/campus/snmp/fall0304, Nov. 2004.

[91] [Online]. Available: http://sysnet.ucsd.edu/wtd/

[92] M. Balazinska and P. Castro, “CRAWDAD data set ibm/watson (v. 2003-02-19),” Downloaded

from http://crawdad.cs.dartmouth.edu/ibm/watson, Feb. 2003.

[93] M. Lenczner, B. Gregoire, and F. Proulx, “CRAWDAD data set ilesansfil/wifidog (v. 2007-08-27),”

Downloaded from http://crawdad.cs.dartmouth.edu/ilesansfil/wifidog, Aug. 2007.

[94] D. Kotz and K. Essien, “Analysis of a campus-wide wireless network,” in Proc. of ACM Mobicom,

Atlanta, GA, Sept. 2002.

[95] T. Henderson, D. Kotz, and I. Abyzov, “The changing usage of a mature campus-wide wireless

network,” in Proc. of ACM MobiCom, Philadelphia, PA, Sept. 2004.

[96] M. Kim and D. Kotz, “Periodic properties of user mobility and access-point popularity,” Personal

and Ubiquitous Computing, vol. 11, no. 6, pp. 465 – 479, Aug. 2007.

[97] D. Knisely, T. Yoshizawa, and F. Favichia, “Standardization of femtocells in 3GPP,” IEEE Com-

munications Magazine, vol. 47, no. 9, pp. 68–75, Sep. 2009.

[98] C. C. Chan and S. Hanly, “Calculating the outage probability in a CDMA network with spatial

Poisson traffic,” IEEE Trans. on Vehicular Technology, vol. 50, no. 1, pp. 183–204, Jan. 2001.

[99] Q. Ye, M. Al-Shalash, C. Caramanis, and J. Andrews, “Resource optimization in device-to-device

cellular systems using time-frequency hopping,” IEEE Trans. on Wireless Communications, vol. 13,

no. 10, pp. 5467–5480, Oct. 2014.

[100] S. Singh, X. Zhang, and J. G. Andrews, “Joint rate and SINR coverage analysis for decoupled

uplink-downlink biased cell associations in HetNets,” arXiv:1412.1898 [cs.IT], 2014.

[101] K. Gilhousen, I. Jacobs, R. Padovani, A. Viterbi, L. Weaver, and C. Wheatley, “On the capacity

of a cellular CDMA system,” IEEE Trans. on Vehicular Technology, vol. 40, no. 2, pp. 303–312,

May 1991.

[102] A. J. Viterbi, A. M. Viterbi, K. Gilhousen, and E. Zehavi, “Soft handoff extends CDMA cell

coverage and increases reverse link capacity,” IEEE Journal on Selected Areas in Communications,

vol. 12, no. 8, pp. 1281–1288, Oct. 1994.

[103] 3GPP-TS-36.104, “Evolved universal terrestrial radio access (E-UTRA); base station (BS) radio

transmission and reception (release 12),” Dec. 2014.

Page 135: Stochastic Analysis and Optimization of Heterogeneous ... · Stochastic Analysis and Optimization of Heterogeneous Wireless Networks Wei Bao Doctor of Philosophy Graduate Department

Bibliography 123

[104] 3GPP-TR-36.814, “Evolved universal terrestrial radio access (E-UTRA); further advancements for

E-UTRA physical layer aspects (release 9),” Mar. 2010.

[105] 3GPP-TR-25.967, “Universal mobile telecommunications system (UMTS); home node B (HNB)

radio frequency (RF),” Oct. 2014.

[106] P. F. Ash and E. D. Bolker, “Generalized Dirichlet tessellations,” Geometriae Dedicata, vol. 20,

no. 2, pp. 209–243, Apr. 1986.

[107] J.-S. Ferenc and Z. Neda, “On the size distribution of Poisson Voronoi cells,” Physica A: Statistical

Mechanics and its Applications, vol. 385, no. 2, pp. 518–526, Nov. 2007.

[108] M. Udell and S. Boyd, “Maximizing a sum of sigmoids.” [Online]. Available: http:

//www.stanford.edu/∼udell/doc/max sum sigmoids.pdf

[109] M. Chiang, “Nonconvex optimization of communication systems,” Advances in Mechanics and

Mathematics, Special Volumn on Strang’s 70th Birthday, pp. 137–196, Oct. 2007.

[110] S. Boyd and L. Vandenberghe, Convex Optimization. Cambridge University Press, 2004.

[111] A. M. Ibrahim, T. ElBatt, and A. El-Keyi, “Coverage probability analysis for wireless networks

using repulsive point processes,” in Proc. of IEEE PIMRC, London, UK, Sep. 2013, pp. 1002–1007.

[112] A. Guo and M. Haenggi, “Spatial stochastic models and metrics for the structure of base stations

in cellular networks,” IEEE Trans. on Wireless Communications, vol. 12, no. 11, pp. 5800–5812,

Nov. 2013.

[113] A. Chambolle, S. Lisini, and L. Lussardi, “A remark on the anisotropic outer Minkowski content,”

Advances in Calculus of Variations, vol. 7, no. 2, pp. 241–266, Apr. 2014.

[114] H. Federer, Geometric Measure Theory. Springer, 1969.

[115] V. Chandrasekhar and J. G. Andrews, “Spectrum allocation in tiered cellular networks,” IEEE

Trans. on Communications, vol. 57, no. 10, pp. 3059–3068, Oct. 2009.

[116] Y. Chon, E. Talipov, H. Shin, and H. Cha, “Mobility data collected by

Lifemap monitoring system at Yonsei University in Seoul,” Downloaded from

http://crawdad.cs.dartmouth.edu/yonsei/lifemap/, May 2012.